The Medium Access Control Sublayer Chapter 4. The Channel Allocation Problem Static Channel Allocation in LANs and MANs Dynamic Channel Allocation in.

Slides:



Advertisements
Similar presentations
The Medium Access Control Sublayer
Advertisements

Medium Access Control Sublayer Chapter 4 CN5E by Tanenbaum & Wetherall, © Pearson Education-Prentice Hall and D. Wetherall, 2011 Channel Allocation Problem.
Topic 7 Local Area Networks (LAN)
Data link layer -- June Data link layer Computer Networks.
Bridging. Bridge Functions To extend size of LANs either geographically or in terms number of users. − Protocols that include collisions can be performed.
CSC 450/550 Part 3: The Medium Access Control Sublayer More Contents on the Engineering Side of Ethernet.
Wireless Networks.
1 Version 3 Module 8 Ethernet Switching. 2 Version 3 Ethernet Switching Ethernet is a shared media –One node can transmit data at a time More nodes increases.
Data Link Layer Switching
The Protocol Stack Part of the protocol stack.
16 February 2003 TU/e Computer Science, System Architecture and Networking 1 Communication media Thanks to A. Tanenbaum.
1 25\10\2010 Unit-V Connecting LANs Unit – 5 Connecting DevicesConnecting Devices Backbone NetworksBackbone Networks Virtual LANsVirtual LANs.
1 Chapter 5 The Medium Access Sublayer. 2 Chapter 5 The Medium Access Layer 5.1 The Channel Allocation problem - Static and dynamic channel allocation.
DataLink Layer1 Ethernet Technologies: 10Base2 10: 10Mbps; 2: 200 meters (actual is 185m) max distance between any two nodes without repeaters thin coaxial.
Connecting LANs, Backbone Networks, and Virtual LANs
CS 453 Computer Networks Lecture 17 Medium Access Control Sublayer Bluetooth, Switching and VLAN.
Infrastructure de Communications – CR 4107Chapter 41 The Medium Access Control Sublayer Chapter 4.
Chapter 6 High-Speed LANs Chapter 6 High-Speed LANs.
1 Token Passing: IEEE802.5 standard  4 Mbps  maximum token holding time: 10 ms, limiting packet length  packet (token, data) format:  SD, ED mark start,
Chapter 5 outline 5.1 Introduction and services
Computer Networks 1 (Mạng Máy Tính 1)
Overview of Wireless LANs Use wireless transmission medium Issues of high prices, low data rates, occupational safety concerns, & licensing requirements.
Medium Access Control. Channel Allocation Static channel allocation in LANs and MANs FDMA, TDMA, CDMA Dynamic channel allocation in LANs and MANs MAC.
CMPE 150 – Winter 2009 Lecture 9 February 3, 2009 P.E. Mantey.
WIRELESS LANs BLUETOOTH.
Bluetooth Background Ericsson, IBM, Intel, Nokia, and Toshiba
Computer Networks NYUS FCSIT Spring 2008 Igor TRAJKOVSKI, Ph.D. Associate Professor
CSMA with Collision Detection CSMA/CD can be in one of three states: contention, transmission, or idle.
The Medium Access Control Sublayer Chapter 4. The Channel Allocation Problem Static Channel Allocation in LANs and MANs Dynamic Channel Allocation in.
The Medium Access Control Sublayer طبقة ولوج الوسط الجزئية Chapter 4.
The Medium Access Control Sublayer Chapter 4 10/1/2015www.noteshit.com1.
15.1 Chapter 15 Connecting LANs, Backbone Networks, and Virtual LANs Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or.
14.1 Chapter 14 Wireless LANs Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
10/18/2007 EETS Bluetooth Bluetooth Architecture Bluetooth Applications The Bluetooth Protocol Stack The Bluetooth Radio Layer The Bluetooth Baseband.
Token Passing: IEEE802.5 standard  4 Mbps  maximum token holding time: 10 ms, limiting packet length  packet (token, data) format:  SD, ED mark start,
Bridging. Bridge Functions To extend size of LANs either geographically or in terms number of users. − Protocols that include collisions can be performed.
The Medium Access Control Sublayer Chapter 4. The Channel Allocation Problem Static Channel Allocation Dynamic Channel Allocation  Delay for the divided.
Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011 The Medium Access Control Sublayer Chapter.
ICOM 6115©Manuel Rodriguez-Martinez ICOM 6115 – Computer Networks and the WWW Manuel Rodriguez-Martinez, Ph.D. Lecture 19.
Review: –Ethernet What is the MAC protocol in Ethernet? –CSMA/CD –Binary exponential backoff Is there any relationship between the minimum frame size and.
1 Kyung Hee University Chapter 15 Connecting LANs, Backbone Networks, and Virtual LANs.
The Medium Access Control Sublayer Chapter 4. The Channel Allocation Problem Static Channel Allocation in LANs and MANs Dynamic Channel Allocation in.
15.1 Chapter 15 Connecting LANs, Backbone Networks, and Virtual LANs Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or.
Chi-Cheng Lin, Winona State University CS 313 Introduction to Computer Networking & Telecommunication Local Area Networks.
The Medium Access Control Sublayer Chapter 4. The Channel Allocation Problem Static Channel Allocation in LANs and MANs Dynamic Channel Allocation in.
Computer Networks 15-1 Chapter 15. Connecting LANs, Backbone Networks, and Virtual LANs 15.1 Connecting devices 15.2 Backbone networks 15.3 Virtual LANs.
CEN 4500 Data Communications Instructor: S. Masoud Sadjadi sadjadi At cs Dot fiu Dot edu Chapter 4: The Medium.
The Medium Access Control Sublayer Chapter 4 12/13/2015www.ishuchita.com1.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Chapter 16 Connecting LANs, Backbone Networks, and Virtual LANs.
Chapter 16 Connecting LANs, Backbone Networks, and Virtual LANs
Ch. 15 Connecting LANs.
The Medium Access Control Sublayer Chapter 4. The Channel Allocation Problem Static Channel Allocation in LANs and MANs Dynamic Channel Allocation in.
The Medium Access Control Sublayer Chapter
15.1 Chapter 15 Connecting LANs, Backbone Networks, and Virtual LANs Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or.
Wireless LAN Requirements (1) Same as any LAN – High capacity, short distances, full connectivity, broadcast capability Throughput: – efficient use wireless.
The Medium Access Control Sublayer
The Medium Access Control (MAC) Sublayer. The Channel Allocation Problem Static Channel Allocation in LANs and MANs Dynamic Channel Allocation in LANs.
THE MEDIUM ACCESS CONTROL SUBLAYER 4.1 THE CHANNEL ALLOCATION PROBLEM 4.2 MULTIPLE ACCESS PROTOCOLS.
Wireless LAN Protocols This talk is based on the course: CPSC Networks and Distributed Processing Spring2006/
Wireless LAN Protocols This talk is based on the course: CPSC Networks and Distributed Processing Spring2006/
The Data Link Layer Chapter
Part III. Data Link Layer
The Medium Access Control Sublayer
Chapter 4 Data Link Layer Switching
The Medium Access Control Sublayer
The Medium Access Control Sublayer
The Medium Access Control (MAC) Sublayer
Chapter 16 Connecting LANs, Backbone Networks, and Virtual LANs
NTHU CS5421 Cloud Computing
Chapter 15. Connecting Devices
Presentation transcript:

The Medium Access Control Sublayer Chapter 4

The Channel Allocation Problem Static Channel Allocation in LANs and MANs Dynamic Channel Allocation in LANs and MANs

Station Model. Single Channel Assumption. Collision Assumption. (a) Continuous Time. (b) Slotted Time. (a) Carrier Sense. (b) No Carrier Sense.

Multiple Access Protocols ALOHA Carrier Sense Multiple Access Protocols Collision-Free Protocols Limited-Contention Protocols Wireless LAN Protocols Wavelength Division Multiple Access Protocols Broadband Wireless VLANS/Bridge Spanning Tree

Wavelength Division Multiple Access Protocols Wavelength division multiple access.

Wireless LAN Protocols A wireless LAN. (a) A transmitting. (b) B transmitting.

Wireless LAN Protocols (2) The MACA protocol. (a) A sending an RTS to B. (b) B responding with a CTS to A.

Gigabit Ethernet (a) A two-station Ethernet. (b) A multistation Ethernet.

Gigabit Ethernet (2) Gigabit Ethernet cabling.

IEEE 802.2: Logical Link Control (a) Position of LLC. (b) Protocol formats.

Wireless LANs The Protocol Stack The Physical Layer The MAC Sublayer Protocol The Frame Structure Services

The Protocol Stack Part of the protocol stack.

The MAC Sublayer Protocol (a) The hidden station problem. (b) The exposed station problem.

The MAC Sublayer Protocol (2) The use of virtual channel sensing using CSMA/CA.

The MAC Sublayer Protocol (3) A fragment burst.

Broadband Wireless Comparison of and (and radio telephony Design goals are very different! Fixed vs mobile, antenna, radio cost, distance, sectoring, traffic/QoS The Protocol Stack The Physical Layer The MAC Sublayer Protocol The Frame Structure

The Protocol Stack The Protocol Stack. OFDM in 2GHz and 5 GHz

The Physical Layer The transmission environment.

The Physical Layer (2) Frames and time slots for time division duplexing.

The MAC Sublayer Protocol Service Classes Constant bit rate service Real-time variable bit rate service Non-real-time variable bit rate service Best efforts service

The Frame Structure (a) A generic frame. (b) A bandwidth request frame.

Bluetooth Bluetooth Architecture Bluetooth Applications The Bluetooth Protocol Stack The Bluetooth Radio Layer The Bluetooth Baseband Layer The Bluetooth L2CAP Layer The Bluetooth Frame Structure

Bluetooth Architecture Two piconets can be connected to form a scatternet.

Bluetooth Applications The Bluetooth profiles.

The Bluetooth Protocol Stack The version of the Bluetooth protocol architecture.

The Bluetooth Frame Structure A typical Bluetooth data frame.

Data Link Layer Switching Bridges from 802.x to 802.y Local Internetworking Spanning Tree Bridges Remote Bridges Repeaters, Hubs, Bridges, Switches, Routers, Gateways Virtual LANs

Data Link Layer Switching Multiple LANs connected by a backbone to handle a total load higher than the capacity of a single LAN.

Bridges from 802.x to 802.y Operation of a LAN bridge from to

Bridges from 802.x to 802.y (2) The IEEE 802 frame formats. The drawing is not to scale.

Local Internetworking A configuration with four LANs and two bridges.

Spanning Tree Bridges Two parallel transparent bridges. Problem of Packet forwarding loops with multiple bridges

Spanning Tree Bridges (2) (a) Interconnected LANs. (b) A spanning tree covering the LANs. The dotted lines are not part of the spanning tree.

IEEE 802.1D Algorithm due to Pearlman et al to construct spanning tree in a distributed manner.

IEEE 802.1D Basic ideas Node with least id becomes root For a given lan, bridge/port with least cost on path to root becomes the designated active bridge, all others are passive Bridges broadcast configuration BPDUs with id of self, id of presumed root, cost to root. Each bridges starts by believing it is root. If you get superior information on your presumed root path, forward downstream If you get inferior information, reply with yours

Remote Bridges Remote bridges can be used to interconnect distant LANs.

Repeaters, Hubs, Bridges, Switches, Routers and Gateways (a) Which device is in which layer. (b) Frames, packets, and headers.

Repeaters, Hubs, Bridges, Switches, Routers and Gateways (2) (a) A hub. (b) A bridge. (c) a switch.

Virtual LANs A building with centralized wiring using hubs and a switch.

Why VLANs if everything interconnects? LAN represents organizational hierarchy rather than geography Security Traffic Load/separation (research vs production) Limiting Broadcasts Legitimate (i.e ARP) Storms Do “rewiring” in software

Virtual LANs (2) (a) Four physical LANs organized into two VLANs, gray and white, by two bridges. (b) The same 15 machines organized into two VLANs by switches.

Grouping into VLANs Port level mapping All machines on a port must be on the same VLAN – OK with completely switched networks. MAC level mapping What if “docks” are used with notebooks IP level mapping Violates layering

802.1q issues Can we identify the VLAN in the frame header Easy to do for new protocols, define a new header field What to do with (Old/Fast/Giga) Ethernet, which has no “free” header fields and max size frames ? Who generates this field What to do with legacy NICs Key point – this field is only used by switches, not end machines

802.1Q Adds a new field to Ethernet header circa 98, raised frame size to 1522 from st 2 bytes are protocol ID, fixed as 0x8100 (>1500 so type) 2 nd byte has VLAN id (lower order 12 bits), 3 bit priority (used by 802.1P), 1 bit CFI to indicate traffic Required Bridges and switches to be VLAN aware, “future” NICs should be aware too (with Giga deployment?) Bridges/switches could add this field till then)

The IEEE 802.1Q Standard Transition from legacy Ethernet to VLAN-aware Ethernet. The shaded symbols are VLAN aware. The empty ones are not.

The IEEE 802.1Q Standard (2) The (legacy) and 802.1Q Ethernet frame formats.

UWB FCC definition – bandwidth > 25% of center frequency. 2(Fh-Fl)/(Fh+Fl) b has 80MHz of usable spectrum in 2.4GHz band Uses Pulse position Modulation Low power on any particular frequency, fitting in under FCC Part 15 rules MAC issues – QoS, TDMA and CDMA don’t work well. P , HiperLAN DM

Summary Channel allocation methods and systems for a common channel.