Medium Access Control Protocols, Local Area Networks, and Wireless Local Area Networks Lecture Note 10.

Slides:



Advertisements
Similar presentations
Channel Allocation Protocols. Dynamic Channel Allocation Parameters Station Model. –N independent stations, each acting as a Poisson Process for the purpose.
Advertisements

The ALOHA Protocol “Free for all”: whenever station has a frame to send, it does so. –Station listens for maximum RTT for an ACK. –If no ACK after a specified.
EECC694 - Shaaban #1 lec #5 Spring Data Link In Broadcast Networks: The Media Access Sublayer Broadcast networks with multi-access (or random.
Fundamentals of Computer Networks ECE 478/578
Lecture 9: Multiple Access Protocols
Communication Networks Lecture 5 NETW 501-L5: NETW 501-L5: Medium Access Control Dr.-Ing. Khaled Shawky Hassan Room: C3-222, ext: 1204,
1 K. Salah Module 4.2: Media Access Control The Media Access Control (MAC) sublayer –Random Access (CSMA), IEEE –Token Passing, IEEE Ch 13-
Distributed systems Module 1 -Basic networking Teaching unit 1 – LAN standards Ernesto Damiani University of Bozen-Bolzano Lesson 2 – LAN Medium Access.
1 ELEN602 Lecture 10 Review of last lecture –M/G/1 and M/D/1 Results Multi-access Networks Medium Access Control –ALOHA –Slotted ALOHA.
1 Pertemuan 13 Teknik Akses Jaringan - Random Matakuliah: H0174/Jaringan Komputer Tahun: 2006 Versi: 1/0.
MAC Protocols Media Access Control (who gets the use the channel) zContention-based yALOHA and Slotted ALOHA. yCSMA. yCSMA/CD. TDM and FDM are inefficient.
CS 5253 Workshop 1 MAC Protocol and Traffic Model.
CMPE 150- Introduction to Computer Networks 1 CMPE 150 Fall 2005 Lecture 17 Introduction to Computer Networks.
Copyright © 2003, Dr. Dharma P. Agrawal and Dr. Qing-An Zeng. All rights reserved. 1 Chapter 6 Multiple Radio Access.
Teknik Akses Jaringan Carrier Sense Pertemuan 12 Matakuliah: H0484/Jaringan Komputer Tahun: 2007.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Chapter 13 Multiple Access.
CMPE 150- Introduction to Computer Networks 1 CMPE 150 Fall 2005 Lecture 16 Introduction to Computer Networks.
EEC-484/584 Computer Networks Lecture 13 Wenbing Zhao
EEC-484/584 Computer Networks Lecture 9 Wenbing Zhao (Part of the slides are based on materials supplied by Dr. Louise Moser at UCSB and.
Studying Local Area Networks Via Media Access Control (MAC) SubLayer
What is the difference between random access and scheduling?
CS 5253 Workshop 1 MAC Protocol and Traffic Model.
Networks: Local Area Networks1 LANs Studying Local Area Networks Via Media Access Control (MAC) SubLayer.
Computer Networks: Local Area Networks 1 LANs Studying Local Area Networks via the Media Access Control (MAC) SubLayer.
Semester EEE449 Computer Networks The Data Link Layer Part 2: Media Access Control En. Mohd Nazri Mahmud MPhil (Cambridge, UK) BEng (Essex,
Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011 The Medium Access Control Sublayer Chapter.
Medium Access Control Sublayer
Shashank Srivastava Motilal Nehru National Institute Of Technology, Allahabad Medium Access Control.
1 LAN & MAC (Medium Access Control) protocols Two basic types of networks: –Switched networks: transmission lines, multiplexers, and switches; routing,
1 ECE453 – Introduction to Computer Networks Lecture 7 – Multiple Access Control (I)
Multiple Access Protocols Chapter 6 of Hiroshi Harada Book
Wireless Application Protocol
CIS 725 Media Access Layer. Medium Access Control Sublayer MAC sublayer resides between physical and data link layer Broadcast/multiacess channels N independent.
McGraw-Hill © The McGraw-Hill Companies, Inc., 2004 Chapter 12 Multiple Access Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction.
Chi-Cheng Lin, Winona State University CS412 Introduction to Computer Networking & Telecommunication Medium Access Control Sublayer.
Chapter 4: Medium Access Control (MAC) Sublayer
LECTURE9 NET301. DYNAMIC MAC PROTOCOL: CONTENTION PROTOCOL Carrier Sense Multiple Access (CSMA): A protocol in which a node verifies the absence of other.
LOCAL AREA NETWORKS. CSMA Carrier Sense Multiple Access To minimize the chance of collision and, therefore, increase the performance, the CSMA method.
Chi-Cheng Lin, Winona State University CS 313 Introduction to Computer Networking & Telecommunication Medium Access Control Sublayer.
جلسه یازدهم شبکه های کامپیوتری به نــــــــــــام خدا.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2000 Unit-II Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
4: DataLink Layer1 Multiple Access Links and Protocols Three types of “links”: r point-to-point (single wire, e.g. PPP, SLIP) r broadcast (shared wire.
LOCAL AREA NETWORKS. CSMA/CD Carrier Sense Multiple Access with Collision Detection The CSMA method does not specify the procedure following a collision.
Medium Access Control Sub Layer
Multiple Access.
Data Communications, Kwangwoon University12-1 Chapter 12. Multiple Access 1.Random Access 2.Controlled Access 3.Channelization.
1 Kyung Hee University Chapter 12 Multiple Access.
Chapter 6 Multiple Radio Access
Medium Access Control Protocols, Local Area Networks, and Wireless Local Area Networks Lecture Note 9.
Ch 12. Multiple Access. Multiple Access for Shared Link Dedicated link – Point-to-point connection is sufficient Shared link – Link is not dedicated –
Background of Ad hoc Wireless Networks Student Presentations Wireless Communication Technology and Research Ad hoc Routing and Mobile IP and Mobility Wireless.
LECTURE9 NET301 11/5/2015Lect 9 NET DYNAMIC MAC PROTOCOL: CONTENTION PROTOCOL Carrier Sense Multiple Access (CSMA): A protocol in which a node verifies.
ECEN 621, Prof. Xi Zhang ECEN “ Mobile Wireless Networking” Course Materials: Papers, Reference Texts: Bertsekas/Gallager, Stuber, Stallings, etc.
EE 122: Lecture 6 Ion Stoica September 13, 2001 (* this talk is based in part on the on-line slides of J. Kurose & K. Rose)
實驗三 媒體存取協定模擬 教師: 助教: 1998/10/19 High Speed Network Lab. Department of Computer Information Science, NCTU.
Carrier Sense Multiple Access Improve ALOHA by using carrier sense –Stations listen to the carrier before transmitting –If channel is busy, the station.
Tel Hai Academic College Department of Computer Science Prof. Reuven Aviv Markov Models for Access Control in Computer Networks Resource: Fayez Gebali,
COMPUTER NETWORKS Data-link Layer (The Medium Access Control Sublayer) MAC Sublayer.
Multiple Access By, B. R. Chandavarkar, CSE Dept., NITK, Surathkal Ref: B. A. Forouzan, 5 th Edition.
ECEN “Mobile Wireless Networking”
MEDIUM ACCESS CONTROL PROTOCOL
Lab 7 – CSMA/CD (Data Link Layer Layer)
Multiple Access Mahesh Jangid Assistant Professor JVW University.
Net301 lecture9 11/5/2015 Lect 9 NET301.
Services of DLL Framing Link access Reliable delivery
Communication Networks NETW 501
CSE 313 Data Communication
CARRIER SENSE MULTIPLE ACCESS (CSMA)
Chapter 6 Multiple Radio Access.
Multiple Access Control (MAC) Protocols
Presentation transcript:

Medium Access Control Protocols, Local Area Networks, and Wireless Local Area Networks Lecture Note 10

Medium Access Control Protocols and Local Area Networks Part I: Medium Access Control Part II: Local Area Networks Part III: Wireless Local Area Networks

Medium Access Control Protocols, Local Area Networks, and Wireless Local Area Networks Medium Access Control Protocol: Slotted ALOHA: Throughput/Delay Performance Modeling and Analysis

Slotted ALOHA  Time is slotted in X seconds slots  Stations synchronized to frame times  Stations transmit frames in first slot after frame arrival  Backoff intervals in multiples of slots t (k+1)X kX t 0 +X+2t prop + B Vulnerable period Time-out Backoff period B t 0 +X+2t prop Only frames that arrive during prior X seconds collide

Throughput of Slotted ALOHA Ge -G Ge -2G G S

Application of Slotted Aloha  Reservation protocol allows a large number of stations with infrequent traffic to reserve slots to transmit their frames in future cycles  Each cycle has mini-slots allocated for making reservations  Stations use slotted Aloha during mini-slots to request slots cycle X-second slot Reservation mini-slots...

Carrier Sensing Multiple Access (CSMA) A Station A begins transmission at t = 0 A Station A captures channel at t = t prop  A station senses the channel before it starts transmission  If busy, either wait or schedule backoff (different options)  If idle, start transmission  Vulnerable period is reduced to t prop (due to channel capture effect)  When collisions occur they involve entire frame transmission times  If t prop >X (or if a>1), no gain compared to ALOHA or slotted ALOHA

 Transmitter behavior when busy channel is sensed  1-persistent CSMA (most greedy)  Start transmission as soon as the channel becomes idle  Low delay and low efficiency  Non-persistent CSMA (least greedy)  Wait a backoff period, then sense carrier again  High delay and high efficiency  p-persistent CSMA (adjustable greedy)  Wait till channel becomes idle, transmit with prob. p; or wait one mini-slot time & re-sense with probability 1-p  Delay and efficiency can be balanced CSMA Options Sensing

S G a  0.01 a = 0.1 a = 1 1-Persistent CSMA Throughput  Better than Aloha & slotted Aloha for small a  Worse than Aloha for a > 1

S G a = 0.01 Non-Persistent CSMA Throughput a = 0.1 a = 1  Higher maximum throughput than 1- persistent for small a  Worse than Aloha for a > 1

CSMA with Collision Detection (CSMA/CD)  Monitor for collisions & abort transmission  Stations with frames to send, first do carrier sensing  After beginning transmissions, stations continue listening to the medium to detect collisions  If collisions detected, all stations involved stop transmission, reschedule random backoff times, and try again at scheduled times  In CSMA collisions result in wastage of X seconds spent transmitting an entire frame  CSMA-CD reduces wastage to time to detect collision and abort transmission

CSMA/CD reaction time It takes 2 t prop to find out if channel has been captured A begins to transmit at t = 0 A B B begins to transmit at t = t prop -  ; B detects collision at t = t prop A B A B A detects collision at t= 2 t prop - 