Medium Access Control Sublayer

``Data Link Layer for LANs''

Can divide networks into point-to-point and broadcast. Look at broadcast networks and their protocols.

When many stations compete for a channel (e.g., broadcast channel such as an Ethernet), an algorithm must arbitrate access to the shared channel.

Need a way of insuring that when two or more stations wish to transmit, they all wait until doing so won't interfere with other transmitters. Broadcast links include LANs, satellites (WAN), etc.

LAN's:

MANs cover a city-wide area with LAN technology. For example, cable TV.

Can have higher speed, lower error rate lines with LANs than WANs.

Channel Allocation Methods

How to allocate the broadcast channel to multiple users (nodes, stations)?

Carrier Sense Protocols

Problem with ALOHA is that frames are blindly sent--bound to be collisions.

Stations listen for a transmission before trying to send data--carrier sense. Only send if channel is idle.

Protocol Efficiency

The following table gives maximum efficiency percentages for some of the protocols we have studied so far:

CSMA/CD

Another way to reduce the number of collisions is to abort collisions as soon as they are detected. CSMA networks with Collision Detect (CSMA/CD) do just that. How long does it take to detect collisions:

Skip over some protocols.

IEEE Standard 802 for LAN's

The IEEE has produced a set of LAN protocols known as the IEEE 802 protocols. These protocols have been adopted by ANSI and ISO:

Ethernet is a specific product implementing (or nearly so) the IEEE standard. Interesting to note that having an Ethernet port on a machine has become a standard (certainly for workstations).

The 802.3 protocol is described as follows:

802.3 Frame Layout

At the Medium Access (MAC) sublayer, frames consist of the following:

  1. Frames begin with 56-bit preamble consisting of alternating 1s and 0s. Purpose? Similar to start bit in RS-232-A. It allows the receiver to detect the start of a frame.

  2. Start of the frame designated by the byte ``10101011''. That is, two consecutive 1 bits flag the end of the preamble.

  3. 48-bit destination address (16-bit for lower speed version).

  4. 48-bit source address (16-bit for lower speed version).

  5. 16-bit data length field; maximum data size 1500 bytes.

  6. 32-bit checksum field. The checksum is a number dependent on every bit in the frame. The sender computes a checksum and appends it to the frame. The receiver also recalculates the checksum, comparing result with value stored in frame. If the two checksums differ, some of the bits in the frame must have changed and the packet is discarded as having errors.

There are two types of addresses:

  1. Unicast addresses start with a high-order bit of 0. Unicast addresses refer to a single machine, and every Ethernet address in the world is guaranteed to be unique (e.g., address is sort of like a serial number).

  2. Multicast (group) addresses start with a high-order bit of 1. Multicast addresses refer to a set of one or more stations.

    A broadcast address (all 1's) is a special case of multicasting. All machines process broadcast frames.

    The management of multicast addresses (e.g., entering or leaving a group) must be managed by some outside mechanism (e.g, higher-layer software).

802.3 LANs use a binary exponential backoff algorithm:

Note: our goal is to keep delays low at low loads, but avoid collisions under high load.

Also, note that there are no acknowledgements; a sender has no way of knowing that a frame was successfully delivered.

Switched 802.3 LANs

Can connect hosts to a hub switch. Advantage is that stations use the same network interface card, but they can run at higher speeds.

IEEE Standard 802.4: Token Bus

Physically a bus, logically a ring with each station having a number.

Use of a special control frame called a token. Can only send a message by first capturing the token which passes between stations. No collisions because only one station at a time may hold the token.

Different priority levels at each stations with each getting a fraction of the amount of time for the station.

Periodically broadcast special tokens to allow new stations to enter the ring.

IEEE Standard 802.5: Token Ring

Token passed around the ring. It is seized to send a message then regenerated and passed to the next station.

Comparison of LAN's

Non-deterministic nature of CSMA/CD protocol makes real time computing people nervous.

802.3:

802.4:

802.5:

FDDI

The Fiber Distributed Data Interface (FDDI) is a standard for token rings using fiber for individual links:

  1. supports data rates of 100 Mbps over 200 km

  2. uses LED rather than lasers (lasers potentially dangerous)

  3. has a bit error rate of only 1 in tex2html_wrap_inline90 bits

  4. cabling consists of a pair of rings (one for each direction); two pairs are specified so that the second ring can be used to reconfigure the ring in the event of a station or link failure

The protocol itself is similar to 802.5, but has the following differences:

Waiting for applications to catch up. Similar to Ethernet which people said was too complicated when it came out.

IEEE Standard 802.2: Logical Link Control

On top of MAC layer for DLL equivalent (Fig 4-33).

Service options: