جلسه یازدهم شبکه های کامپیوتری به نــــــــــــام خدا.

Slides:



Advertisements
Similar presentations
Channel Allocation Protocols. Dynamic Channel Allocation Parameters Station Model. –N independent stations, each acting as a Poisson Process for the purpose.
Advertisements

The ALOHA Protocol “Free for all”: whenever station has a frame to send, it does so. –Station listens for maximum RTT for an ACK. –If no ACK after a specified.
EECC694 - Shaaban #1 lec #5 Spring Data Link In Broadcast Networks: The Media Access Sublayer Broadcast networks with multi-access (or random.
Ethernet – CSMA/CD Review
Fundamentals of Computer Networks ECE 478/578
Multiple access What if multiple machines are sharing the same link?
Lecture 9: Multiple Access Protocols
Ethernet. Review Media Access Control – Broadcast media shared by all stations – MAC is used to determine who gets the right to send Developed protocol.
12.1 Chapter 12 Multiple Access Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Communication Networks Lecture 5 NETW 501-L5: NETW 501-L5: Medium Access Control Dr.-Ing. Khaled Shawky Hassan Room: C3-222, ext: 1204,
1 K. Salah Module 4.2: Media Access Control The Media Access Control (MAC) sublayer –Random Access (CSMA), IEEE –Token Passing, IEEE Ch 13-
1 Pertemuan 13 Teknik Akses Jaringan - Random Matakuliah: H0174/Jaringan Komputer Tahun: 2006 Versi: 1/0.
MAC Protocols Media Access Control (who gets the use the channel) zContention-based yALOHA and Slotted ALOHA. yCSMA. yCSMA/CD. TDM and FDM are inefficient.
CS 5253 Workshop 1 MAC Protocol and Traffic Model.
CMPE 150- Introduction to Computer Networks 1 CMPE 150 Fall 2005 Lecture 17 Introduction to Computer Networks.
The Data Link Layer Read Chapters 3 and 4. CSC 3352 Computer Communications Chapter 3&42 Where in the OSI Reference Model ? Session Transport Network.
Copyright © 2003, Dr. Dharma P. Agrawal and Dr. Qing-An Zeng. All rights reserved. 1 Chapter 6 Multiple Radio Access.
Teknik Akses Jaringan Carrier Sense Pertemuan 12 Matakuliah: H0484/Jaringan Komputer Tahun: 2007.
EEC-484/584 Computer Networks Lecture 7 Wenbing Zhao
CMPE 150- Introduction to Computer Networks 1 CMPE 150 Fall 2005 Lecture 16 Introduction to Computer Networks.
EEC-484/584 Computer Networks Lecture 13 Wenbing Zhao
EEC-484/584 Computer Networks Lecture 9 Wenbing Zhao (Part of the slides are based on materials supplied by Dr. Louise Moser at UCSB and.
CS 5253 Workshop 1 MAC Protocol and Traffic Model.
Semester EEE449 Computer Networks The Data Link Layer Part 2: Media Access Control En. Mohd Nazri Mahmud MPhil (Cambridge, UK) BEng (Essex,
Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011 The Medium Access Control Sublayer Chapter.
1 ECE453 – Introduction to Computer Networks Lecture 7 – Multiple Access Control (I)
9/11/2015 5:55 AM1 Ethernet and CSMA/CD CSE 6590 Fall 2010.
Multiple Access Protocols Chapter 6 of Hiroshi Harada Book
Wireless Application Protocol
CIS 725 Media Access Layer. Medium Access Control Sublayer MAC sublayer resides between physical and data link layer Broadcast/multiacess channels N independent.
: Data Communication and Computer Networks
Chi-Cheng Lin, Winona State University CS412 Introduction to Computer Networking & Telecommunication Medium Access Control Sublayer.
Chapter 4: Medium Access Control (MAC) Sublayer
CHAPTER 4: THE MEDIUM ACCESS SUBLAYER 4.1: The Channel Allocation Problem 4.2: Multiple Access Protocols.
LECTURE9 NET301. DYNAMIC MAC PROTOCOL: CONTENTION PROTOCOL Carrier Sense Multiple Access (CSMA): A protocol in which a node verifies the absence of other.
LOCAL AREA NETWORKS. CSMA Carrier Sense Multiple Access To minimize the chance of collision and, therefore, increase the performance, the CSMA method.
جلسه دهم شبکه های کامپیوتری به نــــــــــــام خدا.
The Medium Access Control Sublayer Chapter 4. The Channel Allocation Problem Static Channel Allocation Dynamic Channel Allocation  Delay for the divided.
Chi-Cheng Lin, Winona State University CS 313 Introduction to Computer Networking & Telecommunication Medium Access Control Sublayer.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2000 Unit-II Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
17 - Winter 2005 ECE ECE 766 Computer Interfacing and Protocols 1 Local Area Networks Need for high performance communications for physically close devices.
Medium Access Control Sub Layer
7-1 Introduction to Queueing Theory l Components of a queueing system n probability density function (pdf) of interarrival times n pdf of service times.
Multiple Access.
Data Communications, Kwangwoon University12-1 Chapter 12. Multiple Access 1.Random Access 2.Controlled Access 3.Channelization.
1 Kyung Hee University Chapter 12 Multiple Access.
Chapter 6 Multiple Radio Access
Ch 12. Multiple Access. Multiple Access for Shared Link Dedicated link – Point-to-point connection is sufficient Shared link – Link is not dedicated –
LECTURE9 NET301 11/5/2015Lect 9 NET DYNAMIC MAC PROTOCOL: CONTENTION PROTOCOL Carrier Sense Multiple Access (CSMA): A protocol in which a node verifies.
Carrier Sense Multiple Access Improve ALOHA by using carrier sense –Stations listen to the carrier before transmitting –If channel is busy, the station.
1 Ethernet CSE 3213 Fall February Introduction Rapid changes in technology designs Broader use of LANs New schemes for high-speed LANs High-speed.
Chapter 4 The Medum Access Sublayer. MA Sublayer Additional Reference –Local and Metropolitan Area Networks, William Stallings, Prentice Hall, 2000, 6th.
Medium Access Control Protocols, Local Area Networks, and Wireless Local Area Networks Lecture Note 10.
THE MEDIUM ACCESS CONTROL SUBLAYER 4.1 THE CHANNEL ALLOCATION PROBLEM 4.2 MULTIPLE ACCESS PROTOCOLS.
Chapter 13 Multiple Access.
UNIT 3 MULTIPLE ACCESS Adapted from lecture slides by Behrouz A. Forouzan © The McGraw-Hill Companies, Inc. All rights reserved.
COMPUTER NETWORKS Data-link Layer (The Medium Access Control Sublayer) MAC Sublayer.
Multiple Access By, B. R. Chandavarkar, CSE Dept., NITK, Surathkal Ref: B. A. Forouzan, 5 th Edition.
Chapter 12 Multiple Access.
Introduction to Queueing Theory
Multiple Access Mahesh Jangid Assistant Professor JVW University.
Net301 lecture9 11/5/2015 Lect 9 NET301.
The Medium Access Control Sublayer
Channel Allocation Problem/Multiple Access Protocols Group 3
Ethernet – CSMA/CD Review
Channel Allocation Problem/Multiple Access Protocols Group 3
Data Communication Networks
CSE 313 Data Communication
CARRIER SENSE MULTIPLE ACCESS (CSMA)
Chapter 6 Multiple Radio Access.
Presentation transcript:

جلسه یازدهم شبکه های کامپیوتری به نــــــــــــام خدا

Slotted ALOHA Divide time in discrete intervals Users have to agree on slot boundaries In each slot, one or more users send their frames Probability of transmission success (no other frame is generated in a given interval) t is Slotted ALOHA Efficiency: S=Ge -G Maximum channel utilization: Pure Aloha : 18.4% Slotted Aloha : 36.8% 2

Slotted ALOHA: Vulnerable Time 3

Impact of Load Probability of transmission failure for a single frame: p= 1-e -G Probability of a transmission requiring exactly k attempts: p k =e -G (1-e -G ) k-1 Expected Number of transmissions per frame is: A small increase in channel load, G can results in exponentially increase in transmissions (most of which cause collisions) resulting: Reduced system throughput Longer queues in MAC layer for accumulated, waiting frames. Increase in average frame delay 4

CSMA Carrier Sense Multiple Access "Listen before talk" Reduce the possibility of collision But cannot completely eliminate it 5

Collision in CSMA 6

CSMA: Vulnerable Time 7

Persistence Methods What a station does when channel is idle or busy 1-Persistent NonPersistent P-Persistent 8

1-Persistent Listen to channel and transmit as soon as channel becomes idle If collision, wait random time, and try again This approach is too greedy (name 1-persistent: if idle transmit with p=1) Note: Long propagation delays must be avoided (if not, a greater chance exist that, even after one station starts transmission, another one senses idle, and starts as well) 9

Non-persistent Sense channel; if idle, transmit If not idle, wait a random period before sensing the channel Better utilization, however, longer delays 10

P-persistent Sense channel, if idle, transmit with probability p, defer With probability 1-p to the next slot. If next slot idle repeat the same algorithm If busy the first time, wait till next time slot and try again 11

Throughput of ALOHA and CSMA 12

CSMA/CD 13 Carrier Sense Multiple Access with Collision Detection Idea: stop directly after detecting collision and wait for a random period

CSMA with Collision Detection 14 How long does it take to detect collision ? Assuming a max travel time of t prop, it takes 2t prop to be sure (contention period) (10 µsec on 1 km cable)

CSMA/CD: Minimum Frame Size 15 Each frame must be large enough for a sender to detect a collision Worst case scenario: "A" is transmitting "D" starts transmitting just before A's signal arrives Note: Although CSMA/CD avoids collisions once a station has seized the channel; collisions still occurs during the contention period Contention period may become large for long (fibre) cables Solution: Try avoiding all collisions !

Collision Free Protocols 16 Bit-Map protocol (reserve bandwidth) In contention period each station broadcasts if it has a frame to send Efficiency of d/(d+N) for low load and d/(d+1) for high load Can be further optimized by allowing reservation for multiple slots. Efficiency approaches 1.

17 Binary countdown protocol Collision Free Protocols

18 So far: Contention protocols: low delay at low load Collision-free protocols: high channel utilization at high load Let’s combine good properties of both using adaptive algorithms Consider k stations; each has probability p of transmitting a frame in a certain slot. Probability that some station acquires the channel and its optimal value: Lesson: Reduce the number of competing stations, k Limited-Contention Protocols

Adaptive Tree Walk Protocol 19 How to assign stations to slots? Dynamic assignment: Many stations may try per slot if load low Few stations may try per slot if load is high Adaptive tree walk protocol: a depth-first traversal of a tree: In slot 0 all stations may try If collision, all stations under node 2 may try in slot 1 Three cases one station succeeds: give next frame slot to node 3 stations collision: continue with node 4 during slot 2 no one sends: continue with node 6 !! Example Assume only G & H have a load Collision in slot 0 at node 1 Node 2 is tried at slot 1 and discovered idle No point in trying Node 3. Try Node 6 instead If Node 6 is idle, again, no point in trying 7. Try G and H. The tree for eight stations.