Distributed systems Module 1 -Basic networking Teaching unit 1 – LAN standards Ernesto Damiani University of Bozen-Bolzano Lesson 2 – LAN Medium Access.

Slides:



Advertisements
Similar presentations
Nick Feamster CS 4251 Computer Networking II Spring 2008
Advertisements

Channel Allocation Protocols. Dynamic Channel Allocation Parameters Station Model. –N independent stations, each acting as a Poisson Process for the purpose.
The ALOHA Protocol “Free for all”: whenever station has a frame to send, it does so. –Station listens for maximum RTT for an ACK. –If no ACK after a specified.
EECC694 - Shaaban #1 lec #5 Spring Data Link In Broadcast Networks: The Media Access Sublayer Broadcast networks with multi-access (or random.
Ethernet – CSMA/CD Review
Fundamentals of Computer Networks ECE 478/578
Multiple access What if multiple machines are sharing the same link?
Lecture 9: Multiple Access Protocols
Distributed systems Module 1 -Basic networking Teaching unit 1 – LAN standards Ernesto Damiani Free University of Bozen-Bolzano Lesson 1 – Local network.
1 K. Salah Module 4.2: Media Access Control The Media Access Control (MAC) sublayer –Random Access (CSMA), IEEE –Token Passing, IEEE Ch 13-
Wireless & Mobile Networking: Multiple Radio Access Azizol Bin Abdullah (A2.04) Rujukan: Text Book Chapter 6.
MAC Protocols Media Access Control (who gets the use the channel) zContention-based yALOHA and Slotted ALOHA. yCSMA. yCSMA/CD. TDM and FDM are inefficient.
Distributed systems Module 1 -Basic networking Teaching unit 1 – LAN standards Ernesto Damiani University of Bozen-Bolzano Lesson 5 – Collision management.
Wireless Networking So we talked about wired networks. What about wireless?
CS 5253 Workshop 1 MAC Protocol and Traffic Model.
Copyright © 2003, Dr. Dharma P. Agrawal and Dr. Qing-An Zeng. All rights reserved. 1 Chapter 6 Multiple Radio Access.
EE 122: Ethernet and Ion Stoica September 18, 2002 (* this talk is based in part on the on-line slides of J. Kurose & K. Rose)
Distributed systems Module 1 -Basic networking Teaching unit 1 – LAN standards Ernesto Damiani University of Bozen-Bolzano Lesson 4 – Ethernet frame.
CMPE 150- Introduction to Computer Networks 1 CMPE 150 Fall 2005 Lecture 16 Introduction to Computer Networks.
EEC-484/584 Computer Networks Lecture 9 Wenbing Zhao (Part of the slides are based on materials supplied by Dr. Louise Moser at UCSB and.
Spanning Tree and Wireless EE122 Discussion 10/28/2011.
Distributed Systems Module 1 -Basic networking Teaching unit 1 – LAN standards Ernesto Damiani University of Bozen-Bolzano Lesson 3 – Introduction to Ethernet.
Semester EEE449 Computer Networks The Data Link Layer Part 2: Media Access Control En. Mohd Nazri Mahmud MPhil (Cambridge, UK) BEng (Essex,
Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011 The Medium Access Control Sublayer Chapter.
1 ECE453 – Introduction to Computer Networks Lecture 7 – Multiple Access Control (I)
جلسه دوازدهم شبکه های کامپیوتری به نــــــــــــام خدا.
9/11/2015 5:55 AM1 Ethernet and CSMA/CD CSE 6590 Fall 2010.
Wireless Medium Access. Multi-transmitter Interference Problem  Similar to multi-path or noise  Two transmitting stations will constructively/destructively.
Ethernet. Problem In an Ethernet, suppose there are three stations very close to each other, A, B and C. Suppose at time 0, all of them have a frame to.
Chi-Cheng Lin, Winona State University CS412 Introduction to Computer Networking & Telecommunication Medium Access Control Sublayer.
Computer Networks NYUS FCSIT Spring 2008 Igor TRAJKOVSKI, Ph.D. Associate Professor
Chapter 4: Medium Access Control (MAC) Sublayer
CSMA with Collision Detection CSMA/CD can be in one of three states: contention, transmission, or idle.
The Medium Access Control Sublayer Chapter 4. The Channel Allocation Problem Static Channel Allocation in LANs and MANs Dynamic Channel Allocation in.
CSC4220/6220 Computer Networks
The Medium Access Control Sublayer Chapter 4 10/1/2015www.noteshit.com1.
CHAPTER 4: THE MEDIUM ACCESS SUBLAYER 4.1: The Channel Allocation Problem 4.2: Multiple Access Protocols.
LECTURE9 NET301. DYNAMIC MAC PROTOCOL: CONTENTION PROTOCOL Carrier Sense Multiple Access (CSMA): A protocol in which a node verifies the absence of other.
The Medium Access Control Sublayer Chapter 4. The Channel Allocation Problem Static Channel Allocation Dynamic Channel Allocation  Delay for the divided.
Chi-Cheng Lin, Winona State University CS 313 Introduction to Computer Networking & Telecommunication Medium Access Control Sublayer.
The Medium Access Control Sublayer Chapter 4. The Channel Allocation Problem Static Channel Allocation in LANs and MANs Dynamic Channel Allocation in.
جلسه یازدهم شبکه های کامپیوتری به نــــــــــــام خدا.
4: DataLink Layer1 Multiple Access Links and Protocols Three types of “links”: r point-to-point (single wire, e.g. PPP, SLIP) r broadcast (shared wire.
Multiple Access.
Data Communications, Kwangwoon University12-1 Chapter 12. Multiple Access 1.Random Access 2.Controlled Access 3.Channelization.
Chapter 6 Multiple Radio Access
The Medium Access Control Sublayer Chapter 4 12/13/2015www.ishuchita.com1.
Introduction to Wireless Networks Dina Katabi & Sam Madden MIT – – Spring 2014.
Wireless. 2 A talks to B C senses the channel – C does not hear A’s transmission C talks to B Signals from A and B collide Carrier Sense will be ineffective.
5: DataLink Layer 5a-1 Multiple Access protocol. 5: DataLink Layer 5a-2 Multiple Access Links and Protocols Three types of “links”: r point-to-point (single.
Background of Ad hoc Wireless Networks Student Presentations Wireless Communication Technology and Research Ad hoc Routing and Mobile IP and Mobility Wireless.
LECTURE9 NET301 11/5/2015Lect 9 NET DYNAMIC MAC PROTOCOL: CONTENTION PROTOCOL Carrier Sense Multiple Access (CSMA): A protocol in which a node verifies.
Medium Access Control in Wireless networks
The Medium Access Control Sublayer Chapter 4. The Channel Allocation Problem Static Channel Allocation in LANs and MANs Dynamic Channel Allocation in.
MAC Layer Protocols for Wireless Networks. What is MAC? MAC stands for Media Access Control. A MAC layer protocol is the protocol that controls access.
Carrier Sense Multiple Access Improve ALOHA by using carrier sense –Stations listen to the carrier before transmitting –If channel is busy, the station.
1 Ethernet CSE 3213 Fall February Introduction Rapid changes in technology designs Broader use of LANs New schemes for high-speed LANs High-speed.
The Medium Access Control Sublayer
Medium Access Control Protocols, Local Area Networks, and Wireless Local Area Networks Lecture Note 10.
THE MEDIUM ACCESS CONTROL SUBLAYER 4.1 THE CHANNEL ALLOCATION PROBLEM 4.2 MULTIPLE ACCESS PROTOCOLS.
COMPUTER NETWORKS Data-link Layer (The Medium Access Control Sublayer) MAC Sublayer.
THE MEDIUM ACCESS CONTROL SUBLAYER 4.1 THE CHANNEL ALLOCATION PROBLEM 4.2 MULTIPLE ACCESS PROTOCOLS.
Wireless Sensor Networks 4. Medium Access
High Speed LANs – Ethernet and Token Ring
Net301 lecture9 11/5/2015 Lect 9 NET301.
The Medium Access Control Sublayer
The Medium Access Control Sublayer
CSE 313 Data Communication
CSE 313 Data Communication
Chapter 6 Multiple Radio Access.
Presentation transcript:

Distributed systems Module 1 -Basic networking Teaching unit 1 – LAN standards Ernesto Damiani University of Bozen-Bolzano Lesson 2 – LAN Medium Access Control

Contention MAC protocols (reminder) CSMA/CD (Carrier Sensing Multiple Access/Collision Detection) It listens to the channel in advance to avoid collisions, but when they happen it resends the frame (used by Ethernet LAN)  1-persistent: the station resends with probability 1 when the channel is idle  p-persistent: when the channel becomes idle, it transmits with probability p  non-persistent: when the channel idle waits a random time before transmitting

Unifying view and adaptive solution Mixed strategies are adaptive Division of stations into groups; every group may contend for a different slot –Limiting case: only one member in group (collision free protocol) –Limiting case: everybody for one slot (slotted ALOHA) –Intermediate case: they choose the group size depending on the load (adaptive protocol)  For example: at first all are entered, then if there is a collision they are reduced in half and half and so on.

Summary table of MAC solutions ContextRequirementsA solution Low loadMinimized latency Contention protocols (e.g. ALOHA) Variable loadMaximum efficiency Collision free protocols Variable loadDifferent problems Hybrid protocols (limited contention protocols)

Wireless networks

Wireless LAN (1) In a wireless LAN not all the stations are within the range of one another –On one hand, this is an advantage because multiple transmissions can be executed at one time –On the other hand, some problems may arise

No difference

Wireless LAN (2) Hidden station problem –When A transmits to B, C senses the medium as free and starts the transmission Exposed station problem –When B transmits to A, C senses the medium as busy and does not transmit to D

MACA (Multiple Access with Collision Avoidance) RTS (Request To Send) –Any station hearing the RTS is close to A and must keep silent until a CTS is sent back to A CTS (Clear to Send) –Any station hearing the CTS is close to B and must keep silent during the upcoming data transmission

MACA for Wireless ACK data Carrier sense to avoid RTS collision Info on congestion Back-off algorithm for each data stream FINE