Professional Documents
Culture Documents
Introduction to
Local Area Network
Dr. Madhavi Belsare
CONTENTS
WCB/McGraw-Hill
• The transit time is the time a message needs to travel from
the originating end of the network to the intended
destination in the network.
• The response time of a network is the time between a user
making a request for a network service and the network
responding to this request.
ISO standard and OSI model
WCB/McGraw-Hill
Summary of Layer Functions
WCB/McGraw-Hill
OSI model is generic, protocol independent reference
model.
1. ALOHA
2. CSMA
3. CSMA/CD
4. CSMA/CA
Figure 12.3 Frames in a pure ALOHA network
Figure 12.4 Procedure for pure ALOHA protocol
Vulnerable time for pure ALOHA protocol
Average number of successfully transmitted
frames for pure ALOHA
•a station may sense the medium and find it idle, only because
the first bit sent by another station has not yet been received
Space/time model of the collision in CSMA
t2> t1 C finds
medium idle.
Vulnerable time in CSMA
Solution
The frame transmission time is Tfr = 2 × Tp = 51.2 μs. This means, in
the worst case, a station needs to transmit for a period of 51.2 μs to
detect the collision. The minimum size of the frame is 10 Mbps ×
51.2 μs = 512 bits or 64 bytes.
1. Reservation
2. Polling
3. Token Passing
Reservation Access
Start Frame
Select Poll
Token Passing
•stations in a network are organized in a logical ring.
In other words, for each station, there is a predecessor and a
successor.
•a special packet called a token circulates through the ring.
• When a station has some data to send, it waits until it
receives the token from its predecessor.
•It then holds the token and sends its data.
•When the station has no more data to send, it releases the
token, passing it to the next logical station in the ring.
Logical ring and physical topology
in token-passing access method
CHANNELIZATION
Solution
We can use the rows of W2 and W4 from Fig. 1
a. For a two-station network, we have
[+1 +1] and [+1 −1].
Solution
The number of sequences needs to be 2m. We need to
choose m = 7 and N = 27 or 128.
We can then use 90 of the sequences as the chips.
Example 12.8
Solution
Let us prove this for the first station, using our previous
four-station example. We can say that the data on the
channel
D = (d1 ⋅ c1 + d2 ⋅ c2 + d3 ⋅ c3 + d4 ⋅ c4).
The receiver which wants to get the data sent by station 1
multiplies these data by c1.
Example 12.8 (continued)
Show how they can detect what the other person has sent.
Quiz Time
https://quizizz.com/join/quiz/5f2f70bf906409001b05d487/start
IEEE has subdivided data link layer into two sub layers : LLC
and MAC
LLC protocol can provide interconnectivity between different
LANs because it makes the MAC sub layer transparent
Logical Link Control
•Flow Control
•Error Control
•Part of framing duties
MAC
•Part of framing function
Defines different access methods for different LANs
•CSMA/CD for Ethernet LAN
•Token passing method for token ring and token bus
LAN
Standard Ethernet Characteristics:
111
Multitransition: MLT-3 scheme
1. If the next bit is 0, there is no transition.
2. If the next bit is 1 and the current level is not 0, the next level is 0.
3. If the next bit is 1 and the current level is 0, the next level is the
opposite of the last nonzero level.
The signal rate is the same as that for NRZ-I, but with greater complexity
(three levels and complex transition rules). It turns out that the shape of
the signal in this scheme helps to reduce the required bandwidth.
8B/6T
• 8 data bits are sent as 6 ternary (one of three voltage levels).
-2,-1,0,1,2Volts
1. Management frame
2. Data frame
3. Control Frame
For control frames the value of the type field is 01
Control frame format
Values of subfields in control frames
Addresses
Addressing mechanisms
Case 1: 00 In this case, To DS = 0 and From DS = 0. This means that the frame is
not going to a distribution system (To DS = 0) and is not coming from a
distribution system (From DS = 0). The frame is going from one station in a BSS
to another without passing through the distribution system.
Case 2: 01 In this case, To DS = 0 and From DS = 1. This means that the frame is
coming from a distribution system (From DS = 1). The frame is coming from an
AP and going to a station.
Case 3: 10 In this case, To DS = 1 and From DS = 0. This means that the frame
is going to a distribution system (To DS = 1). The frame is going from a station
to an AP. The ACK is sent to the original station.
Case 4: 11 In this case, To DS = 1 and From DS = 1. This is the case in which the
distribution system is also wireless. The frame is going from one AP to another
AP in a wireless distribution system.
Hidden station problem
802.11n MIMO
Figure 14.14 Industrial, scientific, and medical (ISM) band
Figure 14.15 Physical layer of IEEE 802.11 FHSS
Figure 14.16 Physical layer of IEEE 802.11 DSSS
Figure 14.17 Physical layer of IEEE 802.11 infrared
Figure 14.18 Physical layer of IEEE 802.11b
BLUETOOTH - IEEE 802.15.1
Can have upto 8 stations. One primary other secondaries. Additional secondaries
can be in parked state. For communication at a time 7 secondaries can be in
active state.
Scatternet (piconets combined together)
L2CAP: Logical Link Control and Adaptation Protocol : Roughly equivalent to LLC
sublayer in wired LAN
The L2CAP has specific duties: multiplexing, segmentation and reassembly, quality of
service (QoS), and group management.
Baseband Layer
TDMA
TDD-TDMA is a kind of half-duplex Communication in which the
sender and receiver send and receive data, but not at the same
time (half-duplex); however, the communication for each
direction uses different hops. This is similar to walkie-talkies using
different carrier frequencies.
Radio Layer: Physical layer, max range : 10m
Band: 2.4 GHz band divided into 79 channels of 1MHz each.
Uses FHSS at Physical layer (1600 hops per second)
Modulation: GFSK: FSK with Gaussian Bandwidth Filtering
If the piconet has only one secondary, the TDMA operation is very
simple.
The time is divided into slots of 625 μs. The primary uses even-
numbered slots (0, 2, 4, . . .); the secondary uses odd-numbered slots
(1, 3, 5, . . .).
TDD-TDMA : half-duplex mode.
In slot 0, the primary sends and the secondary receives
In slot 1, the secondary sends and the primary receives. The cycle is
repeated.
Figure 14.22 Single-secondary communication
Multiple-Secondary Communication