1 Computer Communication & Networks Lecture 12 Datalink Layer: Multiple Access Waleed Ejaz

Slides:



Advertisements
Similar presentations
Nick Feamster CS 4251 Computer Networking II Spring 2008
Advertisements

EECC694 - Shaaban #1 lec #5 Spring Data Link In Broadcast Networks: The Media Access Sublayer Broadcast networks with multi-access (or random.
12.1 Chapter 12 Multiple Access Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Multiple access What if multiple machines are sharing the same link?
LECTURE 11 CT1303 LAN. DYNAMIC MAC PROTOCOL No fixed assignment for transmission media or any network resources.. It allows transmission when needed.
12.1 Chapter 12 Multiple Access Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Communication Networks Lecture 5 NETW 501-L5: NETW 501-L5: Medium Access Control Dr.-Ing. Khaled Shawky Hassan Room: C3-222, ext: 1204,
Chapter 12 Multiple Access Figure 12.1 Data link layer divided into two functionality-oriented sublayers Figure 12.2 Taxonomy of multiple-access protocols.
1 Pertemuan 13 Teknik Akses Jaringan - Random Matakuliah: H0174/Jaringan Komputer Tahun: 2006 Versi: 1/0.
15 – Data link layer Chapter 5: The Data Link Layer Our goals: r understand principles behind data link layer services: m error detection, correction.
DataLink Layer session 1 TELE3118: Network Technologies Week 2: Data Link Layer Framing, Error Control, Multiple Access Some slides have been taken.
5: DataLink Layer5-1 Link Layer – Error Detection/Correction and MAC.
5: DataLink Layer5-1 Chapter 5 Link Layer and LANs Computer Networking: A Top Down Approach Featuring the Internet, 3 rd edition. Jim Kurose, Keith Ross.
12.1 Chapter 12 Multiple Access Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Semester EEE449 Computer Networks The Data Link Layer Part 2: Media Access Control En. Mohd Nazri Mahmud MPhil (Cambridge, UK) BEng (Essex,
Medium Access Control Sublayer
1 ECE453 – Introduction to Computer Networks Lecture 7 – Multiple Access Control (I)
5: DataLink Layer5-1 Chapter 5 Link Layer and LANs Part 3: MAC Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley.
1 Link-Layer Contention EE 122: Intro to Communication Networks Fall 2007 (WF 4-5:30 in Cory 277) Vern Paxson TAs: Lisa Fowler, Daniel Killebrew & Jorge.
Chi-Cheng Lin, Winona State University CS412 Introduction to Computer Networking & Telecommunication Medium Access Control Sublayer.
4-1 Last time □ Link layer overview ♦ Services ♦ Adapters □ Error detection and correction ♦ Parity check ♦ Internet checksum ♦ CRC □ PPP ♦ Byte stuffing.
Chapter 12 Multiple Access Figure 12.1 Data link layer divided into two functionality-oriented sublayers Figure 12.2 Taxonomy of multiple-access protocols.
CSC4220/6220 Computer Networks
جلسه دهم شبکه های کامپیوتری به نــــــــــــام خدا.
Chapter 5 Link Layer Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 Link Layer multiple.
Medium Access Control NWEN302 Computer Network Design.
Chi-Cheng Lin, Winona State University CS 313 Introduction to Computer Networking & Telecommunication Medium Access Control Sublayer.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2000 Unit-II Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
4: DataLink Layer1 Multiple Access Links and Protocols Three types of “links”: r point-to-point (single wire, e.g. PPP, SLIP) r broadcast (shared wire.
Medium Access Control Sub Layer
12.1 Chapter 12 Multiple Access Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Multiple Access.
Data Communications, Kwangwoon University12-1 Chapter 12. Multiple Access 1.Random Access 2.Controlled Access 3.Channelization.
1 Kyung Hee University Chapter 12 Multiple Access.
5: DataLink Layer5-1 The Data Link Layer Chapter 5 Kurose and Ross Today 5.1 and 5.3.
Multiple Access Links and Protocols
CS3502: Data and Computer Networks Local Area Networks - 1 introduction and early broadcast protocols.
5: DataLink Layer 5a-1 Multiple Access protocol. 5: DataLink Layer 5a-2 Multiple Access Links and Protocols Three types of “links”: r point-to-point (single.
Background of Ad hoc Wireless Networks Student Presentations Wireless Communication Technology and Research Ad hoc Routing and Mobile IP and Mobility Wireless.
CS3502: Data and Computer Networks Local Area Networks - 1 introduction and early broadcast protocols.
Chapter 12 Multiple Access
Carrier Sense Multiple Access Improve ALOHA by using carrier sense –Stations listen to the carrier before transmitting –If channel is busy, the station.
Transport Layer 3-1 Chapter 5 Link Layer Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012  CPSC.
5: DataLink Layer5-1 Link Layer r 5.1 Introduction and services r 5.2 Error detection and correction r 5.3Multiple access protocols r 5.4 Link-layer Addressing.
Multiple Access. Figure 12.1 Data link layer divided into two functionality-oriented sublayers.
5: DataLink Layer5-1 Slotted ALOHA Assumptions r all frames same size r time is divided into equal size slots, time to transmit 1 frame r nodes start to.
COMPUTER NETWORKS Data-link Layer (The Medium Access Control Sublayer) MAC Sublayer.
Multiple Access By, B. R. Chandavarkar, CSE Dept., NITK, Surathkal Ref: B. A. Forouzan, 5 th Edition.
Chapter 5 Link Layer Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 A note on the use of these.
Part III. Data Link Layer
Multiple Access Methods
Chapter 12 Multiple Access.
CT301 LECTURE 8.
Chapter 5 Link Layer and LANs
Part III Datalink Layer 10.
Multiple Access Mahesh Jangid Assistant Professor JVW University.
Chapter 12 Multiple Access
CS 457 – Lecture 6 Ethernet Spring 2012.
Services of DLL Framing Link access Reliable delivery
Multiple access.
Multiple Access Methods
Chapter 12 Multiple Access
Overview Jaringan Komputer (3)
Chapter 12 Multiple Access
Link Layer and LANs Not everyone is meant to make a difference. But for me, the choice to lead an ordinary life is no longer an option 5: DataLink Layer.
Data Communication Networks
Multiple Access Methods
Link Layer: Multiple Access
Part III Datalink Layer 10.
Chapter 12 Media Access Control (MAC)
Presentation transcript:

1 Computer Communication & Networks Lecture 12 Datalink Layer: Multiple Access Waleed Ejaz

2 Data Link Layer

3 Data Link Layer Topics to Cover Error Detection and Correction Data Link Control and Protocols Multiple Access Local Area Networks Wireless LANs

4 Multiple access problem Example: Cocktail party – many people gather together in a large room Broadcast medium – air Another example: a classroom Human protocols:  “Give everyone a chance to speak”  “Don’t speak until you are spoken to”  “Don’t monopolize the conversation”  “Raise your hand if you have a question”  “Don’t interrupt when someone is speaking”  “Don’t fall asleep when someone else is talking”

5 Multiple access protocols In LANs, WiFi, satellite networks, cocktail party If more than 2 users the same time - collision All collided packets are lost -> waste of bandwidth Ideally, the MAC protocol for a broadcast channel with the bit-rate R bps should satisfy:  if only 1 node is sending than the throughput is R  when M nodes have data to send than the throughput is R/M  decentralized protocol – no master  simple & inexpensive to implement

6 Taxonomy of Multiple-Access Protocols

7 Random Access Protocols In random access or contention methods, no station is superior to another station and none is assigned the control over another. No station permits, or does not permit, another station to send. At each instance, a station that has data to send uses a procedure defined by the protocol to make a decision on whether or not to send. In random access or contention methods, no station is superior to another station and none is assigned the control over another. No station permits, or does not permit, another station to send. At each instance, a station that has data to send uses a procedure defined by the protocol to make a decision on whether or not to send.

8 ALOHA Network Developed by Norm Abramson at the Univ. of Hawaii  the guy had interest in surfing and packet switching  mountainous islands → land-based network difficult to install  fully decentralized protocol ACK

9 Pure Aloha The node immediately transmits its frame completely If the frame is collided it retransmits the frame again (after completely transmitting its collided frame) with the probability p

10 Slotted Aloha Assumptions all frames same size time is divided into equal size slots, time to transmit 1 frame nodes start to transmit frames only at beginning of slots nodes are synchronized if 2 or more nodes transmit in slot, all nodes detect collision Operation when node obtains fresh frame, it transmits in next slot no collision, node can send new frame in next slot if collision, node retransmits frame in each subsequent slot with prob. p until success

11 Frames in a Slotted ALOHA Network

12 Slotted Aloha Pros single active node can continuously transmit at full rate of channel highly decentralized: only slots in nodes need to be in sync simple Cons collisions, wasting slots idle slots nodes may be able to detect collision in less than time to transmit packet clock synchronization

13 Multiple Access Protocols ALOHA

14 Carrier Sense Multiple Access Invented to minimize collisions and increase the performance A station now “follows” the activity of other stations Simple rules for a polite human conversation  Listen before talking  If someone else begins talking at the same time as you, stop talking CSMA:  A node should not send if another node is already sending carrier sensing CD (collision detection):  A node should stop transmission if there is interference collision detection

15 Carrier Sense Multiple Access If everyone is sensing the medium how come that collisions still occur? channel propagation delay

16 CSMA (cnt’d) Reduces the chance of collisions reduces the efficiency increases the chance for collisions  1-persistant p-persistant  Decreases the chance for collisions  Improves efficiency

17 Multiple Access Protocols ALOHA

18

19 CSMA with Collision Detection (CSMA/CD) CSMA/CD can be in one of the three states: contention, transmission, or idle. Example of CSMA/CD: Ethernet How long does it take before stations realize that there has been a collision?

20 Collision Detection How the station detects a collision? There are many collision detection methods!  Most of them are analog processes. Examples:  detecting voltage level on the line  detecting power level  detecting simultaneous transmission & reception

21 Multiple Access Protocols ALOHA

22 CSMA with Collision Avoidance -CSMA/CA- no collisions

23 Readings Chapter 12 (B.A Forouzan)  Section 12.1  (Cover only those contents which are related to topics covered in class)

24