the medium access sublayer - informatikai tansz©kcsoport
TRANSCRIPT
![Page 1: The Medium Access Sublayer - Informatikai Tansz©kcsoport](https://reader030.vdocuments.us/reader030/viewer/2022020702/61fb18d32e268c58cd5a1cfa/html5/thumbnails/1.jpg)
The Medium Access ControlSublayer
Chapter 4
![Page 2: The Medium Access Sublayer - Informatikai Tansz©kcsoport](https://reader030.vdocuments.us/reader030/viewer/2022020702/61fb18d32e268c58cd5a1cfa/html5/thumbnails/2.jpg)
The Channel Allocation Problem
• Static Channel Allocation in LANs and MANs• Dynamic Channel Allocation in LANs and MANs
![Page 3: The Medium Access Sublayer - Informatikai Tansz©kcsoport](https://reader030.vdocuments.us/reader030/viewer/2022020702/61fb18d32e268c58cd5a1cfa/html5/thumbnails/3.jpg)
Dynamic Channel Allocation in LANs and MANs
1. Station Model.
2. Single Channel Assumption.
3. Collision Assumption.
4. (a) Continuous Time.(b) Slotted Time.
5. (a) Carrier Sense.(b) No Carrier Sense.
![Page 4: The Medium Access Sublayer - Informatikai Tansz©kcsoport](https://reader030.vdocuments.us/reader030/viewer/2022020702/61fb18d32e268c58cd5a1cfa/html5/thumbnails/4.jpg)
Multiple Access Protocols
• ALOHA• Carrier Sense Multiple Access Protocols• Collision-Free Protocols• Limited-Contention Protocols• Wavelength Division Multiple Access Protocols• Wireless LAN Protocols
![Page 5: The Medium Access Sublayer - Informatikai Tansz©kcsoport](https://reader030.vdocuments.us/reader030/viewer/2022020702/61fb18d32e268c58cd5a1cfa/html5/thumbnails/5.jpg)
Pure ALOHA
In pure ALOHA, frames are transmitted at completely arbitrary times.
![Page 6: The Medium Access Sublayer - Informatikai Tansz©kcsoport](https://reader030.vdocuments.us/reader030/viewer/2022020702/61fb18d32e268c58cd5a1cfa/html5/thumbnails/6.jpg)
Pure ALOHA (2)
Vulnerable period for the shaded frame.
![Page 7: The Medium Access Sublayer - Informatikai Tansz©kcsoport](https://reader030.vdocuments.us/reader030/viewer/2022020702/61fb18d32e268c58cd5a1cfa/html5/thumbnails/7.jpg)
Pure ALOHA (3)
Throughput versus offered traffic for ALOHA systems.
![Page 8: The Medium Access Sublayer - Informatikai Tansz©kcsoport](https://reader030.vdocuments.us/reader030/viewer/2022020702/61fb18d32e268c58cd5a1cfa/html5/thumbnails/8.jpg)
Persistent and Nonpersistent CSMA
Comparison of the channel utilization versus load for various random access protocols.
![Page 9: The Medium Access Sublayer - Informatikai Tansz©kcsoport](https://reader030.vdocuments.us/reader030/viewer/2022020702/61fb18d32e268c58cd5a1cfa/html5/thumbnails/9.jpg)
CSMA with Collision Detection
CSMA/CD can be in one of three states: contention, transmission, or idle.
![Page 10: The Medium Access Sublayer - Informatikai Tansz©kcsoport](https://reader030.vdocuments.us/reader030/viewer/2022020702/61fb18d32e268c58cd5a1cfa/html5/thumbnails/10.jpg)
Collision-Free Protocols
The basic bit-map protocol.
![Page 11: The Medium Access Sublayer - Informatikai Tansz©kcsoport](https://reader030.vdocuments.us/reader030/viewer/2022020702/61fb18d32e268c58cd5a1cfa/html5/thumbnails/11.jpg)
Collision-Free Protocols (2)
The binary countdown protocol. A dash indicates silence.
![Page 12: The Medium Access Sublayer - Informatikai Tansz©kcsoport](https://reader030.vdocuments.us/reader030/viewer/2022020702/61fb18d32e268c58cd5a1cfa/html5/thumbnails/12.jpg)
Limited-Contention Protocols
Acquisition probability for a symmetric contention channel.
![Page 13: The Medium Access Sublayer - Informatikai Tansz©kcsoport](https://reader030.vdocuments.us/reader030/viewer/2022020702/61fb18d32e268c58cd5a1cfa/html5/thumbnails/13.jpg)
Adaptive Tree Walk Protocol
The tree for eight stations.
![Page 14: The Medium Access Sublayer - Informatikai Tansz©kcsoport](https://reader030.vdocuments.us/reader030/viewer/2022020702/61fb18d32e268c58cd5a1cfa/html5/thumbnails/14.jpg)
Wavelength Division Multiple Access Protocols
Wavelength division multiple access.
![Page 15: The Medium Access Sublayer - Informatikai Tansz©kcsoport](https://reader030.vdocuments.us/reader030/viewer/2022020702/61fb18d32e268c58cd5a1cfa/html5/thumbnails/15.jpg)
Wireless LAN Protocols
A wireless LAN. (a) A transmitting. (b) B transmitting.
![Page 16: The Medium Access Sublayer - Informatikai Tansz©kcsoport](https://reader030.vdocuments.us/reader030/viewer/2022020702/61fb18d32e268c58cd5a1cfa/html5/thumbnails/16.jpg)
Wireless LAN Protocols (2)
The MACA protocol. (a) A sending an RTS to B.(b) B responding with a CTS to A.
![Page 17: The Medium Access Sublayer - Informatikai Tansz©kcsoport](https://reader030.vdocuments.us/reader030/viewer/2022020702/61fb18d32e268c58cd5a1cfa/html5/thumbnails/17.jpg)
Ethernet• Ethernet Cabling• Manchester Encoding• The Ethernet MAC Sublayer Protocol• The Binary Exponential Backoff Algorithm• Ethernet Performance• Switched Ethernet• Fast Ethernet• Gigabit Ethernet• IEEE 802.2: Logical Link Control• Retrospective on Ethernet
![Page 18: The Medium Access Sublayer - Informatikai Tansz©kcsoport](https://reader030.vdocuments.us/reader030/viewer/2022020702/61fb18d32e268c58cd5a1cfa/html5/thumbnails/18.jpg)
Ethernet Cabling
The most common kinds of Ethernet cabling.
![Page 19: The Medium Access Sublayer - Informatikai Tansz©kcsoport](https://reader030.vdocuments.us/reader030/viewer/2022020702/61fb18d32e268c58cd5a1cfa/html5/thumbnails/19.jpg)
Ethernet Cabling (2)
Three kinds of Ethernet cabling. (a) 10Base5, (b) 10Base2, (c) 10Base-T.
![Page 20: The Medium Access Sublayer - Informatikai Tansz©kcsoport](https://reader030.vdocuments.us/reader030/viewer/2022020702/61fb18d32e268c58cd5a1cfa/html5/thumbnails/20.jpg)
Ethernet Cabling (3)
Cable topologies. (a) Linear, (b) Spine, (c) Tree, (d) Segmented.
![Page 21: The Medium Access Sublayer - Informatikai Tansz©kcsoport](https://reader030.vdocuments.us/reader030/viewer/2022020702/61fb18d32e268c58cd5a1cfa/html5/thumbnails/21.jpg)
Ethernet Cabling (4)
(a) Binary encoding, (b) Manchester encoding, (c) Differential Manchester encoding.
![Page 22: The Medium Access Sublayer - Informatikai Tansz©kcsoport](https://reader030.vdocuments.us/reader030/viewer/2022020702/61fb18d32e268c58cd5a1cfa/html5/thumbnails/22.jpg)
Ethernet MAC Sublayer Protocol
Frame formats. (a) DIX Ethernet, (b) IEEE 802.3.
![Page 23: The Medium Access Sublayer - Informatikai Tansz©kcsoport](https://reader030.vdocuments.us/reader030/viewer/2022020702/61fb18d32e268c58cd5a1cfa/html5/thumbnails/23.jpg)
Ethernet MAC Sublayer Protocol (2)
Collision detection can take as long as 2 .τ
![Page 24: The Medium Access Sublayer - Informatikai Tansz©kcsoport](https://reader030.vdocuments.us/reader030/viewer/2022020702/61fb18d32e268c58cd5a1cfa/html5/thumbnails/24.jpg)
Ethernet Performance
Efficiency of Ethernet at 10 Mbps with 512-bit slot times.
![Page 25: The Medium Access Sublayer - Informatikai Tansz©kcsoport](https://reader030.vdocuments.us/reader030/viewer/2022020702/61fb18d32e268c58cd5a1cfa/html5/thumbnails/25.jpg)
Switched Ethernet
A simple example of switched Ethernet.
![Page 26: The Medium Access Sublayer - Informatikai Tansz©kcsoport](https://reader030.vdocuments.us/reader030/viewer/2022020702/61fb18d32e268c58cd5a1cfa/html5/thumbnails/26.jpg)
Fast Ethernet
The original fast Ethernet cabling.
![Page 27: The Medium Access Sublayer - Informatikai Tansz©kcsoport](https://reader030.vdocuments.us/reader030/viewer/2022020702/61fb18d32e268c58cd5a1cfa/html5/thumbnails/27.jpg)
Gigabit Ethernet
(a) A two-station Ethernet. (b) A multistation Ethernet.
![Page 28: The Medium Access Sublayer - Informatikai Tansz©kcsoport](https://reader030.vdocuments.us/reader030/viewer/2022020702/61fb18d32e268c58cd5a1cfa/html5/thumbnails/28.jpg)
Gigabit Ethernet (2)
Gigabit Ethernet cabling.
![Page 29: The Medium Access Sublayer - Informatikai Tansz©kcsoport](https://reader030.vdocuments.us/reader030/viewer/2022020702/61fb18d32e268c58cd5a1cfa/html5/thumbnails/29.jpg)
IEEE 802.2: Logical Link Control
(a) Position of LLC. (b) Protocol formats.
![Page 30: The Medium Access Sublayer - Informatikai Tansz©kcsoport](https://reader030.vdocuments.us/reader030/viewer/2022020702/61fb18d32e268c58cd5a1cfa/html5/thumbnails/30.jpg)
Wireless LANs
• The 802.11 Protocol Stack• The 802.11 Physical Layer• The 802.11 MAC Sublayer Protocol• The 802.11 Frame Structure• Services
![Page 31: The Medium Access Sublayer - Informatikai Tansz©kcsoport](https://reader030.vdocuments.us/reader030/viewer/2022020702/61fb18d32e268c58cd5a1cfa/html5/thumbnails/31.jpg)
The 802.11 Protocol Stack
Part of the 802.11 protocol stack.
![Page 32: The Medium Access Sublayer - Informatikai Tansz©kcsoport](https://reader030.vdocuments.us/reader030/viewer/2022020702/61fb18d32e268c58cd5a1cfa/html5/thumbnails/32.jpg)
The 802.11 MAC Sublayer Protocol
(a) The hidden station problem.(b) The exposed station problem.
![Page 33: The Medium Access Sublayer - Informatikai Tansz©kcsoport](https://reader030.vdocuments.us/reader030/viewer/2022020702/61fb18d32e268c58cd5a1cfa/html5/thumbnails/33.jpg)
The 802.11 MAC Sublayer Protocol (2)
The use of virtual channel sensing using CSMA/CA.
![Page 34: The Medium Access Sublayer - Informatikai Tansz©kcsoport](https://reader030.vdocuments.us/reader030/viewer/2022020702/61fb18d32e268c58cd5a1cfa/html5/thumbnails/34.jpg)
The 802.11 MAC Sublayer Protocol (3)
A fragment burst.
![Page 35: The Medium Access Sublayer - Informatikai Tansz©kcsoport](https://reader030.vdocuments.us/reader030/viewer/2022020702/61fb18d32e268c58cd5a1cfa/html5/thumbnails/35.jpg)
The 802.11 MAC Sublayer Protocol (4)
Interframe spacing in 802.11.
![Page 36: The Medium Access Sublayer - Informatikai Tansz©kcsoport](https://reader030.vdocuments.us/reader030/viewer/2022020702/61fb18d32e268c58cd5a1cfa/html5/thumbnails/36.jpg)
The 802.11 Frame Structure
The 802.11 data frame.
![Page 37: The Medium Access Sublayer - Informatikai Tansz©kcsoport](https://reader030.vdocuments.us/reader030/viewer/2022020702/61fb18d32e268c58cd5a1cfa/html5/thumbnails/37.jpg)
802.11 Services
• Association• Disassociation• Reassociation• Distribution• Integration
Distribution Services
![Page 38: The Medium Access Sublayer - Informatikai Tansz©kcsoport](https://reader030.vdocuments.us/reader030/viewer/2022020702/61fb18d32e268c58cd5a1cfa/html5/thumbnails/38.jpg)
802.11 Services
• Authentication• Deauthentication• Privacy• Data Delivery
Intracell Services
![Page 39: The Medium Access Sublayer - Informatikai Tansz©kcsoport](https://reader030.vdocuments.us/reader030/viewer/2022020702/61fb18d32e268c58cd5a1cfa/html5/thumbnails/39.jpg)
Broadband Wireless
• Comparison of 802.11 and 802.16• The 802.16 Protocol Stack• The 802.16 Physical Layer• The 802.16 MAC Sublayer Protocol• The 802.16 Frame Structure
![Page 40: The Medium Access Sublayer - Informatikai Tansz©kcsoport](https://reader030.vdocuments.us/reader030/viewer/2022020702/61fb18d32e268c58cd5a1cfa/html5/thumbnails/40.jpg)
The 802.16 Protocol Stack
The 802.16 Protocol Stack.
![Page 41: The Medium Access Sublayer - Informatikai Tansz©kcsoport](https://reader030.vdocuments.us/reader030/viewer/2022020702/61fb18d32e268c58cd5a1cfa/html5/thumbnails/41.jpg)
The 802.16 Physical Layer
The 802.16 transmission environment.
![Page 42: The Medium Access Sublayer - Informatikai Tansz©kcsoport](https://reader030.vdocuments.us/reader030/viewer/2022020702/61fb18d32e268c58cd5a1cfa/html5/thumbnails/42.jpg)
The 802.16 Physical Layer (2)
Frames and time slots for time division duplexing.
![Page 43: The Medium Access Sublayer - Informatikai Tansz©kcsoport](https://reader030.vdocuments.us/reader030/viewer/2022020702/61fb18d32e268c58cd5a1cfa/html5/thumbnails/43.jpg)
The 802.16 MAC Sublayer Protocol
Service Classes• Constant bit rate service• Real-time variable bit rate service• Non-real-time variable bit rate service• Best efforts service
![Page 44: The Medium Access Sublayer - Informatikai Tansz©kcsoport](https://reader030.vdocuments.us/reader030/viewer/2022020702/61fb18d32e268c58cd5a1cfa/html5/thumbnails/44.jpg)
The 802.16 Frame Structure
(a) A generic frame. (b) A bandwidth request frame.
![Page 45: The Medium Access Sublayer - Informatikai Tansz©kcsoport](https://reader030.vdocuments.us/reader030/viewer/2022020702/61fb18d32e268c58cd5a1cfa/html5/thumbnails/45.jpg)
Bluetooth
• Bluetooth Architecture• Bluetooth Applications• The Bluetooth Protocol Stack• The Bluetooth Radio Layer• The Bluetooth Baseband Layer• The Bluetooth L2CAP Layer• The Bluetooth Frame Structure
![Page 46: The Medium Access Sublayer - Informatikai Tansz©kcsoport](https://reader030.vdocuments.us/reader030/viewer/2022020702/61fb18d32e268c58cd5a1cfa/html5/thumbnails/46.jpg)
Bluetooth Architecture
Two piconets can be connected to form a scatternet.
![Page 47: The Medium Access Sublayer - Informatikai Tansz©kcsoport](https://reader030.vdocuments.us/reader030/viewer/2022020702/61fb18d32e268c58cd5a1cfa/html5/thumbnails/47.jpg)
Bluetooth Applications
The Bluetooth profiles.
![Page 48: The Medium Access Sublayer - Informatikai Tansz©kcsoport](https://reader030.vdocuments.us/reader030/viewer/2022020702/61fb18d32e268c58cd5a1cfa/html5/thumbnails/48.jpg)
The Bluetooth Protocol Stack
The 802.15 version of the Bluetooth protocol architecture.
![Page 49: The Medium Access Sublayer - Informatikai Tansz©kcsoport](https://reader030.vdocuments.us/reader030/viewer/2022020702/61fb18d32e268c58cd5a1cfa/html5/thumbnails/49.jpg)
The Bluetooth Frame Structure
A typical Bluetooth data frame.
![Page 50: The Medium Access Sublayer - Informatikai Tansz©kcsoport](https://reader030.vdocuments.us/reader030/viewer/2022020702/61fb18d32e268c58cd5a1cfa/html5/thumbnails/50.jpg)
Data Link Layer Switching
• Bridges from 802.x to 802.y• Local Internetworking• Spanning Tree Bridges• Remote Bridges• Repeaters, Hubs, Bridges, Switches, Routers, Gateways• Virtual LANs
![Page 51: The Medium Access Sublayer - Informatikai Tansz©kcsoport](https://reader030.vdocuments.us/reader030/viewer/2022020702/61fb18d32e268c58cd5a1cfa/html5/thumbnails/51.jpg)
Data Link Layer Switching
Multiple LANs connected by a backbone to handle a total load higher than the capacity of a single LAN.
![Page 52: The Medium Access Sublayer - Informatikai Tansz©kcsoport](https://reader030.vdocuments.us/reader030/viewer/2022020702/61fb18d32e268c58cd5a1cfa/html5/thumbnails/52.jpg)
Bridges from 802.x to 802.y
Operation of a LAN bridge from 802.11 to 802.3.
![Page 53: The Medium Access Sublayer - Informatikai Tansz©kcsoport](https://reader030.vdocuments.us/reader030/viewer/2022020702/61fb18d32e268c58cd5a1cfa/html5/thumbnails/53.jpg)
Bridges from 802.x to 802.y (2)
The IEEE 802 frame formats. The drawing is not to scale.
![Page 54: The Medium Access Sublayer - Informatikai Tansz©kcsoport](https://reader030.vdocuments.us/reader030/viewer/2022020702/61fb18d32e268c58cd5a1cfa/html5/thumbnails/54.jpg)
Local Internetworking
A configuration with four LANs and two bridges.
![Page 55: The Medium Access Sublayer - Informatikai Tansz©kcsoport](https://reader030.vdocuments.us/reader030/viewer/2022020702/61fb18d32e268c58cd5a1cfa/html5/thumbnails/55.jpg)
Spanning Tree Bridges
Two parallel transparent bridges.
![Page 56: The Medium Access Sublayer - Informatikai Tansz©kcsoport](https://reader030.vdocuments.us/reader030/viewer/2022020702/61fb18d32e268c58cd5a1cfa/html5/thumbnails/56.jpg)
Spanning Tree Bridges (2)
(a) Interconnected LANs. (b) A spanning tree covering the LANs. The dotted lines are not part of the spanning tree.
![Page 57: The Medium Access Sublayer - Informatikai Tansz©kcsoport](https://reader030.vdocuments.us/reader030/viewer/2022020702/61fb18d32e268c58cd5a1cfa/html5/thumbnails/57.jpg)
Remote Bridges
Remote bridges can be used to interconnect distant LANs.
![Page 58: The Medium Access Sublayer - Informatikai Tansz©kcsoport](https://reader030.vdocuments.us/reader030/viewer/2022020702/61fb18d32e268c58cd5a1cfa/html5/thumbnails/58.jpg)
Repeaters, Hubs, Bridges, Switches, Routers and Gateways
(a) Which device is in which layer.(b) Frames, packets, and headers.
![Page 59: The Medium Access Sublayer - Informatikai Tansz©kcsoport](https://reader030.vdocuments.us/reader030/viewer/2022020702/61fb18d32e268c58cd5a1cfa/html5/thumbnails/59.jpg)
Repeaters, Hubs, Bridges, Switches, Routers and Gateways (2)
(a) A hub. (b) A bridge. (c) a switch.
![Page 60: The Medium Access Sublayer - Informatikai Tansz©kcsoport](https://reader030.vdocuments.us/reader030/viewer/2022020702/61fb18d32e268c58cd5a1cfa/html5/thumbnails/60.jpg)
Virtual LANs
A building with centralized wiring using hubs and a switch.
![Page 61: The Medium Access Sublayer - Informatikai Tansz©kcsoport](https://reader030.vdocuments.us/reader030/viewer/2022020702/61fb18d32e268c58cd5a1cfa/html5/thumbnails/61.jpg)
Virtual LANs (2)
(a) Four physical LANs organized into two VLANs, gray and white, by two bridges. (b) The same 15 machines organized into two VLANs by switches.
![Page 62: The Medium Access Sublayer - Informatikai Tansz©kcsoport](https://reader030.vdocuments.us/reader030/viewer/2022020702/61fb18d32e268c58cd5a1cfa/html5/thumbnails/62.jpg)
The IEEE 802.1Q Standard
Transition from legacy Ethernet to VLAN-aware Ethernet. The shaded symbols are VLAN aware. The empty ones are not.
![Page 63: The Medium Access Sublayer - Informatikai Tansz©kcsoport](https://reader030.vdocuments.us/reader030/viewer/2022020702/61fb18d32e268c58cd5a1cfa/html5/thumbnails/63.jpg)
The IEEE 802.1Q Standard (2)
The 802.3 (legacy) and 802.1Q Ethernet frame formats.
![Page 64: The Medium Access Sublayer - Informatikai Tansz©kcsoport](https://reader030.vdocuments.us/reader030/viewer/2022020702/61fb18d32e268c58cd5a1cfa/html5/thumbnails/64.jpg)
Summary
Channel allocation methods and systems for a common channel.