Medium Access Control

Similar documents
Data Link Layer. Goals of This Lecture. Engineering Questions. Outline of the Class

The Link Layer II: Ethernet

LAN PROTOCOLS. Beulah A AP/CSE

Topics. Link Layer Services (more) Link Layer Services LECTURE 5 MULTIPLE ACCESS AND LOCAL AREA NETWORKS. flow control: error detection:

The random access methods we study in this chapter have evolved from a very interesting protocol known as ALOHA, which used a very simple procedure

EITF25 Internet Techniques and Applications L4: Network Access. Stefan Höst

Reminder: Datalink Functions Computer Networking. Datalink Architectures

Data Link Layer -2- Network Access

CS 43: Computer Networks Media Access. Kevin Webb Swarthmore College November 30, 2017

CS 43: Computer Networks. 27: Media Access Contd. December 3, 2018

Data Link Layer: Collisions

Data Link Layer -2- Network Access

Link Layer and Ethernet

Link Layer and Ethernet

Chapter 12 Multiple Access 12.1

Data Link Layer, Part 3 Medium Access Control. Preface

Computer Networks Medium Access Control. Mostafa Salehi Fall 2008

Multiple Access Channels

Computer Networks. Today. Principles of datalink layer services Multiple access links Adresavimas, ARP LANs Wireless LANs VU MIF CS 1/48 2/48

COS 140: Foundations of Computer Science

Lecture 5 The Data Link Layer. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it

ECE 4450:427/527 - Computer Networks Spring 2017

CSE 461: Multiple Access. Homework: Chapter 2, problems 1, 8, 12, 18, 23, 24, 35, 43, 46, and 58

Lecture 9 The Data Link Layer part II. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it

CHAPTER 7 MAC LAYER PROTOCOLS. Dr. Bhargavi Goswami Associate Professor & Head Department of Computer Science Garden City College

COMPUTER NETWORK Model Test Paper

Review. Error Detection: CRC Multiple access protocols. LAN addresses and ARP Ethernet. Slotted ALOHA CSMA/CD

Lecture 6 The Data Link Layer. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it

Contention Protocols and Networks

COMP/ELEC 429/556 Introduction to Computer Networks

High Level View. EE 122: Ethernet and Random Access protocols. Medium Access Protocols

Data Link Layer: Overview, operations

Redes de Computadores. Medium Access Control

Chapter 6: DataLink Layer - Ethernet Olivier Bonaventure (2010)

Summary of MAC protocols

Lecture 6. Data Link Layer (cont d) Data Link Layer 1-1

Link layer, LANs: outline. Chapter 5-1 Link Layer. Link layer: introduction. Link layer services

The MAC layer in wireless networks

CSCI-1680 Link Layer Wrap-Up Rodrigo Fonseca

EE 122: Ethernet and

The Link Layer and LANs. Chapter 6: Link layer and LANs

CSCI-1680 Link Layer Wrap-Up Rodrigo Fonseca

CSCI-1680 Link Layer Wrap-Up Rodrigo Fonseca

Computer Networks Principles LAN - Ethernet

Goals. Fundamentals of Network Media. More topics. Topics. Multiple access communication. Multiple access solutions

CSE 461: Multiple Access Networks. This Lecture

Part3. Local Area Networks (LAN)

MULTIPLE ACCESS PROTOCOLS 2. 1

Frames, Packets and Topologies

Multiple Access. Data Communications and Networking

COMMUNICATION NETWORKS NETW 501

CS 3640: Introduction to Networks and Their Applications

COS 140: Foundations of Computer Science

Outline. Introduction to Networked Embedded Systems - Embedded systems Networked embedded systems Embedded Internet - Network properties

CCM 4300 Lecture 6 Computer Networks, Wireless and Mobile Communications. Dr Shahedur Rahman. Room: T115

Networking Technologies and Applications

Medium Access Protocols

Data Link Layer, Part 5. Medium Access Control

Links Reading: Chapter 2. Goals of Todayʼs Lecture. Message, Segment, Packet, and Frame

LAN. CS 4/55231 Internet Engineering. Kent State University Dept. of Computer Science

Data Link Layer: Multi Access Protocols

Chapter 6 Medium Access Control Protocols and Local Area Networks

Access Technologies! Fabio Martignon

Links. CS125 - mylinks 1 1/22/14

Data Link Layer Technologies

Aloha and slotted aloha

Link Layer and LANs 안상현서울시립대학교컴퓨터 통계학과.

ECE 4450:427/527 - Computer Networks Spring 2017

CSCI-1680 Link Layer Wrap-Up Rodrigo Fonseca

Multiple Access Protocols

Random Assignment Protocols

Jaringan Komputer. Broadcast Network. Outline. MAC (Medium Access Control) Channel Allocation Problem. Dynamic Channel Allocation

RMIT University. Data Communication and Net-Centric Computing COSC 1111/2061/1110. Lecture 8. Medium Access Control Methods & LAN

Lecture 4: Wireless MAC Overview. Hung-Yu Wei National Taiwan University

Content. Deterministic Access Polling(1) Master-Slave principles: Introduction Layer 2: Media Access Control

CS 455/555 Intro to Networks and Communications. Link Layer

Physical and Data Link layers

Chapter 5 Link Layer and LANs

Shared Access Networks. Media Access Protocols. Ethernet (802.3) Ethernet cont...

Lecture 9: Bridging. CSE 123: Computer Networks Alex C. Snoeren

CS 716: Introduction to communication networks. - 9 th class; 19 th Aug Instructor: Sridhar Iyer IIT Bombay

Reliable Transmission

Housekeeping. Fall /5 CptS/EE 555 1

Computer Network Fundamentals Spring Week 3 MAC Layer Andreas Terzis

Multiple-access protocols

Random Access. 1. Aloha. 2. Slotted Aloha 3. CSMA 4. CSMA/CD

Chapter 16 Networking

Introductory to Computer Networks Local Area Networks. Lecture 16 Fall Isfahan University of technology Dr.

Computer and Network Security

Chapter 3: Industrial Ethernet

Multiple Access Links and Protocols

ELEC / COMP 177 Fall Some slides from Kurose and Ross, Computer Networking, 5 th Edition

Medium Access Control. MAC protocols: design goals, challenges, contention-based and contention-free protocols

Link Layer: Retransmissions

CSE 6811 Ashikur Rahman

Logical Link Control (LLC) Medium Access Control (MAC)

Media Access Control. Networked Systems (H) Lecture 5

1-1. Switching Networks (Fall 2010) EE 586 Communication and. November 8, Lecture 30

Chapter 5: DataLink Layer

CIS 551 / TCOM 401 Computer and Network Security. Spring 2007 Lecture 7

Transcription:

TC 3TCA NET Département Télécommunications Services & Usages

Intervenant Razvan Stanica razvan.stanica@insa-lyon.fr. Ingénieur Télécom-Réseaux ENSEEIHT, promo 2008. Thèse sur le Contrôle de Congestion dans les Réseaux Véhiculaires, INP Toulouse 2011. Maitre de conférences INSA Lyon depuis Septembre 2012. Cours: 3TC PRS (responsable), 3TC NET, 4TC ARP, 4TC ARM. 2

MAC class slides in English 4h (today and Monday) Three main topics general MAC strategies CSMA/CD CSMA/CA 3

MAC role a part of the data link layer, in charge of handling user access to the channel. point-to-point link shared link 4

frequency Sharing the medium time 5

frequency Sharing the medium Frequency Division Multiple Access - FDMA time 6

frequency Sharing the medium Time Division Multiple Access - TDMA time 7

frequency Sharing the medium Code Division Multiple Access - CDMA time 8

Role of the MAC layer Share the different resources (frequency blocks, time slots, codes). Easiest solution: static assignment. Every node has its own, unique resource not scalable. Two approaches Centralized: a master node that decides the scheduling of the other nodes (e.g. cellular networks). Distributed: resource allocation is decided by the nodes themselves (e.g. local area networks). 9

Centralized solutions Low scalability. High overhead. Distributed solutions Deterministic: gives precise bounds on the channel access delay. Random: nothing certain, based on probabilities, works most of the time. 10

Some examples Token Ring The nodes share one token. A virtual ring structure is created: every node has a right neighbor and a left neighbor. Only the node who owns the token has the right to transmit. After a transmission, the token moves to the right neighbor. 11

Some examples Aloha Transmit whenever data is available. The receiver acknowledges the data (ACK). Transmitter starts a timer. Collision detected on timeout, followed by retransmission after a random delay. 12

TC 3TCA NET Carrier Sense Multiple Access with Collision Detection Département Télécommunications Services & Usages

CSMA/CD Basic principles Carrier Sense listen the medium to detect ongoing transmissions. Collision Detection notice a collision as soon as possible and enter a back-up mode. Listen and transmit at the same time. Compare transmitted and received signals to detect collisions. 14

CSMA/CD Basic principles To properly handle collisions, a station needs to detect an incoming frame before the end of its own transmission. Minimum frame length: a transmission needs to last for at least 2xPROP. 15

CSMA/CD Flow chart 16

CSMA/CD Mechanisms Jam signal when a collision is detected, do not stop. All other stations need to start receiving a frame before the transmission ends. 17

CSMA/CD Mechanisms Back-off: when a collision is detected, the stations need to be de-synchronized. All the contending and transmitting stations detecting a collision choose a random timer. For the i th consecutive collision: uniform choice in the interval [0,2 i -1] back-off b. Stations wait for b time slots before attempting retransmissions. Time slot= time needed to transmit 512 bits (depends on the data rate) 18

CSMA/CD Implementations Ethernet developed in the early 70s at Xerox Palo Alto Research Center. The dominant technology today. Evolution in terms of data rate, physical support and topology. 19

CSMA/CD Implementations In 1983, a slightly modified version of Ethernet has been standardized as IEEE 802.3. The latest published version is IEEE 802.3bk. Current work, mostly on optical networks, where IEEE 802.3 is becoming dominant. 20

CSMA/CD Implementations Ethernet frame Preamble 8 bytes Destination 6 bytes Source 6 bytes Type 2 bytes Data 46-1500 bytes CRC 4 bytes IEEE 802.3 frame Preamble 8 bytes Destination 6 bytes Source 6 bytes Length 2 bytes 802.2 header 8 bytes Data 38-1492 bytes CRC 4 bytes 21

Ethernet frame CSMA/CD Preamble 8 bytes Destination 6 bytes Source 6 bytes Type 2 bytes Data 46-1500 bytes CRC 4 bytes Preamble synchronize the clock of the transmitter and receiver. Destination and Source 48 bits addresses, assigned by network card manufacturers (need to be unique, at least in the local network). Type unique code for the encapsulated protocol (e.g. 0x0800 for IP). Data possibly with padding to reach the minimum size. CRC error control. 22

CSMA/CD Ethernet address Encoded on 6 bytes (48 bits). Theoretically unique address, assigned by the manufacturer. 3 bytes to identify the constructor, 3 bytes to identify the network card. All frames are received by all the stations sharing the medium. Dropped by stations that do not match with destination address. Special broadcast (FF:FF:FF:FF:FF:FF) and multicast addresses. 23