COMPUTER NETWORKS Data-link Layer (The Medium Access Control Sublayer) MAC Sublayer.

Slides:



Advertisements
Similar presentations
Channel Allocation Protocols. Dynamic Channel Allocation Parameters Station Model. –N independent stations, each acting as a Poisson Process for the purpose.
Advertisements

EECC694 - Shaaban #1 lec #5 Spring Data Link In Broadcast Networks: The Media Access Sublayer Broadcast networks with multi-access (or random.
Ethernet – CSMA/CD Review
1 The Medium Access Control Sublayer Chapter 4. 2 The Medium Access Control Sublayer This chapter deals with broadcast networks and their protocols. In.
Fundamentals of Computer Networks ECE 478/578
Multiple access What if multiple machines are sharing the same link?
1 K. Salah Module 4.2: Media Access Control The Media Access Control (MAC) sublayer –Random Access (CSMA), IEEE –Token Passing, IEEE Ch 13-
1 Pertemuan 13 Teknik Akses Jaringan - Random Matakuliah: H0174/Jaringan Komputer Tahun: 2006 Versi: 1/0.
EEC-484/584 Computer Networks Lecture 7 Wenbing Zhao
MAC Protocols Media Access Control (who gets the use the channel) zContention-based yALOHA and Slotted ALOHA. yCSMA. yCSMA/CD. TDM and FDM are inefficient.
CS 5253 Workshop 1 MAC Protocol and Traffic Model.
EEC-484/584 Computer Networks Lecture 13 Wenbing Zhao
EEC-484/584 Computer Networks Lecture 9 Wenbing Zhao (Part of the slides are based on materials supplied by Dr. Louise Moser at UCSB and.
EEC-484/584 Computer Networks Lecture 7 Wenbing Zhao
CMPE 150- Introduction to Computer Networks 1 CMPE 150 Fall 2005 Lecture 16 Introduction to Computer Networks.
EEC-484/584 Computer Networks Lecture 13 Wenbing Zhao
EEC-484/584 Computer Networks Lecture 9 Wenbing Zhao (Part of the slides are based on materials supplied by Dr. Louise Moser at UCSB and.
Studying Local Area Networks Via Media Access Control (MAC) SubLayer
CS 5253 Workshop 1 MAC Protocol and Traffic Model.
Networks: Local Area Networks1 LANs Studying Local Area Networks Via Media Access Control (MAC) SubLayer.
Computer Networks: Local Area Networks 1 LANs Studying Local Area Networks via the Media Access Control (MAC) SubLayer.
EEC-484/584 Computer Networks Lecture 7 Wenbing Zhao
Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011 The Medium Access Control Sublayer Chapter.
1 Chapter 5 The Medium Access Sublayer. 2 Chapter 5 The Medium Access Layer 5.1 The Channel Allocation problem - Static and dynamic channel allocation.
Medium Access Control Sublayer
1 ECE453 – Introduction to Computer Networks Lecture 7 – Multiple Access Control (I)
CIS 725 Media Access Layer. Medium Access Control Sublayer MAC sublayer resides between physical and data link layer Broadcast/multiacess channels N independent.
1 Computer Communication & Networks Lecture 12 Datalink Layer: Multiple Access Waleed Ejaz
Chi-Cheng Lin, Winona State University CS412 Introduction to Computer Networking & Telecommunication Medium Access Control Sublayer.
Chapter 4: Medium Access Control (MAC) Sublayer
CHAPTER 4: THE MEDIUM ACCESS SUBLAYER 4.1: The Channel Allocation Problem 4.2: Multiple Access Protocols.
LECTURE9 NET301. DYNAMIC MAC PROTOCOL: CONTENTION PROTOCOL Carrier Sense Multiple Access (CSMA): A protocol in which a node verifies the absence of other.
LOCAL AREA NETWORKS. CSMA Carrier Sense Multiple Access To minimize the chance of collision and, therefore, increase the performance, the CSMA method.
جلسه دهم شبکه های کامپیوتری به نــــــــــــام خدا.
Medium Access Control NWEN302 Computer Network Design.
The Medium Access Control Sublayer Chapter 4. The Channel Allocation Problem Static Channel Allocation Dynamic Channel Allocation  Delay for the divided.
Chi-Cheng Lin, Winona State University CS 313 Introduction to Computer Networking & Telecommunication Medium Access Control Sublayer.
جلسه یازدهم شبکه های کامپیوتری به نــــــــــــام خدا.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2000 Unit-II Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Medium Access Control Sub Layer
7-1 Introduction to Queueing Theory l Components of a queueing system n probability density function (pdf) of interarrival times n pdf of service times.
Multiple Access.
Chapter 6 Multiple Radio Access
5: DataLink Layer 5a-1 Multiple Access protocol. 5: DataLink Layer 5a-2 Multiple Access Links and Protocols Three types of “links”: r point-to-point (single.
LECTURE9 NET301 11/5/2015Lect 9 NET DYNAMIC MAC PROTOCOL: CONTENTION PROTOCOL Carrier Sense Multiple Access (CSMA): A protocol in which a node verifies.
1 Ethernet CSE 3213 Fall February Introduction Rapid changes in technology designs Broader use of LANs New schemes for high-speed LANs High-speed.
Chapter 4 The Medum Access Sublayer. MA Sublayer Additional Reference –Local and Metropolitan Area Networks, William Stallings, Prentice Hall, 2000, 6th.
Medium Access Control Protocols, Local Area Networks, and Wireless Local Area Networks Lecture Note 10.
THE MEDIUM ACCESS CONTROL SUBLAYER 4.1 THE CHANNEL ALLOCATION PROBLEM 4.2 MULTIPLE ACCESS PROTOCOLS.
UNIT 2 Medium Access sub layer: Medium Access sub layer - Channel Allocations, LAN protocols - ALOHA protocols(PURE AND SLOTTED ALOHA),CSMA/CA,CSMA/CD.
THE MEDIUM ACCESS CONTROL SUBLAYER 4.1 THE CHANNEL ALLOCATION PROBLEM 4.2 MULTIPLE ACCESS PROTOCOLS.
Multiple Access By, B. R. Chandavarkar, CSE Dept., NITK, Surathkal Ref: B. A. Forouzan, 5 th Edition.
4.1 THE CHANNEL ALLOCATION PROBLEM THE CHANNEL ALLOCATION PROBLEM : how to allocate a single broadcast channel among competing users. The channel might.
CS 5253 Workshop 1 MAC Protocol and Traffic Model.
Example DLL Protocols 1. High-Level Data Link Control (HDLC).
Week3 The Medium Access Sublayer
Data link layer divided into two functionality-oriented sublayers
Module 3 Medium Access Control.
Net301 lecture9 11/5/2015 Lect 9 NET301.
Services of DLL Framing Link access Reliable delivery
The Medium Access Control Sublayer
THE IEEE MAC SUB-LAYER – chapter 14
The Medium Access Control Sublayer
Channel Allocation Problem/Multiple Access Protocols Group 3
Link Layer and LANs Not everyone is meant to make a difference. But for me, the choice to lead an ordinary life is no longer an option 5: DataLink Layer.
Channel Allocation Problem/Multiple Access Protocols Group 3
CSE 313 Data Communication
CARRIER SENSE MULTIPLE ACCESS (CSMA)
Chapter 6 Multiple Radio Access.
Dr. John P. Abraham Professor UTPA
Presentation transcript:

COMPUTER NETWORKS Data-link Layer (The Medium Access Control Sublayer) MAC Sublayer

Computer Networks2 Questions to be answered ? In broadcast networks, How the channel is divided between competing users? What is Medium Access Control (MAC)? What protocols are used for allocating a multiple access channel ? MAC Sublayer

Computer Networks3 the need for determine who gets to use the channel -When there are two or more users trying to use a shared single channel there should be an algorithm to control this access. -This problem occurs in broadcast networks which are known as multiaccess channels. MAC Sublayer

Computer Networks4 What is MAC? - Medium Access Control (MAC) is a sublayer of the Data-link layer. - The protocols used to determine who goes next on a multiaccess channel belongs to a MAC sublayer. - MAC is important in LAN which use a multiaccess channel as the basis for communication. MAC Sublayer

Computer Networks5 The Channel Allocation Problem There are two schemes to allocate a single channel among competing users: 1)Static Channel Allocation. 2) Dynamic Channel Allocation MAC Sublayer

Computer Networks6 Static Channel Allocation: In this scheme a Frequency Division Multiplexing (FDM) is used for allocating a single channel among competing users. Example if we have N users, the bandwidth will be divided into N equal-size portions. ++ FDM is a simple and efficient allocation mechanism. - - Waste of resources when the traffic is bursty, or the channel is lightly loaded. MAC Sublayer

Computer Networks7 Dynamic Channel Allocation: Before the discussion of algorithms used for dynamic allocation we need to consider the following assumptions. 1)Station Model: N independent stations generate frames for transmission. (Generate >Block >Transmission) 2) Single channel Assumption: Single channel is available for all communication. 3)Collision Assumption 4)Continuous Time, or Slotted Time 5)Carrier Sense, or No Carrier sense MAC Sublayer

Computer Networks8 Multiple Access Protocols: - ALOHA is a system proposed for solving the channel allocation problem. -there are two versions of ALOHA: 1)Pure ALOHA; 2) Slotted ALOHA The basic difference with respect to timing is: Pure ALOHA does not require global time synchronization; Slotted ALOHA does MAC Sublayer

Pure ALOHA In pure ALOHA, frames are transmitted at completely arbitrary times.

Computer Networks10 Pure ALOHA The system is working as follows: 1- let users transmit whenever they have data to be sent. 2- expected collisions will occur. 3- the collided frames will be destroyed. 4- using a feedback mechanism to know about the status of frame. 5- retransmit the destroyed frame. MAC Sublayer

Pure ALOHA (2) Vulnerable period for the shaded frame.

Computer Networks12 Pure ALOHA The main disadvantage of Pure ALOHA is a low channel utilization. This is expected due to the feature that all users transmit whenever they want. MAC Sublayer

Pure ALOHA (3) Throughput versus offered traffic for ALOHA systems.

Computer Networks14 Slotted ALOHA In this method the proposal was to divide the time into discrete intervals each interval corresponding to one frame. In Slotted ALOHA, a computer can not send anytime, instead it is required to wait for the beginning of the time slot. The big advantage of Slotted ALOHA is the increase in channel utilization. MAC Sublayer

Computer Networks15 Slotted ALOHA There is a limit for the best channel utilization using Slotted ALOHA. To reduce the chance of collisions the station should be able to detect what other stations are doing. In LAN networks this is possible, therefore they can achieve better utilization than Slotted ALOHA. Carrier Sense Protocols are protocols in which stations listen for a carrier. MAC Sublayer

Computer Networks16 Carrier Sense Multiple Access (CSMA) Protocols There are several versions of carrier sense protocols: -1-persistent CSMA -Non-persistent CSMA -P-persistent CSMA -CSMA with Collision Detection (CSMA/CD) MAC Sublayer

Computer Networks17 Carrier Sense Multiple Access (CSMA) Protocols - In 1-persistent CSMA, a station prior to send data it listen to the channel to see if anyone else is transmitting at that moment. -if the channel is busy, the station waits until it becomes idle. -If the channel is idle, the station transmits a frame. -If a collision occurs, the station waits a random amount of time and starts all over again. MAC Sublayer

Computer Networks18 Carrier Sense Multiple Access (CSMA) Protocols -Although this protocol has disadvantages, it is better than ALOHA and Slotted ALOHA --1) It’s performance depends on the propagation delay. --2) There is a chance when two stations start transmission at the same time. MAC Sublayer

Computer Networks19 Carrier Sense Multiple Access (CSMA) Protocols -In Non-persistent CSMA a station makes conscious attempt to sense the channel. -After the first attempt, if the channel is idle, it sends, however, if the channel is already in use, it waits a random period of time and repeats the algorithm. -(+ -)This algorithm has better utilization but longer delays than 1-persistent CSMA. MAC Sublayer

Computer Networks20 Carrier Sense Multiple Access (CSMA) Protocols -In p-persistent CSMA a station transmits if the channel is idle with a probability p and with probability q=1-p it waits until the next slot. MAC Sublayer

Computer Networks21 Carrier Sense Multiple Access (CSMA) Protocols -The main advantage of persistent and non-persistent over ALOHA is that they ensure no station begins to transmit when it senses the channel busy. MAC Sublayer

Computer Networks22 CSMA with Collision Detection -It is important that stations should terminate transmission as soon as they detect a collision. -This protocol is called CSMA/CD. -It is widely used on LANs in the MAC sublayer. -It is the basis of the popular Ethernet LAN. MAC Sublayer

CSMA with Collision Detection CSMA/CD can be in one of three states: contention, transmission, or idle.

Computer Networks24 CSMA with Collision Detection -A collision can be detected by looking at the power or pulse width of the received signal and comparing it to the transmitted signal. -After a station detects a collision it terminates its transmission, waits a random period of time, and then tries again, assuming that no other station has started transmitting in the meantime. MAC Sublayer

Computer Networks25 CSMA with Collision Detection -Collision detection is an analog process. Therefore, special encoding is commonly used. -A sending station must continually monitor the channel, listening for noise bursts that might indicate a collision. For this reason, CSMA/CD with a single channel is inherently a half-duplex system. MAC Sublayer