Dr. John P. Abraham Professor UTPA

Slides:



Advertisements
Similar presentations
14-MAC Sub-layer Dr. John P. Abraham Professor UTPA.
Advertisements

EECC694 - Shaaban #1 lec #5 Spring Data Link In Broadcast Networks: The Media Access Sublayer Broadcast networks with multi-access (or random.
Multiple access What if multiple machines are sharing the same link?
Multiple Access Methods. When nodes or stations are connected and use a common link (cable or air), called a multipoint or broadcast link, we need a.
LECTURE 11 CT1303 LAN. DYNAMIC MAC PROTOCOL No fixed assignment for transmission media or any network resources.. It allows transmission when needed.
1 K. Salah Module 4.2: Media Access Control The Media Access Control (MAC) sublayer –Random Access (CSMA), IEEE –Token Passing, IEEE Ch 13-
1 Pertemuan 13 Teknik Akses Jaringan - Random Matakuliah: H0174/Jaringan Komputer Tahun: 2006 Versi: 1/0.
MAC Protocols Media Access Control (who gets the use the channel) zContention-based yALOHA and Slotted ALOHA. yCSMA. yCSMA/CD. TDM and FDM are inefficient.
EEC-484/584 Computer Networks Lecture 7 Wenbing Zhao
CMPE 150- Introduction to Computer Networks 1 CMPE 150 Fall 2005 Lecture 16 Introduction to Computer Networks.
EEC-484/584 Computer Networks Lecture 13 Wenbing Zhao
Studying Local Area Networks Via Media Access Control (MAC) SubLayer
© 2009 Pearson Education Inc., Upper Saddle River, NJ. All rights reserved.1 Computer Networks and Internets, 5e By Douglas E. Comer Lecture PowerPoints.
Networks: Local Area Networks1 LANs Studying Local Area Networks Via Media Access Control (MAC) SubLayer.
Computer Networks: Local Area Networks 1 LANs Studying Local Area Networks via the Media Access Control (MAC) SubLayer.
Medium Access Control Sublayer
1 ECE453 – Introduction to Computer Networks Lecture 7 – Multiple Access Control (I)
CIS 725 Media Access Layer. Medium Access Control Sublayer MAC sublayer resides between physical and data link layer Broadcast/multiacess channels N independent.
Chi-Cheng Lin, Winona State University CS412 Introduction to Computer Networking & Telecommunication Medium Access Control Sublayer.
CHAPTER 4: THE MEDIUM ACCESS SUBLAYER 4.1: The Channel Allocation Problem 4.2: Multiple Access Protocols.
Chi-Cheng Lin, Winona State University CS 313 Introduction to Computer Networking & Telecommunication Medium Access Control Sublayer.
© 2009 Pearson Education Inc., Upper Saddle River, NJ. All rights reserved. © The McGraw-Hill Companies, Inc. Medium Access Control Asst. Prof. Chaiporn.
4: DataLink Layer1 Multiple Access Links and Protocols Three types of “links”: r point-to-point (single wire, e.g. PPP, SLIP) r broadcast (shared wire.
Medium Access Control Sub Layer
5: DataLink Layer 5a-1 Multiple Access protocol. 5: DataLink Layer 5a-2 Multiple Access Links and Protocols Three types of “links”: r point-to-point (single.
LECTURE9 NET301 11/5/2015Lect 9 NET DYNAMIC MAC PROTOCOL: CONTENTION PROTOCOL Carrier Sense Multiple Access (CSMA): A protocol in which a node verifies.
Chapter 4 The Medum Access Sublayer. MA Sublayer Additional Reference –Local and Metropolitan Area Networks, William Stallings, Prentice Hall, 2000, 6th.
THE MEDIUM ACCESS CONTROL SUBLAYER 4.1 THE CHANNEL ALLOCATION PROBLEM 4.2 MULTIPLE ACCESS PROTOCOLS.
COMPUTER NETWORKS Data-link Layer (The Medium Access Control Sublayer) MAC Sublayer.
2. Data Link Layer: Medium Access Control. Scheduling.
THE MEDIUM ACCESS CONTROL SUBLAYER 4.1 THE CHANNEL ALLOCATION PROBLEM 4.2 MULTIPLE ACCESS PROTOCOLS.
Multiple Access By, B. R. Chandavarkar, CSE Dept., NITK, Surathkal Ref: B. A. Forouzan, 5 th Edition.
4.1 THE CHANNEL ALLOCATION PROBLEM THE CHANNEL ALLOCATION PROBLEM : how to allocate a single broadcast channel among competing users. The channel might.
Example DLL Protocols 1. High-Level Data Link Control (HDLC).
Data Link Layer Lower Layers Local Area Network Standards
Part III. Data Link Layer
Week3 The Medium Access Sublayer
A Taxonomy of Mechanisms for Multi-Access
Multiple Access Methods
Chapter 12 Multiple Access.
Lab 7 – CSMA/CD (Data Link Layer Layer)
CT301 LECTURE 8.
Part III Datalink Layer 10.
Module 3 Medium Access Control.
Chapter 14 LAN Systems Ethernet (CSMA/CD) ALOHA Slotted ALOHA CSMA
Multiple Access Mahesh Jangid Assistant Professor JVW University.
Channel Allocation (MAC)
Subject Name: Computer Communication Networks Subject Code: 10EC71
Net301 lecture9 11/5/2015 Lect 9 NET301.
Services of DLL Framing Link access Reliable delivery
Department of Engineering Science ES465/CES 440, Intro
Figure 12.1 Data link layer divided into two functionality-oriented sublayers Networks can be divided into two categories: those using point-to-point.
THE IEEE MAC SUB-LAYER – chapter 14
Mobile Communications Chapter 3 : Media Access
Communication Networks NETW 501
Multiple Access Methods
Learning Objectives After interacting with this Learning Object, the learner will be able to: Explain the process of collision detection in CSMA/CD.
The Medium Access Control Sublayer
Channel Allocation Problem/Multiple Access Protocols Group 3
Chapter 12 Multiple Access
Link Layer and LANs Not everyone is meant to make a difference. But for me, the choice to lead an ordinary life is no longer an option 5: DataLink Layer.
Channel Allocation Problem/Multiple Access Protocols Group 3
Data Communication Networks
Lecture 5- Data Link Layer
7- chapter Seven Local Area Networks (LAN)
Multiple Access Methods
Chapter 6 Multiple Radio Access.
Multiple Access Control (MAC) Protocols
Part III Datalink Layer 10.
Chapter 12 Media Access Control (MAC)
Presentation transcript:

Dr. John P. Abraham Professor UTPA 14-MAC Sub-layer Dr. John P. Abraham Professor UTPA

A taxonomy of mechanisms for multi-access For this you must refer to figure 14.1 on p.240 See next slide

The data link layer LLC MAC Logical Link Control Refers upward to higher layers MAC Media Access Control refers downward to lower layers

Media Access Determine how to get access when there is competition for the media. MAC (Medium Access Control) sub-layer takes care of this problem MAC is important in LANs where broadcast channels are used MAC is the lower part of the data link layer (next to physical layer) Mac sub-layer does not guarantee delivery

Static and Dynamic Channel Allocation Static is discussed below: Channelization to refer to a mapping (between communication and a channel in the underlying transmission system). Traditional way to allow more than one person to use the medium is to use FDM In Frequency division multiplexing, the total bandwidth is divided among the total number of users, each pair is assigned to a unique frequency. This is known as 1-to-1 static. FDM works well when there is a small number of users When users grow a fast busy signal is issued

Dynamic Channel Allocation Need dynamic if the set of entities using the channels change frequently. Think of cellular phones. In dynamic a mapping can be established when a new station appears, or removed when it disappears. underlying assumptions of dynamic channel allocation 1. Station Model 2. Single Channel Assumption 3. Collision Assumption 4. Continuous time 5. Slotted time

Station Model Consists of N independent STATIONS Each has programs that produce frames for transmission Frames are generated at intervals Once a frame is generated the station is locked until the frame is transmitted

Single Channel Assumption Only one channel is available for all communication All stations transmit on it and all stations receive on that channel

Collision Assumption If two frames are transmitted simultaneously, they overlap in time and resulting signal is garbled. All stations can detect collisions. A collided frame must be retransmitted.

Continuous time Frame transmission can start any time There is no master clock controlling transmission (as opposed to slotted time discussed next)

Slotted time Time is divided into discrete intervals (slots) Frame transmission begins at the start of a time slot

Channelization Protocols FDMA TDMA Code Division Multi-Access Already covered these

Controlled Access Protocols – Collision free Polling: A centralized controller cycles through all stations on the network and gives each an opportunity to transmit a packet, either uses round robin order or priority order .

Reservation – Collision free Often used with satellite transmission, employs a two-step process. Each transmission is planned in advanced. In the first step, each potential sender specifies whether they have a packet to send during the next round and the controller transmits a list of stations that will be transmitting. In the second step, stations transmit upon their turn. Bit-map protocol A bit map with enough slots for all stations is passed around Each station wanting to send a frame and if the frame is ready in the queue, inserts a 1 bit into its reserved slot in the bit map. Once station numbers of all who want to send is known they take turns in order.

Reservation – collision free. Binary count down Each station is given a binary address If a station wants to transmit a frame it broadcasts its address one bit at a time starting with the high order bit. Bits from each station are Ored together the station address starting with the resulting 0 or 1 bit as agreed upon is allowed to go on. If two or more has the same bit then go to the next bit and so on.

Token Passing – collision free Token bus Each station knows the address of the station to its left and right The highest numbered station may send the first frame Then it passes permission to its immediate neighbor by send a special frame called a token. The first station passes the token to the highest numbered one. Token Ring Physical Ring Token circulates

Random Access Protocols Many networks do not use collision free protocols, especially LANs (Token passing is an exception). Instead, a set of computers attached to a shared medium attempt o access the medium without coordination, like the old CB radio.

Random - Multiple Access Protocols ALOHA PURE ALOHA SLOTTED ALOHA CARRIER SENSE MULTIPLE ACCESS PROTOCOLS (CSMA) Persistent and Nonpersistent CSMA CSMA with collision detection

ALOHA 1970 - Norman Abramson – Alohnet. University of Hawaii One main transmitter with a large tower Smaller tower and transmitter, each can reach the central transmitter, but not each other. Used ground based radio broadcasting Two versions of Aloha Pure Slotted

Pure ALOHA Users may send whenever they have data to send If collisions occur, collided data will be destroyed Sender can determine if the data was destroyed by listening to the channel (the sender can hear too). If data was destroyed, re-send after waiting random amount of time Each station’s transmission is repeated by the central station, which can be received by all.

Users agree on slot boundaries Slotted ALOHA Divide time into discrete slots, each time slot is enough for one frame Users agree on slot boundaries A special station emits a signal at the start of each time slot to synchronize

Carrier Sense Multiple Access Protocols (CSMA) Listen for a transmission If the line is clear then transmit Implementations: Persistent, Non Persistent and p-persistent CSMA with collision detection

Persistent Listen, if busy wait until line is free Transmit a frame If collision occurred, wait for a random amount of time Transmission time delay between two sending computers will cause the second computer not to hear the transmission.

Non-Persistent Listen, if busy wait random amount of time and listen again until the line is free This approach is less greedy than the Persistent one This prevents two or more wanting to get on the line from doing so at the same time when the channel becomes free.

P-persistent CSMA Slotted channels. Listen, if free send at the beginning of the next slot

CSMA with Collision Detection (CSMA-CD) Abort transmission as soon as collision is detected Collision is detected by comparing received signal power to sent signal If collision is detected, stop transmission and wait for random amount of time CSMA/CD is used widely in LAN IEEE 802.3 is an example.

Binary Exponential Backoff After a collision occurs, a computer must wait, but how long? In Aloha randomization was used. In exponential backoff, the computer must wait twice the amount of time than the previous time. This is repeated if collision occur again.

CSMA-CA For wireless. May not be able to hear computers outside the range, while the other party can hear. This is known as the hidden station problem. Ready to send and clear to send are transmitted first before transmitting packet. The clear to send or the ready to send will be heard by all within range.