CSC 450/550 Part 3: The Medium Access Control Sublayer.

Slides:



Advertisements
Similar presentations
The ALOHA Protocol “Free for all”: whenever station has a frame to send, it does so. –Station listens for maximum RTT for an ACK. –If no ACK after a specified.
Advertisements

EECC694 - Shaaban #1 lec #5 Spring Data Link In Broadcast Networks: The Media Access Sublayer Broadcast networks with multi-access (or random.
Ethernet – CSMA/CD Review
Fundamentals of Computer Networks ECE 478/578
Multiple access What if multiple machines are sharing the same link?
1 K. Salah Module 4.2: Media Access Control The Media Access Control (MAC) sublayer –Random Access (CSMA), IEEE –Token Passing, IEEE Ch 13-
1 Version 3.0 Module 6 Ethernet Fundamentals. 2 Version 3.0 Why is Ethernet so Successful? In 1973, it could carry data at 3 Mbps Now, it can carry data.
EEC-484/584 Computer Networks Lecture 7 Wenbing Zhao
MAC Protocols Media Access Control (who gets the use the channel) zContention-based yALOHA and Slotted ALOHA. yCSMA. yCSMA/CD. TDM and FDM are inefficient.
CMPE 150- Introduction to Computer Networks 1 CMPE 150 Fall 2005 Lecture 17 Introduction to Computer Networks.
EEC-484/584 Computer Networks Lecture 13 Wenbing Zhao
EEC-484/584 Computer Networks Lecture 7 Wenbing Zhao
EE 4272Spring, 2003 Chapter 14 LAN Systems Ethernet (CSMA/CD)  ALOHA  Slotted ALOHA  CSMA  CSMA/CD Token Ring /FDDI Fiber Channel  Fiber Channel Protocol.
CMPE 150- Introduction to Computer Networks 1 CMPE 150 Fall 2005 Lecture 16 Introduction to Computer Networks.
EEC-484/584 Computer Networks Lecture 13 Wenbing Zhao
EEC-484/584 Computer Networks Lecture 9 Wenbing Zhao (Part of the slides are based on materials supplied by Dr. Louise Moser at UCSB and.
Networks: Local Area Networks1 LANs Studying Local Area Networks Via Media Access Control (MAC) SubLayer.
Computer Networks: Local Area Networks 1 LANs Studying Local Area Networks via the Media Access Control (MAC) SubLayer.
EEC-484/584 Computer Networks Lecture 7 Wenbing Zhao
Semester EEE449 Computer Networks The Data Link Layer Part 2: Media Access Control En. Mohd Nazri Mahmud MPhil (Cambridge, UK) BEng (Essex,
Media Access Sub-layer
1 Chapter 5 The Medium Access Sublayer. 2 Chapter 5 The Medium Access Layer 5.1 The Channel Allocation problem - Static and dynamic channel allocation.
Medium Access Control Sublayer
Infrastructure de Communications – CR 4107Chapter 41 The Medium Access Control Sublayer Chapter 4.
Enhanced CSMA Additional improvement  Use CSMA access  Listen while transmitting  Stop immediately if collision sensed  Called collision detection.
ICOM 6115©Manuel Rodriguez-Martinez ICOM 6115 – Computer Networks and the WWW Manuel Rodriguez-Martinez, Ph.D. Lecture 17.
جلسه دوازدهم شبکه های کامپیوتری به نــــــــــــام خدا.
9/11/2015 5:55 AM1 Ethernet and CSMA/CD CSE 6590 Fall 2010.
Ethernet. Ethernet Goals Simplicity Low Cost Compatibility Address flexibility Fairness –All nodes have equal access to the network High speed Stability.
A.S.Tanenbaum, Computer networks, ch4 MAC 1 The Medium Access Control Sublayer Medium Access Control: a means of controlling access to the medium to promote.
CIS 725 Media Access Layer. Medium Access Control Sublayer MAC sublayer resides between physical and data link layer Broadcast/multiacess channels N independent.
1 LAN Technologies and Network Topology. 2 Direct Point-to-Point Communication.
1 Computer Communication & Networks Lecture 13 Datalink Layer: Local Area Network Waleed Ejaz
Chi-Cheng Lin, Winona State University CS412 Introduction to Computer Networking & Telecommunication Medium Access Control Sublayer.
Computer Networks NYUS FCSIT Spring 2008 Igor TRAJKOVSKI, Ph.D. Associate Professor
The Medium Access Control Sublayer Chapter 4. The Channel Allocation Problem Static Channel Allocation in LANs and MANs Dynamic Channel Allocation in.
The Medium Access Control Sublayer Chapter 4 10/1/2015www.noteshit.com1.
LECTURE9 NET301. DYNAMIC MAC PROTOCOL: CONTENTION PROTOCOL Carrier Sense Multiple Access (CSMA): A protocol in which a node verifies the absence of other.
جلسه دهم شبکه های کامپیوتری به نــــــــــــام خدا.
The Medium Access Control Sublayer Chapter 4. The Channel Allocation Problem Static Channel Allocation Dynamic Channel Allocation  Delay for the divided.
Media access sub-layer
Chi-Cheng Lin, Winona State University CS 313 Introduction to Computer Networking & Telecommunication Medium Access Control Sublayer.
The Medium Access Control Sublayer Chapter 4. The Channel Allocation Problem Static Channel Allocation in LANs and MANs Dynamic Channel Allocation in.
The Medium Access Control Sublayer Chapter 4. The Channel Allocation Problem Static Channel Allocation in LANs and MANs Dynamic Channel Allocation in.
جلسه یازدهم شبکه های کامپیوتری به نــــــــــــام خدا.
17 - Winter 2005 ECE ECE 766 Computer Interfacing and Protocols 1 Local Area Networks Need for high performance communications for physically close devices.
Medium Access Control Sub Layer
Multiple Access.
Data Communications, Kwangwoon University12-1 Chapter 12. Multiple Access 1.Random Access 2.Controlled Access 3.Channelization.
The Medium Access Control Sublayer Chapter 4 12/13/2015www.ishuchita.com1.
5: DataLink Layer 5a-1 Multiple Access protocol. 5: DataLink Layer 5a-2 Multiple Access Links and Protocols Three types of “links”: r point-to-point (single.
The Medium Access Control Sublayer Chapter 4. The Channel Allocation Problem Static Channel Allocation in LANs and MANs Dynamic Channel Allocation in.
EE 122: Lecture 6 Ion Stoica September 13, 2001 (* this talk is based in part on the on-line slides of J. Kurose & K. Rose)
MAC Layer Protocols for Wireless Networks. What is MAC? MAC stands for Media Access Control. A MAC layer protocol is the protocol that controls access.
Carrier Sense Multiple Access Improve ALOHA by using carrier sense –Stations listen to the carrier before transmitting –If channel is busy, the station.
1 Ethernet CSE 3213 Fall February Introduction Rapid changes in technology designs Broader use of LANs New schemes for high-speed LANs High-speed.
The Medium Access Control Sublayer
The Medium Access Control (MAC) Sublayer. The Channel Allocation Problem Static Channel Allocation in LANs and MANs Dynamic Channel Allocation in LANs.
Chapter 4 The Medum Access Sublayer. MA Sublayer Additional Reference –Local and Metropolitan Area Networks, William Stallings, Prentice Hall, 2000, 6th.
THE MEDIUM ACCESS CONTROL SUBLAYER 4.1 THE CHANNEL ALLOCATION PROBLEM 4.2 MULTIPLE ACCESS PROTOCOLS.
UNIT 3 MULTIPLE ACCESS Adapted from lecture slides by Behrouz A. Forouzan © The McGraw-Hill Companies, Inc. All rights reserved.
COMPUTER NETWORKS Data-link Layer (The Medium Access Control Sublayer) MAC Sublayer.
Multiple Access By, B. R. Chandavarkar, CSE Dept., NITK, Surathkal Ref: B. A. Forouzan, 5 th Edition.
The Medium Access Control Sublayer
The Medium Access Control Sublayer
THE IEEE MAC SUB-LAYER – chapter 14
Channel Allocation Problem/Multiple Access Protocols Group 3
Link Layer and LANs Not everyone is meant to make a difference. But for me, the choice to lead an ordinary life is no longer an option 5: DataLink Layer.
Channel Allocation Problem/Multiple Access Protocols Group 3
Dr. John P. Abraham Professor UTPA
Presentation transcript:

CSC 450/550 Part 3: The Medium Access Control Sublayer

CSC 450/550 Summary Part A Functions 1)The problem 2)Where are we now? 3)The Channel Allocation Problem Part B Dynamic Channel Allocation Technologies 1) ALOHA Protocols 2) CSMA 3) CSMA/CD (old ETHERNET) 4) Switching (Fast ETHERNET) 5) Wireless LANS

CSC 450/550 Part A: Functions

CSC 450/550 (1)The Problem The problem: In a single channel broadcast network, when multiple stations try to send messages simultaneously, who has the right to use the channel? A common sense: When we take about MAC, we are faced with a broadcast network computers cable

CSC 450/550 (2) Where are we now? OSI Application Presentation Session Transport Network Data Link Physical Framing Error control Flow control Transmission/reception of frames MEDIA ACCESS sublayer LOGICAL LINK sublayer

CSC 450/550 (3) The Channel Allocation Problem Static FDM /TDM (Frequency/Time Division Multiplexing) –FDM : Radio/TV broadcasts –TDM : POTS (Plain Old Telephone System) –GSM uses both (Global System for Mobile Communications) –Wasteful of bandwidth and not work well for bursty traffic Dynamic Pure/ Slotted ALOHA Carrier Sense Multiple Access (CSMA) Protocols Collision free protocols (optional contents)

CSC 450/550 Part B Dynamic Channel Allocation Technologies 1) ALOHA Protocols 1.1 Pure ALOHA 1.2 Slotted ALOHA 2) CSMA 3) CSMA/CD (old ETHERNET) 4) Switching (Fast ETHERNET) 5) Wireless LANS

CSC 450/550 1) ALOHA Protocols Anyone may transmit whenever they want. (Continuous time model.) Detect if the transmission is successful. (So we need some way for Collision Detection (CD)). After a collision, wait a random amount of time and transmit the same frame again. This technique is known as backoff. The core idea is extremely simple:

CSC 450/ ) Pure ALOHA (1) In pure ALOHA, frames are transmitted at completely arbitrary times.

CSC 450/ ) Pure ALOHA (2) Vulnerable period for the shaded frame.

CSC 450/ ) Slotted ALOHA Time is divided into slots… can only transmit at the start of slot Vulnerable period halved => max. eff is doubled Requires sync of clocks Still poor at hi-loads

CSC 450/ ) Slotted ALOHA (2) Throughput versus offered traffic for ALOHA systems.

CSC 450/550 2) CSMA (Carrier Sense Multiple Access) (1) We can improve the performance of our simple network greatly if we introduce carrier sensing (CS). With carrier sensing, each host listens to the data being transmitted over the cable. A host will only transmit its own frames when it cannot hear any data being transmitted by other hosts. When a frame finishes, an interframe gap is allowed to pass before another host starts transmitting its frame. Communication Link

CSC 450/550 2) CSMA (2) Improves performance when higher medium utilisation When a node has data to transmit, the node first listens to the cable (using a transceiver) to see if a carrier (signal) is being transmitted by another node.

CSC 450/550 2) CSMA (3): Persistent and Nonpersistent CSMA Comparison of the channel utilization versus load for various random access protocols.

CSC 450/550 3) CSMA with Collision Detection (CSMA/CD) (1) CSMA/CD can be in one of three states: contention, transmission, or idle.

CSC 450/550 3) CSMA/CD (2): IEEE Bus LAN The standard describes the operation of the MAC sub-layer in a bus LAN that uses carrier sense, multiple access with collision detection (CSMA/CD). Beside carrier sensing, collision detection and the binary exponential back-off algorithm, the standard also describes the format of the frames and the type of encoding used for transmitting frames. The minimum length of frames can be varied from network to network. This is important because, depending on the size of the network, the frames must be of a suitable minimum length. The standard also makes some suggestions about the type of cabling that should be used for CSMA/CD bus LANs. The CSMA/CD Bus LAN is also widely called Ethernet.

CSC 450/550 3) CSMA/CD (3): Ethernet MAC Sublayer Protocol Frame formats. (a) DIX Ethernet, (b) IEEE

CSC 450/550 3) CSMA/CD (4): Ethernet MAC Sublayer Protocol Every network card in the world has a unique 46-bit serial number called a MAC address. The IEEE allocates these numbers to network card manufacturers who encode them into the firmware of their cards. The destination and source address fields of the MAC frame have 48 bits set aside (the standard also allows for 16-bit addresses but these are rarely used). The most significant bit is set to 0 to indicate an ordinary address and 1 to indicate a group address (this is for multicasting, which means that frames are sent to several hosts). If all 48 bits are set to 1 then frames are broadcast to all the hosts. If the two most significant bits are both zero then the 46 least significant bits contain the MAC addresses of the source and destination hosts.

CSC 450/550 3) CSMA/CD (5): Ethernet MAC Sublayer Protocol (Minimum Frame Length) When a host transmits a frame, there is a small chance that a collision will occur. The first host to detect a collision transmits a 48-bit jam sequence. To ensure that any hosts involved with the collision realise that the jam sequence is associate with their frame, they must still be transmitting when the jam sequence arrives. This means that the frame must be of a minimum length. The worse case scenario is if the two hosts are at far ends of the cable. If host A’s frame is just reaching host B when it begins transmitting, host B will detect the collision first and send a jam signal back to host A.

CSC 450/550 3) CSMA/CD (6): Ethernet MAC Sublayer Protocol (Minimum Frame Length) To ensure that no node may completely receive a frame before the transmitting node has finished sending it, Ethernet defines a minimum frame size (i.e. no frame may have less than 46 bytes of payload). n The minimum frame size is related to the distance which the network spans, the type of media being used and the number of repeaters which the signal may have to pass through to reach the furthest part of the LAN. n Together these define a value known as the Ethernet Slot Time, corresponding to 512 bit times at 10 Mbps.

CSC 450/550 3) CSMA/CD (7): Ethernet MAC Sublayer Protocol (Minimum Frame Length) The longest time between starting to transmit a frame and receiving the first bit of a jam sequence is twice the propagation delay from one end of the cable to the other. This means that a frame must have enough bits to last twice the propagation delay. The CSMA/CD Bus LAN transmits data at the standard rate of r = 10Mbps. The speed of signal propagation is about v = 2  10 8 m/s.

CSC 450/550 3) CSMA/CD (8): Ethernet MAC Sublayer Protocol (Minimum Frame Length) Example #1: Cable = 400m, trans. speed = 10 Mbit/sec, propagation speed = 2*10^8 m/sec A margin of error is usually added to this (often to make it a power of 2) so we might use 64 bits (8 bytes).

CSC 450/550 3) CSMA/CD (9): Ethernet MAC Sublayer Protocol (Minimum Frame Length) Example 2: Speed transmission is 100 Mbits/sec; frame size is 1500 bytes; the propagation speed is 3*10^8 m/sec. Calculate the distance between the nodes such that the time to transmit the frame = time to recognize that the collision have occurred.

CSC 450/550 3) CSMA/CD (10): Ethernet MAC Sublayer Protocol (Minimum Frame Length) The standard frame length is at least 512 bits (64 bytes) long, which is much longer than our minimum requirement of 64 bits (8 bytes). We only have to start worrying when the LAN reaches lengths of more than 2.5km CSMA/CD bus LANs longer than 500m are usually composed of multiple segments joined by in-line passive repeaters, which output on one cable the signals received on another cable. When we work out the minimum frame length for these longer LANs, we also have to take the delays caused by the passive repeaters (about 2.5  sec each) into account as well.

CSC 450/550 3) CSMA/CD (11): Ethernet MAC Sublayer Protocol (Shortest Ethernet Frame) n 64 bytes sent at 10Mbps  51.2  sec n 500m/segment, 4 repeaters between nodes  2500m  25  sec propagation delay n The frame should be longer enough for sender to detect the collision(2x25 or about 50  sec ) Why specify a shortest frame of 64byte? Node A Node BR1R2R3R4 500m  25  sec propagation delay

CSC 450/550 3) CSMA/CD (12): Ethernet MAC Sublayer Protocol (Non-Deterministic) The CSMA/CD bus LAN is said to be a non- deterministic network. This means that no host is guaranteed to be able to send its frame within a reasonable time (just a good probability of doing so). When the network is busy, the number of collisions rises dramatically and it may become very difficult for any hosts to transmit their frames. A real-time computing application (such as an assembly line) will demand that data is transmitted within a specified time period. Since the bus LAN cannot guarantee this, its use for real-time applications may not only be undesirable but potentially dangerous in some situations.

CSC 450/550 4) Switched Ethernet A simple example of switched Ethernet.

CSC 450/550 5) Wireless LANs 5.1 RF allocation 5.2 The Protocol Stack 5.3 The MAC Sublayer Protocol 5.4 The Frame Structure

CSC 450/ ) Where Does Wireless RF Live? MHz MHz MHz /802.11b a Bluetooth Cordless Phones Home RF Baby Monitors Microwave Ovens Old Wireless ISM Band: Industrial, Scientific, Medical

CSC 450/ ) The Protocol Stack Part of the protocol stack.

CSC 450/ ) The MAC Sublayer Protocol (1) (a) The hidden station problem. (b) The exposed station problem.

CSC 450/ ) The MAC Sublayer Protocol (2) The use of virtual channel sensing using CSMA/CA.

CSC 450/ ) The MAC Sublayer Protocol (3) A fragment burst.

CSC 450/ ) The MAC Sublayer Protocol (4) Interframe spacing in

CSC 450/ ) The Frame Structure The data frame.