T. S. Eugene Ngeugeneng at cs.rice.edu Rice University1 COMP/ELEC 429 Introduction to Computer Networks Broadcast network access control Some slides used.

Slides:



Advertisements
Similar presentations
Nick Feamster CS 4251 Computer Networking II Spring 2008
Advertisements

Channel Allocation Protocols. Dynamic Channel Allocation Parameters Station Model. –N independent stations, each acting as a Poisson Process for the purpose.
Computer Networks Ethernet I Professor Hui Zhang
The ALOHA Protocol “Free for all”: whenever station has a frame to send, it does so. –Station listens for maximum RTT for an ACK. –If no ACK after a specified.
EECC694 - Shaaban #1 lec #5 Spring Data Link In Broadcast Networks: The Media Access Sublayer Broadcast networks with multi-access (or random.
Ethernet – CSMA/CD Review
Multiple Access Methods. When nodes or stations are connected and use a common link (cable or air), called a multipoint or broadcast link, we need a.
– Wireless PHY and MAC Stallings Types of Infrared FHSS (frequency hopping spread spectrum) DSSS (direct sequence.
12.1 Chapter 12 Multiple Access Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Communication Networks Lecture 5 NETW 501-L5: NETW 501-L5: Medium Access Control Dr.-Ing. Khaled Shawky Hassan Room: C3-222, ext: 1204,
1 Pertemuan 13 Teknik Akses Jaringan - Random Matakuliah: H0174/Jaringan Komputer Tahun: 2006 Versi: 1/0.
MAC Protocols Media Access Control (who gets the use the channel) zContention-based yALOHA and Slotted ALOHA. yCSMA. yCSMA/CD. TDM and FDM are inefficient.
CS 5253 Workshop 1 MAC Protocol and Traffic Model.
CMPE 150- Introduction to Computer Networks 1 CMPE 150 Fall 2005 Lecture 17 Introduction to Computer Networks.
Copyright © 2003, Dr. Dharma P. Agrawal and Dr. Qing-An Zeng. All rights reserved. 1 Chapter 6 Multiple Radio Access.
EE 122: Ethernet and Ion Stoica September 18, 2002 (* this talk is based in part on the on-line slides of J. Kurose & K. Rose)
1 Link Layer Message M A B Problem: Given a message M at a node A consisting of several packets, how do you send the packets to a “neighbor” node B –Neighbor:
Teknik Akses Jaringan - Non Carrier Sense Pertemuan 11 Matakuliah: H0484/Jaringan Komputer Tahun: 2007.
CMPE 150- Introduction to Computer Networks 1 CMPE 150 Fall 2005 Lecture 16 Introduction to Computer Networks.
EEC-484/584 Computer Networks Lecture 13 Wenbing Zhao
Studying Local Area Networks Via Media Access Control (MAC) SubLayer
Spanning Tree and Wireless EE122 Discussion 10/28/2011.
ECE358: Computer Networks Spring 2012
EEC-484/584 Computer Networks Lecture 13 Wenbing Zhao
Networks: Local Area Networks1 LANs Studying Local Area Networks Via Media Access Control (MAC) SubLayer.
Computer Networks: Local Area Networks 1 LANs Studying Local Area Networks via the Media Access Control (MAC) SubLayer.
Semester EEE449 Computer Networks The Data Link Layer Part 2: Media Access Control En. Mohd Nazri Mahmud MPhil (Cambridge, UK) BEng (Essex,
Lecture 16 Random Access protocols r A node transmits at random at full channel data rate R. r If two or more nodes “collide”, they retransmit at random.
Shashank Srivastava Motilal Nehru National Institute Of Technology, Allahabad Medium Access Control.
Chap 4 Multiaccess Communication (Part 1)
1 ECE453 – Introduction to Computer Networks Lecture 7 – Multiple Access Control (I)
جلسه دوازدهم شبکه های کامپیوتری به نــــــــــــام خدا.
9/11/2015 5:55 AM1 Ethernet and CSMA/CD CSE 6590 Fall 2010.
Multiple Access Protocols Chapter 6 of Hiroshi Harada Book
Wireless Medium Access. Multi-transmitter Interference Problem  Similar to multi-path or noise  Two transmitting stations will constructively/destructively.
McGraw-Hill © The McGraw-Hill Companies, Inc., 2004 Chapter 12 Multiple Access Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction.
Chi-Cheng Lin, Winona State University CS412 Introduction to Computer Networking & Telecommunication Medium Access Control Sublayer.
4-1 Last time □ Link layer overview ♦ Services ♦ Adapters □ Error detection and correction ♦ Parity check ♦ Internet checksum ♦ CRC □ PPP ♦ Byte stuffing.
CSC4220/6220 Computer Networks
M EDIUM A CCESS C ONTROL By Dr. Nawaporn Wisitpongphan.
جلسه دهم شبکه های کامپیوتری به نــــــــــــام خدا.
Medium Access Control NWEN302 Computer Network Design.
Layer 2 Technologies At layer 2 we create and transmit frames over communications channels Format of frames and layer 2 transmission protocols are dependent.
Chi-Cheng Lin, Winona State University CS 313 Introduction to Computer Networking & Telecommunication Medium Access Control Sublayer.
4: DataLink Layer1 Multiple Access Links and Protocols Three types of “links”: r point-to-point (single wire, e.g. PPP, SLIP) r broadcast (shared wire.
Medium Access Control Sub Layer
Chapter 6 Multiple Radio Access
Medium Access Control Protocols, Local Area Networks, and Wireless Local Area Networks Lecture Note 9.
Introduction to Wireless Networks Dina Katabi & Sam Madden MIT – – Spring 2014.
CS3502: Data and Computer Networks Local Area Networks - 1 introduction and early broadcast protocols.
5: DataLink Layer 5a-1 Multiple Access protocol. 5: DataLink Layer 5a-2 Multiple Access Links and Protocols Three types of “links”: r point-to-point (single.
Data Link Layer. Useful References r Wireless Communications and Networks by William Stallings r Computer Networks (third edition) by Andrew Tanenbaum.
Ch 12. Multiple Access. Multiple Access for Shared Link Dedicated link – Point-to-point connection is sufficient Shared link – Link is not dedicated –
CS3502: Data and Computer Networks Local Area Networks - 1 introduction and early broadcast protocols.
LECTURE9 NET301 11/5/2015Lect 9 NET DYNAMIC MAC PROTOCOL: CONTENTION PROTOCOL Carrier Sense Multiple Access (CSMA): A protocol in which a node verifies.
Medium Access Control in Wireless networks
EE 122: Lecture 6 Ion Stoica September 13, 2001 (* this talk is based in part on the on-line slides of J. Kurose & K. Rose)
1 Ethernet CSE 3213 Fall February Introduction Rapid changes in technology designs Broader use of LANs New schemes for high-speed LANs High-speed.
Computer Engineering and Networks, College of Engineering, Majmaah University LAN TECHNOLOGIES Mohammed Saleem Bhat CEN-444 Networks Structure.
High Speed LANs – Ethernet and Token Ring
Multiple Access Mahesh Jangid Assistant Professor JVW University.
CS 457 – Lecture 6 Ethernet Spring 2012.
Services of DLL Framing Link access Reliable delivery
COMP/ELEC 429/556 Introduction to Computer Networks
Overview Jaringan Komputer (3)
Link Layer and LANs Not everyone is meant to make a difference. But for me, the choice to lead an ordinary life is no longer an option 5: DataLink Layer.
Link Layer: Multiple Access
Chapter 6 Multiple Radio Access.
Dr. John P. Abraham Professor UTPA
Multiple Access Control (MAC) Protocols
Presentation transcript:

T. S. Eugene Ngeugeneng at cs.rice.edu Rice University1 COMP/ELEC 429 Introduction to Computer Networks Broadcast network access control Some slides used with permissions from Edward W. Knightly, T. S. Eugene Ng, Ion Stoica, Hui Zhang

Good Old 10BASE5 Ethernet (1976) T. S. Eugene Ngeugeneng at cs.rice.edu Rice University2

Then Came 10BASE2 Ethernet (1980s) T. S. Eugene Ngeugeneng at cs.rice.edu Rice University3

Then Came 10BASET Ethernet (1990) T. S. Eugene Ngeugeneng at cs.rice.edu Rice University4

5 Overview Ethernet and Wi-Fi are both “multi-access” technologies –Broadcast medium, shared by many nodes/hosts Simultaneous transmissions will result in collisions Media Access Control (MAC) protocol required –Rules on how to share medium

T. S. Eugene Ngeugeneng at cs.rice.edu Rice University6 Media Access Control Strategies Channel partitioning –Divide channel into smaller “pieces” (e.g., time slots, frequencies) –Allocate a piece to each host for exclusive use –E.g. Time-Division-Multi-Access (TDMA) cellular network Taking-turns –Tightly coordinate shared access to avoid collisions –E.g. Token ring network Contention –Allow collisions –“Recover” from collisions –E.g. Ethernet, Wi-Fi

T. S. Eugene Ngeugeneng at cs.rice.edu Rice University7 Contention Media Access Control Goals Share medium –If two hosts send at the same time, collision results in no packet being received –Thus, want to have only one host to send at a time Want high network utilization Want simple distributed algorithm –no complex token-passing scheme that are hard to implement reliably

T. S. Eugene Ngeugeneng at cs.rice.edu Rice University8 ALOHA (1971, First Packet Data Network) Topology: Broadcast medium with multiple hosts Aloha Protocol: –Whenever a host has a frame (packet) to send, it transmits the frame immediately –Receivers acknowledge (ACK) all frames –No ACK = collision. Wait a random time and retransmit

T. S. Eugene Ngeugeneng at cs.rice.edu Rice University9 Simple, but radical at the time Previous attempts all partitioned channel –TDMA, FDMA, etc. Aloha optimized for the common case (few senders) and dealt with collisions through retries

T. S. Eugene Ngeugeneng at cs.rice.edu Rice University10 Trade-off Compared to TDMA In TDMA, you always have to wait your turn –delay proportional to number of hosts In Aloha, a host can send immediately Aloha gives much lower send delay, at the price of lower maximum utilization (as we will see)

T. S. Eugene Ngeugeneng at cs.rice.edu Rice University11 Collisions in ALOHA Host

T. S. Eugene Ngeugeneng at cs.rice.edu Rice University12 Performance of ALOHA Performance questions: –What is the collision probability? –What is the maximum throughput? Notation: C: link capacity (bits/sec) s: frame size (bits) F: frame transmission time (sec)

T. S. Eugene Ngeugeneng at cs.rice.edu Rice University13 Collisions and Vulnerable Period A frame will be in a collision if and only if another transmission begins in the vulnerable period of the frame Vulnerable period has the length of 2 frame transmission times

T. S. Eugene Ngeugeneng at cs.rice.edu Rice University14 Traffic Model Aggregate average frame rate from all hosts (Poisson processes are additive)   i Assume each host sends frames according to a Poisson process at average rate λ i frames per second

T. S. Eugene Ngeugeneng at cs.rice.edu Rice University15 System Model Probability of collision Actual average frame rate carried including retransmissions

T. S. Eugene Ngeugeneng at cs.rice.edu Rice University16 Probability of Collision Recall that if Poisson events occur at rate, P(no event in T seconds) = e - T 2F

T. S. Eugene Ngeugeneng at cs.rice.edu Rice University17 Throughput and Total Carried Load If stable, all offered traffic is serviced, and  is also the throughput.   normalized offered load = = F C / s

T. S. Eugene Ngeugeneng at cs.rice.edu Rice University18 Maximum Throughput Maximum achievable throughput: Observe: if offered load >.18*C, unstable

T. S. Eugene Ngeugeneng at cs.rice.edu Rice University19 Performance of ALOHA Maximum throughput approximately 18% of the capacity However, ALOHA is still used for its simplicity 3G phone call establishment

T. S. Eugene Ngeugeneng at cs.rice.edu Rice University20 Slotted ALOHA (S-ALOHA) The Slotted Aloha Protocol –Aloha with an additional constraint –Time is divided into discrete time intervals (slots) –A host can transmit only at the beginning of a slot –A slot is long enough to transmit one frame As a consequence: –Frames either collide completely or do not collide at all –Vulnerable period = ?

T. S. Eugene Ngeugeneng at cs.rice.edu Rice University21 Collisions in S-ALOHA Host

T. S. Eugene Ngeugeneng at cs.rice.edu Rice University22 Total Throughput in S-ALOHA: Maximum achievable throughput: Performance gain but requires hosts to have synchronized frame boundaries –harder to implement Performance of S-ALOHA

T. S. Eugene Ngeugeneng at cs.rice.edu Rice University23 Comparison of ALOHA and S-ALOHA

T. S. Eugene Ngeugeneng at cs.rice.edu Rice University24 Wireline Network: Ethernet Broadcast technology Carrier-sense multiple access with collision detection (CSMA/CD). –MA = multiple access –CS = carrier sense –CD = collision detection host Hub Bob Metcalfe named after the disproven luminiferous ether as an "omnipresent, completely-passive medium for the propagation of electromagnetic waves"

T. S. Eugene Ngeugeneng at cs.rice.edu Rice University25 Ethernet Frame Structure Preamble: –7 bytes with pattern followed by one byte with pattern –Used to synchronize receiver, sender clock rates Addresses: 6 bytes, a frame is received by all adapters on a shared Ethernet and dropped if address does not match Length: 2 bytes, length of actual data CRC: 4 bytes, checked at receiver, if error is detected, the frame is simply dropped Data payload: maximum 1500 bytes, minimum 46 bytes –If data is less than 46 bytes, pad with zeros to 46 bytes Length

T. S. Eugene Ngeugeneng at cs.rice.edu Rice University26 CSMA/CD Algorithm Sense for carrier –i.e. an on-going transmission If carrier present, wait until carrier ends –Sending now would force a collision and waste time Send packet and sense for collision If no collision detected, consider packet delivered Otherwise, abort immediately, perform “exponential back off” and send packet again –Start to send at a random time picked from an interval –Length of the interval increases with every retransmission

T. S. Eugene Ngeugeneng at cs.rice.edu Rice University27 Collision Example spatial layout of nodes along ethernet

T. S. Eugene Ngeugeneng at cs.rice.edu Rice University28 CSMA/CD (Collision Detection) Collision detection easy in wired Ethernet: –compare transmitted and received signals Colliding transmissions aborted, reducing channel wastage

T. S. Eugene Ngeugeneng at cs.rice.edu Rice University29 Collision detection

T. S. Eugene Ngeugeneng at cs.rice.edu Rice University30 Minimum Packet Size Why require a minimum packet size? To give a host enough time to detect collisions In Ethernet, minimum packet size = 64 bytes (two 6- byte addresses, 2-byte type/length, 4-byte CRC, and 46 bytes of data) If host has less than 46 bytes to send, the adaptor pads (adds) bytes to make it 46 bytes What is the relationship between minimum packet size and the length of the Ethernet?

T. S. Eugene Ngeugeneng at cs.rice.edu Rice University31 Minimum Packet Size & Network Length propagation delay (d) a) Time = t; Host 1 starts to send packet Host 1Host 2 propagation delay (d) Host 1Host 2 b) Time = t + d; Host 2 starts to send a packet just before it hears Host 1’s packet propagation delay (d) Host 1Host 2 c) Time = t + 2*d; Host 1 hears Host 2’s packet  detects collision Network length <= (min_packet_size)*(propagation_speed)/(2*bandwidth) = = (8*64b)*(2.5*10 8 mps)/(2*10 7 bps) = 6400m approx

T. S. Eugene Ngeugeneng at cs.rice.edu Rice University32 Exponential Backoff Algorithm Ethernet uses the exponential backoff algorithms to determine when a station can retransmit after a collision Algorithm: Set “slot time” equal to 512bit time After first collision wait 0 or 1 slot times After i-th collision, wait a random number between 0 and 2 i -1 time slots Do not increase random number range, if i=10 Give up after 16 collisions

T. S. Eugene Ngeugeneng at cs.rice.edu Rice University Ethernet vs Wi-Fi Ethernet: one shared “collision” domain : radios have small range compared to overall system: collisions are local –collisions are at receiver, not sender –carrier-sense plays different role CSMA/CA not CSMA/CD –collision avoidance, not collision detection

T. S. Eugene Ngeugeneng at cs.rice.edu Rice University34 Collision Avoidance: The Problems Reachability is not transitive: if B can reach C, and C can reach D, it doesn’t necessary mean that B can reach D Hidden node: A and C send packets to B; neither A nor C will detect the collision! Exposed node: B sends a packet to A; C hears this and decides not to send a packet to D, despite the fact that sending it will not cause interference at A or D! ABC D

T. S. Eugene Ngeugeneng at cs.rice.edu Rice University35 Multiple Access with Collision Avoidance (MACA) Before every data transmission –Sender sends a Request to Send (RTS) frame containing the length of the transmission –Receiver respond with a Clear to Send (CTS) frame –Sender sends data –Receiver sends an ACK; now another sender can send data When sender doesn’t get a CTS/ACK back, it assumes collision senderreceiver other node in sender’s range RTS other node in receiver’s range CTS ACKdata

T. S. Eugene Ngeugeneng at cs.rice.edu Rice University36 Other Nodes When you hear a CTS, you keep quiet until scheduled transmission is over, that is you hear the ACK If you hear a RTS, but not the CTS, you can send –interfering at source but not at receiver senderreceiver other node in sender’s range RTS CTS ACK data other node in receiver’s range

Wrap up A glimpse of the many challenges and ideas in broadcast network access control Wireless network access control is still an area for active research –Many requirements such as power efficiency, low delay, high transmission success rate, etc. T. S. Eugene Ngeugeneng at cs.rice.edu Rice University37