CS 43: Computer Networks Media Access. Kevin Webb Swarthmore College November 30, 2017

Similar documents
CS 43: Computer Networks. 27: Media Access Contd. December 3, 2018

ECE 4450:427/527 - Computer Networks Spring 2017

The Link Layer and LANs. Chapter 6: Link layer and LANs

Outline. Introduction to Networked Embedded Systems - Embedded systems Networked embedded systems Embedded Internet - Network properties

CS 455/555 Intro to Networks and Communications. Link Layer

1-1. Switching Networks (Fall 2010) EE 586 Communication and. November 8, Lecture 30

Chapter 5 Link Layer and LANs

Lecture 6. Data Link Layer (cont d) Data Link Layer 1-1

Chapter 5: Link layer

CMPE 150/L : Introduction to Computer Networks. Chen Qian Computer Engineering UCSC Baskin Engineering Lecture 16

CS 3516: Computer Networks

MULTIPLE ACCESS PROTOCOLS 2. 1

Topics. Link Layer Services (more) Link Layer Services LECTURE 5 MULTIPLE ACCESS AND LOCAL AREA NETWORKS. flow control: error detection:

Multiple Access Links and Protocols

Chapter 5 Link Layer. Computer Networking: A Top Down Approach. 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012

Lecture 8 Link Layer: functionality, error detection, media access algorithm

Data Link Layer: Multi Access Protocols

CSC 4900 Computer Networks: The Link Layer

Computer Networks. Today. Principles of datalink layer services Multiple access links Adresavimas, ARP LANs Wireless LANs VU MIF CS 1/48 2/48

Link Layer and LANs 안상현서울시립대학교컴퓨터 통계학과.

Physical Layer. Medium Access Links and Protocols. Point-to-Point protocols. Modems: Signaling. Modems Signaling. Srinidhi Varadarajan

Lecture 19. Principles behind data link layer services Framing Multiple access protocols

Link layer, LANs: outline. Chapter 5-1 Link Layer. Link layer: introduction. Link layer services

CC451 Computer Networks

Adaptors Communicating. Link Layer: Introduction. Parity Checking. Error Detection. Multiple Access Links and Protocols

Data Link Layer: Overview, operations

Broadcast Links, Addressing and Media Access Control. Link Layer B. Link and Physical Layers. MAC Addresses

Chapter V: Link Layer

Lecture 8 The Data Link Layer part I. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it

Medium Access Control

Redes de Computadores. Medium Access Control

Computer Network Fundamentals Spring Week 3 MAC Layer Andreas Terzis

High Level View. EE 122: Ethernet and Random Access protocols. Medium Access Protocols

Goals of Today s Lecture. Adaptors Communicating

Master Course Computer Networks IN2097

EE 122: Ethernet and

Getting Connected (Chapter 2 Part 4) Networking CS 3470, Section 1 Sarah Diesburg

Links Reading: Chapter 2. Goals of Todayʼs Lecture. Message, Segment, Packet, and Frame

Module 10 Data Link Layer CS655! 10-1!

Computer Networks Medium Access Control. Mostafa Salehi Fall 2008

Chapter 5 Link Layer and LANs

Lecture 5 The Data Link Layer. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it

CSE 461: Multiple Access Networks. This Lecture

Master Course Computer Networks IN2097

CSC 401 Data and Computer Communications Networks

transferring datagram from one node data-link layer has responsibility of to adjacent node over a link 5-1 TDTS06 Computer networks

CSCD 330 Network Programming

Links. CS125 - mylinks 1 1/22/14

Lecture 6 The Data Link Layer. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it

CMPE 150: Introduction to Computer Networks

CHAPTER 7 MAC LAYER PROTOCOLS. Dr. Bhargavi Goswami Associate Professor & Head Department of Computer Science Garden City College

Chapter 6: Link layer and LANs. Link layer, LANs: outline. Link layer: introduction. Link layer: context. Link layer services (more)

Links. Error Detection. Link Layer. Multiple access protocols. Nodes Links Frame. Shared channel Problem: collisions How nodes share a channel

CSCD 330 Network Programming Fall 2012

Chapter 12 Multiple Access 12.1

Adaptors Communicating. Link Layer: Introduction. Parity Checking. Error Detection. Multiple Access Links and Protocols

Message, Segment, Packet, and Frame Link-layer services Encoding, framing, error detection, transmission control Error correction and flow control

CSE 461 Multiple Access. David Wetherall

CMPE 257: Wireless and Mobile Networking

COMP/ELEC 429/556 Introduction to Computer Networks

Aloha and slotted aloha

Link Layer: Retransmissions

Chapter V: Link Layer

CSE 461: Multiple Access. Homework: Chapter 2, problems 1, 8, 12, 18, 23, 24, 35, 43, 46, and 58

Link Layer and LANs. CMPS 4750/6750: Computer Networks

CMPE 257: Wireless and Mobile Networking

Data Link Layer -2- Network Access

Lecture 9: Bridging. CSE 123: Computer Networks Alex C. Snoeren

Medium Access Control

Data Link Layer -2- Network Access

SC250 Computer Networking I. Link Layer. Prof. Matthias Grossglauser LCA/I&C.

Medium Access Control. MAC protocols: design goals, challenges, contention-based and contention-free protocols

CSE/EE 461 Wireless and Contention-Free Protocols

Chapter 5 Link Layer. Computer Networking: A Top Down Approach. 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012

CARRIER SENSE MULTIPLE ACCESS (CSMA):

Chapter 6 The Link Layer and LANs

Chapter 5 Link Layer and LANs

Random Access. 1. Aloha. 2. Slotted Aloha 3. CSMA 4. CSMA/CD

COS 140: Foundations of Computer Science

Chapter 5: DataLink Layer

CS 3640: Introduction to Networks and Their Applications

COMP476 Networked Computer Systems. Polling. Sharing the Wire. LAN Technologies. COMP476 Networked Computer Systems 1

Wireless Communications

The Link Layer II: Ethernet

EITF25 Internet Techniques and Applications L4: Network Access. Stefan Höst

Contention Protocols and Networks

Link Layer: Introduction. Chapter 5 Link Layer & LANS. Link layer: context. Link Layer Services

Link Layer: Introduction. Chapter 5 Link Layer & LANS. Link layer: context. Link Layer Services

Chapter 4 Network Layer

Mobile Communications Chapter 3 : Media Access

COS 140: Foundations of Computer Science

Medium Access Control

ECEN 5032 Data Networks Medium Access Control Sublayer

Multiple Access Protocols

Your Future?! Links and LANs! Regrading of Homework! Other Announcements! Goals of Todayʼs Lecture! Link-Layer Services!

ECE 158A: Lecture 13. Fall 2015

Module 4 Data Link Layer CS655! 4-1!

Reminder: Datalink Functions Computer Networking. Datalink Architectures

CSCI Computer Networks Fall 2016

IEEE , Token Rings. 10/11/06 CS/ECE UIUC, Fall

Transcription:

CS 43: Computer Networks Media Access Kevin Webb Swarthmore College November 30, 2017

Multiple Access Links & Protocols Two classes of links : point-to-point dial-up access link between Ethernet switch, host broadcast (shared wire or medium) old-fashioned Ethernet 802.11 wireless LAN shared wire (e.g., wired Ethernet) shared RF (e.g., 802.11 WiFi) shared RF (satellite)

Multiple Access Protocols Broadcast channel - every host hears every transmission If two or more nodes simultaneously transmit: collision if node receives two or more signals at the same time multiple access protocol algorithm that determines how nodes share channel, i.e., determine when node can transmit communication about channel sharing must use channel itself! no out-of-band channel for coordination

An ideal multiple access protocol Given: broadcast channel of rate R bps 1. if only one node wants to transmit, it can send at rate R. 2. when M nodes want to transmit, each can send at average rate R/M (fairness) 3. fully decentralized: no synchronization of clocks, slots no special node to coordinate transmissions 4. simple

Media Access Control (MAC) Strategies channel partitioning divide channel into smaller pieces (time slots, frequency, code) allocate piece to node for exclusive use random access channel not divided, allow collisions recover from collisions taking turns nodes coordinate with one another to take turns, share channel

Channel partitioning MAC protocols: TDMA TDMA: time division multiple access Access to channel in rounds, like round robin Each node gets fixed length time slot (length = pkt trans time) in each round Example: 6-station LAN, 1,3,4 have pkt, slots 2,5,6 idle 6-slot frame 6-slot frame 1 3 4 1 3 4 Time ->

frequency bands Channel partitioning MAC protocols: FDMA FDMA: frequency division multiple access Channel spectrum divided into frequency bands Each node assigned a fixed frequency band Example: 6-station LAN, 1,3,4 have pkt, bands 2,5,6 idle FDM cable

How many of our ideal properties does channel partitioning give us? 1. if only one node wants to transmit, it can send at rate R. 2. when M nodes want to transmit, each can send at average rate R/M (fairness) 3. fully decentralized: no synchronization of clocks, slots no special node to coordinate transmissions 4. simple A. 0 B. 1 C. 2 D. 3 E. 4 (Which ones?)

Do we use channel partitioning? In what applications might this be a good idea? Terrestrial radio/tv (frequency division) Satellite (frequency division) Fiber optic links (wavelength division) Cell phones Old generations (time division) Current generation (code division)

Random Access Protocols When node has a packet to send, try to send it no a priori coordination among nodes Two or more transmitting nodes collision random access MAC protocol specifies: how to minimize collisions how to detect collisions how to recover from collisions (e.g., via delayed retransmissions)

ALOHAnet (Unslotted / Pure) Norm Abramson at U of Hawaii in late 1960 s Goal: network between islands Shared medium: radio Hub

ALOHAnet If user gives you data, send it all, immediately. Hub

ALOHAnet If the hub received everything, it sends ACK. Hub

ALOHAnet If two senders collide hub sends back no ACKs. Senders wait a random time, send again. *crickets* Hub

(Unslotted / Pure) ALOHA Problems: Sends immediately upon receiving data Sends entire packets all at once

Carrier Sensing Multiple Access (CSMA) CSMA: listen before transmit: if channel sensed idle: transmit if channel sensed busy, defer transmission human analogy: don t interrupt others!

CSMA collisions spatial layout of nodes Collisions can still occur: propagation delay means two nodes may not hear each other s transmission Collision: entire packet transmission time wasted distance & propagation delay play role in in determining collision probability

CSMA/CD (Collision Detection) CSMA/CD: carrier sensing, deferral as in CSMA collisions detected within short time colliding transmissions aborted, freeing channel Collision detection: easy in wired LANs: measure signal strengths, compare transmitted, received signals difficult in wireless LANs: received signal strength overwhelmed by local transmission strength

CSMA/CD (collision detection) spatial layout of nodes

Ethernet and CSMA/CD 1. NIC receives datagram from network layer, creates frame 2. If NIC senses channel idle, starts frame transmission. If NIC senses channel busy, waits until channel idle, then transmits. 3. If NIC transmits entire frame without detecting another transmission, NIC is done with frame! 4. If NIC detects another transmission while transmitting, aborts and sends jam signal 5. After aborting, NIC enters binary (exponential) backoff

Exponential Back off After mth collision, NIC chooses K at random from {0,1,2,, 2 m -1}. NIC waits K 512 bit times, then returns to checking if the channel is idle Longer back off interval with more collisions

How many of our ideal properties does CSMA/CD give us? 1. if only one node wants to transmit, it can send at rate R. 2. when M nodes want to transmit, each can send at average rate R/M (fairness) 3. fully decentralized: no synchronization of clocks, slots no special node to coordinate transmissions 4. simple A. 0 B. 1 C. 2 D. 3 E. 4 (Which ones?)

Taking turns MAC protocols Polling: leader node invites follower nodes to transmit in turn typically used with dumb follower devices Concerns: polling overhead latency centralized leader data followers data poll leader

Taking turns MAC protocols Token passing: Control token passed from one node to next sequentially. T Can only transmit if holding the token. (nothing to send) T Limit on number of bytes sent per token. data

How many of our ideal properties does taking turns (token passing) give us? 1. if only one node wants to transmit, it can send at rate R. 2. when M nodes want to transmit, each can send at average rate R/M (fairness) 3. fully decentralized: no synchronization of clocks, slots no special node to coordinate transmissions 4. simple A. 0 B. 1 C. 2 D. 3 E. 4 (Which ones?)

In Practice Techniques often combined. Book describes DOCSIS in 6.3.4 What about wireless Ethernet? Old joke: I don t know what the next link layer technology will look like, but I m sure it will be named Ethernet.

WiFi (802.11) Senders do carrier sensing like Ethernet. I m waiting Assumes hosts can hear each other!

Hidden Terminal Problem Senders collide at receiver, but they can t hear each other!

CSMA/CA (Collision Avoidance) If sending small (threshold configurable) frame, just send it.

CSMA/CA (Collision Avoidance) If sending large frame, ask for permission first. Request to send. (RTS)

CSMA/CA (Collision Avoidance) If granted, it will be heard by everyone. Clear to send. (CTS)

CSMA/CA (Collision Avoidance) RTS/CTS is like taking turns.

Summary of MAC protocols channel partitioning, by time, frequency or code Time Division, Frequency Division random access (dynamic), ALOHA, S-ALOHA, CSMA, CSMA/CD carrier sensing: easy in some technologies (wire), hard in others (wireless) CSMA/CD used in Ethernet CSMA/CA used in 802.11 taking turns Polling from central site, token passing Bluetooth, FDDI, token ring