CCN 2
CCN 2
CCN 2
The Medium Access Control (MAC) sublayer is a critical component of the data link layer in
network architecture. It is responsible for controlling how devices on a network gain access
to the medium and permission to transmit data. The MAC sublayer is an essential part of the
data link layer, primarily tasked with managing access to the communication channel in a
network. This sublayer is particularly significant in Local Area Networks (LANs), where
multiple devices share the same communication medium.
Key Responsibilities
Importance in LANs
LANs heavily rely on the MAC sublayer because they involve multiple devices
communicating over the same medium. The MAC sublayer's protocols ensure that data
transmission is orderly, efficient, and free from chaos that would result from simultaneous
transmissions.
Layer Structure
Although the MAC sublayer is technically part of the lower portion of the data link layer, it is
often studied after understanding point-to-point protocols. This educational approach is
taken because comprehending multi-party protocols (managed by the MAC sublayer) is
easier once two-party protocols are well understood.
FDM
However, when the number of senders is large and varying or the traffic is bursty,
FDM presents some problems.
If the spectrum is cut up into N regions and fewer than N users are currently
interested in communicating, a large piece of valuable spectrum will be wasted.
If more than N users want to communicate, some of them will be denied permission
for lack of bandwidth, even if some of the users who have been assigned a frequency
band hardly ever transmit or receive anything.
The poor performance of static FDM can easily be seen with a simple queueing
theory calculation.
Let us start by finding the mean time delay, T, to send a frame on to a channel of
capacity C bps. We assume that the frames arrive randomly with an average arrival
rate of λ frames/sec, and that the frames vary in length with an average length of 1/μ
bits. With these parameters, the service rate of the channel is μC frames/sec.
1
A standard queueing theory result is T=
μC− λ
If C is 100 Mbps, the mean frame length, 1/μ, is 10,000 bits, and the frame arrival
rate, λ, is 5000 frames/sec, then T = 200 μsec.
Note that if we ignored the queueing delay and just asked how long it takes to send a
10,000 bit frame on a 100-Mbps network, we would get the (incorrect) answer of 100
μsec. That result only holds when there is no contention for the channel.
Now let us divide the single channel into N independent subchannels, each with
capacity C/Nbps. The mean input rate on each of the subchannels will now be λ/N.
1 N
= =NT
Recomputing T, we get TN =
μ ( CN )−( Nλ ) μC−λ
The mean delay for the divided channel is N times worse than if all the frames were
somehow magically arranged orderly in a big central queue.
The first carrier sense protocol is called 1-persistent CSMA (Carrier Sense Multiple
Access).
When a station has data to send, it first listens
to the channel to see if anyone else is
transmitting at that moment. If the channel is
idle, the station sends its data. Otherwise, if the
channel is busy, the station just waits until it
becomes idle. Then the station transmits a
frame.
If a collision occurs, the station waits a random amount of time and starts all over
again. The protocol is called 1-persistent because the station transmits with a
probability of 1 when it finds the channel idle.
Frame Length: Ethernet has imposed restrictions on both the minimum and maximum
lengths of a frame. The minimum length restriction is required for the correct operation of
CSMA/CD, as we will see shortly. An Ethernet frame needs to have a minimum length of 512
bits or 64 bytes. Part of this length is the header and the trailer. If we count 18 bytes of
header and trailer (6 bytes of source address, 6 bytes of destination address, 2 bytes of
length or type, and 4 bytes of CRC), then the minimum length of data from the upper layer
is 64 − 18 = 46 bytes. If the upper-layer packet is less than 46 bytes, padding is added to
make up the difference. The standard defines the maximum length of a frame (without
preamble and SFD field) as 1518 bytes. If we subtract the 18 bytes of header and trailer, the
maximum length of the payload is 1500 bytes. The maximum length restriction has two
historical reasons. First, memory was very expensive when Ethernet was designed; a
maximum length restriction helped to reduce the size of the buffer. Second, the maximum
length restriction prevents one station from monopolizing the shared medium, blocking
other stations that have data to send.
Topology used in IEEE Topology used in IEEE 802.4 Topology used in IEEE 802.5
802.3 is Bus Topology. is Bus or Tree Topology. is Ring Topology.
Size of the frame format in Size of the frame format in Frame format in IEEE 802.5
IEEE 802.3 standard is IEEE 802.4 standard is 8202 standard is of the variable
1572 bytes. bytes. size.
Size of the data field is 0 Size of the data field is 0 to No limit is on the size of the
to 1500 bytes. 8182 bytes. data field.
Minimum frame required It can handle short minimum It supports both short and
is 64 bytes. frames. large frames.
FDDI is a high-speed networking standard primarily designed for local area networks (LANs)
and capable of extending up to 200 kilometers (124 miles). Based on the token ring
protocol, it supports high-capacity and high-speed data transfer. While it was once widely
used, especially in backbone networks for wide area networks (WANs) and campus area
networks (CANs), it has largely been replaced by more modern networking technologies.
Dual Ring Structure: FDDI networks typically employ two token rings—a primary ring
and a secondary ring for redundancy.
1. Primary Ring: Offers up to 100 Mbps capacity.
2. Secondary Ring: Serves as a backup and can also be used to double the
capacity to 200 Mbps if necessary.
Directional Operation: The rings operate in opposite directions, one clockwise and
the other counterclockwise.
Distance:
1. Single Ring: Can extend up to 200 km.
2. Dual Ring: Can extend up to 100 km.
Topology: Although FDDI uses a token ring topology, it can also be implemented in
a star topology structure.
Token Passing: Only the device with the token can transmit data, ensuring orderly
access to the network.
Timed Token: Ensures maximum wait times for devices, supporting both
synchronous (guaranteed timings) and asynchronous configurations.
Standards: FDDI operates at the OSI model’s Layer 1 (physical) and Layer 2 (media
access control data link).
Frame Size: It supports a large maximum transmission unit (MTU) frame size of
4,352 bytes.
Physical Media
Device Attachment
10. Discuss issue in Data Link layer and about its protocol on the
process of layering protocol
Media Access Control Sub-layer (MAC): It is the second sub-layer of data-link layer. It
controls the flow and multiplexing for transmission medium. Transmission of data packets is
controlled by this layer. This layer is responsible for sending the data over the network
interface card.
Functions are:
Flow Control:
Frame Synchronization:
Issue: Multiple devices sharing the same physical medium can lead to collisions.
Protocols: CSMA/CD (Carrier Sense Multiple Access with Collision Detection),
CSMA/CA (Carrier Sense Multiple Access with Collision Avoidance), Token Ring.
Solution: Implementing rules and protocols to manage access to the physical
medium.
Addressing:
Issue: Ensuring priority for different types of traffic (e.g., video, voice, data).
Protocols: 802.1Q (VLAN tagging), 802.1p (Priority tagging).
Solution: Prioritizing traffic based on type and requirements.
Layered Approach:
Purpose: Simplifies network design by dividing it into layers, each responsible for
specific functions.
Benefits: Modularity, ease of troubleshooting, and the ability to develop protocols
independently.
Inter-Layer Communication:
Description: Each layer interacts with the layer directly above and below it.
Mechanism: Layers pass data and control information using Service Access Points
(SAPs).
Encapsulation:
Process: Each layer adds its own header (and sometimes trailer) to the data before
passing it to the next layer.
Benefit: Ensures that data is appropriately processed at each layer.