CMPE 80N - Introduction to Networks and the Internet 1 CMPE 80N Spring 2003 Week 4 Introduction to Networks and the Internet.

Slides:



Advertisements
Similar presentations
Nick Feamster CS 4251 Computer Networking II Spring 2008
Advertisements

CMPE 80N - Introduction to Networks and the Internet 1 CMPE 80N Spring 2003 Week 5 Introduction to Networks and the Internet.
Channel Allocation Protocols. Dynamic Channel Allocation Parameters Station Model. –N independent stations, each acting as a Poisson Process for the purpose.
The ALOHA Protocol “Free for all”: whenever station has a frame to send, it does so. –Station listens for maximum RTT for an ACK. –If no ACK after a specified.
EECC694 - Shaaban #1 lec #5 Spring Data Link In Broadcast Networks: The Media Access Sublayer Broadcast networks with multi-access (or random.
Ethernet – CSMA/CD Review
Multiple access What if multiple machines are sharing the same link?
Lecture 9: Multiple Access Protocols
Channel Access Methods
Multiple Access Methods. When nodes or stations are connected and use a common link (cable or air), called a multipoint or broadcast link, we need a.
LECTURE 11 CT1303 LAN. DYNAMIC MAC PROTOCOL No fixed assignment for transmission media or any network resources.. It allows transmission when needed.
Channel Access Methods When several devices are connected to a single channel, there must be some rules to govern these devices as they access, transmit,
1 K. Salah Module 4.2: Media Access Control The Media Access Control (MAC) sublayer –Random Access (CSMA), IEEE –Token Passing, IEEE Ch 13-
MAC Protocols Media Access Control (who gets the use the channel) zContention-based yALOHA and Slotted ALOHA. yCSMA. yCSMA/CD. TDM and FDM are inefficient.
CMPE 150- Introduction to Computer Networks 1 CMPE 150 Fall 2005 Lecture 17 Introduction to Computer Networks.
Chapter 14 LAN Systems Ethernet (CSMA/CD) ALOHA Slotted ALOHA CSMA
CMPE 150- Introduction to Computer Networks 1 CMPE 150 Fall 2005 Lecture 15 Introduction to Computer Networks.
Copyright © 2003, Dr. Dharma P. Agrawal and Dr. Qing-An Zeng. All rights reserved. 1 Chapter 6 Multiple Radio Access.
CMPE 80N - Introduction to Networks and the Internet 1 CMPE 80N Winter 2004 Lecture 10 Introduction to Networks and the Internet.
CMPE 257 Spring CMPE 257: Wireless and Mobile Networking Spring 2002 Week 2.
CMPE 80N - Introduction to Networks and the Internet 1 CMPE 80N Winter 2004 Lecture 9 Introduction to Networks and the Internet.
EE 4272Spring, 2003 Chapter 14 LAN Systems Ethernet (CSMA/CD)  ALOHA  Slotted ALOHA  CSMA  CSMA/CD Token Ring /FDDI Fiber Channel  Fiber Channel Protocol.
CMPE 150- Introduction to Computer Networks 1 CMPE 150 Fall 2005 Lecture 16 Introduction to Computer Networks.
EEC-484/584 Computer Networks Lecture 13 Wenbing Zhao
CMPE 150- Introduction to Computer Networks 1 CMPE 150 Fall 2005 Lecture 18 Introduction to Computer Networks.
Studying Local Area Networks Via Media Access Control (MAC) SubLayer
Medium Access Control Sublayer
Shashank Srivastava Motilal Nehru National Institute Of Technology, Allahabad Medium Access Control.
9/11/2015 5:55 AM1 Ethernet and CSMA/CD CSE 6590 Fall 2010.
CIS 725 Media Access Layer. Medium Access Control Sublayer MAC sublayer resides between physical and data link layer Broadcast/multiacess channels N independent.
McGraw-Hill © The McGraw-Hill Companies, Inc., 2004 Chapter 12 Multiple Access Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction.
Chi-Cheng Lin, Winona State University CS412 Introduction to Computer Networking & Telecommunication Medium Access Control Sublayer.
LECTURE9 NET301. DYNAMIC MAC PROTOCOL: CONTENTION PROTOCOL Carrier Sense Multiple Access (CSMA): A protocol in which a node verifies the absence of other.
© Janice Regan, CMPT 128, CMPT 371 Data Communications and Networking LANs 2: MAC protocols.
LAN technologies and network topology LANs and shared media Locality of reference Star, bus and ring topologies Medium access control protocols.
IEEE Wireless LAN Standard. Medium Access Control-CSMA/CA IEEE defines two MAC sublayers Distributed coordination function (DCF) Point coordination.
Data and Computer Communications Ninth Edition by William Stallings Data and Computer Communications, Ninth Edition by William Stallings, (c) Pearson Education.
Chi-Cheng Lin, Winona State University CS 313 Introduction to Computer Networking & Telecommunication Medium Access Control Sublayer.
4: DataLink Layer1 Multiple Access Links and Protocols Three types of “links”: r point-to-point (single wire, e.g. PPP, SLIP) r broadcast (shared wire.
17 - Winter 2005 ECE ECE 766 Computer Interfacing and Protocols 1 Local Area Networks Need for high performance communications for physically close devices.
5: DataLink Layer 5a-1 Multiple Access protocol. 5: DataLink Layer 5a-2 Multiple Access Links and Protocols Three types of “links”: r point-to-point (single.
Ch 12. Multiple Access. Multiple Access for Shared Link Dedicated link – Point-to-point connection is sufficient Shared link – Link is not dedicated –
LECTURE9 NET301 11/5/2015Lect 9 NET DYNAMIC MAC PROTOCOL: CONTENTION PROTOCOL Carrier Sense Multiple Access (CSMA): A protocol in which a node verifies.
1 Ethernet CSE 3213 Fall February Introduction Rapid changes in technology designs Broader use of LANs New schemes for high-speed LANs High-speed.
THE MEDIUM ACCESS CONTROL SUBLAYER 4.1 THE CHANNEL ALLOCATION PROBLEM 4.2 MULTIPLE ACCESS PROTOCOLS.
COMPUTER NETWORKS Data-link Layer (The Medium Access Control Sublayer) MAC Sublayer.
Multiple Access By, B. R. Chandavarkar, CSE Dept., NITK, Surathkal Ref: B. A. Forouzan, 5 th Edition.
Example DLL Protocols 1. High-Level Data Link Control (HDLC).
CT301 LECTURE 8.
Part III Datalink Layer 10.
High Speed LANs – Ethernet and Token Ring
Chapter 14 LAN Systems Ethernet (CSMA/CD) ALOHA Slotted ALOHA CSMA
Multiple Access Mahesh Jangid Assistant Professor JVW University.
TOKEN BUS & TOKEN RING.
CS 457 – Lecture 6 Ethernet Spring 2012.
Net301 lecture9 11/5/2015 Lect 9 NET301.
Services of DLL Framing Link access Reliable delivery
THE IEEE MAC SUB-LAYER – chapter 14
The Medium Access Control Sublayer
Channel Allocation Problem/Multiple Access Protocols Group 3
Link Layer and LANs Not everyone is meant to make a difference. But for me, the choice to lead an ordinary life is no longer an option 5: DataLink Layer.
Channel Allocation Problem/Multiple Access Protocols Group 3
Data Communication Networks
7- chapter Seven Local Area Networks (LAN)
Computer Interfacing and Protocols
Chapter 6 Multiple Radio Access.
Dr. John P. Abraham Professor UTPA
Multiple Access Control (MAC) Protocols
Part III Datalink Layer 10.
Presentation transcript:

CMPE 80N - Introduction to Networks and the Internet 1 CMPE 80N Spring 2003 Week 4 Introduction to Networks and the Internet

CMPE 80N - Introduction to Networks and the Internet 2 Announcements HTML tutorial on (in class). –Links to on-line HTML tutorials/tools.

CMPE 80N - Introduction to Networks and the Internet 3 Layer 2: Data Link Layer

CMPE 80N - Introduction to Networks and the Internet 4 Data Link Layer So far, sending signals over transmission medium. Data link layer: responsible for error-free (reliable) communication between adjacent nodes. Functions: framing, error control, flow control, addressing, and medium access (in shared networks).

CMPE 80N - Introduction to Networks and the Internet 5 medium access control logical link control Medium Access Control Protocols Coordinate competing requests for medium. PHYSICAL LINK NETWORK TRANSPORT SESSION PRESENTATION APPLICATION Sharing of link and transport of data over the link

CMPE 80N - Introduction to Networks and the Internet 6 Medium Access Control Problem: –Computers in a shared network environment. –Only one computer can transmit at a time. If two computers try to use the same line at the same time, their messages get garbled. Collision! –How can we organize the transmission so that all computers are given an opportunity to exchange messages?

CMPE 80N - Introduction to Networks and the Internet 7 Medium Access Control Control access to shared medium. How?

CMPE 80N - Introduction to Networks and the Internet 8 The Multiplexing Problem Analogy: a highway shared by many users time frequency Shared channel (how to divide resource among multiple recipients?)

CMPE 80N - Introduction to Networks and the Internet 9 Frequency-Division Multiplexing Analogy: a highway has multiple lanes time frequency user 1 user 2 user 3 user 4 guard-band

CMPE 80N - Introduction to Networks and the Internet 10 Time-Division Multiplexing Requirement: precise time coordination time frequency user 1user 2user 3user 4 guard-band user 1user 2

CMPE 80N - Introduction to Networks and the Internet 11 Frequency-Time-Division time frequency time-slot (usually of the same size)

CMPE 80N - Introduction to Networks and the Internet 12 Centralized versus Distributed MAC Centralized approaches: –Controller grants access to medium. –Simple, greater control: priorities, qos. –But, single point of failure and performance bottleneck. Decentralized schemes: –All stations collectively run MAC to decide when to transmit.

CMPE 80N - Introduction to Networks and the Internet 13 Round-Robin MAC Each station is allowed to transmit; station may decline or transmit (bounded by some maximum transmit time). Centralized (e.g., polling) or distributed (e.g., token ring) control of who is next to transmit. When done, station relinquishes and right to transmit goes to next station. Efficient when many stations have data to transmit over extended period (stream).

CMPE 80N - Introduction to Networks and the Internet 14 Scheduled Access MAC Time divided into slots. Station reserves slots in the future. Multiple slots for extended transmissions. Suited to stream traffic.

CMPE 80N - Introduction to Networks and the Internet 15 Contention-Based MAC No control. Stations try to acquire the medium. Distributed in nature. Perform well for bursty traffic. Can get very inefficient under heavy load. NOTE: round-robin and contention are the most common.

CMPE 80N - Introduction to Networks and the Internet 16 MAC Protocols Contention-based –ALOHA and Slotted ALOHA. –CSMA. –CSMA/CD. Round-robin : token-based protocols. –Token bus. –Token ring.

CMPE 80N - Introduction to Networks and the Internet 17 Standardized MACs Topologies Bus Ring Round robin Scheduled Contention Token bus (802.4) Polling (802.11) DQDB (802.6) CSMA/CD (802.3) CSMA/CA (802.11) Token ring (802.5; FDDI) Techniques

CMPE 80N - Introduction to Networks and the Internet 18 Contention-Based MACs

CMPE 80N - Introduction to Networks and the Internet 19 The ALOHA Protocol U of Hawaii in early 70’s. Packet radio networks. “Free for all”: whenever station has a frame to send, it does so. –Station listens for maximum RTT for an ACK. –If no ACK, re-sends frame for a number of times and then gives up. –Receivers check FCS and destination address to ACK.

CMPE 80N - Introduction to Networks and the Internet 20 Collisions Invalid frames may be caused by channel noise or Because other station(s) transmitted at the same time: collision. Collision happens even when the last bit of a frame overlaps with the first bit of the next frame.

CMPE 80N - Introduction to Networks and the Internet 21 ALOHA’s Performance 1 Time t0t0 t 0 +t t 0 +2t t 0 +3t vulnerable

CMPE 80N - Introduction to Networks and the Internet 22 ALOHA’s Performance 2 S = G e -2G, where S is the throughput (rate of successful transmissions) and G is the offered load. S = S max = 1/2e = for G=0.5.

CMPE 80N - Introduction to Networks and the Internet 23 Slotted Aloha Doubles performance of ALOHA. Frames can only be transmitted at beginning of slot: “discrete” ALOHA. Vulnerable period is halved. S = G e -G. S = S max = 1/e = for G = 1.

CMPE 80N - Introduction to Networks and the Internet 24 ALOHA Protocols Poor utilization. Key property of LANs: propagation delay between stations is small compared to frame transmission time. Consequence: stations can sense the medium before transmitting.

CMPE 80N - Introduction to Networks and the Internet 25 Carrier-Sense Multiple Access (CSMA) Station that wants to transmit first listens to check if another transmission is in progress (carrier sense). If medium is in use, station waits; else, it transmits. Collisions can still occur. Transmitter waits for acknowledgement (ACK); if no ACKs, retransmits.

CMPE 80N - Introduction to Networks and the Internet 26 CSMA/CD 1 CSMA with collision detection. Problem: when frames collide, medium is unusable for duration of both (damaged) frames. For long frames (when compared to propagation time), considerable waste. What if station listens while transmitting?

CMPE 80N - Introduction to Networks and the Internet 27 CSMA/CD Protocol 1. If medium idle, transmit; otherwise If medium busy, wait until idle, then transmit. 3. If collision detected, abort transmission. 4. After aborting, wait random time, try again.

CMPE 80N - Introduction to Networks and the Internet 28 Ethernet

CMPE 80N - Introduction to Networks and the Internet 29 Ethernet Most popular CSMA/CD protocol. What if a computer transmits a very long message? –It keeps the line busy for very long time, while all other computers in the LAN must wait for the long message to end Rule #1 of resource sharing: All “messages” must be “small”, to allow other computers to access the line –For Ethernet, the maximum size of the payload is 1,500 bytes

CMPE 80N - Introduction to Networks and the Internet 30 Ethernet (cont’d) What is expected performance? –When only one computer needs to transmit: it can immediately access the line. –When many computers want access (high traffic): Average waiting time is high. There is high probability of “collision”. –For every collision, Xmission must start agan –Fairness?. Conclusion: expected delay depends on the traffic on the LAN!

CMPE 80N - Introduction to Networks and the Internet 31 Ethernet Frame Format Preamble DA SA Type Data CRC Postamble Type: identifies upper layer protocol (for demux’ing) Data: bytes (min. is 46 bytes). DA and SA: destination and source addresses

CMPE 80N - Introduction to Networks and the Internet 32 Round-Robin MACs Polling. Token passing.

CMPE 80N - Introduction to Networks and the Internet 33 Token Passing Consider the following game: –A group of friends sitting in a circle –A ball is passed from friend to friend When somebody receives the ball, it passes to the friend to his/her left –A person is allowed to talk only when s/he has the ball in his/her hands This guarantees that only one person talks at a time!

CMPE 80N - Introduction to Networks and the Internet 34 Token Passing (cont’d) Let’s make the game more difficult: –A person that receives the ball and has something to say, rather than saying it, s/he writes it on a letter Including the name of the addressee –Before passing along the ball, s/he passes along the letter –Everyone who receives the paper passes it to the person to his/her left If s/he is the recipient of the letter, s/he signs it after reading it –Once the letter arrives back to the sender, s/he throws it away The ball is still circulating in the circle

CMPE 80N - Introduction to Networks and the Internet 35 Token Ring A Token Ring MAC works similarly: –A special pattern (3-bytes word) of bits called token moves from one computer to the next. –If a computer does not have a message to send, it just passes the token along. –Otherwise, it “seizes the token” and transmits its message (including the address) instead. –The message is passed from one computer to the next, until it arrives back to the sender, which “destroys” it (does not pass it along anymore). –The addressee may “write” something on the message so that the sender knows it has been received correctly. –Once the computer is done transmitting the message, it “releases” (transmits) the token.

CMPE 80N - Introduction to Networks and the Internet 36 Token Ring (cont’d) When station wants to transmit: –Waits for token. –Seizes it. –Transmits frame. When station seizes token and begins transmission, there’s no token on the ring; so nobody else can transmit.

CMPE 80N - Introduction to Networks and the Internet 37 Token Ring (cont’d) What is expected performance of Token Passing? –It is fair. Each computer is given in turn an opportunity to transmit, even when the traffic is high. –However, even if only one computer needs to transmit a message, it has to wait that it receives the token. Again, long messages should not be allowed, because otherwise one computer may “hold the token” for too long.

CMPE 80N - Introduction to Networks and the Internet 38 Token Ring Frame Format 1 SD ACFC DA SAData FCS 1 12 or 6 4 SD: starting delimiter; indicates starting of frame. AC: access control; PPPTMRRR; PPP and RRR priority and reservation; M monitor bit; T token or data frame. FC: frame control; if LLC data or control. DA and SA: destination and source addresses. FCS: frame check sequence. SD ACFC Token frame ED: ending delimiter; contains the error detection bit E; contains frame continuation bit I (multiple frame transmissions). FS: frame status. 11 EDFS

CMPE 80N - Introduction to Networks and the Internet 39 Ethernet versus Token Ring Token ring: –Efficient at heavy traffic. –Guaranteed delay. –Fair. –But, ring/token maintenance overhead. –But, under light traffic? Ethernet is simple!

CMPE 80N - Introduction to Networks and the Internet 40 Wireless LANs IEEE Distributed access control mechanism (DCF) based on CSMA with optional centralized control (PCF). Physical Layer DCF PCF MAC layer Contention-free Service (polling) Contention Service (CSMA)

CMPE 80N - Introduction to Networks and the Internet 41 MAC in Wireless LANs Distributed coordination function (DCF) uses CSMA-based protocol (e.g., ad hoc networks). CD does not make sense in wireless. –Hard for transmitter to distinguish its own transmission from incoming weak signals and noise. Point coordination function (PCF) uses polling to grant stations their turn to transmit (e.g., cellular networks).