You are on page 1of 14

CCN Seminar

ABDUS SARIF AHMED


1RV07EC002
Ethernet MAC Sublayer Protocol
• Ethernet is mainly a protocol that controls the
way data is transmitted over a local area network.
• IEEE 802.3 standard is commonly referred to as
ethernet.
• Because  of  differences   in   packet   formation
  and   physical construction associated with each
standard,the networking community currently
follows the original Ethernet standard
implementation by the DIX suffix .
Ethernet MAC Sublayer Protocol

Frame Formats (a)DIX Ethernet


(b)IEEE 802.3
Ethernet MAC Sublayer Protocol
DIX frame format
• The frame starts with Preamble of 8 bytes
pattern being 10101010.Manchester encoding is
done on this pattern for synchronisation
purpose.
• Destination and source addresses on this frame
is of 6 bytes each.The high order bit in the
destination address is 0 for ordinary addresses
and 1 for group addresses(multicast).
• The destination address consisting of all 1 bits is
reserved for broadcast.
Ethernet MAC Sublayer Protocol
• The addresses can also be local and global.
• Local addresses are assigned by each network
administrator with no significance outside the
local network.
• Global addresses are assigned centrally by
IEEE to ensure that no two stations have the
same global address.
• The type field tells the receiver what to do
with the frame.
• The data field can be from 0 to 1500 bytes.
Ethernet MAC Sub Layer Protocol
• When a transceiver detects a collision,it
truncates the current frame and so stray bits
appear on the cable all the time.
• To distinguish valid frames from garbage,the
frames must be atleast 64 bytes long from
destination address to checksum including
both.
• The pad field is used to fill out the frame to
minimum size when data portion is less than
46 bytes.
Ethernet MAC Sub Layer Protocol
•Minimum frame length
Ethernet and MAC sublayer protocol
• Important reason for having minimum frame length is
to prevent a station from completing the
transmission of a short frame before the first bit has
even reached the far end of the cable where it may
collide with another frame.
• When a station(say A) is transmitting frame to
another station(say B) and if there is a collision
station B aborts its transmission and generates a 48
bit noise burst to warn all other satations.
• At about time 2τ the sender sees the noise burst and
aborts its transmission too and waits for a random
time before trying again.
Ethernet and MAC sublayer protocol
• To prevent wrong interpretation by the sender all
frames must take more than 2τ time to reach the
receiver.
• As the network speed goes up the minimum
frame length must go up or maximum cable
length must come down proportionately.
• The checksum field is 32 bit and is required to
detect the errors.The most common checksum
algorithm is cyclic redundancy check(CRC).
Ethernet and MAC sublayer protocol
• When IEEE standardised Ethernet,the
committee made two changes to the DIX
format:
(1)Preamble field is reduced to 7 bytes and
the last byte is used for a Start of Frame
delimiter.
(2)The type field is changed into a Length
field and the operation to be done on the frame
is given by a small header to the data portion.
Binary Exponential Backoff Algorithm
• Proper randomization is done when a collision occurs
using binary exponential backoff algorithm.
• After a collision time is divided into discrete slots each
length being equal to the worst case round trip
propagation time(2τ).
• After first collision,each station waits either 0 or 1 slot
times before trying again.If after collisions, the two
stations take the same random number, they will
collide again.
• In general after i collisions,a random number between
0 and 2i -1 is chosen by each station and that number
of slots is skipped.
Binary Exponential Backoff Algorithm
• After 10 collisions the randomization interval is
frozen at a maximum of 1023 slots and after 16
collisions the controller reports failure.
• Binary exponential backoff algorithm is chosen to
dyanamically adapt to the number of stations
trying to send.
• If the randomization interval for all collisions is
made 1023 then there is very less chance of
stations colliding for second time but it
introduces delay.
Binary Exponential Backoff Algorithm
• If each station always delayed for either 0 or 1
slot,then if n sations try to send once,they would
collide over and over again until (n-1) of them
picked 1 and the remaining station picked 0.
• By having the randomization interval grow
exponentially as more and more consecutive
collisions occur,the algorithm ensures a low
delay when only few stations collide and if many
stations collide, the collision is resolved in a
reasonable interval.
Binary Exponential Backoff Algorithm
• Since the mere absense of collisions does not
guarantee that bits were not garbled by noise
spikes on the cable, for reliable communication
the destination must verify the checksum and
send back an acknowledgement frame to the
sender.
• The acknowlegement frame would have to fight
for channel time just like the data frame

You might also like