SlideShare a Scribd company logo
1 of 55
Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011
The Medium Access Control
Sublayer
Chapter 4
Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011
Static Channel Allocation
• Multiplexing schemes : divide the resources
• Service delay T of a channel with capacity C bps, average
frame arrival rate of λ frames/sec, average frame length of
1/μ bits:
• Service delay of the same channel splat to N segments:
Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011
Assumptions for Dynamic Channel Allocation
1. Independent traffic
2. Single channel
3. Observable Collisions
4. Continuous or slotted time
5. Carrier sense or no carrier sense
Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011
Multiple Access Protocols
• ALOHA
• Carrier Sense Multiple Access
• Collision-free protocols
• Limited-contention protocols
• Wireless LAN protocols
Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011
ALOHA (1)
In pure ALOHA, frames are transmitted
at completely arbitrary times
Collision
Collision
Time
User
A
B
C
D
E
Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011
ALOHA (2)
Vulnerable period for the shaded frame = 2t
Average packets to be transmitted per 2 frame interval = 2G
Probability of sending k frames during a frame time =
probability of zero frames =
Channel throughput =
Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011
ALOHA (3)
The probability of a transmission requiring exactly k attempts:
The expected number of transmissions:
Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011
Persistent and Nonpersistent CSMA
Comparison of the channel utilization versus load for various
random access protocols.
Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011
CSMA with Collision Detection
When collision is detected, nodes stop sending their frames.
 station must wait 2T to know if it has seized the channel or not.
 for a 1 km cable T= 5 μsec
CSMA/CD can be in one of three states: contention, transmission, or idle.
Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011
Collision-Free Protocols (Bitmap protocol)
a) low-numbered stations must wait on average 1.5N slots and
high-numbered stations must wait 0.5N slots.
b) the mean for all stations is N slots.
c) Channel efficiency = d /(d + N) if each frame contains d bits.
Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011
Collision-Free Protocols (Token Ring)
IEEE802.5, 802.17
The efficiency is same as bitmap protocol.
Station
Direction of
transmission
Token
Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011
Binary Countdown
 A dash indicates silence.
 The channel efficiency = d /(d + log2 N).
 If the first bits of a frame are the station’s address, efficiency = 100%
Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011
Limited-Contention Protocols
 Use Contention at low load to provide low delay, and collision-
free technique at high load to provide good channel efficiency.
 The probability that some station successfully acquires the
channel during a given slot =
 the best value of p is 1/k.
Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011
Limited-Contention Protocols
a. divide the stations into (not necessarily disjoint) groups.
b. Only the members of group 0 are permitted to compete for
slot 0; and so on.
c. At one extreme, each group has but one member, it
resembles collision free protocols like binary countdown.
d. The limiting case is a single group containing all stations,
which resembles CSMA protocols.
e. The protocol should assign many stations per slot when the
load is low and few (or even just one) station per slot when
the load is high.
Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011
The Adaptive Tree Walk Protocol
The tree for eight stations.
 the average number of ready stations per time slot = q
 level i has a fraction 2^−i of the stations below it.
 the expected number of ready stations below level i= (2^−i)q
 at level i = log2 q in the tree should the search begin.
Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011
Wireless LAN Protocols
(hidden & exposed terminals)
Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011
Wireless LAN Protocols (MACA)
(a) A sending an RTS (30 bytes) to B.
(b) B responding with a CTS to A.
Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011
Ethernet (IEEE 802.3)
a) Classic Ethernet
– Shared medium
– 2.5 km max + 4 repeaters
b) switched Ethernet
– Fast Ethernet : 100 Mbps
– Gigabit Ethernet
– 10 Gigabit Ethernet
Thick Ethernet : 500 m, 100 users
Thin Ethernet: 185 m, 30 users
Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011
Classic Ethernet Physical Layer
Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011
Classic Ethernet MAC sublayer
• Preamble: 10101010  10 MHz square wave 6.4 μsec
• Start of frame: 10101011
• D_addr: 0… : unicast, 1… : multicast, 11…1 : broadcast
• S_addr: globally unique for each NIC. First 3 bytes are for
manufacturers assigned by IEEE, the last 3 byte is assigned
by manufacturer to each produced NIC.
Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011
MAC Sublayer Protocol (2)
o Collision detection can take as long as 2 so a minimum
frame length is required.
o For a 2500 m cable: RTT = 50 μsec
o For 10 Mbps BW = min frame size = 500 bit or 64 bytes.
Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011
CSMA/CD with
Binary Exponential Backoff
a) After i’th consecutive collision, the sender nodes wait a random number of
time slots between 0 and 2^i − 1.
b) Each Time slot = 51.2 μsec = 512 bit times
c) after 10 collisions, the interval is frozen at maximum 1023 slots.
d) After 16 collisions, the controller reports failure back
Ethernet Performance
probability A that some station acquires the channel:
maximized when p = 1/k, with A → 1/e as k →∞
The probability that the contention interval has exactly j slots:
mean number of slots per contention:
slot duration = 2τ, the mean contention interval, w = 2τ/A.
w is at most 2τe ∼∼ 5.4τ.
mean frame takes P sec 
The longer the cable, the longer the contention interval
Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011
Efficiency of Ethernet at 10 Mbps with 512-bit slot times
Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011
Switched Ethernet (1)
(a) Hub. (b) Switch.
Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011
Switched Ethernet (2)
An Ethernet switch.
Switch
Twisted pair
Switch ports
Hub
Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011
Fast Ethernet
 100B-T4: uses 4 twisted pairs with 25 MHz BW. 1 to the
switch, 1 from the switch and other 2 are interchangeable.
Using 3 voltage levels for symbols. Manchester encoding.
 100B-TX: 4B/5B encoding. 125 MHz BW results 100 Mbps.
2 pairs of cable required.
 100B-FX: only works with switches because the maximum
cable length should be less than 250 m for CD to work.
Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011
Gigabit Ethernet
a) Two ways to enhance cable length to 200 m when using hubs:
– Hardware carrier extension to 512 bytes.
– frame bursting
b) 8B/10B encoding is used to maintain synchronization.
c) In UTP cables all 4 pairs are used in simultaneous full-duplex mode!
With 5 voltage levels
d) Pause frames are defined to cease the communication speed.
Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011
10 Gigabit Ethernet
 Fiber cables use 64B/66B coding is used.
 CX cables use 8B/10B coding and 3.125 Gsymbol/sec on
each pair.
 T cabling requires 16 voltage levels. LDPC (Low Density
Parity Check) is used.
 40Gbps and 100Gbps Ethernet standards are in the way.
Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011
Ethernet benefits
a) Reliable: by introducing switches
b) Cheap: twisted pairs and NICs
c) Easy to maintain: no software requirement. Easy
configuration.
d) Well integration with IP: both are connection less.
e) Flexible: evolve by time in speed requirements with minimum
reconfiguration and changes.
Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011
Wireless Lans
• 802.11 architecture and protocol stack
• 802.11 physical layer
• 802.11 MAC sublayer protocol
• 802.11 frame structure
• Services
Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011
802.11 Architecture and Protocol Stack (1)
802.11 architecture – infrastructure mode
Access
Point
Client
To Network
Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011
802.11 Architecture and Protocol Stack (2)
802.11 architecture – ad-hoc mode-
Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011
802.11 Protocol Stack
1-2 Mbps 11 Mbps 54 Mbps 600 Mbps
Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011
802.11b PHY Layer
a) 1 Mbps : 11 chip barker code to spread the signal with BPSK
to send 1 bit per 11 chip. The chip rate is 11 Mchips/sec.
b) 2 Mbps : QPSK (Quadrature Phase Shift Keying) to send 2
bits per 11 chip.
c) 5.5 Mbps: CCK (Complementary Code Keying) with 4 bits per
8 chips.
d) 11 Mbps: CCK with 8 bits per 8 chips.
Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011
802.11a, g, n PHY Layer
a) Works in 5GHz band.
b) Uses OFDM (Orthogonal frequency-division multiplexing) with 52
subcarriers 48 for data and 4 for sync.
c) Each symbol lasts 4μs and sends 1, 2, 4, or 6 bits.
d) Supports 8 data rates from 6 up to 54Mbps.
e) Communication range is 1/7 802.11b because of freq. band.
f) 802.11 g uses OFDM in 2.4GHz band.
g) Supports same rates of 802.11a with same range of 802.11b
h) 802.11n doubles the channel width from 20 to 40MHz.
i) Uses multiple antennas and MIMO techniques to increase BW.
Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011
The 802.11 MAC Sublayer Protocol
Sending a frame with CSMA/CA.
The initial back off gets exponentially bigger if no ack is received.
Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011
Collision Avoidance mechanism
The use of virtual channel sensing using CSMA/CA.
NAV (Network Allocation Vector)
RTS/CTS: request to send/ clear to send
Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011
CSMA/CA
a) RTS/CTS mechanism is seldom used, because it slows down
the communication.
b) The random back-off mechanism as well as virtual carrier
sensing (by overhearing the NAV field) are the main
mechanisms to avoid collision.
c) Fragmentation is also used to keep the frame error rates
small.
d) Fragments are sent in bursts when channel is acquired and
each fragment should be acknowledged before the next one
is sent.
Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011
Power management
a) Nodes go to sleep mode and inform AP of it.
b) AP buffers traffic for sleeping nodes.
c) AP sends periodic beacons to announce which node has a
buffered frame.
d) Nodes should wake up at beacon intervals (typically
100msec) to see if they have frames.
e) If so they tell the AP to send them the frames.
Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011
Interframe timing for QoS purposes
a) SIFS (Short InterFrame Spacing)
b) DIFS (Distributed Coordination Function InterFrame Spacing)
c) AIFS (Arbitration InterFrame Space)
d) EIFS (Extended InterFrame Spacing)
Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011
802.11 Frame Structure
Format of the 802.11 data frame
Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011
Data Link Layer Switching
• Uses of bridges
• Learning bridges
• Spanning tree bridges
• Repeaters, hubs, bridges, switches,
routers, and gateways
• Virtual LANs
Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011
Using bridges to connect LANs
Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011
backward learning
a) hash tables are initially empty.
b) Bridges use a flooding algorithm.
c) Gradually By looking at the source addresses, they can tell which
machines are accessible on which ports.
d) it makes an entry in its hash table for each station.
e) the arrival time of the last frame is noted in the entry.
f) It purges all entries more than a few minutes old.
1. If the port for the destination address is the same as the source port, discard
the frame.
2. If the port for the destination address and the source port are different,
forward the frame on to the destination port.
3. If the destination port is unknown, use flooding and send the frame on all
ports except the source port.
Forwarding Rules
Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011
Protocol processing at a bridge
Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011
Loop creation in case of using redundant
links between bridges
Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011
Spanning Tree Bridging
a) B1 is elected to be the root because of its lowest ID.
Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011
Poem by Radia Perlman (1985)
Algorithm for Spanning Tree
I thinkthatIshallneversee
Agraphmorelovelythanatree.
Atreewhosecrucialproperty
Isloop-freeconnectivity.
Atreewhichmustbesuretospan.
SopacketscanreacheveryLAN.
FirsttheRootmustbeselected
ByIDitiselected.
LeastcostpathsfromRootaretraced
Inthetreethesepathsareplaced.
Ameshismadebyfolkslikeme
Thenbridgesfindaspanningtree.
Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011
Repeaters, Hubs, Bridges, Switches,
Routers, and Gateways
(a) Which device is in which layer.
(b) Frames, packets, and headers.
Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011
Virtual LANs (1)
A building with centralized wiring using hubs and a switch.
Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011
Virtual LANs (2)
Two VLANs, gray and white, on a bridged LAN.
Frames from gray LAN nodes are only forwarded to gray LAN ports.
Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011
The IEEE 802.1Q Standard (1)
The standard adds VLAN field in the MAC header.
Bridged LAN that is only partly VLAN-aware. The shaded
frames are originally VLAN aware. The empty ones are not.
Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011
The IEEE 802.1Q Standard (2)
The 802.3 (legacy) and 802.1Q Ethernet frame formats.
Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011
Home work assignment
Student Assigned problems (problems between 26-35 should be ommited)
1 37 40 6 27 1 35 9 41 9 4
2 7 42 10 16 20 27 32 39 28 17
3 14 35 9 40 34 12 7 1 13 1
4 32 15 7 5 17 8 39 2 41 30
5 26 9 21 24 2 13 28 9 20 20
6 31 4 1 30 22 28 33 15 4 38
7 11 28 10 28 4 41 31 6 23 37
8 36 12 37 24 35 40 31 26 29 24
9 5 26 4 8 15 29 41 4 19 28
10 28 36 42 30 27 4 35 33 20 38
11 28 32 27 22 38 35 24 2 6 1
12 33 31 22 16 32 0 3 30 16 35
13 36 9 14 32 30 15 14 17 20 24
14 41 30 31 1 7 5 42 22 34 2
15 7 24 21 38 9 9 37 0 11 6
16 32 5 0 28 16 23 3 4 10 18
17 22 38 35 19 8 40 23 26 9 20
18 1 17 23 7 25 18 40 15 18 15
19 39 28 6 4 25 5 12 22 17 19
20 23 30 2 25 4 26 10 37 11 18
21 38 37 21 20 30 21 10 9 20 27
22 29 13 25 16 17 10 13 8 22 11
23 1 1 15 4 40 40 32 32 34 37
24 28 24 30 12 15 41 12 41 41 36
25 10 32 9 32 31 18 43 35 38 34

More Related Content

What's hot

What's hot (20)

Lecture3 Physical Layer
Lecture3 Physical LayerLecture3 Physical Layer
Lecture3 Physical Layer
 
Mobile computing unit-I-notes 07.01.2020
Mobile computing unit-I-notes 07.01.2020Mobile computing unit-I-notes 07.01.2020
Mobile computing unit-I-notes 07.01.2020
 
Multiplexing : FDM
Multiplexing : FDMMultiplexing : FDM
Multiplexing : FDM
 
OFDM Basics
OFDM BasicsOFDM Basics
OFDM Basics
 
Routing protocols in ad hoc network
Routing protocols in ad hoc networkRouting protocols in ad hoc network
Routing protocols in ad hoc network
 
Adhoc and Sensor Networks - Chapter 02
Adhoc and Sensor Networks - Chapter 02Adhoc and Sensor Networks - Chapter 02
Adhoc and Sensor Networks - Chapter 02
 
AODV routing protocol
AODV routing protocolAODV routing protocol
AODV routing protocol
 
Computer Network - Network Layer
Computer Network - Network LayerComputer Network - Network Layer
Computer Network - Network Layer
 
Wireless sensors networks protocols
Wireless sensors networks protocolsWireless sensors networks protocols
Wireless sensors networks protocols
 
Time Division Multiplexing
Time Division MultiplexingTime Division Multiplexing
Time Division Multiplexing
 
Distance Vector Routing
Distance Vector RoutingDistance Vector Routing
Distance Vector Routing
 
ALOHA Protocol (in detail)
ALOHA Protocol (in detail)ALOHA Protocol (in detail)
ALOHA Protocol (in detail)
 
The medium access sublayer
 The medium  access sublayer The medium  access sublayer
The medium access sublayer
 
IPv4
IPv4IPv4
IPv4
 
Bluetooth Power point presentation
Bluetooth Power point presentationBluetooth Power point presentation
Bluetooth Power point presentation
 
RANDOM ACCESS PROTOCOL IN COMMUNICATION
RANDOM ACCESS PROTOCOL IN COMMUNICATION           RANDOM ACCESS PROTOCOL IN COMMUNICATION
RANDOM ACCESS PROTOCOL IN COMMUNICATION
 
Chapter 7 multiple access techniques
Chapter 7 multiple access techniquesChapter 7 multiple access techniques
Chapter 7 multiple access techniques
 
Tsn lecture vol 2
Tsn lecture vol 2Tsn lecture vol 2
Tsn lecture vol 2
 
Leach protocol
Leach protocolLeach protocol
Leach protocol
 
Media Access Control (MAC Layer)
Media Access Control (MAC Layer)Media Access Control (MAC Layer)
Media Access Control (MAC Layer)
 

Similar to Chapter 4-The Medium Access Control Sublayer.ppt

Ethernet 19 20
Ethernet 19 20Ethernet 19 20
Ethernet 19 20rajeshvbe
 
Communication Networks basics and very important topic
Communication Networks basics and very important topicCommunication Networks basics and very important topic
Communication Networks basics and very important topicKAUSHIKKADIUM
 
ETHERNET IEEE802.pptx
ETHERNET IEEE802.pptxETHERNET IEEE802.pptx
ETHERNET IEEE802.pptxssuserf49c5a
 
IEEE standards 802.3.&802.11
IEEE standards 802.3.&802.11IEEE standards 802.3.&802.11
IEEE standards 802.3.&802.11Keshav Maheshwari
 
Teletraffic Lessons for the Future Internet.ppt
Teletraffic Lessons for the Future Internet.pptTeletraffic Lessons for the Future Internet.ppt
Teletraffic Lessons for the Future Internet.ppttrafficdep
 
Adaptive dcf of mac for vo ip services using
Adaptive dcf of mac for vo ip services usingAdaptive dcf of mac for vo ip services using
Adaptive dcf of mac for vo ip services usingAnmol Tikoo
 
Chapter 2 -_lan_network_design - Network Design
Chapter 2 -_lan_network_design - Network DesignChapter 2 -_lan_network_design - Network Design
Chapter 2 -_lan_network_design - Network Designnakomuri
 
chapter- 6 network layer of computer network
chapter- 6 network layer of computer networkchapter- 6 network layer of computer network
chapter- 6 network layer of computer networkStuti36
 
Wire Lan Testing
Wire Lan TestingWire Lan Testing
Wire Lan Testingwjosephson
 
OPTIMIZATION TECHNIQUES FOR SOURCE FOLLOWER BASED TRACK-AND-HOLD CIRCUIT FOR ...
OPTIMIZATION TECHNIQUES FOR SOURCE FOLLOWER BASED TRACK-AND-HOLD CIRCUIT FOR ...OPTIMIZATION TECHNIQUES FOR SOURCE FOLLOWER BASED TRACK-AND-HOLD CIRCUIT FOR ...
OPTIMIZATION TECHNIQUES FOR SOURCE FOLLOWER BASED TRACK-AND-HOLD CIRCUIT FOR ...VLSICS Design
 
Underlying Technologies Part I (Lecture #4 ET3003 Sem1 2014/2015)
Underlying Technologies Part I (Lecture #4 ET3003 Sem1 2014/2015)Underlying Technologies Part I (Lecture #4 ET3003 Sem1 2014/2015)
Underlying Technologies Part I (Lecture #4 ET3003 Sem1 2014/2015)Tutun Juhana
 
Et3003 sem2-1314-3 ethernets
Et3003 sem2-1314-3 ethernetsEt3003 sem2-1314-3 ethernets
Et3003 sem2-1314-3 ethernetsTutun Juhana
 
Media Access and Internetworking
Media Access and InternetworkingMedia Access and Internetworking
Media Access and InternetworkingN.Jagadish Kumar
 
TCP Performance analysis Wireless Multihop Networks
TCP Performance analysis Wireless Multihop NetworksTCP Performance analysis Wireless Multihop Networks
TCP Performance analysis Wireless Multihop NetworksAbhishek Kona
 
Sdh basics hand_outs_of_sdh_basics
Sdh basics hand_outs_of_sdh_basicsSdh basics hand_outs_of_sdh_basics
Sdh basics hand_outs_of_sdh_basicsPaul Andrew
 

Similar to Chapter 4-The Medium Access Control Sublayer.ppt (20)

Ethernet 19 20
Ethernet 19 20Ethernet 19 20
Ethernet 19 20
 
Chapter 4ver2
Chapter 4ver2Chapter 4ver2
Chapter 4ver2
 
Communication Networks basics and very important topic
Communication Networks basics and very important topicCommunication Networks basics and very important topic
Communication Networks basics and very important topic
 
ETHERNET IEEE802.pptx
ETHERNET IEEE802.pptxETHERNET IEEE802.pptx
ETHERNET IEEE802.pptx
 
Advance ethernet
Advance ethernetAdvance ethernet
Advance ethernet
 
Unit 1 ethernet vsd
Unit 1 ethernet vsdUnit 1 ethernet vsd
Unit 1 ethernet vsd
 
IEEE standards 802.3.&802.11
IEEE standards 802.3.&802.11IEEE standards 802.3.&802.11
IEEE standards 802.3.&802.11
 
Teletraffic Lessons for the Future Internet.ppt
Teletraffic Lessons for the Future Internet.pptTeletraffic Lessons for the Future Internet.ppt
Teletraffic Lessons for the Future Internet.ppt
 
Adaptive dcf of mac for vo ip services using
Adaptive dcf of mac for vo ip services usingAdaptive dcf of mac for vo ip services using
Adaptive dcf of mac for vo ip services using
 
Mac
MacMac
Mac
 
Chapter 2 -_lan_network_design - Network Design
Chapter 2 -_lan_network_design - Network DesignChapter 2 -_lan_network_design - Network Design
Chapter 2 -_lan_network_design - Network Design
 
chapter- 6 network layer of computer network
chapter- 6 network layer of computer networkchapter- 6 network layer of computer network
chapter- 6 network layer of computer network
 
Wire Lan Testing
Wire Lan TestingWire Lan Testing
Wire Lan Testing
 
OPTIMIZATION TECHNIQUES FOR SOURCE FOLLOWER BASED TRACK-AND-HOLD CIRCUIT FOR ...
OPTIMIZATION TECHNIQUES FOR SOURCE FOLLOWER BASED TRACK-AND-HOLD CIRCUIT FOR ...OPTIMIZATION TECHNIQUES FOR SOURCE FOLLOWER BASED TRACK-AND-HOLD CIRCUIT FOR ...
OPTIMIZATION TECHNIQUES FOR SOURCE FOLLOWER BASED TRACK-AND-HOLD CIRCUIT FOR ...
 
Underlying Technologies Part I (Lecture #4 ET3003 Sem1 2014/2015)
Underlying Technologies Part I (Lecture #4 ET3003 Sem1 2014/2015)Underlying Technologies Part I (Lecture #4 ET3003 Sem1 2014/2015)
Underlying Technologies Part I (Lecture #4 ET3003 Sem1 2014/2015)
 
Et3003 sem2-1314-3 ethernets
Et3003 sem2-1314-3 ethernetsEt3003 sem2-1314-3 ethernets
Et3003 sem2-1314-3 ethernets
 
Media Access and Internetworking
Media Access and InternetworkingMedia Access and Internetworking
Media Access and Internetworking
 
TCP Performance analysis Wireless Multihop Networks
TCP Performance analysis Wireless Multihop NetworksTCP Performance analysis Wireless Multihop Networks
TCP Performance analysis Wireless Multihop Networks
 
Sdh basics hand_outs_of_sdh_basics
Sdh basics hand_outs_of_sdh_basicsSdh basics hand_outs_of_sdh_basics
Sdh basics hand_outs_of_sdh_basics
 
3c ethernet
3c ethernet3c ethernet
3c ethernet
 

Recently uploaded

9654467111 Call Girls In Noida Sector 62 Short 1500 Night 6000
9654467111 Call Girls In Noida Sector 62 Short 1500 Night 60009654467111 Call Girls In Noida Sector 62 Short 1500 Night 6000
9654467111 Call Girls In Noida Sector 62 Short 1500 Night 6000Sapana Sha
 
Aiims Call Girls : ☎ 8527673949, Low rate Call Girls
Aiims Call Girls : ☎ 8527673949, Low rate Call GirlsAiims Call Girls : ☎ 8527673949, Low rate Call Girls
Aiims Call Girls : ☎ 8527673949, Low rate Call Girlsashishs7044
 
Russian⚡ Call Girls In Sector 104 Noida✨8375860717⚡Escorts Service
Russian⚡ Call Girls In Sector 104 Noida✨8375860717⚡Escorts ServiceRussian⚡ Call Girls In Sector 104 Noida✨8375860717⚡Escorts Service
Russian⚡ Call Girls In Sector 104 Noida✨8375860717⚡Escorts Servicedoor45step
 
FULL ENJOY - 9953040155 Call Girls in Paschim Vihar | Delhi
FULL ENJOY - 9953040155 Call Girls in Paschim Vihar | DelhiFULL ENJOY - 9953040155 Call Girls in Paschim Vihar | Delhi
FULL ENJOY - 9953040155 Call Girls in Paschim Vihar | DelhiMalviyaNagarCallGirl
 
FULL ENJOY - 9953040155 Call Girls in New Ashok Nagar | Delhi
FULL ENJOY - 9953040155 Call Girls in New Ashok Nagar | DelhiFULL ENJOY - 9953040155 Call Girls in New Ashok Nagar | Delhi
FULL ENJOY - 9953040155 Call Girls in New Ashok Nagar | DelhiMalviyaNagarCallGirl
 
FULL ENJOY - 9953040155 Call Girls in Gandhi Vihar | Delhi
FULL ENJOY - 9953040155 Call Girls in Gandhi Vihar | DelhiFULL ENJOY - 9953040155 Call Girls in Gandhi Vihar | Delhi
FULL ENJOY - 9953040155 Call Girls in Gandhi Vihar | DelhiMalviyaNagarCallGirl
 
Karol Bagh Call Girls : ☎ 8527673949, Low rate Call Girls
Karol Bagh Call Girls : ☎ 8527673949, Low rate Call GirlsKarol Bagh Call Girls : ☎ 8527673949, Low rate Call Girls
Karol Bagh Call Girls : ☎ 8527673949, Low rate Call Girlsashishs7044
 
Khanpur Call Girls : ☎ 8527673949, Low rate Call Girls
Khanpur Call Girls : ☎ 8527673949, Low rate Call GirlsKhanpur Call Girls : ☎ 8527673949, Low rate Call Girls
Khanpur Call Girls : ☎ 8527673949, Low rate Call Girlsashishs7044
 
FULL ENJOY - 9953040155 Call Girls in Moti Nagar | Delhi
FULL ENJOY - 9953040155 Call Girls in Moti Nagar | DelhiFULL ENJOY - 9953040155 Call Girls in Moti Nagar | Delhi
FULL ENJOY - 9953040155 Call Girls in Moti Nagar | DelhiMalviyaNagarCallGirl
 
Call Girls in Islamabad | 03274100048 | Call Girl Service
Call Girls in Islamabad | 03274100048 | Call Girl ServiceCall Girls in Islamabad | 03274100048 | Call Girl Service
Call Girls in Islamabad | 03274100048 | Call Girl ServiceAyesha Khan
 
8377087607, Door Step Call Girls In Gaur City (NOIDA) 24/7 Available
8377087607, Door Step Call Girls In Gaur City (NOIDA) 24/7 Available8377087607, Door Step Call Girls In Gaur City (NOIDA) 24/7 Available
8377087607, Door Step Call Girls In Gaur City (NOIDA) 24/7 Availabledollysharma2066
 
San Jon Motel, Motel/Residence, San Jon NM
San Jon Motel, Motel/Residence, San Jon NMSan Jon Motel, Motel/Residence, San Jon NM
San Jon Motel, Motel/Residence, San Jon NMroute66connected
 
Bur Dubai Call Girls O58993O4O2 Call Girls in Bur Dubai
Bur Dubai Call Girls O58993O4O2 Call Girls in Bur DubaiBur Dubai Call Girls O58993O4O2 Call Girls in Bur Dubai
Bur Dubai Call Girls O58993O4O2 Call Girls in Bur Dubaidajasot375
 
How Can You Get Dubai Call Girls +971564860409 Call Girls Dubai?
How Can You Get Dubai Call Girls +971564860409 Call Girls Dubai?How Can You Get Dubai Call Girls +971564860409 Call Girls Dubai?
How Can You Get Dubai Call Girls +971564860409 Call Girls Dubai?kexey39068
 
FULL ENJOY - 9953040155 Call Girls in Laxmi Nagar | Delhi
FULL ENJOY - 9953040155 Call Girls in Laxmi Nagar | DelhiFULL ENJOY - 9953040155 Call Girls in Laxmi Nagar | Delhi
FULL ENJOY - 9953040155 Call Girls in Laxmi Nagar | DelhiMalviyaNagarCallGirl
 
FULL ENJOY - 9953040155 Call Girls in Noida | Delhi
FULL ENJOY - 9953040155 Call Girls in Noida | DelhiFULL ENJOY - 9953040155 Call Girls in Noida | Delhi
FULL ENJOY - 9953040155 Call Girls in Noida | DelhiMalviyaNagarCallGirl
 
Burari Call Girls : ☎ 8527673949, Low rate Call Girls
Burari Call Girls : ☎ 8527673949, Low rate Call GirlsBurari Call Girls : ☎ 8527673949, Low rate Call Girls
Burari Call Girls : ☎ 8527673949, Low rate Call Girlsashishs7044
 
Retail Store Scavanger Hunt - Foundation College Park
Retail Store Scavanger Hunt - Foundation College ParkRetail Store Scavanger Hunt - Foundation College Park
Retail Store Scavanger Hunt - Foundation College Parkjosebenzaquen
 
FULL ENJOY - 9953040155 Call Girls in Dwarka Mor | Delhi
FULL ENJOY - 9953040155 Call Girls in Dwarka Mor | DelhiFULL ENJOY - 9953040155 Call Girls in Dwarka Mor | Delhi
FULL ENJOY - 9953040155 Call Girls in Dwarka Mor | DelhiMalviyaNagarCallGirl
 

Recently uploaded (20)

9654467111 Call Girls In Noida Sector 62 Short 1500 Night 6000
9654467111 Call Girls In Noida Sector 62 Short 1500 Night 60009654467111 Call Girls In Noida Sector 62 Short 1500 Night 6000
9654467111 Call Girls In Noida Sector 62 Short 1500 Night 6000
 
Aiims Call Girls : ☎ 8527673949, Low rate Call Girls
Aiims Call Girls : ☎ 8527673949, Low rate Call GirlsAiims Call Girls : ☎ 8527673949, Low rate Call Girls
Aiims Call Girls : ☎ 8527673949, Low rate Call Girls
 
Russian⚡ Call Girls In Sector 104 Noida✨8375860717⚡Escorts Service
Russian⚡ Call Girls In Sector 104 Noida✨8375860717⚡Escorts ServiceRussian⚡ Call Girls In Sector 104 Noida✨8375860717⚡Escorts Service
Russian⚡ Call Girls In Sector 104 Noida✨8375860717⚡Escorts Service
 
FULL ENJOY - 9953040155 Call Girls in Paschim Vihar | Delhi
FULL ENJOY - 9953040155 Call Girls in Paschim Vihar | DelhiFULL ENJOY - 9953040155 Call Girls in Paschim Vihar | Delhi
FULL ENJOY - 9953040155 Call Girls in Paschim Vihar | Delhi
 
FULL ENJOY - 9953040155 Call Girls in New Ashok Nagar | Delhi
FULL ENJOY - 9953040155 Call Girls in New Ashok Nagar | DelhiFULL ENJOY - 9953040155 Call Girls in New Ashok Nagar | Delhi
FULL ENJOY - 9953040155 Call Girls in New Ashok Nagar | Delhi
 
FULL ENJOY - 9953040155 Call Girls in Gandhi Vihar | Delhi
FULL ENJOY - 9953040155 Call Girls in Gandhi Vihar | DelhiFULL ENJOY - 9953040155 Call Girls in Gandhi Vihar | Delhi
FULL ENJOY - 9953040155 Call Girls in Gandhi Vihar | Delhi
 
Karol Bagh Call Girls : ☎ 8527673949, Low rate Call Girls
Karol Bagh Call Girls : ☎ 8527673949, Low rate Call GirlsKarol Bagh Call Girls : ☎ 8527673949, Low rate Call Girls
Karol Bagh Call Girls : ☎ 8527673949, Low rate Call Girls
 
Khanpur Call Girls : ☎ 8527673949, Low rate Call Girls
Khanpur Call Girls : ☎ 8527673949, Low rate Call GirlsKhanpur Call Girls : ☎ 8527673949, Low rate Call Girls
Khanpur Call Girls : ☎ 8527673949, Low rate Call Girls
 
FULL ENJOY - 9953040155 Call Girls in Moti Nagar | Delhi
FULL ENJOY - 9953040155 Call Girls in Moti Nagar | DelhiFULL ENJOY - 9953040155 Call Girls in Moti Nagar | Delhi
FULL ENJOY - 9953040155 Call Girls in Moti Nagar | Delhi
 
Call Girls in Islamabad | 03274100048 | Call Girl Service
Call Girls in Islamabad | 03274100048 | Call Girl ServiceCall Girls in Islamabad | 03274100048 | Call Girl Service
Call Girls in Islamabad | 03274100048 | Call Girl Service
 
8377087607, Door Step Call Girls In Gaur City (NOIDA) 24/7 Available
8377087607, Door Step Call Girls In Gaur City (NOIDA) 24/7 Available8377087607, Door Step Call Girls In Gaur City (NOIDA) 24/7 Available
8377087607, Door Step Call Girls In Gaur City (NOIDA) 24/7 Available
 
San Jon Motel, Motel/Residence, San Jon NM
San Jon Motel, Motel/Residence, San Jon NMSan Jon Motel, Motel/Residence, San Jon NM
San Jon Motel, Motel/Residence, San Jon NM
 
Bur Dubai Call Girls O58993O4O2 Call Girls in Bur Dubai
Bur Dubai Call Girls O58993O4O2 Call Girls in Bur DubaiBur Dubai Call Girls O58993O4O2 Call Girls in Bur Dubai
Bur Dubai Call Girls O58993O4O2 Call Girls in Bur Dubai
 
How Can You Get Dubai Call Girls +971564860409 Call Girls Dubai?
How Can You Get Dubai Call Girls +971564860409 Call Girls Dubai?How Can You Get Dubai Call Girls +971564860409 Call Girls Dubai?
How Can You Get Dubai Call Girls +971564860409 Call Girls Dubai?
 
FULL ENJOY - 9953040155 Call Girls in Laxmi Nagar | Delhi
FULL ENJOY - 9953040155 Call Girls in Laxmi Nagar | DelhiFULL ENJOY - 9953040155 Call Girls in Laxmi Nagar | Delhi
FULL ENJOY - 9953040155 Call Girls in Laxmi Nagar | Delhi
 
FULL ENJOY - 9953040155 Call Girls in Noida | Delhi
FULL ENJOY - 9953040155 Call Girls in Noida | DelhiFULL ENJOY - 9953040155 Call Girls in Noida | Delhi
FULL ENJOY - 9953040155 Call Girls in Noida | Delhi
 
Burari Call Girls : ☎ 8527673949, Low rate Call Girls
Burari Call Girls : ☎ 8527673949, Low rate Call GirlsBurari Call Girls : ☎ 8527673949, Low rate Call Girls
Burari Call Girls : ☎ 8527673949, Low rate Call Girls
 
Retail Store Scavanger Hunt - Foundation College Park
Retail Store Scavanger Hunt - Foundation College ParkRetail Store Scavanger Hunt - Foundation College Park
Retail Store Scavanger Hunt - Foundation College Park
 
Dxb Call Girls # +971529501107 # Call Girls In Dxb Dubai || (UAE)
Dxb Call Girls # +971529501107 # Call Girls In Dxb Dubai || (UAE)Dxb Call Girls # +971529501107 # Call Girls In Dxb Dubai || (UAE)
Dxb Call Girls # +971529501107 # Call Girls In Dxb Dubai || (UAE)
 
FULL ENJOY - 9953040155 Call Girls in Dwarka Mor | Delhi
FULL ENJOY - 9953040155 Call Girls in Dwarka Mor | DelhiFULL ENJOY - 9953040155 Call Girls in Dwarka Mor | Delhi
FULL ENJOY - 9953040155 Call Girls in Dwarka Mor | Delhi
 

Chapter 4-The Medium Access Control Sublayer.ppt

  • 1. Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011 The Medium Access Control Sublayer Chapter 4
  • 2. Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011 Static Channel Allocation • Multiplexing schemes : divide the resources • Service delay T of a channel with capacity C bps, average frame arrival rate of λ frames/sec, average frame length of 1/μ bits: • Service delay of the same channel splat to N segments:
  • 3. Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011 Assumptions for Dynamic Channel Allocation 1. Independent traffic 2. Single channel 3. Observable Collisions 4. Continuous or slotted time 5. Carrier sense or no carrier sense
  • 4. Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011 Multiple Access Protocols • ALOHA • Carrier Sense Multiple Access • Collision-free protocols • Limited-contention protocols • Wireless LAN protocols
  • 5. Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011 ALOHA (1) In pure ALOHA, frames are transmitted at completely arbitrary times Collision Collision Time User A B C D E
  • 6. Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011 ALOHA (2) Vulnerable period for the shaded frame = 2t Average packets to be transmitted per 2 frame interval = 2G Probability of sending k frames during a frame time = probability of zero frames = Channel throughput =
  • 7. Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011 ALOHA (3) The probability of a transmission requiring exactly k attempts: The expected number of transmissions:
  • 8. Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011 Persistent and Nonpersistent CSMA Comparison of the channel utilization versus load for various random access protocols.
  • 9. Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011 CSMA with Collision Detection When collision is detected, nodes stop sending their frames.  station must wait 2T to know if it has seized the channel or not.  for a 1 km cable T= 5 μsec CSMA/CD can be in one of three states: contention, transmission, or idle.
  • 10. Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011 Collision-Free Protocols (Bitmap protocol) a) low-numbered stations must wait on average 1.5N slots and high-numbered stations must wait 0.5N slots. b) the mean for all stations is N slots. c) Channel efficiency = d /(d + N) if each frame contains d bits.
  • 11. Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011 Collision-Free Protocols (Token Ring) IEEE802.5, 802.17 The efficiency is same as bitmap protocol. Station Direction of transmission Token
  • 12. Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011 Binary Countdown  A dash indicates silence.  The channel efficiency = d /(d + log2 N).  If the first bits of a frame are the station’s address, efficiency = 100%
  • 13. Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011 Limited-Contention Protocols  Use Contention at low load to provide low delay, and collision- free technique at high load to provide good channel efficiency.  The probability that some station successfully acquires the channel during a given slot =  the best value of p is 1/k.
  • 14. Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011 Limited-Contention Protocols a. divide the stations into (not necessarily disjoint) groups. b. Only the members of group 0 are permitted to compete for slot 0; and so on. c. At one extreme, each group has but one member, it resembles collision free protocols like binary countdown. d. The limiting case is a single group containing all stations, which resembles CSMA protocols. e. The protocol should assign many stations per slot when the load is low and few (or even just one) station per slot when the load is high.
  • 15. Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011 The Adaptive Tree Walk Protocol The tree for eight stations.  the average number of ready stations per time slot = q  level i has a fraction 2^−i of the stations below it.  the expected number of ready stations below level i= (2^−i)q  at level i = log2 q in the tree should the search begin.
  • 16. Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011 Wireless LAN Protocols (hidden & exposed terminals)
  • 17. Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011 Wireless LAN Protocols (MACA) (a) A sending an RTS (30 bytes) to B. (b) B responding with a CTS to A.
  • 18. Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011 Ethernet (IEEE 802.3) a) Classic Ethernet – Shared medium – 2.5 km max + 4 repeaters b) switched Ethernet – Fast Ethernet : 100 Mbps – Gigabit Ethernet – 10 Gigabit Ethernet Thick Ethernet : 500 m, 100 users Thin Ethernet: 185 m, 30 users
  • 19. Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011 Classic Ethernet Physical Layer
  • 20. Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011 Classic Ethernet MAC sublayer • Preamble: 10101010  10 MHz square wave 6.4 μsec • Start of frame: 10101011 • D_addr: 0… : unicast, 1… : multicast, 11…1 : broadcast • S_addr: globally unique for each NIC. First 3 bytes are for manufacturers assigned by IEEE, the last 3 byte is assigned by manufacturer to each produced NIC.
  • 21. Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011 MAC Sublayer Protocol (2) o Collision detection can take as long as 2 so a minimum frame length is required. o For a 2500 m cable: RTT = 50 μsec o For 10 Mbps BW = min frame size = 500 bit or 64 bytes.
  • 22. Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011 CSMA/CD with Binary Exponential Backoff a) After i’th consecutive collision, the sender nodes wait a random number of time slots between 0 and 2^i − 1. b) Each Time slot = 51.2 μsec = 512 bit times c) after 10 collisions, the interval is frozen at maximum 1023 slots. d) After 16 collisions, the controller reports failure back
  • 23. Ethernet Performance probability A that some station acquires the channel: maximized when p = 1/k, with A → 1/e as k →∞ The probability that the contention interval has exactly j slots: mean number of slots per contention: slot duration = 2τ, the mean contention interval, w = 2τ/A. w is at most 2τe ∼∼ 5.4τ. mean frame takes P sec  The longer the cable, the longer the contention interval
  • 24. Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011 Efficiency of Ethernet at 10 Mbps with 512-bit slot times
  • 25. Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011 Switched Ethernet (1) (a) Hub. (b) Switch.
  • 26. Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011 Switched Ethernet (2) An Ethernet switch. Switch Twisted pair Switch ports Hub
  • 27. Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011 Fast Ethernet  100B-T4: uses 4 twisted pairs with 25 MHz BW. 1 to the switch, 1 from the switch and other 2 are interchangeable. Using 3 voltage levels for symbols. Manchester encoding.  100B-TX: 4B/5B encoding. 125 MHz BW results 100 Mbps. 2 pairs of cable required.  100B-FX: only works with switches because the maximum cable length should be less than 250 m for CD to work.
  • 28. Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011 Gigabit Ethernet a) Two ways to enhance cable length to 200 m when using hubs: – Hardware carrier extension to 512 bytes. – frame bursting b) 8B/10B encoding is used to maintain synchronization. c) In UTP cables all 4 pairs are used in simultaneous full-duplex mode! With 5 voltage levels d) Pause frames are defined to cease the communication speed.
  • 29. Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011 10 Gigabit Ethernet  Fiber cables use 64B/66B coding is used.  CX cables use 8B/10B coding and 3.125 Gsymbol/sec on each pair.  T cabling requires 16 voltage levels. LDPC (Low Density Parity Check) is used.  40Gbps and 100Gbps Ethernet standards are in the way.
  • 30. Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011 Ethernet benefits a) Reliable: by introducing switches b) Cheap: twisted pairs and NICs c) Easy to maintain: no software requirement. Easy configuration. d) Well integration with IP: both are connection less. e) Flexible: evolve by time in speed requirements with minimum reconfiguration and changes.
  • 31. Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011 Wireless Lans • 802.11 architecture and protocol stack • 802.11 physical layer • 802.11 MAC sublayer protocol • 802.11 frame structure • Services
  • 32. Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011 802.11 Architecture and Protocol Stack (1) 802.11 architecture – infrastructure mode Access Point Client To Network
  • 33. Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011 802.11 Architecture and Protocol Stack (2) 802.11 architecture – ad-hoc mode-
  • 34. Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011 802.11 Protocol Stack 1-2 Mbps 11 Mbps 54 Mbps 600 Mbps
  • 35. Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011 802.11b PHY Layer a) 1 Mbps : 11 chip barker code to spread the signal with BPSK to send 1 bit per 11 chip. The chip rate is 11 Mchips/sec. b) 2 Mbps : QPSK (Quadrature Phase Shift Keying) to send 2 bits per 11 chip. c) 5.5 Mbps: CCK (Complementary Code Keying) with 4 bits per 8 chips. d) 11 Mbps: CCK with 8 bits per 8 chips.
  • 36. Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011 802.11a, g, n PHY Layer a) Works in 5GHz band. b) Uses OFDM (Orthogonal frequency-division multiplexing) with 52 subcarriers 48 for data and 4 for sync. c) Each symbol lasts 4μs and sends 1, 2, 4, or 6 bits. d) Supports 8 data rates from 6 up to 54Mbps. e) Communication range is 1/7 802.11b because of freq. band. f) 802.11 g uses OFDM in 2.4GHz band. g) Supports same rates of 802.11a with same range of 802.11b h) 802.11n doubles the channel width from 20 to 40MHz. i) Uses multiple antennas and MIMO techniques to increase BW.
  • 37. Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011 The 802.11 MAC Sublayer Protocol Sending a frame with CSMA/CA. The initial back off gets exponentially bigger if no ack is received.
  • 38. Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011 Collision Avoidance mechanism The use of virtual channel sensing using CSMA/CA. NAV (Network Allocation Vector) RTS/CTS: request to send/ clear to send
  • 39. Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011 CSMA/CA a) RTS/CTS mechanism is seldom used, because it slows down the communication. b) The random back-off mechanism as well as virtual carrier sensing (by overhearing the NAV field) are the main mechanisms to avoid collision. c) Fragmentation is also used to keep the frame error rates small. d) Fragments are sent in bursts when channel is acquired and each fragment should be acknowledged before the next one is sent.
  • 40. Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011 Power management a) Nodes go to sleep mode and inform AP of it. b) AP buffers traffic for sleeping nodes. c) AP sends periodic beacons to announce which node has a buffered frame. d) Nodes should wake up at beacon intervals (typically 100msec) to see if they have frames. e) If so they tell the AP to send them the frames.
  • 41. Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011 Interframe timing for QoS purposes a) SIFS (Short InterFrame Spacing) b) DIFS (Distributed Coordination Function InterFrame Spacing) c) AIFS (Arbitration InterFrame Space) d) EIFS (Extended InterFrame Spacing)
  • 42. Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011 802.11 Frame Structure Format of the 802.11 data frame
  • 43. Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011 Data Link Layer Switching • Uses of bridges • Learning bridges • Spanning tree bridges • Repeaters, hubs, bridges, switches, routers, and gateways • Virtual LANs
  • 44. Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011 Using bridges to connect LANs
  • 45. Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011 backward learning a) hash tables are initially empty. b) Bridges use a flooding algorithm. c) Gradually By looking at the source addresses, they can tell which machines are accessible on which ports. d) it makes an entry in its hash table for each station. e) the arrival time of the last frame is noted in the entry. f) It purges all entries more than a few minutes old. 1. If the port for the destination address is the same as the source port, discard the frame. 2. If the port for the destination address and the source port are different, forward the frame on to the destination port. 3. If the destination port is unknown, use flooding and send the frame on all ports except the source port. Forwarding Rules
  • 46. Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011 Protocol processing at a bridge
  • 47. Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011 Loop creation in case of using redundant links between bridges
  • 48. Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011 Spanning Tree Bridging a) B1 is elected to be the root because of its lowest ID.
  • 49. Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011 Poem by Radia Perlman (1985) Algorithm for Spanning Tree I thinkthatIshallneversee Agraphmorelovelythanatree. Atreewhosecrucialproperty Isloop-freeconnectivity. Atreewhichmustbesuretospan. SopacketscanreacheveryLAN. FirsttheRootmustbeselected ByIDitiselected. LeastcostpathsfromRootaretraced Inthetreethesepathsareplaced. Ameshismadebyfolkslikeme Thenbridgesfindaspanningtree.
  • 50. Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011 Repeaters, Hubs, Bridges, Switches, Routers, and Gateways (a) Which device is in which layer. (b) Frames, packets, and headers.
  • 51. Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011 Virtual LANs (1) A building with centralized wiring using hubs and a switch.
  • 52. Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011 Virtual LANs (2) Two VLANs, gray and white, on a bridged LAN. Frames from gray LAN nodes are only forwarded to gray LAN ports.
  • 53. Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011 The IEEE 802.1Q Standard (1) The standard adds VLAN field in the MAC header. Bridged LAN that is only partly VLAN-aware. The shaded frames are originally VLAN aware. The empty ones are not.
  • 54. Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011 The IEEE 802.1Q Standard (2) The 802.3 (legacy) and 802.1Q Ethernet frame formats.
  • 55. Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011 Home work assignment Student Assigned problems (problems between 26-35 should be ommited) 1 37 40 6 27 1 35 9 41 9 4 2 7 42 10 16 20 27 32 39 28 17 3 14 35 9 40 34 12 7 1 13 1 4 32 15 7 5 17 8 39 2 41 30 5 26 9 21 24 2 13 28 9 20 20 6 31 4 1 30 22 28 33 15 4 38 7 11 28 10 28 4 41 31 6 23 37 8 36 12 37 24 35 40 31 26 29 24 9 5 26 4 8 15 29 41 4 19 28 10 28 36 42 30 27 4 35 33 20 38 11 28 32 27 22 38 35 24 2 6 1 12 33 31 22 16 32 0 3 30 16 35 13 36 9 14 32 30 15 14 17 20 24 14 41 30 31 1 7 5 42 22 34 2 15 7 24 21 38 9 9 37 0 11 6 16 32 5 0 28 16 23 3 4 10 18 17 22 38 35 19 8 40 23 26 9 20 18 1 17 23 7 25 18 40 15 18 15 19 39 28 6 4 25 5 12 22 17 19 20 23 30 2 25 4 26 10 37 11 18 21 38 37 21 20 30 21 10 9 20 27 22 29 13 25 16 17 10 13 8 22 11 23 1 1 15 4 40 40 32 32 34 37 24 28 24 30 12 15 41 12 41 41 36 25 10 32 9 32 31 18 43 35 38 34