Semester 1 2011-2012 EEE449 Computer Networks The Data Link Layer Part 2: Media Access Control En. Mohd Nazri Mahmud MPhil (Cambridge, UK) BEng (Essex,

Slides:



Advertisements
Similar presentations
Nick Feamster CS 4251 Computer Networking II Spring 2008
Advertisements

Data and Computer Communications Eighth Edition by William Stallings Lecture slides by Lawrie Brown Chapter 16 – High Speed LANs.
Channel Allocation Protocols. Dynamic Channel Allocation Parameters Station Model. –N independent stations, each acting as a Poisson Process for the purpose.
The ALOHA Protocol “Free for all”: whenever station has a frame to send, it does so. –Station listens for maximum RTT for an ACK. –If no ACK after a specified.
EECC694 - Shaaban #1 lec #5 Spring Data Link In Broadcast Networks: The Media Access Sublayer Broadcast networks with multi-access (or random.
Ethernet – CSMA/CD Review
Multiple access What if multiple machines are sharing the same link?
Communication Networks Lecture 5 NETW 501-L5: NETW 501-L5: Medium Access Control Dr.-Ing. Khaled Shawky Hassan Room: C3-222, ext: 1204,
1 K. Salah Module 4.2: Media Access Control The Media Access Control (MAC) sublayer –Random Access (CSMA), IEEE –Token Passing, IEEE Ch 13-
1 Pertemuan 13 Teknik Akses Jaringan - Random Matakuliah: H0174/Jaringan Komputer Tahun: 2006 Versi: 1/0.
Wireless & Mobile Networking: Multiple Radio Access Azizol Bin Abdullah (A2.04) Rujukan: Text Book Chapter 6.
MAC Protocols Media Access Control (who gets the use the channel) zContention-based yALOHA and Slotted ALOHA. yCSMA. yCSMA/CD. TDM and FDM are inefficient.
CMPE 150- Introduction to Computer Networks 1 CMPE 150 Fall 2005 Lecture 17 Introduction to Computer Networks.
Copyright © 2003, Dr. Dharma P. Agrawal and Dr. Qing-An Zeng. All rights reserved. 1 Chapter 6 Multiple Radio Access.
Teknik Akses Jaringan Carrier Sense Pertemuan 12 Matakuliah: H0484/Jaringan Komputer Tahun: 2007.
CMPE 150- Introduction to Computer Networks 1 CMPE 150 Fall 2005 Lecture 16 Introduction to Computer Networks.
EEC-484/584 Computer Networks Lecture 13 Wenbing Zhao
EEC-484/584 Computer Networks Lecture 9 Wenbing Zhao (Part of the slides are based on materials supplied by Dr. Louise Moser at UCSB and.
Medium Access Control Sublayer
1 ECE453 – Introduction to Computer Networks Lecture 7 – Multiple Access Control (I)
9/11/2015 5:55 AM1 Ethernet and CSMA/CD CSE 6590 Fall 2010.
1 Computer Communication & Networks Lecture 12 Datalink Layer: Multiple Access Waleed Ejaz
LECTURE9 NET301. DYNAMIC MAC PROTOCOL: CONTENTION PROTOCOL Carrier Sense Multiple Access (CSMA): A protocol in which a node verifies the absence of other.
LOCAL AREA NETWORKS. CSMA Carrier Sense Multiple Access To minimize the chance of collision and, therefore, increase the performance, the CSMA method.
Computer and Data Communications Semester Mohd Nazri Mahmud Session 4a-12 March 2012.
Medium Access Control NWEN302 Computer Network Design.
Layer 2 Technologies At layer 2 we create and transmit frames over communications channels Format of frames and layer 2 transmission protocols are dependent.
جلسه یازدهم شبکه های کامپیوتری به نــــــــــــام خدا.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2000 Unit-II Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Medium Access Control Sub Layer
Multiple Access.
Data Communications, Kwangwoon University12-1 Chapter 12. Multiple Access 1.Random Access 2.Controlled Access 3.Channelization.
1 Kyung Hee University Chapter 12 Multiple Access.
Chapter 6 Multiple Radio Access
LOCAL AREA NETWORKS. CSMA/CA In a wired network, the received signal has almost the same energy as the sent signal because either the length of the cable.
5: DataLink Layer 5a-1 Multiple Access protocol. 5: DataLink Layer 5a-2 Multiple Access Links and Protocols Three types of “links”: r point-to-point (single.
Ch 12. Multiple Access. Multiple Access for Shared Link Dedicated link – Point-to-point connection is sufficient Shared link – Link is not dedicated –
Background of Ad hoc Wireless Networks Student Presentations Wireless Communication Technology and Research Ad hoc Routing and Mobile IP and Mobility Wireless.
CSMA
LECTURE9 NET301 11/5/2015Lect 9 NET DYNAMIC MAC PROTOCOL: CONTENTION PROTOCOL Carrier Sense Multiple Access (CSMA): A protocol in which a node verifies.
MAC Layer Protocols for Wireless Networks. What is MAC? MAC stands for Media Access Control. A MAC layer protocol is the protocol that controls access.
Carrier Sense Multiple Access Improve ALOHA by using carrier sense –Stations listen to the carrier before transmitting –If channel is busy, the station.
1 Ethernet CSE 3213 Fall February Introduction Rapid changes in technology designs Broader use of LANs New schemes for high-speed LANs High-speed.
CSMA/CD Simulation Carrier Sense Multiple Access (CSMA), although more efficient than ALOHA or slotted ALOHA, still has one glaring inefficiency: When.
Medium Access Control Protocols, Local Area Networks, and Wireless Local Area Networks Lecture Note 10.
COMPUTER NETWORKS Data-link Layer (The Medium Access Control Sublayer) MAC Sublayer.
Lecture Focus: Data Communications and Networking  Data Link Layer  Media Access Control (MAC) Lecture 23 CSCS 311.
Multiple Access By, B. R. Chandavarkar, CSE Dept., NITK, Surathkal Ref: B. A. Forouzan, 5 th Edition.
Multiple Access Methods
Chapter 12 Multiple Access.
Lab 7 – CSMA/CD (Data Link Layer Layer)
Part III Datalink Layer 10.
Multiple Access Mahesh Jangid Assistant Professor JVW University.
Chapter 12 Multiple Access
Net301 lecture9 11/5/2015 Lect 9 NET301.
Multiple Access Methods
Chapter 12 Multiple Access
Chapter 12 Multiple Access
The Medium Access Control Sublayer
Channel Allocation Problem/Multiple Access Protocols Group 3
Channel Allocation Problem/Multiple Access Protocols Group 3
Data Communication Networks
CSE 313 Data Communication
CSE 313 Data Communication
Multiple Access Methods
CARRIER SENSE MULTIPLE ACCESS (CSMA)
Chapter 6 Multiple Radio Access.
Part III Datalink Layer 10.
Chapter 12 Media Access Control (MAC)
Chapter 12 Media Access Control (MAC)
Presentation transcript:

Semester EEE449 Computer Networks The Data Link Layer Part 2: Media Access Control En. Mohd Nazri Mahmud MPhil (Cambridge, UK) BEng (Essex, UK) Room 2.14

Semester Media Access Control In shared media, we need to manage the sharing process before the data transfer When nodes are connected and use a common link (ie multipoint or broadcast link) we must –Ensure that each node gets access to the link –Prevent any data “collision” between nodes –Handle the collisions when they occur

Semester Media Access Control Random access protocols for multiple access –Contention-based –No node is superior to another node –Node that wishes to send data uses a procedure to make sending decision –No predefined schedule –Collisions damage data

Semester Media Access Control Protocol 1: Pure ALOHA –The earliest random access method –Developed in 1970’s for ALOHAnet, a pioneering computer networking system developed at the University of Hawaii –ALOHAnet became operational in June, 1971, providing the first public demonstration of a wireless packet data network –In the 1970s ALOHA random access was employed in the widely used Ethernet cable based network and then in both Wi-Fi and in mobile telephone networks in the 1980’s. –When collision occur, each node waits for a random amount of time (called backoff time) before retrying –After a maximum number of failed retry, nodes must give up and try later –Prodecure and parameters (discussion)

Semester Media Access Control Pure ALOHA throughput analysis discussion

Semester Media Access Control Protocol 2: Slotted ALOHA –Time is divided into slots whose duration last for a frame-time –Nodes must send only at the beginning of the time slot –Nodes must wait until the next time slot if they miss the current one –The vulnerable time is halved from the Pure ALOHA case

Semester Media Access Control

Semester Media Access Control Protocol 3: CSMA –Nodes must sense the medium before attempting to send –Due to propagation delay a node may mistakenly sense an idle medium –The vulnerable time is equal to the propagation time –“Sense before send” can reduce collision but cannot eliminate it –The first implementation of CSMA was the Ethernet

Semester Media Access Control Protocol 3: CSMA –Can employ one of the four access modes: Nonpersistent,1-persistent, P-persistent or O- persistent modes –Nonpersistent mode When the sender (station) is ready to transmit data, it checks the physical medium If the medium is idle, transmits a frame In case of a busy medium, the sender waits for a random period of time and attempts to transmit again

Semester Media Access Control Protocol 3: CSMA –1-persistent mode When the sender (station) is ready to transmit data, it checks if the physical medium CONTINOUSLY until it becomes idle, and then it transmits a frame If the medium is busy, continue to listen until finds idle In case of a collision, the sender back-off for a random period of time and attempts to transmit again 1-persistent CSMA is used in the Ethernet

Semester Media Access Control Protocol 3: CSMA –P-persistent When the sender is ready to send data, it checks continually if the medium is busy If the medium becomes idle, the sender transmits a frame with a probability p. If the station chooses not to transmit (the probability of this event is 1-p), the sender waits until the next available time slot and transmits again with the same probability p. In case of a collision, the sender waits for a random period of time and attempts to transmit again p-persistent CSMA is used in WiFi and other packet radio systems.

Semester Media Access Control Protocol 3: CSMA –O-persistent Each node is assigned a transmission order by a supervisor station When medium goes idle, nodes wait for their time slot in accordance with their assigned transmission order The station assigned to transmit first transmits immediately The station assigned to transmit second waits one time slot Stations monitor the medium for transmissions from other stations and update their assigned order with each detected transmission

Semester Media Access Control Protocol 3: CSMA –Although more efficient than ALOHA or Slotted-ALOHA, the medium remains unusable for the duration of transmission of both damaged frames. –For long frames, the unusable time can be significant and the capacity wasted can be considerable

Semester Media Access Control Protocol 4: CSMA/CD –Nodes must sense the medium before attempting to send –If collision occurred and is detected, node stops transmitting that frame, transmits a jam signal, and then waits for a random time interval before trying to resend the frame. –Only part of the transmission time is used for a partial frame transmission –improve CSMA performance by terminating transmission as soon as a collision is detected, thus shortening the time required before a retry can be attempted. –Used in the Wired LAN (The Ethernet) – IEEE standard. –Discussion on procedure

Semester Media Access Control What about wireless network? Can the 4 protocols work? Why or Why not?

Media Access Control Hidden nodes in a wireless network refer to nodes that are out of range of other nodes or a collection of nodes. In a wireless network, it is likely that the node at the far edge of the access point's range (A) can sense the access point, but it is unlikely that the same node can sense a node on the opposite end of the access point's range, B. The problem is when nodes A and B start to send packets simultaneously to the access point. Since node A and B can not sense the carrier, collision cannot be detected. The hidden node problem can be observed easily in widespread (>50m radius) WLAN setups with many nodes that use directional antennas and have high upload.

Media Access Control Protocol 5: Carrier sense multiple access with collision avoidance (CSMA/CA) is a wireless network multiple access method differs from CSMA/CD due to the nature of the medium, the radio frequency spectrum. One of the problems of wireless data communications is that it is not possible to listen while sending, therefore collision detection is not possible. Collision avoidance is used to improve CSMA performance by not allowing wireless transmission of a node if another node is transmitting, thus reducing the probability of collision supplemented by the exchange of a Request to Send (RTS) packet sent by the sender S, and a Clear to Send (CTS) packet sent by the intended receiver R. RTS/CTS alerts all nodes within range of the sender, receiver or both, to not transmit for the duration of the main transmission CSMA/CA is used in based wireless LANs Discussion of procedures

Media Access Control Protocol 5: Carrier sense multiple access with collision avoidance (CSMA/CA) –IFS – Interframe Spacing – transmission is deferred for an IFS even if the medium is idle because a distant (out of range) node may have already transmitted but the frame has not been detected. –Contention Window – After waiting for an IFS and the channel is still idle, node must wait until its time slot arrive. Node choose a random number of slot as its waiting time. –RTS/CTS exchange – When its time slot has arrived, sender send RTS to request for transmission and wait for receiver to grant permission and also to alert other nodes to wait.