Title: The Medium Access Control (MAC) Sublayer
1The Medium Access Control (MAC)Sublayer
2The Channel Allocation Problem
- Static Channel Allocation in LANs and MANs
- Example FDM, where each link may be assigned a
different frequency. - Works ok for only a small number of links
- Performance is poor
- Dynamic Channel Allocation in LANs and MANs
- A common physical channel is to be shared
- How to support effective sharing, e.g., which
link should use the channel when and for how
long, etc.
3Performance
4Dynamic Channel Allocation in LANs and MANs
- Station Model.
- Single Channel Assumption.
- Collision Assumption.
- (a) Continuous Time.(b) Slotted Time.
- (a) Carrier Sense.(b) No Carrier Sense.
5Multiple Access Protocols
- ALOHA
- Carrier Sense Multiple Access Protocols
- Collision-Free Protocols
- Limited-Contention Protocols
- Wavelength Division Multiple Access Protocols
- Wireless LAN Protocols
6Pure ALOHA
- In pure ALOHA, frames are transmitted at
completely arbitrary times.
7Pure ALOHA (2)
- Analysis background
- Poisson arrivals
- Frames arrive at random times
- Random ? probabilistic behavior
- N frames arriving in time t?
- N is random (Poisson distribution)
- Problem probability of no arrival in a time
interval 2 frames ? - No collisions ? no arrivals in this interval
- Time interval between two successive arrivals is
Exponentially distributed
- Vulnerable period for the shaded frame.
8Pure ALOHA (3)
- Slotted Aloha Channel is divided into time
slots. - Any sender can access the channel at the
beginning of a time slot - Collision window t G
- Throughput versus offered traffic for ALOHA
systems.
t
t
2t
3t
4t
9Carrier Sense Multiple Access (CSMA)
- Slotted Aloha can achieve a maximum of 37
channel utilization - Why poor utilization? Senders do not bother to
monitor the channel - This leads to higher collision probability
- All senders monitor the channel to find out any
one is already using the channel ? Carrier sense
- If someone is using the channel what to do
- Sender keeps itself busy in listening to the
channel all the time (Persistent CSMA) - Sender backs off (sleeps) for random time before
trying again (non-persistent CSMA) - Try again with probability p (lt 1) (p-persistent
CSMA)
10Persistent and Nonpersistent CSMA
- Comparison of the channel utilization versus load
for various random access protocols.
11CSMA with Collision Detection
- CSMA/CD can be in one of three states
contention, transmission, or idle.
12Collision-Free Protocols
t0
t1
t2
t6
t7
- The basic bit-map protocol.
- Low numbered stations are at a disadvantage (they
have less time to react) - Overhead d/(Nd) (d frame size, N contention
bits) - Low load overhead is higher
- High load overhead Nd/(NNd) d/(d1)
- Does not scale well i.e., as N becomes large.
13Collision-Free Protocols (2)
- N stations can be coded by log2N bits (instead of
N) - Channel efficiency d/(d log2N)
- The binary countdown protocol. A dash indicates
silence.
14Limited-Contention Protocols
- Broadly, two methods for shared access
- CSMA
- Collision Free (CF)
- Performance small delay at low load, high
channel utilization at high loads - Low load ALOHA or CSMA have low delay CF high
delay - High load ALOHA, CSMA too many collisions
- High load collision free, but at the expense of
increased overhead - Mix the two Limited contention protocols
- Acquisition probability for a symmetric
contention channel.
15Adaptive Tree Walk Protocol
- The tree for eight stations.
- Assume previous frame was sent successfully. In
the following contention slot 0 - All stations are permitted to contend (I.e., we
are node 1, level 0) - If only one (of 8) is ready, it acquires the
channel. - Else, there was a contention and slot 1 is
offered to stations under node 2 - If stations under node 2 incur a collision,
offer slot 3 to stations under 4 etc. - If none of the stations under 2 want the
channel, next slot (3) is offered to node 3 - Essentially, depth first traversal of the binary
tree.
16Wavelength Division Multiple Access Protocols
- Wavelength division multiple access.
17Wireless LAN Protocols
- A wireless LAN. (a) A transmitting. (b) B
transmitting. - Essentially, CSMA approach
- What really matters is the interference at the
receiver. - (a) node C may not hear node A, even though
B can (hidden node problem) - (b) node B talking to A which can be heard
by C, thus preventing C from talking to D,
even though, C can not be heard by A (Exposed
node problem)
18Wireless LAN Protocols (2)
- The MACA protocol. (a) A sending an RTS to B.
- (b) B responding with a CTS to A.
19Ethernet
- Ethernet Cabling
- Manchester Encoding
- The Ethernet MAC Sublayer Protocol
- The Binary Exponential Backoff Algorithm
- Ethernet Performance
- Switched Ethernet
- Fast Ethernet
- Gigabit Ethernet
- IEEE 802.2 Logical Link Control
- Retrospective on Ethernet
20Ethernet Cabling
- The most common kinds of Ethernet cabling.
21Ethernet Cabling (2)
- Three kinds of Ethernet cabling.
- (a) 10Base5, (b) 10Base2, (c) 10Base-T.
22Ethernet Cabling (3)
- Cable topologies. (a) Linear, (b) Spine, (c)
Tree, (d) Segmented.
23Manchester Coding (Clock Embedding)
- (a) Binary encoding, (b) Manchester encoding,
(c) Differential Manchester encoding.
- Each bit needs to be sampled in the middle
- Because and noise and clock drift, middle point
is difficult do establish - Manchester coding embeds clock within the data
itself - Clock can be recovered from the data (strong
signal at 2f) - Effective bandwidth is halved.
24IEEE 802.2 Logical Link Control
- (a) Position of LLC. (b) Protocol formats.
25Ethernet MAC Sublayer Protocol
(a)
- Frame formats
- (a) DIX Ethernet, (b) IEEE 802.3.
(b)
- Ethernet Address 6 bytes or 48 bits long
(b0..b47) - Point to point address
- Broadcast address FFFFFFFFFFFF
- Multicast address range starting from 01005e
b470
26Ethernet MAC Sublayer Protocol (2)
- Collision detection can Take as long as 2t
- Minimum packet size considerations
- Collision (if occurring) must be detected while
sender is in the transmission state - That is, frame duration should be gt 2t
- Minimum frame t/bit rate
- Bit rate 10Mbps, Max. cable length 2500m 4
repeaters, 2t ? 50 µsec - Min. frame size 500 bits or 512 bits 64 bytes
(hence the need for padding) - Collision ? binary exponential back off algorith
- After collision, time is discretized into slots
of duration 2t 51.2 µsec - 1st collision wait 0 or 1 slot time 2nd
collision wait 0, 1,2,3 3rd 0..7 x 51.2 µsec - Max 1023 slots
27Ethernet Performance
- p prob. that a station contends
- A prob. that some station is successful
- Assume that ith station is successful
- only the ith station wants to transmit (p)
- none of the other (k-1) stations xmit
-
- prob. that contention interval j slots?
- First (j-1) slots had collisions, jth slot
success qj A(1-A)j-1 - Mean of collisions before success
- Efficiency of Ethernet at 10 Mbps with 512-bit
slot times.
- For optimal p, mean contention interval
28Switched Ethernet
- A simple example of switched Ethernet.
29Fast Ethernet
- The original fast Ethernet cabling.
30Gigabit Ethernet
- (a) A two-station Ethernet. (b) A multistation
Ethernet.
31Gigabit Ethernet (2)
- Gigabit Ethernet cabling.
32Wireless LANs
- The 802.11 Protocol Stack
- The 802.11 Physical Layer
- The 802.11 MAC Sublayer Protocol
- The 802.11 Frame Structure
- Services
33The 802.11 Protocol Stack
- Part of the 802.11 protocol stack.
34The 802.11 MAC Sublayer Protocol
- (a) The hidden node problem.
- (b) The exposed node problem.
- Wireless technology inherently can not support
CSMA/CD - The CD part is not possible (receiver will get
saturated with its stations transmitter) - 802.11 instead uses CSMA/CA (collision avoidance)
- Collision avoidance use of DCF(mandatory) and
PCF (optional uses WAP)
35802.11 Operation Modes
Ad-hoc mode
Infrastructure mode
36Coordination Modes
- DCF Distributed coordination function stations
communicate among themselves - PCF Point coordination function controlled by
AP used as a base station - AP polls all stations that want to communicate
- AP stores and forwards frames
- Reservation is implied via polling, hence
collision free - PCF is optional
37The 802.11 MAC DCF
- The use of virtual channel sensing using CSMA/CA.
38802.11 MAC Frame Fragmentation
- Need to fragment a frame wireless channel
exhibits high BER, Perr p 10-4 - Ethernet frame 1518 bytes ? n12,144 bits
- Prob. Of entire frame incurring no error (1-p)n
lt 0.30 - Why not make n smaller ? entire is broken down
into smaller fragments - Each fragment is individually ACKed
- Higher probability of fragment being received
correctly - Less time overhead to re-transmit fragments.
39802.11 MAC Inter-frame Timings
- Interframe spacing in 802.11.
40The 802.11 Frame Structure
12-bit frame, 4-bit fragement
Re-xmitted fragment (lost ACK?)
WEP in use
Data Control Mgmt
POLL RTS CTS ACK etc.
A1 A2 A3 A4
DA, SA, BSSID, N/A DA,
BSSID SA N/A BSSID SA
DA N/A RAAP TAAP DA
SA
More fragments of this frame are remaining
Used only by AP to inform that it has more
frames (buffered) for the dest. station
41802.11 Services
Services 5 distribution service 4 station
services
- Association
- Disassociation
- Re-association
- Distribution (wireless, routing..)
- Integration (Bridging)
42802.11 Services
- Intracell (station) Services
- Authentication
- Deauthentication (on leaving)
- Privacy (must be encrypted)
- Data Delivery
43Broadband Wireless
- 802.16 is being discussed by the IEEE
- Connecting building using broadband wireless
- 802.11 concerned with connecting mobile stations
- Higher bandwidth (16-55 Ghz)
- Security
- Various traffic classes
44The 802.16 Protocol Stack
- The 802.16 Protocol Stack.
45The 802.16 Physical Layer
- The 802.16 transmission environment.
46The 802.16 Physical Layer (2)
- Frames and time slots for time division duplexing.
47The 802.16 MAC Sublayer Protocol
- Service Classes
- Constant bit rate service
- Real-time variable bit rate service
- Non-real-time variable bit rate service
- Best efforts service
48The 802.16 Frame Structure
- (a) A generic frame. (b) A bandwidth request
frame.
49Bluetooth
- Bluetooth Architecture
- Bluetooth Applications
- The Bluetooth Protocol Stack
- The Bluetooth Radio Layer
- The Bluetooth Baseband Layer
- The Bluetooth L2CAP Layer
- The Bluetooth Frame Structure
50Bluetooth Architecture
- Two piconets can be connected to form a
scatternet.
51Bluetooth Applications
52The Bluetooth Protocol Stack
- The 802.15 version of the Bluetooth protocol
architecture.
53The Bluetooth Frame Structure
- A typical Bluetooth data frame.
54Data Link Layer Switching
- Bridges from 802.x to 802.y
- Local Internetworking
- Spanning Tree Bridges
- Remote Bridges
- Repeaters, Hubs, Bridges, Switches, Routers,
Gateways - Virtual LANs
55Data Link Layer Bridging
- Multiple LANs connected by a backbone to handle a
total load higher than the capacity of a single
LAN.
56Bridges from 802.x to 802.y
- Transparent bridging stations should be
oblivious of segmentation - Different segments may using different MAC/LLC
- Operation of a LAN bridge from 802.11 to 802.3.
57Bridges from 802.x to 802.y (2)
- The IEEE 802 frame formats. The drawing is not
to scale.
58Local Internetworking
- A configuration with four LANs and two bridges.
59Spanning Tree Bridges
- Two parallel transparent bridges.
60Spanning Tree Bridges (2)
- (a) Interconnected LANs. (b) A spanning tree
covering the LANs. The dotted lines are not part
of the spanning tree.
61Remote Bridges
- Remote bridges can be used to interconnect
distant LANs.
62Repeaters, Hubs, Bridges, Switches, Routers and
Gateways
- (a) Which device is in which layer.
- (b) Frames, packets, and headers.
63Repeaters, Hubs, Bridges, Switches, Routers and
Gateways (2)
- (a) A hub. (b) A bridge. (c) a switch.
64Virtual LANs
- A building with centralized wiring using hubs and
a switch.
65Virtual LANs (2)
- (a) Four physical LANs organized into two
VLANs, gray and white, by two bridges. (b) The
same 15 machines organized into two VLANs by
switches.
66The IEEE 802.1Q Standard
- Transition from legacy Ethernet to VLAN-aware
Ethernet. The shaded symbols are VLAN aware.
The empty ones are not.
67The IEEE 802.1Q Standard (2)
- The 802.3 (legacy) and 802.1Q Ethernet frame
formats.
68Summary
- Channel allocation methods and systems for a
common channel.