UNIT 2 Medium Access sub layer: Medium Access sub layer - Channel Allocations, LAN protocols - ALOHA protocols(PURE AND SLOTTED ALOHA),CSMA/CA,CSMA/CD.

Slides:



Advertisements
Similar presentations
Channel Allocation Protocols. Dynamic Channel Allocation Parameters Station Model. –N independent stations, each acting as a Poisson Process for the purpose.
Advertisements

EECC694 - Shaaban #1 lec #5 Spring Data Link In Broadcast Networks: The Media Access Sublayer Broadcast networks with multi-access (or random.
Ethernet – CSMA/CD Review
LECTURE 11 CT1303 LAN. DYNAMIC MAC PROTOCOL No fixed assignment for transmission media or any network resources.. It allows transmission when needed.
1 K. Salah Module 4.2: Media Access Control The Media Access Control (MAC) sublayer –Random Access (CSMA), IEEE –Token Passing, IEEE Ch 13-
5-1 Link Layer: Introduction Some terminology: r hosts and routers are nodes r communication channels that connect adjacent nodes along communication path.
MAC Protocols Media Access Control (who gets the use the channel) zContention-based yALOHA and Slotted ALOHA. yCSMA. yCSMA/CD. TDM and FDM are inefficient.
15 – Data link layer Chapter 5: The Data Link Layer Our goals: r understand principles behind data link layer services: m error detection, correction.
CS 5253 Workshop 1 MAC Protocol and Traffic Model.
CMPE 150- Introduction to Computer Networks 1 CMPE 150 Fall 2005 Lecture 17 Introduction to Computer Networks.
Chapter 14 LAN Systems Ethernet (CSMA/CD) ALOHA Slotted ALOHA CSMA
Copyright © 2003, Dr. Dharma P. Agrawal and Dr. Qing-An Zeng. All rights reserved. 1 Chapter 6 Multiple Radio Access.
EEC-484/584 Computer Networks Lecture 7 Wenbing Zhao
1 Link Layer Message M A B Problem: Given a message M at a node A consisting of several packets, how do you send the packets to a “neighbor” node B –Neighbor:
DataLink Layer session 1 TELE3118: Network Technologies Week 2: Data Link Layer Framing, Error Control, Multiple Access Some slides have been taken.
EE 4272Spring, 2003 Chapter 14 LAN Systems Ethernet (CSMA/CD)  ALOHA  Slotted ALOHA  CSMA  CSMA/CD Token Ring /FDDI Fiber Channel  Fiber Channel Protocol.
CMPE 150- Introduction to Computer Networks 1 CMPE 150 Fall 2005 Lecture 16 Introduction to Computer Networks.
EEC-484/584 Computer Networks Lecture 13 Wenbing Zhao
EEC-484/584 Computer Networks Lecture 9 Wenbing Zhao (Part of the slides are based on materials supplied by Dr. Louise Moser at UCSB and.
5: DataLink Layer5-1 Link Layer – Error Detection/Correction and MAC.
5: DataLink Layer5-1 Chapter 5 Link Layer and LANs Computer Networking: A Top Down Approach Featuring the Internet, 3 rd edition. Jim Kurose, Keith Ross.
Medium Access Control Sublayer
Lecture 16 Random Access protocols r A node transmits at random at full channel data rate R. r If two or more nodes “collide”, they retransmit at random.
1 ECE453 – Introduction to Computer Networks Lecture 7 – Multiple Access Control (I)
5: DataLink Layer5-1 Chapter 5 Link Layer and LANs Part 3: MAC Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley.
9/11/2015 5:55 AM1 Ethernet and CSMA/CD CSE 6590 Fall 2010.
CIS 725 Media Access Layer. Medium Access Control Sublayer MAC sublayer resides between physical and data link layer Broadcast/multiacess channels N independent.
1 Computer Communication & Networks Lecture 12 Datalink Layer: Multiple Access Waleed Ejaz
Chi-Cheng Lin, Winona State University CS412 Introduction to Computer Networking & Telecommunication Medium Access Control Sublayer.
4-1 Last time □ Link layer overview ♦ Services ♦ Adapters □ Error detection and correction ♦ Parity check ♦ Internet checksum ♦ CRC □ PPP ♦ Byte stuffing.
CSC4220/6220 Computer Networks
CHAPTER 4: THE MEDIUM ACCESS SUBLAYER 4.1: The Channel Allocation Problem 4.2: Multiple Access Protocols.
LECTURE9 NET301. DYNAMIC MAC PROTOCOL: CONTENTION PROTOCOL Carrier Sense Multiple Access (CSMA): A protocol in which a node verifies the absence of other.
© Janice Regan, CMPT 128, CMPT 371 Data Communications and Networking LANs 2: MAC protocols.
جلسه دهم شبکه های کامپیوتری به نــــــــــــام خدا.
Chapter 5 Link Layer Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 Link Layer multiple.
Medium Access Control NWEN302 Computer Network Design.
LAN technologies and network topology LANs and shared media Locality of reference Star, bus and ring topologies Medium access control protocols.
Chi-Cheng Lin, Winona State University CS 313 Introduction to Computer Networking & Telecommunication Medium Access Control Sublayer.
4: DataLink Layer1 Multiple Access Links and Protocols Three types of “links”: r point-to-point (single wire, e.g. PPP, SLIP) r broadcast (shared wire.
Medium Access Control Sub Layer
7-1 Introduction to Queueing Theory l Components of a queueing system n probability density function (pdf) of interarrival times n pdf of service times.
Chapter 6 Multiple Radio Access
5: DataLink Layer5-1 The Data Link Layer Chapter 5 Kurose and Ross Today 5.1 and 5.3.
Multiple Access Links and Protocols
CS3502: Data and Computer Networks Local Area Networks - 1 introduction and early broadcast protocols.
5: DataLink Layer 5a-1 Multiple Access protocol. 5: DataLink Layer 5a-2 Multiple Access Links and Protocols Three types of “links”: r point-to-point (single.
Ch 12. Multiple Access. Multiple Access for Shared Link Dedicated link – Point-to-point connection is sufficient Shared link – Link is not dedicated –
CS3502: Data and Computer Networks Local Area Networks - 1 introduction and early broadcast protocols.
LECTURE9 NET301 11/5/2015Lect 9 NET DYNAMIC MAC PROTOCOL: CONTENTION PROTOCOL Carrier Sense Multiple Access (CSMA): A protocol in which a node verifies.
1 Ethernet CSE 3213 Fall February Introduction Rapid changes in technology designs Broader use of LANs New schemes for high-speed LANs High-speed.
5: DataLink Layer5-1 Link Layer r 5.1 Introduction and services r 5.2 Error detection and correction r 5.3Multiple access protocols r 5.4 Link-layer Addressing.
Chapter 4 The Medum Access Sublayer. MA Sublayer Additional Reference –Local and Metropolitan Area Networks, William Stallings, Prentice Hall, 2000, 6th.
THE MEDIUM ACCESS CONTROL SUBLAYER 4.1 THE CHANNEL ALLOCATION PROBLEM 4.2 MULTIPLE ACCESS PROTOCOLS.
5: DataLink Layer5-1 Slotted ALOHA Assumptions r all frames same size r time is divided into equal size slots, time to transmit 1 frame r nodes start to.
COMPUTER NETWORKS Data-link Layer (The Medium Access Control Sublayer) MAC Sublayer.
Multiple Access By, B. R. Chandavarkar, CSE Dept., NITK, Surathkal Ref: B. A. Forouzan, 5 th Edition.
Chapter 5 Link Layer Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 A note on the use of these.
Week3 The Medium Access Sublayer
CT301 LECTURE 8.
Net301 lecture9 11/5/2015 Lect 9 NET301.
Services of DLL Framing Link access Reliable delivery
Multiple access.
2012 session 1 TELE3118: Network Technologies Week 2: Data Link Layer Framing, Error Control, Multiple Access Some slides have been taken from: Computer.
THE IEEE MAC SUB-LAYER – chapter 14
Overview Jaringan Komputer (3)
Link Layer and LANs Not everyone is meant to make a difference. But for me, the choice to lead an ordinary life is no longer an option 5: DataLink Layer.
Link Layer: Multiple Access
Chapter 6 Multiple Radio Access.
Dr. John P. Abraham Professor UTPA
Presentation transcript:

UNIT 2 Medium Access sub layer: Medium Access sub layer - Channel Allocations, LAN protocols - ALOHA protocols(PURE AND SLOTTED ALOHA),CSMA/CA,CSMA/CD - Overview of IEEE standards - FDDI. Data Link Layer - Elementary Data Link Protocols, Sliding Window protocols, Error Handling.

Medium Access sub layer (Introduction) A network of computers based on multi-access medium requires a protocol for effective sharing of the media. As only one node can send or transmit signal at a time using the broadcast mode, the main problem here is how different nodes get control of the medium to send data, that is “who goes next?”. The protocols used for this purpose are known as Medium Access Control (MAC) techniques. The key issues involved here are - Where and How the control is exercised. A centralized scheme has a number of advantages as mentioned below: Greater control to provide features like priority, overrides, and guaranteed bandwidth. Simpler logic at each node. Easy co-ordination.

Goals of MACs Medium Access Control techniques are designed with the following goals in mind 1.Initialisation 2.Fairness 3.Priority 4.Limitations to one station 5.Receipt 6.Error Limitation 7.Recovery 8.Reconfigurability 9.Compatibility 10.Reliability

Medium Access sub layer

MAC(Medium Access Control) Function: a. To perform the control of access to media b. It performs the unique addressing to stations directly connected to LAN. c. Detection of errors LLC(Logical Link Control) Function: a.Error recovery b.Flow control operation c.User addressing

MAC Techniques

Round Robin Techniques Each and every node is given the chance to send or transmit by rotation 1.Polling The message contains the address of the node being selected for granting access. No data =“poll reject” message send back

Round Robin Techniques 2. Token Passing All stations are logically connected in the form of a ring and control of the access to the medium is performed using a token. Token Ring Problems like lost token, duplicate token, and insertion of a node, removal of a node. Fig: A token ring network

The Channel Allocation Problem Static Channel Allocation in LANs and MANs Dynamic Channel Allocation in LANs and WANs

Static Channel Allocation in LANs and MANs FDM TDM Simple queuing theory - Processing Delay - Queuing Delay - Transmission Delay - Propagation Delay - Retransmission Delay Disadv. When the number of users is large and continuously varying, or the traffic is busy,FDM presents some problem

Static Channel Allocation in LANs and MANs A simple queuing theory calculation For a channel of capacity C bps, with an arrival rate of frames/sec, each frame having a length drawn from an exponential probablity density function with mean 1/  bits/frame, the mean time delay Now let us divide the single channel up into N independent subchannels, each with capacity C/N bps. The mean input rate on each of the subchannel will now be /N. Recomputing T, we get

Dynamic Channel Allocation Parameters Station Model. – N independent stations, each acting as a Poisson Process for the purpose protocol analysis Single Channel Assumption. – A single channel is available for all communication. Collision Assumption. – If transmitted frames overlap in time, the resulting signal is garbled. Transmission Discipline: – Continuous time Frames can be transmitted at any time – Slotted time Frames can be transmitted at particular time points Sensing capability: – Station cannot sense the channel before trying to use it. – Stations can tell if the channel is in use before trying to use it

ALOHA - Pure ALOHA - Slotted ALOHA Carrier Sense Multiple Access Protocols - CSMA/CD - CSMA/CA Collision-Free Protocols - Bitmap Protocol - Binary Countdown Limited-Contention Protocols Wavelength Division Multiple Access Protocols Wireless LAN Protocols Multiple Access Protocols

ALOHA PROTOCOL Transmission technology can be categorized into two categories :  Point-to point networks  Broadcast network s

Point-to-point networks Point-to-point networks are those in which when a message is sent from one computer to another, it usually has to be sent via other computers in the network. A point-to-point network consists of many connections between individual pairs of computers.

Broadcast networks Broadcast networks have a single communication channel that is shared by all the machines on the network. A packet sent by one computer is received by all the other computers on the network. The packets that are sent contain the address of the receiving computer; each computer checks this field to see if it matches its own address. If it does not then it is usually ignored; if it does then it is read. Broadcast channels are sometimes known as multi-access channel. Shared channel

Poisson Process The Poisson Process is a celebrated model used in Queuing Theory for “random arrivals”. Assumptions leading to this model include: – The probability of an arrival during a short time interval Δt is proportional to the length of the interval, and does not depend on the origin of the time interval (memory-less property) – The probability of having multiple arrivals during a short time interval Δt approaches zero.

Poisson Distribution The probability of having k arrivals during a time interval of length t is given by: where λ is the arrival rate. Note that this is a single- parameter model; all we have to know is λ.

5: DataLink Layer5-19 Slotted ALOHA Assumptions all frames same size time is divided into equal size slots, time to transmit 1 frame nodes start to transmit frames only at beginning of slots nodes are synchronized if 2 or more nodes transmit in slot, all nodes detect collision Operation when node obtains fresh frame, it transmits in next slot no collision, node can send new frame in next slot if collision, node retransmits frame in each subsequent slot with prob. p until success

5: DataLink Layer5-20 Slotted ALOHA Pros single active node can continuously transmit at full rate of channel highly decentralized: only slots in nodes need to be in sync simple Cons collisions, wasting slots idle slots nodes may be able to detect collision in less than time to transmit packet clock synchronization

5: DataLink Layer5-21 Slotted Aloha efficiency Suppose N nodes with many frames to send, each transmits in slot with probability p prob that node 1 has success in a slot = p(1- p) N-1 prob that any node has a success = Np(1-p) N-1 For max efficiency with N nodes, find p* that maximizes Np(1-p) N-1 For many nodes, take limit of Np*(1-p*) N-1 as N goes to infinity, gives 1/e =.37 Efficiency is the long-run fraction of successful slots when there are many nodes, each with many frames to send At best: channel used for useful transmissions 37% of time!

5: DataLink Layer5-22 Pure (unslotted) ALOHA unslotted Aloha: simpler, no synchronization when frame first arrives – transmit immediately collision probability increases: – frame sent at t 0 collides with other frames sent in [t 0 -1,t 0 +1]

5: DataLink Layer5-23 Pure Aloha efficiency P(success by given node) = P(node transmits). P(no other node transmits in [p 0 -1,p 0 ]. P(no other node transmits in [p 0 -1,p 0 ] = p. (1-p) N-1. (1-p) N-1 = p. (1-p) 2(N-1) … choosing optimum p and then letting n -> infty... = 1/(2e) =.18 Even worse !

5: DataLink Layer5-24 CSMA (Carrier Sense Multiple Access) CSMA: listen before transmit: If channel sensed idle: transmit entire frame If channel sensed busy, defer transmission Human analogy: don’t interrupt others!

Carrier Sense Multiple Access (CSMA) Additional assumption: – Each station is capable of sensing the medium to determine if another transmission is underway

1-persistent CSMA Station can transmit

1-persistent CSMA While there is a new frame A to send do 1.Check the medium 2.If the medium is busy, go to 1. 3.(medium idle) Send frame A and wait for ACK 4.If after some time ACK is not received (timer times out), wait a random amount of time and go to 1. End.

Non-persistent CSMA Station can transmit

Non-persistent CSMA While there is a new frame A to send DO 1.Check the medium 2.If the medium is busy, wait some time, and go to 1. 3.(medium idle) Send frame A and wait for ACK 4.If after some time ACK is not received (timer times out), wait a random amount of time and go to 1. End

p-persistent CSMA

While there is a new frame A to send do 1.Check the medium 2.If the medium is busy, go to 1. 3.(medium idle) With probability p send frame A and the go to 4, and probability (1- p) delay one time slot and go to 1. 4.If after some time ACK is not received (timer times out), wait a random amount of time and go to 1. End.

32 CSMA Summary Non-persistent: Transmit if idle Otherwise, delay, try again Constant or variable Delay Channel busy Ready 1-persistent: Transmit as soon as channel goes idle If collision, back off and try again Time p-persistent: Transmit as soon as channel goes idle with probability p Otherwise, delay one slot, repeat process CSMA persistence and backoff  Nonpersistent  1-persistent  p-persistent

Carrier Sense Multiple Access Protocols CSMA with collision detection (CSMA/CD) Abort a transmission as soon as they detect a collision. Quickly terminating damaged frames saves time and bandwidth. After a station detects a collision, it aborts its transmission, waits a random period of time, and then tries again, assuming that no other station has started transmitting in the meantime.

Contt. A conceptual model for CSMA/CD (How long should each slot be?)

5: DataLink Layer5-35 CSMA collisions collisions can still occur: propagation delay means two nodes may not hear each other’s transmission collision: entire packet transmission time wasted spatial layout of nodes note: role of distance & propagation delay in determining collision probability

CSMA/CA Identical to CSMA/CD but used when listening is not possible while transmitting Idle channel reservation is done by sending a short request message asking other nodes to defer transmission If collison is detected then, then random wait is used Wireless IEEE uses CSMA/CA with an RTS/CTS mechanism

Chapter 4 The Medium Access Sublayer 421 Multiple Access Protocols Carrier Sense Multiple Access Protocols For this reason we will model the contention interval as a slotted ALOHA system with slot width 2  (  is the end to end delay). On a 1-km long coaxial cable,  5  sec. It is important to realize that collision detection is an analog process. The station’s hardware must listen to the cable while it is transmitting. The signal encoding must allow collisions to be detected (e.g., a collision of two 0-volt signals may well be impossible to detect). For this reason, special encoding is commonly used.