Week 8
Week 8
Week 8
(Week 8)
The Medium Access Control
Sublayer
(CONTINUATION)
ANDREW S. TANENBAUM
COMPUTER NETWORKS
FOURTH EDITION
PP. 292-338
BLM431 Computer Networks 1
Dr. Refik Samet
Networks can be divided into two
categories:
1) Those using point-to-point
connections and
2) Those using broadcast channels.
A fragment burst.
BLM431 Computer Networks 51
Dr. Refik Samet
The 802.11 MAC Sublayer Protocol (20)
•PCF (in which the base station polls the
other stations, asking them if they have any
frames to send) and DCF (in which there is
no central control) can coexist within one
cell.
•At first it might seem impossible to have
central control and distributed control
operating at the same time, but 802.11
provides a way to achieve this goal.
BLM431 Computer Networks 52
Dr. Refik Samet
The 802.11 MAC Sublayer Protocol (21)
•It works by carefully defining the
interframe time interval.
•After a frame has been sent, a certain
amount of dead time is required before any
station may send a frame.
•Four different intervals are defined, each
for a specific purpose.
• Reassociation
A station may change its preferred base
station using this service
BLM431 Computer Networks 62
Dr. Refik Samet
802.11 Services (6)
•Distribution
This service determines how to route frames
sent to the base station.
•Integration
If a frame needs to be sent through a non -
802.11 network with a different addressing
scheme or frame format, this service handles
the translation from the 802.11 format to the
format required by the destination network
BLM431 Computer Networks 63
Dr. Refik Samet
802.11 Services (7)
•Station services relate to activity
within a single cell.
•They are used after association has
taken place and are as follows.
Intracell Services
• Authentication
• Deauthentication
• Privacy
• Data Delivery
•Deauthentication
When a previously authenticated station wants
to leave the network, it is deauthenticated.
BLM431 Computer Networks 66
Dr. Refik Samet
802.11 Services (10)
•Privacy
For information sent over a wireless LAN to be
kept confidential, it must be encrypted. This
service manages the encryption and decryption.
•Data Delivery
Finally, data transmission is what it is all about,
so 802.11 naturally provides a way to transmit
and receive data.
BLM431 Computer Networks 67
Dr. Refik Samet
4.5. BROADBAND WIRELESS (1)
• Let us now go outside and see if any
interesting networking is going on there.
• With the deregulation of the telephone
system in many countries, competitors to
the entrenched telephone company are
now often allowed to offer local voice
and high-speed Internet service.
• There is certainly plenty of demand.
BLM431 Computer Networks 68
Dr. Refik Samet
Broadband Wireless (2)
• The problem is that running fiber, coax, or even
category 5 twisted pair to millions of homes and
businesses is prohibitively expensive.
• What is a competitor to do?
• The answer is broadband wireless.
• Erecting a big antenna on a hill just outside of
town and installing antennas directed at it on
customers’ roofs is much easier and cheaper than
digging trenches and stringing cables.
BLM431 Computer Networks 69
Dr. Refik Samet
Broadband Wireless (3)
• In April 2002, IEEE completed the
802.16 Standard named “Air Interface
for Fixed Broadband Wireless Access
Systems”
• However, some people prefer to call it a
wireless MAN or a wireless local loop
(a) QPSK.
(b) QAM-16.
(c) QAM-64.
Service Classes
• Constant bit rate service
• Real-time variable bit rate service
• Non-real-time variable bit rate service
• Best efforts service
(a) Four physical LANs organized into two VLANs, gray and white,
by two bridges. (b) The same 15 machines organized into two
VLANs by switches. BLM431 Computer Networks 115
Dr. Refik Samet
The IEEE 802.1Q Standard (1)
•In VLAN the actually matters is the VLAN
of the frame itself, not the VLAN of the
sending machine.
•If there were some way to identify the
VLAN in the frame header, then the need to
inspect the payload would vanish.
•For a new LAN, such as 802.11 or 802.16, it
would have been easy enough to just add a
VLAN field in the header.
BLM431 Computer Networks 116
Dr. Refik Samet
The IEEE 802.1Q Standard (2)
•In fact, the Connection Identifier field in
802.16 is somewhat similar in spirit to a
VLAN identifier.
•But what to do about Ethernet, which is the
dominant LAN, and does not have any spare
fields lying around for the VLAN identifier?
•This problem was solved by changing the
Ethernet header and the new format was
published in IEEE Standard 802.1Q.
BLM431 Computer Networks 117
Dr. Refik Samet
The IEEE 802.1Q Standard (3)
•The new format contains a VLAN tag; we
will examine it shortly.
•During the transition process, many
installations will have some legacy machines
(typically classic or fast Ethernet) that are not
VLAN aware and others (typically gigabit
Ethernet) that are.