Media Access Control Protocol Based on DOCSIS 1.1 Date 1999-12-22 Submitted Sourceglen Sater Voice: 480-441-8893 Motorola Inc

Total Page:16

File Type:pdf, Size:1020Kb

Media Access Control Protocol Based on DOCSIS 1.1 Date 1999-12-22 Submitted Sourceglen Sater Voice: 480-441-8893 Motorola Inc IEEE 802.16.1mc-00/011999-12-24 Project IEEE 802.16 Broadband Wireless Access Working Group Title Media Access Control Protocol Based on DOCSIS 1.1 Date 1999-12-22 Submitted SourceGlen Sater Voice: 480-441-8893 Motorola Inc. Fax: 480-675-2116 8220 E. Roosevelt Street, M/D R1106 E-mail: [email protected] Scottsdale, AZ 85257 Co-contributors Company Arun Arunachalam, George Stamatelos Nortel Networks Farid Elwailly, Jeff Foerster, Jung Yee Newbridge Networks Corporation Scott Marin, Bill Myers SpectraPoint Wireless, LLC. Leland Langston, Wayne Hunter Raytheon Telecommunications Company Phil Guillemette SpaceBridge Networks Corporation Chet Shirali PhaseCom, Inc. Karl Stambaugh Motorola, Inc. George Fishel Communications Consulting Services Ray Sanders CircuitPath Networks Systems Moshe Ran TelesciCOM, Ltd. Re: 802.16 Medium Access Control Task Group INVITATION TO CONTRIBUTE – Session #5, Document 80216-99_14.pdf Abstract This MAC proposal is based upon DOCSIS 1.1 (Data Over Cable Service Interface Specifications). Modifications to this existing standard are included to support the requirements defined by the 802.16 Working Group for BWA networks. This is a collaborative effort of the above listed people. Purpose The author desires that the 802.16 working group incorporate all or part of the proposal into the 802.16.1 standard. Notice This document has been prepared to assist the IEEE 802.16. It is offered as a basis for discussion and is not binding on the contributing individual(s) or organization(s). The material in this document is subject to change in form and content after further study. The contributors reserve the right to add, amend or withdraw material contained herein. Release The contributors acknowledges and accepts that this contribution may be made public by 802.16. IEEE Patent The contributors are familiar with the IEEE Patent Policy, which is set forth in the IEEE-SA Standards Board Bylaws <http:// Policy standards.ieee.org/guidesbylaws> and includes the statement: “IEEE standards may include the known use of patent(s), including patent applications, if there is technical justification in the opinion of the standards-developing committee and provided the IEEE receives assurance from the patent holder that it will license applicants under reasonable terms and conditions for the purpose of implementing the standard.” Portions of this document are reprinted with permission from Cable Television Laboratories, Inc. 1 1999-12-24 IEEE 802.16mc-00/01 Document Overview This submission was generated from the DOCSIS 1.1 source FrameMaker files. Annex L is provided that lists the significant changes to the DOCSIS MAC to support the BWA MAC. It is strongly recommended the reader begin by reading that Annex. In an effort to make the document easier to read, the following conventions were used: • The paragraph numbering follows the 802.16.1 Air Interface Standard outline. • The original DOCSIS paragraph have minimal changes. In places where substantive changes are made, the changed text is red and a change bar is placed at the outer edge of the text. Changes related to naming (CMTS to BS) are not marked in this way. • A list of modifications is provided which provides a quick hyper-text link to all modified paragraphs. • All indexes are hyper-text linked, allowing quick browsing when reading the PDF format. The Appendixes are considered part of the MAC proposal, and contain information that is in addition to what is contained the main proposal. • The first Annex describes the significant areas within the BWA MAC that differ from the DOCSIS MAC. • The other Annexes are included simply on an informative basis; these Annexes are not officially part of this MAC proposal. The Annexes contain material that was considered by the co-contributors to have possible merit and which should be evaluated further. This material could not be adequately analyzed or discussed in the short amount of time that was available. 2 IEEE 802.16mc-00/01 1999-12-24 Modifications MAC Reference Model ...........................................................................................................15 Overview .................................................................................................................................16 Upstream Intervals, Mini-Slots and System Time ..................................................................17 Frame ......................................................................................................................................18 ATM Cell MAC Frames .........................................................................................................23 Multiple ATM Cells Without Header Suppression ................................................................24 Multiple ATM Cells With Header Suppression .....................................................................25 Request Frame ........................................................................................................................29 Fragmentation Header .............................................................................................................30 Fragmentation Extended Header ............................................................................................35 Payload Header Suppression Header ......................................................................................35 MAC Management Message Header ......................................................................................40 Time Synchronization (SYNC) ..............................................................................................42 Ranging ...................................................................................................................................50 Registration Request (REG-REQ) ..........................................................................................55 Global Timing Reference ......................................................................................................107 Timing Units and Relationships ...........................................................................................107 Scanning and Synchronization to Downstream ....................................................................111 Contention Resolution Overview ..........................................................................................177 MAC Protocol Amendments to Include a Bandwidth-On-Demand MAC / PHY Protocol Sub- layer Option (Informative) ....................................................................................................313 1 1999-12-24 IEEE 802.16mc-00/01 This page intentionally left blank. 2 IEEE 802.16mc-00/01 1999-12-24 Contents 5 MEDIA ACCESS CONTROL LAYER .....................................................................................................15 5.1 MAC REFERENCE MODEL .......................................................................................................................15 5.2 MAC CONCEPT........................................................................................................................................15 5.2.1 Relationship Between Higher Layers and MAC Protocol ...............................................................16 5.2.2 Relationship Between Physical Layer and MAC Protocol...............................................................16 5.3 MEDIA ACCESS CONTROL SPECIFICATION ..............................................................................................16 5.3.1 Introduction.....................................................................................................................................16 5.3.1.1 Overview ...................................................................................................................................16 5.3.1.2 Definitions.................................................................................................................................17 5.3.1.3 Future Use.................................................................................................................................18 5.3.2 Access Modes ...................................................................................................................................19 5.3.3 MAC Frame Formats .......................................................................................................................19 5.3.3.1 Generic MAC Frame Format....................................................................................................19 5.3.3.2 Packet-Based MAC Frames......................................................................................................22 5.3.3.3 Reserved PDU MAC Frames ....................................................................................................26 5.3.3.4 MAC-Specific Headers..............................................................................................................27 5.3.3.5 Extended MAC Headers............................................................................................................32 5.3.3.6 Fragmented MAC Frames ........................................................................................................37 5.3.4 MAC Messages.................................................................................................................................40 5.3.4.1 User...........................................................................................................................................40
Recommended publications
  • Ipv6 Support in Home Gateways
    IPv6 Support in Home Gateways Chris Donley [email protected] 0 Agenda • Introduction • Basic Home Gateway Architecture • DOCSIS® Support for IPv6 • CableLabs eRouter Specification • IETF IPv6 CPE Router • IPv6 Transition Technologies • Ongoing Initiatives Cable Television Laboratories, Inc. 2010. All Rights Reserved. 1 Introduction • Service Providers are beginning to offer IPv6 service • Home Gateways are instrumental in determining IPv6 service characteristics • CableLabs and the IETF have developed compatible specifications for IPv6 Home Gateways • During the transition to IPv6, co-existence with IPv4 is required » Many clients will not be upgradable to IPv6 » A significant amount of content will remain accessible only through IPv4 • As we approach IPv4 exhaustion, new transition technologies such as NAT444, Dual-Stack Lite, and 6RD will be important for such gateways. Cable Television Laboratories, Inc. 2010. All Rights Reserved. 2 Basic Home Gateway Architecture • Basic IPv6 Home Gateways are envisioned as extensions of existing IPv4 gateways » One or two customer-facing interfaces » One physical service provider-facing interface • Gateways assign addresses to CPE devices » Stateless Address Autoconfiguration (SLAAC, RFC 4862) » Stateful DHCPv6 (RFC 3315) • Gateways provide some level of security to home networks Cable Television Laboratories, Inc. 2010. All Rights Reserved. 3 Home Gateway Architecture Cable Television Laboratories, Inc. 2010. All Rights Reserved. 4 DOCSIS® Support for IPv6 • DOCSIS specifications define a broadband
    [Show full text]
  • DOCSIS 3.1 Physical Layer Specification
    Data-Over-Cable Service Interface Specifications DOCSIS® 3.1 Physical Layer Specification CM-SP-PHYv3.1-I10-170111 ISSUED Notice This DOCSIS specification is the result of a cooperative effort undertaken at the direction of Cable Television Laboratories, Inc. for the benefit of the cable industry and its customers. You may download, copy, distribute, and reference the documents herein only for the purpose of developing products or services in accordance with such documents, and educational use. Except as granted by CableLabs® in a separate written license agreement, no license is granted to modify the documents herein (except via the Engineering Change process), or to use, copy, modify or distribute the documents for any other purpose. This document may contain references to other documents not owned or controlled by CableLabs. Use and understanding of this document may require access to such other documents. Designing, manufacturing, distributing, using, selling, or servicing products, or providing services, based on this document may require intellectual property licenses from third parties for technology referenced in this document. To the extent this document contains or refers to documents of third parties, you agree to abide by the terms of any licenses associated with such third-party documents, including open source licenses, if any. Cable Television Laboratories, Inc. 2013-2017 CM-SP-PHYv3.1-I10-170111 Data-Over-Cable Service Interface Specifications DISCLAIMER This document is furnished on an "AS IS" basis and neither CableLabs nor its members provides any representation or warranty, express or implied, regarding the accuracy, completeness, noninfringement, or fitness for a particular purpose of this document, or any document referenced herein.
    [Show full text]
  • Medium Access Control Layer
    Telematics Chapter 5: Medium Access Control Sublayer User Server watching with video Beispielbildvideo clip clips Application Layer Application Layer Presentation Layer Presentation Layer Session Layer Session Layer Transport Layer Transport Layer Network Layer Network Layer Network Layer Univ.-Prof. Dr.-Ing. Jochen H. Schiller Data Link Layer Data Link Layer Data Link Layer Computer Systems and Telematics (CST) Physical Layer Physical Layer Physical Layer Institute of Computer Science Freie Universität Berlin http://cst.mi.fu-berlin.de Contents ● Design Issues ● Metropolitan Area Networks ● Network Topologies (MAN) ● The Channel Allocation Problem ● Wide Area Networks (WAN) ● Multiple Access Protocols ● Frame Relay (historical) ● Ethernet ● ATM ● IEEE 802.2 – Logical Link Control ● SDH ● Token Bus (historical) ● Network Infrastructure ● Token Ring (historical) ● Virtual LANs ● Fiber Distributed Data Interface ● Structured Cabling Univ.-Prof. Dr.-Ing. Jochen H. Schiller ▪ cst.mi.fu-berlin.de ▪ Telematics ▪ Chapter 5: Medium Access Control Sublayer 5.2 Design Issues Univ.-Prof. Dr.-Ing. Jochen H. Schiller ▪ cst.mi.fu-berlin.de ▪ Telematics ▪ Chapter 5: Medium Access Control Sublayer 5.3 Design Issues ● Two kinds of connections in networks ● Point-to-point connections OSI Reference Model ● Broadcast (Multi-access channel, Application Layer Random access channel) Presentation Layer ● In a network with broadcast Session Layer connections ● Who gets the channel? Transport Layer Network Layer ● Protocols used to determine who gets next access to the channel Data Link Layer ● Medium Access Control (MAC) sublayer Physical Layer Univ.-Prof. Dr.-Ing. Jochen H. Schiller ▪ cst.mi.fu-berlin.de ▪ Telematics ▪ Chapter 5: Medium Access Control Sublayer 5.4 Network Types for the Local Range ● LLC layer: uniform interface and same frame format to upper layers ● MAC layer: defines medium access ..
    [Show full text]
  • Docsis™ Reliability = Increased Revenue
    IMPROVING DOCSIS RELIABILITY DOCSIS™ RELIABILITY = INCREASED REVENUE Data-over-cable System Interface Specification (DOCSIS) is the vehicle for cable operators to obtain immediate revenue generating opportunities such as Broadband Data, Voice over IP, IP Video-on-Demand, and countless emerging IP-based technologies. These growth channels rely on cable operators obtaining and retaining subscribers. Subscriber satisfaction with new services is a direct function of DOCSIS network reliability. Improving DOCSIS network reliability requires new skills and new test equipment, in addition to the skills and test equipment we possess as an industry today. DOCSIS WORKING MODEL Developed by CableLabs, DOCSIS is the specification which provides a standard for bridging Ethernet data over a Hybrid- Figure 1. DOCSIS Working Model Fiber Coaxial (HFC) network. The DOCSIS specification defines the method by which DOCSIS-based devices operate TROUBLESHOOTING DOCSIS on the RF plant. Fundamentally, there are three layers of communication which must be understood in order to In assessing and improving DOCSIS network reliability, it is analyze a DOCSIS network. critical that all three layers of the DOCSIS working model are analyzed. Impairments that occur in the RF plant may This model is best illustrated in figure 1. The base of the appear to be DOCSIS or IP related problems, similarly pyramid represents the physical layer of DOCSIS. This is problems in the DOCSIS MAC or IP protocols may appear as where data is modulated and up-converted to an RF carrier RF impairments. This creates Finger Pointing; which often for transport across the HFC plant. The middle of the results in significant time loss and money expenditures pyramid is the DOCSIS Media Access Control (MAC) layer.
    [Show full text]
  • SFR Transition to 3Rd Wave
    Future of Video Videoscape Architecture Overview Admir Hadzimahovic Systems Engineering Manager – EME VTG May 2011 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 1 Videoscape Architecture Overview Agenda: 1. Key IPTV video drivers 2. Claud – Mediasuit Platform 3. Network and ABR 4. Client – Home Gateway 5. Conductor 6. Demo © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 2 CES Las Vegas Videoscape © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 3 Consumer Broadcasters CE/Over The Top Service Provider Behavior and Media Video = 91% of consumer New distribution platform & Brand power Multi-screen offering IP traffic by 2014 interactive content – becoming table stakes Sky Sport TV on iPad / RTL on iPhone & iPad 20% New business models – Rising churn and Netflix = 20% of US Hulu 2009 revenue: $100M Building application & Subscriber acquisition cost st downstream internet 1 half 2010 revenue: $100M content eco-systems traffic in peak times Partnerships & Online Video Snacking Hybrid Broadcast Broadband TV: New Streaming Vertical Integration 11.4 Hour /month HbbTV subscription services Experience Diminishing SP Evolving Legacy Fragmentation Network Relevance Infrastructure Consumer Experience Business Models Content Fragmentation Subscription Fragmentation Broadcast, Premium, UGC Broadband, TV, Mobile, Movie rentals, OTT Device & Screen Fragmentation Free vs. Paid TV, PC, Mobile, Gaming, PDA Interactivity Fragmentation Ad Dollars Fragmentation Lean back, Lean forward, Social Transition from linear TV to online © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 8 Presentation_ID © 2010 Cisco Systems, Inc. All rights reserved. Cisco Public 21 But SP’s Struggle to Deliver Online Content Intuitive Unified Navigation on TV /STB for All Content Multi-screen Web 2.0 Experiences on TV experience TV/STB © 2010 Cisco and/or its affiliates.
    [Show full text]
  • Ts 138 321 V15.3.0 (2018-09)
    ETSI TS 138 321 V15.3.0 (2018-09) TECHNICAL SPECIFICATION 5G; NR; Medium Access Control (MAC) protocol specification (3GPP TS 38.321 version 15.3.0 Release 15) 3GPP TS 38.321 version 15.3.0 Release 15 1 ETSI TS 138 321 V15.3.0 (2018-09) Reference RTS/TSGR-0238321vf30 Keywords 5G ETSI 650 Route des Lucioles F-06921 Sophia Antipolis Cedex - FRANCE Tel.: +33 4 92 94 42 00 Fax: +33 4 93 65 47 16 Siret N° 348 623 562 00017 - NAF 742 C Association à but non lucratif enregistrée à la Sous-Préfecture de Grasse (06) N° 7803/88 Important notice The present document can be downloaded from: http://www.etsi.org/standards-search The present document may be made available in electronic versions and/or in print. The content of any electronic and/or print versions of the present document shall not be modified without the prior written authorization of ETSI. In case of any existing or perceived difference in contents between such versions and/or in print, the only prevailing document is the print of the Portable Document Format (PDF) version kept on a specific network drive within ETSI Secretariat. Users of the present document should be aware that the document may be subject to revision or change of status. Information on the current status of this and other ETSI documents is available at https://portal.etsi.org/TB/ETSIDeliverableStatus.aspx If you find errors in the present document, please send your comment to one of the following services: https://portal.etsi.org/People/CommiteeSupportStaff.aspx Copyright Notification No part may be reproduced or utilized in any form or by any means, electronic or mechanical, including photocopying and microfilm except as authorized by written permission of ETSI.
    [Show full text]
  • V1.1.1 (2014-09)
    Final draft ETSI ES 203 385 V1.1.1 (2014-09) ETSI STANDARD CABLE; DOCSIS® Layer 2 Virtual Private Networking 2 Final draft ETSI ES 203 385 V1.1.1 (2014-09) Reference DES/CABLE-00008 Keywords access, broadband, cable, data, IP, IPcable, L2VPN, modem ETSI 650 Route des Lucioles F-06921 Sophia Antipolis Cedex - FRANCE Tel.: +33 4 92 94 42 00 Fax: +33 4 93 65 47 16 Siret N° 348 623 562 00017 - NAF 742 C Association à but non lucratif enregistrée à la Sous-Préfecture de Grasse (06) N° 7803/88 Important notice The present document can be downloaded from: http://www.etsi.org The present document may be made available in electronic versions and/or in print. The content of any electronic and/or print versions of the present document shall not be modified without the prior written authorization of ETSI. In case of any existing or perceived difference in contents between such versions and/or in print, the only prevailing document is the print of the Portable Document Format (PDF) version kept on a specific network drive within ETSI Secretariat. Users of the present document should be aware that the document may be subject to revision or change of status. Information on the current status of this and other ETSI documents is available at http://portal.etsi.org/tb/status/status.asp If you find errors in the present document, please send your comment to one of the following services: http://portal.etsi.org/chaircor/ETSI_support.asp Copyright Notification No part may be reproduced or utilized in any form or by any means, electronic or mechanical, including photocopying and microfilm except as authorized by written permission of ETSI.
    [Show full text]
  • Colasoft Capsa
    Technical Specifications (Capsa Standard) HP Unix Nettl Packet File (*.TRCO; TRC1) Deployment Environment Libpcap (Wireshark, Tcpdump, Ethereal, etc.) Shared networks (*.cap; *pcap) Switched networks (managed switches and Wireshark (Wireshark, etc.) (*.pcapang; unmanaged switches) *pcapang.gz; *.ntar; *.ntar.gz) Network segments Microsoft Network Monitor 1.x 2.x (*.cap) Proxy server Novell LANalyer (*.tr1) Network Instruments Observer V9.0 (*.bfr) Supported Network Types NetXRay 2.0, and Windows Sniffer (*.cap) Ethernet Sun_Snoop (*.Snoop) Fast Ethernet Visual Network Traffic Capture (*.cap) Gigabit Ethernet Supported Packet File Formats to Export Supported Network Adapters Accellent 5Views Packet File (*.5vw) 10/100/1000 Mbps Ethernet adapters Colasoft Packet File (V3) (*.rapkt) Colasoft Packet File (*.cscpkt) System Requirements Colasoft Raw Packet File (*.rawpkt) Operating Systems Colasoft Raw Packet File (V2) (*.rawpkt) Windows Server 2008 (64-bit) EtherPeek Packet File (V9) (*.pkt) Windows Server 2012 (64-bit)* HP Unix Nettl Packet File (*.TRCO; *.TRC1) Windows Vista (64-bit) Libpcap (Wireshark, Tcpdump, Ethereal, etc.) Windows 7 (64-bit) (*.cap; *pcap) Windows 8/8.1 (64-bit) Wireshark (Wireshark, etc.) (*.pcapang; Windows 10 Professional (64-bit) *pcapang.gz; *.ntar; *.ntar.gz) Microsoft Network Monitor 1.x 2.x (*.cap) * indicates that Colasoft Packet Builder is not Novell LANalyer (*.tr1) compatible with this operating system. NetXRay 2.0, and Windows Sniffer (*.cap) Minimum Sun_Snoop (*.Snoop)
    [Show full text]
  • Download Paper
    DELIVERING ECONOMICAL IP-VIDEO OVER DOCSIS BY BYPASSING THE M- CMTS WITH DIBA Michael Patrick Motorola Connected Home Solutions Abstract CMTS core, DIBA is an architecture for delivery of high-bandwidth entertainment DOCSIS IPTV Bypass Architecture video over DOCSIS to the home for a price (DIBA) DIBA refers to any of a number of per program that matches the cost for techniques whereby downstream IPTV traffic conventional video over MPEG2 delivery to is directly tunneled from an IPTV source to a set-top-boxes. downstream Edge QAM, “bypassing” a DIBA is an innovative bypass DOCSIS M-CMTS core. It will allow architecture in which the conventional operators to deliver economic IP video traffic Modular-CMTS architecture is replaced by a over DOCSIS infrastructure. hybrid architecture consisting of an integrated CMTS and DOCSIS External Physical INTRODUCTION Interface (DEPI) or MPEG Edge QAMs. This paper/presentation will demonstrate the MSOs are considering IP-video and IP effectiveness of DIBA, discuss how operators Television (IPTV) to supplement their current can evolve their infrastructure to implement digital video delivery. IP-based video enables DIBA, discuss alternative bypass new video sources (the Internet) and new encapsulation protocols to tunnel traffic to video destinations (subscriber IPTV playback either DEPI or MPEG Edge QAMs, and devices). outline the economic advantages of DIBA Of course, such a transition to IPTV migration. It will explain how DIBA removes requires significant additional downstream the boundaries of delivering video using a M- DOCSIS® bandwidth. In a reasonable 5-7 CMTS, and how operators can accelerate year “endgame” scenario, VOD is expected to service velocity by efficiently delivering require 26 times the bandwidth of High Speed IPTV services that bypass M-CMTS Data (HSD).
    [Show full text]
  • Introduction to DOCSIS
    Introduction to D O C S IS 3 . 0 Speaker: Byju Pularikkal, Cisco Systems Inc. 1 1 A crony m s / A b b re v ia tions DOCSIS = Data-Ov e r -Cab l e Se r v i c e In te r f ac e MDD = M% C Do m ai n De s c r i p to r Sp e c i f i c ati o n CI* = Co n v e r # e d In te r c o n n e c t * e tw o r ) CMT S = Cab l e Mo d e m T e r m i n ati o n Sy s te m ( $ % M = ( d # e $ % M DS = Do w n s tr e am OSSI = Op e r ati o n s Su p p o r t Sy s te m In te r f ac e U S = U p s tr e am $ P S+ = $ u ad r atu r e P as e S i f t + e y i n # CM = Cab l e Mo d e m , * = , i b e r n o d e M-CMT S = Mo d u l ar CMT S - , C = - y b r i d , i b e r Co a. i al P C = P r i m ar y C an n e l DT I = DOCSIS T i m i n # In te r f ac e ! " = ! o n d i n # " r o u p D( P I = Do w n s tr e am ( .
    [Show full text]
  • Chapter 6: Medium Access Control Layer
    Chapter 6: Medium Access Control Layer Chapter 6: Roadmap " Overview! " Wireless MAC protocols! " Carrier Sense Multiple Access! " Multiple Access with Collision Avoidance (MACA) and MACAW! " MACA By Invitation! " IEEE 802.11! " IEEE 802.15.4 and ZigBee! " Characteristics of MAC Protocols in Sensor Networks! " Energy Efficiency! " Scalability! " Adaptability! " Low Latency and Predictability! " Reliability! " Contention-Free MAC Protocols! " Contention-Based MAC Protocols! " Hybrid MAC Protocols! Fundamentals of Wireless Sensor Networks: Theory and Practice Waltenegus Dargie and Christian Poellabauer © 2010 John Wiley & Sons Ltd. 2! Medium Access Control " In most networks, multiple nodes share a communication medium for transmitting their data packets! " The medium access control (MAC) protocol is primarily responsible for regulating access to the shared medium! " The choice of MAC protocol has a direct bearing on the reliability and efficiency of network transmissions! " due to errors and interferences in wireless communications and to other challenges! " Energy efficiency also affects the design of the MAC protocol! " trade energy efficiency for increased latency or a reduction in throughput or fairness! Fundamentals of Wireless Sensor Networks: Theory and Practice Waltenegus Dargie and Christian Poellabauer © 2010 John Wiley & Sons Ltd. 3! 1! Overview " Responsibilities of MAC layer include:! " decide when a node accesses a shared medium! " resolve any potential conflicts between competing nodes! " correct communication errors occurring at the physical layer! " perform other activities such as framing, addressing, and flow control! " Second layer of the OSI reference model (data link layer) or the IEEE 802 reference model (which divides data link layer into logical link control and medium access control layer)! Fundamentals of Wireless Sensor Networks: Theory and Practice Waltenegus Dargie and Christian Poellabauer © 2010 John Wiley & Sons Ltd.
    [Show full text]
  • The Impact of the DOCSIS 1.1/2.0 MAC Protocol on TCP Jim Martin Department of Computer Science Clemson University Clemson, SC 29634-0974 [email protected]
    The Impact of the DOCSIS 1.1/2.0 MAC Protocol on TCP Jim Martin Department of Computer Science Clemson University Clemson, SC 29634-0974 [email protected] Abstract-- The number of broadband cable access subscribers specification purposely does not specify these algorithms so in the United States is rapidly approaching 30 million. that vendors can develop their own solutions. However, all However there is very little research that has evaluated upstream bandwidth management algorithm will share a set TCP/IP in modern cable environments. We have developed a of basic system parameters such as the amount of time in model of the Data over Cable System Interface Specification the future that the scheduler considers when making (DOCSIS) 1.1/2.0 MAC and physical layers using the ‘ns’ allocation decisions (we refer to this parameter as the simulation package. In this paper we show that the interaction of the MAC layer on downstream TCP web traffic MAP_TIME), the amount of upstream bandwidth allocated leads to poor network performance as the number of active for contention-based bandwidth requests and the range of users grow. We provide an intuitive explanation of this result collision backoff times. These parameters are crucial for and explore several possible improvements. ensuring good performance at high load levels. Keywords— Last Mile Network Technologies, DOCSIS, TCP Performance Residential network Public CM-1 I. INTRODUCTION Internet Residential CM-1 network The Data over Cable (DOCSIS) Service Interface DOCSIS 1.1/2.0 CM-1 CMTS Cable Network Specification defines the Media Access Control (MAC) . CMTS layer as well as the physical communications layer that is CM-1 Enterprise POP Broadband Service Provider network used in the majority of hybrid fiber coaxial cable networks ‘n’ homes or CMTS organizations that offer data services [1].
    [Show full text]