Presentation is loading. Please wait.

Presentation is loading. Please wait.

The Medium Access Control (MAC) Sublayer. The Channel Allocation Problem Static Channel Allocation in LANs and MANs Dynamic Channel Allocation in LANs.

Similar presentations


Presentation on theme: "The Medium Access Control (MAC) Sublayer. The Channel Allocation Problem Static Channel Allocation in LANs and MANs Dynamic Channel Allocation in LANs."— Presentation transcript:

1 The Medium Access Control (MAC) Sublayer

2 The Channel Allocation Problem Static Channel Allocation in LANs and MANs Dynamic Channel Allocation in LANs and MANs

3 Static Channel Allocation FDM – Frequency Division Multiplexing T – Mean time delay Arrival rate: λ frames/sec Channel Capacity: C bps Frame length: Drawn from exponential function – 1/μ bits/frame T = 1 / (μC – λ) FDM – one central queue Single channel is divided into N independent sub-channels, each with capacity C/N bps. T N = 1 / [ μ (C/N) – (λ/N) ] = N / (μC – λ) = NT

4 Dynamic Channel Allocation in LANs and MANs 1.Station Model – N independent stations 2.Single Channel Assumption. 3.Collision Assumption – the event of collision of 2 frames can be detected by all stations 4.(a) Continuous Time. (b) Slotted Time. 5.(a) Carrier Sense. (b) No Carrier Sense.

5 Multiple Access Protocols ALOHA Carrier Sense Multiple Access Protocols Collision-Free Protocols Limited-Contention Protocols Wavelength Division Multiple Access Protocols Wireless LAN Protocols

6 Pure ALOHA In pure ALOHA, frames are transmitted at completely arbitrary times.

7 Pure ALOHA (2) Vulnerable period for the shaded frame.

8 Static Channel Allocation Assumption – Infinite Population N frames per mean frame time N > 1 always collision K transmission attempts per frame. So G frames per second. G >= N Throughput: S = G.P 0, where P 0 is the prob. that a frame does not suffer collision. Pr[k] = (G k. e -G )/ k! S = G e -2G

9 Pure ALOHA (3) Throughput versus offered traffic for ALOHA systems.

10 Static Channel Allocation Variation of collision with G Probability that all other users are silent = (1 – e -G ) Probability that transmission requires exactly k attempts: P k = e -G (1 – e -G ) k-1 Expectation: Σ k.P k = e G

11 Persistent and Nonpersistent CSMA Comparison of the channel utilization versus load for various random access protocols.

12 CSMA with Collision Detection CSMA/CD can be in one of three states: contention, transmission, or idle.

13 CSMA/CD Performance A = probability that exactly one station attempts a transmission in a slot and therefore acquires the medium = binomial probability that any one station attempts to transmit and the others don’t The function takes on a maximum over P when P = 1/N. Maximum throughput will be achieved if the probability of successful seizure of the medium is maximized. During periods of heavy usage, a station should restrain its offered load to 1/N.

14 CSMA/CD Performance The summation converges to: Max. utilization = length of a transmission interval as a proportion of a cycle consisting of a transmission and a contention interval.

15 Collision-Free Protocols The basic bit-map protocol. Performance Always 1 bit/station/frame transmitted is the overhead. Channel efficiency U = d / [d+1], under high load U = d/ [d+N], under low load N = number of bits, d = frame size

16 Collision-Free Protocols (2) Token Passing. Performance Similar to bit-map protocol. Since all positions in the cycle are equivalent, there is no bias for low- or high-numbered stations. Station Direction of transmission Token

17 Collision-Free Protocols (3) The binary countdown protocol. A dash indicates silence. Performance Channel efficiency U = d / [ d + log 2 N ]

18 Limited-Contention Protocols Acquisition probability for a symmetric contention channel. Best value of p = 1/k, where k is the no. of stations. Substituting, Pr[success with optimal p] = [(k – 1)/k] k – 1

19 Adaptive Tree Walk Protocol The tree for eight stations.

20 Wavelength Division Multiple Access Protocols Wavelength division multiple access.

21

22 Wireless LAN Protocols A wireless LAN. (a) A transmitting. (b) B transmitting. Hidden Terminal and exposed terminal problem

23 Wireless LAN Protocols (2) The Multiple Access with Collision Avoidance (MACA) protocol. (a) A sending an RTS to B. (b) B responding with a CTS to A.

24 Ethernet (802.3) Ethernet Cabling Manchester Encoding The Ethernet MAC Sublayer Protocol The Binary Exponential Backoff Algorithm Ethernet Performance Switched Ethernet Fast Ethernet Gigabit Ethernet IEEE 802.2: Logical Link Control Retrospective on Ethernet

25 Ethernet Cabling The most common kinds of Ethernet cabling.

26 Ethernet MAC Sublayer Protocol Frame formats. (a) DIX Ethernet, (b) IEEE 802.3.

27 Preamble of 8 bytes, each containing the bit pattern 10101010 (with the exception of the last byte, in which the last 2 bits are set to 11). This last byte is called the Start of Frame delimiter for 802.3. Destination address – 1 means multicast 1111 – broadcast Source Address – Mac Address To do this, the first 3 bytes of the address field are used for an OUI (Organizationally Unique Identifier). indicate a manufacturer. manufacturer assigns the last 3 bytes of the address

28 Length and Protocol < 1536 is length and higher is Type

29 IEEE 802.2: Logical Link Control (a) Position of LLC. (b) Protocol formats.

30 Length of the packet cannot be too small -- 64 bytes long

31 Ethernet MAC Sublayer Protocol (2)

32 Switched Ethernet A simple example of switched Ethernet.

33 A switch improves performance over a hub in two ways. Since there are no collisions, the capacity is used more efficiently. With a switch multiple frames can be sent simultaneously (by different stations). These frames will reach the switch ports and travel over the switch’s backplane to be output on the proper ports. Two frames might be sent to the same output port at the same time, the switch must have buffering so that it can temporarily queue an input frame until it can be transmitted to the output port.

34 Wireless LANs The 802.11 Protocol Stack The 802.11 Physical Layer The 802.11 MAC Sublayer Protocol The 802.11 Frame Structure Services

35 The 802.11 Protocol Stack Part of the 802.11 protocol stack.

36 The 802.11 MAC Sublayer Protocol (a) The hidden station problem. (b) The exposed station problem.

37 CSMA Exponential Back-off

38 END

39 The 802.11 MAC Sublayer Protocol (2) The use of virtual channel sensing using CSMA/CA.

40 The 802.11 MAC Sublayer Protocol (3) A fragment burst.

41 The 802.11 MAC Sublayer Protocol (4) Interframe spacing in 802.11.

42 The 802.11 Frame Structure The 802.11 data frame.

43 802.11 Services Association Disassociation Reassociation Distribution Integration Distribution Services

44 802.11 Services Authentication Deauthentication Privacy Data Delivery Intracell Services

45 Broadband Wireless Comparison of 802.11 and 802.16 The 802.16 Protocol Stack The 802.16 Physical Layer The 802.16 MAC Sublayer Protocol The 802.16 Frame Structure

46 The 802.16 Protocol Stack The 802.16 Protocol Stack.

47 The 802.16 Physical Layer The 802.16 transmission environment.

48 The 802.16 Physical Layer (2) Frames and time slots for time division duplexing.

49 The 802.16 MAC Sublayer Protocol Service Classes Constant bit rate service Real-time variable bit rate service Non-real-time variable bit rate service Best efforts service

50 The 802.16 Frame Structure (a) A generic frame. (b) A bandwidth request frame.

51 Bluetooth Bluetooth Architecture Bluetooth Applications The Bluetooth Protocol Stack The Bluetooth Radio Layer The Bluetooth Baseband Layer The Bluetooth L2CAP Layer The Bluetooth Frame Structure

52 Bluetooth Architecture Two piconets can be connected to form a scatternet.

53 Bluetooth Applications The Bluetooth profiles.

54 The Bluetooth Protocol Stack The 802.15 version of the Bluetooth protocol architecture.

55 The Bluetooth Frame Structure A typical Bluetooth data frame.

56 Data Link Layer Switching Bridges from 802.x to 802.y Local Internetworking Spanning Tree Bridges Remote Bridges Repeaters, Hubs, Bridges, Switches, Routers, Gateways Virtual LANs

57 Data Link Layer Switching Multiple LANs connected by a backbone to handle a total load higher than the capacity of a single LAN.

58 Bridges from 802.x to 802.y Operation of a LAN bridge from 802.11 to 802.3.

59 Bridges from 802.x to 802.y (2) The IEEE 802 frame formats. The drawing is not to scale.

60 Local Internetworking A configuration with four LANs and two bridges.

61 Spanning Tree Bridges Two parallel transparent bridges.

62 Spanning Tree Bridges (2) (a) Interconnected LANs. (b) A spanning tree covering the LANs. The dotted lines are not part of the spanning tree.

63 Remote Bridges Remote bridges can be used to interconnect distant LANs.

64 Repeaters, Hubs, Bridges, Switches, Routers and Gateways (a) Which device is in which layer. (b) Frames, packets, and headers.

65 Repeaters, Hubs, Bridges, Switches, Routers and Gateways (2) (a) A hub. (b) A bridge. (c) a switch.

66 Virtual LANs A building with centralized wiring using hubs and a switch.

67 Virtual LANs (2) (a) Four physical LANs organized into two VLANs, gray and white, by two bridges. (b) The same 15 machines organized into two VLANs by switches.

68 The IEEE 802.1Q Standard Transition from legacy Ethernet to VLAN-aware Ethernet. The shaded symbols are VLAN aware. The empty ones are not.

69 The IEEE 802.1Q Standard (2) The 802.3 (legacy) and 802.1Q Ethernet frame formats.

70 Summary Channel allocation methods and systems for a common channel.

71 Ethernet Cabling (2) Three kinds of Ethernet cabling. (a) 10Base5, (b) 10Base2, (c) 10Base-T.

72 Ethernet Cabling (3) Cable topologies. (a) Linear, (b) Spine, (c) Tree, (d) Segmented.

73 Ethernet Cabling (4) (a) Binary encoding, (b) Manchester encoding, (c) Differential Manchester encoding.


Download ppt "The Medium Access Control (MAC) Sublayer. The Channel Allocation Problem Static Channel Allocation in LANs and MANs Dynamic Channel Allocation in LANs."

Similar presentations


Ads by Google