Broadcast-and-select networks. Each node is usually attached to two fibers: one to transmit, one to receive W WDM channels are available Tx and Rx operate.

Slides:



Advertisements
Similar presentations
Data and Computer Communications Eighth Edition by William Stallings Lecture slides by Lawrie Brown Chapter 16 – High Speed LANs.
Advertisements

Channel Allocation Protocols. Dynamic Channel Allocation Parameters Station Model. –N independent stations, each acting as a Poisson Process for the purpose.
The ALOHA Protocol “Free for all”: whenever station has a frame to send, it does so. –Station listens for maximum RTT for an ACK. –If no ACK after a specified.
EECC694 - Shaaban #1 lec #5 Spring Data Link In Broadcast Networks: The Media Access Sublayer Broadcast networks with multi-access (or random.
Ethernet – CSMA/CD Review
Multiple Access Methods. When nodes or stations are connected and use a common link (cable or air), called a multipoint or broadcast link, we need a.
LECTURE 11 CT1303 LAN. DYNAMIC MAC PROTOCOL No fixed assignment for transmission media or any network resources.. It allows transmission when needed.
Protocols Plesiochronous digital hierarchy (PDH) Synchronous digital hierarchy (SDH/SONET) Medium access control (MAC)
Communication Networks Lecture 5 NETW 501-L5: NETW 501-L5: Medium Access Control Dr.-Ing. Khaled Shawky Hassan Room: C3-222, ext: 1204,
1 K. Salah Module 4.2: Media Access Control The Media Access Control (MAC) sublayer –Random Access (CSMA), IEEE –Token Passing, IEEE Ch 13-
1 Pertemuan 13 Teknik Akses Jaringan - Random Matakuliah: H0174/Jaringan Komputer Tahun: 2006 Versi: 1/0.
MAC Protocols Media Access Control (who gets the use the channel) zContention-based yALOHA and Slotted ALOHA. yCSMA. yCSMA/CD. TDM and FDM are inefficient.
CS 5253 Workshop 1 MAC Protocol and Traffic Model.
Copyright © 2003, Dr. Dharma P. Agrawal and Dr. Qing-An Zeng. All rights reserved. 1 Chapter 6 Multiple Radio Access.
Distributed systems Module 1 -Basic networking Teaching unit 1 – LAN standards Ernesto Damiani University of Bozen-Bolzano Lesson 4 – Ethernet frame.
CMPE 150- Introduction to Computer Networks 1 CMPE 150 Fall 2005 Lecture 16 Introduction to Computer Networks.
EEC-484/584 Computer Networks Lecture 13 Wenbing Zhao
Studying Local Area Networks Via Media Access Control (MAC) SubLayer
ECE358: Computer Networks Spring 2012
CS 5253 Workshop 1 MAC Protocol and Traffic Model.
Networks: Local Area Networks1 LANs Studying Local Area Networks Via Media Access Control (MAC) SubLayer.
Medium Access Control Sublayer
Lecture 16 Random Access protocols r A node transmits at random at full channel data rate R. r If two or more nodes “collide”, they retransmit at random.
Enhanced CSMA Additional improvement  Use CSMA access  Listen while transmitting  Stop immediately if collision sensed  Called collision detection.
Chap 4 Multiaccess Communication (Part 1)
1 ECE453 – Introduction to Computer Networks Lecture 7 – Multiple Access Control (I)
Multiple Access Protocols Chapter 6 of Hiroshi Harada Book
1 Computer Communication & Networks Lecture 12 Datalink Layer: Multiple Access Waleed Ejaz
Chi-Cheng Lin, Winona State University CS412 Introduction to Computer Networking & Telecommunication Medium Access Control Sublayer.
4-1 Last time □ Link layer overview ♦ Services ♦ Adapters □ Error detection and correction ♦ Parity check ♦ Internet checksum ♦ CRC □ PPP ♦ Byte stuffing.
Chapter 4: Medium Access Control (MAC) Sublayer
Ch. 16 High-Speed LANs The Emergence of High- Speed LANs Trends –Computing power of PCs has continued to grow. –MIS organizations recognize the.
CHAPTER 4: THE MEDIUM ACCESS SUBLAYER 4.1: The Channel Allocation Problem 4.2: Multiple Access Protocols.
LECTURE9 NET301. DYNAMIC MAC PROTOCOL: CONTENTION PROTOCOL Carrier Sense Multiple Access (CSMA): A protocol in which a node verifies the absence of other.
© Janice Regan, CMPT 128, CMPT 371 Data Communications and Networking LANs 2: MAC protocols.
جلسه دهم شبکه های کامپیوتری به نــــــــــــام خدا.
Propagation Delay and Receiver Collision Analysis in WDMA Protocols I.E. Pountourakis, P.A. Baziana and G. Panagiotopoulos School of Electrical and Computer.
Medium Access Control NWEN302 Computer Network Design.
Layer 2 Technologies At layer 2 we create and transmit frames over communications channels Format of frames and layer 2 transmission protocols are dependent.
A High Performance Channel Sorting Scheduling Algorithm Based On Largest Packet P.G.Sarigiannidis, G.I.Papadimitriou, and A.S.Pomportsis Department of.
November 4, 2003APOC 2003 Wuhan, China 1/14 Demand Based Bandwidth Assignment MAC Protocol for Wireless LANs Presented by Ruibiao Qiu Department of Computer.
Demand Based Bandwidth Assignment MAC Protocol for Wireless LANs K.Murugan, B.Dushyanth, E.Gunasekaran S.Arivuthokai, RS.Bhuvaneswaran, S.Shanmugavel.
Chi-Cheng Lin, Winona State University CS 313 Introduction to Computer Networking & Telecommunication Medium Access Control Sublayer.
Medium Access Control Sub Layer
Multiple Access.
Chapter 6 Multiple Radio Access
Medium Access Control Protocols, Local Area Networks, and Wireless Local Area Networks Lecture Note 9.
STUMP: Exploiting Position Diversity in the Staggered TDMA Underwater MAC Protocol Kurtis Kredo II, Petar Djukic, Prasant Mohapatra IEEE INFOCOM 2009.
CS3502: Data and Computer Networks Local Area Networks - 1 introduction and early broadcast protocols.
Ch 12. Multiple Access. Multiple Access for Shared Link Dedicated link – Point-to-point connection is sufficient Shared link – Link is not dedicated –
CS3502: Data and Computer Networks Local Area Networks - 1 introduction and early broadcast protocols.
EE 122: Lecture 6 Ion Stoica September 13, 2001 (* this talk is based in part on the on-line slides of J. Kurose & K. Rose)
Carrier Sense Multiple Access Improve ALOHA by using carrier sense –Stations listen to the carrier before transmitting –If channel is busy, the station.
1 Ethernet CSE 3213 Fall February Introduction Rapid changes in technology designs Broader use of LANs New schemes for high-speed LANs High-speed.
Chapter 4 The Medum Access Sublayer. MA Sublayer Additional Reference –Local and Metropolitan Area Networks, William Stallings, Prentice Hall, 2000, 6th.
Medium Access Control Protocols, Local Area Networks, and Wireless Local Area Networks Lecture Note 10.
AN EFFICIENT TDMA SCHEME WITH DYNAMIC SLOT ASSIGNMENT IN CLUSTERED WIRELESS SENSOR NETWORKS Shafiq U. Hashmi, Jahangir H. Sarker, Hussein T. Mouftah and.
COMPUTER NETWORKS Data-link Layer (The Medium Access Control Sublayer) MAC Sublayer.
Multiple Access By, B. R. Chandavarkar, CSE Dept., NITK, Surathkal Ref: B. A. Forouzan, 5 th Edition.
Week3 The Medium Access Sublayer
Multiple Access Methods
CT301 LECTURE 8.
High Speed LANs – Ethernet and Token Ring
Services of DLL Framing Link access Reliable delivery
Multiple Access Methods
Link Layer and LANs Not everyone is meant to make a difference. But for me, the choice to lead an ordinary life is no longer an option 5: DataLink Layer.
7- chapter Seven Local Area Networks (LAN)
Chapter 6 Multiple Radio Access.
Multiple Access Control (MAC) Protocols
Chapter 12 Media Access Control (MAC)
Presentation transcript:

Broadcast-and-select networks

Each node is usually attached to two fibers: one to transmit, one to receive W WDM channels are available Tx and Rx operate on a single WDM channel at a time (to reduce electronic bandwidth) It is possible to observe collisions and contention – Collision: two or more transmitters transmit on the same channel at the same time – Contention: a single receiver must tune to two or more channels at the same time We need a Medium Access Control (MAC) protocol

Broadcast-and-select networks Nodes can be equipped with one or more tx and rx devices, which may be tunable or fixed Tunable txs and rxs are more expensive (and tunable usually cost more than tunable txs) For example: 2 fixed tx/rx per node allow to build a shuffle topology

Level of performance It is measured by Packet delay: The delay is specified from the start of the packet being transmitted at the source to the end of the packet being received at the destination and through put of network : data that are successfully received by their destination

Slot synchronization

Synchronization algorithm Predicts the time of arrival of the next sync pulse at its receiver Estimates the round trip delay A node transmits the information one round trip delay prior to the estimated time of arrival.

Slotted Aloha/Slotted Aloha protocol Some basic assumption No. of wavelength or channel, W<N Each node must have a fixed –tuned transmitter and receiver operating at control wavelength

Slotted Aloha/Slotted Aloha Aloha used in single channel broadcast network where any node that has a packet to send transmits it immediately. Whereas In slotted aloha time is divided into slots whose length is equal to the maximum sized packet In multichannel network The time is divided into slots for data as well as the control channel

Basic Slotted Aloha/Slotted Aloha protocol Operation: When a data to be send : Control packet is sent in control slot Data packet is sent in data slot Every node –Keeps listening to the control channel –When a transmission to its address is detected, it tunes the rx on channel λT This is called “tell-and-go” approach (data is assumed to be received after large propagation delays) There can be collisions and contention.

Basic Slotted Aloha/Slotted Aloha protocol

Control wavelength protocol : Slotted Aloha Data wavelength protocol: Slotted Aloha Thus the name Slotted Aloha / Slotted Aloha

Modified SA/SA To avoid useless transmissions on the data channels after collisions on control and data channels, it is possible to use a “wait-and- see” approach: do not transmit data until the control frame is received back (after a propagation delay); we get: higher throughput higher access delays

Access delays Defined as the delay between the time at which a packet is available for transmission at a node and the time at which it is first transmitted

Through put analysis Some assumptions are required 1.Independent transmission 2.Large “n” 3.Uniform traffic

Independent transmission In any slot and for any node the probability that the node has a packet for transmission is p, independent of all other slots and all other nodes.

Large “n” No. of nodes in the network n is very large compared to W Assume that W is fixed but n  ∞ and p  0 then The expected no. packets in the network is G  np

Uniform traffic Data packets is equally likely to be transmitted on any one of the W data channels

Throughput analysis Expected no. of data packets that are successful in any data slot for basic SA/SA is LGe -G /W.(e -G/W )2 (L-1) And for modified SA/SA LGe -G /W.(1- Ge -G /W)2 (L-1)

DT-WDMA Dynamic Time-Wavelength Division Multiaccess This protocol assume that the – Number of nodes n is equal to the number of wavelengths W. – Each node has a 1 Fixed Tr, 1 Tunable Rx and 1 Fixed Rx for the control channel – The size of the data slots is n times the control slots. – The data slots do not overlap in time. When ever a node, say x i, has a data packet to send, it sends a control packet in a control slot and the data packet in the data slot immediately following it. Each node continuously monitors the control channel. Thus when node x j, receives a control packet send by node x i it knows that the next data slot has a packet intended for it being transmitted on wavelength I so it tunes its TR to that wavelength. Features : Data packets never collide also control packet never collide.

Scheduling protocol is a self study...

Test beds TopologyNo.of wavelength Wavelength Spacing Bit Rate per wavelength LambdanetStar18(18)2nm1.5Gb/s NTTStar100(100)10GHz622 Mb/s Rainbow IStar12(32)1nm300 Mb/s Rainbow IIStar4(32)1nm1 Gb/s Starnet IStar2(80)10GHz1.25/2.5Gb/s BBCInterconnected Star -(16)4nm2.5 Gb/s