CS3502: Data and Computer Networks Local Area Networks - 1 introduction and early broadcast protocols.

Slides:



Advertisements
Similar presentations
14-MAC Sub-layer Dr. John P. Abraham Professor UTPA.
Advertisements

Data and Computer Communications Eighth Edition by William Stallings Lecture slides by Lawrie Brown Chapter 16 – High Speed LANs.
Channel Allocation Protocols. Dynamic Channel Allocation Parameters Station Model. –N independent stations, each acting as a Poisson Process for the purpose.
The ALOHA Protocol “Free for all”: whenever station has a frame to send, it does so. –Station listens for maximum RTT for an ACK. –If no ACK after a specified.
EECC694 - Shaaban #1 lec #5 Spring Data Link In Broadcast Networks: The Media Access Sublayer Broadcast networks with multi-access (or random.
Fundamentals of Computer Networks ECE 478/578
Multiple access What if multiple machines are sharing the same link?
LECTURE 11 CT1303 LAN. DYNAMIC MAC PROTOCOL No fixed assignment for transmission media or any network resources.. It allows transmission when needed.
Communication Networks Lecture 5 NETW 501-L5: NETW 501-L5: Medium Access Control Dr.-Ing. Khaled Shawky Hassan Room: C3-222, ext: 1204,
1 K. Salah Module 4.2: Media Access Control The Media Access Control (MAC) sublayer –Random Access (CSMA), IEEE –Token Passing, IEEE Ch 13-
MAC Protocols Media Access Control (who gets the use the channel) zContention-based yALOHA and Slotted ALOHA. yCSMA. yCSMA/CD. TDM and FDM are inefficient.
CS 5253 Workshop 1 MAC Protocol and Traffic Model.
CMPE 150- Introduction to Computer Networks 1 CMPE 150 Fall 2005 Lecture 17 Introduction to Computer Networks.
Copyright © 2003, Dr. Dharma P. Agrawal and Dr. Qing-An Zeng. All rights reserved. 1 Chapter 6 Multiple Radio Access.
EE 4272Spring, 2003 Chapter 14 LAN Systems Ethernet (CSMA/CD)  ALOHA  Slotted ALOHA  CSMA  CSMA/CD Token Ring /FDDI Fiber Channel  Fiber Channel Protocol.
CMPE 150- Introduction to Computer Networks 1 CMPE 150 Fall 2005 Lecture 16 Introduction to Computer Networks.
EEC-484/584 Computer Networks Lecture 13 Wenbing Zhao
EEC-484/584 Computer Networks Lecture 9 Wenbing Zhao (Part of the slides are based on materials supplied by Dr. Louise Moser at UCSB and.
Studying Local Area Networks Via Media Access Control (MAC) SubLayer
CS 5253 Workshop 1 MAC Protocol and Traffic Model.
Networks: Local Area Networks1 LANs Studying Local Area Networks Via Media Access Control (MAC) SubLayer.
Computer Networks: Local Area Networks 1 LANs Studying Local Area Networks via the Media Access Control (MAC) SubLayer.
Semester EEE449 Computer Networks The Data Link Layer Part 2: Media Access Control En. Mohd Nazri Mahmud MPhil (Cambridge, UK) BEng (Essex,
Medium Access Control Sublayer
Lecture 16 Random Access protocols r A node transmits at random at full channel data rate R. r If two or more nodes “collide”, they retransmit at random.
Chap 4 Multiaccess Communication (Part 1)
1 ECE453 – Introduction to Computer Networks Lecture 7 – Multiple Access Control (I)
Multiple Access Protocols Chapter 6 of Hiroshi Harada Book
CIS 725 Media Access Layer. Medium Access Control Sublayer MAC sublayer resides between physical and data link layer Broadcast/multiacess channels N independent.
1 Computer Communication & Networks Lecture 12 Datalink Layer: Multiple Access Waleed Ejaz
Chi-Cheng Lin, Winona State University CS412 Introduction to Computer Networking & Telecommunication Medium Access Control Sublayer.
Chapter 4: Medium Access Control (MAC) Sublayer
CHAPTER 4: THE MEDIUM ACCESS SUBLAYER 4.1: The Channel Allocation Problem 4.2: Multiple Access Protocols.
LECTURE9 NET301. DYNAMIC MAC PROTOCOL: CONTENTION PROTOCOL Carrier Sense Multiple Access (CSMA): A protocol in which a node verifies the absence of other.
© Janice Regan, CMPT 128, CMPT 371 Data Communications and Networking LANs 2: MAC protocols.
جلسه دهم شبکه های کامپیوتری به نــــــــــــام خدا.
Medium Access Control NWEN302 Computer Network Design.
Layer 2 Technologies At layer 2 we create and transmit frames over communications channels Format of frames and layer 2 transmission protocols are dependent.
Data and Computer Communications Ninth Edition by William Stallings Data and Computer Communications, Ninth Edition by William Stallings, (c) Pearson Education.
Chi-Cheng Lin, Winona State University CS 313 Introduction to Computer Networking & Telecommunication Medium Access Control Sublayer.
جلسه یازدهم شبکه های کامپیوتری به نــــــــــــام خدا.
4: DataLink Layer1 Multiple Access Links and Protocols Three types of “links”: r point-to-point (single wire, e.g. PPP, SLIP) r broadcast (shared wire.
Medium Access Control Sub Layer
7-1 Introduction to Queueing Theory l Components of a queueing system n probability density function (pdf) of interarrival times n pdf of service times.
Chapter 6 Multiple Radio Access
LANs : Aloha/CSMA , summary
Ch 12. Multiple Access. Multiple Access for Shared Link Dedicated link – Point-to-point connection is sufficient Shared link – Link is not dedicated –
CS3502: Data and Computer Networks Local Area Networks - 1 introduction and early broadcast protocols.
LECTURE9 NET301 11/5/2015Lect 9 NET DYNAMIC MAC PROTOCOL: CONTENTION PROTOCOL Carrier Sense Multiple Access (CSMA): A protocol in which a node verifies.
EE 122: Lecture 6 Ion Stoica September 13, 2001 (* this talk is based in part on the on-line slides of J. Kurose & K. Rose)
Chapter 4 The Medum Access Sublayer. MA Sublayer Additional Reference –Local and Metropolitan Area Networks, William Stallings, Prentice Hall, 2000, 6th.
THE MEDIUM ACCESS CONTROL SUBLAYER 4.1 THE CHANNEL ALLOCATION PROBLEM 4.2 MULTIPLE ACCESS PROTOCOLS.
UNIT 2 Medium Access sub layer: Medium Access sub layer - Channel Allocations, LAN protocols - ALOHA protocols(PURE AND SLOTTED ALOHA),CSMA/CA,CSMA/CD.
COMPUTER NETWORKS Data-link Layer (The Medium Access Control Sublayer) MAC Sublayer.
Multiple Access By, B. R. Chandavarkar, CSE Dept., NITK, Surathkal Ref: B. A. Forouzan, 5 th Edition.
CS 5253 Workshop 1 MAC Protocol and Traffic Model.
Example DLL Protocols 1. High-Level Data Link Control (HDLC).
Week3 The Medium Access Sublayer
Introduction to Queueing Theory
CT301 LECTURE 8.
Services of DLL Framing Link access Reliable delivery
THE IEEE MAC SUB-LAYER – chapter 14
The Medium Access Control Sublayer
Channel Allocation Problem/Multiple Access Protocols Group 3
Link Layer and LANs Not everyone is meant to make a difference. But for me, the choice to lead an ordinary life is no longer an option 5: DataLink Layer.
Channel Allocation Problem/Multiple Access Protocols Group 3
CSE 313 Data Communication
Chapter 6 Multiple Radio Access.
Dr. John P. Abraham Professor UTPA
Satellite Packet Communications A UNIT -V Satellite Packet Communications.
Presentation transcript:

CS3502: Data and Computer Networks Local Area Networks - 1 introduction and early broadcast protocols

CS3502, LANs. Objectives 1. describe LAN topologies/transmission media 2. describe MAC protocols -> in detail 3. compare/contrast different LANs 4. verify basic LAN protocols 5. describe and compare LAN throughputs 6. describe and analyze bridges/LAN switches 7. describe basic router function, differentiate from bridge.

local area networks : general info u limited geographical area u relatively high transmission rates u simple topologies and routing u mostly baseband -- single channel u usually owned by 1 organization u characterized by topology, medium, and MAC protocol

LANs : classes, topologies u broadcast (contention); bus or wireless u Aloha, CSMA, CSMA/CD (802.3) *, u wireless LANs (802.11) u broadcast (controlled) u bit map protocol, token bus u ring u token ring *, FDDI (token), slotted rings u star u ATM LAN

local area networks : broadcast u all nodes connected by ONE channel u if more than 1 node transmits simultaneously, signals interfere (collision): the message is lost u thus, the transmission medium is always in 1 out of 3 possible states: (1) (2) (3) u example: classroom? channels

LANs : ALOHA (pure) u radio frequencies OR any broadcast medium u U of Hawaii, early 1970s. Prof.. N. Abramson, funded by ARPA. u simplest possible protocol u a station with a message simply transmits it to completion. If no collision, message gets through, otherwise wait random time and retransmit.

LANs : ALOHA (pure) u works for when transmissions are rare; but quickly degenerates as load increases u performance analysis, based on assumed Poisson distribution, shows max utilization of 18%. (following slides). u User Load- the amount of traffic attempting to get through the channel u Throughput - amount of traffic getting through the channel u Utilization - is the fraction of time that the channel is transmitting data (throughput/max throughput)

LANs : Aloha performance analysis u based on several assumptions: 1. Transmission attempts are generated by an infinite number of users. 2. transmission attempts follows a Poisson distribution. 3. fixed packet size Def: Let X be a random variable, representing a nonnegative integer. X is a poisson random variable if p(i) = P[X=i] = (e -  i )/i!

LANs : Aloha performance analysis u note: Poisson distribution (discrete RVs) and exponential distribution (continuous RVs) are closely related.  the mean, or “average” of the poisson dist. is  E [ X ]   lso note -- P[ X =0] = p(0) = e -, and P[ X =1] = p(1) = e -  ( come from plugging 0, 1 into the formula)

LANs : Aloha performance analysis Let S = number of successful packet transmissions per packet time (equals channel utilization) G = average number of attempted transmissions per packet time(user load+retransmissions).Then, S = P[successful transmission] = P[1 attempt] P[no other attempts] = P[X=1] P[X=0] = G x e -2G, pure Aloha Q : what is the maximum utilization? (take the derivative, set to 0, plug back in)

LANs : performance analysis derivative : ( G x e -2G ) ’ = (1)(e -2G ) + G(e -2G )(-2) setting to 0, e -2G - 2G e -2G = 0 => 1 - 2G = 0 => G = 0.5 I.e., utilization is max at G = 0.5. Plugging this into the original formula, S = G x e -2G yields a max value of 0.18.

LANs : ALOHA (slotted) u how can ALOHA be improved? u need to reduce collisions u slotted ALOHA : restrict transmissions to time slots u divide time into “slots” u station waits until next time slot to transmit u slots must be synchronized, somehow u how much will utilization improve?

LANs: ALOHA u when should station retransmit after a collision? u show why throughput should double with slotted Aloha over pure Aloha u what is the worst-case time a station will have to wait until getting a successful transmission? u how can Aloha be improved? u hint: what if we could use 2 power levels?

LANs : ALOHA, 2 power levels u idea: when station transmits, flip a coin. Heads, use low power level. Tails, used high power level. u high power clobbers lower power; if same power, collision as before. u can be added to either pure or slotted. Improves max throughput to 26% (pure) or 52% (slotted) under same Poisson assumptions.

LANs : ALOHA summary u simple communications (simple is good ) u relatively cheap, simple to implement u good for sparse, intermittent communication. u not a good LAN protocol because of u poor utilization u potentially infinite delay u stations have listening capability, but don’t fully utilize it

LANs: CSMA u corrects the obvious flaw in Aloha (blindly transmitting without first checking the medium) u CSMA(carrier sense multiple access) protocol: (1) sense the carrier; {LISTEN} if no signal detected then transmit message to end; {TALK} if collision occurred, then wait random time, go to (1) else END. else {carrier is busy} go to (1).

LANs: CSMA u basic CSMA is “persistent,” or “1-persistent” -- it transmits as soon as it detects the open carrier. u suppose another station is transmitting; when will the station start to transmit? u what effect does propagation delay have on this protocol? u note that whenever transmission occurs, the whole message is sent: no way to abort

LANs: CSMA u what are 2 ways that collisions can occur in CSMA? What is their likelihood? u Will CSMA improve throughput over Aloha? u nonpersistent CSMA: when carrier is busy, wait a random time. u Will this improve utilization?

LANs : CSMA, p-persistent u variation of CSMA; generalization for parameter p : real, in (0,1], --- (1) sense the carrier; if no signal detected then transmit message to end with probability p ; else { probability 1- p} wait random time, goto (1); if collision occurred, then wait random time, go to (1) else END; else {carrier busy} go to (1).

LANs : CSMA u will this improve utilization? u for low values of p, maximum utilization is highest; what about user friendliness? u Since even if the channel is free one defers transmission with p=> 0 the average wait time => 

LANs : Aloha/CSMA, summary u Compare approximate utilization of the protocols pure Aloha u slotted Aloha u 1-persistent CSMA u p-persistent CSMA u nonpersistent CSMA u Compare the throughput as a function of user Load