جلسه دوازدهم شبکه های کامپیوتری به نــــــــــــام خدا.

Slides:



Advertisements
Similar presentations
Ethernet “dominant” LAN technology: cheap $20 for 100Mbs!
Advertisements

Computer Networks Ethernet I Professor Hui Zhang
The ALOHA Protocol “Free for all”: whenever station has a frame to send, it does so. –Station listens for maximum RTT for an ACK. –If no ACK after a specified.
Communication Networks Lecture 5 NETW 501-L5: NETW 501-L5: Medium Access Control Dr.-Ing. Khaled Shawky Hassan Room: C3-222, ext: 1204,
1 K. Salah Module 4.2: Media Access Control The Media Access Control (MAC) sublayer –Random Access (CSMA), IEEE –Token Passing, IEEE Ch 13-
Distributed systems Module 1 -Basic networking Teaching unit 1 – LAN standards Ernesto Damiani University of Bozen-Bolzano Lesson 2 – LAN Medium Access.
1 Shared Access Networks Outline Bus (Ethernet) Token ring (FDDI) Wireless (802.11)
Spring 2002CS 4611 Shared Access Networks Outline Bus (Ethernet) Token ring (FDDI) Wireless (802.11)
CSE 561 – Multiple Access David Wetherall Spring 2000.
CSC 450/550 Part 3: The Medium Access Control Sublayer.
EE 122: Ethernet and Ion Stoica September 18, 2002 (* this talk is based in part on the on-line slides of J. Kurose & K. Rose)
Distributed systems Module 1 -Basic networking Teaching unit 1 – LAN standards Ernesto Damiani University of Bozen-Bolzano Lesson 4 – Ethernet frame.
EE 4272Spring, 2003 Chapter 14 LAN Systems Ethernet (CSMA/CD)  ALOHA  Slotted ALOHA  CSMA  CSMA/CD Token Ring /FDDI Fiber Channel  Fiber Channel Protocol.
EEC-484/584 Computer Networks Lecture 13 Wenbing Zhao
Ethernet Outline Multiple Access and Ethernet Intro Ethernet Framing CSMA/CD protocol Exponential backoff.
1 ECE453 – Introduction to Computer Networks Lecture 8 – Multiple Access Control (II)
CSE 461 University of Washington1 Topic How do nodes share a single link? Who sends when, e.g., in WiFI? – Explore with a simple model Assume no-one is.
Infrastructure de Communications – CR 4107Chapter 41 The Medium Access Control Sublayer Chapter 4.
Enhanced CSMA Additional improvement  Use CSMA access  Listen while transmitting  Stop immediately if collision sensed  Called collision detection.
10-01-K.Steenhaut & J.Tiberghien - VUB 1 Telecommunications Concepts Chapter 3.1 Packet Switched Local Area Networks.
2/12/20021 IEEE Wireless Local Area Networks The future is wireless Presented by Tamer Khattab and George Wong Prepared for EECE571N - Advanced.
Computer Networks 1 (Mạng Máy Tính 1)
Ethernet. Ethernet Goals Simplicity Low Cost Compatibility Address flexibility Fairness –All nodes have equal access to the network High speed Stability.
1 Computer Communication & Networks Lecture 13 Datalink Layer: Local Area Network Waleed Ejaz
Computer Networks NYUS FCSIT Spring 2008 Igor TRAJKOVSKI, Ph.D. Associate Professor
Ch. 16 High-Speed LANs The Emergence of High- Speed LANs Trends –Computing power of PCs has continued to grow. –MIS organizations recognize the.
CSMA with Collision Detection CSMA/CD can be in one of three states: contention, transmission, or idle.
The Medium Access Control Sublayer Chapter 4. The Channel Allocation Problem Static Channel Allocation in LANs and MANs Dynamic Channel Allocation in.
The Medium Access Control Sublayer Chapter 4 10/1/2015www.noteshit.com1.
CHAPTER 4: THE MEDIUM ACCESS SUBLAYER 4.1: The Channel Allocation Problem 4.2: Multiple Access Protocols.
LECTURE9 NET301. DYNAMIC MAC PROTOCOL: CONTENTION PROTOCOL Carrier Sense Multiple Access (CSMA): A protocol in which a node verifies the absence of other.
جلسه دهم شبکه های کامپیوتری به نــــــــــــام خدا.
CSE 461 University of Washington1 Topic How do nodes share a single link? Who sends when, e.g., in WiFI? – Explore with a simple model Assume no-one is.
Layer 2 Technologies At layer 2 we create and transmit frames over communications channels Format of frames and layer 2 transmission protocols are dependent.
The Medium Access Control Sublayer Chapter 4. The Channel Allocation Problem Static Channel Allocation Dynamic Channel Allocation  Delay for the divided.
Local Area Networks: Ethernet. IEEE Background Institution of Electrical and Electronic Engineering (IEEE) A professional non-profit organization Project.
The Medium Access Control Sublayer Chapter 4. The Channel Allocation Problem Static Channel Allocation in LANs and MANs Dynamic Channel Allocation in.
The Medium Access Control Sublayer Chapter 4. The Channel Allocation Problem Static Channel Allocation in LANs and MANs Dynamic Channel Allocation in.
جلسه یازدهم شبکه های کامپیوتری به نــــــــــــام خدا.
17 - Winter 2005 ECE ECE 766 Computer Interfacing and Protocols 1 Local Area Networks Need for high performance communications for physically close devices.
LANs : Aloha/CSMA , summary
The Medium Access Control Sublayer Chapter 4 12/13/2015www.ishuchita.com1.
Ch 13. Wired LANs: Ethernet IEEE Standards Project 802 launched in 1985 – To set standards to enable intercommunication among equipment from a variety.
Ethernet Overview it the IEEE standard for Ethernet.
CSE 461: Multiple Access Networks. This Lecture  Key Focus: How do multiple parties share a wire?  This is the Medium Access Control (MAC) portion of.
Department of Computer Science, University of Peshawar Multiple Access.
LECTURE9 NET301 11/5/2015Lect 9 NET DYNAMIC MAC PROTOCOL: CONTENTION PROTOCOL Carrier Sense Multiple Access (CSMA): A protocol in which a node verifies.
The Medium Access Control Sublayer Chapter 4. The Channel Allocation Problem Static Channel Allocation in LANs and MANs Dynamic Channel Allocation in.
CSE 461 University of Washington1 Topic How do nodes share a single link? Who sends when, e.g., in WiFI? – Explore with a simple model Assume no-one is.
EE 122: Lecture 6 Ion Stoica September 13, 2001 (* this talk is based in part on the on-line slides of J. Kurose & K. Rose)
1 Ethernet “dominant” LAN technology: cheap $20 for 100Mbs! first widely used LAN technology Simpler, cheaper than token LANs and ATM Kept up with speed.
MAC Layer Protocols for Wireless Networks. What is MAC? MAC stands for Media Access Control. A MAC layer protocol is the protocol that controls access.
The Medium Access Control Sublayer
THE MEDIUM ACCESS CONTROL SUBLAYER 4.1 THE CHANNEL ALLOCATION PROBLEM 4.2 MULTIPLE ACCESS PROTOCOLS.
Example DLL Protocols 1. High-Level Data Link Control (HDLC).
Data Link Layer Lower Layers Local Area Network Standards
Link Layer 5.1 Introduction and services
Ethernet Outline Multiple Access and Ethernet Intro Ethernet Framing
CS 457 – Lecture 6 Ethernet Spring 2012.
The Medium Access Control Sublayer
Chapter 12 Local Area Networks
Protocol layering and data
Chapter 12 Local Area Networks
Protocol layering and data
Figure 3.1 Internet model.
Chapter 12 Local Area Networks
Ethernet Outline Multiple Access and Ethernet Intro Ethernet Framing
Computer Interfacing and Protocols
LAN Addresses and ARP IP address: drives the packet to destination network LAN (or MAC or Physical) address: drives the packet to the destination node’s.
Ethernet Outline Multiple Access and Ethernet Intro Ethernet Framing
Presentation transcript:

جلسه دوازدهم شبکه های کامپیوتری به نــــــــــــام خدا

Global Wireless Standards 2

Wireless Platforms 3

Wireless LAN Protocols Wireless protocols are inherently multiple access ! Can we use sensing ? What matters is collision at Rx Hidden station problem: C can not sense A. If both target B, there will be a collision Exposed station problem: B sends to A. C senses the medium and concludes that there is activity. So, it does not send to D. The link between C and D is not susceptible to the conversation of A and B. 4

Wireless LAN Protocols MACA: Multiple Access with Collision Avoidance Sender: sends RTS (request to send) Receiver: sends CTS (clear to send) RTS and CTS contain length of message to be sent Key observations: Any station hearing RTS must keep silent during the next phase of data transmission Any station hearing CTS must keep silent during next message 5

IEEE 802 standards 6 IEEE 802 refers to a family of IEEE standards dealing with local area networks and metropolitan area networks: IEEE 802: Overview & Architecture IEEE Bridging & Management IEEE 802.2: Logical Link Control IEEE 802.3: CSMA/CD Access Method (Ethernet) IEEE 802.5: Token Ring Access Method IEEE : Wireless Local Area Networks (LAN) IEEE : Wireless Personal Area Networks (PAN) IEEE : Broadband Wireless Metropolitan Area Networks (MAN) IEEE : Resilient Packet Rings (RPR) IEEE : Mobile Broadband Wireless Access IEEE : Media Independent Handoff IEEE : Wireless Regional Area Network IEEE : Emergency Services Working Group

IEEE standard 802 for LANs Ethernet Whole family of 1-persistent CSMA/CD protocols Original design for 1-10 Mbps Various media, first used on 50 ohm coaxial cable Started as ALOHA system on Hawaiian Islands Carrier sensing was added by Xerox

802.3 LAN Standard Encoding Needed: unambiguously determine start, end and middle of each bit without reference to external clock Two encoding techniques Manchester encoding 1: 1-0 transition 0: 0-1 transition Every bit has transition in the middle. However, twice the bandwidth capacity needed ! Differential encoding uses Manchester, +/ volt signalling Framing Preamble: 7 x pattern creates 10 MHz square wave of 5.6 microsecond for synchronization Start field: denotes start of frame

802.3 Framing 9 Length field: bytes Data: payload Pad: ensure minimum frame length = 64 bytes. needed for collision detection (LAN, 2500 meter, 10 Mbps, 4 repeaters: 51.2 microseconds minimum frame length => 64 bytes) Jam Signal: When a collision is detected during a frame transmission, the transmission is not terminated immediately. A station noting a collision has occurred sends a 4 to 6 byte long pattern composed of bit combinations. The purpose of this is to ensure that any other nodes which may currently be receiving a frame will receive the jam signal in place of the correct 32-bit MAC CRC, this causes the other receivers to discard the frame due to a CRC error

802.3 LAN Standard Addressing Addressing: 6 bytes addresses that are assigned by IEEE Bit …0 type of address 0 0 ordinary local 0 1 ordinary global 1 0 group local 1 1 group global 1 1 1…..1 broadcast Binary Exponential Back off After collision wait 0 or more slots (of 51.2 msec) First collision: wait 0 or 1 slot (choose randomly) Second collision: wait 0, 1, 2 or 3 slots N-th collision: wait 0 – (2 N -1) slots N max = 10 => wait between slots Give up after 16 trials and leave recovery to higher layers Algorithm ensures low latency at low load and fairly resolves collisions when the load is high.