CSC4220/6220 Computer Networks

Slides:



Advertisements
Similar presentations
EECC694 - Shaaban #1 lec #5 Spring Data Link In Broadcast Networks: The Media Access Sublayer Broadcast networks with multi-access (or random.
Advertisements

Ethernet – CSMA/CD Review
Network Layer4-1 Link Layer: Introduction Some terminology: r hosts and routers are nodes (bridges and switches too) r communication channels that connect.
5-1 Link Layer: Introduction Some terminology: r hosts and routers are nodes r communication channels that connect adjacent nodes along communication path.
5: DataLink Layer5a-1 MAC Sublayer. 5: DataLink Layer5a-2 Multiple Access Links and Protocols Two types of “links”: r point-to-point m PPP for dial-up.
1 Pertemuan 13 Teknik Akses Jaringan - Random Matakuliah: H0174/Jaringan Komputer Tahun: 2006 Versi: 1/0.
15 – Data link layer Chapter 5: The Data Link Layer Our goals: r understand principles behind data link layer services: m error detection, correction.
Review r Multicast Routing m Three options m source-based tree: one tree per source shortest path trees reverse path forwarding m group-shared tree: group.
1 Link Layer Message M A B Problem: Given a message M at a node A consisting of several packets, how do you send the packets to a “neighbor” node B –Neighbor:
DataLink Layer session 1 TELE3118: Network Technologies Week 2: Data Link Layer Framing, Error Control, Multiple Access Some slides have been taken.
5: DataLink Layer5-1 Link Layer – Error Detection/Correction and MAC.
5: DataLink Layer5-1 Chapter 5 Link Layer and LANs Computer Networking: A Top Down Approach Featuring the Internet, 3 rd edition. Jim Kurose, Keith Ross.
EEC-484/584 Computer Networks Lecture 13 Wenbing Zhao
5: DataLink Layer5-1 Chapter 5: The Data Link Layer Our goals: r understand principles behind data link layer services: m error detection, correction m.
Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011 The Medium Access Control Sublayer Chapter.
Shashank Srivastava Motilal Nehru National Institute Of Technology, Allahabad Medium Access Control.
Introduction1-1 1DT014/1TT821 Computer Networks I Chapter 5 Link Layer and LANs.
1 ECE453 – Introduction to Computer Networks Lecture 7 – Multiple Access Control (I)
5: DataLink Layer5-1 Chapter 5 Link Layer and LANs Part 3: MAC Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley.
9/11/2015 5:55 AM1 Ethernet and CSMA/CD CSE 6590 Fall 2010.
1 Computer Communication & Networks Lecture 12 Datalink Layer: Multiple Access Waleed Ejaz
McGraw-Hill © The McGraw-Hill Companies, Inc., 2004 Chapter 12 Multiple Access Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction.
Chi-Cheng Lin, Winona State University CS412 Introduction to Computer Networking & Telecommunication Medium Access Control Sublayer.
4-1 Last time □ Link layer overview ♦ Services ♦ Adapters □ Error detection and correction ♦ Parity check ♦ Internet checksum ♦ CRC □ PPP ♦ Byte stuffing.
CHAPTER 4: THE MEDIUM ACCESS SUBLAYER 4.1: The Channel Allocation Problem 4.2: Multiple Access Protocols.
© Janice Regan, CMPT 128, CMPT 371 Data Communications and Networking LANs 2: MAC protocols.
جلسه دهم شبکه های کامپیوتری به نــــــــــــام خدا.
Chapter 5 Link Layer Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 Link Layer multiple.
Medium Access Control NWEN302 Computer Network Design.
The Medium Access Control Sublayer Chapter 4. The Channel Allocation Problem Static Channel Allocation Dynamic Channel Allocation  Delay for the divided.
Chi-Cheng Lin, Winona State University CS 313 Introduction to Computer Networking & Telecommunication Medium Access Control Sublayer.
4: DataLink Layer1 Multiple Access Links and Protocols Three types of “links”: r point-to-point (single wire, e.g. PPP, SLIP) r broadcast (shared wire.
Medium Access Control Sub Layer
Network Layer4-1 Link Layer: Introduction Some terminology: r hosts and routers are nodes (bridges and switches too) r communication channels that connect.
Chapter 6 Multiple Radio Access
5: DataLink Layer5-1 Link Layer r 5.1 Introduction and services r 5.2 Error detection and correction r 5.3Multiple access protocols r 5.4 Link-Layer Addressing.
5: DataLink Layer5-1 The Data Link Layer Chapter 5 Kurose and Ross Today 5.1 and 5.3.
Multiple Access Links and Protocols
5: DataLink Layer 5a-1 Multiple Access protocol. 5: DataLink Layer 5a-2 Multiple Access Links and Protocols Three types of “links”: r point-to-point (single.
Data Link Layer. Useful References r Wireless Communications and Networks by William Stallings r Computer Networks (third edition) by Andrew Tanenbaum.
5: DataLink Layer5-1 Chapter 5: The Data Link Layer Our goals: r Understand principles behind data link layer services: m error detection, error correction.
EEC-484/584 Computer Networks
5: DataLink Layer5-1 Chapter 5: The Data Link Layer Our goals: r Understand principles behind data link layer services: m error detection, error correction.
5: DataLink Layer5-1 Chapter 5 Link Layer and LANs Computer Networking: A Top Down Approach Featuring the Internet, 3 rd edition. Jim Kurose, Keith Ross.
5: DataLink Layer5a-1 Chapter 5: The Data Link Layer Our goals: r understand principles behind data link layer services: m error detection, correction.
EE 122: Lecture 6 Ion Stoica September 13, 2001 (* this talk is based in part on the on-line slides of J. Kurose & K. Rose)
1 Ethernet CSE 3213 Fall February Introduction Rapid changes in technology designs Broader use of LANs New schemes for high-speed LANs High-speed.
5: DataLink Layer5-1 Chapter 5: The Data Link Layer Our goals: r understand principles behind data link layer services: m error detection, error correction.
Transport Layer 3-1 Chapter 5 Link Layer Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012  CPSC.
5: DataLink Layer5-1 Chapter 5 Link Layer and LANs Computer Networking: A Top Down Approach Featuring the Internet, 3 rd edition. Jim Kurose, Keith Ross.
5: DataLink Layer5-1 Link Layer r 5.1 Introduction and services r 5.2 Error detection and correction r 5.3Multiple access protocols r 5.4 Link-layer Addressing.
The Medium Access Control Sublayer
THE MEDIUM ACCESS CONTROL SUBLAYER 4.1 THE CHANNEL ALLOCATION PROBLEM 4.2 MULTIPLE ACCESS PROTOCOLS.
UNIT 2 Medium Access sub layer: Medium Access sub layer - Channel Allocations, LAN protocols - ALOHA protocols(PURE AND SLOTTED ALOHA),CSMA/CA,CSMA/CD.
5: DataLink Layer5-1 Slotted ALOHA Assumptions r all frames same size r time is divided into equal size slots, time to transmit 1 frame r nodes start to.
EEC-484/584 Computer Networks
Chapter 5 Link Layer Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 A note on the use of these.
Chapter 5 Link Layer and LANs
Sidevõrgud IRT 4060/ IRT 0020 vooruloeng 6 / 20. okt 2004
High Speed LANs – Ethernet and Token Ring
Computer Communication Networks
Services of DLL Framing Link access Reliable delivery
Multiple access.
2012 session 1 TELE3118: Network Technologies Week 2: Data Link Layer Framing, Error Control, Multiple Access Some slides have been taken from: Computer.
THE IEEE MAC SUB-LAYER – chapter 14
Overview Jaringan Komputer (3)
Link Layer and LANs Not everyone is meant to make a difference. But for me, the choice to lead an ordinary life is no longer an option 5: DataLink Layer.
Link Layer 5.1 Introduction and services
Link Layer: Multiple Access
Dr. John P. Abraham Professor UTPA
Presentation transcript:

CSC4220/6220 Computer Networks Dr. WenZhan Song Associate Professor, Computer Science

Course roadmap Introduction Application Layer: WWW, FTP, email, DNS, multimedia Transport Layer: reliable end-end data transfer principles, UDP, TCP Network Layer: IP addressing, routing and other issues Data Link Layer: framing, error control, flow control Medium Access Control (MAC) Layer: multiple-access, channel allocation Physical Layer: wired, wireless, satellite Other Topics: network security, social issues, hot topics, research directions

Data Link Layer Road Map Data link layer design issues Framing Error Control Reliable data transfer and flow control Example data link protocols HDLC and PPP Multiple Access Protocols Static channel allocation Dynamic channel allocation LAN technologies and their MAC protocols Ethernet WiFi and WiMax

Multiple Access Links and Protocols Two types of “links”: point-to-point PPP for dial-up access point-to-point link between switch and host broadcast (shared wire or medium) traditional Ethernet upstream HFC 802.11 wireless LAN

Multiple Access protocols single shared broadcast channel two or more simultaneous transmissions by nodes: interference collision if node receives two or more signals at the same time multiple access protocol distributed algorithm that determines how nodes share channel, i.e., determine when node can transmit communication about channel sharing must use channel itself! no out-of-band channel for coordination

Ideal Multiple Access Protocol Broadcast channel of rate R bps 1. When one node wants to transmit, it can send at rate R. 2. When M nodes want to transmit, each can send at average rate R/M 3. Fully decentralized: no special node to coordinate transmissions no synchronization of clocks, slots 4. Simple

MAC Protocols: a taxonomy Static Channel Allocation divide channel into smaller “pieces” (time slots, frequency, code) allocate piece to node for exclusive use Dynamic Channel Allocation channel not divided, allow collisions “recover” from collisions

Static Channel Allocation: TDMA TDMA: time division multiple access access to channel in "rounds" each station gets fixed length slot (length = pkt trans time) in each round unused slots go idle example: 6-station LAN, 1,3,4 have pkt, slots 2,5,6 idle

Static Channel Allocation: FDMA FDMA: frequency division multiple access channel spectrum divided into frequency bands each station assigned fixed frequency band unused transmission time in frequency bands go idle example: 6-station LAN, 1,3,4 have pkt, frequency bands 2,5,6 idle time frequency bands

Dynamic Channel Allocation ALOHA, slotted ALOHA CSMA, CSMA/CD, CSMA/CA – in future slides Collision free protocols Bit-map protocol Binary countdown Limited contention protocols Adaptive tree walk Wavelength division multiple access protocol Not currently used in major system yet

Pure (unslotted) ALOHA unslotted Aloha: simpler, no synchronization when frame first arrives transmit immediately, if collision, then retransmit with p, or waits for another frame time with 1-p collision probability increases: frame sent at t0 collides with other frames sent in [t0-1,t0+1]

Pure Aloha efficiency P(success by given node) = P(node transmits) . P(no other node transmits in [t0-1,t0] . P(no other node transmits in [t0,1+t0] = p . (1-p)N-1 . (1-p)N-1 = p . (1-p)2(N-1) … choosing optimum p and then letting N -> infty ... = 1/(2e) = .18 Even worse !

Slotted ALOHA Assumptions all frames same size time is divided into equal size slots, time to transmit 1 frame nodes start to transmit frames only at beginning of slots nodes are synchronized if 2 or more nodes transmit in slot, all nodes detect collision Operation when node obtains fresh frame, it transmits in next slot no collision, node can send new frame in next slot if collision, node retransmits frame in each subsequent slot with prob. p until success

Slotted ALOHA C – collision E – empty S - successful single active node can continuously transmit at full rate of channel highly decentralized: only slots in nodes need to be in sync simple collisions, wasting slots idle slots (even with data) nodes may be able to detect collision in less than time to transmit packet clock synchronization

Slotted Aloha efficiency Efficiency is the long-run fraction of successful slots when there are many nodes, each with many frames to send For max efficiency with N nodes, find p* that maximizes Np(1-p)N-1 For many nodes, take limit of Np*(1-p*)N-1 as N goes to infinity, gives 1/e = .37 Suppose N nodes with many frames to send, each transmits in slot with probability p prob that node 1 has success in a slot = p(1-p)N-1 prob that an arbitrary node has a success = Np(1-p)N-1 At best: channel used for useful transmissions 37% of time!

Throughput versus offered traffic for ALOHA systems.

CSMA (Carrier Sense Multiple Access) CSMA: listen before transmit: If channel sensed idle: may transmit entire frame If channel sensed busy, defer transmission Human analogy: don’t interrupt others!

Nonpersistent CSMA Station wishing to transmit listens and obeys following: If medium is idle, transmit; otherwise, go to 2 If medium is busy, wait amount of time drawn from probability distribution (retransmission delay) and repeat 1 Consequences: Random delays reduces probability of collisions Consider two stations become ready to transmit at same time While another transmission is in progress If both stations delay same time before retrying, both will attempt to transmit at same time Capacity is wasted because medium will remain idle following end of transmission Even if one or more stations waiting

1-persistent CSMA Station wishing to transmit listens and obeys following:  If medium idle, transmit; otherwise, go to step 2 If medium busy, listen until idle; then transmit immediately Consequences: avoid idle channel time 1-persistent stations selfish If two or more stations waiting, collision guaranteed Gets sorted out after collision

P-persistent CSMA Station wishing to transmit listens and obeys following:  If medium idle, transmit with probability p, and delay one time unit with probability (1 – p) If medium busy, listen until idle and repeat step 1 If transmission is delayed one time unit, repeat step 1 Consequences: Compromise that attempts to reduce collisions Like nonpersistent And reduce idle time Like 1-persistent What is an effective value of p? depend on load

Persistent and Nonpersistent CSMA

Persistent and Nonpersistent CSMA Comparison of the channel utilization versus load for various random access protocols.

Collision-Free Protocols The basic bit-map protocol. Contention period, consists N slots Station j want to transmit frame, insert a 1 bit into slot j Each station has complete knowledge after listen contention period Transmit frame in numerical order Never has collisions Overhead is 1 bit per station

Collision-Free Protocols (2) The binary countdown protocol Station want to transmit, broadcasts its address as a binary string, starting with the highest bit Bits in each address position from different stations are Boolean ORed together The result address is the winner of the bidding, it may now transmit a frame Higher address has a higher priority (good or bad)

Limited-contention protocols Adaptive tree walk protocol

Wavelength Division Multiple Access Protocols

Wireless LAN Protocols (a) Hidden station problem (b) Exposed station problem

MACA protocol (Multiple Access with Collision Avoidance ) (a) A sending a RTS (Request to Send) to B. (b) B responding with a CTS (Clear to Send) to A.

Wireless LAN Protocols Multiple Access with Collision Avoidance (MACA) The sender stimulate the receiver into outputting a short frame, so stations nearby can detect this transmission and avoid transmitting for the duration of the upcoming data frame Multiple Access with Collision Avoidance for Wireless (MACAW) Introduce ACK to enable retransmit Add carrier sense to avoid conflict with RTS Run backoff algorithm for each pair, instead of each station Exchange congestion info between neighbors

Summary of MAC protocols What do you do with a shared media? Channel Partitioning, by time, frequency or code Time Division, Frequency Division Random partitioning (dynamic), ALOHA, S-ALOHA CSMA carrier sensing: easy in some technologies (wire), hard in others (wireless) CSMA/CD used in Ethernet Collision-free and limited contention protocols WDMA MACA, MACAW – wireless CSMA/CA used in 802.11

Reading Assignment Chapter 5.3 and 5.5 Chapter 6.3