Media Access Control. Networked Systems (H) Lecture 5

Similar documents
Multiple Access Protocols

CHAPTER 7 MAC LAYER PROTOCOLS. Dr. Bhargavi Goswami Associate Professor & Head Department of Computer Science Garden City College

CS 43: Computer Networks. 27: Media Access Contd. December 3, 2018

Data Link Layer: Collisions

COS 140: Foundations of Computer Science

CS 43: Computer Networks Media Access. Kevin Webb Swarthmore College November 30, 2017

Multiple Access. Data Communications and Networking

Data Link Layer -2- Network Access

CS 716: Introduction to communication networks. - 8 th class; 17 th Aug Instructor: Sridhar Iyer IIT Bombay

Data Link Layer -2- Network Access

COS 140: Foundations of Computer Science

ECE 4450:427/527 - Computer Networks Spring 2017

Chapter 12 Multiple Access 12.1

Aloha and slotted aloha

CARRIER SENSE MULTIPLE ACCESS (CSMA):

Data Link Layer. Goals of This Lecture. Engineering Questions. Outline of the Class

EITF25 Internet Techniques and Applications L4: Network Access. Stefan Höst

ECE453 Introduction to Computer Networks. Broadcast vs. PPP. Delay. Lecture 7 Multiple Access Control (I)

Outline. Introduction to Networked Embedded Systems - Embedded systems Networked embedded systems Embedded Internet - Network properties

Link Layer. (continued)

CS 716: Introduction to communication networks. - 9 th class; 19 th Aug Instructor: Sridhar Iyer IIT Bombay

Medium Access Control. IEEE , Token Rings. CSMA/CD in WLANs? Ethernet MAC Algorithm. MACA Solution for Hidden Terminal Problem

Link Layer: Retransmissions

LANs. Local Area Networks. via the Media Access Control (MAC) SubLayer. Networks: Local Area Networks

Goals of Today s Lecture. Adaptors Communicating

Outline: Connecting Many Computers

IEEE , Token Rings. 10/11/06 CS/ECE UIUC, Fall

Mobile Communications Chapter 3 : Media Access

Contention Protocols and Networks

COMP476 Networked Computer Systems. Polling. Sharing the Wire. LAN Technologies. COMP476 Networked Computer Systems 1

CSE 461: Multiple Access Networks. This Lecture

Message, Segment, Packet, and Frame Link-layer services Encoding, framing, error detection, transmission control Error correction and flow control

Lecture 4: Wireless MAC Overview. Hung-Yu Wei National Taiwan University

1-1. Switching Networks (Fall 2010) EE 586 Communication and. November 8, Lecture 30

Data Link Layer, Part 3 Medium Access Control. Preface

Local Area Networks (LANs) SMU CSE 5344 /

CS 3640: Introduction to Networks and Their Applications

LANs Local Area Networks LANs provide an efficient network solution : To support a large number of stations Over moderately high speed

Physical Layer. Medium Access Links and Protocols. Point-to-Point protocols. Modems: Signaling. Modems Signaling. Srinidhi Varadarajan

RMIT University. Data Communication and Net-Centric Computing COSC 1111/2061/1110. Lecture 8. Medium Access Control Methods & LAN

COMP/ELEC 429/556 Introduction to Computer Networks

Data Link Layer: Overview, operations

Chapter 6 Medium Access Control Protocols and Local Area Networks

Random Assignment Protocols

Medium Access Control

Markov Chains and Multiaccess Protocols: An. Introduction

LECTURE PLAN. Script. Introduction about MAC Types o ALOHA o CSMA o CSMA/CD o CSMA/CA

Direct Link Networks (II)

Wireless Communications

Reminder: Datalink Functions Computer Networking. Datalink Architectures

Ethernet. Introduction. CSE 3213 Fall 2011

Computer Networks Medium Access Control. Mostafa Salehi Fall 2008

Topics. Link Layer Services (more) Link Layer Services LECTURE 5 MULTIPLE ACCESS AND LOCAL AREA NETWORKS. flow control: error detection:

The MAC layer in wireless networks

Introduction to Wireless Networking CS 490WN/ECE 401WN Winter Lecture 4: Wireless LANs and IEEE Part II

MULTIPLE ACCESS PROTOCOLS 2. 1

MAC LAYER. Murat Demirbas SUNY Buffalo

CCM 4300 Lecture 5 Computer Networks, Wireless and Mobile Communications. Dr Shahedur Rahman. Room: T115

CSE/EE 461 Wireless and Contention-Free Protocols

Link Layer and LANs 안상현서울시립대학교컴퓨터 통계학과.

Computer Network Fundamentals Spring Week 3 MAC Layer Andreas Terzis

Lecture 19. Principles behind data link layer services Framing Multiple access protocols

Wireless Medium Access Control Protocols

Lecture 9: Bridging. CSE 123: Computer Networks Alex C. Snoeren

Data Link Layer, Part 5. Medium Access Control

Data Communications. Automatic Repeat Request Medium Access Control

1999, Scott F. Midkiff

Links. CS125 - mylinks 1 1/22/14

CS 455/555 Intro to Networks and Communications. Link Layer

Medium Access Control

Random Access. 1. Aloha. 2. Slotted Aloha 3. CSMA 4. CSMA/CD

ECEN 5032 Data Networks Medium Access Control Sublayer

Mobile Wireless Networking Medium Access Control

CS 3516: Computer Networks

Strengthening Unlicensed Band Wireless Backhaul

ECE 158A: Lecture 13. Fall 2015

CMPE 257: Wireless and Mobile Networking

Introduction to Real-Time Communications. Real-Time and Embedded Systems (M) Lecture 15

Links Reading: Chapter 2. Goals of Todayʼs Lecture. Message, Segment, Packet, and Frame

Link layer, LANs: outline. Chapter 5-1 Link Layer. Link layer: introduction. Link layer services

Telecommunication Protocols Laboratory Course. Lecture 2

High Level View. EE 122: Ethernet and Random Access protocols. Medium Access Protocols

EITF25 Internet- - Techniques and Applica8ons Stefan Höst. L5 Data link (part 2)

Local Area Networks transmission system private speedy and secure kilometres shared transmission medium hardware & software

Real-Time (Paradigms) (47)

CSCD 330 Network Programming

The Link Layer and LANs. Chapter 6: Link layer and LANs

CPE 448/548 Exam #1 (100 pts) February 14, Name Class: 448

EE 122: Ethernet and

Lecture 8 Link Layer: functionality, error detection, media access algorithm

Data and Computer Communications

Packet multiple access and the Aloha protocol

Chapter 5 Link Layer. Computer Networking: A Top Down Approach. 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012

Access Technologies! Fabio Martignon

ICE 1332/0715 Mobile Computing (Summer, 2008)

Link Layer I: ALOHA, Time-, Frequency-, and Code Division. COS 463: Wireless Networks Lecture 4 Kyle Jamieson

The MAC layer in wireless networks

Sharing Channels CS 118

LAN. CS 4/55231 Internet Engineering. Kent State University Dept. of Computer Science

Lecture 6. Data Link Layer (cont d) Data Link Layer 1-1

Transcription:

Media Access Control Networked Systems (H) Lecture 5

Lecture Outline Controlling access to the channel Link contention Media access control protocols Contention-based protocols CSMA/CD Token ring Slotted TDMA 2

Controlling Access to the Channel Links may be point-to-point or multi-access How to arbitrate access to the link? Point-to-point links typically two unidirectional links Separate physical cables for each direction Need framing in each direction, but there is no contention for the link ARQ with stop-and-wait or sliding-window for flow control Multi-access links typically share a bidirectional link A single physical cable nodes contend for access to the link A single radio frequency 3

Link Contention A collision occurs if two hosts transmit simultaneously A X C Signals overlap: only garbage received B A B 4

Media Access Control (MAC) Protocols Manage/avoid collisions with media access control protocol Contention based (ALOHA, CSMA/CD, etc.) Token based (Token ring) Slotted (TDMA) Different degrees of fairness, access policies, etc. 5

Contention-based MAC Multiple hosts share channel in a way that can lead to collisions: system is contention-based Two-stage access to channel: Detect that a collision is occurring/will occur By listening to the channel while/before sending Send if no collision, or back-off and/or retransmit data according to some algorithm to avoid/resolve collision Back-off delay randomised and increasing to prevent repeated collisions Can be arranged to give priority to certain hosts/users/traffic classes Probabilistic, variable latency, access to channel 6

The ALOHA Network Wireless network developed at the University of Hawaii (1970) The first wireless packet switched network Simplest contention-based MAC Try to transmit whenever data is available If a collision occurs, wait random amount of time then retransmit; repeat until successful Simple, but poor performance Low channel utilisation; long delays A B C D E Collision, resend Collision, resend Time 7

Carrier Sense Multiple Access When propagation delay low, listen before sending If another transmission is active: back-off as if collision occurred, without sending anything A Why does propagation delay matter?? B If link is idle, send data immediately Improves utilisation Active transmissions not disrupted by collisions Only the new sender backs-off if the channel is active A starts transmitting B listens, hears no traffic (message from A hasn t reached it yet) B starts transmitting Collision occurs, as messages overlap in transit; smaller propagation delay less likely to occur 8

CSMA/CD High propagation delay increased collision rate CSMA updated with collision detection (CSMA/CD) Listen to channel before, and while, transmitting data If collision occurs, immediately stop sending, back-off, and retransmit Collision still corrupts both packets But, time channel is blocked due to collisions is reduced better performance than plain CSMA Examples: Ethernet, 802.11 Wi-Fi 9

CSMA/CD: How to Back-Off? CSMA/CD uses back-off to avoid/resolve collisions How long is the back-off interval? Should be random to avoid deterministic repeated collisions Should increase with the number of collisions that affect a transmission repeated collisions signal congestion; reduce transmission rate allows the network to recover Good strategy: Initial back-off interval x seconds ± 50% Each repeated collision before success, x 2x 10

Token-based MAC Contention-based MAC protocols have poor worst case performance Repeated collisions can cause arbitrarily long delays and unpredictable variation in throughput Alternative: token-based protocols Hosts circulate a token on the ring when they have no data to send Token Ring Host wanting to send waits for, and removes, the token, sends one packet, then restarts the token circulating Token circulation enforces round robin transmission, bounds maximum wait time before host can transmit Enforces fairness between hosts on the ring, but reduces utilisation Example: IBM Token Ring 11

Slotted MAC Split channel access into transmission slots Time division media access (TDMA) control when hosts can transmit data Frequency slots control which frequency bands hosts use to transmit data Controller assigns each host a transmission slot Gives a limited, but guaranteed, capacity per-sender Bounds delay variation due to channel access Provides fairness guarantee Example: GSM mobile phones 124 frequency bands, each 200 khz wide 8 slots TDM within each frequency band 12

Design Trade-Off Which is best contention, token, or slotted MAC? As usual, it depends on the application Contention protocols cheaper, hardware more readily available, but cannot guarantee real-time performance Token-based or slotted protocols offer stricter performance guarantees, but are more expensive and need less widely available hardware 13

Summary Media access control protocols Contention-based protocols CSMA/CD Token ring Slotted TDMA Fairness, throughput, and latency variation 14