Unit - 2 ( Part- 2 )
Unit - 2 ( Part- 2 )
To coordinate the access to the channel, multiple access protocols are requiring.
All these protocols belong to the MAC sub layer. Data Link layer is divided into two
sub layers:
1. Logical Link Control (LLC)- is responsible for error control & flow control.
2. Medium Access Control (MAC)- MAC is responsible for multiple access
resolutions
3.3.1.1 ALOHA
ALOHA was developed at University of Hawaii in early 1970s by Norman
Abramson. It was used for ground based radio broadcasting. In this method, stations
share a common channel. When two stations transmit simultaneously, collision occurs
and frames are lost. There are two different versions of ALOHA:
Pure ALOHA
Slotted ALOHA
I
Pure ALOHA
In pure ALOHA, stations transmit frames whenever they have data to send. When two
stations transmit simultaneously, there is collision and frames are lost. In pure
ALOHA, whenever any station transmits a frame, it expects an acknowledgement from
the receiver. If acknowledgement is not received within specified time, the station
assumes that the frame has been lost. If the frame is lost, station waits for a random
amount of time and sends it again. This waiting time must be random; otherwise,
same frames will collide again and again. Whenever two frames try to occupy the
channel at the same time, there will be collision and both the frames will be lost. If first
bit of a new frame overlaps with the last bit of a frame almost finished, both frames will
be lost and both will have to be retransmitted.
The probability of having k arrivals during a time interval of length t is given by:
(t)k et
Pk (t)
k!
where λ is the arrival rate. Note that this is a single-parameter model; all we have to
know is λ.
0!
G
becasue . Thus, S G e2G
Tf
If we differentiate S = Ge-2G with respect to G and set the result to 0 and solve for G,
we find that the maximum occurs when G = 0.5, and for that S = 1/2e = 0.18. So, the
maximum throughput is only 18% of capacity
Slotted ALOHA
Slotted ALOHA was invented to improve the efficiency of pure ALOHA. In slotted
ALOHA, time of the channel is divided into intervals called slots. The station can send
a frame only at the beginning of the slot and only one frame is sent in each slot. If any
station is not able to place the frame onto the channel at the beginning of the slot, it
has to wait until the next time slot. There is still a possibility of collision if two stations
try to send at the beginning of the same time slot.
0!
G
because . Thus, S G eG
Tf
I
In this method, station that wants to transmit data, continuously senses the
channel to check whether he channel is idle or busy. If the channel is busy, station
waits until it becomes idle. When the station detects an idle channel, it immediately
transmits the frame. This method has the highest chance of collision because two or
more stations may find channel to be idle at the same time and transmit their frames.
In this method, the channel has time slots such that the time slot duration is
equal to or greater than the maximum propagation delay time. When a station is ready
to send, it senses the channel. If the channel is busy, station waits until next slot. If
the channel is idle, it transmits the frame. It reduces the chance of collision and
improves the efficiency of the network.
Interframe Space: Whenever the channel is found idle, the station does not transmit
immediately. It waits for a period of time called Interframe Space (IFS). When
channel is sensed idle, it may be possible that some distant station may have already
started transmitting. Therefore, the purpose of IFS time is to allow this transmitted
signal to reach its destination. If after this IFS time, channel is still idle, the station can
send the frames.
Contention Window: Contention window is the amount of time divided into slots.
Station that is ready to send chooses a random number of slots as its waiting time.
The number of slots in the window changes with time. It means that it is set of one
slot for the first time, and then doubles each time the station cannot detect an idle
channel after the IFS time. In contention window, the station needs to sense the
channel after each time slot.
Acknowledgment: Despite all the precautions, collisions may occur and destroy the
data. Positive acknowledgement and the time-out timer help guarantee that the
receiver has received the frame.
The most commonly installed Ethernet systems are called 10BASE-T, which
provides transmission speeds up to 10 Mbps. 'Fast Ethernet' or 100BASE-T provides
transmission speeds up to 100 megabits per second and is typically used for servers,
LAN backbone systems and in workstations with high-bandwidth needs. Gigabit
Ethernet provides an even faster level of backbone support at 1000 megabits per
second (1 gigabit or 1 billion bits per second).
Ethernet is a passive, contention-based broadcast technology that uses
baseband signaling. Baseband signaling uses the entire bandwidth of a cable for a
single transmission. Only one signal can be transmitted at a time and every device on
the shared network hears broadcast transmissions. Passive technology means that
there is no one device controlling the network. Contention-based means that every
device must compete with every other device for access to the shared network. In
other words, devices take turns. They can transmit only when no other device is
transmitting.
Physical layer configurations are specified in three parts
-Data rate (10, 100, 1,000) Mbps
-Signaling method –Baseband(Digital signaling) and Broadband(Analog signaling)
-Cabling (2, 5, T, F, S, L)
– 5 - Thick coax (original Ethernet cabling)
– F – Optical fiber
– S – Short wave laser over multimode fiber
– L – Long wave laser over single mode fiber
Frame format
When a node wants to communicate to another node, it transmits its frame. The
frame travels to every node on the segment. Each node inspects the frame to see if it
is addressed to him. If the frame is not addressed to the node, the node ignores it. If
the frame is addressed to the node, the node opens the frame and reads its contents.
The exception is a broadcast address, which is a special message intended to be read
by every node (like a message on the P.A. as opposed to a comment from one person
I
Inexpensive
Easy to install, maintain, troubleshoot and expand
A widely accepted industry standard, which means compatibility and
equipment access are less of an issue
Structured to allow compatibility with network operating systems
(NOS)
Very reliable
wireless LAN technology based on IEEE 802.11 standard. Its predecessor the
IEEE 802.3, commonly referred to as the Ethernet, is the most widely deployed
member of the family. IEEE 802.11 is commonly referred to as wireless Ethernet
because of its close similarity with the IEEE 802.3. Like IEEE 802.3, it also defines
only two bottom levels of ISO’s open system Interconnection (OSI) model. There are
three media that can be used for transmission over wireless LANs. Infrared, radio
frequency and microwave.
3.5.1 Framing
The frames can be categorized into three types; management frame, control
frame and data frame. The management frames are used for association and
disassociation of stations with at the AP, authentication and de-authentication, and
timing and synchronization. Each frame consists of a MAC header, a frame body and
a frame check sequence (FCS).
I
AC header will be described in a little while. Frame Body varies from 0-2312
bytes. At last is the FCS field. The frame check sequence is a 32-bit cyclic redundancy
check which ensures there are no errors in the frame.
The sequence number field is 12 bits that indicates the sequence number of the
MSDU. The frame body is a variable length field from 0 - 2312. This is the payload.
Advantages:
Availability of low-cost portable equipments: Due to the technology
enhancements, the equipment cost that are required for WLAN set-up have
reduced a lot.
Mobility: An increasing number of LAN users are becoming mobile. These
mobile users require that they are connected to the network regardless of
where they are because they want simultaneous access to the network. This
makes the use of cables, or wired LANs, impractical if not impossible. Wireless
LAN can provide users mobility, which is likely to increase productivity, user
convenience and various service opportunities.
Installation speed and simplicity: Wireless LANs are very easy to install.
There is no requirement for wiring every workstation and every room. This ease
of installation makes wireless LANs inherently flexible. If a workstation must be
moved, it can be done easily and without additional wiring, cable drops or
reconfiguration of the network.
Installation flexibility: If a company moves to a new location, the wireless
system is much easier to move than ripping up all of the cables that a wired
system would have snaked throughout the building. This also provides
portability. Wireless technology allows network to go anywhere wire cannot
reach.
Reduced cost of ownership: While the initial cost of wireless LAN can be
higher than the cost of wired LAN hardware, it is envisaged that the overall
installation expenses and life cycle costs can be significantly lower. Long-term
cost-benefits are greater in dynamic environment requiring frequent moves and
changes.
Scalability: Wireless LAN can be configured in a variety of topologies to meet
the users need and can be easily scaled to cover a large area with thousands
of users roaming within it.
Limitation:
"having instantaneous bandwidths greater than 1 MHz and supporting data rates
greater than about 1.5 Mbit/s
3.6.1 WiMAX
The 802.16a standard for 2-11 GHz is a wireless metropolitan area network (MAN)
technology that will provide broadband wireless connectivity to Fixed, Portable and
Nomadic devices.
It can be used to connect 802.11 hot spots to the Internet, provide campus
connectivity, and provide a wireless alternative to cable and DSL for last mile
broadband access.
WiMAX is expected to offer initially up to about 40 Mbps capacity per wireless channel
for both fixed and portable applications, depending on the particular technical
configuration chosen, enough to support hundreds of businesses with T-1 speed
connectivity and thousands of residences with DSL speed connectivity. WiMAX can
support voice and video as well as Internet data.
populated areas. It can also be used to connect WLAN hotspots to the Internet.
WiMAX is also intended to provide broadband connectivity to mobile devices. It would
not be as fast as in these fixed applications, but expectations are for about 15 Mbps
capacity in a 3 km cell coverage area.
With WiMAX, users could really cut free from today's Internet access arrangements
and be able to go online at broadband speeds, almost wherever they like from within a
Metro Zone. WiMAX could potentially be deployed in a variety of spectrum bands:
2.3GHz, 2.5GHz, 3.5GHz, and 5.8GHz. Support different application classes at the
same time i.e Interactive gaming, VOIP & video conferencing, Streaming media (real
time), Web browsing & instant messaging Media content download (store & forward).
3.7 BLUETOOTH
Piconet is a Bluetooth network that consists of one primary (master) node and seven
active secondary (slave) nodes. Thus, piconet can have upto eight active nodes (1
master and 7 slaves) or stations within the distance of 10 meters. There can be only
one primary or master station in each piconet. The communication between the
primary and the secondary can be one-to-one or one-to-many. All communication is
between master and a slave. Salve-slave communication is not possible. In addition to
seven active slave station, a piconet can have upto 255 parked nodes. These parked
nodes are secondary or slave stations and cannot take part in communication until it is
moved from parked state to active state.
I
second, i.e. each device changes its modulation frequency 1600 times per second. In
order to change bits into a signal, it uses a version of FSK called GFSK i.e. FSK with
Gaussian bandwidth filtering.
Baseband Layer
Baseband layer is equivalent to the MAC sublayer in LANs. Bluetooth uses a form of
TDMA called TDD-TDMA (time division duplex TDMA). Master and slave stations
communicate with each other using time slots. The master in each piconet defines the
time slot of 625 µsec. In TDD- TDMA, communication is half duplex in which receiver
can send and receive data but not at the same time. If the piconet has only no slave;
the master uses even numbered slots (0, 2, 4, ...) and the slave uses odd-numbered
slots (1, 3, 5, ). Both master and slave communicate in half duplex mode. In slot 0,
master sends & secondary receives; in slot 1, secondary sends and primary receives.
If piconet has more than one slave, the master uses even numbered slots. The slave
sends in the next odd-numbered slot if the packet in the previous slot was addressed
to it. In Baseband layer, two types of links can be created between a master and
slave. These are:
1. Asynchronous Connection-less (ACL)
It is used for packet switched data that is available at irregular intervals. ACL delivers
traffic on a best effort basis. Frames can be lost & may have to be retransmitted. A
slave can have only one ACL link to its master. Thus ACL link is used where correct
delivery is preferred over fast delivery. The ACL can achieve a maximum data rate of
721 kbps by using one, three or more slots.
2. Synchronous Connection Oriented (SCO)
sco is used for real time data such as sound. It is used where fast delivery is
preferred over accurate delivery. In an sco link, a physical link is created between
the master and slave by reserving specific slots at regular intervals. Damaged packet;
are not retransmitted over sco links. A slave can have three sco links with the master
and can send data at 64 Kbps.
Logical Link, Control Adaptation Protocol Layer (L2CAP)
The logical unit link control adaptation protocol is equivalent to logical link control
sublayer of LAN. The ACL link uses L2CAP for data exchange but sco channel does
not use it. The various function of L2CAP is:
1. Segmentation and reassembly
L2CAP receives the packets of upto 64 KB from upper layers and divides them into
frames for transmission. It adds extra information to define the location of frame in the
original packet. The L2CAP reassembles the frame into packets again at the
destination.
2. Multiplexing
L2CAP performs multiplexing at sender side and demultiplexing at receiver side. At
the sender site, it accepts data from one of the upper layer protocols frames them and
I
deliver them to the Baseband layer. At the receiver site, it accepts a frame from the
baseband layer, extracts the data, and delivers them to the appropriate protocol1ayer.
3. Quality of Service (QOS)
L2CAP handles quality of service requirements, both when links are established and
during normal operation. It also enables the devices to negotiate the maximum
payload size during connection establishment.
Bluetooth Frame Format
The various fields of blue tooth frame format are:
bridges, switches, hubs, routers, and gateways all of these devices are in common
use, but they all differ in subtle. These devices operate in different layers. The layer
matters because different devices use different pieces of information to decide how
to switch. In a typical scenario, the user generates some data to be sent to a remote
machine. Those data are passed to the transport layer, which then adds a header,
for example, a TCP header, and passes the resulting unit down to the network layer.
The network layer adds its own header to form a network layer packet, for example,
an IP packet. Then the packet goes to the data link layer, which adds its own header
and checksum (CRC) and gives the resulting frame to the physical layer for
transmission, for example, over a LAN.
Fig 3.13 a) Device operated in each layer b) Frames, Packets and header