Media Access Control (MAC) ch12 It is a sublayer of the Data_Link layer to define the coordination of multiple station to a common Link.
|
|
- Emil Miller
- 5 years ago
- Views:
Transcription
1 Media Access Control (MAC) ch12 It is a sublayer of the Data_Link layer to define the coordination of multiple station to a common Link. MAC Protocols Random Control access Channelization 1)ALOHA 1)Reservation 1)FDMA 2)CSMA 2)Polling 2)TDMA 3)CSMA/CD 3) Token Passing 3)CDMA 4)CSMA/CA 5) No CS (wireless): MACA, MACAW Channelization: (Static/deterministic) Static (fixed)&simple, yet rigid (not very scalable), without prioritizing nodes/traffics, and varying reasons of wasting BW. Allows N users to share the channel spatially (FDMA each user gets a sub-band of the channel BW), temporally (TDMA each user gets an equal time slot in a round-robin fashion), or both (CDMA all users share the channel simultaneously via pre-assigned orthogonal chip-sequences to encode their data bits). Control access: (Dynamic/Deterministic) In a try to make better BW utilization and increase scalability, there will be more centralized control to control the channel access, yet more control overhead and less robustness (controller vulnerability). Still mostly no distinguishing of node and traffic types priorities, except in Token-Ring frame priority! Random: (Dynamic/Nondeterministic/Decentralized) No rigid assignment of time-slot/sub-bw which leads to wasting of BW, instead users should be polite in using the channel, with varying degrees. Meanwhile, random waiting time (exponential & function of access impairment) is used to separate/shake users temporally in channel access time, lowering users collisions. In addition, users might sense the channel politely for being idle/free. Most developed approaches have very polite access regimes where users might delay (fixed and/or random time) access to channel, even when it is idle.
2 I Random A station might transmit when having data, no scheduling Random. Stations compete for the link access with high potential for collisions. Sender re-tx the frame if no ACK after the longest round trip delay. A) ALOHA: ALOHA: University of Hawaii(1970) radio communication between islands. i)pure ALOHA: Vulnerable period or Possible collision period = 2 B A C bbbbbbbbbbbbbbbbbbbbbbbb aaaaaaaaaaaaaaaaaaaaaaaaa ccccccccccccccc Period One Period Two / Vulnerable Interval / Period One : A must wait for B to finish. Period Two: No one transmits while A is transmitting (e.g, C). Throughput (S): S = G e - 2G --Successful Tx. (Vol. period = 2) where G: Total number of frames (ret X +new) S max is when G = ½ ==> S max = 1/(2e) = (small!!)
3
4 ii) Slotted ALOHA: To improve the pure ALOHA s throughput S by cutting the Vulnerable period by half.(how?) Time is slotted into slots each is the time to T X a frame (T f ), and a station (when has a frame) can not T X except at the start of a frame! Hence node A cannot catch up with B s frame above, yet still A and C can transfer at same time! Hence, we still have a VP but only one T f period. The V.P = one T f only now (when A & C T x at same time) S slotted = G e - 1*G (Vol. period = 2) S slotted (MAX/G=1) = 1/e = (doubling the S pure-aloha of 0.184)
5 B) Carrier Sense Multiple Access(CSMA): To reduce the chance of collision, a station will check if the channel is busy or idle before using it (i.e., it senses if the channel has a carrier signal (busy) or not (idle)) Do we still have collision possibility? Yes!(two station check at the same time an idle channel, or with time difference less than the cable delay between them) What is the Vol. Period? τ (one way end-to-end trip delay) Persistence Methods: (See Fig for protocols flow charts) The response of a station after sensing the channel: 1)busy and 2) idle. 1) Persistent: While channel is busy keep checking it. Highest probability of collision since more than one station can sense idle at same time. 2) Nonpersistent: If busy channel, wait random time then recheck it. There is lesser chance for collision because of the random wait by different stations. But, all stations might wait while channel is idle. How? If it becomes idle while all waiting, then no node will check it and it will remain idle until the first node wakes up to check. (i.e., too much politeness might be inefficient!)
6 3) P-Persistent: For slotted time channels with slot = τ (one way endto-end trip delay) combines lesser chance for collision, yet more efficient than nonpersistent. While channel is busy, keep checking. When channel becomes idle, the node waits for a slot, with probability P. If the node waits, then after waking up it will check it again, if idle repeat the idle random wait, otherwise waits until it becomes idle again and repeat the idle random wait. C) Carrier Sense Multiple Access with Collision Detection (CSMA/CD): While T x its frame, a station will monitor the channel detecting any collision.(i.e., CD while T x ing) See Fig Condition: It has to keep monitoring for 2 τ time! Why? Collision might be with the last station in the LAN (τ sec) and its echo must return back (τ sec), for a total of 2τ before the T x ing station can hear the collision. What about if the T f < 2 τ? Problem? Yes, a station can leave the Ether (cable) after finishing its frame, without feeling any collision, which does not mean that its frame did not collide since it might collide with the last station at a echo time distance 2τ > T f. The relation between data-rate (B b/s), network length (L), min. frame length (F min bit), and propagation speed (C m/s) is: (F min / B) = 2 τ = 2 (L/C) (= 51.2 µsec for 10Mb/s 2.5 Km Ethernet) Think varying the values of the involved parameters and see how we can still keep the protocol "/CD" (e.g., raising B [better data rate] will force to raise F [overhead of dummy bits] or C [expensive cables] and/or decreasing L [generally good, less $, but less Ethernet stations] to keep the equation balanced). (THINK of other scenarios.)
7 D) "CSMA/Collision" Avoidance (CSMA/CA): (wireless) Because of the nature of wireless media, collision cannot be detected (Why? Open medium low power, signal fading, need for more BW to T x and R x at same time, hidden terminal problem). Hence, we need to avoid the collision all together (How? By being more polite and wait much more than CSMA/CD, but can we? If not then at least to "alleviate" it by waiting more politely [IFS])!
8 CA is implemented with the aid of: 1) IFS: Even if station senses an idle channel it waits for an IFS --- (we can design it such that: short--> high priority and 2) Long--> low priority traffic). Then, it senses the channel again, if busy wait another IFS. Repeat until channel is found idle, then do not T x directly, instead wait on some contention period or random number of free slots (do not count busy slots!). 2) Contention Window: Time is slotted and a ready station (has frame to T x and channel is idle) will apply Bin. Expo. Back-off strategy for waiting for R random number of free slots to be selected form the range 0 -to- (2 k -1) where k is the number of failure to Tx a given frame by the station. Then after waiting for random R slots, a station T x its frame, then waits for ACK within a pre-specified timeout period. Max number of failure to Tx is K=15 trials. 3) ACK: Collision might still occur, destroying the T x ed frame, hence a station waits for ACK back from the receiver, otherwise it times out and increment k by one, then repeats all over again, if k allows (K <16), otherwise aborts and report to the upper layer!
9 There is also Virtual carrier sense, where sender/receiver process of handshaking is done, instead of the implicit carrier physical listening. Examples: Multiple Access Collision Avoidance (MACA) & MACA for wireless (MACAW) used in the IEEE MAC.
10 II Controlled Access Random access does not allow for the much needed upper bound on the frame delay! Hence, with a sort of deterministic control (DC), we can obtain such upper bound, while optimizing the channel BW utilization. With the aid of more control (DC overhead), the access of the channel is by mutual consent of all stations. 1) Reservation: (Centralized Control) Each station, when having a frame to sent reserves the channel to T x such frame.(how?) A reservation control frame (RCF), with mini slots one/station, precedes the data frames, in every data T x interval (variable size). A station with a frame to send marks its mini slot in the reservation frame, then T x in its turn. A station T x a frame only if it reserves its mini slot. A station missing the RCF will wait for an average of n/2 frames until being able to Tx it (or in worst case a max of n-1 frame Tx slots), yet there is an upper limit on the frame Tx delay. If all station have frames to Tx, i.e., heavy load, it will be a TDM mechanism, but with some extra overhead of the RF. In low traffic load, it resembles the statistical TDM, i.e., single Queue multi-servers, with minimal wasting of BW.
11 2) Polling: (Centralized Control) For better network scalability and maintenance, yet less robustness. One of the station (primary) arbitrates among the rest of stations (secondary) who should control the full access to the channel, one secondary station at a time (T x & R x is only via the primary!). Select phase Poll phase Poll Phase: The primary station polls all secondary nodes, if any has frame to send. NAK from a station is NO, Data frame is YES. NAK --> poll next station. Data frame --> get the data frame with receiver address. ACK --> send ACK (from primary to secondary). Problem-- Yes! The primary is lying, since it is not the intended receiver (IS)! (Solution: primary waits until communicating with the IS, and either send ACK or NAK to the sender. Select Phase: The Primary Station (PS) echoes the polled frame to its intended destination via the select function. SEL --> The PS waits for ACK from destination node (DN) indicating willingness to receive. When such ACK arrives, primary T x the data frame to the DN, and waits for DN s frame arrival ACK. Fast select: Primary sends select&data together and waits for ACK. Disadvantage: Station close to the primary hugs the T x starving the faraway stations.
12 3) Token Passing: (Centralized Control) Can we obtain the efficient statistical TDM without the burden of maintaining a global queue to control T x (especially, in lightly loaded network)? The answer is Yes-- it is the Token Ring MAC protocol! The right to access the channel is done via a special control frame called token, which circulates over the ring, giving the right for ring access. N stations are organized in a ring (physical/logical) where each station will have predecessor and successor (left/right) neighbors, it gets the token from its predecessor (hence the right to access the channel), uses it (only, if it has frames to T x ) for a limited predefined time slot, then passes the token to its successor (neighbor). Each station, when getting the token, a node T x frames for a Token Holding Time (THT) period only, then passes it to its successor, guaranteeing an upper bound on a frame total delay, over the ring N*THT. Centralized network monitoring is needed to monitor/control nodes access to the ring and protocol integrity (lost/destroyed token), plus other functions.
13 Types of Rings (LANS): 1) P_T_P physical Ring 2) Dual ring physical P_t_P 3) Logical ring 4) Hub central monitor to control and implement the ring (most used) The Token Ring (IBM)(IEEE 802.5) Point-to-point ring(physical) of twisted pair, Coaxial, or fiber optics. Digital, with known upper bound delay, about N*THT for N nodes. Number of bits in the ring at one time. Channel data rate = R Mbps ( one bit every 1/R μsec) Then each bit occupies 200/R meters ==> Ring physical length is important. 1-bit delay at each station interface to inspect (possibly modify). When a station needs to transmit, it seizes the special control frame token when it gets it. Each station interface is in one of the following modes at any time: 1) listen: read one bit from the ring into the local buffer and copy it back.( 1 bit delay) 2) transmit: break the ring and insert local data (after seizing the token). The sender removes the bits as they circulate back to it (why?). The sender will get some ACK about the state of its transmitted frame; then save it for reliability monitoring, or discard. After finishing the transmission (for a THT period), a station regenerates the token into the ring and switches back to the listen mode. In heavy load state, the round-robin fashion of rotating the token would make the ring efficiency about 100%, almost TDM. The is shielded twisted pairs running 4 or 6 Mbps using differential Manchester encoding. To make the ring more reliable, the wire centre technique (Hub) is used. Frame Format: 3 bytes token (first 3 bytes in the frame).
14 OCTs: SD AC ED TOKEN Format SD: Start Delimiter FC: Frame Control AC: Access Control ED: End Delimiter FS: Frame Status (no limit!!!!?) SD AC FC Destination Source Checksum ED FS Address Address (error check) Data (LLC fame) Data Frame Format No limit on the data length (except the token holding time, THT). The SD and ED contains invalid DME(differential Manchester Encoding).The ED has one bit set to one if the frames is in error, and one bit as end of file. The destination and source addresses are 6 bytes same format as in the and.4 (Ethernet & Token Bus). The FS byte: It has two bits: A and C that work as ACK bits. Auto ACK A=0 and C= 0 destination not present. A=1 and C =0 destination is present but frame is not accepted A=1 and C = 1 destination is present and frame is accepted(copied) The AC byte: Bits PPP T M RRR The PPP and RRR are used to handle multiple priority frames. A frame is transmitted if has higher priority than the token priority in the PPP field; otherwise not T X. But if not T x ed and its priority is higher than the token RRR field, then it can reserve the token priority for next time by replacing the token's RRR field with its own priority. To eliminate the low priority station starvation problem, the station raising the reservation priority (RRR) is also responsible for lowering it back when it is done by saving the overwritten RRR in its stack, and returning it back after finishing the use of the token (after getting it). The T bit is the token-bit = 0 (free token), = 1 (non-token) frame.
15 The FC byte: Bits 2 6 FF z z z z z z FF bits: 00 = control frame (MAC control PDU) 01 = Data frame (LLC PDU included) --> 6-bit z's will be r r r yyy Where r bit indicates reserved (unused), and YYY is the LLC frame priority (LLC) from source to destination. Monitor responsibilities: 1) Lost token: It keeps a timer with the longest tokenless interval. (sum of the token holding times of all stations), then it drains the ring and issues a new token. 2) Cleaning garbled frames from the network.(invalid format or error) 3) Detecting orphan frames through the M bit in the FC byte of the frame. The Monitor looks at the M bit: If M = 0 the frame is OK, and it will set it to 1; otherwise the Monitor decides that frame's sender ("source") node did not drain it (for some reason), since this is the second time the Monitor sees it, hence the frame is orphan and the Monitor drains it from the ring. 4) Inserting extra delay in the ring, when needed, to be able to hold the token, in case of low number of stations. Problems? Yes, tough to handle control in case of a sick monitor! We can easily detect/handle a dead monitor, rather than to deal with a sick one where we do not know really when it is sick! Based on the traffic load volume (heavy/light), compare the TR protocol with the Reservation and Polling protocols? Do we still have an upper bound on the frame delay over a prioritized TR??
16 III Channelization An approach to allow multi_access to single channel by number of stations utilizing Freq. Division (FDMA), Time division (TDMA), and code division (CDMA) Muxing. Frequency Division Multiple Access (FDMA) Spatial division of the channel BW among users, each access a sub-band of the total BW, all the time (forcing broadband Tx).
17 Time Division Multiple Access (TDMA) Code Division Multiple Access(CDMA) Digits (d) are encoded using chip sequence (c)
18 The entire bandwidth of the channel is used all the time by all stations. Each station will have its orthogonal to the others chip sequence for encoding. Bit to be encoded chip multiplier final encoding for T x > > 1 * chip > > 1 * chip silence > > 0 * chip = [00 0] Notice: How to get N orthogonal chips? Walsh Matrix NXN N = 1, 2, 4, 8, 16, 32,..., 2 i i = 0, 1, 2, 3, 4, All rows and columns are orthogonal. (See fig 12.29) Assume 4 stations S1, S2, S3, S4 D =( d 1.c 1 + d 2.c 2 +d 3.c 3 + d 4.c 4 ) At any station, in order to read the bit T x of any other station say station 2, multiply D by C 2 and divide by 4 (size of the chip sequence). (D.c 2 /4) = ( d 1.c 1.c 2 + d 2.c 2.c 2 + d 3.c 3.c 2 + d 4.c 4.c 2 ) / 4 = 4d 2 /4 = d 2 ( if d 2 = 1 0, if 1 1, if 0 silence)
Data Link Layer: Collisions
Data Link Layer: Collisions 1 Multiple Access Data Link layer divided into two sublayers. The upper sublayer is responsible for datalink control, The lower sublayer is responsible for resolving access
More informationCHAPTER 7 MAC LAYER PROTOCOLS. Dr. Bhargavi Goswami Associate Professor & Head Department of Computer Science Garden City College
CHAPTER 7 MAC LAYER PROTOCOLS Dr. Bhargavi Goswami Associate Professor & Head Department of Computer Science Garden City College MEDIUM ACCESS CONTROL - MAC PROTOCOLS When the two stations transmit data
More informationChapter 12 Multiple Access 12.1
Chapter 12 Multiple Access 12.1 Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. 12.2 Figure 12.1 Data link layer divided into two functionality-oriented sublayers
More informationCSE 461: Multiple Access Networks. This Lecture
CSE 461: Multiple Access Networks This Lecture Key Focus: How do multiple parties share a wire? This is the Medium Access Control (MAC) portion of the Link Layer Randomized access protocols: 1. Aloha 2.
More informationLocal Area Networks (LANs) SMU CSE 5344 /
Local Area Networks (LANs) SMU CSE 5344 / 7344 1 LAN/MAN Technology Factors Topology Transmission Medium Medium Access Control Techniques SMU CSE 5344 / 7344 2 Topologies Topology: the shape of a communication
More informationMultiple Access Protocols
Multiple Access Protocols Computer Networks Lecture 2 http://goo.gl/pze5o8 Multiple Access to a Shared Channel The medium (or its sub-channel) may be shared by multiple stations (dynamic allocation) just
More informationTopics. Link Layer Services (more) Link Layer Services LECTURE 5 MULTIPLE ACCESS AND LOCAL AREA NETWORKS. flow control: error detection:
1 Topics 2 LECTURE 5 MULTIPLE ACCESS AND LOCAL AREA NETWORKS Multiple access: CSMA/CD, CSMA/CA, token passing, channelization LAN: characteristics, i basic principles i Protocol architecture Topologies
More informationEITF25 Internet Techniques and Applications L4: Network Access. Stefan Höst
EITF25 Internet Techniques and Applications L4: Network Access Stefan Höst Repetition The link layer protocol should make sure that the data is correctly transmitted over the physical link using error
More informationContention Protocols and Networks
4/13/2005 314 Lecture Contention Protocols and Networks 1 Contention Protocols and Networks Contention Protocols CSMA/CD Network Topologies Ethernet 4/13/2005 314 Lecture Contention Protocols and Networks
More informationThe Medium Access Control Scheme (MAC Layer) Reference: Andrew S. Tanenbaum, Computer Networks, 3rd Edition, Prentice Hall, 1996.
The Medium Access Control Scheme (MAC Layer) Reference: Andrew S. Tanenbaum, Computer Networks, 3rd Edition, Prentice Hall, 1996. 1 Table of Contents Introduction ALOHA Carrier Sense Multiple Sense (CSMA)
More informationJaringan Komputer. Broadcast Network. Outline. MAC (Medium Access Control) Channel Allocation Problem. Dynamic Channel Allocation
Broadcast Network Jaringan Komputer Medium Access Control Sublayer 2 network categories: point-to-point connections broadcast channels Key issue in broadcast network: how to determine who gets to use the
More informationLecture 9: Bridging. CSE 123: Computer Networks Alex C. Snoeren
Lecture 9: Bridging CSE 123: Computer Networks Alex C. Snoeren Lecture 9 Overview Finishing up media access Ethernet Contention-free methods (rings) Moving beyond one wire Link technologies have limits
More informationCS 43: Computer Networks Media Access. Kevin Webb Swarthmore College November 30, 2017
CS 43: Computer Networks Media Access Kevin Webb Swarthmore College November 30, 2017 Multiple Access Links & Protocols Two classes of links : point-to-point dial-up access link between Ethernet switch,
More informationIntroduction to Networks and the Internet
Introduction to Networks and the Internet HTML tutorial today. Announcements CMPE 80N Spring 2003 Week 5 1 2 MAC Protocols MAC Protocols Round-robin. Scheduled-access. Contention-based. Contention-based
More informationData Link Layer -2- Network Access
EITF25 Internet: Technology and Applications Data Link Layer -2- Network Access 2013, Lecture 03 Kaan Bür, Stefan Höst Previously on EITF25 Logical Link Control Sublayer Flow control Send data Wait for
More informationAloha and slotted aloha
CSMA 2/13/06 Aloha and slotted aloha Slotted aloha: transmissions are synchronized and only start at the beginning of a time slot. Aloha sender A sender B collision sender C t Slotted Aloha collision sender
More informationData Link Layer, Part 5. Medium Access Control
CS 455 Medium Access Control, Page 1 Data Link Layer, Part 5 Medium Access Control These slides are created by Dr. Yih Huang of George Mason University. Students registered in Dr. Huang s courses at GMU
More informationChapter 4. The Medium Access Control Sublayer. Points and Questions to Consider. Multiple Access Protocols. The Channel Allocation Problem.
Dynamic Channel Allocation in LANs and MANs Chapter 4 The Medium Access Control Sublayer 1. Station Model. 2. Single Channel Assumption. 3. Collision Assumption. 4. (a) Continuous Time. (b) Slotted Time.
More informationPhysical Layer. Medium Access Links and Protocols. Point-to-Point protocols. Modems: Signaling. Modems Signaling. Srinidhi Varadarajan
P Physical Layer Srinidhi Varadarajan Medium Access Links and Protocols Three types of links : point-to-point (single wire, e.g. PPP, SLIP) broadcast (shared wire or medium; e.g, Ethernet, Wavelan, etc.)
More informationCOMP476 Networked Computer Systems. Polling. Sharing the Wire. LAN Technologies. COMP476 Networked Computer Systems 1
Media Access Control Sub Layer COMP476 Networked Computer Systems Sharing Common Media There are several ways to share common media. Some methods are: Frequency division multiplexing Time division multiplexing
More informationGoals. Fundamentals of Network Media. More topics. Topics. Multiple access communication. Multiple access solutions
Fundamentals of Network Media Local Area Networks Ursula Holmström Goals Learn the basic concepts related to LAN technologies, for example use of shared media medium access control topologies Know the
More informationData Link Layer -2- Network Access
EITF25 Internet: Technology and Applications Data Link Layer -2- Network Access 2015, Lecture 03 Kaan Bür Previously on EITF25 Logical Link Control Sublayer Flow control Send data Wait for ACK Error control
More informationComputer Network Fundamentals Spring Week 3 MAC Layer Andreas Terzis
Computer Network Fundamentals Spring 2008 Week 3 MAC Layer Andreas Terzis Outline MAC Protocols MAC Protocol Examples Channel Partitioning TDMA/FDMA Token Ring Random Access Protocols Aloha and Slotted
More informationLinks Reading: Chapter 2. Goals of Todayʼs Lecture. Message, Segment, Packet, and Frame
Links Reading: Chapter 2 CS 375: Computer Networks Thomas Bressoud 1 Goals of Todayʼs Lecture Link-layer services Encoding, framing, and error detection Error correction and flow control Sharing a shared
More informationECEN 5032 Data Networks Medium Access Control Sublayer
ECEN 5032 Data Networks Medium Access Control Sublayer Peter Mathys mathys@colorado.edu University of Colorado, Boulder c 1996 2005, P. Mathys p.1/35 Overview (Sub)networks can be divided into two categories:
More informationECE 4450:427/527 - Computer Networks Spring 2017
ECE 4450:427/527 - Computer Networks Spring 2017 Dr. Nghi Tran Department of Electrical & Computer Engineering Lecture 5.4: Multiple Access Protocols Dr. Nghi Tran (ECE-University of Akron) ECE 4450:427/527
More informationCS 43: Computer Networks. 27: Media Access Contd. December 3, 2018
CS 43: Computer Networks 27: Media Access Contd. December 3, 2018 Last Class The link layer provides lots of functionality: addressing, framing, media access, error checking could be used independently
More informationLecture 6. Data Link Layer (cont d) Data Link Layer 1-1
Lecture 6 Data Link Layer (cont d) Data Link Layer 1-1 Agenda Continue the Data Link Layer Multiple Access Links and Protocols Addressing Data Link Layer 1-2 Multiple Access Links and Protocols Two types
More informationLink Layer and LANs 안상현서울시립대학교컴퓨터 통계학과.
Link Layer and LANs 안상현서울시립대학교컴퓨터 통계학과 ahn@venus.uos.ac.kr Data Link Layer Goals: understand principles behind data link layer services: error detection, correction sharing a broadcast channel: multiple
More informationCMPE 257: Wireless and Mobile Networking
CMPE 257: Wireless and Mobile Networking Katia Obraczka Computer Engineering UCSC Baskin Engineering Lecture 3 CMPE 257 Winter'11 1 Announcements Accessing secure part of the class Web page: User id: cmpe257.
More informationComputer Networks Medium Access Control. Mostafa Salehi Fall 2008
Computer Networks Medium Access Control Mostafa Salehi Fall 2008 2008 1 Outline Issues ALOHA Network Ethernet Token Ring Wireless 2 Main Issues Local Area Network (LAN) : Three or more machines are physically
More informationData Link Layer, Part 3 Medium Access Control. Preface
Data Link Layer, Part 3 Medium Access Control These slides are created by Dr. Yih Huang of George Mason University. Students registered in Dr. Huang's courses at GMU can make a single machine-readable
More informationCOMMUNICATION NETWORKS NETW 501
COMMUNICATION NETWORKS NETW 501 TUTORIAL 6 Presented by: Eng. Hana Hesham Eng. Mohamed Atef Data Link Layer Data Link Layer is split into 2 sublayers which are the Logical Link Control (LLC) and the Medium
More informationMedium Access Control. CSCI370 Lecture 5 Michael Hutt New York Institute of Technology
Medium Access Control CSCI370 Lecture 5 Michael Hutt New York Institute of Technology The Data Link Layer Logical Link Control (LLC) IEEE 802.2 Standard RFC 1042 Provides three service options Unreliable
More informationICE 1332/0715 Mobile Computing (Summer, 2008)
ICE 1332/0715 Mobile Computing (Summer, 2008) Medium Access Control Prof. Chansu Yu http://academic.csuohio.edu/yuc/ Simplified Reference Model Application layer Transport layer Network layer Data link
More informationRedes de Computadores. Medium Access Control
Redes de Computadores Medium Access Control Manuel P. Ricardo Faculdade de Engenharia da Universidade do Porto 1 » How to control the access of computers to a communication medium?» What is the ideal Medium
More informationComputer Networks. Medium Access Sublayer (Part I)
Computer Networks Medium Access Sublayer (Part I) Topics Introduction Multiple Access Protocols Ethernet Wireless LAN Protocols Bridges Misc (brief) High-Speed LANs Satellite Networks Introduction Remember,
More informationThe MAC layer in wireless networks
The MAC layer in wireless networks The wireless MAC layer roles Access control to shared channel(s) Natural broadcast of wireless transmission Collision of signal: a /space problem Who transmits when?
More informationLANs Local Area Networks LANs provide an efficient network solution : To support a large number of stations Over moderately high speed
Local Area Networks LANs provide an efficient network solution : To support a large number of stations Over moderately high speed With relatively small bit errors Multiaccess Protocols Communication among
More informationCCM 4300 Lecture 5 Computer Networks, Wireless and Mobile Communications. Dr Shahedur Rahman. Room: T115
CCM 4300 Lecture 5 Computer Networks, Wireless and Mobile Communications Dr Shahedur Rahman s.rahman@mdx.ac.uk Room: T115 1 Recap of Last Session Described the physical layer Analogue and Digital signal
More informationMedium Access Control. IEEE , Token Rings. CSMA/CD in WLANs? Ethernet MAC Algorithm. MACA Solution for Hidden Terminal Problem
Medium Access Control IEEE 802.11, Token Rings Wireless channel is a shared medium Need access control mechanism to avoid interference Why not CSMA/CD? 9/15/06 CS/ECE 438 - UIUC, Fall 2006 1 9/15/06 CS/ECE
More informationMultiple Access. Data Communications and Networking
Multiple Access In the previous part we discussed data link control, a mechanism which provides a link with reliable communication. In the protocols we described, we assumed that there is an available
More informationIEEE , Token Rings. 10/11/06 CS/ECE UIUC, Fall
IEEE 802.11, Token Rings 10/11/06 CS/ECE 438 - UIUC, Fall 2006 1 Medium Access Control Wireless channel is a shared medium Need access control mechanism to avoid interference Why not CSMA/CD? 10/11/06
More informationData Link Layer Technologies
Chapter 2.2 La 2 Data Link La Technologies 1 Content Introduction La 2: Frames Error Handling 2 Media Access Control General approaches and terms Aloha Principles CSMA, CSMA/CD, CSMA / CA Master-Slave
More informationChapter 4 (Week 7) The Medium Access Control Sublayer ANDREW S. TANENBAUM COMPUTER NETWORKS FOURTH EDITION PP CN&DC Dr.
Chapter 4 (Week 7) The Medium Access Control Sublayer ANDREW S. TANENBAUM COMPUTER NETWORKS FOURTH EDITION PP. 247-292 1 4.1. THE CHANNEL ALLOCATION PROBLEM 4.2. MULTIPLE ACCESS PROTOCOLS 4.3. ETHERNET
More informationComputer Networks. Today. Principles of datalink layer services Multiple access links Adresavimas, ARP LANs Wireless LANs VU MIF CS 1/48 2/48
Computer Networks VU MIF CS 1/48 Today Principles of datalink layer services Multiple access links Adresavimas, ARP LANs Wireless LANs 2/48 1 Link layer: introduction terminology: hosts and routers: nodes
More informationChapter 6 Medium Access Control Protocols and Local Area Networks
Chapter 6 Medium Access Control Protocols and Local Area Networks Part I: Medium Access Control Part II: Local Area Networks CSE 3213, Winter 2010 Instructor: Foroohar Foroozan Chapter Overview Broadcast
More informationRMIT University. Data Communication and Net-Centric Computing COSC 1111/2061/1110. Lecture 8. Medium Access Control Methods & LAN
RMIT University Data Communication and Net-Centric Computing COSC 1111/2061/1110 Medium Access Control Methods & LAN Technology Slide 1 Lecture Overview During this lecture, we will Look at several Multiple
More informationCSE 461: Multiple Access. Homework: Chapter 2, problems 1, 8, 12, 18, 23, 24, 35, 43, 46, and 58
CSE 461: Multiple Access Homework: Chapter 2, problems 1, 8, 12, 18, 23, 24, 35, 43, 46, and 58 Next Topic Key Focus: How do multiple parties share a wire? This is the Medium Access Control (MAC) portion
More informationCSE/EE 461 Wireless and Contention-Free Protocols
CSE/EE 461 Wireless and Contention-Free Protocols Last Time The multi-access problem Medium Access Control (MAC) sublayer Random access protocols: Aloha CSMA variants Classic Ethernet (CSMA/CD) Application
More informationSummary of MAC protocols
Summary of MAC protocols What do you do with a shared media? Channel Partitioning, by time, frequency or code Time Division, Code Division, Frequency Division Random partitioning (dynamic) ALOHA, S-ALOHA,
More informationCMPE 257: Wireless and Mobile Networking
CMPE 257: Wireless and Mobile Networking Katia Obraczka Computer Engineering UCSC Baskin Engineering Lecture 3 CMPE 257 Spring'15 1 Next week Announcements April 14: ICN (Spencer Sevilla) April 16: DTN
More informationMultiple Access Links and Protocols
Multiple Access Links and Protocols Two types of links : point-to-point PPP for dial-up access point-to-point link between Ethernet switch and host broadcast (shared wire or medium) old-fashioned Ethernet
More informationCARRIER SENSE MULTIPLE ACCESS (CSMA):
Lecture Handout Computer Networks Lecture No. 8 CARRIER SENSE MULTIPLE ACCESS (CSMA): There is no central control management when computers transmit on Ethernet. For this purpose the Ethernet employs CSMA
More informationToken Ring and. Fiber Distributed Data Interface (FDDI) Networks: Token Ring and FDDI 1
Token Ring and Fiber Distributed Data Interface (FDDI) Networks: Token Ring and FDDI 1 IEEE 802.5 Token Ring Proposed in 1969 and initially referred to as a Newhall ring. Token ring :: a number of stations
More informationCSE 461 Multiple Access. David Wetherall
CSE 461 Multiple Access David Wetherall djw@cs.washington.edu How to share a link Multiplexing = networking term for sharing a resource among multiple users (e.g., link, protocol instance) Topics: Multiplexing
More informationMAC Sublayer(1) Principal service of the Medium Access Control Sublayer: Allocating a single broadcast channel (mostly a LAN) among competing users
MAC Sublayer(1) Principal service of the Medium Access Control Sublayer: Allocating a single broadcast channel (mostly a LAN) among competing users Static Channel Allocation: Frequency Division Multiplexing
More informationLinks. CS125 - mylinks 1 1/22/14
Links 1 Goals of Today s Lecture Link-layer services Encoding, framing, and error detection Error correction and flow control Sharing a shared media Channel partitioning Taking turns Random access Shared
More informationData Link Layer. Goals of This Lecture. Engineering Questions. Outline of the Class
Data Link Layer Kuang Chiu Huang TCM NCKU Goals of This Lecture Through the lecture and in-class discussion, students are enabled to describe role and functions of the link layer, and compare different
More informationEthernet. Introduction. CSE 3213 Fall 2011
Ethernet CSE 3213 Fall 2011 19 October 2011 1 Introduction Rapid changes in technology designs Broader use of LANs New schemes for high-speed LANs High-speed LAN technologies: Fast and gigabit Ethernet
More information2.1 CHANNEL ALLOCATION 2.2 MULTIPLE ACCESS PROTOCOLS Collision Free Protocols 2.3 FDDI 2.4 DATA LINK LAYER DESIGN ISSUES 2.5 FRAMING & STUFFING
UNIT-2 2.1 CHANNEL ALLOCATION 2.2 MULTIPLE ACCESS PROTOCOLS 2.2.1 Pure ALOHA 2.2.2 Slotted ALOHA 2.2.3 Carrier Sense Multiple Access 2.2.4 CSMA with Collision Detection 2.2.5 Collision Free Protocols 2.2.5.1
More informationHigh Level View. EE 122: Ethernet and Random Access protocols. Medium Access Protocols
High Level View EE 122: Ethernet and 802.11 Ion Stoica September 18, 2002 Goal: share a communication medium among multiple hosts connected to it Problem: arbitrate between connected hosts Solution goals:
More informationNetworking Technologies and Applications
Networking Technologies and Applications Rolland Vida BME TMIT September 23, 2016 Aloha Advantages: Different size packets No need for synchronization Simple operation If low upstream traffic, the solution
More informationData Link Layer: Overview, operations
Data Link Layer: Overview, operations Chapter 3 1 Outlines 1. Data Link Layer Functions. Data Link Services 3. Framing 4. Error Detection/Correction. Flow Control 6. Medium Access 1 1. Data Link Layer
More informationCS 716: Introduction to communication networks. - 9 th class; 19 th Aug Instructor: Sridhar Iyer IIT Bombay
CS 716: Introduction to communication networks - 9 th class; 19 th Aug 2011 Instructor: Sridhar Iyer IIT Bombay Contention-based MAC: ALOHA Users transmit whenever they have data to send Collisions occur,
More informationMobile Communications Chapter 3 : Media Access
Mobile Communications Chapter 3 : Media Access 2. Motivation 3. SDMA, FDMA, TDMA 1. Aloha and contention based schemes 4. Reservation schemes 5. Collision avoidance, MACA 6. Polling CDMA (Lecture 6) Prof.
More informationReminder: Datalink Functions Computer Networking. Datalink Architectures
Reminder: Datalink Functions 15-441 15 441 15-641 Computer Networking Lecture 5 Media Access Control Peter Steenkiste Fall 2015 www.cs.cmu.edu/~prs/15-441-f15 Framing: encapsulating a network layer datagram
More informationCOMPUTER NETWORKS UNIT 3
COMPUTER NETWORKS UNIT 3 1. Illustrate about Reservation, Polling and Token Passing. [10 marks] Controlled access: In controlled access, the stations consult one another to find which station has the right
More informationThe Link Layer and LANs. Chapter 6: Link layer and LANs
The Link Layer and LANs EECS3214 2018-03-14 4-1 Chapter 6: Link layer and LANs our goals: understand principles behind link layer services: error detection, correction sharing a broadcast channel: multiple
More informationThe Medium Access Control Sublayer
The Medium Access Control Sublayer Chapter 4 Channel Allocation Problem Static channel allocation Assumptions for dynamic Assumptions for Dynamic Channel Allocation 1. Independent traffic 2. Single channel
More informationChapter 4. The Medium Access Control Sublayer
Chapter 4 The Medium Access Control Sublayer The Channel Allocation Problem Static Channel Allocation in LANs and MANs Dynamic Channel Allocation in LANs and MANs Dynamic Channel Allocation in LANs and
More informationMULTIPLE ACCESS PROTOCOLS 2. 1
MULTIPLE ACCESS PROTOCOLS AND WIFI 1 MULTIPLE ACCESS PROTOCOLS 2. 1 MULTIPLE ACCESS LINKS, PROTOCOLS Two types of links : point-to-point broadcast (shared wire or medium) POINT-TO-POINT PPP for dial-up
More informationReal-Time (Paradigms) (47)
Real-Time (Paradigms) (47) Memory: Memory Access Protocols Tasks competing for exclusive memory access (critical sections, semaphores) become interdependent, a common phenomenon especially in distributed
More informationData and Computer Communications
Data and Computer Communications Chapter 16 High Speed LANs Eighth Edition by William Stallings Why High Speed LANs? speed and power of PCs has risen graphics-intensive applications and GUIs see LANs as
More informationCS 455/555 Intro to Networks and Communications. Link Layer
CS 455/555 Intro to Networks and Communications Link Layer Dr. Michele Weigle Department of Computer Science Old Dominion University mweigle@cs.odu.edu http://www.cs.odu.edu/~mweigle/cs455-s13 1 Link Layer
More informationMultiple-access protocols
Multiple Access Multiple-access protocols Random Access MA CSMA CSMA/CD CSMA/CA RANDOM ACCESS In a random access method, each station has the right to the medium without being controlled by any other station.
More informationChapter 4: The Medium Access Layer
Chapter 4: The Medium Access Layer Computer Networks Maccabe Computer Science Department The University of New Mexico September 2002 Medium Access Layer Point-to-point versus broadcast networks Broadcast
More informationThe Medium Access Sublayer
The Medium Access Sublayer shivkuma@ecse.rpi.edu http://www.ecse.rpi.edu/homepages/shivkuma 1-1 Based in part upon the slides of Prof. Raj Jain (OSU), K. Vastola (RPI) Overview Multiple Access: Aloha,
More informationEE 122: Ethernet and
EE 122: Ethernet and 802.11 Ion Stoica September 18, 2002 (* this talk is based in part on the on-line slides of J. Kurose & K. Rose) High Level View Goal: share a communication medium among multiple hosts
More informationMedium Access Control. MAC protocols: design goals, challenges, contention-based and contention-free protocols
Medium Access Control MAC protocols: design goals, challenges, contention-based and contention-free protocols 1 Why do we need MAC protocols? Wireless medium is shared Many nodes may need to access the
More informationMedium Access Control Sublayer Chapter 4
Medium Access Control Sublayer Chapter 4 Channel Allocation Problem Multiple Access Protocols Ethernet Wireless LANs Broadband Wireless Bluetooth RFID Data Link Layer Switching Revised: August 2011 & February
More informationDirect Link Communication II: Wired Media. Multi-Access Communication
Direct Link Communication II: Wired Media Multi-Access Communication Two classes: contention-based e.g., CSMA/CD, CSMA/CA used in Ethernet, WLAN contention-free e.g., TDM, FDM, TDMA, CDMA, token ring used
More informationECE453 Introduction to Computer Networks. Broadcast vs. PPP. Delay. Lecture 7 Multiple Access Control (I)
ECE453 Introduction to Computer Networks Lecture 7 Multiple Access Control (I) 1 Broadcast vs. PPP Broadcast channel = multiaccess channel = random access channel Broadcast LAN Satellite network PPP WAN
More informationLANs. Local Area Networks. via the Media Access Control (MAC) SubLayer. Networks: Local Area Networks
LANs Local Area Networks via the Media Access Control (MAC) SubLayer 1 Local Area Networks Aloha Slotted Aloha CSMA (non-persistent, 1-persistent, p-persistent) CSMA/CD Ethernet Token Ring 2 Network Layer
More informationMedia Access Control. Networked Systems (H) Lecture 5
Media Access Control Networked Systems (H) Lecture 5 Lecture Outline Controlling access to the channel Link contention Media access control protocols Contention-based protocols CSMA/CD Token ring Slotted
More informationAccess Technologies! Fabio Martignon
Access Technologies! Fabio Martignon 1 LAN Ethernet - IEEE 802.3 Broadcast Bus Capacity=10 Mb/s Xerox-Intel-Digital inventors Standardized at the beginning of the 80s as IEEE 802.3 Big Success and Several
More informationLocal Networks. Lecture 4 6-Apr-2016
Local Networks Lecture 4 6-Apr-2016 Roadmap of the Course So far Basic telecom concepts General study of LANs LAN topologies Flow and error control Today we continue the general study of LANs Medium access
More informationData and Computer Communications. Chapter 11 Local Area Network
Data and Computer Communications Chapter 11 Local Area Network LAN Topologies Refers to the way in which the stations attached to the network are interconnected Bus Topology Used with multipoint medium
More informationMultiple Access Channels
Multiple Access Channels Some Queuing Theory MAC: Aloha, ethernet Exponential backoff & friends LANs: Local Area Networks Goal: extend benefits of simple connection as far as possible Means: Share medium
More informationMedium Access Protocols
Medium Access Protocols Summary of MAC protocols What do you do with a shared media? Channel Partitioning, by time, frequency or code Time Division,Code Division, Frequency Division Random partitioning
More informationThe MAC layer in wireless networks
The MAC layer in wireless networks The wireless MAC layer roles Access control to shared channel(s) Natural broadcast of wireless transmission Collision of signal: a time/space problem Who transmits when?
More informationLECTURE PLAN. Script. Introduction about MAC Types o ALOHA o CSMA o CSMA/CD o CSMA/CA
Course- B.Sc. Applied Physical Science (Computer Science) Year- IIIrd, Sem- Vth Subject Computer Science Paper- XVIIth, Computer Networks Lecture -11 Lecture Title- Medium Access Layer Script Today in
More informationWireless Communications
4. Medium Access Control Sublayer DIN/CTC/UEM 2018 Why do we need MAC for? Medium Access Control (MAC) Shared medium instead of point-to-point link MAC sublayer controls access to shared medium Examples:
More informationLocal Area Networks. Aloha Slotted Aloha CSMA (non-persistent, 1-persistent, p-persistent) CSMA/CD Ethernet Token Ring
Local Area Networks Aloha Slotted Aloha CSMA (non-persistent, 1-persistent, p-persistent) CSMA/CD Ethernet Token Ring Networks: Local Area Networks 1 Network Layer Network Layer LLC 802.2 Logical Link
More informationData Link Layer: Multi Access Protocols
Digital Communication in the Modern World Data Link Layer: Multi Access Protocols http://www.cs.huji.ac.il/~com1 com1@cs.huji.ac.il Some of the slides have been borrowed from: Computer Networking: A Top
More informationLink layer, LANs: outline. Chapter 5-1 Link Layer. Link layer: introduction. Link layer services
Chapter 5 Link Layer Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 Link layer, LANs: outline 5.1 introduction, services 5.2 error detection, correction
More information1999, Scott F. Midkiff
Lecture Topics Direct Link Networks: Multiaccess Protocols (.7) Multiaccess control IEEE 80.5 Token Ring and FDDI CS/ECpE 556: Computer Networks Originally by Scott F. Midkiff (ECpE) Modified by Marc Abrams
More informationInternet Architecture and Protocol
Internet Architecture and Protocol Set# 03 Local Area Networks Delivered By: Engr Tahir Niazi Layer Reference to Protocol Application Presentation Session Application FTP, Telnet, SMTP, HTTP, SNMP.. Transport
More informationRahman 1. Application
Data Link layer Overview of IEEE 802.11 Application Presentation Session Transport LLC: On transmission, assemble data into a frame with address and CRC fields. On reception, disassemble frame, perform
More informationOutline. Introduction to Networked Embedded Systems - Embedded systems Networked embedded systems Embedded Internet - Network properties
Outline Introduction to Networked Embedded Systems - Embedded systems Networked embedded systems Embedded Internet - Network properties Layered Network Architectures - OSI framework descriptions of layers
More information