Medium Access Control Sublayer

Size: px
Start display at page:

Download "Medium Access Control Sublayer"

Transcription

1 Wireless (WLAN) Medium Access Control Sublayer Mahalingam Mississippi State University, MS October 20, 2014

2 Outline Medium Access Protocols Wireless (WLAN) 1 Medium Access Protocols ALOHA Slotted ALOHA CSMA 2 CSMA-CD in Binary Exponential Back-off Performance - IEEE Wireless (WLAN) IEEE

3 Terminology Medium Access Protocols Wireless (WLAN) ALOHA Slotted ALOHA CSMA n stations sharing a channel Contention for channel access Collision occurs when packets from any two stations overlap Packet start times can be continuous or slotted Carrier sensing sensing the medium to check if it is in use Packets generated by the network layer of stations Generated packets are transmitted Some packets collide will need to be retransmitted Number of transmitted packets number of generated packets.

4 Three Scenarios Medium Access Protocols Wireless (WLAN) ALOHA Slotted ALOHA CSMA Medium access protocols can be classified into three broad types depending on the nature of the medium and ability to sense the medium ability to detect collisions Scenario 1: Stations contending for the medium cannot sense transmissions from other stations (eg., Satellite communication) Scenario 2: Stations able to sense transmissions by other stations, but cannot listen and transmit at the same time (Short-range wireless). Scenario 3: Stations can sense the medium, and can listen and transmit at the same time ()

5 ALOHA Medium Access Protocols Wireless (WLAN) ALOHA Slotted ALOHA CSMA n stations share a medium Stations transmit whenever they have a packet that needs to be transmitted ACK sent by the receiver. If no ACK received, stations wait for a random amount of time and retransmit. Assume all packets are of the same duration (we will use that as the unit of time)

6 ALOHA Medium Access Protocols Wireless (WLAN) ALOHA Slotted ALOHA CSMA User A B C D E Time

7 Poisson Distribution Medium Access Protocols Wireless (WLAN) ALOHA Slotted ALOHA CSMA What is the probability that an event will occur exactly k times during an interval? 0 times? once? twice? 3 times? For Poisson distribution mean is the same as variance Poisson distribution with mean a (and variance a) represented as Pr{k} = ak e a k! Pr{k} is the probability of exactly k occurrences in an unit interval For example, Pr{0} = e a, Pr{1} = ae a. The mean and variance of a Poisson distribution are the same

8 ALOHA Analysis Medium Access Protocols Wireless (WLAN) ALOHA Slotted ALOHA CSMA Number of stations is very large. Packet creation by network layers (of all stations together) is Poisson distributed with mean N or Pr N {k} = Nk e N k! (an average of N packets generated during each unit interval) Assume each interval has the same length as the packet duration. Average number of packets transmitted in a unit interval is G. As some packets will be retransmitted, G N. Also Poisson distributed with mean G. Pr G {k} = G k e G k! Collision occurs when 2 or more frames occupy the channel at the same time. Obviously, N 1, G 1, G N. (if we have more than one packet during any interval there will be a collision).

9 Wireless (WLAN) ALOHA - Vulnerable Period ALOHA Slotted ALOHA CSMA Collides with the start of the shaded frame t Collides with the end of the shaded frame t o t o + t t o + 2t t o + 3t Time Vulnerable

10 Wireless (WLAN) Efficiency of ALOHA ALOHA Slotted ALOHA CSMA Vulnerable period is 2 intervals Assume n When a station transmits a packet, the packet will be successfully transmitted if no other packets are generated for two consecutive intervals Probability Pr G {0} = e G for one interval Probability of no other packet in the vulnerable period is Pr G {0} Pr G {0} = e 2G Throughput (for each interval) S = Ge 2G (G attempts, but only a fraction e 2G is successful).

11 Wireless (WLAN) What s the best we can do? ALOHA Slotted ALOHA CSMA For pure ALOHA S = Ge 2G What is the best choice of G? d dg S = e 2G (1 2G) = 0 G = 0.5, S = 1 2e Maximum efficiency is only 18%

12 Example Medium Access Protocols Wireless (WLAN) ALOHA Slotted ALOHA CSMA 10 Mbps channel, 1000 bits per packet Satellite can receive up to 10,000 packets per sec (packet interval 1/10,000 sec) Only 1840 packets per second received successfully Efficient Operating point: G = 0.5 for best efficiency : only half a packet will be sent (on an average) during every interval 5000 packets per second sent (by all stations together) Only 1840 will reach, 3160 per/sec will collide (and will have to be retransmitted)

13 Slotted ALOHA Medium Access Protocols Wireless (WLAN) ALOHA Slotted ALOHA CSMA Assumption - existence of some mechanism for synchronizing different stations Station will transmit only at the beginning of slot intervals. Vulnerable period is only one interval - not 2 Throughput S = Ge G Maximized when d dg S = e G (1 G) = 0 G = 1, S = 1 e Maximum efficiency less than 37% Twice as efficient as pure ALOHA

14 Example Medium Access Protocols Wireless (WLAN) ALOHA Slotted ALOHA CSMA Satellite can receive 10,000 packets per sec. Packet interval 1/10,000 sec Now (all stations together) can send only 3680 packets per second. Efficient Operating point: G = 1 for best efficiency : One packet (on an average) sent during every interval Or packets per second sent by all stations together Only 3680 will reach, 6320 per/sec will collide (and will have to be retransmitted)

15 Stability of ALOHA Medium Access Protocols Wireless (WLAN) ALOHA Slotted ALOHA CSMA What happens when G increases? But first, what is the average number of attempts needed for successfully delivering a packet? Probability of success (no collision) is e G for each attempt. To successfully send one packet, e G packets have to be transmitted on an average Number of attempts increases exponentially with G

16 Wireless (WLAN) Channel Utilization With ALOHA ALOHA Slotted ALOHA CSMA S (throughput per frame time) 0.40 Slotted ALOHA: S = Ge G Pure ALOHA: S = Ge 2G G (attempts per packet time)

17 Wireless (WLAN) ALOHA Slotted ALOHA CSMA Carrier Sense Multiple Access Protocols Listen first. If no one is currently using the channel, then transmit Collisions can still occur Propagation delay (B has started transmission, but A does not know that yet) A and B wait for C (which is currently transmitting) to finish and start at the same time. Collisions inferred through the lack of ACKs Persistent and non-persistent CSMA

18 Wireless (WLAN) Non-persistent CSMA ALOHA Slotted ALOHA CSMA 1 If channel is free transmit. 2 If not stop sensing and wait (for a random time) 3 If the channel is free now, transmit 4 If not, back to 2 (stop sensing and wait)

19 Persistent CSMA Medium Access Protocols Wireless (WLAN) ALOHA Slotted ALOHA CSMA 1-persistent - if busy keep sensing the line till it becomes available and start transmitting immediately p-persistent (for slotted channels) if busy keep sensing the channel If free, transmit at the next slot - but with probability p Probability q = 1 p that a station will yield. Process continues till the packet has been transmitted or another station takes over the channel.

20 Wireless (WLAN) ALOHA Slotted ALOHA CSMA Channel Utilization With CSMA / ALOHA S (throughput per packet time) Pure ALOHA Slotted ALOHA 0.5-persistent CSMA 1-persistent CSMA 0.01-persistent CSMA Nonpersistent CSMA 0.1-persistent CSMA G (attempts per packet time)

21 Wireless (WLAN) ALOHA Slotted ALOHA CSMA CSMA With Collision Detection (CSMA-CD) In CSMA (and ALOHA) collisions are inferred through the lack of ACKs What if stations can send and listen at the same time? Stations can stop transmitting as soon as a collision is detected. Colliding packets will now use up only a small fraction of the time. As usual stations sense channel, and transmit only if the channel is free. If collision is detected - stop sending the packet (only part of a packet may be sent).

22 CSMA-CD States Medium Access Protocols Wireless (WLAN) ALOHA Slotted ALOHA CSMA t o Contention slots Frame Frame Frame Frame Transmission period Contention period Time Idle period

23 Wireless (WLAN) ALOHA Slotted ALOHA CSMA Seizing the Channel with CSMA-CD After a station starts transmission of a packet, it should be able to detect within a period τ d that no collision is going to occur for that packet. If τ is the maximum delay between any two stations in the channel τ d < 2τ. Why? After time τ d, the station is sure that it has seized the channel τ d is the contention period. CSMA-CD is employed in

24 Wireless (WLAN) 2τ for Collision Detection ALOHA Slotted ALOHA CSMA A Packet starts at time 0 B A Packet almost at B at τ - B (a) (b) A B A Noise burst gets back to A at 2τ B (c) Collision at time τ (d)

25 Wireless (WLAN) Restrictions On Packet Size CSMA-CD in Binary Exponential Back-off Performance - IEEE With CSMA-CD there is also a restriction on minimum packet duration! What happens if packet duration is less than 2τ? It is possible that A completes the entire packet before it sensed the collision. So A does not even know that a collision occurred! Packet sizes have to be chosen such that the packet duration is greater than 2τ

26 Wireless (WLAN) Minimum Packet Size CSMA-CD in Binary Exponential Back-off Performance - IEEE For 10 Mbps LAN, maximum distance of 2500 m between two stations In practice, upto 4 repeaters may be used Round trip time is about 50µs 10 µs propagation time each way; 30 µs repeater delay Smallest allowed packet size is 500 bits prescribes 64 bytes (512 bits) as the minimum packet size. For 100 Mbps LAN standard recommends max length 250 m 5µs RTT: 2µs propagation delay and 3µs repeater delay Minimum packet size is still about 500 bits (64 bytes)

27 Wireless (WLAN) CSMA-CD in Binary Exponential Back-off Performance - IEEE Binary Exponential Back-off in For any station time is slotted with slot duration 2τ (a slot begins at the instant a collision is sensed) After first collision, station randomly picks 0 or 1 (prob of 1 is half) Retransmit at the next slot with probability half. If collision happens again retransmit at next slot with probability 1/4 If a third collision occurs retransmit with probability 1/8, and so on After r collisions, transmission probability is 1 2 r Binary exponential back-off. After r = 10 probability does not fall below = 1/1024

28 Wireless (WLAN) CSMA-CD in Binary Exponential Back-off Performance - IEEE Binary Exponential Back-off and Slotted ALOHA The contention periods in is similar to slotted ALOHA contending stations send randomly at specific time-slots When operating efficiently slotted ALOHA successfully delivers any packet with probability 1 e In, under full utilization of the channel, the probability that someone seizes the channel is 1 e.

29 Efficiency Medium Access Protocols Wireless (WLAN) CSMA-CD in Binary Exponential Back-off Performance - IEEE Average number of contention slots before a packet is delivered is e When is operating at its maximum capacity, for each packet delivered there is an average of e contentions. The channel is occupied by useful packets of duration P and useless contentions (on an average e contentions of duration 2τ each). Efficiency ν = P P + 2τe

30 Efficiency Medium Access Protocols Wireless (WLAN) CSMA-CD in Binary Exponential Back-off Performance - IEEE F - frame size (in bits) B - data rate (bits per sec) P = F B c - velocity of propagation L - maximum length of ethernet cable (maximum seperation between two stations) τ = L c ν = P P + 2τe = BLe/cF

31 Wireless (WLAN) Constant BL product CSMA-CD in Binary Exponential Back-off Performance - IEEE ν = P P + 2τe = BLe/cF Larger frame sizes results in increased efficiency Need to control BL product - higher bandwidth lines have to be shorter than lower bandwidth lines 100 Mbps lines of length L does not have 10 times the capacity of a 10 Mbps line of length L

32 Wireless (WLAN) Efficiency vs F CSMA-CD in Binary Exponential Back-off Performance - IEEE Channel efficiency byte frames 512-byte frames 256-byte frames 128-byte frames 64-byte frames

33 Wireless (WLAN) Manchester Encoding CSMA-CD in Binary Exponential Back-off Performance - IEEE Bit stream (a) Binary encoding (b) Manchester encoding (c) Differential Manchester encoding Transition here indicates a 0 Lack of transition here indicates a 1 detection of start of each bit. Each bit period divided into two intervals. Twice the bandwidth Every bit period has a transition in the middle Unambiguo

34 Wireless (WLAN) DIX (DEC, Intel, Xerox) and CSMA-CD in Binary Exponential Back-off Performance - IEEE Bytes (a) Preamble Destination address Source address Type Data Pad Destination Source (b) Preamble Length Data Pad address address Checksum Checksum Preamble - 8 octets (each ) 2. Addresses - 6 bytes each. Dest. all ones address - broadcast 3. Destination address all ones implies broadcast; bit 46 used to distinguish local and global addresses; 4. Type of payload 5. Data upto 1500 bytes. Minimum limit? 6. Pad To cater for minimum packet length 7. Checksum 8. IEEE 802.3: SoF Delimiter (for compatibility), Type to Length 1.

35 Families Medium Access Protocols Wireless (WLAN) CSMA-CD in Binary Exponential Back-off Performance - IEEE Based on speed 10Base5 (thick coax), 10Base2 (thin coax), 10Base-T (Twisted Pair), 10Base-F (Fiber optics) Fast ethernet (802.3u), 100Base-T4 (category 3 UTP), 100Base-TX (category 5), 100Base-FX (Fiber) No changes in protocol - just better wires (and better technology for ethernet cards) Backward compatibility Maximum length reduced (otherwise we need to increase minimum frame size!) Why?

36 Wireless (WLAN) Gigabit ethernet (802.3z) CSMA-CD in Binary Exponential Back-off Performance - IEEE Once again backward compatible Need to reduce length further - unacceptable Carrier extension - Padding to extend frame to 512 bytes. Frame bursting - concatenated sequence of frames.

37 Wireless (WLAN) IEEE Hidden / Exposed Station Problem Case 1: A B. C senses medium but does not hear A s transmission as C is out of range. If C transmits to B we have collision. Hidden Station Problem. A is hidden from C Case 2: B A. C needs to transmit to D. C senses medium and assumes that it cannot transmit. Actually it can as A s reception will not be affected. Exposed Station Problem. What is needed? Interference at the Rx is the problem - not the interference at the transmitter! A B C D A B C D Radio range (a) (b)

38 A Medium Access Protocols Wireless (WLAN) IEEE Multiple Access with Collision Avoidance (A) Rx should send a short frame to indicate that it is ready to receive from a source. Other stations hearing the Rx will yield. RTS (Request to Send) and CTS (Clear to Send) packets.

39 Wireless (WLAN) IEEE A B. A sends RTS to B. B responds with CTS. C hears RTS but not CTS. C waits a reasonable amount of time for CTS, and failing to hear it can start Tx to some other node. D hears CTS but not RTS. D should desist until the packet following CTS is finished. Range of A's transmitter Range of B's transmitter C A RTS B D C A CTS B D E E (a) (b)

40 Wireless (WLAN) AW - A for Wireless IEEE Some enhancements to A layer acknowledgements. To receive ACK there should be no collision at the transmitter of the original packet. So exposed station problem is deliberately not addressed. CSMA for transmitting RTS Back-off algorithm for each source-destination pair instead of for each station. Additional information exchange about congestion.

41 Wireless (WLAN) Virtual Channel Sensing IEEE A RTS Data B CTS ACK C NAV D NAV Time

42 Modes Medium Access Protocols Wireless (WLAN) IEEE DCF - Distributed Coordination Function Each node determine what to do next PCF - Point Coordination Function Base station broadcasts beacon frames ( times per sec) Could provide QOS guarantees Coordinator can even request nodes to go to sleep

43 Wireless (WLAN) PCF - DCF Coordination IEEE SIFS - Short IFS, PIFS - PCF IFS, DIFS - DCF IFS, EIFS - Extended IFS Control frame or next fragment may be sent here SIFS PIFS DIFS PCF frames may be sent here EIFS DCF frames may be sent here Bad frame recovery done here ACK Time

44 Wireless (WLAN) Frame Structure IEEE Bytes Frame control Address 1 Address 2 Address 3 Seq. Address 4 Data Duration Checksum Bits Version Type Subtype 1 To From DS DS MF Retry Pwr More W O Frame control

45 Frame Control Medium Access Protocols Wireless (WLAN) IEEE subfields! Version, Data type (data, control, management), subtype (RTS, CTS) To DS, From DS - for interoperability with MF - more fragments Retry - retransmission (ABP 0) Power management (sleep) More - additional frames to be sent W - WEP in use O - strict processing

46 Other Fields Medium Access Protocols Wireless (WLAN) IEEE Duration (includes duration of ACK) - for managing NAV Address 3 and 4 - to handle handover for inter-cell traffic Sequence - frame number

47 Wireless (WLAN) Protocol Stack IEEE Upper layers sublayer Logical link control Data link layer Infrared FHSS DSSS a OFDM b HR-DSSS g OFDM Physical layer

48 Wireless (WLAN) Bit-map protocol Binary Countdown Especially suitable for small number of stations that are close to each other (very little delay)

49 Bit Map Protocol Medium Access Protocols Wireless (WLAN) 8 Contention slots Frames 8 Contention slots d 2

50 Binary Countdown Medium Access Protocols Wireless (WLAN) Bit time Result Stations 0010 and 0100 see this 1 and give up Station 1001 sees this 1 and gives up

51 Wireless (WLAN) Width of each reservation slot should be of the order of the maximum delay between stations (so there is no ambiguity as to which station(s) is making a reservation) Number of reservation slots proportional to number of stations (in bit-map protocol) Number of reservation slots proportional to log2 of number of stations for each packet (in binary countdown) However, if number of packets is proportional to number of stations, even for binary countdown the total overhead (for reservation slots) will depend on the number of stations!

52 A Typical LAN Medium Access Protocols Wireless (WLAN) Bridge Backbone LAN B B B B File server Cluster on a single LAN Workstation LAN

53 Bridges Medium Access Protocols Wireless (WLAN) Bridges interconnect LANs Need for bridges LANs might have sprouted independently Sometimes (geographically well distributed) cheaper to connect different segments with a bridge than run a single cable Controlling load in each LAN Very large physical distances (greater than 2500 m) Reliability Security

54 Wireless (WLAN) Local Internetworking Should the frame be forwarded? To whom? Hash tables F G H Bridge LAN 4 A B B1 C B2 D E LAN 1 LAN 2 LAN 3

55 Backward Learning Medium Access Protocols Wireless (WLAN) Hash tables are empty at first If route to destination not known flood over all lines If destination and source are on the same line discard packet If destination and source are on different lines, forward Backward learning operate in promiscuous mode Inspect source address of each packet seen to get some knowledge of the topology

56 Wireless (WLAN) Repeaters, Hubs, Bridges, Switches, Routers, Gateways Application layer Transport layer Application gateway Transport gateway Packet (supplied by network layer) Network layer Router Frame header Packet header TCP header User data CRC Data link layer Physical layer Bridge, switch Repeater, hub (a) Frame (built by data link layer) (b)

57 Wireless (WLAN) Hubs, Bridges, Switches A B C D A B C D Host A B C D Hub Bridge Switch LAN E F G H (a) E F G H (b) E F G H (c)

Chapter 4: The Medium Access Layer

Chapter 4: The Medium Access Layer Chapter 4: The Medium Access Layer Computer Networks Maccabe Computer Science Department The University of New Mexico September 2002 Medium Access Layer Point-to-point versus broadcast networks Broadcast

More information

Chapter 4. The Medium Access Control Sublayer. Points and Questions to Consider. Multiple Access Protocols. The Channel Allocation Problem.

Chapter 4. The Medium Access Control Sublayer. Points and Questions to Consider. Multiple Access Protocols. The Channel Allocation Problem. Dynamic Channel Allocation in LANs and MANs Chapter 4 The Medium Access Control Sublayer 1. Station Model. 2. Single Channel Assumption. 3. Collision Assumption. 4. (a) Continuous Time. (b) Slotted Time.

More information

Chapter 4. The Medium Access Control Sublayer

Chapter 4. The Medium Access Control Sublayer Chapter 4 The Medium Access Control Sublayer The Channel Allocation Problem Static Channel Allocation in LANs and MANs Dynamic Channel Allocation in LANs and MANs Dynamic Channel Allocation in LANs and

More information

Computer Networks. Medium Access Sublayer (Part I)

Computer Networks. Medium Access Sublayer (Part I) Computer Networks Medium Access Sublayer (Part I) Topics Introduction Multiple Access Protocols Ethernet Wireless LAN Protocols Bridges Misc (brief) High-Speed LANs Satellite Networks Introduction Remember,

More information

Multiple Access Links and Protocols

Multiple Access Links and Protocols Multiple Access Links and Protocols Two types of links : point-to-point PPP for dial-up access point-to-point link between Ethernet switch and host broadcast (shared wire or medium) old-fashioned Ethernet

More information

Wireless Communications

Wireless Communications 4. Medium Access Control Sublayer DIN/CTC/UEM 2018 Why do we need MAC for? Medium Access Control (MAC) Shared medium instead of point-to-point link MAC sublayer controls access to shared medium Examples:

More information

Mohamed Khedr.

Mohamed Khedr. Mohamed Khedr http://webmail.aast.edu/~khedr Tentatively Week 1 Week 2 Week 3 Week 4 Week 5 Week 6 Week 7 Week 8 Week 9 Week 10 Week 11 Week 12 Week 13 Week 14 Week 15 Overview Packet Switching IP addressing

More information

CSCD 433 Network Programming Fall Lecture 7 Ethernet and Wireless

CSCD 433 Network Programming Fall Lecture 7 Ethernet and Wireless CSCD 433 Network Programming Fall 2016 Lecture 7 Ethernet and Wireless 802.11 1 Topics 802 Standard MAC and LLC Sublayers Review of MAC in Ethernet MAC in 802.11 Wireless 2 IEEE Standards In 1985, Computer

More information

Wireless Local Area Networks. Networks: Wireless LANs 1

Wireless Local Area Networks. Networks: Wireless LANs 1 Wireless Local Area Networks Networks: Wireless LANs 1 Wireless Local Area Networks The proliferation of laptop computers and other mobile devices (PDAs and cell phones) created an obvious application

More information

Computer Networks Medium Access Control. Mostafa Salehi Fall 2008

Computer Networks Medium Access Control. Mostafa Salehi Fall 2008 Computer Networks Medium Access Control Mostafa Salehi Fall 2008 2008 1 Outline Issues ALOHA Network Ethernet Token Ring Wireless 2 Main Issues Local Area Network (LAN) : Three or more machines are physically

More information

Chapter 12 Multiple Access 12.1

Chapter 12 Multiple Access 12.1 Chapter 12 Multiple Access 12.1 Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. 12.2 Figure 12.1 Data link layer divided into two functionality-oriented sublayers

More information

Redes de Computadores. Medium Access Control

Redes de Computadores. Medium Access Control Redes de Computadores Medium Access Control Manuel P. Ricardo Faculdade de Engenharia da Universidade do Porto 1 » How to control the access of computers to a communication medium?» What is the ideal Medium

More information

Data and Computer Communications. Chapter 13 Wireless LANs

Data and Computer Communications. Chapter 13 Wireless LANs Data and Computer Communications Chapter 13 Wireless LANs Wireless LAN Topology Infrastructure LAN Connect to stations on wired LAN and in other cells May do automatic handoff Ad hoc LAN No hub Peer-to-peer

More information

Outline. EEC-484/584 Computer Networks. Multiple Access Protocols. Wireless LAN Protocols. Lecture 9. Wenbing Zhao

Outline. EEC-484/584 Computer Networks. Multiple Access Protocols. Wireless LAN Protocols. Lecture 9. Wenbing Zhao EEC-484/584 Computer Networks Lecture 9 wenbing@ieee.org (Lecture nodes are based on materials supplied by Dr. Louise Moser at UCSB and Prentice-Hall) Outline Review Multiple access protocols IEEE 802

More information

EEC-484/584 Computer Networks

EEC-484/584 Computer Networks EEC-484/584 Computer Networks Lecture 9 wenbing@ieee.org (Lecture nodes are based on materials supplied by Dr. Louise Moser at UCSB and Prentice-Hall) Outline 2 Review Multiple access protocols IEEE 802

More information

Jaringan Komputer. Broadcast Network. Outline. MAC (Medium Access Control) Channel Allocation Problem. Dynamic Channel Allocation

Jaringan Komputer. Broadcast Network. Outline. MAC (Medium Access Control) Channel Allocation Problem. Dynamic Channel Allocation Broadcast Network Jaringan Komputer Medium Access Control Sublayer 2 network categories: point-to-point connections broadcast channels Key issue in broadcast network: how to determine who gets to use the

More information

Medium Access Control. CSCI370 Lecture 5 Michael Hutt New York Institute of Technology

Medium Access Control. CSCI370 Lecture 5 Michael Hutt New York Institute of Technology Medium Access Control CSCI370 Lecture 5 Michael Hutt New York Institute of Technology The Data Link Layer Logical Link Control (LLC) IEEE 802.2 Standard RFC 1042 Provides three service options Unreliable

More information

Lecture 16: QoS and "

Lecture 16: QoS and Lecture 16: QoS and 802.11" CSE 123: Computer Networks Alex C. Snoeren HW 4 due now! Lecture 16 Overview" Network-wide QoS IntServ DifServ 802.11 Wireless CSMA/CA Hidden Terminals RTS/CTS CSE 123 Lecture

More information

Data and Computer Communications

Data and Computer Communications Data and Computer Communications Chapter 16 High Speed LANs Eighth Edition by William Stallings Why High Speed LANs? speed and power of PCs has risen graphics-intensive applications and GUIs see LANs as

More information

ECEN 5032 Data Networks Medium Access Control Sublayer

ECEN 5032 Data Networks Medium Access Control Sublayer ECEN 5032 Data Networks Medium Access Control Sublayer Peter Mathys mathys@colorado.edu University of Colorado, Boulder c 1996 2005, P. Mathys p.1/35 Overview (Sub)networks can be divided into two categories:

More information

High Level View. EE 122: Ethernet and Random Access protocols. Medium Access Protocols

High Level View. EE 122: Ethernet and Random Access protocols. Medium Access Protocols High Level View EE 122: Ethernet and 802.11 Ion Stoica September 18, 2002 Goal: share a communication medium among multiple hosts connected to it Problem: arbitrate between connected hosts Solution goals:

More information

Outline. EEC-682/782 Computer Networks I. Multiple Access Protocols. IEEE 802 Standards

Outline. EEC-682/782 Computer Networks I. Multiple Access Protocols. IEEE 802 Standards EEC-682/782 Computer Networks I Lecture 9 Wenbing Zhao w.zhao1@csuohio.edu http://academic.csuohio.edu/zhao_w/teaching/eec682.htm (Lecture nodes are based on materials supplied by Dr. Louise Moser at UCSB

More information

Wireless Local Area Networks (WLANs)) and Wireless Sensor Networks (WSNs) Computer Networks: Wireless Networks 1

Wireless Local Area Networks (WLANs)) and Wireless Sensor Networks (WSNs) Computer Networks: Wireless Networks 1 Wireless Local Area Networks (WLANs)) and Wireless Sensor Networks (WSNs) Computer Networks: Wireless Networks 1 Wireless Local Area Networks The proliferation of laptop computers and other mobile devices

More information

Wireless LANs. ITS 413 Internet Technologies and Applications

Wireless LANs. ITS 413 Internet Technologies and Applications Wireless LANs ITS 413 Internet Technologies and Applications Aim: Aim and Contents Understand how IEEE 802.11 wireless LANs work Understand what influences the performance of wireless LANs Contents: IEEE

More information

Ethernet. Introduction. CSE 3213 Fall 2011

Ethernet. Introduction. CSE 3213 Fall 2011 Ethernet CSE 3213 Fall 2011 19 October 2011 1 Introduction Rapid changes in technology designs Broader use of LANs New schemes for high-speed LANs High-speed LAN technologies: Fast and gigabit Ethernet

More information

Wireless Local Area Networks (WLANs) and Wireless Sensor Networks (WSNs) Primer. Computer Networks: Wireless LANs

Wireless Local Area Networks (WLANs) and Wireless Sensor Networks (WSNs) Primer. Computer Networks: Wireless LANs Wireless Local Area Networks (WLANs) and Wireless Sensor Networks (WSNs) Primer 1 Wireless Local Area Networks (WLANs) The proliferation of laptop computers and other mobile devices (PDAs and cell phones)

More information

CMPE 257: Wireless and Mobile Networking

CMPE 257: Wireless and Mobile Networking CMPE 257: Wireless and Mobile Networking Katia Obraczka Computer Engineering UCSC Baskin Engineering Lecture 3 CMPE 257 Winter'11 1 Announcements Accessing secure part of the class Web page: User id: cmpe257.

More information

EE 122: Ethernet and

EE 122: Ethernet and EE 122: Ethernet and 802.11 Ion Stoica September 18, 2002 (* this talk is based in part on the on-line slides of J. Kurose & K. Rose) High Level View Goal: share a communication medium among multiple hosts

More information

Getting Connected (Chapter 2 Part 4) Networking CS 3470, Section 1 Sarah Diesburg

Getting Connected (Chapter 2 Part 4) Networking CS 3470, Section 1 Sarah Diesburg Getting Connected (Chapter 2 Part 4) Networking CS 3470, Section 1 Sarah Diesburg Five Problems Encoding/decoding Framing Error Detection Error Correction Media Access Five Problems Encoding/decoding Framing

More information

Page 1. Outline : Wireless Networks Lecture 11: MAC. Standardization of Wireless Networks. History. Frequency Bands

Page 1. Outline : Wireless Networks Lecture 11: MAC. Standardization of Wireless Networks. History. Frequency Bands Outline 18-759 : Wireless s Lecture 11: 80.11 Peter Steenkiste Dina Papagiannaki Spring Semester 009 http://www.cs.cmu.edu/~prs/wireless09/ Peter A. Steenkiste, CMU 1 80 protocol overview Wireless LANs

More information

4.3 IEEE Physical Layer IEEE IEEE b IEEE a IEEE g IEEE n IEEE 802.

4.3 IEEE Physical Layer IEEE IEEE b IEEE a IEEE g IEEE n IEEE 802. 4.3 IEEE 802.11 Physical Layer 4.3.1 IEEE 802.11 4.3.2 IEEE 802.11b 4.3.3 IEEE 802.11a 4.3.4 IEEE 802.11g 4.3.5 IEEE 802.11n 4.3.6 IEEE 802.11ac,ad Andreas Könsgen Summer Term 2012 4.3.3 IEEE 802.11a Data

More information

IEEE , Token Rings. 10/11/06 CS/ECE UIUC, Fall

IEEE , Token Rings. 10/11/06 CS/ECE UIUC, Fall IEEE 802.11, Token Rings 10/11/06 CS/ECE 438 - UIUC, Fall 2006 1 Medium Access Control Wireless channel is a shared medium Need access control mechanism to avoid interference Why not CSMA/CD? 10/11/06

More information

Wireless LAN -Architecture

Wireless LAN -Architecture Wireless LAN -Architecture IEEE has defined the specifications for a wireless LAN, called IEEE 802.11, which covers the physical and data link layers. Basic Service Set (BSS) Access Point (AP) Distribution

More information

Wireless Networking & Mobile Computing

Wireless Networking & Mobile Computing Wireless Networking & Mobile Computing CS 752/852 - Spring 2012 Lec #4: Medium Access Control - II Tamer Nadeem Dept. of Computer Science IEEE 802.11 Standards Page 2 Spring 2012 CS 752/852 - Wireless

More information

Networking Technologies and Applications

Networking Technologies and Applications Networking Technologies and Applications Rolland Vida BME TMIT September 23, 2016 Aloha Advantages: Different size packets No need for synchronization Simple operation If low upstream traffic, the solution

More information

Contention Protocols and Networks

Contention Protocols and Networks 4/13/2005 314 Lecture Contention Protocols and Networks 1 Contention Protocols and Networks Contention Protocols CSMA/CD Network Topologies Ethernet 4/13/2005 314 Lecture Contention Protocols and Networks

More information

Wireless Communication and Networking CMPT 371

Wireless Communication and Networking CMPT 371 Wireless Communication and Networking CMPT 371 Wireless Systems: AM, FM Radio TV Broadcast Satellite Broadcast 2-way Radios Cordless Phones Satellite Links Mobile Telephony Systems Wireless Local Loop

More information

standard. Acknowledgement: Slides borrowed from Richard Y. Yale

standard. Acknowledgement: Slides borrowed from Richard Y. Yale 802.11 standard Acknowledgement: Slides borrowed from Richard Y. Yang @ Yale IEEE 802.11 Requirements Design for small coverage (e.g. office, home) Low/no mobility High data rate applications Ability to

More information

EITF25 Internet Techniques and Applications L4: Network Access. Stefan Höst

EITF25 Internet Techniques and Applications L4: Network Access. Stefan Höst EITF25 Internet Techniques and Applications L4: Network Access Stefan Höst Repetition The link layer protocol should make sure that the data is correctly transmitted over the physical link using error

More information

WiFi Networks: IEEE b Wireless LANs. Carey Williamson Department of Computer Science University of Calgary Winter 2018

WiFi Networks: IEEE b Wireless LANs. Carey Williamson Department of Computer Science University of Calgary Winter 2018 WiFi Networks: IEEE 802.11b Wireless LANs Carey Williamson Department of Computer Science University of Calgary Winter 2018 Background (1 of 2) In many respects, the IEEE 802.11b wireless LAN (WLAN) standard

More information

Mobile & Wireless Networking. Lecture 7: Wireless LAN

Mobile & Wireless Networking. Lecture 7: Wireless LAN 192620010 Mobile & Wireless Networking Lecture 7: Wireless LAN [Schiller, Section 7.3] [Reader, Part 6] [Optional: "IEEE 802.11n Development: History, Process, and Technology", Perahia, IEEE Communications

More information

Medium Access Control. IEEE , Token Rings. CSMA/CD in WLANs? Ethernet MAC Algorithm. MACA Solution for Hidden Terminal Problem

Medium Access Control. IEEE , Token Rings. CSMA/CD in WLANs? Ethernet MAC Algorithm. MACA Solution for Hidden Terminal Problem Medium Access Control IEEE 802.11, Token Rings Wireless channel is a shared medium Need access control mechanism to avoid interference Why not CSMA/CD? 9/15/06 CS/ECE 438 - UIUC, Fall 2006 1 9/15/06 CS/ECE

More information

The MAC layer in wireless networks

The MAC layer in wireless networks The MAC layer in wireless networks The wireless MAC layer roles Access control to shared channel(s) Natural broadcast of wireless transmission Collision of signal: a /space problem Who transmits when?

More information

Direct Link Communication II: Wired Media. Multi-Access Communication

Direct Link Communication II: Wired Media. Multi-Access Communication Direct Link Communication II: Wired Media Multi-Access Communication Two classes: contention-based e.g., CSMA/CD, CSMA/CA used in Ethernet, WLAN contention-free e.g., TDM, FDM, TDMA, CDMA, token ring one

More information

CSE 461: Wireless Networks

CSE 461: Wireless Networks CSE 461: Wireless Networks Wireless IEEE 802.11 A physical and multiple access layer standard for wireless local area networks (WLAN) Ad Hoc Network: no servers or access points Infrastructure Network

More information

Unit 7 Media Access Control (MAC)

Unit 7 Media Access Control (MAC) Unit 7 Media Access Control (MAC) 1 Internet Model 2 Sublayers of Data Link Layer Logical link control (LLC) Flow control Error control Media access control (MAC) access control 3 Categorization of MAC

More information

RMIT University. Data Communication and Net-Centric Computing COSC 1111/2061/1110. Lecture 8. Medium Access Control Methods & LAN

RMIT University. Data Communication and Net-Centric Computing COSC 1111/2061/1110. Lecture 8. Medium Access Control Methods & LAN RMIT University Data Communication and Net-Centric Computing COSC 1111/2061/1110 Medium Access Control Methods & LAN Technology Slide 1 Lecture Overview During this lecture, we will Look at several Multiple

More information

Outline / Wireless Networks and Applications Lecture 9: Wireless LANs Aloha and 802 Wireless. Regular Ethernet CSMA/CD

Outline / Wireless Networks and Applications Lecture 9: Wireless LANs Aloha and 802 Wireless. Regular Ethernet CSMA/CD Page 1 Outline 18-452/18-750 Wireless Networks and Applications Lecture 9: Wireless LANs Aloha and 802 Wireless Peter Steenkiste Data link fundamentals» And what changes in wireless Aloha Ethernet Wireless-specific

More information

Data Communications. Data Link Layer Protocols Wireless LANs

Data Communications. Data Link Layer Protocols Wireless LANs Data Communications Data Link Layer Protocols Wireless LANs Wireless Networks Several different types of communications networks are using unguided media. These networks are generally referred to as wireless

More information

The Medium Access Control Scheme (MAC Layer) Reference: Andrew S. Tanenbaum, Computer Networks, 3rd Edition, Prentice Hall, 1996.

The Medium Access Control Scheme (MAC Layer) Reference: Andrew S. Tanenbaum, Computer Networks, 3rd Edition, Prentice Hall, 1996. The Medium Access Control Scheme (MAC Layer) Reference: Andrew S. Tanenbaum, Computer Networks, 3rd Edition, Prentice Hall, 1996. 1 Table of Contents Introduction ALOHA Carrier Sense Multiple Sense (CSMA)

More information

The Medium Access Control Sublayer

The Medium Access Control Sublayer The Medium Access Control Sublayer Chapter 4 Channel Allocation Problem Static channel allocation Assumptions for dynamic Assumptions for Dynamic Channel Allocation 1. Independent traffic 2. Single channel

More information

CSE 461: Multiple Access Networks. This Lecture

CSE 461: Multiple Access Networks. This Lecture CSE 461: Multiple Access Networks This Lecture Key Focus: How do multiple parties share a wire? This is the Medium Access Control (MAC) portion of the Link Layer Randomized access protocols: 1. Aloha 2.

More information

Medium Access Control. MAC protocols: design goals, challenges, contention-based and contention-free protocols

Medium Access Control. MAC protocols: design goals, challenges, contention-based and contention-free protocols Medium Access Control MAC protocols: design goals, challenges, contention-based and contention-free protocols 1 Why do we need MAC protocols? Wireless medium is shared Many nodes may need to access the

More information

Medium Access Control Sublayer Chapter 4

Medium Access Control Sublayer Chapter 4 Medium Access Control Sublayer Chapter 4 Channel Allocation Problem Multiple Access Protocols Ethernet Wireless LANs Broadband Wireless Bluetooth RFID Data Link Layer Switching Revised: August 2011 & February

More information

Lesson 2-3: The IEEE x MAC Layer

Lesson 2-3: The IEEE x MAC Layer Module 2: Establishing Wireless Connectivity Lesson 2-3: The IEEE 802.11x MAC Layer Lesson Overview This lesson describes basic IEEE 802.11x MAC operation, beginning with an explanation of contention schemes

More information

CHAPTER 7 MAC LAYER PROTOCOLS. Dr. Bhargavi Goswami Associate Professor & Head Department of Computer Science Garden City College

CHAPTER 7 MAC LAYER PROTOCOLS. Dr. Bhargavi Goswami Associate Professor & Head Department of Computer Science Garden City College CHAPTER 7 MAC LAYER PROTOCOLS Dr. Bhargavi Goswami Associate Professor & Head Department of Computer Science Garden City College MEDIUM ACCESS CONTROL - MAC PROTOCOLS When the two stations transmit data

More information

Multiple Access in Cellular and Systems

Multiple Access in Cellular and Systems Multiple Access in Cellular and 802.11 Systems 1 GSM The total bandwidth is divided into many narrowband channels. (200 khz in GSM) Users are given time slots in a narrowband channel (8 users) A channel

More information

Overview. Wireless networks basics IEEE (Wi-Fi) a/b/g/n ad Hoc MAC protocols ad Hoc routing DSR AODV

Overview. Wireless networks basics IEEE (Wi-Fi) a/b/g/n ad Hoc MAC protocols ad Hoc routing DSR AODV Wireless networks 1 Overview Wireless networks basics IEEE 802.11 (Wi-Fi) a/b/g/n ad Hoc MAC protocols ad Hoc routing DSR AODV 2 Wireless Networks Autonomous systems of mobile hosts connected by wireless

More information

Goals. Fundamentals of Network Media. More topics. Topics. Multiple access communication. Multiple access solutions

Goals. Fundamentals of Network Media. More topics. Topics. Multiple access communication. Multiple access solutions Fundamentals of Network Media Local Area Networks Ursula Holmström Goals Learn the basic concepts related to LAN technologies, for example use of shared media medium access control topologies Know the

More information

Topics for Today. More on Ethernet. Wireless LANs Readings. Topology and Wiring Switched Ethernet Fast Ethernet Gigabit Ethernet. 4.3 to 4.

Topics for Today. More on Ethernet. Wireless LANs Readings. Topology and Wiring Switched Ethernet Fast Ethernet Gigabit Ethernet. 4.3 to 4. Topics for Today More on Ethernet Topology and Wiring Switched Ethernet Fast Ethernet Gigabit Ethernet Wireless LANs Readings 4.3 to 4.4 1 Original Ethernet Wiring Heavy coaxial cable, called thicknet,

More information

Local Area Networks (LANs) SMU CSE 5344 /

Local Area Networks (LANs) SMU CSE 5344 / Local Area Networks (LANs) SMU CSE 5344 / 7344 1 LAN/MAN Technology Factors Topology Transmission Medium Medium Access Control Techniques SMU CSE 5344 / 7344 2 Topologies Topology: the shape of a communication

More information

Mobile Communications Chapter 7: Wireless LANs

Mobile Communications Chapter 7: Wireless LANs Characteristics IEEE 802.11 PHY MAC Roaming IEEE 802.11a, b, g, e HIPERLAN Bluetooth Comparisons Prof. Dr.-Ing. Jochen Schiller, http://www.jochenschiller.de/ MC SS02 7.1 Comparison: infrastructure vs.

More information

Local Area Networks NETW 901

Local Area Networks NETW 901 Local Area Networks NETW 901 Lecture 4 Wireless LAN Course Instructor: Dr.-Ing. Maggie Mashaly maggie.ezzat@guc.edu.eg C3.220 1 Contents What is a Wireless LAN? Applications and Requirements Transmission

More information

Medium Access Control Sublayer Chapter 4

Medium Access Control Sublayer Chapter 4 Medium Access Control Sublayer Chapter 4 Channel Allocation Problem Multiple Access Protocols Ethernet Wireless LANs Broadband Wireless Bluetooth RFID Data Link Layer Switching Revised: August 2011 The

More information

LANs. Local Area Networks. via the Media Access Control (MAC) SubLayer. Networks: Local Area Networks

LANs. Local Area Networks. via the Media Access Control (MAC) SubLayer. Networks: Local Area Networks LANs Local Area Networks via the Media Access Control (MAC) SubLayer 1 Local Area Networks Aloha Slotted Aloha CSMA (non-persistent, 1-persistent, p-persistent) CSMA/CD Ethernet Token Ring 2 Network Layer

More information

IEEE WLANs (WiFi) Part II/III System Overview and MAC Layer

IEEE WLANs (WiFi) Part II/III System Overview and MAC Layer IEEE 802.11 WLANs (WiFi) Part II/III System Overview and MAC Layer Design goals for wireless LANs (WLANs) Global, seamless operation Low power for battery use No special permissions or licenses needed

More information

ICE 1332/0715 Mobile Computing (Summer, 2008)

ICE 1332/0715 Mobile Computing (Summer, 2008) ICE 1332/0715 Mobile Computing (Summer, 2008) IEEE 802.11 Prof. Chansu Yu http://academic.csuohio.edu/yuc/ Contents Overview of IEEE 802.11 Frame formats MAC frame PHY frame IEEE 802.11 IEEE 802.11b IEEE

More information

Multiple Access Protocols

Multiple Access Protocols Multiple Access Protocols Computer Networks Lecture 2 http://goo.gl/pze5o8 Multiple Access to a Shared Channel The medium (or its sub-channel) may be shared by multiple stations (dynamic allocation) just

More information

Computer Networks. Wireless LANs

Computer Networks. Wireless LANs Computer Networks Wireless LANs Mobile Communication Technology according to IEEE (examples) Local wireless networks WLAN 802.11 Personal wireless nw WPAN 802.15 WiFi 802.11a 802.11b 802.11h 802.11i/e/

More information

Chapter 6 Medium Access Control Protocols and Local Area Networks

Chapter 6 Medium Access Control Protocols and Local Area Networks Chapter 6 Medium Access Control Protocols and Local Area Networks Part I: Medium Access Control Part II: Local Area Networks CSE 3213, Winter 2010 Instructor: Foroohar Foroozan Chapter Overview Broadcast

More information

The MAC layer in wireless networks

The MAC layer in wireless networks The MAC layer in wireless networks The wireless MAC layer roles Access control to shared channel(s) Natural broadcast of wireless transmission Collision of signal: a time/space problem Who transmits when?

More information

Data Link Layer -2- Network Access

Data Link Layer -2- Network Access EITF25 Internet: Technology and Applications Data Link Layer -2- Network Access 2015, Lecture 03 Kaan Bür Previously on EITF25 Logical Link Control Sublayer Flow control Send data Wait for ACK Error control

More information

ICE 1332/0715 Mobile Computing (Summer, 2008)

ICE 1332/0715 Mobile Computing (Summer, 2008) ICE 1332/0715 Mobile Computing (Summer, 2008) Medium Access Control Prof. Chansu Yu http://academic.csuohio.edu/yuc/ Simplified Reference Model Application layer Transport layer Network layer Data link

More information

Links Reading: Chapter 2. Goals of Todayʼs Lecture. Message, Segment, Packet, and Frame

Links Reading: Chapter 2. Goals of Todayʼs Lecture. Message, Segment, Packet, and Frame Links Reading: Chapter 2 CS 375: Computer Networks Thomas Bressoud 1 Goals of Todayʼs Lecture Link-layer services Encoding, framing, and error detection Error correction and flow control Sharing a shared

More information

Wireless Communication and Networking CMPT 371

Wireless Communication and Networking CMPT 371 Wireless Communication and Networking CMPT 371 Wireless Systems: AM, FM Radio TV Broadcast Satellite Broadcast 2-way Radios Cordless Phones Satellite Links Mobile Telephony Systems Wireless Local Loop

More information

Telecommunication Protocols Laboratory Course. Lecture 2

Telecommunication Protocols Laboratory Course. Lecture 2 Telecommunication Protocols Laboratory Course Lecture 2 Last time We began our study of telecommunication protocols at the Logical Link Control sub-layer (LLC) LLC issues Connectionless vs connection-oriented

More information

Department of Electrical and Computer Systems Engineering

Department of Electrical and Computer Systems Engineering Department of Electrical and Computer Systems Engineering Technical Report MECSE-6-2006 Medium Access Control (MAC) Schemes for Quality of Service (QoS) provision of Voice over Internet Protocol (VoIP)

More information

MSIT 413: Wireless Technologies Week 8

MSIT 413: Wireless Technologies Week 8 MSIT 413: Wireless Technologies Week 8 Michael L. Honig Department of EECS Northwestern University November 2017 The Multiple Access Problem How can multiple mobiles access (communicate with) the same

More information

Direct Link Communication II: Wired Media. Multi-Access Communication

Direct Link Communication II: Wired Media. Multi-Access Communication Direct Link Communication II: Wired Media Multi-Access Communication Two classes: contention-based e.g., CSMA/CD, CSMA/CA used in Ethernet, WLAN contention-free e.g., TDM, FDM, TDMA, CDMA, token ring used

More information

Announcements / Wireless Networks and Applications Lecture 9: Wireless LANs Wireless. Regular Ethernet CSMA/CD.

Announcements / Wireless Networks and Applications Lecture 9: Wireless LANs Wireless. Regular Ethernet CSMA/CD. Announcements 18-452/18-750 Wireless Networks and Applications Lecture 9: Wireless LANs 802.11 Wireless Peter Steenkiste Homework 1 should be out by tomorrow Project 1 by Friday Schedule:» Thursday lecture

More information

Data Link Layer -2- Network Access

Data Link Layer -2- Network Access EITF25 Internet: Technology and Applications Data Link Layer -2- Network Access 2013, Lecture 03 Kaan Bür, Stefan Höst Previously on EITF25 Logical Link Control Sublayer Flow control Send data Wait for

More information

Computer and Network Security

Computer and Network Security CIS 551 / TCOM 401 Computer and Network Security Spring 2009 Lecture 6 Announcements First project: Due: 6 Feb. 2009 at 11:59 p.m. http://www.cis.upenn.edu/~cis551/project1.html Plan for Today: Networks:

More information

Random Access. 1. Aloha. 2. Slotted Aloha 3. CSMA 4. CSMA/CD

Random Access. 1. Aloha. 2. Slotted Aloha 3. CSMA 4. CSMA/CD Random Access 1. Aloha 2. Slotted Aloha 3. CSMA 4. CSMA/CD Background Communication medium B No Collision collision A C Modern Local Area Networks (LANs) operate as follows Users are connected to communication

More information

MAC. Fall Data Communications II 1

MAC. Fall Data Communications II 1 802.11 MAC Fall 2005 91.564 Data Communications II 1 RF Quality (ACK) Fall 2005 91.564 Data Communications II 2 Hidden Terminal (RTS/CTS) Fall 2005 91.564 Data Communications II 3 MAC Coordination Functions

More information

04/11/2011. Wireless LANs. CSE 3213 Fall November Overview

04/11/2011. Wireless LANs. CSE 3213 Fall November Overview Wireless LANs CSE 3213 Fall 2011 4 November 2011 Overview 2 1 Infrastructure Wireless LAN 3 Applications of Wireless LANs Key application areas: LAN extension cross-building interconnect nomadic access

More information

CIS 551 / TCOM 401 Computer and Network Security. Spring 2007 Lecture 7

CIS 551 / TCOM 401 Computer and Network Security. Spring 2007 Lecture 7 CIS 551 / TCOM 401 Computer and Network Security Spring 2007 Lecture 7 Announcements Reminder: Project 1 is due on Thursday. 2/1/07 CIS/TCOM 551 2 Network Architecture General blueprints that guide the

More information

CHAPTER 8: LAN Standards

CHAPTER 8: LAN Standards CHAPTER 8: LAN Standards DR. BHARGAVI GOSWAMI, ASSOCIATE PROFESSOR HEAD, DEPARTMENT OF COMPUTER SCIENCE, GARDEN CITY COLLEGE BANGALORE. LAN STRUCTURE NETWORK INTERFACE CARD MEDIUM ACCESS CONTROL SUB LAYER

More information

Ethernet Basics. based on Chapter 4 of CompTIA Network+ Exam Guide, 4 th ed., Mike Meyers

Ethernet Basics. based on Chapter 4 of CompTIA Network+ Exam Guide, 4 th ed., Mike Meyers Ethernet Basics based on Chapter 4 of CompTIA Network+ Exam Guide, 4 th ed., Mike Meyers Ethernet Basics History Ethernet Frames CSMA/CD Obsolete versions 10Mbps versions Segments Spanning Tree Protocol

More information

CS/ECE 439: Wireless Networking. MAC Layer Road to Wireless

CS/ECE 439: Wireless Networking. MAC Layer Road to Wireless CS/ECE 439: Wireless Networking MAC Layer Road to Wireless Multiple Access Media Media access Controlling which frame should be sent over the link next Easy for point-to-point links; half versus full duplex

More information

IEEE Technical Tutorial. Introduction. IEEE Architecture

IEEE Technical Tutorial. Introduction. IEEE Architecture IEEE 802.11 Technical Tutorial Introduction The purpose of this document is to give technical readers a basic overview of the new 802.11 Standard, enabling them to understand the basic concepts, principle

More information

COS 140: Foundations of Computer Science

COS 140: Foundations of Computer Science COS 140: Foundations of Computer Science ALOHA Network Protocol Family Fall 2017 Homework 2 Introduction 3 Network Protocols.......................................................... 3 Problem.................................................................

More information

IEEE WLAN (802.11) Copyright. Nomadic Communications

IEEE WLAN (802.11) Copyright. Nomadic Communications Nomadic Communications WLAN (802.11) Renato Lo Cigno LoCigno@disi.unitn.it - Tel: 2026 Dipartimento di Ingegneria e Scienza dell Informazione Home Page: http://isi.unitn.it/locigno/index.php/teaching-duties/nomadic-communications

More information

Data and Computer Communications. Chapter 11 Local Area Network

Data and Computer Communications. Chapter 11 Local Area Network Data and Computer Communications Chapter 11 Local Area Network LAN Topologies Refers to the way in which the stations attached to the network are interconnected Bus Topology Used with multipoint medium

More information

CARRIER SENSE MULTIPLE ACCESS (CSMA):

CARRIER SENSE MULTIPLE ACCESS (CSMA): Lecture Handout Computer Networks Lecture No. 8 CARRIER SENSE MULTIPLE ACCESS (CSMA): There is no central control management when computers transmit on Ethernet. For this purpose the Ethernet employs CSMA

More information

Topics. Link Layer Services (more) Link Layer Services LECTURE 5 MULTIPLE ACCESS AND LOCAL AREA NETWORKS. flow control: error detection:

Topics. Link Layer Services (more) Link Layer Services LECTURE 5 MULTIPLE ACCESS AND LOCAL AREA NETWORKS. flow control: error detection: 1 Topics 2 LECTURE 5 MULTIPLE ACCESS AND LOCAL AREA NETWORKS Multiple access: CSMA/CD, CSMA/CA, token passing, channelization LAN: characteristics, i basic principles i Protocol architecture Topologies

More information

Outline. CS5984 Mobile Computing. IEEE 802 Architecture 1/7. IEEE 802 Architecture 2/7. IEEE 802 Architecture 3/7. Dr. Ayman Abdel-Hamid, CS5984

Outline. CS5984 Mobile Computing. IEEE 802 Architecture 1/7. IEEE 802 Architecture 2/7. IEEE 802 Architecture 3/7. Dr. Ayman Abdel-Hamid, CS5984 CS5984 Mobile Computing Dr. Ayman Abdel-Hamid Computer Science Department Virginia Tech Outline IEEE 82 Architecture IEEE 82. Wireless LANs Based on Chapter 4 in Wireless Communications and Networks, William

More information

MAC Sublayer(1) Principal service of the Medium Access Control Sublayer: Allocating a single broadcast channel (mostly a LAN) among competing users

MAC Sublayer(1) Principal service of the Medium Access Control Sublayer: Allocating a single broadcast channel (mostly a LAN) among competing users MAC Sublayer(1) Principal service of the Medium Access Control Sublayer: Allocating a single broadcast channel (mostly a LAN) among competing users Static Channel Allocation: Frequency Division Multiplexing

More information

Computer Communication III

Computer Communication III Computer Communication III Wireless Media Access IEEE 802.11 Wireless LAN Advantages of Wireless LANs Using the license free ISM band at 2.4 GHz no complicated or expensive licenses necessary very cost

More information

WLAN (802.11) Nomadic Communications. Renato Lo Cigno - Tel: Dipartimento di Ingegneria e Scienza dell Informazione

WLAN (802.11) Nomadic Communications. Renato Lo Cigno - Tel: Dipartimento di Ingegneria e Scienza dell Informazione Nomadic Communications WLAN (802.11) Renato Lo Cigno LoCigno@disi.unitn.it - Tel: 2026 Dipartimento di Ingegneria e Scienza dell Informazione Home Page: http://isi.unitn.it/locigno/index.php/teaching-duties/nomadic-communications

More information

Chapter 6 Wireless and Mobile Networks

Chapter 6 Wireless and Mobile Networks Chapter 6 Wireless and Mobile Networks Computer Networking: A Top Down Approach Featuring the Internet, 3 rd edition. Jim Kurose, Keith Ross Addison-Wesley, July 2004. 6: Wireless and Mobile Networks 6

More information