Professional Documents
Culture Documents
UNIT-3 (b)
MEDIUM ACCESS CONTROL SUBLAYER
SYLLABUS:
Channel allocation
o Static channel allocation
o Assumptions for Dynamic channel allocation
MAC Addresses
IEE 802.X STANDARD ETHERNET
o Classic ETHERNET
Physical Layer
MAC Sub layer Protocol
ETHERNET Performance
o FAST ETHERNET
o GIGABIT ETHERNET
WIRELESS LANS
o Architecture and Protocol Stack
o 802.11 Physical Layer
o 802.11 MAC Sub layer Protocol
o 802.11 Frame structure
o Services
ALOHA PROTOCOL
This is the earliest random access method, developed at University of Hawaii in 1970’s.
It was primarily designed for Wireless LAN, but it can use on any shared medium.
As the medium is shared between the stations, there are potential collisions will occur.
When a station sends data, another station may attempt to do so at the same time. So the
data from the two stations will collide.
In PURE ALOHA
This is simple, but elegant method.
The idea is that each station sends a frame whenever it has a frame to send. But as there is only
one channel to share, there is the possibility of collision between the frames that came from
different stations.
The process can be explained as
o There are four stations and each station sends two frames. So a total of eight frames can
share the channel
o Among these some of the frames collide, because multiple frames are in contention for the
shared channel. Even if one bit of a frame coexist on the channel with one bit from the
another frame, there is a collision.
o So we need to resend the frames that have been destroyed during the transmission. This
method relies on ACK from the Receiver.
o A collision involves two or more stations, if all these stations try to resend their frames
after the Time-out period again all frames will collide.
o To avoid this, each station has to waits a random amount of time before resend its frame.
The Time-out period is equal to the maximum possible round-trip propagation delay.
The Back-off time is a random value that normally depends on K. its formula is implemented
using Binary-exponential Back-off algorithm.
The Vulnerable time (in which there is a possibility of collision) is an important parameter.
And is calculated from below figure as
Let G be the average number of frames generated by the system during one frame transmission
time. Then the average number of successful transmissions for PURE ALOHA is
S=G*e-2G
The maximum throughput is S=0.184 when G= (1/2)
In SLOTTED ALOHA
In this we divide the time into slots of Tp sec and force the station to send only at the beginning
of the time slot.
So, a station is allowed to transmit only at the beginning of the synchronized timeslot. If a
station misses this moment, it still waits up to the commencement of next timeslot.
Even if the timeslots are assigned, but still there exists potential collisions, because of two
stations try to send the frames in same timeslot.
In this, the vulnerable time period reduced to one-half as compared to Pure ALOHA.
Let G be the average number of frames generated by the system during one frame transmission
time. Then the average number of successful transmissions for SLOTTED ALOHA is
S=G*e-G
The maximum throughput is S=0.364 when G= 1
This indicates that if one frame is generated during one frame transmission time, then
36.4 percent of these frames reach their destination successfully.
In above figure,
At time T=t1, station B sense the medium and find it IDLE, so it sends a frame.
At T=t2, station C sense the medium and find it IDLE. Because the first bits from station B not
reached the station C. So station C also sends a frame. The two signals collide and both the frames
are destroyed.
The vulnerable time period is equal to Propagation Time (Tp), the time needed for a signal to
propagate from one end of the medium to other.
Persistent methods:
This deals with what we do if the channel is busy or found to be idle.
Three methods are (a). 1-persistent (b) Non-persistent (c) p-persistent
1-PERSISTENT:
It is simple and straight forward.
If the station founds to be idle, it sends the frame immediately. If the station is busy, it
continuously senses the channel until it become idle.
This method has highest chance of collision because two or more stations may find the line be
idle and send their frames immediately.
NON-PERSISTENT:
A station that has a frame to send senses the line.
o If the line is idle, it sends immediately.
o If the line is not idle, it waits a random amount of time and then senses the line again.
This approach reduces the chance of collision because it is unlikely that two or more stations
will wait the same amount of time and retry to send simultaneously.
However, this method reduces the efficiency of the network because the medium remains idle
when there may be stations with frames to send.
p-PERSISTENT:
It is used if the channel has time slots with slot duration equal to or greater than the maximum
propagation time. It reduces the chance of collision and improves efficiency.
In this method, after the station finds the line idle it follows these steps:
1. With probability p, the station sends its frame.
2. With probability q = 1 - p, the station waits for the beginning of the next time slot and
checks the line again.
DEPT. OF ECE, VIIT
COMPUTER NETWORKS (VR-17) UNIT-4 MAC SUBLAYER
a. If the line is idle, it goes to step 1.
b. If the line is busy, it acts as though a collision has occurred and uses the backoff
procedure.
CSMA-CD:
This method is designed to solve the problem in CSMA (As the CSMA method doesn’t specify
the procedure following a collision)
In this, a station monitors the medium after it sends a frame to check if the transmission was
successful or not. If not there is a collision. So the frame is sent again.
The analysis of CSMA/CD is given by
At T=t1, station A has executed its persistent method and start sending the bits of its frame.
At T=t2, station C not yet sensed the first bit send by A, it executes its persistence method
and starts sending the bits in its frame in both the directions.
After some time (T=t3), the station C detects the collision when it receives the first bit of
A’s frame.
Station A detects the collision at T=t4, when it receives the first bit of the frame sent by
Station C.
Station A transmit for the duration (t4-t1) and C transmit for the duration (t2-t3).
At T=t3 the transmission of C’s frame is aborted. At T=t4 the transmission of A’s frame is
aborted.
DEPT. OF ECE, VIIT
COMPUTER NETWORKS (VR-17) UNIT-4 MAC SUBLAYER
So to work CSMA/CD, there is a restriction on frame size.
Before the station send its last bit of the frame, the sending station must detect the presence the
collision. So the frame transmission time must be at least twice of the maximum propagation
time.
The process of CSMA/CD is represented in the below flowchart as
Specification Description
802.1 Sets Internetworking standards related to network management.
802.2 Defines the general standard for the DLL. The IEEE divides this layer into 2 sublayers:
LLC and MAC layers. The MAC layer varies with different network types and is defined
by standard IEEE 802.3.
802.3 Defines the MAC layer for bus networks that use Carrier-Sense Multiple Access
with Collision Detection (CSMA/CD). This is the Ethernet Standard.
802.4 Defines the MAC layer for bus networks that use a token-passing mechanism (Token Bus
LAN).
802.5 Defines the MAC layer for token ring networks (Token Ring LAN).
802.6 Sets standards for metropolitan area networks (MANs), which are data networks
designed for towns or cities. In terms of geographic breadth, MANs are larger than
LANs, but smaller than WANs. MANs are usually characterized by very-high-speed
connections using fiber-optic cables or other digital media.
802.7 Used by the Broadband Technical Advisory Group.
802.8 Used by the Fiber-Optic Technical Advisory Group.
802.9 Defines integrated voice/data networks.
802.10 Defines network security.
802.11 Defines wireless network standards.
802.12 Defines Demand Priority Access LAN, 100BaseVG-AnyLAN.
802.13 Unused.
802.14 Defines cable modem standards.
802.15 Defines wireless personal area networks (WPAN).
802.16 Defines broadband wireless standards
Local Area Network (LAN) is a computer network that is designed for a limited geographic
area such as a building or a campus.
Although a LAN can be used as an isolated network to connect computers in an organization
for the sole purpose of sharing resources, most LANs today are also linked to a wide area
network (WAN) or the Internet.
The LAN market has several technologies such as Ethernet, Token Ring, Token Bus, FDDI,
and ATM LAN. Ethernet is by far the dominant technology among these.
In 1985, the Computer Society of the IEEE started a project, called Project 802, to set
standards to enable intercommunication among equipment from a variety of manufacturers.
Project 802 is a way of specifying functions of the physical layer and the data link layer of
major LAN protocols.
The IEEE has subdivided the data link layer into two sublayers: logical link control (LLC) and
media access control (MAC). IEEE has also created several physical layer standards for
different LAN protocols.
Standard Ethernet uses 1-persistent CSMA/CD at LLC layer to resolve multiple access conflicts.
In Standard Ethernet, the MAC sublayer governs the operation of the access method. It also
frames data received from the upper layer and passes them to the physical layer.
The frame format is given by
Preamble: It contains 7 bytes (56 bits) of alternating Os and 1s that alerts the receiving
system to the coming frame and enables it to synchronize its input timing. The
preamble is actually added at the physical layer and is not (formally) part of the frame.
Start frame delimiter (SFD): The second field (l byte: 10101011) indicates the
beginning of the frame. The SFD warns the station or stations that this is the last chance
for synchronization. The last 2 bits is 11 and alerts the receiver that the next field is the
destination address.
Destination address (DA): The DA field is 6 bytes and contains the physical address
of the destination station or stations to receive the packet.
Source address (SA): The SA field is also 6 bytes and contains the physical address of
the sender of the packet.
Length or type: The original Ethernet used this field as the type field to define the
upper-layer protocol using the MAC frame. The IEEE standard used it as the length
field to define the number of bytes in the data field. Both uses are common today.
Data: This field carries data encapsulated from the upper-layer protocols. It is a
minimum of 46 and a maximum of 1500 bytes.
CRC: The last field contains error detection information, in this case a CRC-32
o The ETHERNET frame needs to have a minimum length of 64 Bytes. By excluding the
header and trailer parts, the minimum length of data from upper layer is 46 Bytes. If the
data is less than 46 bytes, zero padding is done.
o This defines the maximum length of a frame as 1518 Bytes. By excluding the header
and trailer parts, the maximum length of data from upper layer is 1500 Bytes.
The ADDRESSING is done as follows
o Each station on an Ethernet network (such as a PC, workstation, or printer) has its own
network interface card (NIC).
o The NIC fits inside the station and provides the station with a 6-byte physical address.
o A source address is always a unicast address. But the destination address can be
unicast, multicast, or broadcast.
o If the least significant bit of the first byte in a destination address is 0, the address is
unicast; otherwise, it is multicast.
o The broadcast destination address is a special case of the multicast address in which all
bits are 1s. (FF:FF:FF:FF:FF:FF)
The Standard ETHERNET uses various PHYSICAL LAYER strategies. They are
o Co-axial cable (10 Base-5, 10-Base-2)
o Twisted Pair cable (10 Base-T)
o Fiber optic cable (10 Base-F)
The encoding technique used here is MANCHESTER ENCODING/DECODING.
10 BASE-2:
o It also uses a BUS topology, but the cable is much thinner and more flexible.
o The cable can be bent to pass very close to the stations.
o In this case, the transceiver is normally part of the network interface card (NIC), which
is installed inside the station.
o This implementation is more cost effective than 10Base5 because of
Thin coaxial cable is less expensive than thick coaxial
The TEE connections are much cheaper than taps.
Installation is simpler because the thin coaxial cable is very flexible.
o However, the length of each segment cannot exceed 185 m (close to 200 m) due to the
high level of thin coaxial cable.
10 BASE-T:
o Uses a physical star topology. The stations are connected to a hub via two pairs of
twisted cable.
o Note that two pairs of twisted cable create two paths (one for sending and one for
receiving) between the station and the hub. Any collision here happens in the hub.
o The maximum length of the twisted cable here is defined as 100 m, to minimize the
effect of attenuation in the twisted cable.
10 BASE-F:
o This is most commonly used
o It uses a star topology to connect stations to a hub. The stations are connected to the
hub using two fiber-optic cables
There is a relation between the slot time and maximum length of the network. It is depends on
the propagation speed of the signal in the particular domain.
The propagation speed is given by 2*108 meters/sec in most of the transmission media.
The slot time is defined as “The round-trip time required for a frame to travel from one end of
a maximum length network to the other end plus the time needed to send the JAM sequence”.
o For Standard ETHERNET, it is the time required to send the 512 bite i.e. 51.2micro
seconds.
So the maximum length of the network is given by 5120meters. (Theoretical value)
But in practical scenarios, we need to consider the delay times in repeaters and interfaces. So
the maximum length of the network is 48% of the theoretical value (2500 meters)
FAST ETHERNET
IEEE 802.3u
In 100 Base-TX
o It uses 2 pairs of Twisted pair cable.
o It adopts MLT-3 encoding because of its good bandwidth performance
o To provide self-synchronization, 4B/5B Block coding is adopted
o With 4B/5B Block coding, it creates a data rate of 125 Mbps, which is fed to MLT-3
for encoding.
In 100 Base-FX
o It uses two pairs of Optical fiber cables
o As it can handle high bandwidth requirements, we use simple line coding schemes (in
this, we adopt NRZ-I encoding
o Here also, in order to provide self-synchronization, 4B/5B Block coding is adopted
In 100 Base-TX
o To provide a data rate of 100Mbps, it requires the use of Category-3 UTP or STP
cables.
o It uses 4-pairs of UTP for transmitting 100Mbps
GIGABIT ETHERNET
IEEE 802.3z
GIGABIT ETHERNET can’t use Manchester encoding scheme because it involves very high
bandwidth
o Two –Wire implementations use NRZ schemes, and to provide self-synchronizations
we adopt 8B/10B block encoding
o In four-wire implementation, 4D-PAM5 encoding be used in order to reduce the
Bandwidth
IMPORTANT QUESTIONS
1. Discuss about the problems in Static channel allocation and what are the assumptions of
Dynamic channel allocation?
2. Explain how the Slotted ALOHA solved the problem of channel allocation?
3. Write about CSMA and CSMA/CD in detail?
4. Write short notes on collision free protocols?
5. Discuss about limited contention protocols?
6. Explain about Wireless LAN protocols?
7. What are the different cable topologies for ETHERNET?
8. Explain about CSMA with CD with a neat diagram?
9. Compare the throughput of Pure ALOHA with Slotted ALOHA?
10. What is CSMA and what are different approaches?
11. Explain various classes of IEEE 802.X standard ETHERNET?
12. Discuss about Fast ETHERNET and explain about its physical layer implementations?
13. Discuss about Gigabit ETHERNET and explain about its physical layer implementations?
14. Explain about 10Gigabit ETHERNET?
15. Explain the advantages of Wireless LANs?
16. Explain Pure ALOHA and Slotted ALOHA protocols?