Title: The Medium Access Control Sublayer
1The Medium Access ControlSublayer
2The Channel Allocation Problem in Multi-access or
random-access
- Static Channel Allocation in LANs and MANs
- Dynamic Channel Allocation in LANs and MANs
3Dynamic Channel Allocation in LANs and MANs
- Station Model.
- Single Channel Assumption.
- Collision Assumption.
- (a) Continuous Time.(b) Slotted Time.
- (a) Carrier Sense.(b) No Carrier Sense.
4Multiple Access Protocols
- ALOHA
- Carrier Sense Multiple Access Protocols
- Collision-Free Protocols
- Limited-Contention Protocols
- Wavelength Division Multiple Access Protocols
- Wireless LAN Protocols
5Pure ALOHA
- In pure ALOHA, frames are transmitted at
completely arbitrary times.
6Pure ALOHA (2)
- Vulnerable period for the shaded frame.
7Slotted ALOHA
- Frames are transmitted only within the slotted
- Collision can only occur within the slotted
8Vulnerable period (Slotted ALOHA)
9Pure ALOHA (3)
- Throughput versus offered traffic for ALOHA
systems.
10Persistent and Non-persistent CSMA
- Comparison of the channel utilization versus load
for various random access protocols.
11CSMA with Collision Detection
- CSMA/CD can be in one of three states
contention, transmission, or idle.
12Limited-Contention Protocols
- Acquisition probability for a symmetric
contention channel.
13Ethernet
- Ethernet Cabling
- Manchester Encoding
- The Ethernet MAC Sublayer Protocol
- The Binary Exponential Backoff Algorithm
- Ethernet Performance
- Switched Ethernet
- Fast Ethernet
- Gigabit Ethernet
- IEEE 802.2 Logical Link Control
- Retrospective on Ethernet
14Ethernet Cabling
- The most common kinds of Ethernet cabling.
15Ethernet Cabling (2)
- Three kinds of Ethernet cabling.
- (a) 10Base5, (b) 10Base2, (c) 10Base-T.
16Ethernet Cabling (3)
- Cable topologies. (a) Linear, (b) Spine, (c)
Tree, (d) Segmented.
17Ethernet Cabling (4)
- (a) Binary encoding, (b) Manchester encoding,
(c) Differential Manchester encoding.
18Ethernet MAC Sublayer Protocol
- Frame formats. (a) Ethernet, (b) IEEE 802.3.
19(No Transcript)
20How collision happen
- More than 2 stations transmit frames at the same
time - More than 2 stations have enter to contention
period (trying to gain access to the media). Once
the media available, those stations transmit
frame at the same time.
21Ethernet MAC Sublayer Protocol (2)
22Why PAD is needed
- Enlarge frame to minimal length, when data is
very small
23How fast do electrons move?
- As fast as you can get them going! Well not
quite. One of the facts of life discovered in the
20th century is that the speed of light (300,000
kilometers per second) is the ultimate speed
limit. As you add energy to the electron, it will
go faster, but as you get it to go close to the
speed of light, you find that you have to add
even more energy just to bump it a bit faster.
For example, with just over 220,000 eV (which
stands for a convenient unit of energy called the
"electron-volt"), you can get the electron up to
90 of the speed of light. But to get it to 99.9
(just another 9.9), you need a total of over 11
million eV! One way of looking at this is that
the electron gets "heavier" (more massive) as it
goes ever faster. So it's harder to push it
faster. At Jefferson Lab, a typical energy for
the electrons in the beam is 4 GeV which is 4
billion eV. That means the electron is traveling
at 99.9999992 of the speed of light. Close but
still not 100. - You may wonder how fast the electrons are
whizzing around in the atoms around you. A good
example (and the most simple to calculate) is the
hydrogen atom which is in all our water. A
calculation shows that the electron is traveling
at about 2,200 kilometers per second. That's less
than 1 of the speed of light, but it's fast
enough to get it around the Earth in just over 18
seconds. Read up on what happens when nothing can
go faster than the speed of light.
24Example
- What is the max length of the Ethernet LAN
- 10 Mbps and 100 Mbps
- Assume that electron move at 2200km/s
25Binary Exponential Backoff
- When collision occur ?
- An algorithm for dealing with contention in the
use of a network. To transmit a packet the host
sets a local parameter, L to 1 and transmits in
one of the next L slots. If a collision occurs,
it doubles L and repeats.
26- The retransmission is delayed by an amount of
time derived from the slot time and the number of
attempts to retransmit. - After i collisions, a random number of slot times
between 0 and 2i - 1 is chosen. For the first
collision, each sender might wait 0 or 1 slot
times. After the second collision, the senders
might wait 0, 1, 2, or 3 slot times, and so
forth. As the number of retransmission attempts
increases, the number of possibilities for delay
increases.
27Ethernet Performance
- Efficiency of Ethernet at 10 Mbps with 512-bit
slot times.
28Switched Ethernet
- A simple example of switched Ethernet.
29Fast Ethernet
- The original fast Ethernet cabling.
30Gigabit Ethernet
- (a) A two-station Ethernet. (b) A multistation
Ethernet.
31Gigabit Ethernet (2)
- Gigabit Ethernet cabling.
32IEEE 802.2 Logical Link Control
- (a) Position of LLC. (b) Protocol formats.
33Bluetooth
- Bluetooth Architecture
- Bluetooth Applications
- The Bluetooth Protocol Stack
- The Bluetooth Radio Layer
- The Bluetooth Baseband Layer
- The Bluetooth L2CAP Layer
- The Bluetooth Frame Structure
34Bluetooth Architecture
- Two piconets can be connected to form a
scatternet.
35Bluetooth Applications
36The Bluetooth Protocol Stack
- The 802.15 version of the Bluetooth protocol
architecture.
37The Bluetooth Frame Structure
- A typical Bluetooth data frame.
38Data Link Layer Switching
- Bridges from 802.x to 802.y
- Local Internetworking
- Spanning Tree Bridges
- Remote Bridges
- Repeaters, Hubs, Bridges, Switches, Routers,
Gateways - Virtual LANs
39Data Link Layer Switching
- Multiple LANs connected by a backbone to handle a
total load higher than the capacity of a single
LAN.
40Bridges from 802.x to 802.y
- Operation of a LAN bridge from 802.11 to 802.3.
41Bridges from 802.x to 802.y (2)
- The IEEE 802 frame formats. The drawing is not
to scale.
42Local Internetworking
- A configuration with four LANs and two bridges.
43Spanning Tree Bridges
- Two parallel transparent bridges.
44Spanning Tree Bridges (2)
- (a) Interconnected LANs. (b) A spanning tree
covering the LANs. The dotted lines are not part
of the spanning tree.
45Repeaters, Hubs, Bridges, Switches, Routers and
Gateways
- Which device is in which layer.
- Frames, packets, and headers.
46Repeaters, Hubs, Bridges, Switches, Routers and
Gateways (2)
- (a) A hub. (b) A bridge. (c) a switch.
47Virtual LANs
- A building with centralized wiring using hubs and
a switch.
48Virtual LANs (2)
- (a) Four physical LANs organized into two
VLANs, gray and white, by two bridges. (b) The
same 15 machines organized into two VLANs by
switches.
49Summary
- Channel allocation methods and systems for a
common channel.