Professional Documents
Culture Documents
1
Main reference: Copyright © The McGraw-Hill Companies Inc.
PART 1:
2
Introduction
3
Characteristics:
i. Moderate-size geographic area [diameter of no more than a few
km]
ii. Located within a single building or localized group of buildings
[warehouse, campus, hostel]
iii. Total data rate of at least several Mbps
iv. Complete ownership by a single organization
The link layer is divided into 2 sub layers:
Application
i. Logical link control (LLC)
Presentation
ii. Medium access control (MAC) Session
Transport
Network
LLC Link
MAC layer
Physical
4
Medium Access Control [MAC]
- regulates the access to the shared link
Logical Link Control [LLC]
- implements reliable packet transmission [flow and error
control]
LLC sublayer was originally designed to be the same for all LAN for
interoperability
Standards
- MAC: IEEE 802.3-12
- LLC: IEEE 802.2
Most common protocols
- ALOHA, Ethernet, Token Ring, WIFI
Two main classes of LANs:
i. Wired LANs
ii. Wireless LANs
5
Main performance parameters of interest
- Throughput: maximum bit transmission rate when the
LAN is heavily loaded
- Efficiency: fraction of throughput to channel rate
- Delay: typical time taken to transmit a packet
between two nodes
6
IEEE 802
LAN protocols are concerned principally with lower layers of the OSI
Model.
Thus, higher-layer protocols are independent of network architecture
and are applicable to LANs, MANs and WANs.
IEEE 802 LAN/MAN Standards Committee (www.ieee802.org) has
developed the IEEE 802 reference model for LAN specifications.
Transport protocol
Network () () ()
Logical link control
Data link layer Medium access
control Scope of
IEEE 802
Physical Physical standards
Medium Medium
7
The lowest layer of the IEEE 802 reference model corresponds to
the physical layer of the OSI model and includes functions:
- Encoding/decoding signal
- Preamble generation/removal [for synchronization]
- Bit transmission/reception
In addition, the physical layer of 802 model also includes
specification of transmission medium and topology, as the choice of
transmission medium and topology is critical in LAN.
9
The architecture of IEEE 802 LAN standards
1. Unacked CL
LLC IEEE 802 .2 2. Acked CL
3. CO
Token Token 100(Base)
MAC CSMA/CD Token Bus
Ring Ring
DQDB Wireless
VG-AnyLAN
Unshielded twisted pair
IEEE 802.12
Broadband coaxial
Broadband coaxial
IEEE 802.3
IEEE 802.4
IEEE 802.5
IEEE 802.6
Optical Fiber
Optical Fiber
Optical fiber
Optical fiber
Optical fiber
FDDI
Infrared
Radio
PHY
CL – connectionless
CO – connection oriented
10
Taxonomy of multiple-access protocols
. .
11
5.1 RANDOM ACCESS
12
ALOHA
13
PURE ALOHA
15
Procedure for pure ALOHA protocol
16
Example 1
17
Example 1(continued)
18
Vulnerable time for pure ALOHA protocol
19
Example 2
Solution
Average frame transmission time Tfr is 200 bits/200 kbps or 1
ms. The vulnerable time is 2 × 1 ms = 2 ms. This means no
station should send later than 1 ms before this station starts
transmission and no station should start sending during the
one 1-ms period that this station is sending.
20
Note
21
Example 3
Solution
The frame transmission time is 200/200 kbps or 1 ms.
a. If the system creates 1000 frames per second, this is 1
frame per millisecond. The load is 1. In this case
S = G× e−2 G or S = 0.135 (13.5 percent). This means
that the throughput is 1000 × 0.135 = 135 frames. Only
135 frames out of 1000 will probably survive.
22
Example 3 (continued)
24
Note
25
Vulnerable time for slotted ALOHA protocol
26
Efficiency ratio (ratio of throughput achieved to channel rate)
o Pure ALOHA = 0.184
o Slotted ALOHA=0.368
Both versions exhibit poor utilization as they fail to take advantage of
short propagation delay (w.r.t frame transmission time) in LANs
For short propagation delay, when a station launches a frame, a;; other
station will know it almost immediately ⇒CSMA
27
Example 4
Solution
The frame transmission time is 200/200 kbps or 1 ms.
a. If the system creates 1000 frames per second, this is 1
frame per millisecond. The load is 1. In this case
S = G× e−G or S = 0.368 (36.8 percent). This means
that the throughput is 1000 × 0.0368 = 368 frames.
Only 386 frames out of 1000 will probably survive.
28
Example 4 (continued)
29
Carrier Sense Multiple Access (CSMA)
30
Space/time model of the collision in CSMA
31
Vulnerable time in CSMA
The vulnerable time for CSMA is the propagation time, Tp (the time
time for a signal to propagate from one end to another end of the
medium)
If the first bit of the frame reaches the end of the medium, every
station will already have heard the bit and will refrain from sending
Consider the worst case where A at one end is sending a frame
This frame is susceptible for collision until its first bit arrives at the
other end.
32
Behavior of three persistence methods
33
2) Persistent
o A station with frame to send senses the medium
o If the medium is idle, it sends immediately
o If the medium is busy,
a) 1-persistent
- The station sends a frame immediately ( with a probability of 1) if
the medium is sensed idle
-Increase the chance of collision as 2 or more stations may send their
frames simultaneously after finding the medium idle.
34
b) p-persistent
- The station send with probability p (i.e. may or may not send) if the
medium is sensed idle
- Reduce chance of collision and improve efficiency
35
Flow diagram for three persistence methods
36
Carrier Sense Multiple Access with Collision Detection (CSMA/CD)
With CSMA, the medium remains unusable for the duration of frame
transmission when two frames collide
For long frames, the amount of wasted capacity can be significant
[wasted time equal to frame transmission time]
This waste can be reduced if a station continues to listen to the
medium while transmitting [collision detection]
How to detect:
i. The station sends frame and senses the medium
ii. Collision detected if
- Coax:station senses power exceeding transmitted signal
strength [maximum length must be restricted to limit
signal attenuation]
- UTP: there is signal on more than one port [sensed by
hub and collision presence signal is generated and sent
to all stations]
37
In CSMA/CD, a station wishing to transmit obey these rules:
i. If the station senses that the channel is idle (for 96 bit times), it
start to transmit the data frame and go to step (iii), otherwise go
to step (ii).
ii. If the channel is busy, the station waits (1-persistent) until it
senses that the channel is idle for 96 bit times and start to
transmit the frame and go to step (iii).
iii. While transmitting, it monitors the channel for possible
collision; if it transmits the entire frame without collision, the
transmission is considered as successful.
iv. If collision is detected, the station stops transmitting its frame,
transmit a 48-bit jam signal and go to step (v)
v. After aborting, the station enters an exponential backoff phase
and waits a random time before returns to step (i)
38
Binary Exponential Backoff
40
CSMA/CD with exponential backoff
41
Collision Detection & Frame Transmission time
t=0
t = tp
t = 2tp
Collision occurs
A B
Solution
The frame transmission time is Tfr = 2 × Tp = 51.2 µs. This
means, in the worst case, a station needs to transmit for a
period of 51.2 µs to detect the collision. The minimum size
of the frame is 10 Mbps × 51.2 µs = 512 bits or 64 bytes.
This is actually the minimum size of the frame for Standard
Ethernet.
46
Major difference between ALOHA and CSMA/CD
- ALOHA: transmit as soon as there is a frame to be sent
- CSMA/CD:wait first for the channel to be idle before a frame is
transmitted
Efficiency of CSMA/CD (empirical):
1
U=
1 + 5a
end − to − end propagationdelay
where a=
frame transmissi on time
CSMA/CD will be more efficient than
- pure ALOHA for a < 0.89
- slotted ALOHA for a < 0.34
47
Example of a > 1 and a < 1
48
5.2 CONTROLLED ACCESS
49
Reservation access method
50
Select and poll functions in polling access method
51
Logical ring and physical topology in token-passing access method