StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

MAC Service Preservation - Case Study Example

Cite this document
Summary
The paper "MAC Service Preservation" states that the 802.11D standard is critical for uninterrupted network communication that may assist federal organizations, government organizations, army networks and businesses as well. The standard provides filtration capabilities…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER94.7% of users find it useful
MAC Service Preservation
Read Text Preview

Extract of sample "MAC Service Preservation"

802.11D Standard — The research discusses an overview for the 802.11D standard. Likewise, the features and limitations of this standard suchas MAC service, MAC service preservation, Frame filtration, frame disordering, transit an delay are thoroughly discussed. Index Terms – MAC, 802.11D, Frames I. 802.11D Standard 802.1D is standard associated with local area and metropolitan area networks. The 802.1D standard and all its types can be interconnected with each other by utilizing MAC bridges (1). Likewise, the local area network in bridged mode enables interconnected systems to be a singular local area network, in spite being attached on different local area networks on separate MAC addresses. The bridged MAC functions beneath the service boundary of the MAC, as it is visible to operational protocols after the boundary i.e. logical link control that is considered to be a partial layer or network layer (2). The existence of more than one MAC bridges will make a difference in Quality of Service (QoS) that is provisioned by the sub layer of MAC, as these configurations for operation of the MAC Bridge are not fully visible (4). Likewise, a local area network that is set to a bridged mode will provide (3): The connectivity of workstations linked to dissimilar local area networks configured with dissimilar MAC types An efficient increment associated with the physical extent along with the number of attachments that are allowed or the overall performance of the local area network Partitions on the physical layer of the local area network for administration and management issues Access authentication for the local area network Amplified accessibility for the MAC service for redefining configuration settings or network failure of associated components II. Support of the MAC Service The end users or the end systems receiving MAC service are connected to a bridged local area network that is in a connection less mode (5). The MAC service is mentioned in the ISO 15802-1 standard, as it is considered to be an abstraction for the number of services and functionalities for a number of precise MAC services. Likewise, it labels the exchange of users from source to destination from MA-UNITDATA requests and at the same time corresponds with MA-UNITDATA for indicating primitives that are assigned from the MAC wireless access points. Every request pertaining to MA-UNITDATA and indicating primitives incorporates four parameters i.e. source address, destination address, Priority and MAC service data unit (MSDU). For enhancing the MAC service availability for the end users along with the management of network support, MAC bridges need the following configuration (5): For provisioning redundant routes needs to be defined via end users to the continuous network availability for uninterrupted service in case of a component failure Routes that are defined from end users need to be predictive and configurable in case of continuous availability of the networking components There is a possibility that the MAC Bridge can deny the MAC services for authenticating and authorizing network devices The devices that are not authorized can be denied for accessing the bridged LAN, there is an exception for exchanging protocols that is essential for completing the authentication process III. MAC Service Preservation The provision of MAC service is possible by Bridged Local area network that is identical to the singular local area network (6). Within the given scenario: A bridge is not accessible directly from communicating end users excluding end station that is utilized for management, as frames that are exchanged to the end users are tagged with the MAC address associated with peers along with address field of the destination, as MAC address of the bridge is not tagged. All the available MAC addresses within the network needs to be distinctive There is no restriction by the configuration and topology for the MAC addresses of the end users IV. Service Maintenance Quality The service maintenance quality comprises of the following attributes: Availability of the Service Loss of frames Disordering of the flames Duplication of the frames Transit delay of the frames Lifetime of the frames Error rate of the frames not detected Maximum supported size of data unit Priority of the frames Throughput of the frames V. Frame Filtration The Information that is filtered cannot be altered or customized by utilizing this technique. In order to avoid unauthorized access into network the connection will contradict service and abandon the provided frames. In addition, the probability of availed service can be increased via production of active services, impediment in service condition that is caused by the connection problems. The unauthorized access may contain significant consequence such as, malfunction, elimination, or incorporation of any element in the network. The above described proceedings are termed as unexpected changes in a network. Moreover, the added element in operating system is a basic requirement in order to sustain the MAC services. However, the LAN Local Area Network limits the configuration and work as an independent service stipulation. VI. the MAC Service The individual LAN will also provide the same services as offered by The MAC Service through a Bridged Local Area Network LAN. As a result, the end users would not be able to connect via Bridge LAN however, for the managerial level the end users can avail these services. In addition, the transformation of frames among end users and peer end users can be accomplish by destination Address field only. In fact, the probability of utilizing MAC Address for the Bridge is almost zero. The uniqueness is the chief requirement for all the MAC Address for the networks. Moreover, the topology cannot control the MAC Addresses for the end users and can be configured all networks. VII. Frame disordering In The MAC Service (9.2 of ISO/IEC 15802-1) the amalgamation of address permits an insignificant rate of reorganizing of frames with a given user priority for a given combination of destination address and source address (10). The MA_UNITDATA assigned service primitives’ equivalent to MA_UNITDATA request primitives along with the identical proceedings are the same for the amalgamation of destination and source addresses. These services are accomplished on priority bases. The manipulation or replication of the frames is not allowed in the Bridge Forwarding procedure (9). The independent MAC can be connected through the Bridges and the connecting procedure contains manifolds that lead towards the destination station. In order to ensure that only one independent frame is used for bridge the source destination needs to operate the protocols. The manipulation and replication of Frames does not take place through ordinary operation. Moreover, the networks are configured by RSTP than there is an elevated chance of frames to be deployed and transmitted for the network. The frames that are waiting for the transmission can be accomplished through ports because the Bridge can take time to download. The manipulation and replication may occur there are less chances of reconfiguration. However, the regular network failure may lead the configuration towards the deprivation of the MAC service functionalities (7). There are a number of LAN protocols present such as, LLC Type 2, are considered as a significant frame that particularly maintain the Force Protocol Version parameter (8). Moreover, these parameters can be utilized for the onward timing of transmission of ports in order to minimize these manipulation or replication of frames. The replication and manipulation is discussed briefly in the RSTP. VIII. Frame transit delay The brand new changeable frames are now launched by The MAC Services. These frames will resist the delay timing and can be controlled by the kind of media and access control technique. The onwards time among the MA_UNITDATA.request in the frame transit delays is a new form of and is equivalent to MA_UNITDATA.indication primitive. The standards related to the onwards time are determined only if the on Service Data Units are that are effectively transmitted. In addition, the end users will receive the MAC Services in the form of conceptual interface. Therefore, the entire frame transformation is not achievable to indicate the onwards time. In fact, the possibility to estimate the media access is high and the transformation of frames and its functionalities can be calculated via transitional technique. The transitional technique for the above discussed case is suggested as Bridge. In addition, the time that is added by the Bridge is taken as the time that is used to receive a frame. After receiving the frame it is relayed in order to be measured by the system. The relayed procedure is known as FCS Frame Check Sequence. After completing the procedure the frames are checked and if any error is found then these frame are redundant. IX. Frame lifetime The transfer stoppage acknowledgement is provided by The MAC Service. The services are authorized via higher bound for the significant services and connection for the end user. The appropriate operations must be ensured in order to maximize the frame lifetime for the superior layer of protocols. The definition of Bridge is discussed relating the transit stoppage for the frames. Moreover, the MAC associate layer provides the information related to the Bridge does not contain any transit stoppage. This is include acknowledge by the significant frames and rejected frames by the bridge in order to lower the stoppage in all bridges. X. summary and conclusion The 802.11D standard is critical for uninterrupted network communication that may assist federal organizations, government organizations, army networks and businesses as well. The standard provides filtration capabilities that are enabled by the MAC bridging. References [1] AMAMOU, A., HADDADOU, K. and PUJOLLE, G., 2014. A TRILL-based multi-tenant data center network. Computer Networks, 68, pp. 35-53. [2] Ethernet Alliance Congratulates Elected IEEE 802.1 and 802.3 Working Group Chairs and Vice Chairs; Officer Appointments also Announced. 2010. M2PressWIRE, . [3] GORANSSON, P. and GREENLAW, R., 2007. Secure Roaming in 802.11 Networks. Amsterdam: Newnes/Elsevier. [4] PRASAD, A. and PRASAD, N., 2005. 802.11 WLANs and IP Networking : Security, QoS, and Mobility. Boston: Artech House [5] LEWIS, B.D. and DAVIS, P.T., 2004. Wireless Networks For Dummies. Wiley. [6] MAUFER, T., 2003. A Field Guide to Wireless LANs for Administrators and Power Users. Prentice Hall Professional Technical Reference [7] Network Safety. 2010. Cengage Learning. [8] DIGITAL, C.X., Hack Proofing your Wireless Network. [9] GARZIA, F., 2013. Handbook of Communications Security. WIT Press. [11] OHARA, B. and PETRICK, A., 2005. IEEE 802.11 Handbook: A Designers Companion. Wiley. Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“NETWORK ASSIGNMENT ABOUT 802.1D Example | Topics and Well Written Essays - 1750 words”, n.d.)
NETWORK ASSIGNMENT ABOUT 802.1D Example | Topics and Well Written Essays - 1750 words. Retrieved from https://studentshare.org/information-technology/1666008-network-assignment-about-8021d
(NETWORK ASSIGNMENT ABOUT 802.1D Example | Topics and Well Written Essays - 1750 Words)
NETWORK ASSIGNMENT ABOUT 802.1D Example | Topics and Well Written Essays - 1750 Words. https://studentshare.org/information-technology/1666008-network-assignment-about-8021d.
“NETWORK ASSIGNMENT ABOUT 802.1D Example | Topics and Well Written Essays - 1750 Words”, n.d. https://studentshare.org/information-technology/1666008-network-assignment-about-8021d.
  • Cited: 0 times

CHECK THESE SAMPLES OF MAC Service Preservation

Differences between Qualitative Research and Quantitative Research

There are two main forms of research that are being carried out currently in the field of research and development.... These are the qualitative and quantitative researches.... … Qualitative and quantitative researches are two different approaches that deal with each aspect of the concerned study in a different perspective....
7 Pages (1750 words) Essay

The Role of Support Processes in the Restaurant Business

The paper "The Role of Support Processes in the Restaurant Business" focuses on the significance of all the steps of the service delivery process the restaurant service providers must give proper attention - from the seating of the customers to the serving of food to final receipt payments.... hellip; Chiu and Lin (2004) stated that the service industries are the main components for the economic development of a country and they mostly provide services such as social and personal related, transportation, distribution, repair, advertising, finance and communication support for the manufacturing industries....
6 Pages (1500 words) Term Paper

Budget business PCs that run Vista

Since the introduction of Microsoft latest operating system Windows Vista,most of the PC buyer are forced to purchase the systems that run the Windows Vista.... he three giant PC vendors Dell,HP and Lenovo are also pushing towards Vista aggressively as Microsoft will stop allowing any vendors to preinstall Windows XP on new system… Nevertheless, still there are a number of high performances, inexpensive business PCs that come with both Windows Vista and Windows XP options....
2 Pages (500 words) Article

Optimizing Network Services

hellip; Delay and jitter are more difficult to manage since providing performance guarantees require complex stochastic conditioning of traffic flows between the service endpoints and along with the nodes end-route.... This report considers the merit, methodologies, and tradeoffs of implementing Quality of service (QoS) schemes across IP networks.... Discussion A comprehensive discussion of QoS needs to first provide a concise description of the broad topic of service quality handling in IP networks....
10 Pages (2500 words) Essay

Is Apple Inc the Most Innovation Organization

Its head office is in Cupertino of California but it excellently controls the entire globe with its inventive product lines iPad, iPod, iPhone, Apple TV, mac Computers and many others.... This research is being carried out to identify an innovative organization and provide a brief introduction to the chosen organization and its general industry context, and then justify the choice in the light of key innovation models, concepts, and theory… Its head office is in Cupertino of California but it excellently controls the entire globe with its inventive product lines iPad, iPod, This research will begin with the statement that Apple Inc is one of the most reputed American multinational organizations that develop and designs varied types of consumer electronics, personal computers, and computer software....
11 Pages (2750 words) Essay

The Concept of Networking

hellip; Generally, the concept of the 'Address Resolution Protocol' (ARP) and the 'Media Access Control' (mac) can be described in a correlated manner.... The main purpose of the ARP protocol is to map the 32-bit long IP address with the machine address (mac)  (Hewlett Packard Development Company, L....
9 Pages (2250 words) Essay

Reservation and Non Reservation Based Ad Hoc Networks

This paper "Reservation and Non Reservation Based Ad Hoc Networks" presents a reservation and non-reservation-based switching to makes sense in modern wireless ad hoc networks.... While conservative understanding in current ad hoc wireless networking investigates favoritism direction-finding system corresponding to the NRB switching....
9 Pages (2250 words) Term Paper

Why MAC Address Is Unique

… Medium Access Control (mac) is a protocol used to give the link layer of the data in the Ethernet Local Area Network while the WiFi mac layer is a protocol that allows the sender to avoid collisions of data and transmit small request to send packets Medium Access Control (mac) is a protocol used to give the link layer of the data in the Ethernet Local Area Network while the WiFi mac layer is a protocol that allows the sender to avoid collisions of data and transmit small request to send packets by using CSMA....
6 Pages (1500 words) Assignment
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us