Professional Documents
Culture Documents
SUBLAYER (MAC)
By Jignesh Patel
Multiple access problem
2
By Jignesh Patel
Conti…
3
By Jignesh Patel
Data link layer divided into two functionality-oriented sub layers
4 By Jignesh Patel
The Channel Allocation Problem
5
6 By Jignesh Patel
RANDOM ACCESS
7
By Jignesh Patel
Conti…
8
Topics to be discussed
ALOHA
By Jignesh Patel
ALOHA
9
By Jignesh Patel
10 By Jignesh Patel
Pure ALOHA Principal Rule
11
By Jignesh Patel
Pure ALOHA
12
After MAX
no. of
retransmissi
on attempts
station must
give up &
13try later By Jignesh Patel
Pure ALOHA
14
By Jignesh Patel
Example
The stations on a wireless ALOHA network are a maximum of 600 km apart.
If we assume that signals propagate at 3 × 108 milise, we find
Tp = (600 × 103 × 103 ) / (3 × 108 ) = 2 ms.
Now we can find the value of TB for different values of K .
a. For K = 1, the range is {0, 1}. The station needs to generate a random
number with a value of 0 or 1. This means that TB is either 0 ms (0 × 2)
or 2 ms (1 × 2), based on the outcome of the random variable.
15 By Jignesh Patel
Vulnerable time :- it is a time, in which there is a
chance of collision.
Pure ALOHA vulnerable time = 2 x Tfr
16 By Jignesh Patel
Example
A pure ALOHA network transmits 200-bit frames on a
shared channel of 200 kbps. What is the requirement to
make this frame collision-free?
Solution
Average frame transmission time Tfr is 200 bits/200 kbps
or 1 ms. The vulnerable time is 2 × 1 ms = 2 ms. This
means no station should send later than 1 ms before this
station starts transmission and no station should start
sending during the one 1-ms period that this station is
sending.
17 By Jignesh Patel
Pure ALOHA
18
By Jignesh Patel
Example
A pure ALOHA network transmits 200-bit frames on a shared channel of 200 kbps.
What is the throughput if the system (all stations together) produces
a. 1000 frames per second b. 500 frames per second c. 250 frames per second.
Solution
The frame transmission time is 200/200 kbps or 1 ms.
a. If the system creates 1000 frames per second, this is 1 frame per millisecond.
The load is 1. In this case S = G× e−2 G or S = 0.135 (13.5 percent). This means
that the throughput is 1000 × 0.135 = 135 frames. Only 135 frames out of
1000 will probably survive.
b. If the system creates 500 frames per second, this is (1/2) frame per millisecond.
The load is (1/2). In this case S = G × e −2G or S = 0.184 (18.4 percent). This
means that the throughput is 500 × 0.184 = 92 and that only 92 frames out of
500 will probably survive.
c. If the system creates 250 frames per second, this is (1/4) frame per millisecond.
The load is (1/4). In this case S = G × e −2G or S = 0.152 (15.2 percent). This
means that the throughput is 250 × 0.152 = 38. Only 38 frames out of 250 will
probably survive.
Slotted ALOHA
20
By Jignesh Patel
Frames in a slotted ALOHA network
21 By Jignesh Patel
Slotted ALOHA
22
23 By Jignesh Patel
Example
A slotted ALOHA network transmits 200-bit frames on a shared channel of 200
kbps. What is the throughput if the system (all stations together) produces
a. 1000 frames per second b. 500 frames per second c. 250 frames per second.
Solution
The frame transmission time is 200/200 kbps or 1 ms.
a. If the system creates 1000 frames per second, this is 1frame per millisecond. The
load is 1. In this case S = G× e−G or S = 0.368 (36.8 percent). This means that
the throughput is 1000 × 0.0368 = 368 frames. Only 386 frames out of 1000
will probably survive.
b. If the system creates 500 frames per second, this is (1/2) frame per millisecond.
The load is (1/2). In this case S = G × e−G or S = 0.303 (30.3 percent). This
means that the throughput is 500 × 0.0303 = 151. Only 151 frames out of 500
will probably survive.
c. If the system creates 250 frames per second, this is (1/4) frame per millisecond.
The load is (1/4). In this case S = G × e −G or S = 0.195 (19.5 percent). This
means that the throughput is 250 × 0.195 = 49. Only 49 frames out of 250 will
24 probably survive. By Jignesh Patel
Carrier Sense Multiple Access (CSMA)
25
By Jignesh Patel
Space/time model of the collision in CSMA
(every station is sensing the channel for transmission)
26 By Jignesh Patel
Conti….
27
By Jignesh Patel
Conti…
28
P-Persistent CSMA
By Jignesh Patel
1-Persistent CSMA
29
By Jignesh Patel
Non-Persistent CSMA
30
If collision occurs.
wait a random amount of time and start all over again.
Reduce chances of collision.
By Jignesh Patel
P-persistent
31
32 By Jignesh Patel
CSMA/CD (Collision Detection)
33
By Jignesh Patel
Collision of the first bit in CSMA/CD
34 By Jignesh Patel
Conti…(Ethernet MAC Algorithm)
35
Node A Node B
Node A starts Node B starts transmission at
transmission at time 0 time T
How can we ensure that A knows about the collision?
By Jignesh Patel
Ethernet MAC Algorithm
36
Node A Node B
Node A starts Node B starts transmission at
transmission at time 0 time T
At time 2T, A is still transmitting and notices a collision (jam signal)
By Jignesh Patel
Conti…
37
Solution
The frame transmission time is Tfr = 2 × Tp = 51.2 μs. This
means, in the worst case, a station needs to transmit for a
period of 51.2 μs to detect the collision. The minimum size
of the frame is 10 Mbps × 51.2 μs = 512 bits or 64 bytes.
This is actually the minimum size of the frame for Standard
Ethernet.
38 By Jignesh Patel
Example 2
A network using CSMA/CD has a bandwidth of 10 Mbit/se.
If the signal propagation time is 2x108 metr/s, cable length
is 400 meter. what is the minimum size of the frame?
Solution
Time to transmit 1 bit is, Tb = 1/R =1/107 =0.1 μs
Propagation delay Tprop=d/v = 400/2x108 = 2x10-6 (2μs)
So, number of bits (frame size) we require to transmit are,
Nb= 2 x propagation delay x bandwidth
= 2 x 2 x10 = 40 bits
OR
Nb=( 2 x propagation delay )/ Tb = 40 bits
39 By Jignesh Patel
Flow diagram for the CSMA/CD
40 By Jignesh Patel
Energy level during transmission, idleness, or collision
A station that has a frame to send or is sending a frame needs to monitor the energy
Level to determine mode of channel.
41 By Jignesh Patel
CSMA/CA (Collision Avoidance)
42
By Jignesh Patel
Why is it difficult to detect collisions in
43
a radio environment?
CSMA/CA is used in 802.11 based wireless
LANs and other wired and wireless communication
systems.
One of the problems of wireless data
communications is that it is not possible to listen
while sending, therefore collision detection is not
possible.
Another reason is the hidden terminal problem. (Hidden
nodes in a wireless network refer to nodes that are out of range of other nodes.
Take a physical star topology with an access point with many nodes surrounding it in
a circular fashion: Each node is within communication range of the AP, but the nodes
cannot communicate with each other, as they do not have a physical connection to
each other)
By Jignesh Patel
Hidden Terminal Problem
Node B can communicate with A and C both
A and C cannot hear each other
When A transmits to B, C cannot detect the
transmission using the carrier sense mechanism
If C transmits to D, collision will occur at B
A B C D
By Jignesh Patel
44
MACA solution for Hidden Node
45
CTS (10)
CTS: Request
RTS: Clear ToTo
Send
Send DATA
RTS (10)
A
C
E
By Jignesh Patel 47
MACAW (MACA for Wireless)
48
By Jignesh Patel
Four-Way Handshake
Sender sends Ready-to-Send (RTS)
Receiver responds with Clear-to-Send (CTS)
Sender sends DATA PACKET
Receiver acknowledge with ACK
RTS and CTS announce the duration of the transfer
Nodes overhearing RTS/CTS keep quiet for that duration
Sender will retransmit RTS if no ACK is received
If ACK is sent out, but not received by sender, after receiving new RTS, receiver returns ACK
instead of CTS for new RTS
ACK
CTS(T)
CTS:Request
RTS: Clear ToTo
Send
Send DATA
RTS(T)
destination
source
49 By Jignesh Patel
Exposed Terminal Problem
Node C can communicate with B and D both
Node B can communicate with A and C
Node A cannot hear C
Node D can not hear B
When C transmits to D, B detect the transmission
using the carrier sense mechanism and postpone to
transmit to A, even though such transmission will not
cause collision
A X B C D
By Jignesh Patel
50
Exposed station still unsolved
The CTS frame in CSMA/CA handshake can prevent collision from a hidden station. But here C
can head RTS from A but could not hear CTS from B, so after hearing RTS from A it will wait
but after sometime it might start communicating to D. in this case RTS/CTS is not solving
problem
IEEE Standard 802 for LAN & MAN
52
By Jignesh Patel
Name Description Note
IEEE 802.1 Bridging (networking) and Network Management
IEEE 802.2 LLC inactive
IEEE 802.3 Ethernet
IEEE 802.4 Token bus disbanded
IEEE 802.5 Defines the MAC layer for a Token Ring inactive
IEEE 802.6 MANs disbanded
IEEE 802.7 Broadband LAN using Coaxial Cable disbanded
IEEE 802.8 Fiber Optic TAG disbanded
IEEE 802.9 Integrated Services LAN disbanded
IEEE 802.10 Interoperable LAN Security disbanded
IEEE 802.11 a/b/g/n Wireless LAN (WLAN) & Mesh (Wi-Fi certification)
IEEE 802.12 100BaseVG disbanded
IEEE 802.13 unused
IEEE 802.14 Cable modems disbanded
IEEE 802.15 Wireless PAN
IEEE 802.15.1 Bluetooth certification
IEEE 802.15.2 IEEE 802.15 and IEEE 802.11 coexistence
IEEE 802.15.3 High-Rate wireless PAN
IEEE 802.15.4 Low-Rate wireless PAN (e.g., ZigBee, WirelessHART, MiWi, etc.)
IEEE 802.15.5 Mesh networking for WPAN
IEEE 802.16 Broadband Wireless Access (WiMAX certification)
IEEE 802.16.1 Local Multipoint Distribution Service
IEEE 802.17 Resilient packet ring
IEEE 802.18 Radio Regulatory TAG
IEEE 802.19 Coexistence TAG
IEEE 802.20 Mobile Broadband Wireless Access
IEEE 802.21 Media Independent Handoff
IEEE 802.22 Wireless Regional Area Network
New (March,
IEEE 802.23 Emergency Services Working Group
2010)
53 By Jignesh Patel
IEEE 802.2: Logical Link Control
54
Control field
By Jignesh Patel
IEEE 802.3 ETHERNET
56
By Jignesh Patel
Conti…
57
By Jignesh Patel
Ethernet implementation
58 By Jignesh Patel
59 By Jignesh Patel
802.3 MAC frame (10/100-[fast Ethernet] mbps Ethernet )
Preamble :- The purpose of the preamble is to allow small time interval for the receiver
electronics in each of the nodes to settle after completion of the previous frame.
SFD :- is to notify the receiving station that the frame bits are going to come in next.
Length or type :- IEEE uses this field as a length of data field and Original Ethernet uses as
a type field to define upper-layer protocol.
Data :- this field contains maximum 1500 bytes. minimum 46 bytes length require for
correct operation of CSMA/CD.
60 By Jignesh Patel
IEEE 802.6 DQDB (MAN)
61
Transmission slot :-
Data travel on each bus as a stream of 53 byte slots
(not packets).
The head of buses generates empty slot for use on bus.
By Jignesh Patel
DQDB Data Transmission
63 By Jignesh Patel
64 Bridges
Transparent Bridges
Source routing Bridge
Remote Bridges
By Jignesh Patel
BRIDGES
65
By Jignesh Patel
Conti…
66
By Jignesh Patel
Learning bridge….
68
By Jignesh Patel
69 By Jignesh Patel
Looping in Transparent bridge
70
By Jignesh Patel
71 By Jignesh Patel
Source routing Bridge
72
By Jignesh Patel
Remote Bridge
75
By Jignesh Patel
76 High Speed LANs
FDDI
Fast Ethernet
HIPPI
Fibre channel
By Jignesh Patel
FDDI (Fiber Distributed Data Interface)
77
By Jignesh Patel
Conti…
78
By Jignesh Patel
Nodes could be configured as Single Attached
Stations (SAS) connected to concentrators or as
Dual Attached Stations (DAS) connected to both
rings.
79 By Jignesh Patel
Preamble - Gives a unique sequence that prepares each station for an upcoming
frame.
Start delimiter - Indicates the beginning of a frame.
Frame control - Indicates the size of the address.
Destination address - Origin and destination address
Source address - Identifies the single station that sent the frame.
Frame check sequence (FCS) - CRC error - checking
End delimiter - End of the frame.
Frame status - Identifies whether the frame was recognized and copied by a
80
receiving station.
By Jignesh Patel
Fast Ethernet -100Mbps Ethernet (IEEE
802.3u)
81
By Jignesh Patel
HIPPI (High-Performance Parallel
82
Interface)
It is a standard point-to-point protocol for transmitting
large amounts of data at relatively short distances,
mainly on local area networks ( LAN s).
Its use can make computers, interconnected storage
devices, and other resources on a LAN function as
though they were all within a single supercomputer.
HIPPI is considered an ideal technology for the
transfer of "big data," such as data warehouse
updating, audio and video streams, and data backup
within a range up to 10 kilometers.
By Jignesh Patel
The following table summarizes HIPPI technologies.
multimode
1 kilometer with... fiber optical fiber
HIPPI-800 Serial 800 Mbps
10 kilometers with... single mode
fiber optical fiber
multimode
1 kilometer with... fiber optical fiber
HIPPI-1600 Serial 1600 Mbps
10 kilometers with... single mode
fiber optical fiber
twisted pair copper
HIPPI-6400 6.4 Gbps 50 meters
wire
HIPPI-6400 6.4 Gbps 1 kilometer optical fiber
83 By Jignesh Patel
Fibre Channel
84
By Jignesh Patel