0% found this document useful (0 votes)
29 views

02-Network Protocols Architecture

The document discusses various topics related to network protocols and architectures: 1. It describes different LAN topologies including bus, ring, tree, and star and issues related to inherently broadcast and multi-access networks. 2. It discusses medium access control protocols including centralized vs distributed, synchronous vs asynchronous, and examples like round-robin, reservation, and contention-based protocols. 3. It provides an overview of standardized MAC protocols for different topologies, the IEEE 802 standards, and the LLC and encapsulation.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
29 views

02-Network Protocols Architecture

The document discusses various topics related to network protocols and architectures: 1. It describes different LAN topologies including bus, ring, tree, and star and issues related to inherently broadcast and multi-access networks. 2. It discusses medium access control protocols including centralized vs distributed, synchronous vs asynchronous, and examples like round-robin, reservation, and contention-based protocols. 3. It provides an overview of standardized MAC protocols for different topologies, the IEEE 802 standards, and the LLC and encapsulation.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 64

Network Protocol & Architecture

Febriliyan Samopa
v
LAN Topologies

Star
Ring

Tree
Central node

Bus
Bus Topology

• Use of multipoint medium.


• Stations attach to bus through tap.
• Full-duplex communication allows data to be
sent to/received from bus.
• Transmission from any station propagates in
both directions and is received by all.
• At each end, terminator absorbs and removes
signal from bus.
Tree Topology
• Tree is generalization of bus.
• Headend: start of 1 or more cables (branches).
• Transmission from one station propagates to all
others.
Issues

• Inherently broadcast.
• Frames to transmit data.
• Need for specifying the destination addresses.
• Multi-access.
• Need for controlling access to medium.
• Avoid collisions.
• MAC protocol.
Ring Topology

• Stations attach to repeaters.


• Repeaters are linked to each other by point-to-point
links forming a closed loop.
• Links are unidirectional.
• Repeaters: receive data from one link and repeat it on
the other with no buffering.
Ring

• Stations transmit/receive via repeater.


• Frames circulate past all stations; destination copies
frame as it goes by; source removes frame.
• Ring shared by multiple stations.
• Need MAC protocol.
• Determine when each station may insert frame.
Star Topology

• Each station directly connected to central node


via point-to-point link.
• Central node’s modes of operation:
• Broadcast mode: node broadcasts received
frame on all other links; logically works like
bus.
• Switching mode: node sends frame out only
on the link to the destination.
• Central node as single-point of failure.
Medium Access Control
• Control access to shared medium.
• Where and how?
• Where: centralized versus decentralized.
• How: synchronous versus asynchronous.
Centralized versus Distributed MAC
• Centralized approaches:
• Controller grants access to medium.
• Simple, greater control: priorities, qos.
• But, single point of failure and performance
bottleneck.
• Decentralized schemes:
• All stations collectively run MAC to decide when to
transmit.
Synchronous versus Asynchronous
• Synchronous approaches:
• Static channel allocation.
• Examples: FDM, TDM.
• Simple but inefficient.
• Asynchronous or dynamic:
• Example: STDM.
• 3 categories: round-robin, reservation, and
contention.
Round-Robin MAC

• Each station is allowed to transmit; station may


decline or transmit (bounded by some maximum
transmit time).
• Centralized (e.g., polling) or distributed control
of who is next to transmit.
• When done, station relinquishes and right to
transmit goes to next station.
• Efficient when many stations have data to
transmit over extended period (stream).
Reservation

• Time divided into slots.


• Station reserves slots in the future.
• Multiple slots for extended transmissions.
• Suited to stream traffic.
Contention

• No control.
• Stations try to acquire the medium.
• Distributed in nature.
• Perform well for bursty traffic.
• Can get very inefficient under heavy load.

• NOTE: round-robin and contention are the most


common.
Standardized MACs

Topologies
Techniques Bus Ring
Token bus Token ring
Round robin (802.4) (802.5; FDDI)
Polling
(802.11)
Reservation DQDB
(802.6)
Contention CSMA/CD
(802.3)
CSMA(802.11)
LLC for LANs

• Similar functions as general LLCs.


• But it has to interface with MAC sublayer.
• LLC functions:
• Addressing: source and destination.
• LLC address versus MAC address.
• Control data exchange between 2 users.
• User as higher-layer protocol in the station.
Encapsulation

Application data
TCP
header
IP
header
LLC
header
MAC MAC
header trailer

TCP segment
IP datagram
LLC PDU
MAC frame
LLC Services
• 3 different services:
1.Unacknowledged connectionless (type 1).
• No error or flow control.
• No delivery guarantees.
2.Connection-mode (type 2).
• Logical connection established.
• Flow and congestion control provided.
3.Acknowledged connectionless (type 3).
• No logical connection.
• Flow and error control.
IEEE 802 Standards

The 802 working groups. The important ones are


marked with *. The ones marked with  are
hibernating. The one marked with † gave up.
LLC (802.2) Protocol

• Similar to HDLC (ISO standard).


• LLC PDU (protocol data unit):

1 byte 1 byte 1 or 2 bytes variable


DSAP SSAP LLC control Information
Wireless LANs
• Use wireless transmission media.
• Infrared (IR): limited to indoors and single room
(IR is light -- doesn’t penetrate walls).
• Radio
• Narrowband microwave.
• Spread Spectrum LANs.
Wireless LAN Applications
• Nomadic access (e.g., users roaming around
campus).
• LAN interconnection (e.g., across buildings).
• Ad Hoc Networks (e.g., disaster relief crew).
• Sensor Networks
MAC Protocols
• Contention-based
• ALOHA and Slotted ALOHA.
• CSMA.
• CSMA/CD.
• Round-robin : token-based protocols.
• Token bus.
• Token ring.
CSMA
• Maximum utilization is function of frame size and
propagation time.
• Longer frames or shorter propagation time,
higher utilization.
CSMA Flavors
• 1-persistent CSMA (IEEE 802.3)
• If medium idle, transmit; if medium busy, wait
until idle; then transmit with p=1.
• If collision, waits random period and starts
again.
• Non-persistent CSMA: if medium idle, transmit;
otherwise wait a random time before re-trying.
• P-persistent: when channel idle detected,
transmits packet in the first slot with probability =
p.
CSMA/CD
• CSMA with collision detection.
• Problem: when frames collide, medium is
unusable for duration of both (damaged) frames.
• For long frames (when compared to propagation
time), considerable waste.
• Why not listen while transmitting?
CSMA/CD Protocol

• 1. If medium idle, transmit; otherwise 2.


• 2. If medium busy, wait until idle, then transmit
with p=1.
• 3. If collision detected, transmit brief jamming
signal and abort transmission.
• 4. After aborting, wait random time, try again.
CSMA with Collision Detection

• If collision detected, immediately abort


transmission
• CSMA/CD can be in one of three states:
• contention, transmission, or idle.
CSMA/CD Performance

• Wasted capacity restricted to time to detect


collision.
• Time to detect collision < 2*maximum propagation
delay.
(page 258 of Tannenbaum Text)
• Rule in CSMA/CD protocols: frames long enough
to allow collision detection prior to end of
transmission.
(need to be still listening)
• CSMA/CD is thus half-duplex
Persistent and Nonpersistent CSMA

• Comparison of the channel utilization


versus load for various random access
protocols.
IEEE 802 Standards

The 802 working groups. The important ones are


marked with *. The ones marked with  are
hibernating. The one marked with † gave up.
IEEE 802.2: Logical Link Control

• (a) Position of LLC. (b) Protocol


formats.
Wireless LANs

• The 802.11 Protocol Stack


• The 802.11 Physical Layer
• The 802.11 MAC Sublayer Protocol
• The 802.11 Frame Structure
• Services
Wireless LANs

• (a) Wireless networking with a base


station.
• (b) Ad hoc networking.
Wireless LANs (2)

• The range of a single radio may not cover


the entire system.
Wireless LANs (3)
• A multicell 802.11 network.
Wireless LANs

• IEEE 802.11
• Distributed access control mechanism (DCF)
based on CSMA with optional centralized
control (PCF).
• Contention-free
Service (polling)
MAC PCF Contention
layer Service
DCF
(CSMA)
Physical Layer
MAC in Wireless LANs

• Distributed coordination function (DCF) uses


CSMA-based protocol (e.g., ad hoc networks).
• CD does not make sense in wireless.
• Hard for transmitter to distinguish its own
transmission from incoming weak signals and
noise.
• Point coordination function (PCF) uses
polling to grant stations their turn to transmit
(e.g., cellular networks).
The 802.11 Protocol Stack
• Part of the 802.11 protocol stack.
The 802.11 MAC Sublayer Protocol

• (a) The hidden station problem.


• (b) The exposed station problem.
The 802.11 MAC Sublayer Protocol (2)
• The use of virtual channel sensing using
CSMA/CA.
The 802.11 MAC Sublayer Protocol (3)
• A fragment burst.
The 802.11 MAC Sublayer Protocol (4)
• Interframe spacing in 802.11.
The 802.11 Frame Structure
• The 802.11 data frame.
802.11 Services

Distribution Services

• Association
• Disassociation
• Reassociation
• Distribution
• Integration
802.11 Services

Intracell Services
• Authentication
• Deauthentication
• Privacy
• Data Delivery
Broadband Wireless

• Comparison of 802.11 and 802.16


• The 802.16 Protocol Stack
• The 802.16 Physical Layer
• The 802.16 MAC Sublayer Protocol
• The 802.16 Frame Structure
The 802.16 Protocol Stack
• The 802.16 Protocol Stack.
The 802.16 Physical Layer
• The 802.16 transmission environment.
The 802.16 Physical Layer (2)
• Frames and time slots for time division
duplexing.
The 802.16 MAC Sublayer Protocol

• Service Classes
• Constant bit rate service
• Real-time variable bit rate service
• Non-real-time variable bit rate service
• Best efforts service
The 802.16 Frame Structure
• (a) A generic frame. (b) A bandwidth
request frame.
Bluetooth

• Bluetooth Architecture
• Bluetooth Applications
• The Bluetooth Protocol Stack
• The Bluetooth Radio Layer
• The Bluetooth Baseband Layer
• The Bluetooth L2CAP Layer
• The Bluetooth Frame Structure
Bluetooth Architecture
• Two piconets can be connected to form a
scatternet.
Bluetooth Applications
• The Bluetooth profiles.
The Bluetooth Protocol Stack
• The 802.15 version of the Bluetooth
protocol architecture.
The Bluetooth Frame Structure
• A typical Bluetooth data frame.
See more recent info on this at: http://www.usb.org/developers/wusb/
Summary

• Channel allocation methods and systems for a common


channel.
Data Link Layer Switching

• Bridges from 802.x to 802.y


• Local Internetworking
• Spanning Tree Bridges
• Remote Bridges
• Repeaters, Hubs, Bridges, Switches, Routers,
Gateways
• Virtual LANs
Bridges

• Bridges used to connect multiple LANS


• Link Layer
• Do not look at anything in packets
• Work for any payload within the frame
• IPv4, IPv6, Apple Talk, etc.
• (vs. routers which work at packet (IP) level)
• Individual LANS are shared media (cable or hub)
• (Few hubs still in use – now switched Ethernet)
• LANS have promiscuous mode (i.e. “party line”)
• Bridges provide isolation between LANS
Data Link Layer Switching
• Multiple LANs connected by a backbone to
handle a total load higher than the capacity
of a single LAN.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy