Title: CEN 4500 Data Communications
1CEN 4500 Data Communications
Chapter 4 The Medium Access Control Sublayer
Instructor S. Masoud Sadjadi http//www.cs.fiu.ed
u/sadjadi/Teaching/ sadjadi At cs Dot fiu Dot
edu
2Recap
- Networks are divided into two categories
- Point-2-point connections (WANs)
- Broadcast channels (LANs)
- a.k.a Multicast Channels
- a.k.a Random Access Channels
- Key issue in broadcast channels
- Determining who gets to use the channel, when
there is a competition - Medium Access Control (MAC) sublayer
- Has the protocol that addresses this issue
- Technically is the bottom part of the data link
layer - Usually used in LAN and in satellite networks
3Agenda
- The Channel Allocation Problem
- Multiple Access Protocols
- Ethernet
- Data Link Layer Switching
- Summary
4The Channel Allocation Problem
- How to allocate a single broadcast channel among
competing users? - Static Channel Allocation in LANs and MANs
- Dynamic Channel Allocation in LANs and MANs
5Static Channel Allocation
- Frequency Division Multiplexing (FDM)
- If there are N users, the bandwidth is divided
into N equal-sized portions. - Good for small and constant numbers of users,
each of which has a heavy (buffered) load of
traffic. - Not good for users with bursty traffic
- Time Division Multiplexing (TDM)
- Each user is statically allocated every Nth time
slot. - The same problem with bursty traffics.
6Why FDM and TDM have a poor performance?
- Mean time delay, T, for a channel of capacity C
bps, with arrival rate of ? frames/sec, each
frame having a length drawn from an exponential
probability density function with mean 1/?
bits/frame. - From queuing theory with Poisson arrival and
service times T 1/(?C - ?) - Ex C 100 Mbps, 1/? 10,000 bits/frames, ?
5000 frames/sec, then T 200 ?sec NOT T 100
?sec - TFDM 1/(? (C/N) (?/N)) N/(?C - ?) NT
- Ex 10 networks of 10 Mbps, TFDM NT 2 msec
7Dynamic Channel Allocation Assumptions
- Station Model
- N independent stations/terminals
- The probability of a frame being generated in an
interval of ??t is ??t, where ? is a constant
(the arrival rate of new frames). - Single Channel Assumption
- A single channel is available for all
communications. - All stations can transmit on it and all can
receive from it - Collision Assumption
- Collision If two frames are transmitted
simultaneously, they overlap in time and the
resulting signal is garbled. - All stations can detect collisions.
- There are no errors other than those generated by
collisions. - (a) Continuous Time No master clock. Frame can
start at any time.(b) Slotted Time Time is
divided into discrete intervals (slots). Frame
transmission always begins at the start of a
slot. - (a) Carrier Sense Stations can tell if the
channel is in use.(b) No Carrier Sense Stations
cannot sense the channel before using it.
8Agenda
- The Channel Allocation Problem
- Multiple Access Protocols
- Ethernet
- Data Link Layer Switching
- Summary
9Multiple Access Protocols
- ALOHA
- Carrier Sense Multiple Access Protocols
- Collision-Free Protocols
- Limited-Contention Protocols
- Wavelength Division Multiple Access Protocols
- Wireless LAN Protocols
10ALOHA
- 1970, Norman Abramson, Univ. of Hawaii
- Was called the ALOHA system
- Used ground-based radio broadcasting
- The basic idea is applicable to any system, in
which uncoordinated users are competing for the
use of a single shared channel. - Two versions
- Pure ALOHA not global time synchronization
- Slotted ALOHA time is divided into discrete slots
11Pure ALOHA
- Basic idea
- Let users transmit whenever they have data to be
sent. - There will be collisions, of course, and the
colliding frame will be damaged. - However, due to the feedback property of
broadcasting, a sender can always find out
whether its frame was destroyed by listening to
the channel, the same way the other users do. - If listening at the same time of sending is not
possible, then ack is required. - If a frame is destroyed, the sender just wait a
random amount of time and sends it again. - Contention Systems
- Systems in which multiple users share a common
channel in a way that can lead to conflicts.
12Pure ALOHA Example
- In pure ALOHA, frames are transmitted at
completely arbitrary times. - The throughput of ALOHA systems is maximized by
having a uniform frame size.
13Pure ALOHA Channel Efficiency?
- Let the frame size denote the amount of time
needed to transmit the standard, fixed-length
frame. - Assume that infinite population of users
generates new frames according to a Poisson
distribution with mean N frames per frame time. - If N gt 1, the user community is generating more
frames than the channel can handle, so nearly
every frame will suffer a collision. - For reasonable throughput, we expect 0 lt N lt 1.
- In addition to the new frame, the stations also
generate retransmissions of garbled frames. - Assume that the probability of k transmission
attempts per frame time, old and new combined, is
also Poisson, with mean G per frame time. - Clearly G gt N
- S GP0, where S is throughput and P0 is the
probability that a frame does not suffer
collision.
14Pure ALOHA Vulnerable Period
- A frame will not suffer a collision if not other
frames are sent within one frame time of its
start. - Vulnerable period for the shaded frame.
15Pure ALOHA Throughput
- The probability that k frames are generated
during a given frame time is given by the Poisson
distribution - Prk Gk e-G / k!
- Pr0 e-G
- In an interval of two frame time, the mean number
of frames generated is 2G. - Then, the probability of no other traffic being
initiated during the entire vulnerable period is - P0 e-2G
- Using S GP0 , we get S G e-2G
16Pure ALOHA Throughput
- Maximum throughput occurs at G 0.5, which is
about 0.184, or 18. Not encouraging!
Throughput versus offered traffic for ALOHA
systems.
17Slotted ALOHA
- 1972, Roberts, doubling the capacity of ALOHA
- Basic idea
- Users need to agree on slot boundaries
- One special station emit a pip at the start of
each interval, like a clock. - The users need to wait until the beginning of the
next slot. - Throughput
- The vulnerable area is halved
- So, P0 e-G, and S G e-G
- Probability of collision is 1- P0 or 1- e-G
- The probability of a transmission requiring
exactly k attempts Pk e-G (1- e-G)k-1 - The expected number of transmissions
- E ??k1kPk eG
18Carrier Sense Multiple Access Protocols
- ALOHA and Slotted ALOHA are bound to have many
collisions as the stations start transmitting at
will. - In LANs, it is possible for stations to detect
what other stations are doing and adapt their
behavior accordingly. - Carrier Sense Protocols
- Protocols in which stations listen for a carrier
(i.e., a transmission) and act accordingly - Persistent and Nonpersistent CSMA
- CSMA with Collision Detection
19Persistent CSMA
- When a station has data to send, it first listens
to the channel ro see if anyone else is
transmitting - If the channel is busy, the station waits until
it becomes idle. - When the station detects an idle channel, it
transmits a frame with the probability of one,
hence the name 1-persistent CSMA. - The propagation delay has an important effect on
the performance of this protocol - The longer the propagation delay, the more chance
of collision. - With propagation delay of zero, there will still
be collisions.
20Nonpersistent CSMA
- A conscious attempt is made to be less greedy.
- Before sending, a station senses the channel.
- If the channel is already in use, the station
does not continually sense it for the purpose of
seizing it immediately upon detection the end of
the previous submission. - Instead, it waits a random period of time and
then repeats the algorithm. - Consequently, this algorithm leads to a better
channel utilization, but longer delays.
21P-Persistent CSMA
- It applies to slotted channels
- When a station becomes ready to send, it senses
the channel. - If it is busy, it waits until the next slot.
- If it is idle, it transmits with a probability p
- With probability q1-p, it defers until the next
slot. - If that slot is also idle, it either transmits or
defers again, with probability p and q. - This process is repeated until either the frame
has been transmitted or another station has begun
transmitting. - In the latter case, it waits a random time and
starts again
22Persistent and Nonpersistent CSMA
- Comparison of the channel utilization versus load
for various random access protocols.
23CSMA with Collision Detection
- Persistent and nonpersistent CSMA protocols are
clearly an improvement over ALOHA - No station will start transmission if it senses
that the channel is busy! - Another improvement
- Abort transmission as soon as a collision is
detected. - This saves time and bandwidth
- CSMA/CD
- Is widely used in LANs in the MAC sublayer
- It is the base for the popular Ethernet LAN
24CSMA/CD Conceptual Model
- Lets assume that at time t0 a station has
finished transmitting its frame. - Any other station having a frame to send may now
attempt to do so. - If two or more stations decide to transmit
simultaneously, there will be a collision. - Collisions can be detected by looking at the
power or pulse width of the received signal and
comparing it to the transmitted signal. - After a station detects a collision, it aborts
its transmission, waits a random period of time,
and then tries again, assuming that no other
station has started transmitting in the meantime. - Therefore, our model for CSMA/CD will consists of
alternating contention and transmission periods,
with idle periods occurring when all stations are
quiet.
25CSMA with Collision Detection
- CSMA/CD can be in one of three states
contention, transmission, or idle.
26CSMA/CD Modeling the Contention Period
- Worst case scenario
- Assume ? is the channel propagation time
- If station A starts transmission at t0 and B at
the farthest in the channel start transmission at
t0 ? - ??, then A will not know about the
collision until t0 2? - ?? - Therefore, we model the contention period as a
slotted ALOHA system with slot width 2? - Collision detection is an analog process
- so the signal encoding must allow collisions to
be detected (two 0 volts will be 0 volt). - A sending station must continuously monitor the
channel, listening for noise bursts that might
indicate a collision. - So, CSMA/CD with a single channel is a
half-duplex system inherently, as the receiving
logic is in use. - No MAC-sublayer protocol guarantees reliable
delivery (the receiving side may not correctly
copy the frame!).
27Collision-Free Protocols
- In CSMA/CD still collisions can happen during the
contention period - Adversely affecting the system performance.
- Especially when the cable is long and frames are
short - Collision-Free Protocols
- Do not have any collisions
- Not widely used yet
- Examples
- A Bit-Map Protocol
- Binary Countdown Protocol
28A Bit-Map Protocol
- Efficiency
- Low loads With the overhead per frame, N bits,
and data d bits, the efficiency is d / (N d) - High loads With the overhead per frame, 1 bit,
the efficiency is d / (1 d) - Problem The overhead is one bit per station, so
it does not scale well
The basic bit-map protocol.
29Binary Countdown Protocol
- All addresses are assume to be the same length.
- The bits in each address position from different
stations are BOOLEAN ORed together. - The channel efficiency
- d / (d log2 N)
The binary countdown protocol. A dash indicates
silence.
30Limited-Contention Protocols
- Performance measures
- Low delay at low loads
- Contention protocols (e.g., pure of slotted
ALOHA) - High channel efficiency at high loads
- Collision-free protocols
- It would be best if we could combine the best
properties of the contention and collision-free
protocols. - Limited-Contention Protocol
- Uses a contention protocol at low load
- Uses collision-free protocol at high load
31Limited-Contention Protocols
- Acquisition probability for a symmetric
contention channel.
32Adaptive Tree Walk Protocol
- The tree for eight stations.
33Wavelength Division Multiple Access Protocols
- A different approach to channel allocation is to
divide the channel into sub-channels using FDM,
TDM, or both, and dynamically allocate them as
needed.
Wavelength division multiple access.
34Wireless LAN Protocols
- Portal and Mobile computers may not be the same!
- CSMA may not be appropriate, because what matters
is interference at the receiver, and not at the
sender side. - Hidden Station Problem a station not being able
to detect a potential competitor for the medium
because the competitor is too far away. - Exposes Station Problem a station falsely avoid
transmission, because it senses activity on the
network that does not affect the intended
receiver.
35Wireless LAN Protocols
- A wireless LAN
- Hidden Station Problem A is transmitting and if
C transmits too, then there will be collision at
B. - B is transmitting and for that, C is avoiding
transmission to D.
36Wireless LAN Protocols (2)
- The Multiple Access with Collision Avoidance
(MACA) protocol. - (a) A sending an RTS to B.
- (b) B responding with a CTS to A.
37Agenda
- The Channel Allocation Problem
- Multiple Access Protocols
- Ethernet
- Wireless LANs
- Broadband Wireless
- Bluetooth
- Data Link Layer Switching
- Summary
38Ethernet
- Ethernet Cabling
- Manchester Encoding
- The Ethernet MAC Sublayer Protocol
- The Binary Exponential Backoff Algorithm
- Ethernet Performance
- Switched Ethernet
- Fast Ethernet
- Gigabit Ethernet
- IEEE 802.2 Logical Link Control
- Retrospective on Ethernet
39IEEE 802
- The IEEE has standardized a number of LANs and
MANs under the name IEEE 802. - 802.3 is Ethernet (based on the original
Ethernet) - 802.11 is for Wireless LAN
- 802.15 is for Bluetooth
- 802.16 is for Wireless MAN
- 802.2 is for logical link control for both 802.3
and 802.11
40Ethernet Cabling
- 10Base5 10Base2
- 10 Mbps, Base is for baseband signaling, 500
185 meters - 10Base-T and 10Base-F
- T for Twisted Pair and F for Fiber
The most common kinds of Ethernet cabling.
41Ethernet Cabling (2)
- Three kinds of Ethernet cabling.
- (a) 10Base5, (b) 10Base2, (c) 10Base-T.
42Ethernet Cabling (3)
- Cable topologies. (a) Linear, (b) Spine, (c)
Tree, (d) Segmented.
43Ethernet Cabling (4)
- (a) Binary encoding, (b) Manchester encoding,
(c) Differential Manchester encoding.
44Ethernet MAC Sublayer Protocol
- Preamble (10101010 pattern) The Manchester
encoding will produce a 10 MHz square wave for
6.4 ??sec to allow the receiver clock to
synchronize - Type multiple network protocols Which process
to give the frame to. - Pad Frame size at least 64 bytes frames must
take more than 2?. - For 10 Mbps, max length of 2500 m, and four
repeaters, 2? is 50 ?sec - So, 500 bits is the smallest frame that can work
- SoF Start of Frame delimiter for compatibility
with 802.4 and 802.5
Frame formats. (a) The original DIX (DEC, Intel,
and Xerox) Ethernet, (b) IEEE 802.3.
45Ethernet MAC Sublayer Protocol (2)
46Ethernet Performance
- Efficiency of Ethernet at 10 Mbps with 512-bit
slot times.
47Switched Ethernet
- A simple example of switched Ethernet.
- Collision domains are different.
48Fast Ethernet
- The original fast Ethernet cabling.
49Gigabit Ethernet
- A two-station Ethernet.
- (b) A multistation Ethernet.
50Gigabit Ethernet (2)
- Gigabit Ethernet cabling.
51IEEE 802.2 Logical Link Control
- (a) Position of LLC. (b) Protocol formats.
52Agenda
- The Channel Allocation Problem
- Multiple Access Protocols
- Ethernet
- Wireless LANs
- Broadband Wireless
- Bluetooth
- Data Link Layer Switching
- Summary
53Wireless LANs
- The 802.11 Protocol Stack
- The 802.11 Physical Layer
- The 802.11 MAC Sublayer Protocol
- The 802.11 Frame Structure
- Services
54The 802.11 Protocol Stack
- Part of the 802.11 protocol stack.
55The 802.11 MAC Sublayer Protocol
- (a) The hidden station problem.
- (b) The exposed station problem.
56The 802.11 MAC Sublayer Protocol
- The use of virtual channel sensing using CSMA/CA.
57The 802.11 MAC Sublayer Protocol
58The 802.11 MAC Sublayer Protocol
- Interframe spacing in 802.11.
59The 802.11 Frame Structure
60802.11 Services
Distribution Services
- Association
- Disassociation
- Reassociation
- Distribution
- Integration
61802.11 Services
Intracell Services
- Authentication
- Deauthentication
- Privacy
- Data Delivery
62Agenda
- The Channel Allocation Problem
- Multiple Access Protocols
- Ethernet
- Wireless LANs
- Broadband Wireless
- Bluetooth
- Data Link Layer Switching
- Summary
63Broadband Wireless
- Comparison of 802.11 and 802.16
- The 802.16 Protocol Stack
- The 802.16 Physical Layer
- The 802.16 MAC Sublayer Protocol
- The 802.16 Frame Structure
64The 802.16 Protocol Stack
- The 802.16 Protocol Stack.
65The 802.16 Physical Layer
- The 802.16 transmission environment.
66The 802.16 Physical Layer (2)
- Frames and time slots for time division duplexing.
67The 802.16 MAC Sublayer Protocol
- Service Classes
- Constant bit rate service
- Real-time variable bit rate service
- Non-real-time variable bit rate service
- Best efforts service
68The 802.16 Frame Structure
- (a) A generic frame. (b) A bandwidth request
frame.
69Agenda
- The Channel Allocation Problem
- Multiple Access Protocols
- Ethernet
- Wireless LANs
- Broadband Wireless
- Bluetooth
- Data Link Layer Switching
- Summary
70Bluetooth
- Bluetooth Architecture
- Bluetooth Applications
- The Bluetooth Protocol Stack
- The Bluetooth Radio Layer
- The Bluetooth Baseband Layer
- The Bluetooth L2CAP Layer
- The Bluetooth Frame Structure
71Bluetooth Architecture
- Two piconets can be connected to form a
scatternet.
72Bluetooth Applications
73The Bluetooth Protocol Stack
- The 802.15 version of the Bluetooth protocol
architecture.
74The Bluetooth Frame Structure
- A typical Bluetooth data frame.
75Agenda
- The Channel Allocation Problem
- Multiple Access Protocols
- Ethernet
- Wireless LANs
- Data Link Layer Switching
- Summary
76Data Link Layer Switching
- Bridges from 802.x to 802.y
- Local Internetworking
- Spanning Tree Bridges
- Remote Bridges
- Repeaters, Hubs, Bridges, Switches, Routers,
Gateways - Virtual LANs
77Data Link Layer Switching
- Multiple LANs connected by a backbone to handle a
total load higher than the capacity of a single
LAN.
78Bridges from 802.x to 802.y
- Operation of a LAN bridge from 802.11 to 802.3.
79Bridges from 802.x to 802.y (2)
- The IEEE 802 frame formats. The drawing is not
to scale.
80Local Internetworking
- A configuration with four LANs and two bridges.
81Spanning Tree Bridges
- Two parallel transparent bridges.
82Spanning Tree Bridges (2)
- Interconnected LANs.
- (b) A spanning tree covering the LANs. The dotted
lines are not part of the spanning tree.
83Remote Bridges
- Remote bridges can be used to interconnect
distant LANs.
84Repeaters, Hubs, Bridges, Switches, Routers and
Gateways
- (a) Which device is in which layer.
- (b) Frames, packets, and headers.
85Repeaters, Hubs, Bridges, Switches, Routers and
Gateways (2)
- (a) A hub. (b) A bridge. (c) a switch.
86Virtual LANs
- A building with centralized wiring using hubs and
a switch.
87Virtual LANs (2)
- (a) Four physical LANs organized into two
VLANs, gray and white, by two bridges. (b) The
same 15 machines organized into two VLANs by
switches.
88The IEEE 802.1Q Standard
- Transition from legacy Ethernet to VLAN-aware
Ethernet. The shaded symbols are VLAN aware.
The empty ones are not.
89The IEEE 802.1Q Standard (2)
- The 802.3 (legacy) and 802.1Q Ethernet frame
formats.
90Agenda
- The Channel Allocation Problem
- Multiple Access Protocols
- Ethernet
- Data Link Layer Switching
- Summary
91Summary
- Channel allocation methods and systems for a
common channel.