Title: The Medium Access Control (MAC) Sublayer
1TheMedium Access Control (MAC)Sublayer
2The Channel Allocation Problem
- Static Channel Allocation in LANs and MANs
- Dynamic Channel Allocation in LANs and MANs
3Static Channel Allocation
- FDM Frequency Division Multiplexing
- T Mean time delay
- Arrival rate ? frames/sec
- Channel Capacity C bps
- Frame length Drawn from exponential function
- 1/µ bits/frame
- T 1 / (µC ?)
- FDM one central queue
- Single channel is divided into N independent
sub-channels, each with capacity C/N bps. - TN 1 / µ (C/N) (?/N) N / (µC ?) NT
4Dynamic Channel Allocation in LANs and MANs
- Station Model N independent stations
- Single Channel Assumption.
- Collision Assumption the event of collision of
2 frames can be detected by all stations - (a) Continuous Time.(b) Slotted Time.
- (a) Carrier Sense.(b) No Carrier Sense.
5Multiple Access Protocols
- ALOHA
- Carrier Sense Multiple Access Protocols
- Collision-Free Protocols
- Limited-Contention Protocols
- Wavelength Division Multiple Access Protocols
- Wireless LAN Protocols
6Pure ALOHA
- In pure ALOHA, frames are transmitted at
completely arbitrary times.
7Pure ALOHA (2)
- Vulnerable period for the shaded frame.
8Static Channel Allocation
- Assumption Infinite Population
- N frames per mean frame time
- N gt 1 always collision
- K transmission attempts per frame. So G frames
per second. - G gt N
- Throughput S G.P0, where P0 is the prob. that
a frame does not suffer collision. - Prk (Gk . e-G)/ k!
- S G e-2G
9Pure ALOHA (3)
- Throughput versus offered traffic for ALOHA
systems.
10Static Channel Allocation
- Variation of collision with G
- Probability that all other users are silent (1
e-G) - Probability that transmission requires exactly k
attempts - Pk e-G (1 e-G)k-1
- Expectation S k.Pk eG
11Persistent and Nonpersistent CSMA
- Comparison of the channel utilization versus load
for various random access protocols.
12CSMA with Collision Detection
- CSMA/CD can be in one of three states
contention, transmission, or idle.
13CSMA/CD Performance
- A probability that exactly one station attempts
a transmission in a slot and therefore acquires
the medium binomial probability that any one
station attempts to transmit and the others dont - The function takes on a maximum over P when P
1/N.
- Maximum throughput will be achieved if the
probability of successful seizure of the medium
is maximized. - During periods of heavy usage, a station should
restrain its offered load to 1/N.
14CSMA/CD Performance
- The summation converges to
- Max. utilization length of a transmission
interval as a proportion of a cycle consisting of
a transmission and a contention interval.
15Collision-Free Protocols
- The basic bit-map protocol.
- Performance
- Always 1 bit/station/frame transmitted is the
overhead. - Channel efficiency U d / d1, under high load
- U d/ dN, under low load
- N number of bits, d frame size
16Collision-Free Protocols (2)
Token
Station
Direction of transmission
- Token Passing.
- Performance
- Similar to bit-map protocol.
- Since all positions in the cycle are equivalent,
there is no bias for low- or high-numbered
stations.
17Collision-Free Protocols (3)
- The binary countdown protocol. A dash indicates
silence. - Performance
- Channel efficiency U d / d log2N
18Limited-Contention Protocols
Best value of p 1/k, where k is the no. of
stations. Substituting, Prsuccess with optimal
p (k 1)/kk 1
- Acquisition probability for a symmetric
contention channel.
19Adaptive Tree Walk Protocol
- The tree for eight stations.
20Wavelength Division Multiple Access Protocols
- Wavelength division multiple access.
21(No Transcript)
22Wireless LAN Protocols
- A wireless LAN. (a) A transmitting. (b) B
transmitting. - Hidden Terminal and exposed terminal problem
23Wireless LAN Protocols (2)
- The Multiple Access with Collision Avoidance
(MACA) protocol. - (a) A sending an RTS to B.
- (b) B responding with a CTS to A.
24Ethernet (802.3)
- Ethernet Cabling
- Manchester Encoding
- The Ethernet MAC Sublayer Protocol
- The Binary Exponential Backoff Algorithm
- Ethernet Performance
- Switched Ethernet
- Fast Ethernet
- Gigabit Ethernet
- IEEE 802.2 Logical Link Control
- Retrospective on Ethernet
25Ethernet Cabling
- The most common kinds of Ethernet cabling.
26Ethernet MAC Sublayer Protocol
- Frame formats. (a) DIX Ethernet, (b) IEEE 802.3.
27Preamble of 8 bytes, each containing the bit
pattern 10101010 (with the exception of the last
byte, in which the last 2 bits are set to 11).
This last byte is called the Start of Frame
delimiter for 802.3. Destination address 1
means multicast 1111 broadcast Source Address
Mac Address To do this, the first 3 bytes of
the address field are used for an OUI
(Organizationally Unique Identifier). indicate a
manufacturer. manufacturer assigns the last 3
bytes of the address
28Length and Protocol lt 1536 is length and higher
is Type
29IEEE 802.2 Logical Link Control
- (a) Position of LLC. (b) Protocol formats.
30Length of the packet cannot be too small -- 64
bytes long
31Ethernet MAC Sublayer Protocol (2)
32Switched Ethernet
- A simple example of switched Ethernet.
33- A switch improves performance over a hub in two
ways. - Since there are no collisions, the capacity is
used more efficiently. - With a switch multiple frames can be sent
simultaneously (by different stations). - These frames will reach the switch ports and
travel over the switchs backplane to be output
on the proper ports. - Two frames might be sent to the same output port
at the same time, - the switch must have buffering so that it
- can temporarily queue an input frame until it can
be transmitted to the output port.
34Wireless LANs
- The 802.11 Protocol Stack
- The 802.11 Physical Layer
- The 802.11 MAC Sublayer Protocol
- The 802.11 Frame Structure
- Services
35The 802.11 Protocol Stack
- Part of the 802.11 protocol stack.
36The 802.11 MAC Sublayer Protocol
- (a) The hidden station problem.
- (b) The exposed station problem.
37CSMA
38END
39The 802.11 MAC Sublayer Protocol (2)
- The use of virtual channel sensing using CSMA/CA.
40The 802.11 MAC Sublayer Protocol (3)
41The 802.11 MAC Sublayer Protocol (4)
- Interframe spacing in 802.11.
42The 802.11 Frame Structure
43802.11 Services
Distribution Services
- Association
- Disassociation
- Reassociation
- Distribution
- Integration
44802.11 Services
Intracell Services
- Authentication
- Deauthentication
- Privacy
- Data Delivery
45Broadband Wireless
- Comparison of 802.11 and 802.16
- The 802.16 Protocol Stack
- The 802.16 Physical Layer
- The 802.16 MAC Sublayer Protocol
- The 802.16 Frame Structure
46The 802.16 Protocol Stack
- The 802.16 Protocol Stack.
47The 802.16 Physical Layer
- The 802.16 transmission environment.
48The 802.16 Physical Layer (2)
- Frames and time slots for time division duplexing.
49The 802.16 MAC Sublayer Protocol
- Service Classes
- Constant bit rate service
- Real-time variable bit rate service
- Non-real-time variable bit rate service
- Best efforts service
50The 802.16 Frame Structure
- (a) A generic frame. (b) A bandwidth request
frame.
51Bluetooth
- Bluetooth Architecture
- Bluetooth Applications
- The Bluetooth Protocol Stack
- The Bluetooth Radio Layer
- The Bluetooth Baseband Layer
- The Bluetooth L2CAP Layer
- The Bluetooth Frame Structure
52Bluetooth Architecture
- Two piconets can be connected to form a
scatternet.
53Bluetooth Applications
54The Bluetooth Protocol Stack
- The 802.15 version of the Bluetooth protocol
architecture.
55The Bluetooth Frame Structure
- A typical Bluetooth data frame.
56Data Link Layer Switching
- Bridges from 802.x to 802.y
- Local Internetworking
- Spanning Tree Bridges
- Remote Bridges
- Repeaters, Hubs, Bridges, Switches, Routers,
Gateways - Virtual LANs
57Data Link Layer Switching
- Multiple LANs connected by a backbone to handle a
total load higher than the capacity of a single
LAN.
58Bridges from 802.x to 802.y
- Operation of a LAN bridge from 802.11 to 802.3.
59Bridges from 802.x to 802.y (2)
- The IEEE 802 frame formats. The drawing is not
to scale.
60Local Internetworking
- A configuration with four LANs and two bridges.
61Spanning Tree Bridges
- Two parallel transparent bridges.
62Spanning Tree Bridges (2)
- (a) Interconnected LANs. (b) A spanning tree
covering the LANs. The dotted lines are not part
of the spanning tree.
63Remote Bridges
- Remote bridges can be used to interconnect
distant LANs.
64Repeaters, Hubs, Bridges, Switches, Routers and
Gateways
- (a) Which device is in which layer.
- (b) Frames, packets, and headers.
65Repeaters, Hubs, Bridges, Switches, Routers and
Gateways (2)
- (a) A hub. (b) A bridge. (c) a switch.
66Virtual LANs
- A building with centralized wiring using hubs and
a switch.
67Virtual LANs (2)
- (a) Four physical LANs organized into two
VLANs, gray and white, by two bridges. (b) The
same 15 machines organized into two VLANs by
switches.
68The IEEE 802.1Q Standard
- Transition from legacy Ethernet to VLAN-aware
Ethernet. The shaded symbols are VLAN aware.
The empty ones are not.
69The IEEE 802.1Q Standard (2)
- The 802.3 (legacy) and 802.1Q Ethernet frame
formats.
70Summary
- Channel allocation methods and systems for a
common channel.
71Ethernet Cabling (2)
- Three kinds of Ethernet cabling.
- (a) 10Base5, (b) 10Base2, (c) 10Base-T.
72Ethernet Cabling (3)
- Cable topologies. (a) Linear, (b) Spine, (c)
Tree, (d) Segmented.
73Ethernet Cabling (4)
- (a) Binary encoding, (b) Manchester encoding,
(c) Differential Manchester encoding.