Medium Access Control Sublayer 2 Chapter 4 CN5E by Tanenbaum & Wetherall, © Pearson Education-Prentice Hall and D. Wetherall, 2011 Channel Allocation Problem.

Slides:



Advertisements
Similar presentations
University of Calgary – CPSC 441.  We need to break down big networks to sub-LANs  Limited amount of supportable traffic: on single LAN, all stations.
Advertisements

Medium Access Control Sublayer Chapter 4 CN5E by Tanenbaum & Wetherall, © Pearson Education-Prentice Hall and D. Wetherall, 2011 Channel Allocation Problem.
Topic 7 Local Area Networks (LAN)
CSCI 465 D ata Communications and Networks Lecture 20 Martin van Bommel CSCI 465 Data Communications & Networks 1.
Bridging. Bridge Functions To extend size of LANs either geographically or in terms number of users. − Protocols that include collisions can be performed.
© Kemal AkkayaWireless & Network Security 1 Department of Computer Science Southern Illinois University Carbondale CS591 – Wireless & Network Security.
Wireless Networks.
1 Version 3 Module 8 Ethernet Switching. 2 Version 3 Ethernet Switching Ethernet is a shared media –One node can transmit data at a time More nodes increases.
20 – Collision Avoidance, : Wireless and Mobile Networks6-1.
1 Chapter 8 Local Area Networks - Internetworking.
The Protocol Stack Part of the protocol stack.
Introduction to Computer Networks 09/23 Presenter: Fatemah Panahi.
1 25\10\2010 Unit-V Connecting LANs Unit – 5 Connecting DevicesConnecting Devices Backbone NetworksBackbone Networks Virtual LANsVirtual LANs.
DataLink Layer1 Ethernet Technologies: 10Base2 10: 10Mbps; 2: 200 meters (actual is 185m) max distance between any two nodes without repeaters thin coaxial.
1 Computer Networks LAN Bridges and Switches. 2 Where are we?
Layer 2 Switch  Layer 2 Switching is hardware based.  Uses the host's Media Access Control (MAC) address.  Uses Application Specific Integrated Circuits.
The Medium Access Control Sublayer Chapter 4. The Channel Allocation Problem Static Channel Allocation in LANs and MANs Dynamic Channel Allocation in.
Connecting LANs, Backbone Networks, and Virtual LANs
Infrastructure de Communications – CR 4107Chapter 41 The Medium Access Control Sublayer Chapter 4.
Semester 1 Module 8 Ethernet Switching Andres, Wen-Yuan Liao Department of Computer Science and Engineering De Lin Institute of Technology
Adapted from: Computer Networking, Kurose/Ross 1DT066 Distributed Information Systems Chapter 6 Wireless, WiFi and mobility.
1 Token Passing: IEEE802.5 standard  4 Mbps  maximum token holding time: 10 ms, limiting packet length  packet (token, data) format:  SD, ED mark start,
Chapter 5 outline 5.1 Introduction and services
ICOM 6115©Manuel Rodriguez-Martinez ICOM 6115 – Computer Networks and the WWW Manuel Rodriguez-Martinez, Ph.D. Lecture 17.
1 CS 4396 Computer Networks Lab LAN Switching and Bridges.
CSMA with Collision Detection CSMA/CD can be in one of three states: contention, transmission, or idle.
The Medium Access Control Sublayer Chapter 4. The Channel Allocation Problem Static Channel Allocation in LANs and MANs Dynamic Channel Allocation in.
The Medium Access Control Sublayer طبقة ولوج الوسط الجزئية Chapter 4.
The Medium Access Control Sublayer Chapter 4 10/1/2015www.noteshit.com1.
10/18/2007 EETS Bluetooth Bluetooth Architecture Bluetooth Applications The Bluetooth Protocol Stack The Bluetooth Radio Layer The Bluetooth Baseband.
Token Passing: IEEE802.5 standard  4 Mbps  maximum token holding time: 10 ms, limiting packet length  packet (token, data) format:  SD, ED mark start,
The Medium Access Control Sublayer Chapter 4. The Channel Allocation Problem Static Channel Allocation Dynamic Channel Allocation  Delay for the divided.
Module 8: Ethernet Switching
Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011 The Medium Access Control Sublayer Chapter.
Review: –Ethernet What is the MAC protocol in Ethernet? –CSMA/CD –Binary exponential backoff Is there any relationship between the minimum frame size and.
The Medium Access Control Sublayer Chapter 4. The Channel Allocation Problem Static Channel Allocation in LANs and MANs Dynamic Channel Allocation in.
15.1 Chapter 15 Connecting LANs, Backbone Networks, and Virtual LANs Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or.
Chi-Cheng Lin, Winona State University CS 313 Introduction to Computer Networking & Telecommunication Local Area Networks.
The Medium Access Control Sublayer Chapter 4. The Channel Allocation Problem Static Channel Allocation in LANs and MANs Dynamic Channel Allocation in.
Cisco 3 - Switching Perrine. J Page 16/4/2016 Chapter 4 Switches The performance of shared-medium Ethernet is affected by several factors: data frame broadcast.
Sem1 - Module 8 Ethernet Switching. Shared media environments Shared media environment: –Occurs when multiple hosts have access to the same medium. –For.
CSE 461 University of Washington1 Topic How do we connect nodes with a switch instead of multiple access – Uses multiple links/wires – Basis of modern.
STORE AND FORWARD & CUT THROUGH FORWARD Switches can use different forwarding techniques— two of these are store-and-forward switching and cut-through.
Chapter 6 Medium Access Control Protocols and Local Area Networks Wireless LAN.
The Medium Access Control Sublayer Chapter 4 12/13/2015www.ishuchita.com1.
Universität Karlsruhe Institut für Telematik ECE 591
ICS 156: Networking Lab Magda El Zarki Professor, ICS UC, Irvine.
Medium Access Control Sublayer Chapter 4
The Medium Access Control Sublayer Chapter 4. The Channel Allocation Problem Static Channel Allocation in LANs and MANs Dynamic Channel Allocation in.
1 Chapter 4 MAC Layer – Wireless LAN Jonathan C.L. Liu, Ph.D. Department of Computer, Information Science and Engineering (CISE), University of Florida.
The Medium Access Control Sublayer Chapter
Distributed Systems 7. Medium Access Control Sublayer Simon Razniewski Faculty of Computer Science Free University of Bozen-Bolzano A.Y. 2015/2016.
Wireless LAN Requirements (1) Same as any LAN – High capacity, short distances, full connectivity, broadcast capability Throughput: – efficient use wireless.
The Medium Access Control Sublayer
Distributed Systems 6. Medium Access Control Sublayer Simon Razniewski Faculty of Computer Science Free University of Bozen-Bolzano A.Y. 2014/2015.
Youngstown State University Cisco Regional Academy
The Data Link Layer Chapter
CS 3700 Networks and Distributed Systems
The Medium Access Control Sublayer
Chapter 4 Data Link Layer Switching
CS 3700 Networks and Distributed Systems
CS 457 – Lecture 8 Switching and Forwarding
Medium Access Control Sublayer Chapter 4
The Medium Access Control Sublayer
Hubs Hubs are essentially physical-layer repeaters:
CS 4700 / CS 5700 Network Fundamentals
The Medium Access Control Sublayer
Chapter 6 Medium Access Control Protocols and Local Area Networks
CS 4700 / CS 5700 Network Fundamentals
Presentation transcript:

Medium Access Control Sublayer 2 Chapter 4 CN5E by Tanenbaum & Wetherall, © Pearson Education-Prentice Hall and D. Wetherall, 2011 Channel Allocation Problem Multiple Access Protocols Ethernet Wireless LANs Broadband Wireless Data Link Layer Switching Revised: August 2011

The MAC Sublayer CN5E by Tanenbaum & Wetherall, © Pearson Education-Prentice Hall and D. Wetherall, 2011 Responsible for deciding who sends next on a multi-access link An important part of the link layer, especially for LANs Physical Link Network Transport Application MAC is in here!

Wireless LANs CN5E by Tanenbaum & Wetherall, © Pearson Education-Prentice Hall and D. Wetherall, architecture/protocol stack » physical layer » MAC » frames »

Architecture/Protocol Stack (1) CN5E by Tanenbaum & Wetherall, © Pearson Education-Prentice Hall and D. Wetherall, 2011 Wireless clients associate to a wired AP (Access Point) Called infrastructure mode; there is also ad-hoc mode with no AP, but that is rare. Access Point Client To Network

Architecture/Protocol Stack (2) CN5E by Tanenbaum & Wetherall, © Pearson Education-Prentice Hall and D. Wetherall, 2011 MAC is used across different physical layers

Physical Layer General CN5E by Tanenbaum & Wetherall, © Pearson Education-Prentice Hall and D. Wetherall, GHz or 5-GHz ISM Radiated power at most 1 W Multiple rates supported Rate adaptation used for weak signals

physical layer CN5E by Tanenbaum & Wetherall, © Pearson Education-Prentice Hall and D. Wetherall, 2011 NICs are compatible with multiple physical layers −E.g., a/b/g NameTechniqueMax. Bit Rate bSpread spectrum (CDMA) 2.4 GHz, BPSK or QPSK 11 Mbps gOFDM, 2.4 GHz54 Mbps aOFDM, 5 GHz54 Mbps nOFDM with MIMO, 2.4/5 GHz600 Mbps

MAC (1) CN5E by Tanenbaum & Wetherall, © Pearson Education-Prentice Hall and D. Wetherall, 2011 Two environmental differences from Ethernet Communication is half duplex CD mechanism does not work Transmission ranges are different Hidden and exposed terminal problems

MAC (2) CN5E by Tanenbaum & Wetherall, © Pearson Education-Prentice Hall and D. Wetherall, 2011 CSMA CA A station sensing idle channel waits for a random backoff period instead of attempting to send immediately The destination sends a short ack Lack of ack leads to waiting doubled backoff period and try again Further attempts are as in exponential backoff

MAC (3) CN5E by Tanenbaum & Wetherall, © Pearson Education-Prentice Hall and D. Wetherall, 2011 CSMA/CA inserts backoff slots to avoid collisions MAC uses ACKs/retransmissions for wireless errors

MAC (4) CN5E by Tanenbaum & Wetherall, © Pearson Education-Prentice Hall and D. Wetherall, 2011 Transmission range difference causes problems Even if the ranges are assumed to be same, two problems still exist hidden terminal exposed terminal

MAC (5) CN5E by Tanenbaum & Wetherall, © Pearson Education-Prentice Hall and D. Wetherall, 2011 Virtual channel sensing with the NAV and optional RTS/CTS (often not used) avoids hidden terminals

MAC (6) CN5E by Tanenbaum & Wetherall, © Pearson Education-Prentice Hall and D. Wetherall, 2011 Different backoff slot times add quality of service −Short intervals give preferred access, e.g., control, VoIP MAC has other mechanisms too, e.g., power save

MAC (7) CN5E by Tanenbaum & Wetherall, © Pearson Education-Prentice Hall and D. Wetherall, 2011 In power save mode, the AP will buffer the frames destined to a station and forward them when it receives frames from that station

TUNALI Computer Networks 1 15 Fragmenting MAC Frames Wireless networks are noisy and unreliable The shorter the frame the higher the probability that it will go through undamaged Fragmenting is preferred due to these reasons

TUNALI Computer Networks Frames (1) There are three classes of frames −data −control −management Data frame structure −Frame control has 11 subfields »To DS and from DS indicate incoming or outgoing frame »MF is more fragments »Pwr indicates sleep or wake-up »More is for more frames to come »W is encryption indicator »O is indicating that frames with this bit set must be processed in order

TUNALI Computer Networks Frames (2) »Duration indicates frame duration in microseconds »The first address is receiver and the second address is transmitter, the third address (if any) is the distant endpoint −The first bytes of data field are in the form of LLC header

Frames (3) CN5E by Tanenbaum & Wetherall, © Pearson Education-Prentice Hall and D. Wetherall, 2011 Frames vary depending on their type (Frame control) Data frames have 3 addresses to pass via APs

TUNALI Computer Networks Services Association (connection to AP) Authentication is required Reassociation (change preferred AP) Distribution −How to route frames sent to the base station? Integration −Translation of format for non networks Privacy −AES encryption Data delivery

Broadband Wireless CN5E by Tanenbaum & Wetherall, © Pearson Education-Prentice Hall and D. Wetherall, Architecture / Protocol Stack » Physical Layer » MAC » Frames »

Broadband Wireless Introduction CN5E by Tanenbaum & Wetherall, © Pearson Education-Prentice Hall and D. Wetherall, 2011 Implemented outdoors In short called WiMAX Uses OFDM to support non-line-of-sight between 2 GHz and 10 GHz Aim is to provide Internet access to users without digging for a cable High capacity with powerful stations

Architecture/Protocol Stack (1) CN5E by Tanenbaum & Wetherall, © Pearson Education-Prentice Hall and D. Wetherall, 2011 Wireless clients connect to a wired base station (like 3G)

Clients CN5E by Tanenbaum & Wetherall, © Pearson Education-Prentice Hall and D. Wetherall, 2011 Two different types of stations supported Subscribers are at fixed location Mobile stations move around (car equipped with wimax)

Architecture/Protocol Stack (2) CN5E by Tanenbaum & Wetherall, © Pearson Education-Prentice Hall and D. Wetherall, 2011 MAC is connection-oriented; IP is connectionless Convergence sub-layer maps between the two

Physical Layer (1) CN5E by Tanenbaum & Wetherall, © Pearson Education-Prentice Hall and D. Wetherall, 2011 OFDM used QPSK, QAM16 or QAM-64 for modulation Convolution codes for error correction 12.6 Mbps downlink, 6.2 Mbps uplink supported OFDMA assigns different sets of subcarriers to different stations leading to Allocation of different amounts of bandwidth to different stations

Physical Layer (2) CN5E by Tanenbaum & Wetherall, © Pearson Education-Prentice Hall and D. Wetherall, 2011 Based on OFDM; base station gives mobiles bursts (subcarrier/time frame slots) for uplink and downlink

MAC CN5E by Tanenbaum & Wetherall, © Pearson Education-Prentice Hall and D. Wetherall, 2011 Connection-oriented with base station in control Clients request the bandwidth they need Different kinds of service can be requested: Constant bit rate, e.g., uncompressed voice Real-time variable bit rate, e.g., video, Web Non-real-time variable bit rate, e.g., file download Best-effort for everything else

Frames CN5E by Tanenbaum & Wetherall, © Pearson Education-Prentice Hall and D. Wetherall, 2011 Frames vary depending on their type Connection ID instead of source/dest addresses (a) A generic frame. (b) A bandwidth request frame (b) (a)

Data Link Layer Switching CN5E by Tanenbaum & Wetherall, © Pearson Education-Prentice Hall and D. Wetherall, 2011 Uses of Bridges » Learning Bridges » Spanning Tree » Repeaters, hubs, bridges,.., routers, gateways » Virtual LANs »

Uses of Bridges (1) Common setup is a building with centralized wiring Bridges (switches) are placed in or near wiring closets CN5E by Tanenbaum & Wetherall, © Pearson Education-Prentice Hall and D. Wetherall, 2011

TUNALI Computer Networks 1 31 Uses of Bridges (2) Operate in the data link layer Connect LANs to each other Reasons for multiple LANs Departments have their own LANs Organizations may be spread over several buildings Split a single LAN into multiple LANs to accommodate the load −Do not send traffic onto ports where it is not needed Using bridges total physical distance covered can be increased Increased reliability Increased security

Transparent Bridges Buy the bridge Plug the cables Let it run We need two algorithms backward learning spanning tree CN5E by Tanenbaum & Wetherall, © Pearson Education-Prentice Hall and D. Wetherall, 2011

Learning Bridges (1) CN5E by Tanenbaum & Wetherall, © Pearson Education-Prentice Hall and D. Wetherall, 2011 A bridge operates as a switched LAN (not a hub) Computers, bridges, and hubs connect to its ports

Backward Learning CN5E by Tanenbaum & Wetherall, © Pearson Education-Prentice Hall and D. Wetherall, 2011 Accept every frame transmitted by the stations attached to each of its ports (promiscıous mode) If the source and destination are on the same port, just discard it If not, use a table to figure out the port to forward the packet to If port is not on the table, broadcast the address to figure out the port Maintain the table (hashing used) by timestamping the frame so that incoming port info is fresh

Learning Bridges (2) CN5E by Tanenbaum & Wetherall, © Pearson Education-Prentice Hall and D. Wetherall, 2011 Backward learning algorithm picks the output port: Associates source address on frame with input port Frame with destination address sent to learned port Unlearned destinations are sent to all other ports Needs no configuration Forget unused addresses to allow changes Bandwidth efficient for two-way traffic

Learning Bridges (3) CN5E by Tanenbaum & Wetherall, © Pearson Education-Prentice Hall and D. Wetherall, 2011 Bridges extend the Link layer: Use but don’t remove Ethernet header/addresses Do not inspect Network header

Cut-through switching CN5E by Tanenbaum & Wetherall, © Pearson Education-Prentice Hall and D. Wetherall, 2011 Do not wait for the complete frame Do the switching as soon as source and destination address bits arrive

Spanning Tree (1) – Problem CN5E by Tanenbaum & Wetherall, © Pearson Education-Prentice Hall and D. Wetherall, 2011 Bridge topologies with loops and only backward learning will cause frames to circulate forever Need spanning tree support to solve problem −On spanning tree, there is exactly one path from one station to every other station

Spanning Tree (2) – Algorithm CN5E by Tanenbaum & Wetherall, © Pearson Education-Prentice Hall and D. Wetherall, 2011 Subset of forwarding ports for data is use to avoid loops Selected with the spanning tree distributed algorithm by Perlman I think that I shall never see A graph more lovely than a tree. A tree whose crucial property Is loop-free connectivity. A tree which must be sure to span. So packets can reach every LAN. First the Root must be selected By ID it is elected. Least cost paths from Root are traced In the tree these paths are placed. A mesh is made by folks like me Then bridges find a spanning tree. – Radia Perlman, 1985.

Spanning Tree (3) – Example CN5E by Tanenbaum & Wetherall, © Pearson Education-Prentice Hall and D. Wetherall, 2011 After the algorithm runs: −B1 is the root, two dashed links are turned off −B4 uses link to B2 (lower than B3 also at distance 1) −B5 uses B3 (distance 1 versus B4 at distance 2)

TUNALI Computer Networks 1 41 Spanning Tree (4) – Algorithm Each bridge broadcasts its serial number. The bridge with lowest serial number becomes root A tree of shortest paths from the root to every bridge and LAN is constructed. This is the spanning tree. −Serial numbers are again used to break the ties −Bridges include their distance from the root in their messages After the tree is constructed, the bridges turn off ports that are not part of the shortest path Algorithm runs continuously to detect topology changes

Repeaters, Hubs, Bridges, Switches, Routers, & Gateways CN5E by Tanenbaum & Wetherall, © Pearson Education-Prentice Hall and D. Wetherall, 2011 Devices are named according to the layer they process A bridge or LAN switch operates in the Link layer Buffering in bridge is needed to receive a frame from one port and transmit it from another port

TUNALI Computer Networks 1 43 Virtual LANs (1) Many departments, such as research, patents, and accounting, have information that they do not want passed outside their department Some LANs are more heavily used and the other may not want their communication slowing down due to external causes Most LANs support broadcasting and either regular broadcast or broadcast storm may be isolated by virtual LANs

Virtual LANs (2) Unfortunately, physical locations of offices belonging to a department may not allow configuring them on the same physical LAN The solution is to introduce an overlay logical topology that is decoupled from the physical topology Implemetation requires VLAN aware switches Ethernet frame expanded to include a VLAN field in its header Configuration tables are set up in VLAN aware bridges telling which VLANs are accesible through which ports CN5E by Tanenbaum & Wetherall, © Pearson Education-Prentice Hall and D. Wetherall, 2011

Virtual LANs (3) CN5E by Tanenbaum & Wetherall, © Pearson Education-Prentice Hall and D. Wetherall, 2011 VLANs (Virtual LANs) splits one physical LAN into multiple logical LANs to ease management tasks Ports are “colored” according to their VLAN

Virtual LANs (4) – IEEE 802.1Q CN5E by Tanenbaum & Wetherall, © Pearson Education-Prentice Hall and D. Wetherall, 2011 Bridges need to be aware of VLANs to support them In 802.1Q, frames are tagged with their “color” Legacy switches with no tags are supported

Virtual LANs (5) – IEEE 802.1Q CN5E by Tanenbaum & Wetherall, © Pearson Education-Prentice Hall and D. Wetherall, Q frames carry a color tag (VLAN identifier) Length/Type value is 0x8100 for VLAN protocol

Virtual LANs (6) – IEEE 802.1Q CN5E by Tanenbaum & Wetherall, © Pearson Education-Prentice Hall and D. Wetherall, 2011 VLAN aware bridges coexist with legacy switches Legacy switches are usually located towards the leaves of the spanning tree The ethernet frame entering the first VLAN aware switch is modified to containn VLAN info in its header. The ethernet frame leaving VLAN aware switch heading for legacy swich is modified and VLAN info is removed from the header

TUNALI Computer Networks 1 49 Virtual LANs (7) – IEEE 802.1Q IEEE changed the Ethernet header 802.1Q is the new standard supporting VLANs VLAN fields are actually used only by bridges and switches, not by the user machines No need to throw away the old Ethernet cards If a PC that does not have a card supporting 802.1Q sends a frame to a VLAN aware switch, the switch builds a new tagged frame based on its knowledge of the sender’s VLAN

TUNALI Computer Networks 1 50 Required Reading Tanenbaum Sections

Homework CN5E by Tanenbaum & Wetherall, © Pearson Education-Prentice Hall and D. Wetherall, 2011

End Chapter 4 CN5E by Tanenbaum & Wetherall, © Pearson Education-Prentice Hall and D. Wetherall, 2011