Presentation is loading. Please wait.

Presentation is loading. Please wait.

The Medium Access Control Sublayer Chapter 4 4.6 - 4.8.

Similar presentations


Presentation on theme: "The Medium Access Control Sublayer Chapter 4 4.6 - 4.8."— Presentation transcript:

1 The Medium Access Control Sublayer Chapter 4 4.6 - 4.8

2 Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011 Bluetooth a) Architecture b) Applications c) Protocol stack d) Radio layer e) Link layers f)Frame structure

3 Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011 Bluetooth Architecture a)Two piconets can be connected to form a scatternet

4 Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011 Bluetooth Protocol Stack a)The Bluetooth protocol architecture.

5 Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011 Bluetooth Frame Structure a)Typical Bluetooth data frame at (a) basic, and (b) enhanced, data rates.

6 Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011 RFID a)EPC Gen 2 architecture b)EPC Gen 2 physical layer c)EPC Gen 2 tag identification layer d)Tag identification message formats

7 Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011 EPC Gen 2 Architecture a)RFID architecture.

8 Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011 EPC Gen 2 Physical Layer a)Reader and tag backscatter signals.

9 Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011 EPC Gen 2 Tag Identification Layer a)Example message exchange to identify a tag.

10 Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011 Tag Identification Message Formats a)Format of the Query message.

11 Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011 Data Link Layer Switching a)Uses of bridges b)Learning bridges c)Spanning tree bridges d)Repeaters, hubs, bridges, switches, routers, and gateways e)Virtual LANs

12 Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011 Learning Bridges (1) a)Bridge connecting two multidrop LANs

13 Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011 Learning Bridges (2) a)Bridges (and a hub) connecting seven point-to-point stations.

14 Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011 Learning Bridges (3) a)Protocol processing at a bridge.

15 Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011 Spanning Tree Bridges (1) a)Bridges with two parallel links

16 Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011 Spanning Tree Bridges (2) a)A spanning tree connecting five bridges. The dotted lines are links that are not part of the spanning tree.

17 Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011 Poem by Radia Perlman (1985) Algorithm for Spanning Tree (1) a)I think that I shall never see b)A graph more lovely than a tree. c)A tree whose crucial property d)Is loop-free connectivity. e)A tree which must be sure to span. f)So packets can reach every LAN. g)...

18 Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011 Poem by Radia Perlman (1985) Algorithm for Spanning Tree (2) a)... b)First the Root must be selected c)By ID it is elected. d)Least cost paths from Root are traced e)In the tree these paths are placed. f)A mesh is made by folks like me g)Then bridges find a spanning tree.

19 Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011 Repeaters, Hubs, Bridges, Switches, Routers, and Gateways a)(a) Which device is in which layer. (b) Frames, packets, and headers.

20 Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011 Virtual LANs (1) a)A building with centralized wiring using hubs and a switch.

21 Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011 Virtual LANs (2) a)Two VLANs, gray and white, on a bridged LAN.

22 Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011 The IEEE 802.1Q Standard (1) a)Bridged LAN that is only partly VLAN-aware. The shaded symbols are VLAN aware. The empty ones are not.

23 Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011 The IEEE 802.1Q Standard (2) a)The 802.3 (legacy) and 802.1Q Ethernet frame formats.

24 Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011 End a)Chapter 4


Download ppt "The Medium Access Control Sublayer Chapter 4 4.6 - 4.8."

Similar presentations


Ads by Google