113
The Medium Access The Medium Access Control Control Sublayer Sublayer Chapter 4 Chapter 4

The Medium Access Control Sublayer

Embed Size (px)

DESCRIPTION

The Medium Access Control Sublayer. Chapter 4. Data Link Layer – Accessing the Media. Menyatakan bahwa DDL berkaitan dengan NL dan PL serta menjalankan baik software and hardware. Data Link Sub layers. LLC MAC. Media Access Control Techniques. - PowerPoint PPT Presentation

Citation preview

Page 1: The Medium Access Control Sublayer

The Medium Access ControlThe Medium Access ControlSublayerSublayer

Chapter 4Chapter 4

Page 2: The Medium Access Control Sublayer

Menyatakan bahwa DDL berkaitan dengan NL dan PL Menyatakan bahwa DDL berkaitan dengan NL dan PL serta menjalankan baik software and hardware.serta menjalankan baik software and hardware.

22

Data Link Layer – Accessing the MediaData Link Layer – Accessing the Media

Page 3: The Medium Access Control Sublayer

33

Data Link Sub layersData Link Sub layers

LLC

MAC

Page 4: The Medium Access Control Sublayer

Menjelaskan pentingnya controlling access ke mediaMenjelaskan pentingnya controlling access ke media

44

Media Access Control TechniquesMedia Access Control Techniques

Tanpa pengontrolan

Bergantian Semakin

tinggi tingkat pengontrolan-nya semakin besar overhead nya.

Page 5: The Medium Access Control Sublayer

Media access control :Media access control :– Mengatur peletakkan frame data ke media. Mengatur peletakkan frame data ke media. – Ada beberapa metode untuk mengendalikan Ada beberapa metode untuk mengendalikan

akses ke media.akses ke media.– Teknik pengendalian akses media didefinisikan Teknik pengendalian akses media didefinisikan

bila dan bagaimana nodes men-share media.bila dan bagaimana nodes men-share media.

55

Teknik Media Access ControlTeknik Media Access Control

Page 6: The Medium Access Control Sublayer

Metoda dari media access control Metoda dari media access control dilakukan tergantung pada:dilakukan tergantung pada:– Berbagi Media – bila dan bagaimana Berbagi Media – bila dan bagaimana

node berbagi ke media. node berbagi ke media.

– Topologi - Bagaimana hubungan antar Topologi - Bagaimana hubungan antar node yang nampak pada data link layernode yang nampak pada data link layer

66

Teknik Media Access ControlTeknik Media Access Control

Page 7: The Medium Access Control Sublayer

Menyatakan dua metode media access control Menyatakan dua metode media access control untuk berbagi media dan dasar karakteristik dari untuk berbagi media dan dasar karakteristik dari masing2. masing2.

77

Teknik Media Access Control - berbagi mediaTeknik Media Access Control - berbagi media

Page 8: The Medium Access Control Sublayer

Dua metoda yang sering dipakai adalah :Dua metoda yang sering dipakai adalah :– CSMA/Collision Detection CSMA/Collision Detection

Pada CSMA/Collision Detection (CSMA/CD), Pada CSMA/Collision Detection (CSMA/CD), node akan memonitor media apakah ada node akan memonitor media apakah ada sinyal data, sinyal data,

Bila tidak ada, berarti media free (kosong) Bila tidak ada, berarti media free (kosong) sehingga node akan mengirim data .sehingga node akan mengirim data .

88

Teknik Access Control – berbagi mediaTeknik Access Control – berbagi media

Page 9: The Medium Access Control Sublayer

Bila suatu sinyal terdeteksi dan Bila suatu sinyal terdeteksi dan menandakan bahwa ada node lain menandakan bahwa ada node lain yang sedang mengirim data pada yang sedang mengirim data pada saat yang bersamaan, semua saat yang bersamaan, semua perangkat akan berhenti mengirim perangkat akan berhenti mengirim dan akan mengulang beberapa saat dan akan mengulang beberapa saat kemudian. Metode ini yang akhirnya kemudian. Metode ini yang akhirnya dipakai oleh Ethernet. dipakai oleh Ethernet.

99

Teknik Access Control – berbagi mediaTeknik Access Control – berbagi media

Page 10: The Medium Access Control Sublayer

CSMA/Collision Avoidance CSMA/Collision Avoidance – Pada CSMA/Collision Avoidance (CSMA/CA), Pada CSMA/Collision Avoidance (CSMA/CA),

node akan memeriksa apakah media kosong node akan memeriksa apakah media kosong atau tidak. atau tidak.

– Bila media kosong (free) maka node akan Bila media kosong (free) maka node akan mengirim notifikasi pada media untuk keperluan mengirim notifikasi pada media untuk keperluan akan menggunakannya.akan menggunakannya.

– Kemudian node akan mengirimkan datanya. Kemudian node akan mengirimkan datanya. Metode ini dipakai oleh 802.11 wireless Metode ini dipakai oleh 802.11 wireless networking technologiesnetworking technologies

1010

Teknik Access Control – berbagi mediaTeknik Access Control – berbagi media

Page 11: The Medium Access Control Sublayer

Media access control protocols untuk Media access control protocols untuk non-shared media non-shared media

Membutuhkan sedikit atau tanpa Membutuhkan sedikit atau tanpa kontrol sebelum menempatkan frame kontrol sebelum menempatkan frame pada media.. pada media..

Protocol ini mempunyai aturan dan Protocol ini mempunyai aturan dan prosedur yang sederhana untuk media prosedur yang sederhana untuk media access control. access control.

Topologi point-to-point .Topologi point-to-point .1111

Teknik Media Access Control – tidak Teknik Media Access Control – tidak berbagi mediaberbagi media

Page 12: The Medium Access Control Sublayer

Menggambarkan tujuan dari topologi logical dan Menggambarkan tujuan dari topologi logical dan identifikasi beberapa topologi logical yang umum. identifikasi beberapa topologi logical yang umum.

Teknik Media Access ControlTeknik Media Access Control

Page 13: The Medium Access Control Sublayer

Indetifikasi karakteristik dari topologi multi-Indetifikasi karakteristik dari topologi multi-access dan mendiskripsikan implikasi media access dan mendiskripsikan implikasi media akses bila menggunakan topologi ini. akses bila menggunakan topologi ini.

Teknik Media Access ControlTeknik Media Access Control

Page 14: The Medium Access Control Sublayer

Identifikasi karakteristik dari topologi ring dan Identifikasi karakteristik dari topologi ring dan mendiskripsikan implikasi media akses bila mendiskripsikan implikasi media akses bila menggunakan topologi ini. menggunakan topologi ini.

Teknik Media Access Control Teknik Media Access Control

Page 15: The Medium Access Control Sublayer

Permasalahan Alokasi Kanal. Permasalahan Alokasi Kanal.

• Static Channel Allocation in Static Channel Allocation in LANs and MANsLANs and MANs

• Dynamic Channel Allocation in Dynamic Channel Allocation in LANs and MANsLANs and MANs

Page 16: The Medium Access Control Sublayer

Dynamic Channel Allocation in LANs and MANsDynamic Channel Allocation in LANs and MANs

Station Model.Station Model. Single Channel Assumption.Single Channel Assumption. Collision Assumption.Collision Assumption. (a)(a) Continuous Time. Continuous Time.

(b)(b) Slotted Time. Slotted Time. (a)(a) Carrier Sense. Carrier Sense.

(b)(b) No Carrier Sense. No Carrier Sense.

Page 17: The Medium Access Control Sublayer

Diasumsikan dan disepakati bersama Diasumsikan dan disepakati bersama bahwa :bahwa :

Slotted timeSlotted time Time divided asTime divided as interval-interval dis interval-interval disccrreettee

time time (slot)(slot) transmisitransmisionon frame frame always start at the always start at the

beginning of the slot.beginning of the slot.

Carrier SenseCarrier Sense Station always sense the line before Station always sense the line before use use

it.it.

Page 18: The Medium Access Control Sublayer

No Carrier SenseNo Carrier Sense station not always sense the line before station not always sense the line before

use it.use it. After a few of time, the station know the After a few of time, the station know the

transmission fail or not.transmission fail or not.

Page 19: The Medium Access Control Sublayer

Multiple Access ProtocolsMultiple Access Protocols

• ALOHAALOHA

• Carrier Sense Multiple Access Carrier Sense Multiple Access ProtocolsProtocols

• Collision-Free ProtocolsCollision-Free Protocols

• Limited-Contention ProtocolsLimited-Contention Protocols

• Wavelength Division Multiple Wavelength Division Multiple Access ProtocolsAccess Protocols

• Wireless LAN ProtocolsWireless LAN Protocols

Page 20: The Medium Access Control Sublayer

The first Protocol :The first Protocol :

ALOHAALOHA ProtocolProtocol– Pure AlohaPure Aloha

- SSlotted)lotted) Aloha Aloha

Univesity of Hawaii Univesity of Hawaii year :year : 1970 1970 Norman AbramsonNorman Abramson RRadioadio Packet Network Packet Network

Page 21: The Medium Access Control Sublayer

Pure Pure ALOHAALOHA

Basic Idea :Basic Idea :

o User possible to transmit anytime if User possible to transmit anytime if they have the datathey have the data

o Sender will knows the frame was Sender will knows the frame was send damage or not after 270 mssend damage or not after 270 ms

o No Sense systemNo Sense system

o UsingUsing contention contention system system

Page 22: The Medium Access Control Sublayer

Pure ALOHAPure ALOHAIn pure ALOHA, frames are transmitted at In pure ALOHA, frames are transmitted at

completely arbitrary times.completely arbitrary times.

Page 23: The Medium Access Control Sublayer

Pure ALOHA (2)Pure ALOHA (2)Vulnerable period for the shaded frame.Vulnerable period for the shaded frame.

Page 24: The Medium Access Control Sublayer

Pure ALOHA (3)Pure ALOHA (3)Throughput versus offered traffic for ALOHA Throughput versus offered traffic for ALOHA

systems.systems.

Page 25: The Medium Access Control Sublayer

Presistent CSMA :Presistent CSMA : If station has data If station has data sense the line sense the line The line busy The line busy station wait for a several time station wait for a several time The line empty The line empty send the frame send the frame

If Collision occurred If Collision occurred station wait for a few time station wait for a few time then try to re-send then try to re-send

CallCall 1 presistent1 presistent because the because the probability of probability of transmit = 1, transmit = 1, if the line is empty.if the line is empty.

PresistentPresistent : : ALWAYS detect the line until really ALWAYS detect the line until really emptyempty

Persistent and Nonpersistent CSMAPersistent and Nonpersistent CSMA

Page 26: The Medium Access Control Sublayer

Persistent and Nonpersistent CSMAPersistent and Nonpersistent CSMAComparison of the channel utilization versus Comparison of the channel utilization versus

load for various random access protocols.load for various random access protocols.

Page 27: The Medium Access Control Sublayer

The possibility collision occure:The possibility collision occure:

Station detect the line Station detect the line ‘ ‘ emptyempty ‘ ‘ but maybe the but maybe the packet just sent from another station not yet arrive. packet just sent from another station not yet arrive. This because of the delay propagation.This because of the delay propagation.

2 stations at the same time wait the line which has 2 stations at the same time wait the line which has been used by the another station. If the been used by the another station. If the transmission just finish then the both stations transmission just finish then the both stations together send the packet and access the line. together send the packet and access the line. CCOLLISION!!OLLISION!!

Page 28: The Medium Access Control Sublayer

Packet Time delayPacket Time delay : :

The Duration time between packet sent by The Duration time between packet sent by the sender until ALL packets receive by the the sender until ALL packets receive by the receiver.receiver. very importantvery important

Page 29: The Medium Access Control Sublayer

CSMA/CDCSMA/CD

CD : Collision DetectionCD : Collision Detection After know there was a collision After know there was a collision cancel the cancel the

transmission, without waiting the sending transmission, without waiting the sending frame finishframe finish

Reduce the time andReduce the time and bandwidth bandwidth MODUL MODUL used in used in CSMA / CD CSMA / CD hashas 3 period 3 periodss : :

– transmittransmit

– contentioncontention

– idleidle

Page 30: The Medium Access Control Sublayer

CSMA with Collision DetectionCSMA with Collision Detection

CSMA/CD can be in one of three states: CSMA/CD can be in one of three states: contention, transmission, or idle.contention, transmission, or idle.

Page 31: The Medium Access Control Sublayer

At CSMA/CD probably will collide in the At CSMA/CD probably will collide in the interval “ Contention”interval “ Contention”

If If ( length of line) large and frame is ( length of line) large and frame is short – the critical time (contention) more short – the critical time (contention) more longer longer handle by handle by Bit mapBit map Protocol Protocol

Collision-Free ProtocolsCollision-Free Protocols

Page 32: The Medium Access Control Sublayer

At the At the Collision Free ProtocolCollision Free Protocol : :

Access to the channel by the Station, same as Access to the channel by the Station, same as a sequence of the bit mapa sequence of the bit map

Every stasion has the unique allocation time Every stasion has the unique allocation time for access the line and cannot use by for access the line and cannot use by another stasion. another stasion.

If the stasion not ready when their turn If the stasion not ready when their turn comes up, they must wait their turn in the comes up, they must wait their turn in the next period.next period.

Page 33: The Medium Access Control Sublayer

Collision-Free ProtocolsCollision-Free Protocols

The basic bit-map protocol.The basic bit-map protocol.

Example : There are, 8 stations, 8 contention slot Interval divided into 2 :

contention dan frame

Page 34: The Medium Access Control Sublayer

Binary Count DownBinary Count Down

The overhead of the protocol = 1 bit per station. The overhead of the protocol = 1 bit per station. That will develop by using the same length of That will develop by using the same length of address and broadcasting to the network. Every address and broadcasting to the network. Every position of bit from the different station must OR position of bit from the different station must OR and called Binary Count Down. How to Compare is and called Binary Count Down. How to Compare is as:as:

ExampleExample : 0010,0100,1001,1010 : 0010,0100,1001,1010

Page 35: The Medium Access Control Sublayer

Collision-Free Protocols (2)Collision-Free Protocols (2)The binary countdown protocol. A dash The binary countdown protocol. A dash

indicates silence.indicates silence.

Page 36: The Medium Access Control Sublayer

Wireless LAN ProtocolsWireless LAN Protocols

A wireless LAN. A wireless LAN.

(a)(a) A transmitting. A transmitting. (b)(b) B transmitting. B transmitting.

Page 37: The Medium Access Control Sublayer

Wireless LAN Protocols (2)Wireless LAN Protocols (2)

The MACA protocol. The MACA protocol.

(a)(a) A sending an RTS to B. A sending an RTS to B.

(b)(b) B responding with a CTS to A. B responding with a CTS to A.

Page 38: The Medium Access Control Sublayer

EthernetEthernet• Ethernet CablingEthernet Cabling• Manchester EncodingManchester Encoding• The Ethernet MAC Sublayer ProtocolThe Ethernet MAC Sublayer Protocol• The Binary Exponential Backoff AlgorithmThe Binary Exponential Backoff Algorithm• Ethernet PerformanceEthernet Performance• Switched EthernetSwitched Ethernet• Fast EthernetFast Ethernet• Gigabit EthernetGigabit Ethernet• IEEE 802.2: Logical Link ControlIEEE 802.2: Logical Link Control• Retrospective on EthernetRetrospective on Ethernet

Page 39: The Medium Access Control Sublayer

Ethernet CablingEthernet Cabling

The most common kinds of Ethernet cabling. The most common kinds of Ethernet cabling.

Page 40: The Medium Access Control Sublayer

o 10Base5 10Base5 disebut juga Thick Ethernet, disebut juga Thick Ethernet, dihubungkan dengan Vampire tap.dihubungkan dengan Vampire tap.

Pd 10Base5 dihubungkan ke transceiver Pd 10Base5 dihubungkan ke transceiver yang mempunyai el-circuit sbg pendeteksi yang mempunyai el-circuit sbg pendeteksi collisioncollision

Controller bertanggung jawab thd Controller bertanggung jawab thd essembling data kedalam format yang essembling data kedalam format yang sesuai.sesuai.

o 10Base2 10Base2 disebut juga Thin Ethernet disebut juga Thin Ethernet dihubungkan dengan BNC yang mem- dihubungkan dengan BNC yang mem-

bentuk T junction bentuk T junction BNC T junction BNC T junction connector.connector.

Page 41: The Medium Access Control Sublayer

o 10BaseT 10BaseT menggunakan Twist pair cable menggunakan Twist pair cable dilengkapi dengan HUBdilengkapi dengan HUB

Pd 10BaseT – tidak ada share cable, masing2 Pd 10BaseT – tidak ada share cable, masing2 stasiun dihubungkan ke HUB dengan stasiun dihubungkan ke HUB dengan dedicated cable.dedicated cable.

o 10BaseF 10BaseF menggunakan Fiber Optik menggunakan Fiber Optik - mahal, - mahal, - mempunyai security/ noise imunnity yang- mempunyai security/ noise imunnity yang bagusbagus - lebih susah pemasangannya dp yang - lebih susah pemasangannya dp yang lainnyalainnya - digunakan terutama untuk antar bangunan- digunakan terutama untuk antar bangunan

Page 42: The Medium Access Control Sublayer

Ethernet Cabling (2)Ethernet Cabling (2)Three kinds of Ethernet cabling. Three kinds of Ethernet cabling.

(a)(a) 10Base5, 10Base5, (b)(b) 10Base2, 10Base2, (c)(c) 10Base-T. 10Base-T.

Page 43: The Medium Access Control Sublayer

Untuk mendeteksi kabel putus, bad-tap dll Untuk mendeteksi kabel putus, bad-tap dll digunakan teknik dengan menggunakan digunakan teknik dengan menggunakan echo echo disebut disebut time domain reflectometrytime domain reflectometry..

Page 44: The Medium Access Control Sublayer

Ethernet Cabling (3) – Cable Ethernet Cabling (3) – Cable TopologiesTopologies

a)a) Linear (Room-room) Linear (Room-room) b)b) Spine (basement-roof) Spine (basement-roof)c)c) Tree (general topology) Tree (general topology) d) d) Segmented (per Segmented (per segment)segment)

Page 45: The Medium Access Control Sublayer

Ethernet Cabling (4)Ethernet Cabling (4)

(a)(a) Binary encoding, Binary encoding, (b)(b) Manchester encoding Manchester encoding,,

(c)(c) Differential Manchester encoding. Differential Manchester encoding.Ethernet tidak menggunakan Diff M.EEthernet tidak menggunakan Diff M.E

Page 46: The Medium Access Control Sublayer

Ethernet MAC Sublayer Ethernet MAC Sublayer ProtocolProtocol

Frame formats. Frame formats. (a)(a) DIX Ethernet, DIX Ethernet, (b)(b) IEEE 802.3. IEEE 802.3.

DIX = DEC, Intel, XeroxDIX = DEC, Intel, Xerox

Page 47: The Medium Access Control Sublayer

Coax Cable segment

( 500 m max )

Transceiver cable 50 m max

Coax cable

Transceiver and

connection to coax cable - 100 m max

per segment

stasiun

Batasan-batasan single Ethernet cable segment

Page 48: The Medium Access Control Sublayer

Konfigurasi Ethernet - Yang Konfigurasi Ethernet - Yang “besar”“besar”

Seg 1 Seg 2

Seg 4 Seg 5

stasiun

repeater

Seg 3Kabel koox

Remote repeater

Point to point link

Page 49: The Medium Access Control Sublayer

Periode waktu dari mulainya transmisi, Periode waktu dari mulainya transmisi, selama stasiun selama stasiun pada pada “vulnareble to collision”.“vulnareble to collision”.

Contoh dalam kondisi terjelek sebagai Contoh dalam kondisi terjelek sebagai berikut :berikut :

Bila waktu propagasi sinyal dari ujung ke Bila waktu propagasi sinyal dari ujung ke ujung jaringan adalah : 22,5 ujung jaringan adalah : 22,5 sec yaitu = 225 sec yaitu = 225 bit times pada 10 Mbpsbit times pada 10 Mbps

Collision WindowCollision Window - minimum packet size - minimum packet size

Page 50: The Medium Access Control Sublayer

Sesaat sebelum paket A sampai, B mengirim Sesaat sebelum paket A sampai, B mengirim paket paket tabrakan tabrakan

A mendengar ada tabrakan setelah : A mendengar ada tabrakan setelah : (t+22,5)+22,5 (t+22,5)+22,5 secsec

atau : 45 atau : 45 sec = 450 bit time sesudah A mulai sec = 450 bit time sesudah A mulai mengirimmengirimCollision WindowCollision Window : 450 bit time : 450 bit time

A

B

t + st

Pada saat ‘ t’ mulai transmisi t + 22.5 paket dari A

hampir sampai di B

Page 51: The Medium Access Control Sublayer

Minimum paket size : 64 oktetsMinimum paket size : 64 oktets

64 oktet = 64 x 8 x 0,1 = 51,2 64 oktet = 64 x 8 x 0,1 = 51,2 secsec

atau = 512 bit timesatau = 512 bit times

Minimum paket harus > dari collision Minimum paket harus > dari collision window window

Bagaimana kalau < ??Bagaimana kalau < ?? Pada Ethernet : tidak menjamin pesan Pada Ethernet : tidak menjamin pesan

akan sampai ditujuan pada waktu yang akan sampai ditujuan pada waktu yang pasti pasti non deterministiknon deterministik

Page 52: The Medium Access Control Sublayer

Ethernet MAC Sublayer Protocol Ethernet MAC Sublayer Protocol (2)(2)

Collision detection can take as long as 2 .

Page 53: The Medium Access Control Sublayer

Back Off AlgorithmBack Off Algorithm

Untuk meng-akomodasikan jarak terjauh yang Untuk meng-akomodasikan jarak terjauh yang dibolehkan oleh ethernet, slot time harus min 512 dibolehkan oleh ethernet, slot time harus min 512 bit time atau 51,2 bit time atau 51,2 µµsecsec

Setelah tabrakan yang pertama Setelah tabrakan yang pertama harus harus menunggu 0 atau 1 slot time sebelum mengirm menunggu 0 atau 1 slot time sebelum mengirm lagi. Setelah tabrakan yang kedua lagi. Setelah tabrakan yang kedua harus harus menunggu 0,1,2,3 random….dstmenunggu 0,1,2,3 random….dst

Setelah tabrakan n kali harus Setelah tabrakan n kali harus menunggu 0 menunggu 0 sampai 2sampai 2nn-1 random.-1 random.

Algoritma ini disebut : Algoritma ini disebut : Binary Exponential BackoffBinary Exponential Backoff

Page 54: The Medium Access Control Sublayer

Binary Exponential Back Off Binary Exponential Back Off AlgorithmAlgorithm

Setelah tabrakan ke-1 Setelah tabrakan ke-1 menunggu 0-1 slot menunggu 0-1 slot time sebelum mengirim lagi.time sebelum mengirim lagi.

Setelah tabrakan ke-2 Setelah tabrakan ke-2 menunggu menunggu 0,1,2,atau 3 slot time sebelum mengirim lagi.0,1,2,atau 3 slot time sebelum mengirim lagi.

Dan seterusnya Dan seterusnya tabrakan ke-n , harus tabrakan ke-n , harus menunggu 2menunggu 2nn - 1 - 1

Disebut Binary Exponential Back Off Disebut Binary Exponential Back Off Algorithm.Algorithm.

Bila tabrakan sampai 16x Bila tabrakan sampai 16x dianggap jaringan dianggap jaringan rusakrusak

Page 55: The Medium Access Control Sublayer

Ethernet PerformanceEthernet PerformanceEfficiency of Ethernet at 10 Mbps with 512-bit Efficiency of Ethernet at 10 Mbps with 512-bit

slot times.slot times.

Page 56: The Medium Access Control Sublayer

Switched EthernetSwitched EthernetA simple example of switched Ethernet.A simple example of switched Ethernet.

Page 57: The Medium Access Control Sublayer

Containing a high speed back plane and Containing a high speed back plane and room for typlcally 4 – 32 plug-in line card, room for typlcally 4 – 32 plug-in line card, each containing 1 to 8 connector. Most each containing 1 to 8 connector. Most Often each connector has a 10 Base=T twist Often each connector has a 10 Base=T twist pair connection to a single host computer.pair connection to a single host computer.

Each card forms its own Each card forms its own collision domain collision domain independent of the otherindependent of the other

Switched EthernetSwitched Ethernet

Page 58: The Medium Access Control Sublayer

Switched EthernetSwitched Ethernet Trafik meningkat pada Ethernet diatasi dengan :Trafik meningkat pada Ethernet diatasi dengan : Menambah kecepatan mis. menjadi 100 Mbps Menambah kecepatan mis. menjadi 100 Mbps

atau 1 Gbpsatau 1 Gbps Menggunakan Switched EthernetMenggunakan Switched Ethernet Switch berisi high speed backplane dan card yang Switch berisi high speed backplane dan card yang

masing2 terdiri dari 1-8 konektormasing2 terdiri dari 1-8 konektorBila st mau mengirim Ethernet frameBila st mau mengirim Ethernet frameke switch. ke switch.

Card check, apakah tujuannya ada pada card yang Card check, apakah tujuannya ada pada card yang sama. Bila ya, tinggal dicopy. Bila tidak dikirim sama. Bila ya, tinggal dicopy. Bila tidak dikirim lewat high speed backplane ke card di tujuan.lewat high speed backplane ke card di tujuan.

Bagaimana kalau ada 2 mesin attach ke plug in card Bagaimana kalau ada 2 mesin attach ke plug in card yang sama dan transmit frame pada saat yang sama dan transmit frame pada saat bersamaan? – Coba dipikirkan.bersamaan? – Coba dipikirkan.

Page 59: The Medium Access Control Sublayer

Development of Ethernet by increasing Development of Ethernet by increasing thespeed, using more than 10 Mbps. Using thespeed, using more than 10 Mbps. Using Fiber CabelFiber Cabel

One was called FDDI ( Fiber Distributed One was called FDDI ( Fiber Distributed Data Interchange or Fiber ChannelData Interchange or Fiber Channel

Must be compatible with Classic EthernetMust be compatible with Classic Ethernet

Fast EthernetFast Ethernet

Page 60: The Medium Access Control Sublayer

Fast EthernetFast Ethernet

Merupakan pengembangan dari Ethernet, Merupakan pengembangan dari Ethernet, dengan menaikkan kecepatan-nya.dengan menaikkan kecepatan-nya.

Muncul : FDDI (Fiber Distributed Data Muncul : FDDI (Fiber Distributed Data Interface) dan Fibre-Channel yang keduanya Interface) dan Fibre-Channel yang keduanya menggunakan Fiber Optik, menggunakan menggunakan Fiber Optik, menggunakan back-bone dan station management yang back-bone dan station management yang complicated complicated tidak dipakai lagi.tidak dipakai lagi.

Kemudian Fast Ethernet yang intinya harus Kemudian Fast Ethernet yang intinya harus kompatible dengan Ethernet sebelumnya.kompatible dengan Ethernet sebelumnya.

Kecepatannya menjadi :100 Mbps,Kecepatannya menjadi :100 Mbps,

Page 61: The Medium Access Control Sublayer

Fast EthernetFast Ethernet

The original fast Ethernet cabling.The original fast Ethernet cabling.

Page 62: The Medium Access Control Sublayer

Gigabit EthernetGigabit Ethernet Lebih cenderung ke hubungan point to point Lebih cenderung ke hubungan point to point

tidak multidrop seperti Ethernet original 10 tidak multidrop seperti Ethernet original 10 Mbps Mbps Classic Ethernet (lihat gambar)Classic Ethernet (lihat gambar)

Ada 2 mode operasi yang berbeda :Ada 2 mode operasi yang berbeda :

1.Full duplex 1.Full duplex trafik 2 arah pd waktu yang sama, trafik 2 arah pd waktu yang sama, apabila menggunakan sentral switch yg apabila menggunakan sentral switch yg dihubungkan ke pc. Dilakukan pembufferan, dihubungkan ke pc. Dilakukan pembufferan, shg frame bisa dikirim kapan sajashg frame bisa dikirim kapan saja

Tidak perlu mengamati saluranTidak perlu mengamati saluran Switch bebas mix dan match kecepatanSwitch bebas mix dan match kecepatan

Page 63: The Medium Access Control Sublayer

2.Half Duplex 2.Half Duplex Bila pc dihubungkan ke HUB Bila pc dihubungkan ke HUB bukan switch. HUB tidak melakukan pem- bukan switch. HUB tidak melakukan pem- bufferan frame yang datang.bufferan frame yang datang.

Masih mungkin terjadi tabrakan Masih mungkin terjadi tabrakan diperlu kan diperlu kan standard CSMA/CDstandard CSMA/CD

Kecepatan transmisi 100x lebih dp Classic Kecepatan transmisi 100x lebih dp Classic Ethernet, jarak 100x kurang dp Classic Ethernet, jarak 100x kurang dp Classic Ethernet (25 m).Ethernet (25 m).

Untuk mengatasi ini ditambahkan Untuk mengatasi ini ditambahkan (jelaskan!)(jelaskan!)

- Carrier Extention - Carrier Extention

- Frame bursting- Frame bursting

Page 64: The Medium Access Control Sublayer

Gigabit EthernetGigabit Ethernet

(a)(a) A two-station Ethernet.A two-station Ethernet.

(b)(b) A multistation Ethernet.A multistation Ethernet.

Page 65: The Medium Access Control Sublayer

Gigabit Ethernet (2)Gigabit Ethernet (2)

Gigabit Ethernet cabling.Gigabit Ethernet cabling.

Page 66: The Medium Access Control Sublayer

IEEE 802.2: Logical Link ControlIEEE 802.2: Logical Link Control

(a)(a) Position of LLC. Position of LLC. (b)(b) Protocol Protocol formats.formats.

Page 67: The Medium Access Control Sublayer

Token busToken busToken RingToken Ring

Page 68: The Medium Access Control Sublayer

Wireless LANsWireless LANs

• The 802.11 Protocol StackThe 802.11 Protocol Stack

• The 802.11 Physical LayerThe 802.11 Physical Layer

• The 802.11 MAC Sublayer The 802.11 MAC Sublayer ProtocolProtocol

• The 802.11 Frame StructureThe 802.11 Frame Structure

• ServicesServices

Page 69: The Medium Access Control Sublayer

3 teknik transmisi pada wireless :3 teknik transmisi pada wireless :

Infra-red Infra-red seperti remote control pada TV seperti remote control pada TV• Transmisi pada 0.85 atau 0.95 mikron. Transmisi pada 0.85 atau 0.95 mikron. • Kecep : 1 Mbps menggunakan 4 ke 16 bit Kecep : 1 Mbps menggunakan 4 ke 16 bit

code word(kombinasi 15 - 0 dan satu -1) code word(kombinasi 15 - 0 dan satu -1) gray codegray code

• 2 Mbps menggunakan 2 ke 4 bit coceword 2 Mbps menggunakan 2 ke 4 bit coceword satu -1 (0001,0010 dll)satu -1 (0001,0010 dll)

The 802.11 Protocol StackThe 802.11 Protocol Stack

Page 70: The Medium Access Control Sublayer

Short range radio Short range radio FHSS ( Freq Hopping Spread FHSS ( Freq Hopping Spread Spectrum) dan DSSS( Direct sequence Spread Spectrum) dan DSSS( Direct sequence Spread Sectrum)Sectrum)

• Menggunakan 79 kanal masing2 1 MHzMenggunakan 79 kanal masing2 1 MHz• tanpa ijin (2.4 GHz ISM band) mis: remote pintu tanpa ijin (2.4 GHz ISM band) mis: remote pintu

garasi, microwave oven, cordless telephone ( 1-2 garasi, microwave oven, cordless telephone ( 1-2 Mbps)Mbps)

• DSSS 1 atau 2 Mbps mirip dengan sistem CDMA. DSSS 1 atau 2 Mbps mirip dengan sistem CDMA. Masing2 dikirim dengan 11 chips dengan Masing2 dikirim dengan 11 chips dengan menggunakan : menggunakan : Barker sequence.Barker sequence. Menggunakan Menggunakan PSM.PSM.

The 802.11 Protocol StackThe 802.11 Protocol Stack

Page 71: The Medium Access Control Sublayer

OFDM(Orthogonal-FDM) dan OFDM(Orthogonal-FDM) dan HR(High Rate)-DSSS bekerja pada HR(High Rate)-DSSS bekerja pada sampai 54 Mbps dan 11 Mbpssampai 54 Mbps dan 11 Mbps

The 802.11 Protocol StackThe 802.11 Protocol Stack

Page 72: The Medium Access Control Sublayer

The 802.11 Protocol StackThe 802.11 Protocol StackPart of the 802.11 protocol stack.Part of the 802.11 protocol stack.

Page 73: The Medium Access Control Sublayer

The 802.11 MAC Sublayer ProtocolThe 802.11 MAC Sublayer Protocol

(a)(a) The hidden station problem. The hidden station problem.(b)(b) The exposed station problem. The exposed station problem.

Page 74: The Medium Access Control Sublayer

The 802.11 MAC Sublayer Protocol (2)The 802.11 MAC Sublayer Protocol (2)The use of virtual channel sensing using The use of virtual channel sensing using

CSMA/CA.CSMA/CA.

Page 75: The Medium Access Control Sublayer

The 802.11 MAC Sublayer Protocol The 802.11 MAC Sublayer Protocol (3)(3)

A fragment burst.A fragment burst.

Page 76: The Medium Access Control Sublayer

The 802.11 MAC Sublayer Protocol The 802.11 MAC Sublayer Protocol (4)(4)

Interframe spacing in 802.11.Interframe spacing in 802.11.

Page 77: The Medium Access Control Sublayer

The 802.11 Frame StructureThe 802.11 Frame Structure

The 802.11 data frame.The 802.11 data frame.

Page 78: The Medium Access Control Sublayer

802.11 Services802.11 Services

• AssociationAssociation

• DisassociationDisassociation

• ReassociationReassociation

• DistributionDistribution

• IntegrationIntegration

Distribution Services

Page 79: The Medium Access Control Sublayer

802.11 Services802.11 Services

• AuthenticationAuthentication

• DeauthenticationDeauthentication

• PrivacyPrivacy

• Data DeliveryData Delivery

Intracell Services

Page 80: The Medium Access Control Sublayer

Broadband WirelessBroadband Wireless

• Comparison of 802.11 and 802.16Comparison of 802.11 and 802.16

• The 802.16 Protocol StackThe 802.16 Protocol Stack

• The 802.16 Physical LayerThe 802.16 Physical Layer

• The 802.16 MAC Sublayer The 802.16 MAC Sublayer ProtocolProtocol

• The 802.16 Frame StructureThe 802.16 Frame Structure

Page 81: The Medium Access Control Sublayer

The 802.16 Protocol StackThe 802.16 Protocol StackThe 802.16 Protocol Stack.The 802.16 Protocol Stack.

Page 82: The Medium Access Control Sublayer

The 802.16 Physical LayerThe 802.16 Physical LayerThe 802.16 transmission environment.The 802.16 transmission environment.

Page 83: The Medium Access Control Sublayer

The 802.16 Physical Layer (2)The 802.16 Physical Layer (2)Frames and time slots for time division Frames and time slots for time division

duplexing.duplexing.

Page 84: The Medium Access Control Sublayer

The 802.16 MAC Sublayer The 802.16 MAC Sublayer ProtocolProtocol

Service ClassesService Classes

• Constant bit rate serviceConstant bit rate service

• Real-time variable bit rate serviceReal-time variable bit rate service

• Non-real-time variable bit rate Non-real-time variable bit rate serviceservice

• Best efforts serviceBest efforts service

Page 85: The Medium Access Control Sublayer

The 802.16 Frame StructureThe 802.16 Frame Structure(a)(a) A generic frame. A generic frame.

(b)(b) A bandwidth request frame.A bandwidth request frame.

Page 86: The Medium Access Control Sublayer

BluetoothBluetooth

• Bluetooth ArchitectureBluetooth Architecture

• Bluetooth ApplicationsBluetooth Applications

• The Bluetooth Protocol StackThe Bluetooth Protocol Stack

• The Bluetooth Radio LayerThe Bluetooth Radio Layer

• The Bluetooth Baseband LayerThe Bluetooth Baseband Layer

• The Bluetooth L2CAP LayerThe Bluetooth L2CAP Layer

• The Bluetooth Frame StructureThe Bluetooth Frame Structure

Page 87: The Medium Access Control Sublayer

Bluetooth ArchitectureBluetooth ArchitectureTwo piconets can be connected to form a Two piconets can be connected to form a

scatternet.scatternet.

Page 88: The Medium Access Control Sublayer

Bluetooth ApplicationsBluetooth ApplicationsThe Bluetooth profiles.The Bluetooth profiles.

Page 89: The Medium Access Control Sublayer

The Bluetooth Protocol StackThe Bluetooth Protocol StackThe 802.15 version of the Bluetooth protocol The 802.15 version of the Bluetooth protocol

architecture.architecture.

Page 90: The Medium Access Control Sublayer

The Bluetooth Frame StructureThe Bluetooth Frame Structure

A typical Bluetooth data frame.A typical Bluetooth data frame.

Page 91: The Medium Access Control Sublayer

Data Link Layer SwitchingData Link Layer Switching

• Bridges from 802.x to 802.yBridges from 802.x to 802.y

• Local InternetworkingLocal Internetworking

• Spanning Tree BridgesSpanning Tree Bridges

• Remote BridgesRemote Bridges

• Repeaters, Hubs, Bridges, Switches, Repeaters, Hubs, Bridges, Switches, Routers, GatewaysRouters, Gateways

• Virtual LANsVirtual LANs

Page 92: The Medium Access Control Sublayer

To connect LAN-LANTo connect LAN-LAN On the Data Link LayerOn the Data Link Layer Usually for 802 LANUsually for 802 LAN Only discuss Bridge - 802Only discuss Bridge - 802

The reason why an organization using several The reason why an organization using several LANLAN

1.1. Different needs of many Different needs of many Universit Universitiesies / /

DepartemenDepartementsts Several Several LAN LAN need need bridgebridge

BRIDGEBRIDGE

Page 93: The Medium Access Control Sublayer

2. 2. The different geographies – many The different geographies – many

building in the separate areabuilding in the separate area

3. 3. OverloadOverload - - thousandsthousands workstation workstation

- Need to divided into several LAN- Need to divided into several LAN

- Need- Need Bridge Bridge

4.4.The distance between machines too farThe distance between machines too far

((mis. 802.3 > 2,5 km) mis. 802.3 > 2,5 km) Using the single cable – the Using the single cable – the round trip delay round trip delay is is

largelarge Need dividedNeed divided into several into several LANLAN Need Need bridgebridge

Page 94: The Medium Access Control Sublayer

5.5.Bridge Bridge can select which is continue or notcan select which is continue or not using programmingusing programming not only copynot only copy RepeaterRepeater

6.Bridge 6.Bridge support security to the organizationsupport security to the organization

Page 95: The Medium Access Control Sublayer

The problem of theThe problem of the BRIDGE BRIDGE betweenbetween

802.X DAN 802.Y802.X DAN 802.Y1.1. 1.1. Each using the different frame Each using the different frame

formatformat.. 802.3 : Xerox802.3 : Xerox 802.4 : General motor, Boing, Motorola 802.4 : General motor, Boing, Motorola

does not want to change does not want to change not compatiblenot compatible 802.5 : IBM802.5 : IBM

2.2. 802.3 802.3 allowedallowed 1 - 20 Mbps (10 Mbps) 1 - 20 Mbps (10 Mbps)

802.4 802.4 allowedallowed 1 - 10 (10 Mbps) 1 - 10 (10 Mbps)

802.5 802.5 allowedallowed 1 - 4 Mbps (4 Mbps) 1 - 4 Mbps (4 Mbps)

Page 96: The Medium Access Control Sublayer

TheThe 802.3 / 802.4 802.3 / 802.4 toto 802.5 buffer 802.5 buffer neededneeded

TheThe 802.4 ke 802.3 802.4 ke 802.3 needneed band band width width expansion because there isexpansion because there is collision collision inin 802.3’S 802.3’S

3. The differences between3. The differences between maxmaximumimum frame lengthframe length

Page 97: The Medium Access Control Sublayer

802.3 : 1518 bytes802.3 : 1518 bytes 802.4 : 8191 bytes802.4 : 8191 bytes 802.5 : 802.5 : unlimitedunlimited, , depend ondepend on THT THT The The defaultdefault of of THT 10 msec THT 10 msec 5000 5000

bytesbytes

P SD AC FC DA/SA L D PAD CS ED FS

IEEE 802 Frame-format

802-3

802-4

802-5

Page 98: The Medium Access Control Sublayer

Another ProblemsAnother Problems : : 802.3 ke 802.3 : 802.3 ke 802.3 : no problemno problem 802.4 ke 802.3 : 802.4 ke 802.3 : there arethere are 2 2 problems :problems :

802.4 802.4 hashas preorit preorityy, 802.3 , 802.3 does not has does not has priority priority ignoredignored– 802.4 802.4 has 1 bit in the header ashas 1 bit in the header as

sender, sender, token ack token ack from from destination . destination .

802.5 802.5 toto 802.3 802.3 also has problem as also has problem as aboveabove

Page 99: The Medium Access Control Sublayer

Bridges from 802.x to 802.yBridges from 802.x to 802.yOperation of a LAN bridge from 802.11 to Operation of a LAN bridge from 802.11 to

802.3.802.3.

Page 100: The Medium Access Control Sublayer

Bridges from 802.x to 802.y (2)Bridges from 802.x to 802.y (2)The IEEE 802 frame formats. The drawing is The IEEE 802 frame formats. The drawing is

not to scale.not to scale.

Page 101: The Medium Access Control Sublayer

Local InternetworkingLocal InternetworkingA configuration with four LANs and two A configuration with four LANs and two

bridges.bridges.

Page 102: The Medium Access Control Sublayer

TRANSPARENT BRIDGETRANSPARENT BRIDGE

Every things are transparentEvery things are transparent Just plug between networks without any Just plug between networks without any

changes at all changes at all the system will run the system will run Works asWorks as, ‘promises mode’, , ‘promises mode’, receive receive

everyevery frame frame,, send to many LAN and send to many LAN and many directionmany direction

Bridge Bridge worksworks depend on address table in depend on address table in the bridge to find which frame discard or the bridge to find which frame discard or not. not.

Page 103: The Medium Access Control Sublayer

Routing procedure Routing procedure depend on sender depend on sender and frame’s receiver and frame’s receiver

a)a) If receiver and sender comes from If receiver and sender comes from the same LAN the same LAN frame will be discard frame will be discard

b) b) If receiver and sender comes from If receiver and sender comes from the different LAN the different LAN frame will be pass frame will be pass

c)c) If receiver and sender not clear If receiver and sender not clear and unknown and unknown using flooding using flooding

Flooding : Flooding : sometimes create the sometimes create the troubletrouble because they must copy every because they must copy every frameframe Handle byHandle by Spanning Tree Spanning Tree BridgeBridge

Page 104: The Medium Access Control Sublayer

Spanning Tree BridgesSpanning Tree BridgesTwo parallel transparent bridges.Two parallel transparent bridges.

Page 105: The Medium Access Control Sublayer

Spanning Tree Bridges (2)Spanning Tree Bridges (2)

(a)(a) Interconnected LANs. Interconnected LANs. (b)(b) A spanning tree A spanning tree covering the LANs. The dotted lines are not covering the LANs. The dotted lines are not part of the spanning tree.part of the spanning tree.

Page 106: The Medium Access Control Sublayer

Remote BridgesRemote BridgesRemote bridges can be used to interconnect Remote bridges can be used to interconnect

distant LANs.distant LANs.

Page 107: The Medium Access Control Sublayer

Repeaters, Hubs, Bridges, Repeaters, Hubs, Bridges, Switches, Routers and GatewaysSwitches, Routers and Gateways

(a)(a) Which device is in which layer. Which device is in which layer.

(b)(b) Frames, packets, and headers. Frames, packets, and headers.

Page 108: The Medium Access Control Sublayer

Repeaters, Hubs, Bridges, Switches, Repeaters, Hubs, Bridges, Switches, Routers and Gateways (2)Routers and Gateways (2)

(a)(a) A hub. A hub. (b)(b) A bridge. A bridge. (c)(c) a switch. a switch.

Page 109: The Medium Access Control Sublayer

Virtual LANsVirtual LANsA building with centralized wiring using hubs A building with centralized wiring using hubs

and a switch.and a switch.

Page 110: The Medium Access Control Sublayer

Virtual LANs (2)Virtual LANs (2)

(a)(a) Four physical LANs organized into two VLANs, Four physical LANs organized into two VLANs,

gray and white, by two bridges. gray and white, by two bridges.

(b)(b) The same 15 machines organized into two The same 15 machines organized into two

VLANs by switches.VLANs by switches.

Page 111: The Medium Access Control Sublayer

The IEEE 802.1Q StandardThe IEEE 802.1Q StandardTransition from legacy Ethernet to VLAN-aware Transition from legacy Ethernet to VLAN-aware Ethernet. The shaded symbols are VLAN aware. Ethernet. The shaded symbols are VLAN aware.

The empty ones are not.The empty ones are not.

Page 112: The Medium Access Control Sublayer

The IEEE 802.1Q Standard (2)The IEEE 802.1Q Standard (2)

The 802.3 (legacy) and 802.1Q Ethernet The 802.3 (legacy) and 802.1Q Ethernet frame formats.frame formats.

Page 113: The Medium Access Control Sublayer

SummarySummary

Channel allocation methods and systems for a common channelChannel allocation methods and systems for a common channel..