Media Access Control #7
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Data Communication and Computer Network Unit 1
Department of Collegiate Education GOVERNMENT FIRST GRADE COLLEGE RAIBAG-591317 Department of Computer Science Lecture Notes SUBJECT : DATA COMMUNICATIONS AND COMPUTER NETWORKS SUBJECT CODE : 17BScCST61 CLASS : BSC VI Sem Paper-1 Subject In charge Smt Bhagirathi Halalli Assistant Professor 2019-20 Data Communication and Computer Network Unit 1 Unit 1: Introduction Content: 1.1. Data communications, 1.2. Networks, 1.3. The internet, 1.4. Protocols and standards, 1.5. Network models – OSI model, 1.6. TCP/IP protocol suite, 1.7. Addressing. 1.1.Data Communications, Data refers to the raw facts that are collected while information refers to processed data that enables us to take decisions. Ex. When result of a particular test is declared it contains data of all students, when you find the marks you have scored you have the information that lets you know whether you have passed or failed. The word data refers to any information which is presented in a form that is agreed and accepted upon by is creators and users. Data Communication Data Communication is a process of exchanging data or information In case of computer networks this exchange is done between two devices over a transmission medium. This process involves a communication system which is made up of hardware and software. The hardware part involves the sender and receiver devices and the intermediate devices through which the data passes. The software part involves certain rules which specify what is to be communicated, how it is to be communicated and when. It is also called as a Protocol. The following sections describe the fundamental characteristics that are important for the effective working of data communication process and are followed by the components that make up a data communications system. -
Ipv6 Support in Home Gateways
IPv6 Support in Home Gateways Chris Donley [email protected] 0 Agenda • Introduction • Basic Home Gateway Architecture • DOCSIS® Support for IPv6 • CableLabs eRouter Specification • IETF IPv6 CPE Router • IPv6 Transition Technologies • Ongoing Initiatives Cable Television Laboratories, Inc. 2010. All Rights Reserved. 1 Introduction • Service Providers are beginning to offer IPv6 service • Home Gateways are instrumental in determining IPv6 service characteristics • CableLabs and the IETF have developed compatible specifications for IPv6 Home Gateways • During the transition to IPv6, co-existence with IPv4 is required » Many clients will not be upgradable to IPv6 » A significant amount of content will remain accessible only through IPv4 • As we approach IPv4 exhaustion, new transition technologies such as NAT444, Dual-Stack Lite, and 6RD will be important for such gateways. Cable Television Laboratories, Inc. 2010. All Rights Reserved. 2 Basic Home Gateway Architecture • Basic IPv6 Home Gateways are envisioned as extensions of existing IPv4 gateways » One or two customer-facing interfaces » One physical service provider-facing interface • Gateways assign addresses to CPE devices » Stateless Address Autoconfiguration (SLAAC, RFC 4862) » Stateful DHCPv6 (RFC 3315) • Gateways provide some level of security to home networks Cable Television Laboratories, Inc. 2010. All Rights Reserved. 3 Home Gateway Architecture Cable Television Laboratories, Inc. 2010. All Rights Reserved. 4 DOCSIS® Support for IPv6 • DOCSIS specifications define a broadband -
The OSI Model
Data Encapsulation & OSI & TCP/IP Models Week 2 Lecturer: Lucy White [email protected] Office : 324 1 Network Protocols • A protocol is a formal description of a set of rules and conventions that govern a particular aspect of how devices on a network communicate. Protocols determine the format, timing, sequencing, flow control and error control in data communication. Without protocols, the computer cannot make or rebuild the stream of incoming bits from another computer into the original format. • Protocols control all aspects of data communication, which include the following: - How the physical network is built - How computers connect to the network - How the data is formatted for transmission - The setting up and termination of data transfer sessions - How that data is sent - How to deal with errors 2 Protocol Suites & Industry Standard • Many of the protocols that comprise a protocol suite reference other widely utilized protocols or industry standards • Institute of Electrical and Electronics Engineers (IEEE) or the Internet Engineering Task Force (IETF) • The use of standards in developing and implementing protocols ensures that products from different manufacturers can work together for efficient communications 3 Function of Protocol in Network Communication A standard is a process or protocol that has been endorsed by the networking industry and ratified by a standards organization 4 Protocol Suites TCP/IP Protocol Suite and Communication Function of Protocol in Network Communication 6 Function of Protocol in Network Communication • Technology independent Protocols -Many diverse types of devices can communicate using the same sets of protocols. This is because protocols specify network functionality, not the underlying technology to support this functionality. -
Solutions to Chapter 2
CS413 Computer Networks ASN 4 Solutions Solutions to Assignment #4 3. What difference does it make to the network layer if the underlying data link layer provides a connection-oriented service versus a connectionless service? [4 marks] Solution: If the data link layer provides a connection-oriented service to the network layer, then the network layer must precede all transfer of information with a connection setup procedure (2). If the connection-oriented service includes assurances that frames of information are transferred correctly and in sequence by the data link layer, the network layer can then assume that the packets it sends to its neighbor traverse an error-free pipe. On the other hand, if the data link layer is connectionless, then each frame is sent independently through the data link, probably in unconfirmed manner (without acknowledgments or retransmissions). In this case the network layer cannot make assumptions about the sequencing or correctness of the packets it exchanges with its neighbors (2). The Ethernet local area network provides an example of connectionless transfer of data link frames. The transfer of frames using "Type 2" service in Logical Link Control (discussed in Chapter 6) provides a connection-oriented data link control example. 4. Suppose transmission channels become virtually error-free. Is the data link layer still needed? [2 marks – 1 for the answer and 1 for explanation] Solution: The data link layer is still needed(1) for framing the data and for flow control over the transmission channel. In a multiple access medium such as a LAN, the data link layer is required to coordinate access to the shared medium among the multiple users (1). -
Upcoming Standards in Wireless Local Area Networks
Preprint: http://arxiv.org/abs/1307.7633 Original Publication: UPCOMING STANDARDS IN WIRELESS LOCAL AREA NETWORKS Sourangsu Banerji Department of Electronics & Communication Engineering, RCC-Institute of Information Technology, India Email: [email protected] ABSTRACT: Network technologies are However out of every one of these standards, traditionally centered on wireline solutions. WLAN and recent developments in WLAN Wireless broadband technologies nowadays technology will be our main subject of study in this particular paper. The IEEE 802.11 is the most provide unlimited broadband usage to users widely deployed WLAN technology as of today. that have been previously offered simply to Another renowned counterpart is the HiperLAN wireline users. In this paper, we discuss some of standard by ETSI. These two technologies are the upcoming standards of one of the emerging united underneath the Wireless Fidelity (Wi-fi) wireless broadband technology i.e. IEEE alliance. In literature though, IEEE802.11 and Wi- 802.11. The newest and the emerging standards fi is used interchangeably and we will also continue with the same convention in this fix technology issues or add functionality that particular paper. A regular WLAN network is will be expected to overcome many of the associated with an Access Point (AP) in the current standing problems with IEEE 802.11. middle/centre and numerous stations (STAs) are connected to this central Access Point (AP).Now, Keywords: Wireless Communications, IEEE there are just two modes in which communication 802.11, WLAN, Wi-fi. normally takes place. 1. Introduction Within the centralized mode of communication, The wireless broadband technologies were communication to/from a STA is actually carried developed with the objective of providing services across by the APs. -
Reservation - Time Division Multiple Access Protocols for Wireless Personal Communications
tv '2s.\--qq T! Reservation - Time Division Multiple Access Protocols for Wireless Personal Communications Theodore V. Buot B.S.Eng (Electro&Comm), M.Eng (Telecomm) Thesis submitted for the degree of Doctor of Philosophy 1n The University of Adelaide Faculty of Engineering Department of Electrical and Electronic Engineering August 1997 Contents Abstract IY Declaration Y Acknowledgments YI List of Publications Yrt List of Abbreviations Ylu Symbols and Notations xi Preface xtv L.Introduction 1 Background, Problems and Trends in Personal Communications and description of this work 2. Literature Review t2 2.1 ALOHA and Random Access Protocols I4 2.1.1 Improvements of the ALOHA Protocol 15 2.1.2 Other RMA Algorithms t6 2.1.3 Random Access Protocols with Channel Sensing 16 2.1.4 Spread Spectrum Multiple Access I7 2.2Fixed Assignment and DAMA Protocols 18 2.3 Protocols for Future Wireless Communications I9 2.3.1 Packet Voice Communications t9 2.3.2Reservation based Protocols for Packet Switching 20 2.3.3 Voice and Data Integration in TDMA Systems 23 3. Teletraffic Source Models for R-TDMA 25 3.1 Arrival Process 26 3.2 Message Length Distribution 29 3.3 Smoothing Effect of Buffered Users 30 3.4 Speech Packet Generation 32 3.4.1 Model for Fast SAD with Hangover 35 3.4.2Bffect of Hangover to the Speech Quality 38 3.5 Video Traffic Models 40 3.5.1 Infinite State Markovian Video Source Model 41 3.5.2 AutoRegressive Video Source Model 43 3.5.3 VBR Source with Channel Load Feedback 43 3.6 Summary 46 4. -
Logical Link Control and Channel Scheduling for Multichannel Underwater Sensor Networks
ICST Transactions on Mobile Communications and Applications Research Article Logical Link Control and Channel Scheduling for Multichannel Underwater Sensor Networks Jun Li ∗, Mylene` Toulgoat, Yifeng Zhou, and Louise Lamont Communications Research Centre Canada, 3701 Carling Avenue, Ottawa, ON. K2H 8S2 Canada Abstract With recent developments in terrestrial wireless networks and advances in acoustic communications, multichannel technologies have been proposed to be used in underwater networks to increase data transmission rate over bandwidth-limited underwater channels. Due to high bit error rates in underwater networks, an efficient error control technique is critical in the logical link control (LLC) sublayer to establish reliable data communications over intrinsically unreliable underwater channels. In this paper, we propose a novel protocol stack architecture featuring cross-layer design of LLC sublayer and more efficient packet- to-channel scheduling for multichannel underwater sensor networks. In the proposed stack architecture, a selective-repeat automatic repeat request (SR-ARQ) based error control protocol is combined with a dynamic channel scheduling policy at the LLC sublayer. The dynamic channel scheduling policy uses the channel state information provided via cross-layer design. It is demonstrated that the proposed protocol stack architecture leads to more efficient transmission of multiple packets over parallel channels. Simulation studies are conducted to evaluate the packet delay performance of the proposed cross-layer protocol stack architecture with two different scheduling policies: the proposed dynamic channel scheduling and a static channel scheduling. Simulation results show that the dynamic channel scheduling used in the cross-layer protocol stack outperforms the static channel scheduling. It is observed that, when the dynamic channel scheduling is used, the number of parallel channels has only an insignificant impact on the average packet delay. -
Medium Access Control Protocols of the PRMA Type in Non-Geostationary Satellites
Medium Access Control Protocols of the PRMA Type in non-Geostationary Satellites Giovanni Giambene [email protected] Dipartimento di Ingegneria dell’Informazione Università degli Studi di Siena Via Roma, 53 53100 Siena, Italy Abstract The challenge of future mobile multimedia networks is to provide worldwide tetherless communication services. Low Earth Orbit-Mobile Satellite Systems (LEO-MSSs) will play a significant role by filling the coverage gaps of future generation terrestrial cellular networks. This lecture presents research results on demand-assignment Medium Access Control (MAC) schemes able to share efficiently LEO satellite resources among users and to support isochronous traffics and the ubiquitous access to the Internet. 1 Introduction Future generation mobile communication systems will achieve a global coverage by integrating a terrestrial cellular component and a satellite one [1],[2]. The satellite system will play a complementary role with respect to its terrestrial counterpart; typical operational environments for satellite systems are regions where the provision of the terrestrial coverage is either technically or economically unfeasible. The role of mobile satellite systems is: (i) to allow the global roaming of users; (ii) to provide Quality of Service (QoS) levels comparable with those of terrestrial systems; (iii) to permit the rapid deployment of mobile services in underdeveloped regions. The satellite component of future mobile communication systems will be based (partly or totally) on non-geostationary constellations. In particular, this study focuses on Low Earth Orbit – Mobile Satellite Systems (LEO-MSSs), since they are close to the earth and allow the use of low-power lightweight mobile terminals [3]. In what follows, an earth-fixed cell system [4] will be assumed where antenna beams are steered so as to point towards a given cell on the earth during the satellite visibility time. -
MAC Protocols for IEEE 802.11Ax: Avoiding Collisions on Dense Networks Rafael A
MAC Protocols for IEEE 802.11ax: Avoiding Collisions on Dense Networks Rafael A. da Silva1 and Michele Nogueira1;2 1Department of Informatics, Federal University of Parana,´ Curitiba, PR, Brazil 2Electrical and Computer Engineering, Carnegie Mellon University, Pittsburgh, PA, USA E-mails: [email protected] and [email protected] Wireless networks have become the main form of Internet access. Statistics show that the global mobile Internet penetration should exceed 70% until 2019. Wi-Fi is an important player in this change. Founded on IEEE 802.11, this technology has a crucial impact in how we share broadband access both in domestic and corporate networks. However, recent works have indicated performance issues in Wi-Fi networks, mainly when they have been deployed without planning and under high user density. Hence, different collision avoidance techniques and Medium Access Control protocols have been designed in order to improve Wi-Fi performance. Analyzing the collision problem, this work strengthens the claims found in the literature about the low Wi-Fi performance under dense scenarios. Then, in particular, this article overviews the MAC protocols used in the IEEE 802.11 standard and discusses solutions to mitigate collisions. Finally, it contributes presenting future trends arXiv:1611.06609v1 [cs.NI] 20 Nov 2016 in MAC protocols. This assists in foreseeing expected improvements for the next generation of Wi-Fi devices. I. INTRODUCTION Statistics show that wireless networks have become the main form of Internet access with an expected global mobile Internet penetration exceeding 70% until 2019 [1]. Wi-Fi Notice: This work has been submitted to the IEEE for possible publication. -
Understanding Technology Options for Deploying Wi-Fi
Understanding Technology Options for Deploying Wi-Fi How Wi-Fi Standards Influence Objectives A Technical Paper prepared for the Society of Cable Telecommunications Engineers By Derek Ferro VP Advanced Systems Engineering Ubee Interactive 8085 S. Chester Street Suite 200 Englewood, CO 80112 [email protected] Bill Rink Senior Director Product Management Ubee Interactive 8085 S. Chester Street Suite 200 Englewood, CO 80112 [email protected] www.ubeeinteractive.com Introduction As Wi-Fi technology evolves at an exponential pace, Operators must understand available Wi-Fi standards in order to make the best business decisions when purchasing and deploying new wireless gateways (i.e. performance versus cost). This paper will discuss the migration from 802.11b, 802.11g, 802.11a, 802.11n and most recently the push to 802.11ac. It will also discuss the advancement of MIMO antenna technology from 1x1, 2x2, 3x3 and even 4x4. Many questions will be addressed: • What are the complexities of advanced MIMO? • When to implement which MIMO configuration? • What are alternative options for improving performance (power amplification, improved receive amplifiers, etc.)? • When should single band, dual-band selectable or dual-band concurrent gateways be deployed? • When examining the US residential market, what is the penetration of 2.4GHz, 5GHz, and dual-band homes, and what are the emerging trends in the marketplace? We hope to demystify the complexity surrounding Wi-Fi and look at the trade-offs in performance and cost presented by each option. www.ubeeinteractive.com Alphabet Soup: Understanding Wi-Fi Standards The Evolution of 802.11 Standards 802.11 technology has its origins in a 1985 ruling by the U.S. -
OSI Model and Network Protocols
CHAPTER4 FOUR OSI Model and Network Protocols Objectives 1.1 Explain the function of common networking protocols . TCP . FTP . UDP . TCP/IP suite . DHCP . TFTP . DNS . HTTP(S) . ARP . SIP (VoIP) . RTP (VoIP) . SSH . POP3 . NTP . IMAP4 . Telnet . SMTP . SNMP2/3 . ICMP . IGMP . TLS 134 Chapter 4: OSI Model and Network Protocols 4.1 Explain the function of each layer of the OSI model . Layer 1 – physical . Layer 2 – data link . Layer 3 – network . Layer 4 – transport . Layer 5 – session . Layer 6 – presentation . Layer 7 – application What You Need To Know . Identify the seven layers of the OSI model. Identify the function of each layer of the OSI model. Identify the layer at which networking devices function. Identify the function of various networking protocols. Introduction One of the most important networking concepts to understand is the Open Systems Interconnect (OSI) reference model. This conceptual model, created by the International Organization for Standardization (ISO) in 1978 and revised in 1984, describes a network architecture that allows data to be passed between computer systems. This chapter looks at the OSI model and describes how it relates to real-world networking. It also examines how common network devices relate to the OSI model. Even though the OSI model is conceptual, an appreciation of its purpose and function can help you better understand how protocol suites and network architectures work in practical applications. The OSI Seven-Layer Model As shown in Figure 4.1, the OSI reference model is built, bottom to top, in the following order: physical, data link, network, transport, session, presentation, and application. -
DOCSIS 3.1 Physical Layer Specification
Data-Over-Cable Service Interface Specifications DOCSIS® 3.1 Physical Layer Specification CM-SP-PHYv3.1-I10-170111 ISSUED Notice This DOCSIS specification is the result of a cooperative effort undertaken at the direction of Cable Television Laboratories, Inc. for the benefit of the cable industry and its customers. You may download, copy, distribute, and reference the documents herein only for the purpose of developing products or services in accordance with such documents, and educational use. Except as granted by CableLabs® in a separate written license agreement, no license is granted to modify the documents herein (except via the Engineering Change process), or to use, copy, modify or distribute the documents for any other purpose. This document may contain references to other documents not owned or controlled by CableLabs. Use and understanding of this document may require access to such other documents. Designing, manufacturing, distributing, using, selling, or servicing products, or providing services, based on this document may require intellectual property licenses from third parties for technology referenced in this document. To the extent this document contains or refers to documents of third parties, you agree to abide by the terms of any licenses associated with such third-party documents, including open source licenses, if any. Cable Television Laboratories, Inc. 2013-2017 CM-SP-PHYv3.1-I10-170111 Data-Over-Cable Service Interface Specifications DISCLAIMER This document is furnished on an "AS IS" basis and neither CableLabs nor its members provides any representation or warranty, express or implied, regarding the accuracy, completeness, noninfringement, or fitness for a particular purpose of this document, or any document referenced herein.