The Data Link Layer Read Chapters 3 and 4. CSC 3352 Computer Communications Chapter 3&42 Where in the OSI Reference Model ? Session Transport Network.

Slides:



Advertisements
Similar presentations
14-MAC Sub-layer Dr. John P. Abraham Professor UTPA.
Advertisements

EECC694 - Shaaban #1 lec #5 Spring Data Link In Broadcast Networks: The Media Access Sublayer Broadcast networks with multi-access (or random.
12.1 Chapter 12 Multiple Access Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
LECTURE 11 CT1303 LAN. DYNAMIC MAC PROTOCOL No fixed assignment for transmission media or any network resources.. It allows transmission when needed.
Distributed systems Module 1 -Basic networking Teaching unit 1 – LAN standards Ernesto Damiani Free University of Bozen-Bolzano Lesson 1 – Local network.
MAC Protocols Media Access Control (who gets the use the channel) zContention-based yALOHA and Slotted ALOHA. yCSMA. yCSMA/CD. TDM and FDM are inefficient.
CS 5253 Workshop 1 MAC Protocol and Traffic Model.
CMPE 150- Introduction to Computer Networks 1 CMPE 150 Fall 2005 Lecture 17 Introduction to Computer Networks.
CMPE 150- Introduction to Computer Networks 1 CMPE 150 Fall 2005 Lecture 15 Introduction to Computer Networks.
1 Link Layer Message M A B Problem: Given a message M at a node A consisting of several packets, how do you send the packets to a “neighbor” node B –Neighbor:
CMPE 150- Introduction to Computer Networks 1 CMPE 150 Fall 2005 Lecture 16 Introduction to Computer Networks.
EEC-484/584 Computer Networks Lecture 13 Wenbing Zhao
EEC-484/584 Computer Networks Lecture 9 Wenbing Zhao (Part of the slides are based on materials supplied by Dr. Louise Moser at UCSB and.
Computer Networks Set 6: MAC sublayer. MAC Sublayer ÑWhen several users contend to use same medium, the DLL is divided into a LLC and a MAC sublayer.
Computer Networks Medium Access Sublayer (Part I).
Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011 The Medium Access Control Sublayer Chapter.
1 Chapter 5 The Medium Access Sublayer. 2 Chapter 5 The Medium Access Layer 5.1 The Channel Allocation problem - Static and dynamic channel allocation.
Medium Access Control Sublayer
1 ECE453 – Introduction to Computer Networks Lecture 7 – Multiple Access Control (I)
Computer Networks 1 (Mạng Máy Tính 1)
CIS 725 Media Access Layer. Medium Access Control Sublayer MAC sublayer resides between physical and data link layer Broadcast/multiacess channels N independent.
Chi-Cheng Lin, Winona State University CS412 Introduction to Computer Networking & Telecommunication Medium Access Control Sublayer.
Computer Networks NYUS FCSIT Spring 2008 Igor TRAJKOVSKI, Ph.D. Associate Professor
Chapter 4: Medium Access Control (MAC) Sublayer
CSMA with Collision Detection CSMA/CD can be in one of three states: contention, transmission, or idle.
The Medium Access Control Sublayer Chapter 4. The Channel Allocation Problem Static Channel Allocation in LANs and MANs Dynamic Channel Allocation in.
CSC4220/6220 Computer Networks
The Medium Access Control Sublayer Chapter 4 10/1/2015www.noteshit.com1.
CHAPTER 4: THE MEDIUM ACCESS SUBLAYER 4.1: The Channel Allocation Problem 4.2: Multiple Access Protocols.
جلسه دهم شبکه های کامپیوتری به نــــــــــــام خدا.
The Medium Access Control Sublayer Chapter 4. The Channel Allocation Problem Static Channel Allocation Dynamic Channel Allocation  Delay for the divided.
Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011 The Medium Access Control Sublayer Chapter.
Chi-Cheng Lin, Winona State University CS 313 Introduction to Computer Networking & Telecommunication Medium Access Control Sublayer.
The Medium Access Control Sublayer Chapter 4. The Channel Allocation Problem Static Channel Allocation in LANs and MANs Dynamic Channel Allocation in.
جلسه یازدهم شبکه های کامپیوتری به نــــــــــــام خدا.
17 - Winter 2005 ECE ECE 766 Computer Interfacing and Protocols 1 Local Area Networks Need for high performance communications for physically close devices.
Medium Access Control Sub Layer
12.1 Chapter 12 Multiple Access Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
7-1 Introduction to Queueing Theory l Components of a queueing system n probability density function (pdf) of interarrival times n pdf of service times.
Data Communications, Kwangwoon University12-1 Chapter 12. Multiple Access 1.Random Access 2.Controlled Access 3.Channelization.
The Medium Access Control Sublayer Chapter 4 12/13/2015www.ishuchita.com1.
5: DataLink Layer 5a-1 Multiple Access protocol. 5: DataLink Layer 5a-2 Multiple Access Links and Protocols Three types of “links”: r point-to-point (single.
Chapter 12 Multiple Access
The Medium Access Control Sublayer Chapter 4. The Channel Allocation Problem Static Channel Allocation in LANs and MANs Dynamic Channel Allocation in.
Carrier Sense Multiple Access Improve ALOHA by using carrier sense –Stations listen to the carrier before transmitting –If channel is busy, the station.
The Medium Access Control Sublayer
Chapter 4 The Medum Access Sublayer. MA Sublayer Additional Reference –Local and Metropolitan Area Networks, William Stallings, Prentice Hall, 2000, 6th.
THE MEDIUM ACCESS CONTROL SUBLAYER 4.1 THE CHANNEL ALLOCATION PROBLEM 4.2 MULTIPLE ACCESS PROTOCOLS.
UNIT 2 Medium Access sub layer: Medium Access sub layer - Channel Allocations, LAN protocols - ALOHA protocols(PURE AND SLOTTED ALOHA),CSMA/CA,CSMA/CD.
Multiple Access. Figure 12.1 Data link layer divided into two functionality-oriented sublayers.
COMPUTER NETWORKS Data-link Layer (The Medium Access Control Sublayer) MAC Sublayer.
THE MEDIUM ACCESS CONTROL SUBLAYER 4.1 THE CHANNEL ALLOCATION PROBLEM 4.2 MULTIPLE ACCESS PROTOCOLS.
Week3 The Medium Access Sublayer
Chapter 12 Multiple Access.
Introduction to Queueing Theory
Lab 7 – CSMA/CD (Data Link Layer Layer)
CT301 LECTURE 8.
Part III Datalink Layer 10.
Chapter 12 Multiple Access
The Medium Access Control Sublayer
Data Transmission and Computer Communications ECE: 412
THE IEEE MAC SUB-LAYER – chapter 14
Chapter 12 Multiple Access
Chapter 12 Multiple Access
The Medium Access Control Sublayer
Lecture 8 review Discuss programming assignment 1.
Computer Interfacing and Protocols
Dr. John P. Abraham Professor UTPA
Chapter 12 Media Access Control (MAC)
Distributed Systems 6. Medium Access Control Sublayer
Presentation transcript:

The Data Link Layer Read Chapters 3 and 4

CSC 3352 Computer Communications Chapter 3&42 Where in the OSI Reference Model ? Session Transport Network Data Link Layer Physical Presentation Application Logical Link Layer Medium Access Control

CSC 3352 Computer Communications Chapter 3&43 The Data Link Layer

The Data Link Layer: The Medium Access Control Reading: Chap. 4 in Tanenbaum Chap. 7 + Section 14.1 in Stallings

CSC 3352 Computer Communications Chapter 3&45 Why Do We Need a MAC Layer ? Let us consider different topologies Point-to-point channel  full duplex  half duplex Broadcast channel

CSC 3352 Computer Communications Chapter 3&46 Management of Broadcast Channels Allocating statically shares of the channel to all stations (by TDM, FDM, or other) Let stations compete for the ALL channel

CSC 3352 Computer Communications Chapter 3&47 A Fundamental Result In Queueing Theory In the context of LANs, one powerful bandwith for all is better than one part of it for each one ! Why ? Better utilization, as a dedicated channel may stay IDLE.

CSC 3352 Computer Communications Chapter 3&48 Multiple Access Protocols Competing stations (possible collisions) Aloha Slotted Aloha CSMA CSMA/CD Collision-free Bit-map protocol Binary countdown Limited contention Adaptive tree walk protocol

CSC 3352 Computer Communications Chapter 3&49 The Pure Aloha Model

CSC 3352 Computer Communications Chapter 3&410 The Slotted Aloha Model

CSC 3352 Computer Communications Chapter 3&411 CSMA-Persistent

CSC 3352 Computer Communications Chapter 3&412 CSMA Non-Persistent

CSC 3352 Computer Communications Chapter 3&413 CSMA with Collision Detection

CSC 3352 Computer Communications Chapter 3&414 The Contention period

CSC 3352 Computer Communications Chapter 3&415 Collision-free: the bit-map protocol All previous methods can lead to collisions… Divide the contention period into N intervals slots (N is the machine number in the LAN, 1bit per slot)… The sender broadcast one bit to reserve and then, once all the bit- map is passed by, the channel can be seized by stations with respect to their reservation order… See figure 4.6, page 254 Slots’ number correpsond to the order of machines on the LAN… We have an overhead of 1bit per machine…

CSC 3352 Computer Communications Chapter 3&416 Collision-free: the Binary countdown A station willing to use the channel sends its Binary address starting from the high level bits… Priority rules are clearly set to select the next broadcaster based on its Address… Bit 1 beats bit 0… In case of equality, we go to the next bit… See figure 4.7, page 256

CSC 3352 Computer Communications Chapter 3&417 Limited contention: Adaptive tree walk protocol D 7 ABC 1 E H GF The LAN machines