CSE 461: Multiple Access Networks. This Lecture

Similar documents
CSE/EE 461 Wireless and Contention-Free Protocols

CSE 461 Multiple Access. David Wetherall

Lecture 9: Bridging. CSE 123: Computer Networks Alex C. Snoeren

CSE/EE 461 Section 2

CSE 461: Multiple Access. Homework: Chapter 2, problems 1, 8, 12, 18, 23, 24, 35, 43, 46, and 58

!! Due next week (week 3), start of class. !! Electronic turnin. !! No class trawler (do that for Fishnet #2) !! On web site

High Level View. EE 122: Ethernet and Random Access protocols. Medium Access Protocols

CS 43: Computer Networks. 27: Media Access Contd. December 3, 2018

EE 122: Ethernet and

CS 43: Computer Networks Media Access. Kevin Webb Swarthmore College November 30, 2017

Computer Network Fundamentals Spring Week 3 MAC Layer Andreas Terzis

CMPE 257: Wireless and Mobile Networking

Link Layer: Retransmissions

Multiple Access Protocols

Link Layer. (continued)

Data Link Layer, Part 3 Medium Access Control. Preface

CMPE 257: Wireless and Mobile Networking

Data Link Layer, Part 5. Medium Access Control

The Medium Access Control Scheme (MAC Layer) Reference: Andrew S. Tanenbaum, Computer Networks, 3rd Edition, Prentice Hall, 1996.

Local Area Networks (LANs) SMU CSE 5344 /

Contention Protocols and Networks

Chapter 4. The Medium Access Control Sublayer. Points and Questions to Consider. Multiple Access Protocols. The Channel Allocation Problem.

IEEE , Token Rings. 10/11/06 CS/ECE UIUC, Fall

Chapter 12 Multiple Access 12.1

CHAPTER 7 MAC LAYER PROTOCOLS. Dr. Bhargavi Goswami Associate Professor & Head Department of Computer Science Garden City College

Jaringan Komputer. Broadcast Network. Outline. MAC (Medium Access Control) Channel Allocation Problem. Dynamic Channel Allocation

Getting Connected (Chapter 2 Part 4) Networking CS 3470, Section 1 Sarah Diesburg

ECEN 5032 Data Networks Medium Access Control Sublayer

Computer Networks Medium Access Control. Mostafa Salehi Fall 2008

Medium Access Control Sublayer Chapter 4

Shared Access Networks. Media Access Protocols. Ethernet (802.3) Ethernet cont...

Lecture 5 The Data Link Layer. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it

Aloha and slotted aloha

CSE 461: Wireless Networks

Multiple Access Links and Protocols

CARRIER SENSE MULTIPLE ACCESS (CSMA):

ECE 4450:427/527 - Computer Networks Spring 2017

Lecture 6 The Data Link Layer. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it

Medium Access Control. IEEE , Token Rings. CSMA/CD in WLANs? Ethernet MAC Algorithm. MACA Solution for Hidden Terminal Problem

Lecture 6. Data Link Layer (cont d) Data Link Layer 1-1

CS 640 Lecture 4: 09/11/2014

Random Access. 1. Aloha. 2. Slotted Aloha 3. CSMA 4. CSMA/CD

The Link Layer and LANs. Chapter 6: Link layer and LANs

Data Link Layer -2- Network Access

LAN PROTOCOLS. Beulah A AP/CSE

Review. Error Detection: CRC Multiple access protocols. LAN addresses and ARP Ethernet. Slotted ALOHA CSMA/CD

Summary of MAC protocols

EITF25 Internet Techniques and Applications L4: Network Access. Stefan Höst

ICE 1332/0715 Mobile Computing (Summer, 2008)

COMP476 Networked Computer Systems. Polling. Sharing the Wire. LAN Technologies. COMP476 Networked Computer Systems 1

Lecture 9: Bridging & Switching"

Topics. Link Layer Services (more) Link Layer Services LECTURE 5 MULTIPLE ACCESS AND LOCAL AREA NETWORKS. flow control: error detection:

COMP/ELEC 429/556 Introduction to Computer Networks

Ethernet. Typical Setup. Names. Operations. Operations Switch: No Collisions EECS 122. Hub: Single Collision Domain

Direct Link Communication II: Wired Media. Multi-Access Communication

EECS 122, Lecture 7. Kevin Fall Jean Walrand

COS 140: Foundations of Computer Science

Data Link Layer -2- Network Access

Computer Networks. Today. Principles of datalink layer services Multiple access links Adresavimas, ARP LANs Wireless LANs VU MIF CS 1/48 2/48

Wireless Communications

Mohamed Khedr.

CS 716: Introduction to communication networks. - 9 th class; 19 th Aug Instructor: Sridhar Iyer IIT Bombay

Medium Access Control. CSCI370 Lecture 5 Michael Hutt New York Institute of Technology

Links Reading: Chapter 2. Goals of Todayʼs Lecture. Message, Segment, Packet, and Frame

Redes de Computadores. Medium Access Control

Medium Access Control Sublayer Chapter 4

Link Layer and Ethernet

Data and Computer Communications

CMPE 150/L : Introduction to Computer Networks. Chen Qian Computer Engineering UCSC Baskin Engineering Lecture 16

Link Layer and Ethernet

Chapter 6 Medium Access Control Protocols and Local Area Networks

Unit II. Part A (2 Marks)

LECTURE PLAN. Script. Introduction about MAC Types o ALOHA o CSMA o CSMA/CD o CSMA/CA

Physical Layer. Medium Access Links and Protocols. Point-to-Point protocols. Modems: Signaling. Modems Signaling. Srinidhi Varadarajan

COS 140: Foundations of Computer Science

Reminder: Datalink Functions Computer Networking. Datalink Architectures

Medium Access Control. MAC protocols: design goals, challenges, contention-based and contention-free protocols

CSCD 433 Network Programming Fall Lecture 7 Ethernet and Wireless

Protocols for Multiaccess Networks

Rahman 1. Application

Networking Technologies and Applications

Goals. Fundamentals of Network Media. More topics. Topics. Multiple access communication. Multiple access solutions

Computer Networking Lecture 5 Data link Layer Access Control. Based on slides by Peter Steenkiste Copyright, Carnegie Mellon

CS 3640: Introduction to Networks and Their Applications

Computer Networks Principles LAN - Ethernet

Lecture 8 The Data Link Layer part I. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it

The MAC layer in wireless networks

Link Layer and LANs 안상현서울시립대학교컴퓨터 통계학과.

College of Computer and Information Sciences Department of Computer Engineering CEN444 Computer Networks Midterm 2 Exam Second Semester 1434/1435

Multiple Access Channels

Chapter 8 LAN Topologies

Chapter 4. The Medium Access Control Sublayer

Unit 7 Media Access Control (MAC)

Medium Access Protocols

The Medium Access Control Sublayer

Intelligent Transportation Systems. Medium Access Control. Prof. Dr. Thomas Strang

CS 123: Lecture 12, LANs, and Ethernet. George Varghese. October 24, 2006

WiFi Networks: IEEE b Wireless LANs. Carey Williamson Department of Computer Science University of Calgary Winter 2018

ECE 4450:427/527 - Computer Networks Spring 2017

Multiple Access in Cellular and Systems

Transcription:

CSE 461: Multiple Access Networks This Lecture Key Focus: How do multiple parties share a wire? This is the Medium Access Control (MAC) portion of the Link Layer Randomized access protocols: 1. Aloha 2. CSMA variants 3. Classic Ethernet 4. Wireless Application Presentation Session Transport Network Data Link Physical

1. ALOHA Wireless links between the Hawaiian islands in the 70s Want distributed allocation no special channels, or single point of failure Aloha protocol: Just send when you have data! There will be some collisions of course Detect error frames and retransmit a random time later Simple, decentralized and works well for low load For many users, analytic traffic model, max efficiency is 18% 2. Carrier Sense Multiple Access We can do better by listening before we send (CSMA) good defense against collisions only if a is small (LANs) A X collision B (wire) a parameter: number of packets that fit on the wire a = bandwidth * delay / packet size Small (<<1) for LANs, large (>>1) for satellites

What if the Channel is Busy? 1-persistent CSMA Wait until idle then go for it Blocked senders can queue up and collide non-persistent CSMA Wait a random time and try again Less greedy when loaded, but larger delay p-persistent CSMA If idle send with prob p until done; assumed slotted time Choose p so p * # senders < 1; avoids collisions at cost of delay CSMA with Collision Detection Even with CSMA there can still be collisions. Time for B to detect A s transmission X collision (wire) A B For wired media we can detect all collisions and abort (CSMA/CD): Requires a minimum frame size ( acquiring the medium ) B must continue sending ( jam ) until A detects collision

3. Classic Ethernet IEEE 802.3 standard wired LAN (1-persistent CSMA/CD) Classic Ethernet: 10 Mbps over coaxial cable Manchester encoding, preamble, 32 bit CRC nodes (wire) Newer versions are much faster Fast (100 Mbps), Gigabit (1 Gbps) Modern equipment isn t one long wire hubs and switches Hub or Switch Modern (Ethernet II) Frames Preamble (8) Dest (6) Source (6) Type (2) Payload (var) Pad (var) CRC (4) Min frame 64 bytes, max 1500 bytes Max length 2.5km, max between stations 500m (repeaters) Addresses unique per adaptor; 6 bytes; globally assigned Broadcast media is readily tapped: Promiscuous mode; multicast addresses

Binary Exponential Backoff Build on 1-persistent CSMA/CD On collision: jam and exponential backoff Jamming: send 48 bit sequence to ensure collision detection Backoff: First collision: wait 0 or 1 frame times at random and retry Second time: wait 0, 1, 2, or 3 frame times Nth time (N<=10): wait 0, 1,, 2 N -1 times Max wait 1023 frames, give up after 16 attempts Scheme balances average wait with load Ethernet Capture Randomized access scheme is not fair Stations A and B always have data to send They will collide at some time Suppose A wins and sends, while B backs off Next time they collide and B s chances of winning are halved!

Ethernet Performance Much better than Aloha or CSMA! Works very well in practice Source of protocol inefficiency: collisions More efficient to send larger frames Acquire the medium and send lots of data Less efficient as the network grows in terms of frames recall a = delay * bandwidth / frame size a grows as the path gets longer (satellite) a grows as the bit rates increase (Fast, Gigabit Ethernet) 4. Wireless Communication Wireless is more complicated than wired 1. Cannot detect collisions Transmitter swamps co-located receiver 2. Different transmitters have different coverage areas Asymmetries lead to hidden/exposed terminal problems

Hidden Terminals A B C transmit range A and C can both send to B but can t hear each other A is a hidden terminal for C and vice versa CSMA will be ineffective want to sense at receiver Exposed Terminals A B C D transmit range B, C can hear each other but can safely send to A, D Compare to spatial reuse in cell phones: 1 2 3 1

CSMA with Collision Avoidance Since we can t detect collisions, we avoid them CSMA/CA as opposed to CSMA/CD Not greedy like Ethernet CS: listen before transmitting. When medium busy, choose random backoff interval Wait for that many idle timeslots to pass before sending CA: transmit short jamming signal before sending frame essentially reserves medium, let s others know your intent to transmit Collisions can be inferred Use CRC and ACK from receiver to infer no collision on collision, binary exponential backoff like Ethernet RTS / CTS Protocols (MACA) A RTS B C D CTS 1. B stimulates C with Request To Send (RTS) 2. A hears RTS and defers to allow the CTS 3. C replies to B with Clear To Send (CTS) 4. D hears CTS and defers to allow the data 5. B sends to C

802.11 Wireless LANs Emerging standard with a bunch of options/features Basestation Wireless plus wired system or pure wireless (ad hoc) Avoids collisions (CSMA/CA (p-persistence), RTS/CTS) 5. Contention-free Protocols Collisions are the main difficulty with random schemes Inefficiency, limit to scalability Q: Can we avoid collisions? A: Yes. By taking turns or with reservations Token Ring / FDDI, DQDB More generally, what else might we want? Deterministic service, priorities/qos, reliability

Token Ring (802.5) D C Token rotates permission to send around node Sender injects packet into ring and removes later Maximum token holding time (THT) bounds access time Early or delayed token release Round robin service, acknowledgments and priorities Monitor nodes ensure health of ring A B nodes Direction of transmission FDDI (Fiber Distributed Data Interface) Roughly a large, fast token ring 100 Mbps and 200km vs 4/16 Mbps and local Dual counter-rotating rings for redundancy Complex token holding policies for voice etc. traffic Break! Token ring advantages No contention, bounded access delay Supports fair, reserved, priority access Disadvantages Complexity, reliability, scalability

DQDB (Distributed Queue Dual Bus) Busy Request Data upstream downstream Two unidirectional buses that carry fixed size cells Cells are marked busy/free and can signal a request too Nodes maintain a distributed FIFO queue By sending requests they are reserving future access DQDB Algorithm Two counters per direction (UP, DN) RC (request count), CD (countdown) Consider sending downstream (DN): Always have RC count UP requests, minus free DN cells if larger than zero This is a measure of how many others are waiting to send To send, copy RC to CD and set RC to zero, then decrement CD for each free DN cell, send when zero This waits for earlier requests to be satisfied before sending Highly scalable, efficient, but not perfectly fair

Modern Ethernet A key concern is manageability centralized vs. distributed layout Another is performance scalability Switches vs. Hubs nodes (wire) Switch or Hub Classic Ethernet (10Mbps) Fast Ethernet (100Mbps) Gigabit Ethernet (1Gbps) Key Concepts Wireless communication is relatively complex No collision detection, hidden and exposed terminals There are contention-free MAC protocols Based on turn taking and reservations, not randomization