LANs. Local Area Networks. via the Media Access Control (MAC) SubLayer. Networks: Local Area Networks

Similar documents
Random Access. 1. Aloha. 2. Slotted Aloha 3. CSMA 4. CSMA/CD

Chapter 6 Medium Access Control Protocols and Local Area Networks

Multiple Access (1) Required reading: Garcia 6.1, 6.2.1, CSE 3213, Fall 2010 Instructor: N. Vlajic

Ethernet. Introduction. CSE 3213 Fall 2011

ECEN 5032 Data Networks Medium Access Control Sublayer

COS 140: Foundations of Computer Science

Multiple Access. Data Communications and Networking

LAN PROTOCOLS. Beulah A AP/CSE

EITF25 Internet Techniques and Applications L4: Network Access. Stefan Höst

Computer Networks. Medium Access Sublayer (Part I)

ECE453 Introduction to Computer Networks. Broadcast vs. PPP. Delay. Lecture 7 Multiple Access Control (I)

Jaringan Komputer. Broadcast Network. Outline. MAC (Medium Access Control) Channel Allocation Problem. Dynamic Channel Allocation

COS 140: Foundations of Computer Science

Chapter 4. The Medium Access Control Sublayer. Points and Questions to Consider. Multiple Access Protocols. The Channel Allocation Problem.

Data and Computer Communications. Chapter 11 Local Area Network

LANs Local Area Networks LANs provide an efficient network solution : To support a large number of stations Over moderately high speed

Chapter 6 Medium Access Control Protocols and Local Area Networks

Chapter 12 Multiple Access 12.1

ECE 4450:427/527 - Computer Networks Spring 2017

CS 716: Introduction to communication networks. - 9 th class; 19 th Aug Instructor: Sridhar Iyer IIT Bombay

Markov Chains and Multiaccess Protocols: An. Introduction

CHAPTER 7 MAC LAYER PROTOCOLS. Dr. Bhargavi Goswami Associate Professor & Head Department of Computer Science Garden City College

COMMUNICATION NETWORKS NETW 501

The Medium Access Control Scheme (MAC Layer) Reference: Andrew S. Tanenbaum, Computer Networks, 3rd Edition, Prentice Hall, 1996.

Data Link Layer -2- Network Access

CS 43: Computer Networks. 27: Media Access Contd. December 3, 2018

Data Link Layer -2- Network Access

CS 43: Computer Networks Media Access. Kevin Webb Swarthmore College November 30, 2017

Multiple Access Protocols

Chapter 4 (Week 7) The Medium Access Control Sublayer ANDREW S. TANENBAUM COMPUTER NETWORKS FOURTH EDITION PP CN&DC Dr.

Local Area Networks. Aloha Slotted Aloha CSMA (non-persistent, 1-persistent, p-persistent) CSMA/CD Ethernet Token Ring

Random Assignment Protocols

Data Link Layer: Collisions

Redes de Computadores. Medium Access Control

Unit 7 Media Access Control (MAC)

Local Area Networks (LANs) SMU CSE 5344 /

Protocols for Multiaccess Networks

High Level View. EE 122: Ethernet and Random Access protocols. Medium Access Protocols

The Link Layer and LANs. Chapter 6: Link layer and LANs

Computer Network Fundamentals Spring Week 3 MAC Layer Andreas Terzis

RMIT University. Data Communication and Net-Centric Computing COSC 1111/2061/1110. Lecture 8. Medium Access Control Methods & LAN

Data and Computer Communications

MAC Sublayer(1) Principal service of the Medium Access Control Sublayer: Allocating a single broadcast channel (mostly a LAN) among competing users

CSMA/CD (Collision Detection)

Problem Set Name the 7 OSI layers and give the corresponding functionalities for each layer.

Aloha and slotted aloha

Goals. Fundamentals of Network Media. More topics. Topics. Multiple access communication. Multiple access solutions

EE 122: Ethernet and

COMP/ELEC 429/556 Introduction to Computer Networks

Topics. Link Layer Services (more) Link Layer Services LECTURE 5 MULTIPLE ACCESS AND LOCAL AREA NETWORKS. flow control: error detection:

Contention Protocols and Networks

Data Link Layer, Part 3 Medium Access Control. Preface

Access Technologies! Fabio Martignon

Outline. Introduction to Networked Embedded Systems - Embedded systems Networked embedded systems Embedded Internet - Network properties

CMPE 257: Wireless and Mobile Networking

TSIN01 Information Networks Lecture 3

Local Networks. Lecture 4 6-Apr-2016

Computer Networks Medium Access Control. Mostafa Salehi Fall 2008

CS 455/555 Intro to Networks and Communications. Link Layer

Lecture 6. Data Link Layer (cont d) Data Link Layer 1-1

Data Link Layer, Part 5. Medium Access Control

Data Communications. Automatic Repeat Request Medium Access Control

CMPE 257: Wireless and Mobile Networking

COMPUTER NETWORKS - Local area networks

Local area networks. Copyright

1-1. Switching Networks (Fall 2010) EE 586 Communication and. November 8, Lecture 30

Chapter 4 Data Link Layer

Medium Access Control Sublayer

LECTURE PLAN. Script. Introduction about MAC Types o ALOHA o CSMA o CSMA/CD o CSMA/CA

ISSN: (Online) Volume 2, Issue 6, June 2014 International Journal of Advance Research in Computer Science and Management Studies

Lecture 19. Principles behind data link layer services Framing Multiple access protocols

Telecommunication Protocols Laboratory Course. Lecture 2

Chapter 4. The Medium Access Control Sublayer

Multiple Access Communications. EEE 538, WEEK 11 Dr. Nail Akar Bilkent University Electrical and Electronics Engineering Department

Links Reading: Chapter 2. Goals of Todayʼs Lecture. Message, Segment, Packet, and Frame

CSE 461: Multiple Access Networks. This Lecture

Lecture 4: Wireless MAC Overview. Hung-Yu Wei National Taiwan University

Packet multiple access and the Aloha protocol

1999, Scott F. Midkiff

The Medium Access Control Sublayer

MULTIPLE ACCESS PROTOCOLS 2. 1

2.1 CHANNEL ALLOCATION 2.2 MULTIPLE ACCESS PROTOCOLS Collision Free Protocols 2.3 FDDI 2.4 DATA LINK LAYER DESIGN ISSUES 2.5 FRAMING & STUFFING

Real-Time (Paradigms) (47)

Medium Access Control. CSCI370 Lecture 5 Michael Hutt New York Institute of Technology

Reminder: Datalink Functions Computer Networking. Datalink Architectures

CMPE 150/L : Introduction to Computer Networks. Chen Qian Computer Engineering UCSC Baskin Engineering Lecture 16

Multiple Access Links and Protocols

Outline: Connecting Many Computers

Media Access Control. Networked Systems (H) Lecture 5

Lecture 8 The Data Link Layer part I. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it

Ethernet. Networks: Ethernet 1

Chapter 6 Medium Access Control Protocols and Local Area Networks. Part I: Medium Access Control Part II: Local Area Networks

The MAC layer in wireless networks

Link Layer and LANs 안상현서울시립대학교컴퓨터 통계학과.

Chapter 5 Link Layer and LANs

Data Link Layer: Multi Access Protocols

Link Layer: Retransmissions

Media Access Control (MAC) Sub-layer and Ethernet

COMP476 Networked Computer Systems. Polling. Sharing the Wire. LAN Technologies. COMP476 Networked Computer Systems 1

EITF25 Internet- - Techniques and Applica8ons Stefan Höst. L5 Data link (part 2)

Transcription:

LANs Local Area Networks via the Media Access Control (MAC) SubLayer 1

Local Area Networks Aloha Slotted Aloha CSMA (non-persistent, 1-persistent, p-persistent) CSMA/CD Ethernet Token Ring 2

Network Layer Network Layer LLC 802.2 Logical Link Control Data Link Layer MAC 802.3 CSMA-CD 802.5 Token Ring 802.11 Wireless LAN Other LANs Physical Layer Various Physical Layers Physical Layer Copyright 2000 The McGraw Hill Companies IEEE 802 OSI Figure 6.11 3

Channel Access Abstraction 1 2 3 4 Shared Multiple Access Medium M 5 Copyright 2000 The McGraw Hill Companies Leon-Garcia & Widjaja: Communication Networks Figure 6.1 4

Static Channel Allocation Problem The history of broadcast networks includes satellite and packet radio networks. Let us view a satellite as a repeater amplifying and rebroadcasting everything that comes in. To generalize this problem, consider networks where every frame sent is automatically received by every site (node). 5

Satellite Channel = f in = f out Copyright 2000 The McGraw Hill Companies Leon-Garcia & Widjaja: Communication Networks Figure 6.3 6

Static Channel Allocation Problem We model this situation as n independent users (one per node), each wanting to communicate with another user and they have no other form of communication. The Channel Allocation Problem To manage a single broadcast channel which must be shared efficiently and fairly among n uncoordinated users. 7

Specific LAN Topologies Ring networks Multitapped Bus Copyright 2000 The McGraw Hill Companies Leon-Garcia & Widjaja: Communication Networks Figure 6.5 8

Possible Model Assumptions for the Channel Allocation Problem 0. Listen property :: (applies to satellites) The sender is able to listen to sent frame one roundtrip after sending it. no need for explicit ACKs. 1. The model consists of n independent stations. 2. A single channel is available for communications. 9

Possible Model Assumptions for the Channel Allocation Problem 3. Collision Assumption :: If two frames are transmitted simultaneously, they overlap in time and the resulting signal is garbled. This event is a collision. 4a. Continuous Time Assumption :: frame transmissions can begin at any time instant. 4b. Slotted Time Assumption :: time is divided into discrete intervals (slots). Frame transmissions always begin at the start of a time slot. 10

Possible Model Assumptions for the Channel Allocation Problem 5a. Carrier Sense Assumption (CS) :: Stations can tell if the channel is busy (in use) before trying to use it. If the channel is busy, no station will attempt to use the channel until it is idle. 5b. No Carrier Sense Assumption :: Stations are unable to sense channel before attempting to send a frame. They just go ahead and transmit a frame. 11

a :: Relative Propagation Time length of the data path (in bits) a = -------------------------------------------------- length of a standard frame (in bits) -ORpropagation time ( in seconds) a = ------------------------------------------------ transmission time (in seconds) -ORdelay-bandwidth product* a = ----------------------------------------- [ LG&W def p.346] average frame size * Delay-bandwidth product :: the product of the capacity (bit rate) and the delay. 12

13

Relative Propagation Time R = capacity (data rate) d = maximum distance of communications path v = propagation velocity (Assume v = 2/3 speed of light 2 x 10 8 meters/second) L = frame length d / v Rd a = ------- = ------ L/R vl 14

Upper Bound on Utilization for Shared Media LAN Assume a perfect, efficient access that allows one transmission at a time where there are no collisions, no retransmissions, no delays between transmissions and no bits wasted on overhead. {These are best-case assumptions} Tput L Util = --------------- = ------------------------------------------------ Capacity propagation time + transmission time -------------------------------------------------------- R 15

Maximum Utilization for LANs L --------------- d L L 1 max. Util = ---- + ---- = --------------- = ------------ v R Rd a + 1 ------------------- ---- + L R v 1 max. Util = --------- 1 + a 16

A transmits at t = 0 A detects collision at t = 2 t prop A A A Distance d meters t prop = d / ν seconds B B B B transmits before t = t prop and detects collision shortly thereafter Copyright 2000 The McGraw Hill Companies Leon-Garcia & Widjaja: Communication Networks Figure 6.7 17

LAN Design Performance For broadcast LANs what are the factors under the designer s control that affect LAN performance? Capacity {function of media} Propagation delay {function of media, distance} Bits /frame (frame size) MAC protocol Offered load depends on how retransmissions are handled Number of stations Bit error rate 18

Typical frame delay versus Throughput performance E[T]/E[X] Transfer Delay 1 Copyright 2000 The McGraw Hill Companies Load Leon-Garcia & Widjaja: Communication Networks ρ max 1 ρ Figure 6.8 19

Delay-Throughput Performance E[T]/E[X] Dependence on a a > a a a Transfer Delay 1 Copyright 2000 The McGraw Hill Companies ρ max Load Leon-Garcia & Widjaja: Communication Networks ρ max 1 ρ Figure 6.9 20

Multiple Access Protocols 21

Historic LAN Performance Notation I :: input load - the total (normalized) rate of data generated by all n stations G :: offered load - the total (normalized) data rate presented to the network including retransmissions S :: LAN throughput - the total (normalized) data rate transferred between stations D :: average frame delay - the time from when a frame is ready for transmission until completion of a successful transmission. 22

Normalizing Throughput (S) [assuming one packet = one frame] Throughput (S) is normalized using packets/packet time where packet time :: the time to transmit a standard fixed-length packet i.e., packet length packet time = ----------------- bit rate NOTE: Since the channel capacity is one packet /packet time, S can be viewed as throughput as a fraction of capacity. Represented in LG&W by in later graphs. ρ 23

Historic LAN Performance Notation 1 retransmissions 2 I G S 3 X X X n D 24

ALOHA Abramson solved the channel allocation problem for ground radio at University of Hawaii in 1970 s. Aloha Transmission Strategy Stations transmit whenever they have data to send. Collisions will occur and colliding frames are destroyed. Aloha Retransmission Strategy Station waits a random amount of time before sending again. 25

ALOHA Figure 4-2. Vulnerable period for the shaded frame. 26

ALOHA First transmission Retransmission t 0 -X t 0 t 0 +X t 0 +X+2t prop t 0 +X+2t prop +Β t Vulnerable period Time-out Backoff period Retransmission if necessary random backoff period B Copyright 2000 The McGraw Hill Companies Leon-Garcia & Widjaja: Communication Networks Figure 6.16 27

ALOHA Vulnerable period :: t 0 X to t 0 + X two frame transmission times Assume: Poisson Arrivals with average number of arrivals of 2G arrivals/ 2 X S = G e-2 (1+a) G 28

Slotted ALOHA (Roberts 1972) uses discrete time intervals as slots (i.e., slot = one packet transmission time) and synchronize the send time (e.g., use pip from a satellite). Slotted Aloha Strategy Station transmits ONLY at the beginning of a time slot. Collisions will occur and colliding frames are destroyed. Slotted Aloha Retransmission Strategy Station waits a random amount of time before sending again. 29

Slotted ALOHA (k+1)x kx t 0 +X+2t prop +Β t 0 +X+2t prop t Vulnerable period Time-out Backoff period Retransmission if necessary random backoff period B slots Copyright 2000 The McGraw Hill Companies Leon-Garcia & Widjaja: Communication Networks Figure 6.18 30

Slotted ALOHA Vulnerable period :: t 0 X to t 0 one frame transmission time Assume: Poisson Arrivals with average number of arrivals of G arrivals/ X P 0 = P[k=0, t=1] = e G S = G P 0 S = G e G and an adjustment for a yields S = G e -(1+a) G 31

ALOHA and Slotted AlOHA Throughput versus Load 0.4 0.35 0.368 0.3 S 0.25 0.2 0.184 Ge -G Slotted Aloha 0.15 0.1 0.05 Ge -2G Aloha 0 0.01563 0.03125 0.0625 0.125 0.25 0.5 1 2 4 8 G Copyright 2000 The McGraw Hill Companies Leon-Garcia & Widjaja: Communication Networks Figure 6.17 32

Carrier Sense with Multiple Access (CSMA) 33

1-persistent CSMA Transmission Strategy the greedy algorithm 1. Sense the channel. 2. IF the channel is idle, THEN transmit. 3. IF the channel is busy, THEN continue to listen until channel is idle and transmit immediately. 34

nonpersistent CSMA Transmission Strategy the less-greedy algorithm Sense the channel. IF the channel is idle, THEN transmit. 1. IF the channel is busy, THEN wait a random amount of time and repeat the algorithm. 35

p - persistent CSMA Transmission Strategy a slotted approximation 1. Sense the channel. 2. IF the channel is idle, THEN with probability p transmit and with probability (1-p) delay one time slot and repeat the algorithm.. 3. IF the channel is busy, THEN delay one time slot and repeat the algorithm. 36

P Persistent CSMA details the time slot is usually set to the maximum propagation delay. as p decreases, stations wait longer to transmit but the number of collisions decreases. Consideration for the choice of p : (n x p) must be < 1 for stability, where n is maximum number of stations, i.e., p < 1/n 37

CSMA Collisions In all three strategies a collision is possible. CSMA determines collisions by the lack of an ACK which results in a TIMEOUT. {This is extremely expensive with respect to performance.} If a collision occurs, THEN wait a random amount of time and retransmit. 38

CSMA/CD CSMA with Collision Detection If a collision is detected during transmission, THEN immediately cease transmitting the frame. The first station to detect a collision sends a jam signal to all stations to indicate that there has been a collision. After receiving a jam signal, a station that was attempting to transmit waits a random amount of time before attempting to retransmit. The maximum time needed to detect a collision is 2 x propagation delay. 39

CSMA vs CSMA/CD CSMA is essentially a historical technology until we include Wireless LANs. If propagation time is short compared to transmission time, station can be listening before sending with CSMA. Collision detection (CD) is accomplished by detecting voltage levels outside acceptable range. Thus attenuation limits distance without a repeater. If the collision time is short compared to packet time (i.e., small a), performance will increase due to CD. 40

Figure 6.23 frame contention frame Probability of 1 successful transmission: P s ucces s P success is maximized at p=1/n: max P success = np(1 p ) n 1 = n(1 1 n )n 1 1 e P max 0.6 0.5 0.4 0.3 0.2 0.1 0 2 4 6 8 10 12 14 16 n 41

Persistent and Non-persistent CSMA Figure 4-4.Comparison of the channel utilization versus load for various random access protocols. 42

Throughput versus Load with varying a 0.6 S 0.5 0.4 0.53 0.45 1-Persistent CSMA 0.3 0.2 0.1 0.16 a = 0.01 a = 0.1 0 0.02 0.03 0.06 0.13 0.25 0.5 1 2 4 8 16 a = 1 32 64 G Copyright 2000 The McGraw Hill Companies Leon-Garcia & Widjaja: Communication Networks Figure 6.21 - Part 2 43

Throughput versus Load with varying a S 0.9 0.8 0.81 0.7 Non-Persistent CSMA 0.6 0.5 0.4 0.3 0.2 0.14 0.51 a = 0.1 a = 0.01 0.1 0 0.02 0.03 0.06 0.13 0.25 0.5 1 2 4 8 16 32 64 G a = 1 Copyright 2000 The McGraw Hill Companies Leon-Garcia & Widjaja: Communication Networks Figure 6.21 - Part 1 44

Maximim Achievable Throughputs 1 0.8 CSMA/CD 1-P CSMA Non-P CSMA ρ max 0.6 0.4 0.2 Slotted Aloha Aloha 0 0.01 0.1 1 a Copyright 2000 The McGraw Hill Companies Leon-Garcia & Widjaja: Communication Networks Figure 6.24 45

Frame Delay with varying a Avg. Transfer Delay 30 25 20 15 10 5 0 CSMA-CD a = 0.2 a = 0.1 a = 0.01 0 0.06 0.12 0.18 0.24 0.3 0.36 0.42 0.48 0.54 0.6 0.66 0.72 0.78 0.84 0.9 0.96 Load Copyright 2000 The McGraw Hill Companies Leon-Garcia & Widjaja: Communication Networks Figure 6.51 46