Download Media Access Control #7

Document related concepts

Power over Ethernet wikipedia , lookup

Deep packet inspection wikipedia , lookup

Wireless security wikipedia , lookup

Point-to-Point Protocol over Ethernet wikipedia , lookup

IEEE 802.1aq wikipedia , lookup

AppleTalk wikipedia , lookup

Wake-on-LAN wikipedia , lookup

Cracking of wireless networks wikipedia , lookup

Piggybacking (Internet access) wikipedia , lookup

IEEE 1355 wikipedia , lookup

IEEE 802.11 wikipedia , lookup

Transcript
Media Access Control
#7
Chapter 6
MAC
1
MAC
2
Outline
Why use MAC protocols
General classes of MAC protocols
Standard LAN protocols
Broadband Access
Deterministic
Random Access
Cable
DSL
Other..
Satellite Networks
Media Access Control:
Protocols provide:
Direct access to the media
Distributed control over
resource allocation
Typically broadcast
(real or virtual)
MAC
3
MAC
4
Media Access Control:
Advantages
High data rates
(open new applications)
Low cost
Local organizational control
Wireless is a broadcast media and efficient
use of resources is important
Enable sharing of resources
Mobility
via Wireless
Media Access Control
MAC protocols establish a set of rules that govern
who gets to use the shared transmission media in an
efficient manner.
Obstacle to perfect channel utilization
Finite propagation delay means that each users’
knowledge of the state of the system is imperfect
and thus they can not perfectly schedule
transmissions, i.e., some time will be wasted
attempting to learn the state of the system and/or
learning the fate of transmissions.
Lost messages
MAC
5
Media Access Control
Perfect Knowledge would lead to FIFO
performance.
Performance of MAC protocols will be
compared to FIFO performance.
Ideal
MAC
Performance
MAC
6
Impact of MAC Overhead
MAC Protocol 2
E[T]/E[X]
Transfer Delay
MAC Protocol 1
1
Load
Smax-1
Smax-2 1
ρ
Adapted from: Leon-Garcia & Widjaja: Communication Networks
MAC
7
MAC
8
Alternative Media Access Control
Strategies
Static Allocation
FDM
TDM
Problems
Management; not easy to add users
– Requires signaling
Wasteful in resources for bursty traffic
Example
A transmission media has a rate of 10 Mb/s and supports
50 users. The system uses static allocation. A user has a 1
Mbyte file to transmit. The file transfer time is:
Alternative Media Access Control
Strategies
Suppose
you send a message to all
the other 49 users saying, ‘I need the
whole channel for about 1sec, do not
use it, please’
As long as the overhead incurred
in sending the message is less than
39 sec. the user will get better
performance.
MAC
9
Alternative Media Access Control
Strategies
Deterministic
Polling
Token
networks
Random Access
ALOHA
Carrier
sense multiple access (CSMA)
CSMA with collision detection (CSMA/CD)
MAC
10
Alternative Media Access Control
Strategies: Dynamic allocation of resources
Deterministic; Polling, Token Ring &Token
Bus
Advantage: the maximum time
between users chances to transmit is
bounded. (assuming a limit on the
token holding time)
Disadvantage: Time is wasted polling
other users if they have no data to send.
The technology does not scale
MAC
11
MAC
12
Deterministic Protocols
Roll
Call Polling
Master/slave
arrangement
Master polls each node; Do you
have data to send?
If the polled node has data it is
sent otherwise next node is
polled.
Deterministic Protocols
Node
Node
Master
Node
Node
Maximum token holding time= Maximum time a
station is allowed to transmit before passing on the
permission to transmit, the token.
MAC
13
MAC
14
Deterministic Protocols
Hub Polling
No master station
Each nodes polls the next node in turn
Node
Node
Node
Node
Node
Deterministic Protocols
Example:
# nodes = 10
Link rate = 1 Mb/s
Packet Size = 1000 bits
Assume Low load no queueing
Assume node interface delay = 0
0.1 ms between nodes (30 km/(3x108m/s) = 0.1ms)
Find the effective transmission rate and efficiency.
–
–
–
–
Repeat for link rate = 10 Mb/s
–
–
–
–
On average destination is 5 nodes away .5 ms
Time to transmit 1000 bits = 0.5 ms + 1 ms = 1.5 ms
Effective transmission rate = 1000 bits/ 1.5 ms = 666Kb/s
Efficiency = (666 Kb/s)/(1000 Kb/s) = 0.66
On average destination is 5 nodes away .5 ms
Time to transmit 1000 bits = 0.5 ms + .1 ms = .6 ms
Effective transmission rate = 1000 bits/ .6 ms = 1.67 Mb/s
Efficiency = (1.67 Mb/s)/(10 Mb/s) = 16.7%
Conclusion Polling does not scale with link rate
MAC
15
MAC
16
Alternative Media Access Control
Strategies: Random Access
Each node sends data with limited
coordination between users:
No explicit permission to transmit
Total chaos: Send data as soon as ready
Limited chaos: Listen before sending data, if
the channel is busy do not send.
Further Limiting chaos: Listen before sending
data, continue listening after sending and if
collision with another transmission stop
sending.
[Carrier Sense Multiple Access with Collision Detection
CSMA/CD]
MAC
17
MAC
18
Alternative Media Access Control
Strategies: Random Access
Advantage: Simple
Disadvantage:
No
guarantee that you will
ever get to send.
The MAC protocol
technology does not scale
Random Access Protocols:
Assumptions
Overlap
in time and space of two
or more transmissions causes a
collision and the destruction of all
packets involved.
[ No capture effects]
One
channel
For analysis no station buffering
MAC
19
MAC
20
Random Access Protocols:
Assumptions
Time-Alternatives
Synchronization between
users (Slotted
time)
No synchronization between users
(unslotted time)
Knowledge of the channel stateAlternatives
Carrier
sensing (Listen before talk-LBT)
Collision detection
Random Access Protocols
Strategies
ALOHA
Backoff
No coordination between users
Send a PDU, wait for acknowledgment,
if no acknowledgment ASSUME collision then
backoff and try again
Select “random” time to attempt another
transmission
Slotted ALOHA
Same as ALOHA only time is slotted
MAC
21
MAC
22
Random Access Protocols
Strategies
p-persistent CSMA
Listen to channel, on transition from busy to idle
transmit with probability p
After sending the PDU, wait for
acknowledgment,
if no acknowledgment then backoff and
retransmit
Non-persistent, if channel busy then reschedule
transmission
1-persistent, Transmit as soon as idle
Random Access Protocols
Strategies
CSMA/CD
1-persistent
but continue to sense
the channel, if collision detected
then stop transmission.
CSMA/CD is used in 10, 100
Mb/s, and 1 Gb/s Ethernet
MAC
23
MAC
24
Limitations on Random
Access Protocols
Distance
Time
to learn channel state Propagation time
Speed
Time to learn channel state Clocking speed
Random Access Protocols
Analysis of ALOHA:
Goal: Find Smax
Protocol Operation
Packet of length L (sec) arrives at station i
– Station i transmits immediately
– Station i starts an acknowledgment timer
If no other station transmits while i is transmitting
then success
Else a collision occurred
Station i learns that a collision occurred if the
acknowledgment timer fires before the
acknowledgment arrives
MAC
25
Random Access Protocols
Analysis of Aloha
collision detected then station i
retransmitts at a later time, this time
is pseudo-random and is determined
by a backoff algorithm
If
Design
Issue:
Determine
the maximum normalized
throughput for an Aloha system
MAC
26
Random Access Protocols
Analysis of Aloha
Assumptions
1.
= Average number of new message arrival to the system
2.
= Average number arrivals to the system, i.e.,
new arrivals + retransmissions
3. The total arrival process is Poisson
4. Fixed Length Packets
MAC
27
Random Access Protocols
Analysis of Aloha
Collision Mechanism
Arrival
Arrival
Arrival
Target Packet
2L
Target packet is vulnerable to collision for 2L Sec.
MAC
28
Random Access Protocols: Analysis of Aloha
New Retransmitted
Delay
Load
0.18
MAC
29
Random Access Protocols
Analysis of Slotted Aloha
Target Packet
Synchronization reduces the vulnerable period
from 2L to L so the maximum throughput is
increases to 36%
MAC
30
Random Access Protocols
Performance of Unslotted and Slotted Aloha
From: “Computer Networks, 3rd Edition, A.S. Tanenbaum.
Prentice Hall, 1996
MAC
31
Random Access Protocols
CSMA Protocols
Listen to the channel before transmitting to reduce the
vulnerable period
Let D = maximum distance between nodes (m)
Let R = the transmission rate (b/s)
Let c = speed of light = 3 x 108 m/s
The propagation time = D/(kc)=τ (sec)
k is a constant for the physical media:
k = .66 for fiber, k=.88 for coax
Example: 1 km
- Free space propagation time
- Fiber propagation time
- Coax propagation time
= 3.33 us
= 5.05 us
= 3.79 us
MAC
32
Random Access Protocols
CSMA Protocols
Assume node A transmits at time t and node
B at t -x, where x 0
(That is, Node B transmits right before it hears A)
If after 2D/kc sec. no collision occurred, then
none will occur
Let a= τ/L=(D/kc)/L = normalized length of
the bus
Remember L(sec) =
(Packet Length [bits])/R [b/s]
As a --> 1, CSMA performance
approaches Aloha performance
MAC
33
Random Access Protocols
CSMA Protocols
Limits on a
Want a small to keep vulnerable period
short by having:
– Short bus
a= DR/Xkc
where
– Lower speeds
X= packet length in bits
– Long packets
Lower limit (Minimum) packet length to
upper bound a
Maximum packet length to be fair
Reason for Minimum/Maximum
Packet Size in the Internet
MAC
34
Random Access Protocols
Performance
Ideal
From: “Computer Networks, 3rd Edition, A.S. Tanenbaum.
Prentice Hall, 1996
MAC
35
Random Access Protocols
Performance: Nonpersistent CSMA
S
0.81
0.01
0.51
0.14
0.1
G
1
From: Leon-Garcia & Widjaja: Communication Networks
MAC
36
Polling vs Random Access Performance
α= a
N=
# Nodes
MAC
37
MAC
38
Random Access Protocols
CSMA Protocols: States
From: “Computer Networks, 3rd Edition, A.S. Tanenbaum.
Prentice Hall, 1996
Collision Free Protocols
Collision free protocols establish rules
to determine which stations sends after
a successful transmission.
Assume there are N stations with
unique addresses 0 to N-1.
A contention interval is a period after a
successful transmission that is divided
into N time slots, one for each station.
MAC
39
Collision Free Protocols
If a station has a PDU to send it sets a
bit to 1 in its time slot in the contention
interval.
At the end of the contention interval all
nodes know who has data to send and
the order in which it will be sent.
MAC
40
Collision Free Protocols
Problems:
Fairness
Flexibility
Many
systems use the basic
approach of collision free
protocols
MAC
41
Random Access and Reservations
Distributed systems: Stations implement a decentralized algorithm to
determine transmission order, e.g., reservation Aloha
Centralized systems: A central controller accepts requests from stations
and issues grants to transmit
Frequency Division Duplex (FDD): Separate frequency bands for
uplink & downlink
Time-Division Duplex (TDD): Uplink & downlink time-share the same
frequency channel
The centralized system is used in many access technologies, e.g.,
DOCSIS
IEEE 802.16 (WiMAX)
Wideband code division Multiple access (WCDMA)
High Speed Data Packet Access (HSDPA) - Evolution from GSM
Long Term Evolution (LTE)
CDMA2000
Evolution Data optimized EV-DO – Evolution from CDMA
Adapted from: Leon-Garcia & Widjaja: Communication Networks
MAC
42
Reservation System
System Characteristics
Asymmetric
– Upstream
Minislots with requests for resources
Access Minislots via random access protocol
– Downstream
Accepts minislots and includes grants for
transmission
Grants control the flow on the upstream link
Order of grants established via a “scheduling”
algroithm
MAC
43
Reservation Systems
Reservation
interval
r
d
Frame
transmissions
d
d
Upstream Transmissions
r
d
Cycle n
d
d
Time
Cycle (n + 1)
Minislot
r
= 1 2
3
M
Transmissions organized into cycles (or frames)
Cycle: reservation interval + frame transmissions
Reservation interval has a minislot for each station to request
reservations for frame transmissions; minislot can carry other
information, e.g., number of frame to TX, station backlog, channel
quality indicator (CQI)
Adapted from: Leon-Garcia & Widjaja: Communication Networks
MAC
44
Central controller issues
grants to transmit
Algorithms to grant permission to UE
permission to transmit on upstream can
be based on:
number
of frame to TX,
station backlog,
channel quality indicator (CQI)
– Leads to Opportunistic Scheduling
Other…..
MAC
45
MAC
46
Throughput
Let
Assume
R = Link rate (b/s)
L = packet size (bits)
v= minislot size (sec)
M = Number of stations
X = L/R (sec)
Propagation delay < X Access network
Heavy load stations have packets to send
All requests are granted
One minislot needed for each packet/station
Time to transmit M packets = Mv+MX
Adapted from: Leon-Garcia & Widjaja: Communication Networks
Throughput
If k frame transmissions can be reserved with ONE
reservation message and if there are M stations, as
many as Mk frames can be transmitted in XM(k+v)
seconds
Adapted from: Leon-Garcia & Widjaja: Communication Networks
MAC
47
Throughput: with random access
contention for Minislots
Real systems have too many nodes for each to
get a fixed minislot.
Therefore a random access protocol is used to
transmit in a minslot.
A station attempts to obtain a grant by
transmitting in a minslot in the upstream
direction.
If successful the station will get the grant on the
down stream
If unsuccessful then assume collision, backoff and
retry.
MAC
48
Throughput: with random access
contention for Minislots
Assume slotted Aloha is used for
contention for minislots.
On average, each reservation takes at
least e = 2.71 minislot attempts
1
Smax = 1 + 2.71v/X
Effect is just to make the minislots seem
longer
MAC
49
MAC
50
Standard LANs
IEEE 802.3 [10 Mb/s]
IEEE 802.4 [up to 10 Mb/s]
Token Bus
Modulated
IEEE 802.5 [4 and 16 Mb/s]
CSMA/CD
Baseband
Token ring
Baseband
IEEE 802.11 Wireless LAN (more later)
Standard LANs
FDDI (CDDI) [100 Mb/s]
Token Ring
IEEE 802.12 [100 Mb/s]
Fiber Distributed Data Interface
Copper Distributed Data Interface
Baseband
Demand priority
IEEE 802.16
(Wireless local loop or Wireless MAN)
Other IEEE 802.xx Protocols
Cable Modem Data over Cable Service Interface
Specification (DOCSIS)
MAC
51
Standard LANs
Network Layer
IEEE 802.2
Medium Access Control
Physical Layer
IEEE 802.2 = Logical Link Control
Protocol
IEEE 802.3
IEEE 802.4
IEEE 802.5
IEEE 802.6
IEEE 802.11
IEEE 802.12
IEEE 802.16
Others…..
MAC
52
Random Access Protocols
CSMA Protocols
Example: Ethernet
Rate = 10 Mb/s
Minimum packet size = 512 bits
Maximum packet size = 12144 bits
D (max per segment) = 500 m
a --> [0.001, 0.03]
CSMA networks do not scale
Increase D performance degrades
Increase R performance degrades
MAC
53
MAC
54
Ethernet
Unslotted 1-persistent CSMA/CD
Procedure
Frame_to_transmit and idle
– wait interframe_gap
– transmit
Listen
to channel and if collision
– stop sending
– send jam signal
– schedule retransmission
Ethernet: Schedule retansmission
(the binary exponential backoff algorithm)
N= N+1 where N = number of retransmission
attempts
If N > attempt limit then trash the PDU
else
calculate the backoff time
– k = Min[N, backoff_limit]
– R ~ Uniform [0, 2k]
– retransmit at time tnow +
R*slot_time
MAC
55
MAC
56
Ethernet: Parameters
Slot time = 512 bit times
Interframe gap = 9.6us
Attempt limit = 16
Backoff limit = 10
Jam time = 32 bits/rate
Maximum frame size = 8*(1518) bits
Minimum frame size = 8*(64) bits
Ethernet
Packet structure
802.3 MAC Frame
1518 Bytes
7
1
Preamble
SD
Synch
6
Destination
Address
Start
frame
6
Source
Address
2
4
Length Information Pad
1A-23-F9-CD-06-9B
FCS
46 to 1500 bytes
Preamble: 7 bytes of 10101010
Start Of Frame: 1 byte, thus: 10101011
Source and Destination Address: Each 6 bytes and are globally unique.
Type field:
In 802.3 this field gives the length (in bytes) of the data field.
Data field: From 46 to 1500 bytes.
MAC
57
MAC
58
Ethernet:
Typical Configurations
Started here
NIC
NIC
NIC
Bus
Hub
Evolved to
NIC
NIC
NIC
NIC =
Network
Interface
Card
Switched Ethernet
AHigh Speed Interface, GigE
From: “Computer Networks, 3rd Edition, A.S. Tanenbaum.
Prentice Hall, 1996
MAC
59
Gigabit Ethernet
Allows half- and full-duplex operation at speeds of
1000 Mb/s
Uses the 802.3 Ethernet frame format
Can use the CSMA/CD access method with support
for one repeater per collision domain: Half-duplex
Common use is with Gigabit Ethernet switches in
Full-duplex mode
→ Νo CSMA/CD
Addresses compatibility with 10 Mb/s, 100 Mb/s,
and 10-Gigabit Ethernet technologies
From: Whitepaper: Gigabit Ethernet Overview,
Gigabit Ethernet Alliance, May, 1997, http://www.gigabit ethernet.org/technology/whitepapers
MAC
60
Gigabit Ethernet: Distance
Multimode fiber-optic link with a maximum
length of 550 meters
Single-mode fiber-optic link with a
maximum length of 3 kilometers
Optical links based on Fiber channel
technology
Copper based link with a maximum length
of at least 25 meters.
Category 5 unshielded twisted pair (UTP)
wiring link 100 meters
From: Whitepaper: Gigabit Ethernet Overview,
Gigabit Ethernet Alliance, May, 1997, http://www.gigabit ethernet.org/technology/whitepapers
MAC
61
MAC
62
Gigabit Ethernet:
Possible Application
From: Whitepaper: Gigabit Ethernet Overview,
Gigabit Ethernet Alliance, May, 1997, http://www.gigabit ethernet.org/technology/whitepapers
Evolution of Ethernet Technology
PMD=Physical Media Dependent
From: Mike Salzman, "10 GbE requirements & architecture,"
http://grouper.ieee.org/groups/802/3/10G_study/public/june99/salzman_1_0699.pdf
MAC
63
MAC
64
Ethernet
40 Gb/s Ethernet 40GbE
100 Gb/s Ethernet
100GbE
Provide support for
optical transport
network(OTN)
Carrier Grade Ethernet
Virtual LAN
Ethernet services to end
customers
Ethernet technology in
carrier networks
Adapted from: Leon-Garcia & Widjaja: Communication Networks
Vision: Ethernet End-to-End
Carrier CO
PoP
Carrier CO
PoP
GbE
Location A
GbE
GbE
Optical
Transport
MAN
10GbE
MAN
GbE
Optical
Transport
10GbE
Core DWDM Optical
Network
GbE
Optical
Transport
GbE
Campus LAN
Location B
MAC
65
MAC
66
From:10 Gigabit Ethernet Alliance Networld+Interop Las Vegas May, 2000
Definitions of Network Elements
Repeaters
Bridges
Switches
Routers
Routing
Forwarding
Repeaters & Bridges
Repeaters forwards electrical signals from one
Ethernet to another
Bridges (sometimes called hubs)
Interconnects multiple access LANs to form
Extended LANs
Only forwards frames destined for other LANs
Link layer forwarding based on MAC address
Bridges are devices that forward link-level frames
from one physical LAN to another
Bridging forwarding rules prevent loops
MAC
67
Switches & Routers
Switches
– Forwards packets
– Star topology
– New hosts can be added without degrading the
performance of the existing hosts
– Scales by adding additional switches
(if supported by the switch fabric)
Routers & Gateways
– Forwards packets
– Interconnects two or more networks (maybe owned by
different organizations)
– Forwarding take packet from input port then use
routing table to find an output port then forward packet
to that port.
– Routing process of filling in the routing table
MAC
68
Switches & Routers
Layer 2 switching is performed by
looking at a destination MAC address
within a frame. Layer 2 switching
builds and maintains a switching table
that keeps track of which MAC
addresses belong to each port or
interface.
Ethernet
switches
ATM Switches
MAC
69
Switches & Routers
Layer 3 switching (routers) operates at the
network layer. It examines packet
information and forwards packets based on
their network-layer destination addresses.
IP Switches
Layer 4 Switching operates at the transport
layer makes forwarding decision based on IP
address and TCP/UDP application port
Gateways, Firewalls, IPSec, Policy Based
Networks (PBN), Directory Enabled Networks
(DEN)
MAC
70
Wireless Networking
Some general problems
Noise
(likelihood of bit errors)
Hidden Terminal
(Removes advantage of carrier sensing)
– B Hears A
– B Hears C
– C can not hear A
Terminal A
Terminal B
Physical
obstruction
Terminal C
MAC
71
MAC
72
Wireless Networking
(Some problems continued)
Average received signal strength
Falls off with distance between tx and rec
Is a function of
– Reflection
– Diffraction
– Scattering
Changing received signal strength
Signal fading
– Mobility
– Weather
Propagation mechanisms
R=Reflection
S=Scattering
D=Diffraction
From: Anderson, J., Rappaport, and Yoshida, S. “Propagation Measurements and Models for
Wireless Communications Channels,” IEEE Communications Magazine, Jan 1995
MAC
73
Propagation Effects
Signal strength at a
distance varies due to
Multipath
Large scale models
predicts the average
signal strength
Red line
Modified from: W. Stallings, Wireless Communications & Networks, Pearson 2005
Small scale (fading)
models characterize the
short term fluctuations
Black line
MAC
74
IEEE 802.11
Form of a packet radio network
Must deal with the hidden terminal
problem
Physical layer
Frequency Hopping Spread Spectrum
Direct Sequence Spread Spectrum
Infrared
MAC
75
IEEE 802.11
MAC- Carrier Sense Multiple Access with Collision
Avoidance (CSMA/CA)
Sense channel if idle the sendRequest to Send (RTS) PDU
Receiver responds with a Clear to Send (CTS) PDU
If receive CTS then all other nodes know the channel is
captured and will not send, original sources sends without
collision
If RTS PDUs collide then use random access backoff
algorithm
RTS/CTS deals with the hidden terminal problem
Access Points (AP) are the wireless/wired gateways:
Infrastructure mode
Ad hoc mode
MAC
76
802.11a
802.11a supports mandatory data rates of 6, 12, and 24 Mbps
Optional data rates of 9, 18, 36, and 54 Mbps
Operates in 5-GHz UNII (Unlicensed National Information
Infrastructure) band
Occupies 300 MHz in three different bandwidths of 100 MHz
each:5.150 to 5.250 GHz (U-NII lower band)5.250 to 5.350 GHz
(U-NII middle band)5.725 to 5.825 GHz (U-NII upper
band)802.11a provides 12 channels, each channel being 20 MHz
wide, and each centered at 20 MHz intervals (beginning at 5.180
GHz and ending at 5.320 GHz for the upper and middle U-NII
bands, beginning at 5.745 GHz and ending at 5.805 GHz for the
upper U-NII band). It is important to note that none of these
channels overlap.
802.11a uses OFDM (Orthogonal Frequency Division
Multiplexing) with multiple carriers (aka "subcarriers") per
channel
MAC
77
802.11b
Supports data rates of 1, 2, 5.5, and 11 Mb/s.
Operates in the 2.4-GHz ISM (Industrial, Scientific, and
Medical) band.
Occupies 83.5 MHz (for North America) from 2.4000 GHz to
2.4835 GHz.
802.11b provides 11 channels (for North America), each channel
being 22 MHz in width, and each channel centered at 5 MHz
intervals (beginning at 2.412 GHz and ending at 2.462 GHz).
This means that there are only 3 channels which do not overlap
(channels 1, 6, 11).
802.11b uses DSSS (Direct Sequence Spread Spectrum) with a
single carrier per channel.
Both 802.11b and 802.11a use the 802.11 MAC, both use
CSMA/CA to "listen" before transmitting on a given channel (to
avoid colliding with another transmitter by sensing if the
channel is occupied).
MAC
78
802.11g
A physical layer standard for WLANs in the 2.4GHz and 5GHz
radio band.
The maximum link rate is 54-Mbps per channel--compared with
11 Mbps for 11b.
802.11g standard uses orthogonal frequency-division
multiplexing (OFDM) modulation but, for backward
compatibility with 11b, it also supports complementary code
keying (CCK) modulation and, as an option for faster link rates,
allows packet binary convolutional coding (PBCC) modulation.
Speeds similar to 11a and backward compatibility may appear
attractive
Advantage-provides ability for dual-mode 2.4GHz and 5GHz
products, in that using OFDM for both modes to reduce silicon
cost.
MAC
79
Other IEEE 802.11 standards
IEEE 802.11n
IEEE 802.11ac
Increase rate to 600 Mb/s
Used multiple antennas Multiple-input multiple-output (MIMO)
Frame aggregation, effectively increase packet size to reduce
overhead
Increase rate to 1 Gb/s
80MHz and 160 MHz channels
Higher order modulation
IEEE 802.11af (White-Fi) proposal for Wi-Fi using the TV White
spaces using cognitive radio technology.
IEEE 802.11ad (WiGig) enables data rates up to 7 Gb/s (uses 60
GHz spectrum)
MAC
80
802.11e
Supplementary to the MAC layer to provide CoS
support for LAN applications.
Applies to 802.11 physical standards a, b and g.
802.11e provides some features for differentiating
data traffic streams.
MAC
81
Broadband Access Technologies:
Cable Modems
FDM on the Cable
From: “Computer Networks, 3rd Edition, A.S.
Tanenbaum. Prentice Hall, 1996
MAC
82
Generic Hybird Fiber Coax (HFC)
Distribution Plant
From: Data Over Cable Service Interface
Specifications (DOCSIS) Manish Mangal, Sprint, TP&I
MAC
83
Broadband Access Technologies:
Cable Modems - Terms
CMTS: Cable Modem Termination System. Central device for
connecting the cable TV network to a data network like the
internet. Normally placed in the headend of the cable TV
system. Downstream:
Headend: Central distribution point for a CATV system. Video
signals are received here from satellites and maybe other
sources, frequency converted to the appropriate channels,
combined with locally originated signals, and rebroadcast onto
the HFC plant.
Upstream: The data flowing from the Cable Modem to the
CMTS.
Downstream: The data flowing from the CMTS to the cable
modem.
MAC
84
Data Rates: DOCSIS 1.0/1.1
Carriers limit down and upstream rates, e.g., New Zealand operator TelstraClear
provides (as of Sp 2007):
- downstream speeds of 10Mbit/s and 2Mbit/s
- upstream speed of 2Mbit/s.
MAC
85
DOCSIS Protocol Stack
Convergence Sublayer:
Interface between the MAC layer and
Physical Media Dependent Layer (PMD) or PHY
Can also be Ethernet between the
Host CPE and external CM
NSI=Network
Side Interface
RFI=Radio Frequency Interface
MAC
Modified from: www.cablemodem.com/downloads/specs/SP-CMCI-I09-030730.pdf
86
Broadband Access Technologies:
Cable Modems - Terms
Headend controls all transmissions
on the downstream and schedules upstream
Request for use of upstream made using random
access (contention) in specific upstream time slots
From: “Computer Networks, 3rd Edition, A.S.
Tanenbaum. Prentice Hall, 1996
MAC
87
Broadband Access Technologies:
Cable Modems
From: http://www.cable-modems.org/tutorial
MAC
88
Broadband Access Technologies:
Cable Modems
From: http://www.cable-modems.org/tutorial
MAC
89
Broadband Access Technologies:
Cable Modems
Aggregate Data Rates shared by 500 to
2000 homes today
From: http://www.cable-modems.org/tutorial
MAC
90
DOCSIS MAC
Data Over Cable Service Interface Specification
(DOCSIS)
A stream of mini-slots in upstream
(6.25 us containing 8-32 Bytes)
Dynamic mix of contention- and reservation-based
upstream transmit opportunities
Quality of service including:
Support of Bandwidth and Latency guarantees
Packet classification
Dynamic service establishment
Extensions provided for security at data link layer
Support of wide range of data rates
MAC
91
DOCSIS MAC
Upstream Bandwidth Allocation Protocol
MAP is a MAC management message transmitted by the
CMTS in the downstream which describes the use of the
next upstream mini-slots (up to 4096)
A MAP describes some slots as grants for particular stations
to transmit data in, some for contention transmission and
some as an opportunity for new CMs to join the link
MAC
92
DOCSIS MAC
From: Data Over Cable Service Interface
Specifications (DOCSIS) Manish Mangal, Sprint, TP&I
MAC
93
MAC
94
DOCSIS MAC
PMD=Physical Media Dependent
From: http://www.jlsnet.co.uk/index.php?page=projects_docsis_chap3c
DOCSIS MAC -- Best Effort
DOCSIS 1.0
From: Data Over Cable Service Interface
Specifications (DOCSIS) Manish Mangal, Sprint, TP&I
MAC
95
MAC
96
DOCSIS MAC -- DOCSIS 1.1
Real Time Polling Mode
From: Data Over Cable Service Interface
Specifications (DOCSIS) Manish Mangal, Sprint, TP&I
DOCSIS MAC -- DOCSIS 1.1
Circuit Switched Emulation “Unsolicited Grant
Mode”
From: Data Over Cable Service Interface
Specifications (DOCSIS) Manish Mangal, Sprint, TP&I
MAC
97
MAC
98
Evolution of DOCSIS
Embedded DOCSIS: eDOCSIS device
contains
CM
One or more embedded Service/Application
Functional Entities (eSAFEs)
–
–
–
–
–
Telephone
Video
Audio
Digital video recorders
Multiple TV tuners
DOCIS 3.0
From: http://www.fttxtra.com/hfc/docsis/docsis-3-0-tutorial/
MAC
99
DOCSIS 3.0: Channel Bonding
From: http://www.fttxtra.com/hfc/docsis/docsis-3-0-tutorial/
MAC
100
Wireless broadband Internet
IEEE 802.16 (WiMax)
IEEE 802.16 protocol based on DOCSIS
IEEE 802.16e addresses mobility
MAC
101
Digital Subscriber Line: Physical topology
NID =
Network
Interface
Device
DSLAM=
Digital
Subscriber
Line Access
Multiplexer
Modified from: Tanenbaum, A. Computer
Networks, Prentice Hall, 4th ED 2003
Telephone Lines
MAC
102
Broadband Access Technologies:
DSL - digital subscriber line
Not shared media
Point-to-point connection to network
ADSL - Asymmetric DSL
Downstream -
1.5 Mb/s - 9 Mb/s
Upstream - 16 kb/s - 640 kb/s
HDSL - High data rate DSL
Downstream -
1.5 Mb/s - 2 Mb/s
Upstream - 1.5 Mb/s - 2 Mb/s
MAC
103
Broadband Access Technologies:
DSL - digital subscriber line
VDSL - Very high data rate DSL
G.lite officially ITU-T standard G-992.2
Downstream - 1.544 Mb/s to 6 Mb/s
Upstream - 128 Kbps to 384 Kbps
Does not require splitting of the line at the user end
Downstream - 13 Mb/s - 52 Mb/s
Upstream - 1.5 Mb/s - 2.3 Mb/s
DSLAM - digital subscriber line access multiplexer
Speed depends on distance from DSLAM (max
18,000 ft)
MAC
104
Powerline Communications Access
What is it:
It is a data communication
technology that operates over
the electricity supply.
Rates Mb/s
Last hop:
– Power line
– Wireless 802.11
For more information see:
http://www.adaptivenetworks.com/
MAC
105
Bluetooth
Bluetooth- Harald Blaatand (Bluetooth) II
(940-981) the Viking King who unified
Denmark and Norway
Original Goal: desk top cable replacement
Used to describe the protocol of a short range
(10 meter) frequency-hopping radio link
between devices.
devices are then termed Bluetooth - enabled.
Documentation on Bluetooth is split sections,
– Bluetooth Specification
– Bluetooth Profiles.
MAC
106
Bluetooth
The Specification describes how the
technology works (i.e the Bluetooth protocol
architecture),
The Profiles describe how the technology is
used (i.e how different parts of the
specification can be used to fulfill a desired
function for a Bluetooth device)
Uses frequency hopping in 79 hops displaced
by 1 MHz, starting at 2.402GHz and finishing
at 2.480GHz
Data Rate < 1Mb/s
For more details see:
http://www.palowireless.com/infotooth/tutorial.asp
MAC
107
MAC
108
RFID
Radio Frequency Identification Tags
Replacement for Barcode
Types
Active (like Kansas Turnpike K-tag)
Passive
Need MAC when reading a group of
products at “once”
Issues
Cost
Privacy
Satellite Networks: GEO
Geostationary
earth orbit
37,700
km
Power--> increased cost
Propagation delay
Limited orbital slots ~ 180
(2 degrees)
MAC
109
MAC
110
Satellite Networks: MEO
Medium earth orbit
5,000 - 15,000 km
Period ~ 4-9 hours
Fewer satellites
Satellite Networks: LEO
Low earth orbit
1500 km
Periods up to 2 hours
More satellites
Cheaper to launch
Odyssey Telecommunications International Inc.:
Worldwide Personal Communications
MAC
Satellite Services
111
Satellite Networks
Properties
Large delay ~ 270 ms (Geosynchronous)
Up and down links are on different frequencies
( full duplex)
CSMA/CD will not work because of long
delay
Token networks are not applicable because of
long delays, e.g., 100 nodes will have a 27 sec.
token return time.
MAC
112
Satellite Networks:
Reservation ALOHA
Consider a slotted system with N slots per frame
(TDM like)
Each slot can be in one of three states:
– Empty, i.e., not is use
– Mine, i.e., in use by me
– Other, i.e., in use by another node
Protocol
– If state is mine then continue to use it
– If state is other then do not send in that time slot
– If state is empty then contend for that slot using Aloha
MAC
113
Satellite Networks
At low loads the network performs like
a random access systems, i.e., no
waiting for permission to send.
At high loads the systems performs like
a TDM system.
This scheme has a problem with
fairness
Distributed assignment of time slots
MAC
114
Satellite Networks
TDMA - Time Division Multiple
Access
Up stream stations request bandwidth, time
slots.
Central controller grants requests for
bandwidth
Central controller has global view of all
requests
Centralized assignment of time slots
MAC
115
MAC
116
Satellite Access
What it is: Satellite access
Typically Asymmetric
DirecWay
Features
Basic
Plus
Starband
Starband
360
Starband
481
Upload speed
50 Kbps
100 kbps
50 Kbps
100 Kbps
Download
speed
500 Kbps
500 Kbps
500 Kbps
500 Kbps
Equipment cost
$600
$600
$700
$700
Installation cost
$400
$400
$400
$400
Monthly cost
$60
$100
$60
$90
Contract term
2 yr
2 yr
1 yr
1 yr
IP address
NAT
Static
NAT
Static
Installation
training
and cert.
1 day training in Ohio
conducted last
Saturday of every
month. Cost $500
Training and test available
online, free of charge
As of 2005
Nelson Environmental Study Area (NESA) Wireless Data Link
NESA HQ – Flux Tower Network
MAC
117
Satellite Link Bandwidth Tests
Microsoft Remote Desktop was used to access the data server PC located in the NESA HQ building, then
internet access bandwidth tests were initiated. Remote Desktop has a significant impact on the available
bandwidth reported. Typical numbers directly from the NESA site are 1440 kbps up / 700 kbps down.
MAC
118