The Medium Access Control Sublayer

Slides:



Advertisements
Similar presentations
Nick Feamster CS 4251 Computer Networking II Spring 2008
Advertisements

14-MAC Sub-layer Dr. John P. Abraham Professor UTPA.
EECC694 - Shaaban #1 lec #5 Spring Data Link In Broadcast Networks: The Media Access Sublayer Broadcast networks with multi-access (or random.
Fundamentals of Computer Networks ECE 478/578
Multiple access What if multiple machines are sharing the same link?
Multiple Access Methods. When nodes or stations are connected and use a common link (cable or air), called a multipoint or broadcast link, we need a.
LECTURE 11 CT1303 LAN. DYNAMIC MAC PROTOCOL No fixed assignment for transmission media or any network resources.. It allows transmission when needed.
1 K. Salah Module 4.2: Media Access Control The Media Access Control (MAC) sublayer –Random Access (CSMA), IEEE –Token Passing, IEEE Ch 13-
1 Pertemuan 13 Teknik Akses Jaringan - Random Matakuliah: H0174/Jaringan Komputer Tahun: 2006 Versi: 1/0.
EEC-484/584 Computer Networks Lecture 7 Wenbing Zhao
Wireless & Mobile Networking: Multiple Radio Access Azizol Bin Abdullah (A2.04) Rujukan: Text Book Chapter 6.
MAC Protocols Media Access Control (who gets the use the channel) zContention-based yALOHA and Slotted ALOHA. yCSMA. yCSMA/CD. TDM and FDM are inefficient.
CS 5253 Workshop 1 MAC Protocol and Traffic Model.
Copyright © 2003, Dr. Dharma P. Agrawal and Dr. Qing-An Zeng. All rights reserved. 1 Chapter 6 Multiple Radio Access.
CMPE 150- Introduction to Computer Networks 1 CMPE 150 Fall 2005 Lecture 16 Introduction to Computer Networks.
EEC-484/584 Computer Networks Lecture 13 Wenbing Zhao
EEC-484/584 Computer Networks Lecture 9 Wenbing Zhao (Part of the slides are based on materials supplied by Dr. Louise Moser at UCSB and.
Semester EEE449 Computer Networks The Data Link Layer Part 2: Media Access Control En. Mohd Nazri Mahmud MPhil (Cambridge, UK) BEng (Essex,
Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011 The Medium Access Control Sublayer Chapter.
1 Chapter 5 The Medium Access Sublayer. 2 Chapter 5 The Medium Access Layer 5.1 The Channel Allocation problem - Static and dynamic channel allocation.
Medium Access Control Sublayer
1 ECE453 – Introduction to Computer Networks Lecture 7 – Multiple Access Control (I)
CIS 725 Media Access Layer. Medium Access Control Sublayer MAC sublayer resides between physical and data link layer Broadcast/multiacess channels N independent.
Chi-Cheng Lin, Winona State University CS412 Introduction to Computer Networking & Telecommunication Medium Access Control Sublayer.
Chapter 4: Medium Access Control (MAC) Sublayer
CHAPTER 4: THE MEDIUM ACCESS SUBLAYER 4.1: The Channel Allocation Problem 4.2: Multiple Access Protocols.
LECTURE9 NET301. DYNAMIC MAC PROTOCOL: CONTENTION PROTOCOL Carrier Sense Multiple Access (CSMA): A protocol in which a node verifies the absence of other.
جلسه دهم شبکه های کامپیوتری به نــــــــــــام خدا.
Layer 2 Technologies At layer 2 we create and transmit frames over communications channels Format of frames and layer 2 transmission protocols are dependent.
The Medium Access Control Sublayer Chapter 4. The Channel Allocation Problem Static Channel Allocation Dynamic Channel Allocation  Delay for the divided.
Chi-Cheng Lin, Winona State University CS 313 Introduction to Computer Networking & Telecommunication Medium Access Control Sublayer.
جلسه یازدهم شبکه های کامپیوتری به نــــــــــــام خدا.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2000 Unit-II Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
4: DataLink Layer1 Multiple Access Links and Protocols Three types of “links”: r point-to-point (single wire, e.g. PPP, SLIP) r broadcast (shared wire.
Medium Access Control Sub Layer
Chapter 6 Multiple Radio Access
5: DataLink Layer 5a-1 Multiple Access protocol. 5: DataLink Layer 5a-2 Multiple Access Links and Protocols Three types of “links”: r point-to-point (single.
LECTURE9 NET301 11/5/2015Lect 9 NET DYNAMIC MAC PROTOCOL: CONTENTION PROTOCOL Carrier Sense Multiple Access (CSMA): A protocol in which a node verifies.
Carrier Sense Multiple Access Improve ALOHA by using carrier sense –Stations listen to the carrier before transmitting –If channel is busy, the station.
Chapter 4 The Medum Access Sublayer. MA Sublayer Additional Reference –Local and Metropolitan Area Networks, William Stallings, Prentice Hall, 2000, 6th.
THE MEDIUM ACCESS CONTROL SUBLAYER 4.1 THE CHANNEL ALLOCATION PROBLEM 4.2 MULTIPLE ACCESS PROTOCOLS.
COMPUTER NETWORKS Data-link Layer (The Medium Access Control Sublayer) MAC Sublayer.
THE MEDIUM ACCESS CONTROL SUBLAYER 4.1 THE CHANNEL ALLOCATION PROBLEM 4.2 MULTIPLE ACCESS PROTOCOLS.
Multiple Access By, B. R. Chandavarkar, CSE Dept., NITK, Surathkal Ref: B. A. Forouzan, 5 th Edition.
4.1 THE CHANNEL ALLOCATION PROBLEM THE CHANNEL ALLOCATION PROBLEM : how to allocate a single broadcast channel among competing users. The channel might.
Example DLL Protocols 1. High-Level Data Link Control (HDLC).
Week3 The Medium Access Sublayer
A Taxonomy of Mechanisms for Multi-Access
Multiple Access Methods
Introduction to Queueing Theory
CT301 LECTURE 8.
Part III Datalink Layer 10.
Module 3 Medium Access Control.
Multiple Access Mahesh Jangid Assistant Professor JVW University.
Channel Allocation (MAC)
Net301 lecture9 11/5/2015 Lect 9 NET301.
Services of DLL Framing Link access Reliable delivery
The Medium Access Control Sublayer
THE IEEE MAC SUB-LAYER – chapter 14
Multiple Access Methods
Learning Objectives After interacting with this Learning Object, the learner will be able to: Explain the process of collision detection in CSMA/CD.
Channel Allocation Problem/Multiple Access Protocols Group 3
Channel Allocation Problem/Multiple Access Protocols Group 3
Data Communication Networks
Multiple Access Methods
Chapter 6 Multiple Radio Access.
Dr. John P. Abraham Professor UTPA
Multiple Access Control (MAC) Protocols
Part III Datalink Layer 10.
Chapter 12 Media Access Control (MAC)
Presentation transcript:

The Medium Access Control Sublayer Presentation By: Group 3

What is the Medium Access Control Sublayer? Can divide networks into point-to-point and broadcast. Look at broadcast networks and their protocols. When many stations compete for a channel (e.g., broadcast channel such as an Ethernet), an algorithm must arbitrate access to the shared channel. Need a way of insuring that when two or more stations wish to transmit, they all wait until doing so won't interfere with other transmitters. Broadcast links include LANs, satellites (WAN), etc.

The Channel Allocation Problem Static Channel Allocation For N users, the bandwidth is divided into N equal-sized portions. Works well with small, constant number of users with steady or heavy traffic. Doesn't work well with large and varied number of users with bursty traffic.

The Channel Allocation Problem Dynamic Channel Allocation Stations will generate a frame and will do nothing else until that frame has been transmitted. All stations/terminals are equal and thus all communication travels across a single channel. Each station keeps track of collision and will retransmit the frame. Frame transmission can occur instantly or on set intervals. A station can sense if a channel is busy before sending the frame or it can transmit the frame and find out if it is busy or idle.

CSMA Protocol What is CSMA (Carrier Sense Multiple Access)? Protocols in which stations listen for the carrier and act accordingly. Protocols: 1-Persistent - Station listens to channel activity, if channel is idle the station transmits, and if a collision is detected the station waits a random time before retransmitting. Non-Persistent - Station senses for channel activity, if channel is free station sends a frame. If the known channel is in use the station stops sensing and waits a random time before re-sensing. P-Persistent (Slotted channels) - Station senses if channel is free, if channel is idle the station transmits with a probability of q = 1 - p.

CSMA Protocol cont. CSMA/CD Is the basis of Ethernet LAN. Similar to other protocols but with built in CD (Collision Detection). A collisions occurs when a device or node tries to send data at the same time another device does. Consists of 3 States: transmission, contention, or idle state. Functionality: Any device or node can try to send data to the channel at any time. If a collision is detected the frame is discarded and the device then waits a random amount of time then resends the data.

ALOHA What is ALOHA? A system for coordinating and arbitrating access to a shared communication network channel. First Medium Access Control that was created in the early 1970s in Hawaii. Created by Norman Abramson, a researcher at the University of Hawaii. Uses short-ranged radios, with each user terminal sharing an upstream frequency to send frames to a central computer. Two versions of ALOHA: pure and slotted. Norman Abramson

ALOHA continued... Pure (Unslotted) ALOHA Slotted ALOHA Can transmit whenever something must be sent User must listen for a repeated message, try again if not heard Must wait a random amount of time before resending a transmission As soon as a frame arrives in the channel, it is transmitted Transmission time is continuous Slotted ALOHA Transmission time divided into discrete intervals called slots, each corresponding to a single frame Users must wait to send a transmission if another user has taken that particular time slot, they must wait for the next slot Halves the amount of collisions occurring Used for cable and RFIDs

Collision-free Protocols Bit-map protocol Transmission protocol with N slots During the contention period, each station announces whether they have data to send during the Nth slot by sending a 1 bit After this, each station that sent a 1 bit sends their frame This is done in numerical order

Collision-free Protocols Token Passing Each station passes a token from one to the next station in a predefined order This token represents permission to send a frame If a station does not need to send any frames, it can just pass the token along to the next station Token ring protocol Each station passes the token and frames in a cyclical direction

Limited Contention Protocols Takes the best of contention and collision-free protocols Collision based protocols are best when the network load = low Collision-free based protocols are best when the network load = high Adaptive Tree Walk Protocol Partitions the groups of the station and then limits convention for each slot Treat stations as the leaf of a binary tree First slot all stations can try to get the slot If no conflict, fine If conflict then only nodes under a subtree get to try for the next one

Wireless LAN Protocols Wireless has complications that wired does not. Collision detection is different than for wired, not nearly as easy. Multiple Access with Collision Avoidance (MACA) helps reduce number of collisions Sender sends Request to Send (RTS) Receiver sends Clear to Send (CTS) which clears the station for the incoming transmission

Video https://www.youtube.com/watch?v=nyYr3cR5BTw