1 The Medium Access Control Sublayer Chapter 4. 2 The Medium Access Control Sublayer This chapter deals with broadcast networks and their protocols. In.

Slides:



Advertisements
Similar presentations
Nick Feamster CS 4251 Computer Networking II Spring 2008
Advertisements

Hidden Terminal Problem and Exposed Terminal Problem in Wireless MAC Protocols.
Channel Allocation Protocols. Dynamic Channel Allocation Parameters Station Model. –N independent stations, each acting as a Poisson Process for the purpose.
EECC694 - Shaaban #1 lec #5 Spring Data Link In Broadcast Networks: The Media Access Sublayer Broadcast networks with multi-access (or random.
1 Pertemuan 13 Teknik Akses Jaringan - Random Matakuliah: H0174/Jaringan Komputer Tahun: 2006 Versi: 1/0.
EEC-484/584 Computer Networks Lecture 7 Wenbing Zhao
CS 5253 Workshop 1 MAC Protocol and Traffic Model.
Copyright © 2003, Dr. Dharma P. Agrawal and Dr. Qing-An Zeng. All rights reserved. 1 Chapter 6 Multiple Radio Access.
EEC-484/584 Computer Networks Lecture 13 Wenbing Zhao
EEC-484/584 Computer Networks Lecture 9 Wenbing Zhao (Part of the slides are based on materials supplied by Dr. Louise Moser at UCSB and.
EEC-484/584 Computer Networks Lecture 7 Wenbing Zhao
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Chapter 13 Multiple Access.
CMPE 150- Introduction to Computer Networks 1 CMPE 150 Fall 2005 Lecture 16 Introduction to Computer Networks.
EEC-484/584 Computer Networks Lecture 13 Wenbing Zhao
EEC-484/584 Computer Networks Lecture 9 Wenbing Zhao (Part of the slides are based on materials supplied by Dr. Louise Moser at UCSB and.
CS 5253 Workshop 1 MAC Protocol and Traffic Model.
EEC-484/584 Computer Networks Lecture 7 Wenbing Zhao
Semester EEE449 Computer Networks The Data Link Layer Part 2: Media Access Control En. Mohd Nazri Mahmud MPhil (Cambridge, UK) BEng (Essex,
1 Chapter 5 The Medium Access Sublayer. 2 Chapter 5 The Medium Access Layer 5.1 The Channel Allocation problem - Static and dynamic channel allocation.
Medium Access Control Sublayer
1 ECE453 – Introduction to Computer Networks Lecture 7 – Multiple Access Control (I)
CIS 725 Media Access Layer. Medium Access Control Sublayer MAC sublayer resides between physical and data link layer Broadcast/multiacess channels N independent.
1 Computer Communication & Networks Lecture 12 Datalink Layer: Multiple Access Waleed Ejaz
Chi-Cheng Lin, Winona State University CS412 Introduction to Computer Networking & Telecommunication Medium Access Control Sublayer.
The Medium Access Control Sublayer Chapter 4. The Channel Allocation Problem Static Channel Allocation in LANs and MANs Dynamic Channel Allocation in.
CHAPTER 4: THE MEDIUM ACCESS SUBLAYER 4.1: The Channel Allocation Problem 4.2: Multiple Access Protocols.
LECTURE9 NET301. DYNAMIC MAC PROTOCOL: CONTENTION PROTOCOL Carrier Sense Multiple Access (CSMA): A protocol in which a node verifies the absence of other.
Computer and Data Communications Semester Mohd Nazri Mahmud Session 4a-12 March 2012.
جلسه دهم شبکه های کامپیوتری به نــــــــــــام خدا.
CWNA Guide to Wireless LANs, Second Edition
Medium Access Control NWEN302 Computer Network Design.
The Medium Access Control Sublayer Chapter 4. The Channel Allocation Problem Static Channel Allocation Dynamic Channel Allocation  Delay for the divided.
IEEE Wireless LAN Standard. Medium Access Control-CSMA/CA IEEE defines two MAC sublayers Distributed coordination function (DCF) Point coordination.
Chi-Cheng Lin, Winona State University CS 313 Introduction to Computer Networking & Telecommunication Medium Access Control Sublayer.
Cyclic Redundancy Check (CRC).  An error detection mechanism in which a special number is appended to a block of data in order to detect any changes.
The Medium Access Control Sublayer Chapter 4. The Channel Allocation Problem Static Channel Allocation in LANs and MANs Dynamic Channel Allocation in.
جلسه یازدهم شبکه های کامپیوتری به نــــــــــــام خدا.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2000 Unit-II Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
4: DataLink Layer1 Multiple Access Links and Protocols Three types of “links”: r point-to-point (single wire, e.g. PPP, SLIP) r broadcast (shared wire.
LOCAL AREA NETWORKS. CSMA/CD Carrier Sense Multiple Access with Collision Detection The CSMA method does not specify the procedure following a collision.
Medium Access Control Sub Layer
Multiple Access.
Chapter 6 Multiple Radio Access
The Medium Access Control Sublayer Chapter 4 12/13/2015www.ishuchita.com1.
5: DataLink Layer 5a-1 Multiple Access protocol. 5: DataLink Layer 5a-2 Multiple Access Links and Protocols Three types of “links”: r point-to-point (single.
Background of Ad hoc Wireless Networks Student Presentations Wireless Communication Technology and Research Ad hoc Routing and Mobile IP and Mobility Wireless.
LECTURE9 NET301 11/5/2015Lect 9 NET DYNAMIC MAC PROTOCOL: CONTENTION PROTOCOL Carrier Sense Multiple Access (CSMA): A protocol in which a node verifies.
Medium Access Control in Wireless networks
The Medium Access Control Sublayer Chapter 4. The Channel Allocation Problem Static Channel Allocation in LANs and MANs Dynamic Channel Allocation in.
1 Ethernet CSE 3213 Fall February Introduction Rapid changes in technology designs Broader use of LANs New schemes for high-speed LANs High-speed.
The Medium Access Control Sublayer
Chapter 4 The Medum Access Sublayer. MA Sublayer Additional Reference –Local and Metropolitan Area Networks, William Stallings, Prentice Hall, 2000, 6th.
THE MEDIUM ACCESS CONTROL SUBLAYER 4.1 THE CHANNEL ALLOCATION PROBLEM 4.2 MULTIPLE ACCESS PROTOCOLS.
COMPUTER NETWORKS Data-link Layer (The Medium Access Control Sublayer) MAC Sublayer.
THE MEDIUM ACCESS CONTROL SUBLAYER 4.1 THE CHANNEL ALLOCATION PROBLEM 4.2 MULTIPLE ACCESS PROTOCOLS.
Multiple Access By, B. R. Chandavarkar, CSE Dept., NITK, Surathkal Ref: B. A. Forouzan, 5 th Edition.
4.1 THE CHANNEL ALLOCATION PROBLEM THE CHANNEL ALLOCATION PROBLEM : how to allocate a single broadcast channel among competing users. The channel might.
Part III Datalink Layer 10.
Module 3 Medium Access Control.
Services of DLL Framing Link access Reliable delivery
THE IEEE MAC SUB-LAYER – chapter 14
The Medium Access Control Sublayer
Channel Allocation Problem/Multiple Access Protocols Group 3
Link Layer and LANs Not everyone is meant to make a difference. But for me, the choice to lead an ordinary life is no longer an option 5: DataLink Layer.
Channel Allocation Problem/Multiple Access Protocols Group 3
Wireless LAN Protocols
Chapter 6 Multiple Radio Access.
Dr. John P. Abraham Professor UTPA
Part III Datalink Layer 10.
Chapter 12 Media Access Control (MAC)
Presentation transcript:

1 The Medium Access Control Sublayer Chapter 4

2 The Medium Access Control Sublayer This chapter deals with broadcast networks and their protocols. In the literature, broadcast channels are sometimes referred to as multiaccess channels or random access channels. The protocols used to determine who goes next on a multiaccess channel belong to a sublayer of the data link layer called the MAC (Medium Access Control) sublayer.

3 The Channel Allocation Problem To allocate a single broadcast channel among competing users, we can use: Static Channel Allocation in LANs and MANs Dynamic Channel Allocation in LANs and MANs

4 Static Channel Allocation in LANs and MANs Frequency Division Multiplexing (FDM) is an example of static channel allocation where the bandwidth is divided among a number of N users. When there is only a small and constant number of users, each of which has a heavy (buffered) load of traffic (e.g., carriers' switching offices), FDM is a simple and efficient allocation mechanism. However, when the number of senders is large and continuously varying or the traffic is bursty, FDM presents some problems. 1) when fewer than N users are currently interested in communicating, a large piece of valuable spectrum will be wasted. 2) when more users wants to communicate, those who have not been assigned a frequency will be denied permission. 3) even assuming that the number of users could somehow be held constant at N, each user traffic usually changes dynamically over time.

5 Dynamic Channel Allocation in LANs and MANs 1.Station Model: N independent stations (terminals) exists. 2.Single Channel Assumption: A single channel is available for all communication (send and receive) 3.Collision Assumption: If two frames are transmitted simultaneously, they overlap in time and the resulting signal is garbled (collision). no errors other than those generated by collisions assumed to exist. 4.(a) Continuous Time: Frame transmission can begin at any instant. (b) Slotted Time: Frame transmissions always begin at the start of a slot where the time is divided into discrete slots. 5.(a) Carrier Sense: Stations can tell if the channel is in use before trying to use it. (b) No Carrier Sense: Stations cannot sense the channel before trying to use it.

6 Multiple Access Protocols ALOHA Carrier Sense Multiple Access Protocols Collision-Free Protocols Limited-Contention Protocols Wavelength Division Multiple Access Protocols Wireless LAN Protocols

Random Access MA CSMA CSMA/CD CSMA/CA

8 Evolution of random-access methods

9 Figure 13.3 ALOHA network

10 Procedure for ALOHA protocol

11 Pure ALOHA The basic idea of an ALOHA system is simple: let users transmit whenever they have data to be sent. There will be collisions, of course, and the colliding frames will be damaged. If the frame was destroyed, the sender just waits a random amount of time and sends it again. How the channel know that there is a collision: -Due to the feedback property of broadcasting, a sender can always find out whether its frame was destroyed by listening to the channel, the same way other users do. With a LAN, the feedback is immediate; with a satellite, there is a delay of 270 msec before the sender knows if the transmission was successful. -If listening while transmitting is not possible for some reason, acknowledgements are needed.

12 Pure ALOHA (2) In pure ALOHA, frames are transmitted at completely arbitrary times. The throughput of ALOHA systems is maximized by having a uniform frame size rather than by allowing variable length frames.

13 Other protocols Slotted ALOHA: It assumed the time is divided into discrete intervals. The station can send at the beginning of the next time interval whenever it have data ready after the start of the current time interval. 1- Persistent CSMA: When a station has data to send, it first listens to the channel to see if anyone else is transmitting at that moment. if the channel is idle, it start transmission. If the channel is busy, the station waits until it becomes idle. When the station detects an idle channel, it transmits a frame. If a collision occurs, the station waits a random amount of time and starts all over again. Nonpersistent CSMA: same as 1-persistent except that the station does not continually sense the channel when it finds it busy, rather it waits a random period of time and then sense the channel again. When the channel becomes idle it transmit. p-Persistent CSMA: same as Nonpersistent CSMA but the station transmit with probability p when the channel is idle.

14 Other protocols (2) The propagation delay has an important effect on the performance of the protocol. There is a small chance that just after a station begins sending, another station will become ready to send and sense the channel. If the first station's signal has not yet reached the second one, the latter will sense an idle channel and will also begin sending, resulting in a collision. The longer the propagation delay, the more important this effect becomes, and the worse the performance of the protocol. Even if the propagation delay is zero, there will still be collisions. If two stations become ready in the middle of a third station's transmission, both will wait politely until the transmission ends and then both will begin transmitting exactly simultaneously (in 1-persistent model), resulting in a collision.

15 Persistence strategies

16 CSMA/CD procedure

17 CSMA/CA procedure

18 Wireless LAN Protocols A system of notebook computers that communicate by radio can be regarded as a wireless LAN A common configuration for a wireless LAN is an office building with base stations (also called access points) strategically placed around the building. All the base stations are wired together using copper or fiber. A simplifying assumption that all radio transmitters have some fixed range will be used follow. When a receiver is within range of two active transmitters, the resulting signal will generally be garbled and useless.

19 Wireless LAN Protocols (2) A naive approach to using a wireless LAN might be to try CSMA: just listen for other transmissions and only transmit if no one else is doing so. The trouble is, this protocol is not really appropriate because what matters is interference at the receiver, not at the sender. A wireless LAN. (a) A transmitting. (b) B transmitting.

20 Wireless LAN Protocols (3) When A is transmitting to B (previous figure part a) If C senses the medium, it will not hear A because A is out of range, and thus falsely conclude that it can transmit to B. If C does start transmitting, it will interfere at B, wiping out the frame from A. The problem of a station not being able to detect a potential competitor for the medium because the competitor is too far away is called the hidden station problem.

21 Wireless LAN Protocols (4) When B transmitting to A (previous figure part b) If C senses the medium, it will hear an ongoing transmission and falsely conclude that it may not send to D, when in fact such a transmission would cause bad reception only in the zone between B and C, where neither of the intended receivers is located. This is called the exposed station problem.

22 Hidden station problem

23 The CTS frame in CSMA/CA handshake can prevent collision from a hidden station. Note

24 Use of handshaking to prevent hidden station problem

25 Exposed station problem

26 Use of handshaking in exposed station problem

27 Wireless LAN Protocols (5) The problem is that before starting a transmission, a station really wants to know whether there is activity around the receiver. An early protocol designed for wireless LANs is MACA (Multiple Access with Collision Avoidance) (Karn, 1990). The basic idea behind it is for the sender to stimulate the receiver into outputting a short frame, so stations nearby can detect this transmission and avoid transmitting for the duration of the upcoming (large) data frame.

28 Wireless LAN Protocols (6) Let us now consider how A sends a frame to B. - A starts by sending an RTS (Request To Send) frame to B. This short frame (30 bytes) contains the length of the data frame that will eventually follow. - Then B replies with a CTS (Clear to Send) frame. The CTS frame contains the data length (copied from the RTS frame). Upon receipt of the CTS frame, A begins transmission.

29 Wireless LAN Protocols (7) The MACA protocol. (a) A sending an RTS to B. (b) B responding with a CTS to A.

30 Wireless LAN Protocols (8) Any station hearing the RTS is clearly close to A and must remain silent long enough for the CTS to be transmitted back to A without conflict. Any station hearing the CTS is clearly close to B and must remain silent during the upcoming data transmission, whose length it can tell by examining the CTS frame. C is within range of A but not within range of B. Therefore, it hears the RTS from A but not the CTS from B. As long as it does not interfere with the CTS, it is free to transmit while the data frame is being sent. D is within range of B but not A. It does not hear the RTS but does hear the CTS. Hearing the CTS tips it off that it is close to a station that is about to receive a frame, so it defers sending anything until that frame is expected to be finished.

31 Wireless LAN Protocols (9) E hears both control messages and, like D, must be silent until the data frame is complete. Collisions can still occur: For example, B and C could both send RTS frames to A at the same time. These will collide and be lost. In the event of a collision, an unsuccessful transmitter (i.e., one that does not hear a CTS within the expected time interval) waits a random amount of time and tries again later. New improvements have been made to MACA to improve its performance and the new protocol named MACAW (MACA for Wireless).

32 The MAC Sublayer Protocol Two problems have been explained before: the hidden station problem and the exposed station problem supports two modes of operation: The first, called DCF (Distributed Coordination Function), does not use any kind of central control (in that respect, similar to Ethernet). The other, called PCF (Point Coordination Function), uses the base station to control all activity in its cell. All implementations must support DCF but PCF is optional.

33 The MAC Sublayer Protocol (a) The hidden station problem. (b) The exposed station problem.

Services There are five distribution services are provided by the base stations and deal with station mobility as they enter and leave cells, attaching themselves to and detaching themselves from base stations. 1. Association. This service is used by mobile stations to connect themselves to base stations. Typically, it is used just after a station moves within the radio range of the base station. Upon arrival, it announces its identity and capabilities. The capabilities include the data rates supported, need for PCF services, and power management requirements. The base station may accept or reject the mobile station. If the mobile station is accepted, it must then authenticate itself. 2. Disassociation. Either the station or the base station may disassociate A station should use this service before shutting down or leaving, but the base station may also use it before going down for maintenance.

Services 3. Reassociation. A station may change its preferred base station using this service. This facility is useful for mobile stations moving from one cell to another. 4. Distribution. This service determines how to route frames sent to the base station. If the destination is local to the base station, the frames can be sent out directly over the air. Otherwise, they will have to be forwarded over the wired network. 5. Integration. If a frame needs to be sent through a non network with a different addressing scheme or frame format, this service handles the translation from the format to the format required by the destination network.

Services The remaining four services are intracell (i.e., relate to actions within a single cell). They are used after association has taken place and are as follows. 1. Authentication. After a mobile station has been associated by the base station (i.e., accepted into its cell), the base station sends a special challenge frame to it to see if the mobile station knows the secret key (password) that has been assigned to it. It proves its knowledge of the secret key by encrypting the challenge frame and sending it back to the base station. If the result is correct, the mobile is fully enrolled in the cell.