LECTURE 13 CT1303 LAN. DYNAMIC MAC PROTOCOL: CONTENTION PROTOCOL CSMA\CA Carrier Sense Multiple Access\Collision Avoidance CSMA\CA Each station will sense.

Slides:



Advertisements
Similar presentations
Nick Feamster CS 4251 Computer Networking II Spring 2008
Advertisements

Chapter 13 Metropolitan Area Networks IEEE DQDB (Distributed Queues, Dual Bus) SMDS (Switched Megabit Data Services) WCB/McGraw-Hill  The McGraw-Hill.
Computer Networking (Appendix C) Objectives
Multiple Access Methods. When nodes or stations are connected and use a common link (cable or air), called a multipoint or broadcast link, we need a.
LECTURE 11 CT1303 LAN. DYNAMIC MAC PROTOCOL No fixed assignment for transmission media or any network resources.. It allows transmission when needed.
LECTURE 10 CT1303 LAN. WIRELESS NETWORK Is any type of computer network that uses wireless data connections for connecting network nodes and sharing network.
Channel Access Methods When several devices are connected to a single channel, there must be some rules to govern these devices as they access, transmit,
1 K. Salah Module 4.2: Media Access Control The Media Access Control (MAC) sublayer –Random Access (CSMA), IEEE –Token Passing, IEEE Ch 13-
Distributed systems Module 1 -Basic networking Teaching unit 1 – LAN standards Ernesto Damiani University of Bozen-Bolzano Lesson 2 – LAN Medium Access.
Internetworking Fundamentals (Lecture #4) Andres Rengifo Copyright 2008.
Chapter 14 LAN Systems Ethernet (CSMA/CD) ALOHA Slotted ALOHA CSMA
Copyright © 2003, Dr. Dharma P. Agrawal and Dr. Qing-An Zeng. All rights reserved. 1 Chapter 6 Multiple Radio Access.
Ethernet: CSMA/CD (Carrier Sense Multiple Access with Collision Detection) Access method: method of controlling how network nodes access communications.
EE 4272Spring, 2003 Chapter 14 LAN Systems Ethernet (CSMA/CD)  ALOHA  Slotted ALOHA  CSMA  CSMA/CD Token Ring /FDDI Fiber Channel  Fiber Channel Protocol.
CMPE 150- Introduction to Computer Networks 1 CMPE 150 Fall 2005 Lecture 16 Introduction to Computer Networks.
12.1 Chapter 12 Multiple Access Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Semester EEE449 Computer Networks The Data Link Layer Part 2: Media Access Control En. Mohd Nazri Mahmud MPhil (Cambridge, UK) BEng (Essex,
Chapter 8 LAN Technologies and Network Topology Direct Point-to-Point Communication Local Area Networks (LANs) LAN Topologies Ethernet Token Ring FDDI.
1 Computer Networks Course: CIS 3003 Fundamental of Information Technology.
Network Topologies An introduction to Network Topologies and the Link Layer.
1 ECE453 – Introduction to Computer Networks Lecture 7 – Multiple Access Control (I)
Wireless Medium Access. Multi-transmitter Interference Problem  Similar to multi-path or noise  Two transmitting stations will constructively/destructively.
1 Computer Communication & Networks Lecture 12 Datalink Layer: Multiple Access Waleed Ejaz
1 LAN Technologies and Network Topology. 2 Direct Point-to-Point Communication.
Computer Networks NYUS FCSIT Spring 2008 Igor TRAJKOVSKI, Ph.D. Associate Professor
LECTURE9 NET301. DYNAMIC MAC PROTOCOL: CONTENTION PROTOCOL Carrier Sense Multiple Access (CSMA): A protocol in which a node verifies the absence of other.
CWNA Guide to Wireless LANs, Second Edition
Introduction network Protocol
LAN technologies and network topology LANs and shared media Locality of reference Star, bus and ring topologies Medium access control protocols.
Lesson 3—Networking BASICS1 Networking BASICS Network Design Unit 2 Lesson 3.
The Medium Access Control Sublayer Chapter 4. The Channel Allocation Problem Static Channel Allocation Dynamic Channel Allocation  Delay for the divided.
Data and Computer Communications Ninth Edition by William Stallings Data and Computer Communications, Ninth Edition by William Stallings, (c) Pearson Education.
November 4, 2003APOC 2003 Wuhan, China 1/14 Demand Based Bandwidth Assignment MAC Protocol for Wireless LANs Presented by Ruibiao Qiu Department of Computer.
Day10 LAN. Why? Allow more than one machine to share –Resources –Internet connectivity –Information.
Chapter 6 Multiple Radio Access
WAN & Technology Introduction of WAN Switching & Routing Congestion control WAN Technologies: DQDB (Distributed queue dual bus) SDH, SONET, ATM, Frame.
1 Chap. 4 Data link layer 3. 2 MAC(medium access control) model MAC  If two nodes are transmitted simultaneously, collision of two frames is occurred.
CCNA Guide to Cisco Networking Chapter 2: Network Devices.
5: DataLink Layer 5a-1 Multiple Access protocol. 5: DataLink Layer 5a-2 Multiple Access Links and Protocols Three types of “links”: r point-to-point (single.
WIRELESS COMMUNICATION Husnain Sherazi Lecture 1.
LECTURE9 NET301 11/5/2015Lect 9 NET DYNAMIC MAC PROTOCOL: CONTENTION PROTOCOL Carrier Sense Multiple Access (CSMA): A protocol in which a node verifies.
DQDB Network Security.
MAC Layer Protocols for Wireless Networks. What is MAC? MAC stands for Media Access Control. A MAC layer protocol is the protocol that controls access.
Data Communication and Networks Chapter 5. What’s a Network? a network consists of two or more computers that are connected together to share information.
Distributed-Queue Access for Wireless Ad Hoc Networks Authors: V. Baiamonte, C. Casetti, C.-F. Chiasserini Dipartimento di Elettronica, Politecnico di.
THE MEDIUM ACCESS CONTROL SUBLAYER 4.1 THE CHANNEL ALLOCATION PROBLEM 4.2 MULTIPLE ACCESS PROTOCOLS.
COMPUTER NETWORKS Lecture-8 Husnain Sherazi. Review Lecture 7  Shared Communication Channel  Locality of Reference Principle  LAN Topologies – Star.
Rehab AlFallaj.  Is any type of computer network that uses wireless data connections for connecting network nodes and sharing network resources.  So,
Chapter 8 LAN Technologies and Network Topology
A Taxonomy of Mechanisms for Multi-Access
Multiple Access Methods
Lecture #9 MAC Protocols
Network Protocols.
Chapter 12 Multiple Access.
Lab 7 – CSMA/CD (Data Link Layer Layer)
CT301 LECTURE 8.
Computer Communication Networks
Part III Datalink Layer 10.
Net301 lecture9 11/5/2015 Lect 9 NET301.
Computer Communication & Networks
IEEE Wireless LAN wireless LANs: untethered (often mobile) networking
Multiple Access Methods
The Medium Access Control Sublayer
Wireless LAN Simulation IEEE MAC Protocol
Chapter 13 Metropolitan Area Networks
Multiple Access Methods
Chapter 6 Multiple Radio Access.
Multiple Access Control (MAC) Protocols
Part III Datalink Layer 10.
Presentation transcript:

LECTURE 13 CT1303 LAN

DYNAMIC MAC PROTOCOL: CONTENTION PROTOCOL CSMA\CA Carrier Sense Multiple Access\Collision Avoidance CSMA\CA Each station will sense the channel and inform all the rest station in the network that it will start transmitting data over the channel. In this protocol the collision may occur between Request To Send RTS frames or Confirm to Send CTS frames. Collisions don’t occur between data frames.

DYNAMIC MAC PROTOCOL: CONTENTION PROTOCOL CSMA\CA Advantages: Collisions do NOT occur between data frames. Transmission on demand only. Channel utilization is efficient when request and confirm to send done successfully. Used mostly and better for Wireless networks. Disadvantages: Unlimited waste of time (waiting) if nodes connected are large. Used in Wireless LANs and Apple Talk for apple devices.

CONTENTION PROTOCOL ADVANTAGES AND DISADVANTAGES: Contention protocol advantages and disadvantages: Advantages: Transmission on demand. Better used for discontinuous transmission of signal and data (computer networks in general) Better used in networks with light traffic. Disadvantages: Large number of connected nodes results in not utilizing the channel effectively. Wasted time (waiting) Sensing channels becomes difficult in large and long network channels

DYNAMIC MAC PROTOCOL: RESERVATION PROTOCOLS: To better channel utilizing and eliminate attenuation may occur in network channels due to collisions; Distributed Queue Dual Bus (DQDB): This protocol is intended to be used on a dual-bus configuration ( unidirectional) fiber optic networks. Two buses, each one in one direction, and each node is connected to the two buses. Centralized unit for each bus to control transmission.

DYNAMIC MAC PROTOCOL: RESERVATION PROTOCOLS: DQDB

Each centralized unit will send empty frames to the channel, which can be used by connected nodes to transmit data. Each frame has 2 flags ; one to identify whether the frame is empty and ready for used or has been reserved by another node. The other flag identifies if there is a Reservation request of frames on the other channel (bus). This protocol needed 2 counters in each connected node, that determine the number previous reservations for each channel, the counters will be incremented each time a frame with reservation flag on passes the connected node.

DYNAMIC MAC PROTOCOL: RESERVATION PROTOCOLS: DQDB When a node wants to send data to another node: Chooses which channel will be used. Turn on the reservation flag on a frame on the other channel. The node will then use one of the empty frames with its data. This protocol is used in Ring networks, LAN and MAN networks.

DYNAMIC MAC PROTOCOL: RESERVATION PROTOCOLS: DQDB Advantages: Transmission guaranteed. Limit delay time. Channel utilization %100 Disadvantages: Number of software needed for each connected node to control and determine the location of the node in the network. The need for cartelized unit to control frames. If the cartelized unit stopped, the protocol is stopped.