Analysis of Ethernet-like protocols Andrey Lukyanenko University of Kuopio.

Slides:



Advertisements
Similar presentations
Data and Computer Communications Eighth Edition by William Stallings Lecture slides by Lawrie Brown Chapter 16 – High Speed LANs.
Advertisements

Topic 7 Local Area Networks (LAN)
Ethernet “dominant” LAN technology: cheap $20 for 100Mbs!
Channel Allocation Protocols. Dynamic Channel Allocation Parameters Station Model. –N independent stations, each acting as a Poisson Process for the purpose.
The ALOHA Protocol “Free for all”: whenever station has a frame to send, it does so. –Station listens for maximum RTT for an ACK. –If no ACK after a specified.
Ethernet – CSMA/CD Review
Lecture 9: Multiple Access Protocols
A New Approach for Accurate Modelling of Medium Access Control (MAC) Protocols Presenter: Moshe Zukerman ARC Centre for Ultra Broadband Information Networks.
1 K. Salah Module 4.2: Media Access Control The Media Access Control (MAC) sublayer –Random Access (CSMA), IEEE –Token Passing, IEEE Ch 13-
CMPE 150- Introduction to Computer Networks 1 CMPE 150 Fall 2005 Lecture 17 Introduction to Computer Networks.
Copyright © 2003, Dr. Dharma P. Agrawal and Dr. Qing-An Zeng. All rights reserved. 1 Chapter 6 Multiple Radio Access.
EEC-484/584 Computer Networks Lecture 13 Wenbing Zhao
5-1 Data Link Layer r Today, we will study the data link layer… r This is the last layer in the network protocol stack we will study in this class…
ECE358: Computer Networks Spring 2012
1 Announcements Prelim and submission for 3 rd CS 415 project Homework 4 graded.
Lecture 16 Random Access protocols r A node transmits at random at full channel data rate R. r If two or more nodes “collide”, they retransmit at random.
Model and tools. Traffic Model Poisson law – Napoléon worries about the statistics of horse accidents of his generals – Poisson confirms these are unfrequent.
Infrastructure de Communications – CR 4107Chapter 41 The Medium Access Control Sublayer Chapter 4.
Enhanced CSMA Additional improvement  Use CSMA access  Listen while transmitting  Stop immediately if collision sensed  Called collision detection.
Review: Medium Access Control Sublayer –What is the problem to be addressed in this sublayer? –Protocols that allow collision Pure ALOHA Slotted ALOHA.
Binary Exponential Backoff Binary exponential backoff refers to a collision resolution mechanism used in random access MAC protocols. This algorithm is.
9/11/2015 5:55 AM1 Ethernet and CSMA/CD CSE 6590 Fall 2010.
CHAPTER 4: THE MEDIUM ACCESS SUBLAYER 4.1: The Channel Allocation Problem 4.2: Multiple Access Protocols.
LECTURE9 NET301. DYNAMIC MAC PROTOCOL: CONTENTION PROTOCOL Carrier Sense Multiple Access (CSMA): A protocol in which a node verifies the absence of other.
جلسه دهم شبکه های کامپیوتری به نــــــــــــام خدا.
CSE 461 University of Washington1 Topic How do nodes share a single link? Who sends when, e.g., in WiFI? – Explore with a simple model Assume no-one is.
LAN technologies and network topology LANs and shared media Locality of reference Star, bus and ring topologies Medium access control protocols.
Data and Computer Communications Ninth Edition by William Stallings Data and Computer Communications, Ninth Edition by William Stallings, (c) Pearson Education.
Chi-Cheng Lin, Winona State University CS 313 Introduction to Computer Networking & Telecommunication Medium Access Control Sublayer.
Multiple Access Readings: Kurose & Ross, 5.3, 5.5.
Data Link Layer Moving Frames. Link Layer Protocols: ethernet, wireless, Token Ring and PPP Has node-to-node job of moving network layer.
Networks and Protocols CE Week 2b. Topologies, CSMA/CD, CSMA/CA.
Ethernet: Distributed Packet Switching for Local Computer Networks Authors: Robert M. Metcalfe and David R. Boggs Presentation: Christopher Peery.
جلسه یازدهم شبکه های کامپیوتری به نــــــــــــام خدا.
R ANDOM A CCESS N ETWORKS CSMA F AMILIES 1. References Chapter 9 of the book. Throughput Analysis for Persistent CSMA Systems, HIDEAKI TAKAGI AND LEONARD.
Prof. John Nestor ECE Department Lafayette College Easton, Pennsylvania ECE Senior Design I Lecture 16 - Ethernet Fall.
4: DataLink Layer1 Multiple Access Links and Protocols Three types of “links”: r point-to-point (single wire, e.g. PPP, SLIP) r broadcast (shared wire.
Medium Access Control Sub Layer
Chapter 6 Multiple Radio Access
LANs : Aloha/CSMA , summary
Ethernet. Ethernet (802.3) 1-persistent CSMA, CD, binary exponential backoff Carrier sense: station listens to channel first. 1-persistent: If idle, station.
CS3502: Data and Computer Networks Local Area Networks - 1 introduction and early broadcast protocols.
5: DataLink Layer 5a-1 Multiple Access protocol. 5: DataLink Layer 5a-2 Multiple Access Links and Protocols Three types of “links”: r point-to-point (single.
CS3502: Data and Computer Networks Local Area Networks - 1 introduction and early broadcast protocols.
LECTURE9 NET301 11/5/2015Lect 9 NET DYNAMIC MAC PROTOCOL: CONTENTION PROTOCOL Carrier Sense Multiple Access (CSMA): A protocol in which a node verifies.
Medium Access Control in Wireless networks
EE 122: Lecture 6 Ion Stoica September 13, 2001 (* this talk is based in part on the on-line slides of J. Kurose & K. Rose)
MAC Layer Protocols for Wireless Networks. What is MAC? MAC stands for Media Access Control. A MAC layer protocol is the protocol that controls access.
1 Ethernet CSE 3213 Fall February Introduction Rapid changes in technology designs Broader use of LANs New schemes for high-speed LANs High-speed.
CSMA/CA Simulation  Course Name: Networking Level(UG/PG): UG  Author(s) : Amitendu Panja, Veedhi Desai  Mentor: Aruna Adil *The contents in this ppt.
CSMA/CD Simulation Carrier Sense Multiple Access (CSMA), although more efficient than ALOHA or slotted ALOHA, still has one glaring inefficiency: When.
Tel Hai Academic College Department of Computer Science Prof. Reuven Aviv Markov Models for Access Control in Computer Networks Resource: Fayez Gebali,
Chapter 4 The Medum Access Sublayer. MA Sublayer Additional Reference –Local and Metropolitan Area Networks, William Stallings, Prentice Hall, 2000, 6th.
COMPUTER NETWORKS Data-link Layer (The Medium Access Control Sublayer) MAC Sublayer.
Example DLL Protocols 1. High-Level Data Link Control (HDLC).
Data Link Layer Lower Layers Local Area Network Standards
Wireless Sensor Networks 4. Medium Access
High Speed LANs – Ethernet and Token Ring
DTMC Applications Ranking Web Pages & Slotted ALOHA
Net301 lecture9 11/5/2015 Lect 9 NET301.
Services of DLL Framing Link access Reliable delivery
Learning Objectives After interacting with this Learning Object, the learner will be able to: Explain the process of collision detection in CSMA/CD.
Ethernet Neil Tang 9/17/2008 CS440 Computer Networks.
The Medium Access Control Sublayer
Channel Allocation Problem/Multiple Access Protocols Group 3
Ethernet – CSMA/CD Review
Channel Allocation Problem/Multiple Access Protocols Group 3
of the IEEE Distributed Coordination Function
Chapter 6 Multiple Radio Access.
Satellite Packet Communications A UNIT -V Satellite Packet Communications.
Presentation transcript:

Analysis of Ethernet-like protocols Andrey Lukyanenko University of Kuopio

History of Ethernet Bob Metcalfe and David Boggs created Ethernet in laboratory of Xerox Company in 1973 (1976 scientific paper). Idea: Cheapness (just put “wire” in the building) Easiness (to add new station just buy a transceiver to it, and tap it into the network). Access to sources of local area network (printer, file server, etc…) Robustness (if any number of station becomes unreachable, the network still working). Success of idea: Today 95% of LANs are Ethernet LANs.

The Idea Shared medium (bus). –all data simply broadcast over the medium. –receivers listen to the network, if there is a message for them. Collisions. –If two or more messages broadcast in the network then collision could happen. Backoff protocol from Aloha. –The part of collision resolution protocol. –Problem of algorithms with fixed retransmission time (Pure Aloha isn’t stable).

Collision resolution Mechanisms to reduce probability and cost of losing packets: 1.Carrier detection Phase encoded (to remove silent spaces during packet transfer) If a station wants to transfer a packet it listen to the channel, deferring the packet if the channel busy. Collisions only if two or more stations find the Ether silent. 2.Interference detection each transceiver has detector, which says if the channel has the same signal that it transmits. If the signal differ then collision. We define time slot from now as double time to propagate the signal over network (round trip time). 3.Packet error detection (checksums) 4.Truncated packet filtering (reduce processing load). 5.Collision consensus enforcement When station find it message experenced interference it jams the network, to let all station know about it.

Backoff protocol in Ethernet Metcalfe and Boggs took binary exponential backoff protocol for their network. Difference that isn’t anymore a constant, now it is a function from the number of successive collisions of a message (backoff counter ). In Ethernet this function have the following form. If backoff counter exceeds 16, then we discard the message and zero the counter. Time delay always is a random number that is taken uniformly from sector We work with time delay before next attempt to send instead of “clear” probability.

Why do we continue study the Ethernet? Answer: We can use backoff protocol in the future. Examples of use: 1.Wireless network (also took binary exponential backoff). 2.OCPC (optical comunication parallel computer) h-relation problem currently studied in Kuopio. Collisions happen when two or more station transmit to the same station at some moment of time. Every station has h messages to send. The expected number of messages to some station is h (some kind of balanced situation).

h-relation problem (closer view) Tasks: In h-relation problem backoff protocol may be used. We need to choose the best one. In general we can take any kind of backoff function, backoff protocol wasn’t studied quite well yet (though, but some results say that binary exponential isn’t good choice).

History of research Different authors got different results on backoff. Kelly –mathematically formulation of problem (binary), criterion of instability with high input rate, for infinite model. Aldous –Ultimate instability of all acknowledge-based protocols, for infinite model. Goodman et al –stability for small incoming rate, for finite model. Håstad et al –Instability of binary exponential backoff for big incoming rate (>0.5) –Stability of polynomial backoff. –Instability of linear and sublinear protocols at all. Shenker –Denies some results of Håstad et al (according polynomial backoff)

Main Results by now For infinite model (when number of station is infinite) the protocol is unstable for all backoffs. For finite model polynomial backoff stable, and binary exponential unstable for big incoming rate (>0.5) and stable for small incoming rate, which goes to zero as the number of station grows up.

Our model Model was taken from Kwak et al paper. It’s slightly differ from model in Bianchi. Assumptions of the model: –The model is under Saturation conditions. –The model is in steady state (collision probability is the same, this state we could achieve if let the model work for a long period of time). –Time slotted model (with slot equal to the double round trip time). Message broadcasts during one time slot and has exactly bounds of the slot (also synchronized).

Calculus (1) Our first task for this model was to find the dependence between probability to transmit and probability to collide at any moment of time. We found that where From Bianchi we have that so solution of this system gives us the exact value for probability of collision (unfortunately we couldn’t solve it in general). Note that function F(z) has all the properties of backoff functions (combined together).

Calculus (2) Solving the previous equations we have, that The condition to have exactly one intersection is

Calculus (3) One of the most important characteristic of a network is the delay time of the system. It’s time that message should wait until successful transmission: Combining it with we can find the value of optimal probability of collision

Calculus (4) Existing BEB: Optimal EB:

Optimality for general function

Leaving saturation condition Using negative drift we can leave saturation conditions. New model is almost the same. New node which doesn’t affect if number of messages in the queue greater than zero.

Negative drift (idea). Zero state Current state Negative drift Q(t) > C Q(t) < C The number of steps to return to zero is at most (with positive probability) Condition of drift

Repeat results. We found optimality conditions for backoff protocol (model with infinite backoff counter). Extended the development of backoff to general functionality. Showed the performance of known backoff functions.

Future work. Make simulation (checking received results). Extend the theory on backoff function with finite model backoff counter. Check the formulas for small network preload (weakness of the assumption that model in steady state).

Thanks. Questions?