10/17/2015 Chapter 4 20 % syllabus Medium Access Sublayer.

87
03/23/22 Chapter 4 20 % syllabus Medium Access Sublayer

Transcript of 10/17/2015 Chapter 4 20 % syllabus Medium Access Sublayer.

Page 1: 10/17/2015 Chapter 4 20 % syllabus Medium Access Sublayer.

04/20/23

Chapter 4

20 % syllabus

Medium Access Sublayer

Page 2: 10/17/2015 Chapter 4 20 % syllabus Medium Access Sublayer.

2

04/20/23

One problem with Broadcast Networks

• Who Goes Next

• The central theme of this chapter is – “how to allocate a single broadcast channel

among competing users “

• To General Schemes– Static– Dynamic

Page 3: 10/17/2015 Chapter 4 20 % syllabus Medium Access Sublayer.

3

04/20/23

Static Channel Allocation(FDM or TDM)

FDM

Page 4: 10/17/2015 Chapter 4 20 % syllabus Medium Access Sublayer.

4

04/20/23

Static Channel Allocation

• If there are N users, the bandwidth is divided into N equal-sized portions

• Application Area:-– a small and constant number of users, – each of which has a heavy (buffered) load of

traffic

• Not Applicable:-– varying no of users – fixed users with low load

Page 5: 10/17/2015 Chapter 4 20 % syllabus Medium Access Sublayer.

5

04/20/23

Static Channel Allocation

• T = Mean Time Delay

• 1/µ = bits/frame

• C = Channel Capacity in bps

• λ = No of Frames/Second

(Without Static Allocation)

Page 6: 10/17/2015 Chapter 4 20 % syllabus Medium Access Sublayer.

6

04/20/23

(With Static Allocation)

Static Channel Allocation

Page 7: 10/17/2015 Chapter 4 20 % syllabus Medium Access Sublayer.

7

04/20/23

Dynamic channel allocation

• Carrier Sense Multiple Access Protocols (CSMA)

• Wireless LAN Protocols

Page 8: 10/17/2015 Chapter 4 20 % syllabus Medium Access Sublayer.

8

04/20/23

Multiple Access Protocols

Different types:

• Contention protocols resolve a collision after it occurs. These protocols execute a collision resolution protocol after each collision

• Collision-free protocols (e.g., a bit-map protocol and binary countdown) ensure that a collision can never occur.

Page 9: 10/17/2015 Chapter 4 20 % syllabus Medium Access Sublayer.

9

04/20/23

Nonpersistent/x-persistent CSMA Protocols

• Nonpersistent CSMA Protocol: Step 1: If the medium is idle, transmit immediately Step 2: If the medium is busy, wait a random amount of time and

repeat Step 1– Waste idle time if the backoff time is too long

• 1-persistent CSMA Protocol: Step 1: If the medium is idle, transmit immediately

- the host transmits with probability of 1 Step 2: If the medium is busy, continue to listen until medium

becomes idle, and then transmit immediately– There will always be a collision if two nodes want to retransmit

Human analogy: don’t interrupt others!

Page 10: 10/17/2015 Chapter 4 20 % syllabus Medium Access Sublayer.

10

04/20/23

Nonpersistent/x-persistent CSMA Protocols

• p-persistent CSMA Protocol: Step 1: If the medium is idle, transmit with probability p

In case the transmission did not happen (the probability of this event is 1-p) the sender waits until the next available time slot and transmits again with the same probability p. Step 2: If the medium is busy, continue to listen until medium becomes idle, then go to Step 1– A good tradeoff between nonpersistent and 1-persistent CSMA

– Assume channels are slotted– One slot = contention period (i.e., one round trip propagation delay)

Page 11: 10/17/2015 Chapter 4 20 % syllabus Medium Access Sublayer.

11

04/20/23

CSMA/CD (CSMA with Collision Detection)

• In CSMA, if 2 terminals begin sending packet at the same time, each will transmit its complete packet (although collision is taking place).

• Wasting medium for an entire packet time.

• CSMA/CD

Step 1: If the medium is idle, transmit

Step 2: If the medium is busy, continue to listen until the channel is idle then transmit

Step 3: If a collision is detected during transmission, cease transmitting

Step 4: Wait a random amount of time and repeats the same algorithm

Page 12: 10/17/2015 Chapter 4 20 % syllabus Medium Access Sublayer.

12

04/20/23

CSMA with Collision Detection

• Stations abort their transmissions as soon as they detect a collision

Page 13: 10/17/2015 Chapter 4 20 % syllabus Medium Access Sublayer.

13

04/20/23

Wireless LAN Protocols

• Hidden station problem. – A is transmitting to B– C wants to transmit it sense the medium and

falsely conclude that no one is transmitting

Page 14: 10/17/2015 Chapter 4 20 % syllabus Medium Access Sublayer.

14

04/20/23

Wireless LAN Protocols

• Exposed station problem. – B is transmitting to A– C wants to transmit it sense the medium and

falsely conclude that I can’t send to D

Page 15: 10/17/2015 Chapter 4 20 % syllabus Medium Access Sublayer.

15

04/20/23

MACA

• Multiple Access with Collision Avoidance

Page 16: 10/17/2015 Chapter 4 20 % syllabus Medium Access Sublayer.

16

04/20/23

MACA

• A starts by sending an RTS (Request To Send) frame to B

• Size = 30 bytes

• Content = Length of data to be sent

• Then B replies with a CTS (Clear to Send) frame which also contains length of data

• A starts transmission

Page 17: 10/17/2015 Chapter 4 20 % syllabus Medium Access Sublayer.

17

04/20/23

MACAW

• Multiple Access with Collision Avoidance for Wireless

• Improvements over MACA– Acknowledgement after each data frame– Carrier sensing before starting transmission

(i.e. before sending RTS frame to start transmission)

Page 18: 10/17/2015 Chapter 4 20 % syllabus Medium Access Sublayer.

18

04/20/23

ETHERNET(In More Detail)

• Ethernet is a family of frame-based computer networking technologies for local area networks (LAN)

– LAN technology• Ethernet Cabling • 10 – 10Mbps• Base – Baseband

Page 19: 10/17/2015 Chapter 4 20 % syllabus Medium Access Sublayer.

19

04/20/23

Transceiver and Hub

10Base5 10Base2 10BaseTTransceiver: Carrier detection and collision detectionController: transmits and receives frame, assembling of data and calculating checksums.

Page 20: 10/17/2015 Chapter 4 20 % syllabus Medium Access Sublayer.

20

04/20/23

10Base5 10Base2

Page 21: 10/17/2015 Chapter 4 20 % syllabus Medium Access Sublayer.

21

04/20/23

10BaseT

Page 22: 10/17/2015 Chapter 4 20 % syllabus Medium Access Sublayer.

22

04/20/23

Time Domain Reflectometry • Deals with detecting cable breaks, or loose

connectors • A pulse of known shape is injected into the cable.• If the pulse hits an obstacle or the end of the

cable, an echo will be generated and sent back. • By carefully timing the interval between sending

the pulse and receiving the echo, it is possible to localize the origin of the echo.

• This technique is called time domain reflectometry.

Page 23: 10/17/2015 Chapter 4 20 % syllabus Medium Access Sublayer.

23

04/20/23

Cable Topologies

A linear topology single cable is snaked from room to room, with

each station tapping into it at the nearest point

A spine (backbone) topology a vertical spine runs from the basement to the

roof, with horizontal cables on each floor connected to the spine by special amplifiers (repeaters).

In some buildings, the horizontal cables are thin and the backbone is thick

Page 24: 10/17/2015 Chapter 4 20 % syllabus Medium Access Sublayer.

24

04/20/23

Cable Topologies

A tree topology A segmented topology with repeaters

To allow larger networks, multiple cables can be connected by repeaters

Page 25: 10/17/2015 Chapter 4 20 % syllabus Medium Access Sublayer.

25

04/20/23

Topologies(The way in which building is wired)

Page 26: 10/17/2015 Chapter 4 20 % syllabus Medium Access Sublayer.

26

04/20/23

Manchester Encoding and Differential ME

Page 27: 10/17/2015 Chapter 4 20 % syllabus Medium Access Sublayer.

27

04/20/23

ME Encoding• Each bit period is divided into two equal intervals. • A binary 1 bit is sent by having the voltage set high

during the first interval and low in the second one.• A binary 0 is just the reverse: first low and then high. • This scheme ensures that every bit period has a transition

in the middle, • Advantage: making it easy for the receiver to synchronize

with the sender. • Disadvantage: it requires twice as much bandwidth as

straight binary encoding because the pulses are half the width

Page 28: 10/17/2015 Chapter 4 20 % syllabus Medium Access Sublayer.

28

04/20/23

Differential Manchester Encoding

• A 1 bit is indicated by the absence of a transition at the start of the interval

• A 0 bit is indicated by the presence of a transition at the start of the interval.

• In both cases, there is a transition in the middle • Disadvantage : The differential scheme requires more

complex equipment • Advantage: offers better noise immunity. • All Ethernet systems use Manchester encoding due to its

simplicity. • The high signal is + 0.85 volts and the low signal is - 0.85

volts

Page 29: 10/17/2015 Chapter 4 20 % syllabus Medium Access Sublayer.

29

04/20/23

Frame Formats

(a) DIX Ethernet. (b) IEEE 802.3.

Page 30: 10/17/2015 Chapter 4 20 % syllabus Medium Access Sublayer.

30

04/20/23

Fields Description

• Preamble– Length=8 bytes

– each containing the bit pattern 10101010

– to allow the receiver's clock to synchronize with the sender's

• Address– Length=6 bytes

– Group addresses : High order bit = 1

– Multicast: Sending to group of stations

– Broadcast: Address consists of all 1 bit

Page 31: 10/17/2015 Chapter 4 20 % syllabus Medium Access Sublayer.

31

04/20/23

Fields Description

• Type– tells the receiver what to do with the frame

– The Type field specifies which process to give the frame to.

• Data– up to 1500 bytes

– Minimum length must be 46 bytes

• Pad– To achieve to minimum length of frame

• Checksum

Page 32: 10/17/2015 Chapter 4 20 % syllabus Medium Access Sublayer.

32

04/20/23

Fields Description

• Two changes in DIX frame by 802.3 frame– reduce the preamble to 7 bytes and use the last

byte for a Start of Frame delimiter – Type field into a Length field

Page 33: 10/17/2015 Chapter 4 20 % syllabus Medium Access Sublayer.

33

04/20/23

The Binary Exponential Back off Algorithm

• If more than one stations try to acquire the channel at same time collision occurs

• After the first collision, each station waits either 0 or 1 slot times

• After the second collision, each one picks either 0, 1, 2, or 3 slot times.

• If a third collision occurs then the next time the number of slots to wait is chosen at random from the interval 0 to 23 - 1.

Page 34: 10/17/2015 Chapter 4 20 % syllabus Medium Access Sublayer.

34

04/20/23

The Binary Exponential Back off Algorithm

• In general, after i collisions, a random number between 0 and 2i - 1 is chosen,

• However, after ten collisions have been reached, the randomization interval is frozen at a maximum of 1023 slots.

• After 16 collisions, the controller reports failure back to the computer. Further recovery is up to higher layers.

Page 35: 10/17/2015 Chapter 4 20 % syllabus Medium Access Sublayer.

35

04/20/23

Switched 802.3 LAN• Way to deal with increased load: switched

Ethernet • An Ethernet network that is controlled by a switch

instead of a shared hub. – For example, a 24-port 100Base-T hub shares the total

200 Mbps bandwidth with all 24 attached nodes. By replacing the hub with a switch, each of the 12 sender/receiver pairs has the full 200 Mbps capacity.

• Switch = a high-speed backplane + room for typically 4 to 32 plug-in line cards, each having one to eight connectors

Page 36: 10/17/2015 Chapter 4 20 % syllabus Medium Access Sublayer.

36

04/20/23

A Switched 803.2 LAN

Page 37: 10/17/2015 Chapter 4 20 % syllabus Medium Access Sublayer.

37

04/20/23

Fast Ethernet .3u

• It is called 802.3u,

• Reduce the bit time from 100 nsec to 10 nsec

• Not feasible to use Manchester encoding

Page 38: 10/17/2015 Chapter 4 20 % syllabus Medium Access Sublayer.

38

04/20/23

• 100 Base T4– Uses four separate twisted pairs of Cat 3 UTP– One to the hub, one from the hub,the other two are switchable to the

current transmission direction– Three-level ternary code is used 8B/6T (8 bits map to 6 trits.)

• Prior to transmission each set of 8 bits is converted into 6 ternary symbols. (0,1,2)• Three signal levels : +V, 0, -V

• 100 Base TX– Uses two pair of twisted pair, one pair for transmission and one pair for

reception.– Uses Cat 5 UTP.– Uses 4B/5B encoding– Full duplex

• 100 Base FX– Multimode fibre– Full duplex– Distance between station and hub can be 2 km

Page 39: 10/17/2015 Chapter 4 20 % syllabus Medium Access Sublayer.

39

04/20/23

Gigabit Ethernet .3z

•Supports full duplex and half duplex•Full duplex – uses switch (buffereing is present)•Half duplex – uses hub (no buffering)

Page 40: 10/17/2015 Chapter 4 20 % syllabus Medium Access Sublayer.

40

04/20/23

(a) A two-station Ethernet. (b) A multistation Ethernet.

Page 41: 10/17/2015 Chapter 4 20 % syllabus Medium Access Sublayer.

41

04/20/23

Carrier ExtensionRRRRRRRRRRRRRFrame

Carrier Extension

512 bytes

• For 10BaseT : 2.5 km max; slot time = 64 bytes• For 1000BaseT: 200 m max; slot time = 512 bytes• Carrier Extension :: continue transmitting control

characters [R] • This permits minimum 64-byte frame to be handled.• Control characters discarded at destination.

Page 42: 10/17/2015 Chapter 4 20 % syllabus Medium Access Sublayer.

42

04/20/23

Frame Bursting

512 bytes

ExtensionFrame Frame Frame Frame

Frame burst

• Source sends out burst of frames• Maximum frame burst is 8192 bytes• Increases the throughput

Page 43: 10/17/2015 Chapter 4 20 % syllabus Medium Access Sublayer.

43

04/20/23

Wireless LAN Protocol Stack

Page 44: 10/17/2015 Chapter 4 20 % syllabus Medium Access Sublayer.

44

04/20/23

Physical Layer

• Five permitted transmission techniques – Infrared

– FHSS (Frequency Hopping Spread Spectrum)

– DSSS (Direct Sequence Spread Spectrum),

– OFDM (Orthogonal Frequency Division Multiplexing)

– HR-DSSS (High Rate Direct Sequence Spread Spectrum)

– An enhanced version of HR-DSSS

• They differ in the technology used and speeds achievable

Page 45: 10/17/2015 Chapter 4 20 % syllabus Medium Access Sublayer.

45

04/20/23

Infrared Technique

• Two speeds are permitted: 1 Mbps and 2 Mbps • At 1 Mbps, an encoding scheme is used in which

a group of 4 bits is encoded as a 16-bit (15 0’s and single 1)

• At 2 Mbps, an encoding scheme is used in which a group of 2 bits is encoded as a 4-bit

• Cannot penetrate through wall.• Due to the low bandwidth and sunlight swamps

infrared signals), this is not a popular option.

Page 46: 10/17/2015 Chapter 4 20 % syllabus Medium Access Sublayer.

46

04/20/23

FHSS (Frequency Hopping Spread Spectrum) • Is a method of transmitting radio signals by rapidly

switching a carrier among many frequency channels, – using a pseudorandom sequence known to both transmitter and

receiver.

• uses 79 channels each 1-MHz wide, starting at the low end of the 2.4-GHz ISM band

• A pseudorandom number generator is used to produce the sequence of frequencies hopped to

• Dwell time: The amount of time spent at each frequency (must be < 400 msec )

• Advantage : Good security• Disadvantage : Low Bandwidth

Page 47: 10/17/2015 Chapter 4 20 % syllabus Medium Access Sublayer.

47

04/20/23

DSSS (Direct Sequence Spread Spectrum) • The scheme used has similarities to the

CDMA system.

• Each bit is transmitted as 11 chips (Barker Sequence)

• 1 or 2 Mbps speed

Page 48: 10/17/2015 Chapter 4 20 % syllabus Medium Access Sublayer.

48

04/20/23

OFDM (Orthogonal Frequency Division Multiplexing)

• the high-speed wireless LAN

• deliver up to 54 Mbps in 5GHz ISM band

• different frequencies are used—52 of them, 48 for data and 4 for synchronization

Page 49: 10/17/2015 Chapter 4 20 % syllabus Medium Access Sublayer.

49

04/20/23

HR-DSSS (High Rate Direct Sequence Spread Spectrum)

• uses 11 million chips/sec to achieve 11 Mbps in the 2.4-GHz band

• Known as 802.11b

• Data rates supported by 802.11b are 1, 2, 5.5, and 11 Mbps

• This technique was enhanced by IEEE to achieve higher speed. (called 802.11g)– In theory operates at 54MBps.

Page 50: 10/17/2015 Chapter 4 20 % syllabus Medium Access Sublayer.

50

04/20/23

The 802.11 MAC Sub layer Protocol

• 802.11 supports two modes of operation – DCF (Distributed Coordination Function),

• does not use any kind of central control

– PCF (Point Coordination Function), • uses the base station to control all activity in its cell

• 802.11 uses a protocol called CSMA/CA and MACAW

Page 51: 10/17/2015 Chapter 4 20 % syllabus Medium Access Sublayer.

51

04/20/23

CSMA/CA• In DCF, CSMA/CA is used• CSMA/CA has two mode of operation:1) Based on Physical Channel Sensing

– Station senses the channel. If it is idle, it just starts transmitting.

– It does not sense the channel while transmitting but emits its entire frame (half duplex)

– If a collision occurs, the colliding stations wait a random time, using the Ethernet binary exponential back off algorithm

2) Based on Virtual channel sensing (MACAW)

Page 52: 10/17/2015 Chapter 4 20 % syllabus Medium Access Sublayer.

52

04/20/23

MACAW

(Network Allocation Vector)

Page 53: 10/17/2015 Chapter 4 20 % syllabus Medium Access Sublayer.

53

04/20/23

To deal with the problem of noisy channels, 802.11 allows frames to be

fragmented into smaller pieces

Page 54: 10/17/2015 Chapter 4 20 % syllabus Medium Access Sublayer.

54

04/20/23

PCF

• The base station polls the other stations, asking them if they have any frames to send

• Base station broadcasts a beacon frame periodically (10 to 100 times per second).

Page 55: 10/17/2015 Chapter 4 20 % syllabus Medium Access Sublayer.

55

04/20/23

PCF and DCF can coexist within one cell

• It works by carefully defining the interframe time interval

• After a frame has been sent, a certain amount of dead time is required before any station may send a frame

• Four different intervals are defined – SIFS (Short InterFrame Spacing).

– PIFS (PCF InterFrame Spacing)

– DIFS (DCF InterFrame Spacing)

– EIFS (Extended InterFrame Spacing),

Page 56: 10/17/2015 Chapter 4 20 % syllabus Medium Access Sublayer.

56

04/20/23

PCF and DCF can coexist within one cell

Page 57: 10/17/2015 Chapter 4 20 % syllabus Medium Access Sublayer.

57

04/20/23

The 802.11 Frame Structure

• Three different classes of frames – Data,– Control, and – Management.

Page 58: 10/17/2015 Chapter 4 20 % syllabus Medium Access Sublayer.

58

04/20/23

The 802.11 data frame

Page 59: 10/17/2015 Chapter 4 20 % syllabus Medium Access Sublayer.

59

04/20/23

The 802.11 data frame• Frame Control field

– 11 subfields • Protocol version • Type (data, control, or management) • Subtype fields (e.g., RTS or CTS) • To DS (Distribution system)• From DS • MF bit means that more fragments will follow • Retry bit marks a retransmission of a frame sent earlier • Power management bit is used by the base station to put the receiver

into sleep state or take it out of sleep state • The More bit indicates that the sender has additional frames for the

receiver • The W bit specifies that the frame body has been encrypted using the

WEP (Wired Equivalent Privacy) algorithm • the O bit tells the receiver that a sequence of frames with this bit on

must be processed strictly in order.

Page 60: 10/17/2015 Chapter 4 20 % syllabus Medium Access Sublayer.

60

04/20/23

The 802.11 data frame• the Duration field,

– tells how long the frame and its acknowledgement will occupy the channel

– Used to manage NAV mechanism• The source and destination are obviously needed,• The other two addresses are used for the source

and destination base stations for inter cell traffic. • Sequence field allows fragments to be numbered.

Of the 16 bits available, 12 identify the frame and 4 identify the fragment.

• The Data field contains the payload, up to 2312 bytes, followed by the usual Checksum

Page 61: 10/17/2015 Chapter 4 20 % syllabus Medium Access Sublayer.

61

04/20/23

The 802.11 data frame

• Management frames have a format similar to that of data frames, except without one of the base station addresses, – because management frames are restricted to a

single cell.

• Control frames are shorter still, having only one or two addresses, – No data field and no sequence field– Key information used is subtype (RTS,CTS,

and ACK)

Page 62: 10/17/2015 Chapter 4 20 % syllabus Medium Access Sublayer.

62

04/20/23

Services

• Wireless LAN must provide nine services

• divided into two categories: – five distribution services and

• relate to managing cell membership and interacting with stations outside the cell

– four station services • relate to activity within a single cell.

Page 63: 10/17/2015 Chapter 4 20 % syllabus Medium Access Sublayer.

63

04/20/23

Five Distribution Services1. Association. This service is used by mobile stations to

connect themselves to base stations 2. Disassociation. Either the station or the base station may

disassociate, thus breaking the relationship 3. Re association. A station may change its preferred base

station using this service 4. Distribution. This service determines how to route

frames sent to the base station5. Integration. If a frame needs to be sent through a non-

802.11 network with a different addressing scheme or frame format, this service handles the translation from the 802.11 format to the format required by the destination network.

Page 64: 10/17/2015 Chapter 4 20 % syllabus Medium Access Sublayer.

64

04/20/23

Four Station Services

• Authentication. Allow new station to get into network

• Deauthentication. When a previously authenticated station wants to leave the network, it is deauthenticated. After deauthentication, it may no longer use the network

• Privacy. information sent over a wireless LAN must be encrypted

• Data delivery

Page 65: 10/17/2015 Chapter 4 20 % syllabus Medium Access Sublayer.

65

04/20/23

Broadband Wireless

• Erecting a big antenna on a hill just outside of town and installing antennas directed at it on customers' roofs

• Some people prefer to call it a wireless MAN (Metropolitan Area Network) or a wireless local loop.

• IEEE calls 802.16• Commercialized under the name “WiMAX”

(from "Worldwide Interoperability for Microwave Access")

Page 66: 10/17/2015 Chapter 4 20 % syllabus Medium Access Sublayer.

66

04/20/23

Broadband Wireless

Page 67: 10/17/2015 Chapter 4 20 % syllabus Medium Access Sublayer.

67

04/20/23

Comparison of 802.11 with 802.16

• 802.16 runs over part of a city, the distances involved can be several kilometers,

• Each cell is likely to have many more users than will a typical 802.11 cell

• No ISM bands • 802.11 was designed to be mobile Ethernet,

whereas 802.16 was designed to be wireless, but stationary, cable television

Page 68: 10/17/2015 Chapter 4 20 % syllabus Medium Access Sublayer.

68

04/20/23

The 802.16 Protocol Stack

Page 69: 10/17/2015 Chapter 4 20 % syllabus Medium Access Sublayer.

69

04/20/23

The 802.16 Protocol Stack

• Physical layer – convergence sub layer to hide the different

technologies from the data link layer

• Data link layer– consists of three sub layers

• The bottom one deals with privacy and security • MAC sub layer main protocols, such as channel

management (Connection Oriented)• Service-specific convergence sub layer (LLC) –

interface with NL

Page 70: 10/17/2015 Chapter 4 20 % syllabus Medium Access Sublayer.

70

04/20/23

The 802.16 Physical Layer • 802.16 employs three different modulation schemes• 10-66 GHz range • Signal strength decreases as distance from base station

increases.• Depending on how far the subscriber station is from the

base station. – For close-in subscribers, QAM-64 is used, with 6 bits/baud.– For medium-distance subscribers, QAM-16 is used, with 4

bits/baud. – For distant subscribers, QPSK is used, with 2 bits/baud

• Bit Rate (bps) = Baud per second * bits per baud.• Ex 25MHz spectrum

– For QAM-64 => 25*6 = 150 Mbps– QAM-16 => 25*4 = 100 Mbps– QPSK => 25 * 2 = 50 Mbps

Page 71: 10/17/2015 Chapter 4 20 % syllabus Medium Access Sublayer.

71

04/20/23

The 802.16 MAC Sub layer Protocol

• Four classes of service are defined 1. Constant bit rate service.

– for transmitting uncompressed voice

2. Real-time variable bit rate service.– for compressed multimedia and other soft real-time

applications

3. Non-real-time variable bit rate service.– for heavy transmissions that are not real time, such as

large file transfers

4. Best-efforts service.– for everything else

• All service in 802.16 is connection-oriented

Page 72: 10/17/2015 Chapter 4 20 % syllabus Medium Access Sublayer.

72

04/20/23

The 802.16 Frame Structure

(a) A generic frame. (b) A bandwidth request frame.

Page 73: 10/17/2015 Chapter 4 20 % syllabus Medium Access Sublayer.

73

04/20/23

The 802.16 Frame Structure• The EC bit tells whether the payload is encrypted • The Type field identifies the frame type, mostly telling

whether fragmentations are present.• The CI field indicates the presence or absence of the final

checksum. • The EK field tells which of the encryption keys is being

used (if any).• The Length field gives the complete length of the frame,

including the header. • The Connection identifier tells which connection this

frame belongs to. • Finally, the HeaderCRC field is a checksum over the

header only, using the polynomial x8 + x2 + x + 1.

Page 74: 10/17/2015 Chapter 4 20 % syllabus Medium Access Sublayer.

74

04/20/23

For BW Req Frames

• Starts with 1 instead of 0

• Bytes needed field tell how much bytes to be transferred

Page 75: 10/17/2015 Chapter 4 20 % syllabus Medium Access Sublayer.

75

04/20/23

Bluetooth

• Short Range, Low Power, Inexpensive wireless radio

• IEEE assigned designation 802.15

• Bluetooth Architecture:– Piconet – the basic unit of a Bluetooth

system.• 1 Master node

• 1 to 7 active slave nodes (upto distance of 10km)

• 0 to 255 parked nodes

Page 76: 10/17/2015 Chapter 4 20 % syllabus Medium Access Sublayer.

76

04/20/23

Two Piconets connected to form a Scatternet

Page 77: 10/17/2015 Chapter 4 20 % syllabus Medium Access Sublayer.

77

04/20/23

Bluetooth Architecture• Parked node

– a slave device in a low power state to conserve the drain on the devices batteries

– In this state the device can only respond to the beacon from the master node

• Communication– Only possible between master and slave nodes– Piconet uses centralized Time Division Multiplexing.– The master node controls the clock and determines

which device gets to communicate in which time slot.– All communication is between master and slave; direct

slave-slave communication is not possible

Page 78: 10/17/2015 Chapter 4 20 % syllabus Medium Access Sublayer.

78

04/20/23

Bluetooth Applications

• The 13 applications, which are called profiles, are:

networking

telephony

Object exchange

Page 79: 10/17/2015 Chapter 4 20 % syllabus Medium Access Sublayer.

79

04/20/23

The Bluetooth Frame Structure

• Access code : Identifies the master so that slaves within radio range of two masters can tell which traffic is for them.

• Data – 2744 bits

Page 80: 10/17/2015 Chapter 4 20 % syllabus Medium Access Sublayer.

80

04/20/23

The Bluetooth Frame Structure• Header:

– Adr: identifies one of the eight active devices – Type: frame type (ACL, SCO, poll, or null), the type of error

correction used in the data field, and how many slots long the frame is.

– F: asserted by a slave when its buffer is full and cannot receive any more data.

– A: piggyback an ACK onto a frame – S: number the frames to detect retransmissions

• Protocol is stop and wait, so 1 bit is enough– Checksum

• Entire 18-bit header is repeated three times to form 54 bits header– On Receiver side, each copy is verified. If all three are same, the

bit is accepted.

Page 81: 10/17/2015 Chapter 4 20 % syllabus Medium Access Sublayer.

81

04/20/23

DLL Switching

(a) Which device is in which layer. (b) Frames, packets, and headers

Page 82: 10/17/2015 Chapter 4 20 % syllabus Medium Access Sublayer.

82

04/20/23

Repeaters

• Analog devices that are connected to two cable segments.

• A signal appearing on one of them is amplified and put out on the other.

• Repeaters do not understand frames, packets, or headers. – They understand volts.

Page 83: 10/17/2015 Chapter 4 20 % syllabus Medium Access Sublayer.

83

04/20/23

Hubs• A hub has a number of input lines

that it joins electrically • Frames arriving on any of the lines

are broadcast on all the others port • If two frames arrive at the same

time, they will collide, just as on a coaxial cable

• Hubs differ from repeaters in that they do not (usually) amplify the incoming signals

• Also known as Multiport repeaters

Page 84: 10/17/2015 Chapter 4 20 % syllabus Medium Access Sublayer.

84

04/20/23

Bridge

• A bridge connects two or more LANs

• When a frame arrives, software in the bridge extracts the destination address from the frame header and looks it up in a table to see where to send the frame.

Page 85: 10/17/2015 Chapter 4 20 % syllabus Medium Access Sublayer.

85

04/20/23

Switches• Switches has buffer space

– If frames come in faster than they can be retransmitted, the switch may run out of buffer space and have to start discarding frames.

• Cut-through switches: – modern switches start forwarding

frames as soon as the destination header field has come in, but before the rest of the frame has arrived

– Do not use store-and-forward switching.

• Address is Ethernet address (48 bit)

Page 86: 10/17/2015 Chapter 4 20 % syllabus Medium Access Sublayer.

86

04/20/23

Routers

• When a packet comes into a router, the frame header and trailer are stripped off and the packet located in the frame's payload field is passed to the routing software.

• Uses IP address– IPV4 – 32 bits– IPV6 – 128 bits

Page 87: 10/17/2015 Chapter 4 20 % syllabus Medium Access Sublayer.

87

04/20/23

Gateways

• Transport Gateway : – These connect two computers that use different

connection-oriented transport protocols.

• Application Gateway :– Application gateways understand the format and

contents of the data and translate messages from one format to another

– Ex: An e-mail gateway could translate Internet messages into SMS messages for mobile phones.