“Local Area Networks” - Gerd Keiser Copyright © 2003 - The McGraw-Hill Companies srl Local Area Networks Gerd Keiser.

Slides:



Advertisements
Similar presentations
Channel Allocation Protocols. Dynamic Channel Allocation Parameters Station Model. –N independent stations, each acting as a Poisson Process for the purpose.
Advertisements

EECC694 - Shaaban #1 lec #5 Spring Data Link In Broadcast Networks: The Media Access Sublayer Broadcast networks with multi-access (or random.
Ethernet – CSMA/CD Review
12.1 Chapter 12 Multiple Access Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Fundamentals of Computer Networks ECE 478/578
12.1 Chapter 12 Multiple Access Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
1 ELEN602 Lecture 10 Review of last lecture –M/G/1 and M/D/1 Results Multi-access Networks Medium Access Control –ALOHA –Slotted ALOHA.
CS 5253 Workshop 1 MAC Protocol and Traffic Model.
CMPE 150- Introduction to Computer Networks 1 CMPE 150 Fall 2005 Lecture 17 Introduction to Computer Networks.
1 6/27/ :02 Chapter 15LAN Performance1 Rivier College CS575: Advanced LANs Chapter 15: LAN Performance.
CMPE 150- Introduction to Computer Networks 1 CMPE 150 Fall 2005 Lecture 16 Introduction to Computer Networks.
7C Cimini-9/97 RANDOM ACCESS TECHNIQUES ALOHA Carrier-Sense Techniques Reservation Protocols PRMA.
Studying Local Area Networks Via Media Access Control (MAC) SubLayer
CS 5253 Workshop 1 MAC Protocol and Traffic Model.
Networks: Local Area Networks1 LANs Studying Local Area Networks Via Media Access Control (MAC) SubLayer.
Computer Networks: Local Area Networks 1 LANs Studying Local Area Networks via the Media Access Control (MAC) SubLayer.
Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011 The Medium Access Control Sublayer Chapter.
Shashank Srivastava Motilal Nehru National Institute Of Technology, Allahabad Medium Access Control.
Infrastructure de Communications – CR 4107Chapter 41 The Medium Access Control Sublayer Chapter 4.
Chap 4 Multiaccess Communication (Part 1)
9/11/2015 5:55 AM1 Ethernet and CSMA/CD CSE 6590 Fall 2010.
Multiple Access Protocols Chapter 6 of Hiroshi Harada Book
A.S.Tanenbaum, Computer networks, ch4 MAC 1 The Medium Access Control Sublayer Medium Access Control: a means of controlling access to the medium to promote.
: Data Communication and Computer Networks
McGraw-Hill © The McGraw-Hill Companies, Inc., 2004 Chapter 12 Multiple Access Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction.
Computer Networks NYUS FCSIT Spring 2008 Igor TRAJKOVSKI, Ph.D. Associate Professor
Chapter 4: Medium Access Control (MAC) Sublayer
The Medium Access Control Sublayer Chapter 4 10/1/2015www.noteshit.com1.
Layer 2 Technologies At layer 2 we create and transmit frames over communications channels Format of frames and layer 2 transmission protocols are dependent.
The Medium Access Control Sublayer Chapter 4. The Channel Allocation Problem Static Channel Allocation Dynamic Channel Allocation  Delay for the divided.
Chi-Cheng Lin, Winona State University CS 313 Introduction to Computer Networking & Telecommunication Medium Access Control Sublayer.
Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter Seven ATM LANs.
The Medium Access Control Sublayer Chapter 4. The Channel Allocation Problem Static Channel Allocation in LANs and MANs Dynamic Channel Allocation in.
R ANDOM A CCESS N ETWORKS CSMA F AMILIES 1. References Chapter 9 of the book. Throughput Analysis for Persistent CSMA Systems, HIDEAKI TAKAGI AND LEONARD.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2000 Unit-II Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Medium Access Control Sub Layer
12.1 Chapter 12 Multiple Access Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Data Communications, Kwangwoon University12-1 Chapter 12. Multiple Access 1.Random Access 2.Controlled Access 3.Channelization.
Giuseppe Bianchi Random Access Performance the case of Aloha.
Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter Four LAN Access Techniques.
The Medium Access Control Sublayer Chapter 4 12/13/2015www.ishuchita.com1.
“Local Area Networks” - Gerd Keiser Copyright © The McGraw-Hill Companies srl Local Area Networks Gerd Keiser.
Chapter 12 Multiple Access
The Medium Access Control Sublayer Chapter 4. The Channel Allocation Problem Static Channel Allocation in LANs and MANs Dynamic Channel Allocation in.
實驗三 媒體存取協定模擬 教師: 助教: 1998/10/19 High Speed Network Lab. Department of Computer Information Science, NCTU.
“Local Area Networks” - Gerd Keiser Copyright © The McGraw-Hill Companies srl Local Area Networks Gerd Keiser.
“Local Area Networks” - Gerd Keiser Copyright © The McGraw-Hill Companies srl Local Area Networks Gerd Keiser.
1 Ethernet CSE 3213 Fall February Introduction Rapid changes in technology designs Broader use of LANs New schemes for high-speed LANs High-speed.
Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. PowerPoint Presentation Materials For Instructor’s Resources.
“Local Area Networks” - Gerd Keiser Copyright © The McGraw-Hill Companies srl Local Area Networks Gerd Keiser.
Tel Hai Academic College Department of Computer Science Prof. Reuven Aviv Markov Models for Access Control in Computer Networks Resource: Fayez Gebali,
Medium Access Control Protocols, Local Area Networks, and Wireless Local Area Networks Lecture Note 10.
“Local Area Networks” - Gerd Keiser Copyright © The McGraw-Hill Companies srl Local Area Networks Gerd Keiser.
Chapter 13 Multiple Access.
Chapter 12 Media Access Control (MAC)
UNIT 3 MULTIPLE ACCESS Adapted from lecture slides by Behrouz A. Forouzan © The McGraw-Hill Companies, Inc. All rights reserved.
Multiple Access. Figure 12.1 Data link layer divided into two functionality-oriented sublayers.
COMPUTER NETWORKS Data-link Layer (The Medium Access Control Sublayer) MAC Sublayer.
CS 5253 Workshop 1 MAC Protocol and Traffic Model.
MEDIUM ACCESS CONTROL PROTOCOL
Chapter 12 Multiple Access
High Speed LANs – Ethernet and Token Ring
Multiple Access Mahesh Jangid Assistant Professor JVW University.
Chapter 12 Multiple Access
The Medium Access Control Sublayer
The Medium Access Control Sublayer
Chapter 12 Multiple Access
Chapter 12 Multiple Access
Chapter 12 Multiple Access
CSE 313 Data Communication
Presentation transcript:

“Local Area Networks” - Gerd Keiser Copyright © The McGraw-Hill Companies srl Local Area Networks Gerd Keiser

“Local Area Networks” - Gerd Keiser Copyright © The McGraw-Hill Companies srl Chapter Four LAN Access Techniques

“Local Area Networks” - Gerd Keiser Copyright © The McGraw-Hill Companies srl General concept of a simple queuing model Figure 4.1

“Local Area Networks” - Gerd Keiser Copyright © The McGraw-Hill Companies srl Vulnerable period in the pure ALOHA scheme Figure 4.2

“Local Area Networks” - Gerd Keiser Copyright © The McGraw-Hill Companies srl Throughput versus offered load for pure and slotted ALOHA Figure 4.3

“Local Area Networks” - Gerd Keiser Copyright © The McGraw-Hill Companies srl Transmission attempts and random retransmission delays for colliding packets in slotted ALOHA Figure 4.4

“Local Area Networks” - Gerd Keiser Copyright © The McGraw-Hill Companies srl Successful and unsuccessful transmission attempts for nonpersistent CSMA Figure 4.5

“Local Area Networks” - Gerd Keiser Copyright © The McGraw-Hill Companies srl Throughput S as a function of the offered load G Figure 4.6

“Local Area Networks” - Gerd Keiser Copyright © The McGraw-Hill Companies srl Packet arrivals in slotted nonpersistent CSMA Figure 4.7

“Local Area Networks” - Gerd Keiser Copyright © The McGraw-Hill Companies srl Flow diagram for the CSMA/CD protocol Figure 4.8

“Local Area Networks” - Gerd Keiser Copyright © The McGraw-Hill Companies srl Performance comparisons Figure 4.9

“Local Area Networks” - Gerd Keiser Copyright © The McGraw-Hill Companies srl Throughput as a function of G for 1-persistent CSMA/CD Figure 4.10 Reprinted with permission from Takagi and Kleinrock, 17 © 1987, IEEE

“Local Area Networks” - Gerd Keiser Copyright © The McGraw-Hill Companies srl Examples of three types of polling schemes Figure 4.11

“Local Area Networks” - Gerd Keiser Copyright © The McGraw-Hill Companies srl Use of a central LAN switch in a star network architecture Figure 4.12

“Local Area Networks” - Gerd Keiser Copyright © The McGraw-Hill Companies srl LAN-to-LAN and LAN-to-MAN/WAN switches Figure 4.13

“Local Area Networks” - Gerd Keiser Copyright © The McGraw-Hill Companies srl The basic concept of a LAN switch Figure 4.14

“Local Area Networks” - Gerd Keiser Copyright © The McGraw-Hill Companies srl Equilibrium throughput curve in slotted ALOHA Figure 4.15

“Local Area Networks” - Gerd Keiser Copyright © The McGraw-Hill Companies srl Equilibrium contours for slotted ALOHA Figure 4.16

“Local Area Networks” - Gerd Keiser Copyright © The McGraw-Hill Companies srl Example of a channel load line Figure 4.17

“Local Area Networks” - Gerd Keiser Copyright © The McGraw-Hill Companies srl Example of a globally stable, lightly loaded system Figure 4.18

“Local Area Networks” - Gerd Keiser Copyright © The McGraw-Hill Companies srl Bistable system: 2 locally stable & 1 unstable equilibrium points Figure 4.19

“Local Area Networks” - Gerd Keiser Copyright © The McGraw-Hill Companies srl Behavior of systems which are (a) stable but overloaded (b) unstable with infinite users Figure 4.20