LECTURE 11 CT1303 LAN. DYNAMIC MAC PROTOCOL No fixed assignment for transmission media or any network resources.. It allows transmission when needed.

Slides:



Advertisements
Similar presentations
Nick Feamster CS 4251 Computer Networking II Spring 2008
Advertisements

EECC694 - Shaaban #1 lec #5 Spring Data Link In Broadcast Networks: The Media Access Sublayer Broadcast networks with multi-access (or random.
12.1 Chapter 12 Multiple Access Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Multiple access What if multiple machines are sharing the same link?
Lecture 9: Multiple Access Protocols
Multiple Access Methods. When nodes or stations are connected and use a common link (cable or air), called a multipoint or broadcast link, we need a.
12.1 Chapter 12 Multiple Access Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Channel Access Methods When several devices are connected to a single channel, there must be some rules to govern these devices as they access, transmit,
1 K. Salah Module 4.2: Media Access Control The Media Access Control (MAC) sublayer –Random Access (CSMA), IEEE –Token Passing, IEEE Ch 13-
Chapter 12 Multiple Access Figure 12.1 Data link layer divided into two functionality-oriented sublayers Figure 12.2 Taxonomy of multiple-access protocols.
MAC Protocols Media Access Control (who gets the use the channel) zContention-based yALOHA and Slotted ALOHA. yCSMA. yCSMA/CD. TDM and FDM are inefficient.
Internetworking Fundamentals (Lecture #4) Andres Rengifo Copyright 2008.
CMPE 150- Introduction to Computer Networks 1 CMPE 150 Fall 2005 Lecture 17 Introduction to Computer Networks.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Chapter 13 Multiple Access.
EE 4272Spring, 2003 Chapter 14 LAN Systems Ethernet (CSMA/CD)  ALOHA  Slotted ALOHA  CSMA  CSMA/CD Token Ring /FDDI Fiber Channel  Fiber Channel Protocol.
CMPE 150- Introduction to Computer Networks 1 CMPE 150 Fall 2005 Lecture 16 Introduction to Computer Networks.
12.1 Chapter 12 Multiple Access Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Semester EEE449 Computer Networks The Data Link Layer Part 2: Media Access Control En. Mohd Nazri Mahmud MPhil (Cambridge, UK) BEng (Essex,
Medium Access Control Sublayer
Network Topologies An introduction to Network Topologies and the Link Layer.
Shashank Srivastava Motilal Nehru National Institute Of Technology, Allahabad Medium Access Control.
1 ECE453 – Introduction to Computer Networks Lecture 7 – Multiple Access Control (I)
CIS 725 Media Access Layer. Medium Access Control Sublayer MAC sublayer resides between physical and data link layer Broadcast/multiacess channels N independent.
1 Computer Communication & Networks Lecture 12 Datalink Layer: Multiple Access Waleed Ejaz
McGraw-Hill © The McGraw-Hill Companies, Inc., 2004 Chapter 12 Multiple Access Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction.
CHAPTER 4: THE MEDIUM ACCESS SUBLAYER 4.1: The Channel Allocation Problem 4.2: Multiple Access Protocols.
LECTURE9 NET301. DYNAMIC MAC PROTOCOL: CONTENTION PROTOCOL Carrier Sense Multiple Access (CSMA): A protocol in which a node verifies the absence of other.
جلسه دهم شبکه های کامپیوتری به نــــــــــــام خدا.
Layer 2 Technologies At layer 2 we create and transmit frames over communications channels Format of frames and layer 2 transmission protocols are dependent.
The Medium Access Control Sublayer Chapter 4. The Channel Allocation Problem Static Channel Allocation Dynamic Channel Allocation  Delay for the divided.
Chi-Cheng Lin, Winona State University CS 313 Introduction to Computer Networking & Telecommunication Medium Access Control Sublayer.
© 2009 Pearson Education Inc., Upper Saddle River, NJ. All rights reserved. © The McGraw-Hill Companies, Inc. Medium Access Control Asst. Prof. Chaiporn.
Medium Access Control Sub Layer
12.1 Chapter 12 Multiple Access Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
1 Kyung Hee University Chapter 12 Multiple Access.
5: DataLink Layer 5a-1 Multiple Access protocol. 5: DataLink Layer 5a-2 Multiple Access Links and Protocols Three types of “links”: r point-to-point (single.
Department of Computer Science, University of Peshawar Multiple Access.
LECTURE9 NET301 11/5/2015Lect 9 NET DYNAMIC MAC PROTOCOL: CONTENTION PROTOCOL Carrier Sense Multiple Access (CSMA): A protocol in which a node verifies.
LECTURE 13 CT1303 LAN. DYNAMIC MAC PROTOCOL: CONTENTION PROTOCOL CSMA\CA Carrier Sense Multiple Access\Collision Avoidance CSMA\CA Each station will sense.
THE MEDIUM ACCESS CONTROL SUBLAYER 4.1 THE CHANNEL ALLOCATION PROBLEM 4.2 MULTIPLE ACCESS PROTOCOLS.
Chapter 12 Media Access Control (MAC)
Multiple Access. Figure 12.1 Data link layer divided into two functionality-oriented sublayers.
Example DLL Protocols 1. High-Level Data Link Control (HDLC).
A Taxonomy of Mechanisms for Multi-Access
Multiple Access Methods
Lecture #9 MAC Protocols
Chapter 12 Multiple Access.
Lab 7 – CSMA/CD (Data Link Layer Layer)
CT301 LECTURE 8.
Part III Datalink Layer 10.
Multiple Access Mahesh Jangid Assistant Professor JVW University.
Subject Name: Computer Communication Networks Subject Code: 10EC71
Net301 lecture9 11/5/2015 Lect 9 NET301.
Figure 12.1 Data link layer divided into two functionality-oriented sublayers Networks can be divided into two categories: those using point-to-point.
THE IEEE MAC SUB-LAYER – chapter 14
Multiple Access Methods
Learning Objectives After interacting with this Learning Object, the learner will be able to: Explain the process of collision detection in CSMA/CD.
The Medium Access Control Sublayer
Chapter 13 Multiple Access
Chapter 12 Multiple Access
Link Layer and LANs Not everyone is meant to make a difference. But for me, the choice to lead an ordinary life is no longer an option 5: DataLink Layer.
Chapter 13 Multiple Access
Lecture 5- Data Link Layer
Multiple Access Methods
Dr. John P. Abraham Professor UTPA
Multiple Access Control (MAC) Protocols
Part III Datalink Layer 10.
Chapter 12 Media Access Control (MAC)
Chapter 12 Media Access Control (MAC)
Presentation transcript:

LECTURE 11 CT1303 LAN

DYNAMIC MAC PROTOCOL No fixed assignment for transmission media or any network resources.. It allows transmission when needed. Round Robin Protocols Contention Protocols Reservation Protocols

DYNAMIC MAC PROTOCOL: ROUND ROBIN PROTOCOLS Round Robin Protocol: an arrangement of choosing all elements in a group equally in some rational order. Token pass Polling. Token pass protocol: Ring Topology; IMB, FDDI. A signal called a token is passed between nodes that authorizes the node to communicate Token is needed to allow transmission of data.

DYNAMIC MAC PROTOCOL: TOKEN PASS PROTOCOL

Advantages: Allow transmission only when needed. Limited delay time; where maximum delay time is not more than time needed to pass the token over network. D: n T+ t D: maximum delay time n: number of nodes in Ring network. T: time needed to transmit data. t: total time needed to pass the token.

DYNAMIC MAC PROTOCOL: TOKEN PASS PROTOCOL Disadvantages: Losing the token resulting in disabling all network. If token doesn’t work, network will stop. t time needed to pass the token is wasted and not being used to transmit data. t time increase if network is large and token needed to transmit to farther places. Ring topology disadvantage applies as this protocol applies with ring topology.

DYNAMIC MAC PROTOCOL: POLLING PROTOCOL Polling Protocol: used usually with tree topology. Used in networks with mainframe. Or one central station control the network. Works with topologies in which one device is designated as a primary station and the other devices are secondary. All data exchange must be made through the primary device. The primary device controls the link, secondary devices follow its instructions.

DYNAMIC MAC PROTOCOL: POLLING PROTOCOL Primary station asks all secondary devices if they have data be to sent. Secondary devices reply with data or NAK if not. Primary receive the data and determine where to send it to other secondary devices or keep it for it self. Primary device asks the secondary devices again if they have data to be sent …

DYNAMIC MAC PROTOCOL: POLLING PROTOCOL Advantages: Limited delay time; complete circle polling time. transmission is guaranteed with full transmission media bandwidth and resources. Disadvantages: Time to poll data from each secondary device is wasted when it has not data to be sent. If more secondary devices are connected, then wasted polling time increased. Polling protocol stopped if primary device stopped or disabled.

DYNAMIC MAC PROTOCOL: POLLING PROTOCOL

Polling protocols: Roll-call Polling: Primary device asks (polls) all secondary devices in one polling cycle. Hub-polling : Primary device start to poll first secondary device, and after it completes sending its data it pass the polling to the next secondary device.. etc Save more time where secondary devices usually close to each other more than primary device, so save polling time.

DYNAMIC MAC PROTOCOL: POLLING PROTOCOL Binary Tree polling: Divide the network to two sections, polls the first section, if there is ACK, re-divide the section into two sections and polls again. Until secondary device is allocated. This type is preferred if number of nodes are huge with low traffic. In case of high traffic in network, previous type are preferred more.

DYNAMIC MAC PROTOCOL: CONTENTION PROTOCOL Contention protocol: Used to best utilize the channel. Used effectively when nodes send data discontinuous; computer network. Sometimes is called: Multiple Access Nodes are connected to channel via two transmission media; one to send data and one to receive data.

DYNAMIC MAC PROTOCOL: CONTENTION PROTOCOL

data is send in form of packets or data frame. Packet, data frame consists of sender address, destination address, data, data used to control media. Devices compete to transmit its data, therefore: Collision may occur.

DYNAMIC MAC PROTOCOL: CONTENTION PROTOCOL Pure Aloha Multiple Access Slotted Aloha Multiple Access Carrier Sense Multiple Access (CSMA) Carrier Sense Multiple Access/ Collision Detection (CSMA/CD) Carrier Sense Multiple Access/ Collision Avoidance (CSMA/CA)

DYNAMIC MAC PROTOCOL: CONTENTION PROTOCOL Pure Aloha Multiple Access: Used in wireless LAN. First used in Haway uni, in ALOHA. Best used when traffic is low. Node transmits data frame, then wait to receive it. If it receives it as transmit, the transmission is OK. If the received frame is different, then collision is occur, and node needed to re-transmit the data frame again after a random delay time.

DYNAMIC MAC PROTOCOL: CONTENTION PROTOCOL Advantages: Simple to implement. Transmission only when needed. Disadvantages: Unlimited delay if number of connected nodes are huge; lots of collisions. No effective utilizing to channel due to collisions.

DYNAMIC MAC PROTOCOL: CONTENTION PROTOCOL Slotted Aloha Multiple Access: Similar to Pure Aloha, but; Time is divided into slots. Node send data in starting of time slot not any time. Node receives data frame when the next time slot, if data frame is exactly same as the data packet being sent, transmission is OK, otherwise; collision may occur, re- transmit packet again after a random delay time.

DYNAMIC MAC PROTOCOL: CONTENTION PROTOCOL Advantages: Decrease collisions. Collision may occur only at starting of time slot not at any time as Pure Aloha Multiple Access. better in utilizing channel than Pure Aloha Multiple Access. Simple to implement. Disadvantages: Collisions still may occur. Unlimited delay if number of connected nodes are huge; lots of collisions.