SlideShare a Scribd company logo
Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011
The Medium Access Control
Sublayer
Chapter 4
Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011
Static Channel Allocation
• Multiplexing schemes : divide the resources
• Service delay T of a channel with capacity C bps, average
frame arrival rate of λ frames/sec, average frame length of
1/μ bits:
• Service delay of the same channel splat to N segments:
Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011
Assumptions for Dynamic Channel Allocation
1. Independent traffic
2. Single channel
3. Observable Collisions
4. Continuous or slotted time
5. Carrier sense or no carrier sense
Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011
Multiple Access Protocols
• ALOHA
• Carrier Sense Multiple Access
• Collision-free protocols
• Limited-contention protocols
• Wireless LAN protocols
Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011
ALOHA (1)
In pure ALOHA, frames are transmitted
at completely arbitrary times
Collision
Collision
Time
User
A
B
C
D
E
Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011
ALOHA (2)
Vulnerable period for the shaded frame = 2t
Average packets to be transmitted per 2 frame interval = 2G
Probability of sending k frames during a frame time =
probability of zero frames =
Channel throughput =
Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011
ALOHA (3)
The probability of a transmission requiring exactly k attempts:
The expected number of transmissions:
Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011
Persistent and Nonpersistent CSMA
Comparison of the channel utilization versus load for various
random access protocols.
Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011
CSMA with Collision Detection
When collision is detected, nodes stop sending their frames.
 station must wait 2T to know if it has seized the channel or not.
 for a 1 km cable T= 5 μsec
CSMA/CD can be in one of three states: contention, transmission, or idle.
Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011
Collision-Free Protocols (Bitmap protocol)
a) low-numbered stations must wait on average 1.5N slots and
high-numbered stations must wait 0.5N slots.
b) the mean for all stations is N slots.
c) Channel efficiency = d /(d + N) if each frame contains d bits.
Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011
Collision-Free Protocols (Token Ring)
IEEE802.5, 802.17
The efficiency is same as bitmap protocol.
Station
Direction of
transmission
Token
Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011
Binary Countdown
 A dash indicates silence.
 The channel efficiency = d /(d + log2 N).
 If the first bits of a frame are the station’s address, efficiency = 100%
Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011
Limited-Contention Protocols
 Use Contention at low load to provide low delay, and collision-
free technique at high load to provide good channel efficiency.
 The probability that some station successfully acquires the
channel during a given slot =
 the best value of p is 1/k.
Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011
Limited-Contention Protocols
a. divide the stations into (not necessarily disjoint) groups.
b. Only the members of group 0 are permitted to compete for
slot 0; and so on.
c. At one extreme, each group has but one member, it
resembles collision free protocols like binary countdown.
d. The limiting case is a single group containing all stations,
which resembles CSMA protocols.
e. The protocol should assign many stations per slot when the
load is low and few (or even just one) station per slot when
the load is high.
Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011
The Adaptive Tree Walk Protocol
The tree for eight stations.
 the average number of ready stations per time slot = q
 level i has a fraction 2^−i of the stations below it.
 the expected number of ready stations below level i= (2^−i)q
 at level i = log2 q in the tree should the search begin.
Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011
Wireless LAN Protocols
(hidden & exposed terminals)
Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011
Wireless LAN Protocols (MACA)
(a) A sending an RTS (30 bytes) to B.
(b) B responding with a CTS to A.
Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011
Ethernet (IEEE 802.3)
a) Classic Ethernet
– Shared medium
– 2.5 km max + 4 repeaters
b) switched Ethernet
– Fast Ethernet : 100 Mbps
– Gigabit Ethernet
– 10 Gigabit Ethernet
Thick Ethernet : 500 m, 100 users
Thin Ethernet: 185 m, 30 users
Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011
Classic Ethernet Physical Layer
Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011
Classic Ethernet MAC sublayer
• Preamble: 10101010  10 MHz square wave 6.4 μsec
• Start of frame: 10101011
• D_addr: 0… : unicast, 1… : multicast, 11…1 : broadcast
• S_addr: globally unique for each NIC. First 3 bytes are for
manufacturers assigned by IEEE, the last 3 byte is assigned
by manufacturer to each produced NIC.
Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011
MAC Sublayer Protocol (2)
o Collision detection can take as long as 2 so a minimum
frame length is required.
o For a 2500 m cable: RTT = 50 μsec
o For 10 Mbps BW = min frame size = 500 bit or 64 bytes.
Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011
CSMA/CD with
Binary Exponential Backoff
a) After i’th consecutive collision, the sender nodes wait a random number of
time slots between 0 and 2^i − 1.
b) Each Time slot = 51.2 μsec = 512 bit times
c) after 10 collisions, the interval is frozen at maximum 1023 slots.
d) After 16 collisions, the controller reports failure back
Ethernet Performance
probability A that some station acquires the channel:
maximized when p = 1/k, with A → 1/e as k →∞
The probability that the contention interval has exactly j slots:
mean number of slots per contention:
slot duration = 2τ, the mean contention interval, w = 2τ/A.
w is at most 2τe ∼∼ 5.4τ.
mean frame takes P sec 
The longer the cable, the longer the contention interval
Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011
Efficiency of Ethernet at 10 Mbps with 512-bit slot times
Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011
Switched Ethernet (1)
(a) Hub. (b) Switch.
Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011
Switched Ethernet (2)
An Ethernet switch.
Switch
Twisted pair
Switch ports
Hub
Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011
Fast Ethernet
 100B-T4: uses 4 twisted pairs with 25 MHz BW. 1 to the
switch, 1 from the switch and other 2 are interchangeable.
Using 3 voltage levels for symbols. Manchester encoding.
 100B-TX: 4B/5B encoding. 125 MHz BW results 100 Mbps.
2 pairs of cable required.
 100B-FX: only works with switches because the maximum
cable length should be less than 250 m for CD to work.
Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011
Gigabit Ethernet
a) Two ways to enhance cable length to 200 m when using hubs:
– Hardware carrier extension to 512 bytes.
– frame bursting
b) 8B/10B encoding is used to maintain synchronization.
c) In UTP cables all 4 pairs are used in simultaneous full-duplex mode!
With 5 voltage levels
d) Pause frames are defined to cease the communication speed.
Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011
10 Gigabit Ethernet
 Fiber cables use 64B/66B coding is used.
 CX cables use 8B/10B coding and 3.125 Gsymbol/sec on
each pair.
 T cabling requires 16 voltage levels. LDPC (Low Density
Parity Check) is used.
 40Gbps and 100Gbps Ethernet standards are in the way.
Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011
Ethernet benefits
a) Reliable: by introducing switches
b) Cheap: twisted pairs and NICs
c) Easy to maintain: no software requirement. Easy
configuration.
d) Well integration with IP: both are connection less.
e) Flexible: evolve by time in speed requirements with minimum
reconfiguration and changes.
Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011
Wireless Lans
• 802.11 architecture and protocol stack
• 802.11 physical layer
• 802.11 MAC sublayer protocol
• 802.11 frame structure
• Services
Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011
802.11 Architecture and Protocol Stack (1)
802.11 architecture – infrastructure mode
Access
Point
Client
To Network
Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011
802.11 Architecture and Protocol Stack (2)
802.11 architecture – ad-hoc mode-
Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011
802.11 Protocol Stack
1-2 Mbps 11 Mbps 54 Mbps 600 Mbps
Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011
802.11b PHY Layer
a) 1 Mbps : 11 chip barker code to spread the signal with BPSK
to send 1 bit per 11 chip. The chip rate is 11 Mchips/sec.
b) 2 Mbps : QPSK (Quadrature Phase Shift Keying) to send 2
bits per 11 chip.
c) 5.5 Mbps: CCK (Complementary Code Keying) with 4 bits per
8 chips.
d) 11 Mbps: CCK with 8 bits per 8 chips.
Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011
802.11a, g, n PHY Layer
a) Works in 5GHz band.
b) Uses OFDM (Orthogonal frequency-division multiplexing) with 52
subcarriers 48 for data and 4 for sync.
c) Each symbol lasts 4μs and sends 1, 2, 4, or 6 bits.
d) Supports 8 data rates from 6 up to 54Mbps.
e) Communication range is 1/7 802.11b because of freq. band.
f) 802.11 g uses OFDM in 2.4GHz band.
g) Supports same rates of 802.11a with same range of 802.11b
h) 802.11n doubles the channel width from 20 to 40MHz.
i) Uses multiple antennas and MIMO techniques to increase BW.
Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011
The 802.11 MAC Sublayer Protocol
Sending a frame with CSMA/CA.
The initial back off gets exponentially bigger if no ack is received.
Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011
Collision Avoidance mechanism
The use of virtual channel sensing using CSMA/CA.
NAV (Network Allocation Vector)
RTS/CTS: request to send/ clear to send
Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011
CSMA/CA
a) RTS/CTS mechanism is seldom used, because it slows down
the communication.
b) The random back-off mechanism as well as virtual carrier
sensing (by overhearing the NAV field) are the main
mechanisms to avoid collision.
c) Fragmentation is also used to keep the frame error rates
small.
d) Fragments are sent in bursts when channel is acquired and
each fragment should be acknowledged before the next one
is sent.
Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011
Power management
a) Nodes go to sleep mode and inform AP of it.
b) AP buffers traffic for sleeping nodes.
c) AP sends periodic beacons to announce which node has a
buffered frame.
d) Nodes should wake up at beacon intervals (typically
100msec) to see if they have frames.
e) If so they tell the AP to send them the frames.
Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011
Interframe timing for QoS purposes
a) SIFS (Short InterFrame Spacing)
b) DIFS (Distributed Coordination Function InterFrame Spacing)
c) AIFS (Arbitration InterFrame Space)
d) EIFS (Extended InterFrame Spacing)
Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011
802.11 Frame Structure
Format of the 802.11 data frame
Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011
Data Link Layer Switching
• Uses of bridges
• Learning bridges
• Spanning tree bridges
• Repeaters, hubs, bridges, switches,
routers, and gateways
• Virtual LANs
Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011
Using bridges to connect LANs
Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011
backward learning
a) hash tables are initially empty.
b) Bridges use a flooding algorithm.
c) Gradually By looking at the source addresses, they can tell which
machines are accessible on which ports.
d) it makes an entry in its hash table for each station.
e) the arrival time of the last frame is noted in the entry.
f) It purges all entries more than a few minutes old.
1. If the port for the destination address is the same as the source port, discard
the frame.
2. If the port for the destination address and the source port are different,
forward the frame on to the destination port.
3. If the destination port is unknown, use flooding and send the frame on all
ports except the source port.
Forwarding Rules
Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011
Protocol processing at a bridge
Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011
Loop creation in case of using redundant
links between bridges
Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011
Spanning Tree Bridging
a) B1 is elected to be the root because of its lowest ID.
Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011
Poem by Radia Perlman (1985)
Algorithm for Spanning Tree
I thinkthatIshallneversee
Agraphmorelovelythanatree.
Atreewhosecrucialproperty
Isloop-freeconnectivity.
Atreewhichmustbesuretospan.
SopacketscanreacheveryLAN.
FirsttheRootmustbeselected
ByIDitiselected.
LeastcostpathsfromRootaretraced
Inthetreethesepathsareplaced.
Ameshismadebyfolkslikeme
Thenbridgesfindaspanningtree.
Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011
Repeaters, Hubs, Bridges, Switches,
Routers, and Gateways
(a) Which device is in which layer.
(b) Frames, packets, and headers.
Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011
Virtual LANs (1)
A building with centralized wiring using hubs and a switch.
Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011
Virtual LANs (2)
Two VLANs, gray and white, on a bridged LAN.
Frames from gray LAN nodes are only forwarded to gray LAN ports.
Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011
The IEEE 802.1Q Standard (1)
The standard adds VLAN field in the MAC header.
Bridged LAN that is only partly VLAN-aware. The shaded
frames are originally VLAN aware. The empty ones are not.
Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011
The IEEE 802.1Q Standard (2)
The 802.3 (legacy) and 802.1Q Ethernet frame formats.
Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011
Home work assignment
Student Assigned problems (problems between 26-35 should be ommited)
1 37 40 6 27 1 35 9 41 9 4
2 7 42 10 16 20 27 32 39 28 17
3 14 35 9 40 34 12 7 1 13 1
4 32 15 7 5 17 8 39 2 41 30
5 26 9 21 24 2 13 28 9 20 20
6 31 4 1 30 22 28 33 15 4 38
7 11 28 10 28 4 41 31 6 23 37
8 36 12 37 24 35 40 31 26 29 24
9 5 26 4 8 15 29 41 4 19 28
10 28 36 42 30 27 4 35 33 20 38
11 28 32 27 22 38 35 24 2 6 1
12 33 31 22 16 32 0 3 30 16 35
13 36 9 14 32 30 15 14 17 20 24
14 41 30 31 1 7 5 42 22 34 2
15 7 24 21 38 9 9 37 0 11 6
16 32 5 0 28 16 23 3 4 10 18
17 22 38 35 19 8 40 23 26 9 20
18 1 17 23 7 25 18 40 15 18 15
19 39 28 6 4 25 5 12 22 17 19
20 23 30 2 25 4 26 10 37 11 18
21 38 37 21 20 30 21 10 9 20 27
22 29 13 25 16 17 10 13 8 22 11
23 1 1 15 4 40 40 32 32 34 37
24 28 24 30 12 15 41 12 41 41 36
25 10 32 9 32 31 18 43 35 38 34

More Related Content

What's hot

Wired LANs
Wired LANsWired LANs
Wired LANs
Meenakshi Paul
 
Computer Networks Unit 1 Introduction and Physical Layer
Computer Networks Unit 1 Introduction and Physical Layer Computer Networks Unit 1 Introduction and Physical Layer
Computer Networks Unit 1 Introduction and Physical Layer
Dr. SELVAGANESAN S
 
Datalinklayer tanenbaum
Datalinklayer tanenbaumDatalinklayer tanenbaum
Datalinklayer tanenbaum
Mahesh Kumar Chelimilla
 
Routing algorithm
Routing algorithmRouting algorithm
Routing algorithm
Bushra M
 
Data Link Layer| Error Detection
Data Link Layer| Error DetectionData Link Layer| Error Detection
Data Link Layer| Error Detection
Taimoor Muzaffar Gondal
 
HDLC(High level Data Link Control)
HDLC(High level Data Link Control)HDLC(High level Data Link Control)
HDLC(High level Data Link Control)
sonangrai
 
Ethernet and Token ring (Computer Networks)
Ethernet and Token ring (Computer Networks)Ethernet and Token ring (Computer Networks)
Ethernet and Token ring (Computer Networks)
Shail Nakum
 
Computer networks - Channelization
Computer networks - ChannelizationComputer networks - Channelization
Computer networks - Channelization
Elambaruthi Elambaruthi
 
IPv4 Addressing
 IPv4 Addressing   IPv4 Addressing
IPv4 Addressing
TheGodfather HA
 
TELECOMMUNICATIONS SYSTEMS
TELECOMMUNICATIONS SYSTEMSTELECOMMUNICATIONS SYSTEMS
TELECOMMUNICATIONS SYSTEMS
junnubabu
 
5 IEEE standards
5  IEEE standards5  IEEE standards
5 IEEE standards
Rodgers Moonde
 
Tcp Udp Icmp And The Transport Layer
Tcp Udp Icmp And The Transport LayerTcp Udp Icmp And The Transport Layer
Tcp Udp Icmp And The Transport Layer
tmavroidis
 
IP addressing seminar ppt
IP addressing seminar pptIP addressing seminar ppt
IP addressing seminar ppt
Smriti Rastogi
 
Cdma2000
Cdma2000Cdma2000
Cdma2000
vivek kumar
 
Media Access Control
Media Access ControlMedia Access Control
Media Access Control
VijayaLakshmi514
 
Ethernet
EthernetEthernet
Ethernet
Mihika Shah
 
MEDIUM ACCESS CONTROL
MEDIUM ACCESS CONTROLMEDIUM ACCESS CONTROL
MEDIUM ACCESS CONTROL
junnubabu
 
UMTS, Introduction.
UMTS, Introduction.UMTS, Introduction.
UMTS, Introduction.
Mateen Shahid
 

What's hot (20)

Wired LANs
Wired LANsWired LANs
Wired LANs
 
Computer Networks Unit 1 Introduction and Physical Layer
Computer Networks Unit 1 Introduction and Physical Layer Computer Networks Unit 1 Introduction and Physical Layer
Computer Networks Unit 1 Introduction and Physical Layer
 
Datalinklayer tanenbaum
Datalinklayer tanenbaumDatalinklayer tanenbaum
Datalinklayer tanenbaum
 
Routing algorithm
Routing algorithmRouting algorithm
Routing algorithm
 
Data Link Layer| Error Detection
Data Link Layer| Error DetectionData Link Layer| Error Detection
Data Link Layer| Error Detection
 
HDLC(High level Data Link Control)
HDLC(High level Data Link Control)HDLC(High level Data Link Control)
HDLC(High level Data Link Control)
 
Ethernet and Token ring (Computer Networks)
Ethernet and Token ring (Computer Networks)Ethernet and Token ring (Computer Networks)
Ethernet and Token ring (Computer Networks)
 
Computer networks - Channelization
Computer networks - ChannelizationComputer networks - Channelization
Computer networks - Channelization
 
IPv4 Addressing
 IPv4 Addressing   IPv4 Addressing
IPv4 Addressing
 
TELECOMMUNICATIONS SYSTEMS
TELECOMMUNICATIONS SYSTEMSTELECOMMUNICATIONS SYSTEMS
TELECOMMUNICATIONS SYSTEMS
 
Ip addressing classful
Ip addressing classfulIp addressing classful
Ip addressing classful
 
5 IEEE standards
5  IEEE standards5  IEEE standards
5 IEEE standards
 
Tcp Udp Icmp And The Transport Layer
Tcp Udp Icmp And The Transport LayerTcp Udp Icmp And The Transport Layer
Tcp Udp Icmp And The Transport Layer
 
IP addressing seminar ppt
IP addressing seminar pptIP addressing seminar ppt
IP addressing seminar ppt
 
Cdma2000
Cdma2000Cdma2000
Cdma2000
 
IEEE Standards
IEEE StandardsIEEE Standards
IEEE Standards
 
Media Access Control
Media Access ControlMedia Access Control
Media Access Control
 
Ethernet
EthernetEthernet
Ethernet
 
MEDIUM ACCESS CONTROL
MEDIUM ACCESS CONTROLMEDIUM ACCESS CONTROL
MEDIUM ACCESS CONTROL
 
UMTS, Introduction.
UMTS, Introduction.UMTS, Introduction.
UMTS, Introduction.
 

Similar to Chapter 4-The Medium Access Control Sublayer.ppt

Ethernet 19 20
Ethernet 19 20Ethernet 19 20
Ethernet 19 20
rajeshvbe
 
Communication Networks basics and very important topic
Communication Networks basics and very important topicCommunication Networks basics and very important topic
Communication Networks basics and very important topic
KAUSHIKKADIUM
 
ETHERNET IEEE802.pptx
ETHERNET IEEE802.pptxETHERNET IEEE802.pptx
ETHERNET IEEE802.pptx
ssuserf49c5a
 
IEEE standards 802.3.&802.11
IEEE standards 802.3.&802.11IEEE standards 802.3.&802.11
IEEE standards 802.3.&802.11
Keshav Maheshwari
 
Teletraffic Lessons for the Future Internet.ppt
Teletraffic Lessons for the Future Internet.pptTeletraffic Lessons for the Future Internet.ppt
Teletraffic Lessons for the Future Internet.ppt
trafficdep
 
Adaptive dcf of mac for vo ip services using
Adaptive dcf of mac for vo ip services usingAdaptive dcf of mac for vo ip services using
Adaptive dcf of mac for vo ip services using
Anmol Tikoo
 
Chapter 2 -_lan_network_design - Network Design
Chapter 2 -_lan_network_design - Network DesignChapter 2 -_lan_network_design - Network Design
Chapter 2 -_lan_network_design - Network Design
nakomuri
 
chapter- 6 network layer of computer network
chapter- 6 network layer of computer networkchapter- 6 network layer of computer network
chapter- 6 network layer of computer network
Stuti36
 
Wire Lan Testing
Wire Lan TestingWire Lan Testing
Wire Lan Testingwjosephson
 
OPTIMIZATION TECHNIQUES FOR SOURCE FOLLOWER BASED TRACK-AND-HOLD CIRCUIT FOR ...
OPTIMIZATION TECHNIQUES FOR SOURCE FOLLOWER BASED TRACK-AND-HOLD CIRCUIT FOR ...OPTIMIZATION TECHNIQUES FOR SOURCE FOLLOWER BASED TRACK-AND-HOLD CIRCUIT FOR ...
OPTIMIZATION TECHNIQUES FOR SOURCE FOLLOWER BASED TRACK-AND-HOLD CIRCUIT FOR ...
VLSICS Design
 
Underlying Technologies Part I (Lecture #4 ET3003 Sem1 2014/2015)
Underlying Technologies Part I (Lecture #4 ET3003 Sem1 2014/2015)Underlying Technologies Part I (Lecture #4 ET3003 Sem1 2014/2015)
Underlying Technologies Part I (Lecture #4 ET3003 Sem1 2014/2015)
Tutun Juhana
 
Et3003 sem2-1314-3 ethernets
Et3003 sem2-1314-3 ethernetsEt3003 sem2-1314-3 ethernets
Et3003 sem2-1314-3 ethernets
Tutun Juhana
 
Media Access and Internetworking
Media Access and InternetworkingMedia Access and Internetworking
Media Access and Internetworking
N.Jagadish Kumar
 
TCP Performance analysis Wireless Multihop Networks
TCP Performance analysis Wireless Multihop NetworksTCP Performance analysis Wireless Multihop Networks
TCP Performance analysis Wireless Multihop NetworksAbhishek Kona
 
MACPresentation based on medium access control mechanism
MACPresentation based on medium access control mechanismMACPresentation based on medium access control mechanism
MACPresentation based on medium access control mechanism
supriyaharlapur1
 
Sdh basics hand_outs_of_sdh_basics
Sdh basics hand_outs_of_sdh_basicsSdh basics hand_outs_of_sdh_basics
Sdh basics hand_outs_of_sdh_basics
Paul Andrew
 

Similar to Chapter 4-The Medium Access Control Sublayer.ppt (20)

Ethernet 19 20
Ethernet 19 20Ethernet 19 20
Ethernet 19 20
 
Chapter 4ver2
Chapter 4ver2Chapter 4ver2
Chapter 4ver2
 
Communication Networks basics and very important topic
Communication Networks basics and very important topicCommunication Networks basics and very important topic
Communication Networks basics and very important topic
 
ETHERNET IEEE802.pptx
ETHERNET IEEE802.pptxETHERNET IEEE802.pptx
ETHERNET IEEE802.pptx
 
Advance ethernet
Advance ethernetAdvance ethernet
Advance ethernet
 
Unit 1 ethernet vsd
Unit 1 ethernet vsdUnit 1 ethernet vsd
Unit 1 ethernet vsd
 
IEEE standards 802.3.&802.11
IEEE standards 802.3.&802.11IEEE standards 802.3.&802.11
IEEE standards 802.3.&802.11
 
Teletraffic Lessons for the Future Internet.ppt
Teletraffic Lessons for the Future Internet.pptTeletraffic Lessons for the Future Internet.ppt
Teletraffic Lessons for the Future Internet.ppt
 
Adaptive dcf of mac for vo ip services using
Adaptive dcf of mac for vo ip services usingAdaptive dcf of mac for vo ip services using
Adaptive dcf of mac for vo ip services using
 
Mac
MacMac
Mac
 
Chapter 2 -_lan_network_design - Network Design
Chapter 2 -_lan_network_design - Network DesignChapter 2 -_lan_network_design - Network Design
Chapter 2 -_lan_network_design - Network Design
 
chapter- 6 network layer of computer network
chapter- 6 network layer of computer networkchapter- 6 network layer of computer network
chapter- 6 network layer of computer network
 
Wire Lan Testing
Wire Lan TestingWire Lan Testing
Wire Lan Testing
 
OPTIMIZATION TECHNIQUES FOR SOURCE FOLLOWER BASED TRACK-AND-HOLD CIRCUIT FOR ...
OPTIMIZATION TECHNIQUES FOR SOURCE FOLLOWER BASED TRACK-AND-HOLD CIRCUIT FOR ...OPTIMIZATION TECHNIQUES FOR SOURCE FOLLOWER BASED TRACK-AND-HOLD CIRCUIT FOR ...
OPTIMIZATION TECHNIQUES FOR SOURCE FOLLOWER BASED TRACK-AND-HOLD CIRCUIT FOR ...
 
Underlying Technologies Part I (Lecture #4 ET3003 Sem1 2014/2015)
Underlying Technologies Part I (Lecture #4 ET3003 Sem1 2014/2015)Underlying Technologies Part I (Lecture #4 ET3003 Sem1 2014/2015)
Underlying Technologies Part I (Lecture #4 ET3003 Sem1 2014/2015)
 
Et3003 sem2-1314-3 ethernets
Et3003 sem2-1314-3 ethernetsEt3003 sem2-1314-3 ethernets
Et3003 sem2-1314-3 ethernets
 
Media Access and Internetworking
Media Access and InternetworkingMedia Access and Internetworking
Media Access and Internetworking
 
TCP Performance analysis Wireless Multihop Networks
TCP Performance analysis Wireless Multihop NetworksTCP Performance analysis Wireless Multihop Networks
TCP Performance analysis Wireless Multihop Networks
 
MACPresentation based on medium access control mechanism
MACPresentation based on medium access control mechanismMACPresentation based on medium access control mechanism
MACPresentation based on medium access control mechanism
 
Sdh basics hand_outs_of_sdh_basics
Sdh basics hand_outs_of_sdh_basicsSdh basics hand_outs_of_sdh_basics
Sdh basics hand_outs_of_sdh_basics
 

Recently uploaded

Domino Express Storyboard - TV Adv Toys 30"
Domino Express Storyboard - TV Adv Toys 30"Domino Express Storyboard - TV Adv Toys 30"
Domino Express Storyboard - TV Adv Toys 30"
Alessandro Occhipinti
 
My storyboard for a sword fight scene with lightsabers
My storyboard for a sword fight scene with lightsabersMy storyboard for a sword fight scene with lightsabers
My storyboard for a sword fight scene with lightsabers
AlejandroGuarnGutirr
 
Complete Lab 123456789123456789123456789
Complete Lab 123456789123456789123456789Complete Lab 123456789123456789123456789
Complete Lab 123456789123456789123456789
vickyvikas51556
 
Award template for beginner students of DVBS
Award template for beginner students of DVBSAward template for beginner students of DVBS
Award template for beginner students of DVBS
RodilynColampit
 
A Brief Introduction About Hadj Ounis
A Brief  Introduction  About  Hadj OunisA Brief  Introduction  About  Hadj Ounis
A Brief Introduction About Hadj Ounis
Hadj Ounis
 
Fashionista Chic Couture Mazes and Coloring AdventureA
Fashionista Chic Couture Mazes and Coloring AdventureAFashionista Chic Couture Mazes and Coloring AdventureA
Fashionista Chic Couture Mazes and Coloring AdventureA
julierjefferies8888
 
WEEK 11 PART 1- SOULMAKING (ARTMAKING) (1).pdf
WEEK 11 PART 1- SOULMAKING (ARTMAKING) (1).pdfWEEK 11 PART 1- SOULMAKING (ARTMAKING) (1).pdf
WEEK 11 PART 1- SOULMAKING (ARTMAKING) (1).pdf
AntonetteLaurio1
 
FinalLessonPlanResponding.docxnknknknknknk
FinalLessonPlanResponding.docxnknknknknknkFinalLessonPlanResponding.docxnknknknknknk
FinalLessonPlanResponding.docxnknknknknknk
abbieharman
 
一比一原版(UniSA毕业证)南澳大学毕业证成绩单如何办理
一比一原版(UniSA毕业证)南澳大学毕业证成绩单如何办理一比一原版(UniSA毕业证)南澳大学毕业证成绩单如何办理
一比一原版(UniSA毕业证)南澳大学毕业证成绩单如何办理
zeyhe
 
一比一原版(qut毕业证)昆士兰科技大学毕业证如何办理
一比一原版(qut毕业证)昆士兰科技大学毕业证如何办理一比一原版(qut毕业证)昆士兰科技大学毕业证如何办理
一比一原版(qut毕业证)昆士兰科技大学毕业证如何办理
taqyed
 
2024 MATFORCE Youth Poster Contest Winners
2024 MATFORCE Youth Poster Contest Winners2024 MATFORCE Youth Poster Contest Winners
2024 MATFORCE Youth Poster Contest Winners
matforce
 
HOW TO USE PINTEREST_by: Clarissa Credito
HOW TO USE PINTEREST_by: Clarissa CreditoHOW TO USE PINTEREST_by: Clarissa Credito
HOW TO USE PINTEREST_by: Clarissa Credito
ClarissaAlanoCredito
 
This is a certificate template for Daily Vacation Bible School Awards Can edi...
This is a certificate template for Daily Vacation Bible School Awards Can edi...This is a certificate template for Daily Vacation Bible School Awards Can edi...
This is a certificate template for Daily Vacation Bible School Awards Can edi...
RodilynColampit
 
Cream and Brown Illustrative Food Journal Presentation.pptx
Cream and Brown Illustrative Food Journal Presentation.pptxCream and Brown Illustrative Food Journal Presentation.pptx
Cream and Brown Illustrative Food Journal Presentation.pptx
cndywjya001
 
All the images mentioned in 'See What You're Missing'
All the images mentioned in 'See What You're Missing'All the images mentioned in 'See What You're Missing'
All the images mentioned in 'See What You're Missing'
Dave Boyle
 
My storyboard for the short film "Maatla".
My storyboard for the short film "Maatla".My storyboard for the short film "Maatla".
My storyboard for the short film "Maatla".
AlejandroGuarnGutirr
 
一比一原版(QUT毕业证)昆士兰科技大学毕业证成绩单如何办理
一比一原版(QUT毕业证)昆士兰科技大学毕业证成绩单如何办理一比一原版(QUT毕业证)昆士兰科技大学毕业证成绩单如何办理
一比一原版(QUT毕业证)昆士兰科技大学毕业证成绩单如何办理
zeyhe
 
➒➌➎➏➑➐➋➑➐➐ Dpboss Satta Matka Matka Guessing Kalyan Chart Indian Matka Satta ...
➒➌➎➏➑➐➋➑➐➐ Dpboss Satta Matka Matka Guessing Kalyan Chart Indian Matka Satta ...➒➌➎➏➑➐➋➑➐➐ Dpboss Satta Matka Matka Guessing Kalyan Chart Indian Matka Satta ...
➒➌➎➏➑➐➋➑➐➐ Dpboss Satta Matka Matka Guessing Kalyan Chart Indian Matka Satta ...
➒➌➎➏➑➐➋➑➐➐Dpboss Matka Guessing Satta Matka Kalyan Chart Indian Matka
 
Codes n Conventionss copy (2).pptx new new
Codes n Conventionss copy (2).pptx new newCodes n Conventionss copy (2).pptx new new
Codes n Conventionss copy (2).pptx new new
ZackSpencer3
 
Dino Ranch Storyboard / Kids TV Advertising
Dino Ranch Storyboard / Kids TV AdvertisingDino Ranch Storyboard / Kids TV Advertising
Dino Ranch Storyboard / Kids TV Advertising
Alessandro Occhipinti
 

Recently uploaded (20)

Domino Express Storyboard - TV Adv Toys 30"
Domino Express Storyboard - TV Adv Toys 30"Domino Express Storyboard - TV Adv Toys 30"
Domino Express Storyboard - TV Adv Toys 30"
 
My storyboard for a sword fight scene with lightsabers
My storyboard for a sword fight scene with lightsabersMy storyboard for a sword fight scene with lightsabers
My storyboard for a sword fight scene with lightsabers
 
Complete Lab 123456789123456789123456789
Complete Lab 123456789123456789123456789Complete Lab 123456789123456789123456789
Complete Lab 123456789123456789123456789
 
Award template for beginner students of DVBS
Award template for beginner students of DVBSAward template for beginner students of DVBS
Award template for beginner students of DVBS
 
A Brief Introduction About Hadj Ounis
A Brief  Introduction  About  Hadj OunisA Brief  Introduction  About  Hadj Ounis
A Brief Introduction About Hadj Ounis
 
Fashionista Chic Couture Mazes and Coloring AdventureA
Fashionista Chic Couture Mazes and Coloring AdventureAFashionista Chic Couture Mazes and Coloring AdventureA
Fashionista Chic Couture Mazes and Coloring AdventureA
 
WEEK 11 PART 1- SOULMAKING (ARTMAKING) (1).pdf
WEEK 11 PART 1- SOULMAKING (ARTMAKING) (1).pdfWEEK 11 PART 1- SOULMAKING (ARTMAKING) (1).pdf
WEEK 11 PART 1- SOULMAKING (ARTMAKING) (1).pdf
 
FinalLessonPlanResponding.docxnknknknknknk
FinalLessonPlanResponding.docxnknknknknknkFinalLessonPlanResponding.docxnknknknknknk
FinalLessonPlanResponding.docxnknknknknknk
 
一比一原版(UniSA毕业证)南澳大学毕业证成绩单如何办理
一比一原版(UniSA毕业证)南澳大学毕业证成绩单如何办理一比一原版(UniSA毕业证)南澳大学毕业证成绩单如何办理
一比一原版(UniSA毕业证)南澳大学毕业证成绩单如何办理
 
一比一原版(qut毕业证)昆士兰科技大学毕业证如何办理
一比一原版(qut毕业证)昆士兰科技大学毕业证如何办理一比一原版(qut毕业证)昆士兰科技大学毕业证如何办理
一比一原版(qut毕业证)昆士兰科技大学毕业证如何办理
 
2024 MATFORCE Youth Poster Contest Winners
2024 MATFORCE Youth Poster Contest Winners2024 MATFORCE Youth Poster Contest Winners
2024 MATFORCE Youth Poster Contest Winners
 
HOW TO USE PINTEREST_by: Clarissa Credito
HOW TO USE PINTEREST_by: Clarissa CreditoHOW TO USE PINTEREST_by: Clarissa Credito
HOW TO USE PINTEREST_by: Clarissa Credito
 
This is a certificate template for Daily Vacation Bible School Awards Can edi...
This is a certificate template for Daily Vacation Bible School Awards Can edi...This is a certificate template for Daily Vacation Bible School Awards Can edi...
This is a certificate template for Daily Vacation Bible School Awards Can edi...
 
Cream and Brown Illustrative Food Journal Presentation.pptx
Cream and Brown Illustrative Food Journal Presentation.pptxCream and Brown Illustrative Food Journal Presentation.pptx
Cream and Brown Illustrative Food Journal Presentation.pptx
 
All the images mentioned in 'See What You're Missing'
All the images mentioned in 'See What You're Missing'All the images mentioned in 'See What You're Missing'
All the images mentioned in 'See What You're Missing'
 
My storyboard for the short film "Maatla".
My storyboard for the short film "Maatla".My storyboard for the short film "Maatla".
My storyboard for the short film "Maatla".
 
一比一原版(QUT毕业证)昆士兰科技大学毕业证成绩单如何办理
一比一原版(QUT毕业证)昆士兰科技大学毕业证成绩单如何办理一比一原版(QUT毕业证)昆士兰科技大学毕业证成绩单如何办理
一比一原版(QUT毕业证)昆士兰科技大学毕业证成绩单如何办理
 
➒➌➎➏➑➐➋➑➐➐ Dpboss Satta Matka Matka Guessing Kalyan Chart Indian Matka Satta ...
➒➌➎➏➑➐➋➑➐➐ Dpboss Satta Matka Matka Guessing Kalyan Chart Indian Matka Satta ...➒➌➎➏➑➐➋➑➐➐ Dpboss Satta Matka Matka Guessing Kalyan Chart Indian Matka Satta ...
➒➌➎➏➑➐➋➑➐➐ Dpboss Satta Matka Matka Guessing Kalyan Chart Indian Matka Satta ...
 
Codes n Conventionss copy (2).pptx new new
Codes n Conventionss copy (2).pptx new newCodes n Conventionss copy (2).pptx new new
Codes n Conventionss copy (2).pptx new new
 
Dino Ranch Storyboard / Kids TV Advertising
Dino Ranch Storyboard / Kids TV AdvertisingDino Ranch Storyboard / Kids TV Advertising
Dino Ranch Storyboard / Kids TV Advertising
 

Chapter 4-The Medium Access Control Sublayer.ppt

  • 1. Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011 The Medium Access Control Sublayer Chapter 4
  • 2. Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011 Static Channel Allocation • Multiplexing schemes : divide the resources • Service delay T of a channel with capacity C bps, average frame arrival rate of λ frames/sec, average frame length of 1/μ bits: • Service delay of the same channel splat to N segments:
  • 3. Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011 Assumptions for Dynamic Channel Allocation 1. Independent traffic 2. Single channel 3. Observable Collisions 4. Continuous or slotted time 5. Carrier sense or no carrier sense
  • 4. Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011 Multiple Access Protocols • ALOHA • Carrier Sense Multiple Access • Collision-free protocols • Limited-contention protocols • Wireless LAN protocols
  • 5. Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011 ALOHA (1) In pure ALOHA, frames are transmitted at completely arbitrary times Collision Collision Time User A B C D E
  • 6. Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011 ALOHA (2) Vulnerable period for the shaded frame = 2t Average packets to be transmitted per 2 frame interval = 2G Probability of sending k frames during a frame time = probability of zero frames = Channel throughput =
  • 7. Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011 ALOHA (3) The probability of a transmission requiring exactly k attempts: The expected number of transmissions:
  • 8. Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011 Persistent and Nonpersistent CSMA Comparison of the channel utilization versus load for various random access protocols.
  • 9. Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011 CSMA with Collision Detection When collision is detected, nodes stop sending their frames.  station must wait 2T to know if it has seized the channel or not.  for a 1 km cable T= 5 μsec CSMA/CD can be in one of three states: contention, transmission, or idle.
  • 10. Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011 Collision-Free Protocols (Bitmap protocol) a) low-numbered stations must wait on average 1.5N slots and high-numbered stations must wait 0.5N slots. b) the mean for all stations is N slots. c) Channel efficiency = d /(d + N) if each frame contains d bits.
  • 11. Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011 Collision-Free Protocols (Token Ring) IEEE802.5, 802.17 The efficiency is same as bitmap protocol. Station Direction of transmission Token
  • 12. Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011 Binary Countdown  A dash indicates silence.  The channel efficiency = d /(d + log2 N).  If the first bits of a frame are the station’s address, efficiency = 100%
  • 13. Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011 Limited-Contention Protocols  Use Contention at low load to provide low delay, and collision- free technique at high load to provide good channel efficiency.  The probability that some station successfully acquires the channel during a given slot =  the best value of p is 1/k.
  • 14. Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011 Limited-Contention Protocols a. divide the stations into (not necessarily disjoint) groups. b. Only the members of group 0 are permitted to compete for slot 0; and so on. c. At one extreme, each group has but one member, it resembles collision free protocols like binary countdown. d. The limiting case is a single group containing all stations, which resembles CSMA protocols. e. The protocol should assign many stations per slot when the load is low and few (or even just one) station per slot when the load is high.
  • 15. Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011 The Adaptive Tree Walk Protocol The tree for eight stations.  the average number of ready stations per time slot = q  level i has a fraction 2^−i of the stations below it.  the expected number of ready stations below level i= (2^−i)q  at level i = log2 q in the tree should the search begin.
  • 16. Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011 Wireless LAN Protocols (hidden & exposed terminals)
  • 17. Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011 Wireless LAN Protocols (MACA) (a) A sending an RTS (30 bytes) to B. (b) B responding with a CTS to A.
  • 18. Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011 Ethernet (IEEE 802.3) a) Classic Ethernet – Shared medium – 2.5 km max + 4 repeaters b) switched Ethernet – Fast Ethernet : 100 Mbps – Gigabit Ethernet – 10 Gigabit Ethernet Thick Ethernet : 500 m, 100 users Thin Ethernet: 185 m, 30 users
  • 19. Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011 Classic Ethernet Physical Layer
  • 20. Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011 Classic Ethernet MAC sublayer • Preamble: 10101010  10 MHz square wave 6.4 μsec • Start of frame: 10101011 • D_addr: 0… : unicast, 1… : multicast, 11…1 : broadcast • S_addr: globally unique for each NIC. First 3 bytes are for manufacturers assigned by IEEE, the last 3 byte is assigned by manufacturer to each produced NIC.
  • 21. Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011 MAC Sublayer Protocol (2) o Collision detection can take as long as 2 so a minimum frame length is required. o For a 2500 m cable: RTT = 50 μsec o For 10 Mbps BW = min frame size = 500 bit or 64 bytes.
  • 22. Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011 CSMA/CD with Binary Exponential Backoff a) After i’th consecutive collision, the sender nodes wait a random number of time slots between 0 and 2^i − 1. b) Each Time slot = 51.2 μsec = 512 bit times c) after 10 collisions, the interval is frozen at maximum 1023 slots. d) After 16 collisions, the controller reports failure back
  • 23. Ethernet Performance probability A that some station acquires the channel: maximized when p = 1/k, with A → 1/e as k →∞ The probability that the contention interval has exactly j slots: mean number of slots per contention: slot duration = 2τ, the mean contention interval, w = 2τ/A. w is at most 2τe ∼∼ 5.4τ. mean frame takes P sec  The longer the cable, the longer the contention interval
  • 24. Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011 Efficiency of Ethernet at 10 Mbps with 512-bit slot times
  • 25. Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011 Switched Ethernet (1) (a) Hub. (b) Switch.
  • 26. Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011 Switched Ethernet (2) An Ethernet switch. Switch Twisted pair Switch ports Hub
  • 27. Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011 Fast Ethernet  100B-T4: uses 4 twisted pairs with 25 MHz BW. 1 to the switch, 1 from the switch and other 2 are interchangeable. Using 3 voltage levels for symbols. Manchester encoding.  100B-TX: 4B/5B encoding. 125 MHz BW results 100 Mbps. 2 pairs of cable required.  100B-FX: only works with switches because the maximum cable length should be less than 250 m for CD to work.
  • 28. Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011 Gigabit Ethernet a) Two ways to enhance cable length to 200 m when using hubs: – Hardware carrier extension to 512 bytes. – frame bursting b) 8B/10B encoding is used to maintain synchronization. c) In UTP cables all 4 pairs are used in simultaneous full-duplex mode! With 5 voltage levels d) Pause frames are defined to cease the communication speed.
  • 29. Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011 10 Gigabit Ethernet  Fiber cables use 64B/66B coding is used.  CX cables use 8B/10B coding and 3.125 Gsymbol/sec on each pair.  T cabling requires 16 voltage levels. LDPC (Low Density Parity Check) is used.  40Gbps and 100Gbps Ethernet standards are in the way.
  • 30. Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011 Ethernet benefits a) Reliable: by introducing switches b) Cheap: twisted pairs and NICs c) Easy to maintain: no software requirement. Easy configuration. d) Well integration with IP: both are connection less. e) Flexible: evolve by time in speed requirements with minimum reconfiguration and changes.
  • 31. Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011 Wireless Lans • 802.11 architecture and protocol stack • 802.11 physical layer • 802.11 MAC sublayer protocol • 802.11 frame structure • Services
  • 32. Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011 802.11 Architecture and Protocol Stack (1) 802.11 architecture – infrastructure mode Access Point Client To Network
  • 33. Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011 802.11 Architecture and Protocol Stack (2) 802.11 architecture – ad-hoc mode-
  • 34. Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011 802.11 Protocol Stack 1-2 Mbps 11 Mbps 54 Mbps 600 Mbps
  • 35. Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011 802.11b PHY Layer a) 1 Mbps : 11 chip barker code to spread the signal with BPSK to send 1 bit per 11 chip. The chip rate is 11 Mchips/sec. b) 2 Mbps : QPSK (Quadrature Phase Shift Keying) to send 2 bits per 11 chip. c) 5.5 Mbps: CCK (Complementary Code Keying) with 4 bits per 8 chips. d) 11 Mbps: CCK with 8 bits per 8 chips.
  • 36. Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011 802.11a, g, n PHY Layer a) Works in 5GHz band. b) Uses OFDM (Orthogonal frequency-division multiplexing) with 52 subcarriers 48 for data and 4 for sync. c) Each symbol lasts 4μs and sends 1, 2, 4, or 6 bits. d) Supports 8 data rates from 6 up to 54Mbps. e) Communication range is 1/7 802.11b because of freq. band. f) 802.11 g uses OFDM in 2.4GHz band. g) Supports same rates of 802.11a with same range of 802.11b h) 802.11n doubles the channel width from 20 to 40MHz. i) Uses multiple antennas and MIMO techniques to increase BW.
  • 37. Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011 The 802.11 MAC Sublayer Protocol Sending a frame with CSMA/CA. The initial back off gets exponentially bigger if no ack is received.
  • 38. Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011 Collision Avoidance mechanism The use of virtual channel sensing using CSMA/CA. NAV (Network Allocation Vector) RTS/CTS: request to send/ clear to send
  • 39. Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011 CSMA/CA a) RTS/CTS mechanism is seldom used, because it slows down the communication. b) The random back-off mechanism as well as virtual carrier sensing (by overhearing the NAV field) are the main mechanisms to avoid collision. c) Fragmentation is also used to keep the frame error rates small. d) Fragments are sent in bursts when channel is acquired and each fragment should be acknowledged before the next one is sent.
  • 40. Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011 Power management a) Nodes go to sleep mode and inform AP of it. b) AP buffers traffic for sleeping nodes. c) AP sends periodic beacons to announce which node has a buffered frame. d) Nodes should wake up at beacon intervals (typically 100msec) to see if they have frames. e) If so they tell the AP to send them the frames.
  • 41. Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011 Interframe timing for QoS purposes a) SIFS (Short InterFrame Spacing) b) DIFS (Distributed Coordination Function InterFrame Spacing) c) AIFS (Arbitration InterFrame Space) d) EIFS (Extended InterFrame Spacing)
  • 42. Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011 802.11 Frame Structure Format of the 802.11 data frame
  • 43. Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011 Data Link Layer Switching • Uses of bridges • Learning bridges • Spanning tree bridges • Repeaters, hubs, bridges, switches, routers, and gateways • Virtual LANs
  • 44. Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011 Using bridges to connect LANs
  • 45. Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011 backward learning a) hash tables are initially empty. b) Bridges use a flooding algorithm. c) Gradually By looking at the source addresses, they can tell which machines are accessible on which ports. d) it makes an entry in its hash table for each station. e) the arrival time of the last frame is noted in the entry. f) It purges all entries more than a few minutes old. 1. If the port for the destination address is the same as the source port, discard the frame. 2. If the port for the destination address and the source port are different, forward the frame on to the destination port. 3. If the destination port is unknown, use flooding and send the frame on all ports except the source port. Forwarding Rules
  • 46. Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011 Protocol processing at a bridge
  • 47. Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011 Loop creation in case of using redundant links between bridges
  • 48. Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011 Spanning Tree Bridging a) B1 is elected to be the root because of its lowest ID.
  • 49. Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011 Poem by Radia Perlman (1985) Algorithm for Spanning Tree I thinkthatIshallneversee Agraphmorelovelythanatree. Atreewhosecrucialproperty Isloop-freeconnectivity. Atreewhichmustbesuretospan. SopacketscanreacheveryLAN. FirsttheRootmustbeselected ByIDitiselected. LeastcostpathsfromRootaretraced Inthetreethesepathsareplaced. Ameshismadebyfolkslikeme Thenbridgesfindaspanningtree.
  • 50. Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011 Repeaters, Hubs, Bridges, Switches, Routers, and Gateways (a) Which device is in which layer. (b) Frames, packets, and headers.
  • 51. Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011 Virtual LANs (1) A building with centralized wiring using hubs and a switch.
  • 52. Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011 Virtual LANs (2) Two VLANs, gray and white, on a bridged LAN. Frames from gray LAN nodes are only forwarded to gray LAN ports.
  • 53. Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011 The IEEE 802.1Q Standard (1) The standard adds VLAN field in the MAC header. Bridged LAN that is only partly VLAN-aware. The shaded frames are originally VLAN aware. The empty ones are not.
  • 54. Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011 The IEEE 802.1Q Standard (2) The 802.3 (legacy) and 802.1Q Ethernet frame formats.
  • 55. Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011 Home work assignment Student Assigned problems (problems between 26-35 should be ommited) 1 37 40 6 27 1 35 9 41 9 4 2 7 42 10 16 20 27 32 39 28 17 3 14 35 9 40 34 12 7 1 13 1 4 32 15 7 5 17 8 39 2 41 30 5 26 9 21 24 2 13 28 9 20 20 6 31 4 1 30 22 28 33 15 4 38 7 11 28 10 28 4 41 31 6 23 37 8 36 12 37 24 35 40 31 26 29 24 9 5 26 4 8 15 29 41 4 19 28 10 28 36 42 30 27 4 35 33 20 38 11 28 32 27 22 38 35 24 2 6 1 12 33 31 22 16 32 0 3 30 16 35 13 36 9 14 32 30 15 14 17 20 24 14 41 30 31 1 7 5 42 22 34 2 15 7 24 21 38 9 9 37 0 11 6 16 32 5 0 28 16 23 3 4 10 18 17 22 38 35 19 8 40 23 26 9 20 18 1 17 23 7 25 18 40 15 18 15 19 39 28 6 4 25 5 12 22 17 19 20 23 30 2 25 4 26 10 37 11 18 21 38 37 21 20 30 21 10 9 20 27 22 29 13 25 16 17 10 13 8 22 11 23 1 1 15 4 40 40 32 32 34 37 24 28 24 30 12 15 41 12 41 41 36 25 10 32 9 32 31 18 43 35 38 34