You are on page 1of 63
Data Link Layer ~ Frami i Ing ~ Flow - bate ink AYE" Protocols ~HDLC~ PPP Mee ha of et Basics - CSMAycD — Virtual LAN — wi i 2 LAN (802.11) - Physical Layer: Data and Signal formance ~ i i Is - Pe eS ene esoumedia, Switching - Circuit SHchea ad 5.1 INTRODUCTION - DATA LINK LAYER Data Link Layer is the second layer of OSI model. It is responsible for transferring frames of data from one node to another node. It performs node to node communication, Node-1 Node-2 Node-3.-Node-.-—Node-5 Node ~ 1 and Node — 5 are source and destination. Node ~ 2,3,4 are intermediate node, helps in transferring data. The interface among two nodes is termed as link. Each participating host or router is termed as node. Communication channels that connect adjacent nodes is called links. Link Layer Services / Functions Data link layer provides the following services: * Framing * Flow control © Error control © — Congestion control Framing : ket received from network layer) into a frame 1 (pe " ; ; Ie encapsulates the datagram rr Jate datagram from frame received on logical before sending to next node. It also decaps channel, a Scanned with CamScanner Computer ches data from network layer and divide Wey ee Dus) er each fame header includes address manageable ui source andfdes led frames. jon machine. Congestion Control nor Controt Figure: Services of Datalink layer Flow control It provides flow control mechanisms to ensure sender must not send above the tolerable level of receiver. It tries to prevent buffer overflow and control data flow, ivery among adjacent nodes) magnetic signal ighly susceptbl ink layer provides error control mechanism to detect error and retransni 0 is performed to avoid congestion during data access by differen © point link (LLC & MAC) * Broadcast link (MAC) Data link layer {wo sublayers : layer (LLC) Medium Access control layer (MAC) © Logical tink contr a tink and Physical Layers @ k control layer Js the uppermost layer of ink layer, St Ths lye provides he funtion Addressing Data flow control optionalyy Error control «Acknowledgement service yeaium access control layer Medium access can be tributed and centralized, + Character counting «byte stuffing «bit stuffing Services provided to network layer : Unacknowledged connectionless service © Acknowledged connectionless service + Acknowledged connection oriented service 52 LINK LAYER ADDRESSING (LINK ADDRESS) tha physical address. It is also known as hardware normally of 48 bits (6 bytes long) and Each computer is assigned Sétress or medium access address (MAC). ‘Written in hexa decimal. TP address need to be assigned for router. Because in some application, outer may act as source/destit fora router It depends number * — More than one IP address can be poss of connected links to routers. Scanned with CamScanner Computer son IPadaress ina packet is determined by the sence yer « determined by Address Resolution Protocol (ARpy 54 Link layer addre: of the link address depends on the protocol being used. + Siz “Three types of address used by link layer protocols: Inicast address Multicast address Broadcast address Unicast refers to one to one communication. Unicast address is an address hy specifies a single network device. Multicast refers to one to many communication. Multicast address is an addr, that specify multiple network device. ion. Broadcast address is an address ht Address Resolution Protocol (ARP) ARP is a communication protocol that helps to identify IP address from the physic MAC address. It is used to discover link layer address, MAC that associated with the inter! Iyer addres accepts IP address from IP protocol and maps to correspondi and sends toda lnk layer. Network es layer ej PMess a ~> tiniclayer a ARP request packets helps to find the link address of the receiver Intend receiver recognises IP address and sends MAC address. ARP cache ARP cache is a table that m: correspor ih Mains correlation of MAC address Wi! his "spository that Connects IP address to MAC address in a network. = Figure aRe paces Hardware type: Defines the type of the lnk layer protocol (Type I~ Ethernet) Protocol type + Defines the network - layer protocol (1PV4 protocol). ‘The source hardware and protocol addresses are variable length defines link layer and network layer addresses of the sender. Operation : Specifies the operation sender performs (I-request,2-reply) 5.3. DATA LINK LAYER SERVICE ‘The different services provided by the Data Link Layer are: + Framing © Link access © Reliable delivery + Flow contro! ‘© Error contro! + Error detection and correction © Half duplex and full duplex Framing frame. . cess of encapsulating network datagram within a link layer | he pro ta Link layer. . the first service provided by the da een Scanned with CamScanner Computer 1 decepsulation the datagram from gy Te 0 performs the proces of d received from the logical channel. control takes care of traffic condition of the medium ang make, access control ta " er is responsible fo for the frame tobe transmitted. provides synch In the data into bits and tran between the sender and re Reliable delivery / delivery of data from node to node connection, for Forming frames fom hebits, Each Supports reliable he destination address. All the source and the th of ata grouped ino sin Flow control (Single large frame are suspectible te ean - enton be cron’ ow of packet the meer fame. ( ‘ needs retransmission) Mai to disal Message is divided into smaller sizeof fame nthe ata nk ayer, Error detection and corre Frames canbe of It performs checksum and cyclic redundancy check to detect the error. I perfom | I eration on detection of errors. certor correction operation on det. Fixed size a Congestion cont Frame Frame Since link may be congested with frames, it rest corrupted frames. So certain congestion control mech: congestion, 5.4 DATA LINK CONTROL (DLC) AND ITS SERVICE In variable size frame, itis necessary to state start and end of the frame. Ethernet, token ring and frame relay (network technologies) have their own frame structures. into two sub layers. Data link control layer (DLC) [ler (Ener detection] der ‘comactice ) Medium Access Control Layer (MAC) Hea (Gata) | sete purpose) Fare orca ing message into frames isto create recoverable chunks during Data link control (DLC) d nodes. It consider tasks such as : le communication between two adjaceat Fixed size frame : Reliable packet transmission Itis of fixed size, No boundaries can bese ti is very low, It can be overcome Sm deeston [MY Suffer from internal fragmentation, when size of fame Sy padding. Recovery during packet retransmission Variable si Services provided by DLC are: pes ae, Need to define end and beginning of next frame, Starting ize. 3 (SFD)- ae orf Frame is of var “ame is called Start Frame Del () Framing ___... Scanned with CamScanner Problems in Framing = + Detection of SFD Detection of end of frame (End frame delimiter) «Appearance of flag portion in data. Variable size of frame is based on : + Length of frame Length field of fame defines the actual length of frame and ED in: of the frame, eS the lengy “The problems of framing can be solved by the following two approaches : (Character — Oriented framing ~ Oriented Approach (Character Oriented Framing : so otherwise referred as byte-oriented framing. All data to be carried are 8-bit characters (ASCII) Variable number ‘of Characters Fleg| Header Trailer Flag} Frame structure - Character Oriented protocol Header — It includ e nati informatie Gt address, destination address and other cont Trailer’ ~ thas error detection bits in mult les of 8 Flag — 3 . added to fin, ‘pendent special characters, id beginning, end of frame and prot 1 Braphs, audio or video are sent, then is the end of the message. So to fix this i strategy was added to character oriented sa byte —, framing 0M etic ffing, a 5 pyte stl in ig normally called escape character acounters ESC charac fer as data, not as a del ect cs syie stuffing i the process of adding ones flag oF ESC character inthe text, nbyte stuffing (also called character stuf jon of the frame when there isa character Pecial bytes added tothe daa tion, Flag|Header| | ESC | Fag Esc ]es0 Trailer | Flag 1 e z Flag|Header| | ESC | Flag [=< ESC Traler | Rag) [usted may | = Figure Character stuffing Itis very costly and obsolete method. Bit-o1 inted frame : In bit-oriented framing, 8-bit pattern flag, 0 beginning and end of the frame. In flag patterns appear in dat cas in character stuffing. r the next 1uffing is the process of addi ‘one’s follows a zero in the dats. stuffing one ‘0 is added after five consecutive | 0 is used as delimiter to define is resolved by stuffing 1 single bit instead of | 's regardless ofthe value of ng one exrazero, after five consecutive Scanned with CamScanner 71007000] Trailer | Flag, Fag | Header [00011111011001 extra 2 bits Recover Tag] rawr [oorr7470170077711007000] Tealer [Flag] Figure Bit stating If flag like patter, appears in data, it must be stuffed. (b) Flow and error control Flow control is one ofthe main responsibility of data link layer, _ Flow control isthe set of procedures, that informs amoui receiving acknowledgement from the receiver. __ Flow contro! mechanism makes sender to ‘receiver, before continuing further transmission from When rate of proces and send data accordingly. sender side. Two flow control mechanisms are: © Stop and wait © Sliding window Sliding window (Send many frame at atime) nt of data can be sent before wait for an acknowledgement fron is slower than rate of transmission, then sender must hold sesame process is continued until sender send the ast fam jwledgement takes the ; rhe acknowledgement takes the sme propguton ime ata sending fame Sender Receiver Frame 9 _ 7K Sender starts timer when it sends the frame. When acknowledgement isnot received initend time, then sender assumes thatthe data is lost or damaged and resends the data. Receiver sends acknowledgement, only when data is received. When a receiver does not receive a frame or received a damaged frame, it won't send back the acknowledgement. After the expiry of timer, the sender resends again the lost frame, ‘When a sender receives damaged acknowledgement, after the timer expires, sender ‘in retransmits the frame. 16 it discards the copy of frame, itretransmits the frame. But receiver Since receiver has already received this fram ‘When a sender receives acknowledgement late, ‘the otherside, discards the copy. iver discards the second On receiving second acknowledgement for same frame, rece er discards the: ‘knowledgement, Batters ‘Occurane of buffer flow at any end Suffer maintained at both sender and restiver. in “imated to other end to maitain the flow contol. a Scanned with CamScanner Piggybacking Since ack take same propag both transmits data, can send both data and ack d in terms of two way commu ing each transmission, Piggy nce itis called Go-Back-N-ARQ at AR Drawback cqcie Repeat ARQ Sending one frame at time and acknowledgement for each frame, consumes mye jpSelective Repeat ARQ, time. rsends net can be improved by sending multiple time of acknowledgement. Efficiency of stop and w frames during the ‘This can be achieved by : + Go-Back-N ARQ (ARQ - Automatic repeat request) + se Go-Back-N ARQ ve Repeat ARQ In this multiple frames were sent while waiting for the acknowledgement. | maintains the copy of frame sent, unt Frames are numbered seque Sequence numbers range from 0 to 2"—1 Let m bits =3, the 2-1 = 7, So the sequence numbers are | ‘The sequence numbers can be repeated as The length of sequence number 2» “1 is called as size of window which can be taken as variable in TCP. Betore siding -—————— Sih ]2[3]4[slelzyala a Sliding window size = 7 ee onseceiving frame eter now sends the missed frame alone, ro Controt based on ARQ. Error cont mission, 1 ot detection of eror, receiver request fied frame is known as ARQ. ‘Slicing window size =7 en sender sends 7 frame, but frame 4 not acknowl ged, then resends3,4,5,6 only the lost frames gets retransmitted, rol combines both the error det ender to retra tection and frame, Retransmission ———«€, Scanned with CamScanner Computer Dorng node onde communication ow nd eor contol performed layer. During end to end co layer. Error control can be done If frame is corrupted, then the corrupted frame is discarded, approaches : «IFrame isnot corrupted, an acknowledgement is sent to the receiver, ERC (Cycie Redundancy Check) i added in header portion by sender andy vertfied by the receiver. Error Control Techniques : Cex] Stop and wat ARO [Sicing window ARQ) Goback-N [Selective Repeal] Possible errors are : Single bit error (Gi) Burst error (More than one bit) i [opto t{i Jo pa ‘Single bit error COE ‘Sender Burst error Error detection and con in and control mechani i 4 ‘or transport layer, ‘mechanisms are either implemented in data link Different methods of eror detection are: (Redundancy Check * Nettcal redundancy check (vRc) 0m Lee tag xmunicaton, ow and err contol performed in ay Pon ana pysical Layers Longitudinal edundaney chek rng 4 Cyolie redundancy check (cRo) Cheek sum ero detection f performed bythe ooving etndany ey concept gonand error control nor control can also be performed by unactnomle sanledgement shows the Problem with he fame, ied frame, Non-recipient of, omectontess and Connecton oriented piCean be either + Connectionless protocol + Connection oriented protocol Connectionless protocol means, there is no need of establishment of connection temeen sender and receiver before the transmission. In Connection Oriented Protocol it follows phases like setup phase, transfer phase tnd teardown phase. m Access Control layer (MAC) the lower sublayer of data link layer. It is responsible for sharing physical ‘Connection among different systems in a network. IP (Internet Protocol) maintains mapping ‘between IP address and MAC address ‘ing ARP (Address Resolution Protocol) 43 DATA LINK LAYER PROTOCOL Data link protocols were classified based upon the existence errors + Noiseless Channel ~ Simplest Protocol — Stop and wait protocol * Noise Channel Scanned with CamScanner Go-Back-N ARQ Ja lows none direction, ACK & NAK in opposite direction fea of including ACK & NAK in data frame is termed ag Piggybacking. Noiseless Channels Noiseless channels normally don: ‘Simplest Protocol 1s no flow or error control is unicast protocol, frame flows only in one direction. + On receiving, receiver removes header part and send data packet to netno layer. © Data li mult lexing and soon, ithm - Simplest Protocol (sender) (true) wait_event( ); make frame ( send frame } Algorithm - Simplest Protocol (receiver) While (true) error and flow control mechanism, layer uses services provided by physical layer such as signaling Protocol refer previous deseribed content of “Stop and Wa soise channels ise channels normally have flow and error contol mechanisms copand wait Automatic Repeat Request (ARQ) jple error control mechanism to the tadds i stop and wait protocol. so known as alternating bit protocol. It ensures reliability ofthe information ted. sopand Wait Potocol resolves the following problems = Lost data and acknowledgement Delayed data and acknowledgement of Stop and Wait ARQ: Itis used in Connection Oriented Protocol f offers error and flow control. Stop and Wait ARQ Protocol i used in data ink and anspor Yet th window size 1 (v) It implements sliding window protocol Stop and Wait procedure aimsto sen at only nth ARG D Srp and Wait Timeout + Seavence ‘a + Sequence number of ack ‘eacknowledgement of receiver, Stop and number of Timeout indicates lost data. jost ack. Sequence number of data indicates | Then Sop and Wait ARQ will work bette Scanned with CamScanner RQ sends only one packet at sliding window protocol pe o of window size ative acknowledgement. It sends ack only when «Receiver sends only positive acknowledge Y Whe thy correct dats. track isnot received, sender assumes it as timeout and sends back the same gy, packet again. \ded atthe header portion. The Sequence numbers egy quence numbers ad modulo-2 arithmetic. Iudes sequence number (0 oF 1) with the ack, Sequence numbe oe the next packet it expect. By this approach receiver ean detect duplicate frames y checking the. rate frame sequence number. ‘© Duplicate sequence numbers are easily detected and discarded. sender Reosiver Fame 9 = ; Tine oa] Lost | ao Time Time Figure Stop and Wait ARQ (lost frame) Disadvantage : ‘+ Efficiency is low, since only one frame is sent at a time, © Need to set ‘et for each individual frame. * Window size being one is also a disadvantage, Frame 1 scares dupcates Figure Stop and Walt a, ast ack ‘Automatic Repeat Request (ARQ) «Stop and Wait * Go back N 2 Sele (selective retransmission) rej ARQ purpose is to ensure proper sequence of packet delivery Free from errors and duplications. There is no need of pipelining in Sop and Wait ARQ, since it need to wat for an ‘inowledgement to send the next data. 46 HDLC (HIGH LEVEL DATA LINK CONTROL) HDLC is used to achieve communication 56. Transfer modes HDLC performs two transfer modes, such as * Normal Response Mode (NRM) lanced mode (ABM) Asynchronot Response Mode (NRM) is. Primary station sends secondary st ye commands. es mary and 8 "Work ; Son ns, py two stations, primar ote "ands Whereas secondary Scanned with CamScanner ond Psi Layers 9 iy Unnumbered frames (Ustramesy frame is used to transm tit of control field is 0. Sta and conto information of use data, ‘The fist is used to transporte geframe is use Port control information, performs error and flow control, ion. The first Uetrame is used forthe purpose of management-The first two fields of com flats I, first two fields of control Secondary station Figure Multipoint tink (NRM) ‘Asynchronous balanced mode (ABM) cach station can act as both primary and secondary sti is is the current practice of part ns of ABM are balanced, O ==. poe 8 = ‘<_[command] station = “ Figure Pitot Lik (ABM) 5.6.2 Frames Flag | Addross | Contro! User data pays | FCs | Flag fia [tes] na | Fos Fn Wanagemen Tres | Fag [Fes ‘across | Contol jonas address itis TO address contains sender o receiver ares. Ipimary sation has ares ates address). If secondary station has address, then it has jon addres ‘can be I byte or several byte, depends on the ss). Address field can depends on t the network. ends with 0. address is more than one byt, only the lst byt ends Control Each frame is bit-oriented and includes 6 fields, Fag | Adcress | Controt Payload Fes | Fleg ‘bvfe ‘bye tbe Vaiable size Dora 1 bjto bytes ‘There are thce types of frames, namely : (Information frames (I-frames) Gi) Supe isory frames (S-frames) i. (>"> : joni of or2 bye, sed foreor and low cota It dtemiestypean frees ‘frame, . Veer data / Payload / Information ase dta depends ont contains user data from network layer. The length 0 Network, — Scanned with CamScanner ona ysl Layers " 5) code value is FCS: Sequence is of 2 or 4 byte rca wed dundancy code. —_ standard code used for FCS is eyelie Control Field ~ I-frames It carries user data from networ 0, then rence number. Code Command] Response 4 Next 3 bits denoted by N(S) holds seauenc iow ae a ywledgement number, ormal response mode «Last 3 bits denoted by N(R) holds acknowledes mber. aor — a bit. ‘ nd N(R) called P/F 1s Single bit between N¢S) and N(R) UA Tenmnbered «P/F is single bit used for dual purpose. SABM DM Wakinen balanced mode extended © Bit= 1, can poll or final sent from primary station to secondary station. 57 POINT-TO-POINT PROTOCOL (PPP) Pe © Final, frame sent from secondary station to primary frame s a data link layer protocol used to establish direct connection between two a byte-oriented protocol. Control Field ~S frame led as $-frame, used for error and flow contol hout the help of networking device, it can directly connects two routers (nodes). ‘+ Supervisory frames are: «If first wo bits is 10, «The is N(R) holds both ack and nak number. IP and TCP do not support PPP. is S-frame, 13 Example : Connecting desktop computer to the internet through the telephone line, provides services of physical layer. © 2bits are used to send $-frame. of four types. = _ Receive Ready (RR) ices : = _ Receive Not Ready (RNI . = + Itean provide services such as encryption, authentication and compression * Defines frame format that can be exchanged between d rence called Network Control oa levices. Selective Reject (SREJ) " * Supports multiple network layer services, he © Re is 00, Ii ‘ode value is 00. It is used & Protocol (NCP) 0 ack ity good frame 1 N(R) defines ack number, nowledge quality g00 inks. vides multiple connec * RNR code value is 10, It ™ + Itprovides network address configuration. . ing en slowdown. N(R) defines a is used to control congestion by as! ick number, # REJ code value is 0 N(R) defines ack numbe r, Scanned with CamScanner and Physical Layers CO Ney “There is no flow control in PPP, ender sends without concem of receiver. + Provides sit So lack of effi | cd configuration during multipoint configuration, ppp works on different phase + Nod ie P int protoct is normally a combination of three tyes Of protoc on oint-to-point protocol is norm also veferced as three components of PPP. Esta Protocol (LCP) to establish connection between two points, Authenticate © Link Cont + Authentication Protocol (AP) to ensure secure connection between two pong, 4 Network ‘+ Network Control Protocol (NCP) handles IPV4, IPV6, con Framing : «Terminate Flag | address] contro! | Protocol | Payload | Fos | Flag Failed Toye tbyie tbye tor2 Varable 20rd 1 byte bytes. bytes Carrier detected Flag : It starts and end with 1 byte of bit pattern 01: Both HDLC and PPP use same pattern. But HDLC is bit oriented whereas PPP is byte oriented. ‘constant value, set to 11111111 used as broadcast address. It has constant value 11000000. error control, this field has no impact at configuration "© PPP has no flow control and very simp . ure Transition phases in PPE Protocol Dead —No Defines what data tobe used, which may be ether user data or other inforai® to communicate. Payload : ; dries * Establish — \dentifies channel to node 2m ¢ of secu thentication ~ For the purpose O° Authentication, Ifauthentication Ii carries user data and other information, porting network ates about the SUP Fes: * Network — tm tis newwork phase node eae Frame Check Sequence, Protocols, * Open ~ Data tcansfer takes pee: ———s—™ Scanned with CamScanner Terminate ~ After data Multiplexing : completes. termination of Ink takes plage NOP OSIGP| AP TCP | CHAP, =) Datalink PAP layer Flag | Address | Control | Protocol | Payload | Fos | Flag 1 4 2 Code | 1D [Length = as &s A é 70 | Aceress | Control | Protoca | Payload | ros | Flag Figure LOP packet encapsulated in a frame, sa7 Packet ec |= ‘ype > Description —] *op0sed categor| [Ost | Congurexcx fei x03 Configue NOK [Nt aczepica x04 | Confgurereiect | Notrecognaed 2_Ylor0s [Terminate rene Fequest to shut down 8_Tlox06 [Terinateack | hecapranaoeee 0x07 | Codereiect | Unkncun code 0x08 _|Protccolreject | Unknown protec Jox09 | Echorequest | neto mes sage to 4 check other end loxoa[Echorenly ecsrzee tet Jox08 |Discarcrequest | Requestio decard the packet Category of packet ip he, ‘¢ 0x01 to 0x04 - link Configuration (Establish phase) ‘¢ 0x05 and 0x06 - link Termination (Termination phase) © 0x07 to Ox0B Authent ‘monitoring and debugging mn Protocol (AP) Authentication helps to verify the authorised users. Itmakes use of 3 protocols for authentication purpose: * The Password Auther * The Challenge Handshake Authen! * The Extensible Authent CHAP Ts most commonly used protocol. ion protocol. Scanned with CamScanner Pason) PAP Packets SCS Scan se Figure CHAP packet encapsulated a Ppp Flag | Address the protocol used for wireless networks that extends the authent tocol. Network Control Protocols (NCP) snable user to access remote systems. point to point ‘mechanism used to configure different network protocols. includes protocols such as i€ packet, user uses predefined function and password 10 from the challenge. * IPCP (Internet Protocol Control Protocol) ) user and system generated r granted otherwise denied, * OSICP (OSI Control Prot IPCP configures link used to take completed in NCP protocol, the user ean yet. Once network layer config data packets from the netw' IP packet [reel ror [Fe [econ] coma] rat] re EL Figure IP datagram en ime, then access to sent «challenge value. So it is difficult for the in the system. Time 7 Sots ‘Shot: Tart Swr2 sors ‘Vurnerable time Figure Sot ALOHA Scanned with CamScanner Computer Ny sq Vulnerable time forsloted aloha Ty: throughput S,,, = 0.368. when G=1 jyce the collision by sensing y Sense Multiple Access tries t reduce the co 18 Whether the lefbusy before sending frame: sense before trans! isjon in CSMA, into CSMA/CD and CSMA/CA. jon sense the medium for idleness and transmit the fame efor the first bit to reach every station and for every station to sense it That is, station which sense the medium fin ‘another station has not yet been received. je, because the First bit sent by leads to collision, Vulnerable time = Propagation time (T,) Propagation time is the time needed by a frame to reach from one end to other end Whenever a mediun is busy or idle, station follows any one of the below approach, ‘There are three types of CSMA: -persistent COMA, Non-persistent CSMA (iii) P-persistent CSMA I-Persistent COMA senses medium is ity of 1. This approach res ium for idleness. Sense continuesly eet Medium Figure 1-Persistent coma ee is method reduces the e fome station goes to waiting stat 5, Because thee is te and some other stat Hon level compared to |-persiset COMA, chance of sation being ions with frame o send, This approach Step I= With the proba ‘eeconinvusly Busy > ae ~When medium busy, follows backoff algorithm Sendit Reeth ReP aa [eon (Rerandom number) _elsewat S, P, it sends the frame. ‘This method combines the advantages of 1 and non persistent CSMA. It reduces and improves the efficiency. used when channel is divided into time slots equal to greater than ‘imum propagation time. Whenever station senses idleness of medium, | P, station waits fr the beginning of next time slot time sot foal sy Sense Multiple Access with he station after sending the frame. vale Figure Persistent CSA Scanned with CamScanner Sent to info sznoray level of channel have thre values o-idle ‘Normal ~ Channel is free, sy file. Ser checks whether the medium is b / 1 does not receive any collision sig sends dummy dat = Send: data, 1» A sends frst bit of frame at 12 and feels idleness of medit the frame of station C and results in c ‘Abnormal - C pontcipating station must detect the energy level of cane to 4, Throughput of CSMA/CD is greater than sated Atoka. = = Asa same way at G, station C detects i jon ist4-t1 and C transt waa carrier Sense Multiple Access wit avo ‘Three strategies are adopted to avoid col Collision avoidance is suitable for wireless (i) _Interframe space (IFS) (ii) Contention Window Acknowledgements @)Interframe Space (IFS) ion sense medium is idle, it does not send immediately. Rather it waits time period called interframe space (IFS). it starts sending the frame. jons and frame types. + CSMAICD does not use acknowledgement for successful transmission. ue hhecks successful and unsuccessful transmissions Astation t ‘ops the transmission and sends jammitg ps Content Window Itis an amount of time dit to slots A station which wish to transmit chooses © Ifno collision, Tdom number of slots a: coun Sender successfully completes the transmission and rests Of sy exponential backof strategy. Number of stots changes based on yets double on next slot and so on. ; and restart from the left part, when it Difference between ALOHA and CSMA/CD first time on slot, and Whenever a medium is busy itstops the timer medium as idle. Persistence (non pers ansmission procedure, pees * In ALOHA, entire frame is in CSMAICDtransmiseg nt) 10 -persistent or p-persiste Sense transmitted and wat for an acknowledgem#at™4 and col fi ) Acknowledements tang Positive acknowl 'ssion of a frame. mer can guarantee successful AL i ‘it it tir nat sent at the begining incie Cat? CSMAICD entre frame edgement and time ou Scanned with CamScanner com wet Frame wpes: ‘wo types of eam (i) DCF interframe space (DIFS) (0 stands for istibute®) ) shor interiame space (SUES) IFS Tred with dia and maragement ame ed for ACK and CTS frames 1es are used in CSMA/CA 's whereas SIFS is Frame Exchange Time Line : Each station checks the ene with backoff until channel becom J, station wats fora period of time called DPS. Then station sends frame called RTS (Right to Stand) receives RTS and waits for a period of time called short IFS) and sends control frame called CTS (clear to send) say level of channel, Stations follow persistence strategy 1g CTS, waits for SIFS and send data, ig station, when one of the station data. NAV indicates the time to wait for the waiting station to check the stem sends RTS, other station starts NAV. On expiry of waiting station checks for the idleness of medium/ CTS, means collision of RTS from more than one station. $2 NAV (Al otherstaon (8, C& 09 Figure CSMA/CA an WAY Bach RTS has sender address, receiver address, duration to send. Juoproblems in wireless networks : CSMA/CA suffers from the following two problems. Hidden station problem i) Exposed station problem 582 Controlled Access ion takes place among the participa duce the congestion. led access, co-ordi controlled access helps ore There are three types of controlled access methods. (i Reservation based Access Token passing 5 Reservation based Access ¢ dat, fist resenes BE sent 7 ln reservation based method, a station whieh wish © then sends the data. There wit ‘ere will be N reservations mi on which wants to send data reser mini sot AY et reservation, station can pet Scanned with CamScanner Advantages : ‘+ Control of congestion © Bandwidth guarantee Disadvantages : 4+ Increase of control packets consumes bandwidth. ii) Polling the topology where one station is considered as primary station 3g station as secondary station. other secondary station. mary station collapse, then entire system gets disturbed. Polling access works under two functions, such as = + Select = Poll Select : The Select function (SEL) is used by the primary stati tnctote is 1 primary station to send data. It ine ‘address ofthe intend secondary station. It sends SEL to alert the secondary station regarding the upcoming transmission. * Secondary station, on receiving SEL, sends ACK to inform receive data, © After receiving ACK, ACK on successful 8 of data, station sends data and secondary station sends Figure Select Function used by the primary station to ak (poll sesondarydeviee, ary station polls the next secondary station. ae Isecondary station sends ACK fame. then PRR and send back ACK to intimate its reciPt reads the data frame ‘Token Passing : sing, Each station has predeessor Scanned with CamScanner ‘After the curre Toke particul is a speci Whenever a station wants to transmit ad station. ives data but has no data to rece Poltiag and Token passing follows round robin concept. Token Management : token from being destroyed or lost. 3m that can be served first and promi ‘Token can include the the type of data to be send. Physical ring Dual ring Bus ring Star ring ing : Token can be sent only to the successor in all. Other participating nodes/statoes does not known the token presence. Drawback Figure Physic fe : High speed token ‘CDDI (Copper cfioken gets the token to access the shared media. Example : Token Bus Law. fons of network is ess Poe Star ring + A hub connects the diferent station pe link taiture, Scanned with CamScanner an physical Layers } Computer: Netra signals are create ‘The signals are autom: th tthe expected ime duration, Station 1 Statin 5.8.3 Channel — In multiple access, the available resource is channelised based upon space, None fequeny and L_ coments] Example, In highways, how each and every vehicle takes different space, s time and chooses the path. (channels) ae — access is divided as follows ‘wens ee der to achieve congestion free, synchronisation must be achieved among the g channels. Like FDM and FDMA, TDM and TDMA are also no ‘einigue whereas TDMA is a multiple access method. 00, Troperties of CDMA : The codes used in edma posses the following properts sian (oo ied by If gets numberof stations 2s esult) by another) n = (Code m ‘when one code is mul the data shares common channel a8 Orthogonality - (Get zer0, Let data d and code ¢, for different stations, Station 4 103 MHz plexing) is different from FDMA (Freave™ Scanned with CamScanner Computer, as ‘Station 2 Se Sain | are | coca cameron cairaa rears cred Jeo | axce Station 3 Station 4 data = (41 .c1 + 2.62 +43 .€3 + 44.4) .€1 = d) cl cl +42.c2.cl +43.€3 01 +4404 61 =4xdl CDMA Code characteristics }) how to identity good code. (2) how to separate noise from signal. Each user has different code, such there wont be interference in the medium. A Good code should have property of - Orthogon Orthogonalty between code is established when inner product zero, rovides good auto correlation. (i<., signals separated by time, perpendicular to each other). + CDMA uses code to separate different users in a code space and to enable access toa shared medium with respect to interference. + Agood code for certain uses should have a good autocorre! orthogonal ion and should be ) (0, 0, 0). 2, 5,0) and 0,0, 17)30+0+0=0, ~ 2,4) and (-2, 3,3) = 0, 2,3)and (4,2, 6) = 4+ 4-18 ¥ 0, not orthogonal 2,3)(4,2,- 3)44+4-9=— | are almost orthogonal. =I. This code has # 6% 5000 AS fyute value of tefl ofCDMA before wo senders A and B WAN 0 send da, cpg erent HES got Key SEQUENEE. following unique and pet B=0 Key=4,= 010011 Be sender A wants to send the bit data 4, = Letuse assume "standard addi ion rule ing the key as chippi ication of the data bit with the whole Sequence (spreading refers iping sequence). in space. 7 ig interference from oth ‘he: Assuming the signals that same sens applies A's Code for de-spreadings Scanned with CamScanner Spread Aloha with Multiple Access It makes use of spread spectrum concept. ing with n devices requires programming of t decode n different codes. valuable for connection oriented services like mobi (00 complicated for typical connectionless, bursty data traffic, Joha was a very simple, connectionless scheme but coul senocaa Nar Bana senoens 2 : Ce] Sintra Soe Prod win gn Pover ll at Advantages: ) 2) Raises throughput from 18%, of collision decreases, Teeeiver tbe abe y © Phone Id only provide g ta iques includes the follow es wactee IN goals nitialisation makes the system en priorty is provided to station which naue ipeceipt provides assurance to the . Recovery enables recover from te packet ashy, os _ -econfigura Paves way add or remove stations ag er eed, Compatibility to different platforms. : «Reliability ensures failure of one system does not collapse the entre network, ETHERNET BASICS Ethemet is a type of communication protocol that i created at Xerox PARC in wiby Robert Metcalfe and others, which connects computers on a network over s indconnection. Ethemet network is used to create local area network and connect multiple computers tober devices such as printers, scanners, and so on. In wired network, thsi done ithe help of fiber optic cables, while ina wireless network its done through wireless of Ethernet Networks Fast Ethernet: As the term suggests thsi @ Fesitorreceive data at about 100 Mbps. This pe of oH 5 'sed pair or CATS cable. If a laptop, camera, or any 0 ss ofthe ink cr, they operate at 10/100Base Ethernet and 100Bas on the ies “s si ; ataneven higher yg it*bit Ethernet: This type of network ta i, 000 Mbps or 1Gbps. Gigabit speed is a” 4 i being phased out. In speed internet, and can is usually supported by \B Systems which use CATS¢ oF 0 aot Fup to $O0m, 1000Base SX Sher TRON manus Gigabit Eater! Mea git? LX for single mode systems rnnBase speeds O° "ae gas ha ean andl sing Fiber SFP mole oy ual Ne Gigabit speed on the fiber side bY . advanced and high speed wen is supported by CATES OFC! Scanned with CamScanner can be twisted pi used for data transfer from one deviee to the other, inthe pair ables, as wel as fiber optic cables. By wing a fiberoptic enbl around 10,000 meters. extended up Switch Ethernet: This type of network requires as ‘able, a normal network eable is used network. ‘Types of Ethernet Cables types Ethernet may be ether a wired or wireless network. In a wired network, variu, ‘of cables are used. Here are some widely used Ethernet cable isted pair coaxial cable. is thick twisted pair coaxial cables. sisted paire je which offers a speed of around 10 Mbp, twisted pair cable and offer a speed of 100 Mbps, iber optic protocol which offers a speed of 100 Mbps. 2 1000Base SX: Fiber optic protocol which utilizes a wavelength of 850nm for ‘© 1000Base LX: Fiber optic protocol which u Advani Disadva multimode networks. izes a wavelength of 1310 nm, for multimode networks and up to 1550nm for singlemode networks tages of Ethernet Itisnot much costly to form an Ethernet network. As compared to other syste of connecting computers, it is relatively inexpensive. data sect Also, the Gigabitnetwork allows the users to transmit data ata speed of i In this network, the quality ofthe data In this network, admi The latest version of gigabit ethernet and wireless ethernet have the Pot to transmit data atthe speed of 1-100Gbps, intages of Ethernet Itneeds determi time applications, jc Service; therfore, i isnot considered te best Or" ‘and Physical Layers 5 wt the wired Ethernet network re + for using in short iryou create a wired ethernet ne + they increase the cost work that, Dn, Needs cables hubs, switches, utes, pata needs quick transf erative spat Pal plain, 8 well as datas very In ethernet network, any acknowled es 8 iotsenby receiver er accepings Ifyou are planning to set up a wireless Et you have no experience inthe network fel no ean be i 4 Comparing with the wired Ethemet etnork wits networks not more secu «The full-duplex data communication mode is not supported bythe 100Bas. ‘T4 version. inding a problem is very diffi not easy to determine which node 510 WIRELESS LAN (LOCAL AREA NETWORK) Local Area Network is designed to suppor limited geographic area such as building cecampus. IEEE 802 set standards to enable interconnection among the components of diferent ‘minufacturers. in an Ethemet network (if s causing the problem. Tn wired LAN. I is also sed Ethernet is a technology mostly used in wired LAN. Its sls 8 wireless LAN, ded data link layer into two sublayer LLC and As familiar earlier, IEEE802 subdivi Mac, UC handles + framing + flow control + error control * provides control protocols fo NAC handles all IEEE LAN * random access controlled access channelisation Scanned with CamScanner Ss EERE REIESEaS STRESS a vere Evolution aS] [aeons] [16s] [estos See | Pres] | aaa | | ToGaabr Saneet | | ereme_| Lenenet_| | eter Fig. Types of Ethernet Figure Wired Ethernet yo1 Standard Ethernet emet technology of 1OMbps is termed as standard Ei puters to form a LAN via a protocol, Ethernet is a approach to connect A computer network interface card unique address. An ethernet cable connect NIC to cent Ethemet is a wired LAN technology. It includes advantages such as : '* Noradio wave interference. of network security. forthe external intruders to gain access to the network, ‘The frames to be sent into the network is independent. No concem of oe Frames hhas no phases like connection establishment and termination sn be resolved by he conneetiontess it may sur fom pocket op. tea bereaved BY of acknowledgement. sible probability range of packet P+ DTE : These are the end devices that convert user i i le due to the pos eee convert user i i 0) be equipment interconnected with network or user, maton Osama oa Timi sn DCE : These are the intermediate devices that forward the frames, It may be switche’ — routers and so on. Preamble Toy —, Pat offrame Pha ayer ar ences Scanned with CamScanner Compe Hey Torecoming frame and enables ing we pie inning tte ets 16. Sine Ethemet ag 5 a 5 Jn station, Receiver on seeing its own & ind passes the data t0 the next pay £ = 3 : Grandard Ethernet use coaxial eable for bus 2 In contains link layer address of the sender. pair cable for star topology. rs opcogy and vst 5 Type: 3 It specifies the type of protocol encapsulated in payload. of rec ‘equals zero, then the receiver discards the frame. «In broadcast transmission, all stations receive the frame. Frame length : Access Methods = Min and max frame length is 64 b indard Eth CSMAVCD with persistent approach as modium access d 1 length is 64 bytes to 15 = thernet uses er Iength is 46 bytes to 1500 bytes, HB nts. Min and max at works under the below seenerios s length includes header, tans header, trailer, sonue and destination address, type and CRC. , 1B sain ast check iebo an Each patticipating device in ih bythe energy level ofthe me ce in a Ethernet network has i ¢ NIC. Ethernet MAC addvesslooke He t network has its own network interface card idle and station can start sending frame, 3A:40.20:2 currently in use by other station. end frame continuously monitor Een net grammes received bY Ej need to send and data for erei8 Work staton ——l Computer * Netvey an? for 185 meters length, to fase T ~ for unshielded twisted pur ctl of maxim - yo Base F —for Aber optic able of 2000 meueg en Om ater Encoding / Decoding wa opase T Ethernet uses manchester encoding, thm used in compute network td sally encode decode technique by kepin databit lengths ed. on and itor ight low tansmison ing synchronisation isthe advantage ofthis technique + alert regarding congestion. K is the number of attempts made by the station to send data. After each time station creates a random number that increase exponentially. jon, K = 1, random numbers are 0, 1 tOMbs data jon, K=3, random numbers are 01,234,567 and soon, Siaion a hi ick. Sis thick RG-8 coaxial Iso known as thick ethernet or thicknet. Since it uses ethernet. Itis connected using AUT: Only 10 Base 5 use extemal Effciency=- (area) le. Where [between NIC and ethernet reception of dl signals and cllsion detection i ission, The transeiver enables transmi ore han $O0m can be te must not exceed above 500m. M Maximum length of cable 5.10.2 Different Standards / Types of Ethernet using repeaters. © 10BaseX— Data rate 10 Mbps ing to remeber in 2. Important Iso referred as thin etheret oF cheaperms! ‘themet coax wire is 5 4~ 3 rule. Use either thick/ thin coaxial cable 3 segment Use Manchester Encod by 4 repeaters 10 Ft a 5.4.3 is 5 cable segments, comested TN Conga eomme Base means baseband si Son tor The BNC (B2Y"" ogy. Transe seband sign ested using BNC connector. The works on bus 170 to connect/disconnect for ¢ X - defines maximum cal PS OFNIC, installed inside the stat Scanned with CamScanner “0 COMP Here [once] , somes | Lsasm Baseband ' Thin coaxial cable, coe) maximum length 185 m the currently used fastest form of eh nn gory 5) ethernet network ct networks. ‘© less expensive than thick coaxial pt ook odin oF fast EtHETNEL 925 Bad onthe owing aay, is simple and flexible Disadvantage : Bridged Ethernet '* length greater than 185m results in high attenuation, ' 10 Base—T ‘Maximum length Example if 10 Mbs shared between 6 sations ina network. But separate 10Mps (00m for sending in one will be provided to the network which has 3 station separated by bridge. Ths way (half dup! is data moves only in paves way for increased bandwidth. one direction BEERS Pair of twisted pair cable Without Brege a 22 100 Base Tx : is known as fast ethernet. It provides d oa cnown as fast It provides data transfer at th HOmegabits second. It runs over multimode fiber. ere ae 10 Base F : * Reduced Collision pared with the 200° tis aso referred as Fiber ethernet. I makes use of by Fr is fast ee ethernet over fiber. work Collision greatly reduced in the bridged net Drawbacks : rans. allows faster data * Supports low data rate, tert pthe com ‘ "paves way for N networks connected — Cabling is expensive, ————s—séd _ lilt... Scanned with CamScanner LOSS Neto, =e e@ Domain Domain ‘Démain + Full Duplex Ethernet Domain 10 Base 5, 10 Base 2 provides only half duplex communication duplex switched ethernet improves the capacity of domain from 1 No need of CSMA/CD (one way), Fu 0 t0 20 Mbps, Since each stations in to send and one to recei layer is simple. 2 — Receive luplex switched network is cor ‘The carrier sensing and col ted via two links, one n detection of MAC + MAC control layer Since standard ethernet wor expected from recei new MAC control ks on connectionless to send data from sender side) Protocol. (No prior permi o to provide flow and error cont designed between LLC and MAC sublayers. 5.11 FAST ETHERNET (IEEE 802.3u) It uses different number of cables, © 100 Base -Fx — Uses 2 opt — Cable length - 412m for halfduplex ~ 2000m for full duplex 09 Base —'* VES UNshicled twigey air cay MAXIMUM cable length ao 100m, yoo Base 72 — Uses vo pais orp — Cable Cats ~ maximum cbt lengths tom yo0 Base T4 Uses four pairs of utp ~ Cable CATs ~_ maximum cable lengths 1009, ‘The main goals of fast ethernet are: «Compatible with standard intemet. © Maximum delay for signal is less, Supports data rate of 100Mbps. «Increase in data transfer. «No 5-4-3 rule in fast ethernet. Access Method : Normally CSMAJCD performance based upon : © minimum frame size jum network length (propagation speed) Fast ethernet tries to achieve the above using 2 approaches i Io ‘© Adapt to star topology instead of bus topology. * Use of link layer switch to ree make the transmission medi to point medium. Feature added to fast ethernet. pew fet ‘Autonegotiation is 8 sone another * incompatible devices to connec to have multiple capabilites jieation to during fll duplex communication ie) Use of shared medium 3 it Scanned with CamScanner Physical layer supports data transfe th hub or switch at the centre. It adopts either star topology Use different Manchester encoding for different ethernet such as 100 Base~Tx, 1) Base Fx and 100 Base TA, 7 100 Base-Tx makes use of two pairs oftwisted pair cable. All 100Mbps rated cables except 100Base Fx use CATS ea 100 Base-Tx/T4 — works for 100 Mb ~ Uses Unshielded twisted pair ~ CATS UTP have 4 pair of cables. 100 Base Fx ~ works for 100 Mbps, uses fiber optic cable. © MLT3~ encoding is mul is aptiabe ; imum Length of frame as S12 ig © SOM aos in ne level transmit that uses three voltage level ‘*NRZ (non return to zero) refers to form of level is maint iaframe bursting ¢ was proposed to overcome redundancy in small bursty of dt, adn is done to Long sequence of 0's or I's creates problem at receiver side due to clock synchronization problem Fast ethernet is the version of ethernet, that enables transmission off dala over Itcan use point o pointor star topology. ited than fast ethernet. 100 mega bits per second on Local Area Networks. (LAN) more compl oe . 5.12 GIGABIT ETHERNET + Two-wire — 1000Base - Sx (Short wave) hata ae Ags Higher data rate than fast ethernet, Goal of Gigabit ethernet is to upgrade 1000 Base - Lx (Long wave) wy ata rate to bl) nena © Four-wire = oropae-5 casi atures : ern © Data rate to 1Gbps. it makes use of Manchester encoding a {ocips data rat. tis signed fo 2 10 Gigabet Ethernet — is designed 10 S977 an = ase BW 2 a dress as fast ethernet a se LR, 10 10 Gbase-SR, 10 Obes + Same frame format, frame length and auto nego MAC sublayer : Four implementations are Chase 4 Scanned with CamScanner Computer Netwoy 556, ks SS emt Neg ference between fast ethernet and Gigabit ethernet Parameters thernet Speed TOON pS Delay More Tess [Configuration Simple Complex Distance 10Km 70K RTT (Round Trip delay} 100-500 i 4000 bit times [Comparison Fast than 10 Base-T | A successor of Fast | Ethernet is used with gigabit router to allow LAN greater than fast ethernet. speed ion free network.) 5.13 WIRELESS LOCAL AREA NETWORK (W-LAN) A wired loc al wired connection are faster than rea network makes use of eables to connect stations to form a network, A Wireless network connects devices wirelessly and remains stay connected tothe network. 5.13.1 Introduction Comparison between wired and wirelsss network, + Wired network uses cables to connect network uses air as medium to transport s © Toacces: whereas internet, ferent temet, host must connect through NIC (Network wireless network host neednot be physi ol s LAN in wired network ich, to form a network. Isolated LAN in wireless n freely with one another. + One wired LAN ean be connected to other in LA LAN to other wireless or wired and vice verse ls between different stations. terface Card), ly connected to the {is where group of computers connected via 'tworkisadhoc network where computers connected IN and in same way one wireless =} 9 Wired LAN (Isolated) an PI ysical Layers wired LAN (Isolated) Figure [A device or a network can be connested ao ‘Wireless LAN (Adhoe) 0 thes device or network though a interface or device called Acces Poin (ap) Wired network astructure based network, whereas witless etwork may be infrastructure based or infrastructures in terms of athoe eon 7 AN being wired or BP. Wired internet connection Link layer address change! Network layer address ladts of wireless networks : @ Convenience : Ot any + Based upon ""¢leristics of wireless network? Multipath propagation. Interference can be high: i in comnecte + User can mobile and remain connect Can improve product at comfortable less operates onthe two lower level layers of TCP / by changing NIC. remain same. in nature. May connect to network at anywhere, x tothe network. by working at comfortable place acd, eon ie an Ow Frith Scanned with CamScanner \d configu ta Link and Physical Layers pat 5.13.2 IEEE 802,17 ‘# SNR (Signal t0 N« ‘Access Control oe In wired network, CSMA/CD works in two Ways elec antiAN a189 Fefered as wireless ethemet, whereas IEEE 02. 's wireless fidelity. == Architecture of WLAN, ) and extended service set (ESS), form a network. fone another without infrast ted to form a network isc elessly each other to In wireless network, CSMA/CD does not work due to tructure is termed as Adhoe led Basic Service Set. ess network which works with battery may feet qj Scanned with CamScanner eu '* Due to hidden and exposed terminal problem, e diffe OM detection '¢ Signal fading also be a big problem for the distant network. devices connected with one another wireless Point (AP) called infrastructure BSS. ly with an intermediate device, access A terminal probiem, 'ee of one an, her. Now C wishes to tats n and assumes entire path is busy and called exposed terminal proble™ formed by mobil stations (mobile phones LOPS =.) and stationary ). There are ree types of Stations based on mat eee frastructure based IEEE 80211: (STA) are connected to access points (AP). are terminals with access mechanisms to the wireless range of BSS, ‘The distribution network connects the wine ed to separate dierent networks. lessnetork by acespin witha ‘¢ Stations and AP with same radio coverage ‘¢ This network altogether termed as extended service set (ESS). Scanned with CamScanner = Computer Networs 5.13.4 Protocol Architecture Mobile Terminal 2 Infra stucture network 802.3 MAC. 802.3 PHY Wired Fibre optic layer is subdivided i Layer Convergence Protocol (PLCP). — Physical Medium Dependent Sublayer (PMD). AC layer comprise medium access, fragmentation of user data and encryption. PLCP sublayer provides a carrier sense signal, called clear channel assessment transmission technology. PMD sublayer handles modu MAC management supports the association and re-asso access point and roaming between different access poin ication mechanisms power management toa ate soy it, sks of PHY Manageme Cont of brid Ey Hon with regard $0 an ap Chanel Tain, Sfarbuted software i cas ofan AP, nd nteraction withthe Luc oe MAC | MACMgnt | Sh Mgnt PLCP HY Mgt PHY [pup MACsublayer : IEEE 802.11 defines two sublayers (Distributed Co-ordination Furetion (OCD) Point Co-ordination Function PCP) Distibuted Co-ordination Fusetie (OCP) tanec cachangt dnt DCF uses CSMAVCA for accesing 0 UPS" ‘ommunication process. (i) Data Frame a jets condition ') Control Frame sees ci check ae * Before sending data, station nto . 4s for some peed 'S) nteframe Spee OFS) — | Scanned with CamScanner After DIFS, station sends control frame. The control frat to send (RTS), ci 2 On receiving RTS, receiver . 1@ CTS, sender waits for SIFS and sends data frame, for i data frame, receiver for the frame received. + Collision Avoidance (CA) is achieved by a feature called Network Allocation Vector(NAV), and sends acknowledgeme Fesides ta poi soso evork, Point, Access Point (AP) tn eoe AP waits for PIFs duration then DiFs dur ‘+ When a station sends RTS, it include the du = = is RTS, starts a timer called NAV. The station must check the e ir, before checking the channel idleness for the ne: DFS support = Asynchronous data transmission = Use CSMAICA protocol. Works on random back-off mechanism. © RTS or CTS control frames transition When collision occurs during RTS tran: CTS so sender goes on backoff strategy. 30 referred as Handshaking Period ion, then sender does not receive PCF support = Supports both realtime & asynchronous data transmission. 1g method, controlled by AP. + Supports time bounded service. = Use p Follows simple round robin or priority based scheme, SiFS ontetion perio CP) thaw sin BSS set NAV and do aot sen ts ds Ap (Acees Poi n uses DCF and PCF, prortyis si" one "NAV (Al other station (B, C & D)] come this Too © Hidden terminal problem DS doesnot ase that use only © ats “ i implemented. : —@e, ith a spel crs “or © a tepetition interval is repeated Wil me, Scanned with CamScanner ‘nd Physical Layers ee broadeast maw ‘Time-Bounded Service ona = Supports packet exchan, ‘ean be given for Xm, asic Mechanisms by IEEE ap.) CSMA/CA. Computer Networg At the end of contention free period, PC sends CF end frame to allow cony based stations to use the medium. performed to divide large fran ied ony, 8 © smaller ones, Dugg asy to send small frame than larger one. + MAC layer frame consists of nine fields as shown below : 270% 2tyey ayes | eves _| ote YR EYEE 01029126, syn Fo | D [Address 1]address 2 Address 3] $C [Address 4] Frame body Fes] rower Tare Mgmt | data | WEP) Revd | 1b 18 Tbe Tea iid Yos Yes Wred_esened ‘Sotto Sette iequnalnt MAC mechanisms are als cal (DFWMAC). ‘Three different parameters of medium cen: Medium Busy led istbton foundation wi Pray Contention (Here, several nodes ty to sces the edie orp u ry 7 Next frame. Values of above parameters ae define i Figure MAC layer frame IEEE802.11 Slot Time is derived from: Frame control: Stores control Information, . D + Duration of transmission ‘© Transmitter delay. i ae 20 pS for DSSS. he Address + Value of To Ds aid from Ds * Slot time is 50 ps for FMSS and oa Sequence Control: Defines sequence number, OFS S Frame body + Information on type 2 subtype (1O11-RTS, 1100-CTS, 1101+ ¥ aaa ACK) of FC Cod Fcs + Error detection sequences Meson Medium Access Control Layer \ cess Its tasks:~ controls medium access os fee> OFS sanetane SEH a ~ supports roaming, authentication, power conservation. Fig, : Medium AceS® SUFS: Short Inter-frame spacine! pedivm access (© ‘The shortest waiting time fo Gi) Highest propety Support broadcast and m Scanned with CamScanner medium is busy. a Computer Networks 11H je have to Wait for the d = SBS Node ha luration of py ww ta packets HFS, Defined for short control messages such as ack Packet D Inerwards. meting a contention phase or polling responses. zach node ROW chooses a random bck . ; ie wi = For DSSS SIFS is 10 8. 2) a lays medium aces frye etn leceaecroeae ce comes os6 be masse PCF inter-frame sp ): (PCFIES) 3p The me se ed. Whe ne sess te chau , ext chance, Medium prio trade again for atleast DIFS, Bat ithenea . a A is . But, ifthe randomized, ) Waiting time between DIFS and SIFS is used fora time-bounded service, fora node is over and the medium oa = Anaccess point polling other nodes only has to work PIFS for medium access. i , is, additional randomly distributed dea telps to ao i) PIFS is defined as SIFs plus one slot time. This, a ays helps to avoid DCF inter-frame spacing. DLF IFS (DLFS) pindvanvages =] gach node waited already for resmission, takes same changes for tpasmitting data in the next cycle. 1, Itdenotes longest waiting time. access. 2. Lowest priority for mi 3. Th ing time is used for asynchronous data service contention period. 4. DIFS is defined as SIFS plus two slot times. (Basic DEWMAC-DCF using CSMA/CA: used to check whether the medium: 2.11 by backoff timer. . le or busy. . the mandatory access mechanism of IEEE 802, Ifthe medi He for at the least the duration of DIFS, a node can access the medium at once. # Italso short access delays under light load. _ et (Randonzed ct! Inet ors i " [ ‘Medium busy: Next frame Li feral aes | od, medium is free > DIFS aoe Figure Contention Window and Watng Tine i Scanned with CamScanner 381 pata Link and Physical Layers pata inkand Physteatayers sat \ecess to the medium ‘© hence no residual back of t time for station 2, hence ge first. Methods avoiding Hidden Terminals-DFWMAC-DCF with RTS/CTS on tension? Computer Het eS In Backoft Timer nd, ach node sel a backoff timer. waits res, the node accesses ‘As soon as the counter eX?! transmission not being sensed by other terminal, fhe other terminal also tries to transmit, there: we waited Fonger have Insucha ‘only forthe remainder of hat at the receiver in the middle. os, 4 OFF [a ee For taking care of this problem, IEEE 802.11 specifies ad t the form introduction of two control packets, namely RTS and CTS. 4 ‘Though the use of this feature nal, every terminal must be prepared to take 7 care upon receipt of RTS/CTS packet : cred aT] The following figure shows the use of RTS and CTS. $1 =e] [bony ta [or] ce el fy 7 ‘Sender = Is sense voe 24) meena Bracers atuas [Gor] iatosccor ine asic DFWIAC-OCF with several competing senders The above figure explains basic access mechanism for IEEE 802.11 for five stations trying to senda packet Received 3 has first access from higher layer to send a packet. NAVIRTST n senses the medium, waits for DIFS, and access medium. (i.e. sends 7 Or NAV (CTS) . 5 Statons 1¢ medium is idle for DIFS again fit Defer access > Now, the window and ‘Afte waiting for right to access the medium, the sender issues a request to send (RTS) cor RTS packet contains information about the receiver of the data transmi ‘ely to take place later and intended duration of the transmi ‘makes use of NAV (Net Allocation Vector). > Figure s Scanned with CamScanner Pigs lai can try medium access in -don't have AP-S0 ca" Note: Adho A Note: Ad! frame periods. CPeslits Access time into super sists of: ‘Superftame period consist ne priad contention period ! wi 10, contention free period start, ther station acce: a aeimean the star of sper fame is delayed, Start frame allows sends deta to station hearing SIPS rather than Pigs, es mechanisms like CSMA/CA Att end cosrdinator sens an end marker (CF end) to indicate the end contention free period. Afier this contention period starts again, set in other st = ys ae se [pate [ om | TP Frome Tak Three Types of Frames: Conte Frame (rlable delivery of data frame} Data Frame [cary pay load data, Management Frame, MAC Managements "nth tag 7 53: ee eee Synchronize = Power Management = Roaming = Management Information Base. ‘Addressing mechanism ; Addressing can be classified in 4 different on FC field. 5 [CasE]fo DS[From DS[_Addr 1 Addr2_ [| Addr3 [ Adar oof o | 0 [Dest Sre sss1p> | Na orf o 1 [Dest ‘Sending AP | Sre NA lo} 1 0 [Receiving AP| Sre Dest NA 1 1 | Receiving AP | Sending AP | Dest Sre Physical layer : It works on the techniques. + _ FHSS (Frequency Hopping Spread Spectrum) = DSSS (Direct Sequence Spread Spectrum) - OFDM (Orthogonal Frequency Division Multiplexing) + Infrared K contains 3 different physical layer: + one for infrared transmission = two for radio transmission, * provides clear channel assessment signal (CCA), needed by MAC mechanisms which controls medium access and indicates if the medium is currently idle. 1) Frequency Hopping Spread Spectrum (FHSS): It is a spread spectrum technique, allows co-existence of multiple networks in the same area by Separating different networks using diferent hopping sequences (pattern of channel usage called hopping sequence). The selection of particular channel is patter 'sachieved by using a pseudo-random hopping Scanned with CamScanner uc header oe 4st Todor pat ol rip. Format of an 602.11 PAY ame uag FUSS Frame consists of to parts: PLCP Part (Preamble and header). Provides frame synchronization, PLCP-PDU Length Word (PLW): Includes length of paylo bytes includes CRC, ranges between 0 and 4/5. * Header Error Cheek (HEC): PLCP header is protected by a 16 bit Checksum with the standard ITU-T generator Polynomial GO =XOR BHT read Spectrum: Alternative method of spread vating by code and not by frequency. DSSS, sprea ‘tum mounted separ Schieved using 11-Chip Barker #4" in unk and Physlea Layers 11 uses Differential Quadrature Phase Shift Keyin ion schemes. ‘ying (DQPSK) for 2 M bit/s as Its frame consists of 2 parts: PLCP Part (Preamble and header) Payload Part, ‘Synchronizat 128 bits 16-1 jeld used for sync. at the beginning of frame. Only 2 values have been identified for this field to indicate the data rate of the payload. Service: IEEE 802.11 complaint frame. ‘© Length: 16 bits used for length indication of the payload in microseconds. + Header Error Cheek (HEC): 128 we 8 818 atoits Syrehronizaton SFO Service }iengt) HEC | Payload SS PLCP preamble PLCP header Fi Infra Red: Makes use of near visible light at 850-950 nm. Format of an IEEE 802.11 PHY frame using DSSS Scanned with CamScanner gota Link and Physical Layers 13.5 IEEE 802.11 Se, mull Allows for point 0 jon is 10 m. Maximum range of transmission Scanned with CamScanner reney i simple. = Rewuse of frequency sn siciaiion TEEE | Technique i fiz |[FSK 802.11 FHSS 24-48 GH _ Dsss 24-48GH2 {PS None Infrared PPM OFDM | S7-58GH2z_ [PSK or QAM DSSS 2448GHz [PSK OFDM [24-48GHz_ [Different OFDM | 5.7-S8GHz {Different — FHSS is Frequency Hopping Spread Spectrum method used to transmit radio sigl, by using pseudo random sequence known to both sender and receiver, DSSS is Direct Sequence Spread Spectrum method uses pseudo noise to change the phase, IEEE 802.11 Services: 1) _ The service provider can be either the station of the distributed system. FHSS changes frequency being used, while DHSS change the phase FHSS easier to synchronise than DSSS. DSSS is used in 2» Positioning system while FHSS does not. first3 services are used to control [EEE Other 6 services are used to support deli MAC service data units (MSDU). So SNo.__ Service ‘Provider Used to Support Z ne area \ uted system MSDU delivery of OFDM is Orthogonal frequency division m modi plexing method used for isle data stream to several narrowband signi terference. 7 F frequency modulation scheme where digital signs LAN access and security tensed through discrete frequency. H LAN access and security signal changes. (ex) . enn jon System MSDU delivery ibuted System MsDU uted System MsDU ls co : ; Pulse in on ofrequing sage bts ae encoded by transmiting St MSDU Delivery MSDU delivery tied time shits, AM is Quadatre Amp Privacy LAN access and security de Modulation that combines two AM signals10s# Distributed System MSDU delivery. channel 0 double the bandwidth, Re-association

You might also like