Unit 3 Part II

You might also like

Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 39

Unit 3

IEEE 802.1

 IEEE 802.1 handles the architecture, security, management and internetworking


of local area networks (LAN), metropolitan area networks (MAN) and wide area
networks (WAN) standardized by IEEE 802.
 The following are key IEEE 802.1 tasks:

 Designs and implements standards that regulate network management practices


 Provides services, including LAN/MAN management, media access control
(MAC) bridging, data encryption/encoding and network traffic management
 IEEE 802.1 is comprised of four groups that focus on different standards and
policies in the following areas:
Internetworking
 Audio/video (A/V) bridging
 Data center bridging
 Security
IEEE 802:

 IEEE 802 is a collection of networking standards that cover the physical and data-
link layer specifications for technologies such as Ethernet and wireless.
 These specifications apply to local area networks (LAN) and metropolitan area
networks (MAN).
 The family of standards is developed and maintained by the IEEE 802 LAN/MAN
Standards Committee, also called the LMSC.
IEEE 802.2

 IEEE 802.2 is the original name of the ISO/IEC 8802-2 standard which


defines logical link control (LLC) as the upper portion of the data link layer of
the OSI Model. 
 LLC is a software component that provides a uniform interface to the user of the
data link service, usually the network layer. LLC may offer three types of
services:
 Unacknowledged connectionless mode services (mandatory)
 Connection mode services (optional).
 Acknowledged connectionless mode services (optional).
IEEE 802.3

 IEEE 802.3 is defined at the physical layer and data link layer's media access


control (MAC) of wired Ethernet. 
 802.3 is a technology that supports the IEEE 802.1 network architecture.
 802.3 also defines LAN access method using CSMA/CD.
CSMA Mechanism:
 CSMA is a mechanism that senses the state of the shared channel to prevent or
recover data packets from a collision.
 It is also used to control the flow of data packets over the network so that the packets
are not get lost, and data integrity is maintained. 
 Therefore we need to sense the channel before transmitting data packets on a network.
 It is divided into two parts, CSMA CA (Collision Avoidance) and CSMA
CD (Collision Detection).
CSMA/CD
 This protocol is used to detect a collision in the media access control (MAC) layer. 
CSMA/CA

  It is a network protocol that uses to avoid a collision rather than allowing it to
occur, and it does not deal with the recovery of packets after a collision.
 Operates in the MAC layer.
IEEE 802.4(Token Bus):
 IEEE 802.4 uses Token Bus Protocol.
 Token bus is a network implementing a Token Ring protocol over a virtual ring on a 
coaxial cable.
 The physical media has a bus or a tree topology and uses coaxial cables.
Frame Format of Token Bus
IEEE 802.5 (Token Ring):
 Token ring (IEEE 802.5) is a communication protocol in a local area network (LAN)
where all stations are connected in a ring topology and pass one or more tokens for
channel acquisition.
  A token is a special frame of 3 bytes that circulates along the ring of stations. A
station can send data frames only if it holds a token.
Token Ring Mechanism:
IEEE 802.11
 IEEE 802.11 is part of the IEEE 802 set of local area network (LAN) technical standards,
and specifies the set of medium access control (MAC) and physical layer (PHY) protocols
for implementing wireless local area network (WLAN) computer communication.
 802.11 defines standards for Wifi.
Components of IEEE 802.11 Architecture:

 Stations (STA)
 Basic Service Set (BSS)
 Extended Service Set (ESS)
 Distribution Set (DS)
MAC Sub-layer:

 The 802.11 MAC sublayer provides an abstraction of the physical layer to the
logical link control sublayer and upper layers of the OSI network. It is responsible
for encapsulating frames and describing frame formats.
 IEEE 802.11 defines two MAC sub-layers :-
 Distributed Coordination Function (DCF) –
DCF uses CSMA/CA as access method as wireless LAN can’t implement
CSMA/CD. It only offers asynchronous service.
 Point Coordination Function (PCF) –
PCP is implemented on top of DCF and mostly used for time-service
transmission. It uses a centralized, contention-free polling access method. It offers
both asynchronous and time-bounded service.
Bluetooth:
 Bluetooth is a Wireless Personal Area Network (WPAN) technology and is used for
exchanging data over smaller distances.
 It operates in the ISM band at 2.4 GHz to 2.485 GHz.
 Maximum devices that can be connected at the same time are 7.
  Bluetooth ranges upto 10 meters.
  It provides data rates upto 1 Mbps or 3 Mbps
Bluetooth Architecture:

 The architecture of Bluetooth defines two types of Network


 Piconet
 Scatternet
Piconet and Scatternet:

 Piconet is a type of bluetooth network that contains one primary node called


master node and seven active secondary nodes called slave nodes. 

 It is formed by using various piconets. A slave that is present in one piconet can


be act as master or we can say primary in other piconet.
Mobile Technologies:

 1G
 2G
 3G
 4G
 5G
1G:

 First generation of wireless telephone technology.


 Came into existence between 1987-1991
 1G systems the audio was encoded as analog radio signals 
Disadvantages of 1G:

 Poor voice quality


 Poor battery life
 Large phone size
 No security
 Limited capacity
 Poor reliability
2G:

 Came into existence between 1991-2001


 First Wireless digital transmission came with 2G in 1991.
 2G was developed, primarily, to transfer voice, fax, MMS and SMS services.
  Data transfer on top of voice at a speed of 30-35 kbps.
 2.5G
 2.75G
Disadvantages of 2G:

 Required strong digital signals to help mobile phones work. If there was no
network coverage, digital signals weakened.
 Systems were unable to handle complex data like videos.
 As the generation moved towards 3G, the user requirement was too complex for
2G to satisfy.
3G
 Came into existence in 2001-2009.
 Speed was 2 Mbps for stationary devices and 384 Kbps in mobile phones. 
 3G introduced media streaming.
 Multimedia, navigation, mobile apps, browsers, conference calls, mobile TV.
Disadvantages of 3G:

 Messy Architecture
 Cost of upgrading to 3G device was too high
 Power consumption was high
4G
 Came into existence from 2010-2019.
 Mobile multimedia
 4G LTE (Long Term Evolution) was a complete redesign and simplification of 3G
network architecture.
 4G VoLTE.
 Provided Bandwidth of 200 Mbps.
Drawbacks of 4G
 4G LTE network needs complex hardware
 4G technology use many antennae & transmitters resulting in poor battery life.
 In areas without 4G coverage, consumers downgraded to 3G while still paying the
cost of 4G.
 Higher Data consumption
5G

 5G Era : 2019 and Beyond


 Data speeds of up to 35Gbps.
 5G provided faster data rates, higher connection density, much lower latency,
among other improvements.
 5G Technology used millimetre wave (mmWave) radio spectrum.
Use cases of 5G:

 Enabling reliable wireless IoT connectivity at transport hubs


 Essential to the future autonomous vehicles with V2X & smart logistics
 For closer collaborations at the workplace using real time insights.
 Bringing immersive, virtual customized shopping experiences anywhere to the
consumer.
 Driving the next industrial revolution with flexible manufacturing with smart
surveillance, real time supply chain visibility using blockchain & predictive
maintenance.
 With real-time asset tracking and efficient delivery using drones.

You might also like