Why Is Medium Access Control Needed?
Why Is Medium Access Control Needed?
3) - Wireless LANs
The Data Link Layer is divided into two Parts MAC (Media Access Control) Sublayer and
LLC (Logic Link Control) Sublayer
Fig: Worst-case scenario: (a) A sends a frame at time t; (b) A’s frame arrives at B at
time t + d; (c) B begins transmitting at time t + d and collides with A’s frame; (d) B’s
runt (32-bit) frame arrives at A at time t +2d
When this happens, the two (or more) frames are said to collide on the network. Each
sender, because the Ethernet supports collision detection, is able to determine that a
collision is in progress.
At the moment an adaptor detects that its frame is colliding with another, it first
makes sure to transmit a 32-bit jamming sequence and then stops the transmission.
Thus, a transmitter will minimally send 96 bits in the case of a collision: 64-bit
preamble plus 32-bit jamming sequence.
Once an adaptor has detected a collision and stopped its transmission, it waits a certain
amount of time and tries again. Each time it tries to transmit but fails, the adaptor
doubles the amount of time it waits before trying again.
This strategy of doubling the delay interval between each retransmission attempt is a
general technique known as exponential backoff.
ADVANTAGES
1. Ethernet is extremely easy to administer and maintain: There are no switches that
can fail, no routing or configuration tables that have to be kept up-to-date, and it is
easy to add a new host to the network.
2. It is inexpensive: Cable is cheap, and the only other cost is the network adaptor on
each host.
WIRELESS LAN
Wireless technologies differ in variety of dimensions, most notably in how much
bandwidth they provide and how far apart communicating nodes can be.
Four prominent wireless technologies:
a. Blue tooth
b. Wi-Fi(more formally known as 802.11)
c. WiMAX(802.16)
d. Third generation or 3Gcellular wireless.
The most widely used wireless links today are usually asymmetric, that is, the two
endpoints are usually different kinds of nodes.
BASE STATION, usually has no mobility, but has a wired (or at least high
bandwidth) connection to the internet or other networks.
A “client node” is often mobile, and relies on its link to the base station for all its
communication with other nodes.
Wireless communication naturally supports point to multipoint communication,
because radio waves sent by one device can be simultaneously received by many
devices.
This topology implies three qualitatively different levels of mobility.
The first level is no mobility, such as when a receiver must be in a fixed location to
receive a directional transmission from the base station, as is the case with the initial
version of WiMAX.
The second level is mobility within the range of a base, as is the case with Bluetooth.
The third level is mobility between bases, as is the case with cell phones and Wi-Fi.
(1) 802.11/Wi-Fi
Wireless network based on the IEEE 802.11standards, often referred to as Wi-Fi.
1. Physical Properties
802.11 was designed to run over three physical media namely FHSS, DSSS and
infra red.
Spread spectrum (FHSS/DSSS)
Operates in 2.4GHz ISM band with a data rate of 11 Mbps.
In FHSS, signal is transmitted over a random sequence of frequencies.
In DSSS for each data bit, the sender transmits the XOR of that bit and n random
bits.
A pseudorandom number generator is used to select the hopping sequence/random
bits.
The modulation techniques used are frequency shift keying (FSK) & phase shift
keying (PSK) respectively. In both methods except for intended receiver, it would
remain as noise for other nodes.
Infrared
It uses infrared light in the range of 800 to 950 nm.
The modulation technique is called pulse position modulation (PPM).
The sender and receiver do not need to have a clear line of sight.
It has a range of up to about 10 m and is limited to the inside of buildings only.
The data rate is up to 2 Mbps.
The frame contains the source and destination node addresses, each of which are
48 bits long; up to 2312 bytes of data; and a 32-bit CRC.
The Control field contains three subfields: a 6-bit Type field that indicates whether
the frame carries data, is an RTS or CTS frame, or is being used by the scanning
algorithm.
A pair of 1-bit fields—called ToDS and FromDS—that are described below.
In the simplest case, when one node is sending directly to another, both the DS bits
are 0, Addr1 identifies the target node, and Addr2 identifies the source node.
In the most complex case, both DS bits are set to 1, indicating that the message
went from a wireless node onto the distribution system, and then from the
distribution system to another wireless node.
With both bits set, Addr1 identifies the ultimate destination, Addr2 identifies the
immediate sender.
Addr3 identifies the intermediate destination (the one that accepted the frame from
a wireless node and forwarded it across the distribution system),and Addr4
identifies the original source.
Addr1 corresponds to E, Addr2 identifies AP-3, Addr3 corresponds to AP-1, and
Addr4 identifies A.
(2) BLUETOOTH (802.15.1)
Bluetooth technology, standardized as IEEE 802.15.1 is a personal area network
(PAN).
It is used for short-range wireless communication (maximum 10 m) between mobile
phones, PDAs, notebook and other peripheral devices.
Uses low power transmission, operates in 2.45 GHz band with data rate up to 3 Mbps.
Bluetooth Special Interest Group has specified a set of profiles for a range of
application.
Bluetooth network is known as piconet.
A piconet can have up to eight stations, one of which is called the master and the rest
are called slaves.
Slaves do not directly communicate with each other, but via the master.
Bluetooth uses FHSSS and synchronous TDM for transmission.
Master transmits in odd numbered slots, whereas slave transmits to master in even-
numbered slots.
Slaves in parked or inactive state cannot communicate, until it is activated by the
master.
Maximum of 255 devices can be in parked state.