Chi-Cheng Lin, Winona State University CS412 Introduction to Computer Networking & Telecommunication Medium Access Control Sublayer.

Slides:



Advertisements
Similar presentations
14-MAC Sub-layer Dr. John P. Abraham Professor UTPA.
Advertisements

Channel Allocation Protocols. Dynamic Channel Allocation Parameters Station Model. –N independent stations, each acting as a Poisson Process for the purpose.
EECC694 - Shaaban #1 lec #5 Spring Data Link In Broadcast Networks: The Media Access Sublayer Broadcast networks with multi-access (or random.
12.1 Chapter 12 Multiple Access Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
1 The Medium Access Control Sublayer Chapter 4. 2 The Medium Access Control Sublayer This chapter deals with broadcast networks and their protocols. In.
Multiple access What if multiple machines are sharing the same link?
Chapter 12 Multiple Access Figure 12.1 Data link layer divided into two functionality-oriented sublayers Figure 12.2 Taxonomy of multiple-access protocols.
1 Pertemuan 13 Teknik Akses Jaringan - Random Matakuliah: H0174/Jaringan Komputer Tahun: 2006 Versi: 1/0.
EEC-484/584 Computer Networks Lecture 7 Wenbing Zhao
MAC Protocols Media Access Control (who gets the use the channel) zContention-based yALOHA and Slotted ALOHA. yCSMA. yCSMA/CD. TDM and FDM are inefficient.
CS 5253 Workshop 1 MAC Protocol and Traffic Model.
EEC-484/584 Computer Networks Lecture 13 Wenbing Zhao
EEC-484/584 Computer Networks Lecture 9 Wenbing Zhao (Part of the slides are based on materials supplied by Dr. Louise Moser at UCSB and.
EEC-484/584 Computer Networks Lecture 7 Wenbing Zhao
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Chapter 13 Multiple Access.
CMPE 150- Introduction to Computer Networks 1 CMPE 150 Fall 2005 Lecture 16 Introduction to Computer Networks.
EEC-484/584 Computer Networks Lecture 13 Wenbing Zhao
EEC-484/584 Computer Networks Lecture 9 Wenbing Zhao (Part of the slides are based on materials supplied by Dr. Louise Moser at UCSB and.
Studying Local Area Networks Via Media Access Control (MAC) SubLayer
CS 5253 Workshop 1 MAC Protocol and Traffic Model.
Networks: Local Area Networks1 LANs Studying Local Area Networks Via Media Access Control (MAC) SubLayer.
Computer Networks: Local Area Networks 1 LANs Studying Local Area Networks via the Media Access Control (MAC) SubLayer.
EEC-484/584 Computer Networks Lecture 7 Wenbing Zhao
Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011 The Medium Access Control Sublayer Chapter.
1 Chapter 5 The Medium Access Sublayer. 2 Chapter 5 The Medium Access Layer 5.1 The Channel Allocation problem - Static and dynamic channel allocation.
Medium Access Control Sublayer
1 ECE453 – Introduction to Computer Networks Lecture 7 – Multiple Access Control (I)
CIS 725 Media Access Layer. Medium Access Control Sublayer MAC sublayer resides between physical and data link layer Broadcast/multiacess channels N independent.
Chapter 4: Medium Access Control (MAC) Sublayer
Chapter 12 Multiple Access Figure 12.1 Data link layer divided into two functionality-oriented sublayers Figure 12.2 Taxonomy of multiple-access protocols.
CHAPTER 4: THE MEDIUM ACCESS SUBLAYER 4.1: The Channel Allocation Problem 4.2: Multiple Access Protocols.
جلسه دهم شبکه های کامپیوتری به نــــــــــــام خدا.
Medium Access Control NWEN302 Computer Network Design.
Chi-Cheng Lin, Winona State University CS 313 Introduction to Computer Networking & Telecommunication Medium Access Control Sublayer.
جلسه یازدهم شبکه های کامپیوتری به نــــــــــــام خدا.
Medium Access Control Sub Layer
12.1 Chapter 12 Multiple Access Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
7-1 Introduction to Queueing Theory l Components of a queueing system n probability density function (pdf) of interarrival times n pdf of service times.
Data Communications, Kwangwoon University12-1 Chapter 12. Multiple Access 1.Random Access 2.Controlled Access 3.Channelization.
1 Kyung Hee University Chapter 12 Multiple Access.
1 Kyung Hee University Chapter 12 Multiple Access.
5: DataLink Layer 5a-1 Multiple Access protocol. 5: DataLink Layer 5a-2 Multiple Access Links and Protocols Three types of “links”: r point-to-point (single.
Ch 12. Multiple Access. Multiple Access for Shared Link Dedicated link – Point-to-point connection is sufficient Shared link – Link is not dedicated –
1 Kyung Hee University Prof. Choong Seon HONG Multiple Access.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Chapter 13 Multiple Access.
Chapter 4 The Medum Access Sublayer. MA Sublayer Additional Reference –Local and Metropolitan Area Networks, William Stallings, Prentice Hall, 2000, 6th.
THE MEDIUM ACCESS CONTROL SUBLAYER 4.1 THE CHANNEL ALLOCATION PROBLEM 4.2 MULTIPLE ACCESS PROTOCOLS.
Chapter 13 Multiple Access.
UNIT 2 Medium Access sub layer: Medium Access sub layer - Channel Allocations, LAN protocols - ALOHA protocols(PURE AND SLOTTED ALOHA),CSMA/CA,CSMA/CD.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Chapter 13 Multiple Access.
UNIT 3 MULTIPLE ACCESS Adapted from lecture slides by Behrouz A. Forouzan © The McGraw-Hill Companies, Inc. All rights reserved.
COMPUTER NETWORKS Data-link Layer (The Medium Access Control Sublayer) MAC Sublayer.
THE MEDIUM ACCESS CONTROL SUBLAYER 4.1 THE CHANNEL ALLOCATION PROBLEM 4.2 MULTIPLE ACCESS PROTOCOLS.
Week3 The Medium Access Sublayer
Data link layer divided into two functionality-oriented sublayers
Chapter 12 Multiple Access
Module 3 Medium Access Control.
Multiple Access Mahesh Jangid Assistant Professor JVW University.
Subject Name: Computer Communication Networks Subject Code: 10EC71
Figure 12.1 Data link layer divided into two functionality-oriented sublayers Networks can be divided into two categories: those using point-to-point.
THE IEEE MAC SUB-LAYER – chapter 14
Multiple Access Methods
Chapter 13 Multiple Access.
The Medium Access Control Sublayer
Chapter 13 Multiple Access
Channel Allocation Problem/Multiple Access Protocols Group 3
Link Layer and LANs Not everyone is meant to make a difference. But for me, the choice to lead an ordinary life is no longer an option 5: DataLink Layer.
Channel Allocation Problem/Multiple Access Protocols Group 3
Chapter 13 Multiple Access
Dr. John P. Abraham Professor UTPA
Presentation transcript:

Chi-Cheng Lin, Winona State University CS412 Introduction to Computer Networking & Telecommunication Medium Access Control Sublayer

2 Topics l Introduction l Channel Allocation Problem l Multiple Access Protocols l CDMA

3 Introduction l Broadcast networks  Key issue: who gets to use the channel when there is competition  Referred to as  Multiaccess channels  Random access channels l MAC (Medium Access Control) sublayer  LANs  Satellite networks

4 Channel Allocation Problem l Channel Allocation  Static  Dynamic l Performance factors  Medium access delay  Time between a frame is ready and the frame can be transmitted  Throughput  #frames can be transmitted in unit time interval

5 Static Channel Allocation l FDM  Bandwidth divided into N equal sized portions for N users  Problems  #senders large  #senders continuously varies  bursty traffic  Discussion: #users > N  ? < N  ? = N  ?  N times worse than all frames queued in one big queue

6 Static Channel Allocation l TDM  Each user is statically allocated every Nth time slot  Same problems as FDM l Under what circumstances are static channel allocation schemes efficient?

7 Dynamic Channel Allocation l Key assumptions 1. Station model  Independent  Work is generated constantly  One program per station  Station is blocked once a frame has been generated until the frame has been successfully transmitted 2. Single channel assumption

8 Dynamic Channel Allocation l Key assumptions 3. Collision Assumption  Collision: Two frames are transmitted simultaneously, overlapped in time and resulting signal garbled  Can be detected by all stations  No other errors

9 Dynamic Channel Allocation l Key assumptions 4. Time: either continuous or discrete (slotted)  Continuous  Frame transmission can begin at any instant  No "master clock" needed  Slotted  Time divided into discrete intervals (slots)  Frame transmissions begin at the start of a slot  #frames contained in a slot: 0  ? 1  ? >1  ?

10 Dynamic Channel Allocation l Carrier sense ("carrier" refers to electrical signal): either Y or N  Yes  A station can check channel before transmission  If busy, station idle  No  “Just do it"  Can tell if transmission successful later  LANs: carrier sense  Satellites -> not carrier sense (why?)

11 Multiple Access Protocols l ALOHA l Carrier sense multiple access protocols (CSMA) l CSMA w/ collision detection (CSMA/CD) l Collision-free protocols l Limited-contention protocols

12 ALOHA l Applicable to any contention system  System in which uncoordinated users are competing for the use of a single shared channel l Two versions  Pure ALOHA  Slotted ALOHA

13 Pure ALOHA l Let users transmit whenever they have data to be sent l Colliding frames are destroyed l Sender can always find out destroyed or not  Feedback (property of broadcasting) or ACK  LANs: immediately  Satellites: propagation delay (e.g., 270msec)  By listening to the channel  If frame is destroyed wait a random amount of time and retransmit (why "random"?)

14 Figure 13.4 Procedure for ALOHA protocol

15 Pure ALOHA Where are the collisions?

16 Pure ALOHA Frames are assumed to have the same size (same frame time) for analysis

17 Slotted ALOHA l Discrete time l Agreed slot boundaries l Synchronization needed l Performance  Which ALOHA has a shorter medium access delay?  Which ALOHA has a higher throughput?

18 Performance of ALOHA l Slotted ALOHA can double the throughput of pure ALOHA

19 Carrier Sense Multiple Access (CSMA) Protocols l Stations can listen to the channel (i.e., sense a carrier in the channel) l Types  1-persistent CSMA  Nonpersistent CSMA  p-persistent CSMA

20 Figure 13.5 Collision in CSMA

21 Figure 13.6 Persistence strategies

22

23 CSMA w/ Collision Detection (CSMA/CD) l Can listen to the channel and detect collision  Stop transmitting as soon as collision detected l Widely used on LANs (e.g., Ethernet) l Collision detection  Analog process  Special encoding is used

24 CSMA w/ Collision Detection (CSMA/CD) l Conceptual model  3 states  Contention  Transmission  Idle l Minimum time to detect collision determines time slot  Depends on propagation delay of medium

25 CSMA/CD Model

CSMA/CD procedure

27 Collision-Free Protocols l Model  N Stations: 0,1,..., (N-1) l Question  Which station gets the channel after a successful transmission? l Protocols  Bit-map (i.e., reservation) protocol  Token passing protocol  Example: Token ring

28 Bit-Map Protocol

29 Figure Token-passing network

30 Figure Token-passing procedure

31 Performance of Contention and Collision-Free Protocols l Contention  Low load => low medium access delay :)  High load => low channel efficiency :( l Collision-Free  Low load => high medium access delay :(  High load => high channel efficiency :)

32 Code Division Multiple Access (CDMA) l In FDMA, the bandwidth is divided into channels. l In TDMA, the bandwidth is just one channel that is timeshared. l In CDMA, one channel carries all transmissions simultaneously.

33 Figures & Chip sequences and encoding rules The chip sequences must be orthogonal! A  B = A  C = A  D = B  C = B  D = C  D = 0 A  A = B  B = C  C = D  D = length of chip sequence

34 Figure CDMA multiplexer

35 Figure CDMA demultiplexer

36 CDMA (a) Binary chip sequences for four stations (b) Bipolar chip sequences (c) Six examples of transmissions (d) Recovery of station C’s signal

37 Summary of Channel Allocation Methods/Systems