Computer Networks Medium Access Sublayer (Part I).

Slides:



Advertisements
Similar presentations
14-MAC Sub-layer Dr. John P. Abraham Professor UTPA.
Advertisements

Channel Allocation Protocols. Dynamic Channel Allocation Parameters Station Model. –N independent stations, each acting as a Poisson Process for the purpose.
Computer Networks Ethernet I Professor Hui Zhang
The ALOHA Protocol “Free for all”: whenever station has a frame to send, it does so. –Station listens for maximum RTT for an ACK. –If no ACK after a specified.
EECC694 - Shaaban #1 lec #5 Spring Data Link In Broadcast Networks: The Media Access Sublayer Broadcast networks with multi-access (or random.
Ethernet – CSMA/CD Review
The Data Link Layer introduction point-to-point data link protocols
Ethernet. Review Media Access Control – Broadcast media shared by all stations – MAC is used to determine who gets the right to send Developed protocol.
MAC Protocols Media Access Control (who gets the use the channel) zContention-based yALOHA and Slotted ALOHA. yCSMA. yCSMA/CD. TDM and FDM are inefficient.
Computer Networks Medium Access Sublayer. Topics F Introduction F Multiple Access Protocols F IEEE 802 Standard F Bridges F Misc (brief) –High-Speed LANs.
Computer Networks Medium Access Sublayer. Topics F Introduction F Multiple Access Protocols F IEEE 802 Standard F Bridges F Misc (brief) –High-Speed LANs.
CMPE 150- Introduction to Computer Networks 1 CMPE 150 Fall 2005 Lecture 17 Introduction to Computer Networks.
CSC 450/550 Part 3: The Medium Access Control Sublayer.
EEC-484/584 Computer Networks Lecture 7 Wenbing Zhao
CMPE 150- Introduction to Computer Networks 1 CMPE 150 Fall 2005 Lecture 16 Introduction to Computer Networks.
EEC-484/584 Computer Networks Lecture 13 Wenbing Zhao
EEC-484/584 Computer Networks Lecture 9 Wenbing Zhao (Part of the slides are based on materials supplied by Dr. Louise Moser at UCSB and.
Studying Local Area Networks Via Media Access Control (MAC) SubLayer
Networks: Local Area Networks1 LANs Studying Local Area Networks Via Media Access Control (MAC) SubLayer.
Ethernet. Ethernet [DEC, Intel, Xerox] 1-persistent, CSMA-CD with Binary Exponential Backoff Manchester encoding.
Computer Networks: Local Area Networks 1 LANs Studying Local Area Networks via the Media Access Control (MAC) SubLayer.
1 Chapter 5 The Medium Access Sublayer. 2 Chapter 5 The Medium Access Layer 5.1 The Channel Allocation problem - Static and dynamic channel allocation.
Infrastructure de Communications – CR 4107Chapter 41 The Medium Access Control Sublayer Chapter 4.
Enhanced CSMA Additional improvement  Use CSMA access  Listen while transmitting  Stop immediately if collision sensed  Called collision detection.
Review: Medium Access Control Sublayer –What is the problem to be addressed in this sublayer? –Protocols that allow collision Pure ALOHA Slotted ALOHA.
1 ECE453 – Introduction to Computer Networks Lecture 7 – Multiple Access Control (I)
Computer Networks 1 (Mạng Máy Tính 1)
9/11/2015 5:55 AM1 Ethernet and CSMA/CD CSE 6590 Fall 2010.
1 Computer Communication & Networks Lecture 13 Datalink Layer: Local Area Network Waleed Ejaz
Chi-Cheng Lin, Winona State University CS412 Introduction to Computer Networking & Telecommunication Medium Access Control Sublayer.
Computer Networks NYUS FCSIT Spring 2008 Igor TRAJKOVSKI, Ph.D. Associate Professor
Chapter 4: Medium Access Control (MAC) Sublayer
Ch. 16 High-Speed LANs The Emergence of High- Speed LANs Trends –Computing power of PCs has continued to grow. –MIS organizations recognize the.
CSMA with Collision Detection CSMA/CD can be in one of three states: contention, transmission, or idle.
The Medium Access Control Sublayer Chapter 4. The Channel Allocation Problem Static Channel Allocation in LANs and MANs Dynamic Channel Allocation in.
The Medium Access Control Sublayer Chapter 4 10/1/2015www.noteshit.com1.
CHAPTER 4: THE MEDIUM ACCESS SUBLAYER 4.1: The Channel Allocation Problem 4.2: Multiple Access Protocols.
جلسه دهم شبکه های کامپیوتری به نــــــــــــام خدا.
The Medium Access Control Sublayer Chapter 4. The Channel Allocation Problem Static Channel Allocation Dynamic Channel Allocation  Delay for the divided.
CSCI 465 D ata Communications and Networks Lecture 21 Martin van Bommel CSCI 465 Data Communications & Networks 1.
Chi-Cheng Lin, Winona State University CS 313 Introduction to Computer Networking & Telecommunication Medium Access Control Sublayer.
The Medium Access Control Sublayer Chapter 4. The Channel Allocation Problem Static Channel Allocation in LANs and MANs Dynamic Channel Allocation in.
The Medium Access Control Sublayer Chapter 4. The Channel Allocation Problem Static Channel Allocation in LANs and MANs Dynamic Channel Allocation in.
CEN 4500 Data Communications Instructor: S. Masoud Sadjadi sadjadi At cs Dot fiu Dot edu Chapter 4: The Medium.
جلسه یازدهم شبکه های کامپیوتری به نــــــــــــام خدا.
17 - Winter 2005 ECE ECE 766 Computer Interfacing and Protocols 1 Local Area Networks Need for high performance communications for physically close devices.
Medium Access Control Sub Layer
7-1 Introduction to Queueing Theory l Components of a queueing system n probability density function (pdf) of interarrival times n pdf of service times.
LANs : Aloha/CSMA , summary
The Medium Access Control Sublayer Chapter 4 12/13/2015www.ishuchita.com1.
The Medium Access Control Sublayer Chapter 4. The Channel Allocation Problem Static Channel Allocation in LANs and MANs Dynamic Channel Allocation in.
EE 122: Lecture 6 Ion Stoica September 13, 2001 (* this talk is based in part on the on-line slides of J. Kurose & K. Rose)
Carrier Sense Multiple Access Improve ALOHA by using carrier sense –Stations listen to the carrier before transmitting –If channel is busy, the station.
1 Ethernet CSE 3213 Fall February Introduction Rapid changes in technology designs Broader use of LANs New schemes for high-speed LANs High-speed.
1 Ethernet History –developed by Xerox PARC in mid-1970s –roots in Aloha packet-radio network –standardized by Xerox, DEC, and Intel in 1978 –similar to.
The Medium Access Control Sublayer
The Medium Access Control (MAC) Sublayer. The Channel Allocation Problem Static Channel Allocation in LANs and MANs Dynamic Channel Allocation in LANs.
Chapter 4 The Medum Access Sublayer. MA Sublayer Additional Reference –Local and Metropolitan Area Networks, William Stallings, Prentice Hall, 2000, 6th.
THE MEDIUM ACCESS CONTROL SUBLAYER 4.1 THE CHANNEL ALLOCATION PROBLEM 4.2 MULTIPLE ACCESS PROTOCOLS.
Ch. 16 Ethernet Traditional Ethernet IEEE Medium Access Control –Carrier Sense Multiple Access with Collision Detection (CSMA/CD) –The most.
UNIT 2 Medium Access sub layer: Medium Access sub layer - Channel Allocations, LAN protocols - ALOHA protocols(PURE AND SLOTTED ALOHA),CSMA/CA,CSMA/CD.
COMPUTER NETWORKS Data-link Layer (The Medium Access Control Sublayer) MAC Sublayer.
Example DLL Protocols 1. High-Level Data Link Control (HDLC).
The Medium Access Control Sublayer
The Medium Access Control Sublayer
THE IEEE MAC SUB-LAYER – chapter 14
The Medium Access Control (MAC) Sublayer
The Medium Access Control Sublayer
Computer Interfacing and Protocols
Dr. John P. Abraham Professor UTPA
Presentation transcript:

Computer Networks Medium Access Sublayer (Part I)

Topics F Introduction F Multiple Access Protocols F Ethernet F Wireless LAN Protocols F Bridges F Misc (brief) –High-Speed LANs –Satellite Networks

Introduction F Remember, two categories of networks –point-to-point –broadcast F Key issue is who gets channel –example: 6-person conference call F Many protocols to decide F Medium Access Control sublayer –lower part of data-link layer, but easier here F Many LANs multiaccess –satellites, too

Fixed Channel Allocation F Static channel allocation –FDM, TDM

FDM F Time delay T F Capacity C bps F Arrival rate frames/sec F Frames mean 1/  bits T = 1___  C - F Divide into N channels F Each channel C/N bps T = 1____  (C/N) - ( /N) = _ N__  C - = N T TDM is the same

Dynamic Channel Allocation in LANs and MANs: Assumptions F Station Model –N independent stations F Single Channel Assumption. –One shared channel for transmission F Collision Assumption. –garbled if transmissions overlap F (a) Continuous Time. (b) Slotted Time. F (a) Carrier Sense. (b) No Carrier Sense.

Multiple Access Protocols ALOHA Carrier Sense Multiple Access Protocols Collision-Free Protocols Limited-Contention Protocols Wireless LAN Protocols

ALOHA - A Family of Contention Protocols F 1970’s, Abramson F University of Hawaii F Ground based broadcasting, packet radio –generalizes to uncoordinated users competing for single, shared channel F Pure ALOHA –no time slots F Slotted ALHOA –time slots for frames

Pure ALOHA F Transmit whenever you want F Detect collisions after sending –checksum error F If collision, wait random time and retry

Pure ALOHA == Pure Chaos? F Assume infinite collection of stations F Users in two states: typing or waiting F User typing a line. When done, transmit it. –user waiting for response. When done, typing. F frame time is time to put frame on wire –frame length / bit rate (fixed frame length) F Mean number of new frames per frame time –N –What does N > 1 mean?

Analysis of Pure ALOHA F Stations also re-generate collided frames –G is old plus new frames –G > N? G = N? G < N? F Low load (N  0), few collisions: G  N F High load, many collisions: G > N F Throughput per frame time is G times probability of frame having zero collisions: S = G P 0 –ex: G=.5, P 0 =.5 so S =.25 –Note: P 0 is probability of successful transmission

Frame Collisions

Analysis of Pure ALOHA (cont.)  Probability k frames generated per frame time G k e -G Pr[k] = k! Pr[0] = e -G F Need two frame times empty, 2G generated –for two slots, Pr[0] = e -2G F Using S=GP 0, throughput per frame time S = Ge -2G

Pure ALOHA Offered Load vs. Throughput F Max at G = 0.5, S = 1/2e, only about (18%)! –Can we do better?

Slotted ALOHA F Divide time into intervals, one for each frame F Stations agree upon time intervals –one can “pip” as time keeper, like a clock F Users transmit only at beginning of slot F Need one frame time to be empty, G generated –for one slot, Pr[0] = e -G F Throughput S = Ge -G

Slotted ALOHA Offered Load vs. Throughput F Max at G = 1, S = 1/e, only about (37%) –This is not Ethernet!

Last Thoughts on Slotted ALOHA F Best (G = 1): –37% empty –37% success –26% collisions F Raising G, reduces empties but increases collisions exponentially F Expected transmissions (includes original) E = e G –G=0, then 1 transmission; G=1 then 2.X trans. F Small increase in load, big decrease in perf

Carrier Sense Multiple Access - CSMA Protocols F Sending without paying attention is obviously limiting F In LANs, can detect what others are doing F Stations listen for a transmission –carrier sense protocols

Persistent and Nonpersistent F 1-persistent CSMA –detect, send at first chance –wait if another sending –longer delay, more collisions F non-persistent CSMA –if empty, send –if not, less greedy, waits random time then repeats –fewer collisions, longer delay F p-persistent CSMA –if empty, sends with probability p –defers with probability q = 1 - p

Carrier Sense Multiple Access

CSMA with Collision Detection F If detect collision, stop transmitting –frame will be garbled anyway F CSMA with Collision Detection (CD)

CSMA/CD Closing Comments F How long until realize a collision? Time to travel length of cable? Why not? F Propogation , need 2  to “seize” the line F Model 2  slot as slotted ALOHA F 1-km cable has   5  sec F Collision detection analog –special hardware encoding so can detect F Does not guarantee reliable delivery F Basis IEEE (Ethernet)

Collision-Free Protocols F Collisions still occur in CSMA/CD F More so when “wire” long (large  ) F Short frames, too, since contention period becomes more significant F Want collision free protocols F Need to assume N stations have numbers 0 to (N-1) wired in

Bit-Map Protocol F Have N contention slots F Station N puts 1 in slot N-1, else 0 –ex: station 0 wants to send, 1 in 0th slot

Bit-Map Protocol Performance F N contention slots, so N bits overhead /frame F d data bits F Station wants to transmit, waits –Low numbered: avg N/2 slots (current) + N for next –High numbered: avg. N/2 –Combined avg. delay: N F Efficiency under low load (1 sending): –d /(N+d) –average delay: N/2 F High load (N sending): can prorate overhead –d/(d+1) –average delay: N(d+1)/2

Where the Heck Were We? F Introduction  F Multiple Access Protocols –contention  –collision-free  F Ethernet F Wireless LAN Protocols F Bridges F Misc (brief) –High-Speed LAN

Binary Countdown F Instead of 1 bit per station, encode in binary –transmit address in binary F Assume all stations see inserted bits instantaneously F When multiple transmit, OR together F When a station sees high-order 1 bit where it has a zero, it gives up

Binary Countdown Performance F Efficiency: d/(d+log 2 N) F Sender address as first field and no overhead F Fairness/Unfairness? –Mok and Ward (1979): Use virtual station numbers –C,H,D,A,G,B,E,F are 7,6,5,4,3,2,1,0 –D sends: C,H,A,G,B,E,F,D

Contention vs. Collision-Free F Contention better under low load. Why? F Collision-free better under high load. Why? F Hybrid: limited contention protocols F Instead of symmetric contention, asymmetric F Divide into groups. Each group contents for same slot. F How to assign to slots? –1 per slot, then collision free (Binary Countdown) –All in same slot, then contention (CSMA/CD)

Adaptive Tree Walk Protocol F U.S. Army test for Syphilis –Test group, if negative all ok –If positive, then split in two and re-test

Adaptive Tree Walk Protocol F Where to begin searching (entire army?) –if heavily loaded, not at the top since there will always be a collision F Number levels 0, 1, 2 … F At level i, 1/2 i stations below it –ex: level 0, all stations below it, 1 has 1/2 below… F If q stations want to transmit, then q/2 i below F Want number below to be 1 (no collisions) –q/2 i = 1, i = log 2 q

Other Improvements F If collision at 1, 2 idle, do we need to search 3?

Heck, Here We Are F Introduction  F Multiple Access Protocols  –contention  –collision-free  F Ethernet  F Wireless LAN Protocols F Bridges F Misc (brief) –High-Speed LANs –Satellite Networks

Ethernet Ethernet Cabling Manchester Encoding The Ethernet MAC Sublayer Protocol The Binary Exponential Backoff Algorithm Ethernet Performance Switched Ethernet Fast Ethernet Gigabit Ethernet IEEE 802.2: Logical Link Control

Ethernet (IEEE 802.3) F Began as ALOHA, added carrier sense F Xerox PARC built 3 Mbps version for workstations and called it Ethernet –old scientist dudes thought waves propagated through substance called “ether”, so a geeky joke F Xerox, DEC and Intel made 10 Mbps standard –1 to 10 Mbps –not “Ethernet”, but close enough

Ethernet Cabling F 10Base5 - “Thick Ethernet” –10 Mbps, 500 meters F 10Base2 - “Thin Ethernet” or “Thinnet” –BNC connectors, or T-junctions –Easier and more reliable than 10Base5 –But only 200 meters and 30 stations per segment F All on one line, then difficult to find break –domain reflectometry –hubs F 10BaseT (Twisted pair) F 10BaseF (Fiber)

Kinds of Ethernet Cabling Three kinds of Ethernet cabling. (a) 10Base5, (b) 10Base2, (c) 10Base-T.

Cable Topologies Repeaters? Cable topologies. (a) Linear, (b) Spine, (c) Tree, (d) Segmented.

Encoding F 0 volts for 0 and 5 volts for 1 can be misleading F Want start, middle and end of each bit without reference to external clock –Manchester Encoding –Differential Manchester Encoding uses changes

Ethernet Protocol F Preamble: to allow clock synch F Start of Frame: F Source and Destination addr: 2 or 6 bytes –1 for high order bit means “multicast” –all 1’s means “broadcast” F Length: data length, 46 to 1500 –very small frames, problems, so pad to 46 Frame formats. (a) DIX Ethernet, (b) IEEE

Short, Short Frames F Frame must be > 2  F Otherwise, how to tell collision from short frame?

Collision Action? F Each slot of length 2  F If collision, then wait 0 or 1 slot F If another collision, then wait 0, 1, 2, 3 slots F If another collision, then wait 0 to slots F After i collisions, wait 0 to 2 i -1 slots –called binary exponential backoff –why is this a good idea? Consider other options F After 10 collisions, wait 0 to 1023 slots F After 16 collisions, throw in the towel

Now,Where Were We? F Introduction  F Multiple Access Protocols  F IEEE 802 Standard –Ethernet (802.3)  F Wireless LAN Protocols F Misc