The Medium Access Control (MAC) Sublayer - PowerPoint PPT Presentation

1 / 73
About This Presentation
Title:

The Medium Access Control (MAC) Sublayer

Description:

The Medium Access Control (MAC) Sublayer – PowerPoint PPT presentation

Number of Views:178
Avg rating:3.0/5.0
Slides: 74
Provided by: SteveA324
Category:

less

Transcript and Presenter's Notes

Title: The Medium Access Control (MAC) Sublayer


1
TheMedium Access Control (MAC)Sublayer
2
The Channel Allocation Problem
  • Static Channel Allocation in LANs and MANs
  • Dynamic Channel Allocation in LANs and MANs

3
Static Channel Allocation
  • FDM Frequency Division Multiplexing
  • T Mean time delay
  • Arrival rate ? frames/sec
  • Channel Capacity C bps
  • Frame length Drawn from exponential function
  • 1/µ bits/frame
  • T 1 / (µC ?)
  • FDM one central queue
  • Single channel is divided into N independent
    sub-channels, each with capacity C/N bps.
  • TN 1 / µ (C/N) (?/N) N / (µC ?) NT

4
Dynamic Channel Allocation in LANs and MANs
  1. Station Model N independent stations
  2. Single Channel Assumption.
  3. Collision Assumption the event of collision of
    2 frames can be detected by all stations
  4. (a) Continuous Time.(b) Slotted Time.
  5. (a) Carrier Sense.(b) No Carrier Sense.

5
Multiple Access Protocols
  • ALOHA
  • Carrier Sense Multiple Access Protocols
  • Collision-Free Protocols
  • Limited-Contention Protocols
  • Wavelength Division Multiple Access Protocols
  • Wireless LAN Protocols

6
Pure ALOHA
  • In pure ALOHA, frames are transmitted at
    completely arbitrary times.

7
Pure ALOHA (2)
  • Vulnerable period for the shaded frame.

8
Static Channel Allocation
  • Assumption Infinite Population
  • N frames per mean frame time
  • N gt 1 always collision
  • K transmission attempts per frame. So G frames
    per second.
  • G gt N
  • Throughput S G.P0, where P0 is the prob. that
    a frame does not suffer collision.
  • Prk (Gk . e-G)/ k!
  • S G e-2G

9
Pure ALOHA (3)
  • Throughput versus offered traffic for ALOHA
    systems.

10
Static Channel Allocation
  • Variation of collision with G
  • Probability that all other users are silent (1
    e-G)
  • Probability that transmission requires exactly k
    attempts
  • Pk e-G (1 e-G)k-1
  • Expectation S k.Pk eG

11
Persistent and Nonpersistent CSMA
  • Comparison of the channel utilization versus load
    for various random access protocols.

12
CSMA with Collision Detection
  • CSMA/CD can be in one of three states
    contention, transmission, or idle.

13
CSMA/CD Performance
  • A probability that exactly one station attempts
    a transmission in a slot and therefore acquires
    the medium binomial probability that any one
    station attempts to transmit and the others dont
  • The function takes on a maximum over P when P
    1/N.
  • Maximum throughput will be achieved if the
    probability of successful seizure of the medium
    is maximized.
  • During periods of heavy usage, a station should
    restrain its offered load to 1/N.

14
CSMA/CD Performance
  • The summation converges to
  • Max. utilization length of a transmission
    interval as a proportion of a cycle consisting of
    a transmission and a contention interval.

15
Collision-Free Protocols
  • The basic bit-map protocol.
  • Performance
  • Always 1 bit/station/frame transmitted is the
    overhead.
  • Channel efficiency U d / d1, under high load
  • U d/ dN, under low load
  • N number of bits, d frame size

16
Collision-Free Protocols (2)
Token
Station
Direction of transmission
  • Token Passing.
  • Performance
  • Similar to bit-map protocol.
  • Since all positions in the cycle are equivalent,
    there is no bias for low- or high-numbered
    stations.

17
Collision-Free Protocols (3)
  • The binary countdown protocol. A dash indicates
    silence.
  • Performance
  • Channel efficiency U d / d log2N

18
Limited-Contention Protocols
Best value of p 1/k, where k is the no. of
stations. Substituting, Prsuccess with optimal
p (k 1)/kk 1
  • Acquisition probability for a symmetric
    contention channel.

19
Adaptive Tree Walk Protocol
  • The tree for eight stations.

20
Wavelength Division Multiple Access Protocols
  • Wavelength division multiple access.

21
(No Transcript)
22
Wireless LAN Protocols
  • A wireless LAN. (a) A transmitting. (b) B
    transmitting.
  • Hidden Terminal and exposed terminal problem

23
Wireless LAN Protocols (2)
  • The Multiple Access with Collision Avoidance
    (MACA) protocol.
  • (a) A sending an RTS to B.
  • (b) B responding with a CTS to A.

24
Ethernet (802.3)
  • Ethernet Cabling
  • Manchester Encoding
  • The Ethernet MAC Sublayer Protocol
  • The Binary Exponential Backoff Algorithm
  • Ethernet Performance
  • Switched Ethernet
  • Fast Ethernet
  • Gigabit Ethernet
  • IEEE 802.2 Logical Link Control
  • Retrospective on Ethernet

25
Ethernet Cabling
  • The most common kinds of Ethernet cabling.

26
Ethernet MAC Sublayer Protocol
  • Frame formats. (a) DIX Ethernet, (b) IEEE 802.3.

27
Preamble of 8 bytes, each containing the bit
pattern 10101010 (with the exception of the last
byte, in which the last 2 bits are set to 11).
This last byte is called the Start of Frame
delimiter for 802.3. Destination address 1
means multicast 1111 broadcast Source Address
Mac Address To do this, the first 3 bytes of
the address field are used for an OUI
(Organizationally Unique Identifier). indicate a
manufacturer. manufacturer assigns the last 3
bytes of the address
28
Length and Protocol lt 1536 is length and higher
is Type
29
IEEE 802.2 Logical Link Control
  • (a) Position of LLC. (b) Protocol formats.

30
Length of the packet cannot be too small -- 64
bytes long
31
Ethernet MAC Sublayer Protocol (2)
32
Switched Ethernet
  • A simple example of switched Ethernet.

33
  • A switch improves performance over a hub in two
    ways.
  • Since there are no collisions, the capacity is
    used more efficiently.
  • With a switch multiple frames can be sent
    simultaneously (by different stations).
  • These frames will reach the switch ports and
    travel over the switchs backplane to be output
    on the proper ports.
  • Two frames might be sent to the same output port
    at the same time,
  • the switch must have buffering so that it
  • can temporarily queue an input frame until it can
    be transmitted to the output port.

34
Wireless LANs
  • The 802.11 Protocol Stack
  • The 802.11 Physical Layer
  • The 802.11 MAC Sublayer Protocol
  • The 802.11 Frame Structure
  • Services

35
The 802.11 Protocol Stack
  • Part of the 802.11 protocol stack.

36
The 802.11 MAC Sublayer Protocol
  • (a) The hidden station problem.
  • (b) The exposed station problem.

37
CSMA
  • Exponential Back-off

38
END
39
The 802.11 MAC Sublayer Protocol (2)
  • The use of virtual channel sensing using CSMA/CA.

40
The 802.11 MAC Sublayer Protocol (3)
  • A fragment burst.

41
The 802.11 MAC Sublayer Protocol (4)
  • Interframe spacing in 802.11.

42
The 802.11 Frame Structure
  • The 802.11 data frame.

43
802.11 Services
Distribution Services
  • Association
  • Disassociation
  • Reassociation
  • Distribution
  • Integration

44
802.11 Services
Intracell Services
  • Authentication
  • Deauthentication
  • Privacy
  • Data Delivery

45
Broadband Wireless
  • Comparison of 802.11 and 802.16
  • The 802.16 Protocol Stack
  • The 802.16 Physical Layer
  • The 802.16 MAC Sublayer Protocol
  • The 802.16 Frame Structure

46
The 802.16 Protocol Stack
  • The 802.16 Protocol Stack.

47
The 802.16 Physical Layer
  • The 802.16 transmission environment.

48
The 802.16 Physical Layer (2)
  • Frames and time slots for time division duplexing.

49
The 802.16 MAC Sublayer Protocol
  • Service Classes
  • Constant bit rate service
  • Real-time variable bit rate service
  • Non-real-time variable bit rate service
  • Best efforts service

50
The 802.16 Frame Structure
  • (a) A generic frame. (b) A bandwidth request
    frame.

51
Bluetooth
  • Bluetooth Architecture
  • Bluetooth Applications
  • The Bluetooth Protocol Stack
  • The Bluetooth Radio Layer
  • The Bluetooth Baseband Layer
  • The Bluetooth L2CAP Layer
  • The Bluetooth Frame Structure

52
Bluetooth Architecture
  • Two piconets can be connected to form a
    scatternet.

53
Bluetooth Applications
  • The Bluetooth profiles.

54
The Bluetooth Protocol Stack
  • The 802.15 version of the Bluetooth protocol
    architecture.

55
The Bluetooth Frame Structure
  • A typical Bluetooth data frame.

56
Data Link Layer Switching
  • Bridges from 802.x to 802.y
  • Local Internetworking
  • Spanning Tree Bridges
  • Remote Bridges
  • Repeaters, Hubs, Bridges, Switches, Routers,
    Gateways
  • Virtual LANs

57
Data Link Layer Switching
  • Multiple LANs connected by a backbone to handle a
    total load higher than the capacity of a single
    LAN.

58
Bridges from 802.x to 802.y
  • Operation of a LAN bridge from 802.11 to 802.3.

59
Bridges from 802.x to 802.y (2)
  • The IEEE 802 frame formats. The drawing is not
    to scale.

60
Local Internetworking
  • A configuration with four LANs and two bridges.

61
Spanning Tree Bridges
  • Two parallel transparent bridges.

62
Spanning Tree Bridges (2)
  • (a) Interconnected LANs. (b) A spanning tree
    covering the LANs. The dotted lines are not part
    of the spanning tree.

63
Remote Bridges
  • Remote bridges can be used to interconnect
    distant LANs.

64
Repeaters, Hubs, Bridges, Switches, Routers and
Gateways
  • (a) Which device is in which layer.
  • (b) Frames, packets, and headers.

65
Repeaters, Hubs, Bridges, Switches, Routers and
Gateways (2)
  • (a) A hub. (b) A bridge. (c) a switch.

66
Virtual LANs
  • A building with centralized wiring using hubs and
    a switch.

67
Virtual LANs (2)
  • (a) Four physical LANs organized into two
    VLANs, gray and white, by two bridges. (b) The
    same 15 machines organized into two VLANs by
    switches.

68
The IEEE 802.1Q Standard
  • Transition from legacy Ethernet to VLAN-aware
    Ethernet. The shaded symbols are VLAN aware.
    The empty ones are not.

69
The IEEE 802.1Q Standard (2)
  • The 802.3 (legacy) and 802.1Q Ethernet frame
    formats.

70
Summary
  • Channel allocation methods and systems for a
    common channel.

71
Ethernet Cabling (2)
  • Three kinds of Ethernet cabling.
  • (a) 10Base5, (b) 10Base2, (c) 10Base-T.

72
Ethernet Cabling (3)
  • Cable topologies. (a) Linear, (b) Spine, (c)
    Tree, (d) Segmented.

73
Ethernet Cabling (4)
  • (a) Binary encoding, (b) Manchester encoding,
    (c) Differential Manchester encoding.
Write a Comment
User Comments (0)
About PowerShow.com