159.334 Computer Networks Data Link Layer - Overview of LLC and MAC Introduction to 802.11 Professor Richard Harris School of Engineering and Advanced Technology (SEAT) Objectives 159.334 Computer Networks You will be able to describe the objectives of the 802 project. You will be able to discuss the 802.11 LAN standards You will be able to describe the framing methodology for 802 standards You will be able to discuss the various fields used for 802 and 802.11 standards in particular. Computer Networks - 1/2 1/2 References 159.334 Computer Networks Chapters 13 and 14, Forouzan Chapter 4, Tanenbaum Cisco CCNA course notes Computer Networks - 1/3 1/3 Presentation Outline 159.334 Computer Networks Introduction to Project 802 Revision of key concepts from the CCNA learning material on Ethernet The wireless LAN revolution 802.11x Computer Networks - 1/4 1/4 Project 802 of the IEEE 159.334 Computer Networks The Computer Society of the IEEE began a special project in 1985 that was known as Project 802 Its purpose was to set standards that would enable intercommunication between equipment from a variety of manufacturers. Project 802 is a way of specifying functions of the physical layer and the data link layer of major LAN protocols. Computer Networks - 1/5 1/5 The IEEE Standard for LANs - 1 159.334 Computer Networks The following diagram shows the relationship between the traditional ISO model and the 802 standard. It will be seen that the 802 standard has sub-divided the Data Link Layer into two parts, viz: LLC Link Layer Control MAC (Media Access Control) Layer • The IEEE has actually created several physical layer standards for different LAN protocols Computer Networks - 1/6 1/6 The IEEE Standard for LANs - 2 159.334 Computer Networks Data Link Layer Logical Link Control (LLC) For IEEE 802, flow control, error control, and part of the framing duties are all brought together in this LLC sub-layer. Framing is also performed in the MAC sub-layer. The LLC provides a single data link control protocol for all IEEE LANs. (Contrast this with the MAC layer where we have different protocol versions for different LANs. See previous slide.) The LLC makes the MAC sub-layer transparent. Framing LLC provides a PDU similar to HDLC Computer Networks - 1/7 1/7 Framing 159.334 Computer Networks The LLC header contains a control field like HDLC and is used for flow and error control. The two access point fields (DSAP and SSAP) define the upper layer protocol at the source and destination that uses LLC. Computer Networks - 1/8 1/8 Media Access Control - MAC 159.334 Computer Networks In general, multiple access methods include random access, controlled access and channelisation. For IEEE 802, there is a sub-layer called Media Access Control (MAC) that defines the specific access method for each LAN. Eg. It defines CSMA/CD as the media access method for Ethernet LANs. It defines the token passing method for Token Ring and Token Bus LANs. Computer Networks - 1/9 1/9 Evolution of Ethernet 159.334 Computer Networks There have been a number of variants for Ethernet that have evolved over time. The above figure shows this evolution. Computer Networks - 1/10 1/10 The MAC Sub-layer 159.334 Computer Networks Data Link Layer In standard Ethernet, the MAC sub-layer looks after the operation of the access method. It also frames data received from the upper layer and passes them to the physical layer. LLC MAC Computer Networks - 1/11 1/11 MAC Sub-layer Frame Format 159.334 Computer Networks The Ethernet frame contains the following 7 fields: Preamble SFD (Start Frame Delimiter) DA (Destination Address) SA (Source Address) Length or type of PDU (Protocol Data Unit) Upper layer data CRC (Cyclic Redundancy Check) Ethernet doesn’t provide any mechanism for frame acknowledgements so it is “unreliable”. Computer Networks - 1/12 1/12 The MAC Frame Layout 159.334 Computer Networks Notes: The preamble is actually added by the Physical Layer and isn’t a formal part of the frame. The length or type field can contain either piece of information! Originally, meant to specify the type of the upper layer protocol using the MAC frame, it can now also specify the number of bytes in the data field. Computer Networks - 1/13 1/13 Minimum and Maximum Lengths 159.334 Computer Networks Notes: The minimum length is essential since it is needed for the correct operation of CSMA/CD. The maximum length is 1518 bytes This comprises 18 bytes of header and trailer so the maximum payload can be 1500 bytes. Computer Networks - 1/14 1/14 Implementations of Ethernet 159.334 Computer Networks Computer Networks - 1/15 1/15 Slot Time 159.334 Computer Networks “For an Ethernet network, the round trip time required for a frame to travel from one end of a maximum length network to the other, plus the time needed to send the jam sequence is called the slot time.” It is defined in bits. It is the time needed for a station to send 512 bits The slot time therefore depends on the data rate. For standard Ethernet, 10-Mbps this value is 51.2s Computer Networks - 1/16 1/16 Slot Time & Maximum Network Length 159.334 Computer Networks The relationship between these two entities depends on the propagation speed of the signal in the particular medium. Normally this is about 2 x 108 m/sec (about 2/3rds of the rate in air) so: Slot Time Max_Length = Propagation Speed 2 Max_Length (2 108 ) (51.2 106 / 2) 5120m By including delay times in repeaters and interfaces, together with the time required for the jam sequence we find that this reduces the theoretical length to about 48% of the theoretical calculated value. Max_Length 2500m Computer Networks - 1/17 1/17 Implementation 10Base5 159.334 Computer Networks The following slides show implementations of Ethernet. The slides are reproduced directly from Forouzan’s text. (Chapter 13). Computer Networks - 1/18 1/18 10Base2 Implementation 159.334 Computer Networks Computer Networks - 1/19 1/19 10Base-T implementation 159.334 Computer Networks Computer Networks - 1/20 1/20 10Base-F implementation 159.334 Computer Networks Computer Networks - 1/21 1/21 Cable Topologies for Ethernet 159.334 Computer Networks (a) Linear, (b) Spine, (c) Tree, (d) Segmented. Computer Networks - 1/22 1/22 159.334 Computer Networks Wireless LANs Introducing 802.11x What is IEEE 802.11? 159.334 Computer Networks IEEE has defined the specifications for a wireless LAN, called IEEE 802.11, which covers the physical and data link layers. Computer Networks - 1/24 1/24 The 802.11 Architecture - 1 159.334 Computer Networks The IEEE 802.11 standard defines two types of service: BSS – Base Service Set This is made up of stationary or mobile wireless stations and an optional central base station. The central base station is called an Access Point ESS – Extended Service Set This is made up of two or more BSS’s connected through a distribution system that is often a wired LAN – it can be of any type. Computer Networks - 1/25 1/25 The 802.11 Architecture - 2 159.334 Computer Networks There are two types of BSS illustrated below: Ad hoc network Infrastructure network Computer Networks - 1/26 1/26 Example of an Extended Service Set 159.334 Computer Networks Computer Networks - 1/27 1/27 Station Types 159.334 Computer Networks The standard defines three types of stations based on their mobility: No transition Deemed to be stationary or moving only within a BSS BSS-transition Said to be a station that can move from one BSS to another BSS but constrained to being inside one ESS. ESS-transition A station can move from one ESS to another. Note: The standard does not guarantee that communication will be continuous during the move. Computer Networks - 1/28 1/28 The MAC Sub-layer 159.334 Computer Networks The standard defines two MAC sub-layers: The Distributed Coordination Function (DCF) The Point Coordination Function (PCF) The figure below shows the various relationships involved: Computer Networks - 1/29 1/29 Distributed Coordination Function (DCF) 159.334 Computer Networks DCF uses CSMA/CD as the access method. However: Wireless LANs cannot implement CSMA/CD for at least three reasons: 1. For collision detection we need the station to be able to simultaneously send and receive signals. This leads to significant bandwidth requirements. 2. Collision may not be detected because of the hidden station problem (See later slide) 3. The distance between stations can be great and signal fading may prevent a station at one end from hearing the collision at the other end. (See later slide) Computer Networks - 1/30 1/30 Point Coordination Function (PCF) 159.334 Computer Networks It is an optional access method. This can be implemented in an infrastructure network (NOT an ad hoc network). We implement it on top of the DCF and is appropriate for time sensitive applications. PCF is centralised. It is a contention free polling method. The Access Point performs polling for stations that can be polled. The stations are polled sequentially. Data is sent to the AP. Computer Networks - 1/31 1/31 Fragmentation 159.334 Computer Networks Since wireless network environments tend to be quite noisy, it is recommended that frames be fragmented (smaller pieces) since if a frame is to be retransmitted, it is better to send a smaller one than a larger one! Small frames Computer Networks - 1/32 1/32 The Frame Format 159.334 Computer Networks There are 9 fields in the MAC layer frame: Frame Control: the FC field is 2 bytes long and defines the frame type and some control info D: The duration of the transmission to set the Network Address Vector (NAV) Addresses x 4 (each 6 bytes). These depend on the To DS and From DS subfields Sequence control: Sequence number used in flow control. Frame body: It can be from 0 to 2312 bytes and can contain info as defined by the FC field. Frame Check Sequence (FCS) is 4 bytes and contains a CRC 32 error detection sequence. Computer Networks - 1/33 1/33 The Frame Format – subfields of FC 159.334 Computer Networks Computer Networks - 1/34 1/34 Frame Types 159.334 Computer Networks In the 802.11 standard, there are basically three types of frame: Management frames Used for the initial communication between stations and access points Control frames Used for accessing the channel and acknowledging frames Data frames Used for carrying data and control information Computer Networks - 1/35 1/35 Addressing Scheme 159.334 Computer Networks There are 4 cases corresponding to the flag values of 0 or 1 in the To DS and From DS flags. Notes: Address 1 is always the address of the next device. Address 2 is always the address of the previous device Address 3 is the address of the final destination if it is not defined by Address 1 Address 4 is the address of the original source station if it is not the same as Address 2. Computer Networks - 1/36 1/36 Summary of the Addressing Schemes 159.334 Computer Networks Computer Networks - 1/37 1/37 Hidden Station Problem 159.334 Computer Networks Computer Networks - 1/38 1/38 Exposed Station Problem 159.334 Computer Networks Computer Networks - 1/39 1/39 The Physical Layers 159.334 Computer Networks Computer Networks - 1/40 1/40