Computer Networks Chapter 4: Medium Access Control (MAC)

Size: px
Start display at page:

Download "Computer Networks Chapter 4: Medium Access Control (MAC)"

Transcription

1 Computer Networks Chapter 4: Medium Access Control (MAC) Holger Karl Computer Networks Group Universität Paderborn

2 Goals of this chapter The medium access problem and main options for solutions Understand performance problems of fixed multiplexing schemes Important performance metrics Options for MAC protocols: sending, receiving, listening, synchronizing; environment in which they work Classification & examples of MAC protocols, performance aspects An important example: Ethernet WS 09/10, v 2.0 Computer Networks - Medium Access Control 2

3 Outline Static multiplexing Dynamic channel allocation Collision-based protocols Contention-free protocols Limited contention protocols Case study: Ethernet WS 09/10, v 2.0 Computer Networks - Medium Access Control 3

4 Static multiplexing Given a single resource, it can be statically multiplexed Assigning fixed time slots to multiple communication pairs Assigning fixed frequency bands Assigning fixed resources to different sources is fine if Data rate of source and multiplexed link are matched Sources can always saturate the link WS 09/10, v 2.0 Computer Networks - Medium Access Control 4

5 Bursty traffic What happens if sources have bursty traffic? Definition: Large difference between peak and average rate In computer networks: Peak : average = 1000 : 1 quite common Source data rate Mean rate Time WS 09/10, v 2.0 Computer Networks - Medium Access Control 5

6 Static multiplexing & bursty traffic Statically multiplexed resources must either: Source data rate Be large enough to cope with the peak data rate immediately! Big waste, since on average the link/channel will not be utilized Required rate Mean rate Time Be dimensioned for average rate, but then need a buffer! What is the delay until a packet is transmitted? New packets Packets Queues MUX WS 09/10, v 2.0 Computer Networks - Medium Access Control 6

7 Statically multiplexed bursty traffic delay Compare the delay resulting from static multiplexing Base case: No multiplexing, a single traffic source with average rate ρ (bits/s), link capacity C bits/s Delay is T (In case you really want to know: T = 1/(µ C-λ), ρ=λ/µ) Multiplexed case: Split the single source in N sources with same total rate, statically multiplex over the same link (e.g., FDM) Delay T FDM = NT Irrespective of FDM, TDM, - essentially, a queuing theory result! Hence: static multiplexing increases N-fold the delay of a packet Intuition: Because some channels are idle sometimes WS 09/10, v 2.0 Computer Networks - Medium Access Control 7

8 Outline Static multiplexing Dynamic channel allocation Collision-based protocols Contention-free protocols Limited contention protocols Case study: Ethernet WS 09/10, v 2.0 Computer Networks - Medium Access Control 8

9 Dynamic channel allocation MAC Because of the bad delay properties caused by idle subchannels static multiplexing is not appropriate for bursty traffic sources Telephony is not bursty, computer networks are bursty Alternative: Assign channel/link/resource to that source that currently has data to send Dynamic medium allocation Instead of fixed assignments of parts of a shared resource Terminology: Access to the transmission has to be organized a medium access control protocol (MAC) is required WS 09/10, v 2.0 Computer Networks - Medium Access Control 9

10 Assumptions for dynamic channel allocation Station model (or terminal model) N independent stations want to share a given resource One possible load model: probability of generating a packet in interval Δ t is λ Δ t, λ = const Single channel assumption Only a single channel for all stations No possibility to communicate/signal anything via other means Collision assumption Only a single frame can be successfully transmitted at a time Two (or more) frames overlapping in time will collide and are both destroyed No station can receive either frame Note: there are sometimes exceptions to this rule Packet arrivals Time WS 09/10, v 2.0 Computer Networks - Medium Access Control 10

11 Assumptions for dynamic channel allocation Time model Continuous time: Transmissions can begin at any time; no central clock Slotted time: Time is divided in slots; transmissions can only start at a slot boundary. Slot can be idle, a successful transmission, or a collision Carrier Sensing Stations can/cannot detect whether the channel is currently used by some other station There might be imperfections involved in this detection (e.g., incorrectly missing an ongoing detection) Time Time? WS 09/10, v 2.0 Computer Networks - Medium Access Control 11

12 Figures of merit How to judge the efficiency of a dynamic channel allocation system? Intuition: transmit as many packets as quickly as possible At high load (many transmission attempts per unit time): Throughput is crucial ensure that many packets get through At low load (few attempts per time): Delay is crucial ensure that a packet does not have to wait for a long time Fairness: Is every station treated equally? Or justifiable inequality? WS 09/10, v 2.0 Computer Networks - Medium Access Control 12

13 Throughput and offered load Offered load G: The number of packets per unit packet time that the protocol is asked to handle More than one packet per packet time equals overload Ideal protocol: Throughput S equals offered load G as long as G<1 Throughput S = 1 as soon as G>1 S 1 1 G And: have constant small delay, for an arbitrary number of terminals Not very realistic hope! WS 09/10, v 2.0 Computer Networks - Medium Access Control 13

14 Principal options for MAC protocols Main distinction: Does the protocol allow collisions to occur? As a deliberately taken risk, not as an effect of an error If yes: for every type of packet, or only in some restricted form? MAC protocols Collision protocols Contention-free protocols Limited contention protocols Terminology: Systems where collisions can occur are often called contention systems WS 09/10, v 2.0 Computer Networks - Medium Access Control 14

15 Outline Static multiplexing Dynamic channel allocation Collision-based protocols Contention-free protocols Limited contention protocols Case study: Ethernet WS 09/10, v 2.0 Computer Networks - Medium Access Control 15

16 ALOHA The simplest possible medium access protocol: Just talk when you feel like it Formally: Whenever a packet should be transmitted, it is transmitted immediately Introduced in 1985 by Abrahmson et al., University of Hawaii Goal: Use of satellite networks Packets are transmitted at arbitrary times WS 09/10, v 2.0 Computer Networks - Medium Access Control 16

17 ALOHA Analysis ALOHA advantages Trivially simple No coordination between participants necessary ALOHA disadvantages Collisions can and will occur sender does not check channel state Sender has no (immediate) means of learning about the success of its transmission link layer mechanisms (ACKs) are needed ACKs can collide as well WS 09/10, v 2.0 Computer Networks - Medium Access Control 17

18 ALOHA Performance Assume a Poisson arrival process to describe packet transmissions Infinite number of stations, all behave identically, independently Time between two attempts is exponentially distributed, independent for any pairs of events All packets are of unit time length Let G be the mean number of transmission attempts per unit time Then: For a packet transmission to be successful, it must not collide with any other packet How likely is such a collision? Question: How long is a packet vulnerable by other transmissions? WS 09/10, v 2.0 Computer Networks - Medium Access Control 18

19 ALOHA Performance A packet X is destroyed by another packet either Starting up to one packet time before X Starting up to immediately before the end of X Hence: Packet is successful if there is no additional transmission in two packet times Throughput S(G) = G probability P 0 of a packet not colliding Probability: P 0 = P (0 transmission in two packet times by other nodes) = e -2G Throughput S (G) = G P 0 = Ge -2G Optimal for G = 0.5! S = 1/(2e) ¼ Infinitely many! WS 09/10, v 2.0 Computer Networks - Medium Access Control 19

20 A slight improvement: Slotted ALOHA ALOHA s problem: Long vulnerability period of a packet Reduce it by introducing time slots transmissions may only start at the start of a slot Slot synchronization is assumed to be somehow available Result: Vulnerability period is halved, throughput is doubled S(G) = Ge -G Optimal at G=1, S=1/e Detailed analysis: Exercise! Hint: think of Binomial distribution, look at n terminals before looking at n! 1 WS 09/10, v 2.0 Computer Networks - Medium Access Control 20

21 Performance dependence on offered load For (slotted) ALOHA, closed form analysis of throughput S as function of G is simple S 1 1 G Ideal! Anything but a high-performance protocol In particular: throughput collapses as load increases! WS 09/10, v 2.0 Computer Networks - Medium Access Control 21

22 Carrier sensing (Slotted) ALOHA is simple, but not satisfactory Be a bit more polite: Listen before talk Sense the carrier to check whether it is idle before transmitting Carrier Sense Multiple Access (CSMA) Abstain from transmitting if carrier not idle (some other sender is currently transmitting) Crucial question: How to behave in detail when carrier is busy? In particular: WHEN to retry a transmission? WS 09/10, v 2.0 Computer Networks - Medium Access Control 22

23 1-persistent CSMA When carrier is busy, wait until it is idle Then, immediately transmit Persistent waiting Obvious problem: if more than one station wants to transmit, they are guaranteed to collide! Just too impatient But certainly better than pure ALOHA or slotted ALOHA Still open question: What to do when packets collide? Some form of retransmission required, after some random time WS 09/10, v 2.0 Computer Networks - Medium Access Control 23

24 Non-persistent CSMA When channel is idle, transmit When channel is busy, wait a random time before checking again whether the channel is idle Do not continuously monitor carrier to greedily grab it once it is idle Conscious attempt to be less greedy Typically formulated in a continuous time model Performance depends a bit on the random waiting time Main influence is mean value; distribution not very important Mean value has to be large enough compared to packet time, propagation delay But in general better throughput than persistent CSMA for higher loads At low loads, long random waiting is not necessary and wasteful WS 09/10, v 2.0 Computer Networks - Medium Access Control 24

25 p-persistent CSMA Combines ideas from persistent and non-persistent CSMA Uses a slotted time model When channel is idle, send When channel is busy, continuously monitor it until it becomes idle But then, do not always transmit immediately But flip a coin transmit with probability p With probability 1-p, do not send and wait for the next slot If channel is busy in the next slot, monitor for idleness Else, flip a coin again WS 09/10, v 2.0 Computer Networks - Medium Access Control 25

26 CSMA and propagation delay Any CSMA scheme suffers from a principal complication: The propagation delay d Suppose two stations become ready to send at time t and t+ε At t, the channel is completely idle The stations are separated by a propagation delay d > ε Second station cannot detect the already started transmission of first station Will sense an idle channel, send, and collide (at each other, or at a third station) t T gen d A Idle! Idle! B t+ε T gen WS 09/10, v 2.0 Computer Networks - Medium Access Control 26

27 Performance of CSMA WS 09/10, v 2.0 Computer Networks - Medium Access Control 27

28 Performance of CSMA II L. Kleinrock and F. A. Tobagi, Packet Switching in Radio Channels: Part I Carrier Sense Multiple Access Modes and Their Throughput-Delay WS 09/10, Characteristics, v 2.0 IEEE Trans. Computer On Comm., Networks vol. - Com-23, Medium no. Access 12, Dec. Control

29 Performance of nonpersistent CSMA analytic derivation Nonpersistent CSMA protocol A terminal with a packet to send senses an idle channel: transmit A terminal with a packet to send senses a busy channel: reschedule the packet to some random later transmission time Average mean retransmission delay is X* At this later time, repeat the process Traffic model where do packets come from? All packets are of constant length with T seconds for transmission Infinite population of users generates new packets according to a Poisson process with aggregate rate packets/s Hence: S = T is average number of new packets generated per transmission time Additionally, packets are retransmitted! Total transmission attempts G per transmission time T (G S) WS 09/10, v 2.0 Computer Networks - Medium Access Control 29

30 Performance of nonpersistent CSMA traffic model For a tractable traffic model, two further assumptions are necessary Assumption 1: Average retransmission delay X* is large compared to T Assumption 2: Interarrival times of all packet start times (including retransmissions!) are independent and exponentially distributed THIS IS WRONG! but not too a large degree, and makes analysis much simpler Assumption 1 is necessary to make this an acceptable approximation I.e.: all packet transmissions form a Poisson process of rate G! WS 09/10, v 2.0 Computer Networks - Medium Access Control 30

31 Performance of nonpersistent CSMA parameters Summary of parameters S: rate of new packets injected G: traffic offered to the channel (new packets plus retransmissions) It is the rate of the Poisson traffic according to assumption 2 S/G: probability of a successful transmission G/S: average number of transmissions for a given packet T: packet transmission time on the channel For convenience: Let s set T=1 X*: average retransmission delay Precise distribution does not matter, must be large compared to T : (maximum) propagation delay of the channel Normalize this to packet duration: a = / T (for convenience) Goal: What is relation of S and G? WS 09/10, v 2.0 Computer Networks - Medium Access Control 31

32 Performance of nonpersistent CSMA idle and busy periods Observation: nonpersistent CSMA alternates between idle and busy Busy periods start with transmission of a packet at some time t by some terminal on an idle channel Additional transmissions can only start within time t+a At t+a, start of first packet has propagated to all other terminals and prevents them from transmitting (carrier sense rule) Say, at t+y the last packet starts in this busy period Channel is sensed as idle after t+y+1+a Packet duration and propagation delay to all stations t t + Y a a Time 1 End of busy period: t+y+1+a WS 09/10, v 2.0 Computer Networks - Medium Access Control 32

33 Performance of nonpersistent CSMA average busy period What is the average length of a busy period? Randomness comes from the point Y of the last packet starting transmission in the busy period These arrivals of packet transmission were assumed to form a Poisson process of rate G Distribution function of random variable Y: Expected value of Y:! Average busy period: a WS 09/10, v 2.0 Computer Networks - Medium Access Control 33

34 Performance of nonpersistent CSMA average idle period Probability that idle period I is at least c long (0 terminals transmit during c): Average value E[I] = 1/G! On average, a busy/idle cycle lasts: WS 09/10, v 2.0 Computer Networks - Medium Access Control 34

35 Performance of nonpersistent CSMA successful packets Number U of correct packets per busy/idle cycle: Expected number of successful packets per busy/idle cyle then simply: WS 09/10, v 2.0 Computer Networks - Medium Access Control 35

36 Performance of nonpersistent CSMA throughput Putting it together Throughput S is expected number of successful packets / expected duration for transmission cylce Hence: WS 09/10, v 2.0 Computer Networks - Medium Access Control 36

37 Collision detection CSMA/CD When two packets collide, lots of time is wasted by completing their transmission If it were possible to detect a collision when it happens, transmission could be aborted and a new attempt made Wasted time reduced, no need to wait for (destroyed) packets to complete Depending on physical layer, collisions can be detected! Necessary: Sender must be able to listen to the medium when sending, compare what it sends with what it receives If different: declare a collision! CSMA/CD Carrier Sense Multiple Access/Collision Detection A t Idle! Collision Abort! B Idle! t+ε Collision Abort! WS 09/10, v 2.0 Computer Networks - Medium Access Control 37

38 What to do after a collision happens? Stations do want to transmit their packets, despite detecting a collision Have to try again Immediately? Would again ensure another collision Coordinate somehow? Difficult, no communication medium available Wait a random time! Randomization de-synchronizes medium access, reduces collisions However: will result in some idle time, occasionally! Alternation between contention and transmission phases Not necessarily slotted time! WS 09/10, v 2.0 Computer Networks - Medium Access Control 38

39 How to choose random waiting time? Simplest approach to choose a random waiting time: Pick any one of k slots Assumes a slotted time model for simplicity Uniformly distributed from [0,, k-1] the contention window Question: How to choose upper bound k? Small k: Short delay, but high risk of repeated collisions Large k: Low risk of collisions (as stations access attempts are spread over a large time interval), but needlessly high delay if few stations want to access the channel With large contention window, collisions become less likely! Let k adapt to the current number of stations/traffic load WS 09/10, v 2.0 Computer Networks - Medium Access Control 39

40 How to adapt k to traffic load? One option: somehow explicitly find out number of stations, compute an optimal k, signal that to all stations Difficult, high overhead, An implicit approach possible? What is the consequence of a small k when load is high? Collisions! Hence: Use a collision as an indication that the contention window is too small increase it! Will reduce probability of collisions, automatically adapt to higher load Question: How to increase k after collision, how to decrease it again? WS 09/10, v 2.0 Computer Networks - Medium Access Control 40

41 How to adapt k Binary exponential backoff Increase after collisions: Many possibilities Commonly used: Double the contention window size k But only up to a certain limit, say, 1024 slots start out with k=2 This is called binary exponential backoff Decreasing k: Also many options possible E.g., if sufficiently many frames have not collided reduce k (subtract a constant, cut in half, ) Complicated, might waste resources by not being agile enough, Or play it simple: Just start every time at k=2! Common option WS 09/10, v 2.0 Computer Networks - Medium Access Control 41

42 Performance analysis: 1-Persistent CSMA/CD Assumptions Time is slotted Packet duration T slots Backoff window fixed size k slots Propagation delay negligible Channel sensing requires one time slot Collision detection requires one time slot Goal: Derive relevant performance metrics via a Markov chain WS 09/10, v 2.0 Computer Networks - Medium Access Control 42

43 Recall: Discrete time Markov chain with finite state space Definition: Finite state space S = {s 1,, s n } State transition matrix P = [p ij ], 1 I,j n, 0 p ij 1 P is a stochastic matrix, i.e., j=1 n p ij = 1 8 i Interpretation: p ij is the probability to go from state i to state j Markov chain has Markov property Interpretation: the probability which state to choose next only depends on the current state, not on any previous state Formally, with X k random variable for the kth state: Strictly speaking, this is a first-order Markov chain WS 09/10, v 2.0 Computer Networks - Medium Access Control 43

44 Recall: Probability vector Each X k has a finite probability density, written as probability vector µ k µ k is a simple shorthand: µ k (i) = P(X k = s i ) With µ 0 initial distribution, µ k = µ 0 P k If µ = lim k!1 µ k exists, it is the steady-state probability distribution of the Markov chain Under reasonable assumptions, it exists and is independent of initial distribution Possible to show: µ is any row of lim k!1 P k Hence: to know steady state, we only need to know lim k!1 P k And then pick any arbitrary row WS 09/10, v 2.0 Computer Networks - Medium Access Control 44

45 Example Markov chain Consider simple three-state Markov chain 0.2 Initial state: s 1 State transition matrix 0.8 s 1 s s Probability distribution after one step: µ 1 = µ 0 P = [ ] Probability distribution after two steps: µ 2 = µ 1 P = µ 0 P 2 = [ ] Probability distribution after three steps: µ 2 = µ 2 P = µ 0 P 3 = [ ] WS 09/10, v 2.0 Computer Networks - Medium Access Control 45

46 Example Markov chain (II) Probability distribution in steady state: µ = µ 0 lim k!1 P k Use Eigenvalue decomposition of P to compute lim k!1 P k : Hence: WS 09/10, v 2.0 Computer Networks - Medium Access Control 46 µ!

47 Backoff Markov model state description State of one terminal: With previous parameters: k+1+t states for each terminal State of system: Product of individual terminal states E.g., two terminals: (i 1, i 2 ) Initial state: E.g., (0,, 0) WS 09/10, v 2.0 Computer Networks - Medium Access Control 47

48 Backoff Markov model state transitions (I) Note: This is only done for two terminals here generalization is simple (yet a bit tedious) Both terminals idle: (0, 0)! (T, T) Collision With probability 1 After collision, both terminals backoff: (T,T)! (-i 1, -i 2 ) i 1, i 2 chosen at random, independently, uniformly from U(1,k) Hence, each possible backoff state is entered with probability 1/k 2 Only place of randomness! WS 09/10, v 2.0 Computer Networks - Medium Access Control 48

49 Backoff Markov model state transitions (II) In backoff state, count-down happens until one terminal reaches 0 (i 1, i 2 )! (i 1 + 1, i 2 + 1) if i 1, i 2 < 0 Once one terminal has reached 0 and the other is still in backoff, terminal will start to transmit (0, i 2 )! (T, i 2 +1) if i 2 < 0 (i 1, 0)! (i 1 +1, T) if i 1 < 0 If both terminals reach (0,0): see above! WS 09/10, v 2.0 Computer Networks - Medium Access Control 49

50 Backoff Markov model state transitions (III) Terminal transmitting, the other still in backoff: (i 1, i 2 )! (i 1-1, i 2 +1) if i 1 > 0, i 2 < 0 (i 1, i 2 )! (i 1 +1, i 2-1) if i 1 < 0, i 2 > 0 Terminal transmitting, the other checks channel: (i 1, 0)! (i 1-1, 0) if i 1 > 0 (0, i 2 )! (0, i 2-1) if i 2 > 0 Other states not reached! WS 09/10, v 2.0 Computer Networks - Medium Access Control 50

51 State transitions Overview T 1 senses channel, T 2 transmits i 2 -k,t -1,T 0,T T,T T 1 backoff, T 2 transmits 0,1 Collision T 1 transmits, T 2 senses channel -k,0 T 1 backoff, T 2 senses channel -1,0 0,0 1,0 T,0 -k,-k Both in backoff 0,-1 T 1 senses channel, T 1 backoff 0,-k T 1 transmits, T 2 backoff T,-1 T,-k i 1 WS 09/10, v 2.0 Computer Networks - Medium Access Control 51

52 State transition matrix Previous rules give the state transitions We have (k+1+t) states per terminal, i.e., (k+1+t) 2 system states for two terminals State transition matrix maps each state to possible followup state for the next time slot! ((k+1+t) 2 ) 2 entries! For n terminals: ((k+1+t) n ) 2 entries Technicality: Markov models written via a state matrix With linear index for states; we have pair of numbers for state Convention here: Map state (i 1, i 2 ) to state index (i 1 + (k+1) -1) (k+t+1) + (i 2 + (k+1)) Rewrite all the above state transition rules with this transformation WS 09/10, v 2.0 Computer Networks - Medium Access Control 52

53 State transition matrix To : From : From index To index ( ) State transition matrix P WS 09/10, v 2.0 Computer Networks - Medium Access Control 53

54 Obtain steady state distributions Look at P k for k! 1 We only do this numerically, analytically it is possible but a bit of work All rows converge to steady state vector Here: a bit cumbersome to interpret this vector; need to translate it back into a state matrix to understand it WS 09/10, v 2.0 Computer Networks - Medium Access Control 54

55 Deriving performance metrics Collision probability: Steady state probability of state (T,T) Probability of a timeslot where a transmission completes successfully: Sum of steady state probabilities of states (1,0) and (0, 1) Average number of time slots between transmission completions: 1 / success probability Throughput: T / average number of time slots between transmission completions WS 09/10, v 2.0 Computer Networks - Medium Access Control 55

56 Performance results WS 09/10, v 2.0 Computer Networks - Medium Access Control 56

57 Performance results WS 09/10, v 2.0 Computer Networks - Medium Access Control 57

58 Outline Static multiplexing Dynamic channel allocation Collision-based protocols Contention-free protocols Limited contention protocols Case study: Ethernet WS 09/10, v 2.0 Computer Networks - Medium Access Control 58

59 Contention-free protocols Since collisions cause problems, how about using protocols without contention for the medium? Simplest example: Static TDMA Each station/terminal is assigned a fixed time slot in a periodic schedule Station 1 Station 2 Station 3 Station 1 Station 2. But disadvantages of static multiplexing are clear Time Are there dynamic, contention-free protocols? WS 09/10, v 2.0 Computer Networks - Medium Access Control 59

60 Bit-map protocol Problem of static TDMA: When a station has nothing to send, its time slot is idling and wastes resources Possible to only have time slots assigned to stations that have data to transmit? Needs some information exchange which station is ready to send They should reserve resources/time slots! Bit-map protocol Short reservation slots, only used to announce desire to transmit Must be received by every station WS 09/10, v 2.0 Computer Networks - Medium Access Control 60

61 Bit-map protocol properties Behavior at low load If there is (hardly) any packet, the medium will repeat the (empty) contention slots A station that wants to transmit has to wait its turn before it can do so! Relatively high delay Behavior at high load At high load, medium is dominated by data packets (which are long compared to contention slots) Overhead is negligible! Good and stable throughput Note: Bit-map is a carrier-sense protocol! WS 09/10, v 2.0 Computer Networks - Medium Access Control 61

62 Outline Static multiplexing Dynamic channel allocation Collision-based protocols Contention-free protocols Limited contention protocols Case study: Ethernet WS 09/10, v 2.0 Computer Networks - Medium Access Control 62

63 Best of both worlds? Desirable: Protocol with Low delay at low load like a contention protocol High throughput at high load like a contention-free protocol Hybrid or adaptive solution?! Limited-contention protocols do exist One possible idea: adapt number of stations per contention slot Contention slots are nice for throughput, but at low load, we cannot afford to wait a long time for every station s slot Several stations have to share a slot, dynamically WS 09/10, v 2.0 Computer Networks - Medium Access Control 63

64 Adaptive tree walk Idea: Use several levels of resolution for the contention slots Inspired by levels in a tree At highest level, all nodes share a single slot If only one node from this group claims the contention slot, it may transmit If more than one, collision in contention slot! double slots, half the stations assigned to the slot And recurse WS 09/10, v 2.0 Computer Networks - Medium Access Control 64

65 Outline Static multiplexing Dynamic channel allocation Collision-based protocols Contention-free protocols Limited contention protocols Case study: Ethernet WS 09/10, v 2.0 Computer Networks - Medium Access Control 65

66 A case study: Ethernet A practical example, dealing (mostly) with MAC: Ethernet Standardized by IEEE as standard Part of the 802 family of standards dealing with MAC protocols Also contains PHY and DLC specifications Issues Cabling Physical layer MAC sublayer Switched Ethernet Fast & gigabit Ethernet WS 09/10, v 2.0 Computer Networks - Medium Access Control 66

67 Ethernet design The original Ethernet design document: Robert Metcalfe, 1973 See also: WS 09/10, v 2.0 Computer Networks - Medium Access Control 67

68 Ethernet cabling Yellow cable Simple electrical connection 10Base5 10Base2 10BaseT WS 09/10, v 2.0 Computer Networks - Medium Access Control 68

69 Ethernet physical layer Details depend on medium Common: Manchester encoding At +/ V (typically) to ensure DC freeness With option for signal violations Used to demarcate frames WS 09/10, v 2.0 Computer Networks - Medium Access Control 69

70 Ethernet MAC sublayer Essentially: CSMA/CD with binary exponential backoff Frame format: For clock synchronization at receiver Each byte: MAC layer addresses Necessary for minimum frame length WS 09/10, v 2.0 Computer Networks - Medium Access Control 70

71 Switched Ethernet With conventional 10Base5/10Base2 Ethernet, all stations attached to a single cable form a collision domain Packets from all these stations might potentially collide Big collision domains stress the CSMA/CD mechanism, reducing performance How to reduce collision domains but still maintain connectivity of local stations? Use smaller collision domains! To ensure connectivity, put a switch in Recall: A hub is electrically connected, thus a single collision domain Separate collision domains WS 09/10, v 2.0 Computer Networks - Medium Access Control 71

72 An Ethernet switch Unlike a hub, not a simple electrical connection for a starwired topology How to exchange packets between different collision domains? Switch contains buffers to intermediately store incoming packets before forwarding them towards their destination Different buffer structures possible: one per incoming link, one per group of links, Switch (example) Cost issue, mainly Hub Collision domain Backbone Collision domain Collision domain WS 09/10, v 2.0 Computer Networks - Medium Access Control 72

73 Fast Ethernet Normal (even switched) Ethernet only achieves 10 MBit/ s 1992: Build a faster Ethernet! Goals: Backward compatible, stick with the old protocol to avoid hidden traps, get job done quickly Result: 802.3u aka Fast Ethernet Fast Ethernet Keep almost everything the same (frame format, protocol rules) Reduce bit time from 100 ns to 10 ns Consequences for maximum length of a wiring segment, minimum packet sizes? (Recall unavoidable collisions in CSMA!) WS 09/10, v 2.0 Computer Networks - Medium Access Control 73

74 Fast Ethernet Cabling Standard category 3 twisted pairs (telephony cables) cannot support 200 MBaud over 100 m cable length Solution: use 2 pairs of wires in this case, reduce baud rate Also, Fast Ethernet/cat 5 cabling does not use Manchester, but 4B/5B WS 09/10, v 2.0 Computer Networks - Medium Access Control 74

75 Gigabit Ethernet Ok: can we go another factor of 10 faster? 1995 gigabit Ethernet Goal: again, keep basic scheme as it is Works, but price to pay: No more multi-drop configurations as in classic Ethernet In gigabit Ethernet, each wire has exactly two machines attached to it Terminal and/or switch/hub WS 09/10, v 2.0 Computer Networks - Medium Access Control 75

76 Gigabit Ethernet With a switch No shared collision domains! no collision! no need for CSMA/ CD Allows full-duplex operation of each link With a hub Collisions, half duplex, CSMA/CD Maximum cable distance is reduced to 25 m Actually: not very sensible combination from a cost/performance perspective WS 09/10, v 2.0 Computer Networks - Medium Access Control 76

77 Gigabit Ethernet Cabling WS 09/10, v 2.0 Computer Networks - Medium Access Control 77

78 1000BASE-T Topology Four pairs, each at 250 MBps WS 09/10, v 2.0 Computer Networks - Medium Access Control 78

79 And how does traffic on an Ethernet look like? How many packets are there, per time unit, transmitted over a typical Ethernet? Assumptions: Many sources connected to a single Ethernet Sources independently generate traffic (=try to transmit a packet) Intuition: Average number of transmitted packets might be bursty over short time windows The longer the considered time window, the smoother the number of transmissions should become, right? WS 09/10, v 2.0 Computer Networks - Medium Access Control 79

80 Measurements: Picture from Ethernet traces: Look at the paper W. E. Leland, M. Taqqu, W. Willinger, D. V. Wilson, "On the Self-Similar Nature of Ethernet Traffic," Proc. SIGCOM93, 1993, San Francisco, California, pp leland93selfsimilar.ht ml Hence: too bursty to be easily smoothed! WS 09/10, v 2.0 Computer Networks - Medium Access Control 80

81 Conclusion MAC protocols are a crucial ingredient, pivotal for good performance Static multiplexing just won t do for bursty traffic Main categories: Collision, collision-free, limited contention Main figures of merit: Throughput, delay, fairness There hardly is a best solution Important case study: Ethernet Main lesson to be learned: Keep it simple! WS 09/10, v 2.0 Computer Networks - Medium Access Control 81

Wireless Sensor Networks 7th Lecture

Wireless Sensor Networks 7th Lecture Wireless Sensor Networks 7th Lecture 15.11.2006 Christian Schindelhauer schindel@informatik.uni-freiburg.de 1 Medium Access Control (MAC) Controlling when to send a packet and when to listen for a packet

More information

COS 140: Foundations of Computer Science

COS 140: Foundations of Computer Science COS 140: Foundations of Computer Science ALOHA Network Protocol Family Fall 2017 Homework 2 Introduction 3 Network Protocols.......................................................... 3 Problem.................................................................

More information

Jaringan Komputer. Broadcast Network. Outline. MAC (Medium Access Control) Channel Allocation Problem. Dynamic Channel Allocation

Jaringan Komputer. Broadcast Network. Outline. MAC (Medium Access Control) Channel Allocation Problem. Dynamic Channel Allocation Broadcast Network Jaringan Komputer Medium Access Control Sublayer 2 network categories: point-to-point connections broadcast channels Key issue in broadcast network: how to determine who gets to use the

More information

Chapter 6 Medium Access Control Protocols and Local Area Networks

Chapter 6 Medium Access Control Protocols and Local Area Networks Chapter 6 Medium Access Control Protocols and Local Area Networks Part I: Medium Access Control Part II: Local Area Networks CSE 3213, Winter 2010 Instructor: Foroohar Foroozan Chapter Overview Broadcast

More information

ECEN 5032 Data Networks Medium Access Control Sublayer

ECEN 5032 Data Networks Medium Access Control Sublayer ECEN 5032 Data Networks Medium Access Control Sublayer Peter Mathys mathys@colorado.edu University of Colorado, Boulder c 1996 2005, P. Mathys p.1/35 Overview (Sub)networks can be divided into two categories:

More information

Computer Networks. Medium Access Sublayer (Part I)

Computer Networks. Medium Access Sublayer (Part I) Computer Networks Medium Access Sublayer (Part I) Topics Introduction Multiple Access Protocols Ethernet Wireless LAN Protocols Bridges Misc (brief) High-Speed LANs Satellite Networks Introduction Remember,

More information

COS 140: Foundations of Computer Science

COS 140: Foundations of Computer Science COS 140: Foundations of C S Network Protocol Family Fall 2017 Copyright c 2002 2017 UMaine School of Computing and Information S 1 / 25 Homework Homework Slides, book Chapter 24 on line Homework: All exercises

More information

Multiple Access Protocols

Multiple Access Protocols Multiple Access Protocols Computer Networks Lecture 2 http://goo.gl/pze5o8 Multiple Access to a Shared Channel The medium (or its sub-channel) may be shared by multiple stations (dynamic allocation) just

More information

Chapter 4. The Medium Access Control Sublayer. Points and Questions to Consider. Multiple Access Protocols. The Channel Allocation Problem.

Chapter 4. The Medium Access Control Sublayer. Points and Questions to Consider. Multiple Access Protocols. The Channel Allocation Problem. Dynamic Channel Allocation in LANs and MANs Chapter 4 The Medium Access Control Sublayer 1. Station Model. 2. Single Channel Assumption. 3. Collision Assumption. 4. (a) Continuous Time. (b) Slotted Time.

More information

Random Access. 1. Aloha. 2. Slotted Aloha 3. CSMA 4. CSMA/CD

Random Access. 1. Aloha. 2. Slotted Aloha 3. CSMA 4. CSMA/CD Random Access 1. Aloha 2. Slotted Aloha 3. CSMA 4. CSMA/CD Background Communication medium B No Collision collision A C Modern Local Area Networks (LANs) operate as follows Users are connected to communication

More information

EITF25 Internet Techniques and Applications L4: Network Access. Stefan Höst

EITF25 Internet Techniques and Applications L4: Network Access. Stefan Höst EITF25 Internet Techniques and Applications L4: Network Access Stefan Höst Repetition The link layer protocol should make sure that the data is correctly transmitted over the physical link using error

More information

CS 716: Introduction to communication networks. - 9 th class; 19 th Aug Instructor: Sridhar Iyer IIT Bombay

CS 716: Introduction to communication networks. - 9 th class; 19 th Aug Instructor: Sridhar Iyer IIT Bombay CS 716: Introduction to communication networks - 9 th class; 19 th Aug 2011 Instructor: Sridhar Iyer IIT Bombay Contention-based MAC: ALOHA Users transmit whenever they have data to send Collisions occur,

More information

Chapter 4 (Week 7) The Medium Access Control Sublayer ANDREW S. TANENBAUM COMPUTER NETWORKS FOURTH EDITION PP CN&DC Dr.

Chapter 4 (Week 7) The Medium Access Control Sublayer ANDREW S. TANENBAUM COMPUTER NETWORKS FOURTH EDITION PP CN&DC Dr. Chapter 4 (Week 7) The Medium Access Control Sublayer ANDREW S. TANENBAUM COMPUTER NETWORKS FOURTH EDITION PP. 247-292 1 4.1. THE CHANNEL ALLOCATION PROBLEM 4.2. MULTIPLE ACCESS PROTOCOLS 4.3. ETHERNET

More information

ECE453 Introduction to Computer Networks. Broadcast vs. PPP. Delay. Lecture 7 Multiple Access Control (I)

ECE453 Introduction to Computer Networks. Broadcast vs. PPP. Delay. Lecture 7 Multiple Access Control (I) ECE453 Introduction to Computer Networks Lecture 7 Multiple Access Control (I) 1 Broadcast vs. PPP Broadcast channel = multiaccess channel = random access channel Broadcast LAN Satellite network PPP WAN

More information

Markov Chains and Multiaccess Protocols: An. Introduction

Markov Chains and Multiaccess Protocols: An. Introduction Markov Chains and Multiaccess Protocols: An Introduction Laila Daniel and Krishnan Narayanan April 8, 2012 Outline of the talk Introduction to Markov Chain applications in Communication and Computer Science

More information

Goals. Fundamentals of Network Media. More topics. Topics. Multiple access communication. Multiple access solutions

Goals. Fundamentals of Network Media. More topics. Topics. Multiple access communication. Multiple access solutions Fundamentals of Network Media Local Area Networks Ursula Holmström Goals Learn the basic concepts related to LAN technologies, for example use of shared media medium access control topologies Know the

More information

Medium Access Control Sublayer Chapter 4

Medium Access Control Sublayer Chapter 4 Medium Access Control Sublayer Chapter 4 Channel Allocation Problem Multiple Access Protocols Ethernet Wireless LANs Broadband Wireless Bluetooth RFID Data Link Layer Switching Revised: August 2011 & February

More information

COMPUTER NETWORKS - Local area networks

COMPUTER NETWORKS - Local area networks Local area networks Telecommunication Networks Group firstname.lastname@polito.it http://www.telematica.polito.it/ COMPUTER NETWORKS LANs - 1 Copyright Quest opera è protetta dalla licenza Creative Commons

More information

Local area networks. Copyright

Local area networks. Copyright Local area networks Telecommunication Networks Group firstname.lastname@polito.it http://www.telematica.polito.it/ COMPUTER NETWORKS LANs - 1 Copyright Quest opera è protetta dalla licenza Creative Commons

More information

High Level View. EE 122: Ethernet and Random Access protocols. Medium Access Protocols

High Level View. EE 122: Ethernet and Random Access protocols. Medium Access Protocols High Level View EE 122: Ethernet and 802.11 Ion Stoica September 18, 2002 Goal: share a communication medium among multiple hosts connected to it Problem: arbitrate between connected hosts Solution goals:

More information

Multiple Access (1) Required reading: Garcia 6.1, 6.2.1, CSE 3213, Fall 2010 Instructor: N. Vlajic

Multiple Access (1) Required reading: Garcia 6.1, 6.2.1, CSE 3213, Fall 2010 Instructor: N. Vlajic 1 Multiple Access (1) Required reading: Garcia 6.1, 6.2.1, 6.2.2 CSE 3213, Fall 2010 Instructor: N. Vlajic Multiple Access Communications 2 Broadcast Networks aka multiple access networks multiple sending

More information

LANs. Local Area Networks. via the Media Access Control (MAC) SubLayer. Networks: Local Area Networks

LANs. Local Area Networks. via the Media Access Control (MAC) SubLayer. Networks: Local Area Networks LANs Local Area Networks via the Media Access Control (MAC) SubLayer 1 Local Area Networks Aloha Slotted Aloha CSMA (non-persistent, 1-persistent, p-persistent) CSMA/CD Ethernet Token Ring 2 Network Layer

More information

EE 122: Ethernet and

EE 122: Ethernet and EE 122: Ethernet and 802.11 Ion Stoica September 18, 2002 (* this talk is based in part on the on-line slides of J. Kurose & K. Rose) High Level View Goal: share a communication medium among multiple hosts

More information

CHAPTER 7 MAC LAYER PROTOCOLS. Dr. Bhargavi Goswami Associate Professor & Head Department of Computer Science Garden City College

CHAPTER 7 MAC LAYER PROTOCOLS. Dr. Bhargavi Goswami Associate Professor & Head Department of Computer Science Garden City College CHAPTER 7 MAC LAYER PROTOCOLS Dr. Bhargavi Goswami Associate Professor & Head Department of Computer Science Garden City College MEDIUM ACCESS CONTROL - MAC PROTOCOLS When the two stations transmit data

More information

Contention Protocols and Networks

Contention Protocols and Networks 4/13/2005 314 Lecture Contention Protocols and Networks 1 Contention Protocols and Networks Contention Protocols CSMA/CD Network Topologies Ethernet 4/13/2005 314 Lecture Contention Protocols and Networks

More information

Medium Access Control

Medium Access Control Medium Access Control Mark Handley UCL Computer Science CS 3035/GZ01 Context: OSI Layer 2, S&K Link Layer email WWW phone...! SMTP HTTP RTP...! TCP UDP!! IP!! ethernet PPP! CSMA async sonet...! copper

More information

Protocols for Multiaccess Networks

Protocols for Multiaccess Networks Protocols for Multiaccess Networks Hosts broadcast packets When a collision occurs, all transmitted packets are lost Lost packets have to be retransmitted => Need Multiaccess Protocol Model - Slotted Aloha

More information

Ethernet. Introduction. CSE 3213 Fall 2011

Ethernet. Introduction. CSE 3213 Fall 2011 Ethernet CSE 3213 Fall 2011 19 October 2011 1 Introduction Rapid changes in technology designs Broader use of LANs New schemes for high-speed LANs High-speed LAN technologies: Fast and gigabit Ethernet

More information

Data and Computer Communications

Data and Computer Communications Data and Computer Communications Chapter 16 High Speed LANs Eighth Edition by William Stallings Why High Speed LANs? speed and power of PCs has risen graphics-intensive applications and GUIs see LANs as

More information

CS 43: Computer Networks. 27: Media Access Contd. December 3, 2018

CS 43: Computer Networks. 27: Media Access Contd. December 3, 2018 CS 43: Computer Networks 27: Media Access Contd. December 3, 2018 Last Class The link layer provides lots of functionality: addressing, framing, media access, error checking could be used independently

More information

The Medium Access Control Scheme (MAC Layer) Reference: Andrew S. Tanenbaum, Computer Networks, 3rd Edition, Prentice Hall, 1996.

The Medium Access Control Scheme (MAC Layer) Reference: Andrew S. Tanenbaum, Computer Networks, 3rd Edition, Prentice Hall, 1996. The Medium Access Control Scheme (MAC Layer) Reference: Andrew S. Tanenbaum, Computer Networks, 3rd Edition, Prentice Hall, 1996. 1 Table of Contents Introduction ALOHA Carrier Sense Multiple Sense (CSMA)

More information

Redes de Computadores. Medium Access Control

Redes de Computadores. Medium Access Control Redes de Computadores Medium Access Control Manuel P. Ricardo Faculdade de Engenharia da Universidade do Porto 1 » How to control the access of computers to a communication medium?» What is the ideal Medium

More information

COMP/ELEC 429/556 Introduction to Computer Networks

COMP/ELEC 429/556 Introduction to Computer Networks COMP/ELEC 429/556 Introduction to Computer Networks Broadcast network access control Some slides used with permissions from Edward W. Knightly, T. S. Eugene Ng, Ion Stoica, Hui Zhang T. S. Eugene Ng eugeneng

More information

LANs Local Area Networks LANs provide an efficient network solution : To support a large number of stations Over moderately high speed

LANs Local Area Networks LANs provide an efficient network solution : To support a large number of stations Over moderately high speed Local Area Networks LANs provide an efficient network solution : To support a large number of stations Over moderately high speed With relatively small bit errors Multiaccess Protocols Communication among

More information

Wireless Communications

Wireless Communications 4. Medium Access Control Sublayer DIN/CTC/UEM 2018 Why do we need MAC for? Medium Access Control (MAC) Shared medium instead of point-to-point link MAC sublayer controls access to shared medium Examples:

More information

Link Layer I: ALOHA, Time-, Frequency-, and Code Division. COS 463: Wireless Networks Lecture 4 Kyle Jamieson

Link Layer I: ALOHA, Time-, Frequency-, and Code Division. COS 463: Wireless Networks Lecture 4 Kyle Jamieson Link Layer I: ALOHA, Time-, Frequency-, and Code Division COS 463: Wireless Networks Lecture 4 Kyle Jamieson Review: The Data Link Layer (L2) Enables exchange of atomic messages (frames) between end hosts

More information

2.1 CHANNEL ALLOCATION 2.2 MULTIPLE ACCESS PROTOCOLS Collision Free Protocols 2.3 FDDI 2.4 DATA LINK LAYER DESIGN ISSUES 2.5 FRAMING & STUFFING

2.1 CHANNEL ALLOCATION 2.2 MULTIPLE ACCESS PROTOCOLS Collision Free Protocols 2.3 FDDI 2.4 DATA LINK LAYER DESIGN ISSUES 2.5 FRAMING & STUFFING UNIT-2 2.1 CHANNEL ALLOCATION 2.2 MULTIPLE ACCESS PROTOCOLS 2.2.1 Pure ALOHA 2.2.2 Slotted ALOHA 2.2.3 Carrier Sense Multiple Access 2.2.4 CSMA with Collision Detection 2.2.5 Collision Free Protocols 2.2.5.1

More information

CS 43: Computer Networks Media Access. Kevin Webb Swarthmore College November 30, 2017

CS 43: Computer Networks Media Access. Kevin Webb Swarthmore College November 30, 2017 CS 43: Computer Networks Media Access Kevin Webb Swarthmore College November 30, 2017 Multiple Access Links & Protocols Two classes of links : point-to-point dial-up access link between Ethernet switch,

More information

TSIN01 Information Networks Lecture 3

TSIN01 Information Networks Lecture 3 TSIN01 Information Networks Lecture 3 Danyo Danev Division of Communication Systems Department of Electrical Engineering Linköping University, Sweden September 10 th, 2018 Danyo Danev TSIN01 Information

More information

Chapter 12 Multiple Access 12.1

Chapter 12 Multiple Access 12.1 Chapter 12 Multiple Access 12.1 Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. 12.2 Figure 12.1 Data link layer divided into two functionality-oriented sublayers

More information

Multiple Access. Data Communications and Networking

Multiple Access. Data Communications and Networking Multiple Access In the previous part we discussed data link control, a mechanism which provides a link with reliable communication. In the protocols we described, we assumed that there is an available

More information

Data Link Layer -2- Network Access

Data Link Layer -2- Network Access EITF25 Internet: Technology and Applications Data Link Layer -2- Network Access 2015, Lecture 03 Kaan Bür Previously on EITF25 Logical Link Control Sublayer Flow control Send data Wait for ACK Error control

More information

Local Area Networks (LANs) SMU CSE 5344 /

Local Area Networks (LANs) SMU CSE 5344 / Local Area Networks (LANs) SMU CSE 5344 / 7344 1 LAN/MAN Technology Factors Topology Transmission Medium Medium Access Control Techniques SMU CSE 5344 / 7344 2 Topologies Topology: the shape of a communication

More information

ECE 4450:427/527 - Computer Networks Spring 2017

ECE 4450:427/527 - Computer Networks Spring 2017 ECE 4450:427/527 - Computer Networks Spring 2017 Dr. Nghi Tran Department of Electrical & Computer Engineering Lecture 5.4: Multiple Access Protocols Dr. Nghi Tran (ECE-University of Akron) ECE 4450:427/527

More information

CCM 4300 Lecture 5 Computer Networks, Wireless and Mobile Communications. Dr Shahedur Rahman. Room: T115

CCM 4300 Lecture 5 Computer Networks, Wireless and Mobile Communications. Dr Shahedur Rahman. Room: T115 CCM 4300 Lecture 5 Computer Networks, Wireless and Mobile Communications Dr Shahedur Rahman s.rahman@mdx.ac.uk Room: T115 1 Recap of Last Session Described the physical layer Analogue and Digital signal

More information

The MAC layer in wireless networks

The MAC layer in wireless networks The MAC layer in wireless networks The wireless MAC layer roles Access control to shared channel(s) Natural broadcast of wireless transmission Collision of signal: a /space problem Who transmits when?

More information

COMMUNICATION NETWORKS NETW 501

COMMUNICATION NETWORKS NETW 501 COMMUNICATION NETWORKS NETW 501 TUTORIAL 6 Presented by: Eng. Hana Hesham Eng. Mohamed Atef Data Link Layer Data Link Layer is split into 2 sublayers which are the Logical Link Control (LLC) and the Medium

More information

Wireless Sensor Networks 8th Lecture

Wireless Sensor Networks 8th Lecture Wireless Sensor Networks 8th Lecture 21.11.2006 Christian Schindelhauer schindel@informatik.uni-freiburg.de 1 Media Access Control (MAC) Controlling when to send a packet and when to listen for a packet

More information

CSE 461 Multiple Access. David Wetherall

CSE 461 Multiple Access. David Wetherall CSE 461 Multiple Access David Wetherall djw@cs.washington.edu How to share a link Multiplexing = networking term for sharing a resource among multiple users (e.g., link, protocol instance) Topics: Multiplexing

More information

ECE 158A: Lecture 13. Fall 2015

ECE 158A: Lecture 13. Fall 2015 ECE 158A: Lecture 13 Fall 2015 Random Access and Ethernet! Random Access! Basic idea: Exploit statistical multiplexing Do not avoid collisions, just recover from them When a node has packet to send Transmit

More information

Data and Computer Communications. Chapter 11 Local Area Network

Data and Computer Communications. Chapter 11 Local Area Network Data and Computer Communications Chapter 11 Local Area Network LAN Topologies Refers to the way in which the stations attached to the network are interconnected Bus Topology Used with multipoint medium

More information

CSE 461: Multiple Access Networks. This Lecture

CSE 461: Multiple Access Networks. This Lecture CSE 461: Multiple Access Networks This Lecture Key Focus: How do multiple parties share a wire? This is the Medium Access Control (MAC) portion of the Link Layer Randomized access protocols: 1. Aloha 2.

More information

Wireless Medium Access Control Protocols

Wireless Medium Access Control Protocols Wireless Medium Access Control Protocols Telecomunicazioni Undergraduate course in Electrical Engineering University of Rome La Sapienza Rome, Italy 2007-2008 Classification of wireless MAC protocols Wireless

More information

ICE 1332/0715 Mobile Computing (Summer, 2008)

ICE 1332/0715 Mobile Computing (Summer, 2008) ICE 1332/0715 Mobile Computing (Summer, 2008) Medium Access Control Prof. Chansu Yu http://academic.csuohio.edu/yuc/ Simplified Reference Model Application layer Transport layer Network layer Data link

More information

Random Assignment Protocols

Random Assignment Protocols Random Assignment Protocols Random assignment strategies attempt to reduce problem occur in fixed assignment strategy by eliminating pre allocation of bandwidth to communicating nodes. Random assignment

More information

CS 123: Lecture 12, LANs, and Ethernet. George Varghese. October 24, 2006

CS 123: Lecture 12, LANs, and Ethernet. George Varghese. October 24, 2006 CS 123: Lecture 12, LANs, and Ethernet George Varghese October 24, 2006 Selective Reject Modulus failure Example w = 2, Max = 3 0 0 1 3 0 A(1) A(2) 1 0 retransmit A(1) A(2) buffer Case 1 Case 2 reject

More information

Data Link Layer -2- Network Access

Data Link Layer -2- Network Access EITF25 Internet: Technology and Applications Data Link Layer -2- Network Access 2013, Lecture 03 Kaan Bür, Stefan Höst Previously on EITF25 Logical Link Control Sublayer Flow control Send data Wait for

More information

Packet multiple access and the Aloha protocol

Packet multiple access and the Aloha protocol Packet multiple access and the Aloha protocol Massachusetts Institute of Technology Department of Aeronautics and Astronautics Slide 1 Packet Multiple Access PMA SHARED UPLINK TERMINAL TERMINAL APPL TRANS

More information

MAC Sublayer(1) Principal service of the Medium Access Control Sublayer: Allocating a single broadcast channel (mostly a LAN) among competing users

MAC Sublayer(1) Principal service of the Medium Access Control Sublayer: Allocating a single broadcast channel (mostly a LAN) among competing users MAC Sublayer(1) Principal service of the Medium Access Control Sublayer: Allocating a single broadcast channel (mostly a LAN) among competing users Static Channel Allocation: Frequency Division Multiplexing

More information

LECTURE PLAN. Script. Introduction about MAC Types o ALOHA o CSMA o CSMA/CD o CSMA/CA

LECTURE PLAN. Script. Introduction about MAC Types o ALOHA o CSMA o CSMA/CD o CSMA/CA Course- B.Sc. Applied Physical Science (Computer Science) Year- IIIrd, Sem- Vth Subject Computer Science Paper- XVIIth, Computer Networks Lecture -11 Lecture Title- Medium Access Layer Script Today in

More information

Multimedia Communication Services Traffic Modeling and Streaming

Multimedia Communication Services Traffic Modeling and Streaming Multimedia Communication Services Traffic Modeling and Streaming Medium Access Control algorithms Introduction and details on Aloha networks with infinite nodes Università degli Studi di Brescia A.A. 2014/2015

More information

Medium Access Control

Medium Access Control Medium Access Control Brad Karp (slides contributed by Kyle Jamieson) UCL Computer Science CS 3035/GZ01 14 th October 2014 Context: OSI Layer 2, S&K Link Layer email WWW phone...! SMTP HTTP RTP...! TCP

More information

Lecture 5 The Data Link Layer. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it

Lecture 5 The Data Link Layer. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it Lecture 5 The Data Link Layer Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it Link Layer: setting the context two physically connected devices: host-router, router-router, host-host,

More information

The Link Layer and LANs. Chapter 6: Link layer and LANs

The Link Layer and LANs. Chapter 6: Link layer and LANs The Link Layer and LANs EECS3214 2018-03-14 4-1 Chapter 6: Link layer and LANs our goals: understand principles behind link layer services: error detection, correction sharing a broadcast channel: multiple

More information

Chapter 4. The Medium Access Control Sublayer

Chapter 4. The Medium Access Control Sublayer Chapter 4 The Medium Access Control Sublayer The Channel Allocation Problem Static Channel Allocation in LANs and MANs Dynamic Channel Allocation in LANs and MANs Dynamic Channel Allocation in LANs and

More information

Lecture 12 December 04, Wireless Access. Graduate course in Communications Engineering. University of Rome La Sapienza. Rome, Italy

Lecture 12 December 04, Wireless Access. Graduate course in Communications Engineering. University of Rome La Sapienza. Rome, Italy Lecture 12 December 04, 2017 Wireless Access Graduate course in Communications Engineering University of Rome La Sapienza Rome, Italy 2017-2018 Random Medium Access Control Part II - CSMA and Collision

More information

Computer Network Fundamentals Spring Week 3 MAC Layer Andreas Terzis

Computer Network Fundamentals Spring Week 3 MAC Layer Andreas Terzis Computer Network Fundamentals Spring 2008 Week 3 MAC Layer Andreas Terzis Outline MAC Protocols MAC Protocol Examples Channel Partitioning TDMA/FDMA Token Ring Random Access Protocols Aloha and Slotted

More information

Data Link Layer: Collisions

Data Link Layer: Collisions Data Link Layer: Collisions 1 Multiple Access Data Link layer divided into two sublayers. The upper sublayer is responsible for datalink control, The lower sublayer is responsible for resolving access

More information

Multiple Access Communications. EEE 538, WEEK 11 Dr. Nail Akar Bilkent University Electrical and Electronics Engineering Department

Multiple Access Communications. EEE 538, WEEK 11 Dr. Nail Akar Bilkent University Electrical and Electronics Engineering Department Multiple Access Communications EEE 538, WEEK 11 Dr. Nail Akar Bilkent University Electrical and Electronics Engineering Department 1 Multiple Access Satellite systems, radio networks (WLAN), ethernet segment

More information

Multiple Access Channels

Multiple Access Channels Multiple Access Channels Some Queuing Theory MAC: Aloha, ethernet Exponential backoff & friends LANs: Local Area Networks Goal: extend benefits of simple connection as far as possible Means: Share medium

More information

Aloha and slotted aloha

Aloha and slotted aloha CSMA 2/13/06 Aloha and slotted aloha Slotted aloha: transmissions are synchronized and only start at the beginning of a time slot. Aloha sender A sender B collision sender C t Slotted Aloha collision sender

More information

Link Layer: Retransmissions

Link Layer: Retransmissions Link Layer: Retransmissions Context on Reliability Where in the stack should we place reliability functions? Application Transport Network Link Physical CSE 461 University of Washington 2 Context on Reliability

More information

Lecture 6 The Data Link Layer. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it

Lecture 6 The Data Link Layer. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it Lecture 6 The Data Link Layer Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it Link Layer: setting the context two physically connected devices: host-router, router-router, host-host,

More information

Computer Networks Medium Access Control. Mostafa Salehi Fall 2008

Computer Networks Medium Access Control. Mostafa Salehi Fall 2008 Computer Networks Medium Access Control Mostafa Salehi Fall 2008 2008 1 Outline Issues ALOHA Network Ethernet Token Ring Wireless 2 Main Issues Local Area Network (LAN) : Three or more machines are physically

More information

The MAC layer in wireless networks

The MAC layer in wireless networks The MAC layer in wireless networks The wireless MAC layer roles Access control to shared channel(s) Natural broadcast of wireless transmission Collision of signal: a time/space problem Who transmits when?

More information

CS 455/555 Intro to Networks and Communications. Link Layer

CS 455/555 Intro to Networks and Communications. Link Layer CS 455/555 Intro to Networks and Communications Link Layer Dr. Michele Weigle Department of Computer Science Old Dominion University mweigle@cs.odu.edu http://www.cs.odu.edu/~mweigle/cs455-s13 1 Link Layer

More information

Topics. Link Layer Services (more) Link Layer Services LECTURE 5 MULTIPLE ACCESS AND LOCAL AREA NETWORKS. flow control: error detection:

Topics. Link Layer Services (more) Link Layer Services LECTURE 5 MULTIPLE ACCESS AND LOCAL AREA NETWORKS. flow control: error detection: 1 Topics 2 LECTURE 5 MULTIPLE ACCESS AND LOCAL AREA NETWORKS Multiple access: CSMA/CD, CSMA/CA, token passing, channelization LAN: characteristics, i basic principles i Protocol architecture Topologies

More information

ETSN01 Exam Solutions

ETSN01 Exam Solutions ETSN01 Exam Solutions March 014 Question 1 (a) See p17 of the cellular systems slides for a diagram and the full procedure. The main points here were that the HLR needs to be queried to determine the location

More information

ECSE-4670: Computer Communication Networks (CCN) Informal Quiz 3

ECSE-4670: Computer Communication Networks (CCN) Informal Quiz 3 ECSE-4670: Computer Communication Networks (CCN) Informal Quiz 3 : shivkuma@ecse.rpi.edu Biplab Sikdar: sikdab@rpi.edu 1 T F Slotted ALOHA has improved utilization since the window of vulnerability is

More information

Links Reading: Chapter 2. Goals of Todayʼs Lecture. Message, Segment, Packet, and Frame

Links Reading: Chapter 2. Goals of Todayʼs Lecture. Message, Segment, Packet, and Frame Links Reading: Chapter 2 CS 375: Computer Networks Thomas Bressoud 1 Goals of Todayʼs Lecture Link-layer services Encoding, framing, and error detection Error correction and flow control Sharing a shared

More information

Medium Access Control

Medium Access Control Medium Access Control Fundamental Problem N nodes in vicinity want to transmit (to, say, N other nodes). How to do this interference free? Interference free means SINR Otherwise, we say that packets collide.

More information

Chapter 6 Medium Access Control Protocols and Local Area Networks

Chapter 6 Medium Access Control Protocols and Local Area Networks Chapter 6 Medium Access Control Protocols and Local Area Networks Part I: Medium Access Control Part II: Local Area Networks Chapter Overview Broadcast Networks All information sent to all users No routing

More information

Link Layer. (continued)

Link Layer. (continued) Link Layer (continued) Where we are in the Course Moving on up to the Link Layer! Application Transport Network Link Physical CSE 461 University of Washington 2 Topics 1. Framing Delimiting start/end of

More information

Getting Connected (Chapter 2 Part 4) Networking CS 3470, Section 1 Sarah Diesburg

Getting Connected (Chapter 2 Part 4) Networking CS 3470, Section 1 Sarah Diesburg Getting Connected (Chapter 2 Part 4) Networking CS 3470, Section 1 Sarah Diesburg Five Problems Encoding/decoding Framing Error Detection Error Correction Media Access Five Problems Encoding/decoding Framing

More information

Lecture 6. Data Link Layer (cont d) Data Link Layer 1-1

Lecture 6. Data Link Layer (cont d) Data Link Layer 1-1 Lecture 6 Data Link Layer (cont d) Data Link Layer 1-1 Agenda Continue the Data Link Layer Multiple Access Links and Protocols Addressing Data Link Layer 1-2 Multiple Access Links and Protocols Two types

More information

The Medium Access Control Sublayer

The Medium Access Control Sublayer The Medium Access Control Sublayer Chapter 4 Channel Allocation Problem Static channel allocation Assumptions for dynamic Assumptions for Dynamic Channel Allocation 1. Independent traffic 2. Single channel

More information

Chapter 1 Basic concepts of wireless data networks (cont d)

Chapter 1 Basic concepts of wireless data networks (cont d) Chapter 1 Basic concepts of wireless data networks (cont d) Part 2: Medium access methods for mobile data networks Sept 15 2004 1 Fixed assignment access schemes in voice-oriented networks Frequency division

More information

Data Link Layer, Part 3 Medium Access Control. Preface

Data Link Layer, Part 3 Medium Access Control. Preface Data Link Layer, Part 3 Medium Access Control These slides are created by Dr. Yih Huang of George Mason University. Students registered in Dr. Huang's courses at GMU can make a single machine-readable

More information

Outline. Application examples

Outline. Application examples Outline Application examples Google page rank algorithm Aloha protocol Virtual circuit with window flow control Store-and-Forward packet-switched network Interactive system with infinite servers 1 Example1:

More information

Medium Access Protocols

Medium Access Protocols Medium Access Protocols Summary of MAC protocols What do you do with a shared media? Channel Partitioning, by time, frequency or code Time Division,Code Division, Frequency Division Random partitioning

More information

Networking Technologies and Applications

Networking Technologies and Applications Networking Technologies and Applications Rolland Vida BME TMIT September 23, 2016 Aloha Advantages: Different size packets No need for synchronization Simple operation If low upstream traffic, the solution

More information

Data Link Layer, Part 5. Medium Access Control

Data Link Layer, Part 5. Medium Access Control CS 455 Medium Access Control, Page 1 Data Link Layer, Part 5 Medium Access Control These slides are created by Dr. Yih Huang of George Mason University. Students registered in Dr. Huang s courses at GMU

More information

CMPE 150/L : Introduction to Computer Networks. Chen Qian Computer Engineering UCSC Baskin Engineering Lecture 16

CMPE 150/L : Introduction to Computer Networks. Chen Qian Computer Engineering UCSC Baskin Engineering Lecture 16 CMPE 150/L : Introduction to Computer Networks Chen Qian Computer Engineering UCSC Baskin Engineering Lecture 16 1 Final project demo Please do the demo next week to the TAs. So basically you may need

More information

Chapter 4: The Medium Access Layer

Chapter 4: The Medium Access Layer Chapter 4: The Medium Access Layer Computer Networks Maccabe Computer Science Department The University of New Mexico September 2002 Medium Access Layer Point-to-point versus broadcast networks Broadcast

More information

Medium Access Control. CSCI370 Lecture 5 Michael Hutt New York Institute of Technology

Medium Access Control. CSCI370 Lecture 5 Michael Hutt New York Institute of Technology Medium Access Control CSCI370 Lecture 5 Michael Hutt New York Institute of Technology The Data Link Layer Logical Link Control (LLC) IEEE 802.2 Standard RFC 1042 Provides three service options Unreliable

More information

Comparison of pre-backoff and post-backoff procedures for IEEE distributed coordination function

Comparison of pre-backoff and post-backoff procedures for IEEE distributed coordination function Comparison of pre-backoff and post-backoff procedures for IEEE 802.11 distributed coordination function Ping Zhong, Xuemin Hong, Xiaofang Wu, Jianghong Shi a), and Huihuang Chen School of Information Science

More information

Medium Access Control Sublayer

Medium Access Control Sublayer Wireless (WLAN) Medium Access Control Sublayer Mahalingam Mississippi State University, MS October 20, 2014 Outline Medium Access Protocols Wireless (WLAN) 1 Medium Access Protocols ALOHA Slotted ALOHA

More information

Lecture 9: Bridging. CSE 123: Computer Networks Alex C. Snoeren

Lecture 9: Bridging. CSE 123: Computer Networks Alex C. Snoeren Lecture 9: Bridging CSE 123: Computer Networks Alex C. Snoeren Lecture 9 Overview Finishing up media access Ethernet Contention-free methods (rings) Moving beyond one wire Link technologies have limits

More information

Outline. Introduction to Networked Embedded Systems - Embedded systems Networked embedded systems Embedded Internet - Network properties

Outline. Introduction to Networked Embedded Systems - Embedded systems Networked embedded systems Embedded Internet - Network properties Outline Introduction to Networked Embedded Systems - Embedded systems Networked embedded systems Embedded Internet - Network properties Layered Network Architectures - OSI framework descriptions of layers

More information

Direct Link Communication II: Wired Media. Multi-Access Communication

Direct Link Communication II: Wired Media. Multi-Access Communication Direct Link Communication II: Wired Media Multi-Access Communication Two classes: contention-based e.g., CSMA/CD, CSMA/CA used in Ethernet, WLAN contention-free e.g., TDM, FDM, TDMA, CDMA, token ring one

More information