Bandwidth Utilization: Multiplexing
Bandwidth Utilization: Multiplexing
Bandwidth Utilization: Multiplexing
Bandwidth Utilization:
Multiplexing
6.1
Note
Bandwidth utilization is the wise use of
available bandwidth to achieve
specific goals.
6.2
MULTIPLEXING
6.3
Dividing a link into channels
6.4
Categories of multiplexing
6.5
Frequency-division multiplexing (FDM)
6.6
FDM process
6.7
FDM demultiplexing example
6.8
Example
6.10
Wavelength-division multiplexing (WDM)
6.11
Figure Prisms in wavelength-division multiplexing and demultiplexing
6.12
Time Division Multiplexing (TDM)
6.14
Interleaving
The process of taking a group of bits from each input line for
multiplexing is called interleaving.
We interleave bits (1 - n) from each input onto one output.
6.15
Interleaving
6.16
Synchronization
To ensure that the receiver correctly reads the
incoming bits, i.e., knows the incoming bit
boundaries to interpret a “1” and a “0”, a
known bit pattern is used between the frames.
The receiver looks for the anticipated bit and
starts counting bits till the end of the frame.
Then it starts over again with the reception of
another known bit.
These bits (or bit patterns) are called
synchronization bit(s).
They are part of the overhead of transmission.
6.17
Framing bits
6.18
Inefficient use of Bandwidth
6.19
Empty slots
6.20
Figure 6.26 TDM slot comparison
6.21
Multiple Access
12.22
12.23
RANDOM ACCESS
12.24
Frames in a pure ALOHA network
12.25
Procedure for pure ALOHA protocol
12.26
Example
12.27
Example (continued)
12.28
Vulnerable time for pure ALOHA protocol
12.29
Example
A pure ALOHA network transmits 200-bit frames on a shared channel of 200 kbps.
What is the requirement to make this frame collision-free?
Solution
Average frame transmission time Tfr is 200 bits/200 kbps or 1 ms. The vulnerable
time is 2 × 1 ms = 2 ms. This means no station should send later than 1 ms before
this station starts transmission and no station should start sending during the one 1-
ms period that this station is sending.
12.30
Note
12.31
Example
A pure ALOHA network transmits 200-bit frames on a shared channel of 200 kbps.
What is the throughput if the system (all stations together) produces
a. 1000 frames per second b. 500 frames per second
c. 250 frames per second.
Solution
The frame transmission time is 200/200 kbps or 1 ms.
a. If the system creates 1000 frames per second, this is 1
frame per millisecond. The load is 1. In this case
S = G× e−2 G or S = 0.135 (13.5 percent). This means
that the throughput is 1000 × 0.135 = 135 frames. Only
135 frames out of 1000 will probably survive.
12.32
Example (continued)
b. If the system creates 500 frames per second, this is
(1/2) frame per millisecond. The load is (1/2). In this
case S = G × e −2G or S = 0.184 (18.4 percent). This
means that the throughput is 500 × 0.184 = 92 and that
only 92 frames out of 500 will probably survive. Note
that this is the maximum throughput case,
percentagewise.
12.33
Figure Frames in a slotted ALOHA network
12.34
Note
12.35
Vulnerable time for slotted ALOHA protocol
12.36
Example
A slotted ALOHA network transmits 200-bit frames on a shared channel of 200
kbps. What is the throughput if the system (all stations together) produces
a. 1000 frames per second b. 500 frames per second
c. 250 frames per second.
Solution
The frame transmission time is 200/200 kbps or 1 ms.
a. If the system creates 1000 frames per second, this is 1
frame per millisecond. The load is 1. In this case
S = G× e−G or S = 0.368 (36.8 percent). This means
that the throughput is 1000 × 0.0368 = 368 frames.
Only 386 frames out of 1000 will probably survive.
12.37
Example (continued)
b. If the system creates 500 frames per second, this is
(1/2) frame per millisecond. The load is (1/2). In this
case S = G × e−G or S = 0.303 (30.3 percent). This
means that the throughput is 500 × 0.0303 = 151.
Only 151 frames out of 500 will probably survive.
12.38
Figure Space/time model of the collision in CSMA
12.39
Figure Vulnerable time in CSMA
12.40
Figure Behavior of three persistence methods
12.41
Figure Flow diagram for three persistence methods
12.42
Figure Collision of the first bit in CSMA/CD
12.43
Figure Collision and abortion in CSMA/CD
12.44
Example
A network using CSMA/CD has a bandwidth of 10 Mbps. If the maximum
propagation time (including the delays in the devices and ignoring the time
needed to send a jamming signal, as we see later) is 25.6 μs, what is the minimum
size of the frame?
Solution
The frame transmission time is Tfr = 2 × Tp = 51.2 μs. This means, in the worst
case, a station needs to transmit for a period of 51.2 μs to detect the collision.
The minimum size of the frame is 10 Mbps × 51.2 μs = 512 bits or 64 bytes. This is
actually the minimum size of the frame for Standard Ethernet.
12.45
Figure Flow diagram for the CSMA/CD
12.46
Figure Energy level during transmission, idleness, or collision
12.47
Figure Timing in CSMA/CA
12.48
Note
12.49
Note
12.50
Figure Flow diagram for CSMA/CA
12.51
Error Detection and Correction
Basic concepts
Networks must be able to transfer data
from one device to another with
complete accuracy.
Data can be corrupted during
transmission.
For reliable communication, errors must
be detected and corrected.
Error detection and correction are
implemented either at the data link layer
or the transport layer of the OSI model.
Types of Errors
Single-bit error
Single bit errors are the least likely type of errors
in serial data transmission because the noise must
have a very short duration which is very rare.
However this kind of errors can happen in parallel
transmission.
Example:
If data is sent at 1Mbps then each bit lasts only
1/1,000,000 sec. or 1 μs.
For a single-bit error to occur, the noise must have
a duration of only 1 μs, which is very rare.
Burst error
The term burst error means that two or
more bits in the data unit have changed
from 1 to 0 or from 0 to 1.
• Circuit Switching
• Message Switching
• Packet Switching
Circuit Switching
Circuit switching is a technique that directly connects the sender and
the receiver in an unbroken path.
Telephone switching equipment, for example, establishes a path that
connects the caller's telephone to the receiver's telephone by making a
physical connection.
With this type of switching technique, once a connection is
established, a dedicated path exists between both ends until the
connection is terminated.
Routing decisions must be made when the circuit is first established,
but there are no decisions made after that time.
Circuit Switching
Advantages:
• The communication channel (once established) is dedicated.
Disadvantages:
• Possible long wait to establish a connection, (10 seconds,
more on long- distance or international calls.) during which
no data can be transmitted.
• More expensive than any other switching techniques,
because a dedicated path is required for each connection.
• Inefficient use of the communication channel, because the
channel is not used when the connected systems are not
using it.
Message Switching
Disadvantages
• Message switching is not compatible with interactive
applications.
• Store-and-forward devices are expensive, because they
must have large disks to hold potentially long messages.
Packet Switching
• Packet switching can be seen as a solution that tries to combine the
advantages of message and circuit switching and to minimize the
disadvantages of both.
• There are two methods of packet switching: Datagram
and virtual circuit.
Packet Switching
The size of the packet can vary from 180 bits, the size for the
Datakit® virtual circuit switch designed by Bell Labs for
communications and business applications; to 1,024 or 2,048 bits for
the 1PSS® switch, also designed by Bell Labs for public data
networking; to 53 bytes for ATM switching, such as Lucent
Technologies' packet switches.
Packet switching
In packet switching, the analog signal from your phone is converted
into a digital data stream. That series of digital bits is then divided
into relatively tiny clusters of bits, called packets. Each packet has
at its beginning the digital address -- a long number -- to which it is
being sent. The system blasts out all those tiny packets, as fast as
it can, and they travel across the nation's digital backbone systems
to their destination: the telephone, or rather the telephone
system, of the person you're calling.
They do not necessarily travel together; they do not travel
sequentially. They don't even all travel via the same route. But
eventually they arrive at the right point -- that digital address
added to the front of each string of digital data -- and at their
destination are reassembled into the correct order, then converted
to analog form, so your friend can understand what you're saying.
Packet Switching: Datagram
• Datagram packet switching is similar to message switching in
that each packet is a self-contained unit with complete
addressing information attached.
• This fact allows packets to take a variety of possible paths
through the network.
• So the packets, each with the same destination address, do not
follow the same route, and they may arrive out of sequence at
the exit point node (or the destination).
• Reordering is done at the destination point based on the
sequence number of the packets.
• It is possible for a packet to be destroyed if one of the nodes on
its way is crashed momentarily. Thus all its queued packets may
be lost.
Packet Switching:Virtual Circuit
• In the virtual circuit approach, a preplanned route is established
before any data packets are sent.
• A logical connection is established when
a sender send a "call request packet" to the receiver and
the receiver send back an acknowledge packet "call accepted
packet" to the sender if the receiver agrees on conversational
parameters.
• The conversational parameters can be maximum packet sizes,
path to be taken, and other variables necessary to establish and
maintain the conversation.
• Virtual circuits imply acknowledgements, flow control, and error
control, so virtual circuits are reliable.
• That is, they have the capability to inform upper-protocol layers
if a transmission problem occurs.
Packet Switching:Virtual Circuit
• In virtual circuit, the route between stations does not mean that
this is a dedicated path, as in circuit switching.
• A packet is still buffered at each node and queued for output over
a line.
• The difference between virtual circuit and datagram approaches:
With virtual circuit, the node does not need to make a routing
decision for each packet.
It is made only once for all packets using that virtual circuit.
Packet Switching: Virtual Circuit
Advantages:
• Packet switching is cost effective, because switching
devices do not need massive amount of secondary
storage.
• Packet switching offers improved delay characteristics,
because there are no long messages in the queue
(maximum packet size is fixed).
• Packet can be rerouted if there is any problem, such as,
busy or disabled links.
• The advantage of packet switching is that many
network users can share the same channel at the same
time. Packet switching can maximize link efficiency by
making optimal use of link bandwidth.
Disadvantages of packet switching
Disadvantages:
• Protocols for packet switching are typically more complex.
• It can add some initial costs in implementation.
• If packet is lost, sender needs to retransmit the data.
• Another disadvantage is that packet-switched systems still
can’t deliver the same quality as dedicated circuits in
applications requiring very little delay - like voice
conversations or moving images.
Link layer: introduction
terminology:
hosts and routers: nodes
communication channels that connect global ISP
adjacent nodes along communication
path: links
wired links
wireless links
LANs
layer-2 packet: frame, encapsulates
datagram
5-109
Data Link Layer
Link layer services (more)
flow control:
pacing between adjacent sending and receiving nodes
error detection:
errors caused by signal attenuation, noise.
receiver detects presence of errors:
signals sender for retransmission or drops frame
error correction:
receiver identifies and corrects bit error(s) without
resorting to retransmission
half-duplex and full-duplex
with half duplex, nodes at both ends of link can transmit,
but not at same time
5-110
Data Link Layer
Where is the link layer implemented?
in each and every host
link layer implemented in
“adaptor” (network
interface card NIC) application
transport
Ethernet card, 802.11 card network cpu memory
link
implements link, physical layer
software, firmware
network adapter
card
5-111
Data Link Layer
Adaptors communicating
datagram datagram
controller controller
frame
5-112
Data Link Layer
Addressing: routing to another LAN
walkthrough: send datagram from A to B via R
focus on addressing - at both IP (datagram) and MAC layer (frame)
assume A knows B’s IP address
assume A knows IP address of first hop router, R (how?)
assume A knows R’s MAC address (how?)
A B
R
111.111.111.111
222.222.222.222
74-29-9C-E8-FF-55
49-BD-D2-C7-56-2A
222.222.222.220
1A-23-F9-CD-06-9B
5-113
Data Link Layer
Addressing: routing to another LAN
A creates IP datagram with IP source A, destination B
A creates link-layer frame with R's MAC address as dest, frame
contains A-to-B IP datagram
MAC src: 74-29-9C-E8-FF-55
MAC dest: E6-E9-00-17-BB-4B
IP src: 111.111.111.111
IP dest: 222.222.222.222
IP
Eth
Phy
A B
R
111.111.111.111
222.222.222.222
74-29-9C-E8-FF-55
49-BD-D2-C7-56-2A
222.222.222.220
1A-23-F9-CD-06-9B
5-114
Data Link Layer
Addressing: routing to another LAN
frame sent from A to R
frame received at R, datagram removed, passed up to IP
IP IP
Eth Eth
Phy Ph
y
A B
R
111.111.111.111
222.222.222.222
74-29-9C-E8-FF-55
49-BD-D2-C7-56-2A
222.222.222.220
1A-23-F9-CD-06-9B
5-115
Data Link Layer
Addressing: routing to another LAN
R forwards datagram with IP source A, destination B
R creates link-layer frame with B's MAC address as dest, frame
contains A-to-B IP datagram
5-116
Data Link Layer
Addressing: routing to another LAN
R forwards datagram with IP source A, destination B
R creates link-layer frame with B's MAC address as dest, frame
contains A-to-B IP datagram
5-117
Data Link Layer
Addressing: routing to another LAN
R forwards datagram with IP source A, destination B
R creates link-layer frame with B's MAC address as dest, frame
contains A-to-B IP datagram
MAC src: 1A-23-F9-CD-06-9B
MAC dest: 49-BD-D2-C7-56-2A
IP src: 111.111.111.111
IP dest: 222.222.222.222
IP
Eth
Phy
A B
R
111.111.111.111
222.222.222.222
74-29-9C-E8-FF-55
49-BD-D2-C7-56-2A
222.222.222.220
1A-23-F9-CD-06-9B
5-118
Data Link Layer
Ethernet
“dominant” wired LAN technology:
cheap for NIC
first widely used LAN technology
Developed in the mid-1970s by researchers at the Xerox Palo Alto Research
Centers (PARC)
simpler, cheaper than token LANs and ATM
kept up with speed race: 10 Mbps – 10 Gbps
5-119
Data Link Layer
Ethernet frame structure
Sending adapter encapsulates IP datagram (or other network layer
protocol packet) in Ethernet frame
Preamble:
7 bytes with pattern 10101010 followed by one byte with pattern
10101011
used to synchronize receiver, sender clock rates
5-120
Data Link Layer
Ethernet frame structure (more)
addresses: 6 bytes
if adapter receives frame with matching destination
address, or with broadcast address (e.g. ARP packet), it
passes data in frame to network layer protocol
otherwise, adapter discards frame
type: indicates higher layer protocol (mostly IP but others
possible, e.g., Novell IPX, AppleTalk)
CRC: checked at receiver, if error is detected, frame is
dropped
Data: 46 to 1500 bytes (MTU: 1500B)
5-121
Data Link Layer
Ethernet switch
link-layer device: takes an active role
store, forward Ethernet frames
examine incoming frame’s MAC address, selectively forward frame to one-
or-more outgoing links when frame is to be forwarded on segment, uses
CSMA/CD to access segment
transparent
hosts are unaware of presence of switches
plug-and-play, self-learning
switches do not need to be configured
5-122
Data Link Layer
Switch: multiple simultaneous transmissions
5-123
Data Link Layer
Switch table
5-124
Data Link Layer
Switch: self-learning Source: A
Dest: A’
A A A’
switch learns which hosts
can be reached through C’ B
which interfaces
when frame received,
61 2
switch “learns” location of
sender: incoming LAN
5 4 3
segment B’ C
records sender/location pair
in switch table
A’
MAC addr interface TTL
Switch table
A 1 60 (initially empty)
5-125
Data Link Layer
Switch: frame filtering/forwarding
When frame received:
5-127
Data Link Layer
Interconnecting switches
S4
S1 S3
A S2
D F I
B C
E G H
5-128
Data Link Layer
Self-learning multi-switch example
S4
S1 S3
A S2
D F I
B C
E G H
5-129
Data Link Layer
Switches vs. Routers
application
both store-and-forward transport
datagram network
devices
frame link
routers: network-layer physical
link frame
devices (examine physical
network-layer headers)
switches are link-layer
devices (examine link-
switch
layer headers) network datagram
link frame
routers maintain routing physical
tables, implement
routing algorithms application
switches maintain transport
switch tables, network
link
implement filtering,
physical
learning algorithms
5-130
Data Link Layer
14-1 IEEE 802.11
14.131
A BSS without an AP is called an ad hoc network;
a BSS with an AP is called an infrastructure network.
14.132
Figure Basic service sets (BSSs)
14.133
Figure Extended service sets (ESSs)
14.134
Figure MAC layers in IEEE 802.11 standard
14.135
Figure CSMA/CA flowchart
14.136
Figure 14.5 CSMA/CA and NAV
14.137
Figure Example of repetition interval
14.138
Figure Frame format
14.139
Table Subfields in FC field
14.140
Figure Control frames
14.141
Table Values of subfields in control frames
14.142
Figure Addressing mechanisms
14.143
Figure Hidden station problem
14.144
Note
14.145
Figure Use of handshaking to prevent hidden station problem
14.146
Figure Exposed station problem
14.147
Figure Use of handshaking in exposed station problem
14.148
Table Physical layers
14.149
Figure Industrial, scientific, and medical (ISM) band
14.150
Figure Physical layer of IEEE 802.11 FHSS
14.151
Figure Physical layer of IEEE 802.11 DSSS
14.152
Figure Physical layer of IEEE 802.11 infrared
14.153
Figure Physical layer of IEEE 802.11b
14.154
BLUETOOTH
14.155
Piconet
14.156
Figure Scatternet
14.157
Figure Bluetooth layers
14.158
Figure Single-secondary communication
14.159
Figure Multiple-secondary communication
14.160
Figure Frame format types
14.161
Figure L2CAP data packet format
14.162