Module 3 Notes
Module 3 Notes
The Computer Society of the IEEE started a project, called Project 802, to set standards to enable
intercommunication among equipment from a variety of manufacturers. Project 802 does not seek
to replace any part of the OSI model or TCP/IP protocol suite. Instead, it is a way of specifying
functions of the physical layer and the data-link layer of major LAN protocols.
The Ethernet LAN was developed in the 1970s by Robert Metcalfe and David Boggs. Since then, it
has gone through four generations: Standard Ethernet (10 Mbps), Fast Ethernet (100 Mbps), Gigabit
Ethernet (1 Gbps), and 10 Gigabit Ethernet (10 Gbps), as shown in Figure 4.2.
STANDARD ETHERNET
Characteristics
Let us first discuss some characteristics of the Standard Ethernet.
Connectionless and Unreliable Service
Ethernet provides a connectionless service, which means each frame sent is independent of the
previous or next frame. Ethernet has no connection establishment or connection termination phases.
The sender sends a frame whenever it has it; the receiver may or may not be ready for it. The sender
may overwhelm the receiver with frames, which may result in dropped frames. If a frame drops, the
sender data-link layer will not know about it unless an upper-layer protocol takes care of it. Ethernet
is also unreliable. If a frame is corrupted during transmission and the receiver finds out about the
corruption, the receiver drops the frame silently. It is the duty of high-level protocols to find out
about it.
Frame Format
The Ethernet frame contains seven fields, as shown in Figure 4.3.
Preamble: This field contains 7 bytes (56 bits) of alternating 0s and 1s that alert the receiving
system to the coming frame and enable it to synchronize its clock if it’s out of synchronization. The
pattern provides only an alert and a timing pulse. The 56-bit pattern allows the stations to miss some
bits at the beginning of the frame.
Start frame delimiter (SFD): This field (1 byte: 10101011) signals the beginning of the frame. The
SFD warns the station or stations that this is the last chance for synchronization. The last 2 bits are
(11)2 and alert the receiver that the next field is the destination address.
Destination address (DA): This field is 6 bytes (48 bits) and contains the link-layer address of the
destination station or stations to receive the packet. When the receiver sees its own link-layer
address, it decapsulates the data from the frame and passes the data to the upper-layer protocol
defined by the value of the type field.
Source address (SA): This field is also 6 bytes and contains the link-layer address of the sender of
the packet.
Type. This field defines the upper-layer protocol whose packet is encapsulated in the frame. This
protocol can be IP, ARP, OSPF, and so on. In other words, it serves the same purpose as the protocol
field in a datagram and the port number in a segment or user datagram. It is used for multiplexing
and demultiplexing.
Data. This field carries data encapsulated from the upper-layer protocols. It is a minimum of 46 and
a maximum of 1500 bytes. If the data coming from the upper layer is more than 1500 bytes, it
should be fragmented and encapsulated in more than one frame. If it is less than 46 bytes, it needs
to be padded with extra 0s. A padded data frame is delivered to the upper-layer protocol as it is
(without removing the padding), which means that it is the responsibility of the upper layer to
remove or, in the case of the sender, to add the padding. The upper-layer protocol needs to know the
length of its data. For example, a datagram has a field that defines the length of the data.
CRC. The last field contains error detection information, in this case a CRC-32. The CRC is
calculated over the addresses, types, and data field. If the receiver calculates the CRC and finds that
it is not zero (corruption in transmission), it discards the frame.
Frame Length
Ethernet imposes restrictions on both the minimum and maximum lengths of a frame. An Ethernet
frame needs to have a minimum length of 512 bits or 64 bytes. Part of this length is the header and
the trailer. If we count 18 bytes of header and trailer (6 bytes of source address, 6 bytes of
destination address, 2 bytes of length or type, and 4 bytes of CRC), then the minimum length of
data from the upper layer is 64 − 18 = 46 bytes. If the upper-layer packet is less than 46 bytes,
padding is added to make up the difference.
Addressing
Each station on an Ethernet network (such as a PC, workstation, or printer) has its own network
interface card (NIC). The NIC fits inside the station and provides the station with a link-layer
address. The Ethernet address is 6 bytes (48 bits), normally written in hexadecimal notation, with a
colon between the bytes. For example, the following shows an Ethernet MAC address:
47:20:1B:2E:08:EE
Transmission of Address Bits
The way the addresses are sent out online is different from the way they are written in hexadecimal
notation. The transmission is left to right, byte by byte; however, for each byte, the least significant
bit is sent first and the most significant bit is sent last.
Figure 4.4 shows how to distinguish a unicast address from a multicast address. If the least
significant bit of the first byte in a destination address is 0, the address is unicast; otherwise, it is
multicast
Implementation
The Standard Ethernet defined several implementations, but only four of them became popular
during the 1980s. Table 4.1 shows a summary of Standard Ethernet implementations
10 Gigabit Ethernet
In recent years, there has been another look at Ethernet for use in metropolitan areas. The idea is to
extend the technology, the data rate, and the coverage distance so that Ethernet can be used as a
LAN and a metropolitan area network(MAN). The IEEE committee created 10 Gigabit Ethernet and
called it Standard 802.3ae. The goals of the 10 Gigabit Ethernet design can be summarized as
upgrading the data rate to 10 Gbps; keeping the same frame size and format; and allowing the
interconnection of LANs, MANs, and WANs possible. This data rate is possible only with fiber-
optic technology at this time. The standard defines two types of physical layers: LAN PHY and
WAN PHY. The first is designed to support existing LANs; the second actually defines a WAN with
links connected through SONET OC-192.
Implementation
10 Gigabit Ethernet operates only in full-duplex mode, which means there is no need for contention;
CSMA/CD is not used in 10 Gigabit Ethernet. Four implementations are the most common:
10GBase-SR, 10GBase-LR, 10GBase-EW, and 10GBase-X4. Table 4.4 shows a summary of these
10-Gigabit Ethernet implementations.
Wireless LANs
Wireless communication is one of the fastest-growing technologies. The demand for connecting
devices without the use of cables is increasing everywhere. Wireless LANs can be found on college
campuses, in office buildings, and in many public areas.
Characteristics
There are several characteristics of wireless LANs that either do not apply to wired LANs or the
existence of which is negligible and can be ignored
Attenuation
The strength of electromagnetic signals decreases rapidly because the signal disperses in all
directions; only a small portion of it reaches the receiver. The situation becomes worse with mobile
senders that operate on batteries and normally have small power supplies.
Interference
Another issue is that a receiver may receive signals not only from the intended sender, but also
from other senders if they are using the same frequency band.
Multipath Propagation
A receiver may receive more than one signal from the same sender because electromagnetic waves
can be reflected back from obstacles such as walls, the ground, or objects. The result is that the
receiver receives some signals at different phases (because they travel different paths). This makes
the signal less recognizable.
Error
With the above characteristics of a wireless network, we can expect that errors and error detection
are more serious issues in a wireless network than in a wired network.
Station Types
IEEE 802.11 defines three types of stations based on their mobility in a wireless LAN: no-
transition, BSS-transition, and ESS-transition mobility. A station with no-transition mobility is
either stationary (not moving) or moving only inside a BSS. A station with BSS transition mobility
can move from one BSS to another, but the movement is confined inside one ESS. A station with
ESS-transition mobility can move from one ESS to another. However, IEEE 802.11 does not
guarantee that communication is continuous during the move.
MAC Sublayer
IEEE 802.11 defines two MAC sublayers: the distributed coordination function (DCF) and the point
coordination function (PCF). Figure 4.9 shows the relationship among the two MAC sublayers, the
LLC sublayer, and the physical layer.
Addressing Mechanism
IEEE 802.11 specifies four addressing mechanism cases, defined by the value of the two flags in the
FC field, To DS and From DS. Each flag can be either 0 or 1, resulting in four different situations.
The interpretation of the four addresses (address 1 to address 4) in the MAC frame depends on the
value of these flags, as shown in Table 4.7.
Case 1:00. In this case, To DS = 0 and From DS = 0. This means that the frame is not going to a
distribution system (To DS = 0) and is not coming from a distribution system (From DS = 0). The
frame is going from one station in a BSS to another without passing through the distribution system.
The addresses are shown in Figure 4.14
Case 2:01. In this case, To DS = 0 and From DS = 1. This means that the frame is coming from a
distribution system (From DS = 1). The frame is coming from an AP and going to a station. The
addresses are as shown in Figure 4.14. Note that address 3 contains the original sender of the frame
(in another BSS).
Case 3:10. In this case, To DS = 1 and From DS = 0. This means that the frame is going to a
distribution system (To DS = 1). The frame is going from a station to an AP. The ACK is sent to the
original station. The addresses are as shown in Figure 4.14. Note that address 3 contains the final
destination of the frame in the distribution system.
Case 4:11. In this case, To DS = 1 and From DS = 1. This is the case in which the distribution
system is also wireless. The frame is going from one AP to another AP in a wireless distribution
system. Here, we need four addresses to define the original sender, the final destination, and two
intermediate APs. Figure 4.14 shows the situation.
BLUETOOTH
Bluetooth is a wireless LAN technology designed to connect devices of different functions such as
telephones, notebooks, computers (desktop and laptop), cameras, printers, and even coffee makers
when they are at a short distance from each other. A Bluetooth LAN is an ad hoc network, which
means that the network is formed spontaneously; the devices, sometimes called gadgets, find each
other and make a network called a piconet
Bluetooth was originally started as a project by the Ericsson Company. It is named for Harald
Blaatand, the king of Denmark (940–981) who united Denmark and Norway. Blaatand translates to
Bluetooth in English.
Today, Bluetooth technology is the implementation of a protocol defined by the IEEE 802.15
standard. The standard defines a wireless personal area network (WPAN) operable in an area the
size of a room or a hall.
Architecture
Bluetooth defines two types of networks: piconet and scatternet.
Piconets
A Bluetooth network is called a piconet, or a small net. A piconet can have up to eight stations, one
of which is called the primary; the rest are called secondaries. The communication between the
primary and secondary stations can be one-to-one or one-to-many. Figure 4.20 shows a piconet
Scatternet
Piconets can be combined to form what is called a scatternet. A secondary station in one piconet can
be the primary in another piconet. This station can receive messages from the primary in the first
piconet (as a secondary) and, acting as a primary, deliver them to secondaries in the second piconet.
A station can be a member of two piconets. Figure 4.21 illustrates a scatternet.
Bluetooth Layers
Bluetooth uses several layers that do not exactly match those of the Internet model we have defined
in this book. Figure 4.22 shows these layers.
The Logical Link Control and Adaptation Protocol (L2CAP) (L2 here means LL) is roughly
equivalent to the LLC sublayer in LANs. It is used for data exchange on an ACL link; SCO
channels do not use L2CAP. Figure 4.23 shows the format of the data packet at this level. The 16-
bit length field defines the size of the data, in bytes, coming from the upper layers. Data can be up
to 65,535 bytes. The channel ID (CID) defines a unique identifier for the virtual channel created at
this level. The L2CAP has specific duties: multiplexing, segmentation and reassembly, quality of
service (QoS), and group management.
Multiplexing
The L2CAP can do multiplexing. At the sender site, it accepts data from one of the upper-layer
protocols, frames them, and delivers them to the baseband layer. At the receiver site, it accepts a
frame from the baseband layer, extracts the data, and delivers them to the appropriate protocol layer.
Segmentation and Reassembly
The L2CAP divides these large packets into segments and adds extra information to define the
location of the segments in the original packet. The L2CAP segments the packet at the source and
reassembles the segments at the destination.
QoS Bluetooth allows the stations to define a quality-of-service level.
Group Management Another functionality of L2CAP is to allow devices to create a type of logical
addressing between themselves
Baseband Layer
The baseband layer is roughly equivalent to the MAC sublayer in LANs. The access method is
TDMA. The primary and secondary stations communicate with each other using time slots.
Frame Format
A frame in the baseband layer can be one of three types: one-slot, three-slot, or five-slot.
Figure 4.26 shows the format of the three frame types.