ECEN 5032 Data Networks Medium Access Control Sublayer

Size: px
Start display at page:

Download "ECEN 5032 Data Networks Medium Access Control Sublayer"

Transcription

1 ECEN 5032 Data Networks Medium Access Control Sublayer Peter Mathys University of Colorado, Boulder c , P. Mathys p.1/35

2 Overview (Sub)networks can be divided into two categories: 1. Those using point-to-point connections (e.g., leased line). 2. Those using broadcast connections (e.g., wireless LANs). In a broadcast network one of the key issues is how to determine who gets to use the channel when there is competition for it. Broadcast channels are often referred to as multiaccess channels or random access channels. Real life example: Meeting between several people: After one speaker finishes, who gets to talk next? More tricky: Conference call (cannot use external means to avoid chaos, e.g., by raising hands). c , P. Mathys p.2/35

3 Medium Access Control The protocols used to determine who goes next on a multiaccess channel belong to the MAC (medium access control) sublayer. The MAC sublayer is a sublayer of the data link layer (DLL). The MAC sublayer is expecially important for LANs. WANs, in contrast, use point-to-point links, except for satellite networks. Examples of MAC protocols are the CSMA/CD protocol used by Ethernet, and the CSMA/CA protocol used by wireless LANs. c , P. Mathys p.3/35

4 Static Channel Allocation Traditional ways of allocating channels are TDM (time division multiplexing) and FDM (frequency division multiplexing). If there are users, time gets divided up into time slots for TDM, or bandwidth gets divided up into frequency slots for FDM. If is large and not all users transmit at all times, a lot of transmission capacity is wasted with static TDM or FDM allocations. In addition, in most computer systems data traffic is very bursty, e.g., peak to mean traffic ratio of 1000:1 c , P. Mathys p.4/35

5 Static Channel Allocation Simple example: M/M/1 queue (memoryless Poisson arrivals with rate and memoryless Poisson departures with rate ): where is the average delay of a frame and is the channel capacity. Now divide this up into static subchannels, each with capacity and arrival rate to obtain resulting in an increase of the delay by a factor of. c , P. Mathys p.5/35

6 Dynamic Channel Allocation Key assumptions: 1. Station model. There are independent stations or terminals. Arrival rate is (probability of frame generated in interval of length is ). Terminals can have at most one frame to transmit at any given time. 2. Single Channel Assumption. A single channel is available for all communication. All stations can transmit on it and receive from it. All stations are eqivalent in hardware, but protocol software may assign priorities. 3. Collision Assumption. If two or more terminals transmit at the same time, a collision results and the frame must be retransmitted at a later time. All stations can detect collisions and there are no other errors than collisions. c , P. Mathys p.6/35

7 Dynamic Channel Allocation Key assumptions (contd.): 4. Continuous/Slotted Time. If channel time is continuous, frame transmission can sart at any time. If channel time is slotted, then frame transmissions must always begin at the start of a slot. A slot may be idle (0), contain exactly one frame (1), or a collision (C). 5. Carrier Sense (Y/N). If carrier sensing is used, stations can tell if the channel is in use before trying to use it. In this case stations wait until the channel is idle before starting a new transmission. Wired LANs generally have carrier sense, while in wireless networks not all stations may be within radio range of other stations so that carrier sensing cannot be relied upon. Key assumption is single (collision) channel. No other means of communication. c , P. Mathys p.7/35

8 ALOHA The ALOHA network was developed around 1970 to provide radio communication between the central computer and various data terminals at the campuses of the University of Hawaii. The basic idea of ALOHA is to let users transmit frames whenever they have data to send. If frames collide, they are retransmitted after a random amount of time. It is assumed that each station can determine whether a collision happened or not. If there is no collision, transmission is assumed to be successful. c , P. Mathys p.8/35

9 Pure ALOHA Example In pure ALOHA, frames are transmitted at completely random times. c , P. Mathys p.9/35

10 Pure ALOHA Pure ALOHA: Vulnerable period for shaded frame. c , P. Mathys p.10/35

11 Pure ALOHA Throughput Successfull frames leave system at rate and arrivals occur at rate, leading to a hypothetic equilibrium point as shown. Necessary condition:. c , P. Mathys p.11/35

12 Slotted ALOHA In 1972 a method for doubling the throughput of a (pure) ALOHA system was published. The key idea is to divide time into discrete intervals, each corresponding to the length of a frame. Under this method, known as slotted ALOHA, a computer is required to wait for the beginning of a slot before it can transmit data. This reduces the vulnerable period to the length of one frame and consequently the throughput becomes which peaks at and yields. c , P. Mathys p.12/35

13 Slotted ALOHA Throughput Successfull frames leave system at rate and arrivals occur at rate, leading to a hypothetic equilibrium point as shown. Necessary condition:. c , P. Mathys p.13/35

14 CSMA In (wired) local area networks it is possible for each station to detect what other stations are doing and adapt their behavior accordingly. Protocols in which stations listen for a carrier on the channel are called carrier sense protocols. CSMA stands for carrier sense multiple access. There are two types of CSMA protocols: persistent and nonpersistent CSMA. CSMA/CD stands for carrier sense multiple access with collision detection. c , P. Mathys p.14/35

15 Persistent CSMA 1-persistent CSMA works as follows: When a station has data to send, it first listens to the channel to see if anyone else is already transmitting. When the channel is idle, the station transmits its frame. When the channel is busy, the station waits until it becomes idle, and then transmits with probability 1 (hence the name 1-persistent). If a collision occurs during transmission, the station waits a random amount of time and then starts all over again. c , P. Mathys p.15/35

16 Effect of Propagation Delay When two or more stations start transmitting at about the same time instant, they may not be able to sense each other s transmissions because of the propagation delays between different stations. Thus, when 1-persistent CSMA is used, there is a good chance that after one transmission ends, two or more new stations start transmitting and collide. Such collisions can be avoided if not all stations that become ready to transmit start sending immediately after the previous transmission ends. The resulting protocols are nonpersistent or p-persistent versions of CSMA. c , P. Mathys p.16/35

17 Nonpersistent CSMA Nonpersistent CSMA works as follows: Before sending, a station senses the channel. If the channel is idle, the station starts transmitting. If the channel is busy, the station waits a random amount of time (without sensing the channel) before it repeats the algorithm. This leads to longer delays, but better channel utilization than 1-persistent CSMA. c , P. Mathys p.17/35

18 p-persistent CSMA For slotted channels p-persistent CSMA can be used. It works like this: When a station becomes ready to transmit, it senses the channel. If the channel is idle, the station starts transmitting with probability. With probability it defers until the next slot. If the next slot is also idle, it transmits or defers again, with probabilities or. This process is repeated until either the frame gets transmitted or another station started transmitting. In the latter case the station acts as if there had been a collision (i.e., waits a random amount of time and starts again). If the station initially senses the channel busy, it waits until the next slot and applies the above algorithm. c , P. Mathys p.18/35

19 Throughput for CSMA Versions The smaller is for p-persistent CSMA the better the throughput becomes, at the cost of a (much) longer average transmission delay. c , P. Mathys p.19/35

20 CSMA/CD If the length of a standard frame is much longer than the propagation delay between stations, the performance of CSMA can be improved by aborting transmissions as soon as a collision is detected. Thus, if two stations sense the channel to be idle and begin transmitting simultaneously, they abort their transmissions as soon as they detect the collision. The resulting protocol is known as CSMA/CD (carrier sense multiple access with collision detection). CSMA/CD is the basis of Ethernet LANs. Under CSMA/CD the channel can be in one of three states: (i) Transmitting single frames, (ii) resolving contentions, or (iii) idle. The main feature is that the CD part shortens the amount of time that is spent to resolve contentions. c , P. Mathys p.20/35

21 CSMA/CD CSMA/CD can be in one of three states: Contention, transmission, or idle. c , P. Mathys p.21/35

22 Effect of Propagation Delay The figure above illustrates the fact that a station can only be sure to have seized the channel after transmitting for without hearing a collision. c , P. Mathys p.22/35

23 Binary Exponential Backoff In Ethernet, time is divided into slots of length (where is the worst-case propagation delay in the network) after a collision occurs. After the first collision, each station waits either 0 or 1 slot times (at random) before trying to retransmit. If that results in another collision, each station now waits 0, 1, 2, or 3 slot times (at random) before trying to retransmit. Each time when another collision occurs the number of slots to wait is chosen at random from a set of numbers that has twice the size of the previous set, up to the interval. This algorithm, which in essence stabilizes the underlying slotted ALOHA system, is called binary exponential backoff. c , P. Mathys p.23/35

24 Collision-Free Protocols CSMA/CD is not universally applicable. For instance, if the propagation delay is similar to or much longer than the length of a frame (e.g., on a satellite channel), CD does not help to shorten contention periods. If there is a finite number of stations, then there exist schemes that either avoid collisions altogether, or at least limit the contention to (small) subsets of. An obvious solution is to use TDM or FDM for users, but the goal is to do better than that in the case when only a fraction of all users is typically active at any given time. c , P. Mathys p.24/35

25 Bit Map Protocol The basic bit-map protocol for stations uses contention slots of 1 bit each. Any station that has a frame to transmit sets the bit in its assigned slot and every other station gets to see this bit. Thus, during the actual transmission phase each station knows when to transmit and when to be silent. Bit-map protocols are part of a larger class called reservation protocols. c , P. Mathys p.25/35

26 Wireless LAN Protocols A system of notebook computers that communicate by radio can be regarded as a wireless LAN. Wireless LANs have different properties than conventional (wired) LANs and require special MAC sublayer protocols. A common configuration for a wireless LAN consists of base stations (or access points) strategically placed around a building and wired together using copper of fiber. The mobile stations then communicate via radio links with these base stations. If the transmission power of the base and mobile stations is adjusted to have a range of 3-4 meters, then each room becomes a cell in a cellular system. This is similar to a cellular telephone system, except that each cell has only one channel, covering the entire available bandwidth and all stations in the cell. c , P. Mathys p.26/35

27 Hidden Station Problem Simplifying assumption: All radio transmitters have some fixed range. A transmits to B. If C senses medium, it will not hear A and thus, when it transmits to B a collision results. CSMA cannot be used here because what counts is what B hears, not what A and C hear. The problem of a station not being able to detect a competitor because it is too far away is called the hidden station problem. c , P. Mathys p.27/35

28 Exposed Station Problem Simplifying assumption: All radio transmitters have some fixed range. B transmits to A. C wants to transmit to D. It senses the medium and falsely concludes that it cannot start sending. Again, what is crucial is what the receiver sees, not what the sender sees. The problem encountered here is called the exposed station problem. c , P. Mathys p.28/35

29 MACA Protocol MACA stands for mulitple access with collision avoidance. The basic idea is for the sender to stimulate the receiver into sending a short frame, so that stations nearby can detect it and refrain from using the channel during the upcoming (large) data frame. If A wants to send to B it starts by transmitting an RTS (request to send) frame. This short frame contains the length of the data frame that will eventually follow. If B is ready to receive a frame, it responds with a CTS (clear to send) frame. The CTS frame also contains the length of the upcoming data frame. Upon receipt of the CTS frame A begins transmission. Any station that hears RTS is close to A and must remain silent for the CTS to be transmitted back to A. Any station that hears CTS is close to B and must remain silent during the upcoming data frame transmission. c , P. Mathys p.29/35

30 MACA Protocol (a) A sends RTS to B. (b) B responds with a CTS to A. c , P. Mathys p.30/35

31 MACAW Protocol MACAW stands for MACA for wireless. It is a fine tuned version of MACA. An ACK frame is sent after each successful data frame (so that retransmissions can be initiated when no ACK is received). CSMA is used to avoid some obvious collisions of RTS frames. Exponential backoff algorithm is run separately for each data stream (source-destination pair). Finally, a mechanism is added for stations to exchange information about congestion and make the backoff algorithm react less violently to temporary problems. c , P. Mathys p.31/35

32 MAC Sublayer Protocol The MAC sublayer protocol is quite different from the one for Ethernet, due to the different behavior and requirements of the wireless environment. Collision detection with early transmission abort cannot be used due to the inability of radio transceivers to transmit and listen simultaneously. In addition there is the hidden/exposed station problem supports two modes of operation. The first, called DCF (distributed coordination function), uses no central control, similar to Ethernet. The second, called PCF (point coordination function), uses the base station to control all actvity in its cell. All implementations of must support DCF, but PCF is optional. c , P. Mathys p.32/35

33 Hidden/Exposed Stations (a) Hidden station problem. (b) Exposed station problem. c , P. Mathys p.33/35

34 DCF for DCF uses a protocol called CSMA/CA (CSMA with collision avoidance). In this protocol both physical and virtual channel sensing are used. Method 1: When a station wants to transmit, it senses the channel. If it is idle it starts transmitting and sends the entire frame without further channel sensing. If the channel is busy, transmission is deferred until the channel goes idle. If a collision occurs, the colliding stations wait a random time (using binary exponential backoff) and then try again. Method 2: Based on MACAW using virtual channel sensing. A station that wants to transmit sends an RTS frame to request permission to send a data frame. When permission is granted the receiving station returns a CTS frame. Every station that hears either the RTS, the CTS or both knows that a data frame transmission is about to begin and defers transmitting. c , P. Mathys p.34/35

35 Virtual Channel Sensing A wants to send to B and sends RTS. B responds with CTS. C is within range of A and hears RTS. D is within range of B but not of A. It does not hear RTS but hears CTS. C and D assert a virtual channel busy to themselves, indicated by NAV (network allocation vector). c , P. Mathys p.35/35

LECTURE PLAN. Script. Introduction about MAC Types o ALOHA o CSMA o CSMA/CD o CSMA/CA

LECTURE PLAN. Script. Introduction about MAC Types o ALOHA o CSMA o CSMA/CD o CSMA/CA Course- B.Sc. Applied Physical Science (Computer Science) Year- IIIrd, Sem- Vth Subject Computer Science Paper- XVIIth, Computer Networks Lecture -11 Lecture Title- Medium Access Layer Script Today in

More information

ECE453 Introduction to Computer Networks. Broadcast vs. PPP. Delay. Lecture 7 Multiple Access Control (I)

ECE453 Introduction to Computer Networks. Broadcast vs. PPP. Delay. Lecture 7 Multiple Access Control (I) ECE453 Introduction to Computer Networks Lecture 7 Multiple Access Control (I) 1 Broadcast vs. PPP Broadcast channel = multiaccess channel = random access channel Broadcast LAN Satellite network PPP WAN

More information

Chapter 4 (Week 7) The Medium Access Control Sublayer ANDREW S. TANENBAUM COMPUTER NETWORKS FOURTH EDITION PP CN&DC Dr.

Chapter 4 (Week 7) The Medium Access Control Sublayer ANDREW S. TANENBAUM COMPUTER NETWORKS FOURTH EDITION PP CN&DC Dr. Chapter 4 (Week 7) The Medium Access Control Sublayer ANDREW S. TANENBAUM COMPUTER NETWORKS FOURTH EDITION PP. 247-292 1 4.1. THE CHANNEL ALLOCATION PROBLEM 4.2. MULTIPLE ACCESS PROTOCOLS 4.3. ETHERNET

More information

Chapter 12 Multiple Access 12.1

Chapter 12 Multiple Access 12.1 Chapter 12 Multiple Access 12.1 Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. 12.2 Figure 12.1 Data link layer divided into two functionality-oriented sublayers

More information

Jaringan Komputer. Broadcast Network. Outline. MAC (Medium Access Control) Channel Allocation Problem. Dynamic Channel Allocation

Jaringan Komputer. Broadcast Network. Outline. MAC (Medium Access Control) Channel Allocation Problem. Dynamic Channel Allocation Broadcast Network Jaringan Komputer Medium Access Control Sublayer 2 network categories: point-to-point connections broadcast channels Key issue in broadcast network: how to determine who gets to use the

More information

Chapter 4. The Medium Access Control Sublayer. Points and Questions to Consider. Multiple Access Protocols. The Channel Allocation Problem.

Chapter 4. The Medium Access Control Sublayer. Points and Questions to Consider. Multiple Access Protocols. The Channel Allocation Problem. Dynamic Channel Allocation in LANs and MANs Chapter 4 The Medium Access Control Sublayer 1. Station Model. 2. Single Channel Assumption. 3. Collision Assumption. 4. (a) Continuous Time. (b) Slotted Time.

More information

MAC Sublayer(1) Principal service of the Medium Access Control Sublayer: Allocating a single broadcast channel (mostly a LAN) among competing users

MAC Sublayer(1) Principal service of the Medium Access Control Sublayer: Allocating a single broadcast channel (mostly a LAN) among competing users MAC Sublayer(1) Principal service of the Medium Access Control Sublayer: Allocating a single broadcast channel (mostly a LAN) among competing users Static Channel Allocation: Frequency Division Multiplexing

More information

The Medium Access Control Scheme (MAC Layer) Reference: Andrew S. Tanenbaum, Computer Networks, 3rd Edition, Prentice Hall, 1996.

The Medium Access Control Scheme (MAC Layer) Reference: Andrew S. Tanenbaum, Computer Networks, 3rd Edition, Prentice Hall, 1996. The Medium Access Control Scheme (MAC Layer) Reference: Andrew S. Tanenbaum, Computer Networks, 3rd Edition, Prentice Hall, 1996. 1 Table of Contents Introduction ALOHA Carrier Sense Multiple Sense (CSMA)

More information

Multiple Access. Data Communications and Networking

Multiple Access. Data Communications and Networking Multiple Access In the previous part we discussed data link control, a mechanism which provides a link with reliable communication. In the protocols we described, we assumed that there is an available

More information

COS 140: Foundations of Computer Science

COS 140: Foundations of Computer Science COS 140: Foundations of Computer Science ALOHA Network Protocol Family Fall 2017 Homework 2 Introduction 3 Network Protocols.......................................................... 3 Problem.................................................................

More information

Unit 7 Media Access Control (MAC)

Unit 7 Media Access Control (MAC) Unit 7 Media Access Control (MAC) 1 Internet Model 2 Sublayers of Data Link Layer Logical link control (LLC) Flow control Error control Media access control (MAC) access control 3 Categorization of MAC

More information

CS 43: Computer Networks. 27: Media Access Contd. December 3, 2018

CS 43: Computer Networks. 27: Media Access Contd. December 3, 2018 CS 43: Computer Networks 27: Media Access Contd. December 3, 2018 Last Class The link layer provides lots of functionality: addressing, framing, media access, error checking could be used independently

More information

Link Layer: Retransmissions

Link Layer: Retransmissions Link Layer: Retransmissions Context on Reliability Where in the stack should we place reliability functions? Application Transport Network Link Physical CSE 461 University of Washington 2 Context on Reliability

More information

COS 140: Foundations of Computer Science

COS 140: Foundations of Computer Science COS 140: Foundations of C S Network Protocol Family Fall 2017 Copyright c 2002 2017 UMaine School of Computing and Information S 1 / 25 Homework Homework Slides, book Chapter 24 on line Homework: All exercises

More information

LANs. Local Area Networks. via the Media Access Control (MAC) SubLayer. Networks: Local Area Networks

LANs. Local Area Networks. via the Media Access Control (MAC) SubLayer. Networks: Local Area Networks LANs Local Area Networks via the Media Access Control (MAC) SubLayer 1 Local Area Networks Aloha Slotted Aloha CSMA (non-persistent, 1-persistent, p-persistent) CSMA/CD Ethernet Token Ring 2 Network Layer

More information

CMPE 257: Wireless and Mobile Networking

CMPE 257: Wireless and Mobile Networking CMPE 257: Wireless and Mobile Networking Katia Obraczka Computer Engineering UCSC Baskin Engineering Lecture 3 CMPE 257 Winter'11 1 Announcements Accessing secure part of the class Web page: User id: cmpe257.

More information

Aloha and slotted aloha

Aloha and slotted aloha CSMA 2/13/06 Aloha and slotted aloha Slotted aloha: transmissions are synchronized and only start at the beginning of a time slot. Aloha sender A sender B collision sender C t Slotted Aloha collision sender

More information

Telecommunication Protocols Laboratory Course. Lecture 2

Telecommunication Protocols Laboratory Course. Lecture 2 Telecommunication Protocols Laboratory Course Lecture 2 Last time We began our study of telecommunication protocols at the Logical Link Control sub-layer (LLC) LLC issues Connectionless vs connection-oriented

More information

Random Access. 1. Aloha. 2. Slotted Aloha 3. CSMA 4. CSMA/CD

Random Access. 1. Aloha. 2. Slotted Aloha 3. CSMA 4. CSMA/CD Random Access 1. Aloha 2. Slotted Aloha 3. CSMA 4. CSMA/CD Background Communication medium B No Collision collision A C Modern Local Area Networks (LANs) operate as follows Users are connected to communication

More information

ICE 1332/0715 Mobile Computing (Summer, 2008)

ICE 1332/0715 Mobile Computing (Summer, 2008) ICE 1332/0715 Mobile Computing (Summer, 2008) Medium Access Control Prof. Chansu Yu http://academic.csuohio.edu/yuc/ Simplified Reference Model Application layer Transport layer Network layer Data link

More information

CSE 461: Multiple Access Networks. This Lecture

CSE 461: Multiple Access Networks. This Lecture CSE 461: Multiple Access Networks This Lecture Key Focus: How do multiple parties share a wire? This is the Medium Access Control (MAC) portion of the Link Layer Randomized access protocols: 1. Aloha 2.

More information

CHAPTER 7 MAC LAYER PROTOCOLS. Dr. Bhargavi Goswami Associate Professor & Head Department of Computer Science Garden City College

CHAPTER 7 MAC LAYER PROTOCOLS. Dr. Bhargavi Goswami Associate Professor & Head Department of Computer Science Garden City College CHAPTER 7 MAC LAYER PROTOCOLS Dr. Bhargavi Goswami Associate Professor & Head Department of Computer Science Garden City College MEDIUM ACCESS CONTROL - MAC PROTOCOLS When the two stations transmit data

More information

High Level View. EE 122: Ethernet and Random Access protocols. Medium Access Protocols

High Level View. EE 122: Ethernet and Random Access protocols. Medium Access Protocols High Level View EE 122: Ethernet and 802.11 Ion Stoica September 18, 2002 Goal: share a communication medium among multiple hosts connected to it Problem: arbitrate between connected hosts Solution goals:

More information

Data Link Layer: Collisions

Data Link Layer: Collisions Data Link Layer: Collisions 1 Multiple Access Data Link layer divided into two sublayers. The upper sublayer is responsible for datalink control, The lower sublayer is responsible for resolving access

More information

Wireless Local Area Networks. Networks: Wireless LANs 1

Wireless Local Area Networks. Networks: Wireless LANs 1 Wireless Local Area Networks Networks: Wireless LANs 1 Wireless Local Area Networks The proliferation of laptop computers and other mobile devices (PDAs and cell phones) created an obvious application

More information

Computer Network Fundamentals Spring Week 3 MAC Layer Andreas Terzis

Computer Network Fundamentals Spring Week 3 MAC Layer Andreas Terzis Computer Network Fundamentals Spring 2008 Week 3 MAC Layer Andreas Terzis Outline MAC Protocols MAC Protocol Examples Channel Partitioning TDMA/FDMA Token Ring Random Access Protocols Aloha and Slotted

More information

Chapter 6 Medium Access Control Protocols and Local Area Networks

Chapter 6 Medium Access Control Protocols and Local Area Networks Chapter 6 Medium Access Control Protocols and Local Area Networks Part I: Medium Access Control Part II: Local Area Networks CSE 3213, Winter 2010 Instructor: Foroohar Foroozan Chapter Overview Broadcast

More information

Multiple Access Protocols

Multiple Access Protocols Multiple Access Protocols Computer Networks Lecture 2 http://goo.gl/pze5o8 Multiple Access to a Shared Channel The medium (or its sub-channel) may be shared by multiple stations (dynamic allocation) just

More information

CS 43: Computer Networks Media Access. Kevin Webb Swarthmore College November 30, 2017

CS 43: Computer Networks Media Access. Kevin Webb Swarthmore College November 30, 2017 CS 43: Computer Networks Media Access Kevin Webb Swarthmore College November 30, 2017 Multiple Access Links & Protocols Two classes of links : point-to-point dial-up access link between Ethernet switch,

More information

CSE 461: Wireless Networks

CSE 461: Wireless Networks CSE 461: Wireless Networks Wireless IEEE 802.11 A physical and multiple access layer standard for wireless local area networks (WLAN) Ad Hoc Network: no servers or access points Infrastructure Network

More information

CSE 461 Multiple Access. David Wetherall

CSE 461 Multiple Access. David Wetherall CSE 461 Multiple Access David Wetherall djw@cs.washington.edu How to share a link Multiplexing = networking term for sharing a resource among multiple users (e.g., link, protocol instance) Topics: Multiplexing

More information

The MAC layer in wireless networks

The MAC layer in wireless networks The MAC layer in wireless networks The wireless MAC layer roles Access control to shared channel(s) Natural broadcast of wireless transmission Collision of signal: a /space problem Who transmits when?

More information

EE 122: Ethernet and

EE 122: Ethernet and EE 122: Ethernet and 802.11 Ion Stoica September 18, 2002 (* this talk is based in part on the on-line slides of J. Kurose & K. Rose) High Level View Goal: share a communication medium among multiple hosts

More information

Wireless Communications

Wireless Communications 4. Medium Access Control Sublayer DIN/CTC/UEM 2018 Why do we need MAC for? Medium Access Control (MAC) Shared medium instead of point-to-point link MAC sublayer controls access to shared medium Examples:

More information

Medium Access Control. CSCI370 Lecture 5 Michael Hutt New York Institute of Technology

Medium Access Control. CSCI370 Lecture 5 Michael Hutt New York Institute of Technology Medium Access Control CSCI370 Lecture 5 Michael Hutt New York Institute of Technology The Data Link Layer Logical Link Control (LLC) IEEE 802.2 Standard RFC 1042 Provides three service options Unreliable

More information

Markov Chains and Multiaccess Protocols: An. Introduction

Markov Chains and Multiaccess Protocols: An. Introduction Markov Chains and Multiaccess Protocols: An Introduction Laila Daniel and Krishnan Narayanan April 8, 2012 Outline of the talk Introduction to Markov Chain applications in Communication and Computer Science

More information

ECE 4450:427/527 - Computer Networks Spring 2017

ECE 4450:427/527 - Computer Networks Spring 2017 ECE 4450:427/527 - Computer Networks Spring 2017 Dr. Nghi Tran Department of Electrical & Computer Engineering Lecture 5.4: Multiple Access Protocols Dr. Nghi Tran (ECE-University of Akron) ECE 4450:427/527

More information

The MAC layer in wireless networks

The MAC layer in wireless networks The MAC layer in wireless networks The wireless MAC layer roles Access control to shared channel(s) Natural broadcast of wireless transmission Collision of signal: a time/space problem Who transmits when?

More information

Computer Communication III

Computer Communication III Computer Communication III Wireless Media Access IEEE 802.11 Wireless LAN Advantages of Wireless LANs Using the license free ISM band at 2.4 GHz no complicated or expensive licenses necessary very cost

More information

Wireless Local Area Networks (WLANs)) and Wireless Sensor Networks (WSNs) Computer Networks: Wireless Networks 1

Wireless Local Area Networks (WLANs)) and Wireless Sensor Networks (WSNs) Computer Networks: Wireless Networks 1 Wireless Local Area Networks (WLANs)) and Wireless Sensor Networks (WSNs) Computer Networks: Wireless Networks 1 Wireless Local Area Networks The proliferation of laptop computers and other mobile devices

More information

LANs Local Area Networks LANs provide an efficient network solution : To support a large number of stations Over moderately high speed

LANs Local Area Networks LANs provide an efficient network solution : To support a large number of stations Over moderately high speed Local Area Networks LANs provide an efficient network solution : To support a large number of stations Over moderately high speed With relatively small bit errors Multiaccess Protocols Communication among

More information

Data Link Layer -2- Network Access

Data Link Layer -2- Network Access EITF25 Internet: Technology and Applications Data Link Layer -2- Network Access 2015, Lecture 03 Kaan Bür Previously on EITF25 Logical Link Control Sublayer Flow control Send data Wait for ACK Error control

More information

Chapter 4. The Medium Access Control Sublayer

Chapter 4. The Medium Access Control Sublayer Chapter 4 The Medium Access Control Sublayer The Channel Allocation Problem Static Channel Allocation in LANs and MANs Dynamic Channel Allocation in LANs and MANs Dynamic Channel Allocation in LANs and

More information

Multiple Access Links and Protocols

Multiple Access Links and Protocols Multiple Access Links and Protocols Two types of links : point-to-point PPP for dial-up access point-to-point link between Ethernet switch and host broadcast (shared wire or medium) old-fashioned Ethernet

More information

CMPE 257: Wireless and Mobile Networking

CMPE 257: Wireless and Mobile Networking CMPE 257: Wireless and Mobile Networking Katia Obraczka Computer Engineering UCSC Baskin Engineering Lecture 3 CMPE 257 Spring'15 1 Next week Announcements April 14: ICN (Spencer Sevilla) April 16: DTN

More information

Medium Access Control. MAC protocols: design goals, challenges, contention-based and contention-free protocols

Medium Access Control. MAC protocols: design goals, challenges, contention-based and contention-free protocols Medium Access Control MAC protocols: design goals, challenges, contention-based and contention-free protocols 1 Why do we need MAC protocols? Wireless medium is shared Many nodes may need to access the

More information

Contention Protocols and Networks

Contention Protocols and Networks 4/13/2005 314 Lecture Contention Protocols and Networks 1 Contention Protocols and Networks Contention Protocols CSMA/CD Network Topologies Ethernet 4/13/2005 314 Lecture Contention Protocols and Networks

More information

Lecture 4: Wireless MAC Overview. Hung-Yu Wei National Taiwan University

Lecture 4: Wireless MAC Overview. Hung-Yu Wei National Taiwan University Lecture 4: Wireless MAC Overview Hung-Yu Wei National Taiwan University Medium Access Control Topology 3 Simplex and Duplex 4 FDMA TDMA CDMA DSSS FHSS Multiple Access Methods Notice: CDMA and spread spectrum

More information

COMPUTER NETWORKS - Local area networks

COMPUTER NETWORKS - Local area networks Local area networks Telecommunication Networks Group firstname.lastname@polito.it http://www.telematica.polito.it/ COMPUTER NETWORKS LANs - 1 Copyright Quest opera è protetta dalla licenza Creative Commons

More information

Local area networks. Copyright

Local area networks. Copyright Local area networks Telecommunication Networks Group firstname.lastname@polito.it http://www.telematica.polito.it/ COMPUTER NETWORKS LANs - 1 Copyright Quest opera è protetta dalla licenza Creative Commons

More information

Data Link Layer -2- Network Access

Data Link Layer -2- Network Access EITF25 Internet: Technology and Applications Data Link Layer -2- Network Access 2013, Lecture 03 Kaan Bür, Stefan Höst Previously on EITF25 Logical Link Control Sublayer Flow control Send data Wait for

More information

Ethernet. Introduction. CSE 3213 Fall 2011

Ethernet. Introduction. CSE 3213 Fall 2011 Ethernet CSE 3213 Fall 2011 19 October 2011 1 Introduction Rapid changes in technology designs Broader use of LANs New schemes for high-speed LANs High-speed LAN technologies: Fast and gigabit Ethernet

More information

Computer Networks. Medium Access Sublayer (Part I)

Computer Networks. Medium Access Sublayer (Part I) Computer Networks Medium Access Sublayer (Part I) Topics Introduction Multiple Access Protocols Ethernet Wireless LAN Protocols Bridges Misc (brief) High-Speed LANs Satellite Networks Introduction Remember,

More information

Medium Access Control Sublayer

Medium Access Control Sublayer Wireless (WLAN) Medium Access Control Sublayer Mahalingam Mississippi State University, MS October 20, 2014 Outline Medium Access Protocols Wireless (WLAN) 1 Medium Access Protocols ALOHA Slotted ALOHA

More information

CSE/EE 461 Wireless and Contention-Free Protocols

CSE/EE 461 Wireless and Contention-Free Protocols CSE/EE 461 Wireless and Contention-Free Protocols Last Time The multi-access problem Medium Access Control (MAC) sublayer Random access protocols: Aloha CSMA variants Classic Ethernet (CSMA/CD) Application

More information

The Medium Access Control Sublayer

The Medium Access Control Sublayer The Medium Access Control Sublayer Chapter 4 Channel Allocation Problem Static channel allocation Assumptions for dynamic Assumptions for Dynamic Channel Allocation 1. Independent traffic 2. Single channel

More information

Mohamed Khedr.

Mohamed Khedr. Mohamed Khedr http://webmail.aast.edu/~khedr Tentatively Week 1 Week 2 Week 3 Week 4 Week 5 Week 6 Week 7 Week 8 Week 9 Week 10 Week 11 Week 12 Week 13 Week 14 Week 15 Overview Packet Switching IP addressing

More information

Data Link Layer, Part 5. Medium Access Control

Data Link Layer, Part 5. Medium Access Control CS 455 Medium Access Control, Page 1 Data Link Layer, Part 5 Medium Access Control These slides are created by Dr. Yih Huang of George Mason University. Students registered in Dr. Huang s courses at GMU

More information

Computer Networks Medium Access Control. Mostafa Salehi Fall 2008

Computer Networks Medium Access Control. Mostafa Salehi Fall 2008 Computer Networks Medium Access Control Mostafa Salehi Fall 2008 2008 1 Outline Issues ALOHA Network Ethernet Token Ring Wireless 2 Main Issues Local Area Network (LAN) : Three or more machines are physically

More information

Protocols for Multiaccess Networks

Protocols for Multiaccess Networks Protocols for Multiaccess Networks Hosts broadcast packets When a collision occurs, all transmitted packets are lost Lost packets have to be retransmitted => Need Multiaccess Protocol Model - Slotted Aloha

More information

Medium Access Control Sublayer Chapter 4

Medium Access Control Sublayer Chapter 4 Medium Access Control Sublayer Chapter 4 Channel Allocation Problem Multiple Access Protocols Ethernet Wireless LANs Broadband Wireless Bluetooth RFID Data Link Layer Switching Revised: August 2011 & February

More information

COMP/ELEC 429/556 Introduction to Computer Networks

COMP/ELEC 429/556 Introduction to Computer Networks COMP/ELEC 429/556 Introduction to Computer Networks Broadcast network access control Some slides used with permissions from Edward W. Knightly, T. S. Eugene Ng, Ion Stoica, Hui Zhang T. S. Eugene Ng eugeneng

More information

Local Networks. Lecture 4 6-Apr-2016

Local Networks. Lecture 4 6-Apr-2016 Local Networks Lecture 4 6-Apr-2016 Roadmap of the Course So far Basic telecom concepts General study of LANs LAN topologies Flow and error control Today we continue the general study of LANs Medium access

More information

Announcements / Wireless Networks and Applications Lecture 9: Wireless LANs Wireless. Regular Ethernet CSMA/CD.

Announcements / Wireless Networks and Applications Lecture 9: Wireless LANs Wireless. Regular Ethernet CSMA/CD. Announcements 18-452/18-750 Wireless Networks and Applications Lecture 9: Wireless LANs 802.11 Wireless Peter Steenkiste Homework 1 should be out by tomorrow Project 1 by Friday Schedule:» Thursday lecture

More information

Redes de Computadores. Medium Access Control

Redes de Computadores. Medium Access Control Redes de Computadores Medium Access Control Manuel P. Ricardo Faculdade de Engenharia da Universidade do Porto 1 » How to control the access of computers to a communication medium?» What is the ideal Medium

More information

Media Access Control in Ad Hoc Networks

Media Access Control in Ad Hoc Networks Media Access Control in Ad Hoc Networks The Wireless Medium is a scarce precious resource. Furthermore, the access medium is broadcast in nature. It is necessary to share this resource efficiently and

More information

EITF25 Internet Techniques and Applications L4: Network Access. Stefan Höst

EITF25 Internet Techniques and Applications L4: Network Access. Stefan Höst EITF25 Internet Techniques and Applications L4: Network Access Stefan Höst Repetition The link layer protocol should make sure that the data is correctly transmitted over the physical link using error

More information

Medium Access Control Sublayer Chapter 4

Medium Access Control Sublayer Chapter 4 Medium Access Control Sublayer Chapter 4 Channel Allocation Problem Multiple Access Protocols Ethernet Wireless LANs Broadband Wireless Bluetooth RFID Data Link Layer Switching Revised: August 2011 The

More information

College of Computer and Information Sciences Department of Computer Engineering CEN444 Computer Networks Midterm 2 Exam Second Semester 1434/1435

College of Computer and Information Sciences Department of Computer Engineering CEN444 Computer Networks Midterm 2 Exam Second Semester 1434/1435 College of Computer and Information Sciences Department of Computer Engineering CEN444 Computer Networks Midterm 2 Exam Second Semester 1434/1435 Student Name ID Time Allowed: 2.0 Hours. Closed Book, Closed

More information

Data and Computer Communications. Chapter 11 Local Area Network

Data and Computer Communications. Chapter 11 Local Area Network Data and Computer Communications Chapter 11 Local Area Network LAN Topologies Refers to the way in which the stations attached to the network are interconnected Bus Topology Used with multipoint medium

More information

Chapter 4: The Medium Access Layer

Chapter 4: The Medium Access Layer Chapter 4: The Medium Access Layer Computer Networks Maccabe Computer Science Department The University of New Mexico September 2002 Medium Access Layer Point-to-point versus broadcast networks Broadcast

More information

Access Technologies! Fabio Martignon

Access Technologies! Fabio Martignon Access Technologies! Fabio Martignon 1 LAN Ethernet - IEEE 802.3 Broadcast Bus Capacity=10 Mb/s Xerox-Intel-Digital inventors Standardized at the beginning of the 80s as IEEE 802.3 Big Success and Several

More information

Wireless Medium Access Control Protocols

Wireless Medium Access Control Protocols Wireless Medium Access Control Protocols Telecomunicazioni Undergraduate course in Electrical Engineering University of Rome La Sapienza Rome, Italy 2007-2008 Classification of wireless MAC protocols Wireless

More information

Wireless MACs: MACAW/802.11

Wireless MACs: MACAW/802.11 Wireless MACs: MACAW/802.11 Mark Handley UCL Computer Science CS 3035/GZ01 Fundamentals: Spectrum and Capacity A particular radio transmits over some range of frequencies; its bandwidth, in the physical

More information

Random Assignment Protocols

Random Assignment Protocols Random Assignment Protocols Random assignment strategies attempt to reduce problem occur in fixed assignment strategy by eliminating pre allocation of bandwidth to communicating nodes. Random assignment

More information

Goals. Fundamentals of Network Media. More topics. Topics. Multiple access communication. Multiple access solutions

Goals. Fundamentals of Network Media. More topics. Topics. Multiple access communication. Multiple access solutions Fundamentals of Network Media Local Area Networks Ursula Holmström Goals Learn the basic concepts related to LAN technologies, for example use of shared media medium access control topologies Know the

More information

Outline. Introduction to Networked Embedded Systems - Embedded systems Networked embedded systems Embedded Internet - Network properties

Outline. Introduction to Networked Embedded Systems - Embedded systems Networked embedded systems Embedded Internet - Network properties Outline Introduction to Networked Embedded Systems - Embedded systems Networked embedded systems Embedded Internet - Network properties Layered Network Architectures - OSI framework descriptions of layers

More information

Outline / Wireless Networks and Applications Lecture 9: Wireless LANs Aloha and 802 Wireless. Regular Ethernet CSMA/CD

Outline / Wireless Networks and Applications Lecture 9: Wireless LANs Aloha and 802 Wireless. Regular Ethernet CSMA/CD Page 1 Outline 18-452/18-750 Wireless Networks and Applications Lecture 9: Wireless LANs Aloha and 802 Wireless Peter Steenkiste Data link fundamentals» And what changes in wireless Aloha Ethernet Wireless-specific

More information

Lecture 6. Data Link Layer (cont d) Data Link Layer 1-1

Lecture 6. Data Link Layer (cont d) Data Link Layer 1-1 Lecture 6 Data Link Layer (cont d) Data Link Layer 1-1 Agenda Continue the Data Link Layer Multiple Access Links and Protocols Addressing Data Link Layer 1-2 Multiple Access Links and Protocols Two types

More information

IEEE Medium Access Control. Medium Access Control

IEEE Medium Access Control. Medium Access Control IEEE 802.11 Medium Access Control EECS3214 3 April 2018 Medium Access Control reliable data delivery access control MAC layer covers three functional areas: security 2 1 MAC Requirements To avoid interference

More information

Intelligent Transportation Systems. Medium Access Control. Prof. Dr. Thomas Strang

Intelligent Transportation Systems. Medium Access Control. Prof. Dr. Thomas Strang Intelligent Transportation Systems Medium Access Control Prof. Dr. Thomas Strang Recap: Wireless Interconnections Networking types + Scalability + Range Delay Individuality Broadcast o Scalability o Range

More information

Overview. Wireless networks basics IEEE (Wi-Fi) a/b/g/n ad Hoc MAC protocols ad Hoc routing DSR AODV

Overview. Wireless networks basics IEEE (Wi-Fi) a/b/g/n ad Hoc MAC protocols ad Hoc routing DSR AODV Wireless networks 1 Overview Wireless networks basics IEEE 802.11 (Wi-Fi) a/b/g/n ad Hoc MAC protocols ad Hoc routing DSR AODV 2 Wireless Networks Autonomous systems of mobile hosts connected by wireless

More information

Link Layer. (continued)

Link Layer. (continued) Link Layer (continued) Topics 1. Framing Delimiting start/end of frames 2. Error detection and correction Handling errors 3. Retransmissions Handling loss 4. Multiple Access 802.11, classic Ethernet 5.

More information

CSMA/CD (Collision Detection)

CSMA/CD (Collision Detection) CSMA/CD (Collision Detection) CD (collision detection): easy in wired LANs: measure signal strengths, compare transmitted, received signals difficult in wireless LANs: received signal strength overwhelmed

More information

Chapter 6 Medium Access Control Protocols and Local Area Networks

Chapter 6 Medium Access Control Protocols and Local Area Networks Chapter 6 Medium Access Control Protocols and Local Area Networks Part I: Medium Access Control Part II: Local Area Networks Chapter Overview Broadcast Networks All information sent to all users No routing

More information

CS 716: Introduction to communication networks. - 9 th class; 19 th Aug Instructor: Sridhar Iyer IIT Bombay

CS 716: Introduction to communication networks. - 9 th class; 19 th Aug Instructor: Sridhar Iyer IIT Bombay CS 716: Introduction to communication networks - 9 th class; 19 th Aug 2011 Instructor: Sridhar Iyer IIT Bombay Contention-based MAC: ALOHA Users transmit whenever they have data to send Collisions occur,

More information

TSIN01 Information Networks Lecture 3

TSIN01 Information Networks Lecture 3 TSIN01 Information Networks Lecture 3 Danyo Danev Division of Communication Systems Department of Electrical Engineering Linköping University, Sweden September 10 th, 2018 Danyo Danev TSIN01 Information

More information

Topics. Link Layer Services (more) Link Layer Services LECTURE 5 MULTIPLE ACCESS AND LOCAL AREA NETWORKS. flow control: error detection:

Topics. Link Layer Services (more) Link Layer Services LECTURE 5 MULTIPLE ACCESS AND LOCAL AREA NETWORKS. flow control: error detection: 1 Topics 2 LECTURE 5 MULTIPLE ACCESS AND LOCAL AREA NETWORKS Multiple access: CSMA/CD, CSMA/CA, token passing, channelization LAN: characteristics, i basic principles i Protocol architecture Topologies

More information

MAC LAYER. Murat Demirbas SUNY Buffalo

MAC LAYER. Murat Demirbas SUNY Buffalo MAC LAYER Murat Demirbas SUNY Buffalo MAC categories Fixed assignment TDMA (Time Division), CDMA (Code division), FDMA (Frequency division) Unsuitable for dynamic, bursty traffic in wireless networks Random

More information

Data and Computer Communications

Data and Computer Communications Data and Computer Communications Chapter 16 High Speed LANs Eighth Edition by William Stallings Why High Speed LANs? speed and power of PCs has risen graphics-intensive applications and GUIs see LANs as

More information

Lecture 12 December 04, Wireless Access. Graduate course in Communications Engineering. University of Rome La Sapienza. Rome, Italy

Lecture 12 December 04, Wireless Access. Graduate course in Communications Engineering. University of Rome La Sapienza. Rome, Italy Lecture 12 December 04, 2017 Wireless Access Graduate course in Communications Engineering University of Rome La Sapienza Rome, Italy 2017-2018 Random Medium Access Control Part II - CSMA and Collision

More information

IEEE , Token Rings. 10/11/06 CS/ECE UIUC, Fall

IEEE , Token Rings. 10/11/06 CS/ECE UIUC, Fall IEEE 802.11, Token Rings 10/11/06 CS/ECE 438 - UIUC, Fall 2006 1 Medium Access Control Wireless channel is a shared medium Need access control mechanism to avoid interference Why not CSMA/CD? 10/11/06

More information

Medium Access Control

Medium Access Control Medium Access Control Fundamental Problem N nodes in vicinity want to transmit (to, say, N other nodes). How to do this interference free? Interference free means SINR Otherwise, we say that packets collide.

More information

Multiple Access (1) Required reading: Garcia 6.1, 6.2.1, CSE 3213, Fall 2010 Instructor: N. Vlajic

Multiple Access (1) Required reading: Garcia 6.1, 6.2.1, CSE 3213, Fall 2010 Instructor: N. Vlajic 1 Multiple Access (1) Required reading: Garcia 6.1, 6.2.1, 6.2.2 CSE 3213, Fall 2010 Instructor: N. Vlajic Multiple Access Communications 2 Broadcast Networks aka multiple access networks multiple sending

More information

Wireless Local Area Networks (WLANs) and Wireless Sensor Networks (WSNs) Primer. Computer Networks: Wireless LANs

Wireless Local Area Networks (WLANs) and Wireless Sensor Networks (WSNs) Primer. Computer Networks: Wireless LANs Wireless Local Area Networks (WLANs) and Wireless Sensor Networks (WSNs) Primer 1 Wireless Local Area Networks (WLANs) The proliferation of laptop computers and other mobile devices (PDAs and cell phones)

More information

Getting Connected (Chapter 2 Part 4) Networking CS 3470, Section 1 Sarah Diesburg

Getting Connected (Chapter 2 Part 4) Networking CS 3470, Section 1 Sarah Diesburg Getting Connected (Chapter 2 Part 4) Networking CS 3470, Section 1 Sarah Diesburg Five Problems Encoding/decoding Framing Error Detection Error Correction Media Access Five Problems Encoding/decoding Framing

More information

Data Link Layer, Part 3 Medium Access Control. Preface

Data Link Layer, Part 3 Medium Access Control. Preface Data Link Layer, Part 3 Medium Access Control These slides are created by Dr. Yih Huang of George Mason University. Students registered in Dr. Huang's courses at GMU can make a single machine-readable

More information

Wireless Communication and Networking CMPT 371

Wireless Communication and Networking CMPT 371 Wireless Communication and Networking CMPT 371 Wireless Systems: AM, FM Radio TV Broadcast Satellite Broadcast 2-way Radios Cordless Phones Satellite Links Mobile Telephony Systems Wireless Local Loop

More information

Problem Set Name the 7 OSI layers and give the corresponding functionalities for each layer.

Problem Set Name the 7 OSI layers and give the corresponding functionalities for each layer. Problem Set 1 1. Why do we use layering in computer networks? 2. Name the 7 OSI layers and give the corresponding functionalities for each layer. 3. Compare the network performance of the 3 Multiple Access

More information

CS/ECE 439: Wireless Networking. MAC Layer Road to Wireless

CS/ECE 439: Wireless Networking. MAC Layer Road to Wireless CS/ECE 439: Wireless Networking MAC Layer Road to Wireless Multiple Access Media Media access Controlling which frame should be sent over the link next Easy for point-to-point links; half versus full duplex

More information