Topics (2) 3. Retransmissions. 4. MulFple Access. 5. Switching. Handling loss. Classic Ethernet, Modern Ethernet

Size: px
Start display at page:

Download "Topics (2) 3. Retransmissions. 4. MulFple Access. 5. Switching. Handling loss. Classic Ethernet, Modern Ethernet"

Transcription

1 3. Retransmissions Handling loss 4. MulFple Access Classic Ethernet, Switching Modern Ethernet Topics (2) CSE 461 University of Washington 1

2 Topic Two strategies to handle errors: 1. Detect errors and retransmit frame (AutomaFc Repeat request, ARQ) 2. Correct errors with an error correcfng code Done this CSE 461 University of Washington 2

3 Context on Reliability Where in the stack should we place reliability funcfons? ApplicaFon Transport Network Link Physical CSE 461 University of Washington 3

4 Context on Reliability (2) Everywhere! It is a key issue Different layers contribute differently ApplicaFon Transport Network Link Physical Recover acfons (correctness) Mask errors (performance opfmizafon) CSE 461 University of Washington 4

5 ARQ ARQ o[en used when errors are common or must be corrected E.g., WiFi, and TCP (later) Rules at sender and receiver: Receiver automafcally acknowledges correct frames with an ACK Sender automafcally resends a[er a Fmeout, unfl an ACK is received CSE 461 University of Washington 5

6 Normal operafon (no loss) Sender Receiver Frame Timeout Time ACK ARQ (2) CSE 461 University of Washington 6

7 Loss and retransmission Sender Receiver Frame X Timeout Time Frame ARQ (3) ACK CSE 461 University of Washington 7

8 So What s Tricky About ARQ? Two non-trivial issues: How long to set the Fmeout?» How to avoid accepfng duplicate frames as new frames» Want performance in the common case and correctness always CSE 461 University of Washington 8

9 Timeouts Timeout should be: Not too big (link goes idle) Not too small (spurious resend) Fairly easy on a LAN Clear worst case, lible variafon Fairly difficult over the Internet Much variafon, no obvious bound We ll revisit this with TCP (later) CSE 461 University of Washington 9

10 Duplicates What happens if an ACK is lost? Sender Frame Receiver Timeout X ACK CSE 461 University of Washington 10

11 Duplicates (2) What happens if an ACK is lost? Sender Frame Receiver Timeout X ACK Frame ACK New Frame?? CSE 461 University of Washington 11

12 Or the Fmeout is early? Duplicates (3) Timeout Sender Frame ACK Receiver CSE 461 University of Washington 12

13 Or the Fmeout is early? Duplicates (4) Timeout Sender Frame ACK Frame ACK Receiver New Frame?? CSE 461 University of Washington 13

14 Sequence Numbers Frames and ACKs must both carry sequence numbers for correctness To disfnguish the current frame from the next one, a single bit (two numbers) is sufficient Called Stop-and-Wait CSE 461 University of Washington 14

15 In the normal case: Sender Receiver Stop-and-Wait Time CSE 461 University of Washington 15

16 In the normal case: Stop-and-Wait (2) Sender Receiver Timeout Frame 0 ACK 0 Time Frame 1 ACK 1 CSE 461 University of Washington 16

17 With ACK loss: Stop-and-Wait (3) Sender Receiver Frame 0 Timeout X ACK 0 CSE 461 University of Washington 17

18 With ACK loss: Stop-and-Wait (4) Sender Receiver Frame 0 Timeout X ACK 0 Frame 0 ACK 0 It s a Resend! CSE 461 University of Washington 18

19 With early Fmeout: Stop-and-Wait (5) Sender Frame 0 Timeout ACK 0 Receiver CSE 461 University of Washington 19

20 With early Fmeout: Stop-and-Wait (6) Sender Frame 0 Timeout ACK 0 Receiver OK Frame 0 ACK 0 It s a Resend CSE 461 University of Washington 20

21 LimitaFon of Stop-and-Wait It allows only a single frame to be outstanding from the sender: Good for LAN, not efficient for high BD Ex: R=1 Mbps, D = 50 ms How many frames/sec? If R=10 Mbps? CSE 461 University of Washington 21

22 Sliding Window GeneralizaFon of stop-and-wait Allows W frames to be outstanding Can send W frames per RTT (=2D) Various opfons for numbering frames/acks and handling loss Will look at along with TCP (later) CSE 461 University of Washington 22

23 Topic MulFplexing is the network word for the sharing of a resource Classic scenario is sharing a link among different users Time Division MulFplexing (TDM)» Frequency Division MulFplexing (FDM)» CSE 461 University of Washington 23

24 Time Division MulFplexing (TDM) Users take turns on a fixed schedule CSE 461 University of Washington 24

25 Frequency Division MulFplexing (FDM) Put different users on different frequency bands Overall FDM channel CSE 461 University of Washington 25

26 TDM versus FDM In TDM a user sends at a high rate a fracfon of the Fme; in FDM, a user sends at a low rate all the Fme Rate TDM FDM Time CSE 461 University of Washington 26

27 TDM versus FDM (2) In TDM a user sends at a high rate a fracfon of the Fme; in FDM, a user sends at a low rate all the Fme Rate TDM FDM Time CSE 461 University of Washington 27

28 TDM/FDM Usage StaFcally divide a resource Suited for confnuous traffic, fixed number of users Widely used in telecommunicafons TV and radio stafons (FDM) GSM (2G cellular) allocates calls using TDM within FDM CSE 461 University of Washington 28

29 MulFplexing Network Traffic Network traffic is bursty ON/OFF sources Load varies greatly over Fme Rate Rate Time Time CSE 461 University of Washington 29

30 MulFplexing Network Traffic (2) Network traffic is bursty Inefficient to always allocate user their ON needs with TDM/FDM Rate Rate R Time R Time CSE 461 University of Washington 30

31 MulFplexing Network Traffic (3) MulFple access schemes mulfplex users according to their demands for gains of stafsfcal mulfplexing Two users, each need R Rate Rate R Time R Time Together they need R < 2R Rate R <2R Time CSE 461 University of Washington 31

32 MulFple Access We will look at two kinds of mulfple access protocols 1. Randomized. Nodes randomize their resource access abempts Good for low load situafons 2. ContenFon-free. Nodes order their resource access abempts Good for high load or guaranteed quality of service situafons CSE 461 University of Washington 32

33 Topic How do nodes share a single link? Who sends when, e.g., in WiFI? Explore with a simple model Assume no-one is in charge; this is a distributed system CSE 461 University of Washington 33

34 Topic (2) We will explore random mulfple access control (MAC) protocols This is the basis for classic Ethernet Remember: data traffic is bursty Busy! Zzzz.. Ho hum CSE 461 University of Washington 34

35 ALOHA Network Seminal computer network connecfng the Hawaiian islands in the late 1960s When should nodes send? A new protocol was devised by Norm Abramson Hawaii CSE 461 University of Washington 35

36 ALOHA Protocol Simple idea: Node just sends when it has traffic. If there was a collision (no ACK received) then wait a random Fme and resend That s it! CSE 461 University of Washington 36

37 Some frames will be lost, but many may get through ALOHA Protocol (2) Good idea? CSE 461 University of Washington 37

38 ALOHA Protocol (3) Simple, decentralized protocol that works well under low load! Not efficient under high load Analysis shows at most 18% efficiency Improvement: divide Fme into slots and efficiency goes up to 36% We ll look at other improvements CSE 461 University of Washington 38

39 Classic Ethernet ALOHA inspired Bob Metcalfe to invent Ethernet for LANs in 1973 Nodes share 10 Mbps coaxial cable Hugely popular in 1980s, 1990s : 2009 IEEE CSE 461 University of Washington 39

40 CSMA (Carrier Sense MulFple Access) Improve ALOHA by listening for acfvity before we send (Doh!) Can do easily with wires, not wireless So does this eliminate collisions? Why or why not? CSE 461 University of Washington 40

41 CSMA (2) SFll possible to listen and hear nothing when another node is sending because of delay CSE 461 University of Washington 41

42 CSMA (3) CSMA is a good defense against collisions only when BD is small X CSE 461 University of Washington 42

43 CSMA/CD (with Collision DetecFon) Can reduce the cost of collisions by detecfng them and aborfng (Jam) the rest of the frame Fme Again, we can do this with wires Jam! X X X X X X X X Jam! CSE 461 University of Washington 43

44 CSMA/CD ComplicaFons Want everyone who collides to know that it happened Time window in which a node may hear of a collision is 2D seconds X CSE 461 University of Washington 44

45 CSMA/CD ComplicaFons (2) Impose a minimum frame size that lasts for 2D seconds So node can t finish before collision Ethernet minimum frame is 64 bytes X CSE 461 University of Washington 45

46 CSMA Persistence What should a node do if another node is sending? What now? Idea: Wait unfl it is done, and send CSE 461 University of Washington 46

47 CSMA Persistence (2) Problem is that mulfple waifng nodes will queue up then collide More load, more of a problem Now! Uh oh Now! CSE 461 University of Washington 47

48 CSMA Persistence (3) IntuiFon for a beber solufon If there are N queued senders, we want each to send next with probability 1/N Send p=½ Whew Send p=½ CSE 461 University of Washington 48

49 Binary ExponenFal Backoff (BEB) Cleverly esfmates the probability 1st collision, wait 0 or 1 frame Fmes 2nd collision, wait from 0 to 3 Fmes 3rd collision, wait from 0 to 7 Fmes BEB doubles interval for each successive collision Quickly gets large enough to work Very efficient in pracfce CSE 461 University of Washington 49

50 Classic Ethernet, or IEEE Most popular LAN of the 1980s, 1990s 10 Mbps over shared coaxial cable, with baseband signals MulFple access with 1-persistent CSMA/CD with BEB CSE 461 University of Washington 50

51 Ethernet Frame Format Has addresses to idenffy the sender and receiver CRC-32 for error detecfon; no ACKs or retransmission Start of frame idenffied with physical layer preamble Packet from Network layer (IP) CSE 461 University of Washington 51

52 Modern Ethernet Based on switches, not mulfple access, but sfll called Ethernet We ll get to it in a later segment Switch Switch ports Twisted pair CSE 461 University of Washington 52

53 Topic How do wireless nodes share a single link? (Yes, this is WiFi!) Build on our simple, wired model Send? Send? CSE 461 University of Washington 53

54 Wireless ComplicaFons Wireless is more complicated than the wired case (Surprise!) 1. Nodes may have different areas of coverage doesn t fit Carrier Sense» 2. Nodes can t hear while sending can t Collision Detect» CSMA/CD CSE 461 University of Washington 54

55 Different Coverage Areas Wireless signal is broadcast and received nearby, where there is sufficient SNR CSE 461 University of Washington 55

56 Hidden Terminals Nodes A and C are hidden terminals when sending to B Can t hear each other (to coordinate) yet collide at B We want to avoid the inefficiency of collisions CSE 461 University of Washington 56

57 Exposed Terminals B and C are exposed terminals when sending to A and D Can hear each other yet don t collide at receivers A and D We want to send concurrently to increase performance CSE 461 University of Washington 57

58 Nodes Can t Hear While Sending With wires, detecfng collisions (and aborfng) lowers their cost More wasted Fme with wireless Wired Collision X X Resend Wireless Collision XXXXXXXXX Time XXXXXXXXX Resend CSE 461 University of Washington 58

59 Possible SoluFon: MACA MACA uses a short handshake instead of CSMA (Karn, 1990) uses a refinement of MACA (later) Protocol rules: 1. A sender node transmits a RTS (Request-To-Send, with frame length) 2. The receiver replies with a CTS (Clear-To-Send, with frame length) 3. Sender transmits the frame while nodes hearing the CTS stay silent Collisions on the RTS/CTS are sfll possible, but less likely CSE 461 University of Washington 59

60 MACA Hidden Terminals AàB with hidden terminal C 1. A sends RTS, to B A B C D CSE 461 University of Washington 60

61 MACA Hidden Terminals (2) AàB with hidden terminal C 2. B sends CTS, to A, and C too A RTS B C D CSE 461 University of Washington 61

62 MACA Hidden Terminals (3) AàB with hidden terminal C 2. B sends CTS, to A, and C too A RTS CTS B CTS Alert! C D CSE 461 University of Washington 62

63 MACA Hidden Terminals (4) AàB with hidden terminal C 3. A sends frame while C defers Frame Quiet... CSE 461 University of Washington 63

64 MACA Exposed Terminals BàA, CàD as exposed terminals B and C send RTS to A and D A B C D CSE 461 University of Washington 64

65 MACA Exposed Terminals (2) BàA, CàD as exposed terminals A and D send CTS to B and C A RTS B C RTS D CSE 461 University of Washington 65

66 MACA Exposed Terminals (3) BàA, CàD as exposed terminals A and D send CTS to B and C All OK All OK A RTS CTS B C RTS CTS D CSE 461 University of Washington 66

67 MACA Exposed Terminals (4) BàA, CàD as exposed terminals A and D send CTS to B and C A Frame B C Frame D CSE 461 University of Washington 67

68 802.11, or WiFi Very popular wireless LAN started in the 1990s Clients get connecfvity from a (wired) AP (Access Point) It s a mulf-access problem J Various flavors have been developed over Fme Faster, more features Access Point Client To Network CSE 461 University of Washington 68

69 Physical Layer Uses 20/40 MHz channels on ISM bands b/g/n on 2.4 GHz a/n on 5 GHz OFDM modulafon (except legacy b) Different amplitudes/phases for varying SNRs Rates from 6 to 54 Mbps plus error correcfon n uses mulfple antennas; see with MulFple Antennas for Dummies CSE 461 University of Washington 69

70 Link Layer MulFple access uses CSMA/CA (next); RTS/CTS opfonal Frames are ACKed and retransmibed with ARQ Funky addressing (three addresses!) due to AP Errors are detected with a 32-bit CRC Many, many features (e.g., encrypfon, power save) Packet from Network layer (IP) CSE 461 University of Washington 70

71 CSMA/CA for MulFple Access Sender avoids collisions by inserfng small random gaps E.g., when both B and C send, C picks a smaller gap, goes first Send? Send? Time CSE 461 University of Washington 71

72 The Future of (Guess) Likely ubiquitous for Internet connecfvity Greater diversity, from low- to high-end devices InnovaFon in physical layer drives speed And power-efficient operafon too More seamless integrafon of connecfvity Too manual now, and limited (e.g., device-to-device) CSE 461 University of Washington 72

73 Topic How do we connect nodes with a switch instead of mulfple access Uses mulfple links/wires Basis of modern (switched) Ethernet Switch CSE 461 University of Washington 73

74 Switched Ethernet Hosts are wired to Ethernet switches with twisted pair Switch serves to connect the hosts Wires usually run to a closet Switch Switch ports Twisted pair CSE 461 University of Washington 74

75 What s in the box? Remember from protocol layers: Hub, or repeater Physical Physical All look like this: Switch Link Link Router Network Link Network Link CSE 461 University of Washington 75

76 Inside a Hub All ports are wired together; more convenient and reliable than a single shared wire CSE 461 University of Washington 76

77 Inside a Switch Uses frame addresses to connect input port to the right output port; mulfple frames may be switched in parallel... Fabric CSE 461 University of Washington 77

78 Inside a Switch (2) Port may be used for both input and output (full-duplex) Just send, no mulfple access protocol à 4 and 2 à 3 CSE 461 University of Washington 78

79 Inside a Switch (3) Need buffers for mulfple inputs to send to one output Input Output Input Buffer Fabric Output Buffer CSE 461 University of Washington 79

80 Inside a Switch (4) Sustained overload will fill buffer and lead to frame loss XXX Loss! Input Output Input Buffer Fabric Output Buffer CSE 461 University of Washington 80

81 Advantages of Switches Switches and hubs have replaced the shared cable of classic Ethernet Convenient to run wires to one locafon More reliable; wire cut is not a single point of failure that is hard to find Switches offer scalable performance E.g., 100 Mbps per port instead of 100 Mbps for all nodes of shared cable / hub CSE 461 University of Washington 81

82 Switch Forwarding Switch needs to find the right output port for the desfnafon address in the Ethernet frame. How? Want to let hosts be moved around readily; don t look at IP Ethernet Frame Source DesFnaFon CSE 461 University of Washington 82

83 Backward Learning Switch forwards frames with a port/address table as follows: 1. To fill the table, it looks at the source address of input frames 2. To forward, it sends to the port, or else broadcasts to all ports CSE 461 University of Washington 83

84 1: A sends to D Backward Learning (2) Switch D Address Port A B C D CSE 461 University of Washington 84

85 2: D sends to A Backward Learning (3) Switch D Address Port A 1 B C D CSE 461 University of Washington 85

86 3: A sends to D Backward Learning (4) Switch D Address Port A 1 B C D 4 CSE 461 University of Washington 86

87 3: A sends to D Backward Learning (5) Switch D Address Port A 1 B C D 4 CSE 461 University of Washington 87

88 Learning with MulFple Switches Just works with mulfple switches and a mix of hubs assuming no loops, e.g., A sends to D then D sends to A Switch CSE 461 University of Washington 88

89 Learning with MulFple Switches (2) Just works with mulfple switches and a mix of hubs assuming no loops, e.g., A sends to D then D sends to A Switch CSE 461 University of Washington 89

90 Topic How can we connect switches in any topology so they just work This is part 2 of switched Ethernet Loops yikes! CSE 461 University of Washington 90

91 Problem Forwarding Loops May have a loop in the topology Redundancy in case of failures Or a simple mistake Want LAN switches to just work Plug-and-play, no changes to hosts But loops cause a problem Redundant Links CSE 461 University of Washington 91

92 Forwarding Loops (2) Suppose the network is started and A sends to F. What happens? A B C D Le[ / Right E F CSE 461 University of Washington 92

93 Forwarding Loops (3) Suppose the network is started and A sends to F. What happens? A à C à B, D-le[, D-right D-le[ à C-right, E, F D-right à C-le[, E, F C-right à D-le[, A, B C-le[ à D-right, A, B D-le[ à D-right à A E C D B Le[ / Right F CSE 461 University of Washington 93

94 Spanning Tree SoluFon Switches collecfvely find a spanning tree for the topology A subset of links that is a tree (no loops) and reaches all switches They switches forward as normal on the spanning tree Broadcasts will go up to the root of the tree and down all the branches CSE 461 University of Washington 94

95 Spanning Tree (2) Topology One ST Another ST CSE 461 University of Washington 95

96 Spanning Tree (3) Topology One ST Another ST Root CSE 461 University of Washington 96

97 Spanning Tree Algorithm Rules of the distributed game: All switches run the same algorithm They start with no informafon Operate in parallel and send messages Always search for the best solufon Ensures a highly robust solufon Any topology, with no configurafon Adapts to link/switch failures, CSE 461 University of Washington 97

98 Radia Perlman (1952 ) Key early work on roufng protocols RouFng in the ARPANET Spanning Tree for switches (next) Link-state roufng (later) Now focused on network security CSE 461 University of Washington 98

99 Outline: Spanning Tree Algorithm (2) 1. Elect a root node of the tree (switch with the lowest address) 2. Grow tree as shortest distances from the root (using lowest address to break distance Fes) 3. Turn off ports for forwarding if they aren t on the spanning tree CSE 461 University of Washington 99

100 Spanning Tree Algorithm (3) Details: Each switch inifally believes it is the root of the tree Each switch sends periodic updates to neighbors with: Its address, address of the root, and distance (in hops) to root Switches favors ports with shorter distances to lowest root Uses lowest address as a Fe for distances Hi, I m C, the root is A, it s 2 hops away or (C, A, 2) C CSE 461 University of Washington 100

101 Spanning Tree Example 1 st round, sending: A sends (A, A, 0) to say it is root B, C, D, E, and F do likewise 1 st round, receiving: A sfll thinks is it (A, A, 0) B sfll thinks (B, B, 0) C updates to (C, A, 1) D updates to (D, C, 1) E updates to (E, A, 1) F updates to (F, B, 1) A,A,0 E,E,0 C,C,0 D,D,0 B,B,0 F,F,0 CSE 461 University of Washington 101

102 Spanning Tree Example (2) 2 nd round, sending Nodes send their updated state 2 nd round receiving: A remains (A, A, 0) B updates to (B, A, 2) via C C remains (C, A, 1) D updates to (D, A, 2) via C E remains (E, A, 1) F remains (F, B, 1) A,A,0 E,A,1 C,A,1 D,C,1 B,B,0 F,B,1 CSE 461 University of Washington 102

103 Spanning Tree Example (3) 3 rd round, sending Nodes send their updated state 3 rd round receiving: A remains (A, A, 0) B remains (B, A, 2) via C C remains (C, A, 1) D remains (D, A, 2) via C-le[ E remains (E, A, 1) F updates to (F, A, 3) via B A,A,0 E,A,1 C,A,1 D,A,2 B,A,2 F,B,1 CSE 461 University of Washington 103

104 Spanning Tree Example (4) 4 th round Steady-state has been reached Nodes turn off forwarding that is not on the spanning tree A,A,0 C,A,1 B,A,2 Algorithm confnues to run Adapts by Fming out informafon E.g., if A fails, other nodes forget it, and B will become the new root E,A,1 D,A,2 F,A,3 CSE 461 University of Washington 104

105 Spanning Tree Example (5) Forwarding proceeds as usual on the ST IniFally D sends to F: A,A,0 B,A,2 C,A,1 And F sends back to D: D,A,2 E,A,1 F,A,3 CSE 461 University of Washington 105

106 Spanning Tree Example (6) Forwarding proceeds as usual on the ST IniFally D sends to F: D à C-le[ C à A, B A à E B à F A,A,0 C,A,1 B,A,2 And F sends back to D: F à B B à C C à D (hm, not such a great route) E,A,1 D,A,2 F,A,3 CSE 461 University of Washington 106

Link Layer: Retransmissions

Link Layer: Retransmissions Link Layer: Retransmissions Context on Reliability Where in the stack should we place reliability functions? Application Transport Network Link Physical CSE 461 University of Washington 2 Context on Reliability

More information

Link Layer. (continued)

Link Layer. (continued) Link Layer (continued) Topics 1. Framing Delimiting start/end of frames 2. Error detection and correction Handling errors 3. Retransmissions Handling loss 4. Multiple Access 802.11, classic Ethernet 5.

More information

Computer Networks. Randomized Multiple Access

Computer Networks. Randomized Multiple Access Computer Networks Randomized Multiple Access Topic How do nodes share a single link? Who sends when, e.g., in WiFI? Explore with a simple model Assume no-one is in charge; this is a distributed system

More information

Link Layer. (continued)

Link Layer. (continued) Link Layer (continued) Where we are in the Course Moving on up to the Link Layer! Application Transport Network Link Physical CSE 461 University of Washington 2 Topics 1. Framing Delimiting start/end of

More information

Opera-ng Systems and Networks. Network Lecture 4: Link Layer (2) Pending Issues

Opera-ng Systems and Networks. Network Lecture 4: Link Layer (2) Pending Issues Opera-ng Systems and Networks Network Lecture 4: Link Layer (2) Adrian Perrig Network Security Group ETH Zürich Pending Issues How to read the course textbook? How to prepare for the exam given that there

More information

Hamming Code. Gives a method for construc=ng a code with a distance of 3. Plus an easy way to correct [soon]

Hamming Code. Gives a method for construc=ng a code with a distance of 3. Plus an easy way to correct [soon] Hamming Code Gives a method for construc=ng a code with a distance of 3 Uses n = 2 k k 1, e.g., n=4, k=3 Put check bits in posi=ons p that are powers of 2, star=ng with posi=on 1 Check bit in posi=on p

More information

Where we are in the Course

Where we are in the Course Link Layer Where we are in the Course Moving on up to the Link Layer! Application Transport Network Link Physical CSE 461 University of Washington 2 Scope of the Link Layer Concerns how to transfer messages

More information

Medium Access Control Sublayer Chapter 4

Medium Access Control Sublayer Chapter 4 Medium Access Control Sublayer Chapter 4 Channel Allocation Problem Multiple Access Protocols Ethernet Wireless LANs Broadband Wireless Bluetooth RFID Data Link Layer Switching Revised: August 2011 & February

More information

CSE 461: Multiple Access Networks. This Lecture

CSE 461: Multiple Access Networks. This Lecture CSE 461: Multiple Access Networks This Lecture Key Focus: How do multiple parties share a wire? This is the Medium Access Control (MAC) portion of the Link Layer Randomized access protocols: 1. Aloha 2.

More information

CSE 461 Multiple Access. David Wetherall

CSE 461 Multiple Access. David Wetherall CSE 461 Multiple Access David Wetherall djw@cs.washington.edu How to share a link Multiplexing = networking term for sharing a resource among multiple users (e.g., link, protocol instance) Topics: Multiplexing

More information

Chapter 12 Multiple Access 12.1

Chapter 12 Multiple Access 12.1 Chapter 12 Multiple Access 12.1 Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. 12.2 Figure 12.1 Data link layer divided into two functionality-oriented sublayers

More information

ECE 158A: Lecture 13. Fall 2015

ECE 158A: Lecture 13. Fall 2015 ECE 158A: Lecture 13 Fall 2015 Random Access and Ethernet! Random Access! Basic idea: Exploit statistical multiplexing Do not avoid collisions, just recover from them When a node has packet to send Transmit

More information

CS 43: Computer Networks Media Access. Kevin Webb Swarthmore College November 30, 2017

CS 43: Computer Networks Media Access. Kevin Webb Swarthmore College November 30, 2017 CS 43: Computer Networks Media Access Kevin Webb Swarthmore College November 30, 2017 Multiple Access Links & Protocols Two classes of links : point-to-point dial-up access link between Ethernet switch,

More information

CS 43: Computer Networks. 27: Media Access Contd. December 3, 2018

CS 43: Computer Networks. 27: Media Access Contd. December 3, 2018 CS 43: Computer Networks 27: Media Access Contd. December 3, 2018 Last Class The link layer provides lots of functionality: addressing, framing, media access, error checking could be used independently

More information

High Level View. EE 122: Ethernet and Random Access protocols. Medium Access Protocols

High Level View. EE 122: Ethernet and Random Access protocols. Medium Access Protocols High Level View EE 122: Ethernet and 802.11 Ion Stoica September 18, 2002 Goal: share a communication medium among multiple hosts connected to it Problem: arbitrate between connected hosts Solution goals:

More information

CMPE 257: Wireless and Mobile Networking

CMPE 257: Wireless and Mobile Networking CMPE 257: Wireless and Mobile Networking Katia Obraczka Computer Engineering UCSC Baskin Engineering Lecture 3 CMPE 257 Winter'11 1 Announcements Accessing secure part of the class Web page: User id: cmpe257.

More information

EE 122: Ethernet and

EE 122: Ethernet and EE 122: Ethernet and 802.11 Ion Stoica September 18, 2002 (* this talk is based in part on the on-line slides of J. Kurose & K. Rose) High Level View Goal: share a communication medium among multiple hosts

More information

Medium Access Control Sublayer Chapter 4

Medium Access Control Sublayer Chapter 4 Medium Access Control Sublayer Chapter 4 Channel Allocation Problem Multiple Access Protocols Ethernet Wireless LANs Broadband Wireless Bluetooth RFID Data Link Layer Switching Revised: August 2011 The

More information

IEEE , Token Rings. 10/11/06 CS/ECE UIUC, Fall

IEEE , Token Rings. 10/11/06 CS/ECE UIUC, Fall IEEE 802.11, Token Rings 10/11/06 CS/ECE 438 - UIUC, Fall 2006 1 Medium Access Control Wireless channel is a shared medium Need access control mechanism to avoid interference Why not CSMA/CD? 10/11/06

More information

Computer Networks Medium Access Control. Mostafa Salehi Fall 2008

Computer Networks Medium Access Control. Mostafa Salehi Fall 2008 Computer Networks Medium Access Control Mostafa Salehi Fall 2008 2008 1 Outline Issues ALOHA Network Ethernet Token Ring Wireless 2 Main Issues Local Area Network (LAN) : Three or more machines are physically

More information

Lecture 6. Data Link Layer (cont d) Data Link Layer 1-1

Lecture 6. Data Link Layer (cont d) Data Link Layer 1-1 Lecture 6 Data Link Layer (cont d) Data Link Layer 1-1 Agenda Continue the Data Link Layer Multiple Access Links and Protocols Addressing Data Link Layer 1-2 Multiple Access Links and Protocols Two types

More information

Jaringan Komputer. Broadcast Network. Outline. MAC (Medium Access Control) Channel Allocation Problem. Dynamic Channel Allocation

Jaringan Komputer. Broadcast Network. Outline. MAC (Medium Access Control) Channel Allocation Problem. Dynamic Channel Allocation Broadcast Network Jaringan Komputer Medium Access Control Sublayer 2 network categories: point-to-point connections broadcast channels Key issue in broadcast network: how to determine who gets to use the

More information

Computer Networks. Today. Principles of datalink layer services Multiple access links Adresavimas, ARP LANs Wireless LANs VU MIF CS 1/48 2/48

Computer Networks. Today. Principles of datalink layer services Multiple access links Adresavimas, ARP LANs Wireless LANs VU MIF CS 1/48 2/48 Computer Networks VU MIF CS 1/48 Today Principles of datalink layer services Multiple access links Adresavimas, ARP LANs Wireless LANs 2/48 1 Link layer: introduction terminology: hosts and routers: nodes

More information

ECEN 5032 Data Networks Medium Access Control Sublayer

ECEN 5032 Data Networks Medium Access Control Sublayer ECEN 5032 Data Networks Medium Access Control Sublayer Peter Mathys mathys@colorado.edu University of Colorado, Boulder c 1996 2005, P. Mathys p.1/35 Overview (Sub)networks can be divided into two categories:

More information

Computer Network Fundamentals Spring Week 3 MAC Layer Andreas Terzis

Computer Network Fundamentals Spring Week 3 MAC Layer Andreas Terzis Computer Network Fundamentals Spring 2008 Week 3 MAC Layer Andreas Terzis Outline MAC Protocols MAC Protocol Examples Channel Partitioning TDMA/FDMA Token Ring Random Access Protocols Aloha and Slotted

More information

Getting Connected (Chapter 2 Part 4) Networking CS 3470, Section 1 Sarah Diesburg

Getting Connected (Chapter 2 Part 4) Networking CS 3470, Section 1 Sarah Diesburg Getting Connected (Chapter 2 Part 4) Networking CS 3470, Section 1 Sarah Diesburg Five Problems Encoding/decoding Framing Error Detection Error Correction Media Access Five Problems Encoding/decoding Framing

More information

CSE/EE 461 Wireless and Contention-Free Protocols

CSE/EE 461 Wireless and Contention-Free Protocols CSE/EE 461 Wireless and Contention-Free Protocols Last Time The multi-access problem Medium Access Control (MAC) sublayer Random access protocols: Aloha CSMA variants Classic Ethernet (CSMA/CD) Application

More information

Redes de Computadores. Medium Access Control

Redes de Computadores. Medium Access Control Redes de Computadores Medium Access Control Manuel P. Ricardo Faculdade de Engenharia da Universidade do Porto 1 » How to control the access of computers to a communication medium?» What is the ideal Medium

More information

Multiple Access in Cellular and Systems

Multiple Access in Cellular and Systems Multiple Access in Cellular and 802.11 Systems 1 GSM The total bandwidth is divided into many narrowband channels. (200 khz in GSM) Users are given time slots in a narrowband channel (8 users) A channel

More information

Medium Access Control. MAC protocols: design goals, challenges, contention-based and contention-free protocols

Medium Access Control. MAC protocols: design goals, challenges, contention-based and contention-free protocols Medium Access Control MAC protocols: design goals, challenges, contention-based and contention-free protocols 1 Why do we need MAC protocols? Wireless medium is shared Many nodes may need to access the

More information

The Medium Access Control Sublayer

The Medium Access Control Sublayer The Medium Access Control Sublayer Chapter 4 Channel Allocation Problem Static channel allocation Assumptions for dynamic Assumptions for Dynamic Channel Allocation 1. Independent traffic 2. Single channel

More information

COS 140: Foundations of Computer Science

COS 140: Foundations of Computer Science COS 140: Foundations of Computer Science ALOHA Network Protocol Family Fall 2017 Homework 2 Introduction 3 Network Protocols.......................................................... 3 Problem.................................................................

More information

CSE 461: Wireless Networks

CSE 461: Wireless Networks CSE 461: Wireless Networks Wireless IEEE 802.11 A physical and multiple access layer standard for wireless local area networks (WLAN) Ad Hoc Network: no servers or access points Infrastructure Network

More information

Lecture 9: Bridging. CSE 123: Computer Networks Alex C. Snoeren

Lecture 9: Bridging. CSE 123: Computer Networks Alex C. Snoeren Lecture 9: Bridging CSE 123: Computer Networks Alex C. Snoeren Lecture 9 Overview Finishing up media access Ethernet Contention-free methods (rings) Moving beyond one wire Link technologies have limits

More information

CSE 461: Bridging LANs. Last Topic

CSE 461: Bridging LANs. Last Topic CSE 461: Bridging LANs Last Topic Medium Access Control (MAC) protocols Part of the Link Layer At the heart of Local Area Networks (LANs) How do multiple parties share a wire or the air? Random access

More information

Computer Networks. Shyam Gollakota

Computer Networks. Shyam Gollakota Computer Networks Shyam Gollakota Topic Some bits will be received in error due to noise. What can we do? Detect errors with codes» Correct errors with codes» Retransmit lost frames Later Reliability is

More information

Chapter 4. The Medium Access Control Sublayer. Points and Questions to Consider. Multiple Access Protocols. The Channel Allocation Problem.

Chapter 4. The Medium Access Control Sublayer. Points and Questions to Consider. Multiple Access Protocols. The Channel Allocation Problem. Dynamic Channel Allocation in LANs and MANs Chapter 4 The Medium Access Control Sublayer 1. Station Model. 2. Single Channel Assumption. 3. Collision Assumption. 4. (a) Continuous Time. (b) Slotted Time.

More information

Medium Access Control. CSCI370 Lecture 5 Michael Hutt New York Institute of Technology

Medium Access Control. CSCI370 Lecture 5 Michael Hutt New York Institute of Technology Medium Access Control CSCI370 Lecture 5 Michael Hutt New York Institute of Technology The Data Link Layer Logical Link Control (LLC) IEEE 802.2 Standard RFC 1042 Provides three service options Unreliable

More information

Random Access. 1. Aloha. 2. Slotted Aloha 3. CSMA 4. CSMA/CD

Random Access. 1. Aloha. 2. Slotted Aloha 3. CSMA 4. CSMA/CD Random Access 1. Aloha 2. Slotted Aloha 3. CSMA 4. CSMA/CD Background Communication medium B No Collision collision A C Modern Local Area Networks (LANs) operate as follows Users are connected to communication

More information

Links Reading: Chapter 2. Goals of Todayʼs Lecture. Message, Segment, Packet, and Frame

Links Reading: Chapter 2. Goals of Todayʼs Lecture. Message, Segment, Packet, and Frame Links Reading: Chapter 2 CS 375: Computer Networks Thomas Bressoud 1 Goals of Todayʼs Lecture Link-layer services Encoding, framing, and error detection Error correction and flow control Sharing a shared

More information

Medium Access Control. IEEE , Token Rings. CSMA/CD in WLANs? Ethernet MAC Algorithm. MACA Solution for Hidden Terminal Problem

Medium Access Control. IEEE , Token Rings. CSMA/CD in WLANs? Ethernet MAC Algorithm. MACA Solution for Hidden Terminal Problem Medium Access Control IEEE 802.11, Token Rings Wireless channel is a shared medium Need access control mechanism to avoid interference Why not CSMA/CD? 9/15/06 CS/ECE 438 - UIUC, Fall 2006 1 9/15/06 CS/ECE

More information

Networking Technologies and Applications

Networking Technologies and Applications Networking Technologies and Applications Rolland Vida BME TMIT September 23, 2016 Aloha Advantages: Different size packets No need for synchronization Simple operation If low upstream traffic, the solution

More information

Wireless Local Area Networks (WLANs)) and Wireless Sensor Networks (WSNs) Computer Networks: Wireless Networks 1

Wireless Local Area Networks (WLANs)) and Wireless Sensor Networks (WSNs) Computer Networks: Wireless Networks 1 Wireless Local Area Networks (WLANs)) and Wireless Sensor Networks (WSNs) Computer Networks: Wireless Networks 1 Wireless Local Area Networks The proliferation of laptop computers and other mobile devices

More information

CS/ECE 439: Wireless Networking. MAC Layer Road to Wireless

CS/ECE 439: Wireless Networking. MAC Layer Road to Wireless CS/ECE 439: Wireless Networking MAC Layer Road to Wireless Multiple Access Media Media access Controlling which frame should be sent over the link next Easy for point-to-point links; half versus full duplex

More information

CMPE 257: Wireless and Mobile Networking

CMPE 257: Wireless and Mobile Networking CMPE 257: Wireless and Mobile Networking Katia Obraczka Computer Engineering UCSC Baskin Engineering Lecture 3 CMPE 257 Spring'15 1 Next week Announcements April 14: ICN (Spencer Sevilla) April 16: DTN

More information

Wireless Local Area Networks. Networks: Wireless LANs 1

Wireless Local Area Networks. Networks: Wireless LANs 1 Wireless Local Area Networks Networks: Wireless LANs 1 Wireless Local Area Networks The proliferation of laptop computers and other mobile devices (PDAs and cell phones) created an obvious application

More information

LAN PROTOCOLS. Beulah A AP/CSE

LAN PROTOCOLS. Beulah A AP/CSE LAN PROTOCOLS Beulah A AP/CSE IEEE STANDARDS In 1985, the Computer Society of the IEEE started a project, called Project 802, to set standards to enable intercommunication among equipment from a variety

More information

Review. Error Detection: CRC Multiple access protocols. LAN addresses and ARP Ethernet. Slotted ALOHA CSMA/CD

Review. Error Detection: CRC Multiple access protocols. LAN addresses and ARP Ethernet. Slotted ALOHA CSMA/CD Review Error Detection: CRC Multiple access protocols Slotted ALOHA CSMA/CD LAN addresses and ARP Ethernet Some slides are in courtesy of J. Kurose and K. Ross Overview Ethernet Hubs, bridges, and switches

More information

CHAPTER 7 MAC LAYER PROTOCOLS. Dr. Bhargavi Goswami Associate Professor & Head Department of Computer Science Garden City College

CHAPTER 7 MAC LAYER PROTOCOLS. Dr. Bhargavi Goswami Associate Professor & Head Department of Computer Science Garden City College CHAPTER 7 MAC LAYER PROTOCOLS Dr. Bhargavi Goswami Associate Professor & Head Department of Computer Science Garden City College MEDIUM ACCESS CONTROL - MAC PROTOCOLS When the two stations transmit data

More information

ECE453 Introduction to Computer Networks. Broadcast vs. PPP. Delay. Lecture 7 Multiple Access Control (I)

ECE453 Introduction to Computer Networks. Broadcast vs. PPP. Delay. Lecture 7 Multiple Access Control (I) ECE453 Introduction to Computer Networks Lecture 7 Multiple Access Control (I) 1 Broadcast vs. PPP Broadcast channel = multiaccess channel = random access channel Broadcast LAN Satellite network PPP WAN

More information

Medium Access Protocols

Medium Access Protocols Medium Access Protocols Summary of MAC protocols What do you do with a shared media? Channel Partitioning, by time, frequency or code Time Division,Code Division, Frequency Division Random partitioning

More information

Multiple Access Links and Protocols

Multiple Access Links and Protocols Multiple Access Links and Protocols Two types of links : point-to-point PPP for dial-up access point-to-point link between Ethernet switch and host broadcast (shared wire or medium) old-fashioned Ethernet

More information

LECTURE PLAN. Script. Introduction about MAC Types o ALOHA o CSMA o CSMA/CD o CSMA/CA

LECTURE PLAN. Script. Introduction about MAC Types o ALOHA o CSMA o CSMA/CD o CSMA/CA Course- B.Sc. Applied Physical Science (Computer Science) Year- IIIrd, Sem- Vth Subject Computer Science Paper- XVIIth, Computer Networks Lecture -11 Lecture Title- Medium Access Layer Script Today in

More information

Lecture 25: CSE 123: Computer Networks Alex C. Snoeren. HW4 due NOW

Lecture 25: CSE 123: Computer Networks Alex C. Snoeren. HW4 due NOW Lecture 25: 802.11 CSE 123: Computer Networks Alex C. Snoeren HW4 due NOW Lecture 25 Overview 802.11 Wireless PHY layer overview Hidden Terminals Basic wireless challenge RTS/CTS Virtual carrier sense

More information

WiFi Networks: IEEE b Wireless LANs. Carey Williamson Department of Computer Science University of Calgary Winter 2018

WiFi Networks: IEEE b Wireless LANs. Carey Williamson Department of Computer Science University of Calgary Winter 2018 WiFi Networks: IEEE 802.11b Wireless LANs Carey Williamson Department of Computer Science University of Calgary Winter 2018 Background (1 of 2) In many respects, the IEEE 802.11b wireless LAN (WLAN) standard

More information

ECE 4450:427/527 - Computer Networks Spring 2017

ECE 4450:427/527 - Computer Networks Spring 2017 ECE 4450:427/527 - Computer Networks Spring 2017 Dr. Nghi Tran Department of Electrical & Computer Engineering Lecture 5.5: Ethernet Dr. Nghi Tran (ECE-University of Akron) ECE 4450:427/527 Computer Networks

More information

Lecture 16: QoS and "

Lecture 16: QoS and Lecture 16: QoS and 802.11" CSE 123: Computer Networks Alex C. Snoeren HW 4 due now! Lecture 16 Overview" Network-wide QoS IntServ DifServ 802.11 Wireless CSMA/CA Hidden Terminals RTS/CTS CSE 123 Lecture

More information

CSMA/CD (Collision Detection)

CSMA/CD (Collision Detection) CSMA/CD (Collision Detection) CD (collision detection): easy in wired LANs: measure signal strengths, compare transmitted, received signals difficult in wireless LANs: received signal strength overwhelmed

More information

Multiple Access Channels

Multiple Access Channels Multiple Access Channels Some Queuing Theory MAC: Aloha, ethernet Exponential backoff & friends LANs: Local Area Networks Goal: extend benefits of simple connection as far as possible Means: Share medium

More information

Topics. Link Layer Services (more) Link Layer Services LECTURE 5 MULTIPLE ACCESS AND LOCAL AREA NETWORKS. flow control: error detection:

Topics. Link Layer Services (more) Link Layer Services LECTURE 5 MULTIPLE ACCESS AND LOCAL AREA NETWORKS. flow control: error detection: 1 Topics 2 LECTURE 5 MULTIPLE ACCESS AND LOCAL AREA NETWORKS Multiple access: CSMA/CD, CSMA/CA, token passing, channelization LAN: characteristics, i basic principles i Protocol architecture Topologies

More information

Contention Protocols and Networks

Contention Protocols and Networks 4/13/2005 314 Lecture Contention Protocols and Networks 1 Contention Protocols and Networks Contention Protocols CSMA/CD Network Topologies Ethernet 4/13/2005 314 Lecture Contention Protocols and Networks

More information

MSIT 413: Wireless Technologies Week 8

MSIT 413: Wireless Technologies Week 8 MSIT 413: Wireless Technologies Week 8 Michael L. Honig Department of EECS Northwestern University November 2017 The Multiple Access Problem How can multiple mobiles access (communicate with) the same

More information

COS 140: Foundations of Computer Science

COS 140: Foundations of Computer Science COS 140: Foundations of C S Network Protocol Family Fall 2017 Copyright c 2002 2017 UMaine School of Computing and Information S 1 / 25 Homework Homework Slides, book Chapter 24 on line Homework: All exercises

More information

6.9 Summary. 11/20/2013 Wireless and Mobile Networks (SSL) 6-1. Characteristics of selected wireless link standards a, g point-to-point

6.9 Summary. 11/20/2013 Wireless and Mobile Networks (SSL) 6-1. Characteristics of selected wireless link standards a, g point-to-point Chapter 6 outline 6.1 Introduction Wireless 6.2 Wireless links, characteristics CDMA 6.3 IEEE 802.11 wireless LANs ( wi-fi ) 6.4 Cellular Internet Access architecture standards (e.g., GSM) Mobility 6.5

More information

Lecture 6 The Data Link Layer. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it

Lecture 6 The Data Link Layer. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it Lecture 6 The Data Link Layer Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it Link Layer: setting the context two physically connected devices: host-router, router-router, host-host,

More information

MAC LAYER. Murat Demirbas SUNY Buffalo

MAC LAYER. Murat Demirbas SUNY Buffalo MAC LAYER Murat Demirbas SUNY Buffalo MAC categories Fixed assignment TDMA (Time Division), CDMA (Code division), FDMA (Frequency division) Unsuitable for dynamic, bursty traffic in wireless networks Random

More information

Final Review Fall 2017 Profs Peter Steenkiste & Justine Sherry

Final Review Fall 2017 Profs Peter Steenkiste & Justine Sherry Final Review 15-441 Fall 2017 Profs Peter Steenkiste & Justine Sherry Facts The Final is next week. It mostly covers things after the midterm, but there is significant material from before. There were

More information

Outline. Introduction to Networked Embedded Systems - Embedded systems Networked embedded systems Embedded Internet - Network properties

Outline. Introduction to Networked Embedded Systems - Embedded systems Networked embedded systems Embedded Internet - Network properties Outline Introduction to Networked Embedded Systems - Embedded systems Networked embedded systems Embedded Internet - Network properties Layered Network Architectures - OSI framework descriptions of layers

More information

Lecture 5 The Data Link Layer. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it

Lecture 5 The Data Link Layer. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it Lecture 5 The Data Link Layer Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it Link Layer: setting the context two physically connected devices: host-router, router-router, host-host,

More information

Multiple Access Protocols

Multiple Access Protocols Multiple Access Protocols Computer Networks Lecture 2 http://goo.gl/pze5o8 Multiple Access to a Shared Channel The medium (or its sub-channel) may be shared by multiple stations (dynamic allocation) just

More information

Opera.ng Systems and Networks. Network Lecture 4: Link Layer (2) Where we are in the Course. Topics. Topics (2) Retransmissions (ARQ) ( 3.

Opera.ng Systems and Networks. Network Lecture 4: Link Layer (2) Where we are in the Course. Topics. Topics (2) Retransmissions (ARQ) ( 3. Opera.ng Systems and Networks Network Lecture 4: Link Layer (2) Adrian Perrig Network Security Group ETH Zürich Pending Issues How to read the course textbook? How to prepare for the exam given that there

More information

Wireless MACs: MACAW/802.11

Wireless MACs: MACAW/802.11 Wireless MACs: MACAW/802.11 Mark Handley UCL Computer Science CS 3035/GZ01 Fundamentals: Spectrum and Capacity A particular radio transmits over some range of frequencies; its bandwidth, in the physical

More information

CS 3640: Introduction to Networks and Their Applications

CS 3640: Introduction to Networks and Their Applications CS 3640: Introduction to Networks and Their Applications Fall 2018, Lecture 7: The Link Layer II Medium Access Control Protocols Instructor: Rishab Nithyanand Teaching Assistant: Md. Kowsar Hossain 1 You

More information

Lecture 24: CSE 123: Computer Networks Stefan Savage. HW4 due NOW

Lecture 24: CSE 123: Computer Networks Stefan Savage. HW4 due NOW Lecture 24: 802.11 CSE 123: Computer Networks Stefan Savage HW4 due NOW About the final Similar in style to midterm Some combination of easy questions, short answer and more in-depth questions Sample final

More information

Ethernet. Typical Setup. Names. Operations. Operations Switch: No Collisions EECS 122. Hub: Single Collision Domain

Ethernet. Typical Setup. Names. Operations. Operations Switch: No Collisions EECS 122. Hub: Single Collision Domain Overview Physical Layer MAC Bridged VLAN Link Aggregation XON/XOFF 802.11 Summary Overview Typical Setup Names Operations Perspective TOC TOC Overview Typical Setup Names Structure [rate][modulation][media

More information

standard. Acknowledgement: Slides borrowed from Richard Y. Yale

standard. Acknowledgement: Slides borrowed from Richard Y. Yale 802.11 standard Acknowledgement: Slides borrowed from Richard Y. Yang @ Yale IEEE 802.11 Requirements Design for small coverage (e.g. office, home) Low/no mobility High data rate applications Ability to

More information

Long Distance Wireless Communication. Principally satellite communication:

Long Distance Wireless Communication. Principally satellite communication: Long Distance Wireless Communication Principally satellite communication: Uplink/Downlink Footprint LOS (line of sight) communication satellite base station is relay Effective for broadcast Limited bandwidth

More information

Wireless Communications

Wireless Communications 4. Medium Access Control Sublayer DIN/CTC/UEM 2018 Why do we need MAC for? Medium Access Control (MAC) Shared medium instead of point-to-point link MAC sublayer controls access to shared medium Examples:

More information

Ethernet. Lecture 6. Outline. Ethernet - Physical Properties. Ethernet - Physical Properties. Ethernet

Ethernet. Lecture 6. Outline. Ethernet - Physical Properties. Ethernet - Physical Properties. Ethernet Lecture 6 Ethernet Reminder: Homework 2, Programming Project 2 due on 9/20/12. Thick-net Thin-net Twisted Pair Thursday, September 13 CS 475 Networks - Lecture 6 1 Thursday, September 13 CS 475 Networks

More information

15-441: Computer Networking. Wireless Networking

15-441: Computer Networking. Wireless Networking 15-441: Computer Networking Wireless Networking Outline Wireless Challenges 802.11 Overview Link Layer Ad-hoc Networks 2 Assumptions made in Internet Host are (mostly) stationary Address assignment, routing

More information

Strengthening Unlicensed Band Wireless Backhaul

Strengthening Unlicensed Band Wireless Backhaul be in charge Strengthening Unlicensed Band Wireless Backhaul Use TDD/TDMA Based Channel Access Mechanism WHITE PAPER Strengthening Unlicensed Band Wireless Backhaul: Use TDD/TDMA Based Channel Access Mechanism

More information

CSC 4900 Computer Networks: The Link Layer

CSC 4900 Computer Networks: The Link Layer CSC 4900 Computer Networks: The Link Layer Professor Henry Carter Fall 2017 Last Time We talked about intra-as routing protocols: Which routing algorithm is used in RIP? OSPF? What techniques allow OSPF

More information

Lecture 12 December 04, Wireless Access. Graduate course in Communications Engineering. University of Rome La Sapienza. Rome, Italy

Lecture 12 December 04, Wireless Access. Graduate course in Communications Engineering. University of Rome La Sapienza. Rome, Italy Lecture 12 December 04, 2017 Wireless Access Graduate course in Communications Engineering University of Rome La Sapienza Rome, Italy 2017-2018 Random Medium Access Control Part II - CSMA and Collision

More information

Principles behind data link layer services

Principles behind data link layer services Data link layer Goals: Principles behind data link layer services Error detection, correction Sharing a broadcast channel: Multiple access Link layer addressing Reliable data transfer, flow control: Done!

More information

Rahman 1. Application

Rahman 1. Application Data Link layer Overview of IEEE 802.11 Application Presentation Session Transport LLC: On transmission, assemble data into a frame with address and CRC fields. On reception, disassemble frame, perform

More information

The Link Layer and LANs. Chapter 6: Link layer and LANs

The Link Layer and LANs. Chapter 6: Link layer and LANs The Link Layer and LANs EECS3214 2018-03-14 4-1 Chapter 6: Link layer and LANs our goals: understand principles behind link layer services: error detection, correction sharing a broadcast channel: multiple

More information

Unit 7 Media Access Control (MAC)

Unit 7 Media Access Control (MAC) Unit 7 Media Access Control (MAC) 1 Internet Model 2 Sublayers of Data Link Layer Logical link control (LLC) Flow control Error control Media access control (MAC) access control 3 Categorization of MAC

More information

Summary of MAC protocols

Summary of MAC protocols Summary of MAC protocols What do you do with a shared media? Channel Partitioning, by time, frequency or code Time Division, Code Division, Frequency Division Random partitioning (dynamic) ALOHA, S-ALOHA,

More information

ECE 4450:427/527 - Computer Networks Spring 2017

ECE 4450:427/527 - Computer Networks Spring 2017 ECE 4450:427/527 - Computer Networks Spring 2017 Dr. Nghi Tran Department of Electrical & Computer Engineering Lecture 5.4: Multiple Access Protocols Dr. Nghi Tran (ECE-University of Akron) ECE 4450:427/527

More information

CS 123: Lecture 12, LANs, and Ethernet. George Varghese. October 24, 2006

CS 123: Lecture 12, LANs, and Ethernet. George Varghese. October 24, 2006 CS 123: Lecture 12, LANs, and Ethernet George Varghese October 24, 2006 Selective Reject Modulus failure Example w = 2, Max = 3 0 0 1 3 0 A(1) A(2) 1 0 retransmit A(1) A(2) buffer Case 1 Case 2 reject

More information

MULTIPLE ACCESS PROTOCOLS 2. 1

MULTIPLE ACCESS PROTOCOLS 2. 1 MULTIPLE ACCESS PROTOCOLS AND WIFI 1 MULTIPLE ACCESS PROTOCOLS 2. 1 MULTIPLE ACCESS LINKS, PROTOCOLS Two types of links : point-to-point broadcast (shared wire or medium) POINT-TO-POINT PPP for dial-up

More information

Module 10 Data Link Layer CS655! 10-1!

Module 10 Data Link Layer CS655! 10-1! Module 10 Data Link Layer CS655! 10-1! Please note: Most of these slides come from this book. Note their copyright notice below! A note on the use of these ppt slides: We re making these slides freely

More information

CSMC 417. Computer Networks Prof. Ashok K Agrawala Ashok Agrawala Set 5. February 12 CMSC417 Set 5 1

CSMC 417. Computer Networks Prof. Ashok K Agrawala Ashok Agrawala Set 5. February 12 CMSC417 Set 5 1 CSMC 417 Computer Networks Prof. Ashok K Agrawala 2012 Ashok Agrawala Set 5 February 12 CMSC417 Set 5 1 The Medium Access Control Sublayer February 12 CMSC417 Set 5 2 Medium Access Control Sublayer Channel

More information

Data Link Layer: Overview, operations

Data Link Layer: Overview, operations Data Link Layer: Overview, operations Chapter 3 1 Outlines 1. Data Link Layer Functions. Data Link Services 3. Framing 4. Error Detection/Correction. Flow Control 6. Medium Access 1 1. Data Link Layer

More information

Chapter 4. The Medium Access Control Sublayer

Chapter 4. The Medium Access Control Sublayer Chapter 4 The Medium Access Control Sublayer The Channel Allocation Problem Static Channel Allocation in LANs and MANs Dynamic Channel Allocation in LANs and MANs Dynamic Channel Allocation in LANs and

More information

CSCI-1680 Link Layer Wrap-Up Rodrigo Fonseca

CSCI-1680 Link Layer Wrap-Up Rodrigo Fonseca CSCI-1680 Link Layer Wrap-Up Rodrigo Fonseca Based partly on lecture notes by David Mazières, Phil Levis, John Jannotti Administrivia Homework I out later today, due next Thursday Today: Link Layer (cont.)

More information

The Link Layer II: Ethernet

The Link Layer II: Ethernet Monday Recap The Link Layer II: Ethernet q Link layer services q Principles for multiple access protocols q Categories of multiple access protocols CSC 249 March 24, 2017 1 2 Recap: Random Access Protocols

More information

College of Computer and Information Sciences Department of Computer Engineering CEN444 Computer Networks Midterm 2 Exam Second Semester 1434/1435

College of Computer and Information Sciences Department of Computer Engineering CEN444 Computer Networks Midterm 2 Exam Second Semester 1434/1435 College of Computer and Information Sciences Department of Computer Engineering CEN444 Computer Networks Midterm 2 Exam Second Semester 1434/1435 Student Name ID Time Allowed: 2.0 Hours. Closed Book, Closed

More information

CSCI-1680 Link Layer Wrap-Up Rodrigo Fonseca

CSCI-1680 Link Layer Wrap-Up Rodrigo Fonseca CSCI-1680 Link Layer Wrap-Up Rodrigo Fonseca Based partly on lecture notes by David Mazières, Phil Levis, John Janno< Administrivia Homework I out later today, due next Thursday, Sep 25th Today: Link Layer

More information

COMP/ELEC 429/556 Introduction to Computer Networks

COMP/ELEC 429/556 Introduction to Computer Networks COMP/ELEC 429/556 Introduction to Computer Networks Broadcast network access control Some slides used with permissions from Edward W. Knightly, T. S. Eugene Ng, Ion Stoica, Hui Zhang T. S. Eugene Ng eugeneng

More information