Where Are We? Basics: Network Classification Network Architecture Reliable Data Transfer Delay Models Implementation: Protocol Design

Size: px
Start display at page:

Download "Where Are We? Basics: Network Classification Network Architecture Reliable Data Transfer Delay Models Implementation: Protocol Design"

Transcription

1 Where Are We? Basics: Network Classification Network Architecture Reliable Data Transfer Delay Models Implementation: Protocol Design

2 Layered Architecture

3 Layered Architecture

4 Data Link Layer Functionality Reliable Delivery of Frames Flow Control Error Detection Error Correction

5 Multiaccess Media

6 Multiaccess Media

7 Multiaccess Media Rules Don t interrupt when someone else is speaking Raise your hand if you have a question Give everyone a chance to speak

8 Multiaccess Media Rules Don t interrupt when someone else is speaking Raise your hand if you have a question Give everyone a chance to speak

9 Multiaccess Media Rules Don t interrupt when someone else is speaking Raise your hand if you have a question Give everyone a chance to speak

10 Multiaccess Media Rules Don t interrupt when someone else is speaking Raise your hand if you have a question Give everyone a chance to speak

11 Multiaccess Protocols Channel Partitioning (Cellular Wireless Networks) Random Access (Ethernet, WiFi) Taking Turns (Token Ring)

12 Multiaccess Protocols Channel Partitioning (Cellular Wireless Networks) Random Access (Ethernet, WiFi) Taking Turns (Token Ring)

13 Multiaccess Protocols Channel Partitioning (Cellular Wireless Networks) Random Access (Ethernet, WiFi) Taking Turns (Token Ring)

14 Multiaccess Protocols Channel Partitioning (Cellular Wireless Networks) Random Access (Ethernet, WiFi) Taking Turns (Token Ring)

15 Protocols for Multiaccess Networks Hosts broadcast packets When a collision occurs, all transmitted packets are lost Lost packets have to be retransmitted

16 Protocols for Multiaccess Networks Hosts broadcast packets When a collision occurs, all transmitted packets are lost Lost packets have to be retransmitted

17 Protocols for Multiaccess Networks Hosts broadcast packets When a collision occurs, all transmitted packets are lost Lost packets have to be retransmitted

18 Protocols for Multiaccess Networks Hosts broadcast packets When a collision occurs, all transmitted packets are lost Lost packets have to be retransmitted

19 Protocols for Multiaccess Networks Hosts broadcast packets When a collision occurs, all transmitted packets are lost Lost packets have to be retransmitted => Need Multiaccess Protocol

20 Protocols for Multiaccess Networks Goal: Understand Multiaccess Protocols Understand Ethernet and IEEE Protocol Issues: How to deal with collisions? Maximal traffic load? ( > Protocol design) ( > Protocol performance)

21 Protocols for Multiaccess Networks Goal: Understand Multiaccess Protocols Understand Ethernet and IEEE Protocol Issues: How to deal with collisions? Maximal traffic load? ( > Protocol design) ( > Protocol performance)

22 Protocols for Multiaccess Networks Goal: Understand Multiaccess Protocols Understand Ethernet and IEEE Protocol Issues: How to deal with collisions? Maximal traffic load? ( > Protocol design) ( > Protocol performance)

23 Protocols for Multiaccess Networks Goal: Understand Multiaccess Protocols Understand Ethernet and IEEE Protocol Issues: How to deal with collisions? Maximal traffic load? ( > Protocol design) ( > Protocol performance)

24 Protocols for Multiaccess Networks Goal: Understand Multiaccess Protocols Understand Ethernet and IEEE Protocol Issues: How to deal with collisions? Maximal traffic load? ( > Protocol design) ( > Protocol performance)

25 Time is divided into slots: unit time = L C seconds Packet arrival rate (over all hosts) of λ packets/time unit Collision or Perfect Reception Immediate Feedback: 0, 1, e (Re-)transmission Probability: q r Infinite number of hosts (i.e. each node has at most one packet to transmit)

26 Time is divided into slots: unit time = L C seconds Packet arrival rate (over all hosts) of λ packets/time unit Collision or Perfect Reception Immediate Feedback: 0, 1, e (Re-)transmission Probability: q r Infinite number of hosts (i.e. each node has at most one packet to transmit)

27 Time is divided into slots: unit time = L C seconds Packet arrival rate (over all hosts) of λ packets/time unit Collision or Perfect Reception Immediate Feedback: 0, 1, e (Re-)transmission Probability: q r Infinite number of hosts (i.e. each node has at most one packet to transmit)

28 Time is divided into slots: unit time = L C seconds Packet arrival rate (over all hosts) of λ packets/time unit Collision or Perfect Reception Immediate Feedback: 0, 1, e (Re-)transmission Probability: q r Infinite number of hosts (i.e. each node has at most one packet to transmit)

29 Time is divided into slots: unit time = L C seconds Packet arrival rate (over all hosts) of λ packets/time unit Collision or Perfect Reception Immediate Feedback: 0, 1, e (Re-)transmission Probability: q r Infinite number of hosts (i.e. each node has at most one packet to transmit)

30 Questions Throughput? How to choose q r? Would q r = 1 work? Probability for (re-)transmission after k 1 slots: Average time until (re-)transmission:

31 Questions Throughput? How to choose q r? Would q r = 1 work? Probability for (re-)transmission after k 1 slots: Average time until (re-)transmission:

32 Questions Throughput? How to choose q r? Would q r = 1 work? Probability for (re-)transmission after k 1 slots: Average time until (re-)transmission:

33 Questions Throughput? How to choose q r? Would q r = 1 work? Probability for (re-)transmission after k 1 slots: Average time until (re-)transmission:

34 Questions Throughput? How to choose q r? Would q r = 1 work? Probability for (re-)transmission after k 1 slots: Average time until (re-)transmission:

35 Questions Throughput? How to choose q r? Would q r = 1 work? Probability for (re-)transmission after k 1 slots: Average time until (re-)transmission:

36 Notation λ: aggregated arrival rate n: number of backlogged packets G(n) = nq r : average number of transmissions per time slot Want to compute P succ : probability of successful transmission in a time slot (as a function of G(n)) Throughput = Psucc 1

37 Notation λ: aggregated arrival rate n: number of backlogged packets G(n) = nq r : average number of transmissions per time slot Want to compute P succ : probability of successful transmission in a time slot (as a function of G(n)) Throughput = Psucc 1

38 Notation λ: aggregated arrival rate n: number of backlogged packets G(n) = nq r : average number of transmissions per time slot Want to compute P succ : probability of successful transmission in a time slot (as a function of G(n)) Throughput = Psucc 1

39 Notation λ: aggregated arrival rate n: number of backlogged packets G(n) = nq r : average number of transmissions per time slot Want to compute P succ : probability of successful transmission in a time slot (as a function of G(n)) Throughput = Psucc 1

40 Notation λ: aggregated arrival rate n: number of backlogged packets G(n) = nq r : average number of transmissions per time slot Want to compute P succ : probability of successful transmission in a time slot (as a function of G(n)) Throughput = Psucc 1

41 Notation λ: aggregated arrival rate n: number of backlogged packets G(n) = nq r : average number of transmissions per time slot Want to compute P succ : probability of successful transmission in a time slot (as a function of G(n)) Throughput = Psucc 1

42 P succ = nq r ( 1 q r ) n 1 = nq r 1 q r ( 1 q r ) n

43 P succ = nq r ( 1 q r ) n 1 = nq r 1 q r ( 1 q r ) n For q r small, we have ( 1 q r ) n e nq r and nq r 1 q r nq r,

44 P succ = nq r ( 1 q r ) n 1 = nq r 1 q r ( 1 q r ) n For q r small, we have ( 1 q r ) n e nq r and nq r 1 q r nq r, and we obtain P succ nq r e nqr = G(n)e G(n) where G(n) = nq r

45 Throughput: G(n)e G(n) where G(n) = nq r

46 Throughput: G(n)e G(n) where G(n) = nq r Note: Arrivals according to a Poisson distribution with rate G: p k = Gk k! e G

47 If G(n)e G(n) > λ: If G(n)e G(n) < λ: Optimal G(n) = nq r = 1, or q r = 1 n

48 If G(n)e G(n) > λ: If G(n)e G(n) < λ: Optimal G(n) = nq r = 1, or q r = 1 n

49 If G(n)e G(n) > λ: If G(n)e G(n) < λ: Optimal G(n) = nq r = 1, or q r = 1 n

50 If G(n)e G(n) > λ: If G(n)e G(n) < λ: Optimal G(n) = nq r = 1, or q r = 1 n

51 What did we learn? λ max = e q r should dynamically change Binary Exponential Backoff q r = 2 k

52 What did we learn? λ max = e q r should dynamically change Binary Exponential Backoff q r = 2 k

53 What did we learn? λ max = e q r should dynamically change Binary Exponential Backoff q r = 2 k

54 What did we learn? λ max = e q r should dynamically change Binary Exponential Backoff q r = 2 k

Protocols for Multiaccess Networks

Protocols for Multiaccess Networks Protocols for Multiaccess Networks Hosts broadcast packets When a collision occurs, all transmitted packets are lost Lost packets have to be retransmitted => Need Multiaccess Protocol Model - Slotted Aloha

More information

Multiple Access (1) Required reading: Garcia 6.1, 6.2.1, CSE 3213, Fall 2010 Instructor: N. Vlajic

Multiple Access (1) Required reading: Garcia 6.1, 6.2.1, CSE 3213, Fall 2010 Instructor: N. Vlajic 1 Multiple Access (1) Required reading: Garcia 6.1, 6.2.1, 6.2.2 CSE 3213, Fall 2010 Instructor: N. Vlajic Multiple Access Communications 2 Broadcast Networks aka multiple access networks multiple sending

More information

Multiple Access Communications. EEE 538, WEEK 11 Dr. Nail Akar Bilkent University Electrical and Electronics Engineering Department

Multiple Access Communications. EEE 538, WEEK 11 Dr. Nail Akar Bilkent University Electrical and Electronics Engineering Department Multiple Access Communications EEE 538, WEEK 11 Dr. Nail Akar Bilkent University Electrical and Electronics Engineering Department 1 Multiple Access Satellite systems, radio networks (WLAN), ethernet segment

More information

Power Laws in ALOHA Systems

Power Laws in ALOHA Systems Power Laws in ALOHA Systems E6083: lecture 7 Prof. Predrag R. Jelenković Dept. of Electrical Engineering Columbia University, NY 10027, USA predrag@ee.columbia.edu February 28, 2007 Jelenković (Columbia

More information

Packet multiple access and the Aloha protocol

Packet multiple access and the Aloha protocol Packet multiple access and the Aloha protocol Massachusetts Institute of Technology Department of Aeronautics and Astronautics Slide 1 Packet Multiple Access PMA SHARED UPLINK TERMINAL TERMINAL APPL TRANS

More information

Computer Network Fundamentals Spring Week 3 MAC Layer Andreas Terzis

Computer Network Fundamentals Spring Week 3 MAC Layer Andreas Terzis Computer Network Fundamentals Spring 2008 Week 3 MAC Layer Andreas Terzis Outline MAC Protocols MAC Protocol Examples Channel Partitioning TDMA/FDMA Token Ring Random Access Protocols Aloha and Slotted

More information

Chapter 6 Medium Access Control Protocols and Local Area Networks

Chapter 6 Medium Access Control Protocols and Local Area Networks Chapter 6 Medium Access Control Protocols and Local Area Networks Part I: Medium Access Control Part II: Local Area Networks CSE 3213, Winter 2010 Instructor: Foroohar Foroozan Chapter Overview Broadcast

More information

Wireless Medium Access Control Protocols

Wireless Medium Access Control Protocols Wireless Medium Access Control Protocols Telecomunicazioni Undergraduate course in Electrical Engineering University of Rome La Sapienza Rome, Italy 2007-2008 Classification of wireless MAC protocols Wireless

More information

Multimedia Communication Services Traffic Modeling and Streaming

Multimedia Communication Services Traffic Modeling and Streaming Multimedia Communication Services Traffic Modeling and Streaming Medium Access Control algorithms Introduction and details on Aloha networks with infinite nodes Università degli Studi di Brescia A.A. 2014/2015

More information

COMP/ELEC 429/556 Introduction to Computer Networks

COMP/ELEC 429/556 Introduction to Computer Networks COMP/ELEC 429/556 Introduction to Computer Networks Broadcast network access control Some slides used with permissions from Edward W. Knightly, T. S. Eugene Ng, Ion Stoica, Hui Zhang T. S. Eugene Ng eugeneng

More information

Simulated SA Throughput vs. p

Simulated SA Throughput vs. p Problem 1. Simulation of Slotted Aloha network (A) There are n stations in the network that are trying to transmit messages to an access point. (B) All the stations are synchronized and they are using

More information

ECE 4450:427/527 - Computer Networks Spring 2017

ECE 4450:427/527 - Computer Networks Spring 2017 ECE 4450:427/527 - Computer Networks Spring 2017 Dr. Nghi Tran Department of Electrical & Computer Engineering Lecture 5.4: Multiple Access Protocols Dr. Nghi Tran (ECE-University of Akron) ECE 4450:427/527

More information

EITF25 Internet Techniques and Applications L4: Network Access. Stefan Höst

EITF25 Internet Techniques and Applications L4: Network Access. Stefan Höst EITF25 Internet Techniques and Applications L4: Network Access Stefan Höst Repetition The link layer protocol should make sure that the data is correctly transmitted over the physical link using error

More information

Random Access. 1. Aloha. 2. Slotted Aloha 3. CSMA 4. CSMA/CD

Random Access. 1. Aloha. 2. Slotted Aloha 3. CSMA 4. CSMA/CD Random Access 1. Aloha 2. Slotted Aloha 3. CSMA 4. CSMA/CD Background Communication medium B No Collision collision A C Modern Local Area Networks (LANs) operate as follows Users are connected to communication

More information

TSIN01 Information Networks Lecture 8

TSIN01 Information Networks Lecture 8 TSIN01 Information Networks Lecture 8 Danyo Danev Division of Communication Systems Department of Electrical Engineering Linköping University, Sweden September 24 th, 2018 Danyo Danev TSIN01 Information

More information

COMPUTER NETWORKS - Local area networks

COMPUTER NETWORKS - Local area networks Local area networks Telecommunication Networks Group firstname.lastname@polito.it http://www.telematica.polito.it/ COMPUTER NETWORKS LANs - 1 Copyright Quest opera è protetta dalla licenza Creative Commons

More information

Local area networks. Copyright

Local area networks. Copyright Local area networks Telecommunication Networks Group firstname.lastname@polito.it http://www.telematica.polito.it/ COMPUTER NETWORKS LANs - 1 Copyright Quest opera è protetta dalla licenza Creative Commons

More information

Markov Chains and Multiaccess Protocols: An. Introduction

Markov Chains and Multiaccess Protocols: An. Introduction Markov Chains and Multiaccess Protocols: An Introduction Laila Daniel and Krishnan Narayanan April 8, 2012 Outline of the talk Introduction to Markov Chain applications in Communication and Computer Science

More information

ECE 158A: Lecture 13. Fall 2015

ECE 158A: Lecture 13. Fall 2015 ECE 158A: Lecture 13 Fall 2015 Random Access and Ethernet! Random Access! Basic idea: Exploit statistical multiplexing Do not avoid collisions, just recover from them When a node has packet to send Transmit

More information

Splitting Algorithms

Splitting Algorithms Splitting Algorithms We have seen that slotted Aloha has maximal throughput 1/e Now we will look at more sophisticated collision resolution techniques which have higher achievable throughput These techniques

More information

EP2210 FEP3210 Performance analysis of Communication networks. Topic 2 Medium access control (or multiple access protocols)

EP2210 FEP3210 Performance analysis of Communication networks. Topic 2 Medium access control (or multiple access protocols) EP2210 FEP3210 Performance analysis of Communication networks Topic 2 Medium access control (or multiple access protocols) 1 Medium access control Lecture material: R. Rom, M. idi, Multiple access protocols,

More information

CS 43: Computer Networks. 27: Media Access Contd. December 3, 2018

CS 43: Computer Networks. 27: Media Access Contd. December 3, 2018 CS 43: Computer Networks 27: Media Access Contd. December 3, 2018 Last Class The link layer provides lots of functionality: addressing, framing, media access, error checking could be used independently

More information

CS 716: Introduction to communication networks. - 9 th class; 19 th Aug Instructor: Sridhar Iyer IIT Bombay

CS 716: Introduction to communication networks. - 9 th class; 19 th Aug Instructor: Sridhar Iyer IIT Bombay CS 716: Introduction to communication networks - 9 th class; 19 th Aug 2011 Instructor: Sridhar Iyer IIT Bombay Contention-based MAC: ALOHA Users transmit whenever they have data to send Collisions occur,

More information

CSE/EE 461 Section 2

CSE/EE 461 Section 2 CSE/EE 461 Section 2 Latency in a store-and-forward network 4ms, 10MB/s B How long does it take to send a 2kB packet from to B? 2ms, 10MB/s C 2ms, 10MB/s B What if it has to pass through a node C? Plan

More information

Multiple Access Protocols

Multiple Access Protocols Multiple Access Protocols Computer Networks Lecture 2 http://goo.gl/pze5o8 Multiple Access to a Shared Channel The medium (or its sub-channel) may be shared by multiple stations (dynamic allocation) just

More information

TSIN01 Information Networks Lecture 3

TSIN01 Information Networks Lecture 3 TSIN01 Information Networks Lecture 3 Danyo Danev Division of Communication Systems Department of Electrical Engineering Linköping University, Sweden September 10 th, 2018 Danyo Danev TSIN01 Information

More information

CS 3640: Introduction to Networks and Their Applications

CS 3640: Introduction to Networks and Their Applications CS 3640: Introduction to Networks and Their Applications Fall 2018, Lecture 7: The Link Layer II Medium Access Control Protocols Instructor: Rishab Nithyanand Teaching Assistant: Md. Kowsar Hossain 1 You

More information

CS 123: Lecture 12, LANs, and Ethernet. George Varghese. October 24, 2006

CS 123: Lecture 12, LANs, and Ethernet. George Varghese. October 24, 2006 CS 123: Lecture 12, LANs, and Ethernet George Varghese October 24, 2006 Selective Reject Modulus failure Example w = 2, Max = 3 0 0 1 3 0 A(1) A(2) 1 0 retransmit A(1) A(2) buffer Case 1 Case 2 reject

More information

RMIT University. Data Communication and Net-Centric Computing COSC 1111/2061/1110. Lecture 8. Medium Access Control Methods & LAN

RMIT University. Data Communication and Net-Centric Computing COSC 1111/2061/1110. Lecture 8. Medium Access Control Methods & LAN RMIT University Data Communication and Net-Centric Computing COSC 1111/2061/1110 Medium Access Control Methods & LAN Technology Slide 1 Lecture Overview During this lecture, we will Look at several Multiple

More information

LANs. Local Area Networks. via the Media Access Control (MAC) SubLayer. Networks: Local Area Networks

LANs. Local Area Networks. via the Media Access Control (MAC) SubLayer. Networks: Local Area Networks LANs Local Area Networks via the Media Access Control (MAC) SubLayer 1 Local Area Networks Aloha Slotted Aloha CSMA (non-persistent, 1-persistent, p-persistent) CSMA/CD Ethernet Token Ring 2 Network Layer

More information

CS 43: Computer Networks Media Access. Kevin Webb Swarthmore College November 30, 2017

CS 43: Computer Networks Media Access. Kevin Webb Swarthmore College November 30, 2017 CS 43: Computer Networks Media Access Kevin Webb Swarthmore College November 30, 2017 Multiple Access Links & Protocols Two classes of links : point-to-point dial-up access link between Ethernet switch,

More information

ECEN 5032 Data Networks Medium Access Control Sublayer

ECEN 5032 Data Networks Medium Access Control Sublayer ECEN 5032 Data Networks Medium Access Control Sublayer Peter Mathys mathys@colorado.edu University of Colorado, Boulder c 1996 2005, P. Mathys p.1/35 Overview (Sub)networks can be divided into two categories:

More information

Redes de Computadores. Medium Access Control

Redes de Computadores. Medium Access Control Redes de Computadores Medium Access Control Manuel P. Ricardo Faculdade de Engenharia da Universidade do Porto 1 » How to control the access of computers to a communication medium?» What is the ideal Medium

More information

Medium Access Control. IEEE , Token Rings. CSMA/CD in WLANs? Ethernet MAC Algorithm. MACA Solution for Hidden Terminal Problem

Medium Access Control. IEEE , Token Rings. CSMA/CD in WLANs? Ethernet MAC Algorithm. MACA Solution for Hidden Terminal Problem Medium Access Control IEEE 802.11, Token Rings Wireless channel is a shared medium Need access control mechanism to avoid interference Why not CSMA/CD? 9/15/06 CS/ECE 438 - UIUC, Fall 2006 1 9/15/06 CS/ECE

More information

Lecture 12 December 04, Wireless Access. Graduate course in Communications Engineering. University of Rome La Sapienza. Rome, Italy

Lecture 12 December 04, Wireless Access. Graduate course in Communications Engineering. University of Rome La Sapienza. Rome, Italy Lecture 12 December 04, 2017 Wireless Access Graduate course in Communications Engineering University of Rome La Sapienza Rome, Italy 2017-2018 Random Medium Access Control Part II - CSMA and Collision

More information

IEEE , Token Rings. 10/11/06 CS/ECE UIUC, Fall

IEEE , Token Rings. 10/11/06 CS/ECE UIUC, Fall IEEE 802.11, Token Rings 10/11/06 CS/ECE 438 - UIUC, Fall 2006 1 Medium Access Control Wireless channel is a shared medium Need access control mechanism to avoid interference Why not CSMA/CD? 10/11/06

More information

Slotted Aloha UHFHLYHU. Recall assumptions:

Slotted Aloha UHFHLYHU. Recall assumptions: Recall assumptions: infinite # of transmitters packets of equal length immediate feedback Poisson arrivals rate Slotted Aloha UHFHLYHU WUDQVPLWWHUV VRW WLPH If a new packet arrives during a slot, transmit

More information

LANs Local Area Networks LANs provide an efficient network solution : To support a large number of stations Over moderately high speed

LANs Local Area Networks LANs provide an efficient network solution : To support a large number of stations Over moderately high speed Local Area Networks LANs provide an efficient network solution : To support a large number of stations Over moderately high speed With relatively small bit errors Multiaccess Protocols Communication among

More information

Lecture 6. Data Link Layer (cont d) Data Link Layer 1-1

Lecture 6. Data Link Layer (cont d) Data Link Layer 1-1 Lecture 6 Data Link Layer (cont d) Data Link Layer 1-1 Agenda Continue the Data Link Layer Multiple Access Links and Protocols Addressing Data Link Layer 1-2 Multiple Access Links and Protocols Two types

More information

ETSN01 Exam Solutions

ETSN01 Exam Solutions ETSN01 Exam Solutions March 014 Question 1 (a) See p17 of the cellular systems slides for a diagram and the full procedure. The main points here were that the HLR needs to be queried to determine the location

More information

The Link Layer and LANs. Chapter 6: Link layer and LANs

The Link Layer and LANs. Chapter 6: Link layer and LANs The Link Layer and LANs EECS3214 2018-03-14 4-1 Chapter 6: Link layer and LANs our goals: understand principles behind link layer services: error detection, correction sharing a broadcast channel: multiple

More information

Link Layer and Ethernet

Link Layer and Ethernet Link Layer and Ethernet 14-740: Fundamentals of Computer Networks Bill Nace Material from Computer Networking: A Top Down Approach, 6 th edition. J.F. Kurose and K.W. Ross traceroute Data Link Layer Multiple

More information

Outline. Application examples

Outline. Application examples Outline Application examples Google page rank algorithm Aloha protocol Virtual circuit with window flow control Store-and-Forward packet-switched network Interactive system with infinite servers 1 Example1:

More information

Computer Networks. Medium Access Sublayer (Part I)

Computer Networks. Medium Access Sublayer (Part I) Computer Networks Medium Access Sublayer (Part I) Topics Introduction Multiple Access Protocols Ethernet Wireless LAN Protocols Bridges Misc (brief) High-Speed LANs Satellite Networks Introduction Remember,

More information

Final Review Fall 2017 Profs Peter Steenkiste & Justine Sherry

Final Review Fall 2017 Profs Peter Steenkiste & Justine Sherry Final Review 15-441 Fall 2017 Profs Peter Steenkiste & Justine Sherry Facts The Final is next week. It mostly covers things after the midterm, but there is significant material from before. There were

More information

COMP476 Networked Computer Systems. Polling. Sharing the Wire. LAN Technologies. COMP476 Networked Computer Systems 1

COMP476 Networked Computer Systems. Polling. Sharing the Wire. LAN Technologies. COMP476 Networked Computer Systems 1 Media Access Control Sub Layer COMP476 Networked Computer Systems Sharing Common Media There are several ways to share common media. Some methods are: Frequency division multiplexing Time division multiplexing

More information

CPSC 441 Tutorial-19. Department of Computer Science University of Calgary

CPSC 441 Tutorial-19. Department of Computer Science University of Calgary CPSC 441 Tutorial-19 Department of Computer Science University of Calgary Problem-1 Consider n nodes that use the slotted CSMA/ CD with binary exponential back-off to access a shared broadcast channel.

More information

ECSE-4670: Computer Communication Networks (CCN) Informal Quiz 3

ECSE-4670: Computer Communication Networks (CCN) Informal Quiz 3 ECSE-4670: Computer Communication Networks (CCN) Informal Quiz 3 : shivkuma@ecse.rpi.edu Biplab Sikdar: sikdab@rpi.edu 1 T F Slotted ALOHA has improved utilization since the window of vulnerability is

More information

Access Technologies! Fabio Martignon

Access Technologies! Fabio Martignon Access Technologies! Fabio Martignon 1 LAN Ethernet - IEEE 802.3 Broadcast Bus Capacity=10 Mb/s Xerox-Intel-Digital inventors Standardized at the beginning of the 80s as IEEE 802.3 Big Success and Several

More information

Multiple Access Links and Protocols

Multiple Access Links and Protocols Multiple Access Links and Protocols Two types of links : point-to-point PPP for dial-up access point-to-point link between Ethernet switch and host broadcast (shared wire or medium) old-fashioned Ethernet

More information

Com S 611 Spring Semester 2007 Discrete Algorithms for Mobile and Wireless Networks. Lecture 3: Tuesday, 23rd January 2007

Com S 611 Spring Semester 2007 Discrete Algorithms for Mobile and Wireless Networks. Lecture 3: Tuesday, 23rd January 2007 Com S 611 Spring Semester 2007 Discrete Algorithms for Mobile and Wireless Networks Lecture 3: Tuesday, 23rd January 2007 Instructor: Soma Chaudhuri Scribe: Abhishek Sinha 1 Introduction The lecture can

More information

B. Bellalta Mobile Communication Networks

B. Bellalta Mobile Communication Networks IEEE 802.11e : EDCA B. Bellalta Mobile Communication Networks Scenario STA AP STA Server Server Fixed Network STA Server Upwnlink TCP flows Downlink TCP flows STA AP STA What is the WLAN cell performance

More information

Link Layer and LANs 안상현서울시립대학교컴퓨터 통계학과.

Link Layer and LANs 안상현서울시립대학교컴퓨터 통계학과. Link Layer and LANs 안상현서울시립대학교컴퓨터 통계학과 ahn@venus.uos.ac.kr Data Link Layer Goals: understand principles behind data link layer services: error detection, correction sharing a broadcast channel: multiple

More information

Physical Layer. Medium Access Links and Protocols. Point-to-Point protocols. Modems: Signaling. Modems Signaling. Srinidhi Varadarajan

Physical Layer. Medium Access Links and Protocols. Point-to-Point protocols. Modems: Signaling. Modems Signaling. Srinidhi Varadarajan P Physical Layer Srinidhi Varadarajan Medium Access Links and Protocols Three types of links : point-to-point (single wire, e.g. PPP, SLIP) broadcast (shared wire or medium; e.g, Ethernet, Wavelan, etc.)

More information

CSE/EE 461 Wireless and Contention-Free Protocols

CSE/EE 461 Wireless and Contention-Free Protocols CSE/EE 461 Wireless and Contention-Free Protocols Last Time The multi-access problem Medium Access Control (MAC) sublayer Random access protocols: Aloha CSMA variants Classic Ethernet (CSMA/CD) Application

More information

Local Area Networks (LANs) SMU CSE 5344 /

Local Area Networks (LANs) SMU CSE 5344 / Local Area Networks (LANs) SMU CSE 5344 / 7344 1 LAN/MAN Technology Factors Topology Transmission Medium Medium Access Control Techniques SMU CSE 5344 / 7344 2 Topologies Topology: the shape of a communication

More information

Link Layer and Ethernet

Link Layer and Ethernet Link Layer and Ethernet 14-740: Fundamentals of Computer Networks Bill Nace Material from Computer Networking: A Top Down Approach, 6 th edition. J.F. Kurose and K.W. Ross traceroute Data Link Layer Multiple

More information

MAC Protocols and Packet Switching

MAC Protocols and Packet Switching MAC Protocols and Packet Switching 6.02 Fall 2013 Lecture 19 Today s Plan MAC Protocols: Randomized Access (Aloha) Stabilization Algorithms Packet Switching: Multi-Hop Networks Delays, Queues, and the

More information

Ethernet. Network Fundamentals Chapter Cisco Systems, Inc. All rights reserved. Cisco Public 1

Ethernet. Network Fundamentals Chapter Cisco Systems, Inc. All rights reserved. Cisco Public 1 Ethernet Network Fundamentals Chapter 9 1 Objectives Identify the basic characteristics of network media used in Ethernet. Describe the physical and data link features of Ethernet. Describe the function

More information

ECE453 Introduction to Computer Networks. Broadcast vs. PPP. Delay. Lecture 7 Multiple Access Control (I)

ECE453 Introduction to Computer Networks. Broadcast vs. PPP. Delay. Lecture 7 Multiple Access Control (I) ECE453 Introduction to Computer Networks Lecture 7 Multiple Access Control (I) 1 Broadcast vs. PPP Broadcast channel = multiaccess channel = random access channel Broadcast LAN Satellite network PPP WAN

More information

CMPE 150/L : Introduction to Computer Networks. Chen Qian Computer Engineering UCSC Baskin Engineering Lecture 16

CMPE 150/L : Introduction to Computer Networks. Chen Qian Computer Engineering UCSC Baskin Engineering Lecture 16 CMPE 150/L : Introduction to Computer Networks Chen Qian Computer Engineering UCSC Baskin Engineering Lecture 16 1 Final project demo Please do the demo next week to the TAs. So basically you may need

More information

Networks Homework # 2

Networks Homework # 2 ISLAMIC UNIVERSITY OF GAZA COMPUTER ENGINEERING DEPARTMENT Networks Homework # 2 INSTRUCTIONS: 1. Show your work (i.e., how you derived your answer or the reason behind your thinking) in addition to your

More information

Direct Link Networks (II)

Direct Link Networks (II) Direct Link Networks (II) Computer Networking Lecture 03 HKU SPACE Community College January 30, 2012 HKU SPACE CC CN Lecture 03 1/25 Outline Reliable Link Service Stop-and-Wait Sliding Window Media Access

More information

Chapter 06 IP Address

Chapter 06 IP Address Chapter 06 IP Address IP Address Internet address Identifier used at IP layer 32 bit binary address The address space of IPv4 is 2 32 or 4,294,967,296 Consists of netid and hosted IP Address Structure

More information

The Medium Access Control Scheme (MAC Layer) Reference: Andrew S. Tanenbaum, Computer Networks, 3rd Edition, Prentice Hall, 1996.

The Medium Access Control Scheme (MAC Layer) Reference: Andrew S. Tanenbaum, Computer Networks, 3rd Edition, Prentice Hall, 1996. The Medium Access Control Scheme (MAC Layer) Reference: Andrew S. Tanenbaum, Computer Networks, 3rd Edition, Prentice Hall, 1996. 1 Table of Contents Introduction ALOHA Carrier Sense Multiple Sense (CSMA)

More information

Frames, Packets and Topologies

Frames, Packets and Topologies Frames, Packets and Topologies Info 341 Networking and Distributed Applications Frames and Packets 1 Motivating Packets What if a network required everything to be sent as a single chunk What happens when

More information

Homework 1. Question 1 - Layering. CSCI 1680 Computer Networks Fonseca

Homework 1. Question 1 - Layering. CSCI 1680 Computer Networks Fonseca CSCI 1680 Computer Networks Fonseca Homework 1 Due: 27 September 2012, 4pm Question 1 - Layering a. Why are networked systems layered? What are the advantages of layering? Are there any disadvantages?

More information

Chapter 5 part 1 LINK LAYER

Chapter 5 part 1 LINK LAYER Overview - today Chapter 5 part 1 LINK LAYER Computer Networks Timothy Roscoe Summer 2007 Context Link layer services Framing Error detection and correction Data Link layer protocols ultiple access protocols

More information

LAN PROTOCOLS. Beulah A AP/CSE

LAN PROTOCOLS. Beulah A AP/CSE LAN PROTOCOLS Beulah A AP/CSE IEEE STANDARDS In 1985, the Computer Society of the IEEE started a project, called Project 802, to set standards to enable intercommunication among equipment from a variety

More information

Data Link Layer, Part 5. Medium Access Control

Data Link Layer, Part 5. Medium Access Control CS 455 Medium Access Control, Page 1 Data Link Layer, Part 5 Medium Access Control These slides are created by Dr. Yih Huang of George Mason University. Students registered in Dr. Huang s courses at GMU

More information

Physical and Link Layers. CS144 Review Session 6 November 6 th, 2008 Roger Liao Based on slides by Ben Nham

Physical and Link Layers. CS144 Review Session 6 November 6 th, 2008 Roger Liao Based on slides by Ben Nham Physical and Link Layers CS144 Review Session 6 November 6 th, 2008 Roger Liao Based on slides by Ben Nham Outline Physical layer Encoding of signals Chips vs. bits Link layer Communication through shared

More information

Lecture 19. Principles behind data link layer services Framing Multiple access protocols

Lecture 19. Principles behind data link layer services Framing Multiple access protocols Link Layer Lecture 19 Principles behind data link layer services Framing Multiple access protocols ALOHA *The slides are adapted from ppt slides (in substantially unaltered form) available from Computer

More information

Module 15: Network Structures

Module 15: Network Structures Module 15: Network Structures Background Motivation Topology Network Types Communication Design Strategies 15.1 Node Types Mainframes (IBM3090, etc.) example applications: airline reservations banking

More information

Can Multiple Subchannels Improve the Delay Performance of RTS/CTS-based MAC Schemes?

Can Multiple Subchannels Improve the Delay Performance of RTS/CTS-based MAC Schemes? Can Multiple Subchannels Improve the Delay Performance of RTS/CTS-based MAC Schemes? By: Jing Deng, Yunghsiang S. Han, and Sanjeev R. Kulkarni. J. Deng, Y. S. Han, and S. R. Kulkarni, "Can Multiple Subchannels

More information

Wireless Communications

Wireless Communications 4. Medium Access Control Sublayer DIN/CTC/UEM 2018 Why do we need MAC for? Medium Access Control (MAC) Shared medium instead of point-to-point link MAC sublayer controls access to shared medium Examples:

More information

Unavoidable Constraints and Collision Avoidance Techniques in Performance Evaluation of Asynchronous Transmission WDMA Protocols

Unavoidable Constraints and Collision Avoidance Techniques in Performance Evaluation of Asynchronous Transmission WDMA Protocols 1th WEA International Conference on COMMUICATIO, Heraklion, reece, July 3-5, 8 Unavoidable Constraints and Collision Avoidance Techniques in Performance Evaluation of Asynchronous Transmission WDMA Protocols

More information

CSE 461: Multiple Access. Homework: Chapter 2, problems 1, 8, 12, 18, 23, 24, 35, 43, 46, and 58

CSE 461: Multiple Access. Homework: Chapter 2, problems 1, 8, 12, 18, 23, 24, 35, 43, 46, and 58 CSE 461: Multiple Access Homework: Chapter 2, problems 1, 8, 12, 18, 23, 24, 35, 43, 46, and 58 Next Topic Key Focus: How do multiple parties share a wire? This is the Medium Access Control (MAC) portion

More information

CS 3516: Computer Networks

CS 3516: Computer Networks Welcome to CS 3516: Computer Networks Prof. Yanhua Li Time: 9:00am 9:50am M, T, R, and F Location: AK219 Fall 2018 A-term 1 Some slides are originally from the course materials of the textbook Computer

More information

Adaptors Communicating. Link Layer: Introduction. Parity Checking. Error Detection. Multiple Access Links and Protocols

Adaptors Communicating. Link Layer: Introduction. Parity Checking. Error Detection. Multiple Access Links and Protocols Link Layer: Introduction daptors ommunicating hosts and routers are nodes links connect nodes wired links wireless links layer-2 packet is a frame, encapsulates datagram datagram controller sending host

More information

Cover sheet for Assignment 3

Cover sheet for Assignment 3 Faculty of Arts and Science University of Toronto CSC 358 - Introduction to Computer Networks, Winter 2018, LEC0101 Cover sheet for Assignment 3 Due Monday March 5, 10:00am. Complete this page and attach

More information

CSE 461 Multiple Access. David Wetherall

CSE 461 Multiple Access. David Wetherall CSE 461 Multiple Access David Wetherall djw@cs.washington.edu How to share a link Multiplexing = networking term for sharing a resource among multiple users (e.g., link, protocol instance) Topics: Multiplexing

More information

Local Area Networks. Aloha Slotted Aloha CSMA (non-persistent, 1-persistent, p-persistent) CSMA/CD Ethernet Token Ring

Local Area Networks. Aloha Slotted Aloha CSMA (non-persistent, 1-persistent, p-persistent) CSMA/CD Ethernet Token Ring Local Area Networks Aloha Slotted Aloha CSMA (non-persistent, 1-persistent, p-persistent) CSMA/CD Ethernet Token Ring Networks: Local Area Networks 1 Network Layer Network Layer LLC 802.2 Logical Link

More information

Module 15: Network Structures

Module 15: Network Structures Module 15: Network Structures Background Topology Network Types Communication Communication Protocol Robustness Design Strategies 15.1 A Distributed System 15.2 Motivation Resource sharing sharing and

More information

Outline. Introduction to Networked Embedded Systems - Embedded systems Networked embedded systems Embedded Internet - Network properties

Outline. Introduction to Networked Embedded Systems - Embedded systems Networked embedded systems Embedded Internet - Network properties Outline Introduction to Networked Embedded Systems - Embedded systems Networked embedded systems Embedded Internet - Network properties Layered Network Architectures - OSI framework descriptions of layers

More information

CCM 4300 Lecture 5 Computer Networks, Wireless and Mobile Communications. Dr Shahedur Rahman. Room: T115

CCM 4300 Lecture 5 Computer Networks, Wireless and Mobile Communications. Dr Shahedur Rahman. Room: T115 CCM 4300 Lecture 5 Computer Networks, Wireless and Mobile Communications Dr Shahedur Rahman s.rahman@mdx.ac.uk Room: T115 1 Recap of Last Session Described the physical layer Analogue and Digital signal

More information

From: The History of the Telephone Herbert N. Casson 1910

From: The History of the Telephone Herbert N. Casson 1910 As for Bell's first telephone lines, they were as simple as clothes-lines. Each short little wire stood by itself, with one instrument at each end.... There were no switchboards of any account, no cables

More information

Cooperative Mobile Internet Access with Opportunistic Scheduling

Cooperative Mobile Internet Access with Opportunistic Scheduling Cooperative Mobile Internet Access with Opportunistic Scheduling Pouya Ostovari, Jie Wu, and Abdallah Khreishah Computer & Information Sciences Temple University Center for Networked Computing http://www.cnc.temple.edu

More information

Multiple Access. Data Communications and Networking

Multiple Access. Data Communications and Networking Multiple Access In the previous part we discussed data link control, a mechanism which provides a link with reliable communication. In the protocols we described, we assumed that there is an available

More information

Data Link Layer, Part 3 Medium Access Control. Preface

Data Link Layer, Part 3 Medium Access Control. Preface Data Link Layer, Part 3 Medium Access Control These slides are created by Dr. Yih Huang of George Mason University. Students registered in Dr. Huang's courses at GMU can make a single machine-readable

More information

FINAL May 21, minutes

FINAL May 21, minutes CS 421: COMPUTER NETWORKS SPRING 2004 FINAL May 21, 2004 160 minutes Name: Student No: 1) a) Consider a 1 Mbits/sec channel with a 20 msec one-way propagation delay, i.e., 40 msec roundtrip delay. We want

More information

Data Link Layer -2- Network Access

Data Link Layer -2- Network Access EITF25 Internet: Technology and Applications Data Link Layer -2- Network Access 2015, Lecture 03 Kaan Bür Previously on EITF25 Logical Link Control Sublayer Flow control Send data Wait for ACK Error control

More information

Chapter 1 Basic concepts of wireless data networks (cont d)

Chapter 1 Basic concepts of wireless data networks (cont d) Chapter 1 Basic concepts of wireless data networks (cont d) Part 2: Medium access methods for mobile data networks Sept 15 2004 1 Fixed assignment access schemes in voice-oriented networks Frequency division

More information

Written Exam in Information Networks TSIN01

Written Exam in Information Networks TSIN01 Written Exam in Information Networks TSIN01 10th August 2006 08:00-12:00 Location: TER2 Examiner: Robert Forchheimer Teacher: Peter Johansson, 4017 or 0702-141405 Aids: Standard mathematical/technical

More information

Medium Access Control Protocols With Memory Jaeok Park, Member, IEEE, and Mihaela van der Schaar, Fellow, IEEE

Medium Access Control Protocols With Memory Jaeok Park, Member, IEEE, and Mihaela van der Schaar, Fellow, IEEE IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 18, NO. 6, DECEMBER 2010 1921 Medium Access Control Protocols With Memory Jaeok Park, Member, IEEE, and Mihaela van der Schaar, Fellow, IEEE Abstract Many existing

More information

Lecture 6 The Data Link Layer. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it

Lecture 6 The Data Link Layer. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it Lecture 6 The Data Link Layer Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it Link Layer: setting the context two physically connected devices: host-router, router-router, host-host,

More information

Internetwork Basic. Possible causes of LAN traffic congestion are

Internetwork Basic. Possible causes of LAN traffic congestion are Internetworking 1 C H A P T E R 2 Internetworking Basics Internetworking Model The OSI Reference Model Ethernet Networking Wireless Networking Data Encapsulation Topic 3 1 Internetwork Basic 4 Possible

More information

Reminder: Datalink Functions Computer Networking. Datalink Architectures

Reminder: Datalink Functions Computer Networking. Datalink Architectures Reminder: Datalink Functions 15-441 15 441 15-641 Computer Networking Lecture 5 Media Access Control Peter Steenkiste Fall 2015 www.cs.cmu.edu/~prs/15-441-f15 Framing: encapsulating a network layer datagram

More information

Introduction to LAN Protocols

Introduction to LAN Protocols CHAPTER 2 Chapter Goals Learn about different LAN protocols. Understand the different methods used to deal with media contention. Learn about different LAN topologies. This chapter introduces the various

More information

MULTIPLE ACCESS PROTOCOLS 2. 1

MULTIPLE ACCESS PROTOCOLS 2. 1 MULTIPLE ACCESS PROTOCOLS AND WIFI 1 MULTIPLE ACCESS PROTOCOLS 2. 1 MULTIPLE ACCESS LINKS, PROTOCOLS Two types of links : point-to-point broadcast (shared wire or medium) POINT-TO-POINT PPP for dial-up

More information

MODELING OF SMART GRID TRAFFICS USING NON- PREEMPTIVE PRIORITY QUEUES

MODELING OF SMART GRID TRAFFICS USING NON- PREEMPTIVE PRIORITY QUEUES MODELING OF SMART GRID TRAFFICS USING NON- PREEMPTIVE PRIORITY QUEUES Contents Smart Grid Model and Components. Future Smart grid components. Classification of Smart Grid Traffic. Brief explanation of

More information