1 / 38

The Medium Access Control Sublayer

The Medium Access Control Sublayer. Medium Access Control: a means of controlling access to the medium to promote orderly and efficient use. OSI Model and Project 802. The Channel Allocation Problem. Static Channel Allocation in LANs and MANs

aysel
Télécharger la présentation

The Medium Access Control Sublayer

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. The Medium Access ControlSublayer Medium Access Control: ameans of controlling access to the medium to promote orderly and efficient use. A.S.Tanenbaum, Computer networks, ch4 MAC

  2. OSI Model and Project 802 A.S.Tanenbaum, Computer networks, ch4 MAC

  3. The Channel Allocation Problem Static Channel Allocation in LANs and MANs FDM: small and constant users, heavy load of traffic of each. TDM:same problem. Poor performance. None of the static channel allocation methods work well with bursty traffic. Dynamic Channel Allocation in LANs and MANs A.S.Tanenbaum, Computer networks, ch4 MAC

  4. Pure ALOHA In pure ALOHA, frames are transmitted at completely arbitrary times. Multiple Access Protocols A.S.Tanenbaum, Computer networks, ch4 MAC

  5. Pure ALOHA (2) Vulnerable period for the shaded frame. A.S.Tanenbaum, Computer networks, ch4 MAC

  6. Slotted ALOHA Time in uniform slots equal to frame transmission time Need central clock (or other sync mechanism) Transmission begins at slot boundary Frames either miss or overlap totally Max utilization 36.8% A.S.Tanenbaum, Computer networks, ch4 MAC

  7. Relative formulas for the ALOHA

  8. Pure ALOHA and Slotted ALOHA Throughput versus offered traffic for ALOHA systems. A.S.Tanenbaum, Computer networks, ch4 MAC

  9. Persistent and Nonpersistent CSMA All stations know that a transmission has started almost immediately First listen for clear medium (carrier sense) If medium idle, transmit with a probability. If two stations start at the same instant, collision Propagation time is much less than transmission time Wait reasonable time (round trip plus ACK contention) No ACK then retransmit A.S.Tanenbaum, Computer networks, ch4 MAC

  10. Persistent and Nonpersistent CSMA Comparison of the channel utilization versus load for various random access protocols. A.S.Tanenbaum, Computer networks, ch4 MAC

  11. CSMA/CD (with collision detection) If collision detected, jam then cease transmission rather than finish transmitting their frame After jam, wait random time then start again Half-duplex system Save time and bandwidth. Basis of Ethernet LAN. A.S.Tanenbaum, Computer networks, ch4 MAC

  12. CSMA/CDOperation A.S.Tanenbaum, Computer networks, ch4 MAC

  13. Token Ring (802.5) MAC protocol Small frame (token) circulates when idle Station waits for token Changes one bit in token to make it SOF for data frame Append rest of data frame Frame makes round trip and is absorbed by transmitting station Station then inserts new token when transmission has finished and leading edge of returning frame arrives Under light loads, some inefficiency Under heavy loads, round robin makes efficiency and fair. A.S.Tanenbaum, Computer networks, ch4 MAC

  14. Token RingOperation A.S.Tanenbaum, Computer networks, ch4 MAC

  15. FDDI MAC Protocol Fiber Distributed Data Interface As for 802.5 except: Station seizes token by aborting token transmission Once token captured, one or more data frames transmitted New token released as soon as transmission finished A.S.Tanenbaum, Computer networks, ch4 MAC

  16. Ethernet Ethernet Cabling Manchester Encoding The Ethernet MAC Sublayer Protocol The Binary Exponential Backoff Algorithm Ethernet Performance Switched Ethernet Fast Ethernet Gigabit Ethernet IEEE 802.2: Logical Link Control A.S.Tanenbaum, Computer networks, ch4 MAC

  17. Ethernet evolution through four generations

  18. Ethernet Cabling The most common kinds of Ethernet cabling. A.S.Tanenbaum, Computer networks, ch4 MAC

  19. 10Base5 implementation

  20. 10Base-T implementation

  21. Ethernet topology Cable topologies. (a) Linear, (b) Spine, (c) Tree, (d) Segmented. A.S.Tanenbaum, Computer networks, ch4 MAC

  22. The size limitation is usually solved by using repeaters to divide the medium into smaller segments Repeaters relay digital signals in both directions, making the segments appear like one medium As repeaters recover the digital signal, they remove any attenuation Baseband Configuration

  23. Ethernet MAC Sublayer Protocol A.S.Tanenbaum, Computer networks, ch4 MAC The McGraw-Hill Companies, Inc., 1998 WCB/McGraw-Hill

  24. PDU Format A.S.Tanenbaum, Computer networks, ch4 MAC The McGraw-Hill Companies, Inc., 1998 WCB/McGraw-Hill

  25. Minimum and maximum length A.S.Tanenbaum, Computer networks, ch4 MAC

  26. Example of an Ethernet address in hexadecimal notation

  27. Ethernet Performance Efficiency of Ethernet at 10 Mbps with 512-bit slot times. A.S.Tanenbaum, Computer networks, ch4 MAC

  28. Switched Ethernet A simple example of switched Ethernet. A.S.Tanenbaum, Computer networks, ch4 MAC

  29. FAST ETHERNET Fast Ethernet was designed to compete with LAN protocols such as FDDI or Fiber Channel. IEEE created Fast Ethernet under the name 802.3u. Fast Ethernet is backward-compatible with Standard Ethernet, but it can transmit data 10 times faster at a rate of 100 Mbps.

  30. Fast Ethernet topology

  31. Fast Ethernet implementations

  32. GIGABIT ETHERNET The need for an even higher data rate resulted in the design of the Gigabit Ethernet protocol (1000 Mbps). The IEEE committee calls the standard 802.3z.

  33. Gigabit Ethernet (a) A two-station Ethernet. (b) A multistation Ethernet. A.S.Tanenbaum, Computer networks, ch4 MAC

  34. Gigabit Ethernet (2) Gigabit Ethernet - Differences • Carrier extension • At least 4096 bit-times long (512 for 10/100) • Frame bursting extended to 200m. • New coding A.S.Tanenbaum, Computer networks, ch4 MAC

  35. Summary of Ten-Gigabit Ethernet implementations

  36. IEEE standard for LANs

  37. IEEE 802.2: Logical Link Control (a) Position of LLC. (b) Protocol formats. A.S.Tanenbaum, Computer networks, ch4 MAC

  38. Figure 13.2 HDLC frame compared with LLC and MAC frames

More Related