LANs Local Area Networks LANs provide an efficient network solution : To support a large number of stations Over moderately high speed

Similar documents
ECE 4450:427/527 - Computer Networks Spring 2017

LANs. Local Area Networks. via the Media Access Control (MAC) SubLayer. Networks: Local Area Networks

Random Assignment Protocols

Data Link Layer: Collisions

ECEN 5032 Data Networks Medium Access Control Sublayer

Local Area Networks (LANs) SMU CSE 5344 /

Topics. Link Layer Services (more) Link Layer Services LECTURE 5 MULTIPLE ACCESS AND LOCAL AREA NETWORKS. flow control: error detection:

EITF25 Internet Techniques and Applications L4: Network Access. Stefan Höst

Chapter 4. The Medium Access Control Sublayer. Points and Questions to Consider. Multiple Access Protocols. The Channel Allocation Problem.

Chapter 6 Medium Access Control Protocols and Local Area Networks

Multiple Access Protocols

Data and Computer Communications. Chapter 11 Local Area Network

TSIN01 Information Networks Lecture 3

CS 43: Computer Networks. 27: Media Access Contd. December 3, 2018

CS 43: Computer Networks Media Access. Kevin Webb Swarthmore College November 30, 2017

Outline. Introduction to Networked Embedded Systems - Embedded systems Networked embedded systems Embedded Internet - Network properties

Computer Networks. Medium Access Sublayer (Part I)

COS 140: Foundations of Computer Science

Multiple Access (1) Required reading: Garcia 6.1, 6.2.1, CSE 3213, Fall 2010 Instructor: N. Vlajic

Local Networks. Lecture 4 6-Apr-2016

MAC Sublayer(1) Principal service of the Medium Access Control Sublayer: Allocating a single broadcast channel (mostly a LAN) among competing users

Redes de Computadores. Medium Access Control

Random Access. 1. Aloha. 2. Slotted Aloha 3. CSMA 4. CSMA/CD

The Link Layer and LANs. Chapter 6: Link layer and LANs

Chapter 4: The Medium Access Layer

Link Layer and LANs 안상현서울시립대학교컴퓨터 통계학과.

Computer Networks Medium Access Control. Mostafa Salehi Fall 2008

The Medium Access Sublayer

Chapter 4. The Medium Access Control Sublayer

Jaringan Komputer. Broadcast Network. Outline. MAC (Medium Access Control) Channel Allocation Problem. Dynamic Channel Allocation

Chapter 4 (Week 7) The Medium Access Control Sublayer ANDREW S. TANENBAUM COMPUTER NETWORKS FOURTH EDITION PP CN&DC Dr.

COS 140: Foundations of Computer Science

CHAPTER 7 MAC LAYER PROTOCOLS. Dr. Bhargavi Goswami Associate Professor & Head Department of Computer Science Garden City College

Multiple Access. Data Communications and Networking

Data Link Layer -2- Network Access

Chapter 12 Multiple Access 12.1

Physical Layer. Medium Access Links and Protocols. Point-to-Point protocols. Modems: Signaling. Modems Signaling. Srinidhi Varadarajan

ECE453 Introduction to Computer Networks. Broadcast vs. PPP. Delay. Lecture 7 Multiple Access Control (I)

Lecture 6. Data Link Layer (cont d) Data Link Layer 1-1

LAN PROTOCOLS. Beulah A AP/CSE

Multiple Access Links and Protocols

Access Technologies! Fabio Martignon

Data Link Layer -2- Network Access

Packet multiple access and the Aloha protocol

High Level View. EE 122: Ethernet and Random Access protocols. Medium Access Protocols

Chapter 5 Link Layer and LANs

COMMUNICATION NETWORKS NETW 501

Aloha and slotted aloha

Goals. Fundamentals of Network Media. More topics. Topics. Multiple access communication. Multiple access solutions

CS 455/555 Intro to Networks and Communications. Link Layer

Data Link Layer: Multi Access Protocols

1-1. Switching Networks (Fall 2010) EE 586 Communication and. November 8, Lecture 30

The Medium Access Control Scheme (MAC Layer) Reference: Andrew S. Tanenbaum, Computer Networks, 3rd Edition, Prentice Hall, 1996.

Wireless Communications

EE 122: Ethernet and

College of Computer and Information Sciences Department of Computer Engineering CEN444 Computer Networks Midterm 2 Exam Second Semester 1434/1435

! High Data Rates (0.1 to 1000 Mbps)! Short Distances (0.1 to 25 km) ! Low Error Rate (10 to 10 ) Local Area Networks

COMP/ELEC 429/556 Introduction to Computer Networks

Chapter 6 Medium Access Control Protocols and Local Area Networks

COMPUTER NETWORKS - Local area networks

Local area networks. Copyright

Real-Time (Paradigms) (47)

ET4254 Communications and Networking 1

Computer Network Fundamentals Spring Week 3 MAC Layer Andreas Terzis

CSE 461 Multiple Access. David Wetherall

CSC 4900 Computer Networks: The Link Layer

Chapter 5: Link layer

The Medium Access Control Sublayer

Ethernet. Introduction. CSE 3213 Fall 2011

Wireless Medium Access Control Protocols

Medium Access Control Sublayer Chapter 4

RMIT University. Data Communication and Net-Centric Computing COSC 1111/2061/1110. Lecture 8. Medium Access Control Methods & LAN

Reminder: Datalink Functions Computer Networking. Datalink Architectures

CMPE 150/L : Introduction to Computer Networks. Chen Qian Computer Engineering UCSC Baskin Engineering Lecture 16

Medium Access Control Sublayer

Data Link Layer: Overview, operations

Lecture 8 The Data Link Layer part I. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it

Media Access Control. Networked Systems (H) Lecture 5

! High Data Rates (0.1 Mbps to 10 Gbps)! Short Distances (0.1 to 40 km) ! Low Error Rate (10 to 10 ) Local Area Networks

Unit 7 Media Access Control (MAC)

MULTIPLE ACCESS PROTOCOLS 2. 1

EP2210 FEP3210 Performance analysis of Communication networks. Topic 2 Medium access control (or multiple access protocols)

2.1 CHANNEL ALLOCATION 2.2 MULTIPLE ACCESS PROTOCOLS Collision Free Protocols 2.3 FDDI 2.4 DATA LINK LAYER DESIGN ISSUES 2.5 FRAMING & STUFFING

Data Link Layer, Part 3 Medium Access Control. Preface

Multiple Access Communications. EEE 538, WEEK 11 Dr. Nail Akar Bilkent University Electrical and Electronics Engineering Department

Data Link Layer, Part 5. Medium Access Control

3. Data Link Layer 3-2

CS 716: Introduction to communication networks. - 9 th class; 19 th Aug Instructor: Sridhar Iyer IIT Bombay

Medium Access Control

Telecommunication Protocols Laboratory Course. Lecture 2

Data and Computer Communications

Link layer, LANs: outline. Chapter 5-1 Link Layer. Link layer: introduction. Link layer services

CSE 461: Multiple Access Networks. This Lecture

Lecture 8 Link Layer: functionality, error detection, media access algorithm

CCNA Exploration1 Chapter 7: OSI Data Link Layer

LECTURE PLAN. Script. Introduction about MAC Types o ALOHA o CSMA o CSMA/CD o CSMA/CA

Chapter 5 Link Layer. Computer Networking: A Top Down Approach. 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012

Chapter 1 Basic concepts of wireless data networks (cont d)

Protocols for Multiaccess Networks

Direct Link Communication II: Wired Media. Multi-Access Communication

Transcription:

Local Area Networks LANs provide an efficient network solution : To support a large number of stations Over moderately high speed With relatively small bit errors

Multiaccess Protocols Communication among stations is provided by means of a unique channel Only a single station can transmit a message at any given time without interference Shared access requires multiaccess control (MAC) protocol to regulate access to the shared medium The access regulation requires mutual agreement among stations, which requires exchange of coordinating information, which requires usage of the channel The recursive aspect of the access problem makes it difficult to solve

MAC Classification Control Mechanism Fixed Dynamic TDM FDM Random Reservation Aloha CSMA Polling Token Pure Slotted Pure CSMA/CD

FDM Bandwidth is divided into channels with private frequency bands Each user is assigned a channel, i.e., no interference Simple and efficient to implement for a fixed number of constantly active users

FDM The scheme may result in poor performance when users are quiescent For a channel of capacity C bps, and a rate of arrival λ frames/sec (Exponential), and a frame length 1 bits/frame (Exponential), the µ response T is given by: T = 1 µc λ Assuming the channel is divided into N independent subchannels: T FDM = 1 = NT µ C λ N N

Time Division Multiple Access Frame i-1 Frame i Frame m Time Ctrl OH Data OH Data OH Data Guard Time Station 1 Station 2 Station N

Time Division Multiple Access Basic Algorithm Data Packet Ready No Yes Wait For Assigned Slot Transmit Data Packet

Roll Call Polling Polling with centralized control is particularly suited for tree topologies and multipoint line Central station sends polling messages to other stations, one by one, in sequential order Polling messages represent permissions to transmit Pulled station transmits data, if any, and indicates that it has completed transmission by sending a go-ahead message Central station continues the polling process by sending a polling message to the next station Once all stations are polled, a cycle is completed and the central station begins a new cycle

Hub Polling Hub polling is a modified version of roll call polling In hub polling, the control is transferred from station to station sequentially The next station in the transmitting sequence listens to the transmissions of the stations immediately before it Each transmitting station affixes a next address to their go-ahead message A station that recognizes its address in the go-ahead message can begin transmission without waiting to be pulled by the central station This scheme requires additional sensors at each station to listen to ongoing transmission of preceding station

Static Allocation Fixed allocation of resources performs well for stream traffic types No overhead required for contention resolution Fixed allocation does not perform well for non bursty traffic When traffic sources are idle, channel capacity is wasted Dynamic schemes allocate bandwidth on demand Dynamic schemes are better suited for bursty traffic

Random Access Techniques Completely decentralized Three techniques are frequently used Pure ALOHA Slotted ALOHA Carrier Sense Multiple Access Carrier Sense Multiple Access with Collision Detection

Pure Aloha Stations transmit data, whenever ready, and wait for an acknowledgement from the receiver Waiting time is the time it takes a packet to travel from the sender to the receiver and back If acknowledgment is received, the transmitting station declares success Absence of acknowledgment infers collision among multiple packets Collision occurs if stations attempt to transmit within a packet transmission time t p Colliding stations stagger their attempts to retransmit the message randomly, using a Backoff algorithm In most implementation, colliding stations continue transmitting until success is achieved

Pure Aloha Vulnerability Period Packet B Packet C t p t p Packet A time t 0 t 0 +t p t 0 +2t p Vulnerability period for Pure Aloha Vulnerability period is 2 t p

Pure Aloha Performance Let N be the number of contending stations Each station generates messages at a rate λ packets/sec on average All messages transmitted are of the same fixed length, m, in units of time Let S denote the traffic intensity S =ρ=n λm What is the limit on S?

Pure Aloha Performance Model Assumptions Packet arrivals at each station are Poisson Packet retransmission is also Poisson This assumption is clearly not correct Simulation studies indicate that the assumption is valid if the random retransmission delay time is relatively long The total rate of packets attempting transmission, i.e., newly generated packets and retransmitted packets, λ >λ Consequently, actual traffic intensity or channel utilization is: G = N λ m

Pure Aloha Performance Model Assumptions Based on the Poission assumption, we can write: Prob [ n packets in T sec ] = (GT ) n e GT n! Furthermore, the rate of successful transmission S can be expressed as: S = G p Where p is the likelyhood that the transmission of an arbitrary packet is successful

Pure Aloha Performance Model Solution Vulnerability periods is 2m, where m is the length of the message in time units A collision will not take place with the currently transmitted packet if no arrivals occur during an interval of 2m sec Prob ( no arrivals in 2 m sec ) = e 2N λ m = e 2G Fraction of messages that get transmitted successfully, represents the probability of success, i.e., probability of no collision Based on the above, we can write: S = e 2G, or S = Ge 2G, G

Pure Aloha Performance Model Solution 0.3 Pure Aloha 0.2 0.1 0 0.5 1.0 1.5 S is maximum, i.e., d (S ) = 0, atg =0.5 dg Maximum throughput S max = 0.5e 1 (0.18)

Pure Aloha Performance Pure aloha is only efficient for lightly loaded system Pure aloha has poor performance for heavily loaded systems Random delays upon collision increase total delay

Slotted Aloha Slotted aloha is an attempt to improve the throughput limitation of pure aloha The channel is divided into time slots which equal one packet transmission time, (assume equal-length packets) All users are synchronized to the time slots Packets begin transmission at beginning of slot Collision occurs between stations attempting to transmit at the beginning of the same time slot

Slotted Aloha Vulnerability Period Transmission time Random Delay Station 1 time Success Collision Station 2 time Vulnerability Period Since the vulnerability period is m, the throughput can be expressed as : S = Ge G This leads to S max = 0.368

Carrier Sense Multiple Access Before transmitting, a station listens to determine if another transmission is in progress (carrier sense) If the medium is in use, the station must wait If the medium is idle, the station may transmit Collision can occur only when more than one station begins transmission within the period of propagation delay

Carrier Sense Multiple Access is small com- Useful when propagation delay pared to packet transmission time All stations are aware of a new transmission within a fraction of the packet transmission time vulnerability period = 2 propagation delay

Carrier Sense Multiple Access Busy Channel Policy If channel is busy, a station can take one of three possible approaches nonpersistent CSMA 1-persistent CSMA p-persistent CSMA

Basic CSMA Protocols CSMA Protocol Characteristics Non Persistent If the medium is idle, transmit If the medium is busy, wait a random ammount of time and sense the channel again 1-Persistent If the meduim is idle, transmit If the meduim is busy, continue to listen uintil the channel is sensed idle, then try again p-persistent If medium is idle, transmit with probability p or delay one time unit with probability (1-p) The time unit is typically equal to the max propagation delay If the medium is busy, continue to listen until the medium becomes idle, and try to transmit p-persistently After transmission is delayed 1 unit time, try to transmit p-persistently

Slotted Non-Persistent CSMA Variation of nonpersistent CSMA The time axis is slotted into intervals of length τ (τ << transmission time) All stations are synchronized and are required to start transmitting only at the beginning of a slot When a packet arrives, the station senses the state of the channel at the beginning of a slot Station transmits if the channel is idle Defers to a later time slot if there is traffic present Vulnerability period τ

CSMA/CD Protocol CSMA/CD attempts to improve performance by forcing the transmitting station to listen while transmitting, in order to to detect collision Rules for the CSMA/CD protocol: If the medium is idle, transmit If the medium is busy, continue listening until the channel is idle, then transmit immediately and continue listening If collision is detected during transmission then 1. Cease transmission 2. Wait a random amount of time, then attempt transmission again

Token Based MAC Protocols Token passing provides distributed control of the sequence in which stations transmit The topology could be either a physical or a logical ring A circulating token provides exclusive access to the shared medium Lack of centralization raises several issues to be addressed Who starts the cycle? What happens if the token is lost? What if multiple tokens are generated simultaneously?

IEEE Standard LANs 802.10 LAN Security (SILS) 802.1 Higher Level and Internetworking (HILI) 802.2 Logical Link CONTROL 802.3 CSMA/CD 802.4 802.5 802.6 802.9 802.11 Voice/Data Wireless Token Bus Token Ring MAN LAN LAN 802.12 Demand Priority 802.14 Cable TV Based Broad 802.7 Broadband TAG 802.8 Fiber OP. TAG

IEEE Standard LANs LAN Model Application Presentation Session Transport Network Internetworking Data Link Physical Logical Link Cntrl Media Access Cntrl Physical

Logical Link Control Layer (LLC) The LLC layer provides a uniform protocol interface between higher layers and the actual underlying network The LLC layer makes the MAC and physical LAN/MAN implementation transparent to the higher layers It allows an application to run on different types of network

LLC-MAC Interface The IEEE 802 LLC is intended to operate with any of the Medium Access Control (MAC) protocols (CSMA/CD, Token Bus, Token Ring, FDDI) A single logical interface to any of the MAC layers is defined The 802 standard does not define an explicit interface, but provides a model of interaction based on the following primitives: MA-Unit-Data.request MA-Unit-Data.indication MA-Unit-Data.response MA-Unit-Data.confirm

LLC Service Primitives Confirmed Service LLC Service User LLC Service Provider LLC Service User Request Indication Response Confirm

LLC Service Primitives Non-Confirmed Service LLC Service User LLC Service Provider LLC Service User Request Indication

LLC Types of Class LLc protocols, also referred to as types of operations, offer three possible services Type 1 operation, to support unacknowledged connectionless service Type 2 operation, to support connection-mode service Type 3 operation, to support acknowledged connectionless service

LLC Type 1 Operation Type 1 service is connectionless The protocol does not support acknowledgment, flow control or error control Only error detection and discard at the MAC level is supported Unnumbered Information PDU is used to exchange user data XID PDU is used to exchange type of operation and window size TEST PDU is used for loopback testing

LLC Type 2 Operation This service provides logical connection between service access points (SAPs) The service supports flow control, sequencing, and error contrl The protocol uses all three types of PDU formats to establish and manage a connection Information frames, I-frame, to carry user data and sequence numbers, N(S) and N(R) Supervisory frames, S-frames, to enforce flow control Unnumbered frames, U-frames, for connection management (SABME, and DISC), connection rejection (DM), acknowledge unnumbered commands (UA), and report on unacceptable frames (FRMR)

LLC Type 3 Operation This type of operation requires that each PDU transmitted is acknowledged A new type of frame is used to carry this service, Acknowledged Connectionless (AC) Information PDU User data is sent in AC command PDU, and must acknowledged using AC response PDU

Conclusion Discussed multiaccess protocols Contention-based schemes Token-based schemes Discussed logical link control sublayer design issues