515 a Access Control List , 184–187, 200, 289, 294, 404 Control Matrix

Total Page:16

File Type:pdf, Size:1020Kb

515 a Access Control List , 184–187, 200, 289, 294, 404 Control Matrix Index A B Access Bandwidth , 8, 10, 11, 13, 27, 40, 85, 133, 278, control list , 184–187, 200, 289, 294, 404 281, 327, 388, 392, 393, 398, 403, 415, control matrix , 185–186 457, 467, 474 mandatory , 189, 190, 197, 352 Base-T , 37 role-based , 185–188, 477 Base-X , 37 rule-based , 185, 188–189 Bastion , 248, 251, 262–264, 268 Activism , 115, 491, 497 Biometrics , 43, 53, 192–193, 204, 208, Advocacy , 339, 497 209, 305 Alert noti fi er , 279–280 Blue box , 112, 113 Amplitude , 8, 391 Bluetooth , 40, 400–402, 408, 419, 432, 433, Annualized loss , 159–160 438, 440–442 Anomaly , 272, 275–277, 279, 291 Bridge , 3, 13, 24, 25, 28–31, 33, 35, 141, 248, ARPANET , 68, 113 259, 293, 396 Asynchronous token , 211 Buffer over fl ow , 63, 67, 78, 110 Asynchronous transfer mode (ATM) , 23, 25, 38–40, 379, 395 Auditing , 56, 145–147, 165–167, 183, 204, C 261, 290, 352, 384 Carrier sense multiple access (CSMA) , Authentication 36, 401 anonymous , 209, 217, 220 CASPR. See Commonly Accepted Security DES , 216 Practices and Regulations (CASPR) dial-in , 215–217 CERT. See Computer Emergency Response header , 374, 375 Team (CERT) Kerberos , 214–215, 366–369 Certi fi cate authority , 213, 234, 236, 237, 239, null , 216, 405 241, 364, 366, 506, 509 policy , 218–219 Certi fi cation protocols , 214, 216, 218, 317, 366, process , 152, 164–165 382–384, 425 security , 145, 146, 164–165 remote , 209, 215–218, 383–384 Chain of custody , 302, 306, 313 Unix , 216 Challenge-response , 204, 210–212, 216, 363 Authenticator , 203, 204, 206, 207, 209, Cipher 211, 215, 216 feedback , 225 Authority registration , 240, 241 specs , 370, 371 Authorization Cladding , 12 coarse grain , 200 Coaxial cable , 11, 150, 394 fi ne grain , 200 Code Red , 68, 78, 98, 114, 329, 331, 332 granularity , 198, 199 Common criteria (CC) , 349–350 Availability , 6, 10, 85, 93, 95, 98, 109, 121, 122, Commonly Accepted Security Practices 164, 165, 201, 292, 298, 353, 392, 393, and Regulations (CASPR) , 56 422, 424, 448, 460, 467, 474–486, 504 Communicating element , 236, 237 J.M. Kizza, Guide to Computer Network Security, Computer Communications 515 and Networks, DOI 10.1007/978-1-4471-4543-1, © Springer-Verlag London 2013 516 Index Communication Denial of service , 64, 67, 74–75, 78, 107, radio , 13 109–110, 117, 129, 137, 148, 272, 273, satellite , 13 275, 310, 313, 408, 420, 422, 424, 439, Complacency , 90 441, 479, 483, 492, 504, 509 Complexity Destroyers , 126, 333, 334 programming , 137 Detection , 37, 43, 78, 83, 87, 114, 129, 130, software , 90, 91, 161, 476 150, 164, 166, 173, 254, 265, 271, system , 90, 99 275–278, 280, 282, 283, 290–292, 310, Compression 313, 317, 320, 332, 392, 409, 416, 417, data , 85, 306, 307, 311 419, 487, 493, 496, 507 lossless , 304 intrusion , 83, 87, 114, 130, 150, 166, 265, lossy , 304 271–294, 306, 313, 317, 320, 422, 462, Computer Emergency Response Team 493, 504, 507, 508 (CERT) , 57, 63, 89, 92, 99, 114, Deterrence , 43 138, 325 Disaster Con fi dentiality committee , 176, 178 data , 48, 49, 129, 223, 230–232, 241, 267, human , 172–173 423, 426 management , 171–181 information , 48 natural , 81, 150, 156, 157, 171 message , 359, 426 planning , 172 PPP , 383 prevention , 173–174 Congestion control , 21, 24, 25, 27, 32 recovery , 172, 175–176 Consolidation , 85, 447, 448, 460 resources , 180 Control Objectives for Information and response , 174–175 (Related) Technology (COBIT) , 57 Distribution center , 214, 234–236 Cracker , 81, 113, 115 Domain name service (DNS) , 22, 116, 149, CRC. See Cyclic redundancy check (CRC) 166, 255, 262–264, 266, 267, 293, Cryptanalysis , 48, 225, 226 313, 316, 504, 506 Cryptographic algorithm , 49, 224, 226, 233, Dual-homed , 256 363–364 Dumpster diving , 101 CSMA. See Carrier sense multiple access (CSMA) Cyber E crime , 107–131, 173, 493, 496 e-attack , 109 cyberspace , 64, 65, 68–72, 77, 81, 86, ECBS. See European Committee for Banking 100, 108, 109, 111, 115, 120, 133, Standards (ECBS) 137, 183, 185, 189, 247, 298, 357, ECMA. See European Computer 491–494, 497, 498 Manufacturers Association (ECMA) sleuth , 120 Education Cyclic redundancy check (CRC) , 37, 243, 304 focused , 494, 495 formal , 495 mass , 494, 495, 497, 498 D occasional , 495 DARPA. See Defense Advanced Research Effectiveness , 90, 93, 99–100, 163–165, 175, Project Agency (DARPA) 204–206, 284, 291, 292, 325, 326, 336, Data circuit-terminating equipment (DCE) , 39 337, 343, 347, 485 Datagram , 20–25, 27, 32–34, 40, 251, 252, Electronic 374–377, 397, 398, 507, 508 codebook , 225 DCE. See Data circuit-terminating equipment surveillance , 120, 191–192 (DCE) Encoding Defense Advanced Research Project Agency analog , 8, 9 (DARPA) , 21 digital , 8–9 Demilitarized zone (DMZ) , 43, 152, 262–264 scheme , 8 Index 517 Encryption Firewall asymmetric , 23, 49 forensics , 265–266 symmetric , 49, 224, 226–230, 232, 235 limitations , 267 End-points , 250, 485 NAT , 259, 261 Espionage services , 250, 266–267 economic , 82, 111 SOHO , 250, 259–260 military , 81, 120 VPN , 250, 258 Ethernet , 17, 23, 30, 32, 36–38, 248, 285, 289, Forensics 396, 509 analysis , 84, 87, 309, 311 ETSI. See European Telecommunications computer , 299, 303, 311 Standards Institute (ETSI) network , 307 European Committee for Banking Standards Frequency hopping , 401 (ECBS) , 51 FTP. See File transfer protocol (FTP) European Computer Manufacturers Association (ECMA) , 51 European Telecommunications Standards G Institute (ETSI) , 50, 392 Gateways , 3, 24, 25, 29, 30, 32–35, 46, 76, Evidence 116, 128, 133, 134, 137, 140, 247, 248, analysis of , 307–308 250, 323, 324, 327, 328, 332, 335, 377, preserving , 304–306 379–381, 398, 461, 474 recovery , 303–304 Globalization , 107, 111, 120, 171, 183, Exploits , 65, 67, 68, 78, 79, 83, 110, 116, 127, 297, 491 128, 159, 162, 163, 286, 421, 422, Global System for Mobile Communications 437–440, 504, 506, 507 (GSM) , 392, 398, 431, 433 Exterior gateway protocol (EGP) , 33 Goodtimes , 73, 74 GSM. See Global System for Mobile Communications (GSM) F FDDI. See Fiber distributed data interface (FDDI) H Federal criteria , 349, 354 Hacktivist , 115–117, 129 Federal Information Processing Standards Half open , 66, 110, 135 (FIPS) , 52, 53, 350 Hash function , 49, 211, 241–243, 306, 361, Fiber distributed data interface (FDDI) , 364, 372, 426 36, 38 Hashing algorithm , 49 File transfer protocol (FTP) , 22, 54, 149, 152, Hidden fi les , 304, 309 201, 217, 241, 252, 254, 257, 262, 263, Honeypot , 286–287, 407 266, 267, 293, 313, 335, 336 Hotlines , 497 Filtering HTTPS. See Hypertext transfer protocol over address , 252 secure socket layer (HTTPS) content , 323–340 Humanware , 95, 157–159, 161, 163 exclusion , 323, 325 Hybrid , 17, 233, 275, 284–285, 378, 380, 408, keyword , 326 470, 475, 485, 487 packet , 326 Hypertext transfer protocol over secure socket port , 252–255 layer (HTTPS) , 357, 358, 364 pro fi le , 326 stateful , 251 stateless , 251, 252 I virus , 328–335 ICMP. See Internet control message protocol Fingerprint , 47–49, 192–194, 204, 205, 208, (ICMP) 242 Ignorance , 83, 121 FIPS. See Federal Information Processing Impersonation , 102, 128 Standards (FIPS) Incident response , 58, 153, 288, 314–316 518 Index Information quality , 85 K e y Information Sharing and Analysis Centers distribution , 229, 234, 236, 240, 359, 506 (ISACs) , 107 encryption , 49, 234 Infrared , 13, 40, 194, 388, 396, 419, 440 escrow , 239–240 Initial sequence numbers , 67, 254, 508 exchange , 211, 232, 234, 362, 409, 425, 441 Integrated services digital network (ISDN) , infrastructure , 361 38, 216 management , 51–53, 233–240, 405–406, Integrity , 36, 46, 49, 52, 53, 63, 81, 93, 409, 424–426, 506 108–110, 151, 152, 164, 189, 205, 206, private , 49, 212, 213, 218, 224, 230–232, 213, 223, 224, 230–233, 235–237, 241, 242, 359, 366, 367, 371 241–243, 267, 285–286, 300, 302, public , 49, 51, 52, 209, 212–215, 218, 220, 304–306, 318, 333, 351–353, 361, 224, 226, 227, 230–245, 358, 359, 364–366, 369, 370, 372, 374–376, 361–365, 367, 368, 370, 371, 380, 381, 379, 409, 422, 423, 426, 453 425, 483, 509–510 Interface , 19, 21, 23, 30, 32–36, 38, 46, 50, 65, 93–95, 103, 133–139, 156, 158, 162, 179, 189, 207, 250, 284, 285, 332, 344, L 352, 395, 396, 414, 433, 434, 458, 468, LAN. See Local area network (LAN) 470, 474, 478, 485, 507, 508 Land.c attack , 110 Internet control message protocol (ICMP) , 22, Least privileges , 188, 189, 199, 201 23, 31, 32, 67, 68, 110, 151, 250–252, Legislation , 130, 131, 298, 340, 491–493 374, 504, 509 Load balancer , 278–280, 460, 483–484 Internet protocol security (IPSec) , 51, 52, Local area network (LAN) , 6, 7, 11, 13–17, 22, 258, 267, 357, 373–377, 380, 381, 27–30, 32–38, 40, 41, 51, 68, 109, 121, 462, 504, 506 153, 207, 219, 248, 381–385, 388, 395, Internetworking , 4, 30–34, 112 396, 400–402, 404–406, 410, 457, 458 Intruder , 11, 43, 44, 66, 67, 78, 80, 83, 89, 90, 97, 98, 109, 126–128, 150, 151, 159, 161–163, 190, 192, 200, 205, 209, 210, M 212, 226, 233, 250, 253, 255, 257, MAC. See Medium access control (MAC) 262–264, 272, 273, 276, 277, 282, 283, MAN. See Metropolitan area network (MAN) 285–287, 302, 313, 337, 359, 365, 404, Manchester , 9 406–408, 425, 437, 442, 479, 484, 485 MD-5 , 52 Intrusion detection , 83, 87, 114, 130, 150, 166, Medium access control (MAC) , 36, 37, 51, 265, 271–294, 306, 313, 317, 320, 422, 189, 190, 242, 243, 250, 252, 312, 359, 462, 493, 504, 506–508 364, 372, 395, 401, 404, 408, 409, 426 IP version (IPv) , 23, 337, 374, 376, 377, 482, Metropolitan area network (MAN) , 7, 14, 502, 507 41, 52 Iris , 47, 194, 195, 204, 205, 208, 293 Mobile IP , 396–400 ISACs.
Recommended publications
  • Medium Access Control Layer
    Telematics Chapter 5: Medium Access Control Sublayer User Server watching with video Beispielbildvideo clip clips Application Layer Application Layer Presentation Layer Presentation Layer Session Layer Session Layer Transport Layer Transport Layer Network Layer Network Layer Network Layer Univ.-Prof. Dr.-Ing. Jochen H. Schiller Data Link Layer Data Link Layer Data Link Layer Computer Systems and Telematics (CST) Physical Layer Physical Layer Physical Layer Institute of Computer Science Freie Universität Berlin http://cst.mi.fu-berlin.de Contents ● Design Issues ● Metropolitan Area Networks ● Network Topologies (MAN) ● The Channel Allocation Problem ● Wide Area Networks (WAN) ● Multiple Access Protocols ● Frame Relay (historical) ● Ethernet ● ATM ● IEEE 802.2 – Logical Link Control ● SDH ● Token Bus (historical) ● Network Infrastructure ● Token Ring (historical) ● Virtual LANs ● Fiber Distributed Data Interface ● Structured Cabling Univ.-Prof. Dr.-Ing. Jochen H. Schiller ▪ cst.mi.fu-berlin.de ▪ Telematics ▪ Chapter 5: Medium Access Control Sublayer 5.2 Design Issues Univ.-Prof. Dr.-Ing. Jochen H. Schiller ▪ cst.mi.fu-berlin.de ▪ Telematics ▪ Chapter 5: Medium Access Control Sublayer 5.3 Design Issues ● Two kinds of connections in networks ● Point-to-point connections OSI Reference Model ● Broadcast (Multi-access channel, Application Layer Random access channel) Presentation Layer ● In a network with broadcast Session Layer connections ● Who gets the channel? Transport Layer Network Layer ● Protocols used to determine who gets next access to the channel Data Link Layer ● Medium Access Control (MAC) sublayer Physical Layer Univ.-Prof. Dr.-Ing. Jochen H. Schiller ▪ cst.mi.fu-berlin.de ▪ Telematics ▪ Chapter 5: Medium Access Control Sublayer 5.4 Network Types for the Local Range ● LLC layer: uniform interface and same frame format to upper layers ● MAC layer: defines medium access ..
    [Show full text]
  • Ts 138 321 V15.3.0 (2018-09)
    ETSI TS 138 321 V15.3.0 (2018-09) TECHNICAL SPECIFICATION 5G; NR; Medium Access Control (MAC) protocol specification (3GPP TS 38.321 version 15.3.0 Release 15) 3GPP TS 38.321 version 15.3.0 Release 15 1 ETSI TS 138 321 V15.3.0 (2018-09) Reference RTS/TSGR-0238321vf30 Keywords 5G ETSI 650 Route des Lucioles F-06921 Sophia Antipolis Cedex - FRANCE Tel.: +33 4 92 94 42 00 Fax: +33 4 93 65 47 16 Siret N° 348 623 562 00017 - NAF 742 C Association à but non lucratif enregistrée à la Sous-Préfecture de Grasse (06) N° 7803/88 Important notice The present document can be downloaded from: http://www.etsi.org/standards-search The present document may be made available in electronic versions and/or in print. The content of any electronic and/or print versions of the present document shall not be modified without the prior written authorization of ETSI. In case of any existing or perceived difference in contents between such versions and/or in print, the only prevailing document is the print of the Portable Document Format (PDF) version kept on a specific network drive within ETSI Secretariat. Users of the present document should be aware that the document may be subject to revision or change of status. Information on the current status of this and other ETSI documents is available at https://portal.etsi.org/TB/ETSIDeliverableStatus.aspx If you find errors in the present document, please send your comment to one of the following services: https://portal.etsi.org/People/CommiteeSupportStaff.aspx Copyright Notification No part may be reproduced or utilized in any form or by any means, electronic or mechanical, including photocopying and microfilm except as authorized by written permission of ETSI.
    [Show full text]
  • Chapter 6: Medium Access Control Layer
    Chapter 6: Medium Access Control Layer Chapter 6: Roadmap " Overview! " Wireless MAC protocols! " Carrier Sense Multiple Access! " Multiple Access with Collision Avoidance (MACA) and MACAW! " MACA By Invitation! " IEEE 802.11! " IEEE 802.15.4 and ZigBee! " Characteristics of MAC Protocols in Sensor Networks! " Energy Efficiency! " Scalability! " Adaptability! " Low Latency and Predictability! " Reliability! " Contention-Free MAC Protocols! " Contention-Based MAC Protocols! " Hybrid MAC Protocols! Fundamentals of Wireless Sensor Networks: Theory and Practice Waltenegus Dargie and Christian Poellabauer © 2010 John Wiley & Sons Ltd. 2! Medium Access Control " In most networks, multiple nodes share a communication medium for transmitting their data packets! " The medium access control (MAC) protocol is primarily responsible for regulating access to the shared medium! " The choice of MAC protocol has a direct bearing on the reliability and efficiency of network transmissions! " due to errors and interferences in wireless communications and to other challenges! " Energy efficiency also affects the design of the MAC protocol! " trade energy efficiency for increased latency or a reduction in throughput or fairness! Fundamentals of Wireless Sensor Networks: Theory and Practice Waltenegus Dargie and Christian Poellabauer © 2010 John Wiley & Sons Ltd. 3! 1! Overview " Responsibilities of MAC layer include:! " decide when a node accesses a shared medium! " resolve any potential conflicts between competing nodes! " correct communication errors occurring at the physical layer! " perform other activities such as framing, addressing, and flow control! " Second layer of the OSI reference model (data link layer) or the IEEE 802 reference model (which divides data link layer into logical link control and medium access control layer)! Fundamentals of Wireless Sensor Networks: Theory and Practice Waltenegus Dargie and Christian Poellabauer © 2010 John Wiley & Sons Ltd.
    [Show full text]
  • Medium Access Control Sublayer
    Telematics Chapter 5: Medium Access Control Sublayer User Server watching with video Beispielbildvideo clip clips Application Layer Application Layer Presentation Layer Presentation Layer Session Layer Session Layer Transport Layer Transport Layer Network Layer Network Layer Network Layer Prof. Dr. Mesut Güneş Data Link Layer Data Link Layer Data Link Layer Computer Systems and Telematics (CST) Physical Layer Physical Layer Physical Layer Distributed, embedded Systems Institute of Computer Science Freie Universität Berlin http://cst.mi.fu-berlin.de Contents ● Design Issues ● Metropolitan Area Networks ● Network Topologies (()MAN) ● The Channel Allocation Problem ● Wide Area Networks (WAN) ● Multiple Access Protocols ● Frame Relay ● Ethernet ● ATM ● IEEE 802.2 – Logical Link Control ● SDH ● Token Bus ● Network Infrastructure ● Token Ring ● Virtual LANs ● Fiber Distributed Data Interface ● Structured Cabling Prof. Dr. Mesut Güneş ▪ cst.mi.fu-berlin.de ▪ Telematics ▪ Chapter 5: Medium Access Control Sublayer 5.2 Design Issues Prof. Dr. Mesut Güneş ▪ cst.mi.fu-berlin.de ▪ Telematics ▪ Chapter 5: Medium Access Control Sublayer 5.3 Design Issues ● Two kinds of connections in networks ● Point-to-point connections OSI Reference Model ● Broadcast (Multi-access channel, Application Layer Random access channel) Presentation Layer ● In a network with broadcast Session Layer connections ● Who gets the channel? Transport Layer Network Layer ● PtProtoco ls use dtdtd to determ ine w ho gets next access to the channel Data Link Layer ● Medium Access Control (()MAC) sublay er Phy sical Laye r Prof. Dr. Mesut Güneş ▪ cst.mi.fu-berlin.de ▪ Telematics ▪ Chapter 5: Medium Access Control Sublayer 5.4 Network Types for the Local Rang e ● LLC layer: uniform interface and same frame format to upper layers ● MAC layer: defines medium access - LLC IEEE 802.2 Logical Link Control ..
    [Show full text]
  • Chapter 11 in Stallings 10Th Edition
    Local Area Network Overview Chapter 11 in Stallings 10th Edition CS420/520 Axel Krings Page 1 Sequence 11 LAN Applications (1) • Personal computer LANs —Low cost —Limited data rate • Back end networks —Interconnecting large systems (mainframes and large storage devices) • High data rate • High speed interface • Distributed access • Limited distance • Limited number of devices CS420/520 Axel Krings Page 2 Sequence 11 1 LAN Applications (2) • Storage Area Networks — Separate network handling storage needs — Detaches storage tasks from specific servers — Shared storage facility across high-speed network — Hard disks, tape libraries, CD arrays — Improved client-server storage access — Direct storage to storage communication for backup • High speed office networks — Desktop image processing — High capacity local storage • Backbone LANs — Interconnect low speed local LANs — Reliability — Capacity — Cost CS420/520 Axel Krings Page 3 Sequence 11 Storage Area Networks CS420/520 Axel Krings Page 4 Sequence 11 2 LAN Architecture • Topologies • Transmission medium • Layout • Medium access control CS420/520 Axel Krings Page 5 Sequence 11 Bus • Multipoint medium • Transmission propagates throughout medium • Heard by all stations — Need to identify target station • Each station has unique address • Full duplex connection between station and tap — Allows for transmission and reception • Need to regulate transmission — To avoid collisions — To avoid hogging • Data in small blocks - frames • Terminator absorbs frames at end of medium CS420/520 Axel Krings
    [Show full text]
  • Media Access Control Protocols in Local Area Networks / Paresh Shah Lehigh University
    Lehigh University Lehigh Preserve Theses and Dissertations 1986 Media access control protocols in local area networks / Paresh Shah Lehigh University Follow this and additional works at: https://preserve.lehigh.edu/etd Part of the Electrical and Computer Engineering Commons Recommended Citation Shah, Paresh, "Media access control protocols in local area networks /" (1986). Theses and Dissertations. 4652. https://preserve.lehigh.edu/etd/4652 This Thesis is brought to you for free and open access by Lehigh Preserve. It has been accepted for inclusion in Theses and Dissertations by an authorized administrator of Lehigh Preserve. For more information, please contact [email protected]. Media Access Control Protocols • Ill Local Area Networks \ by Paresh Shah A Thesis Presented to the Graduate Committee of Lehigh University in Candidacy for the Degree of Master of Science . )Il Comp·uter Science Lehigh University 1986 This thesis is accepted and approved in partial fulfillment of t·he· re·qJXite~ ments for the Degree of Master of Science . .. Chai..rma·:n· CSEE Department ... 11 Acknowledgments I would like to take this time to acknowledge all those who have helped to bring about this thesis and the various concepts that are expressed. Initially, .I would like to thank rny parents for their years of support, guidance, love and understanding without which 1 could not have produced this thesis. I would like to thank Prof. Kenneth Tzeng for being a caring teacher and advisor during the research of this thesis. I would also like to thank Prof. Richard Denton for providing the necessary background material. Finally, I would like to thank all my friends and fellow graduate students who supported me during the research.
    [Show full text]
  • Chapter 6 Medium Access Control Protocols and Local Area Networks
    Chapter 6 Medium Access Control Protocols and Local Area Networks Part I: Medium Access Control Part II: Local Area Networks Chapter Overview l Broadcast Networks l Medium Access Control l All information sent to all l To coordinate access to users shared medium l No routing l Data link layer since direct l Shared media transfer of frames l Radio l Local Area Networks l Cellular telephony l High-speed, low-cost l Wireless LANs communications between co-located computers l Copper & Optical l Typically based on l Ethernet LANs broadcast networks l Cable Modem Access l Simple & cheap l Limited number of users Chapter 6 Medium Access Control Protocols and Local Area Networks Part I: Medium Access Control Multiple Access Communications Random Access Scheduling Channelization Delay Performance Chapter 6 Medium Access Control Protocols and Local Area Networks Part II: Local Area Networks Overview of LANs Ethernet Token Ring and FDDI 802.11 Wireless LAN LAN Bridges Chapter 6 Medium Access Control Protocols and Local Area Networks Multiple Access Communications Multiple Access Communications l Shared media basis for broadcast networks l Inexpensive: radio over air; copper or coaxial cable l M users communicate by broadcasting into medium l Key issue: How to share the medium? 3 2 4 1 Shared multiple access medium M 5 … Approaches to Media Sharing Medium sharing techniques Static Dynamic medium channelization access control l Partition medium Scheduling Random access l Dedicated allocation to users l Polling: take turns l Loose l Satellite l Request
    [Show full text]
  • Topic 5: Medium Access Control (Data Link Layer)
    Topic 5: Medium Access Control (Data Link Layer) • Data link layer deals with medium access and packet delivery over a single link (same physical layer) • This chapter focuses on protocols that coordinate the access to the channel media in the broadcast network • Reference: Alberto Leon-Garcia and Indra Widjaja, Communication Networks - Fundamental Concepts and Key Architectures, 2nd Ed., pp. 370-386, 2004. (Reserved in the DC library. Call No. TK5105. L46 2004.) 5.1 Multiple Access Communications • Shared media basis for broadcast networks – Inexpensive: radio over air; copper or coaxial cable – M users communicate by broadcasting into medium • Key issue: How to share the medium? 3 2 4 1 Shared multiple access medium M 5 … • Sharing a transmission medium • Static sharing (channelization schemes) • Dynamic sharing (MAC schemes) Medium sharing techniques Static channelization Dynamic medium access control scheduling Random access • Random access methods constitute the first major class of MAC procedures 3 MAC classification Contention vs Contention-free • Contention-free MAC – Channel partitioning • TDMA, FDMA, CDMA, W-CDMA, OFDMA, etc. – Turn-taking protocols • Polling (IEEE 802.11 PCF), Token based (WTRP), etc. Contention free period Contention period SIFS PIFS SIFS Bea CF- Data + CF-poll CF- Bea- con poll +CF-ACK end con AP SIFS SIFS Data + CF- CF-ACK ACK station null Token passing polling • Contention-based MAC – Radom access • Aloha, S-Aloha, Non-/1-/p-persistent CSMA, CSMA/CA, etc. – Reservation access • Reservation-Aloha, Reservation-TDMA, DRP, etc. 1 0 1 1 0 0 1340 1 0 0 1 0 2 reservation Data transmission period period Other classifications • Centralized vs distributed • Asynchronous vs Synchronous: – Global synchronization required • Single-channel vs multiple-channel • QoS-aware • Power-aware • … … MAC design principles • High throughput • QoS provisioning • Reliability • Robustness • Fairness • Power consumption • Cost .
    [Show full text]
  • MAC Layer Protocols for Internet of Things: a Survey
    future internet Review MAC Layer Protocols for Internet of Things: A Survey Luiz Oliveira 1, Joel J. P. C. Rodrigues 1,2,3,* , Sergei A. Kozlov 3 , Ricardo A. L. Rabêlo 4 and Victor Hugo C. de Albuquerque 5 1 National Institute of Telecommunications (Inatel), Santa Rita do Sapucaí MG 37540-000, Brazil; [email protected] 2 Instituto de Telecomunicações, 1049-001 Lisboa, Portugal 3 International Institute of Photonics and Optoinformatics, ITMO University, 197101 Saint Petersburg, Russia; [email protected] 4 Department of Computing (DC), Graduate Program in Computer Science (PPGCC), Federal University of Piaui (UFPI), Ministro Petronio Portela Campus, Teresina 64049-550, Piaui, Brazil; [email protected] 5 Graduate Program in Applied Informatics, University of Fortaleza (UNIFOR), Fortaleza CE 60811-905, Brazil; [email protected] * Correspondence: [email protected]; Tel.: +55-35-3471-9200 Received: 27 November 2018; Accepted: 18 December 2018; Published: 14 January 2019 Abstract: Due to the wide variety of uses and the diversity of features required to meet an application, Internet of Things (IoT) technologies are moving forward at a strong pace to meet this demand while at the same time trying to meet the time-to-market of these applications. The characteristics required by applications, such as coverage area, scalability, transmission data rate, and applicability, refer to the Physical and Medium Access Control (MAC) layer designs of protocols. This paper presents a deep study of medium access control (MAC) layer protocols that are used in IoT with a detailed description of such protocols grouped (by short and long distance coverage).
    [Show full text]
  • Medium Access Control
    Medium Access Control COS 598a: Wireless Networking and Sensing Systems Kyle Jamieson [Parts adapted from B. Karp, S. Shenker, P. Steenkiste] Medium access: Timeline Packet radio Wireless LAN Wired LAN ALOHAnet 1960s Amateur packet radio Ethernet 1970s 2 ALOHAnet: Context • Norm Abramson, late 1960s at the University of Hawaii – Seven campuses on four islands – Want to keep campus terminals in contact with mainframe – Telephone costs high, so build (the first) packet radio network 3 THE ALOHA SYSTEM 283 soles such a scheme will lead to the same sort of in- ment for simple communication equipment at the con- efficiencies found in a wire communication system. soles. The possibility of using the same code for error This problem may be partly alleviated by a system of correction at the MENEHUNE will be considered for a central control and channel assignment (such as in a later version of THE ALOHA SYSTEM. telephone switching net) or by a variety of polling The random access method employed by THE techniques. Any of these methods will tend to make ALOHA SYSTEM is based on the use of this error the communication equipment at the consoles more detecting code. Each user at a console transmits packets complex and will not solve the most important problem to the MENEHUNE over the same high data rate of the communication inefficiency caused by the burst channel in a completely unsynchronized (from one nature of the data from an active console. Since we user to another) manner. If and only if a packet is re- expect to have many remote consoles it is important ceived without error it is acknowledged by the MENE- to minimize the complexity of the communication HUNE.
    [Show full text]
  • Media Access Control (MAC) (With Some IEEE 802 Standards)
    Department of Computer and IT Engineering University of Kurdistan Computer Networks I Media Access Control (MAC) (with some IEEE 802 standards) By: Dr. Alireza Abdollahpouri Media Access Control Multiple access links There is ‘ collision ’ if more than one node sends at the same time only one node can send successfully at a time 2 Media Access Control • When a "collision" occurs, the signals will get distorted and the frame will be lost the link bandwidth is wasted during collision • Question: How to coordinate the access of multiple sending and receiving nodes to the shared link ? • Solution: We need a protocol to determine how nodes share channel Medium Access control (MAC) protocol • The main task of a MAC protocol is to minimize collisions in order to utilize the bandwidth by: - Determining when a node can use the link (medium) - What a node should do when the link is busy - What the node should do when it is involved in collision 3 Ideal Multiple Access Protocol 1. When one node wants to transmit, it can send at rate R bps, where R is the channel rate. 2. When M nodes want to transmit, each can send at average rate R/M (fair) 3. fully decentralized: - No special node to coordinate transmissions - No synchronization of clocks, slots 4. Simple Does not exist!! 4 Three Ways to Share the Media Channel partitioning MAC protocols: • Share channel efficiently and fairly at high load • Inefficient at low load: delay in channel access, 1/N bandwidth allocated even if only 1 active node! “Taking turns” protocols • Eliminates empty slots without
    [Show full text]
  • 1 Wireless Media Access Control
    1 Wireless Media Access Control ANDREW D. MYERS and STEFANO BASAGNI Department of Computer Science University of Texas at Dallas Richardson, Texas, U.S.A. ABSTRACT This chapter deals with the problem of designing and effectively utilizing wireless communication channels. Since the wireless medium is inherently a shared resource, controlling channel access becomes a central theme that determines the fundamental capacity of the wireless network and has a dramatic impact on system complexity and cost. Therefore, our primary focus will be the design and implementation of Media Access Control (MAC) protocols for mobile wireless networks. The role of a MAC protocol is explored and the major design choices and con- straints are examined, discussing their impact on system complexity and cost. We then identify the fundamental channel access techniques that are used almost univer- sally in a vast majority of wireless networks. An overview of MAC protocol research that spans cellular telephony, wireless ATM and ad hoc networks is then presented with a qualitative discussion of relative characteristics and performance. We will provide insights into the strengths and weaknesses of each protocol, revealing which protocols are best suited for specific architectures and applications. 1.1 INTRODUCTION The rapid technological advances and innovations of the past few decades have pushed wireless communication from concept to reality. Advances in chip design have dramatically reduced the size and energy requirements of wireless devices, increasing their portability and convenience. This, combined with the freedom of movement, are among the driving forces behind the vast popularity of wireless communication. This situation in unlikely to change, especially when one considers the current push towards wireless broadband access to the Internet and multimedia content.
    [Show full text]