1 Access networks lectures 2008/09 - winter term Part 2 : Access networks.

Slides:



Advertisements
Similar presentations
Topic 7 Local Area Networks (LAN)
Advertisements

Spread Spectrum Chapter 7.
12.1 Chapter 12 Multiple Access Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Multiple access What if multiple machines are sharing the same link?
LECTURE 11 CT1303 LAN. DYNAMIC MAC PROTOCOL No fixed assignment for transmission media or any network resources.. It allows transmission when needed.
Comp 361, Spring 20056:Basic Wireless 1 Chapter 6: Basic Wireless (last updated 02/05/05) r A quick intro to CDMA r Basic
Optical communications & networking - an Overview
12.1 Chapter 12 Multiple Access Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Chapter 12 Multiple Access Figure 12.1 Data link layer divided into two functionality-oriented sublayers Figure 12.2 Taxonomy of multiple-access protocols.
CMPE 150- Introduction to Computer Networks 1 CMPE 150 Fall 2005 Lecture 17 Introduction to Computer Networks.
Introduction While in recent years the telecommunications
TDC 461 Basic Communications Systems Local Area Networks 29 May, 2001.
EE 4272Spring, 2003 Chapter 14 LAN Systems Ethernet (CSMA/CD)  ALOHA  Slotted ALOHA  CSMA  CSMA/CD Token Ring /FDDI Fiber Channel  Fiber Channel Protocol.
CMPE 150- Introduction to Computer Networks 1 CMPE 150 Fall 2005 Lecture 18 Introduction to Computer Networks.
1 CMPT 371 Data Communications and Networking Spread Spectrum.
Understanding GPON By Adnan Umar.
16 February 2003 TU/e Computer Science, System Architecture and Networking 1 Communication media Thanks to A. Tanenbaum.
Chapter 8 LAN Technologies and Network Topology Direct Point-to-Point Communication Local Area Networks (LANs) LAN Topologies Ethernet Token Ring FDDI.
Medium Access Control Sublayer
1 Computer Networks Course: CIS 3003 Fundamental of Information Technology.
Network Access and Transmission Methods Chapter 10.
Signal Propagation Propagation: How the Signal are spreading from the receiver to sender. Transmitted to the Receiver in the spherical shape. sender When.
Chapter 12 Multiple Access Figure 12.1 Data link layer divided into two functionality-oriented sublayers Figure 12.2 Taxonomy of multiple-access protocols.
Ch. 16 High-Speed LANs The Emergence of High- Speed LANs Trends –Computing power of PCs has continued to grow. –MIS organizations recognize the.
1 Introduction to. 2 Contents: DEFINITION OF SPREAD SPECTRUM ( SS ) CHARACTERISTICS OF SPREAD SPECTRUM BASIC PRINCIPLES OF DIRECT SEQUENCE SPREAD SPECTRUM.
ICOM 6115©Manuel Rodriguez-Martinez ICOM 6115 – Computer Networks and the WWW Manuel Rodriguez-Martinez, Ph.D. Lecture 16.
Communication Networks Fourth Meeting. Types of Networks  What is a circuit network?  Two people are connected and allocated them their own physical.
The Medium Access Control Sublayer Chapter 4. The Channel Allocation Problem Static Channel Allocation Dynamic Channel Allocation  Delay for the divided.
Ethernet Fundamentals. The success of Ethernet is due to the following factors: Simplicity and ease of maintenance Ability to incorporate new technologies.
© 2009 Pearson Education Inc., Upper Saddle River, NJ. All rights reserved. © The McGraw-Hill Companies, Inc. Medium Access Control Asst. Prof. Chaiporn.
4: DataLink Layer1 Multiple Access Links and Protocols Three types of “links”: r point-to-point (single wire, e.g. PPP, SLIP) r broadcast (shared wire.
William Stallings Data and Computer Communications
12.1 Chapter 12 Multiple Access Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Data Communications, Kwangwoon University12-1 Chapter 12. Multiple Access 1.Random Access 2.Controlled Access 3.Channelization.
1 Kyung Hee University Chapter 12 Multiple Access.
5: DataLink Layer 5a-1 Multiple Access protocol. 5: DataLink Layer 5a-2 Multiple Access Links and Protocols Three types of “links”: r point-to-point (single.
Lecture 4 Spread Spectrum.
ADG 1 Fall 2013 Review A slide to a chapter summary of the material covered (based on the 8/e book)
5: DataLink Layer5a-1 Chapter 5: The Data Link Layer Our goals: r understand principles behind data link layer services: m error detection, correction.
Chapter 12 Multiple Access
Stallings, Wireless Communications & Networks, Second Edition, © 2005 Pearson Education, Inc. All rights reserved Spread Spectrum Chapter.
1 Kyung Hee University Prof. Choong Seon HONG Multiple Access.
Data and Computer Communications Eighth Edition by William Stallings Chapter 15 – Local Area Network Overview.
THE MEDIUM ACCESS CONTROL SUBLAYER 4.1 THE CHANNEL ALLOCATION PROBLEM 4.2 MULTIPLE ACCESS PROTOCOLS.
Chapter 12 Media Access Control (MAC)
UNIT 3 MULTIPLE ACCESS Adapted from lecture slides by Behrouz A. Forouzan © The McGraw-Hill Companies, Inc. All rights reserved.
Network Access and Transmission Methods
Lecture 7 CSMA and Spread Spectrum Dr. Ghalib A. Shah
CT301 lecture7 10/29/2015 Lect 7 NET301.
Outline Introduction Type of Multiplexing FDMA TDMA CDMA Future Work
Data link layer divided into two functionality-oriented sublayers
CT301 LECTURE 8.
Nada Al Dosary CT 1502 Planning and Design of Communication Networks Local Area Networks (LANs) & Networks.
Chapter 12 Multiple Access
Multiple Access Problem: When two or more nodes transmit at the same time, their frames will collide and the link bandwidth is wasted during collision.
Computer Communication Networks
Multiple Access Mahesh Jangid Assistant Professor JVW University.
Channel Allocation (MAC)
PON Extra Material.
Subject Name: Computer Communication Networks Subject Code: 10EC71
THE IEEE MAC SUB-LAYER – chapter 14
CT301 lecture7 10/29/2015 Lect 7 NET301.
Chapter 13 Multiple Access
Link Layer and LANs Not everyone is meant to make a difference. But for me, the choice to lead an ordinary life is no longer an option 5: DataLink Layer.
Chapter 13 Multiple Access
7- chapter Seven Local Area Networks (LAN)
Optical communications & networking - an Overview
Multiplexing Simultaneous transmission of multiple signals across a single data link As data & telecomm use increases, so does traffic Add individual links.
Multiple Access Control (MAC) Protocols
Chapter 12 Media Access Control (MAC)
Presentation transcript:

1 Access networks lectures 2008/09 - winter term Part 2 : Access networks

2 - Some terms from AN area – see file … -the older terms and functionalities: subscriber line, local loop (only twisted pair) MDF – main distribution frame CTE-central (or local) teleph.exchange junctions – betw.LE trunk- links among national switches and higher The Access Layer represents the access network that links the customers to the local switch. [1]

3 - different posibilities of AN, according to customers number DP – distribution point – 10 1 of customers CCP – cross connection point (cabinet) – 10 2 of customers SCP, PCP – for a lot of customers - not flexible - flexibility

4 Fig. General architecture of AN LT – Line Termination – from the side of exchange DP – Distribution Point NT – Network Termination 2.2 Architecture of AN General architecture Interfaces Switching network Primary netw. Secondary n. End devices netw.

5 Architecture - continue AN functionalities (functional architecture) - Transport functions - Functions of system ports ( SNI - Service Network Interface) - Functions of subscribers ports - UNI (User-Network Interface) - Common functions (for all) – with support of TMN; interface Q3

Network Architectures - physical a/ c/ e/ d/ Fig. Physical topology of LAN - interconnecting between switching centers bus (line) b) Ring Star Mesh (each node is connected to all other nodes) Tree

Logical topology: Line topology (bus) Token Ring – ring access – log. addresses don’t must match with physical topology see [2]

8 Fig Comparing of access methods A – traffic offer Y – traffic power (normalized) 2.3 Methods of the access to shared communication media - communications protocol – its layer MAC (Medium Access Control) - 2 groups of the access methods: STOCHASTIC a DETERMINISTIC...packet delay...cummulative delay for curve b): Y b = Y a (1-α) -1 Stochastic access methods L–packet length, C-media inform.capacity, n- phys.media length,v-propagation velocity in the media a – ideal network b – ideal n.with delay α=0.1 c – CDMA-CD d – synchronized ALOHA e – ALOHA (original)

9 Access methods - continue notes: The first version of the original ALOHA “protocol” (now called Pure ALOHA, and the one implemented in ALOHAnet) was quite simple: If you have data to send, send the data If the message collides with another transmission, try resending "later"

10 Access methods - continue something between stochastic and deterministic methods (methods with minimalization of collisions) CSMA: persistent (Carrier Sense Multiple Access) inpersistent p- persistent CSMA / CD (... / collision detection) - IEEE – signal „JAM“ „Tree Walk Protocol“ – adaptive dynamical deviding of terminals according to collision expectation

11 Deterministic Access methods - they are preferred in AN - without collisions --multiplexing methods = systems with accurate disposing of media capacity (TDMA, FDMA, WDMA, SCMA, CDMA) -- polling (e.g. Roll Call Polling) -- standardized token methods: Token Ring (for ring topology - IEEE 802.4), Token Bus (for bus topol.) – term ‘token’ = special data word methods with transport capacity reservation (bit-map protocols) see fig in the following slide - advantages – negligible error rate, ideal (perfect)network behavior -- disadvantage - delay Access methods - continue

12 reservation data channels----reservation data channels Fig An example of protocol with reservation of media capacity – bitmap protocol

13 Multiplex as methods of access to common transport media in AN  TDMA – the access in the reserved time frame Fig Principle of TDMA - bit oriented - block oriented (see fig )

14 Block oriented TDMA Obr MAC encapsulation of a packet of data [5] Fig with fixed allocating of capacity (in the fixed frames) / with dynamic allocating of capacity (ATM)

15  FDMA... - frequency band is devided to segments for separate channels – between channels there are some gaps (guard intervals) - in applications with other access methods

16  WDMA = Wave length Division Multiple Access without EO conversions with E/O conversions - optical windows (850nm,1300nm,1550n m) - HDWDMA =... - each terminal has its own channel, i.e.its own wavlength λ – optical MUX or splitter Fig WDMA PON system Optical fiber Wave length Optical carriers End station Customers

17 Standards ITU-TITU-T G.983G.983 APON (ATM Passive Optical Network)-the first Passive optical network standard - primarily for business applications, and was based on ATM. BPON (Broadband PON) - standard based on APON. It adds support for WDM, dynamic and higher upstream bandwidth allocation, and survivability. It also created a standard management interface, called OMCI, between the OLT and ONU/ONT, enabling mixed-vendor networks. ITU-TITU-T G.984G.984 GPON (Gigabit PON) - an evolution of the BPON standard - supports higher rates, enhanced security, and choice of Layer 2 protocol (ATM, GEM, Ethernet). In early 2008, Verizon began installing GPON equipment, having installed over 800 thousand lines by mid year. British Telecom, and AT&T are in advanced trials. IEEEIEEE 802.3ah802.3ah EPON or GEPON (Ethernet PON) is an IEEE/EFM standard for using Ethernet for packet data -is now part of the IEEE standard. IEEEIEEE 802.3av 10G-EPON (10 Gigabit Ethernet PON) is an IEEE Task Force for 10Gbit/s backwards compatible with 802.3ah EPON. 10GigEPON will use separate wavelengths for 10G and 1G downstream av will continue to use a single wavelength for both 10G and 1G upstream with ATDMA separation. It will also be WDM-PON compatible (depending on the definition of WDM-PON). It is capable of using multiple wavelengths in both directions. SCTESCTE IPS910 RFoG (RF over Glass) is an SCTE Interface Practices Subcomittee standard in development for Point to Multipoint (P2MP) operations that MAY have a wavelength plan compatible with data PON solutions such as EPON,GEPON or 10GigEPON. RFoG offers an FTTH PON like architecture for MSOs without having to select or deploy a PON technology.

18  SCMA... Fig Principle of 1-channel SCMA for direction multipoint-to-point = SubCarrier Multiple Access -1-channel SCMA : el. subcarriers are modulated by users signals – modulation of λ i – composition of λ i by means of optical coupler  one complex (color) signal (composite signal) -multichannel SCMA –first, user signals are compounded in el. area  broadband FDM signal – this one modulates optical carrier λ i  λ i transports information from lots of channels !

19  CDMA... = Code Division Multiple Access - Spread Spectrum (SS) Method - application in transport systems with SS - pseudorandom sequence (PNS = Pseudo Noise Sequence) (n Chips) – similar properties as noise – it containes all components of spectrum and probabilities of „0“ a „1“ are equal – (But: this PNS is deterministic actually – because of its originating – it is created by generator as in fig PNS is multiplyed binary information signal (fig.2.3.8) – as the new low power pseudorandom signale arises as noise šumu (obr ) – one can detect it only if the PNS is known, what is the process on the receiver side actually (correlation method – multiplying of received spectrum by known PNS etc….. more can be presented in the subject of prof.Kocur – Spread Spectrum Communications Systems - SSCS)

20 DP A / D P /S PNG 1 PNG 2 PNG N 13 μs uncorrelated generators of several different users PNS generator, 1 chip... product of them results in spectrum spreading by means of PNS 64 kbps 1 user Obr Generating of spread spectrum signal data......data bit

N. modulo-2 sum (mod 2) shift register with N memory places Obr Linear PNS generator

22 Narrow band transmitted signal.... Operator of spreading.... Spread spectrum signal (wide-band).... Operator of “dispreading” of signal spectra..... Decoded signal:.... Simple model of SSCS Obr Spectrum of information signal in baseband and after spreading

23 Frequency-hopping spread spectrum (FHSS) direct-sequence spread spectrum (DSSS) time-hopping spread spectrum (THSS) chirp spread spectrum (CSS) and combinations of these techniques are forms of spread spectrum (more for examaple on

24 1.Narrow band interference and jamming robustness 2.Low sensitivity to multi-path propagation 3.3.Some level of security and protection of communications channels. 4.4.Relatively low level of power spectrum density of transmitted signalls. Complexity of signal – low chance to detect it by unauthorized person 5.Accurately measurement of distance, unique and exact time providing  integrated switching, navigate and control systems The basic properties of CDMA: advantages 1.1.Complex decoding circuits, transmitters and receivers circuits. disadvantages

25 References: [1] [2] Chen & Comp.: 3 - Communication Technologies, CRC Press LLC, 2000.