1 K. Salah Module 4.2: Media Access Control The Media Access Control (MAC) sublayer –Random Access (CSMA), IEEE 802.3 –Token Passing, IEEE 802.5 Ch 13-

Slides:



Advertisements
Similar presentations
Data and Computer Communications Eighth Edition by William Stallings Lecture slides by Lawrie Brown Chapter 16 – High Speed LANs.
Advertisements

Channel Allocation Protocols. Dynamic Channel Allocation Parameters Station Model. –N independent stations, each acting as a Poisson Process for the purpose.
The ALOHA Protocol “Free for all”: whenever station has a frame to send, it does so. –Station listens for maximum RTT for an ACK. –If no ACK after a specified.
EECC694 - Shaaban #1 lec #5 Spring Data Link In Broadcast Networks: The Media Access Sublayer Broadcast networks with multi-access (or random.
Ethernet – CSMA/CD Review
Multiple access What if multiple machines are sharing the same link?
Lecture 9: Multiple Access Protocols
The Data Link Layer introduction point-to-point data link protocols
LECTURE 11 CT1303 LAN. DYNAMIC MAC PROTOCOL No fixed assignment for transmission media or any network resources.. It allows transmission when needed.
1 Pertemuan 13 Teknik Akses Jaringan - Random Matakuliah: H0174/Jaringan Komputer Tahun: 2006 Versi: 1/0.
MAC Protocols Media Access Control (who gets the use the channel) zContention-based yALOHA and Slotted ALOHA. yCSMA. yCSMA/CD. TDM and FDM are inefficient.
CS 5253 Workshop 1 MAC Protocol and Traffic Model.
Shared vs. Switched Ethernet (Modeling and Simulation using OPNET)
CMPE 150- Introduction to Computer Networks 1 CMPE 150 Fall 2005 Lecture 17 Introduction to Computer Networks.
Chapter 14 LAN Systems Ethernet (CSMA/CD) ALOHA Slotted ALOHA CSMA
Copyright © 2003, Dr. Dharma P. Agrawal and Dr. Qing-An Zeng. All rights reserved. 1 Chapter 6 Multiple Radio Access.
Teknik Akses Jaringan Carrier Sense Pertemuan 12 Matakuliah: H0484/Jaringan Komputer Tahun: 2007.
CSC 450/550 Part 3: The Medium Access Control Sublayer.
EE 4272Spring, 2003 Chapter 14 LAN Systems Ethernet (CSMA/CD)  ALOHA  Slotted ALOHA  CSMA  CSMA/CD Token Ring /FDDI Fiber Channel  Fiber Channel Protocol.
CMPE 150- Introduction to Computer Networks 1 CMPE 150 Fall 2005 Lecture 16 Introduction to Computer Networks.
EEC-484/584 Computer Networks Lecture 13 Wenbing Zhao
Studying Local Area Networks Via Media Access Control (MAC) SubLayer
Networks: Local Area Networks1 LANs Studying Local Area Networks Via Media Access Control (MAC) SubLayer.
Computer Networks: Local Area Networks 1 LANs Studying Local Area Networks via the Media Access Control (MAC) SubLayer.
Semester EEE449 Computer Networks The Data Link Layer Part 2: Media Access Control En. Mohd Nazri Mahmud MPhil (Cambridge, UK) BEng (Essex,
Shashank Srivastava Motilal Nehru National Institute Of Technology, Allahabad Medium Access Control.
9/11/2015 5:55 AM1 Ethernet and CSMA/CD CSE 6590 Fall 2010.
Ethernet. Ethernet Goals Simplicity Low Cost Compatibility Address flexibility Fairness –All nodes have equal access to the network High speed Stability.
A.S.Tanenbaum, Computer networks, ch4 MAC 1 The Medium Access Control Sublayer Medium Access Control: a means of controlling access to the medium to promote.
CIS 725 Media Access Layer. Medium Access Control Sublayer MAC sublayer resides between physical and data link layer Broadcast/multiacess channels N independent.
McGraw-Hill © The McGraw-Hill Companies, Inc., 2004 Chapter 12 Multiple Access Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction.
Chi-Cheng Lin, Winona State University CS412 Introduction to Computer Networking & Telecommunication Medium Access Control Sublayer.
Chapter 4: Medium Access Control (MAC) Sublayer
Ch. 16 High-Speed LANs The Emergence of High- Speed LANs Trends –Computing power of PCs has continued to grow. –MIS organizations recognize the.
CHAPTER 4: THE MEDIUM ACCESS SUBLAYER 4.1: The Channel Allocation Problem 4.2: Multiple Access Protocols.
LECTURE9 NET301. DYNAMIC MAC PROTOCOL: CONTENTION PROTOCOL Carrier Sense Multiple Access (CSMA): A protocol in which a node verifies the absence of other.
© Janice Regan, CMPT 128, CMPT 371 Data Communications and Networking LANs 2: MAC protocols.
LAN technologies and network topology LANs and shared media Locality of reference Star, bus and ring topologies Medium access control protocols.
Data and Computer Communications Ninth Edition by William Stallings Data and Computer Communications, Ninth Edition by William Stallings, (c) Pearson Education.
Chi-Cheng Lin, Winona State University CS 313 Introduction to Computer Networking & Telecommunication Medium Access Control Sublayer.
جلسه یازدهم شبکه های کامپیوتری به نــــــــــــام خدا.
C H 4 T HE M EDIUM A CCESS C ONTROL S UBLAYER 1 Medium Access Control: a means of controlling access to the medium to promote orderly and efficient use.
Data Communications, Kwangwoon University12-1 Chapter 12. Multiple Access 1.Random Access 2.Controlled Access 3.Channelization.
Chapter 6 Multiple Radio Access
C H 4 T HE M EDIUM A CCESS C ONTROL S UBLAYER 1 Medium Access Control: a means of controlling access to the medium to promote orderly and efficient use.
Ch 12. Multiple Access. Multiple Access for Shared Link Dedicated link – Point-to-point connection is sufficient Shared link – Link is not dedicated –
LECTURE9 NET301 11/5/2015Lect 9 NET DYNAMIC MAC PROTOCOL: CONTENTION PROTOCOL Carrier Sense Multiple Access (CSMA): A protocol in which a node verifies.
EE 122: Lecture 6 Ion Stoica September 13, 2001 (* this talk is based in part on the on-line slides of J. Kurose & K. Rose)
1 Ethernet CSE 3213 Fall February Introduction Rapid changes in technology designs Broader use of LANs New schemes for high-speed LANs High-speed.
1 University of Calgary CS 441 Part 4 Medium Access Control 4.1 MAC Sublayer - CSMA 4.2 MAC Sublayer - Collision Free.
COMPUTER NETWORKS Data-link Layer (The Medium Access Control Sublayer) MAC Sublayer.
Multiple Access By, B. R. Chandavarkar, CSE Dept., NITK, Surathkal Ref: B. A. Forouzan, 5 th Edition.
Example DLL Protocols 1. High-Level Data Link Control (HDLC).
Data Link Layer Lower Layers Local Area Network Standards
CT301 LECTURE 8.
High Speed LANs – Ethernet and Token Ring
Chapter 14 LAN Systems Ethernet (CSMA/CD) ALOHA Slotted ALOHA CSMA
William Stallings Data and Computer Communications
Net301 lecture9 11/5/2015 Lect 9 NET301.
THE IEEE MAC SUB-LAYER – chapter 14
Ethernet Neil Tang 9/17/2008 CS440 Computer Networks.
The Medium Access Control Sublayer
Chapter 12 Multiple Access
Ethernet – CSMA/CD Review
Data Communication Networks
Ethernet – CSMA/CD Review
CARRIER SENSE MULTIPLE ACCESS (CSMA)
Chapter 6 Multiple Radio Access.
Dr. John P. Abraham Professor UTPA
Multiple Access Control (MAC) Protocols
Presentation transcript:

1 K. Salah Module 4.2: Media Access Control The Media Access Control (MAC) sublayer –Random Access (CSMA), IEEE –Token Passing, IEEE Ch

2 K. Salah MAC Concepts MAC sublayer provides the protocols that define the manner in which nodes share the singly physical transmission media. The protocols define the who, the how, the when, and the for how long of channel allocation. These protocols are sometimes called contention protocols. Random Access – Stations access medium randomly Contention –Stations contend for time on medium Random Access Protocols –Pure ALOHA –Slotted ALOHA –1-persistent CSMA –Nonpersistent CSMA –P-persistent CSMA –CSMA/CD –CSMA/CA

3 K. Salah ALOHA Pure ALOHA –Packet Radio –When station has frame, it sends –Station listens (for max round trip time)plus small increment –If ACK, fine. If not, retransmit –If no ACK after repeated transmissions, give up –Frame check sequence –If frame OK and address matches receiver, send ACK –Frame may be damaged by noise or by another station transmitting at the same time (collision) –Any overlap of frames causes collision –Max useful throughput (frames/s) is 18% Slotted ALOHA –Time in uniform slots equal to frame transmission time –Need central clock (or other sync mechanism) –Transmission begins at slot boundary –Frames either miss or overlap totally –Max useful throughput (frames/s) is 37%

4 K. Salah Carrier Sense Multiple Access Propagation time is much less than transmission time All stations know that a transmission has started almost immediately First listen for clear medium (carrier sense) If medium idle, transmit If two stations start at the same instant, collision Max utilization depends on propagation time (medium length) and frame length –Longer frame and shorter propagation gives better utilization

5 K. Salah CSMA 1-persistent CSMA –Similar to telephone with persistent redial feature. –P=1 means the probability of transmitting when sensing idle channel. Nonpersistent CSMA –If channel is busy, wait a random period of time and rechecks the channel. P-persistent CSMA –Uses slotted channel –If channel is idle, transmit with a probability of p. Wait one time slot and sense again idle channel with probability of 1-p. Next time slot, transmit with p probability.

6 K. Salah CSMA/CD Step 1. “ Listen before talking”. Step 2. If channel is quiet for a certain time, called interframe gap (IFG), then transmit. “Talk if quiet”. Step 3. If channel is busy, monitor the channel until it is quiet for IFG period before transmitting. “Wait for quiet before talking.” Step 4. Monitor the channel continuously during transmission to detect collisions. “Listen while talking”. Step 5. If collision occurs, the first node recognizes it will send a jam signal to ensure that all other stations detect the collision. Transmitters should stop immediately, receivers should reject data, and others wishing to transmit should recalculate their backoff period. “A buzzer sounds off indicating we have more than one talker at a time.” Step 6. All nodes wish to transmit must now wait a random period called “backoff” and attempt again to spread out collisions. “Backoff” is based on BEB algorithm (Binary Exponential Backoff). After 16 collisions, drop the frame to be transmitted.

7 K. Salah Notes On baseband bus, collision produces much higher signal voltage than signal Collision detected if cable signal greater than single station signal Signal attenuated over distance Limit distance to 500m (10Base5) or 200m (10Base2) For twisted pair (star-topology) activity on more than one port is collision Why largest network diameter for Ethernet LAN 10Base5 is 2500 meters? –5-4-3 Repeater Placement Rule.

8 K. Salah Token Ring (802.5) MAC protocol –Small frame (token) circulates when idle –Station waits for token –Changes one bit in token to make it SOF (Start Of Frame) for data frame –Append rest of data frame –Frame makes round trip and is absorbed by transmitting station –Station then inserts new token when transmission has finished and leading edge of returning frame arrives –Under light loads, some inefficiency –Under heavy loads, round robin