Chi-Cheng Lin, Winona State University CS 313 Introduction to Computer Networking & Telecommunication Medium Access Control Sublayer.

Slides:



Advertisements
Similar presentations
14-MAC Sub-layer Dr. John P. Abraham Professor UTPA.
Advertisements

Channel Allocation Protocols. Dynamic Channel Allocation Parameters Station Model. –N independent stations, each acting as a Poisson Process for the purpose.
EECC694 - Shaaban #1 lec #5 Spring Data Link In Broadcast Networks: The Media Access Sublayer Broadcast networks with multi-access (or random.
Ethernet – CSMA/CD Review
1 The Medium Access Control Sublayer Chapter 4. 2 The Medium Access Control Sublayer This chapter deals with broadcast networks and their protocols. In.
Fundamentals of Computer Networks ECE 478/578
Multiple access What if multiple machines are sharing the same link?
Lecture 9: Multiple Access Protocols
1 K. Salah Module 4.2: Media Access Control The Media Access Control (MAC) sublayer –Random Access (CSMA), IEEE –Token Passing, IEEE Ch 13-
1 Pertemuan 13 Teknik Akses Jaringan - Random Matakuliah: H0174/Jaringan Komputer Tahun: 2006 Versi: 1/0.
EEC-484/584 Computer Networks Lecture 7 Wenbing Zhao
MAC Protocols Media Access Control (who gets the use the channel) zContention-based yALOHA and Slotted ALOHA. yCSMA. yCSMA/CD. TDM and FDM are inefficient.
CS 5253 Workshop 1 MAC Protocol and Traffic Model.
CMPE 150- Introduction to Computer Networks 1 CMPE 150 Fall 2005 Lecture 17 Introduction to Computer Networks.
EEC-484/584 Computer Networks Lecture 13 Wenbing Zhao
EEC-484/584 Computer Networks Lecture 9 Wenbing Zhao (Part of the slides are based on materials supplied by Dr. Louise Moser at UCSB and.
EEC-484/584 Computer Networks Lecture 7 Wenbing Zhao
Teknik Akses Jaringan - Non Carrier Sense Pertemuan 11 Matakuliah: H0484/Jaringan Komputer Tahun: 2007.
CMPE 150- Introduction to Computer Networks 1 CMPE 150 Fall 2005 Lecture 16 Introduction to Computer Networks.
EEC-484/584 Computer Networks Lecture 13 Wenbing Zhao
EEC-484/584 Computer Networks Lecture 9 Wenbing Zhao (Part of the slides are based on materials supplied by Dr. Louise Moser at UCSB and.
Studying Local Area Networks Via Media Access Control (MAC) SubLayer
CS 5253 Workshop 1 MAC Protocol and Traffic Model.
Networks: Local Area Networks1 LANs Studying Local Area Networks Via Media Access Control (MAC) SubLayer.
Computer Networks: Local Area Networks 1 LANs Studying Local Area Networks via the Media Access Control (MAC) SubLayer.
EEC-484/584 Computer Networks Lecture 7 Wenbing Zhao
Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011 The Medium Access Control Sublayer Chapter.
1 Chapter 5 The Medium Access Sublayer. 2 Chapter 5 The Medium Access Layer 5.1 The Channel Allocation problem - Static and dynamic channel allocation.
Medium Access Control Sublayer
1 ECE453 – Introduction to Computer Networks Lecture 7 – Multiple Access Control (I)
9/11/2015 5:55 AM1 Ethernet and CSMA/CD CSE 6590 Fall 2010.
A.S.Tanenbaum, Computer networks, ch4 MAC 1 The Medium Access Control Sublayer Medium Access Control: a means of controlling access to the medium to promote.
CIS 725 Media Access Layer. Medium Access Control Sublayer MAC sublayer resides between physical and data link layer Broadcast/multiacess channels N independent.
1 Computer Communication & Networks Lecture 12 Datalink Layer: Multiple Access Waleed Ejaz
Chi-Cheng Lin, Winona State University CS412 Introduction to Computer Networking & Telecommunication Medium Access Control Sublayer.
Chapter 4: Medium Access Control (MAC) Sublayer
CHAPTER 4: THE MEDIUM ACCESS SUBLAYER 4.1: The Channel Allocation Problem 4.2: Multiple Access Protocols.
LECTURE9 NET301. DYNAMIC MAC PROTOCOL: CONTENTION PROTOCOL Carrier Sense Multiple Access (CSMA): A protocol in which a node verifies the absence of other.
جلسه دهم شبکه های کامپیوتری به نــــــــــــام خدا.
Medium Access Control NWEN302 Computer Network Design.
The Medium Access Control Sublayer Chapter 4. The Channel Allocation Problem Static Channel Allocation Dynamic Channel Allocation  Delay for the divided.
جلسه یازدهم شبکه های کامپیوتری به نــــــــــــام خدا.
4: DataLink Layer1 Multiple Access Links and Protocols Three types of “links”: r point-to-point (single wire, e.g. PPP, SLIP) r broadcast (shared wire.
Medium Access Control Sub Layer
7-1 Introduction to Queueing Theory l Components of a queueing system n probability density function (pdf) of interarrival times n pdf of service times.
Data Communications, Kwangwoon University12-1 Chapter 12. Multiple Access 1.Random Access 2.Controlled Access 3.Channelization.
CS3502: Data and Computer Networks Local Area Networks - 1 introduction and early broadcast protocols.
5: DataLink Layer 5a-1 Multiple Access protocol. 5: DataLink Layer 5a-2 Multiple Access Links and Protocols Three types of “links”: r point-to-point (single.
LANs Local Area Networks via the Media Access Control (MAC) Sub Layer LANs Local Area Networks via the Media Access Control (MAC) Sub Layer Advanced Computer.
CS3502: Data and Computer Networks Local Area Networks - 1 introduction and early broadcast protocols.
LECTURE9 NET301 11/5/2015Lect 9 NET DYNAMIC MAC PROTOCOL: CONTENTION PROTOCOL Carrier Sense Multiple Access (CSMA): A protocol in which a node verifies.
1 Ethernet CSE 3213 Fall February Introduction Rapid changes in technology designs Broader use of LANs New schemes for high-speed LANs High-speed.
The Medium Access Control Sublayer
Chapter 4 The Medum Access Sublayer. MA Sublayer Additional Reference –Local and Metropolitan Area Networks, William Stallings, Prentice Hall, 2000, 6th.
Medium Access Control Protocols, Local Area Networks, and Wireless Local Area Networks Lecture Note 10.
THE MEDIUM ACCESS CONTROL SUBLAYER 4.1 THE CHANNEL ALLOCATION PROBLEM 4.2 MULTIPLE ACCESS PROTOCOLS.
UNIT 2 Medium Access sub layer: Medium Access sub layer - Channel Allocations, LAN protocols - ALOHA protocols(PURE AND SLOTTED ALOHA),CSMA/CA,CSMA/CD.
COMPUTER NETWORKS Data-link Layer (The Medium Access Control Sublayer) MAC Sublayer.
THE MEDIUM ACCESS CONTROL SUBLAYER 4.1 THE CHANNEL ALLOCATION PROBLEM 4.2 MULTIPLE ACCESS PROTOCOLS.
CS 5253 Workshop 1 MAC Protocol and Traffic Model.
Week3 The Medium Access Sublayer
Chapter 12 Multiple Access.
Module 3 Medium Access Control.
High Speed LANs – Ethernet and Token Ring
THE IEEE MAC SUB-LAYER – chapter 14
The Medium Access Control Sublayer
Channel Allocation Problem/Multiple Access Protocols Group 3
Link Layer and LANs Not everyone is meant to make a difference. But for me, the choice to lead an ordinary life is no longer an option 5: DataLink Layer.
Channel Allocation Problem/Multiple Access Protocols Group 3
Dr. John P. Abraham Professor UTPA
Presentation transcript:

Chi-Cheng Lin, Winona State University CS 313 Introduction to Computer Networking & Telecommunication Medium Access Control Sublayer

2 Topics l Introduction l Channel Allocation Problem l Multiple Access Protocols l CDMA

3 Introduction l Broadcast networks  Key issue: who gets to use the channel when there is competition  Referred to as  Multiaccess channels  Random access channels l MAC (Medium Access Control) sublayer  LANs  Wireless networks  Satellite networks

4 Channel Allocation Problem l Channel Allocation  Static  Dynamic l Performance factors  Medium access delay  Time between a frame is ready and the frame can be transmitted  Throughput  #frames can be transmitted in unit time interval

5 Static Channel Allocation l FDM  Bandwidth divided into N equal sized portions for N users  Problems  #senders large  #senders continuously varies  bursty traffic  Discussion: #users > N  ? < N  ? = N  ?  N times worse than all frames queued in one big queue

6 Static Channel Allocation l TDM  Each user is statically allocated every Nth time slot  Same problems as FDM l Under what circumstances are static channel allocation schemes efficient?

7 Dynamic Channel Allocation l Key assumptions 1. Station model  Independent  Work is generated constantly  One program per station  Station is blocked once a frame has been generated until the frame has been successfully transmitted 2. Single channel assumption

8 Dynamic Channel Allocation l Key assumptions 3. Collision Assumption  Collision: Two frames are transmitted simultaneously, overlapped in time and resulting signal garbled  Can be detected by all stations  No other errors

9 Dynamic Channel Allocation l Key assumptions 4. Time: either continuous or discrete (slotted)  Continuous  Frame transmission can begin at any instant  No "master clock" needed  Slotted  Time divided into discrete intervals (slots)  Frame transmissions begin at the start of a slot  #frames contained in a slot: 0  ? 1  ? >1  ?

10 Dynamic Channel Allocation l Carrier sense ("carrier" refers to electrical signal): either Y or N  Yes  A station can check channel before transmission  If busy, station idle  Wired LANs  No  “Just do it"  Can tell if transmission successful later  Wireless networks, cable modems

11 Multiple Access Protocols l ALOHA l Carrier sense multiple access protocols (CSMA) l CSMA w/ collision detection (CSMA/CD) l Collision-free protocols l Limited-contention protocols

12 ALOHA l Applicable to any contention system  System in which uncoordinated users are competing for the use of a single shared channel l Two versions  Pure ALOHA  Slotted ALOHA

13 Pure ALOHA l Let users transmit whenever they have data to be sent l Colliding frames are destroyed l Sender can always find out destroyed or not  Feedback (property of broadcasting) or ACK  LANs: immediately  Satellites: propagation delay (e.g., 270msec)  By listening to the channel  If frame is destroyed wait a random amount of time and retransmit (why "random"?)

14 Pure ALOHA Where are the collisions?

15 Slotted ALOHA l Discrete time l Agreed slot boundaries l Synchronization needed l Performance  Which ALOHA has a shorter medium access delay?  Which ALOHA has a higher throughput?

16 Performance of ALOHA l Slotted ALOHA can double the throughput of pure ALOHA Throughput versus offered traffic for ALOHA systems.

17 Carrier Sense Multiple Access (CSMA) Protocols l Stations can listen to the channel (i.e., sense a carrier in the channel) l Types  1-persistent CSMA  Nonpersistent CSMA  p-persistent CSMA

18 Comparison of the channel utilization versus load for various random access protocols. Performance of MAC Protocols

19 CSMA w/ Collision Detection (CSMA/CD) l Can listen to the channel and detect collision  Stop transmitting as soon as collision detected l Widely used on LANs (e.g., Ethernet) l Collision detection  Analog process  Special encoding is used

20 CSMA w/ Collision Detection (CSMA/CD) l Conceptual model  3 states  Contention  Transmission  Idle l Minimum time to detect collision determines time slot  Depends on propagation delay of medium

21 CSMA/CD Model

22 CSMA/CD Algorithm Source:

23 Collision-Free Protocols l Model  N Stations: 0,1,..., (N-1) l Question  Which station gets the channel after a successful transmission? l Protocols  Bit-map (i.e., reservation) protocol  Token passing protocol  Example: Token ring

Collision-Free Protocol Token ring Station Direction of transmission Token

25 Performance of Contention and Collision-Free Protocols l Contention  Low load => low medium access delay :)  High load => low channel efficiency :( l Collision-Free  Low load => high medium access delay :(  High load => high channel efficiency :)

26 Summary of Channel Allocation Methods/Systems * * * * * * * * * | Token Passing | Contention-free protocol |