CMPE 150- Introduction to Computer Networks 1 CMPE 150 Fall 2005 Lecture 16 Introduction to Computer Networks.

Slides:



Advertisements
Similar presentations
Data and Computer Communications Eighth Edition by William Stallings Lecture slides by Lawrie Brown Chapter 16 – High Speed LANs.
Advertisements

Channel Allocation Protocols. Dynamic Channel Allocation Parameters Station Model. –N independent stations, each acting as a Poisson Process for the purpose.
The ALOHA Protocol “Free for all”: whenever station has a frame to send, it does so. –Station listens for maximum RTT for an ACK. –If no ACK after a specified.
EECC694 - Shaaban #1 lec #5 Spring Data Link In Broadcast Networks: The Media Access Sublayer Broadcast networks with multi-access (or random.
Ethernet – CSMA/CD Review
Fundamentals of Computer Networks ECE 478/578
Multiple access What if multiple machines are sharing the same link?
Lecture 9: Multiple Access Protocols
LECTURE 11 CT1303 LAN. DYNAMIC MAC PROTOCOL No fixed assignment for transmission media or any network resources.. It allows transmission when needed.
Communication Networks Lecture 5 NETW 501-L5: NETW 501-L5: Medium Access Control Dr.-Ing. Khaled Shawky Hassan Room: C3-222, ext: 1204,
1 K. Salah Module 4.2: Media Access Control The Media Access Control (MAC) sublayer –Random Access (CSMA), IEEE –Token Passing, IEEE Ch 13-
MAC Protocols Media Access Control (who gets the use the channel) zContention-based yALOHA and Slotted ALOHA. yCSMA. yCSMA/CD. TDM and FDM are inefficient.
CS 5253 Workshop 1 MAC Protocol and Traffic Model.
CMPE 80N - Introduction to Networks and the Internet 1 CMPE 80N Spring 2003 Week 4 Introduction to Networks and the Internet.
CMPE 150- Introduction to Computer Networks 1 CMPE 150 Fall 2005 Lecture 17 Introduction to Computer Networks.
Chapter 14 LAN Systems Ethernet (CSMA/CD) ALOHA Slotted ALOHA CSMA
CMPE 150- Introduction to Computer Networks 1 CMPE 150 Fall 2005 Lecture 15 Introduction to Computer Networks.
Copyright © 2003, Dr. Dharma P. Agrawal and Dr. Qing-An Zeng. All rights reserved. 1 Chapter 6 Multiple Radio Access.
CMPE 257 Spring CMPE 257: Wireless and Mobile Networking Spring 2002 Week 2.
EEC-484/584 Computer Networks Lecture 7 Wenbing Zhao
EE 4272Spring, 2003 Chapter 14 LAN Systems Ethernet (CSMA/CD)  ALOHA  Slotted ALOHA  CSMA  CSMA/CD Token Ring /FDDI Fiber Channel  Fiber Channel Protocol.
EEC-484/584 Computer Networks Lecture 13 Wenbing Zhao
CMPE 150- Introduction to Computer Networks 1 CMPE 150 Fall 2005 Lecture 18 Introduction to Computer Networks.
Studying Local Area Networks Via Media Access Control (MAC) SubLayer
Networks: Local Area Networks1 LANs Studying Local Area Networks Via Media Access Control (MAC) SubLayer.
Computer Networks: Local Area Networks 1 LANs Studying Local Area Networks via the Media Access Control (MAC) SubLayer.
Semester EEE449 Computer Networks The Data Link Layer Part 2: Media Access Control En. Mohd Nazri Mahmud MPhil (Cambridge, UK) BEng (Essex,
Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011 The Medium Access Control Sublayer Chapter.
Medium Access Control Sublayer
Shashank Srivastava Motilal Nehru National Institute Of Technology, Allahabad Medium Access Control.
1 ECE453 – Introduction to Computer Networks Lecture 7 – Multiple Access Control (I)
9/11/2015 5:55 AM1 Ethernet and CSMA/CD CSE 6590 Fall 2010.
Multiple Access Protocols Chapter 6 of Hiroshi Harada Book
A.S.Tanenbaum, Computer networks, ch4 MAC 1 The Medium Access Control Sublayer Medium Access Control: a means of controlling access to the medium to promote.
CIS 725 Media Access Layer. Medium Access Control Sublayer MAC sublayer resides between physical and data link layer Broadcast/multiacess channels N independent.
McGraw-Hill © The McGraw-Hill Companies, Inc., 2004 Chapter 12 Multiple Access Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction.
Chi-Cheng Lin, Winona State University CS412 Introduction to Computer Networking & Telecommunication Medium Access Control Sublayer.
Chapter 4: Medium Access Control (MAC) Sublayer
CHAPTER 4: THE MEDIUM ACCESS SUBLAYER 4.1: The Channel Allocation Problem 4.2: Multiple Access Protocols.
LECTURE9 NET301. DYNAMIC MAC PROTOCOL: CONTENTION PROTOCOL Carrier Sense Multiple Access (CSMA): A protocol in which a node verifies the absence of other.
© Janice Regan, CMPT 128, CMPT 371 Data Communications and Networking LANs 2: MAC protocols.
Medium Access Control NWEN302 Computer Network Design.
Layer 2 Technologies At layer 2 we create and transmit frames over communications channels Format of frames and layer 2 transmission protocols are dependent.
The Medium Access Control Sublayer Chapter 4. The Channel Allocation Problem Static Channel Allocation Dynamic Channel Allocation  Delay for the divided.
Chi-Cheng Lin, Winona State University CS 313 Introduction to Computer Networking & Telecommunication Medium Access Control Sublayer.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2000 Unit-II Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Medium Access Control Sub Layer
Chapter 6 Multiple Radio Access
CS3502: Data and Computer Networks Local Area Networks - 1 introduction and early broadcast protocols.
5: DataLink Layer 5a-1 Multiple Access protocol. 5: DataLink Layer 5a-2 Multiple Access Links and Protocols Three types of “links”: r point-to-point (single.
CS3502: Data and Computer Networks Local Area Networks - 1 introduction and early broadcast protocols.
LECTURE9 NET301 11/5/2015Lect 9 NET DYNAMIC MAC PROTOCOL: CONTENTION PROTOCOL Carrier Sense Multiple Access (CSMA): A protocol in which a node verifies.
1 Ethernet CSE 3213 Fall February Introduction Rapid changes in technology designs Broader use of LANs New schemes for high-speed LANs High-speed.
The Medium Access Control Sublayer
Chapter 4 The Medum Access Sublayer. MA Sublayer Additional Reference –Local and Metropolitan Area Networks, William Stallings, Prentice Hall, 2000, 6th.
Medium Access Control Protocols, Local Area Networks, and Wireless Local Area Networks Lecture Note 10.
THE MEDIUM ACCESS CONTROL SUBLAYER 4.1 THE CHANNEL ALLOCATION PROBLEM 4.2 MULTIPLE ACCESS PROTOCOLS.
COMPUTER NETWORKS Data-link Layer (The Medium Access Control Sublayer) MAC Sublayer.
Multiple Access By, B. R. Chandavarkar, CSE Dept., NITK, Surathkal Ref: B. A. Forouzan, 5 th Edition.
Example DLL Protocols 1. High-Level Data Link Control (HDLC).
Data Link Layer Lower Layers Local Area Network Standards
Week3 The Medium Access Sublayer
High Speed LANs – Ethernet and Token Ring
Chapter 14 LAN Systems Ethernet (CSMA/CD) ALOHA Slotted ALOHA CSMA
Net301 lecture9 11/5/2015 Lect 9 NET301.
THE IEEE MAC SUB-LAYER – chapter 14
The Medium Access Control Sublayer
Chapter 6 Multiple Radio Access.
Dr. John P. Abraham Professor UTPA
Multiple Access Control (MAC) Protocols
Presentation transcript:

CMPE 150- Introduction to Computer Networks 1 CMPE 150 Fall 2005 Lecture 16 Introduction to Computer Networks

CMPE 150- Introduction to Computer Networks 2 Announcements Midterm on –In class, closed books/notes. Homework 3 is up. –Due on 11, Lab next week: discussion/review sessions for the midterm.

CMPE 150- Introduction to Computer Networks 3 Today MAC (cont’d).

CMPE 150- Introduction to Computer Networks 4 Channel Allocation Problem How to allocate single shared, broadcast channel among several stations/users. If no arbitration, several stations/users may transmit at the same time: COLLISIONS! A.k.a., “floor control”.

CMPE 150- Introduction to Computer Networks 5 Multiplexing Static: –FDM. –TDM. Dynamic: –Statistical TDM.

CMPE 150- Introduction to Computer Networks 6 Dynamic Multiplexing Dynamic allocation. In particular, statistical TDM. –Dynamically allocates time slots on demand. Increased channel utilization. But…

CMPE 150- Introduction to Computer Networks 7 Types of MAC Control: –Distributed. –Centralized. How they coordinate medium access: –Round-robin. –Scheduled-access. –Contention-based.

CMPE 150- Introduction to Computer Networks 8 Round-Robin MAC Centralized: polling. Distributed: token passing.

CMPE 150- Introduction to Computer Networks 9 Scheduled Access MAC Time divided into slots.

CMPE 150- Introduction to Computer Networks 10 Contention-Based MAC No control. Stations try to acquire the medium. Distributed in nature.

CMPE 150- Introduction to Computer Networks 11 MAC Protocols Contention-based –ALOHA and Slotted ALOHA. –CSMA. –CSMA/CD. Round-robin : token-based protocols. –Token bus. –Token ring.

CMPE 150- Introduction to Computer Networks 12 Contention-Based MACs ALOHA family. CSMA family.

CMPE 150- Introduction to Computer Networks 13 The ALOHA Protocols U of Hawaii in early 70’s. Packet radio networks. “Free for all”: whenever station has a frame to send, it does so. –Station listens for maximum RTT for an ACK. –If no ACK, re-sends frame for a number of times and then gives up. –Receivers check FCS and destination address to ACK.

CMPE 150- Introduction to Computer Networks 14 Pure ALOHA In pure ALOHA, frames are transmitted at completely arbitrary times.

CMPE 150- Introduction to Computer Networks 15 Collisions Invalid frames may be caused by channel noise or Because other station(s) transmitted at the same time: collision. Collision happens even when the last bit of a frame overlaps with the first bit of the next frame.

CMPE 150- Introduction to Computer Networks 16 Pure ALOHA: Performance Vulnerable period for the shaded frame.

CMPE 150- Introduction to Computer Networks 17 ALOHA’s Performance (Cont’d) S = G e -2G, where S is the throughput (rate of successful transmissions) and G is the offered load. S = S max = 1/2e = for G=0.5.

CMPE 150- Introduction to Computer Networks 18 Slotted Aloha Doubles performance of ALOHA. Frames can only be transmitted at beginning of slot: “discrete” ALOHA. Vulnerable period is halved. S = G e -G. S = S max = 1/e = for G = 1.

CMPE 150- Introduction to Computer Networks 19 ALOHA Protocols: Performance Throughput versus offered traffic for ALOHA systems.

CMPE 150- Introduction to Computer Networks 20 ALOHA Protocols: Summary Simple. But, poor utilization… –When?

CMPE 150- Introduction to Computer Networks 21 CSMA Protocols

CMPE 150- Introduction to Computer Networks 22 Carrier Sense Multiple Access The capacity of ALOHA or slotted ALOHA is limited by the large vulnerability period of a packet. By listening before transmitting, stations try to reduce the vulnerability period to one propagation delay. This is the basis of CSMA (Kleinrock and Tobagi, UCLA, 1975).

CMPE 150- Introduction to Computer Networks 23 CSMA Station that wants to transmit first listens to check if another transmission is in progress (carrier sense). If medium is in use, station waits; else, it transmits. Collisions can still occur. Transmitter waits for ACK; if no ACKs, retransmits.

CMPE 150- Introduction to Computer Networks 24 CSMA Protocol transmit no wait for a round-trip time positive ack? yes compute random backoff integer k no delay packet transmission k times Packet ready Channel Busy? yes

CMPE 150- Introduction to Computer Networks 25 CSMA (cont’d) Collisions can occur only when 2 or more stations begin transmitting within short time. If station transmits and no collisions during the time leading edge of frame propagates to farthest station, then NO collisions.

CMPE 150- Introduction to Computer Networks 26 CSMA Flavors After detecting carrier, a station can persist trying to transmit after the channel is idle again. 1-persistent CSMA (IEEE 802.3) –If medium idle, transmit; if medium busy, wait until idle; then transmit with p=1. –If collision, waits random period and starts again. Non-persistent CSMA: if medium idle, transmit; otherwise wait a random time before re-trying. –Thus, station does not continuously sense channel when it is in use. P-persistent: when channel idle detected, transmits packet in the first slot with p. –Slotted channel, i.e., with probability q = p-1, defers to next slot.

CMPE 150- Introduction to Computer Networks 27 CSMA vesrsu Aloha Comparison of the channel utilization versus load for various random access protocols.

CMPE 150- Introduction to Computer Networks 28 CSMA/CD CSMA with collision detection. Problem: when frames collide, medium is unusable for duration of both (damaged) frames. For long frames (when compared to propagation time), considerable waste. What if station listens while transmitting?

CMPE 150- Introduction to Computer Networks 29 CSMA/CD Protocol 1. If medium idle, transmit; otherwise If medium busy, wait until idle, then transmit with p=1. 3. If collision detected, transmit brief jamming signal and abort transmission. 4. After aborting, wait random time, try again.

CMPE 150- Introduction to Computer Networks 30 CSMA/CD Performance Wasted capacity restricted to time to detect collision. Time to detect collision < 2*maximum propagation delay. Rule in CSMA/CD protocols: frames long enough to allow collision detection prior to end of transmission.

CMPE 150- Introduction to Computer Networks 31 CSMA with Collision Detection CSMA/CD can be in one of three states: contention, transmission, or idle.

CMPE 150- Introduction to Computer Networks 32 Ethernet

CMPE 150- Introduction to Computer Networks 33 Ethernet IEEE 802. family. Standards for LANs and MANs. Ethernet defined in the IEEE standard. PHY, MAC, and LLC.

CMPE 150- Introduction to Computer Networks 34 Where in the Stack? (a) Position of LLC. (b) Protocol formats.

CMPE 150- Introduction to Computer Networks 35 Ethernet MAC CSMA/CD. Binary exponential back-off.

CMPE 150- Introduction to Computer Networks 36 Ethernet Frame Frame formats. (a) DIX Ethernet, (b) IEEE