100% found this document useful (1 vote)
351 views30 pages

Computer Network - CS610 Power Point Slides Lecture 08

Computer networks use various coordination schemes to share communication channels. Ethernet uses Carrier Sense Multiple Access with Collision Detection (CSMA/CD) where computers listen first before transmitting and can detect collisions. Wireless LANs use Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA) since collisions cannot be detected. Token ring networks use token passing to coordinate access as computers must wait for a token before transmitting. Fiber Distributed Data Interface (FDDI) also uses a token passing ring topology with counter-rotating rings to improve reliability. Asynchronous Transfer Mode (ATM) uses electronic switches in a star topology to provide point-to-point connections between computers.

Uploaded by

Ibrahim Choudary
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPT, PDF, TXT or read online on Scribd
100% found this document useful (1 vote)
351 views30 pages

Computer Network - CS610 Power Point Slides Lecture 08

Computer networks use various coordination schemes to share communication channels. Ethernet uses Carrier Sense Multiple Access with Collision Detection (CSMA/CD) where computers listen first before transmitting and can detect collisions. Wireless LANs use Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA) since collisions cannot be detected. Token ring networks use token passing to coordinate access as computers must wait for a token before transmitting. Fiber Distributed Data Interface (FDDI) also uses a token passing ring topology with counter-rotating rings to improve reliability. Asynchronous Transfer Mode (ATM) uses electronic switches in a star topology to provide point-to-point connections between computers.

Uploaded by

Ibrahim Choudary
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPT, PDF, TXT or read online on Scribd
You are on page 1/ 30

COMPUTER NETWORKS

CS610
Lecture-8
Hammad Khalid Khan
Review Lecture 7
 Shared Communication Channel
 Locality of Reference Principle
 LAN Topologies
– Star
– Ring
– Bus
 Ethernet
Carrier Sense Multiple Access
 A coordination scheme that defines how to take turns
using a shared cable

 A computer listens to the cable (carrier sense)


– If the cable is idle then starts transmitting
– If the cable is in use, then waits

 If Simultaneous transmissions occur, the frames


interfere with each other called a Collision
Collision Detection - CD

 Signals from two computers will interfere with each other

 Overlapping frames is called a Collision


– No harm to hardware
– Data from both frames is Garbled
Ethernet CD

 Ethernet interfaces include hardware to detect


transmission
– Monitor outgoing signal
– Garbled signal is interpreted as a collision
 After collision is detected, computer stops transmitting
 So, Ethernet uses CSMA/CD to coordinate transmissions
Recovery from Collision
 Computer that detects a collision sends special signal to
force all other interfaces to detect collision
 Computer then waits for ether to be idle before
transmitting
– If both computers wait same length of time, frames
will collide again
– Standard specifies maximum delay, and both
computers choose random delay less than maximum
Recovery from Collision
 After waiting, computers use carrier sense to avoid
subsequent collision

– Computer with shorter delay will go first


– Other computers may transmit later
Exponential Backoff
 Even with random delays, collisions may occur

 Especially likely with busy segments

 Computers double delay with each subsequent collision

 Reduces likelihood of sequence of collisions


802.11 Wireless LANs And CSMA/CA

 Use radio signals at 2.4 GHz (IEEE 802.11)


 Data rate at 11Mbps
 Older devices use radio signals at 900MHz
 Data rate of 2Mbps
 Bluetooth specifies a wireless LAN for short distances
 Shared medium - radio instead of coax
Limited Connectivity with Wireless

 In contrast with wired LAN, not all participants may be


able to reach each other
– Low signal strength
– Propagation blocked by walls, etc.

 Can't depend on CD; not all participants may hear


Limited Connectivity with Wireless
CSMA/CA
 Wireless uses Collision Avoidance rather than
Collision Detection
– Transmitting computer sends very short message
to receiver
– Receiver responds with short message reserving
slot for transmitter

 Response from receiver is broadcast, so all potential


transmitters receive reservation
Collisions
 Receiver may receive simultaneous requests
– Results in collision at receiver
– Both requests are lost
– Neither transmitter receives reservation; both use
backoff and retry

 Receiver may receive closely spaced requests


– Selects one
– Selected transmitter sends message
– Transmitter not selected uses backoff and retries
Local Talk

 LAN technology invented by Apple that uses bus


topology
 Interface included with all Macintosh computers
 Relatively low speed - 230.4Kbps
 Low cost (``free'' with a Macintosh); easy to install and
connect
 Uses CSMA/CA
Token Ring
 Many LAN technologies that use ring topology use token
passing for synchronized access to the ring

 Ring itself is treated as a single, shared communication


medium

 Bits pass from transmitter, past other computers and are


copied by destination
Token Ring
 Hardware must be designed to pass token even if attached
computer is powered down
Using the token

 When a computer wants to transmit, it waits for the token

 After transmission, computer transmits token on ring



 Next computer ready to transmit receives token and then
transmits
Token and Synchronization

 Because there is only one token, only one computer will


transmit at a time

– Token is short, reserved frame that cannot appear in


data
– Hardware must regenerate token if lost
Token and Synchronization

 Token gives computer permission to send one frame

– If all ready to transmit, enforces ``Round-Robin''


access
– If none ready to transmit, token circulates around
ring
IBM Token Ring

 Very widely used

 Originally 4mbps, now 16Mbps

 Uses special connector cable between computer and ring


interface
FDDI
 Fiber Distributed Data Interconnect (FDDI) is another ring
technology

– Uses fiber optics between stations


– Transmits data at 100Mbps

 Uses pairs of fibers to form two concentric rings


FDDI and Reliability

 FDDI uses counter-rotating rings in which data flows


in opposite directions

 In case of fiber or station failure, remaining stations
loop back and reroute data through spare ring

 All stations automatically configure loop back by


monitoring data ring
FDDI and Reliability
ATM – Star Network
 Asynchronous Transfer Mode technology consists of
electronic packet switches to which computers can
connect
 ATM switches form hub into which computers connect in
a star topology
 Computers get point-to-point connections - data from
transmitter is routed directly through hub switches to
destination
– If none ready to transmit, token circulates around ring
– If all ready to transmit, enforces ``Round-Robin''
access
ATM – Star Network
ATM Details

 Transmits data at over 100Mbps

 Uses fiber optics to connect computer to switch

 Each connection includes two fibers


ATM Details
ATM Switches
Summary

 CSMA/CD
 Wireless LANs and CSMA/CA
 Token Ring
 FDDI
 ATM

You might also like