Chapter 6 Medium Access Control Protocols and Local Area Networks

Similar documents
Multiple Access (1) Required reading: Garcia 6.1, 6.2.1, CSE 3213, Fall 2010 Instructor: N. Vlajic

Chapter 6 Medium Access Control Protocols and Local Area Networks

Random Access. 1. Aloha. 2. Slotted Aloha 3. CSMA 4. CSMA/CD

LANs. Local Area Networks. via the Media Access Control (MAC) SubLayer. Networks: Local Area Networks

CHAPTER 7 MAC LAYER PROTOCOLS. Dr. Bhargavi Goswami Associate Professor & Head Department of Computer Science Garden City College

COMMUNICATION NETWORKS NETW 501

CS 716: Introduction to communication networks. - 9 th class; 19 th Aug Instructor: Sridhar Iyer IIT Bombay

Chapter 6 Medium Access Control Protocols and Local Area Networks. Part I: Medium Access Control Part II: Local Area Networks

ECE 4450:427/527 - Computer Networks Spring 2017

Chapter 6 Medium Access Control Protocols and Local Area

Topics. Link Layer Services (more) Link Layer Services LECTURE 5 MULTIPLE ACCESS AND LOCAL AREA NETWORKS. flow control: error detection:

COMP/ELEC 429/556 Introduction to Computer Networks

Packet multiple access and the Aloha protocol

Physical Layer. Medium Access Links and Protocols. Point-to-Point protocols. Modems: Signaling. Modems Signaling. Srinidhi Varadarajan

The Link Layer and LANs. Chapter 6: Link layer and LANs

EITF25 Internet Techniques and Applications L4: Network Access. Stefan Höst

High Level View. EE 122: Ethernet and Random Access protocols. Medium Access Protocols

CSE 461: Multiple Access. Homework: Chapter 2, problems 1, 8, 12, 18, 23, 24, 35, 43, 46, and 58

Local Area Networks (LANs) SMU CSE 5344 /

Problem Set Name the 7 OSI layers and give the corresponding functionalities for each layer.

Lecture 6. Data Link Layer (cont d) Data Link Layer 1-1

Computer Network Fundamentals Spring Week 3 MAC Layer Andreas Terzis

CS 43: Computer Networks. 27: Media Access Contd. December 3, 2018

ECEN 5032 Data Networks Medium Access Control Sublayer

1-1. Switching Networks (Fall 2010) EE 586 Communication and. November 8, Lecture 30

Chapter 12 Multiple Access 12.1

Redes de Computadores. Medium Access Control

Data Link Layer -2- Network Access

Aloha and slotted aloha

EE 122: Ethernet and

CSMA/CD (Collision Detection)

Data Link Layer: Collisions

Protocols for Multiaccess Networks

MULTIPLE ACCESS PROTOCOLS 2. 1

Data Link Layer -2- Network Access

COMPUTER NETWORKS - Local area networks

Local area networks. Copyright

Outline. Introduction to Networked Embedded Systems - Embedded systems Networked embedded systems Embedded Internet - Network properties

Multiple-access protocols

Multiple Access Links and Protocols

Ethernet. Introduction. CSE 3213 Fall 2011

CS 43: Computer Networks Media Access. Kevin Webb Swarthmore College November 30, 2017

Multiple Access Protocols

The Medium Access Control Scheme (MAC Layer) Reference: Andrew S. Tanenbaum, Computer Networks, 3rd Edition, Prentice Hall, 1996.

Link Layer and LANs 안상현서울시립대학교컴퓨터 통계학과.

Goals. Fundamentals of Network Media. More topics. Topics. Multiple access communication. Multiple access solutions

Chapter 4. The Medium Access Control Sublayer. Points and Questions to Consider. Multiple Access Protocols. The Channel Allocation Problem.

Chapter 1 Basic concepts of wireless data networks (cont d)

CSE 461: Multiple Access Networks. This Lecture

LANs Local Area Networks LANs provide an efficient network solution : To support a large number of stations Over moderately high speed

Lecture 9: Bridging. CSE 123: Computer Networks Alex C. Snoeren

Multiple Access Communications. EEE 538, WEEK 11 Dr. Nail Akar Bilkent University Electrical and Electronics Engineering Department

CMPE 150/L : Introduction to Computer Networks. Chen Qian Computer Engineering UCSC Baskin Engineering Lecture 16

Lecture 4: Wireless MAC Overview. Hung-Yu Wei National Taiwan University

LECTURE PLAN. Script. Introduction about MAC Types o ALOHA o CSMA o CSMA/CD o CSMA/CA

Computer Networks Medium Access Control. Mostafa Salehi Fall 2008

Lecture 8 The Data Link Layer part I. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it

ICE 1332/0715 Mobile Computing (Summer, 2008)

Chapter 3 MEDIA ACCESS CONTROL

CMPE 257: Wireless and Mobile Networking

TSIN01 Information Networks Lecture 3

CS 455/555 Intro to Networks and Communications. Link Layer

Jaringan Komputer. Broadcast Network. Outline. MAC (Medium Access Control) Channel Allocation Problem. Dynamic Channel Allocation

EP2210 FEP3210 Performance analysis of Communication networks. Topic 2 Medium access control (or multiple access protocols)

COS 140: Foundations of Computer Science

CPSC 441 Tutorial-19. Department of Computer Science University of Calgary

Multiple Access. Data Communications and Networking

Markov Chains and Multiaccess Protocols: An. Introduction

Data Link Layer: Multi Access Protocols

Multiple Access Channels

Chapter 5: Link layer

Chapter 5 Link Layer and LANs

Data and Computer Communications

CSE 461 Multiple Access. David Wetherall

Data Link Layer, Part 5. Medium Access Control

Power Laws in ALOHA Systems

Data Link Layer: Overview, operations

ECE453 Introduction to Computer Networks. Broadcast vs. PPP. Delay. Lecture 7 Multiple Access Control (I)

Reminder: Datalink Functions Computer Networking. Datalink Architectures

LAN PROTOCOLS. Beulah A AP/CSE

Lecture 5 The Data Link Layer. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it

Wireless Medium Access Control Protocols

College of Computer and Information Sciences Department of Computer Engineering CEN444 Computer Networks Midterm 2 Exam Second Semester 1434/1435

Lecture 6 The Data Link Layer. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it

CARRIER SENSE MULTIPLE ACCESS (CSMA):

Multimedia Communication Services Traffic Modeling and Streaming

Links Reading: Chapter 2. Goals of Todayʼs Lecture. Message, Segment, Packet, and Frame

Computer Networks. Medium Access Sublayer (Part I)

Getting Connected (Chapter 2 Part 4) Networking CS 3470, Section 1 Sarah Diesburg

Data Link Layer, Part 3 Medium Access Control. Preface

Medium Access Control Sublayer

CCM 4300 Lecture 5 Computer Networks, Wireless and Mobile Communications. Dr Shahedur Rahman. Room: T115

Data and Computer Communications. Chapter 11 Local Area Network

Links. CS125 - mylinks 1 1/22/14

Access Technologies! Fabio Martignon

Wireless Communications

COS 140: Foundations of Computer Science

Chapter 4 Data Link Layer

Where Are We? Basics: Network Classification Network Architecture Reliable Data Transfer Delay Models Implementation: Protocol Design

CSC 4900 Computer Networks: The Link Layer

Transcription:

Chapter 6 Medium Access Control Protocols and Local Area Networks Part I: Medium Access Control Part II: Local Area Networks CSE 3213, Winter 2010 Instructor: Foroohar Foroozan

Chapter Overview Broadcast Networks All information sent to all users No routing Shared media Radio Cellular telephony Wireless LANs Copper & Optical Ethernet LANs Cable Modem Access Medium Access Control To coordinate access to shared medium Data link layer since direct transfer of frames Local Area Networks High-speed, low-cost communications between co-located computers Typically based on broadcast networks Simple & cheap Limited number of users

Part I: Medium Access Control Multiple Access Communications Random Access Scheduling Channelization

Multiple Access Communications Shared media basis for broadcast networks Inexpensive: radio over air; copper or coaxial cable M users communicate by broadcasting into medium Key issue: How to share the medium? 1 2 3 4 M Shared multiple access medium 5

Approaches to Media Sharing Medium sharing techniques Static channelization Dynamic medium access control Partition medium Dedicated allocation to users Satellite transmission Cellular Telephone Scheduling Polling: take turns Request for slot in transmission schedule Token ring Wireless LANs Random access Loose coordination Send, wait, retry if necessary Aloha Ethernet

Channelization: Satellite two frequency bands: one for uplink and one for downlink each station is allocated a channel in the uplink and in the downlink frequency band different approaches can be employed to create uplink/downlink channels (FDMA, TDMA, CDMA) although each station can theoretically transmit to and listen to any channel, stations remain within their pre-allocated channels to avoid interference Satellite Channel uplink f in downlink f out

Channelization: Cellular uplink f 1 ; downlink f 2 uplink f 3 ; downlink f 4

Scheduling: Polling Data from Data 1 from 2 Inbound line Host computer Poll 1 Poll 2 1 2 3 Data to M Outbound line M Stations

Scheduling: Token-Passing Ring networks token Data to M token Station that holds token transmits into ring

Random Access Multitapped Bus Crash!! Transmit when ready Transmissions can occur; need retransmission strategy

Wireless LAN AdHoc: station-to-station Infrastructure: stations to base station Random access & polling

Chapter 6 Medium Access Control Protocols and Local Area Networks Random Access

ALOHA Simplest solution: just do it A station transmits whenever it has data to transmit If more than one frames are transmitted, they interfere with each other (collide) and are lost If ACK not received within timeout, then a station picks random backoff time (to avoid repeated collision) Station retransmits frame after backoff time

Random Access Techniques: ALOHA (cont.) Example [ Aloha throughput ] R Station 1 1.1 1.2 Transmission Time (F) 1.2' Station 2 2.1 2.2 Station 3 3.1 3.1' R Complete Collision Partial Collision Broadcast channel http://www.invocom.et.put.poznan.pl/~invocom/c/p1-4/p1-4_en/p1-4_3_7.htm#pureaapplet 14

Random Access Techniques: ALOHA (cont.) Vulnerable Period assume frames of constant length (L) and transmission time (X=L/R) consider a frame with starting transmission time t o the frame will be successfully transmitted if no other frame collides with it any transmission that begins in interval [t 0, t 0 +X], or in the prior X seconds leads to collision vulnerable period = [ t 0 X, t 0 + X ] What is the probability of no other transmission, i.e. no collision, in the vulnerable period?! 15

Random Access Techniques: ALOHA (cont.) Throughput definitions and assumptions: S (S out ) throughput average # of successful frame transmissions per X sec (if network operates under stable conditions S out = S in, where S in represents arrival rate of new frames to the system) G load average # transmission attempts! per X sec P succ probability of a successful frame transmission S = P succ G How to find P succ? suppose a frame is ready for transmission at time t 0 frame will be transmitted successfully if no other frame attempts transmission X sec before and after t 0 random backoff spreads retransmissions so that frame transmission (arrivals) are equally likely at any instant in time Poisson process!!! 16 ready for transmission

Random Access Techniques: ALOHA (cont.) if general, if frame arrivals are equally likely at any instant in time, and arrivals occur at an average rate of λ [arrivals per sec] Poisson process P[k arrivals in T seconds] = k λt) λt ( k! e in our case, λ=g/x [arrivals per second] and T=2X, hence P[k transmissions in 2X seconds] = (2G) k! k e 2G accordingly, the probability of successful transmission (no collision) is: P succ = P[0 transmissions in 2X seconds] = e 2G and throughput S = G P succ = G e 2G 17

Arrival: passengers arrive randomly and independently a Poisson process. Passenger arrivals are equally likely at any instant in time. average arrival rate = λ [passenger / sec] average # of arrived passengers in T [sec]: average # of passengers in T [sec] = λt probability of having exactly k passengers in line after T [sec]: P[k arrivals in T seconds] = k λt) λt ( k! e Departure: passengers What is the probability arrive in that batches exactly 1 passenger NOT a Poisson arrives process. to the station, off the buss, in T sec? λ [passenger / sec] 18

Throughput of ALOHA S vs. G in Pure ALOHA NOTE: our analysis assumed that many nodes share a common channel and have comparable transmission rates (if only one node uses the medium, S=1) initially, as G increases S increases until it reaches S max after that point the network enters unstable operating conditions in which collisions become more likely and the number of backlogged stations increases (consequently, S in > S out ) max throughput of ALOHA (S max = 0.184) occurs at G=0.5, which corresponds to a total arrival rate of one frame per vulnerable period S max = 0.184 max ALOHA throughput = 18% of channel capacity stable operating area (S in ~S out ) unstable operating area (S in S ou ) 18% of channel utilization, with Aloha, is not encouraging. 19 But, with everyone transmitting at will we could hardly expected a 100% success rate.

Random Access Techniques: ALOHA (cont.) Example [ Aloha ] a) What is the vulnerable period (in milliseconds) of a pure ALOHA broadcast system with R=50-kbps wireless channel, assuming 1000-byte frames. b) What is the maximum throughput S of such a channel (system), in kbps? a) (frame transmission time =) X = 1000 bytes / 50 kbps = 8000 bits / 50 kbps X = 160 milliseconds vulnerable period = 2*X = 320 milliseconds b) From theory, max throughput = 0.18 * R = 0.18 * 50 kbps = 9.179 kbps 20

Slotted ALOHA improved ALOHA, with reduced prob. of collision assumptions: time is divided into slots of size X=L/R (one frame time) nodes start to transmit only at the beginning of a slot nodes are synchronized so that each node knows when the slots begin operation: 1) when node has a fresh frame to send, it waits until next frame slot and transmits 3) if there is a collision, node retransmits the frame after a backoff-time (backoff-time = multiples of time-frames)

Random Access Techniques: Slotted ALOHA (cont.) Example [ Aloha vs. Slotted Aloha ] 22

Random Access Techniques: Slotted ALOHA (cont.) Vulnerable Period of Slotted ALOHA consider one arbitrary packet P that becomes ready for transmission at some time t during the time slot [k, k+1] packet P will be transmitted successfully if no other packet becomes available for transmission during the same time slot vulnerable period = [ t 0 X, t 0 ] P succ = P[0 arrivals in X seconds] = e G S = G P succ = G e G 23

Random Access Techniques: Slotted ALOHA (cont.) S vs. G in Slotted ALOHA max throughput of Slotted ALOHA (S max = 0.36) occurs at G=1, which corresponds to a total arrival rate of one frame per vulnerable period S max = 0.36 max Slotted ALOHA throughput = 36% of actual channel capacity Slotted ALOHA vs. Pure ALOHA slotted ALOHA reduces vulnerability to collision, but also adds a waiting period for transmission if contention is low, it will prevent very few collisions, and delay many of the (few) packets that are sent 24

Random Access Techniques: Slotted ALOHA (cont.) Example [ slotted Aloha ] Measurements of slotted ALOHA channel with an infinite number of users show that 10% of the slots are idle. a) What is the channel load, G? b) What is the throughput, S? c) Is the channel underloaded or overloaded? a) 10% of slots idle frame will be successfully transmitted if sent in those 10% of slots P succ = 0.1 According to theory, P succ = e -G G = -ln(p succ ) = - ln(0.1) = 2.3 b) According to theory, S = P succ *G = G*e -G as G=2.3 and e -G =0.1 S = 0.23 c) Whenever G>1, the channel is overloaded, so it is overloaded in this case. 25

Carrier Sensing Multiple Access (CSMA) CSMA in ALOHA, node decides to transmit independently of other nodes attached to the broadcast channel node does not pay attention whether another node is transmitting (CSMA) node does not stop transmitting if another node begins to interfere with its transmission (CSMA/CD) polite version of ALOHA decreases the probability of collision by implementing the following rule: carrier sensing node listens to the channel before transmitting if sensed channel idle transmit entire frame if sensed channel busy back-off (defer transmission), and sense the channel again after a random amount of time Station A begins transmission at t = 0 A Station A captures channel at t = t prop A

Carrier Sense Multiple Access (cont.) Vulnerable Period suppose station A begins transmission at one extreme end of a broadcast medium as signal propagates through the medium, stations become aware of A s transmission at time t=t prop A s transmission reaches the other end of medium if no other station initiates transmission during that period, station A will successfully capture the channel vulnerable period = t prop NOTE: if t prop > t frame, CSMA provides no advantage over slotted ALOHA Station A begins transmission at t = 0 A B Station A captures channel at t = t prop A B 27

CSMA Options Transmitter behavior when busy channel is sensed 1-persistent CSMA (most greedy) Start transmission as soon as the channel becomes idle Low delay and low efficiency Non-persistent CSMA (least greedy) Wait a backoff period, then sense carrier again High delay and high efficiency p-persistent CSMA (adjustable greedy) Wait till channel becomes idle, transmit with prob. p; or wait one mini-slot time & re-sense with probability 1-p Delay and efficiency can be balanced Sensing

1-Persistent CSMA Throughput a annotates propagation delay normalized to frame transmission time or so called normalized bandwidth-delay product S 0.6 0.5 0.4 0.3 0.2 0.1 0.53 0.16 0.45 a = t t prop frame = t prop L R = a = 0.01 t prop R L a =0.1 Better than Aloha & slotted Aloha for small a Worse than Aloha for a > 1 0 0.02 0.03 0.06 0.13 0.25 0.5 1 2 4 8 16 32 64 a = 1 G

Non-Persistent CSMA Throughput a = 0.01 S 0.9 0.8 0.7 0.6 0.5 0.81 0.51 Higher maximum throughput than 1-persistent for small a 0.4 0.3 0.2 0.1 0.14 a = 0.1 Worse than Aloha for a > 1 0 0.02 0.03 0.06 0.13 0.25 0.5 1 2 4 8 16 32 64 G a = 1

CSMA with Collision Detection (CSMA/CD) Monitor for collisions & abort transmission Stations with frames to send, first do carrier sensing After beginning transmissions, stations continue listening to the medium to detect collisions If collisions detected, all stations involved stop transmission, reschedule random backoff times, and try again at scheduled times In CSMA collisions result in wastage of X seconds spent transmitting an entire frame CSMA-CD reduces wastage to time to detect collision and abort transmission

CSMA/CD reaction time A begins to transmit at t = 0 A detects collision at t= 2 t prop - δ A B B begins to transmit at A A B B t = t prop - δ; B detects collision at t = t prop It takes 2 t prop to find out if channel has been captured

CSMA-CD Model Assumptions Collisions can be detected and resolved in 2t prop Time slotted in 2t prop slots during contention periods Assume n busy stations, and each may transmit with probability p in each contention time slot Once the contention period is over (a station successfully occupies the channel), it takes X seconds for a frame to be transmitted It takes t prop before the next contention period starts. (a) Busy Contention Busy Idle Contention Busy Time

Contention Resolution How long does it take to resolve contention? Contention is resolved ( success ) if exactly 1 station transmits in a slot: P success = np(1 p) n 1 By taking derivative of P success we find max occurs at p=1/n P max success = n 1 n 1 n 1 n (1 1 ) n = (1 On average, 1/P max = e = 2.718 time slots to resolve contention 1 ) n 1 e Average Contention Period = 2t prop e seconds

CSMA/CD Throughput Busy Contention Busy Contention Busy Contention Busy Time At maximum throughput, systems alternates between contention periods and frame transmission times where: R bits/sec, L bits/frame, X=L/R seconds/frame a = t prop /X ν meters/sec. speed of light in medium d meters is diameter of system 2e+1 = 6.44

CSMA-CD Application: Ethernet First Ethernet LAN standard used CSMA-CD 1-persistent Carrier Sensing R = 10 Mbps t prop = 51.2 microseconds 512 bits = 64 byte slot accommodates 2.5 km + 4 repeaters Truncated Binary Exponential Backoff After nth collision, select backoff from {0, 1,, 2 k 1}, where k=min(n, 10)

Throughput for Random Access MACs 1 CSMA/CD 1-P CSMA ρ max 0.8 0.6 0.4 0.2 Non-P CSMA Slotted ALOHA ALOHA 0 0.01 0.1 1 a For small a: CSMA-CD has best throughput For larger a: Aloha & slotted Aloha better throughput