Communication Networks NETW 501

Slides:



Advertisements
Similar presentations
14-MAC Sub-layer Dr. John P. Abraham Professor UTPA.
Advertisements

12.1 Chapter 12 Multiple Access Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Multiple access What if multiple machines are sharing the same link?
Multiple Access Methods. When nodes or stations are connected and use a common link (cable or air), called a multipoint or broadcast link, we need a.
LECTURE 11 CT1303 LAN. DYNAMIC MAC PROTOCOL No fixed assignment for transmission media or any network resources.. It allows transmission when needed.
Comp 361, Spring 20056:Basic Wireless 1 Chapter 6: Basic Wireless (last updated 02/05/05) r A quick intro to CDMA r Basic
12.1 Chapter 12 Multiple Access Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Chapter 13 Multiple Access.
EEC-484/584 Computer Networks Lecture 9 Wenbing Zhao (Part of the slides are based on materials supplied by Dr. Louise Moser at UCSB and.
Medium Access Control Sublayer
: Data Communication and Computer Networks
Chi-Cheng Lin, Winona State University CS412 Introduction to Computer Networking & Telecommunication Medium Access Control Sublayer.
© Janice Regan, CMPT 128, CMPT 371 Data Communications and Networking LANs 2: MAC protocols.
Medium Access Control NWEN302 Computer Network Design.
MEDIUM ACCESS CONTROL Wireless channel is a shared medium MAC coordinates transmission between users sharing the spectrum Goals: prevent collisions while.
© 2009 Pearson Education Inc., Upper Saddle River, NJ. All rights reserved. © The McGraw-Hill Companies, Inc. Medium Access Control Asst. Prof. Chaiporn.
4: DataLink Layer1 Multiple Access Links and Protocols Three types of “links”: r point-to-point (single wire, e.g. PPP, SLIP) r broadcast (shared wire.
12.1 Chapter 12 Multiple Access Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Data Communications, Kwangwoon University12-1 Chapter 12. Multiple Access 1.Random Access 2.Controlled Access 3.Channelization.
5: DataLink Layer 5a-1 Multiple Access protocol. 5: DataLink Layer 5a-2 Multiple Access Links and Protocols Three types of “links”: r point-to-point (single.
Ch 12. Multiple Access. Multiple Access for Shared Link Dedicated link – Point-to-point connection is sufficient Shared link – Link is not dedicated –
LECTURE9 NET301 11/5/2015Lect 9 NET DYNAMIC MAC PROTOCOL: CONTENTION PROTOCOL Carrier Sense Multiple Access (CSMA): A protocol in which a node verifies.
1 Kyung Hee University Prof. Choong Seon HONG Multiple Access.
UNIT 3 MULTIPLE ACCESS Adapted from lecture slides by Behrouz A. Forouzan © The McGraw-Hill Companies, Inc. All rights reserved.
Multiple Access. Figure 12.1 Data link layer divided into two functionality-oriented sublayers.
2. Data Link Layer: Medium Access Control. Scheduling.
Chapter 5 Link Layer Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 A note on the use of these.
Lecture Multiple Access Techniques Dr. Ghalib A. Shah
A Taxonomy of Mechanisms for Multi-Access
Multiple Access Methods
MEDIUM ACCESS CONTROL PROTOCOL
Data link layer divided into two functionality-oriented sublayers
CT301 LECTURE 8.
Chapter 5 Link Layer and LANs
Sidevõrgud IRT 4060/ IRT 0020 vooruloeng 6 / 20. okt 2004
Chapter 12 Multiple Access
Part III Datalink Layer 10.
Multiple Access Problem: When two or more nodes transmit at the same time, their frames will collide and the link bandwidth is wasted during collision.
Computer Communication Networks
Multiple Access Mahesh Jangid Assistant Professor JVW University.
Channel Allocation (MAC)
Subject Name: Computer Communication Networks Subject Code: 10EC71
Net301 lecture9 11/5/2015 Lect 9 NET301.
Chapter 12 Multiple Access
Figure 12.1 Data link layer divided into two functionality-oriented sublayers Networks can be divided into two categories: those using point-to-point.
THE IEEE MAC SUB-LAYER – chapter 14
Communication Networks NETW 501
Multiple Access Methods
Learning Objectives After interacting with this Learning Object, the learner will be able to: Explain the process of collision detection in CSMA/CD.
Communication Networks NETW 501
Chapter 13 Multiple Access.
Communication Networks NETW 501
Communication Networks NETW 501
Chapter 13 Multiple Access
Communication Networks NETW 501
Communication Networks NETW 501
Communication Networks NETW 501
Channel Allocation Problem/Multiple Access Protocols Group 3
Chapter 12 Multiple Access
Link Layer and LANs Not everyone is meant to make a difference. But for me, the choice to lead an ordinary life is no longer an option 5: DataLink Layer.
Channel Allocation Problem/Multiple Access Protocols Group 3
Chapter 13 Multiple Access
Lecture 5- Data Link Layer
Multiple Access Methods
Chapter 6 Multiple Radio Access.
Dr. John P. Abraham Professor UTPA
Multiple Access Control (MAC) Protocols
Part III Datalink Layer 10.
Chapter 12 Media Access Control (MAC)
Chapter 12 Media Access Control (MAC)
Presentation transcript:

Communication Networks NETW 501 Lecture 6 Medium Access Control – Part 2 Course Instructor: Dr.-Ing. Maggie Mashaly maggie.ezzat@guc.edu.eg C3.220

Outline Channelization Medium Access Protocols FDMA TDMA CDMA Random Access ALOHA CSMA CSMA/CD Scheduling Reservation Polling Token Passing Channelization FDMA TDMA CDMA

Scheduling

Scheduling Why do we need Scheduling? Solution: Under high loads, random access may suffer from high levels of collisions reducing the throughput Collisions and retransmission also mean increased delay in packet delivery Solution: Scheduling schemes attempt to provide an orderly access to the transmission medium Requires signaling

Scheduling We are going to learn about several scheduling techniques: Reservation Polling Token Passing

1. Reservation Controller Process I need to send 3 frames I need to send 2 frames Controller Process A C I need to send 4 frames I need to send 1 frame B D Processing Timeslot 1 2 3 4 5 6 7 8 9 10 Reserving Terminal B A D C Request messages are sent over signaling channels

1. Reservation Controller Process Timeslot 1 2 3 4 5 6 7 8 9 10 Use slots 2,7,10 Use slots 6, 9 Controller Process A C Use slots 3,4,5,8 Use slot 1 B D Timeslot 1 2 3 4 5 6 7 8 9 10 Reserving Terminal B A D C

2. Polling Controller Process Do you have something to send? Do you have something to send? Controller Process A C Do you have something to send? Do you have something to send? B D At any given time only one terminal has the right to transmit over the medium The central station could poll in Round Robin fashion Some other pre-determined order Polling messages are send over signaling channels

2. Polling : System Options Service Limits How much is a station allowed to transmit per poll? - Exhaustive : until station’s data buffer is empty (including new frame arrivals) Gated : all data in buffer when poll arrives Frame-Limited : one frame per poll Time-Limited : up to some maximum time Priority mechanisms More bandwidth & lower delay for stations that appear multiple times in the polling list Issue polls for stations with message of priority k or higher

3. Token Passing Reservation and polling require a central controller In Token Passing the coordination for accessing the medium is distributed A Token is either Free (No terminal is transmitting) Busy (Some terminal is transmitting) A C B D A Token Ring Operation A station that has something to send and sees a free token, changes the state of token to busy and inserts its address in the sender filed of the header D A Free Token Busy Token Data Frame Sender Field in Header Dest. Field in Header

3. Token Passing Reservation and polling require a central controller In Token Passing the coordination for accessing the medium is distributed A Token is either Free (No terminal is transmitting) Busy (Some terminal is transmitting) A C B D C Token Ring Operation A station that sees the token as busy and its name is not in the sender or destination fields, simply acts as repeater than forwards the frame D A D A Free Token Busy Token Data Frame Sender Field in Header Dest. Field in Header

3. Token Passing Reservation and polling require a central controller In Token Passing the coordination for accessing the medium is distributed A Token is either Free (No terminal is transmitting) Busy (Some terminal is transmitting) A C B D D Token Ring Operation Send data frame to upper layer A station that sees the token as busy and its name is in the destination field, sends the data frame to the upper layer before acting as a repeater D A D A Free Token Busy Token Data Frame Sender Field in Header Dest. Field in Header

3. Token Passing Reservation and polling require a central controller In Token Passing the coordination for accessing the medium is distributed A Token is either Free (No terminal is transmitting) Busy (Some terminal is transmitting) A C B D A Token Ring Operation A station that sees the token as busy and its name is in the sender fields, changes the state of the token to free and removes the frame from the ring D A Free Token Busy Token Data Frame Sender Field in Header Dest. Field in Header

Channelization

Single Shared Channel: Is it enough? NO! … WHY? Services demands are smaller than total available system resources It is sometimes desirable to allow simultaneous communications from multiple users Channelization Sub-dividing the available bandwidth (i.e., resources) into several (orthogonal) channels Channelization Techniques FDMA : Frequency Division Multiple Access TDMA : Time Division Multiple Access CDMA : Code Division Multiple Access Medium access protocols are still needed to regulate use of available channels

Channelization Techniques FDMA Channel bandwidth divided into frequency bands At any given instant each band should be used by only one user

Channelization Techniques TDMA System resources are divided in to time slots Each user uses the entire bandwidth but not all the time

Channelization Techniques CDMA Each user is allocated a unique code to use for communication Users may transmit simultaneously over the same frequency band Used in wireless systems

Channelization Techniques Summary

Medium Access Control Summary Medium Access Protocols Rules to access shared channels Medium Access Techniques Random (e.g., ALOHA, CSMA, CSMA/CD) Scheduling (e.g., Reservation, Polling, Token Passing) Channelization Sub-dividing the system bandwidth in to multiple channels Medium access techniques can be extended to define rules for access to available channel

References NETW 501 Lectures slides by Assoc. Prof. Tallal El-Shabrawy “Communication Networks 2nd Edition”, A. Leon-Garcia and I. Widjaja, McGraw Hill, 2013 “Computer Networks 4th Edition”, A. S. Tanenbaum, Pearson International