CCN Unit4 Raghudathesh
CCN Unit4 Raghudathesh
CCN Unit4 Raghudathesh
RAGHUDATHESH G P
Asst Professor
UNIT - 4
Wired LAN, Ethernet, IEEE standards, Standard Ethernet. Changes in the standards, Fast
Ethernet, Gigabit Ethernet, Wireless LAN IEEE 802.11
7 Hours
ES
TEXT BOOKS:
1. Data Communication and Networking, B Forouzan, 4th Ed, TMH 2006.
2. Computer Networks, James F. Kurose, Keith W. Ross: Pearson education, 2 nd Edition,
2003.
3. Introduction to Data communication and Networking, Wayne Tomasi: Pearson education
2007.
Special Thanks To:
Faculty (Chronological): Arun A Badiger (GMIT Davengere), Dr. Manjunath N (JNNCE
Shimoga), Harisha G C (GMIT Davangere), Suresha V Sathegala (KVGCE Sullia)
Students:
H
U
AT
BY:
RAGHUDATHESH G P
Asst Prof
ECE Dept, GMIT
Davangere 577004
Cell: +917411459249
Mail: datheshraghubooks@gmail.com
Quotes:
Your life is your message to the world, make sure its inspiring.
AG
Formal education will make you a living but self education will make a fortune.
Be better than you were yesterday.
Department of ECE
raghudathesh.weebly.com
Page No - 1
MAC Layer
RAGHUDATHESH G P
Asst Professor
Introduction:
A local area network (LAN) is a computer network that is designed for a limited
geographic area such as a building or a campus. Although a LAN can be used as an
isolated network to connect computers in an organization for the sole purpose of sharing
resources, most LANs today are also linked to a wide area network (WAN) or the
Internet.
In 1985, the Computer Society of the IEEE started a project, called Project 802, to set
standards to enable intercommunication among equipment from a variety of
manufacturers.
Project 802 is a way of specifying functions of the physical layer and the data link layer
of major LAN protocols.
ISO approved 802 under the designation ISO8802 and is adopted by American National
Standards Institute (ANSI) in 1987.
The relationship of the 802 Standard to the traditional OSI model is shown in Figure
below
AG
H
U
AT
ES
The IEEE has subdivided the data link layer into two sub layers:
Logical Link Control (LLC)
Media Access Control (MAC)
IEEE has also created several physical layer standards for different LAN protocols.
Department of ECE
raghudathesh.weebly.com
Page No - 2
MAC Layer
RAGHUDATHESH G P
Asst Professor
AG
H
U
AT
ES
But in IEEE Project 802, flow control, error control, and part of the framing duties are
collected into one sublayer called the logical link control.
Framing is handled in both the LLC sublayer and the MAC sublayer.
The LLC provides one single data link control protocol for all IEEE LANs.
A single LLC protocol can provide interconnectivity between different LANs because
it makes the MAC sublayer transparent.
The Figure above shows one single LLC protocol serving several MAC protocols.
Framing LLC defines a protocol data unit (PDU) that is somewhat similar to that of
HDLC.
The header contains a control field like the one in HDLC; this field is used for flow
and error control.
The two other header fields define the upper-layer protocol at the source and
destination that uses LLC. These fields are called the destinationservice access point
(DSAP) and the source service access point (SSAP).
The other fields defined in a typical data link control protocol such as HDLC are
moved to the
MAC sublayer.
Hence, a frame defined in HDLC is divided into a PDU at the LLC sublayer and a
frame at the MAC sublayer, as shown in Figure below.
Need of LLC:
To provide flow and error control for the upper-layer protocols that actually demand
these services.
Ex. if a LAN or several LANs are used in an isolated system, LLC may be needed to
provide flow and error control for the application layer protocols.
Department of ECE
raghudathesh.weebly.com
Page No - 3
MAC Layer
RAGHUDATHESH G P
Asst Professor
IEEE Project 802 has created a sublayer called media access control that defines the
specific access method for each LAN.
Ex: CSMA/CD as the media access method for Ethernet LANs and the token passing
method for Token Ring and Token Bus LANs.
Physical Layer:
The physical layer is dependent on the implementation and type of physical media
used.
IEEE defines detailed specifications for each LAN implementation.
Ex: although there is only one MAC sublayer for Standard Ethernet, there is a
different physical layer specifications for each Ethernet implementation.
Standard Ethernet:
AG
H
U
AT
ES
The original Ethernet was created in 1976 at Xerox's Palo Alto Research Center (PARC).
Since then, it has gone through four generations:
1. Standard Ethernet (lot Mbps)
2. Fast Ethernet (100 Mbps)
3. Gigabit Ethernet (l Gbps)
4. Ten-Gigabit Ethernet (l0 Gbps)
In all the above Ethernet we have to concentrate on MAC layer and Physical layer.
MAC Sublayer
Performs two main functions:
Governs the operation of the access method.
Frames data received from the upper layer and passes them to the physical layer.
Frame Format:
Department of ECE
raghudathesh.weebly.com
Page No - 4
MAC Layer
RAGHUDATHESH G P
Asst Professor
ES
AT
AG
H
U
1. Preamble:
Contains 7 bytes of alternating 0s and 1s.
Alerts the receiving system to the coming frame and enables it to synchronize its
input timing. The pattern provides only an alert and a timing pulse.
The 56-bit pattern allows the stations to miss some bits at the beginning of the frame.
The preamble is actually added at the physical layer and is not part of the frame.
Department of ECE
raghudathesh.weebly.com
Page No - 5
Asst Professor
RAGHUDATHESH G P
MAC Layer
ES
5. Length or type:
The original Ethernet used this field as the type field to define the upper-layer
protocol using the MAC frame.
The IEEE standard used it as the length field to define the number of bytes in the data
field.
AT
6. Data:
This field carries data encapsulated from the upper-layer protocols.
It is a minimum of 46 and a maximum of 1500 bytes.
Ethernet has imposed restrictions on both the minimum and maximum lengths of a frame
as shown below.
AG
H
U
Frame Length:
7. CRC:
The last field contains error detection information, in this case a CRC-32.
Department of ECE
raghudathesh.weebly.com
Page No - 6
MAC Layer
RAGHUDATHESH G P
Asst Professor
The minimum length required for the correct operation of the CSMA/CD is 512 bits or 64
bytes.
The minimum length of data from the upper layer is 64 - 18 = 46 bytes. If the upper-layer
packet is less than 46 bytes, padding is added to make up the difference.
The standard defines the maximum length of a frame (without preamble and SFD field)
as 1518 bytes. If we subtract the 18 bytes of header and trailer, the maximum length of
the payload is 1500 bytes.
ES
Addressing:
Each station on an Ethernet network has its own network interface card (NIC) and has 6
byte physical address as shown below
AT
A source address is always a unicast address as the frame comes from only one station.
AG
H
U
Department of ECE
raghudathesh.weebly.com
Page No - 7
MAC Layer
RAGHUDATHESH G P
Asst Professor
If the least significant bit of the first byte in a destination address is 0, the address is
unicast; otherwise, it is multicast.
A unicast destination address defines only one recipient; the relationship between the
sender and the receiver is one-to-one.
A multicast destination address defines a group of addresses; the relationship between the
sender and the receivers is one-to-many.
The broadcast address is a special case of the multicast address; the recipients are all the
stations on the LAN. A broadcast destination address is forty-eight 1 s.
Problems:
AG
H
U
AT
ES
Department of ECE
raghudathesh.weebly.com
Page No - 8
MAC Layer
RAGHUDATHESH G P
Asst Professor
Slot Time:
The slot time in Ethernet is defined in terms of bits.
Definition: The round-trip time required for a frame to travel from one end of a
maximum-length network to the other plus the time needed to send the jam sequence is
called the slot time.
Slot time =round-trip time + time required to send the jam sequence
This means that the actual slot time depends on the data rate; for traditional 10-Mbps
Ethernet it is 51.2 s.
Practically, we need to consider the delay times in repeaters and interfaces, and the time
required to send the jam sequence.
These reduce the maximum-length of a traditional Ethernet network to 2500 m, just 48
percent of the theoretical calculation.
AG
H
U
AT
ES
Department of ECE
raghudathesh.weebly.com
Page No - 9
MAC Layer
RAGHUDATHESH G P
Asst Professor
Physical Layer:
ES
The Standard Ethernet defines several physical layer implementations; four of the most
common, are shown in Figure below.
At the sender, data are converted to a digital signal using the Manchester scheme; at the
receiver, the received signal is interpreted as Manchester and decoded into data.
AG
H
U
AT
Department of ECE
raghudathesh.weebly.com
Page No - 10
RAGHUDATHESH G P
Asst Professor
MAC Layer
ES
10Base5 was the first Ethernet specification to use a bus topology with an external
transceiver (transmitter/receiver) connected via a tap to a thick coaxial cable.
AT
If a length of more than 500 m is needed, up to five segments, each a maximum of 500meter, can be connected using repeaters.
Figure below shows a schematic diagram of a 10Base5 implementation.
AG
H
U
Department of ECE
raghudathesh.weebly.com
Page No - 11
MAC Layer
RAGHUDATHESH G P
Asst Professor
10Base2:
The second implementation is called 10Base2.
Also called as thin Ethernet, or Cheapernet.
The transceiver is normally part of the network interface card (NIC), which is installed
inside the station.
Figure below shows the schematic diagram of a 10Base2 implementation.
AT
ES
This implementation is more cost effective than 10Base5 because thin coaxial cable is
less expensive than thick coaxial and the tee connections are much cheaper than taps.
H
U
The length of each segment cannot exceed 185 m (close to 200 m) due to the high level
of attenuation in thin coaxial cable.
AG
10Base-T:
The stations are connected to a hub via two pairs of twisted cable.
Any collision here happens in the hub.
The maximum length of the twisted cable here is defined as 100 m, to minimize the effect
of attenuation in the twisted cable.
Department of ECE
raghudathesh.weebly.com
Page No - 12
RAGHUDATHESH G P
Asst Professor
10Base-F:
MAC Layer
Also called as Fiber Ethernet uses a optical fiber 10-Mbps Ethernet, the most common is
called 10Base-F.
AG
H
U
AT
ES
Department of ECE
raghudathesh.weebly.com
Page No - 13
MAC Layer
RAGHUDATHESH G P
Asst Professor
Comparison:
The 10-Mbps Standard Ethernet has gone through several changes before moving to the
higher data rates.
AT
Bridged Ethernet:
ES
H
U
In an unbridged Ethernet network, the total capacity say 10 Mbps is shared among all
stations with a frame to send; the stations share the bandwidth of the network.
AG
If only one station has frames to send it benefits from the total bandwidth. If more than
one station use the network then the capacity is shared.
Ex., if two stations have a lot of frames to send, they probably alternate in usage. When
one station is sending, the other one refrains from sending. Thus here, each station on
average sends at a rate of 5 Mbps.
Department of ECE
raghudathesh.weebly.com
Page No - 14
RAGHUDATHESH G P
Asst Professor
MAC Layer
A bridge divides the network into two or more networks where each network is
independent.
Figure below shows a network with 12 stations is divided into two networks, each with 6
stations. Now each network has a capacity of 10 Mbps.
In a network with a heavy load, each station theoretically is offered 10/6 Mbps instead of
10/12 Mbps, assuming that the traffic is not going through the bridge.
ES
H
U
AT
AG
Figure below shows the collision domains for an unbridged and a bridged network.
Bridge makes the collision domain much smaller and the probability of collision is
reduced to a greater extent.
In the figure below without bridging, 12 stations contend for access to the medium; with
bridging only 3 stations contend for access to the medium.
Department of ECE
raghudathesh.weebly.com
Page No - 15
RAGHUDATHESH G P
Asst Professor
MAC Layer
ES
Switched Ethernet:
Instead of having two to four networks, we can have N networks, where N is the number
of stations on the LAN.
If we can have a multiple-port bridge, we can have an N-port switch. Thus, the bandwidth
is shared only between the station and the switch (5 Mbps each if total bandwidth is
10Mbps).
AG
H
U
AT
Department of ECE
raghudathesh.weebly.com
Page No - 16
MAC Layer
RAGHUDATHESH G P
Asst Professor
Full-Duplex Ethernet:
The limitations of 10Base5 and 10Base2 is that communication is half-duplex.
The full-duplex mode increases the capacity of each domain from 10 to 20 Mbps.
ES
Fast Ethernet:
Fast Ethernet was designed to compete with LAN protocols such as FDDI or Fiber
Channel. IEEE standard for Fast Ethernet is 802.3u.
Fast Ethernet is backward-compatible with Standard Ethernet, but it can transmit data 10
times faster at a rate of 100 Mbps.
H
U
AT
AG
MAC Sublayer:
In the evolution of Ethernet from 10 to 100 Mbps was to keep the MAC sublayer
untouched.
A decision was made to drop the bus topologies and keep only the star topology.
The access method is CSMA/CD for the half-duplex approach; for full duplex Fast
Ethernet, there is no need for CSMAlCD.
Department of ECE
raghudathesh.weebly.com
Page No - 17
MAC Layer
RAGHUDATHESH G P
Asst Professor
Autonegotiation:
Autonegotiation allows a station or a hub with a range of capabilities.
Autonegotiation allows two devices to negotiate the mode or data rate of operation.
Physical Layer:
The physical layer in Fast Ethernet is more complicated than in Standard Ethernet.
ES
Topology:
Fast Ethernet is designed to connect two or more stations together.
If there are only two stations, they can be connected point-to-point. Three or more
stations need to be connected in a star topology with a hub or a switch at the center.
AG
H
U
AT
Implementation:
Implementation at the physical layer can be categorized as
1. Two-wire: The two-wire implementation can be either category 5 UTP (100BaseTX) or fiber-optic cable (100Base-FX).
2. Four-wire: The four-wire implementation is designed only for category 3 UTP
(l00Base-T4). Figure below shows the different implementation methods.
Department of ECE
raghudathesh.weebly.com
Page No - 18
RAGHUDATHESH G P
Asst Professor
AG
H
U
AT
ES
MAC Layer
Department of ECE
raghudathesh.weebly.com
Page No - 19
MAC Layer
RAGHUDATHESH G P
Asst Professor
Encoding:
Manchester encoding needs a 200-Mbaud bandwidth for a data rate of 100 Mbps, which
makes it unsuitable for a medium such as twisted-pair cable.
The Fast Ethernet designers sought some alternative encoding/decoding scheme.
100Base-TX:
Uses two pairs of twisted-pair cable.
The MLT-3 scheme was selected since it has good bandwidth performance.
MLT-3 is not a self-synchronous line coding scheme, 4B/5B block coding is used to
provide bit synchronization by preventing the occurrence of a long sequence of 0s and
1s.
This creates a data rate of 125 Mbps, which is fed into MLT-3 for encoding.
Figure: 100Base-TX
H
U
AT
ES
AG
Department of ECE
raghudathesh.weebly.com
Page No - 20
RAGHUDATHESH G P
Asst Professor
MAC Layer
AG
H
U
AT
ES
100Base-FX:
Uses two pairs of fiber-optic cables (to handle higher bandwidth).
encoding).
To overcome this problem, the designers used 4B/5B block encoding.
The block encoding increases the bit rate from 100 to 125 Mbps, which can easily be
handled by fiber-optic cable.
Department of ECE
raghudathesh.weebly.com
Page No - 21
RAGHUDATHESH G P
Asst Professor
MAC Layer
100Base-T4:
It was designed to use category 3 or higher UTP.
Figure: 100Base-FX
The implementation uses four pairs of UTP for transmitting 100 Mbps.
Encoding/decoding in 100Base-T4 is more complicated.
Figure: 100Base-T4
H
U
AT
ES
AG
Department of ECE
raghudathesh.weebly.com
Page No - 22
MAC Layer
RAGHUDATHESH G P
Asst Professor
Gigabit Ethernet:
The need for an even higher data rate resulted in the design of the Gigabit Ethernet
protocol (1000 Mbps).
ES
MAC Sublayer:
Gigabit Ethernet has two distinctive approaches for medium access:
Full-duplex:
In this mode a central switch connected to all computers or other switches.
Each switch has buffers for each input port in which data are stored until they are
transmitted. There is no collision in this mode.
The maximum length of the cable is determined by the signal attenuation in the cable, not
by the
AG
H
U
Half-duplex:
AT
The maximum length of the network in this approach is totally dependent on the
minimum frame size.
Three methods have been defined:
1. Traditional
2. Carrier Extension
3. Frame Bursting
Department of ECE
raghudathesh.weebly.com
Page No - 23
MAC Layer
RAGHUDATHESH G P
Asst Professor
1. Traditional:
Here the minimum length of the frame is 512 bits.
The slot time for Gigabit Ethernet is 0.512 s.
2. Carrier Extension:
To allow for a longer network, this method increases the minimum frame length.
The carrier extension approach defines the minimum length of a frame as 512 bytes
and can be extended to 4096 bits thus the minimum length is 8 times longer.
This method forces a station to add extension bits (padding) to any frame that is less
than 4096 bits.
In this way, the maximum length of the network can be increased 8 times to a length
of 200 m. This allows a length of 100 m from the hub to the station.
ES
AT
3. Frame Bursting:
Carrier extension is very inefficient if we have a series of short frames to send; each
frame carries redundant data.
To improve efficiency, frame bursting was proposed. Instead of adding an extension
to each frame, multiple frames are sent.
To make the multiple frames look like one frame, padding is added between the
frames so that the channel is not idle.
H
U
AG
Physical Layer:
The physical layer in Gigabit Ethernet is more complicated than that in Standard or Fast
Ethernet.
Topology:
Gigabit Ethernet is designed to connect two or more stations.
Another possible configuration is to connect several star topologies or let a star topology
be part of another as shown in figure below
Department of ECE
raghudathesh.weebly.com
Page No - 24
RAGHUDATHESH G P
Asst Professor
ES
MAC Layer
AG
H
U
AT
Implementation:
Gigabit Ethernet can be categorized as
A two-wire implementation:
The two-wire implementations use fiber-optic cable (1000Base-SX, shortwave, or 1000Base-LX, long-wave), or STP (1000Base-CX).
A four-wire implementation:
The four-wire version uses category 5 twisted-pair cable (1000Base-T).
Encoding:
The two-wire implementations use an NRZ scheme, but NRZ does not self-synchronize
properly.
To synchronize bits, particularly at this high data rate, 8B/10B block encoding is used.
Department of ECE
raghudathesh.weebly.com
Page No - 25
MAC Layer
RAGHUDATHESH G P
Asst Professor
This block encoding prevents long sequences of 0s or 1s in the stream, but the resulting
stream is 1.25 Gbps.
All four wires are involved in both input and output; each wire carries 250 Mbps, which
is in the range for category 5 UTP cable.
ES
AG
H
U
AT
Ten-Gigabit Ethernet:
The IEEE committee created Ten-Gigabit Ethernet and called it Standard 802.3ae.
The goals of the Ten-Gigabit Ethernet design includes:
1. Upgrade the data rate to 10 Gbps.
2. Make it compatible with Standard, Fast, and Gigabit Ethernet.
3. Use the same 48-bit address.
4. Use the same frame format.
5. Keep the same minimum and maximum frame lengths.
Department of ECE
raghudathesh.weebly.com
Page No - 26
MAC Layer
RAGHUDATHESH G P
Asst Professor
MAC Sublayer:
Ten-Gigabit Ethernet operates only in full duplex mode which means there is no need for
contention.
Physical Layer:
The physical layer in Ten-Gigabit Ethernet is designed for using fiber-optic cable over
long distances.
Three implementations are the most common:
1. lOGBase-S
2. lOGBase-L
3. lOGBase-E
H
U
AT
ES
Wireless LAN:
IEEE has defined the specifications for a wireless LAN, called IEEE 802.11, which
covers the physical and data link layers.
AG
Architecture:
The standard defines two kinds of services:
1. The basic service set (BSS)
2. The extended service set (ESS)
Department of ECE
raghudathesh.weebly.com
Page No - 27
MAC Layer
RAGHUDATHESH G P
Asst Professor
AT
ES
H
U
AG
The BSSs are connected through a distribution system, which is usually a wired LAN.
Department of ECE
raghudathesh.weebly.com
Page No - 28
MAC Layer
RAGHUDATHESH G P
Asst Professor
When BSSs are connected, the stations within reach of one another can communicate
without the use of an AP.
Communication between two stations in two different BSSs usually occurs via two APs.
Figure below shows an ESS
ES
AT
Station Types:
IEEE 802.11 defines three types of stations based on their mobility in a wireless LAN:
1. No-Transition: A station with no-transition mobility is either stationary (not
moving) or moving only inside a BSS.
2. BSS-Transition: A station with BSS-transition mobility can move from one BSS
to another, but the movement is confined inside one ESS.
3. ESS-Transition mobility: A station with ESS-transition mobility can move from
one ESS to another. However, IEEE 802.11 does not guarantee that
communication is continuous during the move.
AG
H
U
MAC Sublayer:
IEEE 802.11 defines two MAC sublayers:
1. Distributed Coordination Function (DCF)
2. Point Coordination Function (PCF)
Figure below shows the relationship between the two MAC sublayers, the LLC sublayer,
and the physical layer.
Department of ECE
raghudathesh.weebly.com
Page No - 29
RAGHUDATHESH G P
Asst Professor
AT
ES
MAC Layer
AG
H
U
Department of ECE
raghudathesh.weebly.com
Page No - 30
MAC Layer
RAGHUDATHESH G P
Asst Professor
ES
AT
Each time a station accesses the system and sends an RTS frame other stations start their
NAV.
H
U
In other words each station, before sensing the physical medium to see if it is idle first
checks its NAV to see if it has expired.
AG
These control frames may collide. However, because there is no mechanism for collision
detection, the sender assumes there has been a collision if it has not received a CTS frame
from the receive.
Department of ECE
raghudathesh.weebly.com
Page No - 31
MAC Layer
RAGHUDATHESH G P
Asst Professor
To give priority to PCF over DCF, another set of interframe spaces has been defined:
PIFS and SIFS.
The SIFS is the same as that in DCF, but the PIFS (PCF IFS) is shorter than the DIFS.
This means that if, at the same time, a station wants to use only DCF and an AP wants to
use PCF, the AP has priority.
Due to the priority of PCF over DCF, stations that only use DCF may not gain access to
the medium.
To prevent this, a repetition interval has been designed to cover both contention-free
(PCF) and contention-based (DCF) traffic.
The repetition interval, which is repeated continuously, starts with a special control
frame, called a beacon frame.
When the stations hear the beacon frame, they start their NAV for the duration of the
contention free period of the repetition interval.
During the repetition interval, the PC (point controller) can send a poll frame, receive
data, send an ACK, receive an ACK, or do any combination of these (802.11 uses
piggybacking).
At the end of the contention-free period, the PC sends a CF end (contention-free end)
frame to allow the contention-based stations to use the medium.
Figure below shows an example of a repetition interval.
ES
AT
H
U
AG
Department of ECE
raghudathesh.weebly.com
Page No - 32
MAC Layer
RAGHUDATHESH G P
Asst Professor
Frame Format:
The MAC layer frame consists of nine fields, as shown in Figure below
Frame control (FC): The FC field is 2 bytes long and defines the type of frame and
some control information. Table below describes the subfields
D: Defines the duration of the transmission that is used to set the value of NAV. In one
control frame, this field defines the ID of the frame.
AG
H
U
AT
ES
Address: There are address field, each 6 byte long. The meaning of each address field
depends on the value of the To DS and from DS subfields.
Sequence Control: This field defines the sequence number of the frame to be used in
flow control.
Frame body: This field which can be between 0 and 2312 bytes, contains information
based on the type and the subtype defined in the FC field.
FCS: The FCS field is 4 bytes long and contains a CRC-32 error detection sequence.
Department of ECE
raghudathesh.weebly.com
Page No - 33
MAC Layer
RAGHUDATHESH G P
Asst Professor
Frame Types:
A wireless LAN defined by IEEE 802.11 have three categories of frames:
1. Management frames:
Management Frames Management frames are used for the initial
communication between stations and access points.
2. Data frames:
Data frames are used for carrying data and control information.
3. Control frames:
Control frames are used for accessing the channel and acknowledging
frames.
ES
For control frames the value of the type field is 01; the values of the subtype fields for
frames are shown in Table below.
H
U
AT
AG
Addressing Mechanism:
The IEEE 802.11 addressing mechanism specifies four cases, defined by the value of the
two flags in the FC field, To DS and From DS.
The interpretation of the four addresses (address 1 to address 4) in the MAC frame
depends on the value of these flags, as shown in Table below.
Department of ECE
raghudathesh.weebly.com
Page No - 34
RAGHUDATHESH G P
Asst Professor
MAC Layer
Address 3 is the address of the final destination station if it is not defined by address 1.
Address 4 is the address of the original source station if it is not the same as address 2.
Case 1(00):
ES
Frame is not going to distribution system and is not coming from distribution system.
The frame is going from one station in a BSS to another without passing through the
distribution system.
H
U
AT
AG
Case 2(01):
Department of ECE
raghudathesh.weebly.com
Page No - 35
RAGHUDATHESH G P
Asst Professor
Case 3(10):
In this case To DS=1 and from DS=0.
Frame is going to a distributions system.
AT
ES
MAC Layer
AG
H
U
Case 4(11):
In this case To DS=1 and from DS=1.
Department of ECE
raghudathesh.weebly.com
Page No - 36
MAC Layer
RAGHUDATHESH G P
Asst Professor
ES
Station B has a transmission range shown by the left oval; every station in this range can
hear any signal transmitted by station B.
Station C has a transmission range shown by the right oval; every station located in this
range can hear any signal transmitted by C.
AT
Station A, however, is in the area covered by both B and C; it can hear any signal
transmitted by
B or C.
Assume that station B is sending data to station A. In the middle of this transmission,
station C also has data to send to station A.
However, station C is out of B's range and transmissions from B cannot reach C.
Therefore C thinks the medium is free. Station C sends its data to A, which results in a
collision at A because this station is receiving data from both B and C.
Thus in the above case, we say that stations B and C are hidden from each other with
respect to A.
AG
H
U
Hidden stations can reduce the capacity of the network because of the possibility of
collision.
The solution to the hidden station problem is the use of the handshake frames (RTS and
CTS). Figure below shows that the RTS message from B reaches A, but not C. However,
Department of ECE
raghudathesh.weebly.com
Page No - 37
MAC Layer
RAGHUDATHESH G P
Asst Professor
because both Band C are within the range of A, the CTS message, which contains the
duration of data transmission from B to A reaches C.
Station C knows that some hidden station is using the channel and refrains from
transmitting until that duration is over.
ES
AT
In this problem a station refrains from using a channel when it is, in fact, available.
AG
H
U
Station C has some data to send to station D, which can be sent without interfering with
the transmission from A to B.
Department of ECE
raghudathesh.weebly.com
Page No - 38
MAC Layer
RAGHUDATHESH G P
Asst Professor
Solution: The handshaking messages RTS and CTS cannot help in this case.
Station C hears the RTS from A, but does not hear the CTS from B.
Station C, after hearing the RTS from A, can wait for a time so that the CTS from B
reaches A; it then sends an RTS to D to show that it needs to communicate with D.
Both stations B and A may hear this RTS, but station A is in the sending state, not the
receiving state. Station B, however, responds with a CTS.
The problem is here. If station A has started sending its data, station C cannot hear the
CTS from station D because of the collision; it cannot send its data to D. It remains
exposed until A finishes sending its data as shown in figure below.
AG
H
U
AT
ES
Department of ECE
raghudathesh.weebly.com
Page No - 39
MAC Layer
RAGHUDATHESH G P
Asst Professor
Physical Layer:
The band is divided into 79 subbands of 1MHz (and some guard bands). A
pseudorandom number generator selects the hopping sequence.
AT
ES
IEEE 802.11 DSSS uses the direct sequence spread spectrum (DSSS).
The system allows 1 or 2 bits/baud (BPSK or QPSK), which results in a data rate of 1
or 2 Mbps, as shown in figure below.
AG
H
U
Department of ECE
raghudathesh.weebly.com
Page No - 40
MAC Layer
RAGHUDATHESH G P
Asst Professor
For a 1-Mbps data rate, a 4-bit sequence is first mapped into a 16-bit sequence in
which only one bit is set to 1 and the rest are set to 0.
For a 2-Mbps data rate, a 2-bit sequence is first mapped into a 4-bit sequence in
which only one bit is set to 1 and the rest are set to 0.
The mapped sequences are then converted to optical signals; the presence of light
specifies 1, the absence of light specifies 0 as shown in figure below.
ES
OFDM is similar to FDM, with one major difference: All the subbands are used by
one source at a given time. Sources contend with one another at the data link layer for
access.
H
U
AT
The band is divided into 52 subbands, with 48 subbands for sending 48 groups of bits
at a time and 4 subbands for control information.
The scheme is similar to ADSL, Dividing the band into subbands diminishes the
effects of interference. If the subbands are used randomly, security can also be
increased.
AG
OFDM uses PSK and QAM for modulation. The common data rates are 18 Mbps
(PSK) and 54 Mbps (QAM).
HR-DSSS is similar to DSSS except for the encoding method, which is called
complementary code keying (CCK).
Department of ECE
raghudathesh.weebly.com
Page No - 41
MAC Layer
RAGHUDATHESH G P
Asst Professor
The 5.5-Mbps version uses BPSK and transmits at 1.375 Mbaudls with 4-bit CCK
encoding. The 11-Mbps version uses QPSK and transmits at 1.375 Mbps with 8-bit
CCK encoding.
ES
6. IEEE 802.11g:
AT
This new specification defines forward error correction and OFDM using the 2.4GHz ISM band.
H
U
AG
Department of ECE
raghudathesh.weebly.com
Page No - 42
MAC Layer
Asst Professor
All implementations, except the infrared, operate in the industrial, scientific, and medical
(ISM) band, which defines three unlicensed bands in the three ranges 902-928 MHz,
2.400--4.835 GHz, and 5.725-5.850 GHz, as shown in figure below.
RAGHUDATHESH G P
AG
H
U
AT
ES
Department of ECE
raghudathesh.weebly.com
Page No - 43
MAC Layer
RAGHUDATHESH G P
Asst Professor
Problems:
1. Compare the data rates for Standard Ethernet, Fast Ethernet, Gigabit Ethernet,
and Ten-Gigabit Ethernet.
Solution:
The rates are as follows:
Standard Ethernet: 10 Mbps
Fast Ethernet: 100 Mbp
Gigabit Ethernet: 1 Gbps
Ten-Gigabit Ethernet: 10 Gbps
ES
2. How does the Ethernet address lA:2B:3CAD:5E:6F appear on the line in binary?
Solution:
01011000:11010100:00111100:11010010:01111010:11110110
AT
AG
H
U
4. An Ethernet MAC sublayer receives 1510 bytes of data from the upper layer. Can
the data be encapsulated in one frame? If not, how many frames need to be sent?
What is the size of the data in each frame?
Solution:
The maximum data size in the Standard Ethernet is 1500 bytes. The data of 1510 bytes,
therefore, must be split between two frames. The standard dictates that the first frame must carry
the maximum possible number of bytes (1500); the second frame then needs to carry only 10
bytes of data (it requires padding). The following shows the breakdown:
Data size for the first frame: 1500 bytes
Data size for the second frame: 46 bytes (with padding)
5. Suppose the length of a l0Base5 cable is 2500 m. If the speed of propagation in a
thick coaxial cable is 200,000,000 m/s, how long does it take for a bit to travel from
the beginning to the end of the network? Assume there is 10s delay in the
equipment.
Department of ECE
raghudathesh.weebly.com
Page No - 44
MAC Layer
RAGHUDATHESH G P
Asst Professor
AG
H
U
AT
ES
Solution:
Department of ECE
raghudathesh.weebly.com
Page No - 45
MAC Layer
RAGHUDATHESH G P
Asst Professor
VTU Questions:
AG
H
U
AT
ES
1. Explain the goals, MAC sub layer and physical layer of the Ethernet. (Dec 2010, 10M)
2. Explain briefly the baseband layer in the Bluetooth layers. ( Dec 2010, 10M)
3. What are the advantages of dividing an etherent LAN with a bridge? Explain with a neat
diagram. (June 2011, 06M)
4. Compare the data rates for standards, fast, gigabit and ten-gigabit Ethernet. Mention one
example in each case .( June 2011, 04M)
5. Explain DCF and PCF modes of 802.11 MAC protocol. (June 2011, 10M)
6. Mention the four different types of Ethernet format. Explain the same briefly. (Dec 2011,
10M)
7. List the different goals of Giga bit Ethernet and explain the different implementation of
same (Dec 2011, 10M)
8. Compare the data rates for Ethernet, fast, Ethernet, Gigabit Ethernet and ten Gigabit
Ethernet. (Dec 2012, 04M)
9. What is the difference between a unicast, multicast, and broadcast address? Define the
type of the following destination addresses. (Dec 2012, 08M)
a. 4A:30:10:21:10:1A
b. 47:20:1B:2E:08:EE
c. FF:FF:FF:FF:FF:FF
10. Explain the following with respect to FAST Ethernet. (Dec 2012, 08M)
a. Implementation
b. Encoding
c. 100 BASE-TX
d. 100 BASE-FX
11. List the goals of fast Ethernet; explain the features of physical layer in fast Ethernet.
(June 2013, 10M)
12. Explain two different kinds of services as defined in IEEE 802.11. (June 2013, 06M)
13. Write a note on piconet and Scatternet in Bluetooth. (June 2013, 04M)
14. What are the reasons for not implementing CSMA/CD IN wireless LANs? With a
flowchart and frame exchange time line diagram explain CSMA/CA. (June 2013, 08M)
15. What are the advantages of having Bridged Ethernet? (June 2013, 06M)
16. List goals of the fast Ethernet. Enumerate Fast Ethernet implementations (June 2013,
06M)
Department of ECE
raghudathesh.weebly.com
Page No - 46