Local Networks. Lecture 4 6-Apr-2016

Size: px
Start display at page:

Download "Local Networks. Lecture 4 6-Apr-2016"

Transcription

1 Local Networks Lecture 4 6-Apr-2016

2 Roadmap of the Course So far Basic telecom concepts General study of LANs LAN topologies Flow and error control Today we continue the general study of LANs Medium access methods Logical link control

3 Medium Access Control (MAC) Methods

4 Medium Access Methods In LANs all stations are connected to a shared transmission medium Simultaneous attempts to access the medium by more than 1 station possible (=> collision) To prevent the above situation, each protocol has a MAC method (Medium Access Control) Station follows some procedure when it needs to send frames No conflicts between stations thus ensured

5 Types of methods

6 Random access methods No station controls other stations Also named contention methods Stations compete with each other A station with data to send Applies a protocol-related procedure for deciding whether or not to transmit Decision may depend on medium state (idle or busy)

7 Collision When more than one station tries to transmit => access conflict => frames will be destroyed or modified This access conflict is called collision

8 Procedures issues When should station access the medium? What should station do if medium is busy? How should station determine success or failure of a transmission? What should station do when there is an access conflict? Note: Broadcasting provides feedback A sender can always find out whether its transmitted frame was destroyed, by listening to the channel, as all the other stations do LAN immediate feedback, satellite system about 270 ms delay

9 Random access methods

10 Multiple access (MA) methods ALOHA-type methods Earliest and simplest, least efficient Designed in early 70s, to be used in communication at University of Hawaii Wireless (radio) LAN

11 ALOHA Originally: ground-based radio broadcasting, on 2 frequencies one for sending data, one for receiving ACKs Basic idea works for any system with uncoordinated users competing for a single shared channel Two versions: pure and slotted

12 ALOHA rules Multiple access No carrier sense No checking for collision Acknowledgement (explicit or implicit) Ack should arrive in the allotted time (two times the maximum propagation delay) Otherwise frame has to be resent After waiting a random amount of time

13 Pure ALOHA Users transmit whenever they have data to send There will be collisions, collided frames damaged Sender finds out if transmission was successful With feedback property With acknowledgements If frame collided, sender waits random amount of time and sends again Called backoff strategy Efficiency of such channel allocation: 18%

14 Pure ALOHA procedure

15 Pure ALOHA s vulnerable time Time interval during which collision can occur

16 Slotted ALOHA Time divided into slots, each slot corresponds to one frame Agreement on slot boundaries needed (synchronization) One special station can emit a beep at the start of each slot Users send at the beginning of slots only Vulnerable period is halved when compared to pure ALOHA => double efficiency: 37%

17 Slotted ALOHA illustration

18 Slotted ALOHA s vulnerable time

19 Carrier Sense Multiple Access (CSMA) methods The medium is sensed by each station before trying to use it Chance of collision reduced => performance increased Collisions can still appear Due to propagation delays Vulnerable time in CSMA = propagation time T prop Time needed for a signal to propagate from one end of the medium to the other

20 Collisions in CSMA

21 CSMA methods Several types Persistent (and p-persistent) Non-persistent CSMA with collision detection (CSMA/CD) CSMA with collision avoidance (CSMA/CA)

22 Non-persistent CSMA Station senses the channel If channel idle station starts transmitting If channel busy, station waits a random amount of time and then it senses the channel again Better efficiency than persistent CSMA s Unlikely that two stations wait the same amount of random time Reduces the network s efficiency Idle medium while stations have frames to send

23 Non-persistent CSMA illustration

24 (1-)Persistent CSMA When a station has to send, it first listens to the channel If channel busy, station waits until it becomes idle If channel idle, station transmits frame (probability 1) If collision occurs, a random amount of time passes and everything starts over again Better than ALOHAs; used in Ethernet

25 (1-)Persistent CSMA illustration

26 p-persistent CSMA Applies to slotted channels Station senses channel and if idle: Transmits with probability p Defers transmission until next slot with probability q=1-p At next slot, if idle, same thing Algorithm repeated until frame transmitted or another station begins transmission If channel busy, station waits a random time and senses again Better performances for small p

27 p-persistent CSMA illustration

28 Channel utilization versus load

29 CSMA / CD Different improvement when compared to ALOHA Stations abort transmission as soon as they detect a collision => saves time and bandwidth Widely used on LANs MAC (basis of Ethernet) Model At t 0 some station finished transmission Any other station may start transmitting => collisions may occur After a detected collision, stations wait a random time and start sending again, sensing the channel first When does a frame know it sent successfully?

30 CSMA/CD 2 Minimum time to detect a collision Time needed for a signal to propagate from a station to another Worst case scenario τ the time needed for a signal to propagate between farthest stations It takes 2τ until a station is certain it seized the channel (if transmits for 2τ without hearing a collision, then it is sure) A sending station must continually monitor the channel To listen for noise bursts indicating a collision CSMA/CD inherently a half-duplex system

31 Collision detection

32 CSMA/CD illustration

33 (Truncated) binary exponential backoff algorithm Used by all collision-detecting stations to calculate their individual retransmission delay (backoff delay) after 1 st collision each station waits 0 or 1 slot times before trying again; if each station picks the same random number, they will collide again after 2 nd collision each station picks 0,1,2, or 3 slot times before trying again, and waits that number of slot times if a 3 rd collision occurs, the next time number of slots to wait is chosen randomly by each station from the interval 0 to after i collisions, a random number between 0 to 2 i -1 is chosen, and that number of slots is skipped after 10 collisions the randomization interval is frozen at a maximum of 1023 slots after 16 collisions a failure is reported and recovery is up to higher layers

34 (Truncated) binary exponential backoff algorithm 2 The algorithm dynamically adapts to the number of stations trying to send If randomization interval for all collisions was 1023 the chance for two stations to collide for a second time: negligible the average wait after a collision: hundreds of slot times => delay If each station always delayed for 0 or 1 slots stations would collide again and again The algorithm ensures a low delay when only few stations collide Also ensures collision is resolved in reasonable interval when many stations collide Truncating the backoff at 1023 keeps the bound from growing too large

35 CSMA/CA No collision, collisions are avoided If line idle, it waits an Inter Frame Gap (IFG) time interval, then a random amount of time, then sends frame and sets timer Station waits for ACK from receiver If received before timer expires => success If not => failed; increases backoff parameter, waits a backoff time interval and senses line Used in wireless LANs

36 CSMA/CA illustration

37 Controlled access Stations consult each other to see which has the right to send One station then sends Being authorized by the rest Example: token passing

38 Token passing

39 Token passing illustration (simplified)

40 A Bitmap protocol Collision-free protocols avoid collisions entirely Senders must know when it is their turn to send The basic bit-map protocol: Sender set a bit in contention slot if they have data Senders send in turn; everyone knows who has data CN5E by Tanenbaum & Wetherall, Pearson Education-Prentice Hall and D. Wetherall, 2011

41 Binary Countdown protocol Binary countdown improves on the bitmap protocol Stations send their address in contention slot (log N bits instead of N bits) Medium ORs bits; stations give up when they send a 0 but see a 1 Station that sees its full address is next to send CN5E by Tanenbaum & Wetherall, Pearson Education-Prentice Hall and D. Wetherall, 2011

42 Limited-Contention Protocols Performance measures delay at low load channel efficiency at high load Contention strategies - Light load: contention preferred - it has low delay and collisions are rare - High load: contention less atractive - overhead associated with channel arbitration Collision-free - Light load - relatively high delay - High load - channel effciency improves, as overheads are fixed it would be nice to combine the advantages of both contention at low load to get low delay collision free at high load for good channel efficiency

43 Limited-Contention Protocols Idea is to divide stations into groups within which only a very small number are likely to want to send Avoids wastage due to idle periods and collisions Already too many contenders for a good chance of one winner CN5E by Tanenbaum & Wetherall, Pearson Education-Prentice Hall and D. Wetherall, 2011

44 Limited-Contention Protocols: how? To increase probability of success for station i Decrease competition amount Divide stations into groups Can be non-disjoint Only members of group 0 can compete for slot 0 If one succeeds, it transmits If not, or nothing to submit, group 1 contends for slot 1, etc Key: appropriate division into groups Dynamic is better many stations per slot when load is low Few (even one) stations per slot when load is high

45 Limited Contention Adaptive Tree Walk Tree divides stations into groups (nodes) to poll Depth first search under nodes with poll collisions Start search at lower levels if >1 station expected Level 0 Level 1 Level 2 CN5E by Tanenbaum & Wetherall, Pearson Education-Prentice Hall and D. Wetherall, 2011

46 Wireless LAN Protocols (1) Wireless has complications compared to wired Cannot detect collisions acknowledgements used A station may not be able to transmit to/to receive from all other stations limited radio range CN5E by Tanenbaum & Wetherall, Pearson Education-Prentice Hall and D. Wetherall, 2011

47 Wireless LANs (2) Hidden terminals Hidden terminals are senders that cannot sense each other but nonetheless collide at intended receiver Want to prevent; loss of efficiency A and C are hidden terminals when sending to B CN5E by Tanenbaum & Wetherall, Pearson Education-Prentice Hall and D. Wetherall, 2011

48 Wireless LANs (3) Exposed terminals Exposed terminals are senders who can sense each other but still transmit safely (to different receivers) Desirably concurrency; improves performance B A and C D are exposed terminals CN5E by Tanenbaum & Wetherall, Pearson Education-Prentice Hall and D. Wetherall, 2011

49 Wireless LANs (4) MACA MACA protocol grants access for A to send to B: A sends RTS to B [left]; B replies with CTS [right] C can send while the data frame is being sent if not interfering; D and E must be silent until data frame sent completely A sends RTS to B; C and E hear and defer for CTS B replies with CTS; D and E hear and defer for data CN5E by Tanenbaum & Wetherall, Pearson Education-Prentice Hall and D. Wetherall, 2011

50 Logical Link Control

51 IEEE 802 Project 1985: IEEE Computer Society started the 802 Project Standard to enable LAN intercommunication from a variety of manufacturers Specifies functions of PhL and DLL of major LAN Protocols

52 IEEE 802 working groups Number Topic Overview and architecture of LANs Logical link control * Ethernet Token bus (was briefly used in manufacturing plants) Token ring (IBM's entry into the LAN world) Dual queue dual bus (early metropolitan area network) Technical advisory group on broadband technologies Technical advisory group on fiber optic technologies Isochronous LANs (for real-time applications) Virtual LANs and security * Wireless LANs (WiFi) Demand priority (Hewlett-Packard's AnyLAN) Unlucky number; nobody wanted it Cable modems (defunct: an industry consortium got there first) * Personal area networks (Bluetooth, Zigbee) * Broadband wireless (WiMAX) Resilient packet ring Technical advisory group on radio regulatory issues Technical advisory group on coexistence of all these standards Mobile broadband wireless (similar to e) Media independent handoff (for roaming over technologies) Wireless regional area network

53 IEEE Standard and OSI model

54 IEEE Standards for LANs

55 Logical Link Control (LLC) Generic sublayer, part of the data link layer Allows interoperability between different LAN protocols

56 LLC functions LLC connects together LANs with different protocols LLC hides the LAN-specific aspects to upper layers Access method, encoding, signaling, transmission media LLC adds reliability by supervising MAC frames MAC sublayer provides a virtual unreliable link LLC can be present or not in a network

57 Multiplexing using LLC When stations use multiple upper layer protocols (e.g. IP and IPX)

58 LLC services LLC supplies services to the user of the LAN (typically the network layer)

59 LLC service types

60 Service primitives (message exchanges)

61 Unacknowledged connectionless service User passes data unit without making any connection nor expecting any ACK

62 Acknowledged connectionless service User gets ACK for data transfer

63 Connection-oriented service Connection established, data exchange, connection released

64 Connection-oriented service, data transfer

65 Connection-oriented service, disconnection

66 Connection-oriented service, other primitives Resetting the connection If either user believes something is wrong (e.g., synchronization) Flow control LLC user can indicate how much data should be passed between entities in the next data transfer

67 LLC protocol Defines the format of data units sent between 2 LLCs Data unit: PDU (protocol data unit) Information PDU: I-PDU Transport user data in connection-oriented services Supervisory PDU: S-PDU Flow and error control Unnumbered PDU: U-PDU Carry data in connectionless services and management information in connection-oriented services

68 PDUs

69 PDU format 4 fields: destination service access point (DSAP), source service access point (SSAP), control, and information

70 DSAP and SSAP Addresses used by LLC Identify protocol stacks on receiving and sending machine

71 Control field First one/two bits define the PDU type

72 I-PDU N(S) specifies number of PDU being sent Its own identifying number N(R) specifies number of PDU being expected Implies two-way exchange (with piggybacking) ACK field referring to a previous correct reception of PDUs until the next expected one NAK field referring to a previous incorrect reception of the respective PDU

73 S-PDU N(R) is used when receiver has no data of its own to send S-PDUs do not transmit data Hence do not need N(S) to identify them Code refers to some coded flow and error control information

74 U-PDU Has neither N(S) nor N(R) Has 2 code fields, one 2-bit long, another 3-bit long

75 P/F bit Stands for poll/final, single bit with dual purpose Has meaning only when set (bit=1) It means poll when a PDU is sent by a primary station to a secondary one Address field contains the receiver s address It means final when a PDU is sent by a secondary station to a primary one Address field contains the sender s address In some protocols is used to force the other machine to send a Supervisory frame immediately, rather than waiting for reverse traffic and piggyback

76 Information field Used to carry The data sent from an upper layer Management information needed for LLC operation Possible to include flow/error/other control information in I-PDUs Combining data to be sent with control information: piggybacking

77 More on PDUs I-PDU designed for user information transport and piggybacked ACKs S-PDU Used for ACKs, flow control, error control when piggybacking is not appropriate No information in the information field, but still carry messages to receiver Messages based on S-PDU type and transmission context

78 More on S-PDUs Receive ready (RR,00): receiving station returns ACK of a received I-PDU In this case receiver has no data of its own to send N(R) contains the sequence number of next expected PDU Receive not ready (RNR,01): receiver returns ACK for all PDUs except the one in N(R) Also requests that no more PDUs be sent until a RR S-PDU is issued Reject (REJ,10): NAK returned by a receiver in a goback-n ARQ system When receiver has no data on which to piggyback the response N(R) contains the number of damaged PDU => that PDU and all that follow need to be retransmitted Selective reject (SRJ,11): requires the retransmission of specified frame

79 More on U-PDUs Unnumbered PDUs used for exchanging User information Management and control information between connected devices Much of the carried information contained in the control field codes

80 PDUs in unacknowledged connectionless service This service uses 3 unnumbered PDUs UI, XID, TEST XID: exchange IDs; TEST: loopback test

81 PDUs in acknowledged connectionless service This service uses only one unnumbered PDU AC: acknowledged connectionless information

82 PDUs in connection-oriented service This service uses all 3 types of PDUs

83 Data transfer

84 Piggybacking

85 Disconnection

Telecommunication Protocols Laboratory Course. Lecture 2

Telecommunication Protocols Laboratory Course. Lecture 2 Telecommunication Protocols Laboratory Course Lecture 2 Last time We began our study of telecommunication protocols at the Logical Link Control sub-layer (LLC) LLC issues Connectionless vs connection-oriented

More information

Chapter 12 Multiple Access 12.1

Chapter 12 Multiple Access 12.1 Chapter 12 Multiple Access 12.1 Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. 12.2 Figure 12.1 Data link layer divided into two functionality-oriented sublayers

More information

CHAPTER 7 MAC LAYER PROTOCOLS. Dr. Bhargavi Goswami Associate Professor & Head Department of Computer Science Garden City College

CHAPTER 7 MAC LAYER PROTOCOLS. Dr. Bhargavi Goswami Associate Professor & Head Department of Computer Science Garden City College CHAPTER 7 MAC LAYER PROTOCOLS Dr. Bhargavi Goswami Associate Professor & Head Department of Computer Science Garden City College MEDIUM ACCESS CONTROL - MAC PROTOCOLS When the two stations transmit data

More information

Jaringan Komputer. Broadcast Network. Outline. MAC (Medium Access Control) Channel Allocation Problem. Dynamic Channel Allocation

Jaringan Komputer. Broadcast Network. Outline. MAC (Medium Access Control) Channel Allocation Problem. Dynamic Channel Allocation Broadcast Network Jaringan Komputer Medium Access Control Sublayer 2 network categories: point-to-point connections broadcast channels Key issue in broadcast network: how to determine who gets to use the

More information

ECEN 5032 Data Networks Medium Access Control Sublayer

ECEN 5032 Data Networks Medium Access Control Sublayer ECEN 5032 Data Networks Medium Access Control Sublayer Peter Mathys mathys@colorado.edu University of Colorado, Boulder c 1996 2005, P. Mathys p.1/35 Overview (Sub)networks can be divided into two categories:

More information

The Medium Access Control Scheme (MAC Layer) Reference: Andrew S. Tanenbaum, Computer Networks, 3rd Edition, Prentice Hall, 1996.

The Medium Access Control Scheme (MAC Layer) Reference: Andrew S. Tanenbaum, Computer Networks, 3rd Edition, Prentice Hall, 1996. The Medium Access Control Scheme (MAC Layer) Reference: Andrew S. Tanenbaum, Computer Networks, 3rd Edition, Prentice Hall, 1996. 1 Table of Contents Introduction ALOHA Carrier Sense Multiple Sense (CSMA)

More information

Data Link Layer -2- Network Access

Data Link Layer -2- Network Access EITF25 Internet: Technology and Applications Data Link Layer -2- Network Access 2015, Lecture 03 Kaan Bür Previously on EITF25 Logical Link Control Sublayer Flow control Send data Wait for ACK Error control

More information

Aloha and slotted aloha

Aloha and slotted aloha CSMA 2/13/06 Aloha and slotted aloha Slotted aloha: transmissions are synchronized and only start at the beginning of a time slot. Aloha sender A sender B collision sender C t Slotted Aloha collision sender

More information

Multiple Access Protocols

Multiple Access Protocols Multiple Access Protocols Computer Networks Lecture 2 http://goo.gl/pze5o8 Multiple Access to a Shared Channel The medium (or its sub-channel) may be shared by multiple stations (dynamic allocation) just

More information

Medium Access Control Sublayer Chapter 4

Medium Access Control Sublayer Chapter 4 Medium Access Control Sublayer Chapter 4 Channel Allocation Problem Multiple Access Protocols Ethernet Wireless LANs Broadband Wireless Bluetooth RFID Data Link Layer Switching Revised: August 2011 & February

More information

Data Link Layer: Collisions

Data Link Layer: Collisions Data Link Layer: Collisions 1 Multiple Access Data Link layer divided into two sublayers. The upper sublayer is responsible for datalink control, The lower sublayer is responsible for resolving access

More information

Data Link Layer -2- Network Access

Data Link Layer -2- Network Access EITF25 Internet: Technology and Applications Data Link Layer -2- Network Access 2013, Lecture 03 Kaan Bür, Stefan Höst Previously on EITF25 Logical Link Control Sublayer Flow control Send data Wait for

More information

LANs Local Area Networks LANs provide an efficient network solution : To support a large number of stations Over moderately high speed

LANs Local Area Networks LANs provide an efficient network solution : To support a large number of stations Over moderately high speed Local Area Networks LANs provide an efficient network solution : To support a large number of stations Over moderately high speed With relatively small bit errors Multiaccess Protocols Communication among

More information

CS 43: Computer Networks. 27: Media Access Contd. December 3, 2018

CS 43: Computer Networks. 27: Media Access Contd. December 3, 2018 CS 43: Computer Networks 27: Media Access Contd. December 3, 2018 Last Class The link layer provides lots of functionality: addressing, framing, media access, error checking could be used independently

More information

Chapter 4. The Medium Access Control Sublayer. Points and Questions to Consider. Multiple Access Protocols. The Channel Allocation Problem.

Chapter 4. The Medium Access Control Sublayer. Points and Questions to Consider. Multiple Access Protocols. The Channel Allocation Problem. Dynamic Channel Allocation in LANs and MANs Chapter 4 The Medium Access Control Sublayer 1. Station Model. 2. Single Channel Assumption. 3. Collision Assumption. 4. (a) Continuous Time. (b) Slotted Time.

More information

CS 43: Computer Networks Media Access. Kevin Webb Swarthmore College November 30, 2017

CS 43: Computer Networks Media Access. Kevin Webb Swarthmore College November 30, 2017 CS 43: Computer Networks Media Access Kevin Webb Swarthmore College November 30, 2017 Multiple Access Links & Protocols Two classes of links : point-to-point dial-up access link between Ethernet switch,

More information

Computer Networks. Today. Principles of datalink layer services Multiple access links Adresavimas, ARP LANs Wireless LANs VU MIF CS 1/48 2/48

Computer Networks. Today. Principles of datalink layer services Multiple access links Adresavimas, ARP LANs Wireless LANs VU MIF CS 1/48 2/48 Computer Networks VU MIF CS 1/48 Today Principles of datalink layer services Multiple access links Adresavimas, ARP LANs Wireless LANs 2/48 1 Link layer: introduction terminology: hosts and routers: nodes

More information

CSE 461: Multiple Access Networks. This Lecture

CSE 461: Multiple Access Networks. This Lecture CSE 461: Multiple Access Networks This Lecture Key Focus: How do multiple parties share a wire? This is the Medium Access Control (MAC) portion of the Link Layer Randomized access protocols: 1. Aloha 2.

More information

Chapter 4 (Week 7) The Medium Access Control Sublayer ANDREW S. TANENBAUM COMPUTER NETWORKS FOURTH EDITION PP CN&DC Dr.

Chapter 4 (Week 7) The Medium Access Control Sublayer ANDREW S. TANENBAUM COMPUTER NETWORKS FOURTH EDITION PP CN&DC Dr. Chapter 4 (Week 7) The Medium Access Control Sublayer ANDREW S. TANENBAUM COMPUTER NETWORKS FOURTH EDITION PP. 247-292 1 4.1. THE CHANNEL ALLOCATION PROBLEM 4.2. MULTIPLE ACCESS PROTOCOLS 4.3. ETHERNET

More information

Multiple Access. Data Communications and Networking

Multiple Access. Data Communications and Networking Multiple Access In the previous part we discussed data link control, a mechanism which provides a link with reliable communication. In the protocols we described, we assumed that there is an available

More information

ECE453 Introduction to Computer Networks. Broadcast vs. PPP. Delay. Lecture 7 Multiple Access Control (I)

ECE453 Introduction to Computer Networks. Broadcast vs. PPP. Delay. Lecture 7 Multiple Access Control (I) ECE453 Introduction to Computer Networks Lecture 7 Multiple Access Control (I) 1 Broadcast vs. PPP Broadcast channel = multiaccess channel = random access channel Broadcast LAN Satellite network PPP WAN

More information

LANs. Local Area Networks. via the Media Access Control (MAC) SubLayer. Networks: Local Area Networks

LANs. Local Area Networks. via the Media Access Control (MAC) SubLayer. Networks: Local Area Networks LANs Local Area Networks via the Media Access Control (MAC) SubLayer 1 Local Area Networks Aloha Slotted Aloha CSMA (non-persistent, 1-persistent, p-persistent) CSMA/CD Ethernet Token Ring 2 Network Layer

More information

CMPE 257: Wireless and Mobile Networking

CMPE 257: Wireless and Mobile Networking CMPE 257: Wireless and Mobile Networking Katia Obraczka Computer Engineering UCSC Baskin Engineering Lecture 3 CMPE 257 Winter'11 1 Announcements Accessing secure part of the class Web page: User id: cmpe257.

More information

Unit 7 Media Access Control (MAC)

Unit 7 Media Access Control (MAC) Unit 7 Media Access Control (MAC) 1 Internet Model 2 Sublayers of Data Link Layer Logical link control (LLC) Flow control Error control Media access control (MAC) access control 3 Categorization of MAC

More information

Local Area Networks (LANs) SMU CSE 5344 /

Local Area Networks (LANs) SMU CSE 5344 / Local Area Networks (LANs) SMU CSE 5344 / 7344 1 LAN/MAN Technology Factors Topology Transmission Medium Medium Access Control Techniques SMU CSE 5344 / 7344 2 Topologies Topology: the shape of a communication

More information

EITF25 Internet Techniques and Applications L4: Network Access. Stefan Höst

EITF25 Internet Techniques and Applications L4: Network Access. Stefan Höst EITF25 Internet Techniques and Applications L4: Network Access Stefan Höst Repetition The link layer protocol should make sure that the data is correctly transmitted over the physical link using error

More information

ICE 1332/0715 Mobile Computing (Summer, 2008)

ICE 1332/0715 Mobile Computing (Summer, 2008) ICE 1332/0715 Mobile Computing (Summer, 2008) Medium Access Control Prof. Chansu Yu http://academic.csuohio.edu/yuc/ Simplified Reference Model Application layer Transport layer Network layer Data link

More information

High Level View. EE 122: Ethernet and Random Access protocols. Medium Access Protocols

High Level View. EE 122: Ethernet and Random Access protocols. Medium Access Protocols High Level View EE 122: Ethernet and 802.11 Ion Stoica September 18, 2002 Goal: share a communication medium among multiple hosts connected to it Problem: arbitrate between connected hosts Solution goals:

More information

Medium Access Control. CSCI370 Lecture 5 Michael Hutt New York Institute of Technology

Medium Access Control. CSCI370 Lecture 5 Michael Hutt New York Institute of Technology Medium Access Control CSCI370 Lecture 5 Michael Hutt New York Institute of Technology The Data Link Layer Logical Link Control (LLC) IEEE 802.2 Standard RFC 1042 Provides three service options Unreliable

More information

CSCD 433 Network Programming Fall Lecture 7 Ethernet and Wireless

CSCD 433 Network Programming Fall Lecture 7 Ethernet and Wireless CSCD 433 Network Programming Fall 2016 Lecture 7 Ethernet and Wireless 802.11 1 Topics 802 Standard MAC and LLC Sublayers Review of MAC in Ethernet MAC in 802.11 Wireless 2 IEEE Standards In 1985, Computer

More information

Redes de Computadores. Medium Access Control

Redes de Computadores. Medium Access Control Redes de Computadores Medium Access Control Manuel P. Ricardo Faculdade de Engenharia da Universidade do Porto 1 » How to control the access of computers to a communication medium?» What is the ideal Medium

More information

LAN PROTOCOLS. Beulah A AP/CSE

LAN PROTOCOLS. Beulah A AP/CSE LAN PROTOCOLS Beulah A AP/CSE IEEE STANDARDS In 1985, the Computer Society of the IEEE started a project, called Project 802, to set standards to enable intercommunication among equipment from a variety

More information

EE 122: Ethernet and

EE 122: Ethernet and EE 122: Ethernet and 802.11 Ion Stoica September 18, 2002 (* this talk is based in part on the on-line slides of J. Kurose & K. Rose) High Level View Goal: share a communication medium among multiple hosts

More information

LECTURE PLAN. Script. Introduction about MAC Types o ALOHA o CSMA o CSMA/CD o CSMA/CA

LECTURE PLAN. Script. Introduction about MAC Types o ALOHA o CSMA o CSMA/CD o CSMA/CA Course- B.Sc. Applied Physical Science (Computer Science) Year- IIIrd, Sem- Vth Subject Computer Science Paper- XVIIth, Computer Networks Lecture -11 Lecture Title- Medium Access Layer Script Today in

More information

ECE 4450:427/527 - Computer Networks Spring 2017

ECE 4450:427/527 - Computer Networks Spring 2017 ECE 4450:427/527 - Computer Networks Spring 2017 Dr. Nghi Tran Department of Electrical & Computer Engineering Lecture 5.4: Multiple Access Protocols Dr. Nghi Tran (ECE-University of Akron) ECE 4450:427/527

More information

Link Layer: Retransmissions

Link Layer: Retransmissions Link Layer: Retransmissions Context on Reliability Where in the stack should we place reliability functions? Application Transport Network Link Physical CSE 461 University of Washington 2 Context on Reliability

More information

Chapter 4. The Medium Access Control Sublayer

Chapter 4. The Medium Access Control Sublayer Chapter 4 The Medium Access Control Sublayer The Channel Allocation Problem Static Channel Allocation in LANs and MANs Dynamic Channel Allocation in LANs and MANs Dynamic Channel Allocation in LANs and

More information

COMP476 Networked Computer Systems. Polling. Sharing the Wire. LAN Technologies. COMP476 Networked Computer Systems 1

COMP476 Networked Computer Systems. Polling. Sharing the Wire. LAN Technologies. COMP476 Networked Computer Systems 1 Media Access Control Sub Layer COMP476 Networked Computer Systems Sharing Common Media There are several ways to share common media. Some methods are: Frequency division multiplexing Time division multiplexing

More information

IEEE , Token Rings. 10/11/06 CS/ECE UIUC, Fall

IEEE , Token Rings. 10/11/06 CS/ECE UIUC, Fall IEEE 802.11, Token Rings 10/11/06 CS/ECE 438 - UIUC, Fall 2006 1 Medium Access Control Wireless channel is a shared medium Need access control mechanism to avoid interference Why not CSMA/CD? 10/11/06

More information

CMPE 257: Wireless and Mobile Networking

CMPE 257: Wireless and Mobile Networking CMPE 257: Wireless and Mobile Networking Katia Obraczka Computer Engineering UCSC Baskin Engineering Lecture 3 CMPE 257 Spring'15 1 Next week Announcements April 14: ICN (Spencer Sevilla) April 16: DTN

More information

COS 140: Foundations of Computer Science

COS 140: Foundations of Computer Science COS 140: Foundations of Computer Science ALOHA Network Protocol Family Fall 2017 Homework 2 Introduction 3 Network Protocols.......................................................... 3 Problem.................................................................

More information

Computer Network Fundamentals Spring Week 3 MAC Layer Andreas Terzis

Computer Network Fundamentals Spring Week 3 MAC Layer Andreas Terzis Computer Network Fundamentals Spring 2008 Week 3 MAC Layer Andreas Terzis Outline MAC Protocols MAC Protocol Examples Channel Partitioning TDMA/FDMA Token Ring Random Access Protocols Aloha and Slotted

More information

Outline. Introduction to Networked Embedded Systems - Embedded systems Networked embedded systems Embedded Internet - Network properties

Outline. Introduction to Networked Embedded Systems - Embedded systems Networked embedded systems Embedded Internet - Network properties Outline Introduction to Networked Embedded Systems - Embedded systems Networked embedded systems Embedded Internet - Network properties Layered Network Architectures - OSI framework descriptions of layers

More information

Topics. Link Layer Services (more) Link Layer Services LECTURE 5 MULTIPLE ACCESS AND LOCAL AREA NETWORKS. flow control: error detection:

Topics. Link Layer Services (more) Link Layer Services LECTURE 5 MULTIPLE ACCESS AND LOCAL AREA NETWORKS. flow control: error detection: 1 Topics 2 LECTURE 5 MULTIPLE ACCESS AND LOCAL AREA NETWORKS Multiple access: CSMA/CD, CSMA/CA, token passing, channelization LAN: characteristics, i basic principles i Protocol architecture Topologies

More information

CSE 461 Multiple Access. David Wetherall

CSE 461 Multiple Access. David Wetherall CSE 461 Multiple Access David Wetherall djw@cs.washington.edu How to share a link Multiplexing = networking term for sharing a resource among multiple users (e.g., link, protocol instance) Topics: Multiplexing

More information

Random Access. 1. Aloha. 2. Slotted Aloha 3. CSMA 4. CSMA/CD

Random Access. 1. Aloha. 2. Slotted Aloha 3. CSMA 4. CSMA/CD Random Access 1. Aloha 2. Slotted Aloha 3. CSMA 4. CSMA/CD Background Communication medium B No Collision collision A C Modern Local Area Networks (LANs) operate as follows Users are connected to communication

More information

Mobile Communications Chapter 3 : Media Access

Mobile Communications Chapter 3 : Media Access Mobile Communications Chapter 3 : Media Access 2. Motivation 3. SDMA, FDMA, TDMA 1. Aloha and contention based schemes 4. Reservation schemes 5. Collision avoidance, MACA 6. Polling CDMA (Lecture 6) Prof.

More information

Medium Access Control. IEEE , Token Rings. CSMA/CD in WLANs? Ethernet MAC Algorithm. MACA Solution for Hidden Terminal Problem

Medium Access Control. IEEE , Token Rings. CSMA/CD in WLANs? Ethernet MAC Algorithm. MACA Solution for Hidden Terminal Problem Medium Access Control IEEE 802.11, Token Rings Wireless channel is a shared medium Need access control mechanism to avoid interference Why not CSMA/CD? 9/15/06 CS/ECE 438 - UIUC, Fall 2006 1 9/15/06 CS/ECE

More information

CS 716: Introduction to communication networks. - 9 th class; 19 th Aug Instructor: Sridhar Iyer IIT Bombay

CS 716: Introduction to communication networks. - 9 th class; 19 th Aug Instructor: Sridhar Iyer IIT Bombay CS 716: Introduction to communication networks - 9 th class; 19 th Aug 2011 Instructor: Sridhar Iyer IIT Bombay Contention-based MAC: ALOHA Users transmit whenever they have data to send Collisions occur,

More information

Chapter 6 Medium Access Control Protocols and Local Area Networks

Chapter 6 Medium Access Control Protocols and Local Area Networks Chapter 6 Medium Access Control Protocols and Local Area Networks Part I: Medium Access Control Part II: Local Area Networks CSE 3213, Winter 2010 Instructor: Foroohar Foroozan Chapter Overview Broadcast

More information

CSE 461: Wireless Networks

CSE 461: Wireless Networks CSE 461: Wireless Networks Wireless IEEE 802.11 A physical and multiple access layer standard for wireless local area networks (WLAN) Ad Hoc Network: no servers or access points Infrastructure Network

More information

Local Area Networks. Ethernet LAN

Local Area Networks. Ethernet LAN Local Area Networks Ethernet 802.3 LAN -7-1 Local Area Networks (Lokale Netze) Wide Area Network LAN -7-2 Local Area Networks What is a LAN? Multiple systems attached to an often shared medium high total

More information

MAC Sublayer(1) Principal service of the Medium Access Control Sublayer: Allocating a single broadcast channel (mostly a LAN) among competing users

MAC Sublayer(1) Principal service of the Medium Access Control Sublayer: Allocating a single broadcast channel (mostly a LAN) among competing users MAC Sublayer(1) Principal service of the Medium Access Control Sublayer: Allocating a single broadcast channel (mostly a LAN) among competing users Static Channel Allocation: Frequency Division Multiplexing

More information

The Medium Access Control Sublayer

The Medium Access Control Sublayer The Medium Access Control Sublayer Chapter 4 Channel Allocation Problem Static channel allocation Assumptions for dynamic Assumptions for Dynamic Channel Allocation 1. Independent traffic 2. Single channel

More information

Data Link Layer. Learning Objectives. Position of the data-link layer. MCA 207, Data Communication & Networking

Data Link Layer. Learning Objectives. Position of the data-link layer. MCA 207, Data Communication & Networking Data Link Layer Bharati Vidyapeeth s Institute of Computer Applications and Management,New Delhi-63 by Vishal Jain U2. 1 Learning Objectives To introduce the design issues of data link layer. To discuss

More information

CSMA/CD (Collision Detection)

CSMA/CD (Collision Detection) CSMA/CD (Collision Detection) CD (collision detection): easy in wired LANs: measure signal strengths, compare transmitted, received signals difficult in wireless LANs: received signal strength overwhelmed

More information

Link Layer. (continued)

Link Layer. (continued) Link Layer (continued) Topics 1. Framing Delimiting start/end of frames 2. Error detection and correction Handling errors 3. Retransmissions Handling loss 4. Multiple Access 802.11, classic Ethernet 5.

More information

Goals. Fundamentals of Network Media. More topics. Topics. Multiple access communication. Multiple access solutions

Goals. Fundamentals of Network Media. More topics. Topics. Multiple access communication. Multiple access solutions Fundamentals of Network Media Local Area Networks Ursula Holmström Goals Learn the basic concepts related to LAN technologies, for example use of shared media medium access control topologies Know the

More information

Access Technologies! Fabio Martignon

Access Technologies! Fabio Martignon Access Technologies! Fabio Martignon 1 LAN Ethernet - IEEE 802.3 Broadcast Bus Capacity=10 Mb/s Xerox-Intel-Digital inventors Standardized at the beginning of the 80s as IEEE 802.3 Big Success and Several

More information

CSE/EE 461 Wireless and Contention-Free Protocols

CSE/EE 461 Wireless and Contention-Free Protocols CSE/EE 461 Wireless and Contention-Free Protocols Last Time The multi-access problem Medium Access Control (MAC) sublayer Random access protocols: Aloha CSMA variants Classic Ethernet (CSMA/CD) Application

More information

! High Data Rates (0.1 to 1000 Mbps)! Short Distances (0.1 to 25 km) ! Low Error Rate (10 to 10 ) Local Area Networks

! High Data Rates (0.1 to 1000 Mbps)! Short Distances (0.1 to 25 km) ! Low Error Rate (10 to 10 ) Local Area Networks Local Area Networks A Local Area Netw ork is a communications netw ork that provides interconnection of a variety of data communicating devices w ithin a small area. Typical Characteristics! High Data

More information

COS 140: Foundations of Computer Science

COS 140: Foundations of Computer Science COS 140: Foundations of C S Network Protocol Family Fall 2017 Copyright c 2002 2017 UMaine School of Computing and Information S 1 / 25 Homework Homework Slides, book Chapter 24 on line Homework: All exercises

More information

The MAC layer in wireless networks

The MAC layer in wireless networks The MAC layer in wireless networks The wireless MAC layer roles Access control to shared channel(s) Natural broadcast of wireless transmission Collision of signal: a /space problem Who transmits when?

More information

Contention Protocols and Networks

Contention Protocols and Networks 4/13/2005 314 Lecture Contention Protocols and Networks 1 Contention Protocols and Networks Contention Protocols CSMA/CD Network Topologies Ethernet 4/13/2005 314 Lecture Contention Protocols and Networks

More information

Topics for Today. More on Ethernet. Wireless LANs Readings. Topology and Wiring Switched Ethernet Fast Ethernet Gigabit Ethernet. 4.3 to 4.

Topics for Today. More on Ethernet. Wireless LANs Readings. Topology and Wiring Switched Ethernet Fast Ethernet Gigabit Ethernet. 4.3 to 4. Topics for Today More on Ethernet Topology and Wiring Switched Ethernet Fast Ethernet Gigabit Ethernet Wireless LANs Readings 4.3 to 4.4 1 Original Ethernet Wiring Heavy coaxial cable, called thicknet,

More information

Wireless Medium Access Control Protocols

Wireless Medium Access Control Protocols Wireless Medium Access Control Protocols Telecomunicazioni Undergraduate course in Electrical Engineering University of Rome La Sapienza Rome, Italy 2007-2008 Classification of wireless MAC protocols Wireless

More information

! High Data Rates (0.1 Mbps to 10 Gbps)! Short Distances (0.1 to 40 km) ! Low Error Rate (10 to 10 ) Local Area Networks

! High Data Rates (0.1 Mbps to 10 Gbps)! Short Distances (0.1 to 40 km) ! Low Error Rate (10 to 10 ) Local Area Networks Local Area Networks A Local Area Network is a communications network that provides interconnection of a variety of data communicating devices within a small area. Typical Characteristics! High Data Rates

More information

Medium Access Control Sublayer Chapter 4

Medium Access Control Sublayer Chapter 4 Medium Access Control Sublayer Chapter 4 Channel Allocation Problem Multiple Access Protocols Ethernet Wireless LANs Broadband Wireless Bluetooth RFID Data Link Layer Switching Revised: August 2011 The

More information

Computer Communication III

Computer Communication III Computer Communication III Wireless Media Access IEEE 802.11 Wireless LAN Advantages of Wireless LANs Using the license free ISM band at 2.4 GHz no complicated or expensive licenses necessary very cost

More information

Data Link Layer Technologies

Data Link Layer Technologies Chapter 2.2 La 2 Data Link La Technologies 1 Content Introduction La 2: Frames Error Handling 2 Media Access Control General approaches and terms Aloha Principles CSMA, CSMA/CD, CSMA / CA Master-Slave

More information

The Link Layer and LANs. Chapter 6: Link layer and LANs

The Link Layer and LANs. Chapter 6: Link layer and LANs The Link Layer and LANs EECS3214 2018-03-14 4-1 Chapter 6: Link layer and LANs our goals: understand principles behind link layer services: error detection, correction sharing a broadcast channel: multiple

More information

2.1 CHANNEL ALLOCATION 2.2 MULTIPLE ACCESS PROTOCOLS Collision Free Protocols 2.3 FDDI 2.4 DATA LINK LAYER DESIGN ISSUES 2.5 FRAMING & STUFFING

2.1 CHANNEL ALLOCATION 2.2 MULTIPLE ACCESS PROTOCOLS Collision Free Protocols 2.3 FDDI 2.4 DATA LINK LAYER DESIGN ISSUES 2.5 FRAMING & STUFFING UNIT-2 2.1 CHANNEL ALLOCATION 2.2 MULTIPLE ACCESS PROTOCOLS 2.2.1 Pure ALOHA 2.2.2 Slotted ALOHA 2.2.3 Carrier Sense Multiple Access 2.2.4 CSMA with Collision Detection 2.2.5 Collision Free Protocols 2.2.5.1

More information

Chapter 5 Data-Link Layer: Wired Networks

Chapter 5 Data-Link Layer: Wired Networks Sungkyunkwan University Chapter 5 Data-Link Layer: Wired Networks Prepared by Syed M. Raza and H. Choo 2018-Fall Computer Networks Copyright 2000-2018 Networking Laboratory Chapter 5 Outline 5.1 Introduction

More information

COMP/ELEC 429/556 Introduction to Computer Networks

COMP/ELEC 429/556 Introduction to Computer Networks COMP/ELEC 429/556 Introduction to Computer Networks Broadcast network access control Some slides used with permissions from Edward W. Knightly, T. S. Eugene Ng, Ion Stoica, Hui Zhang T. S. Eugene Ng eugeneng

More information

Data Link Layer, Part 3 Medium Access Control. Preface

Data Link Layer, Part 3 Medium Access Control. Preface Data Link Layer, Part 3 Medium Access Control These slides are created by Dr. Yih Huang of George Mason University. Students registered in Dr. Huang's courses at GMU can make a single machine-readable

More information

Data and Computer Communications. Chapter 11 Local Area Network

Data and Computer Communications. Chapter 11 Local Area Network Data and Computer Communications Chapter 11 Local Area Network LAN Topologies Refers to the way in which the stations attached to the network are interconnected Bus Topology Used with multipoint medium

More information

CSMC 417. Computer Networks Prof. Ashok K Agrawala Ashok Agrawala Set 5. February 12 CMSC417 Set 5 1

CSMC 417. Computer Networks Prof. Ashok K Agrawala Ashok Agrawala Set 5. February 12 CMSC417 Set 5 1 CSMC 417 Computer Networks Prof. Ashok K Agrawala 2012 Ashok Agrawala Set 5 February 12 CMSC417 Set 5 1 The Medium Access Control Sublayer February 12 CMSC417 Set 5 2 Medium Access Control Sublayer Channel

More information

Medium Access Control. MAC protocols: design goals, challenges, contention-based and contention-free protocols

Medium Access Control. MAC protocols: design goals, challenges, contention-based and contention-free protocols Medium Access Control MAC protocols: design goals, challenges, contention-based and contention-free protocols 1 Why do we need MAC protocols? Wireless medium is shared Many nodes may need to access the

More information

Outline. EEC-484/584 Computer Networks. Multiple Access Protocols. Wireless LAN Protocols. Lecture 9. Wenbing Zhao

Outline. EEC-484/584 Computer Networks. Multiple Access Protocols. Wireless LAN Protocols. Lecture 9. Wenbing Zhao EEC-484/584 Computer Networks Lecture 9 wenbing@ieee.org (Lecture nodes are based on materials supplied by Dr. Louise Moser at UCSB and Prentice-Hall) Outline Review Multiple access protocols IEEE 802

More information

EEC-484/584 Computer Networks

EEC-484/584 Computer Networks EEC-484/584 Computer Networks Lecture 9 wenbing@ieee.org (Lecture nodes are based on materials supplied by Dr. Louise Moser at UCSB and Prentice-Hall) Outline 2 Review Multiple access protocols IEEE 802

More information

MULTIPLE ACCESS PROTOCOLS 2. 1

MULTIPLE ACCESS PROTOCOLS 2. 1 MULTIPLE ACCESS PROTOCOLS AND WIFI 1 MULTIPLE ACCESS PROTOCOLS 2. 1 MULTIPLE ACCESS LINKS, PROTOCOLS Two types of links : point-to-point broadcast (shared wire or medium) POINT-TO-POINT PPP for dial-up

More information

Outline / Wireless Networks and Applications Lecture 9: Wireless LANs Aloha and 802 Wireless. Regular Ethernet CSMA/CD

Outline / Wireless Networks and Applications Lecture 9: Wireless LANs Aloha and 802 Wireless. Regular Ethernet CSMA/CD Page 1 Outline 18-452/18-750 Wireless Networks and Applications Lecture 9: Wireless LANs Aloha and 802 Wireless Peter Steenkiste Data link fundamentals» And what changes in wireless Aloha Ethernet Wireless-specific

More information

Lecture 6. Data Link Layer (cont d) Data Link Layer 1-1

Lecture 6. Data Link Layer (cont d) Data Link Layer 1-1 Lecture 6 Data Link Layer (cont d) Data Link Layer 1-1 Agenda Continue the Data Link Layer Multiple Access Links and Protocols Addressing Data Link Layer 1-2 Multiple Access Links and Protocols Two types

More information

Multiple Access Links and Protocols

Multiple Access Links and Protocols Multiple Access Links and Protocols Two types of links : point-to-point PPP for dial-up access point-to-point link between Ethernet switch and host broadcast (shared wire or medium) old-fashioned Ethernet

More information

CCNA Exploration1 Chapter 7: OSI Data Link Layer

CCNA Exploration1 Chapter 7: OSI Data Link Layer CCNA Exploration1 Chapter 7: OSI Data Link Layer LOCAL CISCO ACADEMY ELSYS TU INSTRUCTOR: STELA STEFANOVA 1 Explain the role of Data Link layer protocols in data transmission; Objectives Describe how the

More information

Computer Networks Principles LAN - Ethernet

Computer Networks Principles LAN - Ethernet Computer Networks Principles LAN - Ethernet Prof. Andrzej Duda duda@imag.fr http://duda.imag.fr 1 Interconnection structure - layer 3 interconnection layer 3 router subnetwork 1 interconnection layer 2

More information

CS 455/555 Intro to Networks and Communications. Link Layer

CS 455/555 Intro to Networks and Communications. Link Layer CS 455/555 Intro to Networks and Communications Link Layer Dr. Michele Weigle Department of Computer Science Old Dominion University mweigle@cs.odu.edu http://www.cs.odu.edu/~mweigle/cs455-s13 1 Link Layer

More information

Random Assignment Protocols

Random Assignment Protocols Random Assignment Protocols Random assignment strategies attempt to reduce problem occur in fixed assignment strategy by eliminating pre allocation of bandwidth to communicating nodes. Random assignment

More information

Wireless Communications

Wireless Communications 4. Medium Access Control Sublayer DIN/CTC/UEM 2018 Why do we need MAC for? Medium Access Control (MAC) Shared medium instead of point-to-point link MAC sublayer controls access to shared medium Examples:

More information

1. Data Link Layer (Layer 2)

1. Data Link Layer (Layer 2) 1. Data Link Layer (Layer 2) The Data Link layer provides a means for exchanging data over a common local media. The Data Link layer performs two basic services: Allows the upper layers to access the media

More information

Outline. EEC-682/782 Computer Networks I. Multiple Access Protocols. IEEE 802 Standards

Outline. EEC-682/782 Computer Networks I. Multiple Access Protocols. IEEE 802 Standards EEC-682/782 Computer Networks I Lecture 9 Wenbing Zhao w.zhao1@csuohio.edu http://academic.csuohio.edu/zhao_w/teaching/eec682.htm (Lecture nodes are based on materials supplied by Dr. Louise Moser at UCSB

More information

Chapter 7: Data Link Control. Data Link Control Protocols

Chapter 7: Data Link Control. Data Link Control Protocols Chapter 7: Data Link Control CS420/520 Axel Krings Page 1 Data Link Control Protocols Need layer of logic above Physical to manage exchange of data over a link frame synchronization flow control error

More information

Chapter 7: Data Link Control. CS420/520 Axel Krings Page 1

Chapter 7: Data Link Control. CS420/520 Axel Krings Page 1 Chapter 7: Data Link Control CS420/520 Axel Krings Page 1 Data Link Control Protocols Need layer of logic above Physical to manage exchange of data over a link frame synchronization flow control error

More information

Data Link Control Protocols

Data Link Control Protocols Data Link Control Protocols need layer of logic above Physical to manage exchange of data over a link frame synchronization flow control error control addressing control and data link management Flow Control

More information

IEEE Medium Access Control. Medium Access Control

IEEE Medium Access Control. Medium Access Control IEEE 802.11 Medium Access Control EECS3214 3 April 2018 Medium Access Control reliable data delivery access control MAC layer covers three functional areas: security 2 1 MAC Requirements To avoid interference

More information

Data Link Layer. Goals of This Lecture. Engineering Questions. Outline of the Class

Data Link Layer. Goals of This Lecture. Engineering Questions. Outline of the Class Data Link Layer Kuang Chiu Huang TCM NCKU Goals of This Lecture Through the lecture and in-class discussion, students are enabled to describe role and functions of the link layer, and compare different

More information

Chapter 4: The Medium Access Layer

Chapter 4: The Medium Access Layer Chapter 4: The Medium Access Layer Computer Networks Maccabe Computer Science Department The University of New Mexico September 2002 Medium Access Layer Point-to-point versus broadcast networks Broadcast

More information

COMMUNICATION NETWORKS NETW 501

COMMUNICATION NETWORKS NETW 501 COMMUNICATION NETWORKS NETW 501 TUTORIAL 6 Presented by: Eng. Hana Hesham Eng. Mohamed Atef Data Link Layer Data Link Layer is split into 2 sublayers which are the Logical Link Control (LLC) and the Medium

More information

ET3110 Networking and Communications UNIT 2: Communication Techniques and Data Link Control Protocol skong@itt-tech.edutech.edu Learning Objectives Identify methods of detecting errors. Use Hamming code

More information

Part3. Local Area Networks (LAN)

Part3. Local Area Networks (LAN) Part3 Local Area Networks (LAN) LAN Characteristics Small geographical area Relatively high data rate Single management Topologies Bus, star, ring Specifications at physical and data link layer mostly

More information