data link layer and mac - alpen-adria-universität klagenfurt · data link layer and mac group...

Post on 28-Jul-2018

221 Views

Category:

Documents

0 Downloads

Preview:

Click to see full reader

TRANSCRIPT

Data link Layer and Mac

GROUP MEMBERS

MD. SARWAR ZAHAN(MATRIX:14614192)

SAZDOV(MATRIX: 1560657)

Agenda

• Introduction - Zahan

• Data link layer overview - Zahan

• Data link layer working example - Zahan

• Introduction of Mac- Sazdov

• Brief overview of Mac – Sazdov

• Conclusion- Sazdov

2

Why data link layer ?

3

• Reliable transmission of data frames between two nodes connected by a physical layer.

• The Data-Link layer ensures that an initial connection has been set up.

• Divides output data into data frames.

• Handles the acknowledgements from a receiver that the data arrived successfully.

How its work?

4

Data-link layer takes packets from Network Layer

and encapsulates them into Frames. Then, it sends

each frame bit-by-bit on the hardware. At receiver’

end, data link layer picks up signals from hardware

and assembles them into frames.

5

Data link layer taskAddressingData-link layer provides hardware addressing mechanism. Hardware address is assumed to be unique on the link. It is encoded into hardware at the time of manufacturing.SynchronizationWhen data frames are sent on the link, both machines must be synchronized in order to transfer to take place.Error ControlThese errors are detected and attempted to recover actual data bits. It also provides error reporting mechanism to the sender.Flow ControlStations on same link may have different speed or capacity. Data-link layer ensures flow control that enables both machine to exchange data on same speed.Multi-AccessData-link layer provides mechanism such as CSMA/CD to equip capability of accessing a shared media among multiple Systems.

6

Formatting Data for Transmission

When data travels on the media, it is converted into a stream of bits. If a node is receiving long streams of bits, how does it determine where a frame starts and stops or which bits represent the address?

7

Framing breaks the stream into decipherable groupings, with control information inserted in the header and trailer as values in different fields. This format gives the physical signals a structure that can be received by nodes and decoded into packets at the destination.

Farming and Example

Example:

(NIC), which inserts into the system bus of a computer and makes the connection between running software processes on the computer and physical media. Software associated with the NIC enables the NIC to perform its intermediary functions of preparing data for transmission and encoding the data as signals to be sent on the associated media.

8

Media Access Control(MAC)

The medium access control (MAC) layer is the lower sub layer of the data link layer of the seven-layer OSI model.

The MAC sub layer provides addressing and channel access control mechanisms that make it possible for

several terminals or network nodes to communicate within a multiple access network that incorporates a shared

medium in network

9

Media Access Control Method

MAC protocols are responsible for managing access to the shared communication medium

Which are:1. When a node accesses the shared medium2. Resolving conflicts of competing nodes

MAC ChallengesMedium access in wireless networks is difficult

1.Impossible to send and to receive at the same time (with a single transducer)

2.Interference situation at receiver is what counts for transmission success, but can be very different to what sender can observe

3.High error rates make establishment of well coordinated communication links difficult

10

MAC Protocol Classification

11

Contention‐Based Contention‐Based

ALOHA CSMAMACA

MACAW

MAC

FDMATDMACDMA

POLLING

Example of Mac protocol (ALOHA)

12

Aloha method, refers to a simple communications scheme. in which each source (transmitter) in a network sends data when ever there is a frame to send. If the frame successfully reaches the destination the next frame is sent. If the frame fails to be received at the destination, it is sent again.

Problem in Aloha:

If several nodes transmit during the same period, the messages interfere and are corrupted (“collision”).

Slotted Aloha

13

Time is divided into time slots of equal length.

Whenever a node has a message to transmit, it transmits in the next time slot.

If a destination receives a message properly, it transmits an ACK in the next time slot.

Conclusions

14

Wireless platforms are becoming less expensive and more powerful, enabling the promise of

widespread use for everything from health monitoring to military use.

As a result various MAC protocols with different objectives have been proposed for access the

medium. However low power MAC protocols have received a lot of consideration in wireless

sensor network for example: S MAC, B MAC etc. MAC protocol will continue update since

wireless technology is a leader of the today's communication.

top related