Chapter 3. Underlying Technologiescss
// 第三章. 底層技術git
We can think of the Internet as a series of backbone networks that are run by international, national, are regional ISPs. The backbones are joined together by connecting devices such as routers or switching stations. The end users are either part of the local ISP LAN or connected via point-to-point networks to the LANs. Conceptually, the Internet is a set of switched WANs (backbone). LANs, point-to-point WANs, and connecting or switching devices. 算法
Although the TCP/IP Protocol Suite is normally shownas five-layer stack, it only defines the three upper layers: TCP/IP is only concerned with the network, transport, and application layers. This means that TCP/IP assumes the existence of these WANs, LANs, and the connecting devices that join them. 緩存
As a brief review, we touch upon some of these underlying technologies in this chapter.網絡
// 咱們可以把因特網想爲網絡的骨幹, 包括全球的、國家的、地區的ISP。 骨幹被鏈接在一塊兒經過相關設備諸如路由器和交換機站點。 app
OBJECTIVESless
The chapter has several objectives: dom
3.1 WIRED LOCAL AREA NETWORKSide
A local area network (LAN) is a computer network that is designed for a limited geographic area such as a building or a campus. Although a LAN can be used as an isolated network to connect computers in an organization for the sole purpose of sharing resources, most LANs today are also linked to a wide area network (WAN) or the Internet.oop
The LAN market has seen several technologies such as Ethernet, token ring, token bus, FDDL, and ATM LAN. Some of these technologies survived for a while, but Ethernet is by far the dominant technology.
In this section, we first discuss the IEEE standard Project 802, designed to regulate the manufacturing and interconnectivity between different LANs. We then concentrate on the Ethnet on the Ethernet LANs.
Although Ethernet has gon through a four-generation evolution during the last few decdes, the main concept has remained the same. Ethernet has changed to meet the market needs and to make use of the new technologies.
IEEE Standards
In 1985, the Computer Society of the IEEE started a project, called Project 802, to set standards to enable intercommunication among equipment from a variety of manufacturers. Project 802 does not seek to replace any part of the OSI or the Internet model. Instead, it is a way of specifying functions of the physical layer and the data link layer of major LAN protocols.
The standard was adopted by the American National Standards Institute (ANSI). In 1987, the International Standards Organization (ISO) also approved it as international standard under the designation ISO 8802.
The relationship of the 802 Standard to the traditional OSI model is shown in Figure 3.1. The IEEE has subdivided the data link layer into two sublayers: logical link control (LLC) and media access control (MAC). IEEE has also created several physical layer standards for different LAN protocols.
Figure 3.1 IEEE stand for LANs
LLC: logical link control | Data link layer | LLC | ||||||
Ethernet MAC | Token ring MAC | Token bus MAC | ||||||
MAC: Media access control | physical layer | Ethernet physical layers | Token ring physical layers | Token bus physical layer | ||||
Transmission medium | Transmission medium | |||||||
OSI or TCP/IP Suite | IEEE Standard |
In this text, however, we treat physical and data link layer together as the underlying technology supporting other layers in the TCP/IP protocol suite. For more details about physical and data link layer technology see Forouzan, Data Communications and Networking, 4th ed., MCGraw-Hill, 2007.
Frame Format
The packet sent in an Ethernet LAN is called a frame. In this section we discuss the format and the length of the frame that is used in our versions of the Ethernet.
Frame Format
The Ethernet frame contains seven fields: preamble, SFD, DA, SA, length or type of data unit, upper-layer data, and the CRC. Ethernet does not provide any mechanism for acknowledging received frames, making it what is known as an unreliable medium. Acknowledgments must be implemented at the higher layers. The format of the MAC frame is shown in Figure 3.2.
Figure 3.2 Ethernet frame
Premble: 56 bits of alternating 1s and 0s. | ||||||||
SFD: Start frame delimiter, flag (10101011) | ||||||||
▅ | Preamble | SFD | Destination address | Source address | Length or type | Data and padding | CRC | |
7 bytes | 1 bytes | 6 bytes | 6bytes | 2 bytes | 4 bytes | |||
Physical layer header |
Frame Length
Ethernet has imposed restrictions on both the minimum and maximum lengths of a frame, as shown in Figure 3.3
Figure 3.3 Minimum and maximum Lengths
Minmum payload length: 46bytes | |||||
Maximum payload length:1500 bytes | |||||
Destination address | Source address | Legth or Type | Data and padding | CRC | |
6 bytes | 6 bytes | 2 bytes | 4 byte | ||
Minimum frame length: 512 bits or 64 bits | |||||
Maximum frame length: 12,144 bits or 1518 bytes |
The minimum length restriction is required for the correct operation of CMSA/CD, as we will see shortly. An Ethernet frame needs to have a minimum length of 512 bits or 64 bytes. Part of this length is the header and the trailer. If we count 18 bytes of header and trailer (6 bytes of source address, 6 bytes of destination address, 2 bytes of length or type, and 4 bytes of CRC ), then the minimum length of data from the upper layer is 64-18=46 bytes. If the upper-layer packet is less than 46 bytes, padding is added to make up the difference.
The standard defines the maximum length of a frame (without preamble and SFD field) as 1518 bytes. If we subtract the18 bytes of the header and trailer, the maximum length of the payload is 1500 bytes. The maximum length restriction has two historical reasons. First, memory was very expensive when Ethernet was designed: a maximum length restriction helped to reduce the size of the buffer. Second, the maximum length restriction prevents one station from monopolizing the shared medium, blocking other station that have data to send.
Minimum length: 64bytes (512 bits) Maximum length: 1518 bytes (12,144 bits)
Addressing
Each station on an Ethernet network (such as a PC, workstation, or printer) has its own network interface card (NIC). The NIC fits inside the station and provides the station with a 6-byte physical address. As shown in Figure 3.4, the Ethernet address is 6 bytes (48 bits), normally written in hexadecimal notation, with a colon between the bytes. The address normally is referred to as the data link address, physical address, or MAC address.
Figure 3.4 Ethernet address in hexadecimal notation
d: Hexadecimal digit | |
d1 d2 : d3d4 : d5 d6 : d7 d8 : d9 d10 : d 11 d12 | |
6 bytes = 12 hexadecimal digital = 48 bits |
For example, the following shows an Ethernet MAC address:
4A:30:10:21:10:1A
Unicast, Multicast, and Broadcast Addresses
A source address is always a unicast address -- the frame comes from only one station. The destination address, however, can be unicast, multicast, or broadcast. Figure 3.5 shows how to distinguish a unicast address from a multicast address. If least significant bit of the first byte in a destination address is 0, the address is unicast, otherwise it is multicast.
Figure 3.5 Unicast and multicast address
The least significant bit of the first byte defines the type of address. If the bit is 0 , the address is unicast; otherwise, it is multicast.
A unicast destination address defines only one recipient; the relationship between the sender and the reciever is one-to-one. A multicast destination address defines a group of address; the relationship between the sender and the receivers is one-to-many.
The broadcast address is a special case of the multicast address; the recipients are all the stations on the LAN. A broadcast destination address is forty-eight 1s.
The broadcast destination address is a special case of the multicast address in which all bits are 1s.
Example 3.1
Define the type of the following destination addresses:
a. 4A:30:10:21:10:1A
b. 47:20:1B:2E:08:EE
c. FF:FF:FF:FF:FF:FF
Solution
To find the type of the address, we need to look at the second hexadecimal digit from the left. If it is even, the address is unicast. If it is odd, the address is multicast. If all digitals are F's, the address is broadcast. Therefore, we have the following:
a. This is a unicast address because A in binary is 1010 (even).
b. This is a multicast address because 7 in binary is 0111(odd)
The way the addressese are sent out on line is different from the way they are written in hexadecimal notation. The transmission is left-to-right, byte by byte; however, for each byte, the least significant bit is sent first and the most significant bit is sent last. This means that the bit that defines an address as unicast or multicast arrives first at the receiver.
Example 3.2
Show how the address 47:20:1B:2E:08:EE is sent out in line.
solution
The address is sent left-to-right, byte-to-byte; for each byte, it is sent right-to-left, bit by bit, as shown below
← | 1110,0010 | 0000,0100 | 1101,1000 | 01110100 | 00010000 | 01110111 |
0100,0111 | 0010,0000 | 0001,1011 | 00101110 | 00001000 | 11101110 | |
47 | 20 | 1B | 2E | 08 | EE |
Ethernet Evolution
Ethernet was created in 1976 at Xerox's Palo Alto Research Center (PARC). Since then it has gone through four generations: Standard Ethernet (10 Mbps), Fast Ethernet (100 Mbps), Gigabit Ethernet (1 Gbps), and Ten-Gigabit Ethernet (10 Gbps), as shown in Figure 3.6. We briefly discuss all these generations staring with the first, Standard (or traditional) Ethernet.
Figure 3.6 Ethernet evolution through four generations
Standard Ethernet
The original Ethernet with 10-Mbps data rate is now history, but we briefly discuss its characteristics to pave the way for understanding other Ethernet versions.
Access Method :CSMA / CD
// 訪問方法 : CSMA /CD (載波監聽多路訪問技術)
The IEEE 802.3 standard defines: carrier sense multiple access with collision detection (CSMA / CD) as the access method for traditional Ethernet. Stations on a traditional Ethernet can be connected together using a physical bus or star topology, but the logical topology is a bus. By this, we mean that the medium (channel) is shared between stations and only one station at a time can use it. It also implies that all stations receive a frame sent by a station (broadcasting). The real destination keeps the frame while the rest drop it. In this situation, how can we be sure that two stations are not using the medium at the same time? If they do, their frames will collide with each other.
// IEEE 802.3 標準定義了:對於傳統的Ethernet訪問方法是 CSMA/CD 。 在傳統Ethernet 上的站點能夠被鏈接起來使用一條物理總線或者星型拓撲, 可是邏輯拓撲是一條總線。到此爲止, 咱們明的了,媒介(信道) 是被多個站點共享的, 而且僅僅一個站點在某一刻可以使用它。 它也暗示了, 全部的站點接收到了來自同一站點的幀(廣播)。真正的目的地址保留相對應的幀,當其它的站點放棄這個目標。 在這種狀況下,咱們怎麼可以確保兩個站點在同一時間段沒有使用媒介。 若是他們同時使用,他們的幀將彼此衝突。
( Sense /sens / n. 感知;
collision /kəˈlɪʒ.ən / n. a strong disagreement 衝突;抵觸;
medium /ˈmiː.di.əm/ n. 媒介方法;
channel /ˈtʃæn.əl/ n. 信道;
collide /kəˈlaɪd/ vt. (especially of moving objects) to hit something violently. (尤指移動的物體) 相撞、相碰;
)
To minimize the chance of collision and, therefore, increase the preformance, the CSMA method was developed. The chance of collision can be reduce if a station sensens the medium before trying to use it. Carrier sense multiple access (CSMA) requires that each station first listen to the medium (or check the state of the medium) before sending. In other words, CMSA is based on the principle "sense before transmit" or "listen before talk". CSMA can reduce the possiblity of collision, but it cannot eliminate it. The reason for this is shown in Figure 3.7, a space and time model of a CSMA network. Stations are connected to a shared channel (usually a dedicated medium).
// 爲了最小化衝突的機會, 所以,增長性能,CSMA 方法被開發出來。若是一個站點在準備使用媒介以前可以感知到媒介,那麼衝突的機會可以被下降。 載波監聽多路訪問技術須要, 每一個站點在發送幀以前首先監聽媒介(亦或檢查媒介狀態)。 換句話說, CMSA 是基於這樣的原理:「傳輸前感知」或者「說前先聽」。 CSMA 可以減小衝突的可能性, 可是它不能排除這種衝突。 如圖3.7 所示的緣由, CSMA 網絡的時空模型, 站點被鏈接起來經過一條共享信道(一般是一條專用的媒介)。
( eliminate /iˈlɪm.ɪ.neɪ/ vt. to remove or take away someone or something 排除, 消除, 清除
dedicated /ˈded.ɪ.keɪ.tɪd/ n. designed to be used for a particular purpose 專用的;專門的)
Figure 3.7 Space / time model of a collision in CSMA.
The possibility of collision still exists because of propagation delay; when a station sends a frame; it still takes time (although very short) for the first bit to reach every station and for every station to sense it. In other words, a station may sense the medium and find it idle, only because the first bit sent by another station has not yet been received.
//衝突仍然存在,緣由是傳播延時;當一個站點發送一個幀, 當一個站點發送一個幀時, 它仍然須要時間(儘管很是短)去發送第一個比特到每個站點, 而且每個站點還得偵聽它。 換句話說, 一個站點可能偵聽媒介而且發現媒介空閒,僅僅是由於被另一個站點發送首位比特尚未被接收到。
( propagation /,prɒpə'ɡeɪʃən/ n . to spread opinions, lies, or beliefs among many people. 傳播;
idle/ ˈaɪ.dəl/ adj. An idle moment or period of time is one in which there is no work or activity空閒的; )
At time t1 , station B sense the medium and finds it idle, so it sends a frame. At time t2 (t2 >t1), station C sense the medium and find it idle because, at this time, the first bits from station B have not reached station C. Station C also sends a frame. The two signals collide and both frames are destroyed.
// 在時間點t1 , 站點A 偵測媒介,而且發現它閒置,所以就發送了一幀。 在時間點t2 (t2 >t1) , 站點C 偵測媒介,而且發現它閒置,由於,在這一時間段, 來自站點B的首位比特尚未到達站點C。 站點C 也發送了一幀。兩個信號衝突而且兩個幀都被破壞。
Carrier sense multiple access with collision detection (CSMA / CD) aguments the algorithm to handle the collision. In this method, a station monitors the medium after it sends a frame to see if the transmission was successful. If so, the station is finish. If, however, there is a collision, the frame is sent again. To better understand CSMA/CD, let us look at the first bits transmitted by the two stations involved in the collision. Although each station continues to send bits in the frame until it detects the collision, we show what happens as the first bits collide. In Figure 3.8, station A and C are involved in the collision.
// 帶衝突檢查的載波監聽多路訪問技術增長算法處理衝突。 用這種方法,一個站點先發送一幀後監控媒介,看,是否傳輸成功, 若是成功,站點是完成。 若是不管如何,有衝突,幀再一次被髮送。 爲了更好地理解CSMA/CD, 讓咱們看在兩個站點間傳輸的首個比特位涉及在衝突域中。儘管每個站點直到偵測到衝突時,以幀的形式持續發送比特位,咱們要顯示的是做爲第一比特位衝突發生了什麼。 在圖3.8中,站點A 和站點C被涉及在一個衝突中。
(agument /ɔːɡˈment/ vt. to increase the size or value of something by adding something to it 增長 )
Figure 3.8 Collision of the first bit in CSMA / CD
At time t1 , station A has started sending the bits of its frame. At time t2 , station C has not yet sensed the first bit sent by A. Station C starts sending the bits in its frame, which propagate both to the left and to the right. The collision occurs sometime after time t2 . Station C detects a collision at time t3 when it receives the first bit of A's frame. Station C immediately (or after a short time, but we assume immediately) aborts transmission. Station A detects collision at time t4 when it receives the first bit of C's frame; it also immediately aborts transmission. Looking at the figure, we see that A transmits for the duration t4 - t1; C transmits for the duration t3 - t2 . Later we show that, for the protocol work, the length of any frame divided by the bit rate in this protocol must be more than either of these duration. At time t4 , the transmission of A's frame, though incomplete, is aborted; at time t3 , the transmission of B's frame, through incomplete, is aborted. // 在時間點 t1 時, 站點A 已經開始以幀的形式發送比特位。 在時間點 t2 時, 站點C尚未偵測到由站點A 發送的首個比特位。 站點C 開始以幀的形式發送比特,而且開始向左和向右雙向傳播。衝突發生在時間節點t2 . 站點C 在時間節點t3探測到衝突, 當它接收到A站的幀的首位地址。站點C當即(或者一個短期段後,可是咱們假設當即)停止傳輸。當站點A接收到站點C發送幀的首位比特時,它在時間節點4偵測到衝突;它也當即停止傳輸。 仔細看圖, 咱們看見 站點A 傳輸持續時間爲 t4 - t1; 站點腳傳輸持續時間爲 t3 - t2 . 再日後看, 依據協議運轉,任何幀的長度除以該協議的比特速率的商必須大於這些時間段中的任何一個。 在時間節點t4 , A的幀的傳輸,儘管沒有完成,可是停止了;在時間節點t3, B的幀的傳輸,儘管沒有完成,可是停止了。
( detect /dɪˈtekt/ vt. to notice something that is partly hidden or not clear, or to discover something, especoially used a special method. (尤指用特殊的方法)發現,察覺,看出
abort /əˈbɔːt/ vt. to case something to stop or fail before it begins or before it is complete. 停止;使夭折,使中途失敗。
duration /djʊəˈreɪ.ʃən/ n. the length of time that something lasts. 持續時間
protocol /ˈprəʊ.tə.kɒl / n. a formal international agreement. (正式的國際性)條約、協議書、公約
incomplete /ˌɪn.kəmˈpliːt/ adj. not having some parts, or not fished 不完整的,未完成的;)
Minimum Frame Size
For CSMA / CD to work, we need a restriction on the frame size. Before sending the last bit of the frame, the sending station must detect a collision, if any, and abort the transmission. This is so because the station, once the entire frame is sent, does not keep a copy of the frame and does not monitor the line for collision detection. Therefore, the frame transmission time Tfr must be least two times the maximum propagation time Tp . To understand the reason, let us think about the wrost-case scenario. If the two stations involved in a collision are the maximum distance apart, the signal from the frist takes time TP to reach the second, and the effect of the collision takes another time Tp to reach the first. So the requirement is that the first station must still be transmitting after 2TP .
Example 3.3
In the standard Ethernet, if the maximum propagation time is 25.6μs, what is the minimum size of the the frame?
Solution
The frame transission time is Tfr = 2 × TP = 25.6μs ×2 = 51.2μs. This means, in worst case, a station needs to transmit for a period of 51.2 μs to detect the collision. The minimum size of the frame is 10 Mbps×51.2μs =512bit or 64 bytes. This is actually the minimum size of the frame for Standard Ethernet, as we discussed before.
// 最小幀尺寸
對於CSMA/CD的運行, 咱們在幀的尺寸大小須要有必定的限制。在發送特定幀的最後一位比特前,發送站點必須偵測衝突,若是存在任何一個,那麼停止傳輸。 這就是,由於站點,一旦一個幀的所有被髮送,不保留這個幀的副本,也不監控線上的衝突偵察。所以,幀的傳輸時間TFR 必須至少是最大傳輸時間Tp的兩倍。 去理解這個緣由,讓咱們想一個最糟糕的例子。 若是兩個站點涉及一個衝突是在最遠距離以外, 來自第一個站點的們號到達另外一個站點的時間爲Tp , 衝突響應到第一站點所需時間Tp 。 所以對於第一站點的需求必須在兩個Tp 時間間隔後仍在傳輸。
示例3.3
在標準的以太網中,若是最大傳輸時間是25.6μs,幀的最小尺寸是多大?
解答:
幀的傳輸時間是51.2μs , 這意味着,在最糟糕的狀況下,一個站點必須用51.2 μs的時間段去探測衝突傳輸。幀的最小尺寸是512位或者64字節。這是標準以太網精確的最小尺寸,正如咱們前邊的討論。
(scenario /sɪˈnɑː.ri.əʊ/ n. a description of possible actions or events in the future.可能發生的事態,設想。 )
Procedure
// 流程
(procedure /prəˈsiː.dʒər/ n. a set of actions that is offical or accepted way of doing something . 程序,步驟,常規)
Figure 3.9 shows the flow diagram for CSMA / CD. We need to sense the channel before we start sending the frame. We do not send the entrie frame and then look for a collision. The station transmits and receives continuously and simultaneoudly (using two different ports). We use a loop to show that transmission is a continuous process. We constantly monitor in order to detect one of two conditions: either transmission is finished or a collision is detected. Either event stops transmission. When we come out of the loop, if a collision has not been detected, it means that transmission is complete; the entire frame is transmitted. Otherwise, a collision has occurred. The diagram also shows a short jamming signal that enforces the collision in case other stations have not yet sensed the collision.
// 圖3.9 所示爲CSMA / CD 的流程圖, 咱們在開始發送幀以前須要對信道進行監聽。咱們並無發送完整的幀去尋找一個衝突。 站點持續傳輸,並同時接收 (使用兩個不一樣的接口)。 咱們使用一個循環去顯示一個持續的過程。 咱們一直監控目的是去探測兩個條件中的一個:傳輸完成或者衝突被偵測到。 兩件事件中之一都中止傳輸。 當沒有衝突被偵測出來的時候,咱們就跳出循環,也就意味着傳輸成功,整個幀被傳輸。相反,一個衝突已經發生。 該圖也顯示了一個短的干擾信號,在其餘站尚未檢測到碰撞的狀況下強制執行碰撞。
Figure 3.9 CSMA /CD flow diagram.
Implementation
The standard Ethernet defined several implementations, but only four of them because popular during '80s. Table 3.1 shows a summary of Standard Ethernet implementations. In the nomenclature 10Base-X, the number defines the data rate (10 Mbps), the term Base means baseband (digital) signal, and X approximately defines either the maximum size of the cable in 100 meters (for example 5 for 500 or 2 for 185 meters) or the type of the cable, T for unshielded twisted pair cable (UTP) and F for fiber-optic.
Table 3.1 Summary of Standard Ethernet implementations
Figure 3.10 Show simplified diagrams of each implementation.
Fast Ethernet
// 快速以太網
Fast Ethernet was designed to complete with LAN protocols such as FDDI or Fiber Channel. IEEE created Fast Ethernet under the name 802.3u. Fast Ethernet is backward-compatible with Standard Ethernet, but it can transmit data 10 times faster at a rate of 100 Mbps. The goals of Fast Ethernet can be summarized as follows:
// 快速以太網的設計是符合LAN協議,例如FDDI 或者 光纖信道。 IEEE 建立快速以太網以802.3的名義命名。 快速以太網完成後至兼容傳統以太網,可是它傳輸數據提升了10倍,以100Mbpd的速度傳輸。以太網的目標被宗述以下:
MAC Sublayer
// MAC子層
A main consideration in the evolution of Ethernet from 10 to 100 Mbps was to keep the MAC sublayer untouched. However, a decision was made to drop the bus topologies and keep only the star topology. For the star topology, there are two choices: half deplex and full deplex。 In the half-duplex approach, the stations are connected via a hub; in the full-duplex approach, the connection is made via a switch with buffers at each port (See Section 3.5, Connecting Devices, at the end of the chapter).
The access method is the same (CSMA / CD) for the half-duplex approach; for full-duplex Fast Ethernet, there is no need for CSMA / CD. However, the implementations Keep CSMA / CD for backward compatibility with Standard Ethernet.
// 以太網從10Mbps 到100Mbps的變革過中,主要考慮的是MAC子層不觸碰。 不管如何,下定決心丟掉總線拓撲,保留星型拓撲。 對於星型拓撲,存在兩種選擇:半工和全雙工。 在半工方式中,站點被鏈接經過hub, 在全雙工方式中,經過一個交換機與每一個站口上的緩衝區創建鏈接(參看3.5節,鏈接設備,在本章末)
對於半雙工方式,其訪問方式與(CSMA / CD )是相同的;對於全雙工快速以太網, 不須要CSMA/CD。 不管如何,實現後至兼容傳統以太網保留了CSMA/CD。
(buffer //ˈbʌf.ər/ v. When a computer buffers information or buffers, it stores information temporarily in its memory while dealing with it and sending it (計算機緩存於內存中))
Autonegotiation
//自動協商機制
(auto-negotiation /nəˌɡəʊ.ʃiˈeɪ.ʃən/ n. Autonegotiation is an Ethernet procedure by which two connected devices choose common transmission parameters, such as speed, duplex mode, and flow control. In this process, the connected devices first share their capabilities regarding these parameters and then choose the highest performance transmission mode they both support. 自動協商機制是一種以太網流程:兩個相連設備選擇相同的傳輸限定因素:例如速度、雙工模式和流控制。 在這個過程當中,被鏈接的設備首先分享他們關於這些參數的能力,而後選擇它們都支持的最高性能傳輸模式。)
A new feature added to Fast Ethernet is called autonegotiation. It allows a station or a hub a range of capabilities. Autonegotiation allows two devices to negotiate the mode or data rate of operation. It was designed particularly for the following purposes:
// 以太網新增的符加功能,被稱做自動協商機制。 它認同站點和集線器的一系列性能參數。 自動協商機制容許兩臺設備協商操做模式和數據速率。 它是專門爲如下目的設計的。
Implementation
Fast Ethernet implemenation at the physical layer can be categorized as either two-wire or four-wire. The two-wire implementation can be either shielded twisted pair, STP(100Base-Tx) or fiber-optic cable (100 Base-Fx). The four-wire implementation is designed only for unshielded twist pair, UTP (100Base-T4). Table 3.2 is a summary of the Fast Ethernet implementations.
//快速以太網在物理層的實現既能夠按雙導線或也能夠按四導線兩種來分。 雙線制實現也能夠是屏蔽雙絞線, STP(100Base-TX) 或者光纜(100Base-FX)。 四線制實現的實現僅僅是爲了非屏蔽雙絞線, UTP(100Base-T4)。 表3.2 總結了快速以太網的實現。
( shield /[ʃiːld/ n. something or someone used as protection or providing protection 保護物,屏障,保護者; 計算機專業:屏蔽;
twist /twist/ n. 雙絞線
fiber/ 'faɪbɚ/ n. 光纖
optic ['ɒptɪk/ adj. 光學的;
wire /waɪə/ n. 導線 )
Table 3.2 Summary of Fast Ethernet implementation.
Figure 3.11 Summary of Fast Ethernet implementation
Gigabit Ethernet
The need for an even higher data rate resulted in design of the Gigabit Ethernet Protocol (1000Mbps). The IEEE committee calls the Standard 802.3z. The goals of the Gigabit Ethernet design can be summarized as follows:
MAC sublayer
A main consideration in the evolution of Ethernet was keep the MAC sublayer untouched. However, to achieve a data rate of 1 Gbps, this was no longer possible. Gigabit Ethernet has two distinctive approaches for medium access: half-duplex and full-deplex. Almost all implementations of Gigabit Ethernet follow the full-duplex approach. However, we briefly discuss the half-duplex approach to show that Gigabit Ethernet can be compatible with the previous generations.
Full-Deplex mode
In full-deplex mode, thereis a central switch connected to all computers or other switches. In this mode, each switch has buffers for each input port in which data are stored until they are transmitted. There is no collision in this mode. This means that CSMA/CD is not used. Lack of collision implies that the maximum length of the cable is determined by the signal attenuation in the cable, not by the collision detection process.
In the full-duplex mode of Gigabit Ethernet, there is no cillision; the maximum length of the cable is determined by the signal attention in the cable.
Half-Duplex mode
Gigabit Ethernet can also be used in half-duplex mode, although it is rare. In this case, a switch can be replaced by a hub, which acts as the common cable in which a collision might occur. The half-duplex approach uses CSMA/CD. However, as we saw before, the maximum length of the network in this approach is totally dependent on the the minimum frame size. Three solutions have been defined: traditional, carrier extennsion, and frame bursting.
Implementation
Table 3.3 is a summary of the Gigabit Ethernet implemenations
Table 3.3 Summary of Gigabit Ethernet implementaion
Figure 3.12 shows the simiplified diagrams for Gigabit Ethernet
Ten-Gigabit Ethernet
The IEEE commitee created Ten-Gigabit and called it Standard 802.3ae. The goals of the Ten-Gigabit Ethernet design can be summarized as follows:
Implementation
Ten-Gigabit operates only in full duplex mode, which means there is no need for contention: CSMA/CD is not used in Ten-Gigabit Ethernet. Three implementations are the most common: 10 GBase-S, 10GBase-E. Table 3.4 shows a summary of the Ten-Gigabit Ethernet implementation.
Table 3.4 Ten-Giagabit Ethernet Implementation
3.2 WIRELESS LANS
Wireless communication is one of the fastest-growing technologies. The demand for connecting devices without the use of cables is increasing everywhere. Wireless LANs can be found on college campuses, in office buildings, and in many pubic areas. In this section, we concentrate on two wireless technologies for LANs: IEEE 802.11 wireless LANs, sometimes called wireless Ethernet, and Bluthtooth, a technology for small wireless LANs.
IEEE 802.11
IEEE has defined the specifications for a wireless LAN, called IEEE 802.11, which covers the physical and data link layers.
Architecture
The standard defines two kinds of services: the Basic service set (BSS) and the extended services set (ESS).
Basic Services Set
IEEE 802.11 defines the basic service set (BSS) as the building block of a wireless LAN. A basic service set is made of stationry or mobile wireless stations and an optional central base station, known as the access point (AP). Figure 3.13 shows two set in this standard. The BSS without an AP is a stand-alone network and cannot send data to other BBSs. It is called an ad hoc architecture. In this architecture stations can form a network without the need of an AP; they can locate one another and agree to be part of a BSS. A BSS with an AP is sometimes referred to as an infrastructure network.
Figure 3.13 Basic service sets (BSSs)
Extended Service Set
An extended service set (ESS) is made up of two or more BSSs with APs. In this case, the BSSs are connected through a distribution system, which is usually a wired LAN. The distribution system connects the APs in the BBSs. IEEE 802.11 does not restrict the distribution system; it can be any IEEE LAN such as an Ethernet. Note that the extended service set uses two types of stations: mobile and stationary. The mobile stations are normal stations inside a BSS. The stationary stations are AP stations that are part of a wired LAN. Figure 3.14 showes as ESS.
Figure 3.14 Extened services sets (ESSs)
When BBS are connected, the stations within reach of one another can communicate without the use of an AP. However, communication between two stations in two different BSSs usually occurs via two APs.
Station Types
IEEE 802.11 defines three typed of stations based on their mobility in a wireless LAN: no-transition, BSS-transition, and ESS-transition mobility. A station with no-transition mobility is either stationary ( not moving ) or moving only inside a BSS. A station with BSS-transition mobility can move from one BBS to another, but the movement is confined inside one ESS. A station with ESS-transition mobility can move from one ESS to another.
MAC Sublayer
There are two different MAC sublayers in this protocol, however, the one that is used most of the time is based on CSMA/CA (Carrier sense multiple access with collision avoidance). Figure 3.15 shows the flow diagram.
Figure 3.15
Wireless LANs cannot implement CSMA / CD for three reasons:
Frame Exchange Time Line
Figure 3.16 shows the exchange of data and control frames in time
Figure 3.16 CSMA/CA and NAV
1. Before sending a frame, the source station sense the medium by checking the energy level at the carrier frequency.
a. The channel uses a persistence strategy with back-off unitl the channel is idel.
b. After the station is found to be idel, the station waits for a period of time called the distributed interframe space (DIFS);then the station sends a control frame called the request to send (RTS)
2. After receiving the RTS and waiting a period of time called the short interframe space (SIFS), the destination station sends a control frame, called the clear to send (CTS), to the source station. This control frame indicates that the is ready to receive data.
3. The source station sends data after waiting an amount of time equal to SIFS.
4.The destination station, after waiting an amount of time equal to SIFS, sends an acknowledgment to show that the frame has been received. Achnowledgment is needed in this protocol because the station does not have any means to check for the successful arrival of its data at the destionation. On the other hand, the lack of collision in CSMA / CD is kind of indication to the source that data have arrived.
Network Allocation Vector
How do other stations defer sending their data if one station acquires access? In other words, how is the collision avoidance aspect of this protocol accomplished? The key is a feature called NAV.
When a station sends an RTS frame, it cludes the duration of time that it needs to occupy the channel. The stations that are affected by this transmission create a timer called a network allocation vector (NAV) that shows how much time must pass before these stations are allowed to check the channel for idelness. Each time a s tation accesses the system and sends an RTS frame, other stations start their NAV. In other words, each station, before seneing the physical medium to see if it is idle, first checks its NAV to see if it has expired. Figure 3.16 also shows the idea of NAV.
What happens if there is collision during the time when RTS or CTS control frames are in transition, often called the handshaking period? Two or more stations may try to send RTS frames at the same time. These control frames may collide. However, because there is no mechanism for collision detection, the sender assumes there has been a collision if it has not received a CTS frame from the receiver. The back-off strategy is employed, and the sender tries again.
Fragmentation
The wireless environment is very noisy; a corrupt frame has to be retransmitted. The protocol, therefore, recommends fragmentation--the division of a large frame into smaller ones. It is more efficient to resend a small frame than a large one.
Frame Format
The MAC layer frame consists of nine fields as shown in Figure 3.17.
Figure 3.17 Frame format
Table 3.5 Subfield in FC field
Filed | Explanation |
Version | Current version is 0 |
Type | Type of information: management (00), control (01), or data (10) |
Subtype | Subtype of each type (see Table 3.6 ) |
To DS | Defined later |
From DS | Defined later |
More flag | When set to 1, means more fragments |
Retry | When set to 1, means retransmitted frame |
Pwr mgt | When set to 1, means station is power managment mode |
More data | When set to 1, means station has more data to send |
WEP | Wired equivalent privacy (encryption implemented) |
Rsvd | Reserved |
Frame Type
A wireless LAN defined by IEEE 802.11 has three categories of frames: management frame, control frame, and data frames.
Management Frames Management frames are used for the initial communication between stations and access points.
Control Frames Control frames are used for accessing the channel and acknowledging frames Figure 3.18 shows the format.
Figure 3.18 Control frames
For control frames the value of the type field is 01; the values of the subtype fields for frames we have discussed are shows in Table 3.6.
Table 3.6 values of subfields in control frames
subtype | Meaning |
1011 | Request to send (RTS) |
1100 | Clear to send (CTS) |
1101 | Achnowledgment (ACK) |
Data Frames
Data frames are used for carrying data and control information.
Addring Mechanism
The IEEE 802.11 addressing mechanism specifies four cases, defined by the value of the two flags in the FC field. To DS and From DS. Each flag can either 0 or , resulting in four different situations. The interpretation of the four addresses (address 1 to address 4) in the MAC frame depends on the value of these flags , as shown in Table 3.7.
Table 3.7 Addresses
To DS | From DS | Address 1 | Address 2 | Address 3 | Address 4 |
0 | 0 | Destination | Source | BSS ID | N/A |
0 | 1 | Destination | Sending AP | Soure | N/A |
1 | 0 | Receiving AP | Source | Destination | N/A |
1 | 1 | Receiving AP | Sending AP | Destination | Source |
Note that address 1 is always the address of the next device. Address 2 is always the address of the previous device. Address 3 is the address of the final destination station if it is not defined by address1. Address 4 is the address of the original source station if it is not the same as address2.
Hidden and Exposed Station Problems
We referred to hidden and exposed station problems in the previous section. It is time now to discuss these problems and their effects.
Hidden station Problem
Figure 3.19 shows an example of the hidden station problem. Station B has a transmission range shown by the left oval (sphere in space); a transmission range shown by the right oval (sphere in space); every station located in this range can hear any signal transmitted by C. Station C is outside the transmission range of B; likewise, station B is outside the transmission range of C. Station A, however, is in the area covered by both B and C; it can hear any signal transmitted by B or C.
Figure 3.19 Hidden station problem
Assume that station B is sending data to station A. In the middle of this transmission, station C also has data to send to station A. However, station C is out of B's range and transmission from B cannot reach C. Therefore C thinks the medium is free. Station C sends its data to A, which results in a collision at A because this station is receiving data from both B and C. In this case, we say that stations B and C are hidden from each other with respect to A. Hidden stations can reduce the capacity of the network because of the possibility of collision.
The solution to the hidden station problem is the use of the handshake frames (RTS and CTS) that we discussed earlier. Figure 3.20 shows that the RTS message from B reaches A, but not C. However, because both B and C are within the range of A, the CTS message, which contains the duration of data transmission from B to A reaches C. Station C knows that some hidden station is using the channel and refrains from transmitting until that duration is over
The CTS frame in CSMA/CA handshake can prevent collision from a hidden station
Figure 3.20 Use of handshaking to prevent hidden station problem
Exposed Station Problem
Now consider a situation that is the inverse of the previous one; the exposed station problem. In this problem a station refraints from using a channel when it is, in fact, available. In Figure 3.21, station A is transmitting to station B. Station C has some data to send to send to station D, which can be sent without interfering with the transmission from A to B. However, station C is exposed to transmissoin from A; it hears what A is sending and thus refrains from sending. In other words, C is too conservative and wastes the capacity of the channel.
Figure 3.21 Exposed station problem
The handshaking messages RTS and CTS cannot help in this case, despite what we might think. Figure 3.22 shows the situation
Staion C hears the RTS from A, but does not hear the CTS from B. Station C, after hearing the RTS from A, can wait for a time so that the CTS from B reaches A; it then sends an RTS to D to show that it needs to communicate with D. Both stations B and A may hear this RTS, but station A is in the sending state, not the receiving state. Station B, however, responds with a CTS. The problem is here. If station A has started sending its data, station C cannot hear the CTS from station D because of the collision; it cannot send its data to D. It remains exposed until A finishes sending its data.
Figure 3.22 Use of handshaking in exposed station problem
Bluetooth
Bluetooth is wireless LAN technology designed to connect devices of different functions such as telephones, notebooks, computers (desktop and laptop), cameras, printers , coffee makers, and so on. A Bluetooth LAN is an ad hoc network, which means that the network is formed spontaneously; the devices, sometimes called gadgets, find each other and make a network called a piconet. A Bluetooth LAN can even be connected to the Internet if one of the gadgets has this capability. A Bluthtooth LAN, by nature, can not be large. If there are many gadgets that try to connect, there is chaos.
Bluetooth technology has several applications. Peripheral devices such as a wireless mouse or keyboard can communicate with the computer through this technology. Monitoring devices can communicate with sensor devices in a small health care center. Home security devices can use this technology to connect different sensors to the main security controller. Conference attendees can synchronize their laptop computers at a conference.
Bluetooth was originally started as a project by the Ericsson Company. It is named for Harald Blaatand, the king of Denmark(940-981) who united Denmark and Norway. Blaatand translates to Bluetooth in English.
Today, Bluetooth technology is the implementation of a protocol defined by the IEEE 802.15 standard. The standard defines a wireless personal area network(PAN) operable in an area the size o a room or a hall.
Architecture
Bluetooth defines two types of networks: piconet and scatternet.
Piconets
A Bluetooth network is called a piconet, or a small net. A piconet can have up to eight stations, one of which is called the primary; the rest are called secondaries. All the secondary stations synchronize their clocks and hopping sequence with the primary. Note that a piconet can have only one primary station. The communicatoin between the primary and the secondary can be one-to-one or one-to-many. Figure 3.23 show a piconet.
Figure 3.23 Piconet
Although a piconet can have a maximum of seven secondaries, an additional eight secondaries can be in the parked state. A secondary in a parked state is synchronized with the primary, but can not take part in communication until it is moved from the parked state. Because only eight stations can be active in a piconet, activating a station from the parked state means that an active station must go to the parked state.
Scatternet
Piconet can be combined to form what is called a scatternet. A secondary station in one piconet can be the primary in another piconet. This station can receive messages from the primary in the first piconet (as a secondary) and, acting as a primary, deliver them to secondaries in the second piconet. A station can be a member of two picnets. Figure 3.24 illustrates a scatternet
Figure 3.24 Scatternet
Bluetooth Devices
A Bluetooth devices has a built-in short-range radio transmitter. The current data rate is 1 Mbps with a 2.4-GHZ bandwidth. This means that there is a possibility of interference between the IEEE 802.11b wireless LANs and bluetooth LANs
Frame Format
A frame in the baseband layer can be one of three types: one-slot, three-slot, or five-slot. A slot, as we said before, is 625μs. However, in a one-slot frame exchange, 259 μs is needed for hopping and control mechanisms. This means that a one-slot frame can last 625-259, or 366 μs , with a 1-MHz bandwidth and 1 bit / Hz, the size of one-slot frame is 366 bits.
A three-slot frame occupies three slots. However, since 259 μs is used for hopping, the length of the frame is 3×625 -259 = 1616 μs or 1616 bit. A device that uses a three-slot frame remain at the same hop (at the same carrier frequency) for three slots. Even through only one hop number is used, three hop numbers are consumed. That means the hop number for each frame is equal to the first slot of the frame. A five-slot frame also uses 259 bits for hopping, which means that the length of the frame is 5×625-259=1866 bit. Figure 3.25 shows the format of the three frame types.
Figure 3.25 Frame format types
The following describes each field:
The header has three identical 18-bit section. The receiver compares these three sections, bit by bit. If each of the corresponding bit is the same, the bit is accepted; if not, the majority opinion rules. This is a form of forward error correction (for the header only). This double error control is needed because the nature of the communication, via air, is very noisy. Note that there is no retransmission in this sublayer.