Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter Four LAN Access Techniques.

Slides:



Advertisements
Similar presentations
Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter Four Trusses.
Advertisements

Channel Allocation Protocols. Dynamic Channel Allocation Parameters Station Model. –N independent stations, each acting as a Poisson Process for the purpose.
EECC694 - Shaaban #1 lec #5 Spring Data Link In Broadcast Networks: The Media Access Sublayer Broadcast networks with multi-access (or random.
Ethernet – CSMA/CD Review
12.1 Chapter 12 Multiple Access Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Fundamentals of Computer Networks ECE 478/578
12.1 Chapter 12 Multiple Access Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
1 ELEN602 Lecture 10 Review of last lecture –M/G/1 and M/D/1 Results Multi-access Networks Medium Access Control –ALOHA –Slotted ALOHA.
CS 5253 Workshop 1 MAC Protocol and Traffic Model.
CMPE 150- Introduction to Computer Networks 1 CMPE 150 Fall 2005 Lecture 17 Introduction to Computer Networks.
CMPE 150- Introduction to Computer Networks 1 CMPE 150 Fall 2005 Lecture 16 Introduction to Computer Networks.
7C Cimini-9/97 RANDOM ACCESS TECHNIQUES ALOHA Carrier-Sense Techniques Reservation Protocols PRMA.
Studying Local Area Networks Via Media Access Control (MAC) SubLayer
Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 4 Image Slides.
12.1 Chapter 12 Multiple Access Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Copyright © The McGraw-Hill Companies, Inc
CS 5253 Workshop 1 MAC Protocol and Traffic Model.
Networks: Local Area Networks1 LANs Studying Local Area Networks Via Media Access Control (MAC) SubLayer.
Computer Networks: Local Area Networks 1 LANs Studying Local Area Networks via the Media Access Control (MAC) SubLayer.
Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011 The Medium Access Control Sublayer Chapter.
Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 2 Image Slides.
Chapter 8 Traffic-Analysis Techniques. Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. 8-1.
Shashank Srivastava Motilal Nehru National Institute Of Technology, Allahabad Medium Access Control.
Chap 4 Multiaccess Communication (Part 1)
Multiple Access Protocols Chapter 6 of Hiroshi Harada Book
A.S.Tanenbaum, Computer networks, ch4 MAC 1 The Medium Access Control Sublayer Medium Access Control: a means of controlling access to the medium to promote.
: Data Communication and Computer Networks
McGraw-Hill © The McGraw-Hill Companies, Inc., 2004 Chapter 12 Multiple Access Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction.
Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter Three Data Communication Concepts.
“Local Area Networks” - Gerd Keiser Copyright © The McGraw-Hill Companies srl Local Area Networks Gerd Keiser.
The Medium Access Control Sublayer Chapter 4. The Channel Allocation Problem Static Channel Allocation Dynamic Channel Allocation  Delay for the divided.
Chi-Cheng Lin, Winona State University CS 313 Introduction to Computer Networking & Telecommunication Medium Access Control Sublayer.
Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter Eight Wireless LANs.
17.16 Synthesis of Thyroid Hormone (TH) Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Slide number: 1.
Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter Seven ATM LANs.
The Medium Access Control Sublayer Chapter 4. The Channel Allocation Problem Static Channel Allocation in LANs and MANs Dynamic Channel Allocation in.
R ANDOM A CCESS N ETWORKS CSMA F AMILIES 1. References Chapter 9 of the book. Throughput Analysis for Persistent CSMA Systems, HIDEAKI TAKAGI AND LEONARD.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2000 Unit-II Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Medium Access Control Sub Layer
12.1 Chapter 12 Multiple Access Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Data Communications, Kwangwoon University12-1 Chapter 12. Multiple Access 1.Random Access 2.Controlled Access 3.Channelization.
Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 16 Image Slides.
Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter Five Ethernet.
The Medium Access Control Sublayer Chapter 4 12/13/2015www.ishuchita.com1.
Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter Eight Live Load Forces: Influence Lines for Determinate.
Chapter 12 Multiple Access
Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter Three Statics of Structures Reactions.
The Medium Access Control Sublayer Chapter 4. The Channel Allocation Problem Static Channel Allocation in LANs and MANs Dynamic Channel Allocation in.
實驗三 媒體存取協定模擬 教師: 助教: 1998/10/19 High Speed Network Lab. Department of Computer Information Science, NCTU.
1 Ethernet CSE 3213 Fall February Introduction Rapid changes in technology designs Broader use of LANs New schemes for high-speed LANs High-speed.
Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter Fifteen Approximate Analysis of Indeterminate Structures.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Chapter 13 Multiple Access.
Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 7.
Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. PowerPoint Presentation Materials For Instructor’s Resources.
Chapter 13 Transportation Demand Analysis. Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display
Tel Hai Academic College Department of Computer Science Prof. Reuven Aviv Markov Models for Access Control in Computer Networks Resource: Fayez Gebali,
Medium Access Control Protocols, Local Area Networks, and Wireless Local Area Networks Lecture Note 10.
Chapter 13 Multiple Access.
Chapter 12 Media Access Control (MAC)
UNIT 3 MULTIPLE ACCESS Adapted from lecture slides by Behrouz A. Forouzan © The McGraw-Hill Companies, Inc. All rights reserved.
Multiple Access. Figure 12.1 Data link layer divided into two functionality-oriented sublayers.
COMPUTER NETWORKS Data-link Layer (The Medium Access Control Sublayer) MAC Sublayer.
CS 5253 Workshop 1 MAC Protocol and Traffic Model.
Chapter 12 Multiple Access
High Speed LANs – Ethernet and Token Ring
Chapter 12 Multiple Access
Chapter 12 Multiple Access
Chapter 12 Multiple Access
Chapter 12 Multiple Access
CHAPTER 6 SKELETAL SYSTEM
Presentation transcript:

Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter Four LAN Access Techniques

Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. General concept of a simple queuing model Figure 4.1

Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Vulnerable period in the pure ALOHA scheme Figure 4.2

Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Throughput versus offered load for pure and slotted ALOHA Figure 4.3

Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Transmission attempts and random retransmission delays for colliding packets in slotted ALOHA Figure 4.4

Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Successful and unsuccessful transmission attempts for nonpersistent CSMA Figure 4.5

Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Throughput S as a function of the offered load G Figure 4.6

Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Packet arrivals in slotted nonpersistent CSMA Figure 4.7

Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Flow diagram for the CSMA/CD protocol Figure 4.8

Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Performance comparisons Figure 4.9

Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Throughput as a function of G for 1-persistent CSMA/CD Figure 4.10 Reprinted with permission from Takagi and Kleinrock, 17 © 1987, IEEE

Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Examples of three types of polling schemes Figure 4.11

Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Use of a central LAN switch in a star network architecture Figure 4.12

Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. LAN-to-LAN and LAN-to-MAN/WAN switches Figure 4.13

Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. The basic concept of a LAN switch Figure 4.14

Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Equilibrium throughput curve in slotted ALOHA Figure 4.15

Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Equilibrium contours for slotted ALOHA Figure 4.16

Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Example of a channel load line Figure 4.17

Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Example of a globally stable, lightly loaded system Figure 4.18

Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Bistable system: 2 locally stable & 1 unstable equilibrium points Figure 4.19

Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Behavior of systems which are (a) stable but overloaded (b) unstable with infinite users Figure 4.20