Dynamic Channel Allocation in Lans and Mans
Dynamic Channel Allocation in Lans and Mans
Dynamic Channel Allocation in Lans and Mans
to a sublayer of the data link layer The MAC sublayer is especially important in LANs, many of which use a multiaccess channel as the basis for communication. MAC sublayer is the bottom part of the data link layer, so logically we should have studied it before examining all the point-to-point protocols
The traditional way of allocating a single channel, such as a telephone trunk, among multiple competing users is Frequency Division Multiplexing (FDM). FDM is a simple and efficient allocation mechanism
ALOHA
In the 1970s, Norman Abramson and his colleagues at the University of Hawaii devised a new and elegant method to solve the channel allocation problem. Their work has been extended by many researchers since then (Abramson, 1985). Although Abramson's work, called the ALOHA system, used ground-based radio broadcasting, the basic idea is applicable to any system in which uncoordinated users are competing for the use of a single shared channel
Pure ALOHA
The basic idea of an ALOHA system is simple: let users transmit whenever they have data to be sent. CONTENTION SYSTEMS. Systems in which multiple users share a common channel in a way that can lead to conflicts
Slotted ALOHA
In 1972, Roberts published a method for doubling the capacity of an ALOHA system (Roberts, 1972). Roberts' method, which has come to be known as slotted ALOHA, in contrast to Abramson's pure ALOHA, a computer is not permitted to send whenever a carriage return is typed. Instead, it is required to wait for the beginning of the next slot.
CSMA with Collision Detection is widely used on LANs in the MAC sublayer
A Bit-Map Protocol first collision-free protocol, the basic bit-map method, each contention period consists of exactly N slots
reservation protocols
a protocols like this in which the desire to transmit is broadcast before the actual transmission
Binary Countdown The bits in each address position from different stations are BOOLEAN ORed together. We will call this protocol binary countdown
limited-contention protocols (Wavelength Division Multiple Access), The protocol supports three traffic classes : (1) constant data rate connection-oriented traffic, such as uncompressed video, 2) variable data rate connection-oriented traffic, such as file transfer, and (3) datagram traffic, such as UDP packets Each station has two transmitters and two receivers, as follows: 1. A fixed-wavelength receiver for listening to its own control channel. 2. A tunable transmitter for sending on other stations' control channels. 3. A fixed-wavelength transmitter for outputting data frames. 4. A tunable receiver for selecting a data transmitter to listen DWDM (Dense Wavelength Division Multiplexing)
o
hidden station problem
a large number of frequencies are being used, the system is sometimes called DWDM (Dense Wavelength Division Multiplexing)
o
exposed station problem
the problem of a station not being able to detect a potential competitor for the medium because the competitor is too far away
when in fact such a transmission would cause bad reception only in the zone between B and C, where neither of the intended receivers is located. This is called the exposed station problem
An early protocol designed for wireless LANs is MACA (Multiple Access with Collision Avoidance) (Karn, 1990) RTS (Request To Send) CTS (Clear to Send)
Ethernet
The most important of the survivors are 802.3 (Ethernet) and 802.11 (wireless LAN). With 802.15 (Bluetooth) and 802.16 (wireless MAN), it is too early to tell. Please consult the 5th edition of this book to find out. Both 802.3 and 802.11 have different physical layers and different MAC sublayers but converge on the same logical link control sublayer (defined in 802.2), so they have the same interface to the network layer.
Ethernet Cabling
The most common kinds of Ethernet cabling.
10Base5 cabling, popularly called thick Ethernet, came first Connections to it are generally made using vampire taps, in which a pin is very carefully forced halfway into the coaxial cable's core. the second cable type was 10Base2, or thin Ethernet, which, in contrast to the garden-hose-like thick Ethernet, bends easily By carefully timing the interval between sending the pulse and receiving the echo, it is possible to localize the origin of the echo. This technique is called time domain reflectometry Transceiver o is clamped securely around the cable so that its tap makes contact with the inner core
Three kinds of Ethernet cabling. (a) 10Base5. (b) 10Base2. (c) 10Base-T.
Multicast o Sending to a group of stations
binary exponential backoff was chosen to dynamically adapt to the number of stations trying to send
Gigabit Ethernet
It was quickly dubbed gigabit Ethernet and was ratified by IEEE in 1998 under the name 802.3z. This identifier suggests that gigabit Ethernet is going to be the end of the line unless somebody quickly invents a new letter after z frame bursting,
LLC (Logical Link Control), o hides the differences between the various kinds of 802 networks by providing a single format and interface to the network layer FHSS (Frequency Hopping Spread Spectrum) o uses 79 channels, each 1-MHz wide, starting at the low end of the 2.4-GHz ISM band. The third modulation method, DSSS (Direct Sequence Spread Spectrum), is also restricted to 1 or 2 Mbps. Each bit is transmitted as 11 chips, using what is called a Barker sequence The first of the high-speed wireless LANs, 802.11a, uses OFDM (Orthogonal Frequency Division Multiplexing) HR-DSSS (High Rate Direct Sequence Spread Spectrum), another spread spectrum technique, which uses 11 million chips/sec to achieve 11 Mbps in the 2.4-GHz band. It is called 802.11b but is not a follow-up to 802.11a DCF (Distributed Coordination Function), does not use any kind of central control (in that respect, similar to Ethernet). The other, called PCF (Point Coordination Function), uses the base station to control all activity in its cell.
When DCF is employed, 802.11 uses a protocol called CSMA/CA (CSMA with Collision Avoidance). In this protocol, both physical channel sensing and virtual channel sensing are used. Two methods of operation are supported by CSMA/CA. SIFS (Short InterFrame Spacing). It is used to allow the parties in a single dialog the chance to go first. PIFS (PCF InterFrame Spacing) elapses, the base station may send a beacon frame or poll frame. DIFS (DCF InterFrame Spacing) elapses, any station may attempt to acquire the channel to send a new frame. EIFS (Extended InterFrame Spacing), is used only by a station that has just received a bad or unknown frame to report the bad frame WEP (Wired Equivalent Privacy) algorithm.
Services
1. Association. This service is used by mobile stations to connect themselves to base stations. 2. Disassociation. Either the station or the base station may disassociate, thus breaking the relationship. 3. . Reassociation. A station may change its preferred base station using this service. This facility is useful for mobile stations moving from one cell to another. If it is used correctly, no data will be lost as a consequence of the handover. (But 802.11, like Ethernet, is just a best-efforts service.) 4. . Distribution. This service determines how to route frames sent to the base station. If the destination is local to the base station, the frames can be sent out directly over the air. Otherwise, they will have to be forwarded over the wired network. 5. Integration. If a frame needs to be sent through a non-802.11 network with a different addressing scheme or frame format, this service handles the translation from the 802.11 format to the format required by the destination network. The remaining four services are intracell (i.e., relate to actions within a single cell). They are used after association has taken place and are as follows. 1. Authentication. Because wireless communication can easily be sent or received by unauthorized stations, a station must authenticate itself before it is permitted to send data. After a mobile station has been associated by the base station (i.e., accepted into its cell), the base station sends a special challenge frame to it to see if the mobile station knows the secret key (password) that has been assigned to it. It proves its knowledge of the secret key by encrypting the challenge frame and sending it back to the base station. If the result is correct, the mobile is fully enrolled in the cell. In the initial standard, the base station does not have to prove its identity to the mobile station, but work to repair this defect in the standard is underway.
2. Deauthentication. When a previously authenticated station wants to leave the network, it is deauthenticated. After deauthentication, it may no longer use the network. 3. Privacy. For information sent over a wireless LAN to be kept confidential, it must be encrypted. This service manages the encryption and decryption. 4. Data delivery. Finally, data transmission is what it is all about, so 802.11 naturally provides a way to transmit and receive data wireless MAN (Metropolitan Area Network) or a wireless local loop. FDD (Frequency Division Duplexing) and TDD (Time Division Duplexing).
Bluetooth
The project was named Bluetooth, after Harald Blaatand (Bluetooth) II (940-981), a Viking king who unified (i.e., conquered) Denmark and Norway, also without cables. The basic unit of a Bluetooth system is a piconet, which consists of a master node and up to seven active slave nodes within a distance of 10 meters. An interconnected collection of piconets is called a scatternet.
LOCAL INTERNETWORKING
The algorithm used by the transparent bridges is backward learning The routing procedure for an incoming frame depends on the LAN it arrives on (the source LAN) and the LAN its destination is on (the destination LAN), as follows: 1. If destination and source LANs are the same, discard the frame. 2. If the destination and source LANs are different, forward the frame. 3. If the destination LAN is unknown, use flooding.
The resulting concept is called a VLAN (Virtual LAN) and has even been standardized by the 802 committee. It is now being deployed in many organizations. Let us now take a look at it. So far we have assumed that bridges and switches somehow know what color an incoming frame is. How do they know this? Three methods are in use, as follows: 1. Every port is assigned a VLAN color. 2. Every MAC address is assigned a VLAN color. 3. Every layer 3 protocol or IP address is assigned a VLAN color.