You are on page 1of 10

ASSIGNMENT-2

1. HIPERLAN (High-Performance Local Area Network)


Part of ETSI( European Telecommunication Standard Institution) BRAN (Broadband Radio
Access
Operational Frequency: 5.2 GHz
Currently Available data rate : up to 54Mbps: HIPERLAN/2

Requirements
Core network independent with QoS support for real time services
(VoIP, Video) Support of IP transporting networks, ATM networks, 3 rd Generation, Fire ,wire,
etc. Packet network on connection-oriented wireless link
Radio access network specifications (physical layer, data link control layer and convergence
layer) Interoperability standard with conformance test specifications
No frequency planning Dynamic Frequency Selection
Capable of handling different interference and propagation situations Link Adaptation with
multiple modulation and channel coding schemes Supporting asymmetrical traffic load
fluctuating in uplink and downlink as well as for different users
A cellular multi-cell radio network capable of offering access,switching and management
functions within a large coverage area A point-to-multipoint topology with mandatory
centralized modeand optional direct mode
Mobility management

Power management
Uplink power control, downlink power setting, sleep mode
Usage in indoor and outdoor environments
Multicast and broadcast
Scalable security
Different key encryption: 56 bit and 168 bit
Authentication: Optional pre-shared or public key
Spectrum Allocation at 5 GHz
MAC layer supports both asynchronous and synchronous (time bound) applications
Interactive multimedia services
High quality video distribution
Client-Server applications
HIPERLAN/1 Was a best-effort delivery system
HIPERLAN/2
Provides QoS guarantees and supports mobility up to 10 m/s
Uses a variant of CSMA/CA called Elimination Yield-Non Preemptive Priority Multiple
Access (EY-NPMA)
Features of HIPERLAN
MAC supports centralized mode (CM) (APs) and direct mode (DM) (ad-hoc)
Ad-hoc mode assumes single cell area
For multi hop HIPERLANs (nodes outside radio range), some nodes become forwarder
Radio Cells need to overlap to implement forwarding mechanism
Forwarders buffer packets
Mobility may create fragmented LANs. They need to remerge
Functions of Convergence Layer
Adapts services request from higher layers to the service offered by DLC
Coverts higher layer packets (Fixed or variable lengths) to fixed length SDUs at
DLC

2. Logical link control and adaptation protocol (L2CAP)


L2CAP is used within the Bluetooth protocol stack. It passes packets to either the Host
Controller Interface (HCI) or on a hostless system, directly to the ACL/ASB/PSB link.
L2CAP's functions include:

Transporting data for higher layer protocols, including multiplexing multiple applications
over a single link.

Segmentation and reassembly of packets.

Providing one-way transmission management of multicast data to a group of other


Bluetooth devices.

Quality of service (QoS) management for higher layer protocols.

It is channel-based, and control commands are sent on channel 0x0001. This signaling channel is
available as soon as the default ACL-U logical link has been set up, and is used to set up
additional channels. L2CAP channels can be connection-oriented or group-oriented, and are
transported by ACL in the former case, or by ASB or PSB in the latter.
In basic mode, L2CAP provides packets with a payload configurable up to 64 kB, with 672 bytes
as the default maximum transmission unit (MTU), and 48 bytes as the minimum mandatory
supported MTU. In retransmission and flow control modes, L2CAP can be configured for
reliable or asynchronous data per channel by performing retransmissions and CRC checks.
Reliability in either of these modes is optionally and/or additionally guaranteed by the lower
layer Bluetooth BDR/EDR air interface by configuring the number of retransmissions and flush

timeout (time after which the radio will flush packets). In-order sequencing is guaranteed by the
lower layer.
Maximum transmission unit
In computer networking, the maximum transmission unit (MTU) of a communications
protocol of a layer is the size (in bytes or octets) of the largest protocol data unit that the layer
can pass onwards. MTU parameters usually appear in association with a communications
interface . Standards (Ethernet, for example) can fix the size of an MTU; or systems (such as
point-to-point serial links) may decide MTU at connect time.
A larger MTU brings greater efficiency because each network packet carries more user data
while protocol overheads, such as headers or underlying per-packet delays, remain fixed; the
resulting higher efficiency means an improvement in bulk protocol throughput. A larger MTU
also means processing of fewer packets for the same amount of data. In some systems, perpacket-processing can be a critical performance limitation.
However, this gain is not without a downside. Large packets occupy a slow link for more time
than a smaller packet, causing greater delays to subsequent packets, and increasing lag and
minimum latency. For example, a 1500-byte packet, the largest allowed by Ethernet at the
network layer (and hence over most of the Internet), ties up a 14.4k modem for about one
second.
Large packets are also problematic in the presence of communications errors. Corruption of a
single bit in a packet requires that the entire packet be retransmitted. At a given bit error rate,
larger packets are more likely to be corrupt. Their greater payload makes retransmissions of
larger packets take longer. Despite the negative effects on retransmission duration, large packets
can still have a net positive effect on end-to-end TCP performance
L2CAP Functional Requirements
Protocol Multiplexing
L2CAP must support protocol multiplexing because the Baseband Protocol does not support
any type field identifying the higher layer protocol being multiplexed above it. L2CAP must be
able to distinguish between upper layer protocols such as the Service Discovery Protocol,
RFCOMM, and Telephony Control.
Segmentation & Reassembly
Compared to other wired physical media, the data packets defined by the Baseband
Protocol are limited in size. Exporting a maximum transmission unit (MTU) associated with the
largest Baseband payload (341 bytes for DH5 packets) limits the efficient use of bandwidth for
higher layer protocols that are designed to use larger packets. Large L2CAP packets must be

segmented into multiple smaller Baseband packets prior to their transmission over the air.
Similarly, multiple received Baseband packets may be reassembled into a single larger L2CAP
packet following a simple integrity check. The Segmentation and Reassembly (SAR)
functionality is absolutely necessary to support protocols using packets larger than those
supported by the Baseband.
Quality of Service
The L2CAP connection establishment process allows the exchange of information regarding
the quality of service (QoS) expected between two Bluetooth units. Each L2CAP implementation
must monitor the resources used by the protocol and ensure that QoS contracts are honored.
Groups
Many protocols include the concept of a group of addresses. The Baseband Protocol supports
the concept of a piconet, a group of devices synchronously hopping together using the same
clock. The L2CAP group abstraction permits implementations to efficiently map protocol groups
on to piconets. Without a group abstraction, higher level protocols would need to be exposed to
the Baseband Protocol and Link Manager functionality in order to manage groups efficiently.

L2CAP General Operation


Channel Identifiers
Channel identifiers (CIDs) are local names representing a logical channel end-point on the
device. Implementations are free to manage the CIDs in a manner best suited for that particular
implementation, with the provision that the same CID is not reused as a local L2CAP channel
endpoint for multiple simultaneous L2CAP channels between a local device and some remote
device.
CID assignment is relative to a particular device and a device can assign CIDs independently
from other devices (with the exception of certain reserved CIDs, such as the signaling channel).
Thus, even if the same CID value has been assigned to (remote) channel endpoints by several
remote devices connected to a single local device, the local device can still uniquely associate
each remote CID with a different device.
Operation between Devices
The connection-oriented data channels represent a connection between two devices, where a
CID identifies each endpoint of the channel. The connectionless channels restrict data flow to a
single direction. These channels are used to support a channel group where the CID on the
source represents one or more remote devices. There are also a number of CIDs reserved for
special purposes. The signaling channel is one example of a reserved channel. This channel is
used to create and establish connection-oriented data channels and to negotiate changes in the

characteristics of these channels. Support for a signaling channel within an L2CAP entity is
mandatory. Another CID is reserved for all incoming connectionless data traffic.
Operation between Layers
L2CAP implementations follow the general architecture described here:

L2CAP implementations must transfer data between higher layer protocols and the lower
layer protocol.

Each implementation must also support a set of signaling commands for use between
L2CAP implementations.

L2CAP implementations should also be prepared to accept certain types of events from
lower layers and generate events to upper layers. How these events are passed between
layers is an implementation-dependent process.

Segmentation & Reassembly


Segmentation and reassembly (SAR) operations are used to improve efficiency by supporting
a maximum transmission unit (MTU) size larger than the largest Baseband packet. This reduces
overhead by spreading the network and transport packets used by higher layer protocols over
several Baseband packets. All L2CAP packets may be segmented for transfer over Baseband
packets. The protocol does not perform any segmentation and reassembly operations but the
packet format supports adaptation to smaller physical frame sizes.
An L2CAP implementation exposes the outgoing (i.e., the remote hosts receiving) MTU and
segments higher layer packets into chunks that can be passed to the Link Manager via the Host
Controller Interface (HCI), whenever one exists. On the receiving side, an L2CAP
implementation receives chunks from the HCI and reassembles those chunks into L2CAP
packets using information provided through the HCI and from the packet header.
Metropolitan Area Network
A Metropolitan Area Network (MAN) is a large computer network on the large
geographical area that include several buildings or even the entire city (metropolis). The
geographical area of the MAN is larger than LAN, but smaller than WAN. MAN includes many
communicating devices and provides the Internet connectivity for the LANs in the metropolitan
area.
MAN is used to combine into a network group located in different buildings into a single
network. The diameter of such a network can range from 5 to 50 kilometers. As a rule, MAN
does not belong to any particular organization, in most cases, a group of users or a provider who
takes charge for the service own its connecting elements and other equipment. Level of service is
agreed in advance and some warranties are discussed. MAN often acts as a high-speed network
to allow sharing regional resources (like a big LAN). It is also often used to provide public

available connection to other networks using a WAN connection. There are many ways of
classifying networks. The main criterion for classification is considering the administration
method. That is, depending on how the network is organized and how it is controlled, it can be
attributed to local or distributed, metropolitan or WAN. or her A network administrator manages
a network or its segment. Administration team activities are logged, and their rights and
responsibilities are strictly divided if the network is complex. Computers can be connected using
a variety of media access controllers: a twisted pair, optical conductors (optical cables) and via
radio (wireless technology). Wired optical connections are usually established via Ethernet,
wireless - through Wi-Fi, Bluetooth, GPRS and other protocols. Private LAN may be linked to
other local area networks through gateways, as well as being part of a global computer network
(eg, the Internet), or have a connection to it.
Computer and Networks Area for Concept Draw PRO provides professional looking
examples, the libraries with ready-to-use predesigned vector stencils to help you create anyone
computer network diagrams quick, easy and effective.

Example : Metropolitan area networks (MAN)

Routing:
A router is a networking device that forwards data packets between computer networks. Routers
perform the traffic directing functions on the Internet. A data packet is typically forwarded from

one router to another through the networks that constitute the internet work until it reaches its
destination node.
A router is connected to two or more data lines from different networks. When a data packet
comes in on one of the lines, the router reads the address information in the packet to determine
the ultimate destination. Then, using information in its routing table or routing policy, it directs
the packet to the next network on its journey. This creates an overlay internetwork.
The most familiar type of routers are home and small office routers that simply pass IP packets
between the home computers and the Internet. An example of a router would be the owner's
cable or DSL router, which connects to the Internet through an Internet service provider (ISP).
More sophisticated routers, such as enterprise routers, connect large business or ISP networks up
to the powerful core routers that forward data at high speed along the optical fiber lines of the
Internet backbone. Though routers are typically dedicated hardware devices, software-based
routers also exist.

Applications
When multiple routers are used in interconnected networks, the routers exchange information
about destination addresses using a dynamic routing protocol. Each router builds up routing table
listing the preferred routes between any two systems on the interconnected networks.
A router has interfaces for different physical types of network connections, such as copper
cables, fibre optic, or wireless transmission. It also contains firmware for different networking
communications protocol standards. Each network interface uses this specialized computer
software to enable data packets to be forwarded from one protocol transmission system to
another.
Routers may also be used to connect two or more logical groups of computer devices known as
subnet matrix each with a different network matrix. The network prefixes recorded in the routing
table do not necessarily map directly to the physical interface connections.
A router has two stages of operation called planes

Control plane: A router maintains a routing table that lists which route should be used to
forward a data packet, and through which physical interface connection. It does this
using internal pre-configured directives, called static routes, or by learning routes using a
dynamic routing protocol. Static and dynamic routes are stored in the Routing
Information Base (RIB). The control-plane logic then strips non essential directives from
the RIB and builds a Forwarding Information Base (FIB) to be used by the forwardingplane.

Forwarding Plane: The router forwards data packets between incoming and outgoing
interface connections. It routes them to the correct network type using information that
the packet header contains. It uses data recorded in the routing table control plane.

Routers may provide connectivity within enterprises, between enterprises and the Internet, or
between internet service providers (ISPs) networks. The largest routers interconnect the various
ISPs, or may be used in large enterprise networks. Smaller routers usually provide connectivity
for typical home and office networks. Other networking solutions may be provided by a
backbone Wireless Distribution System (WDS), which avoids the costs of introducing
networking cables into buildings.
All sizes of routers may be found inside enterprises. The most powerful routers are usually found
in ISPs, academic and research facilities. Large businesses may also need more powerful routers
to cope with ever increasing demands of intranet data traffic. A three-layer model is in common
use, not all of which need be present in smaller network.

You might also like