Chapter 2 More on Wireless Ethernet, Token Ring, FDDI Professor Rick Han University of Colorado at Boulder

Slides:



Advertisements
Similar presentations
Networks: Wireless LANs1 Wireless Local Area Networks.
Advertisements

12.1 Chapter 12 Multiple Access Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Multiple access What if multiple machines are sharing the same link?
The Data Link Layer introduction point-to-point data link protocols
Multiple Access Methods. When nodes or stations are connected and use a common link (cable or air), called a multipoint or broadcast link, we need a.
LECTURE 11 CT1303 LAN. DYNAMIC MAC PROTOCOL No fixed assignment for transmission media or any network resources.. It allows transmission when needed.
– Wireless PHY and MAC Stallings Types of Infrared FHSS (frequency hopping spread spectrum) DSSS (direct sequence.
Comp 361, Spring 20056:Basic Wireless 1 Chapter 6: Basic Wireless (last updated 02/05/05) r A quick intro to CDMA r Basic
12.1 Chapter 12 Multiple Access Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Network Technology CSE Network Technology CSE3020 Week 9.
P. Bhagwat Specification overview. P. Bhagwat Specifications PLCP Sublayer PHY layer Management PMD Sublayer MAC sublayer MAC Layer Management.
1 Shared Access Networks Outline Bus (Ethernet) Token ring (FDDI) Wireless (802.11)
Spring 2002CS 4611 Shared Access Networks Outline Bus (Ethernet) Token ring (FDDI) Wireless (802.11)
20 – Collision Avoidance, : Wireless and Mobile Networks6-1.
HY539: Mobile Computing and Wireless Networks
specifications overview Specifications MAC  Specification of layers below LLC  Associated management/control interfaces MIB Control Applications.
Chapter 2 Multiple Access Protocols Professor Rick Han University of Colorado at Boulder
Chapter 2 Multiple Access Protocols Professor Rick Han University of Colorado at Boulder
WLAN b a Johan Montelius
Medium Access Control Sublayer
2/12/20021 IEEE Wireless Local Area Networks The future is wireless Presented by Tamer Khattab and George Wong Prepared for EECE571N - Advanced.
Lecture #2 Chapter 14 Wireless LANs.
Chi-Cheng Lin, Winona State University CS412 Introduction to Computer Networking & Telecommunication Medium Access Control Sublayer.
© Janice Regan, CMPT 128, CMPT 371 Data Communications and Networking LANs 2: MAC protocols.
Medium Access Control NWEN302 Computer Network Design.
LAN technologies and network topology LANs and shared media Locality of reference Star, bus and ring topologies Medium access control protocols.
1 Other LANs Token Rings Wireless –Wireless LAN (802.11, WiFi) –Broadband Wireless (802.16) –Bluetooth.
© 2009 Pearson Education Inc., Upper Saddle River, NJ. All rights reserved. © The McGraw-Hill Companies, Inc. Medium Access Control Asst. Prof. Chaiporn.
12.1 Chapter 12 Multiple Access Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Data Communications, Kwangwoon University12-1 Chapter 12. Multiple Access 1.Random Access 2.Controlled Access 3.Channelization.
1 Kyung Hee University Chapter 12 Multiple Access.
5: DataLink Layer 5a-1 Multiple Access protocol. 5: DataLink Layer 5a-2 Multiple Access Links and Protocols Three types of “links”: r point-to-point (single.
Data Link Layer. Useful References r Wireless Communications and Networks by William Stallings r Computer Networks (third edition) by Andrew Tanenbaum.
Ch 12. Multiple Access. Multiple Access for Shared Link Dedicated link – Point-to-point connection is sufficient Shared link – Link is not dedicated –
CSE 461: Multiple Access Networks. This Lecture  Key Focus: How do multiple parties share a wire?  This is the Medium Access Control (MAC) portion of.
Mozafar Bag-Mohammadi University of Ilam
WLAN.
Wireless Protocols. 2 Outline MACA 3 ISM: Industry, Science, Medicine unlicensed frequency spectrum: 900Mhz, 2.4Ghz, 5.1Ghz, 5.7Ghz.
1 Shared Access Networks: Token ring, Wireless Sections 2.7 & 2.8.
1 Kyung Hee University Prof. Choong Seon HONG Multiple Access.
COMPUTER NETWORKS Lecture-8 Husnain Sherazi. Review Lecture 7  Shared Communication Channel  Locality of Reference Principle  LAN Topologies – Star.
1 CS716 Advanced Computer Networks By Dr. Amir Qayyum.
UNIT 3 MULTIPLE ACCESS Adapted from lecture slides by Behrouz A. Forouzan © The McGraw-Hill Companies, Inc. All rights reserved.
2. Data Link Layer: Medium Access Control. Scheduling.
Multiple Access Methods
Chapter 15 Wireless LANs.
Data link layer divided into two functionality-oriented sublayers
Chapter 5 Link Layer and LANs
Part III Datalink Layer 10.
Lecture 27 WLAN Part II Dr. Ghalib A. Shah
Multiple Access Mahesh Jangid Assistant Professor JVW University.
Channel Allocation (MAC)
Medium Access Control (MAC) Sub-layer
Wireless Local Area Networks (LANs)
THE IEEE MAC SUB-LAYER – chapter 14
Communication Networks NETW 501
Multiple Access Methods
Specification overview
Specification overview
Chapter 13 Multiple Access
Specification overview
Specification overview
Chapter 13 Multiple Access
Specification overview
Specification overview
7- chapter Seven Local Area Networks (LAN)
Specification overview
Multiple Access Methods
Mozafar Bag-Mohammadi University of Ilam
Dr. John P. Abraham Professor UTPA
Presentation transcript:

Chapter 2 More on Wireless Ethernet, Token Ring, FDDI Professor Rick Han University of Colorado at Boulder

Prof. Rick Han, University of Colorado at Boulder Announcements Previous lecture now online Homework #1 is on the Web site, due Feb. 5 Programming assignment #1 is now available on Web site, due Feb. 19 (3 weeks) Next, Chapter 2, more on Wireless Ethernet, Token Ring, FDDI

Prof. Rick Han, University of Colorado at Boulder Recap of Previous Lecture Multiple Access Protocols Designed for shared-media links Channel reservation protocols: TDMA, FDMA, CDMA Random access protocols: CSMA/CD (Ethernet), CSMA/CA ( wireless Ethernet) Random Access Protocols ALOHA, slotted ALOHA – packet collisions CSMA – “listen before you talk” CSMA/CD – “listen while you talk” CSMA/CA – see next slide

Prof. Rick Han, University of Colorado at Boulder MAC Layer Uses CSMA/CA = CSMA + Collision Avoidance Collision Avoidance equated with exponential backoff Hidden terminal RTS/CTS is required feature but may be disabled ’s CSMA/CA is called the Distributed Coordination Function (DCF) Useful to send non-delay-sensitive data such as Web, ftp, <- asynchronous traffic b’s MAC is ~70% efficient slotted ALOHA ~37% Ethernet’s efficiency: ~ 1/(1+5T prop /T trans ), ~ 70% for common values of prop. delay and max pkt size, ->100% for small prop. delays & small pkts

Prof. Rick Han, University of Colorado at Boulder MAC Layer (2) Contention in CSMA causes delay Point Coordination Function (PCF) Mode gives delay-sensitive traffic priority over asynchronous traffic Useful for interactive audio/video Define a “superframe”. Delay-sensitive traffic gets access to first part of superframe via shorter random wait times. Inside the first part of superframe, a central PCF master polls each user with delay-sensitive data In second part of superframe, asynchronous data is carried Built on top of DCF

Prof. Rick Han, University of Colorado at Boulder Physical Layers of Variants What does use for its physical layer? 2.4 GHz Freq. Hop 1,2 Mbps 2.4 GHz Dir. Seq. 1,2 Mbps Infrared 1,2 Mbps 2.4 GHz Dir. Seq. 5.5,11 Mbps 5 GHz OFDM 6-54 Mbps Original Standard b802.11a Also, g at 2.4 GHz, OFDM or PBCC, up to 54 Mbps. 5 GHz ok in U.S., but conflicts abroad

Prof. Rick Han, University of Colorado at Boulder b: Direct Sequence Spread Spectrum Multiply data bit stream d(t) by a faster chipping sequence c(t) : BPSK example +1/-1 Chipping Sequence c(t) time Data d(t) Chipping sequence c(t) also called Pseudo-Noise (PN) spreading sequence depending on usage +1 time

Prof. Rick Han, University of Colorado at Boulder Direct Sequence Sender Chipping Sequence c(t) time Data d(t) +1 d(t)*c(t) +1 time

Prof. Rick Han, University of Colorado at Boulder Direct Sequence Receiver Receiver also has c(t) time d(t)*c(t)*c(t) = Data d(t), since c(t)*c(t) = 1! +1 time Receive d(t)*c(t) +1 time

Prof. Rick Han, University of Colorado at Boulder Direct Sequence Spreads the Spectrum Benefit of modulating data d(t) by chipping sequence: spreading the spectrum to improve immunity to noise and fading frequency Spectrum of data d(t) frequency Spectrum of chipping sequence c(t) frequency Spectrum of d(t)*c(t)

Prof. Rick Han, University of Colorado at Boulder CDMA Employs Direct Sequence Each c(t) can be looked upon as a code that only the sender and receiver pair both know Assign code c 1 (t) between a base station and user 1, c 2 (t) between base station and user 2, … Base station sends d 1 (t)*c 1 (t) + d 2 (t)*c 2 (t) Ideally, choose c 1 (t) to be orthogonal to c 2 (t), i.e. c 1 (t)*c 2 (t) =0 (reality: only ~orthogonal) At receiver 1, received signal is multiplied by c 1 (t): c 1 (t)*[d 1 (t)*c 1 (t) + d 2 (t)*c 2 (t)] = d 1 (t)! CDMA: multiple data streams simultaneously access the same medium using ~orthogonal DSSS codes

Prof. Rick Han, University of Colorado at Boulder CDMA Employs Direct Sequence (2) Original at 1 Mbps used 11 chips/bit (Barker sequence), and BPSK (+1/- 1 signalling) for 11 Mcps, or 11 MHz b is more sophisticated: 8 chips per symbol, and 8 bits/symbol, chipping rate is 11 MHz = Msps = 11 Mbps 2.4 GHz ISM band has 14 channels (11 in U.S.) Each channel occupies 22 Mhz. Within each channel, uses Direct Sequence CDMA

Prof. Rick Han, University of Colorado at Boulder Specifics (2) 2.4 GHz ISM band has 14 channels (11 in U.S.) Interference from adjacent Access Points (AP) or base stations: Only 3 channels (1,6,11) are non- overlapping reuse frequencies in beehive pattern to avoid degraded throughput Interference from Bluetooth, microwaves, garage door openers – unlicensed spectrum!

Prof. Rick Han, University of Colorado at Boulder a: OFDM OFDM = Orthogonal Frequency Division Multiplexing Special case of Multi-Carrier Modulation (MCM), or Discrete Multi-Tone (DMT) Divide data bit stream d(t) over different frequencies. For example: Transmit(t) = d 1 (t)*cos(2  t) + d 2 (t)*cos (2  t) 48 subcarriers in a over a 20 MHz channel Delivers better performance than DSSS, especially indoors High spectral efficiency, resistance to multipath, … Various flavors of DSL also employ this technique

Prof. Rick Han, University of Colorado at Boulder Token Ring Not very popular, even being phased out at IBM – primarily of historical interest Why did Ethernet win? “Cheaper and good enough” Conceptual Topology of Token Ring: Token Ring Ethernet

Prof. Rick Han, University of Colorado at Boulder Token Ring (2) Links are unidirectional Each node has a downstream neighbor and an upstream neighbor Token Ring Topology resembles N point-to-point links forming a ring rather than continuous wire loop but access to ring is shared via tokens A “token” is a special flag that circulates around the ring “Token”

Prof. Rick Han, University of Colorado at Boulder Token Ring (3) Each node receives token, then transmits it to its downstream neighbor Round-robin ensures fairness, as every node eventually can transmit when it receives token Token Ring Suppose token was passed from source to destination rather than around the ring as in Token Ring some hosts could be passed over indefinitely – unfair! “Token”

Prof. Rick Han, University of Colorado at Boulder Token Ring (4) When a node has a frame to send, it takes token, and transmits frame downstream Token Ring Each node receives a frame and forwards it downstream Destination host saves copy of frame, but keeps forwarding frame. Inefficient Forwarding stops when frame reaches original source “Token” Data Frame

Prof. Rick Han, University of Colorado at Boulder Token Ring Example Token Ring “Token” DestinationSource Data Frame Data Frame (2) Data Frame (5) Data Frame (4) Data Frame (3) Data Frame (6) (1) (7) Stop Data Frame

Prof. Rick Han, University of Colorado at Boulder Token Ring’s Robustness To Failure A given node can fail at any time: Without the token With the token Token Ring If a node fails without the token: An electromechnical relay closes at failing node, keeping the ring intact Data frame continues to be forwarded as before “Token” Data Frame

Prof. Rick Han, University of Colorado at Boulder Token Ring’s Robustness To Failure (2) In Token Ring, when frame reaches a destination node, it is marked as read When marked-as-read frame reaches sender, it acts as “ACK” to sender Token Ring If a destination node fails without the token: Sender receives unmarked frame, and can retransmit it later “Token” Data Frame Destination

Prof. Rick Han, University of Colorado at Boulder Token Ring’s Robustness To Failure (3) If a node fails with the token, then the ring must somehow introduce a new token After a timeout, in which no token is detected, a “designated monitor” introduces a new token Token Ring If designated monitor fails Its periodic keep- alive not detected A node sends “claim” token around ring If claim token returns to sender, then sender becomes “designated monitor” “Token”

Prof. Rick Han, University of Colorado at Boulder Token Ring : Other Points Token Holding Time (THT) by default is 20 ms Token Ring data rates are 4 and 16 Mbps If a token is held until data frame returns, then called “delay-release” Inefficient, original version of Solution: release token as soon as send has transmitted data frame More efficient, called “early release”, now supported in later version of Token Rotation Time <= (# Nodes)*THT + Ring Latency

Prof. Rick Han, University of Colorado at Boulder FDDI Fiber Distributed Data Interface Dual ring topology originally using optical fibers instead of copper wire 100 Mbps Second ring helps with robustness/ fault recovery Some nodes may be part of only one ring: single attachment station (SAS) FDDI

Prof. Rick Han, University of Colorado at Boulder FDDI FDDI (2) Recall the inefficiency of Token Ring: frames are forwarded even after they’ve reached destination Solution: in FDDI, destination node removes frame from ring Destination Data Frame