multiple access. introduction the medium access sub layer is the bottom part of data link layer. the...
TRANSCRIPT
![Page 1: Multiple Access. INTRODUCTION The medium access sub layer is the bottom part of data link layer. The medium access sub layer is known as MAC(Medium access](https://reader035.vdocuments.site/reader035/viewer/2022070411/56649f2f5503460f94c48859/html5/thumbnails/1.jpg)
Multiple Access
![Page 2: Multiple Access. INTRODUCTION The medium access sub layer is the bottom part of data link layer. The medium access sub layer is known as MAC(Medium access](https://reader035.vdocuments.site/reader035/viewer/2022070411/56649f2f5503460f94c48859/html5/thumbnails/2.jpg)
INTRODUCTION The medium access sub layer is the bottom part of data link
layer. The medium access sub layer is known as MAC(Medium access control) sub layer.
When common medium shared by many stations MAC layer plays very important role. Without MAC Control several station transmits simultaneously could produce garbled message.
The basic function of MAC sublayer is the media access control,error detection and station addressing.
Media access control procedure are ensure that every station get a fair chance to transmit and avoid the collision
When a number of user station share a single transmission medium. this is called as Multiple access communication.
2
![Page 3: Multiple Access. INTRODUCTION The medium access sub layer is the bottom part of data link layer. The medium access sub layer is known as MAC(Medium access](https://reader035.vdocuments.site/reader035/viewer/2022070411/56649f2f5503460f94c48859/html5/thumbnails/3.jpg)
3
Outline Multiple access mechanisms Random access Controlled access Channelization
![Page 4: Multiple Access. INTRODUCTION The medium access sub layer is the bottom part of data link layer. The medium access sub layer is known as MAC(Medium access](https://reader035.vdocuments.site/reader035/viewer/2022070411/56649f2f5503460f94c48859/html5/thumbnails/4.jpg)
4
Sublayers of Data Link Layer
![Page 5: Multiple Access. INTRODUCTION The medium access sub layer is the bottom part of data link layer. The medium access sub layer is known as MAC(Medium access](https://reader035.vdocuments.site/reader035/viewer/2022070411/56649f2f5503460f94c48859/html5/thumbnails/5.jpg)
5
Multiple Access Mechanisms
![Page 6: Multiple Access. INTRODUCTION The medium access sub layer is the bottom part of data link layer. The medium access sub layer is known as MAC(Medium access](https://reader035.vdocuments.site/reader035/viewer/2022070411/56649f2f5503460f94c48859/html5/thumbnails/6.jpg)
Random Access
![Page 7: Multiple Access. INTRODUCTION The medium access sub layer is the bottom part of data link layer. The medium access sub layer is known as MAC(Medium access](https://reader035.vdocuments.site/reader035/viewer/2022070411/56649f2f5503460f94c48859/html5/thumbnails/7.jpg)
7
Random Access Also called contention-based access No station is assigned to control
another
![Page 8: Multiple Access. INTRODUCTION The medium access sub layer is the bottom part of data link layer. The medium access sub layer is known as MAC(Medium access](https://reader035.vdocuments.site/reader035/viewer/2022070411/56649f2f5503460f94c48859/html5/thumbnails/8.jpg)
ALOHA The ALOHA protocol was developed at University of Hawaii
in the early 1970s.ALOHA was developed for packet radio network. ALOHA is applicable to any shared transmission medium.
In a system when multiple users try to send a message to other station through a common broadcast channel random access technique are used.
Random access means there is no scheduled time for any station to transmitt.
The basic idea of ALOHA system is applicable to any system in which uncoordinated users competing for the use of a single shared channel.
When a station send a data another station may attempt to do so at same time so the data from two station are collide. to avoid collision each station simply wait a random time and try it again
8
![Page 9: Multiple Access. INTRODUCTION The medium access sub layer is the bottom part of data link layer. The medium access sub layer is known as MAC(Medium access](https://reader035.vdocuments.site/reader035/viewer/2022070411/56649f2f5503460f94c48859/html5/thumbnails/9.jpg)
9
ALOHA Network
![Page 10: Multiple Access. INTRODUCTION The medium access sub layer is the bottom part of data link layer. The medium access sub layer is known as MAC(Medium access](https://reader035.vdocuments.site/reader035/viewer/2022070411/56649f2f5503460f94c48859/html5/thumbnails/10.jpg)
Pure ALOHA
10
The original ALOHA protocol is called pure ALOHA. In pure ALOHA each station send a frame whenever it has a frame to send. since there is the chance of collision between frame from different station
The below figure in next slide shows the pure aloha The pure ALOHA Protocol relies on acknowledgement from
the receiver. When user send a frame it except the receiver to send an acknowledgement. if the acknowledgement does not arrive after a time out period the station assume that the frame has been destroyed and resend the frame.
Whenever two frames try to occupy the channel at same time there is the chance of collision and both will be garbled.if the first bit of new frame overlaps with last bit of a frame almost finished both frame will be destroyed and both will be retransmit later.
![Page 11: Multiple Access. INTRODUCTION The medium access sub layer is the bottom part of data link layer. The medium access sub layer is known as MAC(Medium access](https://reader035.vdocuments.site/reader035/viewer/2022070411/56649f2f5503460f94c48859/html5/thumbnails/11.jpg)
11
Pure ALOHA dictate that when the time out period passes ,each user wait random amount of time before resending the frame .the randomness will help to avoid more collision.the time is called back-off time (TB)
![Page 12: Multiple Access. INTRODUCTION The medium access sub layer is the bottom part of data link layer. The medium access sub layer is known as MAC(Medium access](https://reader035.vdocuments.site/reader035/viewer/2022070411/56649f2f5503460f94c48859/html5/thumbnails/12.jpg)
12
Frames in Pure ALOHA
![Page 13: Multiple Access. INTRODUCTION The medium access sub layer is the bottom part of data link layer. The medium access sub layer is known as MAC(Medium access](https://reader035.vdocuments.site/reader035/viewer/2022070411/56649f2f5503460f94c48859/html5/thumbnails/13.jpg)
13
ALOHA Protocol
![Page 14: Multiple Access. INTRODUCTION The medium access sub layer is the bottom part of data link layer. The medium access sub layer is known as MAC(Medium access](https://reader035.vdocuments.site/reader035/viewer/2022070411/56649f2f5503460f94c48859/html5/thumbnails/14.jpg)
14
ALOHA: Vulnerable Time
![Page 15: Multiple Access. INTRODUCTION The medium access sub layer is the bottom part of data link layer. The medium access sub layer is known as MAC(Medium access](https://reader035.vdocuments.site/reader035/viewer/2022070411/56649f2f5503460f94c48859/html5/thumbnails/15.jpg)
15
ALOHA: Throughput Assume number of stations trying to
transmit follow Poisson Distribution The throughput for pure ALOHA is
S = G × e−2G
where G is the average number of frames requested per frame-time
The maximum throughput Smax = 0.184 when G= 1/2
![Page 16: Multiple Access. INTRODUCTION The medium access sub layer is the bottom part of data link layer. The medium access sub layer is known as MAC(Medium access](https://reader035.vdocuments.site/reader035/viewer/2022070411/56649f2f5503460f94c48859/html5/thumbnails/16.jpg)
16
Slotted ALOHA
![Page 17: Multiple Access. INTRODUCTION The medium access sub layer is the bottom part of data link layer. The medium access sub layer is known as MAC(Medium access](https://reader035.vdocuments.site/reader035/viewer/2022070411/56649f2f5503460f94c48859/html5/thumbnails/17.jpg)
17
Slotted ALOHA: Vulnerable Time
![Page 18: Multiple Access. INTRODUCTION The medium access sub layer is the bottom part of data link layer. The medium access sub layer is known as MAC(Medium access](https://reader035.vdocuments.site/reader035/viewer/2022070411/56649f2f5503460f94c48859/html5/thumbnails/18.jpg)
18
Slotted ALOHA: Throughput The throughput for Slotted ALOHA is
S = G × e−G
where G is the average number of frames requested per frame-time
The maximum throughput Smax = 0.368 when G= 1
![Page 19: Multiple Access. INTRODUCTION The medium access sub layer is the bottom part of data link layer. The medium access sub layer is known as MAC(Medium access](https://reader035.vdocuments.site/reader035/viewer/2022070411/56649f2f5503460f94c48859/html5/thumbnails/19.jpg)
19
Example A Slotted ALOHA network transmits
200-bit frames on a shared channel of 200 kbps. What is the throughput if the system (all stations together) produces 1000 frames per second 500 frames per second 250 frames per second
![Page 20: Multiple Access. INTRODUCTION The medium access sub layer is the bottom part of data link layer. The medium access sub layer is known as MAC(Medium access](https://reader035.vdocuments.site/reader035/viewer/2022070411/56649f2f5503460f94c48859/html5/thumbnails/20.jpg)
20
CSMA Carrier Sense Multiple Access
"Listen before talk" Reduce the possibility of collision
But cannot completely eliminate it
![Page 21: Multiple Access. INTRODUCTION The medium access sub layer is the bottom part of data link layer. The medium access sub layer is known as MAC(Medium access](https://reader035.vdocuments.site/reader035/viewer/2022070411/56649f2f5503460f94c48859/html5/thumbnails/21.jpg)
21
Collision in CSMA
B
C
![Page 22: Multiple Access. INTRODUCTION The medium access sub layer is the bottom part of data link layer. The medium access sub layer is known as MAC(Medium access](https://reader035.vdocuments.site/reader035/viewer/2022070411/56649f2f5503460f94c48859/html5/thumbnails/22.jpg)
22
CSMA: Vulnerable Time
![Page 23: Multiple Access. INTRODUCTION The medium access sub layer is the bottom part of data link layer. The medium access sub layer is known as MAC(Medium access](https://reader035.vdocuments.site/reader035/viewer/2022070411/56649f2f5503460f94c48859/html5/thumbnails/23.jpg)
23
Persistence Methods What a station does when channel is idle or
busy
![Page 24: Multiple Access. INTRODUCTION The medium access sub layer is the bottom part of data link layer. The medium access sub layer is known as MAC(Medium access](https://reader035.vdocuments.site/reader035/viewer/2022070411/56649f2f5503460f94c48859/html5/thumbnails/24.jpg)
Non-persistent CSMA In non-persistent CSMA when a station
having a packet(frame)to transmit and find that channel is busy it back off for a fixed interval of time.it then check it if channel is free then it transmitts
24
![Page 25: Multiple Access. INTRODUCTION The medium access sub layer is the bottom part of data link layer. The medium access sub layer is known as MAC(Medium access](https://reader035.vdocuments.site/reader035/viewer/2022070411/56649f2f5503460f94c48859/html5/thumbnails/25.jpg)
1-Persistence CSMA Any station wishing to transmit monitor
the channel continuously until the channel is idle and then transmit immediately with probability one hence the name 1-persistent
When two or more station are waiting to transmitt a collision is guaranteed.since each station will transmitt immediately at the end of busy period.in this case each will wait random amount of time and then reattempt to transmit.
25
![Page 26: Multiple Access. INTRODUCTION The medium access sub layer is the bottom part of data link layer. The medium access sub layer is known as MAC(Medium access](https://reader035.vdocuments.site/reader035/viewer/2022070411/56649f2f5503460f94c48859/html5/thumbnails/26.jpg)
P-persistence CSMA To reduce the probability of collision in 1-
persistent CSMA not all waiting station are allowed to transmit immediately after the channel is idle.
When a station become ready to send and it senses the channel to be idle it either to transmit with a probability p or it defer transmission by one time slot with a probability q=1-p if deferred slot is idle the station either transmit with probability p or defer again with a probability q this process is repeated until either packet are transmitted or channel become busy
26
![Page 27: Multiple Access. INTRODUCTION The medium access sub layer is the bottom part of data link layer. The medium access sub layer is known as MAC(Medium access](https://reader035.vdocuments.site/reader035/viewer/2022070411/56649f2f5503460f94c48859/html5/thumbnails/27.jpg)
27
Persistence Methods
![Page 28: Multiple Access. INTRODUCTION The medium access sub layer is the bottom part of data link layer. The medium access sub layer is known as MAC(Medium access](https://reader035.vdocuments.site/reader035/viewer/2022070411/56649f2f5503460f94c48859/html5/thumbnails/28.jpg)
28
CSMA/CD Carrier Sense Multiple Access with
Collision Detection Station monitors channel while
sending a frame
![Page 29: Multiple Access. INTRODUCTION The medium access sub layer is the bottom part of data link layer. The medium access sub layer is known as MAC(Medium access](https://reader035.vdocuments.site/reader035/viewer/2022070411/56649f2f5503460f94c48859/html5/thumbnails/29.jpg)
29
Energy Levels
![Page 30: Multiple Access. INTRODUCTION The medium access sub layer is the bottom part of data link layer. The medium access sub layer is known as MAC(Medium access](https://reader035.vdocuments.site/reader035/viewer/2022070411/56649f2f5503460f94c48859/html5/thumbnails/30.jpg)
30
CSMA/CD: Flow Diagram
![Page 31: Multiple Access. INTRODUCTION The medium access sub layer is the bottom part of data link layer. The medium access sub layer is known as MAC(Medium access](https://reader035.vdocuments.site/reader035/viewer/2022070411/56649f2f5503460f94c48859/html5/thumbnails/31.jpg)
31
CSMA/CA Carrier Sense Multiple Access with
Collision Avoidance Used in a network where collision
cannot be detected E.g., wireless LAN
IFS – Interframe Space
![Page 32: Multiple Access. INTRODUCTION The medium access sub layer is the bottom part of data link layer. The medium access sub layer is known as MAC(Medium access](https://reader035.vdocuments.site/reader035/viewer/2022070411/56649f2f5503460f94c48859/html5/thumbnails/32.jpg)
32
CSMA/CA: Flow Diagram
contention window size is 2K-1
After each slot:- If idle, continue counting- If busy, stop counting
![Page 33: Multiple Access. INTRODUCTION The medium access sub layer is the bottom part of data link layer. The medium access sub layer is known as MAC(Medium access](https://reader035.vdocuments.site/reader035/viewer/2022070411/56649f2f5503460f94c48859/html5/thumbnails/33.jpg)
Controlled Access
![Page 34: Multiple Access. INTRODUCTION The medium access sub layer is the bottom part of data link layer. The medium access sub layer is known as MAC(Medium access](https://reader035.vdocuments.site/reader035/viewer/2022070411/56649f2f5503460f94c48859/html5/thumbnails/34.jpg)
34
Control Access A station must be authorized by
someone (e.g., other stations) before transmitting
Three common methods: Reservation Polling Token passing
![Page 35: Multiple Access. INTRODUCTION The medium access sub layer is the bottom part of data link layer. The medium access sub layer is known as MAC(Medium access](https://reader035.vdocuments.site/reader035/viewer/2022070411/56649f2f5503460f94c48859/html5/thumbnails/35.jpg)
35
Reservation Method
![Page 36: Multiple Access. INTRODUCTION The medium access sub layer is the bottom part of data link layer. The medium access sub layer is known as MAC(Medium access](https://reader035.vdocuments.site/reader035/viewer/2022070411/56649f2f5503460f94c48859/html5/thumbnails/36.jpg)
36
Polling Method
![Page 37: Multiple Access. INTRODUCTION The medium access sub layer is the bottom part of data link layer. The medium access sub layer is known as MAC(Medium access](https://reader035.vdocuments.site/reader035/viewer/2022070411/56649f2f5503460f94c48859/html5/thumbnails/37.jpg)
37
Token Passing
![Page 38: Multiple Access. INTRODUCTION The medium access sub layer is the bottom part of data link layer. The medium access sub layer is known as MAC(Medium access](https://reader035.vdocuments.site/reader035/viewer/2022070411/56649f2f5503460f94c48859/html5/thumbnails/38.jpg)
Channelization
![Page 39: Multiple Access. INTRODUCTION The medium access sub layer is the bottom part of data link layer. The medium access sub layer is known as MAC(Medium access](https://reader035.vdocuments.site/reader035/viewer/2022070411/56649f2f5503460f94c48859/html5/thumbnails/39.jpg)
39
Channelization Similar to multiplexing Three schemes
Frequency-Division Multiple Access (FDMA)
Time-Division Multiple Access (TDMA) Code-Division Multiple Access (CDMA)
![Page 40: Multiple Access. INTRODUCTION The medium access sub layer is the bottom part of data link layer. The medium access sub layer is known as MAC(Medium access](https://reader035.vdocuments.site/reader035/viewer/2022070411/56649f2f5503460f94c48859/html5/thumbnails/40.jpg)
40
FDMA
![Page 41: Multiple Access. INTRODUCTION The medium access sub layer is the bottom part of data link layer. The medium access sub layer is known as MAC(Medium access](https://reader035.vdocuments.site/reader035/viewer/2022070411/56649f2f5503460f94c48859/html5/thumbnails/41.jpg)
41
TDMA
![Page 42: Multiple Access. INTRODUCTION The medium access sub layer is the bottom part of data link layer. The medium access sub layer is known as MAC(Medium access](https://reader035.vdocuments.site/reader035/viewer/2022070411/56649f2f5503460f94c48859/html5/thumbnails/42.jpg)
42
CDMA One channel carries all transmissions
at the same time Each channel is separated by code
![Page 43: Multiple Access. INTRODUCTION The medium access sub layer is the bottom part of data link layer. The medium access sub layer is known as MAC(Medium access](https://reader035.vdocuments.site/reader035/viewer/2022070411/56649f2f5503460f94c48859/html5/thumbnails/43.jpg)
43
CDMA: Chip Sequences Each station is assigned a unique chip
sequence
Chip sequences are orthogonal vectors Inner product of any pair must be zero
With N stations, sequences must have the following properties: They are of length N Their self inner product is always N
![Page 44: Multiple Access. INTRODUCTION The medium access sub layer is the bottom part of data link layer. The medium access sub layer is known as MAC(Medium access](https://reader035.vdocuments.site/reader035/viewer/2022070411/56649f2f5503460f94c48859/html5/thumbnails/44.jpg)
44
CDMA: Bit Representation
![Page 45: Multiple Access. INTRODUCTION The medium access sub layer is the bottom part of data link layer. The medium access sub layer is known as MAC(Medium access](https://reader035.vdocuments.site/reader035/viewer/2022070411/56649f2f5503460f94c48859/html5/thumbnails/45.jpg)
45
Transmission in CDMA
![Page 46: Multiple Access. INTRODUCTION The medium access sub layer is the bottom part of data link layer. The medium access sub layer is known as MAC(Medium access](https://reader035.vdocuments.site/reader035/viewer/2022070411/56649f2f5503460f94c48859/html5/thumbnails/46.jpg)
46
CDMA Encoding
![Page 47: Multiple Access. INTRODUCTION The medium access sub layer is the bottom part of data link layer. The medium access sub layer is known as MAC(Medium access](https://reader035.vdocuments.site/reader035/viewer/2022070411/56649f2f5503460f94c48859/html5/thumbnails/47.jpg)
47
Signal Created by CDMA
![Page 48: Multiple Access. INTRODUCTION The medium access sub layer is the bottom part of data link layer. The medium access sub layer is known as MAC(Medium access](https://reader035.vdocuments.site/reader035/viewer/2022070411/56649f2f5503460f94c48859/html5/thumbnails/48.jpg)
48
CDMA Decoding
![Page 49: Multiple Access. INTRODUCTION The medium access sub layer is the bottom part of data link layer. The medium access sub layer is known as MAC(Medium access](https://reader035.vdocuments.site/reader035/viewer/2022070411/56649f2f5503460f94c48859/html5/thumbnails/49.jpg)
49
Sequence Generation Common method: Walsh Table
Number of sequences is always a power of two
![Page 50: Multiple Access. INTRODUCTION The medium access sub layer is the bottom part of data link layer. The medium access sub layer is known as MAC(Medium access](https://reader035.vdocuments.site/reader035/viewer/2022070411/56649f2f5503460f94c48859/html5/thumbnails/50.jpg)
50
Example: Walsh Table Find chip sequences for eight
stations
![Page 51: Multiple Access. INTRODUCTION The medium access sub layer is the bottom part of data link layer. The medium access sub layer is known as MAC(Medium access](https://reader035.vdocuments.site/reader035/viewer/2022070411/56649f2f5503460f94c48859/html5/thumbnails/51.jpg)
51
Example: Walsh Table There are 80 stations in a CDMA
network. What is the length of the sequences generated by Walsh Table?
![Page 52: Multiple Access. INTRODUCTION The medium access sub layer is the bottom part of data link layer. The medium access sub layer is known as MAC(Medium access](https://reader035.vdocuments.site/reader035/viewer/2022070411/56649f2f5503460f94c48859/html5/thumbnails/52.jpg)
WIRED LAN ETHERNET
52
![Page 53: Multiple Access. INTRODUCTION The medium access sub layer is the bottom part of data link layer. The medium access sub layer is known as MAC(Medium access](https://reader035.vdocuments.site/reader035/viewer/2022070411/56649f2f5503460f94c48859/html5/thumbnails/53.jpg)
IEEE STANDARDS
In 1985, the Computer Society of the IEEE started a project, called Project 802, to set standards to enable intercommunication among equipment from a variety of manufacturers. Project 802 is a way of specifying functions of the physical layer and the data link layer of major LAN protocols.
Data Link LayerPhysical Layer
Topics discussed in this section:
![Page 54: Multiple Access. INTRODUCTION The medium access sub layer is the bottom part of data link layer. The medium access sub layer is known as MAC(Medium access](https://reader035.vdocuments.site/reader035/viewer/2022070411/56649f2f5503460f94c48859/html5/thumbnails/54.jpg)
Figure 13.1 IEEE standard for LANs
![Page 55: Multiple Access. INTRODUCTION The medium access sub layer is the bottom part of data link layer. The medium access sub layer is known as MAC(Medium access](https://reader035.vdocuments.site/reader035/viewer/2022070411/56649f2f5503460f94c48859/html5/thumbnails/55.jpg)
13-2 STANDARD ETHERNET
The original Ethernet was created in 1976 at Xerox’s Palo Alto Research Center (PARC). Since then, it has gone through four generations. We briefly discuss the Standard (or traditional) Ethernet in this section.
MAC SublayerPhysical Layer
Topics discussed in this section:
![Page 56: Multiple Access. INTRODUCTION The medium access sub layer is the bottom part of data link layer. The medium access sub layer is known as MAC(Medium access](https://reader035.vdocuments.site/reader035/viewer/2022070411/56649f2f5503460f94c48859/html5/thumbnails/56.jpg)
Figure 13.3 Ethernet evolution through four generations
![Page 57: Multiple Access. INTRODUCTION The medium access sub layer is the bottom part of data link layer. The medium access sub layer is known as MAC(Medium access](https://reader035.vdocuments.site/reader035/viewer/2022070411/56649f2f5503460f94c48859/html5/thumbnails/57.jpg)
13.57
Figure 13.4 802.3 MAC frame
![Page 58: Multiple Access. INTRODUCTION The medium access sub layer is the bottom part of data link layer. The medium access sub layer is known as MAC(Medium access](https://reader035.vdocuments.site/reader035/viewer/2022070411/56649f2f5503460f94c48859/html5/thumbnails/58.jpg)
13.58
Figure 13.5 Minimum and maximum lengths
![Page 59: Multiple Access. INTRODUCTION The medium access sub layer is the bottom part of data link layer. The medium access sub layer is known as MAC(Medium access](https://reader035.vdocuments.site/reader035/viewer/2022070411/56649f2f5503460f94c48859/html5/thumbnails/59.jpg)
13.59
Frame length:Minimum: 64 bytes (512 bits)
Maximum: 1518 bytes (12,144 bits)
Note
![Page 60: Multiple Access. INTRODUCTION The medium access sub layer is the bottom part of data link layer. The medium access sub layer is known as MAC(Medium access](https://reader035.vdocuments.site/reader035/viewer/2022070411/56649f2f5503460f94c48859/html5/thumbnails/60.jpg)
13.60
Figure 13.6 Example of an Ethernet address in hexadecimal notation
![Page 61: Multiple Access. INTRODUCTION The medium access sub layer is the bottom part of data link layer. The medium access sub layer is known as MAC(Medium access](https://reader035.vdocuments.site/reader035/viewer/2022070411/56649f2f5503460f94c48859/html5/thumbnails/61.jpg)
13.61
Figure 13.7 Unicast and multicast addresses
![Page 62: Multiple Access. INTRODUCTION The medium access sub layer is the bottom part of data link layer. The medium access sub layer is known as MAC(Medium access](https://reader035.vdocuments.site/reader035/viewer/2022070411/56649f2f5503460f94c48859/html5/thumbnails/62.jpg)
13.62
The least significant bit of the first byte defines the type of address.
If the bit is 0, the address is unicast;otherwise, it is multicast.
Note
![Page 63: Multiple Access. INTRODUCTION The medium access sub layer is the bottom part of data link layer. The medium access sub layer is known as MAC(Medium access](https://reader035.vdocuments.site/reader035/viewer/2022070411/56649f2f5503460f94c48859/html5/thumbnails/63.jpg)
13.63
The broadcast destination address is a special case of the multicast address in which all bits are 1s.
Note
![Page 64: Multiple Access. INTRODUCTION The medium access sub layer is the bottom part of data link layer. The medium access sub layer is known as MAC(Medium access](https://reader035.vdocuments.site/reader035/viewer/2022070411/56649f2f5503460f94c48859/html5/thumbnails/64.jpg)
13.64
Define the type of the following destination addresses:a. 4A:30:10:21:10:1A b. 47:20:1B:2E:08:EEc. FF:FF:FF:FF:FF:FF
SolutionTo find the type of the address, we need to look at the second hexadecimal digit from the left. If it is even, the address is unicast. If it is odd, the address is multicast. If all digits are F’s, the address is broadcast. Therefore, we have the following:a. This is a unicast address because A in binary is 1010.b. This is a multicast address because 7 in binary is 0111.c. This is a broadcast address because all digits are F’s.
Example 13.1
![Page 65: Multiple Access. INTRODUCTION The medium access sub layer is the bottom part of data link layer. The medium access sub layer is known as MAC(Medium access](https://reader035.vdocuments.site/reader035/viewer/2022070411/56649f2f5503460f94c48859/html5/thumbnails/65.jpg)
13.65
Figure 13.8 Categories of Standard Ethernet
![Page 66: Multiple Access. INTRODUCTION The medium access sub layer is the bottom part of data link layer. The medium access sub layer is known as MAC(Medium access](https://reader035.vdocuments.site/reader035/viewer/2022070411/56649f2f5503460f94c48859/html5/thumbnails/66.jpg)
13.66
Figure 13.9 Encoding in a Standard Ethernet implementation
![Page 67: Multiple Access. INTRODUCTION The medium access sub layer is the bottom part of data link layer. The medium access sub layer is known as MAC(Medium access](https://reader035.vdocuments.site/reader035/viewer/2022070411/56649f2f5503460f94c48859/html5/thumbnails/67.jpg)
13.67
Figure 13.10 10Base5 implementation
![Page 68: Multiple Access. INTRODUCTION The medium access sub layer is the bottom part of data link layer. The medium access sub layer is known as MAC(Medium access](https://reader035.vdocuments.site/reader035/viewer/2022070411/56649f2f5503460f94c48859/html5/thumbnails/68.jpg)
13.68
Figure 13.11 10Base2 implementation
![Page 69: Multiple Access. INTRODUCTION The medium access sub layer is the bottom part of data link layer. The medium access sub layer is known as MAC(Medium access](https://reader035.vdocuments.site/reader035/viewer/2022070411/56649f2f5503460f94c48859/html5/thumbnails/69.jpg)
13.69
Figure 13.12 10Base-T implementation
![Page 70: Multiple Access. INTRODUCTION The medium access sub layer is the bottom part of data link layer. The medium access sub layer is known as MAC(Medium access](https://reader035.vdocuments.site/reader035/viewer/2022070411/56649f2f5503460f94c48859/html5/thumbnails/70.jpg)
13.70
Figure 13.13 10Base-F implementation
![Page 71: Multiple Access. INTRODUCTION The medium access sub layer is the bottom part of data link layer. The medium access sub layer is known as MAC(Medium access](https://reader035.vdocuments.site/reader035/viewer/2022070411/56649f2f5503460f94c48859/html5/thumbnails/71.jpg)
13.71
Table 13.1 Summary of Standard Ethernet implementations
![Page 72: Multiple Access. INTRODUCTION The medium access sub layer is the bottom part of data link layer. The medium access sub layer is known as MAC(Medium access](https://reader035.vdocuments.site/reader035/viewer/2022070411/56649f2f5503460f94c48859/html5/thumbnails/72.jpg)
13.72
13-3 CHANGES IN THE STANDARD
The 10-Mbps Standard Ethernet has gone through several changes before moving to the higher data rates. These changes actually opened the road to the evolution of the Ethernet to become compatible with other high-data-rate LANs.
Bridged EthernetSwitched EthernetFull-Duplex Ethernet
Topics discussed in this section:
![Page 73: Multiple Access. INTRODUCTION The medium access sub layer is the bottom part of data link layer. The medium access sub layer is known as MAC(Medium access](https://reader035.vdocuments.site/reader035/viewer/2022070411/56649f2f5503460f94c48859/html5/thumbnails/73.jpg)
13.73
Figure 13.14 Sharing bandwidth
![Page 74: Multiple Access. INTRODUCTION The medium access sub layer is the bottom part of data link layer. The medium access sub layer is known as MAC(Medium access](https://reader035.vdocuments.site/reader035/viewer/2022070411/56649f2f5503460f94c48859/html5/thumbnails/74.jpg)
13.74
Figure 13.15 A network with and without a bridge
![Page 75: Multiple Access. INTRODUCTION The medium access sub layer is the bottom part of data link layer. The medium access sub layer is known as MAC(Medium access](https://reader035.vdocuments.site/reader035/viewer/2022070411/56649f2f5503460f94c48859/html5/thumbnails/75.jpg)
13.75
Figure 13.16 Collision domains in an unbridged network and a bridged network
![Page 76: Multiple Access. INTRODUCTION The medium access sub layer is the bottom part of data link layer. The medium access sub layer is known as MAC(Medium access](https://reader035.vdocuments.site/reader035/viewer/2022070411/56649f2f5503460f94c48859/html5/thumbnails/76.jpg)
13.76
Figure 13.17 Switched Ethernet
![Page 77: Multiple Access. INTRODUCTION The medium access sub layer is the bottom part of data link layer. The medium access sub layer is known as MAC(Medium access](https://reader035.vdocuments.site/reader035/viewer/2022070411/56649f2f5503460f94c48859/html5/thumbnails/77.jpg)
13.77
Figure 13.18 Full-duplex switched Ethernet
![Page 78: Multiple Access. INTRODUCTION The medium access sub layer is the bottom part of data link layer. The medium access sub layer is known as MAC(Medium access](https://reader035.vdocuments.site/reader035/viewer/2022070411/56649f2f5503460f94c48859/html5/thumbnails/78.jpg)
13.78
13-4 FAST ETHERNET
Fast Ethernet was designed to compete with LAN protocols such as FDDI or Fiber Channel. IEEE created Fast Ethernet under the name 802.3u. Fast Ethernet is backward-compatible with Standard Ethernet, but it can transmit data 10 times faster at a rate of 100 Mbps.
MAC SublayerPhysical Layer
Topics discussed in this section:
![Page 79: Multiple Access. INTRODUCTION The medium access sub layer is the bottom part of data link layer. The medium access sub layer is known as MAC(Medium access](https://reader035.vdocuments.site/reader035/viewer/2022070411/56649f2f5503460f94c48859/html5/thumbnails/79.jpg)
13.79
Figure 13.19 Fast Ethernet topology
![Page 80: Multiple Access. INTRODUCTION The medium access sub layer is the bottom part of data link layer. The medium access sub layer is known as MAC(Medium access](https://reader035.vdocuments.site/reader035/viewer/2022070411/56649f2f5503460f94c48859/html5/thumbnails/80.jpg)
13.80
Figure 13.20 Fast Ethernet implementations
![Page 81: Multiple Access. INTRODUCTION The medium access sub layer is the bottom part of data link layer. The medium access sub layer is known as MAC(Medium access](https://reader035.vdocuments.site/reader035/viewer/2022070411/56649f2f5503460f94c48859/html5/thumbnails/81.jpg)
13.81
Figure 13.21 Encoding for Fast Ethernet implementation
![Page 82: Multiple Access. INTRODUCTION The medium access sub layer is the bottom part of data link layer. The medium access sub layer is known as MAC(Medium access](https://reader035.vdocuments.site/reader035/viewer/2022070411/56649f2f5503460f94c48859/html5/thumbnails/82.jpg)
13.82
Table 13.2 Summary of Fast Ethernet implementations
![Page 83: Multiple Access. INTRODUCTION The medium access sub layer is the bottom part of data link layer. The medium access sub layer is known as MAC(Medium access](https://reader035.vdocuments.site/reader035/viewer/2022070411/56649f2f5503460f94c48859/html5/thumbnails/83.jpg)
13.83
13-5 GIGABIT ETHERNET
The need for an even higher data rate resulted in the design of the Gigabit Ethernet protocol (1000 Mbps). The IEEE committee calls the standard 802.3z.
MAC SublayerPhysical LayerTen-Gigabit Ethernet
Topics discussed in this section:
![Page 84: Multiple Access. INTRODUCTION The medium access sub layer is the bottom part of data link layer. The medium access sub layer is known as MAC(Medium access](https://reader035.vdocuments.site/reader035/viewer/2022070411/56649f2f5503460f94c48859/html5/thumbnails/84.jpg)
13.84
In the full-duplex mode of Gigabit Ethernet, there is no collision;the maximum length of the cable is determined by the signal
attenuation in the cable.
Note
![Page 85: Multiple Access. INTRODUCTION The medium access sub layer is the bottom part of data link layer. The medium access sub layer is known as MAC(Medium access](https://reader035.vdocuments.site/reader035/viewer/2022070411/56649f2f5503460f94c48859/html5/thumbnails/85.jpg)
13.85
Figure 13.22 Topologies of Gigabit Ethernet
![Page 86: Multiple Access. INTRODUCTION The medium access sub layer is the bottom part of data link layer. The medium access sub layer is known as MAC(Medium access](https://reader035.vdocuments.site/reader035/viewer/2022070411/56649f2f5503460f94c48859/html5/thumbnails/86.jpg)
13.86
Figure 13.23 Gigabit Ethernet implementations
![Page 87: Multiple Access. INTRODUCTION The medium access sub layer is the bottom part of data link layer. The medium access sub layer is known as MAC(Medium access](https://reader035.vdocuments.site/reader035/viewer/2022070411/56649f2f5503460f94c48859/html5/thumbnails/87.jpg)
13.87
Figure 13.24 Encoding in Gigabit Ethernet implementations
![Page 88: Multiple Access. INTRODUCTION The medium access sub layer is the bottom part of data link layer. The medium access sub layer is known as MAC(Medium access](https://reader035.vdocuments.site/reader035/viewer/2022070411/56649f2f5503460f94c48859/html5/thumbnails/88.jpg)
13.88
Table 13.3 Summary of Gigabit Ethernet implementations
![Page 89: Multiple Access. INTRODUCTION The medium access sub layer is the bottom part of data link layer. The medium access sub layer is known as MAC(Medium access](https://reader035.vdocuments.site/reader035/viewer/2022070411/56649f2f5503460f94c48859/html5/thumbnails/89.jpg)
13.89
Table 13.4 Summary of Ten-Gigabit Ethernet implementations
![Page 90: Multiple Access. INTRODUCTION The medium access sub layer is the bottom part of data link layer. The medium access sub layer is known as MAC(Medium access](https://reader035.vdocuments.site/reader035/viewer/2022070411/56649f2f5503460f94c48859/html5/thumbnails/90.jpg)
Figure 11-13
WCB/McGraw-Hill The McGraw-Hill Companies, Inc., 1998
![Page 91: Multiple Access. INTRODUCTION The medium access sub layer is the bottom part of data link layer. The medium access sub layer is known as MAC(Medium access](https://reader035.vdocuments.site/reader035/viewer/2022070411/56649f2f5503460f94c48859/html5/thumbnails/91.jpg)
Figure 11-14
WCB/McGraw-Hill The McGraw-Hill Companies, Inc., 1998
HDLC Configuration
![Page 92: Multiple Access. INTRODUCTION The medium access sub layer is the bottom part of data link layer. The medium access sub layer is known as MAC(Medium access](https://reader035.vdocuments.site/reader035/viewer/2022070411/56649f2f5503460f94c48859/html5/thumbnails/92.jpg)
Figure 11-14-continued
WCB/McGraw-Hill The McGraw-Hill Companies, Inc., 1998
HDLC Configuration
![Page 93: Multiple Access. INTRODUCTION The medium access sub layer is the bottom part of data link layer. The medium access sub layer is known as MAC(Medium access](https://reader035.vdocuments.site/reader035/viewer/2022070411/56649f2f5503460f94c48859/html5/thumbnails/93.jpg)
Figure 11-14-continued
WCB/McGraw-Hill The McGraw-Hill Companies, Inc., 1998
HDLC Configuration
![Page 94: Multiple Access. INTRODUCTION The medium access sub layer is the bottom part of data link layer. The medium access sub layer is known as MAC(Medium access](https://reader035.vdocuments.site/reader035/viewer/2022070411/56649f2f5503460f94c48859/html5/thumbnails/94.jpg)
Figure 11-15
WCB/McGraw-Hill The McGraw-Hill Companies, Inc., 1998
HDLC Modes
![Page 95: Multiple Access. INTRODUCTION The medium access sub layer is the bottom part of data link layer. The medium access sub layer is known as MAC(Medium access](https://reader035.vdocuments.site/reader035/viewer/2022070411/56649f2f5503460f94c48859/html5/thumbnails/95.jpg)
Figure 11-16
WCB/McGraw-Hill The McGraw-Hill Companies, Inc., 1998
HDLC Frame Types
![Page 96: Multiple Access. INTRODUCTION The medium access sub layer is the bottom part of data link layer. The medium access sub layer is known as MAC(Medium access](https://reader035.vdocuments.site/reader035/viewer/2022070411/56649f2f5503460f94c48859/html5/thumbnails/96.jpg)
Figure 11-16-continued
WCB/McGraw-Hill The McGraw-Hill Companies, Inc., 1998
HDLC Frame Types
![Page 97: Multiple Access. INTRODUCTION The medium access sub layer is the bottom part of data link layer. The medium access sub layer is known as MAC(Medium access](https://reader035.vdocuments.site/reader035/viewer/2022070411/56649f2f5503460f94c48859/html5/thumbnails/97.jpg)
Figure 11-16-continued
WCB/McGraw-Hill The McGraw-Hill Companies, Inc., 1998
HDLC Frame Types
![Page 98: Multiple Access. INTRODUCTION The medium access sub layer is the bottom part of data link layer. The medium access sub layer is known as MAC(Medium access](https://reader035.vdocuments.site/reader035/viewer/2022070411/56649f2f5503460f94c48859/html5/thumbnails/98.jpg)
Figure 11-17
WCB/McGraw-Hill The McGraw-Hill Companies, Inc., 1998
HDLC Flag Field
![Page 99: Multiple Access. INTRODUCTION The medium access sub layer is the bottom part of data link layer. The medium access sub layer is known as MAC(Medium access](https://reader035.vdocuments.site/reader035/viewer/2022070411/56649f2f5503460f94c48859/html5/thumbnails/99.jpg)
Figure 11-18
WCB/McGraw-Hill The McGraw-Hill Companies, Inc., 1998
Bit Stuffing
![Page 100: Multiple Access. INTRODUCTION The medium access sub layer is the bottom part of data link layer. The medium access sub layer is known as MAC(Medium access](https://reader035.vdocuments.site/reader035/viewer/2022070411/56649f2f5503460f94c48859/html5/thumbnails/100.jpg)
Figure 11-19
WCB/McGraw-Hill The McGraw-Hill Companies, Inc., 1998
HDLC Address Field
![Page 101: Multiple Access. INTRODUCTION The medium access sub layer is the bottom part of data link layer. The medium access sub layer is known as MAC(Medium access](https://reader035.vdocuments.site/reader035/viewer/2022070411/56649f2f5503460f94c48859/html5/thumbnails/101.jpg)
Figure 11-20
WCB/McGraw-Hill The McGraw-Hill Companies, Inc., 1998
HDLC Control Field
![Page 102: Multiple Access. INTRODUCTION The medium access sub layer is the bottom part of data link layer. The medium access sub layer is known as MAC(Medium access](https://reader035.vdocuments.site/reader035/viewer/2022070411/56649f2f5503460f94c48859/html5/thumbnails/102.jpg)
Figure 11-21
WCB/McGraw-Hill The McGraw-Hill Companies, Inc., 1998
Poll/Final
![Page 103: Multiple Access. INTRODUCTION The medium access sub layer is the bottom part of data link layer. The medium access sub layer is known as MAC(Medium access](https://reader035.vdocuments.site/reader035/viewer/2022070411/56649f2f5503460f94c48859/html5/thumbnails/103.jpg)
Figure 11-22
WCB/McGraw-Hill The McGraw-Hill Companies, Inc., 1998
HDLC Information Field
![Page 104: Multiple Access. INTRODUCTION The medium access sub layer is the bottom part of data link layer. The medium access sub layer is known as MAC(Medium access](https://reader035.vdocuments.site/reader035/viewer/2022070411/56649f2f5503460f94c48859/html5/thumbnails/104.jpg)
Figure 11-23
WCB/McGraw-Hill The McGraw-Hill Companies, Inc., 1998
HDLC FCS Field
![Page 105: Multiple Access. INTRODUCTION The medium access sub layer is the bottom part of data link layer. The medium access sub layer is known as MAC(Medium access](https://reader035.vdocuments.site/reader035/viewer/2022070411/56649f2f5503460f94c48859/html5/thumbnails/105.jpg)
Figure 11-24
WCB/McGraw-Hill The McGraw-Hill Companies, Inc., 1998
![Page 106: Multiple Access. INTRODUCTION The medium access sub layer is the bottom part of data link layer. The medium access sub layer is known as MAC(Medium access](https://reader035.vdocuments.site/reader035/viewer/2022070411/56649f2f5503460f94c48859/html5/thumbnails/106.jpg)
Figure 11-25
WCB/McGraw-Hill The McGraw-Hill Companies, Inc., 1998
Use of P/F Field
![Page 107: Multiple Access. INTRODUCTION The medium access sub layer is the bottom part of data link layer. The medium access sub layer is known as MAC(Medium access](https://reader035.vdocuments.site/reader035/viewer/2022070411/56649f2f5503460f94c48859/html5/thumbnails/107.jpg)
Figure 11-25-continued
WCB/McGraw-Hill The McGraw-Hill Companies, Inc., 1998
Use of P/F Field
![Page 108: Multiple Access. INTRODUCTION The medium access sub layer is the bottom part of data link layer. The medium access sub layer is known as MAC(Medium access](https://reader035.vdocuments.site/reader035/viewer/2022070411/56649f2f5503460f94c48859/html5/thumbnails/108.jpg)
Figure 11-25-continued
WCB/McGraw-Hill The McGraw-Hill Companies, Inc., 1998
Use of P/F Field
![Page 109: Multiple Access. INTRODUCTION The medium access sub layer is the bottom part of data link layer. The medium access sub layer is known as MAC(Medium access](https://reader035.vdocuments.site/reader035/viewer/2022070411/56649f2f5503460f94c48859/html5/thumbnails/109.jpg)
Figure 11-25-continued
WCB/McGraw-Hill The McGraw-Hill Companies, Inc., 1998
Use of P/F Field
![Page 110: Multiple Access. INTRODUCTION The medium access sub layer is the bottom part of data link layer. The medium access sub layer is known as MAC(Medium access](https://reader035.vdocuments.site/reader035/viewer/2022070411/56649f2f5503460f94c48859/html5/thumbnails/110.jpg)
Figure 11-25-continued
WCB/McGraw-Hill The McGraw-Hill Companies, Inc., 1998
Use of P/F Field
![Page 111: Multiple Access. INTRODUCTION The medium access sub layer is the bottom part of data link layer. The medium access sub layer is known as MAC(Medium access](https://reader035.vdocuments.site/reader035/viewer/2022070411/56649f2f5503460f94c48859/html5/thumbnails/111.jpg)
Figure 11-26
WCB/McGraw-Hill The McGraw-Hill Companies, Inc., 1998
U-Frame Control Field
![Page 112: Multiple Access. INTRODUCTION The medium access sub layer is the bottom part of data link layer. The medium access sub layer is known as MAC(Medium access](https://reader035.vdocuments.site/reader035/viewer/2022070411/56649f2f5503460f94c48859/html5/thumbnails/112.jpg)
Figure 11-26-continued
WCB/McGraw-Hill The McGraw-Hill Companies, Inc., 1998
U-Frame Control Field
![Page 113: Multiple Access. INTRODUCTION The medium access sub layer is the bottom part of data link layer. The medium access sub layer is known as MAC(Medium access](https://reader035.vdocuments.site/reader035/viewer/2022070411/56649f2f5503460f94c48859/html5/thumbnails/113.jpg)
Figure 11-27
WCB/McGraw-Hill The McGraw-Hill Companies, Inc., 1998
Polling Example
![Page 114: Multiple Access. INTRODUCTION The medium access sub layer is the bottom part of data link layer. The medium access sub layer is known as MAC(Medium access](https://reader035.vdocuments.site/reader035/viewer/2022070411/56649f2f5503460f94c48859/html5/thumbnails/114.jpg)
Figure 11-28
WCB/McGraw-Hill The McGraw-Hill Companies, Inc., 1998
Selecting Example
![Page 115: Multiple Access. INTRODUCTION The medium access sub layer is the bottom part of data link layer. The medium access sub layer is known as MAC(Medium access](https://reader035.vdocuments.site/reader035/viewer/2022070411/56649f2f5503460f94c48859/html5/thumbnails/115.jpg)
Figure 11-29
WCB/McGraw-Hill The McGraw-Hill Companies, Inc., 1998
Peer-to-Peer Example
![Page 116: Multiple Access. INTRODUCTION The medium access sub layer is the bottom part of data link layer. The medium access sub layer is known as MAC(Medium access](https://reader035.vdocuments.site/reader035/viewer/2022070411/56649f2f5503460f94c48859/html5/thumbnails/116.jpg)
Figure 11-29-continued
WCB/McGraw-Hill The McGraw-Hill Companies, Inc., 1998
Peer-to-Peer Example
![Page 117: Multiple Access. INTRODUCTION The medium access sub layer is the bottom part of data link layer. The medium access sub layer is known as MAC(Medium access](https://reader035.vdocuments.site/reader035/viewer/2022070411/56649f2f5503460f94c48859/html5/thumbnails/117.jpg)
Point-to-PointAccess:
PPP
![Page 118: Multiple Access. INTRODUCTION The medium access sub layer is the bottom part of data link layer. The medium access sub layer is known as MAC(Medium access](https://reader035.vdocuments.site/reader035/viewer/2022070411/56649f2f5503460f94c48859/html5/thumbnails/118.jpg)
PPP In a network, two devices can be connected by a
dedicated link or a shared link. In the first case, the link can be used by the two devices at any time. We refer to this type of access as point-to-point access. In the second case, the link is shared between pairs of devices that need to use the link. We refer to this type of access as multiple access.
One of the most common protocols for point-to-point access is the Point-to-Point Protocol (PPP).
![Page 119: Multiple Access. INTRODUCTION The medium access sub layer is the bottom part of data link layer. The medium access sub layer is known as MAC(Medium access](https://reader035.vdocuments.site/reader035/viewer/2022070411/56649f2f5503460f94c48859/html5/thumbnails/119.jpg)
PPP services
It defines the format of the frame to be exchanged between devices.
It defines how two devices can negotiate the establishment of the link and the exchanged of data.
It defines how network layer data are encapsulated in the data link frame.
It defines how two devices can authenticate each other.
![Page 120: Multiple Access. INTRODUCTION The medium access sub layer is the bottom part of data link layer. The medium access sub layer is known as MAC(Medium access](https://reader035.vdocuments.site/reader035/viewer/2022070411/56649f2f5503460f94c48859/html5/thumbnails/120.jpg)
PPP FRAME
![Page 121: Multiple Access. INTRODUCTION The medium access sub layer is the bottom part of data link layer. The medium access sub layer is known as MAC(Medium access](https://reader035.vdocuments.site/reader035/viewer/2022070411/56649f2f5503460f94c48859/html5/thumbnails/121.jpg)
PPP FRAME Flag field. The flag fields identify the boundaries
of a PPP frame. Its value is 01111110. Address field. Because PPP is used for a point-to-
point connection, it uses the broadcast address of HDCL, 11111111, to avoid a data link address in the protocol.
Control field. The control field uses the format of the U-frame in HDCL. See pages 285-286.
Protocol field. The protocol field defines what is being carried in the data field: user data or other information.
Data field. This field carries either the user data or other information.
Frame check sequence (FCS) field. This field is used for error detection.
![Page 122: Multiple Access. INTRODUCTION The medium access sub layer is the bottom part of data link layer. The medium access sub layer is known as MAC(Medium access](https://reader035.vdocuments.site/reader035/viewer/2022070411/56649f2f5503460f94c48859/html5/thumbnails/122.jpg)
Transition states
A PPP connection goes through different phases called transition sates.
![Page 123: Multiple Access. INTRODUCTION The medium access sub layer is the bottom part of data link layer. The medium access sub layer is known as MAC(Medium access](https://reader035.vdocuments.site/reader035/viewer/2022070411/56649f2f5503460f94c48859/html5/thumbnails/123.jpg)
Transition States Idle state. The idle state means that the link is
not being used. There is no active carrier, and the line is quiet.
Establishing link. When one of the end point starts the communication, the connection goes into the establishing state. In this state, options are negotiated between the two parties. If the negotiation is successful, the system goes to the authenticating state (if authentication is required) or directly to the networking state.
Authenticating state. The authenticating state is optional. If the result is successful , the connection goes to the networking state; otherwise, it goes to the terminating state.
![Page 124: Multiple Access. INTRODUCTION The medium access sub layer is the bottom part of data link layer. The medium access sub layer is known as MAC(Medium access](https://reader035.vdocuments.site/reader035/viewer/2022070411/56649f2f5503460f94c48859/html5/thumbnails/124.jpg)
Transition States Networking State. When a connection reaches
this state, the exchange of user control and data packets can be started. The connection remains in this state until one of the endpoints wants to terminate the connection.
Terminating state. When the connection is in the terminating state, several packets are exchanged between the two ends for house cleaning and closing the link.
![Page 125: Multiple Access. INTRODUCTION The medium access sub layer is the bottom part of data link layer. The medium access sub layer is known as MAC(Medium access](https://reader035.vdocuments.site/reader035/viewer/2022070411/56649f2f5503460f94c48859/html5/thumbnails/125.jpg)
PPP Stack
PPP is a data-link layer protocol, PPP uses a stack of other protocols to establish the link, to authenticate the parties involved, and to carry the network layer data.
Three sets of protocols are used by PPP: Link control protocol, authentication protocols, and network control protocol.
![Page 126: Multiple Access. INTRODUCTION The medium access sub layer is the bottom part of data link layer. The medium access sub layer is known as MAC(Medium access](https://reader035.vdocuments.site/reader035/viewer/2022070411/56649f2f5503460f94c48859/html5/thumbnails/126.jpg)
Protocol stack
![Page 127: Multiple Access. INTRODUCTION The medium access sub layer is the bottom part of data link layer. The medium access sub layer is known as MAC(Medium access](https://reader035.vdocuments.site/reader035/viewer/2022070411/56649f2f5503460f94c48859/html5/thumbnails/127.jpg)
Link Control Protocol (LCP)
It is responsible for establishing, maintaining, configuring, and terminating links.
It also provides negotiation mechanisms to set options between endpoints. Both endpoints of the link must reach an agreement about the options before the link can be established.
When PPP is carrying an LCP packet, it is either in the establishing state or in the terminating state.
All LCP packets are carried in the data field of the PPP frame. What defines the frame as one carrying an LCP packet is the value of the protocol field, which is set to C021 (base 16).
![Page 128: Multiple Access. INTRODUCTION The medium access sub layer is the bottom part of data link layer. The medium access sub layer is known as MAC(Medium access](https://reader035.vdocuments.site/reader035/viewer/2022070411/56649f2f5503460f94c48859/html5/thumbnails/128.jpg)
LCP packet encapsulated in a frame
![Page 129: Multiple Access. INTRODUCTION The medium access sub layer is the bottom part of data link layer. The medium access sub layer is known as MAC(Medium access](https://reader035.vdocuments.site/reader035/viewer/2022070411/56649f2f5503460f94c48859/html5/thumbnails/129.jpg)
Link Control Protocol (LCP)
Code. This field defines the type of LCP packet. ID. This field holds a value used to match a
request with reply. One endpoint inserts a value in this field, which will be copied in the reply packet.
Length. This field defines the length of the entire LCP packet.
Information. This field contains extra information needed for some LCP packets.
![Page 130: Multiple Access. INTRODUCTION The medium access sub layer is the bottom part of data link layer. The medium access sub layer is known as MAC(Medium access](https://reader035.vdocuments.site/reader035/viewer/2022070411/56649f2f5503460f94c48859/html5/thumbnails/130.jpg)
Link Control Protocol (LCP)
Configuration packets are used to negotiate the options between the two ends. There are four different types of packets for this purpose: configure-request, configure-ack, configure-nak, and configure-reject.
Link termination packets. The link termination packets are used to disconnect the link between two endpoints.
There are two types: terminate-request and terminate-ack.
Link monitoring and debugging packets. These packets are used for monitoring and debugging the link. There are five types: code-reject, protocol-reject, echo-reply, discard-request.
![Page 131: Multiple Access. INTRODUCTION The medium access sub layer is the bottom part of data link layer. The medium access sub layer is known as MAC(Medium access](https://reader035.vdocuments.site/reader035/viewer/2022070411/56649f2f5503460f94c48859/html5/thumbnails/131.jpg)
LCP packets and their codes
Code Packet Type Description
0116 Configure-request Contains the list of proposed options and their values
0216 Configure-ack Accepts all options proposed
0316 Configure-nak Announces that some options are not acceptable
0416 Configure-reject Announces that some options are not recognized
0516 Terminate-request Requests to shut down the line
0616 Terminate-ack Accepts the shut down request
0716 Code-reject Announces an unknown code
0816 Protocol-reject Announces an unknown protocol
0916 Echo-request A type of hello message to check if the other end is alive
0A16 Echo-reply The response to the echo-request message
0B16 Discard-request A request to discard the packet
![Page 132: Multiple Access. INTRODUCTION The medium access sub layer is the bottom part of data link layer. The medium access sub layer is known as MAC(Medium access](https://reader035.vdocuments.site/reader035/viewer/2022070411/56649f2f5503460f94c48859/html5/thumbnails/132.jpg)
Authentication Protocols
Authentication plays a very important role in PPP because PPP is designed for use over dial-up links where verification of user identity is necessary.
Authentication means validating the identity of a user who needs to access a set of resources.
PPP uses two protocols for authentication: Password Authentication Protocol (PAP) and Challenge Handshake Authentication Protocol (CHAP)
![Page 133: Multiple Access. INTRODUCTION The medium access sub layer is the bottom part of data link layer. The medium access sub layer is known as MAC(Medium access](https://reader035.vdocuments.site/reader035/viewer/2022070411/56649f2f5503460f94c48859/html5/thumbnails/133.jpg)
PAP The PAP is a simple authentication procedure
with two steps:1. The user who wants to access a system sends
an ID (identification) and a password.2. The system checks the validity of the
identification and password and either accepts or denies a connection.
For those systems that require greater security, PAP is not enough. A third party with access to the link can easily pick up the password and access the system resources.
![Page 134: Multiple Access. INTRODUCTION The medium access sub layer is the bottom part of data link layer. The medium access sub layer is known as MAC(Medium access](https://reader035.vdocuments.site/reader035/viewer/2022070411/56649f2f5503460f94c48859/html5/thumbnails/134.jpg)
PAP
![Page 135: Multiple Access. INTRODUCTION The medium access sub layer is the bottom part of data link layer. The medium access sub layer is known as MAC(Medium access](https://reader035.vdocuments.site/reader035/viewer/2022070411/56649f2f5503460f94c48859/html5/thumbnails/135.jpg)
PAP packets
![Page 136: Multiple Access. INTRODUCTION The medium access sub layer is the bottom part of data link layer. The medium access sub layer is known as MAC(Medium access](https://reader035.vdocuments.site/reader035/viewer/2022070411/56649f2f5503460f94c48859/html5/thumbnails/136.jpg)
CHAP The CHAP protocol is a three-way handshaking
authentication protocol that provides greater security than PAP.
In this method, the password is kept secret; it is never sent on-line.
Steps The system sends to the user a challenge packet
containing a challenge value, usually a few bytes. The user applies a predefined function that takes
the challenge value and the user’s own password and creates a result. The user sends the result in the response packet to the system.
![Page 137: Multiple Access. INTRODUCTION The medium access sub layer is the bottom part of data link layer. The medium access sub layer is known as MAC(Medium access](https://reader035.vdocuments.site/reader035/viewer/2022070411/56649f2f5503460f94c48859/html5/thumbnails/137.jpg)
CHAP
The system does the same. It applies the same function to the password of the user and the challenge value to create a result. If the result created is the same as the result sent in the response packet, access is granted; otherwise, it is denied.
![Page 138: Multiple Access. INTRODUCTION The medium access sub layer is the bottom part of data link layer. The medium access sub layer is known as MAC(Medium access](https://reader035.vdocuments.site/reader035/viewer/2022070411/56649f2f5503460f94c48859/html5/thumbnails/138.jpg)
CHAP
![Page 139: Multiple Access. INTRODUCTION The medium access sub layer is the bottom part of data link layer. The medium access sub layer is known as MAC(Medium access](https://reader035.vdocuments.site/reader035/viewer/2022070411/56649f2f5503460f94c48859/html5/thumbnails/139.jpg)
CHAP packets
![Page 140: Multiple Access. INTRODUCTION The medium access sub layer is the bottom part of data link layer. The medium access sub layer is known as MAC(Medium access](https://reader035.vdocuments.site/reader035/viewer/2022070411/56649f2f5503460f94c48859/html5/thumbnails/140.jpg)
Network Control Protocol (NCP)
After the link is established and authentication (if any) is successful, the connection goes on the networking state.
NCP is a set of control protocols to allow the encapsulation of data coming from network layer protocols into the PPP frame.
The set of packets that establish and terminate a network layer connection is called Internetwork Protocol Control Protocol (IPCP).
![Page 141: Multiple Access. INTRODUCTION The medium access sub layer is the bottom part of data link layer. The medium access sub layer is known as MAC(Medium access](https://reader035.vdocuments.site/reader035/viewer/2022070411/56649f2f5503460f94c48859/html5/thumbnails/141.jpg)
IPCP packet encapsulated in PPP frame
![Page 142: Multiple Access. INTRODUCTION The medium access sub layer is the bottom part of data link layer. The medium access sub layer is known as MAC(Medium access](https://reader035.vdocuments.site/reader035/viewer/2022070411/56649f2f5503460f94c48859/html5/thumbnails/142.jpg)
Table 12.3 Code value for IPCP packets
Code IPCP Packet
01 Configure-request
02 Configure-ack
03 Configure-nak
04 Configure-reject
05 Terminate-request
06 Terminate-ack
07 Code-reject
![Page 143: Multiple Access. INTRODUCTION The medium access sub layer is the bottom part of data link layer. The medium access sub layer is known as MAC(Medium access](https://reader035.vdocuments.site/reader035/viewer/2022070411/56649f2f5503460f94c48859/html5/thumbnails/143.jpg)
An example