Fiber Distributed Data Interface

Similar documents
Wireless LAN Applications LAN Extension Cross building interconnection Nomadic access Ad hoc networks Single Cell Wireless LAN

Chapter 2 Overview. Duplexing, Multiple Access - 1 -

Medium Access Control. Wireless Networks: Guevara Noubir. Slides adapted from Mobile Communications by J. Schiller

% 4 (1 $ $ ! " ( # $ 5 # $ % - % +' ( % +' (( % -.

Mobile Computing. Chapter 3: Medium Access Control

Cellular systems 02/10/06

ETSI SMG#24 TDoc SMG 903 / 97. December 15-19, 1997 Source: SMG2. Concept Group Alpha - Wideband Direct-Sequence CDMA: System Description Summary

Chapter 3 : Media Access. Mobile Communications. Collision avoidance, MACA

Wireless Transmission & Media Access

ICT 5305 Mobile Communications. Lecture - 4 April Dr. Hossen Asiful Mustafa

Medium Access Control

Access Methods and Spectral Efficiency

Multiple Access System

Multiple Access Schemes

Medium Access Schemes

Multiple Access Techniques

CS434/534: Topics in Networked (Networking) Systems

Multiple Access (3) Required reading: Garcia 6.3, 6.4.1, CSE 3213, Fall 2010 Instructor: N. Vlajic

Ilenia Tinnirello. Giuseppe Bianchi, Ilenia Tinnirello

1. Introduction 1.2 Medium Access Control. Prof. JP Hubaux

RADIO LINK ASPECT OF GSM

GLOBAL SYSTEM FOR MOBILE COMMUNICATION. ARFCNS, CHANNELS ETI 2511 Thursday, March 30, 2017

ECE 476/ECE 501C/CS Wireless Communication Systems Winter Lecture 9: Multiple Access, GSM, and IS-95

Fine-grained Channel Access in Wireless LAN. Cristian Petrescu Arvind Jadoo UCL Computer Science 20 th March 2012

Multiple Access Techniques for Wireless Communications

Multiplexing Module W.tra.2

Contents. IEEE family of standards Protocol layering TDD frame structure MAC PDU structure

Politecnico di Milano Scuola di Ingegneria Industriale e dell Informazione. Physical layer. Fundamentals of Communication Networks

Wireless Intro : Computer Networking. Wireless Challenges. Overview

3.1. Historical Overview. Citizens` Band Radio Cordless Telephones Improved Mobile Telephone Service (IMTS)

Outline. EEC-484/584 Computer Networks. Homework #1. Homework #1. Lecture 8. Wenbing Zhao Homework #1 Review

An Introduction to Wireless Technologies Part 2. F. Ricci

Exercise Data Networks

Lecture 8: Media Access Control. CSE 123: Computer Networks Stefan Savage

Introduction to Wireless and Mobile Networking. Hung-Yu Wei g National Taiwan University

Communication Systems GSM

Page 1. Problems with 1G Systems. Wireless Wide Area Networks (WWANs) EEC173B/ECS152C, Spring Cellular Wireless Network

CS6956: Wireless and Mobile Networks Lecture Notes: 3/23/2015

Increasing Broadcast Reliability for Vehicular Ad Hoc Networks. Nathan Balon and Jinhua Guo University of Michigan - Dearborn

CDMA - QUESTIONS & ANSWERS

Reti di Telecomunicazione. Channels and Multiplexing

Multiple Access Methods

COSC 3213: Computer Networks I Instructor: Dr. Amir Asif Department of Computer Science York University Section B

Structure of the Lecture

SourceSync. Exploiting Sender Diversity

Lecture 23: Media Access Control. CSE 123: Computer Networks Alex C. Snoeren

Lecture on Sensor Networks

UNIT- 7. Frequencies above 30Mhz tend to travel in straight lines they are limited in their propagation by the curvature of the earth.

Chapter 2: Global System for Mobile Communication

T325 Summary T305 T325 B BLOCK 3 4 PART III T325. Session 11 Block III Part 3 Access & Modulation. Dr. Saatchi, Seyed Mohsen.

A Wireless Communication System using Multicasting with an Acknowledgement Mark

MOBILE COMPUTING 4/8/18. Basic Call. Public Switched Telephone Network - PSTN. CSE 40814/60814 Spring Transit. switch. Transit. Transit.

Mobile Communication Systems. Part 7- Multiplexing

Wireless Medium Access Control and CDMA-based Communication Lesson 14 CDMA2000

Figure 8.1 CSMA/CD worst-case collision detection.

COMPUTER COMMUNICATION AND NETWORKS ENCODING TECHNIQUES

CS 294-7: Wireless Local Area Networks. Professor Randy H. Katz CS Division University of California, Berkeley Berkeley, CA

Lecture 8 Mul+user Systems

Data and Computer Communications

Question Points Score Total 100

Lecture 8: Media Access Control

APPLICATION PROGRAMMING: MOBILE COMPUTING [ INEA00112W ] Marek Piasecki PhD Wireless Telecommunication

GSM and Similar Architectures Lesson 08 GSM Traffic and Control Data Channels

ROM/UDF CPU I/O I/O I/O RAM

Simple Algorithm in (older) Selection Diversity. Receiver Diversity Can we Do Better? Receiver Diversity Optimization.

Level 6 Graduate Diploma in Engineering Wireless and mobile communications

The problem of upstream traffic synchronization in Passive Optical Networks

Wireless Networks (PHY): Design for Diversity

Wireless Networked Systems

Mobile Network Evolution Part 1. GSM and UMTS

Wireless Broadband Networks

Chapter # Introduction to Mobile Telephone Systems. 1.1 Technologies. Introduction to Mobile Technology

Digi-Wave Technology Williams Sound Digi-Wave White Paper

Spread Spectrum. Chapter 18. FHSS Frequency Hopping Spread Spectrum DSSS Direct Sequence Spread Spectrum DSSS using CDMA Code Division Multiple Access

Channel partitioning protocols

Developing Mobile Applications

CANRF UHF Wireless CAN module

Introduction to IS-95 CDMA p. 1 What is CDMA p. 1 History of CDMA p. 2 Forms of CDMA p MHz CDMA p MHz CDMA (PCS) p. 6 CDMA Parts p.

Bandwidth Utilization:

Wireless WANS and MANS. Chapter 3

Background: Cellular network technology

UNIT 6 ANALOG COMMUNICATION & MULTIPLEXING YOGESH TIWARI EC DEPT,CHARUSAT

Course Overview. AMPS: History

Wireless ad hoc networks. Acknowledgement: Slides borrowed from Richard Y. Yale

CHAPTER 2. Instructor: Mr. Abhijit Parmar Course: Mobile Computing and Wireless Communication ( )

An Introduction to Wireless Technologies Part 2. F. Ricci 2008/2009

Chapter 14. Cellular Wireless Networks

Mobile & Wireless Networking. Lecture 4: Cellular Concepts & Dealing with Mobility. [Reader, Part 3 & 4]

Data and Computer Communications. Tenth Edition by William Stallings

By Ryan Winfield Woodings and Mark Gerrior, Cypress Semiconductor

10EC81-Wireless Communication UNIT-6

Wireless replacement for cables in CAN Network Pros and Cons. by Derek Sum

INTRODUCTION TO COMMUNICATION SYSTEMS AND TRANSMISSION MEDIA

ECS455: Chapter 4 Multiple Access

OPTIMAL ACCESS POINT SELECTION AND CHANNEL ASSIGNMENT IN IEEE NETWORKS. Sangtae Park, B.S. Thesis Prepared for the Degree of MASTER OF SCIENCE

Wireless and Mobile Network Architecture. Outline. Introduction. Cont. Chapter 1: Introduction

Cellular Wireless Networks. Chapter 10

Politecnico di Milano Advanced Network Technologies Laboratory. Beyond Standard MAC Sublayer

Jeffrey M. Gilbert, Ph.D. Manager of Advanced Technology Atheros Communications

Systems. Roland Kammerer. 29. October Institute of Computer Engineering Vienna University of Technology. Communication in Distributed Embedded

Transcription:

Fiber istributed ata Interface FI: is a 100 Mbps fiber optic timed token ring LAN Standard, over distance up to 200 km with up to 1000 stations connected, and is useful as backbone Token bus ridge FI uses a dual ring topology and some other mechanisms, such as station bypass, to enhance fault tolerance Token ring FI ring ridge omputer Ethernet Timed token ring: let token rotation time Ethernet be TRT, target TRT be TTRT, and token holding time be THT Asynchronous class traffic (such as computer data) If TRT > TTRT (token is late): no transmission; If TRT < TTRT (token is early): transmission limited to THT = TTRT - TRT. Synchronous class traffic (such as voice data) Transmission, but THT is small and fixed so: worst case TRT < 2 TTRT Note this is different from usual token ring, such as 802.5 Token is released immediately after frame has been sent (In 802.5, token is released after frame has back to sender) 83

Medium Access ontrol for FI FI protocols, and MA token and frame formats: LL MA PHY PM 1101 11011 PUs frames symbols pulses LL MA PHY PM Layer 2 Layer 1 start frame end delimiter control delimiter 2 2 2 symbol=4 bits, 4b/5b coding size in symbols 5 code bits preamble delimiter start frame destination source end control address address data checksum delimiter at least 2 2 12 12 variable 8 1 3 16 1 1 1 size in symbols error address detected recognized frame status frame copied Frame control: 1st bit indicates class of services, 0/1=asynchronous/synchronous 2nd bit indicates length of address, 0/1=16/48 bits of address (16 bits address is now redundant) Rest of 6 bits indicate frame types, including LL frames given to MA for transmission (in this case, the last 3 bits are for priorities), MA frames used by MA for ring maintenance and fault recovery, and station management frames Frame status: A and are the same as in token ring, and E (error detected) is reset to logic 0 at sender each user on ring can check frame and, if any error is detected, it sets E to logic 1 84

Medium Access by Reservation Overview Multiple access techniques include frequency or wavelength division multiple access, time division multiple access, code division multiple access, and space division multiple access FMA or WMA: total system bandwidth (wavelength) is divided into narrow frequency (wavelength) slots (channels). Each user is allocated a unique band or channel A user is free to transmit or receive all the time on its allocated channel, but the cost of transceiver is high, as each has to be designed on a different band, e.g. 1G mobile system TMA: time frame is divided into slots (channels). Each user is allocated a particular time slot or channel A user is limited to transmit or receive only regular bursts of a wideband signal, but it takes advantages of digital technologies, e.g. 2G mobile system MA: user data is spread by high-rate chip sequences to entire system bandwidth. Each user is allocated a unique code sequence Hardware requires high-rate electronics, but this technology offers much higher capacity and many advantages, e.g. 3G mobile system SMA: utilises spatial diversity. Users can have same carrier (channel), but as long as they have different angles of arrival, they can be separated by smart antenna with adaptive beamforming This technology provides potential for further improving bandwidth efficiency, future 4G? 85

Medium Access Techniques (continue) For most WANs, FMA will always be there to divide allocated total system bandwidth into frequency slots (channels) FMA, WMA and TMA have hard capacity, no more user can access after reaching the capacity while MA and SMA have soft capacity, allow more users at gradually degraded quality A channel is a frequency or wavelength slot for FMA or WMA system, a time slot in TMA system, or a channelisation code in MA system hannels are dynamically allocated and how to make a reservation to gain access may involve a contention process (reservation by contention), more specifically A system has a set of user channels and some separate signalling channels To gain access to the system is to be given a user channel, and booking is done by some signalling channels To let system know you want to make a call or book a user channel first needs to reserve a signalling channel via some random access channel, typically using ALOHA type algorithm This is the access strategy used for 2G GSM and 3G MA mobile systems For example, in MA system, to make request for access is to transmit it with a specific code (random access channel): if successful, you ll be given one signalling code (channel); if unsuccessful, i.e. collision due to some one is doing the same thing (trying to gain access), you have to wait and try again a ALOHA type contention procedure 86

WMA LAN In this kind of fiber optics LANs, a channel is a wavelength band A user gets two channels: control and data. A channel has fixed time slots, and data channel s last slot contains information on free slots in its control channel communicates with A using variable rate connection-oriented: Station A m time slots for control X X X X X X X X S n + 1 time slots for data X X X X X X X X X X 's data channel 's control channel 's data channel 's control channel 's control channel S λ A's control channel is used by other stations to contact A Used by to transmit data 's data channel To contact A, reads status slot Time in A s data channel to see A has any control slots unused; then makes Tx request in a free slot in A s control channel If A accepts Tx request, can send data on a specific slot of its own data channel and tell A where to pick up If and both try to grab a same control slot of A s at same time, a failure is given in A s status slot and have to wait a random period of time before try again (contention) onstant rate connection-oriented: when asks for connection, it also asks can I send you a frame in every occurrence of slot 2? If accepted, a guaranteed bandwidth connection is established. if not, tries a different proposal 87

igital ellular Radio The concepts of cells and frequency reuse are fundamental to cellular radio. A cell maintains a set of frequency slots (channels). Two cells separated by a sufficiently long distance may use the same set of frequency slots (co-channels). This greatly improves bandwidth efficiency G F A E G F G F A E A E (a) (b) GSM: global systems for mobile communications uses a mixture of FMA and TMA technologies GSM has 124 downlink channels and 124 uplink channels (FM) per cell. Each such channel has a frequency band of 200 khz and can support 8 separate users (TM). Theoretically, there are 8 124 = 992 fully duplex (downlink/uplink) channels per cell, but many of them may not be used for avoiding co-channel interference with neighboring cells Frequency 959.8 MHz 935.4 MHz 935.2 MHz 914.8 MHz 890.4 MHz 890.2 MHz TM frame Time hannel 124 2 1 124 2 1 ase to mobile Mobile to base 88

GSM ontrol hannels The above approximately 1000 channels are user channels, and GSM has some separate signalling (control) channels roadcast control channel: continuously broadcasts the base identity and the channel status. y monitoring this channel, mobile knows which cell it is in edicated control channel: is for location updating, registration, and call setup. Through this channel, a base knows who are in its cell ommon control channel: consists of three logic sub-channels Paging channel: is used by the base to announce incoming calls. Mobile continuously monitors this channel to see any call for it Random access channel: is used by mobile to request a slot on the dedicated control channel, for call setup The access to the random access channel is based on slotted ALOHA Access grant channel: is used to announce the assigned slot (who is granted access to which slot of the dedicated control channel) 89

Wireless LANs onsiders wireless LANs that use packet radio with short range. Typically there is a single channel covering the entire bandwidth (a few Mbps) Note no central access point and it is ad hoc network SMA would not work because: Hidden station problem: when A is transmitting to, if senses the medium, it will falsely conclude that it can transmit, as it cannot hear A A (a) Radio range Exposed station problem: when is transmitting to A, if senses medium, it hears an ongoing transmission and falsely concludes that it may not transmit to, but in fact it can safely do so Multiple access with collision avoidance (MAA): sense activity around intended receiver. onsider that A is trying to communicate with : A transmits a Request to Send (RTS) to Range of A's transmitter A (b) answers with a lear to Send (TS) can hear the RTS from A but not the TS from, and it can freely transmit A RTS A TS Range of 's transmitter hears only TS from, and must keep silent (a) (b) E E 90

IEEE 802.11 Medium Access ontrol Two modes of operation: distributed coordination function with no central control (access point), and point coordination function with base station controlling activities in its cell For F, medium access control protocol is based on MAA (multiple access with collision avoidance) To cope with noisy wireless channels, 802.11 allows frames to be fragmented into smaller pieces, each with its own checksum Fragments are individually numbered and acknowledged using stop-and-wait Once channel has been acquired using RTS and TS, multiple fragments can be sent in row For PF, base station polls users, asking them if they have frames to send and controls transmission order no collision, a signed up user is guaranteed a certain fraction of bandwidth ase periodically broadcasts a beacon frame, which contains system parameters, such as hopping frequencies and dwell times (for FHSS), clock synchronisation, etc., and it also invites new users to sign up for polling service 802.11 lets PF and F to coexist within a cell by carefully defining interframe time interval: after a frame has been sent, a certain dead time is required before any user may sent frame AK SIFS ontrol frame or next fragment may be sent here PIFS IFS PF frames may be sent here EIFS Time F frames may be sent here ad frame recovery done here 91

802.11 Frame Structure Frame control: has 11 subfields Protocol version: two versions of protocol are allowed in same cell Type: indicates data, control or management Subtype: e.g. RTS, TS or AK ytes 2 2 6 6 6 2 6 0-2312 Frame control ur- ation Address 1 its 2 2 4 Version Type Subtype Address 2 1 To S Address 3 Seq. Address 4 1 1 1 1 1 1 1 From S MF Re- try ata Pwr More W O Frame control 4 heck- sum To S and from S: indicate frame is going to or coming from the intercell distribution system MF: more fragments will follow Retry: marks a retransmission of a frame sent early Power management: is used by base to put receiver to sleep state or take it out of sleep state More: indicate sender has more frames to send W: indicates that frame body has been encrypted using wired equivalent privacy O: tells receiver that a sequence of frames with this bits on must be processed strictly in order uration: tells how long frame and its AK will occupy the channel Address: two addresses are for source and destination for inside cell traffic and the other two for source and destination for intercell traffic Sequence: allows fragments to be numbered, 12 bits identify frame and 4 bits identify fragment 92

802.11 Services IEEE 802.11 standard requires each conformant wireless LAN must provide 9 services: five distributed services and four station services istributed services: relate to managing cell membership and interacting with users outside cell Association: used by mobiles to connect to base. When a mobile moves into a new cell, it announces its identity and capability. The base may then accept or reject it isassociation: mobile or base may disassociate. Mobile uses this service before shutting down or leaving, and base may also use it before going down for maintenance Reassociation: mobile may use this service to change its preferred base station. This is useful e.g. when moving across cell boundary istribution: determines how to route frames sent to base. For local destination, frames can be sent out directly over air, otherwise, they have to be forward to wired network Integration: translates from 802.11 format to non-802.11 format required by destination network Station services: related to activity within a single cell Authentication: user must be authenticated before it is permitted to send data. After mobile is associated with a base, authentication process is carried out eauthentication: when a previous authenticated user wants to leave, it is deauthenticated Privacy: manages encryption and decryption ata delivery: provides means of transmitting and receiving data. 802.11 does not guarantee to be reliable, and higher layer must deal with error detection and correction 93

Summary FI, timed token ring, MA protocol and frame structure, how it differs from 802.5 token ring Multiple access technique overview: FMA or WMA, TMA, MA, SMA WMA LAN: how MA protocol works igital cellular network, GSM control channels and call set up Wireless LANs: hidden station and exposed station problems, multiple access with collision avoidance Wireless LANs IEEE 802.11 MA protocol, frame structure and services 94