Go backward to Performance of Sliding Window Protocols
Go up to Top

LANs, Ethernet and Contention Protocols

  1. Having now solved (or at least beaten to death) the problem of reliably getting packets exchanged between a pair of connected hosts, we want to look at ways to interconnect more than two hosts. This essentially brings us to the network layer.
    Warning: I added the "essentially" to the last sentence because most people add an extra layer called the "Medium access control" or MAC layer to address the issues associated with local area networks that I plan to discuss first as part of the network layer.

  2. The approaches used to building networks of machines that span relatively small geographic areas (a mile or three) are quite different from those used in much larger networks (spanning hundreds or thousands of miles). Accordingly, networks are categorized as:

    Local Area Networks
    or LANs which span small geographic areas,

    Wide Area Networks
    or WANs which span huge areas, and sometimes

    Metropolitan Area Networks
    for things that fall in the middle.

  3. Another feature that can be used to categorize networks is the approach taken to making it possible for a large number of distinct machines to exchange messages.

  4. The big problem with using the broadcast approach is finding a way that the machines in the network can take turns broadcasting.

  5. We could conceivably assign a distinct frequency to each station (effectively using FDM), but:

  6. Taking turns is tricky, however, when you don't have any way to "talk" about who goes next without using the network itself.

  7. Ethernet is a protocol based on broadcasting that takes a conceptually very simple approach to figuring out how to take turns.

  8. The basic approach used by Ethernet is called contention.

  9. While this approach it conectually simply, to appreciate Ethernet fully one has to appreciate some of the fine points of the exact ways in which Ethernet stations behave. To appreciate these it is useful to discuss some of the choices one has to make when designing a contention protocol. These included:

Computer Science 336
Department of Computer Science
Williams College

Prev Up