Media Access Control (MAC) ch12 It is a sublayer of the Data_Link layer to define the coordination of multiple station to a common Link.

Size: px
Start display at page:

Download "Media Access Control (MAC) ch12 It is a sublayer of the Data_Link layer to define the coordination of multiple station to a common Link."

Transcription

1 Media Access Control (MAC) ch12 It is a sublayer of the Data_Link layer to define the coordination of multiple station to a common Link. MAC Protocols Random Control access Channelization 1)ALOHA 1)Reservation 1)FDMA 2)CSMA 2)Polling 2)TDMA 3)CSMA/CD 3) Token Passing 3)CDMA 4)CSMA/CA 5) No CS (wireless): MACA, MACAW Channelization: (Static/deterministic) Static (fixed)&simple, yet rigid (not very scalable), without prioritizing nodes/traffics, and varying reasons of wasting BW. Allows N users to share the channel spatially (FDMA each user gets a sub-band of the channel BW), temporally (TDMA each user gets an equal time slot in a round-robin fashion), or both (CDMA all users share the channel simultaneously via pre-assigned orthogonal chip-sequences to encode their data bits). Control access: (Dynamic/Deterministic) In a try to make better BW utilization and increase scalability, there will be more centralized control to control the channel access, yet more control overhead and less robustness (controller vulnerability). Still mostly no distinguishing of node and traffic types priorities, except in Token-Ring frame priority! Random: (Dynamic/Nondeterministic/Decentralized) No rigid assignment of time-slot/sub-bw which leads to wasting of BW, instead users should be polite in using the channel, with varying degrees. Meanwhile, random waiting time (exponential & function of access impairment) is used to separate/shake users temporally in channel access time, lowering users collisions. In addition, users might sense the channel politely for being idle/free. Most developed approaches have very polite access regimes where users might delay (fixed and/or random time) access to channel, even when it is idle.

2 I Random A station might transmit when having data, no scheduling Random. Stations compete for the link access with high potential for collisions. Sender re-tx the frame if no ACK after the longest round trip delay. A) ALOHA: ALOHA: University of Hawaii(1970) radio communication between islands. i)pure ALOHA: Vulnerable period or Possible collision period = 2 B A C bbbbbbbbbbbbbbbbbbbbbbbb aaaaaaaaaaaaaaaaaaaaaaaaa ccccccccccccccc Period One Period Two / Vulnerable Interval / Period One : A must wait for B to finish. Period Two: No one transmits while A is transmitting (e.g, C). Throughput (S): S = G e - 2G --Successful Tx. (Vol. period = 2) where G: Total number of frames (ret X +new) S max is when G = ½ ==> S max = 1/(2e) = (small!!)

3

4 ii) Slotted ALOHA: To improve the pure ALOHA s throughput S by cutting the Vulnerable period by half.(how?) Time is slotted into slots each is the time to T X a frame (T f ), and a station (when has a frame) can not T X except at the start of a frame! Hence node A cannot catch up with B s frame above, yet still A and C can transfer at same time! Hence, we still have a VP but only one T f period. The V.P = one T f only now (when A & C T x at same time) S slotted = G e - 1*G (Vol. period = 2) S slotted (MAX/G=1) = 1/e = (doubling the S pure-aloha of 0.184)

5 B) Carrier Sense Multiple Access(CSMA): To reduce the chance of collision, a station will check if the channel is busy or idle before using it (i.e., it senses if the channel has a carrier signal (busy) or not (idle)) Do we still have collision possibility? Yes!(two station check at the same time an idle channel, or with time difference less than the cable delay between them) What is the Vol. Period? τ (one way end-to-end trip delay) Persistence Methods: (See Fig for protocols flow charts) The response of a station after sensing the channel: 1)busy and 2) idle. 1) Persistent: While channel is busy keep checking it. Highest probability of collision since more than one station can sense idle at same time. 2) Nonpersistent: If busy channel, wait random time then recheck it. There is lesser chance for collision because of the random wait by different stations. But, all stations might wait while channel is idle. How? If it becomes idle while all waiting, then no node will check it and it will remain idle until the first node wakes up to check. (i.e., too much politeness might be inefficient!)

6 3) P-Persistent: For slotted time channels with slot = τ (one way endto-end trip delay) combines lesser chance for collision, yet more efficient than nonpersistent. While channel is busy, keep checking. When channel becomes idle, the node waits for a slot, with probability P. If the node waits, then after waking up it will check it again, if idle repeat the idle random wait, otherwise waits until it becomes idle again and repeat the idle random wait. C) Carrier Sense Multiple Access with Collision Detection (CSMA/CD): While T x its frame, a station will monitor the channel detecting any collision.(i.e., CD while T x ing) See Fig Condition: It has to keep monitoring for 2 τ time! Why? Collision might be with the last station in the LAN (τ sec) and its echo must return back (τ sec), for a total of 2τ before the T x ing station can hear the collision. What about if the T f < 2 τ? Problem? Yes, a station can leave the Ether (cable) after finishing its frame, without feeling any collision, which does not mean that its frame did not collide since it might collide with the last station at a echo time distance 2τ > T f. The relation between data-rate (B b/s), network length (L), min. frame length (F min bit), and propagation speed (C m/s) is: (F min / B) = 2 τ = 2 (L/C) (= 51.2 µsec for 10Mb/s 2.5 Km Ethernet) Think varying the values of the involved parameters and see how we can still keep the protocol "/CD" (e.g., raising B [better data rate] will force to raise F [overhead of dummy bits] or C [expensive cables] and/or decreasing L [generally good, less $, but less Ethernet stations] to keep the equation balanced). (THINK of other scenarios.)

7 D) "CSMA/Collision" Avoidance (CSMA/CA): (wireless) Because of the nature of wireless media, collision cannot be detected (Why? Open medium low power, signal fading, need for more BW to T x and R x at same time, hidden terminal problem). Hence, we need to avoid the collision all together (How? By being more polite and wait much more than CSMA/CD, but can we? If not then at least to "alleviate" it by waiting more politely [IFS])!

8 CA is implemented with the aid of: 1) IFS: Even if station senses an idle channel it waits for an IFS --- (we can design it such that: short--> high priority and 2) Long--> low priority traffic). Then, it senses the channel again, if busy wait another IFS. Repeat until channel is found idle, then do not T x directly, instead wait on some contention period or random number of free slots (do not count busy slots!). 2) Contention Window: Time is slotted and a ready station (has frame to T x and channel is idle) will apply Bin. Expo. Back-off strategy for waiting for R random number of free slots to be selected form the range 0 -to- (2 k -1) where k is the number of failure to Tx a given frame by the station. Then after waiting for random R slots, a station T x its frame, then waits for ACK within a pre-specified timeout period. Max number of failure to Tx is K=15 trials. 3) ACK: Collision might still occur, destroying the T x ed frame, hence a station waits for ACK back from the receiver, otherwise it times out and increment k by one, then repeats all over again, if k allows (K <16), otherwise aborts and report to the upper layer!

9 There is also Virtual carrier sense, where sender/receiver process of handshaking is done, instead of the implicit carrier physical listening. Examples: Multiple Access Collision Avoidance (MACA) & MACA for wireless (MACAW) used in the IEEE MAC.

10 II Controlled Access Random access does not allow for the much needed upper bound on the frame delay! Hence, with a sort of deterministic control (DC), we can obtain such upper bound, while optimizing the channel BW utilization. With the aid of more control (DC overhead), the access of the channel is by mutual consent of all stations. 1) Reservation: (Centralized Control) Each station, when having a frame to sent reserves the channel to T x such frame.(how?) A reservation control frame (RCF), with mini slots one/station, precedes the data frames, in every data T x interval (variable size). A station with a frame to send marks its mini slot in the reservation frame, then T x in its turn. A station T x a frame only if it reserves its mini slot. A station missing the RCF will wait for an average of n/2 frames until being able to Tx it (or in worst case a max of n-1 frame Tx slots), yet there is an upper limit on the frame Tx delay. If all station have frames to Tx, i.e., heavy load, it will be a TDM mechanism, but with some extra overhead of the RF. In low traffic load, it resembles the statistical TDM, i.e., single Queue multi-servers, with minimal wasting of BW.

11 2) Polling: (Centralized Control) For better network scalability and maintenance, yet less robustness. One of the station (primary) arbitrates among the rest of stations (secondary) who should control the full access to the channel, one secondary station at a time (T x & R x is only via the primary!). Select phase Poll phase Poll Phase: The primary station polls all secondary nodes, if any has frame to send. NAK from a station is NO, Data frame is YES. NAK --> poll next station. Data frame --> get the data frame with receiver address. ACK --> send ACK (from primary to secondary). Problem-- Yes! The primary is lying, since it is not the intended receiver (IS)! (Solution: primary waits until communicating with the IS, and either send ACK or NAK to the sender. Select Phase: The Primary Station (PS) echoes the polled frame to its intended destination via the select function. SEL --> The PS waits for ACK from destination node (DN) indicating willingness to receive. When such ACK arrives, primary T x the data frame to the DN, and waits for DN s frame arrival ACK. Fast select: Primary sends select&data together and waits for ACK. Disadvantage: Station close to the primary hugs the T x starving the faraway stations.

12 3) Token Passing: (Centralized Control) Can we obtain the efficient statistical TDM without the burden of maintaining a global queue to control T x (especially, in lightly loaded network)? The answer is Yes-- it is the Token Ring MAC protocol! The right to access the channel is done via a special control frame called token, which circulates over the ring, giving the right for ring access. N stations are organized in a ring (physical/logical) where each station will have predecessor and successor (left/right) neighbors, it gets the token from its predecessor (hence the right to access the channel), uses it (only, if it has frames to T x ) for a limited predefined time slot, then passes the token to its successor (neighbor). Each station, when getting the token, a node T x frames for a Token Holding Time (THT) period only, then passes it to its successor, guaranteeing an upper bound on a frame total delay, over the ring N*THT. Centralized network monitoring is needed to monitor/control nodes access to the ring and protocol integrity (lost/destroyed token), plus other functions.

13 Types of Rings (LANS): 1) P_T_P physical Ring 2) Dual ring physical P_t_P 3) Logical ring 4) Hub central monitor to control and implement the ring (most used) The Token Ring (IBM)(IEEE 802.5) Point-to-point ring(physical) of twisted pair, Coaxial, or fiber optics. Digital, with known upper bound delay, about N*THT for N nodes. Number of bits in the ring at one time. Channel data rate = R Mbps ( one bit every 1/R μsec) Then each bit occupies 200/R meters ==> Ring physical length is important. 1-bit delay at each station interface to inspect (possibly modify). When a station needs to transmit, it seizes the special control frame token when it gets it. Each station interface is in one of the following modes at any time: 1) listen: read one bit from the ring into the local buffer and copy it back.( 1 bit delay) 2) transmit: break the ring and insert local data (after seizing the token). The sender removes the bits as they circulate back to it (why?). The sender will get some ACK about the state of its transmitted frame; then save it for reliability monitoring, or discard. After finishing the transmission (for a THT period), a station regenerates the token into the ring and switches back to the listen mode. In heavy load state, the round-robin fashion of rotating the token would make the ring efficiency about 100%, almost TDM. The is shielded twisted pairs running 4 or 6 Mbps using differential Manchester encoding. To make the ring more reliable, the wire centre technique (Hub) is used. Frame Format: 3 bytes token (first 3 bytes in the frame).

14 OCTs: SD AC ED TOKEN Format SD: Start Delimiter FC: Frame Control AC: Access Control ED: End Delimiter FS: Frame Status (no limit!!!!?) SD AC FC Destination Source Checksum ED FS Address Address (error check) Data (LLC fame) Data Frame Format No limit on the data length (except the token holding time, THT). The SD and ED contains invalid DME(differential Manchester Encoding).The ED has one bit set to one if the frames is in error, and one bit as end of file. The destination and source addresses are 6 bytes same format as in the and.4 (Ethernet & Token Bus). The FS byte: It has two bits: A and C that work as ACK bits. Auto ACK A=0 and C= 0 destination not present. A=1 and C =0 destination is present but frame is not accepted A=1 and C = 1 destination is present and frame is accepted(copied) The AC byte: Bits PPP T M RRR The PPP and RRR are used to handle multiple priority frames. A frame is transmitted if has higher priority than the token priority in the PPP field; otherwise not T X. But if not T x ed and its priority is higher than the token RRR field, then it can reserve the token priority for next time by replacing the token's RRR field with its own priority. To eliminate the low priority station starvation problem, the station raising the reservation priority (RRR) is also responsible for lowering it back when it is done by saving the overwritten RRR in its stack, and returning it back after finishing the use of the token (after getting it). The T bit is the token-bit = 0 (free token), = 1 (non-token) frame.

15 The FC byte: Bits 2 6 FF z z z z z z FF bits: 00 = control frame (MAC control PDU) 01 = Data frame (LLC PDU included) --> 6-bit z's will be r r r yyy Where r bit indicates reserved (unused), and YYY is the LLC frame priority (LLC) from source to destination. Monitor responsibilities: 1) Lost token: It keeps a timer with the longest tokenless interval. (sum of the token holding times of all stations), then it drains the ring and issues a new token. 2) Cleaning garbled frames from the network.(invalid format or error) 3) Detecting orphan frames through the M bit in the FC byte of the frame. The Monitor looks at the M bit: If M = 0 the frame is OK, and it will set it to 1; otherwise the Monitor decides that frame's sender ("source") node did not drain it (for some reason), since this is the second time the Monitor sees it, hence the frame is orphan and the Monitor drains it from the ring. 4) Inserting extra delay in the ring, when needed, to be able to hold the token, in case of low number of stations. Problems? Yes, tough to handle control in case of a sick monitor! We can easily detect/handle a dead monitor, rather than to deal with a sick one where we do not know really when it is sick! Based on the traffic load volume (heavy/light), compare the TR protocol with the Reservation and Polling protocols? Do we still have an upper bound on the frame delay over a prioritized TR??

16 III Channelization An approach to allow multi_access to single channel by number of stations utilizing Freq. Division (FDMA), Time division (TDMA), and code division (CDMA) Muxing. Frequency Division Multiple Access (FDMA) Spatial division of the channel BW among users, each access a sub-band of the total BW, all the time (forcing broadband Tx).

17 Time Division Multiple Access (TDMA) Code Division Multiple Access(CDMA) Digits (d) are encoded using chip sequence (c)

18 The entire bandwidth of the channel is used all the time by all stations. Each station will have its orthogonal to the others chip sequence for encoding. Bit to be encoded chip multiplier final encoding for T x > > 1 * chip > > 1 * chip silence > > 0 * chip = [00 0] Notice: How to get N orthogonal chips? Walsh Matrix NXN N = 1, 2, 4, 8, 16, 32,..., 2 i i = 0, 1, 2, 3, 4, All rows and columns are orthogonal. (See fig 12.29) Assume 4 stations S1, S2, S3, S4 D =( d 1.c 1 + d 2.c 2 +d 3.c 3 + d 4.c 4 ) At any station, in order to read the bit T x of any other station say station 2, multiply D by C 2 and divide by 4 (size of the chip sequence). (D.c 2 /4) = ( d 1.c 1.c 2 + d 2.c 2.c 2 + d 3.c 3.c 2 + d 4.c 4.c 2 ) / 4 = 4d 2 /4 = d 2 ( if d 2 = 1 0, if 1 1, if 0 silence)

Data Link Layer: Collisions

Data Link Layer: Collisions Data Link Layer: Collisions 1 Multiple Access Data Link layer divided into two sublayers. The upper sublayer is responsible for datalink control, The lower sublayer is responsible for resolving access

More information

CHAPTER 7 MAC LAYER PROTOCOLS. Dr. Bhargavi Goswami Associate Professor & Head Department of Computer Science Garden City College

CHAPTER 7 MAC LAYER PROTOCOLS. Dr. Bhargavi Goswami Associate Professor & Head Department of Computer Science Garden City College CHAPTER 7 MAC LAYER PROTOCOLS Dr. Bhargavi Goswami Associate Professor & Head Department of Computer Science Garden City College MEDIUM ACCESS CONTROL - MAC PROTOCOLS When the two stations transmit data

More information

Chapter 12 Multiple Access 12.1

Chapter 12 Multiple Access 12.1 Chapter 12 Multiple Access 12.1 Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. 12.2 Figure 12.1 Data link layer divided into two functionality-oriented sublayers

More information

CSE 461: Multiple Access Networks. This Lecture

CSE 461: Multiple Access Networks. This Lecture CSE 461: Multiple Access Networks This Lecture Key Focus: How do multiple parties share a wire? This is the Medium Access Control (MAC) portion of the Link Layer Randomized access protocols: 1. Aloha 2.

More information

Local Area Networks (LANs) SMU CSE 5344 /

Local Area Networks (LANs) SMU CSE 5344 / Local Area Networks (LANs) SMU CSE 5344 / 7344 1 LAN/MAN Technology Factors Topology Transmission Medium Medium Access Control Techniques SMU CSE 5344 / 7344 2 Topologies Topology: the shape of a communication

More information

Multiple Access Protocols

Multiple Access Protocols Multiple Access Protocols Computer Networks Lecture 2 http://goo.gl/pze5o8 Multiple Access to a Shared Channel The medium (or its sub-channel) may be shared by multiple stations (dynamic allocation) just

More information

Topics. Link Layer Services (more) Link Layer Services LECTURE 5 MULTIPLE ACCESS AND LOCAL AREA NETWORKS. flow control: error detection:

Topics. Link Layer Services (more) Link Layer Services LECTURE 5 MULTIPLE ACCESS AND LOCAL AREA NETWORKS. flow control: error detection: 1 Topics 2 LECTURE 5 MULTIPLE ACCESS AND LOCAL AREA NETWORKS Multiple access: CSMA/CD, CSMA/CA, token passing, channelization LAN: characteristics, i basic principles i Protocol architecture Topologies

More information

EITF25 Internet Techniques and Applications L4: Network Access. Stefan Höst

EITF25 Internet Techniques and Applications L4: Network Access. Stefan Höst EITF25 Internet Techniques and Applications L4: Network Access Stefan Höst Repetition The link layer protocol should make sure that the data is correctly transmitted over the physical link using error

More information

Contention Protocols and Networks

Contention Protocols and Networks 4/13/2005 314 Lecture Contention Protocols and Networks 1 Contention Protocols and Networks Contention Protocols CSMA/CD Network Topologies Ethernet 4/13/2005 314 Lecture Contention Protocols and Networks

More information

The Medium Access Control Scheme (MAC Layer) Reference: Andrew S. Tanenbaum, Computer Networks, 3rd Edition, Prentice Hall, 1996.

The Medium Access Control Scheme (MAC Layer) Reference: Andrew S. Tanenbaum, Computer Networks, 3rd Edition, Prentice Hall, 1996. The Medium Access Control Scheme (MAC Layer) Reference: Andrew S. Tanenbaum, Computer Networks, 3rd Edition, Prentice Hall, 1996. 1 Table of Contents Introduction ALOHA Carrier Sense Multiple Sense (CSMA)

More information

Jaringan Komputer. Broadcast Network. Outline. MAC (Medium Access Control) Channel Allocation Problem. Dynamic Channel Allocation

Jaringan Komputer. Broadcast Network. Outline. MAC (Medium Access Control) Channel Allocation Problem. Dynamic Channel Allocation Broadcast Network Jaringan Komputer Medium Access Control Sublayer 2 network categories: point-to-point connections broadcast channels Key issue in broadcast network: how to determine who gets to use the

More information

Lecture 9: Bridging. CSE 123: Computer Networks Alex C. Snoeren

Lecture 9: Bridging. CSE 123: Computer Networks Alex C. Snoeren Lecture 9: Bridging CSE 123: Computer Networks Alex C. Snoeren Lecture 9 Overview Finishing up media access Ethernet Contention-free methods (rings) Moving beyond one wire Link technologies have limits

More information

CS 43: Computer Networks Media Access. Kevin Webb Swarthmore College November 30, 2017

CS 43: Computer Networks Media Access. Kevin Webb Swarthmore College November 30, 2017 CS 43: Computer Networks Media Access Kevin Webb Swarthmore College November 30, 2017 Multiple Access Links & Protocols Two classes of links : point-to-point dial-up access link between Ethernet switch,

More information

Introduction to Networks and the Internet

Introduction to Networks and the Internet Introduction to Networks and the Internet HTML tutorial today. Announcements CMPE 80N Spring 2003 Week 5 1 2 MAC Protocols MAC Protocols Round-robin. Scheduled-access. Contention-based. Contention-based

More information

Data Link Layer -2- Network Access

Data Link Layer -2- Network Access EITF25 Internet: Technology and Applications Data Link Layer -2- Network Access 2013, Lecture 03 Kaan Bür, Stefan Höst Previously on EITF25 Logical Link Control Sublayer Flow control Send data Wait for

More information

Aloha and slotted aloha

Aloha and slotted aloha CSMA 2/13/06 Aloha and slotted aloha Slotted aloha: transmissions are synchronized and only start at the beginning of a time slot. Aloha sender A sender B collision sender C t Slotted Aloha collision sender

More information

Data Link Layer, Part 5. Medium Access Control

Data Link Layer, Part 5. Medium Access Control CS 455 Medium Access Control, Page 1 Data Link Layer, Part 5 Medium Access Control These slides are created by Dr. Yih Huang of George Mason University. Students registered in Dr. Huang s courses at GMU

More information

Chapter 4. The Medium Access Control Sublayer. Points and Questions to Consider. Multiple Access Protocols. The Channel Allocation Problem.

Chapter 4. The Medium Access Control Sublayer. Points and Questions to Consider. Multiple Access Protocols. The Channel Allocation Problem. Dynamic Channel Allocation in LANs and MANs Chapter 4 The Medium Access Control Sublayer 1. Station Model. 2. Single Channel Assumption. 3. Collision Assumption. 4. (a) Continuous Time. (b) Slotted Time.

More information

Physical Layer. Medium Access Links and Protocols. Point-to-Point protocols. Modems: Signaling. Modems Signaling. Srinidhi Varadarajan

Physical Layer. Medium Access Links and Protocols. Point-to-Point protocols. Modems: Signaling. Modems Signaling. Srinidhi Varadarajan P Physical Layer Srinidhi Varadarajan Medium Access Links and Protocols Three types of links : point-to-point (single wire, e.g. PPP, SLIP) broadcast (shared wire or medium; e.g, Ethernet, Wavelan, etc.)

More information

COMP476 Networked Computer Systems. Polling. Sharing the Wire. LAN Technologies. COMP476 Networked Computer Systems 1

COMP476 Networked Computer Systems. Polling. Sharing the Wire. LAN Technologies. COMP476 Networked Computer Systems 1 Media Access Control Sub Layer COMP476 Networked Computer Systems Sharing Common Media There are several ways to share common media. Some methods are: Frequency division multiplexing Time division multiplexing

More information

Goals. Fundamentals of Network Media. More topics. Topics. Multiple access communication. Multiple access solutions

Goals. Fundamentals of Network Media. More topics. Topics. Multiple access communication. Multiple access solutions Fundamentals of Network Media Local Area Networks Ursula Holmström Goals Learn the basic concepts related to LAN technologies, for example use of shared media medium access control topologies Know the

More information

Data Link Layer -2- Network Access

Data Link Layer -2- Network Access EITF25 Internet: Technology and Applications Data Link Layer -2- Network Access 2015, Lecture 03 Kaan Bür Previously on EITF25 Logical Link Control Sublayer Flow control Send data Wait for ACK Error control

More information

Computer Network Fundamentals Spring Week 3 MAC Layer Andreas Terzis

Computer Network Fundamentals Spring Week 3 MAC Layer Andreas Terzis Computer Network Fundamentals Spring 2008 Week 3 MAC Layer Andreas Terzis Outline MAC Protocols MAC Protocol Examples Channel Partitioning TDMA/FDMA Token Ring Random Access Protocols Aloha and Slotted

More information

Links Reading: Chapter 2. Goals of Todayʼs Lecture. Message, Segment, Packet, and Frame

Links Reading: Chapter 2. Goals of Todayʼs Lecture. Message, Segment, Packet, and Frame Links Reading: Chapter 2 CS 375: Computer Networks Thomas Bressoud 1 Goals of Todayʼs Lecture Link-layer services Encoding, framing, and error detection Error correction and flow control Sharing a shared

More information

ECEN 5032 Data Networks Medium Access Control Sublayer

ECEN 5032 Data Networks Medium Access Control Sublayer ECEN 5032 Data Networks Medium Access Control Sublayer Peter Mathys mathys@colorado.edu University of Colorado, Boulder c 1996 2005, P. Mathys p.1/35 Overview (Sub)networks can be divided into two categories:

More information

ECE 4450:427/527 - Computer Networks Spring 2017

ECE 4450:427/527 - Computer Networks Spring 2017 ECE 4450:427/527 - Computer Networks Spring 2017 Dr. Nghi Tran Department of Electrical & Computer Engineering Lecture 5.4: Multiple Access Protocols Dr. Nghi Tran (ECE-University of Akron) ECE 4450:427/527

More information

CS 43: Computer Networks. 27: Media Access Contd. December 3, 2018

CS 43: Computer Networks. 27: Media Access Contd. December 3, 2018 CS 43: Computer Networks 27: Media Access Contd. December 3, 2018 Last Class The link layer provides lots of functionality: addressing, framing, media access, error checking could be used independently

More information

Lecture 6. Data Link Layer (cont d) Data Link Layer 1-1

Lecture 6. Data Link Layer (cont d) Data Link Layer 1-1 Lecture 6 Data Link Layer (cont d) Data Link Layer 1-1 Agenda Continue the Data Link Layer Multiple Access Links and Protocols Addressing Data Link Layer 1-2 Multiple Access Links and Protocols Two types

More information

Link Layer and LANs 안상현서울시립대학교컴퓨터 통계학과.

Link Layer and LANs 안상현서울시립대학교컴퓨터 통계학과. Link Layer and LANs 안상현서울시립대학교컴퓨터 통계학과 ahn@venus.uos.ac.kr Data Link Layer Goals: understand principles behind data link layer services: error detection, correction sharing a broadcast channel: multiple

More information

CMPE 257: Wireless and Mobile Networking

CMPE 257: Wireless and Mobile Networking CMPE 257: Wireless and Mobile Networking Katia Obraczka Computer Engineering UCSC Baskin Engineering Lecture 3 CMPE 257 Winter'11 1 Announcements Accessing secure part of the class Web page: User id: cmpe257.

More information

Computer Networks Medium Access Control. Mostafa Salehi Fall 2008

Computer Networks Medium Access Control. Mostafa Salehi Fall 2008 Computer Networks Medium Access Control Mostafa Salehi Fall 2008 2008 1 Outline Issues ALOHA Network Ethernet Token Ring Wireless 2 Main Issues Local Area Network (LAN) : Three or more machines are physically

More information

Data Link Layer, Part 3 Medium Access Control. Preface

Data Link Layer, Part 3 Medium Access Control. Preface Data Link Layer, Part 3 Medium Access Control These slides are created by Dr. Yih Huang of George Mason University. Students registered in Dr. Huang's courses at GMU can make a single machine-readable

More information

COMMUNICATION NETWORKS NETW 501

COMMUNICATION NETWORKS NETW 501 COMMUNICATION NETWORKS NETW 501 TUTORIAL 6 Presented by: Eng. Hana Hesham Eng. Mohamed Atef Data Link Layer Data Link Layer is split into 2 sublayers which are the Logical Link Control (LLC) and the Medium

More information

Medium Access Control. CSCI370 Lecture 5 Michael Hutt New York Institute of Technology

Medium Access Control. CSCI370 Lecture 5 Michael Hutt New York Institute of Technology Medium Access Control CSCI370 Lecture 5 Michael Hutt New York Institute of Technology The Data Link Layer Logical Link Control (LLC) IEEE 802.2 Standard RFC 1042 Provides three service options Unreliable

More information

ICE 1332/0715 Mobile Computing (Summer, 2008)

ICE 1332/0715 Mobile Computing (Summer, 2008) ICE 1332/0715 Mobile Computing (Summer, 2008) Medium Access Control Prof. Chansu Yu http://academic.csuohio.edu/yuc/ Simplified Reference Model Application layer Transport layer Network layer Data link

More information

Redes de Computadores. Medium Access Control

Redes de Computadores. Medium Access Control Redes de Computadores Medium Access Control Manuel P. Ricardo Faculdade de Engenharia da Universidade do Porto 1 » How to control the access of computers to a communication medium?» What is the ideal Medium

More information

Computer Networks. Medium Access Sublayer (Part I)

Computer Networks. Medium Access Sublayer (Part I) Computer Networks Medium Access Sublayer (Part I) Topics Introduction Multiple Access Protocols Ethernet Wireless LAN Protocols Bridges Misc (brief) High-Speed LANs Satellite Networks Introduction Remember,

More information

The MAC layer in wireless networks

The MAC layer in wireless networks The MAC layer in wireless networks The wireless MAC layer roles Access control to shared channel(s) Natural broadcast of wireless transmission Collision of signal: a /space problem Who transmits when?

More information

LANs Local Area Networks LANs provide an efficient network solution : To support a large number of stations Over moderately high speed

LANs Local Area Networks LANs provide an efficient network solution : To support a large number of stations Over moderately high speed Local Area Networks LANs provide an efficient network solution : To support a large number of stations Over moderately high speed With relatively small bit errors Multiaccess Protocols Communication among

More information

CCM 4300 Lecture 5 Computer Networks, Wireless and Mobile Communications. Dr Shahedur Rahman. Room: T115

CCM 4300 Lecture 5 Computer Networks, Wireless and Mobile Communications. Dr Shahedur Rahman. Room: T115 CCM 4300 Lecture 5 Computer Networks, Wireless and Mobile Communications Dr Shahedur Rahman s.rahman@mdx.ac.uk Room: T115 1 Recap of Last Session Described the physical layer Analogue and Digital signal

More information

Medium Access Control. IEEE , Token Rings. CSMA/CD in WLANs? Ethernet MAC Algorithm. MACA Solution for Hidden Terminal Problem

Medium Access Control. IEEE , Token Rings. CSMA/CD in WLANs? Ethernet MAC Algorithm. MACA Solution for Hidden Terminal Problem Medium Access Control IEEE 802.11, Token Rings Wireless channel is a shared medium Need access control mechanism to avoid interference Why not CSMA/CD? 9/15/06 CS/ECE 438 - UIUC, Fall 2006 1 9/15/06 CS/ECE

More information

Multiple Access. Data Communications and Networking

Multiple Access. Data Communications and Networking Multiple Access In the previous part we discussed data link control, a mechanism which provides a link with reliable communication. In the protocols we described, we assumed that there is an available

More information

IEEE , Token Rings. 10/11/06 CS/ECE UIUC, Fall

IEEE , Token Rings. 10/11/06 CS/ECE UIUC, Fall IEEE 802.11, Token Rings 10/11/06 CS/ECE 438 - UIUC, Fall 2006 1 Medium Access Control Wireless channel is a shared medium Need access control mechanism to avoid interference Why not CSMA/CD? 10/11/06

More information

Data Link Layer Technologies

Data Link Layer Technologies Chapter 2.2 La 2 Data Link La Technologies 1 Content Introduction La 2: Frames Error Handling 2 Media Access Control General approaches and terms Aloha Principles CSMA, CSMA/CD, CSMA / CA Master-Slave

More information

Chapter 4 (Week 7) The Medium Access Control Sublayer ANDREW S. TANENBAUM COMPUTER NETWORKS FOURTH EDITION PP CN&DC Dr.

Chapter 4 (Week 7) The Medium Access Control Sublayer ANDREW S. TANENBAUM COMPUTER NETWORKS FOURTH EDITION PP CN&DC Dr. Chapter 4 (Week 7) The Medium Access Control Sublayer ANDREW S. TANENBAUM COMPUTER NETWORKS FOURTH EDITION PP. 247-292 1 4.1. THE CHANNEL ALLOCATION PROBLEM 4.2. MULTIPLE ACCESS PROTOCOLS 4.3. ETHERNET

More information

Computer Networks. Today. Principles of datalink layer services Multiple access links Adresavimas, ARP LANs Wireless LANs VU MIF CS 1/48 2/48

Computer Networks. Today. Principles of datalink layer services Multiple access links Adresavimas, ARP LANs Wireless LANs VU MIF CS 1/48 2/48 Computer Networks VU MIF CS 1/48 Today Principles of datalink layer services Multiple access links Adresavimas, ARP LANs Wireless LANs 2/48 1 Link layer: introduction terminology: hosts and routers: nodes

More information

Chapter 6 Medium Access Control Protocols and Local Area Networks

Chapter 6 Medium Access Control Protocols and Local Area Networks Chapter 6 Medium Access Control Protocols and Local Area Networks Part I: Medium Access Control Part II: Local Area Networks CSE 3213, Winter 2010 Instructor: Foroohar Foroozan Chapter Overview Broadcast

More information

RMIT University. Data Communication and Net-Centric Computing COSC 1111/2061/1110. Lecture 8. Medium Access Control Methods & LAN

RMIT University. Data Communication and Net-Centric Computing COSC 1111/2061/1110. Lecture 8. Medium Access Control Methods & LAN RMIT University Data Communication and Net-Centric Computing COSC 1111/2061/1110 Medium Access Control Methods & LAN Technology Slide 1 Lecture Overview During this lecture, we will Look at several Multiple

More information

CSE 461: Multiple Access. Homework: Chapter 2, problems 1, 8, 12, 18, 23, 24, 35, 43, 46, and 58

CSE 461: Multiple Access. Homework: Chapter 2, problems 1, 8, 12, 18, 23, 24, 35, 43, 46, and 58 CSE 461: Multiple Access Homework: Chapter 2, problems 1, 8, 12, 18, 23, 24, 35, 43, 46, and 58 Next Topic Key Focus: How do multiple parties share a wire? This is the Medium Access Control (MAC) portion

More information

CSE/EE 461 Wireless and Contention-Free Protocols

CSE/EE 461 Wireless and Contention-Free Protocols CSE/EE 461 Wireless and Contention-Free Protocols Last Time The multi-access problem Medium Access Control (MAC) sublayer Random access protocols: Aloha CSMA variants Classic Ethernet (CSMA/CD) Application

More information

Summary of MAC protocols

Summary of MAC protocols Summary of MAC protocols What do you do with a shared media? Channel Partitioning, by time, frequency or code Time Division, Code Division, Frequency Division Random partitioning (dynamic) ALOHA, S-ALOHA,

More information

CMPE 257: Wireless and Mobile Networking

CMPE 257: Wireless and Mobile Networking CMPE 257: Wireless and Mobile Networking Katia Obraczka Computer Engineering UCSC Baskin Engineering Lecture 3 CMPE 257 Spring'15 1 Next week Announcements April 14: ICN (Spencer Sevilla) April 16: DTN

More information

Multiple Access Links and Protocols

Multiple Access Links and Protocols Multiple Access Links and Protocols Two types of links : point-to-point PPP for dial-up access point-to-point link between Ethernet switch and host broadcast (shared wire or medium) old-fashioned Ethernet

More information

CARRIER SENSE MULTIPLE ACCESS (CSMA):

CARRIER SENSE MULTIPLE ACCESS (CSMA): Lecture Handout Computer Networks Lecture No. 8 CARRIER SENSE MULTIPLE ACCESS (CSMA): There is no central control management when computers transmit on Ethernet. For this purpose the Ethernet employs CSMA

More information

Token Ring and. Fiber Distributed Data Interface (FDDI) Networks: Token Ring and FDDI 1

Token Ring and. Fiber Distributed Data Interface (FDDI) Networks: Token Ring and FDDI 1 Token Ring and Fiber Distributed Data Interface (FDDI) Networks: Token Ring and FDDI 1 IEEE 802.5 Token Ring Proposed in 1969 and initially referred to as a Newhall ring. Token ring :: a number of stations

More information

CSE 461 Multiple Access. David Wetherall

CSE 461 Multiple Access. David Wetherall CSE 461 Multiple Access David Wetherall djw@cs.washington.edu How to share a link Multiplexing = networking term for sharing a resource among multiple users (e.g., link, protocol instance) Topics: Multiplexing

More information

MAC Sublayer(1) Principal service of the Medium Access Control Sublayer: Allocating a single broadcast channel (mostly a LAN) among competing users

MAC Sublayer(1) Principal service of the Medium Access Control Sublayer: Allocating a single broadcast channel (mostly a LAN) among competing users MAC Sublayer(1) Principal service of the Medium Access Control Sublayer: Allocating a single broadcast channel (mostly a LAN) among competing users Static Channel Allocation: Frequency Division Multiplexing

More information

Links. CS125 - mylinks 1 1/22/14

Links. CS125 - mylinks 1 1/22/14 Links 1 Goals of Today s Lecture Link-layer services Encoding, framing, and error detection Error correction and flow control Sharing a shared media Channel partitioning Taking turns Random access Shared

More information

Data Link Layer. Goals of This Lecture. Engineering Questions. Outline of the Class

Data Link Layer. Goals of This Lecture. Engineering Questions. Outline of the Class Data Link Layer Kuang Chiu Huang TCM NCKU Goals of This Lecture Through the lecture and in-class discussion, students are enabled to describe role and functions of the link layer, and compare different

More information

Ethernet. Introduction. CSE 3213 Fall 2011

Ethernet. Introduction. CSE 3213 Fall 2011 Ethernet CSE 3213 Fall 2011 19 October 2011 1 Introduction Rapid changes in technology designs Broader use of LANs New schemes for high-speed LANs High-speed LAN technologies: Fast and gigabit Ethernet

More information

2.1 CHANNEL ALLOCATION 2.2 MULTIPLE ACCESS PROTOCOLS Collision Free Protocols 2.3 FDDI 2.4 DATA LINK LAYER DESIGN ISSUES 2.5 FRAMING & STUFFING

2.1 CHANNEL ALLOCATION 2.2 MULTIPLE ACCESS PROTOCOLS Collision Free Protocols 2.3 FDDI 2.4 DATA LINK LAYER DESIGN ISSUES 2.5 FRAMING & STUFFING UNIT-2 2.1 CHANNEL ALLOCATION 2.2 MULTIPLE ACCESS PROTOCOLS 2.2.1 Pure ALOHA 2.2.2 Slotted ALOHA 2.2.3 Carrier Sense Multiple Access 2.2.4 CSMA with Collision Detection 2.2.5 Collision Free Protocols 2.2.5.1

More information

High Level View. EE 122: Ethernet and Random Access protocols. Medium Access Protocols

High Level View. EE 122: Ethernet and Random Access protocols. Medium Access Protocols High Level View EE 122: Ethernet and 802.11 Ion Stoica September 18, 2002 Goal: share a communication medium among multiple hosts connected to it Problem: arbitrate between connected hosts Solution goals:

More information

Networking Technologies and Applications

Networking Technologies and Applications Networking Technologies and Applications Rolland Vida BME TMIT September 23, 2016 Aloha Advantages: Different size packets No need for synchronization Simple operation If low upstream traffic, the solution

More information

Data Link Layer: Overview, operations

Data Link Layer: Overview, operations Data Link Layer: Overview, operations Chapter 3 1 Outlines 1. Data Link Layer Functions. Data Link Services 3. Framing 4. Error Detection/Correction. Flow Control 6. Medium Access 1 1. Data Link Layer

More information

CS 716: Introduction to communication networks. - 9 th class; 19 th Aug Instructor: Sridhar Iyer IIT Bombay

CS 716: Introduction to communication networks. - 9 th class; 19 th Aug Instructor: Sridhar Iyer IIT Bombay CS 716: Introduction to communication networks - 9 th class; 19 th Aug 2011 Instructor: Sridhar Iyer IIT Bombay Contention-based MAC: ALOHA Users transmit whenever they have data to send Collisions occur,

More information

Mobile Communications Chapter 3 : Media Access

Mobile Communications Chapter 3 : Media Access Mobile Communications Chapter 3 : Media Access 2. Motivation 3. SDMA, FDMA, TDMA 1. Aloha and contention based schemes 4. Reservation schemes 5. Collision avoidance, MACA 6. Polling CDMA (Lecture 6) Prof.

More information

Reminder: Datalink Functions Computer Networking. Datalink Architectures

Reminder: Datalink Functions Computer Networking. Datalink Architectures Reminder: Datalink Functions 15-441 15 441 15-641 Computer Networking Lecture 5 Media Access Control Peter Steenkiste Fall 2015 www.cs.cmu.edu/~prs/15-441-f15 Framing: encapsulating a network layer datagram

More information

COMPUTER NETWORKS UNIT 3

COMPUTER NETWORKS UNIT 3 COMPUTER NETWORKS UNIT 3 1. Illustrate about Reservation, Polling and Token Passing. [10 marks] Controlled access: In controlled access, the stations consult one another to find which station has the right

More information

The Link Layer and LANs. Chapter 6: Link layer and LANs

The Link Layer and LANs. Chapter 6: Link layer and LANs The Link Layer and LANs EECS3214 2018-03-14 4-1 Chapter 6: Link layer and LANs our goals: understand principles behind link layer services: error detection, correction sharing a broadcast channel: multiple

More information

The Medium Access Control Sublayer

The Medium Access Control Sublayer The Medium Access Control Sublayer Chapter 4 Channel Allocation Problem Static channel allocation Assumptions for dynamic Assumptions for Dynamic Channel Allocation 1. Independent traffic 2. Single channel

More information

Chapter 4. The Medium Access Control Sublayer

Chapter 4. The Medium Access Control Sublayer Chapter 4 The Medium Access Control Sublayer The Channel Allocation Problem Static Channel Allocation in LANs and MANs Dynamic Channel Allocation in LANs and MANs Dynamic Channel Allocation in LANs and

More information

MULTIPLE ACCESS PROTOCOLS 2. 1

MULTIPLE ACCESS PROTOCOLS 2. 1 MULTIPLE ACCESS PROTOCOLS AND WIFI 1 MULTIPLE ACCESS PROTOCOLS 2. 1 MULTIPLE ACCESS LINKS, PROTOCOLS Two types of links : point-to-point broadcast (shared wire or medium) POINT-TO-POINT PPP for dial-up

More information

Real-Time (Paradigms) (47)

Real-Time (Paradigms) (47) Real-Time (Paradigms) (47) Memory: Memory Access Protocols Tasks competing for exclusive memory access (critical sections, semaphores) become interdependent, a common phenomenon especially in distributed

More information

Data and Computer Communications

Data and Computer Communications Data and Computer Communications Chapter 16 High Speed LANs Eighth Edition by William Stallings Why High Speed LANs? speed and power of PCs has risen graphics-intensive applications and GUIs see LANs as

More information

CS 455/555 Intro to Networks and Communications. Link Layer

CS 455/555 Intro to Networks and Communications. Link Layer CS 455/555 Intro to Networks and Communications Link Layer Dr. Michele Weigle Department of Computer Science Old Dominion University mweigle@cs.odu.edu http://www.cs.odu.edu/~mweigle/cs455-s13 1 Link Layer

More information

Multiple-access protocols

Multiple-access protocols Multiple Access Multiple-access protocols Random Access MA CSMA CSMA/CD CSMA/CA RANDOM ACCESS In a random access method, each station has the right to the medium without being controlled by any other station.

More information

Chapter 4: The Medium Access Layer

Chapter 4: The Medium Access Layer Chapter 4: The Medium Access Layer Computer Networks Maccabe Computer Science Department The University of New Mexico September 2002 Medium Access Layer Point-to-point versus broadcast networks Broadcast

More information

The Medium Access Sublayer

The Medium Access Sublayer The Medium Access Sublayer shivkuma@ecse.rpi.edu http://www.ecse.rpi.edu/homepages/shivkuma 1-1 Based in part upon the slides of Prof. Raj Jain (OSU), K. Vastola (RPI) Overview Multiple Access: Aloha,

More information

EE 122: Ethernet and

EE 122: Ethernet and EE 122: Ethernet and 802.11 Ion Stoica September 18, 2002 (* this talk is based in part on the on-line slides of J. Kurose & K. Rose) High Level View Goal: share a communication medium among multiple hosts

More information

Medium Access Control. MAC protocols: design goals, challenges, contention-based and contention-free protocols

Medium Access Control. MAC protocols: design goals, challenges, contention-based and contention-free protocols Medium Access Control MAC protocols: design goals, challenges, contention-based and contention-free protocols 1 Why do we need MAC protocols? Wireless medium is shared Many nodes may need to access the

More information

Medium Access Control Sublayer Chapter 4

Medium Access Control Sublayer Chapter 4 Medium Access Control Sublayer Chapter 4 Channel Allocation Problem Multiple Access Protocols Ethernet Wireless LANs Broadband Wireless Bluetooth RFID Data Link Layer Switching Revised: August 2011 & February

More information

Direct Link Communication II: Wired Media. Multi-Access Communication

Direct Link Communication II: Wired Media. Multi-Access Communication Direct Link Communication II: Wired Media Multi-Access Communication Two classes: contention-based e.g., CSMA/CD, CSMA/CA used in Ethernet, WLAN contention-free e.g., TDM, FDM, TDMA, CDMA, token ring used

More information

ECE453 Introduction to Computer Networks. Broadcast vs. PPP. Delay. Lecture 7 Multiple Access Control (I)

ECE453 Introduction to Computer Networks. Broadcast vs. PPP. Delay. Lecture 7 Multiple Access Control (I) ECE453 Introduction to Computer Networks Lecture 7 Multiple Access Control (I) 1 Broadcast vs. PPP Broadcast channel = multiaccess channel = random access channel Broadcast LAN Satellite network PPP WAN

More information

LANs. Local Area Networks. via the Media Access Control (MAC) SubLayer. Networks: Local Area Networks

LANs. Local Area Networks. via the Media Access Control (MAC) SubLayer. Networks: Local Area Networks LANs Local Area Networks via the Media Access Control (MAC) SubLayer 1 Local Area Networks Aloha Slotted Aloha CSMA (non-persistent, 1-persistent, p-persistent) CSMA/CD Ethernet Token Ring 2 Network Layer

More information

Media Access Control. Networked Systems (H) Lecture 5

Media Access Control. Networked Systems (H) Lecture 5 Media Access Control Networked Systems (H) Lecture 5 Lecture Outline Controlling access to the channel Link contention Media access control protocols Contention-based protocols CSMA/CD Token ring Slotted

More information

Access Technologies! Fabio Martignon

Access Technologies! Fabio Martignon Access Technologies! Fabio Martignon 1 LAN Ethernet - IEEE 802.3 Broadcast Bus Capacity=10 Mb/s Xerox-Intel-Digital inventors Standardized at the beginning of the 80s as IEEE 802.3 Big Success and Several

More information

Local Networks. Lecture 4 6-Apr-2016

Local Networks. Lecture 4 6-Apr-2016 Local Networks Lecture 4 6-Apr-2016 Roadmap of the Course So far Basic telecom concepts General study of LANs LAN topologies Flow and error control Today we continue the general study of LANs Medium access

More information

Data and Computer Communications. Chapter 11 Local Area Network

Data and Computer Communications. Chapter 11 Local Area Network Data and Computer Communications Chapter 11 Local Area Network LAN Topologies Refers to the way in which the stations attached to the network are interconnected Bus Topology Used with multipoint medium

More information

Multiple Access Channels

Multiple Access Channels Multiple Access Channels Some Queuing Theory MAC: Aloha, ethernet Exponential backoff & friends LANs: Local Area Networks Goal: extend benefits of simple connection as far as possible Means: Share medium

More information

Medium Access Protocols

Medium Access Protocols Medium Access Protocols Summary of MAC protocols What do you do with a shared media? Channel Partitioning, by time, frequency or code Time Division,Code Division, Frequency Division Random partitioning

More information

The MAC layer in wireless networks

The MAC layer in wireless networks The MAC layer in wireless networks The wireless MAC layer roles Access control to shared channel(s) Natural broadcast of wireless transmission Collision of signal: a time/space problem Who transmits when?

More information

LECTURE PLAN. Script. Introduction about MAC Types o ALOHA o CSMA o CSMA/CD o CSMA/CA

LECTURE PLAN. Script. Introduction about MAC Types o ALOHA o CSMA o CSMA/CD o CSMA/CA Course- B.Sc. Applied Physical Science (Computer Science) Year- IIIrd, Sem- Vth Subject Computer Science Paper- XVIIth, Computer Networks Lecture -11 Lecture Title- Medium Access Layer Script Today in

More information

Wireless Communications

Wireless Communications 4. Medium Access Control Sublayer DIN/CTC/UEM 2018 Why do we need MAC for? Medium Access Control (MAC) Shared medium instead of point-to-point link MAC sublayer controls access to shared medium Examples:

More information

Local Area Networks. Aloha Slotted Aloha CSMA (non-persistent, 1-persistent, p-persistent) CSMA/CD Ethernet Token Ring

Local Area Networks. Aloha Slotted Aloha CSMA (non-persistent, 1-persistent, p-persistent) CSMA/CD Ethernet Token Ring Local Area Networks Aloha Slotted Aloha CSMA (non-persistent, 1-persistent, p-persistent) CSMA/CD Ethernet Token Ring Networks: Local Area Networks 1 Network Layer Network Layer LLC 802.2 Logical Link

More information

Data Link Layer: Multi Access Protocols

Data Link Layer: Multi Access Protocols Digital Communication in the Modern World Data Link Layer: Multi Access Protocols http://www.cs.huji.ac.il/~com1 com1@cs.huji.ac.il Some of the slides have been borrowed from: Computer Networking: A Top

More information

Link layer, LANs: outline. Chapter 5-1 Link Layer. Link layer: introduction. Link layer services

Link layer, LANs: outline. Chapter 5-1 Link Layer. Link layer: introduction. Link layer services Chapter 5 Link Layer Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 Link layer, LANs: outline 5.1 introduction, services 5.2 error detection, correction

More information

1999, Scott F. Midkiff

1999, Scott F. Midkiff Lecture Topics Direct Link Networks: Multiaccess Protocols (.7) Multiaccess control IEEE 80.5 Token Ring and FDDI CS/ECpE 556: Computer Networks Originally by Scott F. Midkiff (ECpE) Modified by Marc Abrams

More information

Internet Architecture and Protocol

Internet Architecture and Protocol Internet Architecture and Protocol Set# 03 Local Area Networks Delivered By: Engr Tahir Niazi Layer Reference to Protocol Application Presentation Session Application FTP, Telnet, SMTP, HTTP, SNMP.. Transport

More information

Rahman 1. Application

Rahman 1. Application Data Link layer Overview of IEEE 802.11 Application Presentation Session Transport LLC: On transmission, assemble data into a frame with address and CRC fields. On reception, disassemble frame, perform

More information

Outline. Introduction to Networked Embedded Systems - Embedded systems Networked embedded systems Embedded Internet - Network properties

Outline. Introduction to Networked Embedded Systems - Embedded systems Networked embedded systems Embedded Internet - Network properties Outline Introduction to Networked Embedded Systems - Embedded systems Networked embedded systems Embedded Internet - Network properties Layered Network Architectures - OSI framework descriptions of layers

More information