Computer Networks 1 (Mạng Máy Tính 1)

Slides:



Advertisements
Similar presentations
The Medium Access Control Sublayer
Advertisements

The ALOHA Protocol “Free for all”: whenever station has a frame to send, it does so. –Station listens for maximum RTT for an ACK. –If no ACK after a specified.
EECC694 - Shaaban #1 lec #5 Spring Data Link In Broadcast Networks: The Media Access Sublayer Broadcast networks with multi-access (or random.
1 The Medium Access Control Sublayer Chapter 4. 2 The Medium Access Control Sublayer This chapter deals with broadcast networks and their protocols. In.
LECTURE 11 CT1303 LAN. DYNAMIC MAC PROTOCOL No fixed assignment for transmission media or any network resources.. It allows transmission when needed.
CMPE 150- Introduction to Computer Networks 1 CMPE 150 Fall 2005 Lecture 17 Introduction to Computer Networks.
Chapter 14 LAN Systems Ethernet (CSMA/CD) ALOHA Slotted ALOHA CSMA
The Data Link Layer Read Chapters 3 and 4. CSC 3352 Computer Communications Chapter 3&42 Where in the OSI Reference Model ? Session Transport Network.
CSC 450/550 Part 3: The Medium Access Control Sublayer.
The Medium Access Control Sublayer Chapter 4. Ethernet Cabling The most common kinds of Ethernet cabling.
EE 4272Spring, 2003 Chapter 14 LAN Systems Ethernet (CSMA/CD)  ALOHA  Slotted ALOHA  CSMA  CSMA/CD Token Ring /FDDI Fiber Channel  Fiber Channel Protocol.
CMPE 150- Introduction to Computer Networks 1 CMPE 150 Fall 2005 Lecture 16 Introduction to Computer Networks.
EEC-484/584 Computer Networks Lecture 13 Wenbing Zhao
EEC-484/584 Computer Networks Lecture 9 Wenbing Zhao (Part of the slides are based on materials supplied by Dr. Louise Moser at UCSB and.
CMPE 150- Introduction to Computer Networks 1 CMPE 150 Fall 2005 Lecture 18 Introduction to Computer Networks.
16 February 2003 TU/e Computer Science, System Architecture and Networking 1 Communication media Thanks to A. Tanenbaum.
Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011 The Medium Access Control Sublayer Chapter.
Infrastructure de Communications – CR 4107Chapter 41 The Medium Access Control Sublayer Chapter 4.
1 ECE453 – Introduction to Computer Networks Lecture 7 – Multiple Access Control (I)
جلسه دوازدهم شبکه های کامپیوتری به نــــــــــــام خدا.
Medium Access Control.
A.S.Tanenbaum, Computer networks, ch4 MAC 1 The Medium Access Control Sublayer Medium Access Control: a means of controlling access to the medium to promote.
Chi-Cheng Lin, Winona State University CS412 Introduction to Computer Networking & Telecommunication Medium Access Control Sublayer.
Computer Networks NYUS FCSIT Spring 2008 Igor TRAJKOVSKI, Ph.D. Associate Professor
Chapter 4: Medium Access Control (MAC) Sublayer
CSMA with Collision Detection CSMA/CD can be in one of three states: contention, transmission, or idle.
The Medium Access Control Sublayer Chapter 4. The Channel Allocation Problem Static Channel Allocation in LANs and MANs Dynamic Channel Allocation in.
CSC4220/6220 Computer Networks
The Medium Access Control Sublayer طبقة ولوج الوسط الجزئية Chapter 4.
The Medium Access Control Sublayer Chapter 4 10/1/2015www.noteshit.com1.
CHAPTER 4: THE MEDIUM ACCESS SUBLAYER 4.1: The Channel Allocation Problem 4.2: Multiple Access Protocols.
ICOM 6115©Manuel Rodriguez-Martinez ICOM 6115 – Computer Networks and the WWW Manuel Rodriguez-Martinez, Ph.D. Lecture 16.
The Medium Access Control Sublayer Chapter 4. The Channel Allocation Problem Static Channel Allocation Dynamic Channel Allocation  Delay for the divided.
Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011 The Medium Access Control Sublayer Chapter.
Data and Computer Communications Ninth Edition by William Stallings Data and Computer Communications, Ninth Edition by William Stallings, (c) Pearson Education.
Chi-Cheng Lin, Winona State University CS 313 Introduction to Computer Networking & Telecommunication Medium Access Control Sublayer.
The Medium Access Control Sublayer Chapter 4. The Channel Allocation Problem Static Channel Allocation in LANs and MANs Dynamic Channel Allocation in.
The Medium Access Control Sublayer Chapter 4. The Channel Allocation Problem Static Channel Allocation in LANs and MANs Dynamic Channel Allocation in.
Chapter 1 - Local Area Network Technologies. How IP Datagrams are Encapsulated IP datagrams are found at the OSI Network layer IP datagrams are sent to.
10/11/2007 EETS The Medium Access Control Sublayer Chapter 4.
جلسه یازدهم شبکه های کامپیوتری به نــــــــــــام خدا.
17 - Winter 2005 ECE ECE 766 Computer Interfacing and Protocols 1 Local Area Networks Need for high performance communications for physically close devices.
Medium Access Control Sub Layer
The Medium Access Control Sublayer Chapter 4 12/13/2015www.ishuchita.com1.
5: DataLink Layer 5a-1 Multiple Access protocol. 5: DataLink Layer 5a-2 Multiple Access Links and Protocols Three types of “links”: r point-to-point (single.
CSE 461: Multiple Access Networks. This Lecture  Key Focus: How do multiple parties share a wire?  This is the Medium Access Control (MAC) portion of.
LECTURE9 NET301 11/5/2015Lect 9 NET DYNAMIC MAC PROTOCOL: CONTENTION PROTOCOL Carrier Sense Multiple Access (CSMA): A protocol in which a node verifies.
The Medium Access Control Sublayer Chapter 4. The Channel Allocation Problem Static Channel Allocation in LANs and MANs Dynamic Channel Allocation in.
Carrier Sense Multiple Access Improve ALOHA by using carrier sense –Stations listen to the carrier before transmitting –If channel is busy, the station.
1 Ethernet History –developed by Xerox PARC in mid-1970s –roots in Aloha packet-radio network –standardized by Xerox, DEC, and Intel in 1978 –similar to.
Distributed Systems 7. Medium Access Control Sublayer Simon Razniewski Faculty of Computer Science Free University of Bozen-Bolzano A.Y. 2015/2016.
The Medium Access Control Sublayer
The Medium Access Control (MAC) Sublayer. The Channel Allocation Problem Static Channel Allocation in LANs and MANs Dynamic Channel Allocation in LANs.
THE MEDIUM ACCESS CONTROL SUBLAYER 4.1 THE CHANNEL ALLOCATION PROBLEM 4.2 MULTIPLE ACCESS PROTOCOLS.
COMPUTER NETWORKS Data-link Layer (The Medium Access Control Sublayer) MAC Sublayer.
THE MEDIUM ACCESS CONTROL SUBLAYER 4.1 THE CHANNEL ALLOCATION PROBLEM 4.2 MULTIPLE ACCESS PROTOCOLS.
Example DLL Protocols 1. High-Level Data Link Control (HDLC).
Week3 The Medium Access Sublayer
The Data Link Layer Chapter
CT301 LECTURE 8.
Chapter 14 LAN Systems Ethernet (CSMA/CD) ALOHA Slotted ALOHA CSMA
The Medium Access Control Sublayer
The Medium Access Control Sublayer
THE IEEE MAC SUB-LAYER – chapter 14
The Medium Access Control (MAC) Sublayer
The Medium Access Control Sublayer
Channel Allocation Problem/Multiple Access Protocols Group 3
Channel Allocation Problem/Multiple Access Protocols Group 3
Computer Interfacing and Protocols
Distributed Systems 6. Medium Access Control Sublayer
Presentation transcript:

Computer Networks 1 (Mạng Máy Tính 1) Lectured by: Dr. Phạm Trần Vũ

Lecture 3: Networking Technologies Reference: Chapter 4 - “Computer Networks”, Andrew S. Tanenbaum, 4th Edition, Prentice Hall, 2003.

Channel Allocation Problem Multiple Access Protocols Content Channel Allocation Problem Multiple Access Protocols

Two types of transmission technology Point-to-Point Link Broadcast Link

Channel Allocation Problem Who's first?

Channel Allocation Problem Static Method Dynamic Method

Static Channel Allocation in LANs and MANs KEY: Each user is assigned with a equal-portion of the bandwidth Minus: 1. Ineffective bandwidth utilization 2. Some users will be denied in high traffic Plus: 1. Simple 2. No interference

Dynamic Channel Allocation in LANs and MANs Key assumptions 1. Station Model 2. Single Channel Assumptions 3. Collision Assumption 4. Continuous Time vs Slotted Time 5. Carrier Sense vs No Carrier Sense

Multiple Access Protocols ALOHA Carrier Sense Multiple Access Protocols Collision-Free Protocols

ALOHA Idea: Users can transmit whenever they have data to send Aloha!! Two types of ALOHA: Pure ALOHA Slotted ALOHA The main difference between them is time and time and time

Pure ALOHA continuous time no global time synchronization frame Send & then wait for collision collision? end no wait a random time yes continuous time no global time synchronization

Pure ALOHA – vulnerable period t – frame time, to – starting time

Slotted ALOHA 1. Time is divided to equal intervals (slots) 2. Need time synchronization 3. Frames can only be transmitted at starts of time slots

Slotted ALOHA – who's next?

Channel utilization

CSMA with Collision Detection (CSMA/CD) How? Idea: A station stop transmitting its frame immediately after a collision is detected to save time and bandwidth This is the basis of Ethernet LAN But: half-duplex

Propagation Delay & CD

Collision-free Protocols The basic bit-map control Idea: At the contention period, all station announce their needs to transmit. And then at the transmission period all registered stations take turn to send their frames. Drawback: suffer n bits delay in contention period

Collision-Free Protocols The binary countdown protocol Unique binary station addresses with the same length Rules: Compete by “OR” with other bits in the same order If there is a “0 to 1 transformation” in the result → give up

The Adaptive Tree Walk Protocol Distributed Depth-first tree walk

The Adaptive Tree Walk Protocol - improvement At heavy traffic, skip nodes father nodes 1,2,3,... Number of nodes at level i: 2^i Assume that, p is number of ready stations. Then k = p/2^i is number of ready stations per node at level i Optimal: k = 1 or p/2^i= 1 from this i = log2(p)

Wavelength Division MA Protocols (WDMA) To allow multiple transmissions the spectrum is divided into channels (wavelength bands) Total internal reflection: n1>n2 i1>ilimit

WDMA Each station is assigned two channels: control & data and two transmitters and two receivers 1. A fixed-wavelength receiver for listening to its own control channel. 2. A fixed-wavelength transmitter for outputting data frames. 3. A tunable transmitter for sending on other stations' control channels. 4. A tunable receiver for selecting a data transmitter to listen to.

WDMA Require global time synchronization for both channels

Wireless LAN Protocols CSMA is not appropriate Interference at the receiver, not at the sender Hidden station problem Exposed station problem

Wireless LAN Protocols - MACA A sends RTS to B and begins transmission only after receiving CTS reply from B

Wireless LAN Protocols - MACA 1. C doesn't see CTS and thus is free to send its RTS 2. C and B may want to send RTS at the same time so cause collision.

Wireless LAN Protocols - MACAW Improvements: 1. ACK frame after each successful data frame 2. Use CSMA for RTS frame

Ethernet Ethernet Cabling Manchester Encoding The Ethernet MAC Sublayer Protocol Switched Ethernet Fast Ethernet Gigabit Ethernet

The most common kinds of Ethernet cabling.

Ethernet Cabling (2) Three kinds of Ethernet cabling. (a) 10Base5, (b) 10Base2, (c) 10Base-T.

Cable topologies. (a) Linear, (b) Spine, (c) Tree, (d) Segmented. Ethernet Cabling (3) Cable topologies. (a) Linear, (b) Spine, (c) Tree, (d) Segmented.

Manchester Encoding Using voltage to encode binary code: 0 volts ~ 0 bit and 5 volts ~ 1 bit 0001000 = 10000000 or 01000000, because the difference between an idle sender (0 volts) and a 0 bit (0 volts) is ambiguous -1 and +1? out of synchronization, long sequence of 0 or 1

Manchester Encoding Using two voltages to encode one bit: 1 ~ high – low; 0 ~ low - high 010 = (-1,1)(1,-1)(-1,1) Plus: every bit has a transition in the middle → determine bit boundary & sync Minus: double bandwidth, 10Mbs ~ 20 mil changes per second

Differential Manchester encoding 1 bit ~ absence;0 bit ~ presence of a transition at the start of the interval. In both cases, there is a transition in the middle. Plus: complex equipment Minus: better noise immunity. (the 802.5 token ring) All Ethernet systems use Manchester encoding due to simplicity.(+ 0.85 volts; - 0.85 volts)

Manchester Encoding (a) Binary encoding, (b) Manchester encoding, (c) Differential Manchester encoding.

Ethernet MAC Sublayer Protocol http://en.wikipedia.org/wiki/MAC_address

Ethernet MAC Sublayer Protocol Unicast: 1 receiver Multicast: group of receivers Broadcast: all 281,474,976,710,656 possible MAC addresses

802.3 Ethernet frame structure

802.3 Ethernet frame structure Header: source and destination MAC address; Ethertype protocol identifier field; optional IEEE 802.1Q VLAN tag Frame check sequence: 32-bit CRC (cyclic redundancy check)

In addition to there being a maximum frame length, there is also a minimum frame length. While a data field of 0 bytes is sometimes useful, it causes a problem. When a transceiver detects a collision, it truncates the current frame, which means that stray bits and pieces of frames appear on the cable all the time. To make it easier to distinguish valid frames from garbage, Ethernet requires that valid frames must be at least 64 bytes long, from destination address to checksum, including both. If the data portion of a frame is less than 46 bytes, the Pad field is used to fill out the frame to the minimum size.

A simple example of switched Ethernet.

Fast Ethernet 802.3u vs 802.12 802.3u: Ideas: backward compatible unforeseen problems technology change period Ideas: keep all the old stuffs reduce the bit time from 100 nsec to 10 nsec

The original fast Ethernet cabling.

Gigabit Ethernet (a) A two-station Ethernet. (b) A multistation Ethernet.

Gigabit Ethernet cabling.

Wireless LAN Protocols Hidden station problem Exposed station problem A wireless LAN. (a) A transmitting B. (b) B transmitting A.

The 802.11 MAC Sublayer Protocol (1) The use of virtual channel sensing using CSMA/CA

The 802.11 MAC Sublayer Protocol (2) A fragment burst.

The 802.11 Frame Structure The 802.11 data frame.

802.11 Services Distribution Services Association Disassociation Reassociation Distribution Integration

802.11 Services Intracell Services Authentication Deauthentication Privacy Data Delivery