dr. l. christofi1 local & metropolitan area networks acoe322 lecture 2 medium access control and...

36
Dr. L. Christofi 1 Local & Metropolitan Area Networks ACOE322 Lecture 2 Medium Access Control and Logical Link Control

Upload: helen-collins

Post on 29-Dec-2015

215 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Dr. L. Christofi1 Local & Metropolitan Area Networks ACOE322 Lecture 2 Medium Access Control and Logical Link Control

Dr. L. Christofi 1

Local & Metropolitan Area Networks

ACOE322

Lecture 2Medium Access Control

andLogical Link Control

Page 2: Dr. L. Christofi1 Local & Metropolitan Area Networks ACOE322 Lecture 2 Medium Access Control and Logical Link Control

2Dr. L. Christofi

Overview• The architecture of a LAN is best described in terms

of a layering of protocols that organize the basic functions of a LAN

• This section opens with a description of the standardized protocol architecture for LANs, which includes—Physical layer—Medium Access Control (MAC) layer—Logical Link Control (LLC) layer

• Physical layer includes topology and transmission medium (covered in lecture 1)

• This section provides an overview of MAC and LLC layers

Page 3: Dr. L. Christofi1 Local & Metropolitan Area Networks ACOE322 Lecture 2 Medium Access Control and Logical Link Control

3Dr. L. Christofi

Medium Access Sublayer (1)

Network Layer

Data Link Layer

Physical Layer

Medium Access Sublayer

Logical Link Control Sublayer

Page 4: Dr. L. Christofi1 Local & Metropolitan Area Networks ACOE322 Lecture 2 Medium Access Control and Logical Link Control

4Dr. L. Christofi

Medium Access Sublayer (2)• Medium access (MAC) sublayer is not

important on point-to-point links

• The MAC sublayer is only used in broadcast or shared channel networks

• MAC protocols enable two stations (or nodes) using a shared communication resource to establish, maintain and terminate a connection.

• Examples: Satellite, Ethernet, Cellular

Page 5: Dr. L. Christofi1 Local & Metropolitan Area Networks ACOE322 Lecture 2 Medium Access Control and Logical Link Control

5Dr. L. Christofi

IEEE 802 Standard (1)

Data LinkLayer

PhysicalLayer

LLCSublayer

PhysicalLayer

MACSublayer

IEEE 802.2

Eth

ern

et

IEE

E 8

02.3

(C

SM

A/C

D)

IEE

E 8

02.4

T

oke

n b

us

IEE

E 8

02.5

To

ken

Rin

g

FD

DI

OSI Layers LAN Specification

Page 6: Dr. L. Christofi1 Local & Metropolitan Area Networks ACOE322 Lecture 2 Medium Access Control and Logical Link Control

6Dr. L. Christofi

IEEE 802 standard (2)• IEEE 802 standard defines:

—Physical layer protocol

—Data link layer protocol

• Medium Access (MAC) Sublayer

• Logical Link Control (LLC) Sublayer

Page 7: Dr. L. Christofi1 Local & Metropolitan Area Networks ACOE322 Lecture 2 Medium Access Control and Logical Link Control

7Dr. L. Christofi

IEEE 802 standard802.2: Logical Link Control (LLC)

— explained in this section

802.3: CSMA/CD (Ethernet)— explained in this section

802.5: Token Ring— explained in lecture 3

802.11: Wireless LANs— explained in lecture 3

Page 8: Dr. L. Christofi1 Local & Metropolitan Area Networks ACOE322 Lecture 2 Medium Access Control and Logical Link Control

8Dr. L. Christofi

IEEE 802 vs OSI model

Page 9: Dr. L. Christofi1 Local & Metropolitan Area Networks ACOE322 Lecture 2 Medium Access Control and Logical Link Control

9Dr. L. Christofi

802 Layers functions• Physical

—Encoding/decoding—Preamble generation/removal—Bit transmission/reception—Transmission medium and topology

• Logical Link Control—Interface to higher levels—Flow and error control

• Medium Access Control—Data assembly and dismantle into frames—Govern access to LAN transmission medium

Page 10: Dr. L. Christofi1 Local & Metropolitan Area Networks ACOE322 Lecture 2 Medium Access Control and Logical Link Control

10Dr. L. Christofi

Scope of LAN protocols

Consider two stations that communicate via a shared medium LAN.

Higher layers (above LLC) provide end-to-end services between the stations

Below the LLC layer, the MAC provides the necessary logic for gaining access to the network

Page 11: Dr. L. Christofi1 Local & Metropolitan Area Networks ACOE322 Lecture 2 Medium Access Control and Logical Link Control

11Dr. L. Christofi

Logical Link Control (LLC)• The LLC layer for LANs is concerned with the

transmission of a link-level protocol data unit (PDU) between two stations, without the necessity of an intermediate switching node

• It has two characteristics:—It must support the multi-access, shared medium

nature of the link—It is relieved from some details of link access by

the MAC layer

Page 12: Dr. L. Christofi1 Local & Metropolitan Area Networks ACOE322 Lecture 2 Medium Access Control and Logical Link Control

12Dr. L. Christofi

LLC Services• Unacknowledged connectionless service

—Datagram-style—Does not involve any flow and error control

mechanisms—Data delivery is not guaranteed

• Connection mode service—A logical connection is set up between two stations—Flow and error control are provided

• Acknowledged connectionless service—A cross between the previous services—Datagrams are to be acknowledged—No prior logical connection is set up

Page 13: Dr. L. Christofi1 Local & Metropolitan Area Networks ACOE322 Lecture 2 Medium Access Control and Logical Link Control

13Dr. L. Christofi

Medium Access Control (1)• Assembly of data into frame with address

and error detection fields• Disassembly of frame and performing of

—Address recognition—Error detection

• Govern access to transmission medium—Not found in traditional layer 2 data link control

• For the same LLC, several MAC options may be available

Page 14: Dr. L. Christofi1 Local & Metropolitan Area Networks ACOE322 Lecture 2 Medium Access Control and Logical Link Control

14Dr. L. Christofi

Medium Access Control (2)• All LANs and MANs consist of a collection of devices

that must share the network’s transmission capacity• Some means of controlling access to the transmission

medium is needed for efficient use of that capacity. This is the function of a Medium Access Control (MAC) Protocol.

• The key parameters in any MAC technique are where and how.—Where, refers to whether control info is exercised in a

centralized or distributed fashion.• Centralized: a controller has the authority to grant access to

the network• Distributed: the stations collectively perform a MAC function

to determine dynamically the order in which stations transmit—How, is contrained by the topology and is a trade-off

among competing factors, such as cost, performance and complexity

Page 15: Dr. L. Christofi1 Local & Metropolitan Area Networks ACOE322 Lecture 2 Medium Access Control and Logical Link Control

15Dr. L. Christofi

LAN Protocols in Context

Page 16: Dr. L. Christofi1 Local & Metropolitan Area Networks ACOE322 Lecture 2 Medium Access Control and Logical Link Control

16Dr. L. Christofi

Generic MAC frame format

• MAC control: contains control info for the functioning of the MAC protocol, eg priority level

• Destination MAC address: the destination physical attachment point on the LAN for this frame

• Source MAC address: the source physical attachment point on the LAN for this frame

• LLC: The LLC data from the next higher layer• CRC: Cyclic Redundancy Check field, used to check if a

transmission error has occurred

Page 17: Dr. L. Christofi1 Local & Metropolitan Area Networks ACOE322 Lecture 2 Medium Access Control and Logical Link Control

17Dr. L. Christofi

MAC techniques• Synchronous

—A specific capacity is dedicated to a connection—Same approach as in circuit-switching FDM or

TDM, so not optimal for LANs/MANs because the needs of the stations are unpredictable

• Asynchronous—Capacity is allocated in a dynamic fashion, in

response to demand—Subdivided into three categories

• Round Robin• Reservation• Contention

Page 18: Dr. L. Christofi1 Local & Metropolitan Area Networks ACOE322 Lecture 2 Medium Access Control and Logical Link Control

18Dr. L. Christofi

Asynchronous MAC techniques• Round Robin

— Each station in turn is granted the right to transmit— After each station finishes transmitting, it passes the right to

transmit to the next station in logical sequence— Efficient technique when many stations have data to transmit

over an extended period of time• Reservation

— For stream traffic (voice, bulk file transfer etc)— Time on the medium is divided into slots, like synchronous TDM— A station whishing to transmit reserves slots for an extended

period• Contention

— For bursty traffic (short, sporadic transmissions such as interactive terminal-host traffic)

— No control is exercised to determine whose turn it is— Simple to implement and efficient for light loads

Page 19: Dr. L. Christofi1 Local & Metropolitan Area Networks ACOE322 Lecture 2 Medium Access Control and Logical Link Control

19Dr. L. Christofi

Medium Access Control Methods• The methods used for Medium Access

Control are:—Carrier-sense multiple-access with

collision detection (CSMA/CD) for bus topologies

—Control token or Token Passing for bus and ring topologies

Page 20: Dr. L. Christofi1 Local & Metropolitan Area Networks ACOE322 Lecture 2 Medium Access Control and Logical Link Control

20Dr. L. Christofi

CSMA/CD• CSMA/CD is used only in bus type

networks, where a number of nodes share a common communication channel (wire) known as the bus.

• CSMA/CD is used in traditional Ethernet—Ethernet will be covered in detail in

future lectures

Page 21: Dr. L. Christofi1 Local & Metropolitan Area Networks ACOE322 Lecture 2 Medium Access Control and Logical Link Control

21Dr. L. Christofi

CSMA/CDA B DC

A B DC

A B DC

A B DC

JAMJAM JAMJAM JAMJAM JAMJAM JAMJAM JAMJAM

Carrier sense multiple access collision detect (CSMA/CD)

CarrierSense

MultipleAccess

Collision

CollisionDetection(Backoff

Algorithm)

CollisionCollision

Page 22: Dr. L. Christofi1 Local & Metropolitan Area Networks ACOE322 Lecture 2 Medium Access Control and Logical Link Control

22Dr. L. Christofi

CSMA/CD operation• The basic operation of CSMA/CD is as follows:

1.To transmit data, the source station assembles a packet comprising of the destination address, the data and control info

2.The source station listens to the cable to determine if the bus is currently in use. If so, it waits until the bus is free, else it transmits the packet. This operation is known as carrier sensing.

3.During transmission, the source station continues to listen to the cable to detect if another station has also initiated a transmission thus causing a collision. This process is known as collision detection.

4. If a collision is detected then, to ensure all stations are aware of the collision, the source station transmits a random bit pattern known as the jam sequence.

5.Stations involved in a collision then back off for a random period before retrying for packet transmission.

Page 23: Dr. L. Christofi1 Local & Metropolitan Area Networks ACOE322 Lecture 2 Medium Access Control and Logical Link Control

23Dr. L. Christofi

CSMA/CD procedure• Sense the channel

— If idle, transmit immediately— If busy, wait until the channel becomes idle

• Collision detection— Abort a transmission immediately if a collision is detected— Try again later after waiting a random amount of time

Page 24: Dr. L. Christofi1 Local & Metropolitan Area Networks ACOE322 Lecture 2 Medium Access Control and Logical Link Control

24Dr. L. Christofi

Collision detection timeHow long does it take to realize there has been a

collision?

Worst case: 2 x end-to-end propagation delay

StationA

StationB

packet

tprop

Page 25: Dr. L. Christofi1 Local & Metropolitan Area Networks ACOE322 Lecture 2 Medium Access Control and Logical Link Control

25Dr. L. Christofi

Control Token or Token Passing• Another way of controlling access to a shared

transmission medium is by a control token (Token Passing)

• The Control Token technique uses a control or permission token to share the communication resource between a number of nodes. The technique can be applied to both bus and ring network topologies.

• This token is passed from one station to another according to a defined set of rules

• A station may transmit a frame only when it has possession of the token and after it has transmitted the frame, it passes the token on, to allow another station to access the transmission medium

Page 26: Dr. L. Christofi1 Local & Metropolitan Area Networks ACOE322 Lecture 2 Medium Access Control and Logical Link Control

26Dr. L. Christofi

Control Token operation (1)• Whether using a ring or bus topology, a logical ring

is established which links all the nodes using the physical medium (see next two slides)

• A single control (permission) token is created at one of the nodes

• The token is passed from node to node around the logical ring until it arrives at a node waiting to send a frame

• The node captures the token and transmits the frame

• Upon completing transmission, the node releases the token to the next node in the logical ring

Page 27: Dr. L. Christofi1 Local & Metropolitan Area Networks ACOE322 Lecture 2 Medium Access Control and Logical Link Control

27Dr. L. Christofi

Control Token operation (2)

A C

B

Dtoken

Assume DTE A wishes to send a frame to DTE C

DTE A waits for receipt of control token from its upstream neighbor

A C

B

D

frame

DTE A transmits frame on to the ring. DTE C copies the frame addressed to it. Frame continues around the ring.

Page 28: Dr. L. Christofi1 Local & Metropolitan Area Networks ACOE322 Lecture 2 Medium Access Control and Logical Link Control

28Dr. L. Christofi

Control Token operation (3)

A C

B

Dframe

DTE A awaits receipt of start of frame but does not repeat the frame, thereby removing it

A C

B

D

token

When last bit of frame has been received DTE A generates and passes on the token: it then processes the response bits at the tail of the frame

Either:

Or:When last bit of frame has been transmitted by DTE A it passes on the token – early release

A C

B

D

token

Page 29: Dr. L. Christofi1 Local & Metropolitan Area Networks ACOE322 Lecture 2 Medium Access Control and Logical Link Control

29Dr. L. Christofi

Sending frames or Control Token• Sending frames

1. Source node monitors all frames in ring. 2. If it detects frames with its own source address it removes

them from the ring3. If it detects a corrupted frame, it removes it from the ring

and retransmits a new one• Sending Control Token

1. When source node finishes transmitting, it sends a token to its designated successor and it is acknowledged

2. If the successor does not respond, it then sends a “who-follows-then” message. If it receives a reply, it send a token

3. If it receives no reply, it sends “is anybody there?” message. If it receives a reply, it sends a token

4. If it does not receive any reply, it then stops transmitting but continues to listen.

Page 30: Dr. L. Christofi1 Local & Metropolitan Area Networks ACOE322 Lecture 2 Medium Access Control and Logical Link Control

30Dr. L. Christofi

Token passing network

A token always circulates around a ring net.

A user grabs a token to transmit data

Page 31: Dr. L. Christofi1 Local & Metropolitan Area Networks ACOE322 Lecture 2 Medium Access Control and Logical Link Control

31Dr. L. Christofi

Control Token procedure

Page 32: Dr. L. Christofi1 Local & Metropolitan Area Networks ACOE322 Lecture 2 Medium Access Control and Logical Link Control

32Dr. L. Christofi

LAN addressing• Communication involves three agents:

—Processes—stations —networks

• The transfer of data from one process to another involves —getting the data to the station in which the

destination process resides, and then —getting it to the intended process within the

computer

• The above suggest the need for two levels of addressing—MAC address—LLC address

Page 33: Dr. L. Christofi1 Local & Metropolitan Area Networks ACOE322 Lecture 2 Medium Access Control and Logical Link Control

33Dr. L. Christofi

User data and LAN/MAN protocol control info• LLC user data (IP datagram) are passed down to LLC

which appends a header, to make the LLC PDU

• The LLC PDU is passed to the MAC entity, which in turn appends a header and a trailer, to make the MAC frame

Page 34: Dr. L. Christofi1 Local & Metropolitan Area Networks ACOE322 Lecture 2 Medium Access Control and Logical Link Control

34Dr. L. Christofi

Levels of addressing• MAC address

—Identifies a physical interface from the station to the LAN

—There is one to one relationship between stations and physical addresses

• LLC address—Identifies an LLC user—The LLC address (LLC SAP) is associated with a

particular user within a station—LLC SAP may refer to a process executing on a

station or to a hardware port

Page 35: Dr. L. Christofi1 Local & Metropolitan Area Networks ACOE322 Lecture 2 Medium Access Control and Logical Link Control

35Dr. L. Christofi

Review Questions• Explain the difference between MAC and LLC protocols with

respect to their functionality.

• Describe the techniques used in implementing MAC protocols.

• Which are the asynchronous MAC techniques and for which type if traffic are they best suited?

• Which methods are used for Medium Access Control and for which type of network topologies are they used?

• What is meant by CSMA/CD?

• Explain the operation of CSMA/CD.

• Explain the terms of collision detection and jam sequence.

• What is meant by Control Token?

• Explain by means of appropriate diagrams the operation of Control Token.

• In the context of Control Token MAC methods, which steps does the source station take when sending frames or the control token on a ring network topology?

Page 36: Dr. L. Christofi1 Local & Metropolitan Area Networks ACOE322 Lecture 2 Medium Access Control and Logical Link Control

36Dr. L. Christofi

• W. Stalling, Local and Metropolitan Area Networks, 6th edition, Prentice Hall, 2000

References

• F. Halsall, Data Communications, Computer Networks and Open Systems, 4th edition, Addison Wesley, 1995

• B.A. Forouzan, Data Communications and Networking, 3rd edition, McGraw-Hill, 2004

• W. Stallings, Data and Computer Communications, 7th edition, Prentice Hall, 2004