Presentation is loading. Please wait.

Presentation is loading. Please wait.


Similar presentations

Presentation on theme: "I N THE N AME OF G OD C OMPUTER N ETWORKS C HAPTER 4: T HE M EDIUM A CCESS C ONTROL S UBLAYER Dr. Shahriar Bijani Shahed University April 2014."— Presentation transcript:


2 References: Computer Networks A. S. Tanenbaum and D. J. Wetherall, Computer Networks (5th Edition), Pearson Education, the book slides, 2011. Chapter 6, Data Communications and Computer Networks: A Business User's Approach, 6th Edition B. A. Forouzan, Multiple Access, 5th Edition, McGraw Hill, lecture slides, 2012. 2


4 D ATA L INK L AYER Data link layer divided into two functionality-oriented sublayers 4 Link Layer Control (LLC) Responsible for error and flow control Multiple Access Control (MAC) Responsible for framing and MAC address and Multiple Access Control

5 5 M ULTIPLE A CCESS P ROBLEM  When two or more computers transmit at the same time, their frames may interfere(collide) and the link bandwidth is wasted during collision  How to coordinate the access of multiple sending/receiving nodes to the shared link? Solution: We need a protocol to coordinate the transmission of the active nodes These protocols are called Medium or Multiple Access Control (MAC) Protocols belong to a sublayer of the data link layer called MAC (Medium Access Control) What is expected from Multiple Access Protocols: Main task is to minimize collisions in order to utilize the bandwidth by: Determining when a station can use the link (medium) what a station should do when the link is busy what the station should do when it is involved in collision

6 6 Medium sharing techniques Static channelization Dynamic medium access control Scheduling Random access A PPROACHES TO M EDIA S HARING Partition medium Dedicated allocation to users Satellite transmission Cellular Telephone Polling: take turns Reservation (Request for slot in transmission schedule) Token ring Wireless LANs ALOHA Loose coordination Send, wait, retry if necessary Ethernet


8 Satellite Channel uplink f in downlink f out C HANNELIZATION E XAMPLE : S ATELLITE 8

9 Multitapped Bus R ANDOM A CCESS Transmit when ready Collision! Transmissions can occur; need retransmission strategy

10 R ANDOM A CCESS Random Access (or contention) Protocols: No station is superior to another station and none is assigned the control over another. A station with a frame to be transmitted can use the link directly based on a procedure defined by the protocol to make a decision on whether or not to send.

11 R ANDOM A CCESS : ALOHA P ROTOCOLS It was designed for wireless LAN and can be used for any shared medium Pure ALOHA Protocol: All frames from any station are of fixed length (L bits) Stations transmit at equal transmission time (all stations produce frames with equal frame lengths). A station that has data can transmit at any time After transmitting a frame, the sender waits for an acknowledgment for the time out equal to the maximum round-trip propagation delay = 2* t prop If no ACK was received, sender assumes that the frame or ACK has been destroyed and resends that frame after it waits for a random amount of time If station fails to receive an ACK after repeated transmissions, it gives up Channel utilization (= efficiency = Throughput) is the percentage of the transmitted frames that arrive successfully (without collisions) or the percentage of the channel bandwidth that will be used for transmitting frames without collisions ALOHA Maximum channel utilization is 18% (i.e, if the system produces F frames/s, then 0.18 * F frames will arrive successfully on average without the need of retransmission).

12 M AXIMUM P ROPAGATION D ELAY Maximum propagation delay(t prop ): time it takes for a bit of a frame to travel between the two most widely separated stations. The farthest station Station B receives the first bit of the frame at time t= t prop

13 Pure ALOHA In pure ALOHA, frames are transmitted at completely arbitrary times.

14 C RITICAL TIME FOR PURE ALOHA 14 If the frame transmission time is T sec, then the vulnerable time is = 2 T sec. This means no station should send during the T-sec before and during the T-sec period that the current station is sending.

15 Procedure for ALOHA protocol

16 R ANDOM A CCESS – S LOTTED ALOHA Time is divided into slots equal to a frame transmission time (T fr ) A station can transmit at the beginning of a slot only If a station misses the beginning of a slot, it has to wait until the beginning of the next time slot. A central clock or station informs all stations about the start of a each slot Maximum channel utilization is 37%

17 In danger (critical) time for slotted ALOHA protocol

18 18

19 T HROUGHPUT C ALCULATION 19 The throughput ( S) for pure ALOHA is S = G × e −2G. The maximum throughput S max = 0.184 when G= (1/2). G = Average number of frames generated by the system (all stations) during one frame transmission time The throughput for slotted ALOHA is S = G × e −G. The maximum throughput S max = 0.368 when G = 1.

20 T HROUGHPUT C ALCULATION Throughput versus offered traffic for ALOHA systems. 20 (offered load rate= new frames+ retransmitted = Total frames presented to the link per the transmission time of a single frame)

21 Advantage of ALOHA protocols A node that has frames to be transmitted can transmit continuously at the full rate of channel (R bps) if it is the only node with frames Simple to be implemented No master station is needed to control the medium Disadvantage If (M) nodes want to transmit, many collisions can occur and the rate allocated for each node will not be on average R/M bps This causes low channel utilization

22 C ARRIER S ENSE M ULTIPLE A CCESS (CSMA) In LANs, propagation time is very small If a station send a frame, other stations know immediately so they can wait before start sending So, a station with frames to be sent, should sense the medium for the presence of another transmission (carrier) before its own transmission  Vulnerable time for CSMA = the maximum propagation time  The longer propagation delay = the worse performance 22

23 C ARRIER S ENSE M ULTIPLE A CCESS (CSMA) Different CSMA protocols: Non-Persistent CSMA 1-Persistent CSMA p-Persistent CSMA 23

24 N ON - PERSISTENT CSMA  A station who wants to send a frame, should sense the medium 1. If medium is idle, transmit; otherwise, go to 2 2. If medium is busy, (backoff) wait a random amount of time and repeat ‘1’  Performance: Random delays reduces probability of collisions Bandwidth is wasted if waiting time (backoff) is large because medium will remain idle following end of transmission even if one or more stations have frames to send 24

25 1- PERSISTENT CSMA To avoid idle channel time Station wishing to transmit listens to the medium: 1. If medium idle, transmit immediately; 2. If medium busy, continuously listen until medium becomes idle; then transmit immediately with probability 1 Performance  1-persistent stations are selfish  If two or more stations becomes ready at the same time, collision guaranteed 25

26 P-persistent CSMA o Time is divided to slots where each time unit (slot) typically equals maximum propagation delay o Station wishing to transmit listens to the medium: 1. If medium idle,  transmit with probability (p), OR  wait one time unit (slot) with probability (1 – p), then repeat step1. 2. If medium busy, continuously listen until idle and repeat step 1 o Performance Reduces the possibility of collisions like non-persistent Reduces channel idle time like 1-persistent


28 C OMPARISON Comparison of the channel utilization versus load for various random access protocols. 28

29 CSMA WITH C OLLISION D ETECTION (CSMA/CD) All previous CSMA protocols have an inefficiency:  If a collision has occurred, the channel is unstable until colliding packets have been fully transmitted CSMA/CD solve the problem as follows:  While transmitting, the sender is listening to medium for collisions.  Sender stops transmission if collision has occurred reducing waste of channel. CSMA/CD is Widely used for bus topology LANs (IEEE 802.3, Ethernet). 29

30 of its own signal, it means collision occurred

31 CSMA/CD P ROTOCOL Use one of the CSMA algorithms (non-persistent, 1-persistent, p-persistent) for transmission If a station detects a collision during its transmission then: Abort transmission and Transmit a jam signal (48 bit) to notify other stations of collision so that they will discard the transmitted frame also to make sure that the collision signal will stay until detected by the furthest station. After sending the jam signal, backoff (wait) for a random amount of time, then Transmit the frame again 31

32 CSMA/CD Question: How long does it take to detect a collision? Answer: In the worst case, twice the maximum propagation delay of the medium Note: a = maximum propagation delay 32

33 R ESTRICTIONS OF CSMA/CD Packet transmission time should be at least as long as the time needed to detect a collision (2 * maximum propagation delay + jam sequence transmission time) Otherwise, CSMA/CD does not have an advantage over CSMA 33

34 S CHEDULING (C ONTROLLED A CCESS ) P ROTOCOLS Provides in order access to shared medium so that every station has chance to transfer (fair protocol) Eliminates collision completely 3 methods for controlled access: 1. Reservation 2. Polling 3. Token Passin g 34

35 1- R ESERVATION Basic Bit-Map Protocol Each contention period consists of exactly N slots. If station i has a frame to send, it transmits a 1 bit during the slot i. No other station is allowed to transmit during this slot. Regardless of what station i does, station j gets the opportunity to transmit a 1 bit during slot j, but only if it has a frame queued. 35

36 B INARY C OUNTDOWN The binary countdown protocol. A dash indicates silence.

37 2- P OLLING Stations take turns accessing the medium Two models: Centralized and distributed polling Centralized polling  One device is assigned as primary station and the others as secondary stations  All data exchanges are done through the primary  When the primary has a frame to send it sends a select frame that includes the address of the intended secondary  When the primary is ready to receive data it sends a Poll frame for each device to ask if it has data to send or not. If yes, data will be transmitted otherwise NAK is sent.  Polling can be done in order (Round-Robin) or based on predetermined order 37

38 Inbound line Outbound line Primary station Secondary Stations 2- P OLLING 1 2 3 M Poll 1 Data from 1 Poll 2 Data from 2 Data to M

39 3- T OKEN -P ASSING  Sort of distributed polling  Station Interface is in two states:  Listen state: Listen to the arriving bits and check the destination address to see if it is its own address. If yes the frame is copied to the station otherwise it is passed through the output port to the next station.  Transmit state: station captures a special frame called free token and transmits its frames. Sending station is responsible for reinserting the free token into the ring medium and for removing the transmitted frame from the medium. 39

40 40 Ring networks 3- T OKEN -P ASSING token Station that holds token transmits into ring token Data to M

41 T OKEN R ING VERSUS E THERNET (CSMA/CD) Pros: Token Ring networks are deterministic in nature -nodes may only transmit at certain well defined times. Result is high bandwidth efficiency. Up to 90% in Token Ring, 40% in Ethernet. Guaranteed sequential access to network eliminates fluctuating response times experienced on other network topologies. Token Ring performance does not decline to the same extent as Ethernet when network traffic increases. i.e: at high loads, the collisions of data frames on Ethernet networks becomes a major problem and can seriously affect the throughput. By its nature Token Ring has a higher reliability, the ring can continue normal operation in most cases despite any single fault. Cons: Ethernet has an advantage over Token Ring : the cost of network equipment is lower for Ethernet. Token Ring networks are more expensive to set up and maintain... Advances in Ethernet technology have tended to be much more rapid than Token Ring (e.g. Gigabit Ethernet). High Speed Token Ring technologies are being developed (100Mbps).

Download ppt "I N THE N AME OF G OD C OMPUTER N ETWORKS C HAPTER 4: T HE M EDIUM A CCESS C ONTROL S UBLAYER Dr. Shahriar Bijani Shahed University April 2014."

Similar presentations

Ads by Google