1 ECE453 – Introduction to Computer Networks Lecture 7 – Multiple Access Control (I)

Slides:



Advertisements
Similar presentations
Channel Allocation Protocols. Dynamic Channel Allocation Parameters Station Model. –N independent stations, each acting as a Poisson Process for the purpose.
Advertisements

EECC694 - Shaaban #1 lec #5 Spring Data Link In Broadcast Networks: The Media Access Sublayer Broadcast networks with multi-access (or random.
1 The Medium Access Control Sublayer Chapter 4. 2 The Medium Access Control Sublayer This chapter deals with broadcast networks and their protocols. In.
Fundamentals of Computer Networks ECE 478/578
Lecture 9: Multiple Access Protocols
Distributed systems Module 1 -Basic networking Teaching unit 1 – LAN standards Ernesto Damiani University of Bozen-Bolzano Lesson 2 – LAN Medium Access.
1 Pertemuan 13 Teknik Akses Jaringan - Random Matakuliah: H0174/Jaringan Komputer Tahun: 2006 Versi: 1/0.
EEC-484/584 Computer Networks Lecture 7 Wenbing Zhao
MAC Protocols Media Access Control (who gets the use the channel) zContention-based yALOHA and Slotted ALOHA. yCSMA. yCSMA/CD. TDM and FDM are inefficient.
CS 5253 Workshop 1 MAC Protocol and Traffic Model.
CMPE 150- Introduction to Computer Networks 1 CMPE 150 Fall 2005 Lecture 17 Introduction to Computer Networks.
The Data Link Layer Read Chapters 3 and 4. CSC 3352 Computer Communications Chapter 3&42 Where in the OSI Reference Model ? Session Transport Network.
Copyright © 2003, Dr. Dharma P. Agrawal and Dr. Qing-An Zeng. All rights reserved. 1 Chapter 6 Multiple Radio Access.
EEC-484/584 Computer Networks Lecture 13 Wenbing Zhao
EEC-484/584 Computer Networks Lecture 7 Wenbing Zhao
CMPE 150- Introduction to Computer Networks 1 CMPE 150 Fall 2005 Lecture 16 Introduction to Computer Networks.
EEC-484/584 Computer Networks Lecture 13 Wenbing Zhao
EEC-484/584 Computer Networks Lecture 9 Wenbing Zhao (Part of the slides are based on materials supplied by Dr. Louise Moser at UCSB and.
Studying Local Area Networks Via Media Access Control (MAC) SubLayer
Computer Networks Medium Access Sublayer (Part I).
CS 5253 Workshop 1 MAC Protocol and Traffic Model.
Networks: Local Area Networks1 LANs Studying Local Area Networks Via Media Access Control (MAC) SubLayer.
Computer Networks: Local Area Networks 1 LANs Studying Local Area Networks via the Media Access Control (MAC) SubLayer.
EEC-484/584 Computer Networks Lecture 7 Wenbing Zhao
Semester EEE449 Computer Networks The Data Link Layer Part 2: Media Access Control En. Mohd Nazri Mahmud MPhil (Cambridge, UK) BEng (Essex,
Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011 The Medium Access Control Sublayer Chapter.
1 Chapter 5 The Medium Access Sublayer. 2 Chapter 5 The Medium Access Layer 5.1 The Channel Allocation problem - Static and dynamic channel allocation.
Medium Access Control Sublayer
Multiple Access Protocols Chapter 6 of Hiroshi Harada Book
Chi-Cheng Lin, Winona State University CS412 Introduction to Computer Networking & Telecommunication Medium Access Control Sublayer.
Chapter 4: Medium Access Control (MAC) Sublayer
CSC4220/6220 Computer Networks
The Medium Access Control Sublayer Chapter 4 10/1/2015www.noteshit.com1.
CHAPTER 4: THE MEDIUM ACCESS SUBLAYER 4.1: The Channel Allocation Problem 4.2: Multiple Access Protocols.
LECTURE9 NET301. DYNAMIC MAC PROTOCOL: CONTENTION PROTOCOL Carrier Sense Multiple Access (CSMA): A protocol in which a node verifies the absence of other.
جلسه دهم شبکه های کامپیوتری به نــــــــــــام خدا.
Medium Access Control NWEN302 Computer Network Design.
The Medium Access Control Sublayer Chapter 4. The Channel Allocation Problem Static Channel Allocation Dynamic Channel Allocation  Delay for the divided.
Chi-Cheng Lin, Winona State University CS 313 Introduction to Computer Networking & Telecommunication Medium Access Control Sublayer.
The Medium Access Control Sublayer Chapter 4. The Channel Allocation Problem Static Channel Allocation in LANs and MANs Dynamic Channel Allocation in.
جلسه یازدهم شبکه های کامپیوتری به نــــــــــــام خدا.
Medium Access Control Sub Layer
7-1 Introduction to Queueing Theory l Components of a queueing system n probability density function (pdf) of interarrival times n pdf of service times.
Multiple Access.
Data Communications, Kwangwoon University12-1 Chapter 12. Multiple Access 1.Random Access 2.Controlled Access 3.Channelization.
Chapter 6 Multiple Radio Access
The Medium Access Control Sublayer Chapter 4 12/13/2015www.ishuchita.com1.
CS3502: Data and Computer Networks Local Area Networks - 1 introduction and early broadcast protocols.
5: DataLink Layer 5a-1 Multiple Access protocol. 5: DataLink Layer 5a-2 Multiple Access Links and Protocols Three types of “links”: r point-to-point (single.
CS3502: Data and Computer Networks Local Area Networks - 1 introduction and early broadcast protocols.
LECTURE9 NET301 11/5/2015Lect 9 NET DYNAMIC MAC PROTOCOL: CONTENTION PROTOCOL Carrier Sense Multiple Access (CSMA): A protocol in which a node verifies.
The Medium Access Control Sublayer Chapter 4. The Channel Allocation Problem Static Channel Allocation in LANs and MANs Dynamic Channel Allocation in.
Carrier Sense Multiple Access Improve ALOHA by using carrier sense –Stations listen to the carrier before transmitting –If channel is busy, the station.
The Medium Access Control Sublayer
Chapter 4 The Medum Access Sublayer. MA Sublayer Additional Reference –Local and Metropolitan Area Networks, William Stallings, Prentice Hall, 2000, 6th.
Medium Access Control Protocols, Local Area Networks, and Wireless Local Area Networks Lecture Note 10.
THE MEDIUM ACCESS CONTROL SUBLAYER 4.1 THE CHANNEL ALLOCATION PROBLEM 4.2 MULTIPLE ACCESS PROTOCOLS.
UNIT 2 Medium Access sub layer: Medium Access sub layer - Channel Allocations, LAN protocols - ALOHA protocols(PURE AND SLOTTED ALOHA),CSMA/CA,CSMA/CD.
COMPUTER NETWORKS Data-link Layer (The Medium Access Control Sublayer) MAC Sublayer.
THE MEDIUM ACCESS CONTROL SUBLAYER 4.1 THE CHANNEL ALLOCATION PROBLEM 4.2 MULTIPLE ACCESS PROTOCOLS.
Week3 The Medium Access Sublayer
Introduction to Queueing Theory
Module 3 Medium Access Control.
Net301 lecture9 11/5/2015 Lect 9 NET301.
THE IEEE MAC SUB-LAYER – chapter 14
The Medium Access Control Sublayer
Channel Allocation Problem/Multiple Access Protocols Group 3
Channel Allocation Problem/Multiple Access Protocols Group 3
Chapter 6 Multiple Radio Access.
Dr. John P. Abraham Professor UTPA
Presentation transcript:

1 ECE453 – Introduction to Computer Networks Lecture 7 – Multiple Access Control (I)

2 Broadcast vs. PPP Broadcast channel = multiaccess channel = random access channel Broadcast LAN Satellite network PPP WAN (router-router lease line) Home user  ISP

3 Delay Packet experiences delay from end to end Nodal delay = processing delay + queuing delay + transmission delay + propagation delay A B propagation transmission nodal processing (processing delay) queuing

4 The Channel Allocation Problem Static Channel Allocation in LANs and MANs FDM or TDM Problems  Fewer than N users A valuable chunk of time (TDM) or bandwidth (FDM) is wasted  More than N users Some users are denied (even if another user is idle)  Exactly N users Idle users waste bandwidth e.g. bursty traffic Dynamic Channel Allocation in LANs and MANs

5 Five Assumptions for Dynamic Channel Allocation Station Model N independent stations generating frames Once a frame is generated, the station is blocked until the frame has been transmitted Single Channel Assumption A single channel is available for all communication All stations are equivalent Collision Assumption If two frames are transmitted simultaneously, they overlap in time and the resulting signal is garbled. This event is called a collision. All stations can detect collisions. Time Assumption Continuous time Slotted time Carrier assumption Carrier Sense (LAN) No Carrier Sense (Satellite)

6 Multiple Access Protocols ALOHA Carrier Sense Multiple Access Protocols Collision-Free Protocols Limited-Contention Protocols Wireless LAN Protocols

7 Some Terminologies Contention systems Systems in which multiple users share a common channel in a way that can lead to conflicts Throughput The maximum continuous traffic rate that a device can handle without dropping a single packet. Measured in terms of the number of frames per second at a given frame size Frametime Time used to transmit a frame (frame_size/data rate)

8 ALOHA Pure ALOHA 1970, Norman Abramson, U. of Hawaii Users transmit whenever they have data When collision occurs, wait for a random amount of time and send again Slotted ALOHA 1972, Roberts Divide time into discrete intervals A computer is not permitted to send until the beginning of the next slot Doubles the maximum throughput

9 *ALOHA – Performance Analysis Poisson process (1837) Simplest model for arrivals into a queue system the probability of an arrival in a small interval of time depends only on the size of the interval The probability that k frames are generated during a given frame time follows the Poisson distribution

10 CSMA – Carrier Sense Multiple Access (LAN) 1-persistent When idle, transmit a frame When busy, continuously sensing When collision, wait for a random amount of time Non-persistent When idle, transmit a frame When busy, wait for a random amount of time When collision, wait for a random amount of time then re-sense p-persistent Slotted channels When idle, transmit with a probability p, defers until the next slot with probability 1-p CSMA with collision detection (CSMA/CD) As soon as a collision is detected, abort the transmission Basis of Ethernet LAN

11 A Worst Case Scenario

12 Collision-Free Protocols Assumption N stations with a unique address from 0 to N-1 Propagation delay is negligible The bit-map protocol A reservation protocol: the desire to transmit is broadcast before the actual transmission Binary countdown

13 Limited-Contention Protocols ALOHA Low load: improved efficiency High load: high delay Collision-free protocols Low load: high delay High load: improved efficiency New protocol? – limited contention protocol Uses contention at low load Uses collision-free at high load Adaptive tree walk protocol

14 Wireless LAN Protocols (a) The hidden station problem (C  B) (b) the exposed station problem (C  D) Activity around the receiver vs. activity around the sender Problem: limited radio range

15 Wireless LAN Protocols MACA – Multiple Access with Collision Avoidance (Karn, 1990) Solution: RTS (Request To Send) – contains the length of frame CTS (Clear To Send) – contains the data length too

16 Multiple Access Protocols ALOHA Pure ALOHA Slotted ALOHA Carrier Sense Multiple Access Protocols (CDMA) 1-persistent Non-persistent p-persistent CDMA/CD (Ethernet) Collision-Free Protocols Bitmap protocol Binary countdown Limited-Contention Protocols Contention when load is light Collision-free when load is heavy Wireless LAN Protocols