Lecture 9: Multiple Access Protocols

Slides:



Advertisements
Similar presentations
Channel Allocation Protocols. Dynamic Channel Allocation Parameters Station Model. –N independent stations, each acting as a Poisson Process for the purpose.
Advertisements

The ALOHA Protocol “Free for all”: whenever station has a frame to send, it does so. –Station listens for maximum RTT for an ACK. –If no ACK after a specified.
EECC694 - Shaaban #1 lec #5 Spring Data Link In Broadcast Networks: The Media Access Sublayer Broadcast networks with multi-access (or random.
Ethernet – CSMA/CD Review
Fundamentals of Computer Networks ECE 478/578
Multiple access What if multiple machines are sharing the same link?
The Data Link Layer introduction point-to-point data link protocols
Multiple Access Methods. When nodes or stations are connected and use a common link (cable or air), called a multipoint or broadcast link, we need a.
LECTURE 11 CT1303 LAN. DYNAMIC MAC PROTOCOL No fixed assignment for transmission media or any network resources.. It allows transmission when needed.
1 K. Salah Module 4.2: Media Access Control The Media Access Control (MAC) sublayer –Random Access (CSMA), IEEE –Token Passing, IEEE Ch 13-
1 The Data Link Layer  introduction  point-to-point data link protocols  the multiple access problem  local area networks  required reading:  Tannenbaum.
1 Pertemuan 13 Teknik Akses Jaringan - Random Matakuliah: H0174/Jaringan Komputer Tahun: 2006 Versi: 1/0.
MAC Protocols Media Access Control (who gets the use the channel) zContention-based yALOHA and Slotted ALOHA. yCSMA. yCSMA/CD. TDM and FDM are inefficient.
CS 5253 Workshop 1 MAC Protocol and Traffic Model.
CMPE 150- Introduction to Computer Networks 1 CMPE 150 Fall 2005 Lecture 17 Introduction to Computer Networks.
Chapter 14 LAN Systems Ethernet (CSMA/CD) ALOHA Slotted ALOHA CSMA
Copyright © 2003, Dr. Dharma P. Agrawal and Dr. Qing-An Zeng. All rights reserved. 1 Chapter 6 Multiple Radio Access.
Teknik Akses Jaringan Carrier Sense Pertemuan 12 Matakuliah: H0484/Jaringan Komputer Tahun: 2007.
EEC-484/584 Computer Networks Lecture 7 Wenbing Zhao
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Chapter 13 Multiple Access.
CMPE 150- Introduction to Computer Networks 1 CMPE 150 Fall 2005 Lecture 16 Introduction to Computer Networks.
EEC-484/584 Computer Networks Lecture 13 Wenbing Zhao
EEC-484/584 Computer Networks Lecture 9 Wenbing Zhao (Part of the slides are based on materials supplied by Dr. Louise Moser at UCSB and.
Semester EEE449 Computer Networks The Data Link Layer Part 2: Media Access Control En. Mohd Nazri Mahmud MPhil (Cambridge, UK) BEng (Essex,
Medium Access Control Sublayer
1 ECE453 – Introduction to Computer Networks Lecture 7 – Multiple Access Control (I)
9/11/2015 5:55 AM1 Ethernet and CSMA/CD CSE 6590 Fall 2010.
Chi-Cheng Lin, Winona State University CS412 Introduction to Computer Networking & Telecommunication Medium Access Control Sublayer.
Chapter 4: Medium Access Control (MAC) Sublayer
CHAPTER 4: THE MEDIUM ACCESS SUBLAYER 4.1: The Channel Allocation Problem 4.2: Multiple Access Protocols.
LECTURE9 NET301. DYNAMIC MAC PROTOCOL: CONTENTION PROTOCOL Carrier Sense Multiple Access (CSMA): A protocol in which a node verifies the absence of other.
LOCAL AREA NETWORKS. CSMA Carrier Sense Multiple Access To minimize the chance of collision and, therefore, increase the performance, the CSMA method.
© Janice Regan, CMPT 128, CMPT 371 Data Communications and Networking LANs 2: MAC protocols.
Chi-Cheng Lin, Winona State University CS 313 Introduction to Computer Networking & Telecommunication Medium Access Control Sublayer.
جلسه یازدهم شبکه های کامپیوتری به نــــــــــــام خدا.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2000 Unit-II Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Medium Access Control Sub Layer
7-1 Introduction to Queueing Theory l Components of a queueing system n probability density function (pdf) of interarrival times n pdf of service times.
Multiple Access.
Data Communications, Kwangwoon University12-1 Chapter 12. Multiple Access 1.Random Access 2.Controlled Access 3.Channelization.
Chapter 6 Multiple Radio Access
5: DataLink Layer 5a-1 Multiple Access protocol. 5: DataLink Layer 5a-2 Multiple Access Links and Protocols Three types of “links”: r point-to-point (single.
Ch 12. Multiple Access. Multiple Access for Shared Link Dedicated link – Point-to-point connection is sufficient Shared link – Link is not dedicated –
LECTURE9 NET301 11/5/2015Lect 9 NET DYNAMIC MAC PROTOCOL: CONTENTION PROTOCOL Carrier Sense Multiple Access (CSMA): A protocol in which a node verifies.
Carrier Sense Multiple Access Improve ALOHA by using carrier sense –Stations listen to the carrier before transmitting –If channel is busy, the station.
1 Ethernet CSE 3213 Fall February Introduction Rapid changes in technology designs Broader use of LANs New schemes for high-speed LANs High-speed.
Chapter 4 The Medum Access Sublayer. MA Sublayer Additional Reference –Local and Metropolitan Area Networks, William Stallings, Prentice Hall, 2000, 6th.
Medium Access Control Protocols, Local Area Networks, and Wireless Local Area Networks Lecture Note 10.
COMPUTER NETWORKS Data-link Layer (The Medium Access Control Sublayer) MAC Sublayer.
Multiple Access By, B. R. Chandavarkar, CSE Dept., NITK, Surathkal Ref: B. A. Forouzan, 5 th Edition.
Example DLL Protocols 1. High-Level Data Link Control (HDLC).
Multiple Access Methods
Chapter 12 Multiple Access.
Lab 7 – CSMA/CD (Data Link Layer Layer)
CT301 LECTURE 8.
High Speed LANs – Ethernet and Token Ring
Chapter 14 LAN Systems Ethernet (CSMA/CD) ALOHA Slotted ALOHA CSMA
Multiple Access Mahesh Jangid Assistant Professor JVW University.
Net301 lecture9 11/5/2015 Lect 9 NET301.
Multiple Access Methods
Learning Objectives After interacting with this Learning Object, the learner will be able to: Explain the process of collision detection in CSMA/CD.
The Medium Access Control Sublayer
Link Layer and LANs Not everyone is meant to make a difference. But for me, the choice to lead an ordinary life is no longer an option 5: DataLink Layer.
Data Communication Networks
CSE 313 Data Communication
Multiple Access Methods
CARRIER SENSE MULTIPLE ACCESS (CSMA)
Chapter 6 Multiple Radio Access.
Dr. John P. Abraham Professor UTPA
Multiple Access Control (MAC) Protocols
Presentation transcript:

Lecture 9: Multiple Access Protocols

Taxonomy of Multiple Access Protocols Random Access Protocols Aloha Slotted Aloha Carrier sense multiple access (CSMA): Ethernet Group random access Controlled Access Protocols Predetermined allocation (TDMA) Reservation protocols Token passing protocols

Aloha If you have a packet, just send it. If multiple people try it and so there is collision, then try resending it later! Theoretical analysis (based on Poisson distribution) shows a throughput of only 18%.

Slotted Aloha Synchronous, that is time is divided into slots Slot size is equal to the transmission time of a packet When you are ready, transmit at the start of the time slot. Doubles the efficiency of Aloha (38% throughput) But requires synchronization!

Carrier Sense Multiple Access CSMA Listen to channel. If busy then wait for a random time and then listen again. If not busy then transmit Collision may still happen

p-persistent CSMA Quite like CSMA. But, when the channel is idle then you transmit with probability p. Otherwise, even when it is idle, you wait for a random time before you listen to the channel.

CSMA/CD CSMA with collision detection(CD): Listen while you are sending packets Stop sending when collision happens Wait random time before you attempt to resend. IEEE 802.3 standard Used in coaxial cable. You do exponetial backoff.

Group Random Access Instead of random backoff, use a structured search to find one unit to transmit First enable a group. If collision happens, then divide the group into two parts and let one part try.

Token Passing Form a circular list. Pass a token around. Whoever has the token can transmit. Only the station that wants to trasmit, seize the token and release it after successful transmission.

Reservation Aloha Channel is divided into time slots of equal size. Each slot is large enough to transmit a packet. Slots are arranged into frames of equal size. Frame size is proportional to propagation delay. Units compete for slots. Once a unit gets a slot, it retains the slot (across frames) until it no longer needs it. Efficient for bursty data but no so for single packet.

FIFO Reservation Channel is divided into slots. Units compete and make reservation for these slots in FIFO manner. Every one keeps track of the order. After every M slots, one slot is broken into small reservation slots using which units try to reserve next M slots. Efficient in handling bursty data. No frame size limitation. But requires tracking of queue!

Round Robin Channel is divided into equal slots where each unit is a owner of a slot. (Just like TDMA) But, others can use the slot of a unit UNTIL the unit wants it by creating a collision. No activity is a signal for others to contend for the slot. Good for burst data. But contend using other protocols for unused slots.