6th Slide Set Computer Networks

Similar documents
4th Slide Set Computer Networks

Getting Connected (Chapter 2 Part 4) Networking CS 3470, Section 1 Sarah Diesburg

CSE 461: Wireless Networks

Link Layer and Ethernet

CSCD 433 Network Programming Fall Lecture 7 Ethernet and Wireless

IEEE , Token Rings. 10/11/06 CS/ECE UIUC, Fall

Mohamed Khedr.

Topics. Link Layer Services (more) Link Layer Services LECTURE 5 MULTIPLE ACCESS AND LOCAL AREA NETWORKS. flow control: error detection:

CS 43: Computer Networks. 27: Media Access Contd. December 3, 2018

Link Layer and Ethernet

CARRIER SENSE MULTIPLE ACCESS (CSMA):

Unit 7 Media Access Control (MAC)

CMPE 257: Wireless and Mobile Networking

Topics for Today. More on Ethernet. Wireless LANs Readings. Topology and Wiring Switched Ethernet Fast Ethernet Gigabit Ethernet. 4.3 to 4.

CMPE 257: Wireless and Mobile Networking

High Level View. EE 122: Ethernet and Random Access protocols. Medium Access Protocols

Lecture 6. Data Link Layer (cont d) Data Link Layer 1-1

Medium Access Control. IEEE , Token Rings. CSMA/CD in WLANs? Ethernet MAC Algorithm. MACA Solution for Hidden Terminal Problem

Multiple Access Links and Protocols

EE 122: Ethernet and

CSMA/CD (Collision Detection)

Chapter 6 Wireless and Mobile Networks

Data Link Layer, Part 5. Medium Access Control

Chapter 6 Wireless and Mobile Networks. Csci 4211 David H.C. Du

5th Slide Set Computer Networks

CS 43: Computer Networks Media Access. Kevin Webb Swarthmore College November 30, 2017

Wireless Communication and Networking CMPT 371

Lesson 2-3: The IEEE x MAC Layer

Data Link Layer -2- Network Access

Computer Communication III

Chapter 12 Multiple Access 12.1

Data Link Layer, Part 3 Medium Access Control. Preface

Midterm Review EECS 122. University of California Berkeley

Medium Access Control. MAC protocols: design goals, challenges, contention-based and contention-free protocols

EITF25 Internet Techniques and Applications L4: Network Access. Stefan Höst

Computer Networks. Today. Principles of datalink layer services Multiple access links Adresavimas, ARP LANs Wireless LANs VU MIF CS 1/48 2/48

Data Link Layer -2- Network Access

Outline / Wireless Networks and Applications Lecture 9: Wireless LANs Aloha and 802 Wireless. Regular Ethernet CSMA/CD

ICE 1332/0715 Mobile Computing (Summer, 2008)

CSC344 Wireless and Mobile Computing. Department of Computer Science COMSATS Institute of Information Technology

CSE 461: Multiple Access Networks. This Lecture

Last Lecture: Data Link Layer

Wireless LANs. ITS 413 Internet Technologies and Applications

Data Communications. Data Link Layer Protocols Wireless LANs

Medium Access Control Sublayer

Data and Computer Communications. Chapter 13 Wireless LANs

MAC. Fall Data Communications II 1

CHAPTER 8: LAN Standards

Shared Access Networks Wireless. 1/27/14 CS mywireless 1

Local Area Networks NETW 901

Reminder: Datalink Functions Computer Networking. Datalink Architectures

CS 348: Computer Networks. - WiFi (contd.); 16 th Aug Instructor: Sridhar Iyer IIT Bombay

The MAC layer in wireless networks

Module 10 Data Link Layer CS655! 10-1!

CC451 Computer Networks

standard. Acknowledgement: Slides borrowed from Richard Y. Yale

Wireless LAN -Architecture

Wireless Communication and Networking CMPT 371

Wireless Local Area Networks (WLANs) Part I

Review. Error Detection: CRC Multiple access protocols. LAN addresses and ARP Ethernet. Slotted ALOHA CSMA/CD

4.3 IEEE Physical Layer IEEE IEEE b IEEE a IEEE g IEEE n IEEE 802.

Objectives. Hexadecimal Numbering and Addressing. Ethernet / IEEE LAN Technology. Ethernet

Wireless Communications

Logical Link Control (LLC) Medium Access Control (MAC)

Local Area Networks (LANs) SMU CSE 5344 /

Lecture 23 Overview. Last Lecture. This Lecture. Next Lecture ADSL, ATM. Wireless Technologies (1) Source: chapters 6.2, 15

Chapter 4. The Medium Access Control Sublayer. Points and Questions to Consider. Multiple Access Protocols. The Channel Allocation Problem.

Overview : Computer Networking. Spectrum Use Comments. Spectrum Allocation in US Link layer challenges and WiFi WiFi

Lecture 6. Reminder: Homework 2, Programming Project 2 due on Thursday. Questions? Tuesday, September 13 CS 475 Networks - Lecture 6 1

Summary of MAC protocols

Announcements: Assignment 4 due now Lab 4 due next Tuesday Assignment 5 posted, due next Thursday

Redes de Computadores. Medium Access Control

CSMC 417. Computer Networks Prof. Ashok K Agrawala Ashok Agrawala. Fall 2018 CMSC417 Set 1 1

Introduction to Networks and the Internet

Mobile and Sensor Systems

Wireless Local Area Networks (WLANs)) and Wireless Sensor Networks (WSNs) Computer Networks: Wireless Networks 1

Wireless and Mobile Networks

IEEE Medium Access Control. Medium Access Control

The Link Layer and LANs. Chapter 6: Link layer and LANs

Wireless Local Area Networks. Networks: Wireless LANs 1

Wireless Network and Mobility

Ethernet. Lecture 6. Outline. Ethernet - Physical Properties. Ethernet - Physical Properties. Ethernet

EECS 122. University of California Berkeley

EECS 122. University of California Berkeley. Network Architecture Network hierarchy Layering Performance. Link Layer Ethernet Wi-Fi

3.1. Introduction to WLAN IEEE

Computer Network Fundamentals Spring Week 3 MAC Layer Andreas Terzis

original standard a transmission at 5 GHz bit rate 54 Mbit/s b support for 5.5 and 11 Mbit/s e QoS

COMP/ELEC 429/556 Introduction to Computer Networks

MSIT 413: Wireless Technologies Week 8

Chapter 4: The Medium Access Layer

Chapter 3. Underlying Technology. TCP/IP Protocol Suite 1 Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display.

Midterm Review. Topics. Review: Network. Review: Network. Layers & Protocols. Review: Network WAN. Midterm Review EECS 122 EECS 122

Midterm Review EECS 122. University of California Berkeley

Master Course Computer Networks IN2097

ECE 4450:427/527 - Computer Networks Spring 2017

Chapter 5 Link Layer. Computer Networking: A Top Down Approach. 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012

WiFi Networks: IEEE b Wireless LANs. Carey Williamson Department of Computer Science University of Calgary Winter 2018

Midterm Exam CSCE 232: Computer Networks Fall Instructions:

Medium Access Control Sublayer Chapter 4

Mohammad Hossein Manshaei 1393

Transcription:

Prof. Dr. Christian Baun 6th Slide Set Computer Networks Frankfurt University of Applied Sciences WS1718 1/36 6th Slide Set Computer Networks Prof. Dr. Christian Baun Frankfurt University of Applied Sciences (1971 2014: Fachhochschule Frankfurt am Main) Faculty of Computer Science and Engineering christianbaun@fb2.fra-uas.de

Prof. Dr. Christian Baun 6th Slide Set Computer Networks Frankfurt University of Applied Sciences WS1718 2/36 Learning Objectives of this Slide Set Data Link Layer (part 3) Media access control methods Media access control method of Ethernet Media access control method of WLAN

Devices: Bridge, Layer-2-Switch (Multiport-Bridge), Modem Protocols: Ethernet, Token Ring, WLAN, Bluetooth, PPP Prof. Dr. Christian Baun 6th Slide Set Computer Networks Frankfurt University of Applied Sciences WS1718 3/36 Data Link Layer Functions of the Data Link Layer Sender: Pack packets of the Network Layer into frames Receiver: Identify the frames in the bit stream from the Physical Layer Ensure correct transmission of the frames inside a physical network from one network device to another one via error detection with checksums Provide physical addresses (MAC addresses) Control access to the transmission medium

Prof. Dr. Christian Baun 6th Slide Set Computer Networks Frankfurt University of Applied Sciences WS1718 4/36 Media Access Control Methods With Ethernet 10BASE2/5 and WLAN, the network devices or stations use a shared transmission medium To coordinate the media access and to avoid collisions, media access control methods are required Ethernet uses the media access control method CSMA/CD WLAN uses the media access control method CSMA/CA Bluetooth is not discussed here, because Bluetooth devices are organized in piconets In each piconet, the master coordinates the media access

Prof. Dr. Christian Baun 6th Slide Set Computer Networks Frankfurt University of Applied Sciences WS1718 5/36 Media Access Control Method CSMA/CD In contrast to Token Ring, for Ethernet it is impossible to predict the waiting time and amount of data, that can be transmitted All participants are regarding the media access in direct competition The waiting time and amount of data depend on... the number of participants and the amount of data, which is send by the individual participants Ethernet uses the media access control method Carrier Sense Multiple Access / Collision Detection (CSMA/CD)

Prof. Dr. Christian Baun 6th Slide Set Computer Networks Frankfurt University of Applied Sciences WS1718 6/36 Meaning of CSMA/CD Image source: http://www.payer.de/cmc/cmcs08.htm Carrier Sense (CS) means: Each network device monitors the channel before transmitting data, and it only transmits data when the channel is idle Thus, the network devices can distinguish between an idle and a busy cable Multiple Access (MA) means: All network devices access the same transmission medium in a competitive way Collision Detection (CD) means: Each network device also monitors the channel during transmission, in order to detect collisions and to perform error handling, when needed

Prof. Dr. Christian Baun 6th Slide Set Computer Networks Frankfurt University of Applied Sciences WS1718 7/36 Functioning of CSMA/CD (1/2) Image Source: Wikipedia If a network device wants to transmit frames via Ethernet, it operates according to the following sequence 1 Monitor the transmission medium Transmission medium is idle = step 2 Transmission medium is busy = step 3 2 Start transmission and continue to monitor the transmission medium Successful transmission Send success message to upper network layers = step 5 Collision is detected Stop frame transmission and send the 48 bits long (jam signal) to announce the collision = step 3

Prof. Dr. Christian Baun 6th Slide Set Computer Networks Frankfurt University of Applied Sciences WS1718 8/36 Functioning of CSMA/CD (2/2) Image Source: Wikipedia 3 Transmission medium is busy. Check the number of transmission attempts: Maximum number not yet reached Wait a random time = step 1 The random time is calculated using the backoff method Maximum number is reached = step 4 4 Error Maximum number of transmission attempts reached Send error message to upper network layers = step 5 5 Leave transmission mode

Prof. Dr. Christian Baun 6th Slide Set Computer Networks Frankfurt University of Applied Sciences WS1718 9/36 Example of CSMA/CD

Prof. Dr. Christian Baun 6th Slide Set Computer Networks Frankfurt University of Applied Sciences WS1718 10/36 Network Size and Collision Detection A collision must be detected by the sender It is important that the transmission of a frame is not completed when a collision occurs Otherwise, the network device might already be finished with sending the frame and believes the transmission was successful Each frame must have a certain minimum length It must be dimensioned in a way, that the transmission duration for a frame with minimum length does not fall below the maximum RTT (round trip time) The RTT is the time it takes for a frame to travel from one end of the network to the most distant end and return back This ensures that a collision reaches the sender before its transmission is finished If a sender detects a collision, it knows that its frame has not arrived correctly at the receiver, and can try the transmission again later Ethernet specifies a maximum network size and a minimum frame length Minimum frame length for Ethernet: 64 Bytes Maximum length of the physical network depends of the Ethernet standard used

Prof. Dr. Christian Baun 6th Slide Set Computer Networks Frankfurt University of Applied Sciences WS1718 11/36 Minimum Frame Length and Collision Detection (Example) Ethernet specifies a maximum network size and a minimum frame length The minimum frame length, where collision detection is still possible, is calculated as follows: P = 2 U D V P = Minimum frame length in bits U = Data transmission speed of the transmission medium in bits per second (bps) D = Network length in meters V = Signal speed on the transmission medium in meters per second (mps) Calculation example for 10BASE5 with 10 Mbps and coaxial cables: U = 10 Mbps = 10,000,000 bps D = 2, 500 meters (this is the maximum length for 10BASE5) V = speed of light velocity factor Speed of light = 299,792,458 m/s Velocity factor = 0.77 for coaxial cables V = 299, 792, 458 m/s 0.77 231, 000, 000 m/s P = 2 10 10 6 2,500 bps m 217 Bits 28 Bytes 231 10 6 m/s Outcome: The minimum frame length of 64 Bytes for Ethernet is more than enough

Prof. Dr. Christian Baun 6th Slide Set Computer Networks Frankfurt University of Applied Sciences WS1718 12/36 Velocity Factor (Wave Propagation Speed) The velocity factor, also called wave propagation speed, depends on transmission medium and is: 1 for vacuum 0.6 for twisted pair cables 0.67 for optical fiber 0.77 for coaxial cables Describes the speed of a signal on a transmission medium relative to the speed of light

Prof. Dr. Christian Baun 6th Slide Set Computer Networks Frankfurt University of Applied Sciences WS1718 13/36 Network Size and Collision Detection (Example) The maximum network size, where collision detection is still possible, is calculated as follows: 2 S max = V t frame S max = Maximum network size with collision detection V = Signal speed of the transmission medium in meters per second (mps) t frame = transmission duration of a frame in seconds Calculation example for 10BASE5 with 10 Mbps and coaxial cables: V = 231, 000, 000 m/s = 231 10 6 m/s Transmission duration t frame = Transmission duration for a single bit, multiplied with the number of bits in a frame (= 512 Bits = 64 Bytes) The transmission duration for a single bit at 10 Mbps is 0.1 microseconds A frame with the minimum frame length of 64 Bytes requires 51.2µs for a complete transmission A 51.2µs long frame travels in the coaxial cable the following distance: 231 10 6 m s 51.2 10 6 s = 11, 827.20 m = 11.83 km Outcome: With a maximum network size of 2.5 km collision detection is possible

Prof. Dr. Christian Baun 6th Slide Set Computer Networks Frankfurt University of Applied Sciences WS1718 14/36 CSMA/CD nowadays The media access method CSMA/CD is absolutely necessary only for Ethernet networks, which implement the bus network topology Reason: In a bus network topology, all network devices are directly connected to a shared transmission medium Almost all Ethernet-based networks nowadays are switched networks and therefore collision-free

Prof. Dr. Christian Baun 6th Slide Set Computer Networks Frankfurt University of Applied Sciences WS1718 15/36 Media Access Control Method CSMA/CA of WLAN CSMA/CD cannot be used with wireless networks With CSMA/CD, the sender detects occurring collisions In wired networks, with a shared transmission medium, each participant receives the transmissions of all other participants Therefore, each participant detects any collision For wireless networks like WLAN, this is not always the case Therefore, the media access method Carrier Sense Multiple Access / Collision Avoidance (CSMA/CA) is used, which tries to minimize the occurrence of collisions Special challenges of the transmission medium in wireless networks cause undetected collisions at the receiver Hidden terminal problem Fading LowerLAN / Powerline also uses CSMA/CA as media access method Source: Analysis of CSMA/CA used in Power Line Communication. Martin Koutny, Petr Mlynek, Jiri Misurec. IEEE (2013)

Prof. Dr. Christian Baun 6th Slide Set Computer Networks Frankfurt University of Applied Sciences WS1718 16/36 Special Characteristics of the Transmission Medium Hidden terminal problem (caused by invisible/hidden terminal device) X and Y both send frames to the Access Point Because of obstacles, the stations X and Y can not detect their transmissions, although they interfere each other at the Access Point Fading (decreasing signal strength) X and Y both send frames to the Access Point The electromagnetic waves are weakened by obstacles and in free space Caused by the positions of X and Y to each other, their signals are so weak, that the stations cannot detect each others transmissions Source: Computernetzwerke, James F. Kurose, Keith W. Ross, Pearson (2008)

Prof. Dr. Christian Baun 6th Slide Set Computer Networks Frankfurt University of Applied Sciences WS1718 17/36 WLAN (802.11) implements 3 different Media Access Control Methods 1 CSMA/CA Strategy: Listen before talk Collision avoidance via random backoff time Minimum spacing between frames, when a sequence of frames shall be transmitted Acknowledgements ACK (not for broadcast) Default method which is implemented in all WLAN devices 2 CSMA/CA RTS/CTS (Request To Send/Clear To Send) Solves the problem of hidden terminals Optional method and implemented in most WLAN devices 3 CSMA/CA PCF (Point Coordination Function) Access Point controls the access to the transmission medium Optional method and seldom implemented Source: Lecture slides of Prof. Dr. Michael Massoth and Wikipedia

Prof. Dr. Christian Baun 6th Slide Set Computer Networks Frankfurt University of Applied Sciences WS1718 18/36 Transmission of Frames If a participant, which transmits frames, detects a collision via CSMA/CD (Ethernet), it aborts the transmission of the frame WLAN does not use collision detection, but with CSMA/CA it makes use of collision avoidance (actually it is just a collision minimization) If a station started transmitting a frame, it will transmit the entire frame in any case If a station has started to transfer a frame, there is no way back For this reason, the sender must be able to detect, if a frame has not arrived correctly at destination Solution: The receiver confirms by ACK that the frame was received correctly

Prof. Dr. Christian Baun 6th Slide Set Computer Networks Frankfurt University of Applied Sciences WS1718 19/36 Functioning of CSMA/CA 1/5 First, the sender listens to the transmission medium (= carrier sense) The transmission medium needs to be idle for a short period This period is called Distributed Interframe Spacing (DIFS) 50µs If the transmission medium is idle for the duration of 1 DIFS, the station can send start to transmit a frame

Prof. Dr. Christian Baun 6th Slide Set Computer Networks Frankfurt University of Applied Sciences WS1718 20/36 Functioning of CSMA/CA 2/5 If a station receives a frame, which passes the CRC check, it waits for a short period This period is called Short Interframe Spacing (SIFS) 10µs Next, the receiver sends an acknowledgement frame (ACK) DIFS and SIFS guarantee for CSMA/CA a minimum spacing, when a sequence of frames shall be transmitted

Prof. Dr. Christian Baun 6th Slide Set Computer Networks Frankfurt University of Applied Sciences WS1718 21/36 Functioning of CSMA/CA 3/5 If another DIFS with an idle transmission medium has expired, a backoff time is calculated The backoff time is calculated by using a random value between the minimum and maximum contention window and multiplying this random value with the slot time After the backoff time has expired, the frame is transmitted Source: Grundkurs Computernetzwerke, Jürgen Scherff, Vieweg + Teubner (2010) If during the backoff time period, another station occupies the transmission medium, the counter is stopped until the transmission medium is idle again for the duration of at least one DIFS.

Prof. Dr. Christian Baun 6th Slide Set Computer Networks Frankfurt University of Applied Sciences WS1718 22/36 Functioning of CSMA/CA 4/5 Minimum CW, maximum CW and slot time depend on the modulation method used and are fixed Modulation method SIFS DIFS 1 Slot Time Minimal CW Maximum CW FHSS (802.11) 28 µs 128 µs 50 µs 15 1023 DSSS (802.11b) 10 µs 50 µs 20 µs 31 1023 OFDM (802.11a/h/n/ac) 16 µs 34 µs 9 µs 15 1023 OFDM (802.11g) 2 16 µs 34 µs 9 µs 15 1023 OFDM (802.11g) 3 10 µs 50 µs 20 µs 15 1023 1 DIFS = SIFS + 2 Slot Time 2 Supports data rates 1-54 Mbps 3 Supports only data rates > 11 Mbps Lower bound and upper bound of the CW are always a power of 2, and from the result, value 1 is subtracted If a WLAN uses e.g. the modulation method OFDM... at the 1 st attempt to transmit, the CW is 15 and 31 at the 2 nd attempt to transmit, the CW is 31 and 63 at the 3 rd attempt to transmit, the CW is 63 and 127

Prof. Dr. Christian Baun 6th Slide Set Computer Networks Frankfurt University of Applied Sciences WS1718 23/36 Functioning of CSMA/CA 5/5 Modulation method SIFS DIFS 1 Slot Time Minimal CW Maximum CW FHSS (802.11) 28 µs 128 µs 50 µs 15 1023 DSSS (802.11b) 10 µs 50 µs 20 µs 31 1023 OFDM (802.11a/h/n/ac) 16 µs 34 µs 9 µs 15 1023 OFDM (802.11g) 2 16 µs 34 µs 9 µs 15 1023 OFDM (802.11g) 3 10 µs 50 µs 20 µs 15 1023 1 DIFS = SIFS + 2 Slot Time 2 Supports data rates 1-54 Mbps 3 Supports only data rates > 11 Mbps Further transmission attempts cause the CW to rise exponentially until the maximum value is reached As soon as a transmission of a frame was successful and the frame has been acknowledged via ACK, the lower bound of the CW is set to the minimum CW value in the table Source: Wireless LANs, Jörg Rech, Heise (2012)

Prof. Dr. Christian Baun 6th Slide Set Computer Networks Frankfurt University of Applied Sciences WS1718 24/36 CSMA/CA RTS/CTS CSMA/CA reduces the number of collisions But it cannot avoid all collisions An improved collision avoidance provides CSMA/CA RTS/CTS Concept: Sender and receiver exchange control frames first This way, all stations in the network learn that a transmission will start soon Control frames: Request To Send (RTS) and Clear To Send (CTS) Both control frames contain a field, which indicates how long the transmission medium (the channel) will be occupied (see slides 28 + 29) Collisions can only occur during the transmission of RTS and CTS frames Because of the hidden terminal problem Figure on left side... Station Y cannot receive the RTS frame from X, but the CTS frame from the Access Point

Functioning of CSMA/CA RTS/CTS 1/3 After the DIFS, the sender transmits a RTS frame to the receiver The RTS frame contains a field, which specifies the period, the sender wants to reserve (use) the transmission medium (the channel) to transmit the frame The receiver acknowledges the reservation request by waiting the SIFS and then transmitting a CTS frame, which also contains the period of time, the sender wants to reserve the transmission medium The receiver confirms this way the period which is required to transmit the data frame Prof. Dr. Christian Baun 6th Slide Set Computer Networks Frankfurt University of Applied Sciences WS1718 25/36

Functioning of CSMA/CA RTS/CTS 2/3 After the receiver successfully received the data frame, it waits for the period of a SIFS and transmits an ACK frame to the sender if the transmission medium (the channel) is occupied, no further station tries to transmit a frame, until the end of the Network Allocation Vector (NAV) NAV is a counter variable, which is maintained by each node itself Reduces the number of collisions Contains the expected occupation time of the transmission medium Is decremented over time, until it reaches value 0 Prof. Dr. Christian Baun 6th Slide Set Computer Networks Frankfurt University of Applied Sciences WS1718 26/36

Prof. Dr. Christian Baun 6th Slide Set Computer Networks Frankfurt University of Applied Sciences WS1718 27/36 Functioning of CSMA/CA RTS/CTS 3/3 Advantages Fewer collisions, because it solves the problem of hidden terminals Less energy consumption, because no transmission attempts during NAV Drawbacks: The reservation of the transmission medium causes delays The RTS and CTS frames are overhead

Prof. Dr. Christian Baun 6th Slide Set Computer Networks Frankfurt University of Applied Sciences WS1718 28/36 WLAN Control Frames (Special Frames) RTS Frame The control frames RTS, CTS and ACK have a different structure compared with data frames Length of RTS frames: 20 bytes With the RTS frame, a station, which wants to transmit frames, sends a reservation request for the transmission medium to the Access Point 1 st address field = MAC address of the access point 2 nd address field = MAC address of the station, which sends the request

Prof. Dr. Christian Baun 6th Slide Set Computer Networks Frankfurt University of Applied Sciences WS1718 29/36 WLAN Control Frames (Special Frames) CTS Frame Length of CTS frames: 14 bytes With a CTS frame, an Access Point confirms the reservation request for the transmission medium address = MAC address of the station, which sent the reservation request

Prof. Dr. Christian Baun 6th Slide Set Computer Networks Frankfurt University of Applied Sciences WS1718 30/36 WLAN Control Frames (Special Frames) ACK Frame Length of ACK frames: 14 bytes With an ACK frame, the receiver confirms the successful transmission of a frame at the sender address = MAC address of the station, which transmitted the frame successfully

Prof. Dr. Christian Baun 6th Slide Set Computer Networks Frankfurt University of Applied Sciences WS1718 31/36 CSMA/CA RTS/CTS in Practice CSMA/CA RTS/CTS is optional for WLAN but mostly implemented In practice, it is used for reserving channels for the transmission of large data frames For each station, a RTS threshold value can be specified (driver?) This way it can be defined that RTS/CTS is used only when a frame is bigger than the threshold value Often, the default threshold value is higher than the maximum frame length (2,346 byte) for IEEE 802.11 Then, the RTS/CTS sequence can be left out for all transmitted data frames Source: Computernetzwerke, James F. Kurose, Keith W. Ross, Pearson (2008) Image source: http://www.itedge.net Screenshot from the web gui of a Netgear WGPS606 wireless router

Prof. Dr. Christian Baun 6th Slide Set Computer Networks Frankfurt University of Applied Sciences WS1718 32/36 CSMA/CA PCF PCF = Point Coordination Function The Access Point controls the media access It requests the registered stations to transmit data frames The approach is called polling CSMA/CA PCF is an optional method and seldom implemented For this reason, it is not discussed here in detail

Prof. Dr. Christian Baun 6th Slide Set Computer Networks Frankfurt University of Applied Sciences WS1718 33/36 Functioning of ARP (1/2) The Address Resolution Protocol (ARP) is used to convert IP addresses of the Network Layer to MAC address of the Data Link Layer If a network device wants to transmit data to a receiver, it uses the receiver s IP address on the Network Layer But on the Data Link Layer, the MAC address is required Therefore, address resolution must be carried out in the Data Link Layer To find out the MAC address of a network device in the LAN, ARP sends a frame with the MAC broadcast address FF-FF-FF-FF-FF-FF as destination address Each network device in the LAN receives and analyzes this frame The frame contains the IP address of the searched network device If a network device with this IP address feels addressed, it sends an ARP reply to the sender The reported MAC address stores the sender in its local ARP cache

Prof. Dr. Christian Baun 6th Slide Set Computer Networks Frankfurt University of Applied Sciences WS1718 34/36 Functioning of ARP (2/2) The ARP cache is used to speed up the address resolution It contains a table with these information for each entry: Protocol type (IP) Protocol address of the sender (IP address) Hardware address of the sender (MAC address) Time To Live (TTL) The TTL is set by the operating system If an entry in the table is used, the TTL is extended Modern Linux distributions discard entries after 5 minutes The ARP cache can be displayed via arp -n or ip neighbour # arp -n Address HWtype HWaddress Flags Mask Iface 192.168.178.1 ether 9c:c7:a6:b9:32:aa C wlan0 192.168.178.24 ether d4:85:64:3b:9f:65 C wlan0 192.168.178.41 ether ec:1f:72:70:08:25 C wlan0 192.168.178.25 ether cc:3a:61:d3:b3:bc C wlan0 Address resolution requests can be send manually via arping

Prof. Dr. Christian Baun 6th Slide Set Computer Networks Frankfurt University of Applied Sciences WS1718 35/36 Structure of ARP Messages (1/2) ARP messages are transmitted as payload via Ethernet frames type = 0x0806 (for the ARP protocol) HLEN = hardware address (MAC address) length in bytes For Ethernet: 6 bytes PLEN = IP address length in bytes For IPv4: 4 bytes

Prof. Dr. Christian Baun 6th Slide Set Computer Networks Frankfurt University of Applied Sciences WS1718 36/36 Structure of ARP Messages (2/2) ARP request MAC address (sender) = MAC address of requesting host MAC address (target) = content is irrelevant IP address (sender) = IP address of requesting host IP address (target) = IP address of searched host ARP reply MAC address (sender) = MAC address of responding host MAC address (target) = MAC address of requesting host IP address (sender) = IP address of responding host IP address (target) = IP address of requesting host