Direct Link Communication II: Wired Media. Multi-Access Communication

Similar documents
Direct Link Communication II: Wired Media. Multi-Access Communication

Chapter 4. The Medium Access Control Sublayer. Points and Questions to Consider. Multiple Access Protocols. The Channel Allocation Problem.

Media Access Control (MAC) Sub-layer and Ethernet

Jaringan Komputer. Broadcast Network. Outline. MAC (Medium Access Control) Channel Allocation Problem. Dynamic Channel Allocation

Part3. Local Area Networks (LAN)

Medium Access Control Sublayer

Redes de Computadores. Medium Access Control

CSE 461: Multiple Access Networks. This Lecture

Data Link Layer, Part 3 Medium Access Control. Preface

Chapter 4: The Medium Access Layer

Local Area Networks. Aloha Slotted Aloha CSMA (non-persistent, 1-persistent, p-persistent) CSMA/CD Ethernet Token Ring

Topics. Link Layer Services (more) Link Layer Services LECTURE 5 MULTIPLE ACCESS AND LOCAL AREA NETWORKS. flow control: error detection:

Introductory to Computer Networks Local Area Networks. Lecture 16 Fall Isfahan University of technology Dr.

Getting Connected (Chapter 2 Part 4) Networking CS 3470, Section 1 Sarah Diesburg

CSE 461: Multiple Access. Homework: Chapter 2, problems 1, 8, 12, 18, 23, 24, 35, 43, 46, and 58

Ethernet. Computer Networks. Lecture 4.

Lecture 4b. Local Area Networks and Bridges

More on LANS. LAN Wiring, Interface

Goals. Fundamentals of Network Media. More topics. Topics. Multiple access communication. Multiple access solutions

Computer Networks. Medium Access Sublayer (Part I)

High Level View. EE 122: Ethernet and Random Access protocols. Medium Access Protocols

Local Area Networks (LANs) SMU CSE 5344 /

Medium Access Control Sublayer Chapter 4

IEEE 802 LANs SECTION C

Networking Technologies and Applications

LAN PROTOCOLS. Beulah A AP/CSE

Lecture 9: Bridging. CSE 123: Computer Networks Alex C. Snoeren

EE 122: Ethernet and

Computer Networks Medium Access Control. Mostafa Salehi Fall 2008

Data Link Layer, Part 5. Medium Access Control

ECE 4450:427/527 - Computer Networks Spring 2017

Links Reading: Chapter 2. Goals of Todayʼs Lecture. Message, Segment, Packet, and Frame

Chapter 4. The Medium Access Control Sublayer

CS 43: Computer Networks. 27: Media Access Contd. December 3, 2018

Data and Computer Communications

Ethernet. Introduction. CSE 3213 Fall 2011

COS 140: Foundations of Computer Science

Communication and Networks. Problems

COS 140: Foundations of Computer Science

Lecture 6. Data Link Layer (cont d) Data Link Layer 1-1

RMIT University. Data Communication and Net-Centric Computing COSC 1111/2061/1110. Lecture 8. Medium Access Control Methods & LAN

CSCI-1680 Link Layer Wrap-Up Rodrigo Fonseca

CSCI-1680 Link Layer Wrap-Up Rodrigo Fonseca

ECE 4450:427/527 - Computer Networks Spring 2017

COMP/ELEC 429/556 Introduction to Computer Networks

Topics for Today. More on Ethernet. Wireless LANs Readings. Topology and Wiring Switched Ethernet Fast Ethernet Gigabit Ethernet. 4.3 to 4.

IEEE standards for local area networks

Links. Error Detection. Link Layer. Multiple access protocols. Nodes Links Frame. Shared channel Problem: collisions How nodes share a channel

The Medium Access Sublayer

EITF25 Internet Techniques and Applications L4: Network Access. Stefan Höst

Ethernet. Networks: Ethernet 1

The random access methods we study in this chapter have evolved from a very interesting protocol known as ALOHA, which used a very simple procedure

Computer Networks Principles LAN - Ethernet

CSCI-1680 Link Layer Wrap-Up Rodrigo Fonseca

CS 716: Introduction to communication networks. - 8 th class; 17 th Aug Instructor: Sridhar Iyer IIT Bombay

Medium Access Control Sublayer Chapter 4

The Link Layer and LANs. Chapter 6: Link layer and LANs

Access Technologies! Fabio Martignon

! High Data Rates (0.1 to 1000 Mbps)! Short Distances (0.1 to 25 km) ! Low Error Rate (10 to 10 ) Local Area Networks

CS 43: Computer Networks Media Access. Kevin Webb Swarthmore College November 30, 2017

CCNA Exploration Network Fundamentals. Chapter 09 Ethernet

Chapter 5 Link Layer and LANs

Data and Computer Communications. Chapter 11 Local Area Network

CMPE 150/L : Introduction to Computer Networks. Chen Qian Computer Engineering UCSC Baskin Engineering Lecture 16

ET4254 Communications and Networking 1

Objectives. Hexadecimal Numbering and Addressing. Ethernet / IEEE LAN Technology. Ethernet

CS 455/555 Intro to Networks and Communications. Link Layer

CSC 4900 Computer Networks: The Link Layer

Outline. Introduction to Networked Embedded Systems - Embedded systems Networked embedded systems Embedded Internet - Network properties

CSCI-1680 Link Layer Wrap-Up Rodrigo Fonseca

10- and 100-Mbps Ethernet

Data Link Layer: Multi Access Protocols

Summary of MAC protocols

ECSE-4670: Computer Communication Networks (CCN) Informal Quiz 3

Physical and Data Link layers

Introduction to Computer Networks. IEEE Ethernet

Ethernet Basics. based on Chapter 4 of CompTIA Network+ Exam Guide, 4 th ed., Mike Meyers

Link Layer and LANs 안상현서울시립대학교컴퓨터 통계학과.

Contention Protocols and Networks

LAN Systems. Bus topology LANs

Medium Access Protocols

Local Area Network Overview

Data Link Layer Technologies

Link Layer and Ethernet

Local Area Networks. Ethernet LAN

Link Layer and Ethernet

Chapter 5: Link layer

Medium Access Control. IEEE , Token Rings. CSMA/CD in WLANs? Ethernet MAC Algorithm. MACA Solution for Hidden Terminal Problem

Computer Networks. Lecture 8 Local Area Network, IEEE 802.x

Computer Networks. Today. Principles of datalink layer services Multiple access links Adresavimas, ARP LANs Wireless LANs VU MIF CS 1/48 2/48

LANs Local Area Networks LANs provide an efficient network solution : To support a large number of stations Over moderately high speed

Reminder: Datalink Functions Computer Networking. Datalink Architectures

Chapter 15 Local Area Network Overview

CSE 461 Multiple Access. David Wetherall

Internet Architecture and Protocol

Data Communication Prof. A. Pal Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Lecture # 29 High Speed LANs

CHAPTER 7 MAC LAYER PROTOCOLS. Dr. Bhargavi Goswami Associate Professor & Head Department of Computer Science Garden City College

LAN Protocols. Required reading: Forouzan 13.1 to 13.5 Garcia 6.7, 6.8. CSE 3213, Fall 2015 Instructor: N. Vlajic

Multiple Access Protocols

Lectures Ethernet

Transcription:

Direct Link Communication II: Wired Media Multi-Access Communication Two classes: contention-based e.g., CSMA/CD, CSMA/CA used in Ethernet, WLAN contention-free e.g., TDM, FDM, TDMA, CDMA, token ring one more method? used in telephony and broadband data networks

also called MAC (medium access control) broadband: FDM, TDMA, CDMA baseband: TDM, multiple access Contention-based MAC for baseband: keep in mind discussion group how to keep discussion orderly?

Features: Time slots are available for grab on-demand TDM Can listen to channel activity... To grab channel slot is to send shoot-first-ask-later (e.g., TV talk shows) If 2 users grab at the same time, slot becomes junk collision Why not just use TDM?

Benefits of contention-based MAC: when not too many users, faster response time don t need to go through registration & reservation phase (TDM) avoids admission control overhead decentralized no central coordinator simple; self-organization

Drawbacks of contention-based MAC: when many users, degraded response & throughput collision wastes slots, i.e., bandwidth lack of QoS (quality of service) assurances you get is what you get ; best effort problematic for real-time traffic, e.g., telephony Thus when to use what?

Ethernet and CSMA/CD copper, fiber Types: 10Base2 (ThinNet): coax, segment length 200 m, 30 nodes/segment 10Base5 (ThickNet): coax, segment length 500 m, 100 nodes/segment 10Base-T: twisted pair, segment length 100 m, 1024 nodes/segment 100Base-T (Fast Ethernet): category 5 UTP, fiber (also 100VG-AnyLAN) Gigabit & 10 Gbps Ethernet: fiber, category 5 UTP

Connectivity example: NIC NIC 1 2 BNC, DB-15 RJ-45 10Base-T coax cable transceiver (MAU) HUB 10Base2, 10Base5 category 3, 5 UTP single-homed vs. multi-homed unique Ethernet address per NIC physical network: bus vs. hub vs. switch very old vs. old vs. not-so-old

hub: multi-tap junction bus and hub: logically equivalent Wire segments can be hooked up by repeaters, bridges, hubs or switches. maximum of 2 (4 for IEEE 802.3) repeaters between two hosts; 1500 m for Fast Ethernet, 2 repeater hops High-speed Ethernets have shorter network diameter about 2500 m for 10 Mbps Ethernet about 200 m for 100 Mbps Ethernet even shorter for 1 Gbps Ethernet additional complications for medium-haul

DIX Ethernet frame: 8 6 6 2 46-1500 4 1 preamble source address dest. address body CRC type postamble IEEE 802.3 Ethernet frame: 8 6 6 2 46-1500 4 1 preamble source address dest. address body CRC length 8 postamble LLC header IEEE 802.2 LLC (Logical Link Control) common interface to different link protocols

Encoding: Manchester recall: Ethernet is baseband Addressing: 48 bit unique address point-to-point broadcast (all 1 s) Receiver: Ethernet adaptor accepts frames with relevant address. accepts only own frame address accepts all frames: promiscuous mode NIC feature sniffing

CSMA/CD MAC: CS (Carrier Sense): can detect if some other node is using the link rule: if busy, abstein MA (Multiple Access): multiple nodes are allowed simultaneous access rule: if channel seems silent, send CD (Collision Detection): can detect if collision due to simultaneous access has occured rule: if collision, retry later Wired vs. wireless media: CD is key difference diffcult to detect collision while transmitting

Signal propagation and collision: Bi-directional propagation terminator absorbs signal: prevent bounce back terminator Best-case collision: 2 stations meet in the middle worst-case? collision

Worst-case collision scenario: τ: one-way propagation delay sender needs to wait 2τ sec before detecting collision for 2500 m length, 51.2 µs round-trip time (2τ) fact enforce 51.2 µs slot time at 10 Mbps, 512 bits; i.e., minimum frame size assures collision detection

Transmit at least 512 bits 6+6+2+46+4=64B=512bits note: delay-bandwidth product Retry upon collision: exponential backoff 1. Wait for random 0 X 51.2 µs before first retry 2. On i th collision, wait for 0 X 2 i 1 51.2 µs before next attempt 3. Give up if i>16 a form of stop-and-wait what s the ACK? guaranteed reliability? pretty drastic measure: necessary?

CSMA/CD Throughput approximate analysis in simplified setting Assumptions: time is slotted slot duration: 2τ k hosts; each host transmits with probability p at every slot transmission behavior among hosts independent transmission behavior across slots independent

New performance metric: utilization (ϱ) fraction of total bandwidth attained 0 ϱ 1 captures efficiency and wastage In slotted CSMA/CD: fraction of usefully used slots what are uselessly used slots?

Ex.: snapshot of baseband channel over 10 time slots blue: successfully transmitted frames brown: collided frames utilization ϱ? 1 2 3 4 5 6 7 8 9 10 One more viewpoint: note: useful and useless periods alternate good bad good bad good 1 2 3 4 5 6 7 8 9 10

In the long run, ϱ = E[good] E[good] + E[bad] avrg. length of adjacent good and bad periods formula holds under mild conditions Next: calculate E[good] and E[bad]

Fix time slot. Probability that a fixed host acquires the slot successfully p(1 p) k 1 Probability that some host acquires the slot why? η = kp(1 p) k 1 Now, let s be generous and find p that maximizes η upper bounding Fact: η is maximized at p =1/k. Also, lim η = lim k k many user assumption ( 1 1 k) k 1 =1/e. common practice to simplify expression (valid?)

Probability bad period persists for exactly i slots (1 η) i 1 η Thefore average bad period E[bad] = i(1 η) i 1 η =1/η i=0 E[bad] is in unit of slots. Convert to second: 2τ/η =2τe Similarly calculate E[good]; call it γ. Convert γ to second: where F : frame size (bits) B: bandwidth (bps) γf/b

Putting everything together where ϱ = = = = L: length of wire (meters) c: speed of light (m/s) E[good] E[good] + E[bad] γf/b γf/b +2τe γf/b γf/b +2Le/c 1 1+(2e/cγ)BL/F What does the formula say? For example, if B is increased, what must be done to maintain high utilization?

In practice today: switched Ethernet contention moved from bus to single point switch: star topology analogous to old telephone switch-boards Ethernet frames are logically scheduled includes buffering Diagram of output-buffered switch: Switching Fabric interconnection networks (e.g., shuffle-exchange) switching fabric: hardware

Ethernet switch emulates CSMA/CD backward compatibility use same frame format upon buffer overflow: send collision signal transparent to legacy host NIC awkward: instituted for incremental deployment Internet: new technology must respect legacy Ex.: 10Base-T, 100Base-T, 1000Base-T and 1000Base-X FE: 802.3u; GigE: 802.3ab and 802.3z negotiation: e.g., full/half duplex how can GigE overcome length limitation? e.g., supports 200 m as in FE

Slot time extension: frame format remains the same minimum slot time extended from 64 B to 512 B padding: transparent to legacy CSMA/CA also called carrier extension reconciliation sublayer between MAC and PHY Packet bursting: slot time extension alone problematic small frames: marginal increase in throughput allow burst of packets only first packet is padded & burst limit

Longer distances? e.g., 1000Base-LX Medium-haul GigE/10GigE (802.3ae): 500m, 5km, 40km CSMA/CD disabled purely point-to-point link switch-to-switch simpler backward compatibility: not an issue flow control pause frame to prevent buffer overflow QoS: 802.3p frame tagging conveys priority priority classes supported at switches