Net301 lecture9 11/5/2015 Lect 9 NET301.

Slides:



Advertisements
Similar presentations
Nick Feamster CS 4251 Computer Networking II Spring 2008
Advertisements

Channel Allocation Protocols. Dynamic Channel Allocation Parameters Station Model. –N independent stations, each acting as a Poisson Process for the purpose.
The ALOHA Protocol “Free for all”: whenever station has a frame to send, it does so. –Station listens for maximum RTT for an ACK. –If no ACK after a specified.
Ethernet – CSMA/CD Review
Fundamentals of Computer Networks ECE 478/578
Multiple access What if multiple machines are sharing the same link?
Lecture 9: Multiple Access Protocols
LECTURE 11 CT1303 LAN. DYNAMIC MAC PROTOCOL No fixed assignment for transmission media or any network resources.. It allows transmission when needed.
1 K. Salah Module 4.2: Media Access Control The Media Access Control (MAC) sublayer –Random Access (CSMA), IEEE –Token Passing, IEEE Ch 13-
1 Pertemuan 13 Teknik Akses Jaringan - Random Matakuliah: H0174/Jaringan Komputer Tahun: 2006 Versi: 1/0.
MAC Protocols Media Access Control (who gets the use the channel) zContention-based yALOHA and Slotted ALOHA. yCSMA. yCSMA/CD. TDM and FDM are inefficient.
CMPE 150- Introduction to Computer Networks 1 CMPE 150 Fall 2005 Lecture 17 Introduction to Computer Networks.
Copyright © 2003, Dr. Dharma P. Agrawal and Dr. Qing-An Zeng. All rights reserved. 1 Chapter 6 Multiple Radio Access.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Chapter 13 Multiple Access.
CMPE 150- Introduction to Computer Networks 1 CMPE 150 Fall 2005 Lecture 16 Introduction to Computer Networks.
EEC-484/584 Computer Networks Lecture 13 Wenbing Zhao
Semester EEE449 Computer Networks The Data Link Layer Part 2: Media Access Control En. Mohd Nazri Mahmud MPhil (Cambridge, UK) BEng (Essex,
Medium Access Control Sublayer
Network Topologies An introduction to Network Topologies and the Link Layer.
1 ECE453 – Introduction to Computer Networks Lecture 7 – Multiple Access Control (I)
9/11/2015 5:55 AM1 Ethernet and CSMA/CD CSE 6590 Fall 2010.
Chapter 4: Medium Access Control (MAC) Sublayer
LECTURE9 NET301. DYNAMIC MAC PROTOCOL: CONTENTION PROTOCOL Carrier Sense Multiple Access (CSMA): A protocol in which a node verifies the absence of other.
LAN technologies and network topology LANs and shared media Locality of reference Star, bus and ring topologies Medium access control protocols.
The Medium Access Control Sublayer Chapter 4. The Channel Allocation Problem Static Channel Allocation Dynamic Channel Allocation  Delay for the divided.
Data and Computer Communications Ninth Edition by William Stallings Data and Computer Communications, Ninth Edition by William Stallings, (c) Pearson Education.
Chi-Cheng Lin, Winona State University CS 313 Introduction to Computer Networking & Telecommunication Medium Access Control Sublayer.
Networks and Protocols CE Week 2b. Topologies, CSMA/CD, CSMA/CA.
جلسه یازدهم شبکه های کامپیوتری به نــــــــــــام خدا.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2000 Unit-II Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Medium Access Control Sub Layer
Chapter 6 Multiple Radio Access
5: DataLink Layer 5a-1 Multiple Access protocol. 5: DataLink Layer 5a-2 Multiple Access Links and Protocols Three types of “links”: r point-to-point (single.
Ch 12. Multiple Access. Multiple Access for Shared Link Dedicated link – Point-to-point connection is sufficient Shared link – Link is not dedicated –
LECTURE9 NET301 11/5/2015Lect 9 NET DYNAMIC MAC PROTOCOL: CONTENTION PROTOCOL Carrier Sense Multiple Access (CSMA): A protocol in which a node verifies.
1 Ethernet CSE 3213 Fall February Introduction Rapid changes in technology designs Broader use of LANs New schemes for high-speed LANs High-speed.
LECTURE 13 CT1303 LAN. DYNAMIC MAC PROTOCOL: CONTENTION PROTOCOL CSMA\CA Carrier Sense Multiple Access\Collision Avoidance CSMA\CA Each station will sense.
THE MEDIUM ACCESS CONTROL SUBLAYER 4.1 THE CHANNEL ALLOCATION PROBLEM 4.2 MULTIPLE ACCESS PROTOCOLS.
COMPUTER NETWORKS Data-link Layer (The Medium Access Control Sublayer) MAC Sublayer.
Multiple Access By, B. R. Chandavarkar, CSE Dept., NITK, Surathkal Ref: B. A. Forouzan, 5 th Edition.
Example DLL Protocols 1. High-Level Data Link Control (HDLC).
Data Link Layer Lower Layers Local Area Network Standards
A Taxonomy of Mechanisms for Multi-Access
Lecture #9 MAC Protocols
Chapter 12 Multiple Access.
Lab 7 – CSMA/CD (Data Link Layer Layer)
CT301 LECTURE 8.
Part III Datalink Layer 10.
High Speed LANs – Ethernet and Token Ring
Chapter 14 LAN Systems Ethernet (CSMA/CD) ALOHA Slotted ALOHA CSMA
Multiple Access Mahesh Jangid Assistant Professor JVW University.
Channel Allocation (MAC)
Services of DLL Framing Link access Reliable delivery
Figure 12.1 Data link layer divided into two functionality-oriented sublayers Networks can be divided into two categories: those using point-to-point.
THE IEEE MAC SUB-LAYER – chapter 14
Multiple Access Methods
Learning Objectives After interacting with this Learning Object, the learner will be able to: Explain the process of collision detection in CSMA/CD.
The Medium Access Control Sublayer
Channel Allocation Problem/Multiple Access Protocols Group 3
Chapter 12 Multiple Access
Ethernet – CSMA/CD Review
Channel Allocation Problem/Multiple Access Protocols Group 3
Data Communication Networks
Wireless LAN Simulation IEEE MAC Protocol
CARRIER SENSE MULTIPLE ACCESS (CSMA)
Chapter 6 Multiple Radio Access.
Dr. John P. Abraham Professor UTPA
Multiple Access Control (MAC) Protocols
Part III Datalink Layer 10.
Presentation transcript:

net301 lecture9 11/5/2015 Lect 9 NET301

Dynamic mac protocol: contention protocol Carrier Sense Multiple Access (CSMA): A protocol in which a node verifies the absence of other traffic before transmitting on a shared transmission medium. Transmitter uses feedback from a receiver to determine whether another transmission is in progress before initiating a transmission. That is, it tries to detect the presence of a carrier wave from another station before attempting to transmit. 11/5/2015 Lect 9 NET301

Dynamic mac protocol: contention protocol Carrier sense, if busy wait for a random period. When carrier is idle, encapsulate data into a packets, then send it through the transmission channel. Reads what in channel. Check integrity of packet, if packet sent similar to received, transmission successes. Otherwise, collision occurs, wait for random period then repeat the transmission again. Less collisions occur than ALOHA, due to carrier sense before transmitting data 11/5/2015 Lect 9 NET301

Dynamic mac protocol: contention protocol Better use of CSMA achieved with better carrier sense. Carrier sense may be difficult when network channel is long. CSMA is not effective with long network channel . Slotted CSMA: dividing time to slots, sense only when starting time of the slot. 11/5/2015 Lect 9 NET301

11/5/2015 Lect 9 NET301

Dynamic mac protocol: contention protocol Non CSMA persistent: In this protocol, before sending the data, the station senses the channel and if the channel is idle it starts transmitting the data. But if the channel is busy, the station does not continuously sense it but instead of that it waits for random amount of time and repeats the algorithm.  Persistent CSMA When the sender (station) is ready to transmit data, it checks if the transmission medium is busy. If so, it then senses the medium continually until it becomes idle, and then it transmits the message (packet). 11/5/2015 Lect 9 NET301

Dynamic mac protocol: contention protocol P-persistent CSMA: When the sender is ready to send data, it checks continually if the medium is busy. If the medium becomes idle, the sender transmits a frame with a probability p. If the station chooses not to transmit (the probability of this event is 1-p), the sender waits until the next available time slot and transmits again with the same probability p. 11/5/2015 Lect 9 NET301

Dynamic mac protocol: contention protocol Advantages: Less collisions probabilities compared to ALOHA. Transmission on demand only. Disadvantages: Unknown delay when more nodes are connected. Collisions still occur. Network with heavy traffic may not benefit with CSMA. 11/5/2015 Lect 9 NET301

Dynamic mac protocol: contention protocol 11/5/2015 Lect 9 NET301

Dynamic mac protocol: contention protocol Carrier Sense Multiple Access\collision Detection (CSMA\CD): It uses a carrier sensing scheme in which a transmitting data station detects other signals while transmitting a frame, and stops transmitting that frame, transmits a jam signal, and then waits for a random time interval before trying to resend the frame. When collision detection: it sends Jamming Signal to tell other stations that collision has occurred. CSMA/CD is used to improve CSMA performance by terminating transmission as soon as a collision is detected 11/5/2015 Lect 9 NET301

Dynamic mac protocol: contention protocol Main procedure: Is my frame ready for transmission? If yes, it goes on to the next point. Is medium idle? If not, wait until it becomes ready Start transmitting. Did a collision occur? If so, go to collision detected procedure. Reset retransmission counters and end frame transmission. 11/5/2015 Lect 9 NET301

Dynamic mac protocol: contention protocol Collision detected procedure: Continue transmission (with a jam signal instead of frame header/data/CRC) until minimum packet time is reached to ensure that all receivers detect the collision. Increment retransmission counter. Was the maximum number of transmission attempts reached? If so, abort transmission. Calculate and wait random back off period based on number of collisions. Re-enter main procedure at stage 1. 11/5/2015 Lect 9 NET301

Dynamic mac protocol: contention protocol Advantages: Less collision occurred compared to CSMA. Transmission on demand. Disadvantages: Unknown delay when more nodes are connected. Wasted time exits due to collisions, but better performance and wasted time compare to CSMA. Used mostly in IEEE LANs, and called Ethernet Protocol; developed by Xerox. 11/5/2015 Lect 9 NET301

11/5/2015 Lect 9 NET301

Dynamic mac protocol: contention protocol CSMA\CA Carrier Sense Multiple Access\Collision Avoidance CSMA\CA Each station will sense the channel and inform all the rest station in the network that it will start transmitting data over the channel. In this protocol the collision may occur between Request To Send RTS frames or Confirm to Send CTS frames. Collisions don’t occur between data frames. 11/5/2015 Lect 9 NET301

11/5/2015 Lect 9 NET301

11/5/2015 Lect 9 NET301

Dynamic mac protocol: contention protocol CSMA\CA Advantages: Collisions do NOT occur between data frames. Transmission on demand only. Channel utilization is efficient when request and confirm to send done successfully. Used mostly and better for Wireless networks. Disadvantages: Unlimited waste of time (waiting) if nodes connected are large. Used in Wireless LANs and Apple Talk for apple devices. 11/5/2015 Lect 9 NET301

Contention protocol advantages and disadvantages: Transmission on demand. Better used for discontinuous transmission of signal and data (computer networks in general) Better used in networks with light traffic. Disadvantages: Large number of connected nodes results in not utilizing the channel effectively. Wasted time (waiting) Sensing channels becomes difficult in large and long network channels 11/5/2015 Lect 9 NET301

Dynamic mac protocol: Reservation protocols: To better channel utilizing and eliminate attenuation may occur in network channels due to collisions; Distributed Queue Dual Bus (DQDB): This protocol is intended to be used on a dual-bus configuration (unidirectional) fiber optic networks. Two buses , each one in one direction, and each node is connected to the two buses. Centralized unit for each bus to control transmission. 11/5/2015 Lect 9 NET301

Dynamic mac protocol: Reservation protocols: DQDB 11/5/2015 Lect 9 NET301

Dynamic mac protocol: Reservation protocols: DQDB Each centralized unit will send empty frames to the channel, which can be used by connected nodes to transmit data. Each frame has 2 flags; one to identify whether the frame is empty and ready for used or has been reserved by another node. The other flag identifies if there is a Reservation request of frames on the other channel (bus). This protocol needed 2 counters in each connected node, that determine the number previous reservations for each channel, the counters will be incremented each time a frame with reservation flag on passes the connected node. 11/5/2015 Lect 9 NET301

Dynamic mac protocol: Reservation protocols: DQDB When a node wants to send data to another node: Chooses which channel will be used. Turn on the reservation flag on a frame on the other channel. The node will then use one of the empty frames with its data. This protocol is used in Ring networks, LAN and MAN networks. 11/5/2015 Lect 9 NET301

11/5/2015 Lect 9 NET301

Dynamic mac protocol: Reservation protocols: DQDB Advantages: Transmission guaranteed. Limit delay time. Channel utilization %100 Disadvantages: Number of software needed for each connected node to control and determine the location of the node in the network. The need for centralized unit to control frames. If the centralized unit stopped, the protocol is stopped. 11/5/2015 Lect 9 NET301

11/5/2015 Lect 9 NET301

Reservation protocols LAN MAC protocols Dynamic MAC protocols Round robin protocols: Token pass Polling Hub-polling Roll-call Polling Binary Tree Polling Contention protocols Pure Aloha Multiple Access Slotted Aloha Multiple Access Carrier Sense Multiple Access (CSMA) Non CSMA persistent Persistent CSMA P_Persistent CSMA Carrier Sense Multiple Access/ Collision Detection (CSMA/CD) Carrier Sense Multiple Access/ Collision Avoidance (CSMA/CA) Reservation protocols Distributed Queue Dual Bus (DQDB 10/29/2015 Lect 8 NET301