Network Technologies essentials Week 3: Retransmission, sharing links, switching Compilation made by Tim Moors, UNSW Australia Original slides by David.

Slides:



Advertisements
Similar presentations
Network Technologies essentials Week 2: Physical layer & direct links Compilation made by Tim Moors, UNSW Australia Original slides by David Wetherall,
Advertisements

Medium Access Control Sublayer Chapter 4 CN5E by Tanenbaum & Wetherall, © Pearson Education-Prentice Hall and D. Wetherall, 2011 Channel Allocation Problem.
Ethernet “dominant” LAN technology: cheap $20 for 100Mbs!
The ALOHA Protocol “Free for all”: whenever station has a frame to send, it does so. –Station listens for maximum RTT for an ACK. –If no ACK after a specified.
Both RTS and CTS contains: The address of the sender The address of the receiver The sizeof the intended data short message size contention concentrated.
1 Shared Access Networks Outline Bus (Ethernet) Token ring (FDDI) Wireless (802.11)
MAC Protocols Media Access Control (who gets the use the channel) zContention-based yALOHA and Slotted ALOHA. yCSMA. yCSMA/CD. TDM and FDM are inefficient.
CMPE 150- Introduction to Computer Networks 1 CMPE 150 Fall 2005 Lecture 17 Introduction to Computer Networks.
Spring 2002CS 4611 Shared Access Networks Outline Bus (Ethernet) Token ring (FDDI) Wireless (802.11)
CSC 450/550 Part 3: The Medium Access Control Sublayer.
20 – Collision Avoidance, : Wireless and Mobile Networks6-1.
EE 122: Ethernet and Ion Stoica September 18, 2002 (* this talk is based in part on the on-line slides of J. Kurose & K. Rose)
CMPE 150- Introduction to Computer Networks 1 CMPE 150 Fall 2005 Lecture 16 Introduction to Computer Networks.
EEC-484/584 Computer Networks Lecture 13 Wenbing Zhao
1 Elements of a wireless network network infrastructure wireless hosts r laptop, PDA, IP phone r run applications r may be stationary (non- mobile) or.
5-1 Data Link Layer r Today, we will study the data link layer… r This is the last layer in the network protocol stack we will study in this class…
EEC-484/584 Computer Networks Lecture 14 Wenbing Zhao
Spanning Tree and Wireless EE122 Discussion 10/28/2011.
Computer Science & Engineering Introduction to Computer Networks Overview of the Link Layer.
Chapter 2 Multiple Access Protocols Professor Rick Han University of Colorado at Boulder
5-1 Data Link Layer r Wireless Networks m Wi-Fi (Wireless LAN) Example Problems m RTS/CTS.
5-1 Data Link Layer r What is Data Link Layer? r Wireless Networks m Wi-Fi (Wireless LAN) r Comparison with Ethernet.
Cs/ee 143 Communication Networks Chapter 3 Ethernet Text: Walrand & Parakh, 2010 Steven Low CMS, EE, Caltech.
Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011 The Medium Access Control Sublayer Chapter.
CSE 461 University of Washington1 Topic How do nodes share a single link? Who sends when, e.g., in WiFI? – Explore with a simple model Assume no-one is.
6: Wireless and Mobile Networks6-1 Elements of a wireless network network infrastructure wireless hosts r laptop, PDA, IP phone r run applications r may.
1 Token Passing: IEEE802.5 standard  4 Mbps  maximum token holding time: 10 ms, limiting packet length  packet (token, data) format:  SD, ED mark start,
Chapter 5 outline 5.1 Introduction and services
Wi-Fi Wireless LANs Dr. Adil Yousif. What is a Wireless LAN  A wireless local area network(LAN) is a flexible data communications system implemented.
ICOM 6115©Manuel Rodriguez-Martinez ICOM 6115 – Computer Networks and the WWW Manuel Rodriguez-Martinez, Ph.D. Lecture 17.
Network Technologies essentials Week 4: Internetworking Compilation made by Tim Moors, UNSW Australia Original slides by David Wetherall, University of.
1 ECE453 – Introduction to Computer Networks Lecture 7 – Multiple Access Control (I)
Introduction1-1 Data Communications and Computer Networks Chapter 5 CS 3830 Lecture 27 Omar Meqdadi Department of Computer Science and Software Engineering.
Wireless Medium Access. Multi-transmitter Interference Problem  Similar to multi-path or noise  Two transmitting stations will constructively/destructively.
Network Technologies essentials Week 8: TCP congestion control Compilation made by Tim Moors, UNSW Australia Original slides by David Wetherall, University.
1 Computer Communication & Networks Lecture 13 Datalink Layer: Local Area Network Waleed Ejaz
Computer Networks NYUS FCSIT Spring 2008 Igor TRAJKOVSKI, Ph.D. Associate Professor
CSMA with Collision Detection CSMA/CD can be in one of three states: contention, transmission, or idle.
جلسه دهم شبکه های کامپیوتری به نــــــــــــام خدا.
CSE 461 University of Washington1 Topic How do nodes share a single link? Who sends when, e.g., in WiFI? – Explore with a simple model Assume no-one is.
Token Passing: IEEE802.5 standard  4 Mbps  maximum token holding time: 10 ms, limiting packet length  packet (token, data) format:  SD, ED mark start,
The Medium Access Control Sublayer Chapter 4. The Channel Allocation Problem Static Channel Allocation Dynamic Channel Allocation  Delay for the divided.
Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011 The Medium Access Control Sublayer Chapter.
Network Technologies essentials Week 5: Routing Compilation made by Tim Moors, UNSW Australia Original slides by David Wetherall, University of Washington.
Networks and Protocols CE Week 2b. Topologies, CSMA/CD, CSMA/CA.
Wireless and Mobility The term wireless is normally used to refer to any type of electrical or electronic operation which is accomplished without the use.
CSE 461 University of Washington1 Where we are in the Course Finishing off the Link Layer! – Builds on the physical layer to transfer frames over connected.
CSE 461 University of Washington1 Topic How do we connect nodes with a switch instead of multiple access – Uses multiple links/wires – Basis of modern.
Lecture Topics: 11/27 Networks Layered Model Ethernet IP.
5: DataLink Layer 5a-1 Multiple Access protocol. 5: DataLink Layer 5a-2 Multiple Access Links and Protocols Three types of “links”: r point-to-point (single.
Data Link Layer. Useful References r Wireless Communications and Networks by William Stallings r Computer Networks (third edition) by Andrew Tanenbaum.
Background of Ad hoc Wireless Networks Student Presentations Wireless Communication Technology and Research Ad hoc Routing and Mobile IP and Mobility Wireless.
CSE 461: Multiple Access Networks. This Lecture  Key Focus: How do multiple parties share a wire?  This is the Medium Access Control (MAC) portion of.
Review. Layers Physical layer – sending bits from one place to another, ensuring an okay BER Data link layer – encapsulate information bits into frames,
LECTURE9 NET301 11/5/2015Lect 9 NET DYNAMIC MAC PROTOCOL: CONTENTION PROTOCOL Carrier Sense Multiple Access (CSMA): A protocol in which a node verifies.
CSE 461 University of Washington1 Topic How do nodes share a single link? Who sends when, e.g., in WiFI? – Explore with a simple model Assume no-one is.
EE 122: Lecture 6 Ion Stoica September 13, 2001 (* this talk is based in part on the on-line slides of J. Kurose & K. Rose)
MAC Layer Protocols for Wireless Networks. What is MAC? MAC stands for Media Access Control. A MAC layer protocol is the protocol that controls access.
Carrier Sense Multiple Access Improve ALOHA by using carrier sense –Stations listen to the carrier before transmitting –If channel is busy, the station.
1 Chapter 4 MAC Layer – Wireless LAN Jonathan C.L. Liu, Ph.D. Department of Computer, Information Science and Engineering (CISE), University of Florida.
Distributed Systems 7. Medium Access Control Sublayer Simon Razniewski Faculty of Computer Science Free University of Bozen-Bolzano A.Y. 2015/2016.
The Medium Access Control Sublayer
Distributed Systems 6. Medium Access Control Sublayer Simon Razniewski Faculty of Computer Science Free University of Bozen-Bolzano A.Y. 2014/2015.
THE MEDIUM ACCESS CONTROL SUBLAYER 4.1 THE CHANNEL ALLOCATION PROBLEM 4.2 MULTIPLE ACCESS PROTOCOLS.
Link Layer 5.1 Introduction and services
The Data Link Layer Chapter
Topic Multiplexing is the network word for the sharing of a resource
CS 457 – Lecture 6 Ethernet Spring 2012.
Distributed Systems 6. Medium Access Control Sublayer
Presentation transcript:

Network Technologies essentials Week 3: Retransmission, sharing links, switching Compilation made by Tim Moors, UNSW Australia Original slides by David Wetherall, University of Washington ISBN-10: © 2014 For the book A. Tanenbaum and D. Wetherall: Computer Networks, 5 th ed, Prentice-Hall, 2011A. Tanenbaum and D. Wetherall: Computer Networks, 5 th ed, Prentice-Hall, 2011 Tim added green graffiti

Computer Networks2 Duplicates (2) What happens if an ACK is lost? Frame ACK X Frame ACK Timeout SenderReceiver New Frame? New Frame?? 3b-2.11 Coursera 3-2 Retransmission

Computer Networks3 Sequence Numbers Frames and ACKs must both carry sequence numbers for correctness To distinguish the current frame from the next one, a single bit (two numbers) is sufficient – Called Stop-and-Wait 3b-2.14 Coursera 3-2

Computer Networks4 Limitation of Stop-and-Wait It allows only a single frame to be outstanding from the sender: – Good for LAN, not efficient for high BD Ex: R=1 Mbps, D = 50 ms – How many frames/sec? If R=10 Mbps? 3b-2.21 Coursera 3-2

Computer Networks5 TDM versus FDM (2) In TDM a user sends at a high rate a fraction of the time; in FDM, a user sends at a low rate all the time Rate Time FDM TDM 3b-3.6 Coursera 3-3

Computer Networks6 Circuit & packet switching See Youtube video; no single slide captures it Circuits (e.g. TDM/FDM): Static turn-taking for resource – Predictable => guarantees – Inflexible => inefficient for bursty traffic Packets: Statistical: Take a turn when needed – Others can use resource when not needed => efficient – Unpredictable => Header info identifies source/destination Harder to guarantee service Might experience congestion => delay/loss TELE3118 Network Technologies

Computer Networks7 ALOHA Protocol Simple idea: – Node just sends when it has traffic. – If there was a collision (no ACK received) then wait a random time and resend That’s it! 3b-4.5 Coursera 3-4

Computer Networks8 Classic Ethernet ALOHA inspired Bob Metcalfe to invent Ethernet for LANs in 1973 – Nodes share 10 Mbps coaxial cable – Hugely popular in 1980s, 1990s : © 2009 IEEE 3b-4.8 Coursera 3-4

Computer Networks9 CSMA/CD (with Collision Detection) Can reduce the cost of collisions by detecting them and aborting (Jam) the rest of the frame time – Again, we can do this with wires X X X X Jam! 3b-4.12 Coursera 3-4

Computer Networks10 Binary Exponential Backoff (BEB) Cleverly estimates the probability – 1st collision, wait 0 or 1 frame times – 2nd collision, wait from 0 to 3 times – 3rd collision, wait from 0 to 7 times … BEB doubles interval for each successive collision – Quickly gets large enough to work – Very efficient in practice 3b-4.18 Coursera 3-4

Hidden Terminals Nodes A and C are hidden terminals when sending to B – Can’t hear each other (to coordinate) yet collide at B – We want to avoid the inefficiency of collisions Computer Networks11 3b-5.5 Coursera 3-5

Possible Solution: MACA MACA uses a short handshake instead of CSMA (Karn, 1990) – uses a refinement of MACA (later) Protocol rules: 1.A sender node transmits a RTS (Request-To-Send, with frame length) 2.The receiver replies with a CTS (Clear-To-Send, with frame length) 3.Sender transmits the frame while nodes hearing the CTS stay silent – Collisions on the RTS/CTS are still possible, but less likely Computer Networks12 3b-5.8 Coursera 3-5

CSMA/CA for Multiple Access Sender avoids collisions by inserting small random gaps – E.g., when both B and C send, C picks a smaller gap, goes first Computer Networks13 Time Send? 3b-5.20 Coursera 3-5 part of

Switch Forwarding Switch needs to find the right output port for the destination address in the Ethernet frame. How? – Want to let hosts be moved around readily; don’t look at IP Computer Networks14... Source Destination Ethernet Frame 3b-7.11 Coursera 3-7

Computer Networks15 Backward Learning Switch forwards frames with a port/address table as follows: 1.To fill the table, it looks at the source address of input frames 2.To forward, it sends to the port, or else broadcasts to all ports 3b-7.12 Coursera 3-7

Spanning Tree (3) Computer Networks16 TopologyOne STAnother ST Root 3b-8.8 Coursera 3-8

Spanning Tree Algorithm (3) Details: – Each switch initially believes it is the root of the tree – Each switch sends periodic updates to neighbors with: Its address, address of the root, and distance (in hops) to root – Switches favors ports with shorter distances to lowest root Uses lowest address as a tie for distances Computer Networks17 C Hi, I’m C, the root is A, it’s 2 hops away or (C, A, 2) 3b-8.12 Coursera 3-8

END © 2013 D. Wetherall Slide material from: TANENBAUM, ANDREW S.; WETHERALL, DAVID J., COMPUTER NETWORKS, 5th Edition, © Electronically reproduced by permission of Pearson Education, Inc., Upper Saddle River, New Jersey Computer Networks18