Ieeestds
Ieeestds
enterprise network
IEEE 802 is a family of standards for LANs, which defines an LLC and
802.4
802.5
Control
Physical
Physical
Layer
Layer
IEEE 802 LAN Layers
IEEE 802.3 Ethernet LANs
– The MAC layer uses CSMA/CD (Carrier Sense Multiple Access with
Collision Detection) technology.
When a computer wants to transmit a frame it:
– Listens for a frame on the cable, if busy, the computer waits for a
random time and attempts transmission again. This is known as
Carrier Sense.
– If the cable is quiet, the computer begins to transmit.
– Two computers could transmit at the same time. To prevent this
happening, the transmitting computer listens to what it is sending.
– If what it hears is different to what it is sending, then a collision has
occurred. This is known as Collision Detection.
Contd……..
– When a computer wants to receive a frame it:
Listens to all frames traveling on the cable.
If the frame address is the same as the computer’s address or the same as the
group address of the computers of which it is a member, it copies the frame from
the cable.
Otherwise it just ignores the frame.
Note: Ethernet LAN is a broadcast network. It is possible to
– Unicast a frame from one computer to any other computer connected to the
same cable.
– Broadcast a frame from one computer to all other computers connected to
the same cable.
– Multicast a frame from one computer to a subset of the computers connected
to the same cable.
Carrier Sense Multiple Access with Collision Detection
(CSMA/CD)
Frame format
– 10Base5
– 10Base2
This was the most popular 802.3 cable because it was cheap and
there was a good connection between the computer and the
coaxial cable.
• 10BaseT
• star topology is used.
• Stations are connected to a hub via two pairs of twisted
cable.
• Currently most popular since it is easy to maintain but is more
expensive.
• 10BaseF
• Good for high speed connections between buildings.
10Base5 10Base2 10BaseT
Types of Ethernet
1) FAST ETHERNET
2)GIGABIT ETHERNET
-1 Gigabit
-10 Gigabit
Token Bus – IEEE 802.4
• A network which implements the modified Token Ring protocol over a "virtual
ring" on a coaxial cable with a bus topology.
• It is mainly used for industrial applications.
1 1 1
1 1
17
Token-Passing Bus Access
Method
Physically, it is a Bus network. Logically, it is a Ring network
Receive responses
Token-Passing Bus Access
Method
Non-Token Holder
• Respond to a poll
• Send Acknowledgement
• Ring Initialization
• Addition to ring
• Error Recovery
Normal Token Passing
Operation
• The station desired to enter the logical ring will respond with a Set-
Successor frame with
• DA = Token-holder address
• SA = TS (Its address)
• Data = TS
• The Token holder detects the event in the response window and
takes appropriate actions:
• No Response: Pass token to the next station
• One Response: Pass token to the newly added station. The newly added
station will update its NS value by recall the DA field of the previously
received Solicit-Successor-1 frame.
Addition of a Station
(Continued)
• Multiple Responses:
• A Resolve-Contention frame is issued by the token-holder with
• DA = XX, SA = TS, Data = Null
• A station desired to enter the logical ring will response with a Set-Successor
frame as before at the K-th window, where K is determined by the value of the
first two bits of its address. However, if the channel is detected busy before the
K-th window, it will give up.
• If no valid Set-Successor frame is received by the token-holder, the token-holder
will issue another Resolve-Contention frame.
• Now only those stations involved in the contention may try again. The value of K
now is determined by the next two bits.
• The above procedure is repeated until a valid Set-Successor frame is received by
the token-holder. A new station is thus successfully added to the logical ring.
Deletion of a Station
• The station wishes to be deleted may wait until it receives the token,
then sends a Set-Successor frame to its predecessor, with
• DA = PS
• SA = TS
• Data = NS
• The previous station once receives the Set-Successor frame will
modify its NS and send a token to its new next station.
• The next station once receives the Set-Successor frame will modify
its PS accordingly.
• After these two modifications, the station is removed from the
logical ring automatically.
• If the station fails, it will not receive the token. This will be detected
by the token-sender as explained later.
Fault Management
• Cause:
• Noise
• Duplicate Address, each one may "receive" a token
• Detection:
• While holding the token, the station may hear a frame on the bus which
indicating that another station also has a token.
• Action:
• Drop the token
• If all stations drop the token, the network becomes the case of no token (see
the procedure of handling no token later)
Unaccepted Token or Failed
Station
• Cause
• The token passed to the next station may be garbled
• The next station fails
• Detection:
• No response (Channel is idle) in one response window
• Action:
• Try to pass token one more time
• It still no response, then the next station is assumed to have failed
• The token holder then issues a Who-Follows frame with
• DA = XX, SA = TS, Data = NS
Unaccepted Token or Failed
Station
• All other stations once received Who-Follows frame will compare the data with
its PS value. If there is a match, it will issue a Set-Successor frame back. Three
response windows are reserved after Who-Follows. The first two are needed to
make a comparison.
• If no response to the Who-Follows frame, the above procedure will be tried one
more time.
• If still no response to the Who-Follows frame, then it could be that the next
station to the next station has also failed.
• The token-holder will try to establish the ring by issuing a Solicit-Successor-2
frame, with
• DA = TS, SA = TS, Data = Null.
Unaccepted Token and Failed
Station
• Cause:
• The Token-holder station fails
• The token is destroyed
• Network Initialization
• Detection:
• No channel activity has been heard for a certain amount of time (Bus-Idle
Timer expired)
• Action:
• Any station when its Bus-Idle timer is expired will issue a Claim-Token frame,
with
• DA = XX, SA = TS, Data = Any value with (0,2,4,6) slot times depending on its address
No Token or Initialization
• The station with the greatest address will get the token. This is done by
comparing the address. Two bits of the address are compared at a time.
• In each pass, only those stations who transmitted the longest frame on the
previous pass try again.
• The station that succeeds on the last pass considers itself the token holder.
• The difference is 2 slots in the frame padding. The station waits one slot for
its or other frame to pass. It then samples the channel at the second slot.
• The logical ring can then be established by issuing Solicit-Successor frames as
described before.
Priority Mechanism
• In the control field of data frame, three bits are reserved to indicate
frame priority.
• Only four access classes are considered
• 6 : The highest priority
• 4
• 2
• 0 : The lowest priority
• Hi-Pri-Token-Hold-Time: To avoid one station dominating the
network, an upper bound is set in each station to determine the
maximum time that the highest priority frame can hold the token.
• Each lower access class in the station has a Target token Rotation
Time (TRT).
802.5 Token Ring LANs
– A Token Ring LAN consists of a collection of ring interfaces connected by
point-to-point lines.
Ring
interface
Unidirectional
Ring – One Way
Computers
IEEE 802.5 Token Ring LANs
Technology.
only one token so only one computer can transmit at any one
time.
The computer can now transmit its frame on its output link.
This frame will now propagate around the ring until it arrives
back at the sender who removes the frame from the ring.
Start of Checksum
Destination Source End Frame
Frame Data – No Limit Same as
Address Address Delimiter Status
Delimiter 802.3
• 802.11 refers to a family of specifications developed by the IEEE for wireless LAN
DSL Router
DSL
Connection
Etc.
• Advantages
• Flexible deployment
• Minimal wiring difficulties
• More robust against disasters (earthquake etc)
• Disadvantages
• Low bandwidth compared to wired networks (1-10 Mbit/s)
• Need to follow wireless spectrum regulations
• Not support mobility
48
infrastructure
network
AP: Access Point
AP
AP wired network
AP
ad-hoc network
802.11 Wireless LAN Working
Group(2/2)
Working Groups summary
802.11
50
802.11n Working Group
• What is the 802.11n?
• Uses MIMO radio technology and OFDM as a basis
• Anywhere from 100Mbps to 600Mbps depending on implementation
• Support both 2.4 GHz and 5 GHz
• Use muiltiple stream
51
802.15 Wireless Personal Area Network(WPAN)
Working Group
802.15
802.15.1 : WPAN/Bluetooth
802.15.2 : Coexistence Group
802.15.3a 802.15.3b 802.15.4a 802.15.4b
802.15.3 : High Rate(HR) WPAN Group
802.15.3a : WPAN HR Alternative PHY Task
Group
802.15.3b : MAC Amendment Task Group
802.15.4 : Low Rate(LW) WPAN Group(Zigbee)
802.15.4a : WPAN Low Rate Alternative PHY
802.15.4b : Revisions and Enhancements
UWB Forum
52
Bluetooth
• What is the Bluetooth?
• Radio modules operate in 2.45GHz. RF channels:2420+k MHz
• Devices within 10m of each other can share up to 1Mbps
• Projected cost for a Bluetooth chip is ~$5.
• Its low power consumption
• Can operate on both circuit and packet switching modes
• Providing both synchronous and asynchronous data services
53
Bluetooth versions
• Bluetooth 1.0 and 1.0B
• Versions 1.0 and 1.0B had many problems
• Manufacturers had difficulty making their products interoperable.
• Bluetooth 1.1
• Many errors found in the 1.0B specifications were fixed.
• Added support for non-encrypted channels.
• Received Signal Strength Indicator (RSSI).
• Bluetooth 1.2
• Faster Connection and Discovery
• Use the Adaptive frequency-hopping spread spectrum (AFH)
• improves resistance to radio frequency interference
• Higher transmission speeds in practice, up to 721 kbps
• Bluetooth 2.0
• This version, specified November 2004
• The main enhancement is the introduction of an enhanced data rate (EDR) of 3.0 Mbps.
• Lower power consumption through a reduced duty cycle.
• Simplification of multi-link scenarios due to more available bandwidth.
• Bluetooth 2.1
• A draft version of the Bluetooth Core Specification Version 2.1 + EDR is now available
54
802.16 Broadband Wireless Access(BWA)
Working Group(1/2)
• IEEE 802.16
• Be was established by IEEE Standards Board in 1999, aims to prepare formal
specifications for the global deployment of broadband Wireless Metropolitan Area
Network.
• A unit of the IEEE 802 LAN/MAN Standards Committee.
• A related technology Mobile Broadband Wireless Access(MBWA)
Mobile WWAN
(IMT-2000) 802.16e
(Vehicular) cdma2000® 1xEV-DO,
Mobility
Pedestrian 2G/2.5G
cdma2000® 1xEV-DV 802.16a
Cellular
WCDMA HSDPA (WiMAX)
(Nomadic)
Fixed 802.15.1 802.11 802.15.3a
(Bluetooth) (WLAN) (UWB)
(Stationary)
0.1 1.03.1 10 100
Peak Data Rate per User (Mbits/second)
55
802.16 Broadband Wireless Access(BWA) Working
Group(2/2)
802.16
56
802.11 Family Members
• There are several specifications in the 802.11 family:
• 802.11
• 802.11a
• 802.11g