Communication Networks NETW 501

Slides:



Advertisements
Similar presentations
Fundamentals of Computer Networks ECE 478/578
Advertisements

Communication Networks Lecture 5 NETW 501-L5: NETW 501-L5: Medium Access Control Dr.-Ing. Khaled Shawky Hassan Room: C3-222, ext: 1204,
1 Pertemuan 13 Teknik Akses Jaringan - Random Matakuliah: H0174/Jaringan Komputer Tahun: 2006 Versi: 1/0.
MAC Protocols Media Access Control (who gets the use the channel) zContention-based yALOHA and Slotted ALOHA. yCSMA. yCSMA/CD. TDM and FDM are inefficient.
CMPE 150- Introduction to Computer Networks 1 CMPE 150 Fall 2005 Lecture 17 Introduction to Computer Networks.
Copyright © 2003, Dr. Dharma P. Agrawal and Dr. Qing-An Zeng. All rights reserved. 1 Chapter 6 Multiple Radio Access.
CMPE 150- Introduction to Computer Networks 1 CMPE 150 Fall 2005 Lecture 16 Introduction to Computer Networks.
Studying Local Area Networks Via Media Access Control (MAC) SubLayer
Networks: Local Area Networks1 LANs Studying Local Area Networks Via Media Access Control (MAC) SubLayer.
Computer Networks: Local Area Networks 1 LANs Studying Local Area Networks via the Media Access Control (MAC) SubLayer.
Medium Access Control Sublayer
: Data Communication and Computer Networks
Chi-Cheng Lin, Winona State University CS412 Introduction to Computer Networking & Telecommunication Medium Access Control Sublayer.
LECTURE9 NET301. DYNAMIC MAC PROTOCOL: CONTENTION PROTOCOL Carrier Sense Multiple Access (CSMA): A protocol in which a node verifies the absence of other.
Chi-Cheng Lin, Winona State University CS 313 Introduction to Computer Networking & Telecommunication Medium Access Control Sublayer.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2000 Unit-II Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
© 2009 Pearson Education Inc., Upper Saddle River, NJ. All rights reserved. © The McGraw-Hill Companies, Inc. Medium Access Control Asst. Prof. Chaiporn.
4: DataLink Layer1 Multiple Access Links and Protocols Three types of “links”: r point-to-point (single wire, e.g. PPP, SLIP) r broadcast (shared wire.
Data Communications, Kwangwoon University12-1 Chapter 12. Multiple Access 1.Random Access 2.Controlled Access 3.Channelization.
Chapter 6 Multiple Radio Access
5: DataLink Layer 5a-1 Multiple Access protocol. 5: DataLink Layer 5a-2 Multiple Access Links and Protocols Three types of “links”: r point-to-point (single.
Ch 12. Multiple Access. Multiple Access for Shared Link Dedicated link – Point-to-point connection is sufficient Shared link – Link is not dedicated –
LECTURE9 NET301 11/5/2015Lect 9 NET DYNAMIC MAC PROTOCOL: CONTENTION PROTOCOL Carrier Sense Multiple Access (CSMA): A protocol in which a node verifies.
Medium Access Control Protocols, Local Area Networks, and Wireless Local Area Networks Lecture Note 10.
UNIT 3 MULTIPLE ACCESS Adapted from lecture slides by Behrouz A. Forouzan © The McGraw-Hill Companies, Inc. All rights reserved.
COMPUTER NETWORKS Data-link Layer (The Medium Access Control Sublayer) MAC Sublayer.
2. Data Link Layer: Medium Access Control. Scheduling.
Multiple Access By, B. R. Chandavarkar, CSE Dept., NITK, Surathkal Ref: B. A. Forouzan, 5 th Edition.
Example DLL Protocols 1. High-Level Data Link Control (HDLC).
Data Link Layer Lower Layers Local Area Network Standards
ECEN “Mobile Wireless Networking”
Lecture 7 CSMA and Spread Spectrum Dr. Ghalib A. Shah
MEDIUM ACCESS CONTROL PROTOCOL
Data link layer divided into two functionality-oriented sublayers
Chapter 12 Multiple Access.
Lab 7 – CSMA/CD (Data Link Layer Layer)
Chapter 12 Multiple Access
Part III Datalink Layer 10.
High Speed LANs – Ethernet and Token Ring
Chapter 14 LAN Systems Ethernet (CSMA/CD) ALOHA Slotted ALOHA CSMA
Multiple Access Mahesh Jangid Assistant Professor JVW University.
Channel Allocation (MAC)
Subject Name: Computer Communication Networks Subject Code: 10EC71
Net301 lecture9 11/5/2015 Lect 9 NET301.
Services of DLL Framing Link access Reliable delivery
Figure 12.1 Data link layer divided into two functionality-oriented sublayers Networks can be divided into two categories: those using point-to-point.
THE IEEE MAC SUB-LAYER – chapter 14
Communication Networks NETW 501
Communication Networks NETW 501
Multiple Access Methods
Learning Objectives After interacting with this Learning Object, the learner will be able to: Explain the process of collision detection in CSMA/CD.
Communication Networks NETW 501
Communication Networks NETW 501
Communication Networks NETW 501
The Medium Access Control Sublayer
Chapter 13 Multiple Access
Communication Networks NETW 501
Channel Allocation Problem/Multiple Access Protocols Group 3
Chapter 12 Multiple Access
Channel Allocation Problem/Multiple Access Protocols Group 3
Data Communication Networks
Chapter 13 Multiple Access
CSE 313 Data Communication
CARRIER SENSE MULTIPLE ACCESS (CSMA)
Chapter 6 Multiple Radio Access.
Dr. John P. Abraham Professor UTPA
Multiple Access Control (MAC) Protocols
Part III Datalink Layer 10.
Chapter 12 Media Access Control (MAC)
Chapter 12 Media Access Control (MAC)
Presentation transcript:

Communication Networks NETW 501 Lecture 5 Medium Access Control Course Instructor: Dr.-Ing. Maggie Mashaly maggie.ezzat@guc.edu.eg C3.220

Outline Medium Access Protocols Channelization Summary Random Access ALOHA CSMA CSMA/CD Scheduling Reservation Polling Token Passing Summary Channelization FDMA TDMA CDMA

Multiple Access Protocols Why do we need Medium Access Control? Multiple Access Protocols Random Access Scheduling

Random Access

Electrical Engineering ALOHA Protocols Hawaii Islands 1970s University of Hawaii needed a means to inter-connect terminals located at campuses on multiple islands to the host computer on main campus Packet Radio Messages are transmitted as soon as they become available Electrical Engineering Arts Management

ALOHA Operation Collision No Collision Terminal A Terminal A Terminal A Terminal B Terminal B Terminal B Collision Transmissions from two or more terminals overlap in time ALOHA Operation Messages transmitted once available From time-to-time messages collide (treated as erroneous frames) The terminal knows that its messages was corrupted when it receives no acknowledgements within 2tprop (i.e., a timeout is used) Recovery by the use of retransmissions Can we simply apply retransmission directly after timeouts? NO! Retransmissions will collide again SOLUTION: Retransmission after random intervals from timeouts (Backoff Algorithm)

Re-Transmission IF NECESSARY ALOHA Operation First Transmission Re-Transmission IF NECESSARY t0-X t0 t0+X t0+X+2tpropo t0+X+2tprop+B Vulnerable Period Backoff Period Timeout Vulnerable Period: Collision will occur if any other terminal commences transmission within this period Backoff Period Random time set for retransmission

Slotted ALOHA Objective Reduce the probability of collisions HOW? Transmission in synchronized slots Avoid partial collisions First Transmission Re-Transmission IF NECESSARY (k+2+B+ciel(2tprop/X))X kX (k+1)X (k+2)X +2tprop Backoff Period Vulnerable Period Timeout

ALOHA Performance System Load G: Average number of packets generated within packet transmission time X Throughput S: Average number of packets transmitted successfully within packet transmission time X

Carrier Sense Multiple Access Low throughput of ALOHA is due to waste of bandwidth due to collisions CSMA: Sense (i.e., Listen) the medium for presence of a carrier signal before transmission A terminal transmit only if a sense an idle channel Widely used in LAN with Bus Topology Vulnerable period = tprop Network Diameter A B C Station A starts transmission at time t=0 A B C At time tprop (for electrical energy to propagate from A to C) all network terminals would have listened to the transmission from A. Terminal A is said to have captured the channel

Classes of CSMA CSMA schemes vary with the behavior when the terminal has something to send and channel is sensed to be busy 1-Persistent CSMA If channel is busy continue to sense channel As soon as channel is sensed idle transmit frame In case of collisions, a backoff algorithm is used to set a time to re-sense the channel Non-Persistent CSMA If channel is busy, immediately run the backoff algorithm to set a time to re-sense the channel p-Persistent CSMA If channel is busy continue to sense channel As soon as channel is sensed idle transmit frame with probability p. With probability (1-p) wait for tprop before sensing the channel again In case of collisions, a backoff algorithm is used to set a time to re-sense the channel

Performance of CSMA

CSMA with Collision detection (CSMA/CD) TIME: t=0 Station A starts transmission In both ALOHA and CSMA, when collision occurs we lose at least a full transmission time for nothing CSMA/CD Abort transmission when a collision is detected A B TIME: t=tprop-ε Station B sense an idle channel and starts transmission A B TIME: t=tprop Station B detects a collision and aborts transmission A B TIME: t=2tprop- ε Even though Station B has aborted transmission, its initial signal arrives at A. A detects a collision and aborts transmission A B

GENERALLY: AFTER N COLLISIONS Exponential Backoff Algorithms FIRST COLLISION Wait 0 or 1 transmission frames (chosen randomly) before trying again SECOND COLLISION Wait 0, 1,2 or 3 transmission frames (chosen randomly) before trying again THIRD COLLISION Wait 0, 1,2,… or 7 transmission frames (chosen randomly) before trying again GENERALLY: AFTER N COLLISIONS Wait 0 to 2N-1 transmission frames if N≤10 before trying again. N>10, wait between 0 and 1023 (210-1) Give up at N=16

Exponential Backoff Algorithms Data Packet from Upper Layer NB=0, CW=2, BE =macMinBE Delay for Random (2BE-1) Slots Perform CCA (1st or 2nd ) CCA Success? Yes No CW=2, NB=NB+1, BE =min(BE+1,macMaxBE) CW=CW-1 No NB> maxNB? CW=0? No Yes Yes Packet Discard Packet Transmission

Exponential Backoff Algorithms Tslot

References NETW 501 Lectures slides by Assoc. Prof. Tallal El-Shabrawy “Communication Networks 2nd Edition”, A. Leon-Garcia and I. Widjaja, McGraw Hill, 2013 “Computer Networks 4th Edition”, A. S. Tanenbaum, Pearson International