COMP/ELEC 429/556 Introduction to Computer Networks

Similar documents
High Level View. EE 122: Ethernet and Random Access protocols. Medium Access Protocols

EE 122: Ethernet and

CS 43: Computer Networks. 27: Media Access Contd. December 3, 2018

CS 43: Computer Networks Media Access. Kevin Webb Swarthmore College November 30, 2017

Chapter 6 Medium Access Control Protocols and Local Area Networks

Computer Network Fundamentals Spring Week 3 MAC Layer Andreas Terzis

Aloha and slotted aloha

ECE 4450:427/527 - Computer Networks Spring 2017

Outline. Introduction to Networked Embedded Systems - Embedded systems Networked embedded systems Embedded Internet - Network properties

Computer Networks Medium Access Control. Mostafa Salehi Fall 2008

Random Access. 1. Aloha. 2. Slotted Aloha 3. CSMA 4. CSMA/CD

Multiple Access Links and Protocols

CSE 461: Multiple Access Networks. This Lecture

Multiple Access (1) Required reading: Garcia 6.1, 6.2.1, CSE 3213, Fall 2010 Instructor: N. Vlajic

Computer Networks. Today. Principles of datalink layer services Multiple access links Adresavimas, ARP LANs Wireless LANs VU MIF CS 1/48 2/48

1-1. Switching Networks (Fall 2010) EE 586 Communication and. November 8, Lecture 30

The Link Layer and LANs. Chapter 6: Link layer and LANs

Links Reading: Chapter 2. Goals of Todayʼs Lecture. Message, Segment, Packet, and Frame

Protocols for Multiaccess Networks

Link Layer and Ethernet

Link Layer and LANs 안상현서울시립대학교컴퓨터 통계학과.

Chapter 12 Multiple Access 12.1

Topics. Link Layer Services (more) Link Layer Services LECTURE 5 MULTIPLE ACCESS AND LOCAL AREA NETWORKS. flow control: error detection:

Data Link Layer, Part 5. Medium Access Control

Link Layer and Ethernet

ECEN 5032 Data Networks Medium Access Control Sublayer

CS 716: Introduction to communication networks. - 9 th class; 19 th Aug Instructor: Sridhar Iyer IIT Bombay

CS 3640: Introduction to Networks and Their Applications

Data Link Layer: Multi Access Protocols

LANs. Local Area Networks. via the Media Access Control (MAC) SubLayer. Networks: Local Area Networks

ICE 1332/0715 Mobile Computing (Summer, 2008)

MULTIPLE ACCESS PROTOCOLS 2. 1

Physical Layer. Medium Access Links and Protocols. Point-to-Point protocols. Modems: Signaling. Modems Signaling. Srinidhi Varadarajan

CS 455/555 Intro to Networks and Communications. Link Layer

Getting Connected (Chapter 2 Part 4) Networking CS 3470, Section 1 Sarah Diesburg

COS 140: Foundations of Computer Science

Link Layer I: ALOHA, Time-, Frequency-, and Code Division. COS 463: Wireless Networks Lecture 4 Kyle Jamieson

COMP/ELEC 429/556 Introduction to Computer Networks

Lecture 6. Data Link Layer (cont d) Data Link Layer 1-1

CMPE 150/L : Introduction to Computer Networks. Chen Qian Computer Engineering UCSC Baskin Engineering Lecture 16

Summary of MAC protocols

The Link Layer II: Ethernet

Chapter 5: Link layer

Lecture 5 The Data Link Layer. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it

CSC 4900 Computer Networks: The Link Layer

Multiple Access Channels

Chapter 5 Link Layer and LANs

Medium Access Protocols

Chapter 4. The Medium Access Control Sublayer. Points and Questions to Consider. Multiple Access Protocols. The Channel Allocation Problem.

EITF25 Internet Techniques and Applications L4: Network Access. Stefan Höst

Link Layer: Retransmissions

Chapter 5 Link Layer and LANs

Medium Access Control

Lecture 6 The Data Link Layer. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it

Data Link Layer, Part 3 Medium Access Control. Preface

COS 140: Foundations of Computer Science

Jaringan Komputer. Broadcast Network. Outline. MAC (Medium Access Control) Channel Allocation Problem. Dynamic Channel Allocation

Direct Link Communication II: Wired Media. Multi-Access Communication

Redes de Computadores. Medium Access Control

Lecture 4: Wireless MAC Overview. Hung-Yu Wei National Taiwan University

Lecture 9: Bridging. CSE 123: Computer Networks Alex C. Snoeren

CHAPTER 7 MAC LAYER PROTOCOLS. Dr. Bhargavi Goswami Associate Professor & Head Department of Computer Science Garden City College

Link Layer. (continued)

COMPUTER NETWORKS - Local area networks

Local area networks. Copyright

Links. CS125 - mylinks 1 1/22/14

COMP/ELEC 429/556 Introduction to Computer Networks

Mobile Communications Chapter 3 : Media Access

Lecture 8 The Data Link Layer part I. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it

LANs Local Area Networks LANs provide an efficient network solution : To support a large number of stations Over moderately high speed

Goals of Today s Lecture. Adaptors Communicating

CSE 461: Multiple Access. Homework: Chapter 2, problems 1, 8, 12, 18, 23, 24, 35, 43, 46, and 58

Ethernet. Lecture 6. Outline. Ethernet - Physical Properties. Ethernet - Physical Properties. Ethernet

The MAC layer in wireless networks

Intelligent Transportation Systems. Medium Access Control. Prof. Dr. Thomas Strang

Contention Protocols and Networks

ECE453 Introduction to Computer Networks. Broadcast vs. PPP. Delay. Lecture 7 Multiple Access Control (I)

Packet multiple access and the Aloha protocol

Chapter V: Link Layer

Ethernet. Introduction. CSE 3213 Fall 2011

Ethernet. Typical Setup. Names. Operations. Operations Switch: No Collisions EECS 122. Hub: Single Collision Domain

Medium Access Control. CSCI370 Lecture 5 Michael Hutt New York Institute of Technology

Data Link Layer -2- Network Access

CSMA/CD (Collision Detection)

Lecture 6. Reminder: Homework 2, Programming Project 2 due on Thursday. Questions? Tuesday, September 13 CS 475 Networks - Lecture 6 1

Medium Access Control

Computer Networking Lecture 5 Data link Layer Access Control. Based on slides by Peter Steenkiste Copyright, Carnegie Mellon

Computer Networks. Medium Access Sublayer (Part I)

CMPE 257: Wireless and Mobile Networking

Data Link Layer: Overview, operations

Direct Link Communication II: Wired Media. Multi-Access Communication

Lecture 19. Principles behind data link layer services Framing Multiple access protocols

Chapter 5 Link Layer. Computer Networking: A Top Down Approach. 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012

Chapter 5 Link Layer and LANs

Adaptors Communicating. Link Layer: Introduction. Parity Checking. Error Detection. Multiple Access Links and Protocols

Chapter 4. The Medium Access Control Sublayer

Rahman 1. Application

CSE 461: Wireless Networks

Data Link Layer -2- Network Access

Multimedia Communication Services Traffic Modeling and Streaming

Transcription:

COMP/ELEC 429/556 Introduction to Computer Networks Broadcast network access control Some slides used with permissions from Edward W. Knightly, T. S. Eugene Ng, Ion Stoica, Hui Zhang T. S. Eugene Ng eugeneng at cs.rice.edu Rice University 1

Let s Begin with the Most Primitive Network T. S. Eugene Ng eugeneng at cs.rice.edu Rice University 2

500 meters Good Old 10BASE5 Ethernet (1976) T. S. Eugene Ng eugeneng at cs.rice.edu Rice University 3

200 meters Then Came 10BASE2 Ethernet (1980s) T. S. Eugene Ng eugeneng at cs.rice.edu Rice University 4

Twisted pair, 100 meters Then Came 10BASE-T Ethernet (1990) More: 100BASE-TX, 1000BASE-T At >= 10Gbit/s, broadcast no longer supported. T. S. Eugene Ng eugeneng at cs.rice.edu Rice University 5

Overview Ethernet (< 10Gbps) and Wi-Fi are both multiaccess technologies Broadcast medium, shared by many nodes/hosts Simultaneous transmissions will result in collisions Media Access Control (MAC) protocol required Rules on how to share medium T. S. Eugene Ng eugeneng at cs.rice.edu Rice University 6

Media Access Control Strategies Channel partitioning Divide channel into smaller pieces (e.g., time slots, frequencies) Allocate a piece to each host for exclusive use E.g. Time-Division-Multi-Access (TDMA) cellular network Taking-turns Tightly coordinate shared access to avoid collisions E.g. Token ring network Contention Allow collisions Recover from collisions E.g. Ethernet, Wi-Fi T. S. Eugene Ng eugeneng at cs.rice.edu Rice University 7

Contention Media Access Control Goals To share medium If two hosts send at the same time, collision results in no packet being received Thus, want to have only one host to send at a time Want high network utilization Want simple distributed algorithm Take a walk through history ALOHAnet 1971 Ethernet 1973 Wi-Fi 1997 T. S. Eugene Ng eugeneng at cs.rice.edu Rice University 8

ALOHAnet (Necessity is the mother of invention) Topology: Broadcast medium with multiple hosts Aloha Protocol: Whenever a host has a packet to send, it transmits the packet immediately The receiver acknowledges the packet immediately No ACK = collision. Wait a random time and retransmit T. S. Eugene Ng eugeneng at cs.rice.edu Rice University 9

Simple, but radical at the time Previous attempts all partitioned channel TDMA, FDMA, etc. Aloha optimized for the common case (few senders) and dealt with collisions through retries T. S. Eugene Ng eugeneng at cs.rice.edu Rice University 10

Trade-off Compared to TDMA In TDMA, you always have to wait your turn delay proportional to number of hosts In Aloha, a host can send immediately Aloha gives much lower send delay, at the price of lower maximum utilization (as we will see) T. S. Eugene Ng eugeneng at cs.rice.edu Rice University 11

Collisions in ALOHA Host Host Host T. S. Eugene Ng eugeneng at cs.rice.edu Rice University 12

Performance of ALOHA Performance questions: What is the collision probability? What is the maximum throughput? Notation: C: link bandwidth (bits/sec) s: packet size (bits) F: packet transmission time (sec) T. S. Eugene Ng eugeneng at cs.rice.edu Rice University 13

Collisions and Vulnerable Period Packet which collides with start of red packet Packet which collides with end of red packet Packet Vulnerable Period of red packet A packet will be in a collision if and only if another transmission begins in the vulnerable period of the packet Vulnerable period has the length of 2 packet transmission times T. S. Eugene Ng eugeneng at cs.rice.edu Rice University 14

Traffic Model Assume each host sends packets according to a Poisson process at average rate λ i packets per second 2 1 3 λ 1 λ λ 2 3 Aggregate average packet rate from all hosts (Poisson processes are additive) P[no_ frame _ sent _in _ t] = e λt + T. S. Eugene Ng eugeneng at cs.rice.edu Rice University 15

System Model Probability of collision Actual average packet rate carried including retransmissions T. S. Eugene Ng eugeneng at cs.rice.edu Rice University 16

Probability of Collision Packet which collides with start of red packet Packet which collides with end of red packet Packet Vulnerable Period of red packet 2F Recall that if Poisson events occur at rate λ, P(no event in T seconds) = e -λt p = P(some _ frame _ sent _in < 2F) =1 e G2F T. S. Eugene Ng eugeneng at cs.rice.edu Rice University 17

Throughput and Total Carried Load ρ = Re 2R λ = Ge 2FG R(normalized total carried load) = G C /s = FG ρ (normalized offered load) = p =1 e 2FG Fλ = FGe 2FG λ C / s = Fλ If stable, all offered traffic is serviced, and ρ is also the throughput. T. S. Eugene Ng eugeneng at cs.rice.edu Rice University 18

Maximum Throughput Maximum achievable throughput: Observe: if offered load >.18*C, unstable T. S. Eugene Ng eugeneng at cs.rice.edu Rice University 19

Performance of ALOHA (assume Poisson arrival) Maximum throughput approximately 18% of the capacity However, ALOHA is still used for its simplicity 3G phone call establishment T. S. Eugene Ng eugeneng at cs.rice.edu Rice University 20

Wireline Network: 802.3 Ethernet Bob Metcalfe named it after the disproven luminiferous ether as an "omnipresent, completely-passive medium for the propagation of electromagnetic waves" Broadcast technology host host host host host host host host Hub Carrier-sense multiple access with collision detection (CSMA/CD). MA = multiple access CS = carrier sense CD = collision detection T. S. Eugene Ng eugeneng at cs.rice.edu Rice University 21

Preamble: Ethernet Packet Structure 7 bytes with pattern 10101010 followed by one byte with pattern 10101011 Used to synchronize receiver, sender clock rates Addresses: 6 bytes, a packet is received by all adapters on a shared Ethernet and dropped if address does not match Length: 2 bytes, length of actual data CRC: 4 bytes, checked at receiver, if error is detected, the packet is simply dropped Data payload: maximum 1500 bytes, minimum 46 bytes If data is less than 46 bytes, pad with zeros to 46 bytes Length T. S. Eugene Ng eugeneng at cs.rice.edu Rice University 22

CSMA/CD Algorithm Sense for carrier i.e. an on-going transmission If carrier present, wait until carrier ends Sending now would force a collision and waste time Send packet and sense for collision If no collision detected, consider packet delivered Otherwise, abort immediately, perform exponential back off and send packet again Start to send at a random time picked from an interval Length of the interval increases with every retransmission T. S. Eugene Ng eugeneng at cs.rice.edu Rice University 23

Collision Example spatial layout of nodes along ethernet T. S. Eugene Ng eugeneng at cs.rice.edu Rice University 24

CSMA/CD (Collision Detection) Collision detection easy in wired Ethernet: compare transmitted and received signals Colliding transmissions aborted, reducing channel wastage T. S. Eugene Ng eugeneng at cs.rice.edu Rice University 25

Collision detection T. S. Eugene Ng eugeneng at cs.rice.edu Rice University 26

Minimum Packet Size Why require a minimum packet size? To give a host enough time to detect collisions In Ethernet, minimum packet size = 64 bytes (two 6- byte addresses, 2-byte type/length, 4-byte CRC, and 46 bytes of data) If host has less than 46 bytes to send, the adaptor pads (adds) bytes to make it 46 bytes What is the relationship between minimum packet size and the length of the Ethernet? T. S. Eugene Ng eugeneng at cs.rice.edu Rice University 27

Minimum Packet Size & Network Length a) Time = t; Host 1 starts to send packet Host 1 Host 2 propagation delay (d) b) Time = t + d; Host 2 starts to send a packet just before it hears Host 1 s packet Host 1 Host 2 propagation delay (d) c) Time = t + 2*d; Host 1 hears Host 2 s packet detects collision Host 1 Host 2 propagation delay (d) Network length <= (min_packet_size)*(propagation_speed)/(2*bandwidth) = = (8*64b)*(2.5*10 8 mps)/(2*10 7 bps) = 6400m approx T. S. Eugene Ng eugeneng at cs.rice.edu Rice University 28

Exponential Backoff Algorithm Ethernet uses the exponential backoff algorithms to determine when a station can retransmit after a collision Algorithm: Set slot time equal to 512bit time After first collision wait 0 or 1 slot times After i-th collision, wait a random number between 0 and 2 i -1 time slots Do not increase random number range, if i=10 Give up after 16 collisions T. S. Eugene Ng eugeneng at cs.rice.edu Rice University 29

802.3 Ethernet vs 802.11 Wi-Fi Ethernet: one shared collision domain 802.11: radios have small range compared to overall system: collisions are local collisions are at receiver, not sender carrier-sense plays different role CSMA/CA not CSMA/CD collision avoidance, not collision detection T. S. Eugene Ng eugeneng at cs.rice.edu Rice University 30

Collision Avoidance: The Problems Reachability is not transitive: if B can reach C, and C can reach D, it doesn t necessary mean that B can reach D A B C D Hidden node: A and C send packets to B; neither A nor C will detect the collision! Exposed node: B sends a packet to A; C hears this and decides not to send a packet to D, despite the fact that sending it will not cause interference at A or D! T. S. Eugene Ng eugeneng at cs.rice.edu Rice University 31

Multiple Access with Collision Avoidance (MACA) other node in sender s range RTS sender receiver CTS other node in receiver s range data ACK Before every data transmission Sender sends a Request to Send (RTS) packet containing the length of the transmission Receiver respond with a Clear to Send (CTS) packet Sender sends data Receiver sends an ACK; now another sender can send data When sender doesn t get a CTS/ACK back, it assumes collision T. S. Eugene Ng eugeneng at cs.rice.edu Rice University 32

Other Nodes When you hear a CTS, you keep quiet until scheduled transmission is over, that is you hear the ACK If you hear a RTS, but not the CTS, you can send interfering at source but not at receiver other node in sender s range sender receiver other node in receiver s range RTS CTS data ACK T. S. Eugene Ng eugeneng at cs.rice.edu Rice University 33

What about the Tesla? T. S. Eugene Ng eugeneng at cs.rice.edu Rice University 34

Wrap up A glimpse of the many challenges and ideas in broadcast network access control Wireless network access control is still an area for active research Many requirements such as power efficiency, low delay, high transmission success rate, etc. T. S. Eugene Ng eugeneng at cs.rice.edu Rice University 35