The Medium Access Control Sublayer Chapter 4 12/13/2015www.ishuchita.com1.

Slides:



Advertisements
Similar presentations
The Medium Access Control Sublayer
Advertisements

Medium Access Control Sublayer Chapter 4 CN5E by Tanenbaum & Wetherall, © Pearson Education-Prentice Hall and D. Wetherall, 2011 Channel Allocation Problem.
Channel Allocation Protocols. Dynamic Channel Allocation Parameters Station Model. –N independent stations, each acting as a Poisson Process for the purpose.
EECC694 - Shaaban #1 lec #5 Spring Data Link In Broadcast Networks: The Media Access Sublayer Broadcast networks with multi-access (or random.
Medium Access Control Sublayer. Static Channel Allocation FDM TDM Wastage of resources when some of the users are idle. What if the number of users increase.
CMPE 150 – Winter 2009 Lecture 8 January 29, 2009 P.E. Mantey.
The Medium Access Control Sublayer
Wireless Networks.
CMPE 150- Introduction to Computer Networks 1 CMPE 150 Fall 2005 Lecture 17 Introduction to Computer Networks.
Data Link Layer Switching
CSC 450/550 Part 3: The Medium Access Control Sublayer.
The Protocol Stack Part of the protocol stack.
The Medium Access Control Sublayer Chapter 4. Ethernet Cabling The most common kinds of Ethernet cabling.
CMPE 150- Introduction to Computer Networks 1 CMPE 150 Fall 2005 Lecture 16 Introduction to Computer Networks.
CMPE 150 – Winter 2009 Lecture 7 January 27, 2009 P.E. Mantey.
CMPE 150- Introduction to Computer Networks 1 CMPE 150 Fall 2005 Lecture 18 Introduction to Computer Networks.
Computer Networks Medium Access Sublayer (Part I).
16 February 2003 TU/e Computer Science, System Architecture and Networking 1 Communication media Thanks to A. Tanenbaum.
Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011 The Medium Access Control Sublayer Chapter.
1 Chapter 5 The Medium Access Sublayer. 2 Chapter 5 The Medium Access Layer 5.1 The Channel Allocation problem - Static and dynamic channel allocation.
1 ECE453 – Introduction to Computer Networks Lecture 8 – Multiple Access Control (II)
The Medium Access Control Sublayer Chapter 4. The Channel Allocation Problem Static Channel Allocation in LANs and MANs Dynamic Channel Allocation in.
Infrastructure de Communications – CR 4107Chapter 41 The Medium Access Control Sublayer Chapter 4.
Chapter 6 High-Speed LANs Chapter 6 High-Speed LANs.
1 ECE453 – Introduction to Computer Networks Lecture 7 – Multiple Access Control (I)
Computer Networks 1 (Mạng Máy Tính 1)
Medium Access Control.
A.S.Tanenbaum, Computer networks, ch4 MAC 1 The Medium Access Control Sublayer Medium Access Control: a means of controlling access to the medium to promote.
Medium Access Control. Channel Allocation Static channel allocation in LANs and MANs FDMA, TDMA, CDMA Dynamic channel allocation in LANs and MANs MAC.
The Medium Access Sublayer
Computer Networks NYUS FCSIT Spring 2008 Igor TRAJKOVSKI, Ph.D. Associate Professor
1 Chapter 5 The Medium Access Sublayer. 2 The Medium Access Layer 5.1 Channel Allocation problem - Static and dynamic channel allocation in LANs & MANs.
CSMA with Collision Detection CSMA/CD can be in one of three states: contention, transmission, or idle.
The Medium Access Control Sublayer Chapter 4. The Channel Allocation Problem Static Channel Allocation in LANs and MANs Dynamic Channel Allocation in.
CSC4220/6220 Computer Networks
The Medium Access Control Sublayer طبقة ولوج الوسط الجزئية Chapter 4.
The Medium Access Control Sublayer Chapter 4 10/1/2015www.noteshit.com1.
CHAPTER 4: THE MEDIUM ACCESS SUBLAYER 4.1: The Channel Allocation Problem 4.2: Multiple Access Protocols.
Enterprise network 8.1:Introduction 8.2:LANs 8.3:Ethernet / IEEE :Token ring 8.5:Bridges 8.6:FDDI 8.7:High-speed LANs 8.8:LAN protocol 8.9:Multicast.
10/18/2007 EETS Bluetooth Bluetooth Architecture Bluetooth Applications The Bluetooth Protocol Stack The Bluetooth Radio Layer The Bluetooth Baseband.
The Medium Access Control Sublayer Chapter 4. The Channel Allocation Problem Static Channel Allocation Dynamic Channel Allocation  Delay for the divided.
Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011 The Medium Access Control Sublayer Chapter.
Chi-Cheng Lin, Winona State University CS 313 Introduction to Computer Networking & Telecommunication Medium Access Control Sublayer.
The Medium Access Control Sublayer Chapter 4. The Channel Allocation Problem Static Channel Allocation in LANs and MANs Dynamic Channel Allocation in.
Chi-Cheng Lin, Winona State University CS 313 Introduction to Computer Networking & Telecommunication Local Area Networks.
The Medium Access Control Sublayer Chapter 4. The Channel Allocation Problem Static Channel Allocation in LANs and MANs Dynamic Channel Allocation in.
CEN 4500 Data Communications Instructor: S. Masoud Sadjadi sadjadi At cs Dot fiu Dot edu Chapter 4: The Medium.
10/11/2007 EETS The Medium Access Control Sublayer Chapter 4.
17 - Winter 2005 ECE ECE 766 Computer Interfacing and Protocols 1 Local Area Networks Need for high performance communications for physically close devices.
C H 4 T HE M EDIUM A CCESS C ONTROL S UBLAYER 1 Medium Access Control: a means of controlling access to the medium to promote orderly and efficient use.
Medium Access Control Sub Layer
Data Communications, Kwangwoon University12-1 Chapter 12. Multiple Access 1.Random Access 2.Controlled Access 3.Channelization.
C H 4 T HE M EDIUM A CCESS C ONTROL S UBLAYER 1 Medium Access Control: a means of controlling access to the medium to promote orderly and efficient use.
Medium Access Control Sublayer Chapter 4
The Medium Access Control Sublayer Chapter 4. The Channel Allocation Problem Static Channel Allocation in LANs and MANs Dynamic Channel Allocation in.
The Medium Access Control Sublayer Chapter 4 M/M/1 System λ: mean arrival rate (frames/sec) 1/μ: mean frame length (bits/frame) C: data transmission.
1 Ethernet History –developed by Xerox PARC in mid-1970s –roots in Aloha packet-radio network –standardized by Xerox, DEC, and Intel in 1978 –similar to.
The Medium Access Control Sublayer
The Medium Access Control (MAC) Sublayer. The Channel Allocation Problem Static Channel Allocation in LANs and MANs Dynamic Channel Allocation in LANs.
THE MEDIUM ACCESS CONTROL SUBLAYER 4.1 THE CHANNEL ALLOCATION PROBLEM 4.2 MULTIPLE ACCESS PROTOCOLS.
Medium Access Control Sublayer. What is MAC Layer In the IEEE 802 reference model of computer networking, the medium access control or media access control.
COMPUTER NETWORKS Data-link Layer (The Medium Access Control Sublayer) MAC Sublayer.
Wireless LAN Protocols This talk is based on the course: CPSC Networks and Distributed Processing Spring2006/
Wireless LAN Protocols This talk is based on the course: CPSC Networks and Distributed Processing Spring2006/
Example DLL Protocols 1. High-Level Data Link Control (HDLC).
The Data Link Layer Chapter
The Medium Access Control Sublayer
The Medium Access Control Sublayer
The Medium Access Control Sublayer
The Medium Access Control (MAC) Sublayer
Presentation transcript:

The Medium Access Control Sublayer Chapter 4 12/13/2015www.ishuchita.com1

The Channel Allocation Problem Static Channel Allocation in LANs and MANs Dynamic Channel Allocation in LANs and MANs 12/13/2015www.ishuchita.com2

Dynamic Channel Allocation in LANs and MANs 1.Station Model. 2.Single Channel Assumption. 3.Collision Assumption. 4.(a) Continuous Time. (b) Slotted Time. 5.(a) Carrier Sense. (b) No Carrier Sense. 12/13/2015www.ishuchita.com3

Multiple Access Protocols ALOHA Carrier Sense Multiple Access Protocols Collision-Free Protocols Limited-Contention Protocols Wavelength Division Multiple Access Protocols Wireless LAN Protocols 12/13/2015www.ishuchita.com4

Pure ALOHA In pure ALOHA, frames are transmitted at completely arbitrary times. 12/13/2015www.ishuchita.com5

Pure ALOHA (2) Vulnerable period for the shaded frame. 12/13/2015www.ishuchita.com6

Pure ALOHA (3) Throughput versus offered traffic for ALOHA systems. 12/13/2015www.ishuchita.com7

Persistent and Nonpersistent CSMA Comparison of the channel utilization versus load for various random access protocols. 12/13/2015www.ishuchita.com8

CSMA with Collision Detection CSMA/CD can be in one of three states: contention, transmission, or idle. 12/13/2015www.ishuchita.com9

Collision-Free Protocols The basic bit-map protocol. 12/13/2015www.ishuchita.com10

Collision-Free Protocols (2) The binary countdown protocol. A dash indicates silence. 12/13/2015www.ishuchita.com11

Limited-Contention Protocols Acquisition probability for a symmetric contention channel. 12/13/2015www.ishuchita.com12

Adaptive Tree Walk Protocol The tree for eight stations. 12/13/2015www.ishuchita.com13

Wavelength Division Multiple Access Protocols Wavelength division multiple access. 12/13/2015www.ishuchita.com14

Wireless LAN Protocols A wireless LAN. (a) A transmitting. (b) B transmitting. 12/13/2015www.ishuchita.com15

Wireless LAN Protocols (2) The MACA protocol. (a) A sending an RTS to B. (b) B responding with a CTS to A. 12/13/2015www.ishuchita.com16

Ethernet Ethernet Cabling Manchester Encoding The Ethernet MAC Sublayer Protocol The Binary Exponential Backoff Algorithm Ethernet Performance Switched Ethernet Fast Ethernet Gigabit Ethernet IEEE 802.2: Logical Link Control Retrospective on Ethernet 12/13/2015www.ishuchita.com17

Ethernet Cabling The most common kinds of Ethernet cabling. 12/13/2015www.ishuchita.com18

Ethernet Cabling (2) Three kinds of Ethernet cabling. (a) 10Base5, (b) 10Base2, (c) 10Base-T. 12/13/2015www.ishuchita.com19

Ethernet Cabling (3) Cable topologies. (a) Linear, (b) Spine, (c) Tree, (d) Segmented. 12/13/2015www.ishuchita.com20

Ethernet Cabling (4) (a) Binary encoding, (b) Manchester encoding, (c) Differential Manchester encoding. 12/13/2015www.ishuchita.com21

Ethernet MAC Sublayer Protocol Frame formats. (a) DIX Ethernet, (b) IEEE /13/2015www.ishuchita.com22

Ethernet MAC Sublayer Protocol (2) 12/13/2015www.ishuchita.com23

Ethernet Performance Efficiency of Ethernet at 10 Mbps with 512-bit slot times. 12/13/2015www.ishuchita.com24

Switched Ethernet A simple example of switched Ethernet. 12/13/2015www.ishuchita.com25

Fast Ethernet The original fast Ethernet cabling. 12/13/2015www.ishuchita.com26

Gigabit Ethernet (a) A two-station Ethernet. (b) A multistation Ethernet. 12/13/2015www.ishuchita.com27

Gigabit Ethernet (2) Gigabit Ethernet cabling. 12/13/2015www.ishuchita.com28

IEEE 802.2: Logical Link Control (a) Position of LLC. (b) Protocol formats. 12/13/2015www.ishuchita.com29

Wireless LANs The Protocol Stack The Physical Layer The MAC Sublayer Protocol The Frame Structure Services 12/13/2015www.ishuchita.com30

The Protocol Stack Part of the protocol stack. 12/13/2015www.ishuchita.com31

The MAC Sublayer Protocol (a) The hidden station problem. (b) The exposed station problem. 12/13/2015www.ishuchita.com32

The MAC Sublayer Protocol (2) The use of virtual channel sensing using CSMA/CA. 12/13/2015www.ishuchita.com33

The MAC Sublayer Protocol (3) A fragment burst. 12/13/2015www.ishuchita.com34

The MAC Sublayer Protocol (4) Interframe spacing in /13/2015www.ishuchita.com35

The Frame Structure The data frame. 12/13/2015www.ishuchita.com36

Services Association Disassociation Reassociation Distribution Integration Distribution Services 12/13/2015www.ishuchita.com37

Services Authentication Deauthentication Privacy Data Delivery Intracell Services 12/13/2015www.ishuchita.com38

Broadband Wireless Comparison of and The Protocol Stack The Physical Layer The MAC Sublayer Protocol The Frame Structure 12/13/2015www.ishuchita.com39

The Protocol Stack The Protocol Stack. 12/13/2015www.ishuchita.com40

The Physical Layer The transmission environment. 12/13/2015www.ishuchita.com41

The Physical Layer (2) Frames and time slots for time division duplexing. 12/13/2015www.ishuchita.com42

The MAC Sublayer Protocol Service Classes Constant bit rate service Real-time variable bit rate service Non-real-time variable bit rate service Best efforts service 12/13/2015www.ishuchita.com43

The Frame Structure (a) A generic frame. (b) A bandwidth request frame. 12/13/2015www.ishuchita.com44

Bluetooth Bluetooth Architecture Bluetooth Applications The Bluetooth Protocol Stack The Bluetooth Radio Layer The Bluetooth Baseband Layer The Bluetooth L2CAP Layer The Bluetooth Frame Structure 12/13/2015www.ishuchita.com45

Bluetooth Architecture Two piconets can be connected to form a scatternet. 12/13/2015www.ishuchita.com46

Bluetooth Applications The Bluetooth profiles. 12/13/2015www.ishuchita.com47

The Bluetooth Protocol Stack The version of the Bluetooth protocol architecture. 12/13/2015www.ishuchita.com48

The Bluetooth Frame Structure A typical Bluetooth data frame. 12/13/2015www.ishuchita.com49

Data Link Layer Switching Bridges from 802.x to 802.y Local Internetworking Spanning Tree Bridges Remote Bridges Repeaters, Hubs, Bridges, Switches, Routers, Gateways Virtual LANs 12/13/2015www.ishuchita.com50

Data Link Layer Switching Multiple LANs connected by a backbone to handle a total load higher than the capacity of a single LAN. 12/13/2015www.ishuchita.com51

Bridges from 802.x to 802.y Operation of a LAN bridge from to /13/2015www.ishuchita.com52

Bridges from 802.x to 802.y (2) The IEEE 802 frame formats. The drawing is not to scale. 12/13/2015www.ishuchita.com53

Local Internetworking A configuration with four LANs and two bridges. 12/13/2015www.ishuchita.com54

Spanning Tree Bridges Two parallel transparent bridges. 12/13/2015www.ishuchita.com55

Spanning Tree Bridges (2) (a) Interconnected LANs. (b) A spanning tree covering the LANs. The dotted lines are not part of the spanning tree. 12/13/2015www.ishuchita.com56

Remote Bridges Remote bridges can be used to interconnect distant LANs. 12/13/2015www.ishuchita.com57

Repeaters, Hubs, Bridges, Switches, Routers and Gateways (a) Which device is in which layer. (b) Frames, packets, and headers. 12/13/2015www.ishuchita.com58

Repeaters, Hubs, Bridges, Switches, Routers and Gateways (2) (a) A hub. (b) A bridge. (c) a switch. 12/13/2015www.ishuchita.com59

Virtual LANs A building with centralized wiring using hubs and a switch. 12/13/2015www.ishuchita.com60

Virtual LANs (2) (a) Four physical LANs organized into two VLANs, gray and white, by two bridges. (b) The same 15 machines organized into two VLANs by switches. 12/13/2015www.ishuchita.com61

The IEEE 802.1Q Standard Transition from legacy Ethernet to VLAN-aware Ethernet. The shaded symbols are VLAN aware. The empty ones are not. 12/13/2015www.ishuchita.com62

The IEEE 802.1Q Standard (2) The (legacy) and 802.1Q Ethernet frame formats. 12/13/2015www.ishuchita.com63

Summary Channel allocation methods and systems for a common channel. 12/13/2015www.ishuchita.com64