CSE/EE 461 Wireless and Contention-Free Protocols

Similar documents
CSE 461: Multiple Access Networks. This Lecture

CSE/EE 461 Section 2

CSE 461 Multiple Access. David Wetherall

Lecture 9: Bridging. CSE 123: Computer Networks Alex C. Snoeren

CS 43: Computer Networks. 27: Media Access Contd. December 3, 2018

CS 43: Computer Networks Media Access. Kevin Webb Swarthmore College November 30, 2017

Link Layer. (continued)

Local Area Networks (LANs) SMU CSE 5344 /

IEEE , Token Rings. 10/11/06 CS/ECE UIUC, Fall

CMPE 257: Wireless and Mobile Networking

Computer Network Fundamentals Spring Week 3 MAC Layer Andreas Terzis

Lecture 9: Bridging & Switching"

Medium Access Control Sublayer Chapter 4

Medium Access Control. IEEE , Token Rings. CSMA/CD in WLANs? Ethernet MAC Algorithm. MACA Solution for Hidden Terminal Problem

CSE 461: Multiple Access. Homework: Chapter 2, problems 1, 8, 12, 18, 23, 24, 35, 43, 46, and 58

CMPE 257: Wireless and Mobile Networking

Multiple Access Protocols

Link Layer: Retransmissions

High Level View. EE 122: Ethernet and Random Access protocols. Medium Access Protocols

!! Due next week (week 3), start of class. !! Electronic turnin. !! No class trawler (do that for Fishnet #2) !! On web site

Chapter 12 Multiple Access 12.1

ECEN 5032 Data Networks Medium Access Control Sublayer

CARRIER SENSE MULTIPLE ACCESS (CSMA):

CSE 123: Computer Networks Alex C. Snoeren. HW 2 due Thursday 10/21!

Wireless Communications

EE 122: Ethernet and

Chapter 4. The Medium Access Control Sublayer. Points and Questions to Consider. Multiple Access Protocols. The Channel Allocation Problem.

Medium Access Control Sublayer Chapter 4

COMP476 Networked Computer Systems. Polling. Sharing the Wire. LAN Technologies. COMP476 Networked Computer Systems 1

Medium Access Control. MAC protocols: design goals, challenges, contention-based and contention-free protocols

CHAPTER 7 MAC LAYER PROTOCOLS. Dr. Bhargavi Goswami Associate Professor & Head Department of Computer Science Garden City College

Data Link Layer -2- Network Access

Data Link Layer, Part 3 Medium Access Control. Preface

Lecture 6. Data Link Layer (cont d) Data Link Layer 1-1

Data Link Layer, Part 5. Medium Access Control

The Medium Access Control Scheme (MAC Layer) Reference: Andrew S. Tanenbaum, Computer Networks, 3rd Edition, Prentice Hall, 1996.

Multiple Access Links and Protocols

CSE 461: Wireless Networks

Computer Networks Medium Access Control. Mostafa Salehi Fall 2008

Data Link Layer -2- Network Access

CS 3640: Introduction to Networks and Their Applications

Getting Connected (Chapter 2 Part 4) Networking CS 3470, Section 1 Sarah Diesburg

ICE 1332/0715 Mobile Computing (Summer, 2008)

Final Review Fall 2017 Profs Peter Steenkiste & Justine Sherry

Outline / Wireless Networks and Applications Lecture 9: Wireless LANs Aloha and 802 Wireless. Regular Ethernet CSMA/CD

Aloha and slotted aloha

The Medium Access Control Sublayer

Topics for Today. More on Ethernet. Wireless LANs Readings. Topology and Wiring Switched Ethernet Fast Ethernet Gigabit Ethernet. 4.3 to 4.

ECE 4450:427/527 - Computer Networks Spring 2017

Lecture 23 Overview. Last Lecture. This Lecture. Next Lecture ADSL, ATM. Wireless Technologies (1) Source: chapters 6.2, 15

Medium Access Control. CSCI370 Lecture 5 Michael Hutt New York Institute of Technology

LECTURE PLAN. Script. Introduction about MAC Types o ALOHA o CSMA o CSMA/CD o CSMA/CA

ECE 4450:427/527 - Computer Networks Spring 2017

Unit 7 Media Access Control (MAC)

Multiple Access in Cellular and Systems

Mohamed Khedr.

Intelligent Transportation Systems. Medium Access Control. Prof. Dr. Thomas Strang

The Link Layer and LANs. Chapter 6: Link layer and LANs

Introduction to Networks and the Internet

Jaringan Komputer. Broadcast Network. Outline. MAC (Medium Access Control) Channel Allocation Problem. Dynamic Channel Allocation

Chapter 6 Wireless and Mobile Networks. Csci 4211 David H.C. Du

Shared Access Networks Wireless. 1/27/14 CS mywireless 1

Wireless Challenges : Computer Networking. Overview. Routing to Mobile Nodes. Lecture 25: Wireless Networking

Chapter 4. The Medium Access Control Sublayer

CSCD 433 Network Programming Fall Lecture 7 Ethernet and Wireless

WiFi Networks: IEEE b Wireless LANs. Carey Williamson Department of Computer Science University of Calgary Winter 2018

Redes de Computadores. Medium Access Control

COMPUTER NETWORKS - Local area networks

Local area networks. Copyright

Links Reading: Chapter 2. Goals of Todayʼs Lecture. Message, Segment, Packet, and Frame

EITF25 Internet Techniques and Applications L4: Network Access. Stefan Höst

Reminder: Datalink Functions Computer Networking. Datalink Architectures

Topics. Link Layer Services (more) Link Layer Services LECTURE 5 MULTIPLE ACCESS AND LOCAL AREA NETWORKS. flow control: error detection:

CMPE 150/L : Introduction to Computer Networks. Chen Qian Computer Engineering UCSC Baskin Engineering Lecture 16

Wireless Local Area Networks. Networks: Wireless LANs 1

Data and Computer Communications. Chapter 11 Local Area Network

Contention Protocols and Networks

Link Layer and Ethernet

Link Layer and Ethernet

Lecture 4: Wireless MAC Overview. Hung-Yu Wei National Taiwan University

COS 140: Foundations of Computer Science

Announcements: Assignment 4 due now Lab 4 due next Tuesday Assignment 5 posted, due next Thursday

The MAC layer in wireless networks

MAC LAYER. Murat Demirbas SUNY Buffalo

MAC Sublayer(1) Principal service of the Medium Access Control Sublayer: Allocating a single broadcast channel (mostly a LAN) among competing users

Multiple Access Channels

Announcements / Wireless Networks and Applications Lecture 9: Wireless LANs Wireless. Regular Ethernet CSMA/CD.

Outline. Introduction to Networked Embedded Systems - Embedded systems Networked embedded systems Embedded Internet - Network properties

Page 1. Outline : Wireless Networks Lecture 11: MAC. Standardization of Wireless Networks. History. Frequency Bands

Computer Networks. Today. Principles of datalink layer services Multiple access links Adresavimas, ARP LANs Wireless LANs VU MIF CS 1/48 2/48

Lecture 6: Example LAN: Ethernet

Frames, Packets and Topologies

Lecture 6 The Data Link Layer. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it

CSMA/CD (Collision Detection)

Last Lecture: Data Link Layer

Lecture 5 The Data Link Layer. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it

Local Networks. Lecture 4 6-Apr-2016

Data and Computer Communications. Chapter 13 Wireless LANs

CSCI Spring Final Exam Solution

MULTIPLE ACCESS PROTOCOLS 2. 1

Transcription:

CSE/EE 461 Wireless and Contention-Free Protocols Last Time The multi-access problem Medium Access Control (MAC) sublayer Random access protocols: Aloha CSMA variants Classic Ethernet (CSMA/CD) Application Presentation Session Transport Network Data Link Physical 1

CSMA vs. CSMA/CD CSMA: The least you could do with without getting laughed at. Don t speak if you hear another speaking But, keep speaking even if somebody interrupts you Why is this an issue? CSMA/CD Stop speaking if someone interrupts you Will the difference reveal itself at high load or low load? How will the difference reveal itself? Utilization Under Load ideal 64 512 128 CSMA CSMA/CD 2

CSMA/CD, Utilization and Scalability But, just 3 Mb/s! Modern Ethernet A key concern is manageability centralized vs. distributed layout Another is performance scalability Switches vs. Hubs nodes (wire) Switch or Hub Classic Ethernet (10Mbps) Fast Ethernet (100Mbps) Gigabit Ethernet (1Gbps) (eliminates contention) 3

This Lecture More on multiple-access schemes: 1. Wireless schemes 2. Contention-free protocols Application Presentation Session Transport Network Data Link Physical 1. Wireless Communication Wireless is more complicated than wired 1. Cannot detect collisions Transmitter swamps co-located receiver Means you can t sense your own collisions Like screaming so loud that you can t hear others talking 2. Different transmitters have different coverage areas Asymmetries lead to hidden/exposed terminal problems 4

Hidden Terminals A B C transmit range A and C can both send to B but can t hear each other A is a hidden terminal for C and vice versa CSMA will be ineffective A can t tell it s colliding with C, and vice versa Must sense collision at sense at receiver Exposed Terminals A B C D transmit range B, C can hear each other but can safely send to A, D Should be allowed when possible 5

CSMA with Collision Avoidance Since we can t detect collisions, we avoid them CSMA/CA as opposed to CSMA/CD Not greedy like Ethernet When medium busy, choose random backoff interval Wait for that many idle timeslots to pass before sending Remember p-persistence a refinement When a collision is inferred, retransmit with binary exponential backoff (like Ethernet) Use CRC and ACK from receiver to infer no collision Again, exponential backoff helps us quickly hunt for the right amount of deference time RTS / CTS Protocols A RTS B C CTS D RTS/CTS say: how long 1. B stimulates C with Request To Send (RTS) 2. A hears RTS and defers to allow the CTS 3. C replies to B with Clear To Send (CTS) 4. D hears CTS and defers to allow the data 5. B sends to C 6

802.11 Wireless LANs Emerging standard with a bunch of options/features Basestation Wireless plus wired system or pure wireless (ad hoc) Avoids collisions (CSMA/CA (exp-backoff), RTS/CTS) Built on new links (spread spectrum, or diffuse infrared) 2. Contention-free Protocols Collisions are the main difficulty with random schemes Inefficiency, limit to scalability Q: Can we avoid collisions? A: Yes. By taking turns Token Ring / FDDI Can be a building block for more.. Deterministic service, priorities/qos, reliability 7

Token Ring (802.5) D C A B nodes Direction of transmission Token rotates permission to send around node Sender injects packet into ring and removes later Maximum token holding time (THT) bounds access time Early or delayed token release Round robin service, acknowledgments and priorities Monitor nodes ensure health of ring FDDI (Fiber Distributed Data Interface) Roughly a large, fast token ring 100 Mbps and 200km vs 4/16 Mbps and local Dual counter-rotating rings for redundancy Complex token holding policies for voice etc. traffic Token ring advantages No contention, bounded access delay Support fair, reserved, priority access Disadvantages Complexity, reliability, scalability Break! 8

DQDB (Distributed Queue Dual Bus) upstream Busy Request Data downstream Two unidirectional buses that carry fixed size cells Cells are marked busy/free and can signal a request too Nodes maintain a distributed FIFO queue By sending requests they are reserving future access DQDB Algorithm Two counters per direction (UP, DN) RC (request count), CD (countdown) Consider sending downstream (DN): Always have RC count UP requests, minus free DN cells if larger than zero This is a measure of how many others are waiting to send To send, copy RC to CD, decrement CD for each free DN cell, send when zero This waits for earlier requests to be satisfied before sending Highly scalable, efficient, but not perfectly fair 9

Key Concepts Wireless communication is relatively complex No collision detection, hidden and exposed terminals There are contention-free MAC protocols Based on turn taking and reservations, not randomization 10