Data Link Layer - Overview of LLC and MAC Introduction to 802.11

advertisement
159.334 Computer Networks
Data Link Layer - Overview of LLC and MAC
Introduction to 802.11
Professor Richard Harris
School of Engineering and Advanced
Technology (SEAT)
Objectives
159.334 Computer Networks
You will be able to describe the objectives of the 802
project.
You will be able to discuss the 802.11 LAN standards
You will be able to describe the framing methodology for
802 standards
You will be able to discuss the various fields used for
802 and 802.11 standards in particular.
Computer Networks - 1/2
1/2
References
159.334 Computer Networks
Chapters 13 and 14, Forouzan
Chapter 4, Tanenbaum
Cisco CCNA course notes
Computer Networks - 1/3
1/3
Presentation Outline
159.334 Computer Networks
Introduction to Project 802
Revision of key concepts from the CCNA learning
material on Ethernet
The wireless LAN revolution 802.11x
Computer Networks - 1/4
1/4
Project 802 of the IEEE
159.334 Computer Networks
The Computer Society of the IEEE began a special
project in 1985 that was known as Project 802
Its purpose was to set standards that would enable
intercommunication between equipment from a variety
of manufacturers.
Project 802 is a way of specifying functions of the
physical layer and the data link layer of major LAN
protocols.
Computer Networks - 1/5
1/5
The IEEE Standard for LANs - 1
159.334 Computer Networks
The following diagram shows the relationship between the traditional ISO model and
the 802 standard.
It will be seen that the 802 standard has sub-divided the Data Link Layer into two
parts, viz:
LLC Link Layer Control
MAC (Media Access Control) Layer
• The IEEE has actually created several physical layer standards for
different LAN protocols
Computer Networks - 1/6
1/6
The IEEE Standard for LANs - 2
159.334 Computer Networks
Data Link Layer
Logical Link Control (LLC)
For IEEE 802, flow control, error control, and part of the framing
duties are all brought together in this LLC sub-layer. Framing is also
performed in the MAC sub-layer.
The LLC provides a single data link control protocol for all IEEE
LANs. (Contrast this with the MAC layer where we have different
protocol versions for different LANs. See previous slide.)
The LLC makes the MAC sub-layer transparent.
Framing
LLC provides a PDU similar to HDLC
Computer Networks - 1/7
1/7
Framing
159.334 Computer Networks
The LLC header contains a control field like HDLC and is
used for flow and error control.
The two access point fields (DSAP and SSAP) define the
upper layer protocol at the source and destination that
uses LLC.
Computer Networks - 1/8
1/8
Media Access Control - MAC
159.334 Computer Networks
In general, multiple access methods include random access,
controlled access and channelisation.
For IEEE 802, there is a sub-layer called Media Access Control
(MAC) that defines the specific access method for each LAN.
Eg. It defines CSMA/CD as the media access method for Ethernet LANs.
It defines the token passing method for Token Ring and Token Bus
LANs.
Computer Networks - 1/9
1/9
Evolution of Ethernet
159.334 Computer Networks
There have been a number of variants for Ethernet that
have evolved over time. The above figure shows this
evolution.
Computer Networks - 1/10
1/10
The MAC Sub-layer
159.334 Computer Networks
Data Link Layer
In standard Ethernet, the MAC sub-layer looks after the
operation of the access method. It also frames data
received from the upper layer and passes them to the
physical layer.
LLC
MAC
Computer Networks - 1/11
1/11
MAC Sub-layer Frame Format
159.334 Computer Networks
The Ethernet frame contains the following 7 fields:
Preamble
SFD (Start Frame Delimiter)
DA (Destination Address)
SA (Source Address)
Length or type of PDU (Protocol Data Unit)
Upper layer data
CRC (Cyclic Redundancy Check)
Ethernet doesn’t provide any mechanism for frame
acknowledgements so it is “unreliable”.
Computer Networks - 1/12
1/12
The MAC Frame Layout
159.334 Computer Networks
Notes:
The preamble is actually added by the Physical Layer and isn’t a
formal part of the frame.
The length or type field can contain either piece of information!
Originally, meant to specify the type of the upper layer protocol
using the MAC frame, it can now also specify the number of
bytes in the data field.
Computer Networks - 1/13
1/13
Minimum and Maximum Lengths
159.334 Computer Networks
Notes:
The minimum length is essential since it is needed for the
correct operation of CSMA/CD.
The maximum length is 1518 bytes
This comprises 18 bytes of header and trailer so the maximum
payload can be 1500 bytes.
Computer Networks - 1/14
1/14
Implementations of Ethernet
159.334 Computer Networks
Computer Networks - 1/15
1/15
Slot Time
159.334 Computer Networks
“For an Ethernet network, the round trip time required
for a frame to travel from one end of a maximum length
network to the other, plus the time needed to send the
jam sequence is called the slot time.”
It is defined in bits.
It is the time needed for a station to send 512 bits
The slot time therefore depends on the data rate.
For standard Ethernet, 10-Mbps this value is 51.2s
Computer Networks - 1/16
1/16
Slot Time & Maximum Network Length
159.334 Computer Networks
The relationship between these two entities depends on the
propagation speed of the signal in the particular medium.
Normally this is about 2 x 108 m/sec (about 2/3rds of the rate in air)
so:
Slot Time
Max_Length = Propagation Speed 
2
Max_Length  (2 108 )  (51.2 106 / 2)  5120m
By including delay times in repeaters and interfaces, together with
the time required for the jam sequence we find that this reduces the
theoretical length to about 48% of the theoretical calculated value.
Max_Length  2500m
Computer Networks - 1/17
1/17
Implementation 10Base5
159.334 Computer Networks
The following slides show implementations of Ethernet.
The slides are reproduced directly from Forouzan’s text.
(Chapter 13).
Computer Networks - 1/18
1/18
10Base2 Implementation
159.334 Computer Networks
Computer Networks - 1/19
1/19
10Base-T implementation
159.334 Computer Networks
Computer Networks - 1/20
1/20
10Base-F implementation
159.334 Computer Networks
Computer Networks - 1/21
1/21
Cable Topologies for Ethernet
159.334 Computer Networks
(a) Linear, (b) Spine, (c) Tree, (d) Segmented.
Computer Networks - 1/22
1/22
159.334 Computer Networks
Wireless LANs
Introducing 802.11x
What is IEEE 802.11?
159.334 Computer Networks
IEEE has defined the specifications for a wireless LAN,
called IEEE 802.11, which covers the physical and data
link layers.
Computer Networks - 1/24
1/24
The 802.11 Architecture - 1
159.334 Computer Networks
The IEEE 802.11 standard defines two types of service:
BSS – Base Service Set
This is made up of stationary or mobile wireless stations and an
optional central base station.
The central base station is called an Access Point
ESS – Extended Service Set
This is made up of two or more BSS’s connected through a
distribution system that is often a wired LAN – it can be of any type.
Computer Networks - 1/25
1/25
The 802.11 Architecture - 2
159.334 Computer Networks
There are two types of BSS illustrated below:
Ad hoc network
Infrastructure network
Computer Networks - 1/26
1/26
Example of an Extended Service Set
159.334 Computer Networks
Computer Networks - 1/27
1/27
Station Types
159.334 Computer Networks
The standard defines three types of stations based on
their mobility:
No transition
Deemed to be stationary or moving only within a BSS
BSS-transition
Said to be a station that can move from one BSS to another BSS
but constrained to being inside one ESS.
ESS-transition
A station can move from one ESS to another.
Note:
The standard does not guarantee that communication will be
continuous during the move.
Computer Networks - 1/28
1/28
The MAC Sub-layer
159.334 Computer Networks
The standard defines two MAC sub-layers:
The Distributed Coordination Function (DCF)
The Point Coordination Function (PCF)
The figure below shows the various relationships
involved:
Computer Networks - 1/29
1/29
Distributed Coordination Function
(DCF)
159.334 Computer Networks
DCF uses CSMA/CD as the access method.
However:
Wireless LANs cannot implement CSMA/CD for at least three
reasons:
1. For collision detection we need the station to be able to
simultaneously send and receive signals. This leads to significant
bandwidth requirements.
2. Collision may not be detected because of the hidden station
problem (See later slide)
3. The distance between stations can be great and signal fading may
prevent a station at one end from hearing the collision at the other
end. (See later slide)
Computer Networks - 1/30
1/30
Point Coordination Function (PCF)
159.334 Computer Networks
It is an optional access method. This can be
implemented in an infrastructure network (NOT an ad
hoc network).
We implement it on top of the DCF and is appropriate for time
sensitive applications.
PCF is centralised.
It is a contention free polling method.
The Access Point performs polling for stations that can be
polled.
The stations are polled sequentially.
Data is sent to the AP.
Computer Networks - 1/31
1/31
Fragmentation
159.334 Computer Networks
Since wireless network environments tend to be quite
noisy, it is recommended that frames be fragmented
(smaller pieces) since if a frame is to be retransmitted, it
is better to send a smaller one than a larger one!
Small frames
Computer Networks - 1/32
1/32
The Frame Format
159.334 Computer Networks
There are 9 fields in the MAC layer frame:
Frame Control: the FC field is 2 bytes long and defines the frame type and
some control info
D: The duration of the transmission to set the Network Address Vector (NAV)
Addresses x 4 (each 6 bytes). These depend on the To DS and From DS
subfields
Sequence control: Sequence number used in flow control.
Frame body: It can be from 0 to 2312 bytes and can contain info as defined by
the FC field.
Frame Check Sequence (FCS) is 4 bytes and contains a CRC 32 error detection
sequence.
Computer Networks - 1/33
1/33
The Frame Format – subfields of FC
159.334 Computer Networks
Computer Networks - 1/34
1/34
Frame Types
159.334 Computer Networks
In the 802.11 standard, there are basically three types of
frame:
Management frames
Used for the initial communication between stations and access
points
Control frames
Used for accessing the channel and acknowledging frames
Data frames
Used for carrying data and control information
Computer Networks - 1/35
1/35
Addressing Scheme
159.334 Computer Networks
There are 4 cases corresponding to the flag values of 0 or 1 in the
To DS and From DS flags.
Notes:
Address 1 is always the address of the next device.
Address 2 is always the address of the previous device
Address 3 is the address of the final destination if it is not defined by
Address 1
Address 4 is the address of the original source station if it is not the
same as Address 2.
Computer Networks - 1/36
1/36
Summary of the Addressing Schemes
159.334 Computer Networks
Computer Networks - 1/37
1/37
Hidden Station Problem
159.334 Computer Networks
Computer Networks - 1/38
1/38
Exposed Station Problem
159.334 Computer Networks
Computer Networks - 1/39
1/39
The Physical Layers
159.334 Computer Networks
Computer Networks - 1/40
1/40
Download