Channel Access Methods When several devices are connected to a single channel, there must be some rules to govern these devices as they access, transmit,

Slides:



Advertisements
Similar presentations
INTRODUCTION TO NETWORKS
Advertisements

Multiple access What if multiple machines are sharing the same link?
Lecture 9: Multiple Access Protocols
Channel Access Methods
Multiple Access Methods. When nodes or stations are connected and use a common link (cable or air), called a multipoint or broadcast link, we need a.
LECTURE 11 CT1303 LAN. DYNAMIC MAC PROTOCOL No fixed assignment for transmission media or any network resources.. It allows transmission when needed.
12.1 Chapter 12 Multiple Access Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Communication Networks Lecture 5 NETW 501-L5: NETW 501-L5: Medium Access Control Dr.-Ing. Khaled Shawky Hassan Room: C3-222, ext: 1204,
1 K. Salah Module 4.2: Media Access Control The Media Access Control (MAC) sublayer –Random Access (CSMA), IEEE –Token Passing, IEEE Ch 13-
1 Version 3.0 Module 6 Ethernet Fundamentals. 2 Version 3.0 Why is Ethernet so Successful? In 1973, it could carry data at 3 Mbps Now, it can carry data.
1 Chapter 9 Computer Networks. 2 Chapter Topics OSI network layers Network Topology Media access control Addressing and routing Network hardware Network.
CMPE 150- Introduction to Computer Networks 1 CMPE 150 Fall 2005 Lecture 17 Introduction to Computer Networks.
Internetworking School of Business Eastern Illinois University © Abdou Illia, Spring 2007 (Week 4, Tuesday 1/30/2007)
Computer Network 實踐資管 Wang-Jiunn Cheng 2004 PART IV-1 Local Area Networks (LANs) Topology.
Channel Access Methods When several devices are connected to a single channel, there must be some rules to govern these devices when they access, transmit,
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Chapter 13 Multiple Access.
CMPE 150- Introduction to Computer Networks 1 CMPE 150 Fall 2005 Lecture 16 Introduction to Computer Networks.
Understanding Networks II. Objectives Compare client and network operating systems Learn about local area network technologies, including Ethernet, Token.
12.1 Chapter 12 Multiple Access Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
COMPUTER NETWORKS.
Network Topologies An introduction to Network Topologies and the Link Layer.
Chapter 4.  Understand network connectivity.  Peer-to-Peer network & Client-Server network  Understand network topology  Star, Bus & Ring topology.
Enhanced CSMA Additional improvement  Use CSMA access  Listen while transmitting  Stop immediately if collision sensed  Called collision detection.
1 LAN Technologies and Network Topology. 2 Direct Point-to-Point Communication.
Chapter 4: Medium Access Control (MAC) Sublayer
Ch. 16 High-Speed LANs The Emergence of High- Speed LANs Trends –Computing power of PCs has continued to grow. –MIS organizations recognize the.
CHAPTER 4: THE MEDIUM ACCESS SUBLAYER 4.1: The Channel Allocation Problem 4.2: Multiple Access Protocols.
LECTURE9 NET301. DYNAMIC MAC PROTOCOL: CONTENTION PROTOCOL Carrier Sense Multiple Access (CSMA): A protocol in which a node verifies the absence of other.
LAN technologies and network topology LANs and shared media Locality of reference Star, bus and ring topologies Medium access control protocols.
Lesson 3—Networking BASICS1 Networking BASICS Network Design Unit 2 Lesson 3.
Layer 2 Technologies At layer 2 we create and transmit frames over communications channels Format of frames and layer 2 transmission protocols are dependent.
Data and Computer Communications Ninth Edition by William Stallings Data and Computer Communications, Ninth Edition by William Stallings, (c) Pearson Education.
Networks and Protocols CE Week 2b. Topologies, CSMA/CD, CSMA/CA.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2000 Unit-II Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
IST 126 Computer Networks Day 2. Server Security Only one password needed to access network Associated with the account is permission to access certain.
17 - Winter 2005 ECE ECE 766 Computer Interfacing and Protocols 1 Local Area Networks Need for high performance communications for physically close devices.
Multiple Access.
1 Kyung Hee University Chapter 12 Multiple Access.
LECTURE9 NET301 11/5/2015Lect 9 NET DYNAMIC MAC PROTOCOL: CONTENTION PROTOCOL Carrier Sense Multiple Access (CSMA): A protocol in which a node verifies.
Internetworking School of Business Eastern Illinois University © Abdou Illia, Spring 2016 (February 3, 2016)
1 Ethernet CSE 3213 Fall February Introduction Rapid changes in technology designs Broader use of LANs New schemes for high-speed LANs High-speed.
LECTURE 13 CT1303 LAN. DYNAMIC MAC PROTOCOL: CONTENTION PROTOCOL CSMA\CA Carrier Sense Multiple Access\Collision Avoidance CSMA\CA Each station will sense.
COMPUTER NETWORKS Lecture-8 Husnain Sherazi. Review Lecture 7  Shared Communication Channel  Locality of Reference Principle  LAN Topologies – Star.
Multiple Access. Figure 12.1 Data link layer divided into two functionality-oriented sublayers.
Multiple Access By, B. R. Chandavarkar, CSE Dept., NITK, Surathkal Ref: B. A. Forouzan, 5 th Edition.
Example DLL Protocols 1. High-Level Data Link Control (HDLC).
Multiple Access Methods
Data link layer divided into two functionality-oriented sublayers
Chapter 12 Multiple Access.
Lab 7 – CSMA/CD (Data Link Layer Layer)
CT301 LECTURE 8.
Part III Datalink Layer 10.
Multiple Access Mahesh Jangid Assistant Professor JVW University.
Net301 lecture9 11/5/2015 Lect 9 NET301.
Figure 12.1 Data link layer divided into two functionality-oriented sublayers Networks can be divided into two categories: those using point-to-point.
Multiple Access Methods
Learning Objectives After interacting with this Learning Object, the learner will be able to: Explain the process of collision detection in CSMA/CD.
The Medium Access Control Sublayer
Chapter 13 Multiple Access
Computer communications
Link Layer and LANs Not everyone is meant to make a difference. But for me, the choice to lead an ordinary life is no longer an option 5: DataLink Layer.
Chapter 13 Multiple Access
Lecture 5- Data Link Layer
Multiple Access Methods
Multiple Access Control (MAC) Protocols
Part III Datalink Layer 10.
Chapter 12 Media Access Control (MAC)
Chapter 12 Media Access Control (MAC)
Presentation transcript:

Channel Access Methods When several devices are connected to a single channel, there must be some rules to govern these devices as they access, transmit, and release the channel. There are three basic channel access methods: Contention Polling Token passing Different access methods have different overhead effects on network traffic.

Contention With contention systems, network devices may transmit whenever they want. No referee mandates when a device may or may not use the channel. This scheme is simple to design The scheme provides equal access rights to all stations. Stations simply transmit whenever they are ready, without considering what other stations are doing. Unfortunately, the "transmit whenever ready" strategy has one important shortcoming. Stations can transmit at the same time. When this happens, the resulting co-mingling of signals usually damages both to the point that a frame's information is lost. This unhappy event is called a "collision."

Collision Newer contention protocols were developed that called for stations to listen to the channel first before transmitting. If the listening station detects a signal, it will not start transmitting and try again later. These protocols are called CSMA (Carrier Sense, Multiple Access with collision detection) protocols. These protocols will reduce collisions. However, collisions may still occur when two stations sense the cable, detect nothing, and subsequently transmit. In order to reduce collisions, CSMA/CD protocols compute a random backoff time before retransmitting the frame (as shown in the flow diagram). Examples of CSMA/CD protocols : EEE (Ethernet )

CSMA / CD collision schematic

CSMA/CD operation: a) transmit

CSMA / CD operation: b) receive

Advantages CSMA/CD control software is relatively simple and produces little overhead. CSMA/CD network works best on a bus topology with bursty transmission.

Disadvantages CSMA/CD protocols are probabilistic and depends on the network (cable) loading. Considered unsuitable for channels controlling automated equipment that must have certain control over channel access. (This could be OK for different channel access). We can set priorities to give faster access to some devices (This is, probably, not an issue in some applications)

Polling access method Polling is an access method that designates one device (called a "controller", "primary", or "master") as a channel access administrator. This device (Master) queries each of the other devices (“secondaries”) in some predetermined order to see whether they have information to transmit. If so, they transmit (usually through the master).

Polling access method Secondaries may be linked to the master in many different configurations. One of the most common polling topologies is a star, where the points of the star are secondaries and the master is the hub. To get data from a secondary, the master addresses a request for data to the secondary, and then receives the data from the secondary sends (if secondary sends any). The primary then polls another secondary and receives the data from the secondary, and so forth. System limits how long each secondary can transmit on each poll.

Advantages Polling centralizes channel access control. Maximum and minimum access times and data rates on the channel are predictable and fixed. Priorities can be assigned to ensure faster access from some secondaries. Polling is deterministic and is considered suitable for channels controlling some kinds of automated equipment.

Disadvantages Polling systems often use a lot of bandwidth sending notices and acknowledgments or listening for messages. Line turnaround time on a half- duplex line further increases time overhead. This overhead reduces both the channel's data rate under low loads and its throughput.

Token passing System In token-passing systems, a small frame (the token) is passed in an orderly fashion from one device to another. A token is a special authorizing message that temporarily gives control of the channel to the device holding the token. Passing the token around distributes access control among the channel's devices. Each device knows from which device it receives the token and to which device it passes the token.(see fig.) Each device periodically gets control of the token, performs its duties, and then retransmits the token for the next device to use. System rules limit how long each device can control the token.

Control token MAC: Token ring

Control token MAC: Token bus

Slotted ring principles: bit definitions of each slot

Slotted ring principles:Outline topology

Advantages Even though there is more overhead using tokens than using CSMA/CD, performance differences are not noticeable with light traffic and are considerably better with heavy loads because CSMA/CD will spend a lot of time resolving collisions. A deterministic access method such as Token Ring guarantees that every node will get access to the network within a given length of time. In probabilistic access method (such as CSMA/CD) nodes have to check for network activity when they want to access the network.

Disadvantages Components are more expensive than for Ethernet or ARCnet. Token Ring architecture is not very easy to extend to wide-area networks (WANs). Token Ring network is much more expensive than Ethernet. This is due to the complex token passing protocol.

Token Ring