Lecture_3_EECE_497_Layering_Architecture_MAC_protocols
Lecture_3_EECE_497_Layering_Architecture_MAC_protocols
1
Protocol Hierarchies
To reduce design complexity, most networks are organized as a
stack of layers or levels
Each one built upon the one below it
The number of layers, the name of each layer, the contents of
each layer, and the function of each layer differ from network to
network
The purpose of each layer is to offer certain services to the
higher layers
In a sense, each layer is a kind of virtual machine, offering
certain services to the layer above it
2
OSI Layering Architecture/ Reference Model
International standard organization (ISO) established a committee in 1977
to develop an architecture for computer communication
Open Systems Interconnection (OSI) model is the result of this effort
In 1984, OSI model is approved as reference model
3
Upper Layers
Application Layer
Allows access to network resource
Make applications into data format
Presentation Layer
Translate, encrypt and compress data
Session Layer
The session layer is responsible for dialog
control and synchronization
Transport Layer
Controls congestion
Provides transmission reliability between source and destination
4
Network Layer
5
Data Link Layer
6 6
Physical layer
7
Interaction among the layers
8 8
Advantages/disadvantages of Layering
Layer architecture simplifies the communication network design
It is easy to debug network applications in a layered architecture
network
The communication system management is easier
Research/work on a layer can be done independently
Some cases, the functionalities of multiple layer are dependent
especially for wireless networks
Performance can be poor if they work independently
Information from one layer need to pass to another layer and
the activity of a layer should be modified with those information
Cross-layer design cross-layering of two or more layers and
optimization are proposing to overcome the problems
Cross-layer examples:
MAC+PHY, Network+PHY, Network+MAC+PHY, Transport+MAC
9
TCP/IP Reference Model
All the OSI layers are not present
10 10
TCP/IP Reference Model
TCP: Transmission Control Protocol
UDP: User Datagram Protocol
IP: Internet Protocol
ICMP : Internet Control Message Protocol
HTTP : HyperText Transfer Protocol
SMTP: Simple Mail Transfer Protocol
DNS: Domain Name System
RTP: Real time protocol
11 11
What is MAC?
12
Classification
Random access (contention methods): No station is superior to another station and none is
assigned the control over another. No station permits, or does not permit, another station to
send. distributed, low cost, poor performance
Controlled access: The stations consult one another to find which station has the right to
send. A station cannot send unless it has been authorized by other stations. They were
designed for computer networks. Not popular now.
Channelization techniques: The available bandwidth of a link is shared in time, frequency, or
through code, between different stations. Usually, it is controlled by a system administrator.
Conflict free; centralized, high cost, good performance
Frequency Division Multiple Access (FDMA)
14
14
FDMA
Time Division Multiple Access (TDMA)
Time is slotted
One user per slot
Buffer and burst method
Non-continuous transmission
Digital data
Digital modulation
16
16
TDMA
Code Division Multiple Access (CDMA)
Transmitters may transmit at the same time and the same
channel
Each signal is modified by spreading it over a large bandwidth
18
18
CDMA
19 19
CDMA
20
20
CDMA
21
21
FDMA vs. TDMA vs. CDMA
FDMA
Many channels - same antenna
For maximum power efficiency amplifiers operate near saturation
Near saturation power amplifiers are nonlinear
Nonlinearities causes signal spreading
Inter modulation (IM) frequencies
IM are undesired harmonics
Interference with other channels in the FDMA system
Decreases user carrier to interference ratio (C/I) - decreases performance
Interference outside the mobile radio band: adjacent-channel interference
FDMA requires RF filtering to minimize adjacent channel interference
RF filters needed - higher costs
Even through, it could be a good choice for high speed communications
FDMA vs. TDMA vs. CDMA
TDMA:
Digital equipments used in time division multiplexing is increasingly becoming cheaper
There are advantages in digital transmission techniques. Ex: error correction
Lack of inter-modulation noise means increased efficiency
Handoff process much simpler
Low battery consumption due to sleep scheduling facility
Extra signaling bits required for synchronization and framing
High synchronization overhead and guard slots
Selected for next generation communications
CDMA:
Near far problem in CDMA
2
ALOHA: Vulnerable time
Throughput Model
Let G is the traffic arrivals per packet time T
Pr(N=k)=(GT/T)^k*exp(-GT/T)/k!
1-persistent CSMA
0.4
0.3
0.2
Slotted Aloha
Aloha
0.1
0
0 1 2 3 4 5 6 7 8 9
G
CSMA with collision detection
CSMA/CD
In CSMA, if 2 terminals begin sending packet at the same time,
each will transmit its complete packet (although collision is
taking place).
Wasting medium for an entire packet time.
CSMA/CD is used to detect collision and stop transmission
Used in Ethernet, very efficient
Steps in CDMA/CD
Step 1: If the medium is idle, transmit
Step 2: If the medium is busy, continue to listen until the channel is idle then
transmit
Step 3: If a collision is detected during transmission, cease transmitting
Step 4: Wait a random amount of time and repeats the same algorithm
Throughput CDMA/CD
k (1 Psucc ) k 1 Psucc
k 1
Psucc
[1 (1 Psucc )]2
1 / Psucc e
Maximum throughput,
Throughput CDMA/CD
CSMA/CA (CSMA with collision Avoidance)
All terminals listen to the same medium as CSMA/CD.
Terminal ready to transmit senses the medium.
If medium is busy it waits until the end of current transmission.
It again waits for an additional predetermined time period DIFS (Distributed
inter frame Space).
Then picks up a random number of slots (the initial value of back-off
counter) within a contention window to wait before transmitting its frame.
If there are transmissions by other terminals during this time period (back-
off time), the terminal freezes its counter.
It resumes count down after other terminals finish transmission + DIFS. The
terminal can start its transmission when the counter reaches to zero.
CSMA/CA
Delay: B
Delay: C Time
Nodes B & C sense
the medium
Nodes C starts
Nodes B resenses the medium transmitting.
and transmits its frame.
Node C freezes its counter.
DIFS Contention
window DIFS Contention window
Next Frame
Other
Defer access Backoff after defer
CTS ACK
Destination
DIFS
Contention window
Next Frame
Other
HTP
A B C D
Missing opportunity
ETP
Multiple Access Techniques in use
System Multiple Access
Advanced Mobile Phone System (AMPS) FDMA/FDD
Global System for Mobile (GSM) TDMA/FDD
US Digital Cellular (USDC) TDMA/FDD
Digital European Cordless Telephone (DECT) FDMA/TDD
US Narrowband Spread Spectrum (IS-95) CDMA/FDD
Satellite Communication TDMA and FDMA
WiMax TDMA
WiFi CSMA/CA
Ethernet CSMA/VD
IEEE 802 Protocols for LAN and MAN
802.3 for LAN with Ethernet
802.11 (wireless LAN)
802.16 (wireless MAN)