Professional Documents
Culture Documents
Chapter 04
(version May 23, 2007)
01 Introduction
02 Physical Layer
03 Data Link Layer
04 MAC Sublayer
05 Network Layer
06 Transport Layer
07 Application Layer
08 Network Security
00 – 1 /
Medium Access Sublayer (1/2)
So far: We have discussed the Data Link Layer’s func-
tionality and some protocols related to point-to-point
communication.
network layer
physical layer
• S = G · e−2G
0.40
Slotted ALOHA: S = Ge–G
0.30
0.20
Contention
to slots
FA
Tprop
ε 2Tprop − ε
FB
time
distance
A B
2Tprop − ε
A detects that its frame has collided with another frame
Frames
8 Contention slots 8 Contention slots 1 d
0 1 2 3 4 5 6 7 0 1 2 3 4 5 6 7 0 1 2 3 4 5 6 7
1 1 1 1 3 7 1 1 1 5 1 2
Bit time
0 1 2 3
0 0 1 0 0 – – –
0 1 0 0 0 – – –
1 0 0 1 1 0 0 –
1 0 1 0 1 0 1 0
Result 1 0 1 0
Principle:
The first group gets to try it again during the next slot
(k + 1). If no collisions occur then, the second group
gets a try during the slot after that (k + 2). Otherwise,
the first group is split up again.
XXX X X X XX XX ● ● ●
B's control channel
B Used by B to
S B's data channel transmit data
XX XX XX XX ● ● ●
C's control channel
C
S C's data channel λ
X X XX X X XX ● ● ●
D's control channel
D
S D's data channel
Time
A B C D A B C D
Radio range
(a) (b)
C A RTS B D C A CTS B D
E E
(a) (b)
Controller
Controller
Twisted pair
Transceiver
Transceiver + controller
cable
Core Vampire tap
Transceiver Connector
Hub
(a) (b) (c)
Bit stream 1 0 0 0 0 1 0 1 1 1 1
(c) Differential
Manchester encoding
Ethernet
Hub To hosts
To hosts
10Base-T
connection
To the host computers
That means that we can only drop the bit time from
100 nsec to 10 nsec. Just telling everyone to shorten
their wires won’t really do.
Switch or hub
Ethernet
Computer
Ethernet
(a) (b)
Range Range
of C's of A's
radio radio
A B C A B C
C is A is
transmitting transmitting
C
(a) (b)
A RTS Data
B CTS ACK
C NAV
D NAV
Time
Bytes 2 2 6 6 6 2 6 0-2312 4
Bits 2 2 4 1 1 1 1 1 1 1 1
Bytes 2 2 6 6 6 2 6 0-2312 4
Bits 2 2 4 1 1 1 1 1 1 1 1
Bytes 2 2 6 6 6 2 6 0-2312 4
Bits 2 2 4 1 1 1 1 1 1 1 1
QAM-64 (6 bits/baud)
QAM-16 (4 bits/baud)
QPSK (2 bits/baud)
E C Header
(a) 0 Type EK Length Connection ID Data CRC
C I CRC
Bits 1 1 6 16 16 8
Header
(b) 1 0 Type Bytes needed Connection ID
CRC
Some observations:
S S
S
S
S
M S M
S
Active S Parked
slave S slave
S S
Bridge slave
E C Header Check-
802.16 0 Type EK Length Connection ID Data
C I CRC sum
F G H
Bridge LAN 4
A B B1 C B2 D E
Bridge
B1 B2
LAN 1
F
Initial frame
8 9
(a) (b)
A B C D A B C D A B C D
Host
LAN
E F G H E F G H E F G H
Cable
duct
Hub
Corridor
Switch
Hub
A B C D A B C D
G W W W
1
3 4 G W
I GW M I M
G W
J N J N
G W
B1 B2 S1 S2
GW G GW W
K O K O
GW G
L L
2
G W G G
E F G H E F G H
(a) (b)
Tagged Tagged
frame frame
VLAN-
aware VLAN-aware Switching done Legacy
PC switch using tags frame
C
VLAN protocol Pri F VLAN Identifier
ID (0x8100) I