G Unit-Iii
G Unit-Iii
Unit-III
OSI
Application
Presentation
Session LOGICAL LINK sublayer
Transport Framing
Network Error
control
Data Link
Flow
control
Physical
Transmission/reception
of frames
The Medium Access Sub layer
deals with
FDM:
T= 1
μC - λ
• Now let us divide the single channel into N independent sub-
channels, each with capacity C/N bps. The mean input rate on
each sub-channels will be λ/N.
• Recomputing T we get
TFDM = 1
μ(C/N)-(λ /N)
= N
μC – λ
= NT
The mean delay using FDM is N times worse than if all the
frames were somehow magically arranged orederly in a big
central queue.
TDM:
• The same arguments that apply to FDM also apply to
TDM.
• Each user is statically allocated every Nth time slot. If
a user does not use the allocated slot, it just lies
fallow.
• The same holds if we split up the network physically.
Station Model.
Collision Assumption.
4b.Slotted Time:
• ALOHA
• Carrier Sense Multiple Access Protocols
• Collision-Free Protocols
• Limited-Contention Protocols
• Wavelength Division Multiple Access Protocols
• Wireless LAN Protocols
Medium Access Sub Layer
ALOHA
Aloha
Pure ALOHA (Mr. Norman Abramson in 1970s)
Disadvantage
More number of users share common channels in a
way that can lead to conflicts.
More number of collisions occur.
Collision detected: stations waits a random amount
of time.
Issues with pure aloha
Contention, collision detection, retransmission
Vulnerable period for a frame
If G is the mean number of transmission
attempts (old and new) per frame time (offered
load), S is the throughput per frame time, then
S = Ge-2G for pure ALOHA.
Maximum throughput occurs at G = 0.5 with
S=1/(2e)=0.1839. I.e., maximum channel
utilization is 18 percent.
• In other words, if one-half a frame is generated during one
frame transmission time, then 18.4 percent of these frames
reach their destination successfully.
• This is an expected results because the vulnerable time is 2
times the frame transmission time.
• Therefore, if a station generates only one frame in this
vulnerable time, the frame will reach its destination
successfully.
Pure ALOHA
A B C D E
Disadvantage: collisions
Throughput for slotted ALOHA increases.
Differences Between Pure ALOHA and Slotted
ALOHA
• Transmission
• In Pure ALOHA when a frame first arrives, the node
immediately transmits the frame in its entirely into the
Broadcast Channel.
• In Slotted ALOHA when a node has a fresh frame to
send, it waits until the beginning of the next slot and
transmits the entire frame in the slot.
• Timing
• In Pure ALOHA Nodes can transmit frames at Random
Times.
• In Slotted ALOHA Nodes can transmit frames in their
respective slot boundaries only at the beginning of the
Slot.
Differences Between Pure ALOHA and Slotted
ALOHA
Synchronization
Pure ALOHA does not require Synchronization of
slots of any nodes.
Slotted ALOHA requires synchronization between
slots of nodes.
Mode of Transfer
In Pure ALOHA the Mode of Transfer is
Continuous.
In Slotted ALOHA the mode of transfer is Discrete
Differences Between Pure ALOHA and Slotted
ALOHA
Collission
In Pure ALOHA If a Collision Occurs the nodes will then
the collision before the end of the slot the node retransmits
its frame in each subsequent slot with probability P until
the frame transmitted without a collision.
Efficiency
In Pure ALOHA Efficiency is Half of Slotted ALOHA.
ALOHA.
CSMA: Carrier Sense Multiple Access
This method is used if the channel has time slots with a slot
duration equal to or greater than the maximum propogation
time.
It combines advantages of the other two strategies.
It reduces the chance of collision and improves efficiency.
P-persistent CSMA
In this method, after station finds the line idle it follows these
steps:
1.With probability ‘p’, the station sends its frame.
2.With probability q=p-1, the station waits for the beginning of the
next time slot and checks the line again.
a. If the line is idle, it goes to step 1.
b. If the line is busy, it acts as though a collision has occurred
and uses the back-off procedure(which discussed earlier).
Persistent and Nonpersistent CSMA
1. IEEE Standards
2. Standard Ethernet
3. Changes in the Standard
4. Fast Ethernet
5. Gigabit Ethernet
Physical layer
• The physical layer is dependent on the implementation and the
type of physical media used.
• The least significant bit of the first byte defines the type of address.
If the bit is 0, the address is unicast; otherwise, it is multicast
• The broadcast destination address is a special case of the multicast
address in which all bits are 1s
A starts at A B
time 0
Message almost
A B
there at time T when
B starts – collision!
• At 10Mbps it takes 0.1us to transmit one bit so 512 bits (64B) take
51.2us to send
• So, Ethernet frames must be at least 64B long
A B
time = T
A B
time = 2T
• Slot time and maximum network length
• MaxLength = PropagationSpeed x SlotTime/2
• MaxLength = (2 x 108) x (51.2 x 10-6/2) = 5120 m
• MaxLength = 2500 m 48 % of the theoretical calculation by
considering delay times in repeaters and interfaces, and the time
required to send the jam sequence
Physical Layer: Ethernet
• MAC Sublayer
• CSMA/CD for the half-duplex approach
• No need for CSMA/CD for full-duplex Fast Ethernet
• Implementation
Figure 1-38. The important ones are marked with *. The ones marked with
are hibernating. The one marked with † gave up.
Categories of Wireless Networks
Authentication
Deauthentication
Privacy
Data Delivery
Bridges
Means to interconnect individual LANs
Operate at the data link layer
Bridge
A
C
LANs can be connected by devices called bridges, which operate
in the data link layer. Bridges do not examine the network layer
header.
Bridges
Router
A
C
Router
In contrast, a router examines network layer headers.
Why a single organization may end up with multiple LANs? (to
need bridges)
To build the spanning tree, first the bridges have to choose one
bridge to be the root of the tree. They make this choice by
having each one broadcast its serial number, installed by the
manufacturer, and guaranteed to be unique worldwide. The
bridge with the lowest serial number becomes the root. Next, a
tree of shortest paths from the root to every bridge and LAN is
constructed.
Source Routing Bridges
CSMA/CD and token bus accepted transparent
bridges
The token ring community went for source routing
bridges
Here, the source determines the path that a
message should take
When a destination is unknown, the source
issues a discovery frame which is forwarded to
every LAN on the internetwork. When the reply
comes back, the bridges record their identity in it,
so the original sender can know the path.
Comparison bridges: See pages 316-317
A source routing bridge is only interested in those frames with
the high-order bit of the destination set to 1.
For each such frame, it scans the route looking for the number
of the LAN on which the frame arrived.