1 Pertemuan 13 Teknik Akses Jaringan - Random Matakuliah: H0174/Jaringan Komputer Tahun: 2006 Versi: 1/0.

Slides:



Advertisements
Similar presentations
Channel Allocation Protocols. Dynamic Channel Allocation Parameters Station Model. –N independent stations, each acting as a Poisson Process for the purpose.
Advertisements

The ALOHA Protocol “Free for all”: whenever station has a frame to send, it does so. –Station listens for maximum RTT for an ACK. –If no ACK after a specified.
EECC694 - Shaaban #1 lec #5 Spring Data Link In Broadcast Networks: The Media Access Sublayer Broadcast networks with multi-access (or random.
Ethernet – CSMA/CD Review
Fundamentals of Computer Networks ECE 478/578
Multiple access What if multiple machines are sharing the same link?
Communication Networks Lecture 5 NETW 501-L5: NETW 501-L5: Medium Access Control Dr.-Ing. Khaled Shawky Hassan Room: C3-222, ext: 1204,
LANs Local Area Networks via the Media Access Control (MAC) Sub Layer LANs Local Area Networks via the Media Access Control (MAC) Sub Layer Advanced Advanced.
1 K. Salah Module 4.2: Media Access Control The Media Access Control (MAC) sublayer –Random Access (CSMA), IEEE –Token Passing, IEEE Ch 13-
MAC Protocols Media Access Control (who gets the use the channel) zContention-based yALOHA and Slotted ALOHA. yCSMA. yCSMA/CD. TDM and FDM are inefficient.
Copyright © 2003, Dr. Dharma P. Agrawal and Dr. Qing-An Zeng. All rights reserved. 1 Chapter 6 Multiple Radio Access.
Teknik Akses Jaringan Carrier Sense Pertemuan 12 Matakuliah: H0484/Jaringan Komputer Tahun: 2007.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Chapter 13 Multiple Access.
Teknik Akses Jaringan - Non Carrier Sense Pertemuan 11 Matakuliah: H0484/Jaringan Komputer Tahun: 2007.
CMPE 150- Introduction to Computer Networks 1 CMPE 150 Fall 2005 Lecture 16 Introduction to Computer Networks.
EEC-484/584 Computer Networks Lecture 13 Wenbing Zhao
Studying Local Area Networks Via Media Access Control (MAC) SubLayer
Chapter 2 Multiple Access Protocols Professor Rick Han University of Colorado at Boulder
Chapter 2 Multiple Access Protocols Professor Rick Han University of Colorado at Boulder
Networks: Local Area Networks1 LANs Studying Local Area Networks Via Media Access Control (MAC) SubLayer.
Computer Networks: Local Area Networks 1 LANs Studying Local Area Networks via the Media Access Control (MAC) SubLayer.
Semester EEE449 Computer Networks The Data Link Layer Part 2: Media Access Control En. Mohd Nazri Mahmud MPhil (Cambridge, UK) BEng (Essex,
Medium Access Control Sublayer
Shashank Srivastava Motilal Nehru National Institute Of Technology, Allahabad Medium Access Control.
1 ECE453 – Introduction to Computer Networks Lecture 7 – Multiple Access Control (I)
9/11/2015 5:55 AM1 Ethernet and CSMA/CD CSE 6590 Fall 2010.
Multiple Access Protocols Chapter 6 of Hiroshi Harada Book
1 Computer Communication & Networks Lecture 12 Datalink Layer: Multiple Access Waleed Ejaz
Chi-Cheng Lin, Winona State University CS412 Introduction to Computer Networking & Telecommunication Medium Access Control Sublayer.
LECTURE9 NET301. DYNAMIC MAC PROTOCOL: CONTENTION PROTOCOL Carrier Sense Multiple Access (CSMA): A protocol in which a node verifies the absence of other.
LOCAL AREA NETWORKS. CSMA Carrier Sense Multiple Access To minimize the chance of collision and, therefore, increase the performance, the CSMA method.
© Janice Regan, CMPT 128, CMPT 371 Data Communications and Networking LANs 2: MAC protocols.
Medium Access Control NWEN302 Computer Network Design.
Chi-Cheng Lin, Winona State University CS 313 Introduction to Computer Networking & Telecommunication Medium Access Control Sublayer.
جلسه یازدهم شبکه های کامپیوتری به نــــــــــــام خدا.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2000 Unit-II Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
4: DataLink Layer1 Multiple Access Links and Protocols Three types of “links”: r point-to-point (single wire, e.g. PPP, SLIP) r broadcast (shared wire.
Medium Access Control Sub Layer
Multiple Access.
Data Communications, Kwangwoon University12-1 Chapter 12. Multiple Access 1.Random Access 2.Controlled Access 3.Channelization.
Chapter 6 Multiple Radio Access
5: DataLink Layer 5a-1 Multiple Access protocol. 5: DataLink Layer 5a-2 Multiple Access Links and Protocols Three types of “links”: r point-to-point (single.
LANs Local Area Networks via the Media Access Control (MAC) Sub Layer LANs Local Area Networks via the Media Access Control (MAC) Sub Layer Advanced Computer.
Background of Ad hoc Wireless Networks Student Presentations Wireless Communication Technology and Research Ad hoc Routing and Mobile IP and Mobility Wireless.
LECTURE9 NET301 11/5/2015Lect 9 NET DYNAMIC MAC PROTOCOL: CONTENTION PROTOCOL Carrier Sense Multiple Access (CSMA): A protocol in which a node verifies.
EE 122: Lecture 6 Ion Stoica September 13, 2001 (* this talk is based in part on the on-line slides of J. Kurose & K. Rose)
1 Ethernet CSE 3213 Fall February Introduction Rapid changes in technology designs Broader use of LANs New schemes for high-speed LANs High-speed.
Advanced Computer Networks C13
Chapter 4 The Medum Access Sublayer. MA Sublayer Additional Reference –Local and Metropolitan Area Networks, William Stallings, Prentice Hall, 2000, 6th.
Medium Access Control Protocols, Local Area Networks, and Wireless Local Area Networks Lecture Note 10.
THE MEDIUM ACCESS CONTROL SUBLAYER 4.1 THE CHANNEL ALLOCATION PROBLEM 4.2 MULTIPLE ACCESS PROTOCOLS.
COMPUTER NETWORKS Data-link Layer (The Medium Access Control Sublayer) MAC Sublayer.
Multiple Access By, B. R. Chandavarkar, CSE Dept., NITK, Surathkal Ref: B. A. Forouzan, 5 th Edition.
Example DLL Protocols 1. High-Level Data Link Control (HDLC).
Multiple Access Methods
Part III Datalink Layer 10.
Net301 lecture9 11/5/2015 Lect 9 NET301.
Services of DLL Framing Link access Reliable delivery
THE IEEE MAC SUB-LAYER – chapter 14
Multiple Access Methods
Overview Jaringan Komputer (3)
The Medium Access Control Sublayer
Channel Allocation Problem/Multiple Access Protocols Group 3
Link Layer and LANs Not everyone is meant to make a difference. But for me, the choice to lead an ordinary life is no longer an option 5: DataLink Layer.
Channel Allocation Problem/Multiple Access Protocols Group 3
Data Communication Networks
Multiple Access Methods
Chapter 6 Multiple Radio Access.
Part III Datalink Layer 10.
Chapter 12 Media Access Control (MAC)
Presentation transcript:

1 Pertemuan 13 Teknik Akses Jaringan - Random Matakuliah: H0174/Jaringan Komputer Tahun: 2006 Versi: 1/0

2 Learning Outcomes Pada akhir pertemuan ini, diharapkan mahasiswa akan mampu : Menjelaskan teknik akses ke jaringan secara random

3 Outline Materi ALOHA Slotted ALOHA Reservation ALOHA

4 Medium Sharing Techniques Allocation Principles Channel partitioning (Multiple Access) –Divide channel into smaller pieces (time slots, frequency) –Allocate piece to node for exclusive use Random access –Allow collisions and Recover from collisions Scheduled /Taking turns –Tightly coordinate shared access to avoid collisions

5 /Broadcast Networks N senders and receivers connected by a shared medium (copper wire, atmosphere, water) Shared local access to the same media Multiple Access Protocol Determine which host is allowed to transmit next to a shared medium Channel partition: TDMA, FDMA, CDMA Random access: ALOHA, CSMA/CD, CSMA/CA Local Area Network (LAN) Ethernet, Fast Ethernet, Gigabit Ethernet, Wireless Ethernet, or b/a, or WiFi

6 Multiple-access protocols

7 Medium Access Methods

8 General principles: No Carrier Sensing Carrier Sensing Wait for silence Then talk (transmit) Listen while talking Backoff if there is transmission. Repeat Protocols also add a random increasing timeout Random Access Protocols

9 No Carrier Sensing ALOHA –Useful in which uncoordinated users are competing for the use of a single shared channel. –Pure Aloha (no global time synchronization) and Slotted Aloha (global time synch. required)

10 ALOHA Network

11 Pure ALOHA PURE ALOHA –Stations transmit whenever they have information to send at all times. –Collision will occur when two hosts try to transmit packets at the same time –If first bit of a frame overlaps with last bit of an earlier frame then both will be destroyed –Colliding frames destroyed detected by listening to the channel –Such a system is called a contention system

12 –If no ACK by timeout, then wait a randomly selected delay to avoid repeated collisions, then retransmit –Too short : large number of collisions –Too long : underutilization –Frames are the same size –In LAN feedback is immediate. For satellite broadcast 270msec delay Pure ALOHA

13 Pure ALOHA - Collision No synchronization Send without awaiting for beginning of slot Collision of packets can occur when a packet overlaps another packet: –Packet sent at t 0 collide with packets sent at [t 0 -1] or at [t 0 +1] time Collision Wasted Time Colliding with B Packet C Packet B Packet A t0t0 t 0 -1t 0 +1 Collision Overlap with start of packet B Overlap with end of packet B

14 Rather than sending a packet at any time, send along time slot boundaries Collisions are confined to one time slot Slotted ALOHA time Collision Wasted Time Colliding with B Packet CPacket B Packet A t0t0 t 0 -1t 0 +1

15 Efficiency of ALOHA

16 Pertemuan 14 Teknik Akses Jaringan – Carrier Sense Matakuliah: H0174/Jaringan Komputer Tahun: 2006 Versi: 1/0

17 Learning Outcomes Pada akhir pertemuan ini, diharapkan mahasiswa akan mampu : Menjelaskan teknik akses ke jaringan dengan carrier sense

18 Outline Materi CSMA Back-off strategy

19 Carrier Sense Multiple Access ALOHA & Slotted ALOHA are inefficient because stations don’t take into account what other stations are doing before they transmit (Talk-before-listen) Sense for carriers (see if anyone else is transmitting) before begin transmitting Carrier Sense Multiple Access (CSMA) is Listen Before Talk In LAN’s it is possible for stations to detect what other stations are doing and reactively change. CSMA can improve performance These protocols are called carrier sense protocols. They are named 1-persistent CSMA, non-persistent CSMA, p-persistent CSMA

20 When station has data to send, it listens to channel Channel idle: station transmits packet Channel busy: station waits till channel is idle When channel becomes free, a host transmits its packet immediately (with probability 1) 1- Persistent Packet A time Station B listens Packet B delay Station B sends

21 Propagation delay II –If propagation delay is small zero, collision may still occur –Station A transmits, Stations B, X, Y simultaneously realize that line is busy and wait –When line is free, stations B transmits then station X, Y simultaneously transmit. Collision. Collision in CSMA Packet A time Station B listens Packet B Packet Y delay Collision still possible over long propagation delays Packet X Station B sends

22 Before sending, station senses channel If no transmission, station starts sending. If channel is busy it does not continuously sense the channel in order to start transmitting Wait/sleep a random interval before sensing again As soon as channel is idle, then send a packet Random interval reduces collisions Higher throughput than 1-persistent CSMA when many senders Non Persistent Packet A time Station B listens Packet B Random delay Station B sends

23 Generalization of 1-persistent CSMA Typically applied to slotted channels Slot length is chosen as maximum propagation delay A station senses the channel, and If slot is idle, transmit with probability p, or defer with probability q=1-p If next slot is idle, transmit with probability p, or defer with probability 1-p, repeat… If channel is initially busy, it waits until the next slot then sense channel continuously until it becomes free and applies the above algorithm p-Persistent

24 IEEE is a standard for a 1-persistent CSMA/CD LAN –If cable is busy, station waits until cable is idle. –If 2 or more stations simultaneously transmit on an idle cable, they will collide. –All colliding stations then terminate their transmission and, wait random time and then start process again. Ethernet is a specific implementation. CSMA with Collision Detection

25 Ethernet uses CSMA/CD Listen-while-talk protocol A station listens even while it is transmitting, and if a collision is detected, stops transmitting Ethernet - CSMA/CD Packet A time Station B listens Packet B delay Packet B size Not transmitted Station B sends Packet B Station B detects collision, Stops sending

26 Ethernet CSMA/CD requires a minimum size packet If packet B arrives at A and A is no longer transmitting, then Host A will Fail to detect the collision Thinks its packet got through Thinks the incoming packet is a new packet Therefore, to detect a collision: Minimum packet size >= 2*(prop. delay)*BW A Ethernet Packet A t d=propagation delay B Packet A Packet B Packet B t+d B transmit at t+d, just before packet A arrives. B sees collision and transmits a runt” packet Packet arrives at t+2d Minimum size Ethernet packet

27 Comparison of multiple access G (transmission attempts per packet time)