This document discusses Ethernet and the MAC sublayer protocol. It describes the DIX and IEEE 802.3 frame formats, including fields like preamble, destination/source addresses, type/length fields, and checksum. It also explains the minimum frame length requirement and binary exponential backoff algorithm used for collision avoidance.
This document discusses Ethernet and the MAC sublayer protocol. It describes the DIX and IEEE 802.3 frame formats, including fields like preamble, destination/source addresses, type/length fields, and checksum. It also explains the minimum frame length requirement and binary exponential backoff algorithm used for collision avoidance.
Copyright:
Attribution Non-Commercial (BY-NC)
Available Formats
Download as PPTX, PDF, TXT or read online from Scribd
This document discusses Ethernet and the MAC sublayer protocol. It describes the DIX and IEEE 802.3 frame formats, including fields like preamble, destination/source addresses, type/length fields, and checksum. It also explains the minimum frame length requirement and binary exponential backoff algorithm used for collision avoidance.
Copyright:
Attribution Non-Commercial (BY-NC)
Available Formats
Download as PPTX, PDF, TXT or read online from Scribd
1RV07EC002 Ethernet MAC Sublayer Protocol • Ethernet is mainly a protocol that controls the way data is transmitted over a local area network. • IEEE 802.3 standard is commonly referred to as ethernet. • Because of differences in packet formation and physical construction associated with each standard,the networking community currently follows the original Ethernet standard implementation by the DIX suffix . Ethernet MAC Sublayer Protocol
Frame Formats (a)DIX Ethernet
(b)IEEE 802.3 Ethernet MAC Sublayer Protocol DIX frame format • The frame starts with Preamble of 8 bytes pattern being 10101010.Manchester encoding is done on this pattern for synchronisation purpose. • Destination and source addresses on this frame is of 6 bytes each.The high order bit in the destination address is 0 for ordinary addresses and 1 for group addresses(multicast). • The destination address consisting of all 1 bits is reserved for broadcast. Ethernet MAC Sublayer Protocol • The addresses can also be local and global. • Local addresses are assigned by each network administrator with no significance outside the local network. • Global addresses are assigned centrally by IEEE to ensure that no two stations have the same global address. • The type field tells the receiver what to do with the frame. • The data field can be from 0 to 1500 bytes. Ethernet MAC Sub Layer Protocol • When a transceiver detects a collision,it truncates the current frame and so stray bits appear on the cable all the time. • To distinguish valid frames from garbage,the frames must be atleast 64 bytes long from destination address to checksum including both. • The pad field is used to fill out the frame to minimum size when data portion is less than 46 bytes. Ethernet MAC Sub Layer Protocol •Minimum frame length Ethernet and MAC sublayer protocol • Important reason for having minimum frame length is to prevent a station from completing the transmission of a short frame before the first bit has even reached the far end of the cable where it may collide with another frame. • When a station(say A) is transmitting frame to another station(say B) and if there is a collision station B aborts its transmission and generates a 48 bit noise burst to warn all other satations. • At about time 2τ the sender sees the noise burst and aborts its transmission too and waits for a random time before trying again. Ethernet and MAC sublayer protocol • To prevent wrong interpretation by the sender all frames must take more than 2τ time to reach the receiver. • As the network speed goes up the minimum frame length must go up or maximum cable length must come down proportionately. • The checksum field is 32 bit and is required to detect the errors.The most common checksum algorithm is cyclic redundancy check(CRC). Ethernet and MAC sublayer protocol • When IEEE standardised Ethernet,the committee made two changes to the DIX format: (1)Preamble field is reduced to 7 bytes and the last byte is used for a Start of Frame delimiter. (2)The type field is changed into a Length field and the operation to be done on the frame is given by a small header to the data portion. Binary Exponential Backoff Algorithm • Proper randomization is done when a collision occurs using binary exponential backoff algorithm. • After a collision time is divided into discrete slots each length being equal to the worst case round trip propagation time(2τ). • After first collision,each station waits either 0 or 1 slot times before trying again.If after collisions, the two stations take the same random number, they will collide again. • In general after i collisions,a random number between 0 and 2i -1 is chosen by each station and that number of slots is skipped. Binary Exponential Backoff Algorithm • After 10 collisions the randomization interval is frozen at a maximum of 1023 slots and after 16 collisions the controller reports failure. • Binary exponential backoff algorithm is chosen to dyanamically adapt to the number of stations trying to send. • If the randomization interval for all collisions is made 1023 then there is very less chance of stations colliding for second time but it introduces delay. Binary Exponential Backoff Algorithm • If each station always delayed for either 0 or 1 slot,then if n sations try to send once,they would collide over and over again until (n-1) of them picked 1 and the remaining station picked 0. • By having the randomization interval grow exponentially as more and more consecutive collisions occur,the algorithm ensures a low delay when only few stations collide and if many stations collide, the collision is resolved in a reasonable interval. Binary Exponential Backoff Algorithm • Since the mere absense of collisions does not guarantee that bits were not garbled by noise spikes on the cable, for reliable communication the destination must verify the checksum and send back an acknowledgement frame to the sender. • The acknowlegement frame would have to fight for channel time just like the data frame