SlideShare a Scribd company logo
1 of 36
CSC 450/550
Part 3: The Medium Access Control
Sublayer
CSC 450/550
Summary
Part A Functions
1) The problem
2) Where are we now?
3) The Channel Allocation Problem
Part B Dynamic Channel Allocation Technologies
1) ALOHA Protocols
2) CSMA
3) CSMA/CD (old ETHERNET)
4) Switching (Fast ETHERNET)
5) Wireless LANS
CSC 450/550
Part A: Functions
CSC 450/550
(1)The Problem
The problem: In a single channel broadcast network,
when multiple stations try to send messages
simultaneously, who has the right to use the channel?
A common sense:
When we take about MAC, we are faced with a broadcast
network.
1 2 3 4 5
computers
cable
CSC 450/550
(2) Where are we now?
OSI
Application
Presentation
Session
Transport
Network
Data Link
Physical
Framing
Error
control
Flow
control
Transmission/reception of frames
MEDIA ACCESS sublayer
LOGICAL LINK sublayer
CSC 450/550
(3) The Channel Allocation Problem
Static
• FDM /TDM (Frequency/Time Division Multiplexing)
– FDM : Radio/TV broadcasts
– TDM : POTS (Plain Old Telephone System)
– GSM uses both (Global System for Mobile Communications)
– Wasteful of bandwidth and not work well for bursty traffic
Dynamic
• Pure/ Slotted ALOHA
• Carrier Sense Multiple Access (CSMA) Protocols
• Collision free protocols (optional contents)
CSC 450/550
Part B Dynamic Channel Allocation Technologies
1) ALOHA Protocols
1.1 Pure ALOHA
1.2 Slotted ALOHA
2) CSMA
3) CSMA/CD (old ETHERNET)
4) Switching (Fast ETHERNET)
5) Wireless LANS
CSC 450/550
1) ALOHA Protocols
• Anyone may transmit whenever they want. (Continuous time model.)
• Detect if the transmission is successful. (So we need some way for
Collision Detection (CD)).
• After a collision, wait a random amount of time and transmit the same
frame again. This technique is known as backoff.
The core idea is extremely simple:
CSC 450/550
1.1) Pure ALOHA (1)
In pure ALOHA, frames are transmitted at completely arbitrary times.
CSC 450/550
1.1) Pure ALOHA (2)
Vulnerable period for the shaded frame.
CSC 450/550
1.2) Slotted ALOHA
•Time is divided into slots… can only transmit at the start of
slot
•Vulnerable period halved => max. eff is doubled
•Requires sync of clocks
•Still poor at hi-loads
CSC 450/550
1.2) Slotted ALOHA (2)
Throughput versus offered traffic for ALOHA systems.
CSC 450/550
2) CSMA (Carrier Sense Multiple Access) (1)
We can improve the performance of our simple network greatly if
we introduce carrier sensing (CS). With carrier sensing, each
host listens to the data being transmitted over the cable.
• A host will only transmit its own frames when it cannot hear
any data being transmitted by other hosts.
• When a frame finishes, an interframe gap is allowed to pass
before another host starts transmitting its frame.
Communication Link
CSC 450/550
2) CSMA (2)
Improves performance when higher medium utilisation
When a node has data to transmit, the node first listens to the
cable (using a transceiver) to see if a carrier (signal) is being
transmitted by another node.
CSC 450/550
2) CSMA (3): Persistent and Nonpersistent CSMA
Comparison of the channel utilization versus load for
various random access protocols.
CSC 450/550
3) CSMA with Collision Detection (CSMA/CD) (1)
CSMA/CD can be in one of three states: contention,
transmission, or idle.
CSC 450/550
3) CSMA/CD (2): IEEE 802.3 Bus LAN
The 802.3 standard describes the operation of the MAC sub-layer in a bus
LAN that uses carrier sense, multiple access with collision detection
(CSMA/CD).
•Beside carrier sensing, collision detection and the binary exponential
back-off algorithm, the standard also describes the format of the frames
and the type of encoding used for transmitting frames.
•The minimum length of frames can be varied from network to network.
This is important because, depending on the size of the network, the
frames must be of a suitable minimum length.
•The standard also makes some suggestions about the type of cabling that
should be used for CSMA/CD bus LANs.
The CSMA/CD Bus LAN is also widely called Ethernet.
CSC 450/550
3) CSMA/CD (3): Ethernet MAC Sublayer Protocol
Frame formats. (a) DIX Ethernet,
(b) IEEE 802.3.
CSC 450/550
3) CSMA/CD (4): Ethernet MAC Sublayer Protocol
Every network card in the world has a unique 46-bit serial number
called a MAC address. The IEEE allocates these numbers to
network card manufacturers who encode them into the
firmware of their cards.
• The destination and source address fields of the MAC frame
have 48 bits set aside (the standard also allows for 16-bit
addresses but these are rarely used).
• The most significant bit is set to 0 to indicate an ordinary
address and 1 to indicate a group address (this is for
multicasting, which means that frames are sent to several
hosts). If all 48 bits are set to 1 then frames are broadcast
to all the hosts.
• If the two most significant bits are both zero then the 46
least significant bits contain the MAC addresses of the
source and destination hosts.
CSC 450/550
3) CSMA/CD (5): Ethernet MAC Sublayer Protocol
(Minimum Frame Length)
• When a host transmits a frame, there is a small chance that a collision will occur.
The first host to detect a collision transmits a 48-bit jam sequence.
• To ensure that any hosts involved with the collision realise that the jam sequence is
associate with their frame, they must still be transmitting when the jam sequence
arrives. This means that the frame must be of a minimum length.
• The worse case scenario is if the two hosts are at far ends of the cable. If host A’s
frame is just reaching host B when it begins transmitting, host B will detect the
collision first and send a jam signal back to host A.
CSC 450/550
3) CSMA/CD (6): Ethernet MAC Sublayer Protocol
(Minimum Frame Length)
 To ensure that no node may completely receive a frame
before the transmitting node has finished sending it, Ethernet
defines a minimum frame size (i.e. no frame may have less than
46 bytes of payload).
 The minimum frame size is related to the distance which the
network spans, the type of media being used and the number of
repeaters which the signal may have to pass through to reach
the furthest part of the LAN.
 Together these define a value known as the Ethernet Slot
Time, corresponding to 512 bit times at 10 Mbps.
CSC 450/550
3) CSMA/CD (7): Ethernet MAC Sublayer Protocol
(Minimum Frame Length)
The longest time between starting to transmit a frame and receiving the first bit
of a jam sequence is twice the propagation delay from one end of the cable
to the other.
• This means that a frame must have enough bits to last twice the
propagation delay.
• The 802.3 CSMA/CD Bus LAN transmits data at the standard rate of r
= 10Mbps.
• The speed of signal propagation is about v = 2108m/s.
A B
Packet starts at
time 0
A B
Packet at time tp-
A B
Collision occurs
at time tp

Jam sequence
A B
Jam sequence gets
back to A at 2tp

Jam sequence
(a)
(c)
(b)
(d)
CSC 450/550
3) CSMA/CD (8): Ethernet MAC Sublayer Protocol
(Minimum Frame Length)
Example #1: Cable = 400m, trans. speed = 10 Mbit/sec, propagation speed =
2*10^8 m/sec
sec
2
10
2
10
2
400 6
8






 
V
d
tprop
sec
4
2 

 prop
t
Mbps
R 10

sec
1
.
0
000
,
000
,
10
1
1




R
tb
bits
t
t
n
b
p
b 40
1
.
0
4
2 



A margin of error is usually added to this (often to make it a power of
2) so we might use 64 bits (8 bytes).
CSC 450/550
3) CSMA/CD (9): Ethernet MAC Sublayer Protocol
(Minimum Frame Length)
Example 2: Speed transmission is 100 Mbits/sec; frame size is 1500 bytes; the propagation
speed is 3*10^8 m/sec.
Calculate the distance between the nodes such that the
time to transmit the frame = time to recognize that the collision have occurred.
4
6
10
2
.
1
10
100
8
1500 






R
L
t frame
prop
frame
trip
round t
t
T 

 2
_
5
4
10
6
2
10
2
.
1
2






 frame
prop
t
t
V
d
t prop 
    km
V
t
d prop 18
10
18
10
3
10
6 3
8
5








 
CSC 450/550
3) CSMA/CD (10): Ethernet MAC Sublayer Protocol
(Minimum Frame Length)
The standard frame length is at least 512 bits (64 bytes) long,
which is much longer than our minimum requirement of 64 bits
(8 bytes).
• We only have to start worrying when the LAN reaches
lengths of more than 2.5km.
802.3 CSMA/CD bus LANs longer than 500m are usually
composed of multiple segments joined by in-line passive
repeaters, which output on one cable the signals received on
another cable.
• When we work out the minimum frame length for these
longer LANs, we also have to take the delays caused by the
passive repeaters (about 2.5sec each) into account as well.
CSC 450/550
3) CSMA/CD (11): Ethernet MAC Sublayer Protocol
(Shortest Ethernet Frame)
 64 bytes sent at 10Mbps  51.2sec
 500m/segment, 4 repeaters between nodes 2500m
25 sec propagation delay
 The frame should be longer enough for sender to detect
the collision(2x25 or about 50 sec )
Why specify a shortest frame of 64byte?
Node A Node B
R1 R2 R3 R4
500m 25 sec propagation delay
CSC 450/550
3) CSMA/CD (12): Ethernet MAC Sublayer Protocol
(Non-Deterministic)
The 802.3 CSMA/CD bus LAN is said to be a non-deterministic
network. This means that no host is guaranteed to be able to
send its frame within a reasonable time (just a good probability
of doing so).
• When the network is busy, the number of collisions rises
dramatically and it may become very difficult for any hosts to
transmit their frames.
A real-time computing application (such as an assembly line) will
demand that data is transmitted within a specified time period.
• Since the 802.3 bus LAN cannot guarantee this, its use for real-
time applications may not only be undesirable but potentially
dangerous in some situations.
CSC 450/550
4) Switched Ethernet
A simple example of switched Ethernet.
CSC 450/550
5) Wireless LANs
5.1 RF allocation
5.2 The 802.11 Protocol Stack
5.3 The 802.11 MAC Sublayer Protocol
5.4 The 802.11 Frame Structure
CSC 450/550
5.1) Where Does Wireless RF Live?
902-928 MHz 2400-2483.5 MHz 5725-5850
MHz
802.11/802.11b 802.11a
Bluetooth
Cordless Phones
Home RF
Baby Monitors
Microwave Ovens
Old Wireless
ISM Band: Industrial, Scientific, Medical
CSC 450/550
5.2) The 802.11 Protocol Stack
Part of the 802.11 protocol stack.
CSC 450/550
5.3) The 802.11 MAC Sublayer Protocol (1)
(a) The hidden station problem.
(b) The exposed station problem.
CSC 450/550
5.3) The 802.11 MAC Sublayer Protocol (2)
The use of virtual channel sensing using CSMA/CA.
CSC 450/550
5.3) The 802.11 MAC Sublayer Protocol (3)
A fragment burst.
CSC 450/550
5.3) The 802.11 MAC Sublayer Protocol (4)
Interframe spacing in 802.11.
CSC 450/550
5.4) The 802.11 Frame Structure
The 802.11 data frame.

More Related Content

Similar to MEDIUM ACCESS CONTROL Sublayer IN CN.ppt

Similar to MEDIUM ACCESS CONTROL Sublayer IN CN.ppt (20)

wireless.ppt
wireless.pptwireless.ppt
wireless.ppt
 
Data communication part2
Data communication part2Data communication part2
Data communication part2
 
12 ethernet-wifi
12 ethernet-wifi12 ethernet-wifi
12 ethernet-wifi
 
ethernet.ppt
ethernet.pptethernet.ppt
ethernet.ppt
 
ethernet.ppt
ethernet.pptethernet.ppt
ethernet.ppt
 
Ethernet copy
Ethernet   copyEthernet   copy
Ethernet copy
 
IEEE Standards
IEEE StandardsIEEE Standards
IEEE Standards
 
Basic switch and switch configuration.pptx
Basic switch and switch configuration.pptxBasic switch and switch configuration.pptx
Basic switch and switch configuration.pptx
 
Ethernet
EthernetEthernet
Ethernet
 
10 high speedla-ns
10 high speedla-ns10 high speedla-ns
10 high speedla-ns
 
Ethernet
EthernetEthernet
Ethernet
 
Ethernet_Networking2.ppt
Ethernet_Networking2.pptEthernet_Networking2.ppt
Ethernet_Networking2.ppt
 
Lecture5
Lecture5Lecture5
Lecture5
 
F06_Lecture7_etherne..
F06_Lecture7_etherne..F06_Lecture7_etherne..
F06_Lecture7_etherne..
 
Mod9
Mod9Mod9
Mod9
 
IT8602 Mobile Communication - Unit III
IT8602 Mobile Communication  - Unit IIIIT8602 Mobile Communication  - Unit III
IT8602 Mobile Communication - Unit III
 
CCNA BASIC SWITCHING AND SWITCH CONFIGURATION
CCNA BASIC SWITCHING AND SWITCH CONFIGURATIONCCNA BASIC SWITCHING AND SWITCH CONFIGURATION
CCNA BASIC SWITCHING AND SWITCH CONFIGURATION
 
Networking
NetworkingNetworking
Networking
 
Fast ethernet
Fast ethernetFast ethernet
Fast ethernet
 
Multiple Access Protocal
Multiple Access ProtocalMultiple Access Protocal
Multiple Access Protocal
 

Recently uploaded

Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxJoão Esperancinha
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escortsranjana rawat
 
power system scada applications and uses
power system scada applications and usespower system scada applications and uses
power system scada applications and usesDevarapalliHaritha
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...Soham Mondal
 
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort servicejennyeacort
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxwendy cai
 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineeringmalavadedarshan25
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girlsssuser7cb4ff
 
microprocessor 8085 and its interfacing
microprocessor 8085  and its interfacingmicroprocessor 8085  and its interfacing
microprocessor 8085 and its interfacingjaychoudhary37
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024hassan khalil
 
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2RajaP95
 
Current Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLCurrent Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLDeelipZope
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130Suhani Kapoor
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )Tsuyoshi Horigome
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130Suhani Kapoor
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionDr.Costas Sachpazis
 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfAsst.prof M.Gokilavani
 

Recently uploaded (20)

Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
 
power system scada applications and uses
power system scada applications and usespower system scada applications and uses
power system scada applications and uses
 
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptxExploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
 
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineering
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girls
 
microprocessor 8085 and its interfacing
microprocessor 8085  and its interfacingmicroprocessor 8085  and its interfacing
microprocessor 8085 and its interfacing
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
 
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
 
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
 
Current Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLCurrent Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCL
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
 

MEDIUM ACCESS CONTROL Sublayer IN CN.ppt

  • 1. CSC 450/550 Part 3: The Medium Access Control Sublayer
  • 2. CSC 450/550 Summary Part A Functions 1) The problem 2) Where are we now? 3) The Channel Allocation Problem Part B Dynamic Channel Allocation Technologies 1) ALOHA Protocols 2) CSMA 3) CSMA/CD (old ETHERNET) 4) Switching (Fast ETHERNET) 5) Wireless LANS
  • 4. CSC 450/550 (1)The Problem The problem: In a single channel broadcast network, when multiple stations try to send messages simultaneously, who has the right to use the channel? A common sense: When we take about MAC, we are faced with a broadcast network. 1 2 3 4 5 computers cable
  • 5. CSC 450/550 (2) Where are we now? OSI Application Presentation Session Transport Network Data Link Physical Framing Error control Flow control Transmission/reception of frames MEDIA ACCESS sublayer LOGICAL LINK sublayer
  • 6. CSC 450/550 (3) The Channel Allocation Problem Static • FDM /TDM (Frequency/Time Division Multiplexing) – FDM : Radio/TV broadcasts – TDM : POTS (Plain Old Telephone System) – GSM uses both (Global System for Mobile Communications) – Wasteful of bandwidth and not work well for bursty traffic Dynamic • Pure/ Slotted ALOHA • Carrier Sense Multiple Access (CSMA) Protocols • Collision free protocols (optional contents)
  • 7. CSC 450/550 Part B Dynamic Channel Allocation Technologies 1) ALOHA Protocols 1.1 Pure ALOHA 1.2 Slotted ALOHA 2) CSMA 3) CSMA/CD (old ETHERNET) 4) Switching (Fast ETHERNET) 5) Wireless LANS
  • 8. CSC 450/550 1) ALOHA Protocols • Anyone may transmit whenever they want. (Continuous time model.) • Detect if the transmission is successful. (So we need some way for Collision Detection (CD)). • After a collision, wait a random amount of time and transmit the same frame again. This technique is known as backoff. The core idea is extremely simple:
  • 9. CSC 450/550 1.1) Pure ALOHA (1) In pure ALOHA, frames are transmitted at completely arbitrary times.
  • 10. CSC 450/550 1.1) Pure ALOHA (2) Vulnerable period for the shaded frame.
  • 11. CSC 450/550 1.2) Slotted ALOHA •Time is divided into slots… can only transmit at the start of slot •Vulnerable period halved => max. eff is doubled •Requires sync of clocks •Still poor at hi-loads
  • 12. CSC 450/550 1.2) Slotted ALOHA (2) Throughput versus offered traffic for ALOHA systems.
  • 13. CSC 450/550 2) CSMA (Carrier Sense Multiple Access) (1) We can improve the performance of our simple network greatly if we introduce carrier sensing (CS). With carrier sensing, each host listens to the data being transmitted over the cable. • A host will only transmit its own frames when it cannot hear any data being transmitted by other hosts. • When a frame finishes, an interframe gap is allowed to pass before another host starts transmitting its frame. Communication Link
  • 14. CSC 450/550 2) CSMA (2) Improves performance when higher medium utilisation When a node has data to transmit, the node first listens to the cable (using a transceiver) to see if a carrier (signal) is being transmitted by another node.
  • 15. CSC 450/550 2) CSMA (3): Persistent and Nonpersistent CSMA Comparison of the channel utilization versus load for various random access protocols.
  • 16. CSC 450/550 3) CSMA with Collision Detection (CSMA/CD) (1) CSMA/CD can be in one of three states: contention, transmission, or idle.
  • 17. CSC 450/550 3) CSMA/CD (2): IEEE 802.3 Bus LAN The 802.3 standard describes the operation of the MAC sub-layer in a bus LAN that uses carrier sense, multiple access with collision detection (CSMA/CD). •Beside carrier sensing, collision detection and the binary exponential back-off algorithm, the standard also describes the format of the frames and the type of encoding used for transmitting frames. •The minimum length of frames can be varied from network to network. This is important because, depending on the size of the network, the frames must be of a suitable minimum length. •The standard also makes some suggestions about the type of cabling that should be used for CSMA/CD bus LANs. The CSMA/CD Bus LAN is also widely called Ethernet.
  • 18. CSC 450/550 3) CSMA/CD (3): Ethernet MAC Sublayer Protocol Frame formats. (a) DIX Ethernet, (b) IEEE 802.3.
  • 19. CSC 450/550 3) CSMA/CD (4): Ethernet MAC Sublayer Protocol Every network card in the world has a unique 46-bit serial number called a MAC address. The IEEE allocates these numbers to network card manufacturers who encode them into the firmware of their cards. • The destination and source address fields of the MAC frame have 48 bits set aside (the standard also allows for 16-bit addresses but these are rarely used). • The most significant bit is set to 0 to indicate an ordinary address and 1 to indicate a group address (this is for multicasting, which means that frames are sent to several hosts). If all 48 bits are set to 1 then frames are broadcast to all the hosts. • If the two most significant bits are both zero then the 46 least significant bits contain the MAC addresses of the source and destination hosts.
  • 20. CSC 450/550 3) CSMA/CD (5): Ethernet MAC Sublayer Protocol (Minimum Frame Length) • When a host transmits a frame, there is a small chance that a collision will occur. The first host to detect a collision transmits a 48-bit jam sequence. • To ensure that any hosts involved with the collision realise that the jam sequence is associate with their frame, they must still be transmitting when the jam sequence arrives. This means that the frame must be of a minimum length. • The worse case scenario is if the two hosts are at far ends of the cable. If host A’s frame is just reaching host B when it begins transmitting, host B will detect the collision first and send a jam signal back to host A.
  • 21. CSC 450/550 3) CSMA/CD (6): Ethernet MAC Sublayer Protocol (Minimum Frame Length)  To ensure that no node may completely receive a frame before the transmitting node has finished sending it, Ethernet defines a minimum frame size (i.e. no frame may have less than 46 bytes of payload).  The minimum frame size is related to the distance which the network spans, the type of media being used and the number of repeaters which the signal may have to pass through to reach the furthest part of the LAN.  Together these define a value known as the Ethernet Slot Time, corresponding to 512 bit times at 10 Mbps.
  • 22. CSC 450/550 3) CSMA/CD (7): Ethernet MAC Sublayer Protocol (Minimum Frame Length) The longest time between starting to transmit a frame and receiving the first bit of a jam sequence is twice the propagation delay from one end of the cable to the other. • This means that a frame must have enough bits to last twice the propagation delay. • The 802.3 CSMA/CD Bus LAN transmits data at the standard rate of r = 10Mbps. • The speed of signal propagation is about v = 2108m/s. A B Packet starts at time 0 A B Packet at time tp- A B Collision occurs at time tp  Jam sequence A B Jam sequence gets back to A at 2tp  Jam sequence (a) (c) (b) (d)
  • 23. CSC 450/550 3) CSMA/CD (8): Ethernet MAC Sublayer Protocol (Minimum Frame Length) Example #1: Cable = 400m, trans. speed = 10 Mbit/sec, propagation speed = 2*10^8 m/sec sec 2 10 2 10 2 400 6 8         V d tprop sec 4 2    prop t Mbps R 10  sec 1 . 0 000 , 000 , 10 1 1     R tb bits t t n b p b 40 1 . 0 4 2     A margin of error is usually added to this (often to make it a power of 2) so we might use 64 bits (8 bytes).
  • 24. CSC 450/550 3) CSMA/CD (9): Ethernet MAC Sublayer Protocol (Minimum Frame Length) Example 2: Speed transmission is 100 Mbits/sec; frame size is 1500 bytes; the propagation speed is 3*10^8 m/sec. Calculate the distance between the nodes such that the time to transmit the frame = time to recognize that the collision have occurred. 4 6 10 2 . 1 10 100 8 1500        R L t frame prop frame trip round t t T    2 _ 5 4 10 6 2 10 2 . 1 2        frame prop t t V d t prop      km V t d prop 18 10 18 10 3 10 6 3 8 5          
  • 25. CSC 450/550 3) CSMA/CD (10): Ethernet MAC Sublayer Protocol (Minimum Frame Length) The standard frame length is at least 512 bits (64 bytes) long, which is much longer than our minimum requirement of 64 bits (8 bytes). • We only have to start worrying when the LAN reaches lengths of more than 2.5km. 802.3 CSMA/CD bus LANs longer than 500m are usually composed of multiple segments joined by in-line passive repeaters, which output on one cable the signals received on another cable. • When we work out the minimum frame length for these longer LANs, we also have to take the delays caused by the passive repeaters (about 2.5sec each) into account as well.
  • 26. CSC 450/550 3) CSMA/CD (11): Ethernet MAC Sublayer Protocol (Shortest Ethernet Frame)  64 bytes sent at 10Mbps  51.2sec  500m/segment, 4 repeaters between nodes 2500m 25 sec propagation delay  The frame should be longer enough for sender to detect the collision(2x25 or about 50 sec ) Why specify a shortest frame of 64byte? Node A Node B R1 R2 R3 R4 500m 25 sec propagation delay
  • 27. CSC 450/550 3) CSMA/CD (12): Ethernet MAC Sublayer Protocol (Non-Deterministic) The 802.3 CSMA/CD bus LAN is said to be a non-deterministic network. This means that no host is guaranteed to be able to send its frame within a reasonable time (just a good probability of doing so). • When the network is busy, the number of collisions rises dramatically and it may become very difficult for any hosts to transmit their frames. A real-time computing application (such as an assembly line) will demand that data is transmitted within a specified time period. • Since the 802.3 bus LAN cannot guarantee this, its use for real- time applications may not only be undesirable but potentially dangerous in some situations.
  • 28. CSC 450/550 4) Switched Ethernet A simple example of switched Ethernet.
  • 29. CSC 450/550 5) Wireless LANs 5.1 RF allocation 5.2 The 802.11 Protocol Stack 5.3 The 802.11 MAC Sublayer Protocol 5.4 The 802.11 Frame Structure
  • 30. CSC 450/550 5.1) Where Does Wireless RF Live? 902-928 MHz 2400-2483.5 MHz 5725-5850 MHz 802.11/802.11b 802.11a Bluetooth Cordless Phones Home RF Baby Monitors Microwave Ovens Old Wireless ISM Band: Industrial, Scientific, Medical
  • 31. CSC 450/550 5.2) The 802.11 Protocol Stack Part of the 802.11 protocol stack.
  • 32. CSC 450/550 5.3) The 802.11 MAC Sublayer Protocol (1) (a) The hidden station problem. (b) The exposed station problem.
  • 33. CSC 450/550 5.3) The 802.11 MAC Sublayer Protocol (2) The use of virtual channel sensing using CSMA/CA.
  • 34. CSC 450/550 5.3) The 802.11 MAC Sublayer Protocol (3) A fragment burst.
  • 35. CSC 450/550 5.3) The 802.11 MAC Sublayer Protocol (4) Interframe spacing in 802.11.
  • 36. CSC 450/550 5.4) The 802.11 Frame Structure The 802.11 data frame.

Editor's Notes

  1. Page 0
  2. Page 2
  3. Page 3
  4. Page 11
  5. Page 12
  6. Page 13
  7. Page 26
  8. Page 27