Chapter 2 Multiple Access Protocols Professor Rick Han University of Colorado at Boulder

Slides:



Advertisements
Similar presentations
Nick Feamster CS 4251 Computer Networking II Spring 2008
Advertisements

14-MAC Sub-layer Dr. John P. Abraham Professor UTPA.
EECC694 - Shaaban #1 lec #5 Spring Data Link In Broadcast Networks: The Media Access Sublayer Broadcast networks with multi-access (or random.
Ethernet – CSMA/CD Review
Multiple access What if multiple machines are sharing the same link?
Communication Networks Lecture 5 NETW 501-L5: NETW 501-L5: Medium Access Control Dr.-Ing. Khaled Shawky Hassan Room: C3-222, ext: 1204,
1 K. Salah Module 4.2: Media Access Control The Media Access Control (MAC) sublayer –Random Access (CSMA), IEEE –Token Passing, IEEE Ch 13-
Chapter 12 Multiple Access Figure 12.1 Data link layer divided into two functionality-oriented sublayers Figure 12.2 Taxonomy of multiple-access protocols.
1 Pertemuan 13 Teknik Akses Jaringan - Random Matakuliah: H0174/Jaringan Komputer Tahun: 2006 Versi: 1/0.
MAC Protocols Media Access Control (who gets the use the channel) zContention-based yALOHA and Slotted ALOHA. yCSMA. yCSMA/CD. TDM and FDM are inefficient.
CS 5253 Workshop 1 MAC Protocol and Traffic Model.
CMPE 150- Introduction to Computer Networks 1 CMPE 150 Fall 2005 Lecture 17 Introduction to Computer Networks.
Copyright © 2003, Dr. Dharma P. Agrawal and Dr. Qing-An Zeng. All rights reserved. 1 Chapter 6 Multiple Radio Access.
Teknik Akses Jaringan Carrier Sense Pertemuan 12 Matakuliah: H0484/Jaringan Komputer Tahun: 2007.
20 – Collision Avoidance, : Wireless and Mobile Networks6-1.
Teknik Akses Jaringan - Non Carrier Sense Pertemuan 11 Matakuliah: H0484/Jaringan Komputer Tahun: 2007.
CMPE 150- Introduction to Computer Networks 1 CMPE 150 Fall 2005 Lecture 16 Introduction to Computer Networks.
EEC-484/584 Computer Networks Lecture 13 Wenbing Zhao
Studying Local Area Networks Via Media Access Control (MAC) SubLayer
5: DataLink Layer5-1 Chapter 5 Link Layer and LANs Computer Networking: A Top Down Approach Featuring the Internet, 3 rd edition. Jim Kurose, Keith Ross.
Chapter 2 Multiple Access Protocols Professor Rick Han University of Colorado at Boulder
Networks: Local Area Networks1 LANs Studying Local Area Networks Via Media Access Control (MAC) SubLayer.
Computer Networks: Local Area Networks 1 LANs Studying Local Area Networks via the Media Access Control (MAC) SubLayer.
5-1 Data Link Layer r What is Data Link Layer? r Wireless Networks m Wi-Fi (Wireless LAN) r Comparison with Ethernet.
Semester EEE449 Computer Networks The Data Link Layer Part 2: Media Access Control En. Mohd Nazri Mahmud MPhil (Cambridge, UK) BEng (Essex,
8/7/20151 Mobile Computing COE 446 Wireless Multiple Access Tarek Sheltami KFUPM CCSE COE hthttp://faculty.kfupm.edu.sa/coe/tarek/coe446.htm Principles.
Medium Access Control Sublayer
Lecture 16 Random Access protocols r A node transmits at random at full channel data rate R. r If two or more nodes “collide”, they retransmit at random.
6: Wireless and Mobile Networks6-1 Elements of a wireless network network infrastructure wireless hosts r laptop, PDA, IP phone r run applications r may.
1 ECE453 – Introduction to Computer Networks Lecture 7 – Multiple Access Control (I)
9/11/2015 5:55 AM1 Ethernet and CSMA/CD CSE 6590 Fall 2010.
Wireless Medium Access. Multi-transmitter Interference Problem  Similar to multi-path or noise  Two transmitting stations will constructively/destructively.
1 Computer Communication & Networks Lecture 12 Datalink Layer: Multiple Access Waleed Ejaz
Chi-Cheng Lin, Winona State University CS412 Introduction to Computer Networking & Telecommunication Medium Access Control Sublayer.
Chapter 12 Multiple Access Figure 12.1 Data link layer divided into two functionality-oriented sublayers Figure 12.2 Taxonomy of multiple-access protocols.
LECTURE9 NET301. DYNAMIC MAC PROTOCOL: CONTENTION PROTOCOL Carrier Sense Multiple Access (CSMA): A protocol in which a node verifies the absence of other.
© Janice Regan, CMPT 128, CMPT 371 Data Communications and Networking LANs 2: MAC protocols.
Medium Access Control NWEN302 Computer Network Design.
Layer 2 Technologies At layer 2 we create and transmit frames over communications channels Format of frames and layer 2 transmission protocols are dependent.
Chi-Cheng Lin, Winona State University CS 313 Introduction to Computer Networking & Telecommunication Medium Access Control Sublayer.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2000 Unit-II Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
© 2009 Pearson Education Inc., Upper Saddle River, NJ. All rights reserved. © The McGraw-Hill Companies, Inc. Medium Access Control Asst. Prof. Chaiporn.
4: DataLink Layer1 Multiple Access Links and Protocols Three types of “links”: r point-to-point (single wire, e.g. PPP, SLIP) r broadcast (shared wire.
Medium Access Control Sub Layer
Data Communications, Kwangwoon University12-1 Chapter 12. Multiple Access 1.Random Access 2.Controlled Access 3.Channelization.
1 Kyung Hee University Chapter 12 Multiple Access.
Chapter 6 Multiple Radio Access
5: DataLink Layer 5a-1 Multiple Access protocol. 5: DataLink Layer 5a-2 Multiple Access Links and Protocols Three types of “links”: r point-to-point (single.
Ch 12. Multiple Access. Multiple Access for Shared Link Dedicated link – Point-to-point connection is sufficient Shared link – Link is not dedicated –
Background of Ad hoc Wireless Networks Student Presentations Wireless Communication Technology and Research Ad hoc Routing and Mobile IP and Mobility Wireless.
LECTURE9 NET301 11/5/2015Lect 9 NET DYNAMIC MAC PROTOCOL: CONTENTION PROTOCOL Carrier Sense Multiple Access (CSMA): A protocol in which a node verifies.
Medium Access Control in Wireless networks
1 Ethernet CSE 3213 Fall February Introduction Rapid changes in technology designs Broader use of LANs New schemes for high-speed LANs High-speed.
Medium Access Control Protocols, Local Area Networks, and Wireless Local Area Networks Lecture Note 10.
COMPUTER NETWORKS Data-link Layer (The Medium Access Control Sublayer) MAC Sublayer.
Multiple Access By, B. R. Chandavarkar, CSE Dept., NITK, Surathkal Ref: B. A. Forouzan, 5 th Edition.
Multiple Access Methods
Part III Datalink Layer 10.
Net301 lecture9 11/5/2015 Lect 9 NET301.
THE IEEE MAC SUB-LAYER – chapter 14
Multiple Access Methods
The Medium Access Control Sublayer
Channel Allocation Problem/Multiple Access Protocols Group 3
Link Layer and LANs Not everyone is meant to make a difference. But for me, the choice to lead an ordinary life is no longer an option 5: DataLink Layer.
Channel Allocation Problem/Multiple Access Protocols Group 3
Data Communication Networks
Multiple Access Methods
Chapter 6 Multiple Radio Access.
Dr. John P. Abraham Professor UTPA
Part III Datalink Layer 10.
Presentation transcript:

Chapter 2 Multiple Access Protocols Professor Rick Han University of Colorado at Boulder

Prof. Rick Han, University of Colorado at Boulder Announcements Previous lecture now online Homework #1 is on the Web site, due Feb. 5 Programming assignment #1 will be available on Web site on Tuesday, not today Next, Chapter 2, MAC protocols

Prof. Rick Han, University of Colorado at Boulder Recap of Previous Lecture Designing reliable ARQ protocols Acknowledgements Timeouts Sequence numbers Designing efficient reliable protocols Choose timeout wisely Keep the pipe full Stop-and-Wait: one outstanding packet Go-Back-N: sliding window, cumulative ACK Selective Repeat: sliding window, selective ACK

Prof. Rick Han, University of Colorado at Boulder Direct-Link or Point-to-Point Networks Physical layer handles bits Data-link layer handles packets Framing Error detection Retransmission-based protocols How do I send to N hosts? N point-to-point links Other possibilities?

Prof. Rick Han, University of Colorado at Boulder Shared-Media or Broadcast Networks N senders and receivers connected by a shared medium (copper wire, atmosphere-TV!) Sharing access to the same media Analogy: How do N persons converse in a room or at the dinner table? At once, or one by one? What is the communications protocol? Local Area Network (LAN) Ethernet (802.3) /Wireless Ethernet

Prof. Rick Han, University of Colorado at Boulder Multiple Access Protocols Determine which host is allowed to transmit next to a shared medium Channel reservation: TDMA, FDMA, CDMA, Token Ring, … Random access: ALOHA, CSMA/CD, CSMA/CA Ethernet /Wireless Ethernet

Prof. Rick Han, University of Colorado at Boulder Multiple Access Protocols (2) Also called Medium-Access Control (MAC) protocols Before data link-layer packets can be sent, a sender has to gain access to the media MAC layer is often placed in the stack between layer 2 and layer 1 Physical Layer MAC Layer Host A Data Link Layer

Prof. Rick Han, University of Colorado at Boulder Time Division Multiple Access (TDMA) Divide time into multiple slots Each host sends in a pre-determined slot Out-of-band reservation mechanism Compare to Time Division Multiplexing (TDM) …… Host 1 Host 2 Host Not Eth. Router/ Mux

Prof. Rick Han, University of Colorado at Boulder Frequency Division Multiple Access (FDMA) Divide spectrum into frequency bins Each host sends in a pre-determined frequency bin Out-of-band reservation mechanism Also called Frequency Division Multiplexing (FDM) Example: AM/FM radio, TV AM KHz FM MHz Satellite GHz range Freq. (Hz) Host 1Host 2Host 3

Prof. Rick Han, University of Colorado at Boulder Code Division Multiple Access (CDMA) Use multiple orthogonal codes to partition a range of spectrum Each host sends using a pre-determined code Also called “spread spectrum” Direct-sequence spread spectrum (802.11, cell) Frequency-hopping spread spectrum (Bluetooth) Bluetooth F1F2F3 Hopping sequence: F1, F3, F2, F1, F3, F2, … Host 1’s Code: 132, Host 2’s Code: 321, Host 3’s Code: 213 – all 3 codes orthogonal Host 1 Host 2 Host 3 Freq:

Prof. Rick Han, University of Colorado at Boulder Random Access: ALOHA Protocol Developed at University of Hawaii in 1971 by Abramson Ground-based UHF radios connect computers on several island campuses to main university computer on Oahu “pure” ALOHA: hosts transmit whenever they have information to send – form of random access Collision will occur when two hosts try to transmit packets at the same time Hosts wait a timeout=1 RTT for an ACK. If no ACK by timeout, then wait a randomly selected delay to avoid repeated collisions, then retransmit

Prof. Rick Han, University of Colorado at Boulder Random Access: ALOHA Protocol (2) Collision of packets can occur when a packet overlaps another packet Packet A Packet CPacket B time T0 Collision Wasted Time Colliding with B Wasted Time Due to a Collision = 2 packet intervals

Prof. Rick Han, University of Colorado at Boulder Random Access: Slotted ALOHA Rather than sending a packet at any time, send along time slot boundaries Collision are confined to one time slot Packet A Packet CPacket B time T0 Collision No Collision Wasted Time Due to a Collision = 1 packet interval

Prof. Rick Han, University of Colorado at Boulder Random Access: Slotted ALOHA (2) How do hosts synchronize to begin transmitting along time slot boundaries? One central station transmits a synchronization pulse or beacon Slotted ALOHA is more efficient than ALOHA because when there is a collision, the wasted time is confined to one time slot Assuming Poisson packet arrivals (memoryless), can compute the maximum throughput of ALOHA to be 18%. Maximum throughput of Slotted ALOHA is 37% Why are ALOHA & slotted ALOHA so inefficient?

Prof. Rick Han, University of Colorado at Boulder Random Access: CSMA ALOHA & slotted ALOHA are inefficient because hosts don’t take into account what other hosts are doing before they transmit Example: at party, everyone speaks whenever they want to, regardless of whether another person is speaking Instead, “listen before you talk” = Carrier Sense Multiple Access (CSMA) Sense for “carriers” (see if anyone else is transmitting) before you begin transmitting Packet A time Host B listens Packet BPacket YPacket X Host B sends delay Collision still possible over long prop. delays

Prof. Rick Han, University of Colorado at Boulder Random Access: 1-Persistent CSMA If channel is busy, A host listens continuously When channel becomes free, a host transmits its packet immediately (with probability 1) Collision scenarios Hosts A and B are far apart (long prop. delay). A’s signal takes a long time to reach B. So, B thinks channel is free, and begins transmitting. Hosts B and C transmit as soon as A finishes Still, CSMA is more efficient than ALOHA variants Packet A time Host B listens Packet B Packet YPacket X Host B sendsCollision

Prof. Rick Han, University of Colorado at Boulder Random Access: p-Persistent CSMA Generalization of 1-persistent CSMA Typically applied to slotted channels Slot length is chosen as maximum propagation delay A host senses the channel, and If slot is idle, transmit with probability p, or defer with probability q=1-p If next slot is idle, transmit with probability p, or defer with probability 1-p, repeat… If channel is busy, then sense channel continuously until it becomes free, begin again

Prof. Rick Han, University of Colorado at Boulder Random Access: Non-Persistent CSMA Host does not sense channel continuously Instead, if channel is busy, Wait/sleep a random interval before sensing again As with 1-persistent CSMA, as soon as channel is idle, then send a packet Random interval reduces collisions Higher throughput than 1-persistent CSMA when many senders Packet A time Host B listens Packet B Host B sends Random Sleep

Prof. Rick Han, University of Colorado at Boulder Random Access: Ethernet CSMA/CD Ethernet uses CSMA/CD, i.e. CSMA with Collision Detection (CD) “Listen-while-talk” protocol A host listens even while it is transmitting, and if a collision is detected, stops transmitting Packet A time Host B senses carrier Packet B delay Host B starts sending Packet B Host B detects collision And stops sending Not transmitted

Prof. Rick Han, University of Colorado at Boulder Random Access: Ethernet CSMA/CD (2) Can abort transmission sooner than end-of- packet if there is a collision Can happen if prop. delays are long Better efficiency than pure CSMA CSMA/CD doesn’t require explicit acknowledgement Unlike CSMA, which requires an ACK or timeout to detect a collision Collision detection is built into the transmitter When collision detected, begin retransmission

Prof. Rick Han, University of Colorado at Boulder Random Access: Ethernet CSMA/CD (3) Exponential backoff strategy When a collision is detected, a host waits for some randomly chosen time, then retransmits a packet If a second collision is detected, a host doubles the original wait time, then retransmits the packet Each time there is another collision, the wait time is doubled before retransmission Variants: At each retransmission, choose a random value from the exponentially increasing wait time. At each retransmission, choose randomly from among a discrete set of values within exponentially increasing wait time Retransmit a finite # of times

Prof. Rick Han, University of Colorado at Boulder Random Access: Ethernet CSMA/CD (4) CSMA/CD can be used with nonpersistent, 1- persistent, or p-persistent variants of CSMA Ethernet is synonymous with the IEEE standard Initial work on Ethernet at Xerox in early 70’s Ethernet specifies 1-persistent CSMA/CD To extend an Ethernet, repeaters are placed. Start to run into propagation delay issues and noise amplification issues Ethernet keeps its maximum length to 2500 m to keep prop. delays tight, so that CSMA/CD responds well

Prof. Rick Han, University of Colorado at Boulder Random Access: “Wireless” Ethernet Employs CSMA/CA, i.e. CSMA with Collision Avoidance (CA) Hidden terminal effect Example: B can hear A and C, but A and C can’t hear each other. If A is sending B, C thinks channel is clear and starts sending => collision! Doesn’t happen in wired Ethernet, because hosts can hear each other Host A Collision Host BHost C

Prof. Rick Han, University of Colorado at Boulder Random Access: “Wireless” Ethernet (2) How to handle the hidden terminal effect? Host A sends a Request-To-Send (RTS) Host B sends a Clear-To-Send (CTS) Host C hears the CTS, and does not interrupt transmission between A and B This helps implement Collision Avoidance Host A Host C Suppresses Its Data Host BHost C RTS CTS Data

Prof. Rick Han, University of Colorado at Boulder Random Access: “Wireless” Ethernet (3) Acknowledgements are still needed After Host A has finished sending its data, Host B sends an ACK Host C hears this ACK, and sends its RTS Host AHost BHost C Data ACK RTS

Prof. Rick Han, University of Colorado at Boulder Random Access: “Wireless” Ethernet (4) does not support Collision Detection In a wired LAN, transmitter can check voltage levels to see if there is a collision. A remote transmitter’s power doesn’t attenuate severely. In a wireless LAN, the transmitter’s power overwhelms a distant transmitter’s power, so it’s difficult to detect collision. What happens if two RTS’s collide? Senders realize after timeout that CTS did not come back, and then practice exponential backoff in trying to send new RTS’s