McGraw-Hill © The McGraw-Hill Companies, Inc., 2004 Chapter 12 Multiple Access Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction.

Slides:



Advertisements
Similar presentations
Ethernet “dominant” LAN technology: cheap $20 for 100Mbs!
Advertisements

The ALOHA Protocol “Free for all”: whenever station has a frame to send, it does so. –Station listens for maximum RTT for an ACK. –If no ACK after a specified.
Ethernet – CSMA/CD Review
12.1 Chapter 12 Multiple Access Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Multiple Access Methods. When nodes or stations are connected and use a common link (cable or air), called a multipoint or broadcast link, we need a.
13.1 Chapter 13 Wired LANs: Ethernet Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
12.1 Chapter 12 Multiple Access Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
13.1 Chapter 13 Wired LANs: Ethernet Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
1 Version 3.0 Module 6 Ethernet Fundamentals. 2 Version 3.0 Why is Ethernet so Successful? In 1973, it could carry data at 3 Mbps Now, it can carry data.
Chapter 12 Multiple Access Figure 12.1 Data link layer divided into two functionality-oriented sublayers Figure 12.2 Taxonomy of multiple-access protocols.
EEC-484/584 Computer Networks Lecture 13 Wenbing Zhao
Chapter 13 Wired LANs: Ethernet
12.1 Chapter 12 Multiple Access Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Medium Access Control Sublayer
Shashank Srivastava Motilal Nehru National Institute Of Technology, Allahabad Medium Access Control.
Enhanced CSMA Additional improvement  Use CSMA access  Listen while transmitting  Stop immediately if collision sensed  Called collision detection.
9/11/2015 5:55 AM1 Ethernet and CSMA/CD CSE 6590 Fall 2010.
Chapter 13 Wired LANs: Ethernet
Introduction1-1 Data Communications and Computer Networks Chapter 5 CS 3830 Lecture 27 Omar Meqdadi Department of Computer Science and Software Engineering.
1 Computer Communication & Networks Lecture 13 Datalink Layer: Local Area Network Waleed Ejaz
McGraw-Hill © The McGraw-Hill Companies, Inc., 2004 Chapter 12 Multiple Access Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction.
Chapter 12 Multiple Access Figure 12.1 Data link layer divided into two functionality-oriented sublayers Figure 12.2 Taxonomy of multiple-access protocols.
12.1 Chapter 12 Multiple Access Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Multiple Access.
1 Kyung Hee University Chapter 12 Multiple Access.
13.1 Chapter 13 Wired LANs: Ethernet Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
1 Kyung Hee University Chapter 12 Multiple Access.
IEEE STANDARDS IEEE STANDARDS In 1985, the Computer Society of the IEEE started a project, called Project 802, to set standards to enable intercommunication.
Chapter 13 Wired LANs: Ethernet
Chapter 12 Multiple Access
EE 122: Lecture 6 Ion Stoica September 13, 2001 (* this talk is based in part on the on-line slides of J. Kurose & K. Rose)
1 Ethernet CSE 3213 Fall February Introduction Rapid changes in technology designs Broader use of LANs New schemes for high-speed LANs High-speed.
1 Multiple Access: Ethernet Section Point-to-Point vs. Broadcast Media Point-to-point –PPP for dial-up access –Point-to-point link between Ethernet.
Chapter 12 Media Access Control (MAC)
Multiple Access. Figure 12.1 Data link layer divided into two functionality-oriented sublayers.
Multiple Access By, B. R. Chandavarkar, CSE Dept., NITK, Surathkal Ref: B. A. Forouzan, 5 th Edition.
1 Kyung Hee University Chapter 13 Wired LANs: Ethernet.
Example DLL Protocols 1. High-Level Data Link Control (HDLC).
Data Link Layer Lower Layers Local Area Network Standards
Link Layer 5.1 Introduction and services
Multiple Access Methods
Chapter 13 Wired LANs: Ethernet
Data link layer divided into two functionality-oriented sublayers
Chapter 12 Multiple Access.
Part III Datalink Layer.
Chapter 12 Multiple Access
Part III Datalink Layer 10.
High Speed LANs – Ethernet and Token Ring
Multiple Access Problem: When two or more nodes transmit at the same time, their frames will collide and the link bandwidth is wasted during collision.
Multiple Access Mahesh Jangid Assistant Professor JVW University.
CS 457 – Lecture 6 Ethernet Spring 2012.
Data Link Issues Relates to Lab 2.
Figure 12.1 Data link layer divided into two functionality-oriented sublayers Networks can be divided into two categories: those using point-to-point.
THE IEEE MAC SUB-LAYER – chapter 14
Chapter 13 Wired LANs: Ethernet
Data Link Issues Relates to Lab 2.
Multiple Access Methods
Protocol layering and data
Chapter 12 Multiple Access
Link Layer and LANs Not everyone is meant to make a difference. But for me, the choice to lead an ordinary life is no longer an option 5: DataLink Layer.
Ethernet – CSMA/CD Review
Part III Datalink Layer.
Protocol layering and data
Multiple Access Methods
Chaithra Ashwin Sanjana
LAN Addresses and ARP IP address: drives the packet to destination network LAN (or MAC or Physical) address: drives the packet to the destination node’s.
Dr. John P. Abraham Professor UTPA
Multiple Access Control (MAC) Protocols
Chapter 12 Media Access Control (MAC)
Chapter 13 Wired LANs: Ethernet
Presentation transcript:

McGraw-Hill © The McGraw-Hill Companies, Inc., 2004 Chapter 12 Multiple Access Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.

McGraw-Hill © The McGraw-Hill Companies, Inc., 2004 Multiple Access  Broadcast link used in LAN consists of multiple sending and receiving nodes connected to or use a single shared link Broadcast links Examples

McGraw-Hill © The McGraw-Hill Companies, Inc., 2004 Figure 12.1 Data link layer divided into two functionality-oriented sublayers Link Layer Control (LLC) MAC Responsible for error and flow control Control Responsible framing and MAC address and Multiple Access Control

McGraw-Hill © The McGraw-Hill Companies, Inc., 2004 Multiple Access  Problem: When two or more nodes transmit at the same time, their frames will collide and the link bandwidth is wasted during collision  How to coordinate the access of multiple sending/receiving nodes to the shared link??? Solution: We need a protocol to coordinate the transmission of the active nodes These protocols are called Medium or Multiple Access Control (MAC) Protocols belong to a sublayer of the data link layer called MAC (Medium Access Control) What is expected from Multiple Access Protocols: Main task is to minimize collisions in order to utilize the bandwidth by: Determining when a station can use the link (medium) what a station should do when the link is busy what the station should do when it is involved in collision

McGraw-Hill © The McGraw-Hill Companies, Inc., 2004 Figure 12.2 Taxonomy of multiple-access protocols discussed in this chapter

McGraw-Hill © The McGraw-Hill Companies, Inc., 2004 Random Access Random Access (or contention) Protocols: No station is superior to another station and none is assigned the control over another. A station with a frame to be transmitted can use the link directly based on a procedure defined by the protocol to make a decision on whether or not to send.

McGraw-Hill © The McGraw-Hill Companies, Inc., 2004 Random Access – Carrier Sense Multiple Access (CSMA)  If a frame was sent by a station, All stations knows immediately so they can wait before start sending  A station with frames to be sent, should sense the medium for the presence of another transmission (carrier) before it starts its own transmission This can reduce the possibility of collision but it cannot eliminate it. Collision can only happen when more than one station begin transmitting within a short time (the propagation time period)

McGraw-Hill © The McGraw-Hill Companies, Inc., 2004 Types of CSMA Protocols Different CSMA protocols that determine:  What a station should do when the medium is idle?  What a station should do when the medium is busy? 1. Non-Persistent CSMA 2. 1-Persistent CSMA 3. p-Persistent CSMA

McGraw-Hill © The McGraw-Hill Companies, Inc., 2004 Nonpersistent CSMA  A station with frames to be sent, should sense the medium 1. If medium is idle, transmit; otherwise, go to 2 2. If medium is busy, (backoff) wait a random amount of time and repeat 1  Non-persistent Stations are deferential (respect others)  Performance:  Random delays reduces probability of collisions because two stations with data to be transmitted will wait for different amount of times.  Bandwidth is wasted if waiting time (backoff) is large because medium will remain idle following end of transmission even if one or more stations have frames to send Random Waiting times Wasted time

McGraw-Hill © The McGraw-Hill Companies, Inc., persistent CSMA To avoid idle channel time, 1-persistent protocol used Station wishing to transmit listens to the medium: 1. If medium idle, transmit immediately; 2. If medium busy, continuously listen until medium becomes idle; then transmit immediately with probability 1  Performance  1-persistent stations are selfish  If two or more stations becomes ready at the same time, collision guaranteed

McGraw-Hill © The McGraw-Hill Companies, Inc., 2004 P-persistent CSMA Time is divided to slots where each Time unit (slot) typically equals maximum propagation delay Station wishing to transmit listens to the medium: 1. If medium idle,  transmit with probability (p), OR  wait one time unit (slot) with probability (1 – p), then repeat If medium busy, continuously listen until idle and repeat step 1 3. Performance Reduces the possibility of collisions like nonpersistent Reduces channel idle time like 1-persistent

McGraw-Hill © The McGraw-Hill Companies, Inc., 2004 Flow diagram for three persistence methods

McGraw-Hill © The McGraw-Hill Companies, Inc., 2004 Persistent and Nonpersistent CSMA Comparison of the channel utilization versus load for various random access protocols.

McGraw-Hill © The McGraw-Hill Companies, Inc., 2004 CSMA/CD (Collision Detection)  CSMA (all previous methods) has an inefficiency:  If a collision has occurred, the channel is unstable until colliding packets have been fully transmitted  CSMA/CD (Carrier Sense Multiple Access with Collision Detection) overcomes this as follows:  While transmitting, the sender is listening to medium for collisions.  Sender stops transmission if collision has occurred reducing channel wastage. CSMA/CD is Widely used for bus topology LANs (IEEE 802.3, Ethernet).

McGraw-Hill © The McGraw-Hill Companies, Inc., 2004 of its own signal, it means collision occurred

McGraw-Hill © The McGraw-Hill Companies, Inc., 2004 CSMA/CD Protocol Use one of the CSMA persistence algorithm (non-persistent, 1-persistent, p-persistent) for transmission If a collision is detected by a station during its transmission then it should do the following: Abort transmission and Transmit a jam signal (48 bit) to notify other stations of collision so that they will discard the transmitted frame also to make sure that the collision signal will stay until detected by the furthest station After sending the jam signal, backoff (wait) for a random amount of time, then Transmit the frame again

McGraw-Hill © The McGraw-Hill Companies, Inc., 2004 CSMA/CD Question: How long does it take to detect a collision? Answer: In the worst case, twice the maximum propagation delay of the medium Note: a = maximum propagation delay

McGraw-Hill © The McGraw-Hill Companies, Inc., 2004 CSMA/CD  Restrictions of CSMA / CD:  Packet transmission time should be at least as long as the time needed to detect a collision (2 * maximum propagation delay + jam sequence transmission time)  Otherwise, CSMA/CD does not have an advantage over CSMA

McGraw-Hill © The McGraw-Hill Companies, Inc., 2004 Exponential Backoff Algorithm Ethernet uses the exponential backoff algorithms to determine the best duration of the random waiting period after the collision happens Algorithm:  Set “slot time” equal to 2*maximum propagation delay + Jam sequence transmission time (= 51.2 usec for Ethernet 10-Mbps LAN)  After K th collision, select a random number (R) between 0 and 2 k –1 and wait for a period equal to (R*slot time) then retransmit when the medium is idle, for example:  After first collision (K=1), select a number (R) between 0 and 2 1 –1 {0,1} and wait for a period equal to R*slot times (Wait for a period 0 usec or 1x51.2 usec) then retransmit when the medium is idle  Do not increase random number range, if K=10   Maximum interval {0 – 1023}  Give up after 16 unsuccessful attempts and report failure to higher layers

McGraw-Hill © The McGraw-Hill Companies, Inc., 2004 Figure Flow diagram for the CSMA/CD N=N+1 N=0 N==16 Abort N < 10 K=N K=10 Choose R between 0 & 2 k - 1 Wait R*slot time No Yes

McGraw-Hill © The McGraw-Hill Companies, Inc., 2004 Exponential Backoff Algorithm Reduces the chance of two waiting stations picking the same random waiting time When network traffic is light, it results in minimum waiting time before transmission As congestion increases ( traffic is high), collisions increase, stations backoff by larger amounts to reduce the probability of collision. Exponential Back off algorithm gives last-in, first-out effect Stations with no or few collisions will have the chance to transmit before stations that have waited longer because of their previous unsuccessful transmission attempts.

McGraw-Hill © The McGraw-Hill Companies, Inc., 2004 Performance of Random Access Protocols Simple and easy to implement Decentralized (no central device that can fail and bring down the entire system) In low-traffic, packet transfer has low-delay However, limited throughput and in heavier traffic, packet delay has no limit. In some cases, a station may never have a chance to transfer its packet. (unfair protocol) A node that has frames to be transmitted can transmit continuously at the full rate of channel (R) if it is the only node with frames If (M) nodes want to transmit, many collisions can occur and the rate for each node will not be on average R/M

McGraw-Hill © The McGraw-Hill Companies, Inc., CHANNELIZATION Channelization is a multiple-access method in which the available bandwidth of a link is shared in time, frequency, or through code, between different stations. In this section, we discuss three channelization protocols. Frequency-Division Multiple Access (FDMA) Time-Division Multiple Access (TDMA) Code-Division Multiple Access (CDMA) Topics discussed in this section:

McGraw-Hill © The McGraw-Hill Companies, Inc., 2004 Figure Frequency-division multiple access (FDMA)

McGraw-Hill © The McGraw-Hill Companies, Inc., 2004 FDMA: Frequency Division Multiple Access: Transmission medium is divided into M separate frequency bands Each station transmits continuously on the assigned band at an average rate of R/M A node is limited to an average rate equal R/M (where M is number of nodes) even when it is the only node with frame to be sent 12-3 CHANNELIZATION - FDMA

McGraw-Hill © The McGraw-Hill Companies, Inc., 2004 Figure Time-division multiple access (TDMA)

McGraw-Hill © The McGraw-Hill Companies, Inc., 2004 TDMA: Time Division Multiple Access The entire bandwidth capacity is a single channel with its capacity shared in time between M stations A node must always wait for its turn until its slot time arrives even when it is the only node with frames to send A node is limited to an average rate equal R/M (where M is number of nodes) even when it is the only node with frame to be sent 12-3 CHANNELIZATION - TDMA

McGraw-Hill © The McGraw-Hill Companies, Inc., 2004 CDMA: Code Division Multiple Access In CDMA, one channel carries all transmissions simultaneously Each station codes its data signal by a specific codes before transmission The stations receivers use these codes to recover the data for the desired station 12-3 CHANNELIZATION - CDMA

McGraw-Hill © The McGraw-Hill Companies, Inc., Figure Simple idea of communication with code

McGraw-Hill © The McGraw-Hill Companies, Inc., 2004 Chapter 13 Wired LANs: Ethernet Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.

McGraw-Hill © The McGraw-Hill Companies, Inc., IEEE STANDARDS Ethernet: It is a LAN protocol that is used in Bus and Star topologies and implements CSMA/CD as the medium access method  Original (traditional) Ethernet developed in 1980 by three companies: Digital, Intel, Xerox (DIX).  In 1985, the Computer Society of the IEEE started a project, called Project 802, to set standards to enable intercommunication among equipment from a variety of manufacturers.  Current version is called IEEE Ethernet

McGraw-Hill © The McGraw-Hill Companies, Inc., 2004 Ethernet Frame formats. (a) DIX Ethernet, (b) IEEE FCS  Ethernet Frame format

McGraw-Hill © The McGraw-Hill Companies, Inc., 2004 Figure MAC frame

McGraw-Hill © The McGraw-Hill Companies, Inc., 2004 IEEE Ethernet In IEEE Ethernet Data link layer is split into two sublayers: Bottom part: MAC The frame is called IEEE Handles framing, MAC addressing, Medium Access control Specific implementation for each LAN protocol Defines CSMA/CD as the access method for Ethernet LANs and Token passing method for Token Ring. Implemented in hardware Top part: LLC (Logical Link Control) The subframe is called IEEE Provides error and flow control if needed It makes the MAC sublayer transparent Allows interconnectivity between different LANs data link layers Used to multiplex multiple network layer protocols in the data link layer frame Implemented in software

McGraw-Hill © The McGraw-Hill Companies, Inc., 2004 Figure 13.1 IEEE standard for LANs

McGraw-Hill © The McGraw-Hill Companies, Inc., 2004 Ethernet Provides Unreliable, connectionless Service Ethernet data link layer protocol provides connectionless service to the network layer No handshaking between sending and receiving adapter. Ethernet protocol provides Unreliable service to the network layer : Receiving adapter doesn’t send ACK or NAK to sending adapter This means stream of datagrams passed to network layer can have gaps (missing data) Gaps will be filled if application is using reliable transport layer protocol Otherwise, application will see the gaps

McGraw-Hill © The McGraw-Hill Companies, Inc., 2004 Preamble: 8 bytes with pattern used to synchronize receiver, sender clock rates. In IEEE 802.3, eighth byte is start of frame ( ) Addresses: 6 bytes (explained latter) Type (DIX) Indicates the type of the Network layer protocol being carried in the payload (data) field, mostly IP but others may be supported such as IP (0800), Novell IPX (8137) and AppleTalk (809B), ARP (0806) ) Allow multiple network layer protocols to be supported on a single machine (multiplexing) Its value starts at 0600h (=1536 in decimal) Length (IEEE 802.3): number of bytes in the data field. Maximum 1500 bytes (= 05DCh) CRC: checked at receiver, if error is detected, the frame is discarded CRC-32 Data: carries data encapsulated from the upper-layer protocols Pad: Zeros are added to the data field to make the minimum data length = 46 bytes Ethernet Frame

McGraw-Hill © The McGraw-Hill Companies, Inc., 2004 Ethernet address  Six bytes = 48 bits  Flat address not hierarchical  Burned into the NIC ROM  First three bytes from left specify the vendor. Cisco C, 3Com C and the last 24 bit should be created uniquely by the company  Destination Address can be:  Unicast: second digit from left is even (one recipient)  Multicast: Second digit from left is odd (group of stations to receive the frame – conferencing applications)  Broadcast (ALL ones) (all stations receive the frame)  Source address is always Unicast

McGraw-Hill © The McGraw-Hill Companies, Inc., 2004

McGraw-Hill © The McGraw-Hill Companies, Inc., 2004 The least significant bit of the first byte defines the type of address. If the bit is 0, the address is unicast; otherwise, it is multicast. Note

McGraw-Hill © The McGraw-Hill Companies, Inc., 2004 The broadcast destination address is a special case of the multicast address in which all bits are 1s. Note

McGraw-Hill © The McGraw-Hill Companies, Inc., 2004 Figure 13.7 Unicast and multicast addresses

McGraw-Hill © The McGraw-Hill Companies, Inc., 2004 Show how the address 47:20:1B:2E:08:EE is sent out on line. Solution The address is sent left-to-right, byte by byte; for each byte, it is sent right-to-left, bit by bit, as shown below: Example 13.2

McGraw-Hill © The McGraw-Hill Companies, Inc., 2004 Define the type of the following destination addresses: a. 4A:30:10:21:10:1A b. 47:20:1B:2E:08:EE c. FF:FF:FF:FF:FF:FF Solution To find the type of the address, we need to look at the second hexadecimal digit from the left. If it is even, the address is unicast. If it is odd, the address is multicast. If all digits are F’s, the address is broadcast. Therefore, we have the following: a. This is a unicast address because A in binary is b. This is a multicast address because 7 in binary is c. This is a broadcast address because all digits are F’s. Example 13.1

McGraw-Hill © The McGraw-Hill Companies, Inc., 2004 Figure 13.5 Minimum and maximum lengths

McGraw-Hill © The McGraw-Hill Companies, Inc., 2004 Frame length: Minimum: 64 bytes (512 bits) Maximum: 1518 bytes (12,144 bits) Note

McGraw-Hill © The McGraw-Hill Companies, Inc., 2004 Figure 13.3 Ethernet evolution through four generations

McGraw-Hill © The McGraw-Hill Companies, Inc., 2004 Categories of traditional Ethernet

McGraw-Hill © The McGraw-Hill Companies, Inc., 2004 IEEE Cable Types NameCable Max.Max Cable Segment Length Nodes /segment 10Base5thick coax 500 meters100 10Base2thin coax185 meters30 10BaseTtwisted pair100 meters1 10BaseFFiber Optic2Km1 Toplogy Bus Star

McGraw-Hill © The McGraw-Hill Companies, Inc., 2004 Figure Base5 implementation

McGraw-Hill © The McGraw-Hill Companies, Inc., 2004 Connection of stations to the medium using 10Base2

McGraw-Hill © The McGraw-Hill Companies, Inc., BaseT Uses twisted pair Cat3 cable Star-wire topology A hub functions as a repeater with additional functions Fewer cable problems, easier to troubleshoot than coax Cable length at most 100 meters

McGraw-Hill © The McGraw-Hill Companies, Inc., 2004 Figure Base-T implementation

McGraw-Hill © The McGraw-Hill Companies, Inc., 2004 Figure Base-F implementation