Chapter 12 Part 2 Media Access Control (MAC)

Slides:



Advertisements
Similar presentations
12.1 Chapter 12 Multiple Access Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Advertisements

Multiple access What if multiple machines are sharing the same link?
Multiple Access Methods. When nodes or stations are connected and use a common link (cable or air), called a multipoint or broadcast link, we need a.
LECTURE 11 CT1303 LAN. DYNAMIC MAC PROTOCOL No fixed assignment for transmission media or any network resources.. It allows transmission when needed.
Comp 361, Spring 20056:Basic Wireless 1 Chapter 6: Basic Wireless (last updated 02/05/05) r A quick intro to CDMA r Basic
12.1 Chapter 12 Multiple Access Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Chapter 12 Multiple Access Figure 12.1 Data link layer divided into two functionality-oriented sublayers Figure 12.2 Taxonomy of multiple-access protocols.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Chapter 13 Multiple Access.
12.1 Chapter 12 Multiple Access Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
CS352- Link Layer Dept. of Computer Science Rutgers University.
Lecture Focus: Data Communications and Networking  Data Link Layer  Media Access Control (MAC) Lecture 24 CSCS 311.
Medium Access Control Sublayer
Shashank Srivastava Motilal Nehru National Institute Of Technology, Allahabad Medium Access Control.
McGraw-Hill © The McGraw-Hill Companies, Inc., 2004 Chapter 12 Multiple Access Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction.
Chapter 12 Multiple Access Figure 12.1 Data link layer divided into two functionality-oriented sublayers Figure 12.2 Taxonomy of multiple-access protocols.
© Janice Regan, CMPT 128, CMPT 371 Data Communications and Networking LANs 2: MAC protocols.
© 2009 Pearson Education Inc., Upper Saddle River, NJ. All rights reserved. © The McGraw-Hill Companies, Inc. Medium Access Control Asst. Prof. Chaiporn.
12.1 Chapter 12 Multiple Access Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Data Communications, Kwangwoon University12-1 Chapter 12. Multiple Access 1.Random Access 2.Controlled Access 3.Channelization.
1 Kyung Hee University Chapter 12 Multiple Access.
1 Kyung Hee University Chapter 12 Multiple Access.
5: DataLink Layer 5a-1 Multiple Access protocol. 5: DataLink Layer 5a-2 Multiple Access Links and Protocols Three types of “links”: r point-to-point (single.
COMMUNICATION SYSTEM EECB353 Chapter 7 Part III MULTIPLE ACCESS Intan Shafinaz Mustafa Dept of Electrical Engineering Universiti Tenaga Nasional
Chapter 12 Media Access Control (MAC) Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Chapter 12 Multiple Access
1 Kyung Hee University Prof. Choong Seon HONG Multiple Access.
Chapter 13 Multiple Access.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Chapter 13 Multiple Access.
Chapter 12 Media Access Control (MAC)
UNIT 3 MULTIPLE ACCESS Adapted from lecture slides by Behrouz A. Forouzan © The McGraw-Hill Companies, Inc. All rights reserved.
Multiple Access. Figure 12.1 Data link layer divided into two functionality-oriented sublayers.
Network Operations & administration CS 4592 Lecture 18 Instructor: Ibrahim Tariq.
2. Data Link Layer: Medium Access Control. Scheduling.
Multiple Access By, B. R. Chandavarkar, CSE Dept., NITK, Surathkal Ref: B. A. Forouzan, 5 th Edition.
Chapter 2 PHYSICAL LAYER.
Chapter 9 Introduction To Data-Link Layer 9.# 1
A Taxonomy of Mechanisms for Multi-Access
Multiple Access Methods
Bandwidth Utilization
Data link layer divided into two functionality-oriented sublayers
Chapter 12 Multiple Access.
Packetizing Error Detection
CT301 LECTURE 8.
Chapter 12 Multiple Access
Part III Datalink Layer 10.
Multiple Access Problem: When two or more nodes transmit at the same time, their frames will collide and the link bandwidth is wasted during collision.
Multiple Access Mahesh Jangid Assistant Professor JVW University.
Channel Allocation (MAC)
Part III Datalink Layer 10.
Subject Name: Computer Communication Networks Subject Code: 10EC71
Chapter 12 Multiple Access
Figure 12.1 Data link layer divided into two functionality-oriented sublayers Networks can be divided into two categories: those using point-to-point.
THE IEEE MAC SUB-LAYER – chapter 14
Communication Networks NETW 501
Multiple Access Methods
Chapter 13 Multiple Access.
Chapter 13 Multiple Access
Chapter 12 Multiple Access
Chapter 13 Multiple Access
Lecture 5- Data Link Layer
Chapter 1 Introduction Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. 1.#
CSE 313 Data Communication
Cellular Telephone Networks
CSE 313 Data Communication
Multiple Access Methods
Dr. John P. Abraham Professor UTPA
Multiple Access Control (MAC) Protocols
Part III Datalink Layer 10.
Chapter 12 Media Access Control (MAC)
Chapter 12 Media Access Control (MAC)
Presentation transcript:

Chapter 12 Part 2 Media Access Control (MAC) When nodes or stations are connected and use a common link, called a multipoint or broadcast link, we need a multiple-access protocol to coordinate access to the link. The problem of controlling the access to the medium is similar to the rules of speaking in an assembly. The procedures guarantee that the right to speak is upheld and ensure that two people do not speak at the same time, do not interrupt each other, do not monopolize the discussion, and so on. Many protocols have been devised to handle access to a shared link. All of these protocols belong to a sublayer in the data-link layer called media access control (MAC). Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. 12.# 12.# 1 1

Figure 12.1: Taxonomy of multiple-access protocols 12.2 12.# 12.# 12.# 2

Reservation. 12-2 CONTROLLED ACCESS In controlled access, the stations consult one another to find which station has the right to send. A station cannot send unless it has been authorized by other stations. We discuss three controlled-access methods: Reservation. Polling. Token Passing. 12.3 12.3 12.# 12.# 12.# 3

12.2.1 Reservation In the reservation method, a station needs to make a reservation before sending data. Time is divided into intervals. In each interval, a reservation frame precedes the data frames sent in that interval. 12.4 12.# 12.# 12.# 4

Figure 12.18: Reservation access method If there are N stations , there are N reservation minislots. Each minislot belongs to a station. The Figure shows a situation with five stations and a five minislot reservation frame.In the first interval, only stations 1, 3, and 4 have made reservations. In the second interval, only station 1 has made a reservation. 12.5 12.# 12.# 12.# 5

12.2.2 Polling Polling works with topologies in which one device is designated as a primary station and the other devices are secondary stations. All data exchanges must be made through the primary device even when the ultimate destination is a secondary device. The primary device controls the link; the secondary devices follow its instructions. It is up to the primary device to determine which device is allowed to use the channel at a given time. 12.6 12.# 12.# 12.# 6

Figure 12.19: Select and poll functions in polling-access method The primary device is always the initiator of a session However, if the primary station fails, the system goes down. zzzzzzz The select function is used whenever the primary device has something to send. Before sending data, the primary creates and transmits a select (SEL) frame, one field of which includes the address of the intended secondary, to alert the secondary to the upcoming transmission and wait for an acknowledgment. When the primary is ready to receive data, it must ask (poll) each device in turn if it has anything to send. If the secondary device response is negative (NAK frame) it means it has nothing to send. Then the primary polls the next secondary until it finds one with data to send. When the response is positive (a data frame), the primary reads the frame and returns an acknowledgment (ACK frame), verifying its receipt. 12.# 12.# 12.# 7

12.2.3 Token Passing In the token-passing method, the stations in a network are organized in a logical ring. In other words, for each station, there is a predecessor and a successor. The predecessor is the station which is logically before the station in the ring. The successor is the station which is after the station in the ring. The current station is the one that is accessing the channel now. The right has been passed from the predecessor to the current station, and will be passed to the successor when the current station has no more data to send. 12.8 12.# 12.# 12.# 8

Figure 12.20: Logical ring and physical topology in token-passing access method A special packet called a token circulates through the ring. The possession of the token gives the station the right to access the channel and send its data. The physical topology is a star. There is a hub that acts as the connector. The stations are connected to this ring through the two wire connections. The network is less prone to failure because if a link goes down, it will be bypassed by the hub. Adding and removing stations from the ring is easier. The stations are connected to a single cable called a bus. They, make a logical ring, because each station knows the address of its successor. When a station has finished sending its data, it releases the token that has the address of its successor. Only the station with that address gets the token. Uses a second ring for emergencies only, which operates in the reverse direction of the main ring. If one links in the main ring fails, the system automatically combines the two rings to form a temporary ring. Each station needs to have two transmitter ports and two receiver ports. A station sends the token to its successor (the next one in line). The token does not have to have the address of the next successor. If one of the links fails, the whole system fails. 12.# 12.# 12.# 9

In this section, we discuss three protocols: FDMA. TDMA. CDMA. 12-3 CHANNELIZATION Channelization (or channel partition, as it is sometimes called) is a multiple-access method in which the available bandwidth of a link is shared in time, frequency, or through code, among different stations. In this section, we discuss three protocols: FDMA. TDMA. CDMA. 12.10 12.# 12.# 12.# 10

In frequency-division multiple access 12.3.1 FDMA In frequency-division multiple access In frequency-division multiple access (FDMA), the available bandwidth is divided into frequency bands. Each station is allocated a band to send its data. In other words, each band is reserved for a specific station, and it belongs to the station all the time. Each station also uses a bandpass filter (transmitting only a set range of frequencies) to confine the transmitter frequencies. To prevent station interferences, the allocated bands are separated from one another by small guard bands. 12.11 12.# 12.# 12.# 11

Figure 12.21: Frequency-division multiple access (FDMA) The available bandwidth of the common channel is divided into bands that are separated by guard bands. The data- link layer in each station tells its physical layer to make a bandpass signal from the data passed to it. 12.12 12.# 12.# 12.# 12

Time-Division Multiple Access 12.3.2 TDMA Time-Division Multiple Access In time-division multiple access (TDMA), the stations share the bandwidth of the channel in time. Each station is allocated a time slot during which it can send data. Each station transmits its data in its assigned time slot. 12.13 12.# 12.# 12.# 13

Figure 12.22: Time-division multiple access (TDMA) The bandwidth is just one channel that is timeshared between different stations. The data-link layer in each station tells its physical layer to use the allocated time slot. 12.14 12.# 12.# 12.# 14

12.3.3 CDMA Code-division multiple access (CDMA) was conceived several decades ago. Recent advances in electronic technology have finally made its implementation possible.. CDMA differs from FDMA in that only one channel occupies the entire bandwidth of the link. CDMA differs from TDMA in that all stations can send data simultaneously; there is no timesharing. 12.15 12.# 12.# 12.# 15

Figure 12.23: Simple idea of communication with code Each station is assigned a code. If a station want to send data, it multiplies its data by its code. The data that go on the channel are the sum of all these multiplication terms. To get the data, the receiver multipulies the data on the channel by the code of the sender. For example, suppose Station 2 wants to get data from station 1. It multiplies the data on the channel by c1 (the code of station 1). Because (c1 ⋅ c1) is 4, but (c2 ⋅ c1), (c3 ⋅ c1), and (c4 ⋅ c1) are all 0s, station 2 divides the result by 4 to get the data from station 1. 12.16 12.# 12.# 12.# 16

Figure 12.24: Chip sequences The code is a sequence of numbers called chips. They are carefully selected and have the following properties: 1. Each sequence is made of N elements (N is the number of stations). 2. multiplication of a sequence by a scalar: Every element in the sequence is multiplied by a number. [+1 +1 +1 +1] . 2 = [+2 +2 +2 +2] 3. Inner product of two equal sequences= N [+1 +1 +1 +1] . [+1 +1 +1 +1] = +1 +1 +1 +1 = 4 4. Inner product of two different sequences= 0. [+1 +1 +1 +1] . [+1 -1 -1 +1] = +1 -1 -1 +1 = 0 5. If we add two sequences, the result is another sequence. [+1 +1 +1 +1] + [+1 -1 +1 -1] = [+2 0 +2 0] 1. Each sequence is made of N elements, where N is the number of stations. 2. If we multiply a sequence by a number, every element in the sequence is multiplied by that element. This is called multiplication of a sequence by a scalar. For example, 2 • [+1 +1 −1 −1] = [+2 +2 −2 −2] 3. If we multiply two equal sequences, element by element, and add the results, we get N, where N is the number of elements in each sequence. This is called the inner product of two equal sequences. For example, [+1 +1 −1 −1] • [+1 +1 −1 −1] = 1 + 1 + 1 + 1 = 4 4. If we multiply two different sequences, element by element, and add the results, we get 0. This is called the inner product of two different sequences. For example, [+1 +1 −1 −1] • [+1 +1 +1 +1] = 1 + 1 − 1 − 1 = 0 CHAPTER 12 MEDIA ACCESS CONTROL (MAC) 349 5. Adding two sequences means adding the corresponding elements. The result is another sequence. For example, [+1+1−1−1]+[+1+1+1+1]=[+2+2 0 0] 12.17 12.# 12.# 12.# 17

For encoding: If a station needs to send a 0 bit, it encodes it as −1. Figure 12.25: Data representation in CDMA For encoding: If a station needs to send a 0 bit, it encodes it as −1. if a station needs to send a 1 bit, it encodes it as +1. If a station is idle, it sends no signal (interpreted as a 0). 12.# 12.# 12.# 18

Figure 12.26: Sharing channel in CDMA If station 3 is listening to station 2, Station 3 multiplies the total data on the channel by the code for station 2. 12.19 12.# 12.# 12.# 19

Figure 12.27: Digital signal created by four stations in CDMA 12.# 12.# 12.# 20

Figure 12.28: Decoding of the composite signal for one in CDMA 12.21 12.# 12.# 12.# 21

In the Walsh table, each row is a sequence of chips. Figure 12.29: General rules and examples of creating Walsh tables To generate chip sequences, we use a Walsh table, which is a two-dimensional table with an equal number of rows and columns, In the Walsh table, each row is a sequence of chips. After we select W1, W2 can be made from four W1s, with the last one the complement of W1. W4 can be made of four W2s, with the last one the complement of W2. W8 is composed of four W4s, and so on. 12.22 12.# 12.# 12.# 22

Example 12.6 Find the chips for a network with a. Two stations b. Four stations 12.23 12.# 12.# 23 23

Example 12. 7 What is the number of sequences if we have 90 stations in our network? 2^6 =64 2^7 =1z28 12.24 12.# 12.# 24 24

Example 12.8 Self-Study Prove that a receiving station can get the data sent by a specific sender if it multiplies the entire data on the channel by the sender’s chip code and then divides it by the number of stations. 12.25 12.# 12.# 25 25