Medium Access Control. Channel Allocation Static channel allocation in LANs and MANs FDMA, TDMA, CDMA Dynamic channel allocation in LANs and MANs MAC.

Slides:



Advertisements
Similar presentations
The Medium Access Control Sublayer
Advertisements

Medium Access Control Sublayer Chapter 4 CN5E by Tanenbaum & Wetherall, © Pearson Education-Prentice Hall and D. Wetherall, 2011 Channel Allocation Problem.
Channel Allocation Protocols. Dynamic Channel Allocation Parameters Station Model. –N independent stations, each acting as a Poisson Process for the purpose.
EECC694 - Shaaban #1 lec #5 Spring Data Link In Broadcast Networks: The Media Access Sublayer Broadcast networks with multi-access (or random.
Wireless Networks.
CMPE 150- Introduction to Computer Networks 1 CMPE 150 Fall 2005 Lecture 17 Introduction to Computer Networks.
Copyright © 2003, Dr. Dharma P. Agrawal and Dr. Qing-An Zeng. All rights reserved. 1 Chapter 6 Multiple Radio Access.
Data Link Layer Switching
The Protocol Stack Part of the protocol stack.
Midterm Review 1 Introduction –Basic terminology and concepts. Physical Layer –Time and frequency domains. –Bandwidth and data rate. –Analog and digital.
The Medium Access Control Sublayer Chapter 4. Ethernet Cabling The most common kinds of Ethernet cabling.
CMPE 150- Introduction to Computer Networks 1 CMPE 150 Fall 2005 Lecture 16 Introduction to Computer Networks.
CMPE 150- Introduction to Computer Networks 1 CMPE 150 Fall 2005 Lecture 18 Introduction to Computer Networks.
16 February 2003 TU/e Computer Science, System Architecture and Networking 1 Communication media Thanks to A. Tanenbaum.
Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011 The Medium Access Control Sublayer Chapter.
1 Chapter 5 The Medium Access Sublayer. 2 Chapter 5 The Medium Access Layer 5.1 The Channel Allocation problem - Static and dynamic channel allocation.
Medium Access Control Sublayer
1 ECE453 – Introduction to Computer Networks Lecture 8 – Multiple Access Control (II)
The Medium Access Control Sublayer Chapter 4. The Channel Allocation Problem Static Channel Allocation in LANs and MANs Dynamic Channel Allocation in.
Infrastructure de Communications – CR 4107Chapter 41 The Medium Access Control Sublayer Chapter 4.
1 ECE453 – Introduction to Computer Networks Lecture 7 – Multiple Access Control (I)
Computer Networks 1 (Mạng Máy Tính 1)
Overview of Wireless LANs Use wireless transmission medium Issues of high prices, low data rates, occupational safety concerns, & licensing requirements.
Medium Access Control.
A.S.Tanenbaum, Computer networks, ch4 MAC 1 The Medium Access Control Sublayer Medium Access Control: a means of controlling access to the medium to promote.
Basic Model MEDIUM Distributed Sources Fig.13 Generic Model for Media Access Systems.
Chi-Cheng Lin, Winona State University CS412 Introduction to Computer Networking & Telecommunication Medium Access Control Sublayer.
Computer Networks NYUS FCSIT Spring 2008 Igor TRAJKOVSKI, Ph.D. Associate Professor
CSMA with Collision Detection CSMA/CD can be in one of three states: contention, transmission, or idle.
The Medium Access Control Sublayer Chapter 4. The Channel Allocation Problem Static Channel Allocation in LANs and MANs Dynamic Channel Allocation in.
CSC4220/6220 Computer Networks
The Medium Access Control Sublayer طبقة ولوج الوسط الجزئية Chapter 4.
The Medium Access Control Sublayer Chapter 4 10/1/2015www.noteshit.com1.
CHAPTER 4: THE MEDIUM ACCESS SUBLAYER 4.1: The Channel Allocation Problem 4.2: Multiple Access Protocols.
جلسه دهم شبکه های کامپیوتری به نــــــــــــام خدا.
Enterprise network 8.1:Introduction 8.2:LANs 8.3:Ethernet / IEEE :Token ring 8.5:Bridges 8.6:FDDI 8.7:High-speed LANs 8.8:LAN protocol 8.9:Multicast.
10/18/2007 EETS Bluetooth Bluetooth Architecture Bluetooth Applications The Bluetooth Protocol Stack The Bluetooth Radio Layer The Bluetooth Baseband.
Medium Access Control NWEN302 Computer Network Design.
Layer 2 Technologies At layer 2 we create and transmit frames over communications channels Format of frames and layer 2 transmission protocols are dependent.
The Medium Access Control Sublayer Chapter 4. The Channel Allocation Problem Static Channel Allocation Dynamic Channel Allocation  Delay for the divided.
Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011 The Medium Access Control Sublayer Chapter.
Link Layer: MAC Ilam University Dr. Mozafar Bag-Mohammadi.
Chi-Cheng Lin, Winona State University CS 313 Introduction to Computer Networking & Telecommunication Medium Access Control Sublayer.
The Medium Access Control Sublayer Chapter 4. The Channel Allocation Problem Static Channel Allocation in LANs and MANs Dynamic Channel Allocation in.
The Medium Access Control Sublayer Chapter 4. The Channel Allocation Problem Static Channel Allocation in LANs and MANs Dynamic Channel Allocation in.
CEN 4500 Data Communications Instructor: S. Masoud Sadjadi sadjadi At cs Dot fiu Dot edu Chapter 4: The Medium.
10/11/2007 EETS The Medium Access Control Sublayer Chapter 4.
17 - Winter 2005 ECE ECE 766 Computer Interfacing and Protocols 1 Local Area Networks Need for high performance communications for physically close devices.
C H 4 T HE M EDIUM A CCESS C ONTROL S UBLAYER 1 Medium Access Control: a means of controlling access to the medium to promote orderly and efficient use.
Medium Access Control Sub Layer
7-1 Introduction to Queueing Theory l Components of a queueing system n probability density function (pdf) of interarrival times n pdf of service times.
Data Communications, Kwangwoon University12-1 Chapter 12. Multiple Access 1.Random Access 2.Controlled Access 3.Channelization.
Chapter 6 Multiple Radio Access
C H 4 T HE M EDIUM A CCESS C ONTROL S UBLAYER 1 Medium Access Control: a means of controlling access to the medium to promote orderly and efficient use.
The Medium Access Control Sublayer Chapter 4 12/13/2015www.ishuchita.com1.
5: DataLink Layer 5a-1 Multiple Access protocol. 5: DataLink Layer 5a-2 Multiple Access Links and Protocols Three types of “links”: r point-to-point (single.
Ch 12. Multiple Access. Multiple Access for Shared Link Dedicated link – Point-to-point connection is sufficient Shared link – Link is not dedicated –
LECTURE9 NET301 11/5/2015Lect 9 NET DYNAMIC MAC PROTOCOL: CONTENTION PROTOCOL Carrier Sense Multiple Access (CSMA): A protocol in which a node verifies.
The Medium Access Control Sublayer Chapter 4. The Channel Allocation Problem Static Channel Allocation in LANs and MANs Dynamic Channel Allocation in.
Wireless LAN Requirements (1) Same as any LAN – High capacity, short distances, full connectivity, broadcast capability Throughput: – efficient use wireless.
The Medium Access Control Sublayer
The Medium Access Control (MAC) Sublayer. The Channel Allocation Problem Static Channel Allocation in LANs and MANs Dynamic Channel Allocation in LANs.
THE MEDIUM ACCESS CONTROL SUBLAYER 4.1 THE CHANNEL ALLOCATION PROBLEM 4.2 MULTIPLE ACCESS PROTOCOLS.
Wireless LAN Protocols This talk is based on the course: CPSC Networks and Distributed Processing Spring2006/
The Data Link Layer Chapter
The Medium Access Control Sublayer
The Medium Access Control Sublayer
The Medium Access Control Sublayer
The Medium Access Control (MAC) Sublayer
The Medium Access Control Sublayer
Presentation transcript:

Medium Access Control

Channel Allocation Static channel allocation in LANs and MANs FDMA, TDMA, CDMA Dynamic channel allocation in LANs and MANs MAC protocols: with collisions, polling, token

Static Channel Allocation Delay for one fast channel: Delay for multiple FDM slower channels:

Poisson Process Probability of k arrivals in time t: Probability that interarrival time exceeds t:

M/M/1 Queue Queue equations Delay for multiple FDM slower channels:

Delay Little’s formula Delay is:

Static Channel Allocation Delay for one fast channel: Delay for multiple FDM slower channels:

Dynamic Channel Allocation 1.(a) Single channel (b) Multiple channel 2.(a) Collision (b) Collision-free 3. (a) Continuous Time. (b) Slotted Time. 4. (a) Carrier Sense. (b) No Carrier Sense.

Multiple Access Protocols ALOHA Carrier Sense Multiple Access (CSMA) protocols CSMA/CD CSMA/CA Collision-Free protocols Reservation based Token based

Pure ALOHA In pure ALOHA, frames are transmitted at completely arbitrary times.

Pure ALOHA Vulnerable period for the shaded frame.

ALOHA Throughput Throughput is S=GP 0, where P 0 is the probability of successful transmission. The k frames per f frame slots is P 0 =e -fG For pure ALOHA f=2, for slotted ALOHA f=1, so:

Pure and Slotted ALOHA Throughput versus offered traffic for ALOHA systems.

Carrier Sense Multiple Access 1-Persistant CSMA Nonpersistant CSMA P-Persistant CSMA

Persistent and Nonpersistent CSMA Comparison of the channel utilization versus load for various random access protocols.

CSMA with Collision Detection CSMA/CD can be in one of three states: contention, transmission, or idle.

Wireless LAN: CSMA with Collision Avoidance A wireless LAN. (a) A transmitting. (b) B transmitting.

Wireless LAN: CSMA-CA The MACA protocol. (a) A sending an RTS to B. (b) B responding with a CTS to A.

DOCSIS ( Data Over Cable Service Interface Specification

Collision-Free Protocols:Reservations The basic bit-map protocol.

Collision-Free Protocols: Bidding The binary countdown protocol. A dash indicates silence.

Collision Free Protocols: Fiber Distributed Data Interface (FDDI) Station transmits only when it has a token Timers count the time while the token is away Two timers determine how much data a station may transmit, so that the token delay is limited

Limited-Contention Protocols Acquisition probability for a symmetric contention channel.

Adaptive Tree Walk Protocol The tree for eight stations.

WDMA Networks Stations may be connected to the optical star coupler or onto the optical ring and utilize multiple wavelengths. Stations are equipped with the tunable/fixed transmitters and tunable/fixed receivers. Stations are tuned to the common control channel where they compete for the medium.

Ethernet Ethernet, IEEE Base (10Mbps) Fast Ethernet (100Mbps) Gigabit Ethernet

Ethernet MAC Sublayer Protocol Frame formats. (a) DIX Ethernet, (b) IEEE

CSMA with Collision Detection CSMA/CD can be in one of three states: contention, transmission, or idle.

Performance of Non-Persistant CSMA/CD Rom and Sidi, Multiple Access Protocols, Springer Verlag, 1990

Performance of 1-Persistant CSMA/CD Rom and Sidi, Multiple Access Protocols, Springer Verlag, 1990

Comparison of CSMA and CSMA/CD Rom and Sidi, Multiple Access Protocols, Springer Verlag, 1990

Ethernet Performance

Efficiency of Ethernet at 10 Mbps with 512-bit slot times.

Back-Off Mechanism After a collision, user accesses medium with probability 1/W where W is the window size. With each collision W doubles.

10Mbps Ethernet Cabling The most common kinds of Ethernet cabling.

10Mbps Ethernet Cabling Three kinds of Ethernet cabling. (a) 10Base5, (b) 10Base2, (c) 10Base-T.

Ethernet Cabling Cable topologies. (a) Linear, (b) Spine, (c) Tree, (d) Segmented.

10Mb Ethernet Coding (a) Binary encoding, (b) Manchester encoding, (c) Differential Manchester encoding.

10 Mb Ethernet Collision Detection 10Base5 cabling, Kadambi, Crayford and Kalkunte, Gigabit Ethernet, Prentice Hall, 1998

10 Mb Ethernet Collision Detection 10Base2 and 10BaseT cabling, Kadambi, Crayford and Kalkunte, Gigabit Ethernet, Prentice Hall, 1998

Fast Ethernet The original fast Ethernet cabling.

Fast Ethernet Auto negotiation enables communication with 10Mb Ethernet Manchester code → 4B/5B code Full duplex mode is optional with using PAUSE command

Switched Ethernet A simple example of switched Ethernet.

Gigabit Ethernet (a) A two-station Ethernet. (b) A multistation Ethernet.

Gigabit Ethernet Gigabit Ethernet cabling.

Gigabit Ethernet Prioritization of fiber over copper 4B/5B coding → 8B/10B coding Full duplex mode is preferred with PAUSE message Carrier extension, and frame bursting introduced in half-duplex mode

IEEE 802.2: Logical Link Control (a) Position of LLC. (b) Protocol formats.

IEEE 802.2: Logical Link Control (a) Position of LLC. (b) Protocol formats.

A Sample HFC System Secondary Hub o HOME o 5-42 MHz 550 MHz 750 MHz RF Spectrum on coax: return 80 broadcast channels30 QAM channels (~150 video channels) Downstream: 500 MHz shared by ~50,000 (broadcast) 200 MHz by 1200 (narrowcast) Upstream: ~37 MHz shared by 300 broadcast narrowcast Fiber Node up b n (4 n /fiber) Sheryl Woodward, AT&T Labs-Research

Justification for Using Shared Medium Equivalent circuit rate (ECR) on a cable with many users is the rate of a dedicated link that would provide the same e.g. average delay (similar results is obtained for 90 th percentile page delay). By Shankar, Jiang and Mishra: where t ON is the transmission tim, and t OFF is the think time, r is the channel rate, t ON /(t ON +t OFF )<<1, on periods have an exponential distribution.

Justification for Using Shared Medium Let’s calculate how many users can be allocated one DOCSIS channel of 32Mbps to get the same experience as DSL user with dedicated rate of 2Mbps. According to traffic statistics page size is 68KB on average, and t OFF is 14.5s on average, which is much more than 32/2=16 users. Price: high user speed.

DOCSIS MAC Protocol Traffic that is transmitted downstream to the users is controlled by CMTS (cable modem termination system) in headend. It polices and shapes the traffic, and perform algorithms such are WFQ and RED. Users requests are resolved at headend, and they are informed about the resolution through the downstream channel. If there is a collision of requests, users repeat their requests according to exponential back-off mechanism, otherwise they send data in specified time slot(s).

QoS in DOCSIS ServiceQoS parametersAccess ModeApplications UGSUnsolicited grant size, interval, jitter IsonchronousVideoconferencing, VoD, VoIP UGS-ADUnsolicited grant size, interval, jitter;polling interval, jitter Isonchronous, periodic request polling VoIP with silence supression rtPSPolling interval, jitterPeriodic request polling, piggybacking reservation VoIP

QoS in DOCSIS ServiceQoS parametersAccess ModeApplications nrtPSPolling interval, min reserved rate, max sustained rate, priority Periodic request polling, piggybacking reservation, immediate access Demanding FTP BEmin reserved rate, max sustained rate, priority Normal, piggybacking reservation, immediate access Telnet, FTP, WWW CIRUnspecified

Performance for BE service in DOCSIS Assume that requests form a Poisson process with rate g, T is time slot duration, and T p is a packet duration. The throughput equals S=T p /(T p +I), where I is the average time between packet transmissions. The probability of a packet transmission is equal to the probability that there is only one request in some previous time slot which is gTe -gT. The average time between transmissions is

Performance for BE service in DOCSIS The throughput is It tends to 0 when g increases. Exercise: Find the mapximum value of S in terms of T and T p, and plot graphs of S versus g, and different T/T p. Protocol is unstable like ALOHA. g S 1 2

Wireless LANs Distributed coordination function (DCF) Point coordination function (PCF)

The Protocol Stack Part of the protocol stack.

The MAC Sublayer Protocol (a) The hidden station problem. (b) The exposed station problem.

The MAC Sublayer Protocol The use of virtual channel sensing using CSMA/CA.

The MAC Sublayer Protocol A fragment burst.

The MAC Sublayer Protocol Interframe spacing in

The Frame Structure The data frame.

Services Association Disassociation Reassociation Distribution Integration Privacy Data delivery

Broadband Wireless Fixed wireless Larger bandwidth

The Protocol Stack The Protocol Stack.

The Physical Layer The transmission environment.

The Physical Layer Frames and time slots for time division duplexing.

The MAC Sublayer Protocol Service Classes Constant bit rate service Real-time variable bit rate service Non-real-time variable bit rate service Best efforts service

The Frame Structure (a) A generic frame. (b) A bandwidth request frame.

Bluetooth Used for communication of the equipment in the house, office Interferes with IEEE

Bluetooth Architecture Two piconets can be connected to form a scatternet.

Bluetooth Applications The Bluetooth profiles.

The Bluetooth Protocol Stack The version of the Bluetooth protocol architecture.

The Bluetooth Frame Structure A typical Bluetooth data frame.

Data Link Layer Switching Bridges from 802.x to 802.y Local Internetworking Spanning Tree Bridges Remote Bridges Repeaters, Hubs, Bridges, Switches, Routers, Gateways Virtual LANs

Data Link Layer Switching Multiple LANs connected by a backbone to handle a total load higher than the capacity of a single LAN.

Bridges from 802.x to 802.y Operation of a LAN bridge from to

Bridges from 802.x to 802.y (2) The IEEE 802 frame formats. The drawing is not to scale.

Local Internetworking A configuration with four LANs and two bridges.

Spanning Tree Bridges Two parallel transparent bridges.

Spanning Tree Bridges (2) (a) Interconnected LANs. (b) A spanning tree covering the LANs. The dotted lines are not part of the spanning tree.

Remote Bridges Remote bridges can be used to interconnect distant LANs.

Repeaters, Hubs, Bridges, Switches, Routers and Gateways (a) Which device is in which layer. (b) Frames, packets, and headers.

Repeaters, Hubs, Bridges, Switches, Routers and Gateways (2) (a) A hub. (b) A bridge. (c) a switch.

Virtual LANs A building with centralized wiring using hubs and a switch.

Virtual LANs (2) (a) Four physical LANs organized into two VLANs, gray and white, by two bridges. (b) The same 15 machines organized into two VLANs by switches.

The IEEE 802.1Q Standard Transition from legacy Ethernet to VLAN-aware Ethernet. The shaded symbols are VLAN aware. The empty ones are not.

The IEEE 802.1Q Standard (2) The (legacy) and 802.1Q Ethernet frame formats.

Summary Channel allocation methods and systems for a common channel.