0% found this document useful (0 votes)
24 views

02-Network Protocols Architecture

The document discusses various topics related to network protocols and architectures: 1. It describes different LAN topologies including bus, ring, tree, and star and issues related to inherently broadcast and multi-access networks. 2. It discusses medium access control protocols including centralized vs distributed, synchronous vs asynchronous, and examples like round-robin, reservation, and contention-based protocols. 3. It provides an overview of standardized MAC protocols for different topologies, the IEEE 802 standards, and the LLC and encapsulation.
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
24 views

02-Network Protocols Architecture

The document discusses various topics related to network protocols and architectures: 1. It describes different LAN topologies including bus, ring, tree, and star and issues related to inherently broadcast and multi-access networks. 2. It discusses medium access control protocols including centralized vs distributed, synchronous vs asynchronous, and examples like round-robin, reservation, and contention-based protocols. 3. It provides an overview of standardized MAC protocols for different topologies, the IEEE 802 standards, and the LLC and encapsulation.
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 64

Network Protocol & Architecture

Febriliyan Samopa
v
LAN Topologies

Star
Ring

Tree
Central node

Bus
Bus Topology

• Use of multipoint medium.


• Stations attach to bus through tap.
• Full-duplex communication allows data to be
sent to/received from bus.
• Transmission from any station propagates in
both directions and is received by all.
• At each end, terminator absorbs and removes
signal from bus.
Tree Topology
• Tree is generalization of bus.
• Headend: start of 1 or more cables (branches).
• Transmission from one station propagates to all
others.
Issues

• Inherently broadcast.
• Frames to transmit data.
• Need for specifying the destination addresses.
• Multi-access.
• Need for controlling access to medium.
• Avoid collisions.
• MAC protocol.
Ring Topology

• Stations attach to repeaters.


• Repeaters are linked to each other by point-to-point
links forming a closed loop.
• Links are unidirectional.
• Repeaters: receive data from one link and repeat it on
the other with no buffering.
Ring

• Stations transmit/receive via repeater.


• Frames circulate past all stations; destination copies
frame as it goes by; source removes frame.
• Ring shared by multiple stations.
• Need MAC protocol.
• Determine when each station may insert frame.
Star Topology

• Each station directly connected to central node


via point-to-point link.
• Central node’s modes of operation:
• Broadcast mode: node broadcasts received
frame on all other links; logically works like
bus.
• Switching mode: node sends frame out only
on the link to the destination.
• Central node as single-point of failure.
Medium Access Control
• Control access to shared medium.
• Where and how?
• Where: centralized versus decentralized.
• How: synchronous versus asynchronous.
Centralized versus Distributed MAC
• Centralized approaches:
• Controller grants access to medium.
• Simple, greater control: priorities, qos.
• But, single point of failure and performance
bottleneck.
• Decentralized schemes:
• All stations collectively run MAC to decide when to
transmit.
Synchronous versus Asynchronous
• Synchronous approaches:
• Static channel allocation.
• Examples: FDM, TDM.
• Simple but inefficient.
• Asynchronous or dynamic:
• Example: STDM.
• 3 categories: round-robin, reservation, and
contention.
Round-Robin MAC

• Each station is allowed to transmit; station may


decline or transmit (bounded by some maximum
transmit time).
• Centralized (e.g., polling) or distributed control
of who is next to transmit.
• When done, station relinquishes and right to
transmit goes to next station.
• Efficient when many stations have data to
transmit over extended period (stream).
Reservation

• Time divided into slots.


• Station reserves slots in the future.
• Multiple slots for extended transmissions.
• Suited to stream traffic.
Contention

• No control.
• Stations try to acquire the medium.
• Distributed in nature.
• Perform well for bursty traffic.
• Can get very inefficient under heavy load.

• NOTE: round-robin and contention are the most


common.
Standardized MACs

Topologies
Techniques Bus Ring
Token bus Token ring
Round robin (802.4) (802.5; FDDI)
Polling
(802.11)
Reservation DQDB
(802.6)
Contention CSMA/CD
(802.3)
CSMA(802.11)
LLC for LANs

• Similar functions as general LLCs.


• But it has to interface with MAC sublayer.
• LLC functions:
• Addressing: source and destination.
• LLC address versus MAC address.
• Control data exchange between 2 users.
• User as higher-layer protocol in the station.
Encapsulation

Application data
TCP
header
IP
header
LLC
header
MAC MAC
header trailer

TCP segment
IP datagram
LLC PDU
MAC frame
LLC Services
• 3 different services:
1.Unacknowledged connectionless (type 1).
• No error or flow control.
• No delivery guarantees.
2.Connection-mode (type 2).
• Logical connection established.
• Flow and congestion control provided.
3.Acknowledged connectionless (type 3).
• No logical connection.
• Flow and error control.
IEEE 802 Standards

The 802 working groups. The important ones are


marked with *. The ones marked with  are
hibernating. The one marked with † gave up.
LLC (802.2) Protocol

• Similar to HDLC (ISO standard).


• LLC PDU (protocol data unit):

1 byte 1 byte 1 or 2 bytes variable


DSAP SSAP LLC control Information
Wireless LANs
• Use wireless transmission media.
• Infrared (IR): limited to indoors and single room
(IR is light -- doesn’t penetrate walls).
• Radio
• Narrowband microwave.
• Spread Spectrum LANs.
Wireless LAN Applications
• Nomadic access (e.g., users roaming around
campus).
• LAN interconnection (e.g., across buildings).
• Ad Hoc Networks (e.g., disaster relief crew).
• Sensor Networks
MAC Protocols
• Contention-based
• ALOHA and Slotted ALOHA.
• CSMA.
• CSMA/CD.
• Round-robin : token-based protocols.
• Token bus.
• Token ring.
CSMA
• Maximum utilization is function of frame size and
propagation time.
• Longer frames or shorter propagation time,
higher utilization.
CSMA Flavors
• 1-persistent CSMA (IEEE 802.3)
• If medium idle, transmit; if medium busy, wait
until idle; then transmit with p=1.
• If collision, waits random period and starts
again.
• Non-persistent CSMA: if medium idle, transmit;
otherwise wait a random time before re-trying.
• P-persistent: when channel idle detected,
transmits packet in the first slot with probability =
p.
CSMA/CD
• CSMA with collision detection.
• Problem: when frames collide, medium is
unusable for duration of both (damaged) frames.
• For long frames (when compared to propagation
time), considerable waste.
• Why not listen while transmitting?
CSMA/CD Protocol

• 1. If medium idle, transmit; otherwise 2.


• 2. If medium busy, wait until idle, then transmit
with p=1.
• 3. If collision detected, transmit brief jamming
signal and abort transmission.
• 4. After aborting, wait random time, try again.
CSMA with Collision Detection

• If collision detected, immediately abort


transmission
• CSMA/CD can be in one of three states:
• contention, transmission, or idle.
CSMA/CD Performance

• Wasted capacity restricted to time to detect


collision.
• Time to detect collision < 2*maximum propagation
delay.
(page 258 of Tannenbaum Text)
• Rule in CSMA/CD protocols: frames long enough
to allow collision detection prior to end of
transmission.
(need to be still listening)
• CSMA/CD is thus half-duplex
Persistent and Nonpersistent CSMA

• Comparison of the channel utilization


versus load for various random access
protocols.
IEEE 802 Standards

The 802 working groups. The important ones are


marked with *. The ones marked with  are
hibernating. The one marked with † gave up.
IEEE 802.2: Logical Link Control

• (a) Position of LLC. (b) Protocol


formats.
Wireless LANs

• The 802.11 Protocol Stack


• The 802.11 Physical Layer
• The 802.11 MAC Sublayer Protocol
• The 802.11 Frame Structure
• Services
Wireless LANs

• (a) Wireless networking with a base


station.
• (b) Ad hoc networking.
Wireless LANs (2)

• The range of a single radio may not cover


the entire system.
Wireless LANs (3)
• A multicell 802.11 network.
Wireless LANs

• IEEE 802.11
• Distributed access control mechanism (DCF)
based on CSMA with optional centralized
control (PCF).
• Contention-free
Service (polling)
MAC PCF Contention
layer Service
DCF
(CSMA)
Physical Layer
MAC in Wireless LANs

• Distributed coordination function (DCF) uses


CSMA-based protocol (e.g., ad hoc networks).
• CD does not make sense in wireless.
• Hard for transmitter to distinguish its own
transmission from incoming weak signals and
noise.
• Point coordination function (PCF) uses
polling to grant stations their turn to transmit
(e.g., cellular networks).
The 802.11 Protocol Stack
• Part of the 802.11 protocol stack.
The 802.11 MAC Sublayer Protocol

• (a) The hidden station problem.


• (b) The exposed station problem.
The 802.11 MAC Sublayer Protocol (2)
• The use of virtual channel sensing using
CSMA/CA.
The 802.11 MAC Sublayer Protocol (3)
• A fragment burst.
The 802.11 MAC Sublayer Protocol (4)
• Interframe spacing in 802.11.
The 802.11 Frame Structure
• The 802.11 data frame.
802.11 Services

Distribution Services

• Association
• Disassociation
• Reassociation
• Distribution
• Integration
802.11 Services

Intracell Services
• Authentication
• Deauthentication
• Privacy
• Data Delivery
Broadband Wireless

• Comparison of 802.11 and 802.16


• The 802.16 Protocol Stack
• The 802.16 Physical Layer
• The 802.16 MAC Sublayer Protocol
• The 802.16 Frame Structure
The 802.16 Protocol Stack
• The 802.16 Protocol Stack.
The 802.16 Physical Layer
• The 802.16 transmission environment.
The 802.16 Physical Layer (2)
• Frames and time slots for time division
duplexing.
The 802.16 MAC Sublayer Protocol

• Service Classes
• Constant bit rate service
• Real-time variable bit rate service
• Non-real-time variable bit rate service
• Best efforts service
The 802.16 Frame Structure
• (a) A generic frame. (b) A bandwidth
request frame.
Bluetooth

• Bluetooth Architecture
• Bluetooth Applications
• The Bluetooth Protocol Stack
• The Bluetooth Radio Layer
• The Bluetooth Baseband Layer
• The Bluetooth L2CAP Layer
• The Bluetooth Frame Structure
Bluetooth Architecture
• Two piconets can be connected to form a
scatternet.
Bluetooth Applications
• The Bluetooth profiles.
The Bluetooth Protocol Stack
• The 802.15 version of the Bluetooth
protocol architecture.
The Bluetooth Frame Structure
• A typical Bluetooth data frame.
See more recent info on this at: http://www.usb.org/developers/wusb/
Summary

• Channel allocation methods and systems for a common


channel.
Data Link Layer Switching

• Bridges from 802.x to 802.y


• Local Internetworking
• Spanning Tree Bridges
• Remote Bridges
• Repeaters, Hubs, Bridges, Switches, Routers,
Gateways
• Virtual LANs
Bridges

• Bridges used to connect multiple LANS


• Link Layer
• Do not look at anything in packets
• Work for any payload within the frame
• IPv4, IPv6, Apple Talk, etc.
• (vs. routers which work at packet (IP) level)
• Individual LANS are shared media (cable or hub)
• (Few hubs still in use – now switched Ethernet)
• LANS have promiscuous mode (i.e. “party line”)
• Bridges provide isolation between LANS
Data Link Layer Switching
• Multiple LANs connected by a backbone to
handle a total load higher than the capacity
of a single LAN.

You might also like