1 6/27/2015 01:02 Chapter 15LAN Performance1 Rivier College CS575: Advanced LANs Chapter 15: LAN Performance.

Slides:



Advertisements
Similar presentations
Nick Feamster CS 4251 Computer Networking II Spring 2008
Advertisements

Data and Computer Communications Eighth Edition by William Stallings Lecture slides by Lawrie Brown Chapter 16 – High Speed LANs.
Data and Computer Communications
Channel Allocation Protocols. Dynamic Channel Allocation Parameters Station Model. –N independent stations, each acting as a Poisson Process for the purpose.
The ALOHA Protocol “Free for all”: whenever station has a frame to send, it does so. –Station listens for maximum RTT for an ACK. –If no ACK after a specified.
EECC694 - Shaaban #1 lec #5 Spring Data Link In Broadcast Networks: The Media Access Sublayer Broadcast networks with multi-access (or random.
Ethernet – CSMA/CD Review
Fundamentals of Computer Networks ECE 478/578
Lecture 9: Multiple Access Protocols
The Data Link Layer introduction point-to-point data link protocols
LECTURE 11 CT1303 LAN. DYNAMIC MAC PROTOCOL No fixed assignment for transmission media or any network resources.. It allows transmission when needed.
12.1 Chapter 12 Multiple Access Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Communication Networks Lecture 5 NETW 501-L5: NETW 501-L5: Medium Access Control Dr.-Ing. Khaled Shawky Hassan Room: C3-222, ext: 1204,
Channel Access Methods When several devices are connected to a single channel, there must be some rules to govern these devices as they access, transmit,
1 K. Salah Module 4.2: Media Access Control The Media Access Control (MAC) sublayer –Random Access (CSMA), IEEE –Token Passing, IEEE Ch 13-
1 Version 3.0 Module 6 Ethernet Fundamentals. 2 Version 3.0 Why is Ethernet so Successful? In 1973, it could carry data at 3 Mbps Now, it can carry data.
MAC Protocols Media Access Control (who gets the use the channel) zContention-based yALOHA and Slotted ALOHA. yCSMA. yCSMA/CD. TDM and FDM are inefficient.
CMPE 150- Introduction to Computer Networks 1 CMPE 150 Fall 2005 Lecture 17 Introduction to Computer Networks.
Chapter 14 LAN Systems Ethernet (CSMA/CD) ALOHA Slotted ALOHA CSMA
Copyright © 2003, Dr. Dharma P. Agrawal and Dr. Qing-An Zeng. All rights reserved. 1 Chapter 6 Multiple Radio Access.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Chapter 13 Multiple Access.
EE 4272Spring, 2003 Chapter 14 LAN Systems Ethernet (CSMA/CD)  ALOHA  Slotted ALOHA  CSMA  CSMA/CD Token Ring /FDDI Fiber Channel  Fiber Channel Protocol.
CMPE 150- Introduction to Computer Networks 1 CMPE 150 Fall 2005 Lecture 16 Introduction to Computer Networks.
Studying Local Area Networks Via Media Access Control (MAC) SubLayer
12.1 Chapter 12 Multiple Access Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Networks: Local Area Networks1 LANs Studying Local Area Networks Via Media Access Control (MAC) SubLayer.
Computer Networks: Local Area Networks 1 LANs Studying Local Area Networks via the Media Access Control (MAC) SubLayer.
Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011 The Medium Access Control Sublayer Chapter.
Lecture 16 Random Access protocols r A node transmits at random at full channel data rate R. r If two or more nodes “collide”, they retransmit at random.
1 ECE453 – Introduction to Computer Networks Lecture 7 – Multiple Access Control (I)
9/11/2015 5:55 AM1 Ethernet and CSMA/CD CSE 6590 Fall 2010.
McGraw-Hill © The McGraw-Hill Companies, Inc., 2004 Chapter 12 Multiple Access Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction.
Chi-Cheng Lin, Winona State University CS412 Introduction to Computer Networking & Telecommunication Medium Access Control Sublayer.
Chapter 4: Medium Access Control (MAC) Sublayer
Chapter 12 Multiple Access Figure 12.1 Data link layer divided into two functionality-oriented sublayers Figure 12.2 Taxonomy of multiple-access protocols.
CHAPTER 4: THE MEDIUM ACCESS SUBLAYER 4.1: The Channel Allocation Problem 4.2: Multiple Access Protocols.
LECTURE9 NET301. DYNAMIC MAC PROTOCOL: CONTENTION PROTOCOL Carrier Sense Multiple Access (CSMA): A protocol in which a node verifies the absence of other.
© Janice Regan, CMPT 128, CMPT 371 Data Communications and Networking LANs 2: MAC protocols.
The Medium Access Control Sublayer Chapter 4. The Channel Allocation Problem Static Channel Allocation Dynamic Channel Allocation  Delay for the divided.
Data and Computer Communications Ninth Edition by William Stallings Data and Computer Communications, Ninth Edition by William Stallings, (c) Pearson Education.
Chi-Cheng Lin, Winona State University CS 313 Introduction to Computer Networking & Telecommunication Medium Access Control Sublayer.
4: DataLink Layer1 Multiple Access Links and Protocols Three types of “links”: r point-to-point (single wire, e.g. PPP, SLIP) r broadcast (shared wire.
LOCAL AREA NETWORKS. CSMA/CD Carrier Sense Multiple Access with Collision Detection The CSMA method does not specify the procedure following a collision.
Medium Access Control Sub Layer
Multiple Access.
Data Communications, Kwangwoon University12-1 Chapter 12. Multiple Access 1.Random Access 2.Controlled Access 3.Channelization.
1 Kyung Hee University Chapter 12 Multiple Access.
CS3502: Data and Computer Networks Local Area Networks - 1 introduction and early broadcast protocols.
CS3502: Data and Computer Networks Local Area Networks - 1 introduction and early broadcast protocols.
LECTURE9 NET301 11/5/2015Lect 9 NET DYNAMIC MAC PROTOCOL: CONTENTION PROTOCOL Carrier Sense Multiple Access (CSMA): A protocol in which a node verifies.
Chapter 12 Multiple Access
EE 122: Lecture 6 Ion Stoica September 13, 2001 (* this talk is based in part on the on-line slides of J. Kurose & K. Rose)
Carrier Sense Multiple Access Improve ALOHA by using carrier sense –Stations listen to the carrier before transmitting –If channel is busy, the station.
1 Ethernet CSE 3213 Fall February Introduction Rapid changes in technology designs Broader use of LANs New schemes for high-speed LANs High-speed.
Medium Access Control Protocols, Local Area Networks, and Wireless Local Area Networks Lecture Note 10.
Multiple Access. Figure 12.1 Data link layer divided into two functionality-oriented sublayers.
Example DLL Protocols 1. High-Level Data Link Control (HDLC).
Data Link Layer Lower Layers Local Area Network Standards
Chapter 12 Multiple Access.
Lab 7 – CSMA/CD (Data Link Layer Layer)
CT301 LECTURE 8.
High Speed LANs – Ethernet and Token Ring
Chapter 14 LAN Systems Ethernet (CSMA/CD) ALOHA Slotted ALOHA CSMA
Multiple Access Mahesh Jangid Assistant Professor JVW University.
Net301 lecture9 11/5/2015 Lect 9 NET301.
CSMA with Reservation by Interruptions (CSMA/RI)
CARRIER SENSE MULTIPLE ACCESS (CSMA)
Chapter 6 Multiple Radio Access.
Multiple Access Control (MAC) Protocols
Chapter 12 Media Access Control (MAC)
Presentation transcript:

1 6/27/ :02 Chapter 15LAN Performance1 Rivier College CS575: Advanced LANs Chapter 15: LAN Performance

2 6/27/ :02 Chapter 15LAN Performance2 LAN Performance Overview 0 Measures of Performance 0 Effect of Propagation Delay and Transmission Rate 0 Factors That Affects Performance 0 Bounds of Performance 0 Comparative Performance of Token Passing and CSMA/CD 0 Behavior of Contention Protocols

3 6/27/ :02 Chapter 15LAN Performance3 Measures of Performance 0 [D]: The delay that occurs between the time a packet or frame is ready for transmission from a node, and the completion of successful transmission. 0 [S]: The throughput of the LAN; the total rate of data being transmitted between nodes (carried load). 0 [U]: The utilization of the LAN medium; the fraction of total capacity being used.

4 6/27/ :02 Chapter 15LAN Performance4 Ideal Channel Utilization

5 6/27/ :02 Chapter 15LAN Performance5 Measurements of Performance

6 6/27/ :02 Chapter 15LAN Performance6 Representative Values of a and U a = Propagation time/Transmission time; Maximum possible utilization, U = Throughput/Data rate = 1/(1 + a)

7 6/27/ :02 Chapter 15LAN Performance7 The Effect of a on Utilization for Baseband Bus

8 6/27/ :02 Chapter 15LAN Performance8 Utilization U as a Function of a

9 6/27/ :02 Chapter 15LAN Performance9 Effect of a on Throughput S

10 6/27/ :02 Chapter 15LAN Performance10 Overhead 0 Administrative Overhead for controlling protocols includes address and synchronization bits. 0 In contention protocols (ALOHA, S-ALOHA, CSMA, CSMA/CD): Time wasted due to collisions; need for acknowledgement frames. S- ALOHA requires that slot size equals transmission plus maximum propagation time. 0 In Token Ring: Time waiting for token if intervening stations have no data to send. 0 In Token Bus: Time waiting for token if logically intervening stations have no data to send; token transmission; acknowledgement frames. 0 Explicit reservation: Reservation transmission, acknowledgements. 0 Implicit reservation: Overhead of protocol used to establish reservation, acknowledgements.

11 6/27/ :02 Chapter 15LAN Performance11 LAN Performance: Bounds on Performance 0 Regions, based on the magnitude of the offered load: 1. A region of low delay through the network, where the capacity is more than adequate to handle the load offered. 2. A region of high delay, where the network becomes a bottleneck. 3. A region of unbounded delay, where the offered load exceeds the total capacity of the system. 0 Maximum possible throughput: THRU < N active /(T idle + T msg ) 0 The breakpoint between these two bounds occurs at: N active /(T idle + T msg ) = 1/ T msg or N active = (T idle + T msg )/T msg 0 For a lower bound on delay: T delay > T msg or T delay > N active T msg - T idle

12 6/27/ :02 Chapter 15LAN Performance12 Performance of Token Passing and CSMA/CD 0 For Token Ring: Throughput S = 1/(1 + a > 1, a < 1 S = 1/a(1 + a > 1 and S = N >> 1, a > 1 Delay D = N + a – a < 1 D = a >1 0 For CSMA/CD: S = 1/[1 + 2a(1-A)/A] and S = 1/(1 + N >> 1; A = (1 – 1/N)^(N – 1) Delay for CSMA/CD is difficult to express and depends on the exact nature of the protocol (persistence, retry policy).

13 6/27/ :02 Chapter 15LAN Performance13 Performance Analysis Conclusions 0 For the given parameters, the smaller the mean frame length, the greater the difference in maximum mean throughput rate between token passing and CSMA/CD. This reflects the strong dependence of CSMA/CD on a. 0 Token ring is the least sensitive to workload. 0 CSMA/CD offers the shortest delay under light load, while it is most sensitive under heavy load to the workload.