1 Mao W07 Multiple Access EECS 489 Computer Networks Z. Morley Mao Wednesday Feb 21, 2007 Acknowledgement:

Slides:



Advertisements
Similar presentations
Communication Networks ( ) / Spring 2011 The Blavatnik School of Computer Science, Tel-Aviv University Allon Wagner.
Advertisements

Review r Error Detection: CRC r Multiple access protocols m Slotted ALOHA m CSMA/CD r Homework 3 out r Project 3 out, link state only. Some slides are.
Chapter 5 Link Layer Computer Networking: A Top Down Approach 6th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 A note on the use of these.
5: DataLink Layer5-1 Chapter 5 Link Layer and LANs Computer Networking: A Top Down Approach 5 th edition. Jim Kurose, Keith Ross Addison-Wesley, April.
Network Layer4-1 Link Layer: Introduction Some terminology: r hosts and routers are nodes (bridges and switches too) r communication channels that connect.
5-1 Link Layer: Introduction Some terminology: r hosts and routers are nodes r communication channels that connect adjacent nodes along communication path.
5: DataLink Layer5a-1 MAC Sublayer. 5: DataLink Layer5a-2 Multiple Access Links and Protocols Two types of “links”: r point-to-point m PPP for dial-up.
5: DataLink Layer5-1 MAC Addresses and ARP r 32-bit IP address: m network-layer address m used to get datagram to destination IP subnet r MAC (or LAN or.
15 – Data link layer Chapter 5: The Data Link Layer Our goals: r understand principles behind data link layer services: m error detection, correction.
5: DataLink Layer5-1 Data Link Layer r What is Data Link Layer? r Multiple access protocols r Ethernet.
5-1 Data Link Layer r What is Data Link Layer? r Multiple access protocols r Link-layer Addressing r Ethernet.
11/11/ /13/2003 DLL, Error Detection, MAC, ARP November 11-13, 2003.
1 Announcement r Homework #3 was due last night r Homework #4 is out.
1 Link Layer Message M A B Problem: Given a message M at a node A consisting of several packets, how do you send the packets to a “neighbor” node B –Neighbor:
DataLink Layer session 1 TELE3118: Network Technologies Week 2: Data Link Layer Framing, Error Control, Multiple Access Some slides have been taken.
Review r Multicast Routing m Three options m source-based tree: one tree per source shortest path trees reverse path forwarding m group-shared tree: group.
MAC Addresses and ARP 32-bit IP address: –network-layer address –used to get datagram to destination IP subnet MAC (or LAN or physical or Ethernet) address:
Chapter 5 Link Layer slides are modified from J. Kurose & K. Ross CPE 400 / 600 Computer Communication Networks Lecture 21.
5: DataLink Layer5-1 Link Layer – Error Detection/Correction and MAC.
5: DataLink Layer5-1 Chapter 5 Link Layer and LANs Computer Networking: A Top Down Approach Featuring the Internet, 3 rd edition. Jim Kurose, Keith Ross.
5: DataLink Layer5-1 Chapter 5 Link Layer and LANs Computer Networking: A Top Down Approach Featuring the Internet, 3 rd edition. Jim Kurose, Keith Ross.
16 – CSMA/CD - ARP Network Layer4-1. 5: DataLink Layer5-2 CSMA (Carrier Sense Multiple Access) CSMA: listen before transmit: If channel sensed idle: transmit.
5: DataLink Layer5-1 Chapter 5: The Data Link Layer Our goals: r understand principles behind data link layer services: m error detection, correction m.
IP Address 0 network host 10 network host 110 networkhost 1110 multicast address A B C D class to to
Lecture 16 Random Access protocols r A node transmits at random at full channel data rate R. r If two or more nodes “collide”, they retransmit at random.
Introduction1-1 Data Communications and Computer Networks Chapter 5 CS 3830 Lecture 26 Omar Meqdadi Department of Computer Science and Software Engineering.
Network LayerII-1 RSC Part II: Network Layer 4. IP in operation Redes y Servicios de Comunicaciones Universidad Carlos III de Madrid These slides are,
5: DataLink Layer5-1 LAN technologies Data link layer so far: m services, error detection/correction, multiple access Next: LAN technologies m addressing.
5: DataLink Layer5-1 Chapter 5 Link Layer and LANs Part 3: MAC Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley.
1 Random Access Protocols r When node has packet to send m transmit at full channel data rate R. m no a priori coordination among nodes  two or more transmitting.
1 Link-Layer Contention EE 122: Intro to Communication Networks Fall 2007 (WF 4-5:30 in Cory 277) Vern Paxson TAs: Lisa Fowler, Daniel Killebrew & Jorge.
5: DataLink Layer5-1 Chapter 5 Link Layer and LANs Part 4: Link Layer addressing Ethernet Computer Networking: A Top Down Approach 6 th edition Jim Kurose,
4-1 Last time □ Link layer overview ♦ Services ♦ Adapters □ Error detection and correction ♦ Parity check ♦ Internet checksum ♦ CRC □ PPP ♦ Byte stuffing.
Chapter 5 Link Layer Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 Link Layer multiple.
Multiple Access Readings: Kurose & Ross, 5.3, 5.5.
4: DataLink Layer1 Multiple Access Links and Protocols Three types of “links”: r point-to-point (single wire, e.g. PPP, SLIP) r broadcast (shared wire.
Network Layer4-1 Link Layer: Introduction Some terminology: r hosts and routers are nodes (bridges and switches too) r communication channels that connect.
5: DataLink Layer5-1 The Data Link Layer Chapter 5 Kurose and Ross Today 5.1 and 5.3.
5: DataLink Layer5-1 CSMA (Carrier Sense Multiple Access) CSMA: listen before transmit: If channel sensed idle: transmit entire frame r If channel sensed.
Multiple Access Links and Protocols
5: DataLink Layer5-1 Chapter 5 Link Layer and LANs Computer Networking: A Top Down Approach 4 th edition. Jim Kurose, Keith Ross Addison-Wesley, July 2007.
5: DataLink Layer5-1 Chapter 5 Link Layer and LANs Computer Networking: A Top Down Approach Featuring the Internet, 3 rd edition. Jim Kurose, Keith Ross.
Data Link Layer. Useful References r Wireless Communications and Networks by William Stallings r Computer Networks (third edition) by Andrew Tanenbaum.
5: DataLink Layer5a-1 Chapter 5: The Data Link Layer Last time: r link layer services r error detection, correction r multiple access protocols and LANs.
5: DataLink Layer5-1 Chapter 5: The Data Link Layer Our goals: r Understand principles behind data link layer services: m error detection, error correction.
Net5: ARP 協定 授課教師:雲林科技大學 張慶龍 老師. IP Address/Physical Address Static Mapping  IP broadcast address maps to Ethernet broadcast address  IP Multicast Address.
5: DataLink Layer5-1 Chapter 5: The Data Link Layer Our goals: r understand principles behind data link layer services: m error detection, error correction.
Transport Layer 3-1 Chapter 5 Link Layer Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012  CPSC.
5: DataLink Layer5-1 Chapter 5: The Data Link Layer Our goals: r understand principles behind data link layer services: m error detection, correction m.
5: DataLink Layer5-1 Link Layer r 5.1 Introduction and services r 5.2 Error detection and correction r 5.3Multiple access protocols r 5.4 Link-layer Addressing.
CSEN 404 Data Link Layer Amr El Mougy Lamia AlBadrawy.
4: DataLink Layer1 LAN technologies Data link layer so far: m services, error detection/correction, multiple access Next: LAN technologies m addressing.
CPSC 441: Link Layer1 Link Layer Addressing Slides originally from Carey Williamson Notes derived from “ Computer Networking: A Top Down Approach”, by.
5: DataLink Layer5-1 Slotted ALOHA Assumptions r all frames same size r time is divided into equal size slots, time to transmit 1 frame r nodes start to.
Chapter 5 Link Layer Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 A note on the use of these.
Introduction to Networks
Chapter 5 Link Layer A note on the use of these ppt slides:
Random Access Protocols
Chapter 5 Link Layer and LANs
Sidevõrgud IRT 4060/ IRT 0020 vooruloeng 6 / 20. okt 2004
MAC Addresses and ARP 32-bit IP address:
CS 457 – Lecture 6 Ethernet Spring 2012.
Services of DLL Framing Link access Reliable delivery
Multiple access.
2012 session 1 TELE3118: Network Technologies Week 2: Data Link Layer Framing, Error Control, Multiple Access Some slides have been taken from: Computer.
Introduction to Networks
Overview Jaringan Komputer (3)
Link Layer and LANs Not everyone is meant to make a difference. But for me, the choice to lead an ordinary life is no longer an option 5: DataLink Layer.
Link Layer 5.1 Introduction and services
Link Layer: Multiple Access
Presentation transcript:

1 Mao W07 Multiple Access EECS 489 Computer Networks Z. Morley Mao Wednesday Feb 21, 2007 Acknowledgement: Some slides taken from Kurose&Ross and Katz&Stoica

2 Mao W07 Announcements  Homework 2 -Solution will be posted later today.  Midterm 1 is in class on Wednesday March 7 th -Please let us know if you prefer to take it early -Material: Chapter 1-4 -You can have one sheet of notes for the midterm. -Sample midterm solution is posted.

3 Mao W07 Distance Vector: link cost changes Link cost changes: good news travels fast bad news travels slow - “count to infinity” problem! 44 iterations before algorithm stabilizes: see text Poisoned reverse: If Z routes through Y to get to X : Z tells Y its (Z’s) distance to X is infinite (so Y won’t route to X via Z) will this completely solve count to infinity problem? x z y 60

4 Mao W07 Other ways to improve distance vector protocols  Triggered updates: to speed up convergence. Whenever a node changes the metric for a route, it is required to send update messages almost immediately.  Route poisoning: Advertise cost as infinity when cost from next hop has been increasing and continue to stay with current next hop for "a while".  Path hold-down: Do not switch route for n update periods after cost goes up. This reduces the likelihood of switching to a route that is invalid.

5 Mao W07 Random Access Protocols  When node has packet to send -transmit at full channel data rate R. -no a priori coordination among nodes  two or more transmitting nodes ➜ “collision”,  random access MAC protocol specifies: -how to detect collisions -how to recover from collisions (e.g., via delayed retransmissions)  Examples of random access MAC protocols: -slotted ALOHA -ALOHA -CSMA, CSMA/CD, CSMA/CA

6 Mao W07 Slotted ALOHA Assumptions  all frames same size  time is divided into equal size slots, time to transmit 1 frame  nodes start to transmit frames only at beginning of slots  nodes are synchronized  if 2 or more nodes transmit in slot, all nodes detect collision Operation  when node obtains fresh frame, it transmits in next slot  no collision, node can send new frame in next slot  if collision, node retransmits frame in each subsequent slot with prob. p until success

7 Mao W07 Slotted ALOHA Pros  single active node can continuously transmit at full rate of channel  highly decentralized: only slots in nodes need to be in sync  simple Cons  collisions, wasting slots  idle slots  nodes may be able to detect collision in less than time to transmit packet  clock synchronization

8 Mao W07 Slotted Aloha efficiency  Suppose N nodes with many frames to send, each transmits in slot with probability p  prob that node 1 has success in a slot = p(1-p) N-1  prob that any node has a success = Np(1-p) N-1  For max efficiency with N nodes, find p* that maximizes Np(1-p) N-1  For many nodes, take limit of Np*(1-p*) N-1 as N goes to infinity, gives 1/e =.37 Efficiency is the long-run fraction of successful slots when there are many nodes, each with many frames to send At best: channel used for useful transmissions 37% of time!

9 Mao W07 Pure (unslotted) ALOHA  unslotted Aloha: simpler, no synchronization  when frame first arrives - transmit immediately  collision probability increases: -frame sent at t 0 collides with other frames sent in [t 0 -1,t 0 +1]

10 Mao W07 Pure Aloha efficiency P(success by given node) = P(node transmits). P(no other node transmits in [p 0 -1,p 0 ]. P(no other node transmits in [p 0 -1,p 0 ] = p. (1-p) N-1. (1-p) N-1 = p. (1-p) 2(N-1) … choosing optimum p and then letting n -> infty... = 1/(2e) =.18 Even worse !

11 Mao W07 Why is this better than TDMA?  In TDMA, you always have to wait your turn -delay proportional to number of sites  In Aloha, can send immediately  Aloha gives much lower delays, at the price of lower utilization

12 Mao W07 Slotted Aloha  Divide time into slots  Only start transmission at beginning of slots  Decreases chance of “partial collisions”

13 Mao W07 CSMA (Carrier Sense Multiple Access) CSMA: listen before transmit: If channel sensed idle: transmit entire frame  If channel sensed busy, defer transmission  Human analogy: don’t interrupt others!

14 Mao W07 CSMA collisions collisions can still occur: propagation delay means two nodes may not hear each other’s transmission collision: entire packet transmission time wasted spatial layout of nodes note: role of distance & propagation delay in determining collision probability

15 Mao W07 CSMA/CD (Collision Detection) CSMA/CD: carrier sensing, deferral as in CSMA -collisions detected within short time -colliding transmissions aborted, reducing channel wastage  collision detection: -easy in wired LANs: measure signal strengths, compare transmitted, received signals -difficult in wireless LANs: receiver shut off while transmitting  human analogy: the polite conversationalist

16 Mao W07 CSMA/CD collision detection

17 Mao W07 “Taking Turns” MAC protocols channel partitioning MAC protocols: -share channel efficiently and fairly at high load -inefficient at low load: delay in channel access, 1/N bandwidth allocated even if only 1 active node! Random access MAC protocols -efficient at low load: single node can fully utilize channel -high load: collision overhead “taking turns” protocols look for best of both worlds!

18 Mao W07 “Taking Turns” MAC protocols Polling:  master node “invites” slave nodes to transmit in turn  concerns: -polling overhead -latency -single point of failure (master) Token passing:  control token passed from one node to next sequentially.  token message  concerns: -token overhead -latency -single point of failure (token)

19 Mao W07 Summary of MAC protocols  What do you do with a shared media? -Channel Partitioning, by time, frequency or code Time Division, Frequency Division -Random partitioning (dynamic), ALOHA, S-ALOHA, CSMA, CSMA/CD carrier sensing: easy in some technologies (wire), hard in others (wireless) CSMA/CD used in Ethernet CSMA/CA used in Taking Turns polling from a central site, token passing

20 Mao W07 LAN technologies Data link layer so far: -services, error detection/correction, multiple access Next: LAN technologies -addressing -Ethernet -hubs, switches -PPP

21 Mao W07 MAC Addresses and ARP  32-bit IP address: -network-layer address -used to get datagram to destination IP subnet  MAC (or LAN or physical or Ethernet) address: -used to get datagram from one interface to another physically- connected interface (same network) -48 bit MAC address (for most LANs) burned in the adapter ROM  Why do we need both MAC and IP addresses?

22 Mao W07 LAN Addresses and ARP Each adapter on LAN has unique LAN address Broadcast address = FF-FF-FF-FF-FF-FF = adapter 1A-2F-BB AD D7-FA-20-B0 0C-C4-11-6F-E F7-2B LAN (wired or wireless)

23 Mao W07 LAN Address (more)  MAC address allocation administered by IEEE  manufacturer buys portion of MAC address space (to assure uniqueness)  Analogy: (a) MAC address: like Social Security Number (b) IP address: like postal address  MAC flat address ➜ portability -can move LAN card from one LAN to another  IP hierarchical address NOT portable - depends on IP subnet to which node is attached

24 Mao W07 ARP: Address Resolution Protocol  Each IP node (Host, Router) on LAN has ARP table  ARP Table: IP/MAC address mappings for some LAN nodes - TTL (Time To Live): time after which address mapping will be forgotten (typically 20 min) Question: how to determine MAC address of B knowing B’s IP address? 1A-2F-BB AD D7-FA-20-B0 0C-C4-11-6F-E F7-2B LAN

25 Mao W07 ARP protocol: Same LAN (network)  A wants to send datagram to B, and B’s MAC address not in A’s ARP table.  A broadcasts ARP query packet, containing B's IP address -Dest MAC address = FF- FF-FF-FF-FF-FF -all machines on LAN receive ARP query  B receives ARP packet, replies to A with its (B's) MAC address -frame sent to A’s MAC address (unicast)  A caches (saves) IP-to- MAC address pair in its ARP table until information becomes old (times out) -soft state: information that times out (goes away) unless refreshed  ARP is “plug-and- play”: -nodes create their ARP tables without intervention from net administrator

26 Mao W07 Routing to another LAN walkthrough: send datagram from A to B via R assume A knows B IP address  Two ARP tables in router R, one for each IP network (LAN)  In routing table at source Host, find router  In ARP table at source, find MAC address E6-E BB-4B, etc A R B

27 Mao W07  A creates datagram with source A, destination B  A uses ARP to get R’s MAC address for  A creates link-layer frame with R's MAC address as dest, frame contains A-to-B IP datagram  A’s adapter sends frame  R’s adapter receives frame  R removes IP datagram from Ethernet frame, sees its destined to B  R uses ARP to get B’s MAC address  R creates frame containing A-to-B IP datagram sends to B A R B

28 Mao W07 ARP Poisoning Attacks  Can one spoof the ARP reply messages?  What are the consequences?  How to remedy this problem?