CHAPTER 4: THE MEDIUM ACCESS SUBLAYER 4.1: The Channel Allocation Problem 4.2: Multiple Access Protocols.

Slides:



Advertisements
Similar presentations
Problems in Ad Hoc Channel Access
Advertisements

Nick Feamster CS 4251 Computer Networking II Spring 2008
14-MAC Sub-layer Dr. John P. Abraham Professor UTPA.
Channel Allocation Protocols. Dynamic Channel Allocation Parameters Station Model. –N independent stations, each acting as a Poisson Process for the purpose.
EECC694 - Shaaban #1 lec #5 Spring Data Link In Broadcast Networks: The Media Access Sublayer Broadcast networks with multi-access (or random.
Ethernet – CSMA/CD Review
1 The Medium Access Control Sublayer Chapter 4. 2 The Medium Access Control Sublayer This chapter deals with broadcast networks and their protocols. In.
Multiple access What if multiple machines are sharing the same link?
LECTURE 11 CT1303 LAN. DYNAMIC MAC PROTOCOL No fixed assignment for transmission media or any network resources.. It allows transmission when needed.
Communication Networks Lecture 5 NETW 501-L5: NETW 501-L5: Medium Access Control Dr.-Ing. Khaled Shawky Hassan Room: C3-222, ext: 1204,
1 K. Salah Module 4.2: Media Access Control The Media Access Control (MAC) sublayer –Random Access (CSMA), IEEE –Token Passing, IEEE Ch 13-
Wireless & Mobile Networking: Multiple Radio Access Azizol Bin Abdullah (A2.04) Rujukan: Text Book Chapter 6.
MAC Protocols Media Access Control (who gets the use the channel) zContention-based yALOHA and Slotted ALOHA. yCSMA. yCSMA/CD. TDM and FDM are inefficient.
CS 5253 Workshop 1 MAC Protocol and Traffic Model.
CMPE 150- Introduction to Computer Networks 1 CMPE 150 Fall 2005 Lecture 17 Introduction to Computer Networks.
The Data Link Layer Read Chapters 3 and 4. CSC 3352 Computer Communications Chapter 3&42 Where in the OSI Reference Model ? Session Transport Network.
Copyright © 2003, Dr. Dharma P. Agrawal and Dr. Qing-An Zeng. All rights reserved. 1 Chapter 6 Multiple Radio Access.
CMPE 150- Introduction to Computer Networks 1 CMPE 150 Fall 2005 Lecture 16 Introduction to Computer Networks.
EEC-484/584 Computer Networks Lecture 13 Wenbing Zhao
EEC-484/584 Computer Networks Lecture 9 Wenbing Zhao (Part of the slides are based on materials supplied by Dr. Louise Moser at UCSB and.
Studying Local Area Networks Via Media Access Control (MAC) SubLayer
Networks: Local Area Networks1 LANs Studying Local Area Networks Via Media Access Control (MAC) SubLayer.
Computer Networks: Local Area Networks 1 LANs Studying Local Area Networks via the Media Access Control (MAC) SubLayer.
Semester EEE449 Computer Networks The Data Link Layer Part 2: Media Access Control En. Mohd Nazri Mahmud MPhil (Cambridge, UK) BEng (Essex,
Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011 The Medium Access Control Sublayer Chapter.
Medium Access Control Sublayer
1 ECE453 – Introduction to Computer Networks Lecture 7 – Multiple Access Control (I)
9/11/2015 5:55 AM1 Ethernet and CSMA/CD CSE 6590 Fall 2010.
Multiple Access Protocols Chapter 6 of Hiroshi Harada Book
CIS 725 Media Access Layer. Medium Access Control Sublayer MAC sublayer resides between physical and data link layer Broadcast/multiacess channels N independent.
Chi-Cheng Lin, Winona State University CS412 Introduction to Computer Networking & Telecommunication Medium Access Control Sublayer.
Chapter 4: Medium Access Control (MAC) Sublayer
The Medium Access Control Sublayer Chapter 4 10/1/2015www.noteshit.com1.
LECTURE9 NET301. DYNAMIC MAC PROTOCOL: CONTENTION PROTOCOL Carrier Sense Multiple Access (CSMA): A protocol in which a node verifies the absence of other.
جلسه دهم شبکه های کامپیوتری به نــــــــــــام خدا.
The Medium Access Control Sublayer Chapter 4. The Channel Allocation Problem Static Channel Allocation Dynamic Channel Allocation  Delay for the divided.
Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011 The Medium Access Control Sublayer Chapter.
Chi-Cheng Lin, Winona State University CS 313 Introduction to Computer Networking & Telecommunication Medium Access Control Sublayer.
جلسه یازدهم شبکه های کامپیوتری به نــــــــــــام خدا.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2000 Unit-II Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Medium Access Control Sub Layer
7-1 Introduction to Queueing Theory l Components of a queueing system n probability density function (pdf) of interarrival times n pdf of service times.
Multiple Access.
Data Communications, Kwangwoon University12-1 Chapter 12. Multiple Access 1.Random Access 2.Controlled Access 3.Channelization.
Chapter 6 Multiple Radio Access
The Medium Access Control Sublayer Chapter 4 12/13/2015www.ishuchita.com1.
CS3502: Data and Computer Networks Local Area Networks - 1 introduction and early broadcast protocols.
Ch 12. Multiple Access. Multiple Access for Shared Link Dedicated link – Point-to-point connection is sufficient Shared link – Link is not dedicated –
CS3502: Data and Computer Networks Local Area Networks - 1 introduction and early broadcast protocols.
LECTURE9 NET301 11/5/2015Lect 9 NET DYNAMIC MAC PROTOCOL: CONTENTION PROTOCOL Carrier Sense Multiple Access (CSMA): A protocol in which a node verifies.
The Medium Access Control Sublayer Chapter 4. The Channel Allocation Problem Static Channel Allocation in LANs and MANs Dynamic Channel Allocation in.
Carrier Sense Multiple Access Improve ALOHA by using carrier sense –Stations listen to the carrier before transmitting –If channel is busy, the station.
1 Ethernet CSE 3213 Fall February Introduction Rapid changes in technology designs Broader use of LANs New schemes for high-speed LANs High-speed.
The Medium Access Control Sublayer
Chapter 4 The Medum Access Sublayer. MA Sublayer Additional Reference –Local and Metropolitan Area Networks, William Stallings, Prentice Hall, 2000, 6th.
THE MEDIUM ACCESS CONTROL SUBLAYER 4.1 THE CHANNEL ALLOCATION PROBLEM 4.2 MULTIPLE ACCESS PROTOCOLS.
COMPUTER NETWORKS Data-link Layer (The Medium Access Control Sublayer) MAC Sublayer.
THE MEDIUM ACCESS CONTROL SUBLAYER 4.1 THE CHANNEL ALLOCATION PROBLEM 4.2 MULTIPLE ACCESS PROTOCOLS.
Multiple Access By, B. R. Chandavarkar, CSE Dept., NITK, Surathkal Ref: B. A. Forouzan, 5 th Edition.
CT301 LECTURE 8.
Module 3 Medium Access Control.
High Speed LANs – Ethernet and Token Ring
Net301 lecture9 11/5/2015 Lect 9 NET301.
THE IEEE MAC SUB-LAYER – chapter 14
The Medium Access Control Sublayer
Channel Allocation Problem/Multiple Access Protocols Group 3
Channel Allocation Problem/Multiple Access Protocols Group 3
Data Communication Networks
Chapter 6 Multiple Radio Access.
Dr. John P. Abraham Professor UTPA
Presentation transcript:

CHAPTER 4: THE MEDIUM ACCESS SUBLAYER 4.1: The Channel Allocation Problem 4.2: Multiple Access Protocols

4.1.1 The Channel Allocation Problem Problem  How to allocate single broadcast channel among competing users ? Solutions -  Static Channel Allocation  Dynamic Channel Allocation

Static Channel Allocation  How ? For N users, the Bandwidth is divided equally by N.  Works well with small, constant number of users with steady or heavy traffic.  Doesn’t work well with large and varied number of users, with bursty traffic. If user is dormant, then bandwidth is lost.

key Assumptions for Dynamic Channel Allocation  Independent Traffic - N independent stations, each generating frames for transmission. Once a frame is generated, the station is blocked and does nothing until the frame has been transmitted.  Single Channel - One channel is available for for all communication.  Observable Collisions - Two frames may be overlapped and signal garbled or result in a collision. Collisions must be transmitted again later.

5 key Assumptions for Dynamic Channel Allocation  Continuous Or Slotted Time - If time is continuous, transmission can begin at any time. If it’s divided into discrete intervals, transmission must begin at the beginning.  Carrier Sense Or No Carrier Sense - Can tell if channel is in use before trying to use it. Without carrier sense, stations transmit blindly and then check back later to see if transmission was successful.

4.2 Multiple Access Protocols  ALOHA  Carrier Sense Multiple Access  Collision-Free Protocols  Limited-Contention Protocols  Wireless LAN Protocols

1. ALOHA  The ALOHA system was established in 1970’s by Norman Abramson. It uses group based radio broadcasting where the users could send frames to the central unit.  Collisions is one problem that cannot be avoided but can be reduced.  Contention period : The time interval in which frames can overlap.  There are two versions of ALOHA:  Pure ALOHA that has continuous time  Slotted ALOHA that divides time into slots, and it was made to double the capacity of ALOHA

Pure ALOHA  Users transmit whenever they have data to be sent.  Stations listens to the channel to find out if the frame was broadcasted.  If frame was destroyed, sender must wait a random amount of time and send it again.

Slotted ALOHA  Each interval corresponds to one frame of data.  Users are required to agree on slots boundaries.  A station is required to wait for the beginning of the next slot to send a frame.

Pure ALOHA VS. Slotted ALOHA TYPEPURESLOTTED TIME ContinuousIntervals BROADCASTING At any timeBeginning of slot MAX THROUGHPUT 18.3 %36.8 %

2. Carrier Sense Multiple Access Protocols  ALOHA simply means goodbye… in this case.  Allows LANs achieve a much better utilization than ALOHA.  Carrier Sense Protocols.

Types of Carrier Sense Multiple Access (CSMA) Persistent CSMA - Station listens to channel first, then transmits only if the channel is “idle”.  Collisions still an issue!  Bandwidth-Delay Product- The number of frames that fit on a channel.  Outperforms pure ALOHA.

Types of Carrier Sense Multiple Access (CSMA) Nonpersistent CSMA - Similar to 1-persistent CSMA, but less greedy.  Sends a packet only when channel is idle.  If the channel is busy, then the station will check back later.  Higher channel utilization, but longer delays than 1-persistent CSMA P-persistent CSMA - A little bit of both.  Slotted channels.  If channel is idle, may or may not transmit immediately.  Repeats until transmission or another station transmits.

The 3 CSMA’s Vs. The ALOHA’s

CSMA with Collision Detection CSMA/CD- Like other CSMA’s “listens” to signal, if it is different than the signal it is putting out, it knows a collision is occurring.  Is the basis of the classic Ethernet LAN.  Collision detection is an analog process.  If a collision is detected, transmission is aborted.

3. Collision Free Protocols There are no collisions in CSMA/CD but…  Collisions still occur in contention period.  Collisions downgrade performance. Solutions include:  Bit-Map Protocol: waiting list.  Token Ring Protocol: form a circle.  Binary Countdown Protocol: top dog takes priority.

Bit Map Protocol Basic Bit-Map Method: Waiting List  During contention period, stations are divided into slots.  Each station can say it has frames to send during its slot only.  Once all slots are known, they transmit is numerical order.  After all transmissions, another contention period occurs.  This is a Reservation Protocol - reserving the ability to transmit before doing so.

Token Ring Protocol Basic Token Ring Method: Form a Circle  Pass a small message called a token from one station to the next in a predefined order.  Token represents permission to send.  Order is determined by topology of a network.  Frames sent in the same direction of the token.  Physical Ring not necessary. Can be in a line or bus, known as a Token Bus. What’s Different from Bit-Map:  All positions are equal, no bias on high or low numbered stations.  Each token does not need to propagate to all stations before the protocol advances to the next step.

Binary Countdown Protocol Basic Binary Countdown Method: Top Dog Takes Priority  A station wanting to transmit broadcasts its address as a binary string.  Implicitly assumes that the transmission delays are negligible.  All stations see bits essentially instantaneously.  Bidding for the channel, higher addressed stations have priority over the lower numbered stations.  Simple and very efficient.

4. Limited-Contention Protocols  Contention (pure or slotted ALOHA) is preferable under conditions of light load due to its low delay (since collisions are rare).  Collision-free protocols are favorable at high load because of the improved channel efficiency (since overheads are fixed).  Limited-contention protocols attempt to combine the best properties of contention and collision free protocols.

Acquisition probability for a symmetric contention channel

Limited-Contention Protocols  Stations get divided into groups.  Only members of group 0 can compete for slot 0.  If successful, the member acquires the channel and transmits its frame.  If not, the members of group 1 compete for slot 1.

How to Assign Stations to Slots ?  Special Cases:  Each group has one member. No chance for collision. (binary countdown)  Two stations per group. Little chance of collision.  As more stations are assigned to the same slot, the probability of collisions grows but the length of the bit-map scan needed to give everyone a chance shrinks.

How to Assign Stations to Slots  Limiting Case: Single group containing all stations. (slotted ALOHA)  What we need:  A method to assign stations to slots dynamically, with many stations per slot when the load is low and few (or even just one) station per slot when the load is high.

The Adaptive Tree Walk Protocol Tree for 8 stations

5. Wireless LAN Protocol Wireless LAN protocol are the rules that govern the interactions between wireless devices.  When dealing with wireless LAN the distance between access points has to be taken into consideration.  Wireless communications can overlap and cause collisions between packets being sent.  Problems such as these are resolved by using various protocols to regulate these interactions.

Terminal Problem When transmitters check to see if a collision can occur at the receiving end one of two problems can occur:  Hidden terminal problem - the transmitter cannot detect the interfering transmitter since it is out of range and thus causes interference.  Exposed Terminal Problem - The transmitter does detect another signal that can cause collisions and does not transmit even though the problematic signal does not reach the intended receiver.

MACA  MACA ( Multiple Access with Collision Avoidance ) – MACA is a protocol designed to reduce the number of collisions by having transmitters first send a short frame to the receiver an: RTS (Request to Send) which entails the length of the data frame which is to be sent.  The receiver then returns a CTS (Clear to send) frame which clears the station to transmit.

MACA  Upon Receiving A RTS, a station will remain silent to allow for a CTS to be sent out to prevent collision.  Upon Receiving a CTS, the station realizes it is close to a receiver about to receive information and will defer sending anything until the frame is expected to finish.  Despite all this, Collisions can still occur in the case of MACA.

THANK YOU FOR YOUR ATTENTION! QUESTIONS ?