Multiple access What if multiple machines are sharing the same link?

Slides:



Advertisements
Similar presentations
EECC694 - Shaaban #1 lec #5 Spring Data Link In Broadcast Networks: The Media Access Sublayer Broadcast networks with multi-access (or random.
Advertisements

12.1 Chapter 12 Multiple Access Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Multiple Access Methods. When nodes or stations are connected and use a common link (cable or air), called a multipoint or broadcast link, we need a.
LECTURE 11 CT1303 LAN. DYNAMIC MAC PROTOCOL No fixed assignment for transmission media or any network resources.. It allows transmission when needed.
12.1 Chapter 12 Multiple Access Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
1 K. Salah Module 4.2: Media Access Control The Media Access Control (MAC) sublayer –Random Access (CSMA), IEEE –Token Passing, IEEE Ch 13-
Chapter 12 Multiple Access Figure 12.1 Data link layer divided into two functionality-oriented sublayers Figure 12.2 Taxonomy of multiple-access protocols.
1 Pertemuan 13 Teknik Akses Jaringan - Random Matakuliah: H0174/Jaringan Komputer Tahun: 2006 Versi: 1/0.
MAC Protocols Media Access Control (who gets the use the channel) zContention-based yALOHA and Slotted ALOHA. yCSMA. yCSMA/CD. TDM and FDM are inefficient.
Copyright © 2003, Dr. Dharma P. Agrawal and Dr. Qing-An Zeng. All rights reserved. 1 Chapter 6 Multiple Radio Access.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Chapter 13 Multiple Access.
12.1 Chapter 12 Multiple Access Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Semester EEE449 Computer Networks The Data Link Layer Part 2: Media Access Control En. Mohd Nazri Mahmud MPhil (Cambridge, UK) BEng (Essex,
Medium Access Control Sublayer
Shashank Srivastava Motilal Nehru National Institute Of Technology, Allahabad Medium Access Control.
Multiple Access Protocols Chapter 6 of Hiroshi Harada Book
: Data Communication and Computer Networks
McGraw-Hill © The McGraw-Hill Companies, Inc., 2004 Chapter 12 Multiple Access Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction.
Chi-Cheng Lin, Winona State University CS412 Introduction to Computer Networking & Telecommunication Medium Access Control Sublayer.
Chapter 12 Multiple Access Figure 12.1 Data link layer divided into two functionality-oriented sublayers Figure 12.2 Taxonomy of multiple-access protocols.
LOCAL AREA NETWORKS. CSMA Carrier Sense Multiple Access To minimize the chance of collision and, therefore, increase the performance, the CSMA method.
Medium Access Control NWEN302 Computer Network Design.
Chi-Cheng Lin, Winona State University CS 313 Introduction to Computer Networking & Telecommunication Medium Access Control Sublayer.
جلسه یازدهم شبکه های کامپیوتری به نــــــــــــام خدا.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2000 Unit-II Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
12.1 Chapter 12 Multiple Access Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Multiple Access.
Data Communications, Kwangwoon University12-1 Chapter 12. Multiple Access 1.Random Access 2.Controlled Access 3.Channelization.
1 Kyung Hee University Chapter 12 Multiple Access.
Chapter 6 Multiple Radio Access
LOCAL AREA NETWORKS. CSMA/CA In a wired network, the received signal has almost the same energy as the sent signal because either the length of the cable.
1 Kyung Hee University Chapter 12 Multiple Access.
5: DataLink Layer 5a-1 Multiple Access protocol. 5: DataLink Layer 5a-2 Multiple Access Links and Protocols Three types of “links”: r point-to-point (single.
Ch 12. Multiple Access. Multiple Access for Shared Link Dedicated link – Point-to-point connection is sufficient Shared link – Link is not dedicated –
Chapter 12 Media Access Control (MAC) Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
LECTURE9 NET301 11/5/2015Lect 9 NET DYNAMIC MAC PROTOCOL: CONTENTION PROTOCOL Carrier Sense Multiple Access (CSMA): A protocol in which a node verifies.
Chapter 12 Multiple Access
1 Kyung Hee University Prof. Choong Seon HONG Multiple Access.
THE MEDIUM ACCESS CONTROL SUBLAYER 4.1 THE CHANNEL ALLOCATION PROBLEM 4.2 MULTIPLE ACCESS PROTOCOLS.
Chapter 13 Multiple Access.
Chapter 12 Media Access Control (MAC)
UNIT 3 MULTIPLE ACCESS Adapted from lecture slides by Behrouz A. Forouzan © The McGraw-Hill Companies, Inc. All rights reserved.
Multiple Access. Figure 12.1 Data link layer divided into two functionality-oriented sublayers.
COMPUTER NETWORKS Data-link Layer (The Medium Access Control Sublayer) MAC Sublayer.
Multiple Access By, B. R. Chandavarkar, CSE Dept., NITK, Surathkal Ref: B. A. Forouzan, 5 th Edition.
Multiple Access Methods
Data link layer divided into two functionality-oriented sublayers
Chapter 12 Multiple Access.
CT301 LECTURE 8.
Chapter 12 Multiple Access
Part III Datalink Layer 10.
Multiple Access Mahesh Jangid Assistant Professor JVW University.
Subject Name: Computer Communication Networks Subject Code: 10EC71
Net301 lecture9 11/5/2015 Lect 9 NET301.
Chapter 12 Multiple Access
Figure 12.1 Data link layer divided into two functionality-oriented sublayers Networks can be divided into two categories: those using point-to-point.
THE IEEE MAC SUB-LAYER – chapter 14
Multiple Access Methods
Chapter 13 Multiple Access
Channel Allocation Problem/Multiple Access Protocols Group 3
Channel Allocation Problem/Multiple Access Protocols Group 3
Data Communication Networks
Chapter 13 Multiple Access
Multiple Access Methods
Chapter 6 Multiple Radio Access.
Dr. John P. Abraham Professor UTPA
Multiple Access Control (MAC) Protocols
Part III Datalink Layer 10.
Chapter 12 Media Access Control (MAC)
Chapter 12 Media Access Control (MAC)
Presentation transcript:

Multiple access What if multiple machines are sharing the same link?

Random access In random access protocols, any device can send data at any time, so long as the rules for sending are followed. Nobody is privileged. The goal of the protocols is to maximize use of the link and minimize collisions - when two devices try to talk at the same time.

ALOHA Pure ALOHA: Whenever the sender has a frame to send, it sends the frame. If no ACK is received, assume a collision: –Wait a random amount of time. This avoids everybody resending the collided frames at the same time. (the back-off time, T B ) –Re-send the frame and repeat. –After some maximum number of attempts, K max, give up and wait until later.

Pure ALOHA is pretty lousy at delivering frames, and has a very large vulnerable time. Slotted ALOHA tries to fix this by having rules for when a station can send. –Time is divided into slots of T fr length. –A station can send only at the beginning of a slot. –Thus, if you are the only station that sends a frame at the beginning of a slot, that frame will get through.

CSMA Carrier Sense Multiple Access Before sending, a station must check the link to make sure it is free. Significantly reduces the probability of a collision, at the cost of extra overhead. Vulnerable time of T p. –What are the rules if the link is busy or idle? 1-persistent: Send frame immediately when the link is idle. (Ethernet) Nonpersistent: Check link; if idle, send; if busy, wait random time and check again. p-persistent: 1.If the link is idle, send frame with a probability p. 2.With probability q = 1-p, wait for next slot and check link again. –If idle, do 1. –Else, wait random time and try again.

CSMA/CD CSMA leaves it unclear what to do in case of a collision. To detect a collision, the sender listens to the link after sending a frame: –If it detects nothing else in T fr, it assumes no collision. –If, however, it detects other bits in less than the frame transmission time, there must have been a collision.

Frame size in CSMA/CD If the frame size is too small, there will be lots of undetected collisions. In particular, the problem is if T fr < 2*T p.

CSMA/CA Ideally, we would like to avoid collissions all together (hence Collision Avoidance). Collision detection is not always feasible, especially in high-attenuation media (e.g., wireless). Collision avoidance involves not transmitting the instant the link is idle. Wait the interframe space (IFS). This ensures that some distant device has not already started sending. If the channel is still idle, wait through the contention window - essentially a random number of time slots. If the channel is busy, stop the timer until the channel is idle, then restart it. If the channel is idle after the contention window, send.

Controlled Access Random access methods can reduce, but never eliminate, the chance of a collision. They do so at the cost of higher overhead, but at the benefit of maximal use of the link. Controlled access protocols eliminate collisions by only giving sending rights to one device at a time. However, the link might be wasted if an authorized device has nothing to send or hogs the credentials.

Reservation To use the link, a device needs to make a reservation. –Each time slot is preceded by set of reservation slots, one for each device on the network. –If a device wants to send a data frame, it makes a reservation. –After the reservation slots have passed, each frame that made a reservation sends its data in order.

Polling Polling works in networks set up as primary/secondary architectures, where all communication must go through the primary device. –The primary can send data whenever the link is free. (the select function) –If the primary has nothing to send, it polls each of the secondary devices, one at a time, until it finds one with data to send.

Token passing Used in token-ring networks, where each devidce has a predecessor and a successor. –A device can only send when it has the token - a special packet handed around the ring –A token can only be received the predecessor and sent to the successor.

Channelization In channelization, sending devices share the bandwidth of a link and send simultaneously. Primarily useful in cases where communication is relatively continuous (such as phones) FDMA - link is divided into frequency bands and each sending device is assigned a band. TDMA - link is divided into time slots which are allocated to sending devices.

Code Division Multiple Access CDMA works a little differently. The link consists of only one channel, but all devices can transmit at the same time. –Each device is assigned a code, c i. –Codes have two important properties: –The result of multiplying any two codes together is 0. –The result of multiplying any code by itself is the number of devices on the network. –The data on the link are:

Codes are simply vectors, with one slot for each device on the network. The rule for sending to utilize the codes is: 0 bit = -1; 1 bit = 1; idle = 0 If a device wants to send a bit, it multiplies that bit by its code, which yields a vector. Since the nature of signals is such that they are additive, each device sending to the link simultaneously has the effect of adding these vectors together. For another device to extract a bit it multiplies the total signal on the link by the code of the device it wants to listen to.