The Medium Access Control Sublayer

Slides:



Advertisements
Similar presentations
The Medium Access Control Sublayer
Advertisements

Medium Access Control Sublayer Chapter 4 CN5E by Tanenbaum & Wetherall, © Pearson Education-Prentice Hall and D. Wetherall, 2011 Channel Allocation Problem.
Topic 7 Local Area Networks (LAN)
Data link layer -- June Data link layer Computer Networks.
Bridging. Bridge Functions To extend size of LANs either geographically or in terms number of users. − Protocols that include collisions can be performed.
CSC 450/550 Part 3: The Medium Access Control Sublayer More Contents on the Engineering Side of Ethernet.
Wireless Networks.
1 Version 3 Module 8 Ethernet Switching. 2 Version 3 Ethernet Switching Ethernet is a shared media –One node can transmit data at a time More nodes increases.
Data Link Layer Switching
The Protocol Stack Part of the protocol stack.
16 February 2003 TU/e Computer Science, System Architecture and Networking 1 Communication media Thanks to A. Tanenbaum.
1 25\10\2010 Unit-V Connecting LANs Unit – 5 Connecting DevicesConnecting Devices Backbone NetworksBackbone Networks Virtual LANsVirtual LANs.
1 Chapter 5 The Medium Access Sublayer. 2 Chapter 5 The Medium Access Layer 5.1 The Channel Allocation problem - Static and dynamic channel allocation.
DataLink Layer1 Ethernet Technologies: 10Base2 10: 10Mbps; 2: 200 meters (actual is 185m) max distance between any two nodes without repeaters thin coaxial.
The Medium Access Control Sublayer Chapter 4. The Channel Allocation Problem Static Channel Allocation in LANs and MANs Dynamic Channel Allocation in.
Connecting LANs, Backbone Networks, and Virtual LANs
CS 453 Computer Networks Lecture 17 Medium Access Control Sublayer Bluetooth, Switching and VLAN.
Infrastructure de Communications – CR 4107Chapter 41 The Medium Access Control Sublayer Chapter 4.
1 Token Passing: IEEE802.5 standard  4 Mbps  maximum token holding time: 10 ms, limiting packet length  packet (token, data) format:  SD, ED mark start,
Chapter 5 outline 5.1 Introduction and services
Overview of Wireless LANs Use wireless transmission medium Issues of high prices, low data rates, occupational safety concerns, & licensing requirements.
Medium Access Control. Channel Allocation Static channel allocation in LANs and MANs FDMA, TDMA, CDMA Dynamic channel allocation in LANs and MANs MAC.
CMPE 150 – Winter 2009 Lecture 9 February 3, 2009 P.E. Mantey.
WIRELESS LANs BLUETOOTH.
Bluetooth Background Ericsson, IBM, Intel, Nokia, and Toshiba
Computer Networks NYUS FCSIT Spring 2008 Igor TRAJKOVSKI, Ph.D. Associate Professor
CSMA with Collision Detection CSMA/CD can be in one of three states: contention, transmission, or idle.
The Medium Access Control Sublayer Chapter 4. The Channel Allocation Problem Static Channel Allocation in LANs and MANs Dynamic Channel Allocation in.
The Medium Access Control Sublayer طبقة ولوج الوسط الجزئية Chapter 4.
The Medium Access Control Sublayer Chapter 4 10/1/2015www.noteshit.com1.
15.1 Chapter 15 Connecting LANs, Backbone Networks, and Virtual LANs Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or.
10/18/2007 EETS Bluetooth Bluetooth Architecture Bluetooth Applications The Bluetooth Protocol Stack The Bluetooth Radio Layer The Bluetooth Baseband.
Token Passing: IEEE802.5 standard  4 Mbps  maximum token holding time: 10 ms, limiting packet length  packet (token, data) format:  SD, ED mark start,
Bridging. Bridge Functions To extend size of LANs either geographically or in terms number of users. − Protocols that include collisions can be performed.
The Medium Access Control Sublayer Chapter 4. The Channel Allocation Problem Static Channel Allocation Dynamic Channel Allocation  Delay for the divided.
Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011 The Medium Access Control Sublayer Chapter.
Review: –Ethernet What is the MAC protocol in Ethernet? –CSMA/CD –Binary exponential backoff Is there any relationship between the minimum frame size and.
1 Kyung Hee University Chapter 15 Connecting LANs, Backbone Networks, and Virtual LANs.
The Medium Access Control Sublayer Chapter 4. The Channel Allocation Problem Static Channel Allocation in LANs and MANs Dynamic Channel Allocation in.
Chi-Cheng Lin, Winona State University CS 313 Introduction to Computer Networking & Telecommunication Local Area Networks.
The Medium Access Control Sublayer Chapter 4. The Channel Allocation Problem Static Channel Allocation in LANs and MANs Dynamic Channel Allocation in.
Computer Networks 15-1 Chapter 15. Connecting LANs, Backbone Networks, and Virtual LANs 15.1 Connecting devices 15.2 Backbone networks 15.3 Virtual LANs.
The Medium Access Control Sublayer Chapter 4 12/13/2015www.ishuchita.com1.
Chapter 16 Connecting LANs, Backbone Networks, and Virtual LANs
Ch. 15 Connecting LANs.
The Medium Access Control Sublayer Chapter 4. The Channel Allocation Problem Static Channel Allocation in LANs and MANs Dynamic Channel Allocation in.
15.1 Chapter 15 Connecting LANs, Backbone Networks, and Virtual LANs Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or.
Wireless LAN Requirements (1) Same as any LAN – High capacity, short distances, full connectivity, broadcast capability Throughput: – efficient use wireless.
The Medium Access Control Sublayer
The Medium Access Control (MAC) Sublayer. The Channel Allocation Problem Static Channel Allocation in LANs and MANs Dynamic Channel Allocation in LANs.
Wireless LAN Protocols This talk is based on the course: CPSC Networks and Distributed Processing Spring2006/
Wireless LAN Protocols This talk is based on the course: CPSC Networks and Distributed Processing Spring2006/
Wireless Networks Spring 2007 WiMAX: Broadband Wireless Access.
The Data Link Layer Chapter
Part III. Data Link Layer
Networking Devices.
Bridging.
Chapter 4 Data Link Layer Switching
Bluetooth, RFID, Data Link Layer Switching
Medium Access Control Sublayer Chapter 4
The Medium Access Control Sublayer
Connecting LANs, Backbone Networks, and Virtual LANs
Connecting LANs, Backbone Networks, and Virtual LANs
The Medium Access Control Sublayer
The Medium Access Control (MAC) Sublayer
Chapter 16 Connecting LANs, Backbone Networks, and Virtual LANs
NTHU CS5421 Cloud Computing
WiMAX: Broadband Wireless Access
Chapter 15. Connecting Devices
LAN switching and Bridges
Presentation transcript:

The Medium Access Control Sublayer Chapter 4 The Medium Access Control Sublayer

The Channel Allocation Problem Static Channel Allocation in LANs and MANs Dynamic Channel Allocation in LANs and MANs

Dynamic Channel Allocation in LANs and MANs Station Model. Single Channel Assumption. Collision Assumption. (a) Continuous Time. (b) Slotted Time. (a) Carrier Sense. (b) No Carrier Sense.

Multiple Access Protocols ALOHA Carrier Sense Multiple Access Protocols Collision-Free Protocols Limited-Contention Protocols Wireless LAN Protocols Wavelength Division Multiple Access Protocols Broadband Wireless VLANS/Bridge Spanning Tree

Wavelength Division Multiple Access Protocols

Wireless LAN Protocols A wireless LAN. (a) A transmitting. (b) B transmitting.

Wireless LAN Protocols (2) The MACA protocol. (a) A sending an RTS to B. (b) B responding with a CTS to A.

Gigabit Ethernet (a) A two-station Ethernet. (b) A multistation Ethernet.

Gigabit Ethernet cabling.

IEEE 802.2: Logical Link Control (a) Position of LLC. (b) Protocol formats.

Wireless LANs The 802.11 Protocol Stack The 802.11 Physical Layer The 802.11 MAC Sublayer Protocol The 802.11 Frame Structure Services

Part of the 802.11 protocol stack.

The 802.11 MAC Sublayer Protocol (a) The hidden station problem. (b) The exposed station problem.

The 802.11 MAC Sublayer Protocol (2) The use of virtual channel sensing using CSMA/CA.

The 802.11 MAC Sublayer Protocol (3) A fragment burst.

Broadband Wireless Comparison of 802.11 and 802.16 (and radio telephony Design goals are very different! Fixed vs mobile, antenna, radio cost, distance, sectoring, traffic/QoS The 802.16 Protocol Stack The 802.16 Physical Layer The 802.16 MAC Sublayer Protocol The 802.16 Frame Structure

The 802.16 Protocol Stack The 802.16 Protocol Stack. OFDM in 2GHz and 5 GHz

The 802.16 transmission environment. The 802.16 Physical Layer The 802.16 transmission environment.

Frames and time slots for time division duplexing. The 802.16 Physical Layer (2) Frames and time slots for time division duplexing.

The 802.16 MAC Sublayer Protocol Service Classes Constant bit rate service Real-time variable bit rate service Non-real-time variable bit rate service Best efforts service

(a) A generic frame. (b) A bandwidth request frame. The 802.16 Frame Structure (a) A generic frame. (b) A bandwidth request frame.

Bluetooth Bluetooth Architecture Bluetooth Applications The Bluetooth Protocol Stack The Bluetooth Radio Layer The Bluetooth Baseband Layer The Bluetooth L2CAP Layer The Bluetooth Frame Structure

Bluetooth Architecture Two piconets can be connected to form a scatternet.

Bluetooth Applications The Bluetooth profiles.

The Bluetooth Protocol Stack The 802.15 version of the Bluetooth protocol architecture.

The Bluetooth Frame Structure A typical Bluetooth data frame.

Data Link Layer Switching Bridges from 802.x to 802.y Local Internetworking Spanning Tree Bridges Remote Bridges Repeaters, Hubs, Bridges, Switches, Routers, Gateways Virtual LANs

Data Link Layer Switching Multiple LANs connected by a backbone to handle a total load higher than the capacity of a single LAN.

Operation of a LAN bridge from 802.11 to 802.3. Bridges from 802.x to 802.y Operation of a LAN bridge from 802.11 to 802.3.

The IEEE 802 frame formats. The drawing is not to scale. Bridges from 802.x to 802.y (2) The IEEE 802 frame formats. The drawing is not to scale.

Local Internetworking A configuration with four LANs and two bridges.

Two parallel transparent bridges. Spanning Tree Bridges Problem of Packet forwarding loops with multiple bridges Two parallel transparent bridges.

Spanning Tree Bridges (2) (a) Interconnected LANs. (b) A spanning tree covering the LANs. The dotted lines are not part of the spanning tree.

IEEE 802.1D Algorithm due to Pearlman et al to construct spanning tree in a distributed manner.

IEEE 802.1D Basic ideas Node with least id becomes root For a given lan, bridge/port with least cost on path to root becomes the designated active bridge, all others are passive Bridges broadcast configuration BPDUs with id of self, id of presumed root, cost to root. Each bridges starts by believing it is root. If you get superior information on your presumed root path, forward downstream If you get inferior information, reply with yours

Remote bridges can be used to interconnect distant LANs.

Repeaters, Hubs, Bridges, Switches, Routers and Gateways (a) Which device is in which layer. (b) Frames, packets, and headers.

Repeaters, Hubs, Bridges, Switches, Routers and Gateways (2) (a) A hub. (b) A bridge. (c) a switch.

A building with centralized wiring using hubs and a switch. Virtual LANs A building with centralized wiring using hubs and a switch.

Why VLANs if everything interconnects? LAN represents organizational hierarchy rather than geography Security Traffic Load/separation (research vs production) Limiting Broadcasts Legitimate (i.e ARP) Storms Do “rewiring” in software

Virtual LANs (2) (a) Four physical LANs organized into two VLANs, gray and white, by two bridges. (b) The same 15 machines organized into two VLANs by switches.

Grouping into VLANs Port level mapping MAC level mapping All machines on a port must be on the same VLAN – OK with completely switched networks. MAC level mapping What if “docks” are used with notebooks IP level mapping Violates layering

802.1q issues Can we identify the VLAN in the frame header Easy to do for new protocols, define a new header field What to do with (Old/Fast/Giga) Ethernet, which has no “free” header fields and max size frames ? Who generates this field What to do with legacy NICs Key point – this field is only used by switches, not end machines

802.1Q Adds a new field to Ethernet header circa 98, raised frame size to 1522 from 1518 1st 2 bytes are protocol ID, fixed as 0x8100 (>1500 so type) 2nd byte has VLAN id (lower order 12 bits), 3 bit priority (used by 802.1P), 1 bit CFI to indicate 802.5 traffic Required Bridges and switches to be VLAN aware, “future” NICs should be aware too (with Giga deployment?) Bridges/switches could add this field till then)

The IEEE 802.1Q Standard Transition from legacy Ethernet to VLAN-aware Ethernet. The shaded symbols are VLAN aware. The empty ones are not.

The 802.3 (legacy) and 802.1Q Ethernet frame formats. The IEEE 802.1Q Standard (2) The 802.3 (legacy) and 802.1Q Ethernet frame formats.

UWB FCC definition – bandwidth > 25% of center frequency. 2(Fh-Fl)/(Fh+Fl) 802.11b has 80MHz of usable spectrum in 2.4GHz band Uses Pulse position Modulation Low power on any particular frequency, fitting in under FCC Part 15 rules MAC issues – QoS, TDMA and CDMA don’t work well. P802.15.3, HiperLAN DM

Channel allocation methods and systems for a common channel. Summary Channel allocation methods and systems for a common channel.