CSE 461: Multiple Access Networks. This Lecture  Key Focus: How do multiple parties share a wire?  This is the Medium Access Control (MAC) portion of.

Slides:



Advertisements
Similar presentations
Nick Feamster CS 4251 Computer Networking II Spring 2008
Advertisements

Ethernet “dominant” LAN technology: cheap $20 for 100Mbs!
Channel Allocation Protocols. Dynamic Channel Allocation Parameters Station Model. –N independent stations, each acting as a Poisson Process for the purpose.
Computer Networks Ethernet I Professor Hui Zhang
The ALOHA Protocol “Free for all”: whenever station has a frame to send, it does so. –Station listens for maximum RTT for an ACK. –If no ACK after a specified.
Ethernet – CSMA/CD Review
LECTURE 11 CT1303 LAN. DYNAMIC MAC PROTOCOL No fixed assignment for transmission media or any network resources.. It allows transmission when needed.
1 K. Salah Module 4.2: Media Access Control The Media Access Control (MAC) sublayer –Random Access (CSMA), IEEE –Token Passing, IEEE Ch 13-
1 Shared Access Networks Outline Bus (Ethernet) Token ring (FDDI) Wireless (802.11)
MAC Protocols Media Access Control (who gets the use the channel) zContention-based yALOHA and Slotted ALOHA. yCSMA. yCSMA/CD. TDM and FDM are inefficient.
CMPE 150- Introduction to Computer Networks 1 CMPE 150 Fall 2005 Lecture 17 Introduction to Computer Networks.
1 Computer Networks Local Area Networks. 2 A LAN is a network: –provides Connectivity of computers, mainframes, storage devices, etc. –spans limited geographical.
Chapter 14 LAN Systems Ethernet (CSMA/CD) ALOHA Slotted ALOHA CSMA
Copyright © 2003, Dr. Dharma P. Agrawal and Dr. Qing-An Zeng. All rights reserved. 1 Chapter 6 Multiple Radio Access.
Spring 2002CS 4611 Shared Access Networks Outline Bus (Ethernet) Token ring (FDDI) Wireless (802.11)
CSE 561 – Multiple Access David Wetherall Spring 2000.
20 – Collision Avoidance, : Wireless and Mobile Networks6-1.
EE 122: Ethernet and Ion Stoica September 18, 2002 (* this talk is based in part on the on-line slides of J. Kurose & K. Rose)
1 Link Layer Message M A B Problem: Given a message M at a node A consisting of several packets, how do you send the packets to a “neighbor” node B –Neighbor:
EE 4272Spring, 2003 Chapter 14 LAN Systems Ethernet (CSMA/CD)  ALOHA  Slotted ALOHA  CSMA  CSMA/CD Token Ring /FDDI Fiber Channel  Fiber Channel Protocol.
CMPE 150- Introduction to Computer Networks 1 CMPE 150 Fall 2005 Lecture 16 Introduction to Computer Networks.
EEC-484/584 Computer Networks Lecture 13 Wenbing Zhao
Spanning Tree and Wireless EE122 Discussion 10/28/2011.
Semester EEE449 Computer Networks The Data Link Layer Part 2: Media Access Control En. Mohd Nazri Mahmud MPhil (Cambridge, UK) BEng (Essex,
1 Computer Networks Course: CIS 3003 Fundamental of Information Technology.
Lecture 16 Random Access protocols r A node transmits at random at full channel data rate R. r If two or more nodes “collide”, they retransmit at random.
CSE 461 University of Washington1 Topic How do nodes share a single link? Who sends when, e.g., in WiFI? – Explore with a simple model Assume no-one is.
Lecture 8: Ethernet and Token Ring Networks. Ethernet Carrier Sense, Multiple Access and Collision Detect (CSMA/CD) LAN Ethernet Standard-DEC, Intel,
Enhanced CSMA Additional improvement  Use CSMA access  Listen while transmitting  Stop immediately if collision sensed  Called collision detection.
1 ECE453 – Introduction to Computer Networks Lecture 7 – Multiple Access Control (I)
جلسه دوازدهم شبکه های کامپیوتری به نــــــــــــام خدا.
9/11/2015 5:55 AM1 Ethernet and CSMA/CD CSE 6590 Fall 2010.
Ethernet. Ethernet Goals Simplicity Low Cost Compatibility Address flexibility Fairness –All nodes have equal access to the network High speed Stability.
Wireless Medium Access. Multi-transmitter Interference Problem  Similar to multi-path or noise  Two transmitting stations will constructively/destructively.
1 LAN Technologies and Network Topology. 2 Direct Point-to-Point Communication.
1 Computer Communication & Networks Lecture 13 Datalink Layer: Local Area Network Waleed Ejaz
Chi-Cheng Lin, Winona State University CS412 Introduction to Computer Networking & Telecommunication Medium Access Control Sublayer.
Ch. 16 High-Speed LANs The Emergence of High- Speed LANs Trends –Computing power of PCs has continued to grow. –MIS organizations recognize the.
CHAPTER 4: THE MEDIUM ACCESS SUBLAYER 4.1: The Channel Allocation Problem 4.2: Multiple Access Protocols.
LECTURE9 NET301. DYNAMIC MAC PROTOCOL: CONTENTION PROTOCOL Carrier Sense Multiple Access (CSMA): A protocol in which a node verifies the absence of other.
CSE 461 University of Washington1 Topic How do nodes share a single link? Who sends when, e.g., in WiFI? – Explore with a simple model Assume no-one is.
LAN technologies and network topology LANs and shared media Locality of reference Star, bus and ring topologies Medium access control protocols.
The Medium Access Control Sublayer Chapter 4. The Channel Allocation Problem Static Channel Allocation Dynamic Channel Allocation  Delay for the divided.
Link Layer: MAC Ilam University Dr. Mozafar Bag-Mohammadi.
Chi-Cheng Lin, Winona State University CS 313 Introduction to Computer Networking & Telecommunication Medium Access Control Sublayer.
Networks and Protocols CE Week 2b. Topologies, CSMA/CD, CSMA/CA.
جلسه یازدهم شبکه های کامپیوتری به نــــــــــــام خدا.
4: DataLink Layer1 Multiple Access Links and Protocols Three types of “links”: r point-to-point (single wire, e.g. PPP, SLIP) r broadcast (shared wire.
17 - Winter 2005 ECE ECE 766 Computer Interfacing and Protocols 1 Local Area Networks Need for high performance communications for physically close devices.
Chapter 6 Multiple Radio Access
5: DataLink Layer 5a-1 Multiple Access protocol. 5: DataLink Layer 5a-2 Multiple Access Links and Protocols Three types of “links”: r point-to-point (single.
LECTURE9 NET301 11/5/2015Lect 9 NET DYNAMIC MAC PROTOCOL: CONTENTION PROTOCOL Carrier Sense Multiple Access (CSMA): A protocol in which a node verifies.
Medium Access Control in Wireless networks
CSE 461 University of Washington1 Topic How do nodes share a single link? Who sends when, e.g., in WiFI? – Explore with a simple model Assume no-one is.
EE 122: Lecture 6 Ion Stoica September 13, 2001 (* this talk is based in part on the on-line slides of J. Kurose & K. Rose)
MAC Layer Protocols for Wireless Networks. What is MAC? MAC stands for Media Access Control. A MAC layer protocol is the protocol that controls access.
1 Ethernet CSE 3213 Fall February Introduction Rapid changes in technology designs Broader use of LANs New schemes for high-speed LANs High-speed.
THE MEDIUM ACCESS CONTROL SUBLAYER 4.1 THE CHANNEL ALLOCATION PROBLEM 4.2 MULTIPLE ACCESS PROTOCOLS.
COMPUTER NETWORKS Lecture-8 Husnain Sherazi. Review Lecture 7  Shared Communication Channel  Locality of Reference Principle  LAN Topologies – Star.
1 CS716 Advanced Computer Networks By Dr. Amir Qayyum.
COMPUTER NETWORKS Data-link Layer (The Medium Access Control Sublayer) MAC Sublayer.
Example DLL Protocols 1. High-Level Data Link Control (HDLC).
CT301 LECTURE 8.
CS 457 – Lecture 6 Ethernet Spring 2012.
Net301 lecture9 11/5/2015 Lect 9 NET301.
The Medium Access Control Sublayer
7- chapter Seven Local Area Networks (LAN)
Dr. John P. Abraham Professor UTPA
Distributed Systems 6. Medium Access Control Sublayer
Presentation transcript:

CSE 461: Multiple Access Networks

This Lecture  Key Focus: How do multiple parties share a wire?  This is the Medium Access Control (MAC) portion of the Link Layer  Examples of access protocols: 1. Aloha 2. CSMA variants 3. Classic Ethernet 4. Wireless Physical Data Link Network Transport Session Presentation Application

1. ALOHA  Wireless links between the Hawaiian islands in the 70s  Want distributed allocation  no special channels, or single point of failure  Aloha protocol:  Just send when you have data!  There will be some collisions of course …  Detect error frames and retransmit a random time later  Simple, decentralized and works well for low load  For many users, analytic traffic model, max efficiency is 18%

2. Carrier Sense Multiple Access  We can do better by listening before we send (CSMA)  good defense against collisions only if “a” is small (LANs)  “a” parameter: number of packets that fit on the wire  a = bandwidth * delay / packet size  Small ( >1) for satellites X collision (wire) AB

What if the Channel is Busy?  1-persistent CSMA  Wait until idle then go for it  Blocked senders can queue up and collide  p-persistent CSMA  If idle send with prob p until done; assumed slotted time  Choose p so p * # senders < 1; avoids collisions at cost of delay

CSMA with Collision Detection  Even with CSMA there can still be collisions.  For wired media we can detect all collisions and abort (CSMA/CD):  Requires a minimum frame size (“acquiring the medium”)  B must continue sending (“jam”) until A detects collision X collision (wire) AB Time for B to detect A’s transmission

3. Classic Ethernet  IEEE standard wired LAN (1-persistent CSMA/CD)  Classic Ethernet: 10 Mbps over coaxial cable  Manchester encoding, preamble, 32 bit CRC  Newer versions are much faster  Fast (100 Mbps), Gigabit (1 Gbps)  Modern equipment isn’t one long wire  hubs and switches nodes (wire) Hub or Switch

Modern (Ethernet II) Frames  Min frame 64 bytes, max 1500 bytes  Max length 2.5km, max between stations 500m (repeaters)  Addresses unique per adaptor; 6 bytes; globally assigned  Broadcast media is readily tapped:  Promiscuous mode; multicast addresses CRC (4)Type (2)Preamble (8)Payload (var)Source (6)Dest (6)Pad (var)

Binary Exponential Backoff  Build on 1-persistent CSMA/CD  On collision: jam and exponential backoff  Backoff:  First collision: wait 0 or 1 frame times at random and retry  Second time: wait 0, 1, 2, or 3 frame times  Nth time (N<=10): wait 0, 1, …, 2 N -1 times  Max wait 1023 frames, give up after 16 attempts  Scheme balances average wait with load

Ethernet Capture  Randomized access scheme is not fair  Stations A and B always have data to send  They will collide at some time  Suppose A wins and sends, while B backs off  Next time they collide and B’s chances of winning are halved!

Ethernet Performance  Much better than Aloha or CSMA  Works very well in practice  Source of protocol inefficiency: collisions  More efficient to send larger frames Acquire the medium and send lots of data  Less efficient as the network grows in terms of frames recall “a” = delay * bandwidth / frame size “a” grows as the path gets longer (satellite) “a” grows as the bit rates increase (Fast, Gigabit Ethernet)

4. Wireless Communication Wireless is more complicated than wired … 1. Cannot detect collisions  Transmitter swamps co-located receiver 2. Different transmitters have different coverage areas  Asymmetries lead to hidden/exposed terminal problems

 A and C can both send to B but can’t hear each other  A is a hidden terminal for C and vice versa  CSMA will be ineffective – want to sense at receiver Hidden Terminals ABC transmit range

Exposed Terminals  B, C can hear each other but can safely send to A, D ABC transmit range D

CSMA with Collision Avoidance  Since we can’t detect collisions, we avoid them  CSMA/CA as opposed to CSMA/CD  Not greedy like Ethernet  CS: listen before transmitting.  When medium busy, choose random backoff interval  Wait for that many idle timeslots to pass before sending  CA: transmit short “jamming” signal before sending frame  essentially reserves medium, let’s others know your intent to transmit  Collisions can be inferred  Use CRC and ACK from receiver to infer “no collision”  on collision, binary exponential backoff like Ethernet

1. B stimulates C with Request To Send (RTS) 2. A hears RTS and defers to allow the CTS 3. C replies to B with Clear To Send (CTS) 4. D hears CTS and defers to allow the data 5. B sends to C RTS / CTS Protocols (MACA) BCD RTS CTS A

 Emerging standard with a bunch of options/features …  Wireless plus wired system or pure wireless (ad hoc)  Avoids collisions (CSMA/CA (p-persistence), RTS/CTS) Wireless LANs Basestation

5. Contention-free Protocols  Collisions are the main difficulty with random schemes  Inefficiency, limit to scalability  Q: Can we avoid collisions?  A: Yes. By taking turns or with reservations  Token Ring / FDDI, DQDB  More generally, what else might we want?  Deterministic service, priorities/QOS, reliability

Token Ring (802.5)  Token rotates permission to send around node  Sender injects packet into ring and removes later  Maximum token holding time (THT) bounds access time  token release after sending data  Round robin service, acknowledgments and priorities  Monitor nodes ensure health of ring A B C D nodes Direction of transmission

FDDI (Fiber Distributed Data Interface)  Roughly a large, fast token ring  100 Mbps and 200km vs 4/16 Mbps and local  Dual counter-rotating rings for redundancy  Complex token holding policies for voice etc. traffic  Token ring advantages  No contention, bounded access delay  Supports fair, reserved, priority access  Disadvantages  Complexity, reliability, scalability Break!

Key Concepts  Wireless communication is relatively complex  No collision detection, hidden and exposed terminals  There are contention-free MAC protocols  Based on turn taking and reservations, not randomization