CSE/EE 461 Section 2

Similar documents
CSE/EE 461 Wireless and Contention-Free Protocols

CSE 461: Multiple Access Networks. This Lecture

Lecture 9: Bridging. CSE 123: Computer Networks Alex C. Snoeren

CSE 461 Multiple Access. David Wetherall

Lecture 9: Bridging & Switching"

High Level View. EE 122: Ethernet and Random Access protocols. Medium Access Protocols

EE 122: Ethernet and

IEEE , Token Rings. 10/11/06 CS/ECE UIUC, Fall

Computer Network Fundamentals Spring Week 3 MAC Layer Andreas Terzis

CSE 123: Computer Networks Alex C. Snoeren. HW 2 due Thursday 10/21!

CS 43: Computer Networks Media Access. Kevin Webb Swarthmore College November 30, 2017

Multiple Access Protocols

CMPE 257: Wireless and Mobile Networking

CS 43: Computer Networks. 27: Media Access Contd. December 3, 2018

Medium Access Control. IEEE , Token Rings. CSMA/CD in WLANs? Ethernet MAC Algorithm. MACA Solution for Hidden Terminal Problem

CSE 461: Multiple Access. Homework: Chapter 2, problems 1, 8, 12, 18, 23, 24, 35, 43, 46, and 58

!! Due next week (week 3), start of class. !! Electronic turnin. !! No class trawler (do that for Fishnet #2) !! On web site

Broadcast Links, Addressing and Media Access Control. Link Layer B. Link and Physical Layers. MAC Addresses

CS 3640: Introduction to Networks and Their Applications

Shared Access Networks Wireless. 1/27/14 CS mywireless 1

Chapter 6 Wireless and Mobile Networks. Chapter 6 outline. Chapter 6: Wireless and Mobile Networks. Elements of a wireless network

CSCD 433 Network Programming Fall Lecture 7 Ethernet and Wireless

Medium Access Control Sublayer Chapter 4

Chapter 12 Multiple Access 12.1

Link Layer. (continued)

Lecture 6 The Data Link Layer. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it

ECE 4450:427/527 - Computer Networks Spring 2017

Lecture 5 The Data Link Layer. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it

Local Area Networks (LANs) SMU CSE 5344 /

CSE 461: Wireless Networks

Chapter 4. The Medium Access Control Sublayer. Points and Questions to Consider. Multiple Access Protocols. The Channel Allocation Problem.

Computer Networks Medium Access Control. Mostafa Salehi Fall 2008

Midterm Exam CSCE 232: Computer Networks Fall Instructions:

ECEN 5032 Data Networks Medium Access Control Sublayer

Multiple Access Channels

Medium Access Control. CSCI370 Lecture 5 Michael Hutt New York Institute of Technology

College of Computer and Information Sciences Department of Computer Engineering CEN444 Computer Networks Midterm 2 Exam Second Semester 1434/1435

Medium Access Protocols

Multiple Access Links and Protocols

The Link Layer and LANs. Chapter 6: Link layer and LANs

COMP476 Networked Computer Systems. Polling. Sharing the Wire. LAN Technologies. COMP476 Networked Computer Systems 1

Final Review Fall 2017 Profs Peter Steenkiste & Justine Sherry

Multiple Access in Cellular and Systems

Reminder: Datalink Functions Computer Networking. Datalink Architectures

Getting Connected (Chapter 2 Part 4) Networking CS 3470, Section 1 Sarah Diesburg

Link Layer and LANs 안상현서울시립대학교컴퓨터 통계학과.

CHAPTER 7 MAC LAYER PROTOCOLS. Dr. Bhargavi Goswami Associate Professor & Head Department of Computer Science Garden City College

Last Lecture: Data Link Layer

Summary of MAC protocols

Medium Access Control Sublayer Chapter 4

Link Layer: Retransmissions

CSMA/CD (Collision Detection)

Unit II. Part A (2 Marks)

Lecture 6. Data Link Layer (cont d) Data Link Layer 1-1

Data Link Layer, Part 3 Medium Access Control. Preface

MSIT 413: Wireless Technologies Week 8

Computer Networking Lecture 5 Data link Layer Access Control. Based on slides by Peter Steenkiste Copyright, Carnegie Mellon

Lecture 23 Overview. Last Lecture. This Lecture. Next Lecture ADSL, ATM. Wireless Technologies (1) Source: chapters 6.2, 15

CARRIER SENSE MULTIPLE ACCESS (CSMA):

Networking Technologies and Applications

Topics for Today. More on Ethernet. Wireless LANs Readings. Topology and Wiring Switched Ethernet Fast Ethernet Gigabit Ethernet. 4.3 to 4.

Jaringan Komputer. Broadcast Network. Outline. MAC (Medium Access Control) Channel Allocation Problem. Dynamic Channel Allocation

Aloha and slotted aloha

Virtual University of Pakistan. Describe the Hidden Node and Exposed Node problems in Standard? VUSR. [Larry L. Peterson]

CMPE 257: Wireless and Mobile Networking

Lecture 4b. Local Area Networks and Bridges

Data Communications. Data Link Layer Protocols Wireless LANs

CS 716: Introduction to communication networks. - 9 th class; 19 th Aug Instructor: Sridhar Iyer IIT Bombay

Links Reading: Chapter 2. Goals of Todayʼs Lecture. Message, Segment, Packet, and Frame

Mohamed Khedr.

IEEE Medium Access Control. Medium Access Control

LECTURE PLAN. Script. Introduction about MAC Types o ALOHA o CSMA o CSMA/CD o CSMA/CA

Housekeeping. Fall /5 CptS/EE 555 1

Link Layer and Ethernet

CMPE 257: Wireless and Mobile Networking

Data Link Layer, Part 5. Medium Access Control

Links. CS125 - mylinks 1 1/22/14

Ethernet. Typical Setup. Names. Operations. Operations Switch: No Collisions EECS 122. Hub: Single Collision Domain

Medium Access Control

Local Area Networks NETW 901

Physical and Link Layers. CS144 Review Session 6 November 6 th, 2008 Roger Liao Based on slides by Ben Nham

The Medium Access Control Scheme (MAC Layer) Reference: Andrew S. Tanenbaum, Computer Networks, 3rd Edition, Prentice Hall, 1996.

Wireless Medium Access Control Protocols

Integrating Information Systems: Technology, Strategy, and Organizational Factors

Outline / Wireless Networks and Applications Lecture 9: Wireless LANs Aloha and 802 Wireless. Regular Ethernet CSMA/CD

Wireless LANs. ITS 413 Internet Technologies and Applications

Data Link Layer -2- Network Access

ECE 333: Introduction to Communication Networks Fall Lecture 19: Medium Access Control VII

MAC in /20/06

Goals. Fundamentals of Network Media. More topics. Topics. Multiple access communication. Multiple access solutions

Wireless MACs: MACAW/802.11

Review. Error Detection: CRC Multiple access protocols. LAN addresses and ARP Ethernet. Slotted ALOHA CSMA/CD

Computer Networks. Wireless LANs

Outline. Introduction to Networked Embedded Systems - Embedded systems Networked embedded systems Embedded Internet - Network properties

Local Area Network. Review of Lecture 7. Review of Lecture 7. Review of Lecture 7. Review of Lecture 7. Review of Lecture 7.

Wireless Challenges : Computer Networking. Overview. Routing to Mobile Nodes. Lecture 25: Wireless Networking

Adaptors Communicating. Link Layer: Introduction. Parity Checking. Error Detection. Multiple Access Links and Protocols

Chapter 5 Link Layer and LANs

Unit 7 Media Access Control (MAC)

Topics. Link Layer Services (more) Link Layer Services LECTURE 5 MULTIPLE ACCESS AND LOCAL AREA NETWORKS. flow control: error detection:

Transcription:

CSE/EE 461 Section 2 Latency in a store-and-forward network 4ms, 10MB/s B How long does it take to send a 2kB packet from to B? 2ms, 10MB/s C 2ms, 10MB/s B What if it has to pass through a node C?

Plan for today Examples Latency computation Internet Checksum Ethernet Back-off Few words about Token Rings Wireless Communication Solution First case: latency = propagation + transmit propagation = 4ms transmit = 2kB * (1s/10MB) = 0.2ms latency = 4.2ms second case: latency = 2ms +0.2ms +2ms +0.2ms = 4.4ms

IP Checksum Makes sure that the information in the IP header has not been corrupted. To compute Break data into 16 bit words Perform one s complement addition on the words. Complement the answer To check Break data and checksum into 16 bit words Perform one s complement addition on all of the words Check if this equals 0 (ie, all bits equal to 1) Sample Checksum For simplicity, show the 4 bit word case(real IP uses 16 bit case) ssume data: 1001 1101 0010 What is the checksum?

Solution 1001 1101 +0010???? Do first two first 1001 +1101 10110 dd to third 0111 +0010 1001 Complement 0110 carry back 0111 Is this right? 1001 1101 0010 +0110 1111 YES!!

Ethernet CSM/CD Ethernet transmit rules Don t transmit if you hear someone else If you re transmitting and hear someone else, send a jamming signal and stop Wait a random number of slots between 0 and 2 n -1 If collide again, wait a random time between 0 and 2 n+1-1 and try again Back Off Example Suppose and B are stations on an Ethernet and they collide on their first attempt to send a frame, and then collide on their second attempt. a) What is the probability there are no more collisions and sends before B? b) What is the probability there is another collision (between and B) before anyone sends successfully?

Solution B Time 0: Both Send simultaneously, collide back-off interval {0,1} B back-off interval {0,1} Suppose both choose {0} Time 1: Both Send again and collide back-off interval {0,1, 2, 3} B back-off interval {0,1, 2, 3} Part a. sends before B, and no more collisions What are the possibilities, in which sends before B.B 0.1 0.2 0.3 1.2 1.3 2.3 6 possibilities Total Possibilities: 4*4 = 16 Probability: 6/16

Is it likely we ll really collide? If we use CSM, why do we have collisions? Effectively simultaneous start possible or even likely. Finite speed of light. 100 meters 0.3 microseconds Token Ring (802.5) D C B nodes Direction of transmission Permission to send token rotates around loop When token arrives if no data to send, forward the token if data to send, remove token and inject packet remove packet and re-inject token at sender Maximum token holding time (THT) bounds access time

FDDI Fiber Distributed Data Interface Roughly a large, fast token ring 100 Mbps and 200km vs 4/16 Mbps LN Dual counter-rotating rings for better reliability Complex token holding policies for real-time traffic Token ring advantages No contention, bounded access delay Support fair, reserved, priority access Disadvantages Complexity, reliability, scalability Break! Why Did Ethernet Win? Reliablity Token ring failure mode -- network unusable Ethernet failure mode -- node detached Cost Passive tap cheaper to build than active forwarder Volume => lower cost => volume => lower cost Scalability Repeater: copy all packets across two segments Bridge: selectively repeat packets across two segs Switch: bridge k segments; Hub: repeater for k segs

Wireless Communication Wireless is more complicated than wired 1. Cannot detect collisions Transmitter swamps co-located receiver 2. Different transmitters have different coverage areas symmetries lead to hidden/exposed terminal problems CSM with Collision voidance Since we can t detect collisions, we avoid them CSM/C as opposed to CSM/CD If medium busy, choose random backoff interval Wait for that many idle timeslots to pass before sending If a collision is inferred, retransmit with binary exponential backoff (like Ethernet) Use CRC and CK from receiver to infer no collision gain, exponential backoff helps us adapt p as needed

Hidden and Exposed Terminals B C D B transmit ranges Hidden terminals: B and D can both send to C but can t hear each other Exposed terminals: B, C can hear each other but can safely send to, D C D RTS / CTS Protocols (MC) RTS B C D CTS 1. B asks C: Request To Send (RTS) 2. hears RTS and defers to allow the CTS 3. C replies to B with Clear To Send (CTS) 4. D hears CTS and defers to allow the data 5. B sends to C

802.11 Wireless LNs Basestation Emerging standard: wireless plus wired system or pure wireless (ad hoc) voids collisions (CSM/C (p-persistence), RTS/CTS Built on new links (spread spectrum, or diffuse infrared)