CS3502: Data and Computer Networks Local Area Networks - 1 introduction and early broadcast protocols.

Slides:



Advertisements
Similar presentations
14-MAC Sub-layer Dr. John P. Abraham Professor UTPA.
Advertisements

Data and Computer Communications Eighth Edition by William Stallings Lecture slides by Lawrie Brown Chapter 16 – High Speed LANs.
Channel Allocation Protocols. Dynamic Channel Allocation Parameters Station Model. –N independent stations, each acting as a Poisson Process for the purpose.
The ALOHA Protocol “Free for all”: whenever station has a frame to send, it does so. –Station listens for maximum RTT for an ACK. –If no ACK after a specified.
EECC694 - Shaaban #1 lec #5 Spring Data Link In Broadcast Networks: The Media Access Sublayer Broadcast networks with multi-access (or random.
Fundamentals of Computer Networks ECE 478/578
Multiple access What if multiple machines are sharing the same link?
LECTURE 11 CT1303 LAN. DYNAMIC MAC PROTOCOL No fixed assignment for transmission media or any network resources.. It allows transmission when needed.
Communication Networks Lecture 5 NETW 501-L5: NETW 501-L5: Medium Access Control Dr.-Ing. Khaled Shawky Hassan Room: C3-222, ext: 1204,
LANs Local Area Networks via the Media Access Control (MAC) Sub Layer LANs Local Area Networks via the Media Access Control (MAC) Sub Layer Advanced Advanced.
1 K. Salah Module 4.2: Media Access Control The Media Access Control (MAC) sublayer –Random Access (CSMA), IEEE –Token Passing, IEEE Ch 13-
MAC Protocols Media Access Control (who gets the use the channel) zContention-based yALOHA and Slotted ALOHA. yCSMA. yCSMA/CD. TDM and FDM are inefficient.
CS 5253 Workshop 1 MAC Protocol and Traffic Model.
CMPE 150- Introduction to Computer Networks 1 CMPE 150 Fall 2005 Lecture 17 Introduction to Computer Networks.
Copyright © 2003, Dr. Dharma P. Agrawal and Dr. Qing-An Zeng. All rights reserved. 1 Chapter 6 Multiple Radio Access.
CMPE 150- Introduction to Computer Networks 1 CMPE 150 Fall 2005 Lecture 16 Introduction to Computer Networks.
EEC-484/584 Computer Networks Lecture 9 Wenbing Zhao (Part of the slides are based on materials supplied by Dr. Louise Moser at UCSB and.
Studying Local Area Networks Via Media Access Control (MAC) SubLayer
CS 5253 Workshop 1 MAC Protocol and Traffic Model.
Networks: Local Area Networks1 LANs Studying Local Area Networks Via Media Access Control (MAC) SubLayer.
Computer Networks: Local Area Networks 1 LANs Studying Local Area Networks via the Media Access Control (MAC) SubLayer.
Semester EEE449 Computer Networks The Data Link Layer Part 2: Media Access Control En. Mohd Nazri Mahmud MPhil (Cambridge, UK) BEng (Essex,
Medium Access Control Sublayer
Chap 4 Multiaccess Communication (Part 1)
1 ECE453 – Introduction to Computer Networks Lecture 7 – Multiple Access Control (I)
Multiple Access Protocols Chapter 6 of Hiroshi Harada Book
CIS 725 Media Access Layer. Medium Access Control Sublayer MAC sublayer resides between physical and data link layer Broadcast/multiacess channels N independent.
1 Computer Communication & Networks Lecture 12 Datalink Layer: Multiple Access Waleed Ejaz
Chi-Cheng Lin, Winona State University CS412 Introduction to Computer Networking & Telecommunication Medium Access Control Sublayer.
Chapter 4: Medium Access Control (MAC) Sublayer
CHAPTER 4: THE MEDIUM ACCESS SUBLAYER 4.1: The Channel Allocation Problem 4.2: Multiple Access Protocols.
LECTURE9 NET301. DYNAMIC MAC PROTOCOL: CONTENTION PROTOCOL Carrier Sense Multiple Access (CSMA): A protocol in which a node verifies the absence of other.
© Janice Regan, CMPT 128, CMPT 371 Data Communications and Networking LANs 2: MAC protocols.
جلسه دهم شبکه های کامپیوتری به نــــــــــــام خدا.
Medium Access Control NWEN302 Computer Network Design.
Layer 2 Technologies At layer 2 we create and transmit frames over communications channels Format of frames and layer 2 transmission protocols are dependent.
The Medium Access Control Sublayer Chapter 4. The Channel Allocation Problem Static Channel Allocation Dynamic Channel Allocation  Delay for the divided.
Data and Computer Communications Ninth Edition by William Stallings Data and Computer Communications, Ninth Edition by William Stallings, (c) Pearson Education.
Chi-Cheng Lin, Winona State University CS 313 Introduction to Computer Networking & Telecommunication Medium Access Control Sublayer.
جلسه یازدهم شبکه های کامپیوتری به نــــــــــــام خدا.
4: DataLink Layer1 Multiple Access Links and Protocols Three types of “links”: r point-to-point (single wire, e.g. PPP, SLIP) r broadcast (shared wire.
Medium Access Control Sub Layer
7-1 Introduction to Queueing Theory l Components of a queueing system n probability density function (pdf) of interarrival times n pdf of service times.
Chapter 6 Multiple Radio Access
LANs : Aloha/CSMA , summary
CS3502: Data and Computer Networks Local Area Networks - 1 introduction and early broadcast protocols.
LANs Local Area Networks via the Media Access Control (MAC) Sub Layer LANs Local Area Networks via the Media Access Control (MAC) Sub Layer Advanced Computer.
Ch 12. Multiple Access. Multiple Access for Shared Link Dedicated link – Point-to-point connection is sufficient Shared link – Link is not dedicated –
LECTURE9 NET301 11/5/2015Lect 9 NET DYNAMIC MAC PROTOCOL: CONTENTION PROTOCOL Carrier Sense Multiple Access (CSMA): A protocol in which a node verifies.
EE 122: Lecture 6 Ion Stoica September 13, 2001 (* this talk is based in part on the on-line slides of J. Kurose & K. Rose)
1 Ethernet CSE 3213 Fall February Introduction Rapid changes in technology designs Broader use of LANs New schemes for high-speed LANs High-speed.
Advanced Computer Networks C13
Chapter 4 The Medum Access Sublayer. MA Sublayer Additional Reference –Local and Metropolitan Area Networks, William Stallings, Prentice Hall, 2000, 6th.
THE MEDIUM ACCESS CONTROL SUBLAYER 4.1 THE CHANNEL ALLOCATION PROBLEM 4.2 MULTIPLE ACCESS PROTOCOLS.
COMPUTER NETWORKS Data-link Layer (The Medium Access Control Sublayer) MAC Sublayer.
Multiple Access By, B. R. Chandavarkar, CSE Dept., NITK, Surathkal Ref: B. A. Forouzan, 5 th Edition.
CS 5253 Workshop 1 MAC Protocol and Traffic Model.
Example DLL Protocols 1. High-Level Data Link Control (HDLC).
Data Link Layer Lower Layers Local Area Network Standards
CT301 LECTURE 8.
Net301 lecture9 11/5/2015 Lect 9 NET301.
Services of DLL Framing Link access Reliable delivery
THE IEEE MAC SUB-LAYER – chapter 14
The Medium Access Control Sublayer
Channel Allocation Problem/Multiple Access Protocols Group 3
Link Layer and LANs Not everyone is meant to make a difference. But for me, the choice to lead an ordinary life is no longer an option 5: DataLink Layer.
Channel Allocation Problem/Multiple Access Protocols Group 3
CSE 313 Data Communication
Chapter 6 Multiple Radio Access.
Dr. John P. Abraham Professor UTPA
Presentation transcript:

CS3502: Data and Computer Networks Local Area Networks - 1 introduction and early broadcast protocols

CS3502, LANs. Objectives 1. describe LAN topologies/transmission media 2. describe MAC protocols -> in detail 3. compare/contrast different LANs 4. verify basic LAN protocols 5. describe and compare LAN throughputs 6. describe and analyze bridges/LAN switches 7. describe basic router function, differentiate from bridge.

local area networks : general info u limited geographical area u relatively high transmission rates u simple topologies and routing u mostly baseband -- single channel u usually owned by 1 organization u characterized by topology, medium, and MAC protocol

LANs : classes, topologies u broadcast (contention); bus or wireless u Aloha, CSMA, CSMA/CD (802.3) *, u wireless LANs (802.11) u broadcast (controlled) u bit map protocol, token bus u ring u token ring *, FDDI (token), slotted rings u star u ATM LAN

local area networks : broadcast u all nodes connected by ONE channel u if more than 1 node transmits simultaneously, signals interfere (collision): the message is lost u thus, the transmission medium is always in 1 out of 3 possible states: (1) (2) (3) u example: classroom? channels

LANs : ALOHA (pure) u radio frequencies OR any broadcast medium u U of Hawaii, early 1970s. Prof.. N. Abramson, funded by ARPA. u simplest possible protocol u a station with a message simply transmits it to completion. If no collision, message gets through, otherwise wait random time and retransmit.

LANs : ALOHA (pure) u works for when transmissions are rare; but quickly degenerates as load increases u performance analysis, based on assumed Poisson distribution, shows max throughput of 18%. (following slides) u throughput (aka utilization ) is the fraction of time that the network is transmitting data. u load, or offered load, is the amount of traffic attempting to get through the network

LANs : Aloha performance analysis u based on several assumptions: 1. offered load is infinite number of users. 2. total offered load (transmission attempts) follows a Poisson distribution. 3. fixed packet size Def: Let X be a random variable, representing a nonnegative integer. X is a poisson random variable if p(i) = P[X=i] = (e -  i )/i!

LANs : Aloha performance analysis u note: Poisson distribution (discrete RVs) and exponential distribution (continuous RVs) are closely related.  the mean, or “average” of the poisson dist. is  E [ X ]   lso note -- P[ X =0] = p(0) = e -, and P[ X =1] = p(1) = e -  ( come from plugging 0, 1 into the formula)

LANs : Aloha performance analysis Let S represent the throughput (utilization), and G the offered load. Then, S = G x P[successful transmission] = G x P[no other transmissions] = G x P[X=0] = G x e -2G, pure Aloha Q : what is the maximum throughput? (take the derivative, set to 0, plug back in)

LANs : performance analysis derivative : ( G x e -2G ) ’ = (1)(e -2G ) + G(e -2G )(-2) setting to 0, e -2G - 2G e -2G = 0 => 1 - 2G = 0 => G = 0.5 I.e., throughput is max at G = 0.5. Plugging this into the original formula, S = G x e -2G yields a max value of 0.18.

LANs : ALOHA (slotted) u how can ALOHA be improved? u need to reduce collisions u slotted ALOHA : restrict transmissions to time slots u divide time into “slots” u station waits until next time slot to transmit u slots must be synchronized, somehow u how much will throughput improve?

LANs: ALOHA u when should station retransmit after a collision? u show why throughput should double with slotted Aloha over pure Aloha u what is the worst-case time a station will have to wait until getting a successful transmission? u how can Aloha be improved? u hint: what if we could use 2 power levels?

LANs : ALOHA, 2 power levels u idea: when station transmits, flip a coin. Heads, use low power level. Tails, used high power level. u high power clobbers lower power; if same power, collision as before. u can be added to either pure or slotted. Improves max throughput to 26% (pure) or 52% (slotted) under same Poisson assumptions.

LANs : ALOHA summary u simple communications (simple is good ) u relatively cheap, simple to implement u good for sparse, intermittent communication. u not a good LAN protocol because of u poor utilization u potentially infinite delay u stations have listening capability, but don’t fully utilize it

LANs: CSMA u corrects the obvious flaw in Aloha (blindly transmitting without first checking the medium) u CSMA(carrier sense multiple access) protocol: (1) sense the carrier; {LISTEN} if no signal detected then transmit message to end; {TALK} if collision occurred, then wait random time, go to (1) else END. else {carrier is busy} go to (1).

LANs: CSMA u basic CSMA is “persistent,” or “1-persistent” -- it transmits as soon as it detects the open carrier. u suppose another station is transmitting; when will the station start to transmit? u what effect does propagation delay have on this protocol? u note that whenever transmission occurs, the whole message is sent: no way to abort

LANs: CSMA u what are 2 ways that collisions can occur in CSMA? What is their likelihood? u Will CSMA improve throughput over Aloha? u specify CSMA formally as a Comm.Finite State Machine, then analyze it.

LANs : CSMA, p-persistent u variation of CSMA; generalization for parameter p : real, in (0,1], --- (1) sense the carrier; if no signal detected then transmit message to end with probability p ; else { probability 1- p} wait random time, goto (1); if collision occurred, then wait random time, go to (1) else END; else {carrier busy} go to (1).

LANs : CSMA u exercise: alter the CSMA specification (CFSM) to handle p-persistence u throughput: will this improve throughput? u for low values of p, maximum throughput is highest; what about user friendliness? u nonpersistent CSMA: when carrier is busy, wait a random time. Rewrite the specification for this change.

LANs : CSMA u when collisions occur, how much time is wasted? u what is approximate likelihood of repeating the collision, with u CSMA, 1-persistent u CSMA, 0.1 persistent u CSMA, nonpersistent u How can time wasted be reduced?