the medium access control sublayer chapter 4 12/13/2015
TRANSCRIPT
![Page 1: The Medium Access Control Sublayer Chapter 4 12/13/2015](https://reader036.vdocuments.us/reader036/viewer/2022062315/5697bf9c1a28abf838c932a2/html5/thumbnails/1.jpg)
The Medium Access ControlSublayer
Chapter 4
04/21/23 www.ishuchita.com 1
![Page 2: The Medium Access Control Sublayer Chapter 4 12/13/2015](https://reader036.vdocuments.us/reader036/viewer/2022062315/5697bf9c1a28abf838c932a2/html5/thumbnails/2.jpg)
The Channel Allocation Problem
• Static Channel Allocation in LANs and MANs• Dynamic Channel Allocation in LANs and MANs
04/21/23 www.ishuchita.com 2
![Page 3: The Medium Access Control Sublayer Chapter 4 12/13/2015](https://reader036.vdocuments.us/reader036/viewer/2022062315/5697bf9c1a28abf838c932a2/html5/thumbnails/3.jpg)
Dynamic Channel Allocation in LANs and MANs
1. Station Model.
2. Single Channel Assumption.
3. Collision Assumption.
4. (a) Continuous Time.(b) Slotted Time.
5. (a) Carrier Sense.(b) No Carrier Sense.
04/21/23 www.ishuchita.com 3
![Page 4: The Medium Access Control Sublayer Chapter 4 12/13/2015](https://reader036.vdocuments.us/reader036/viewer/2022062315/5697bf9c1a28abf838c932a2/html5/thumbnails/4.jpg)
Multiple Access Protocols
• ALOHA• Carrier Sense Multiple Access Protocols• Collision-Free Protocols• Limited-Contention Protocols• Wavelength Division Multiple Access Protocols• Wireless LAN Protocols
04/21/23 www.ishuchita.com 4
![Page 5: The Medium Access Control Sublayer Chapter 4 12/13/2015](https://reader036.vdocuments.us/reader036/viewer/2022062315/5697bf9c1a28abf838c932a2/html5/thumbnails/5.jpg)
Pure ALOHA
In pure ALOHA, frames are transmitted at completely arbitrary times.04/21/23 www.ishuchita.com 5
![Page 6: The Medium Access Control Sublayer Chapter 4 12/13/2015](https://reader036.vdocuments.us/reader036/viewer/2022062315/5697bf9c1a28abf838c932a2/html5/thumbnails/6.jpg)
Pure ALOHA (2)
Vulnerable period for the shaded frame.04/21/23 www.ishuchita.com 6
![Page 7: The Medium Access Control Sublayer Chapter 4 12/13/2015](https://reader036.vdocuments.us/reader036/viewer/2022062315/5697bf9c1a28abf838c932a2/html5/thumbnails/7.jpg)
Pure ALOHA (3)
Throughput versus offered traffic for ALOHA systems.04/21/23 www.ishuchita.com 7
![Page 8: The Medium Access Control Sublayer Chapter 4 12/13/2015](https://reader036.vdocuments.us/reader036/viewer/2022062315/5697bf9c1a28abf838c932a2/html5/thumbnails/8.jpg)
Persistent and Nonpersistent CSMA
Comparison of the channel utilization versus load for various random access protocols.04/21/23 www.ishuchita.com 8
![Page 9: The Medium Access Control Sublayer Chapter 4 12/13/2015](https://reader036.vdocuments.us/reader036/viewer/2022062315/5697bf9c1a28abf838c932a2/html5/thumbnails/9.jpg)
CSMA with Collision Detection
CSMA/CD can be in one of three states: contention, transmission, or idle.
04/21/23 www.ishuchita.com 9
![Page 10: The Medium Access Control Sublayer Chapter 4 12/13/2015](https://reader036.vdocuments.us/reader036/viewer/2022062315/5697bf9c1a28abf838c932a2/html5/thumbnails/10.jpg)
Collision-Free Protocols
The basic bit-map protocol.04/21/23 www.ishuchita.com 10
![Page 11: The Medium Access Control Sublayer Chapter 4 12/13/2015](https://reader036.vdocuments.us/reader036/viewer/2022062315/5697bf9c1a28abf838c932a2/html5/thumbnails/11.jpg)
Collision-Free Protocols (2)
The binary countdown protocol. A dash indicates silence.04/21/23 www.ishuchita.com 11
![Page 12: The Medium Access Control Sublayer Chapter 4 12/13/2015](https://reader036.vdocuments.us/reader036/viewer/2022062315/5697bf9c1a28abf838c932a2/html5/thumbnails/12.jpg)
Limited-Contention Protocols
Acquisition probability for a symmetric contention channel.04/21/23 www.ishuchita.com 12
![Page 13: The Medium Access Control Sublayer Chapter 4 12/13/2015](https://reader036.vdocuments.us/reader036/viewer/2022062315/5697bf9c1a28abf838c932a2/html5/thumbnails/13.jpg)
Adaptive Tree Walk Protocol
The tree for eight stations.04/21/23 www.ishuchita.com 13
![Page 14: The Medium Access Control Sublayer Chapter 4 12/13/2015](https://reader036.vdocuments.us/reader036/viewer/2022062315/5697bf9c1a28abf838c932a2/html5/thumbnails/14.jpg)
Wavelength Division Multiple Access Protocols
Wavelength division multiple access.04/21/23 www.ishuchita.com 14
![Page 15: The Medium Access Control Sublayer Chapter 4 12/13/2015](https://reader036.vdocuments.us/reader036/viewer/2022062315/5697bf9c1a28abf838c932a2/html5/thumbnails/15.jpg)
Wireless LAN Protocols
A wireless LAN. (a) A transmitting. (b) B transmitting.
04/21/23 www.ishuchita.com 15
![Page 16: The Medium Access Control Sublayer Chapter 4 12/13/2015](https://reader036.vdocuments.us/reader036/viewer/2022062315/5697bf9c1a28abf838c932a2/html5/thumbnails/16.jpg)
Wireless LAN Protocols (2)
The MACA protocol. (a) A sending an RTS to B.
(b) B responding with a CTS to A.
04/21/23 www.ishuchita.com 16
![Page 17: The Medium Access Control Sublayer Chapter 4 12/13/2015](https://reader036.vdocuments.us/reader036/viewer/2022062315/5697bf9c1a28abf838c932a2/html5/thumbnails/17.jpg)
Ethernet
• Ethernet Cabling• Manchester Encoding• The Ethernet MAC Sublayer Protocol• The Binary Exponential Backoff Algorithm• Ethernet Performance• Switched Ethernet• Fast Ethernet• Gigabit Ethernet• IEEE 802.2: Logical Link Control• Retrospective on Ethernet
04/21/23 www.ishuchita.com 17
![Page 18: The Medium Access Control Sublayer Chapter 4 12/13/2015](https://reader036.vdocuments.us/reader036/viewer/2022062315/5697bf9c1a28abf838c932a2/html5/thumbnails/18.jpg)
Ethernet Cabling
The most common kinds of Ethernet cabling. 04/21/23 www.ishuchita.com 18
![Page 19: The Medium Access Control Sublayer Chapter 4 12/13/2015](https://reader036.vdocuments.us/reader036/viewer/2022062315/5697bf9c1a28abf838c932a2/html5/thumbnails/19.jpg)
Ethernet Cabling (2)
Three kinds of Ethernet cabling.
(a) 10Base5, (b) 10Base2, (c) 10Base-T.04/21/23 www.ishuchita.com 19
![Page 20: The Medium Access Control Sublayer Chapter 4 12/13/2015](https://reader036.vdocuments.us/reader036/viewer/2022062315/5697bf9c1a28abf838c932a2/html5/thumbnails/20.jpg)
Ethernet Cabling (3)
Cable topologies. (a) Linear, (b) Spine, (c) Tree, (d) Segmented.04/21/23 www.ishuchita.com 20
![Page 21: The Medium Access Control Sublayer Chapter 4 12/13/2015](https://reader036.vdocuments.us/reader036/viewer/2022062315/5697bf9c1a28abf838c932a2/html5/thumbnails/21.jpg)
Ethernet Cabling (4)
(a) Binary encoding, (b) Manchester encoding, (c) Differential Manchester encoding.04/21/23 www.ishuchita.com 21
![Page 22: The Medium Access Control Sublayer Chapter 4 12/13/2015](https://reader036.vdocuments.us/reader036/viewer/2022062315/5697bf9c1a28abf838c932a2/html5/thumbnails/22.jpg)
Ethernet MAC Sublayer Protocol
Frame formats. (a) DIX Ethernet, (b) IEEE 802.3.04/21/23 www.ishuchita.com 22
![Page 23: The Medium Access Control Sublayer Chapter 4 12/13/2015](https://reader036.vdocuments.us/reader036/viewer/2022062315/5697bf9c1a28abf838c932a2/html5/thumbnails/23.jpg)
Ethernet MAC Sublayer Protocol (2)
Collision detection can take as long as 2 .04/21/23 www.ishuchita.com 23
![Page 24: The Medium Access Control Sublayer Chapter 4 12/13/2015](https://reader036.vdocuments.us/reader036/viewer/2022062315/5697bf9c1a28abf838c932a2/html5/thumbnails/24.jpg)
Ethernet Performance
Efficiency of Ethernet at 10 Mbps with 512-bit slot times.04/21/23 www.ishuchita.com 24
![Page 25: The Medium Access Control Sublayer Chapter 4 12/13/2015](https://reader036.vdocuments.us/reader036/viewer/2022062315/5697bf9c1a28abf838c932a2/html5/thumbnails/25.jpg)
Switched Ethernet
A simple example of switched Ethernet.04/21/23 www.ishuchita.com 25
![Page 26: The Medium Access Control Sublayer Chapter 4 12/13/2015](https://reader036.vdocuments.us/reader036/viewer/2022062315/5697bf9c1a28abf838c932a2/html5/thumbnails/26.jpg)
Fast Ethernet
The original fast Ethernet cabling.04/21/23 www.ishuchita.com 26
![Page 27: The Medium Access Control Sublayer Chapter 4 12/13/2015](https://reader036.vdocuments.us/reader036/viewer/2022062315/5697bf9c1a28abf838c932a2/html5/thumbnails/27.jpg)
Gigabit Ethernet
(a) A two-station Ethernet. (b) A multistation Ethernet.
04/21/23 www.ishuchita.com 27
![Page 28: The Medium Access Control Sublayer Chapter 4 12/13/2015](https://reader036.vdocuments.us/reader036/viewer/2022062315/5697bf9c1a28abf838c932a2/html5/thumbnails/28.jpg)
Gigabit Ethernet (2)
Gigabit Ethernet cabling.04/21/23 www.ishuchita.com 28
![Page 29: The Medium Access Control Sublayer Chapter 4 12/13/2015](https://reader036.vdocuments.us/reader036/viewer/2022062315/5697bf9c1a28abf838c932a2/html5/thumbnails/29.jpg)
IEEE 802.2: Logical Link Control
(a) Position of LLC. (b) Protocol formats.04/21/23 www.ishuchita.com 29
![Page 30: The Medium Access Control Sublayer Chapter 4 12/13/2015](https://reader036.vdocuments.us/reader036/viewer/2022062315/5697bf9c1a28abf838c932a2/html5/thumbnails/30.jpg)
Wireless LANs
• The 802.11 Protocol Stack
• The 802.11 Physical Layer
• The 802.11 MAC Sublayer Protocol
• The 802.11 Frame Structure
• Services
04/21/23 www.ishuchita.com 30
![Page 31: The Medium Access Control Sublayer Chapter 4 12/13/2015](https://reader036.vdocuments.us/reader036/viewer/2022062315/5697bf9c1a28abf838c932a2/html5/thumbnails/31.jpg)
The 802.11 Protocol Stack
Part of the 802.11 protocol stack.04/21/23 www.ishuchita.com 31
![Page 32: The Medium Access Control Sublayer Chapter 4 12/13/2015](https://reader036.vdocuments.us/reader036/viewer/2022062315/5697bf9c1a28abf838c932a2/html5/thumbnails/32.jpg)
The 802.11 MAC Sublayer Protocol
(a) The hidden station problem.(b) The exposed station problem.04/21/23 www.ishuchita.com 32
![Page 33: The Medium Access Control Sublayer Chapter 4 12/13/2015](https://reader036.vdocuments.us/reader036/viewer/2022062315/5697bf9c1a28abf838c932a2/html5/thumbnails/33.jpg)
The 802.11 MAC Sublayer Protocol (2)
The use of virtual channel sensing using CSMA/CA.04/21/23 www.ishuchita.com 33
![Page 34: The Medium Access Control Sublayer Chapter 4 12/13/2015](https://reader036.vdocuments.us/reader036/viewer/2022062315/5697bf9c1a28abf838c932a2/html5/thumbnails/34.jpg)
The 802.11 MAC Sublayer Protocol (3)
A fragment burst.04/21/23 www.ishuchita.com 34
![Page 35: The Medium Access Control Sublayer Chapter 4 12/13/2015](https://reader036.vdocuments.us/reader036/viewer/2022062315/5697bf9c1a28abf838c932a2/html5/thumbnails/35.jpg)
The 802.11 MAC Sublayer Protocol (4)
Interframe spacing in 802.11.04/21/23 www.ishuchita.com 35
![Page 36: The Medium Access Control Sublayer Chapter 4 12/13/2015](https://reader036.vdocuments.us/reader036/viewer/2022062315/5697bf9c1a28abf838c932a2/html5/thumbnails/36.jpg)
The 802.11 Frame Structure
The 802.11 data frame.04/21/23 www.ishuchita.com 36
![Page 37: The Medium Access Control Sublayer Chapter 4 12/13/2015](https://reader036.vdocuments.us/reader036/viewer/2022062315/5697bf9c1a28abf838c932a2/html5/thumbnails/37.jpg)
802.11 Services
• Association
• Disassociation
• Reassociation
• Distribution
• Integration
Distribution Services
04/21/23 www.ishuchita.com 37
![Page 38: The Medium Access Control Sublayer Chapter 4 12/13/2015](https://reader036.vdocuments.us/reader036/viewer/2022062315/5697bf9c1a28abf838c932a2/html5/thumbnails/38.jpg)
802.11 Services
• Authentication
• Deauthentication
• Privacy
• Data Delivery
Intracell Services
04/21/23 www.ishuchita.com 38
![Page 39: The Medium Access Control Sublayer Chapter 4 12/13/2015](https://reader036.vdocuments.us/reader036/viewer/2022062315/5697bf9c1a28abf838c932a2/html5/thumbnails/39.jpg)
Broadband Wireless
• Comparison of 802.11 and 802.16
• The 802.16 Protocol Stack
• The 802.16 Physical Layer
• The 802.16 MAC Sublayer Protocol
• The 802.16 Frame Structure
04/21/23 www.ishuchita.com 39
![Page 40: The Medium Access Control Sublayer Chapter 4 12/13/2015](https://reader036.vdocuments.us/reader036/viewer/2022062315/5697bf9c1a28abf838c932a2/html5/thumbnails/40.jpg)
The 802.16 Protocol Stack
The 802.16 Protocol Stack.04/21/23 www.ishuchita.com 40
![Page 41: The Medium Access Control Sublayer Chapter 4 12/13/2015](https://reader036.vdocuments.us/reader036/viewer/2022062315/5697bf9c1a28abf838c932a2/html5/thumbnails/41.jpg)
The 802.16 Physical Layer
The 802.16 transmission environment.
04/21/23 www.ishuchita.com 41
![Page 42: The Medium Access Control Sublayer Chapter 4 12/13/2015](https://reader036.vdocuments.us/reader036/viewer/2022062315/5697bf9c1a28abf838c932a2/html5/thumbnails/42.jpg)
The 802.16 Physical Layer (2)
Frames and time slots for time division duplexing.04/21/23 www.ishuchita.com 42
![Page 43: The Medium Access Control Sublayer Chapter 4 12/13/2015](https://reader036.vdocuments.us/reader036/viewer/2022062315/5697bf9c1a28abf838c932a2/html5/thumbnails/43.jpg)
The 802.16 MAC Sublayer Protocol
Service Classes
• Constant bit rate service
• Real-time variable bit rate service
• Non-real-time variable bit rate service
• Best efforts service
04/21/23 www.ishuchita.com 43
![Page 44: The Medium Access Control Sublayer Chapter 4 12/13/2015](https://reader036.vdocuments.us/reader036/viewer/2022062315/5697bf9c1a28abf838c932a2/html5/thumbnails/44.jpg)
The 802.16 Frame Structure
(a) A generic frame. (b) A bandwidth request frame.04/21/23 www.ishuchita.com 44
![Page 45: The Medium Access Control Sublayer Chapter 4 12/13/2015](https://reader036.vdocuments.us/reader036/viewer/2022062315/5697bf9c1a28abf838c932a2/html5/thumbnails/45.jpg)
Bluetooth
• Bluetooth Architecture
• Bluetooth Applications
• The Bluetooth Protocol Stack
• The Bluetooth Radio Layer
• The Bluetooth Baseband Layer
• The Bluetooth L2CAP Layer
• The Bluetooth Frame Structure
04/21/23 www.ishuchita.com 45
![Page 46: The Medium Access Control Sublayer Chapter 4 12/13/2015](https://reader036.vdocuments.us/reader036/viewer/2022062315/5697bf9c1a28abf838c932a2/html5/thumbnails/46.jpg)
Bluetooth Architecture
Two piconets can be connected to form a scatternet.04/21/23 www.ishuchita.com 46
![Page 47: The Medium Access Control Sublayer Chapter 4 12/13/2015](https://reader036.vdocuments.us/reader036/viewer/2022062315/5697bf9c1a28abf838c932a2/html5/thumbnails/47.jpg)
Bluetooth Applications
The Bluetooth profiles.04/21/23 www.ishuchita.com 47
![Page 48: The Medium Access Control Sublayer Chapter 4 12/13/2015](https://reader036.vdocuments.us/reader036/viewer/2022062315/5697bf9c1a28abf838c932a2/html5/thumbnails/48.jpg)
The Bluetooth Protocol Stack
The 802.15 version of the Bluetooth protocol architecture.04/21/23 www.ishuchita.com 48
![Page 49: The Medium Access Control Sublayer Chapter 4 12/13/2015](https://reader036.vdocuments.us/reader036/viewer/2022062315/5697bf9c1a28abf838c932a2/html5/thumbnails/49.jpg)
The Bluetooth Frame Structure
A typical Bluetooth data frame.04/21/23 www.ishuchita.com 49
![Page 50: The Medium Access Control Sublayer Chapter 4 12/13/2015](https://reader036.vdocuments.us/reader036/viewer/2022062315/5697bf9c1a28abf838c932a2/html5/thumbnails/50.jpg)
Data Link Layer Switching
• Bridges from 802.x to 802.y• Local Internetworking• Spanning Tree Bridges• Remote Bridges• Repeaters, Hubs, Bridges, Switches, Routers, Gateways• Virtual LANs
04/21/23 www.ishuchita.com 50
![Page 51: The Medium Access Control Sublayer Chapter 4 12/13/2015](https://reader036.vdocuments.us/reader036/viewer/2022062315/5697bf9c1a28abf838c932a2/html5/thumbnails/51.jpg)
Data Link Layer Switching
Multiple LANs connected by a backbone to handle a total load higher than the capacity of a single LAN.04/21/23 www.ishuchita.com 51
![Page 52: The Medium Access Control Sublayer Chapter 4 12/13/2015](https://reader036.vdocuments.us/reader036/viewer/2022062315/5697bf9c1a28abf838c932a2/html5/thumbnails/52.jpg)
Bridges from 802.x to 802.y
Operation of a LAN bridge from 802.11 to 802.3.04/21/23 www.ishuchita.com 52
![Page 53: The Medium Access Control Sublayer Chapter 4 12/13/2015](https://reader036.vdocuments.us/reader036/viewer/2022062315/5697bf9c1a28abf838c932a2/html5/thumbnails/53.jpg)
Bridges from 802.x to 802.y (2)
The IEEE 802 frame formats. The drawing is not to scale.04/21/23 www.ishuchita.com 53
![Page 54: The Medium Access Control Sublayer Chapter 4 12/13/2015](https://reader036.vdocuments.us/reader036/viewer/2022062315/5697bf9c1a28abf838c932a2/html5/thumbnails/54.jpg)
Local Internetworking
A configuration with four LANs and two bridges.04/21/23 www.ishuchita.com 54
![Page 55: The Medium Access Control Sublayer Chapter 4 12/13/2015](https://reader036.vdocuments.us/reader036/viewer/2022062315/5697bf9c1a28abf838c932a2/html5/thumbnails/55.jpg)
Spanning Tree Bridges
Two parallel transparent bridges.04/21/23 www.ishuchita.com 55
![Page 56: The Medium Access Control Sublayer Chapter 4 12/13/2015](https://reader036.vdocuments.us/reader036/viewer/2022062315/5697bf9c1a28abf838c932a2/html5/thumbnails/56.jpg)
Spanning Tree Bridges (2)
(a) Interconnected LANs. (b) A spanning tree covering the LANs. The dotted lines are not part of the spanning tree.
04/21/23 www.ishuchita.com 56
![Page 57: The Medium Access Control Sublayer Chapter 4 12/13/2015](https://reader036.vdocuments.us/reader036/viewer/2022062315/5697bf9c1a28abf838c932a2/html5/thumbnails/57.jpg)
Remote Bridges
Remote bridges can be used to interconnect distant LANs.04/21/23 www.ishuchita.com 57
![Page 58: The Medium Access Control Sublayer Chapter 4 12/13/2015](https://reader036.vdocuments.us/reader036/viewer/2022062315/5697bf9c1a28abf838c932a2/html5/thumbnails/58.jpg)
Repeaters, Hubs, Bridges, Switches, Routers and Gateways
(a) Which device is in which layer.
(b) Frames, packets, and headers.04/21/23 www.ishuchita.com 58
![Page 59: The Medium Access Control Sublayer Chapter 4 12/13/2015](https://reader036.vdocuments.us/reader036/viewer/2022062315/5697bf9c1a28abf838c932a2/html5/thumbnails/59.jpg)
Repeaters, Hubs, Bridges, Switches, Routers and Gateways (2)
(a) A hub. (b) A bridge. (c) a switch.04/21/23 www.ishuchita.com 59
![Page 60: The Medium Access Control Sublayer Chapter 4 12/13/2015](https://reader036.vdocuments.us/reader036/viewer/2022062315/5697bf9c1a28abf838c932a2/html5/thumbnails/60.jpg)
Virtual LANs
A building with centralized wiring using hubs and a switch.04/21/23 www.ishuchita.com 60
![Page 61: The Medium Access Control Sublayer Chapter 4 12/13/2015](https://reader036.vdocuments.us/reader036/viewer/2022062315/5697bf9c1a28abf838c932a2/html5/thumbnails/61.jpg)
Virtual LANs (2)
(a) Four physical LANs organized into two VLANs, gray and white, by two bridges. (b) The same 15 machines organized into two VLANs by switches.
04/21/23 www.ishuchita.com 61
![Page 62: The Medium Access Control Sublayer Chapter 4 12/13/2015](https://reader036.vdocuments.us/reader036/viewer/2022062315/5697bf9c1a28abf838c932a2/html5/thumbnails/62.jpg)
The IEEE 802.1Q Standard
Transition from legacy Ethernet to VLAN-aware Ethernet. The shaded symbols are VLAN aware. The empty ones are not.04/21/23 www.ishuchita.com 62
![Page 63: The Medium Access Control Sublayer Chapter 4 12/13/2015](https://reader036.vdocuments.us/reader036/viewer/2022062315/5697bf9c1a28abf838c932a2/html5/thumbnails/63.jpg)
The IEEE 802.1Q Standard (2)
The 802.3 (legacy) and 802.1Q Ethernet frame formats.04/21/23 www.ishuchita.com 63
![Page 64: The Medium Access Control Sublayer Chapter 4 12/13/2015](https://reader036.vdocuments.us/reader036/viewer/2022062315/5697bf9c1a28abf838c932a2/html5/thumbnails/64.jpg)
Summary
Channel allocation methods and systems for a common channel.04/21/23 www.ishuchita.com 64