Medium Access Control Protocols, Local Area Networks, and Wireless Local Area Networks Lecture Note 9.

Slides:



Advertisements
Similar presentations
Channel Allocation Protocols. Dynamic Channel Allocation Parameters Station Model. –N independent stations, each acting as a Poisson Process for the purpose.
Advertisements

The ALOHA Protocol “Free for all”: whenever station has a frame to send, it does so. –Station listens for maximum RTT for an ACK. –If no ACK after a specified.
EECC694 - Shaaban #1 lec #5 Spring Data Link In Broadcast Networks: The Media Access Sublayer Broadcast networks with multi-access (or random.
Ethernet – CSMA/CD Review
Fundamentals of Computer Networks ECE 478/578
12.1 Chapter 12 Multiple Access Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Communication Networks Lecture 5 NETW 501-L5: NETW 501-L5: Medium Access Control Dr.-Ing. Khaled Shawky Hassan Room: C3-222, ext: 1204,
LANs Local Area Networks via the Media Access Control (MAC) Sub Layer LANs Local Area Networks via the Media Access Control (MAC) Sub Layer Advanced Advanced.
1 ELEN602 Lecture 10 Review of last lecture –M/G/1 and M/D/1 Results Multi-access Networks Medium Access Control –ALOHA –Slotted ALOHA.
1 Pertemuan 13 Teknik Akses Jaringan - Random Matakuliah: H0174/Jaringan Komputer Tahun: 2006 Versi: 1/0.
MAC Protocols Media Access Control (who gets the use the channel) zContention-based yALOHA and Slotted ALOHA. yCSMA. yCSMA/CD. TDM and FDM are inefficient.
CS 5253 Workshop 1 MAC Protocol and Traffic Model.
CMPE 150- Introduction to Computer Networks 1 CMPE 150 Fall 2005 Lecture 17 Introduction to Computer Networks.
Copyright © 2003, Dr. Dharma P. Agrawal and Dr. Qing-An Zeng. All rights reserved. 1 Chapter 6 Multiple Radio Access.
1 University of Freiburg Computer Networks and Telematics Prof. Christian Schindelhauer Wireless Sensor Networks 7th Lecture Christian Schindelhauer.
Teknik Akses Jaringan - Non Carrier Sense Pertemuan 11 Matakuliah: H0484/Jaringan Komputer Tahun: 2007.
CMPE 150- Introduction to Computer Networks 1 CMPE 150 Fall 2005 Lecture 16 Introduction to Computer Networks.
Studying Local Area Networks Via Media Access Control (MAC) SubLayer
What is the difference between random access and scheduling?
T. S. Eugene Ngeugeneng at cs.rice.edu Rice University1 COMP/ELEC 429 Introduction to Computer Networks Broadcast network access control Some slides used.
Networks: Local Area Networks1 LANs Studying Local Area Networks Via Media Access Control (MAC) SubLayer.
Computer Networks: Local Area Networks 1 LANs Studying Local Area Networks via the Media Access Control (MAC) SubLayer.
Medium Access Control Sublayer
Shashank Srivastava Motilal Nehru National Institute Of Technology, Allahabad Medium Access Control.
Medium Access Control Protocols, Local Area Networks, and Wireless Local Area Networks Lecture Note 8.
1 ECE453 – Introduction to Computer Networks Lecture 7 – Multiple Access Control (I)
Multiple Access Protocols Chapter 6 of Hiroshi Harada Book
Wireless Application Protocol
Opersating Mode DCF: distributed coordination function
1 Computer Communication & Networks Lecture 12 Datalink Layer: Multiple Access Waleed Ejaz
McGraw-Hill © The McGraw-Hill Companies, Inc., 2004 Chapter 12 Multiple Access Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction.
IEEE High Rate WPAN - MAC functionalities & Power Save Mode Mobile Network Lab. 정상수, 한정애.
جلسه دهم شبکه های کامپیوتری به نــــــــــــام خدا.
Medium Access Control NWEN302 Computer Network Design.
Chi-Cheng Lin, Winona State University CS 313 Introduction to Computer Networking & Telecommunication Medium Access Control Sublayer.
1 Poisson Random Process. 2 Mean and Variance Results You have to memorize these! You should be able to derive any of the above Exponential: Poisson:
Cyclic Redundancy Check (CRC).  An error detection mechanism in which a special number is appended to a block of data in order to detect any changes.
جلسه یازدهم شبکه های کامپیوتری به نــــــــــــام خدا.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2000 Unit-II Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Medium Access Control Sub Layer
Multiple Access.
Data Communications, Kwangwoon University12-1 Chapter 12. Multiple Access 1.Random Access 2.Controlled Access 3.Channelization.
Chapter 6 Multiple Radio Access
Giuseppe Bianchi Random Access Performance the case of Aloha.
CS3502: Data and Computer Networks Local Area Networks - 1 introduction and early broadcast protocols.
LANs Local Area Networks via the Media Access Control (MAC) Sub Layer LANs Local Area Networks via the Media Access Control (MAC) Sub Layer Advanced Computer.
Ch 12. Multiple Access. Multiple Access for Shared Link Dedicated link – Point-to-point connection is sufficient Shared link – Link is not dedicated –
Background of Ad hoc Wireless Networks Student Presentations Wireless Communication Technology and Research Ad hoc Routing and Mobile IP and Mobility Wireless.
CS3502: Data and Computer Networks Local Area Networks - 1 introduction and early broadcast protocols.
ECEN 621, Prof. Xi Zhang ECEN “ Mobile Wireless Networking” Course Materials: Papers, Reference Texts: Bertsekas/Gallager, Stuber, Stallings, etc.
實驗三 媒體存取協定模擬 教師: 助教: 1998/10/19 High Speed Network Lab. Department of Computer Information Science, NCTU.
1 Ethernet CSE 3213 Fall February Introduction Rapid changes in technology designs Broader use of LANs New schemes for high-speed LANs High-speed.
Advanced Computer Networks C13
Tel Hai Academic College Department of Computer Science Prof. Reuven Aviv Markov Models for Access Control in Computer Networks Resource: Fayez Gebali,
Chapter 4 The Medum Access Sublayer. MA Sublayer Additional Reference –Local and Metropolitan Area Networks, William Stallings, Prentice Hall, 2000, 6th.
Medium Access Control Protocols, Local Area Networks, and Wireless Local Area Networks Lecture Note 10.
COMPUTER NETWORKS Data-link Layer (The Medium Access Control Sublayer) MAC Sublayer.
Lecture Focus: Data Communications and Networking  Data Link Layer  Media Access Control (MAC) Lecture 23 CSCS 311.
Multiple Access By, B. R. Chandavarkar, CSE Dept., NITK, Surathkal Ref: B. A. Forouzan, 5 th Edition.
ECEN “Mobile Wireless Networking”
MEDIUM ACCESS CONTROL PROTOCOL
Services of DLL Framing Link access Reliable delivery
COMP/ELEC 429/556 Introduction to Computer Networks
The Medium Access Control Sublayer
Communication Networks NETW 501
Chapter 12 Multiple Access
Data Communication Networks
CSE 313 Data Communication
Chapter 6 Multiple Radio Access.
Multiple Access Control (MAC) Protocols
Presentation transcript:

Medium Access Control Protocols, Local Area Networks, and Wireless Local Area Networks Lecture Note 9

Medium Access Control Protocols, Local Area Networks, and Wireless Local Area Networks Part I: Medium Access Control Part II: Local Area Networks Part III: Wireless Local Area Networks

Medium Access Control Protocols, Local Area Networks, and Wireless Local Area Networks Medium Access Control Protocol Delay Performance Modeling and Analysis

Medium Access Control Protocols, Local Area Networks, and Wireless Local Area Networks Medium Access Control Protocol Throughput Performance Modeling and Analysis

Prof. Xi Zhang MAC Delay Performance  Frame transfer delay  From first bit of frame arrives at source MAC  To last bit of frame delivered at destination MAC  Throughput  Actual transfer rate through the shared medium  Measured in frames/sec or bits/sec  Parameters R bits/sec & L bits/frame X=L/R seconds/frame frames/second average arrival rate Load  = X = X/(1/ ), rate at which “ work ” arrives Maximum throughput efficiency): R/L fr/sec

Prof. Xi Zhang Load Transfer delay E[T]/X   max 1 1 Normalized Delay versus Load E[T] = average frame transfer delay X = average frame transmission time  At low arrival rate, only frame transmission time  At high arrival rates, increasingly longer waits to access channel  Max efficiency typically less than 100%

Prof. Xi Zhang Dependence on Rt prop /L Transfer Delay Load E[T]/X   max 1 1 a a a > a

Prof. Xi Zhang ALOHA  Wireless link to provide data transfer between main campus & remote campuses of University of Hawaii  Simplest solution: just do it  A station transmits whenever it has data to transmit  If more than one frames are transmitted, they interfere with each other (collide) and are lost  If ACK not received within timeout, then a station picks random backoff time (to avoid repeated collision)  Station retransmits frame after backoff time t t0t0 t 0 -X t 0 +X t 0 +X+2t prop t 0 +X+2t prop  + B Vulnerable period Time-out Backoff period B First transmission Retransmission

Prof. Xi Zhang ALOHA Model  Definitions and assumptions  X frame transmission time (assume constant)  S: throughput (average # successful frame transmissions per X seconds)  G: load (average # transmission attempts per X sec.)  P success : probability a frame transmission is successful X X frame transmission Prior interval  Any transmission that begins during vulnerable period leads to collision  Success if no arrivals during 2X seconds

Prof. Xi Zhang Abramson ’ s Assumption  What is probability of no arrivals in vulnerable period?  Abramson assumption: Effect of backoff algorithm is that frame arrivals are equally likely to occur at any time interval  G is avg. # arrivals per X seconds  Divide X into n intervals of duration  =X/n  p = probability of arrival in  interval, then G = n p since there are n intervals in X seconds

Prof. Xi Zhang Throughput of Pure ALOHA  Collisions are means for coordinating access  Max throughput is  max =  1/2e (18.4%)  Bimodal behavior: Small G, S≈G Large G, S ↓ 0  Collisions can snowball and drop throughput to zero 0.5e -1 = 0.184

Prof. Xi Zhang Slotted ALOHA  Time is slotted in X seconds slots  Stations synchronized to frame times  Stations transmit frames in first slot after frame arrival  Backoff intervals in multiples of slots t (k+1)X kX t 0 +X+2t prop + B Vulnerable period Time-out Backoff period B t 0 +X+2t prop Only frames that arrive during prior X seconds collide