MAC Sublayer(1) Principal service of the Medium Access Control Sublayer: Allocating a single broadcast channel (mostly a LAN) among competing users

Similar documents
ECEN 5032 Data Networks Medium Access Control Sublayer

Chapter 4. The Medium Access Control Sublayer. Points and Questions to Consider. Multiple Access Protocols. The Channel Allocation Problem.

The Medium Access Control Sublayer

Chapter 4. The Medium Access Control Sublayer

ECE453 Introduction to Computer Networks. Broadcast vs. PPP. Delay. Lecture 7 Multiple Access Control (I)

Chapter 4 (Week 7) The Medium Access Control Sublayer ANDREW S. TANENBAUM COMPUTER NETWORKS FOURTH EDITION PP CN&DC Dr.

Real-Time (Paradigms) (47)

Jaringan Komputer. Broadcast Network. Outline. MAC (Medium Access Control) Channel Allocation Problem. Dynamic Channel Allocation

CMPE 257: Wireless and Mobile Networking

COS 140: Foundations of Computer Science

Multiple Access Links and Protocols

Data Link Layer: Collisions

CMPE 257: Wireless and Mobile Networking

Wireless Communications

Multiple Access Protocols

LANs. Local Area Networks. via the Media Access Control (MAC) SubLayer. Networks: Local Area Networks

Redes de Computadores. Medium Access Control

Lecture 4: Wireless MAC Overview. Hung-Yu Wei National Taiwan University

ECE 4450:427/527 - Computer Networks Spring 2017

Chapter 12 Multiple Access 12.1

LANs Local Area Networks LANs provide an efficient network solution : To support a large number of stations Over moderately high speed

COS 140: Foundations of Computer Science

Random Assignment Protocols

CS 716: Introduction to communication networks. - 8 th class; 17 th Aug Instructor: Sridhar Iyer IIT Bombay

CS 43: Computer Networks. 27: Media Access Contd. December 3, 2018

Unit 7 Media Access Control (MAC)

The MAC layer in wireless networks

Medium Access Control Sublayer Chapter 4

CS 43: Computer Networks Media Access. Kevin Webb Swarthmore College November 30, 2017

CHAPTER 7 MAC LAYER PROTOCOLS. Dr. Bhargavi Goswami Associate Professor & Head Department of Computer Science Garden City College

Multiple Access. Data Communications and Networking

Computer Networks. Medium Access Sublayer (Part I)

Data Link Layer -2- Network Access

Aloha and slotted aloha

The MAC layer in wireless networks

Link Layer: Retransmissions

Medium Access Control. MAC protocols: design goals, challenges, contention-based and contention-free protocols

Wireless Local Area Networks. Networks: Wireless LANs 1

CSE 461: Multiple Access Networks. This Lecture

Announcements / Wireless Networks and Applications Lecture 9: Wireless LANs Wireless. Regular Ethernet CSMA/CD.

COMMUNICATION NETWORKS NETW 501

Data Link Layer -2- Network Access

Outline. Introduction to Networked Embedded Systems - Embedded systems Networked embedded systems Embedded Internet - Network properties

Telecommunication Protocols Laboratory Course. Lecture 2

Wireless LAN. Access Point. Provides network connectivity over wireless media

Medium Access Control Sublayer Chapter 4

Wireless Local Area Networks (WLANs)) and Wireless Sensor Networks (WSNs) Computer Networks: Wireless Networks 1

Wireless Communication and Networking CMPT 371

CS 123: Lecture 12, LANs, and Ethernet. George Varghese. October 24, 2006

ICE 1332/0715 Mobile Computing (Summer, 2008)

Wireless LAN -Architecture

EITF25 Internet Techniques and Applications L4: Network Access. Stefan Höst

The Link Layer and LANs. Chapter 6: Link layer and LANs

Data Communications. Automatic Repeat Request Medium Access Control

Data and Computer Communications. Chapter 13 Wireless LANs

Chapter 6 Medium Access Control Protocols and Local Area Networks

Intelligent Transportation Systems. Medium Access Control. Prof. Dr. Thomas Strang

Computer Networks Medium Access Control. Mostafa Salehi Fall 2008

Wireless Medium Access Control Protocols

The Medium Access Control Scheme (MAC Layer) Reference: Andrew S. Tanenbaum, Computer Networks, 3rd Edition, Prentice Hall, 1996.

Computer Network Fundamentals Spring Week 3 MAC Layer Andreas Terzis

CSE 461: Wireless Networks

Random Access. 1. Aloha. 2. Slotted Aloha 3. CSMA 4. CSMA/CD

COMPUTER NETWORKS - Local area networks

Local area networks. Copyright

1-1. Switching Networks (Fall 2010) EE 586 Communication and. November 8, Lecture 30

High Level View. EE 122: Ethernet and Random Access protocols. Medium Access Protocols

Lecture 6. Data Link Layer (cont d) Data Link Layer 1-1

Topics. Link Layer Services (more) Link Layer Services LECTURE 5 MULTIPLE ACCESS AND LOCAL AREA NETWORKS. flow control: error detection:

CSE/EE 461 Wireless and Contention-Free Protocols

Medium Access Control. CSCI370 Lecture 5 Michael Hutt New York Institute of Technology

Lecture 12 December 04, Wireless Access. Graduate course in Communications Engineering. University of Rome La Sapienza. Rome, Italy

04/11/2011. Wireless LANs. CSE 3213 Fall November Overview

CS 455/555 Intro to Networks and Communications. Link Layer

Medium Access Control Sublayer

EE 122: Ethernet and

CSE 461 Multiple Access. David Wetherall

Multiple-access protocols

COMP476 Networked Computer Systems. Polling. Sharing the Wire. LAN Technologies. COMP476 Networked Computer Systems 1

Physical Layer. Medium Access Links and Protocols. Point-to-Point protocols. Modems: Signaling. Modems Signaling. Srinidhi Varadarajan

Local Networks. Lecture 4 6-Apr-2016

Computer Communication III

Access Technologies! Fabio Martignon

Mobile Communications Chapter 3 : Media Access

MULTIPLE ACCESS PROTOCOLS 2. 1

Data Link Layer: Overview, operations

Chapter 6 Medium Access Control Protocols and Local Area Networks

Link Layer and LANs 안상현서울시립대학교컴퓨터 통계학과.

LECTURE PLAN. Script. Introduction about MAC Types o ALOHA o CSMA o CSMA/CD o CSMA/CA

Chapter 1 Basic concepts of wireless data networks (cont d)

Wireless Communication and Networking CMPT 371

Local Area Networks NETW 901

Chapter 4: The Medium Access Layer

CS/ECE 439: Wireless Networking. MAC Layer Road to Wireless

WiFi Networks: IEEE b Wireless LANs. Carey Williamson Department of Computer Science University of Calgary Winter 2018

CSC 4900 Computer Networks: The Link Layer

MSIT 413: Wireless Technologies Week 8

Data Link Layer. Goals of This Lecture. Engineering Questions. Outline of the Class

TSIN01 Information Networks Lecture 3

Wireless Local Area Networks (WLANs) and Wireless Sensor Networks (WSNs) Primer. Computer Networks: Wireless LANs

Transcription:

MAC Sublayer(1) Principal service of the Medium Access Control Sublayer: Allocating a single broadcast channel (mostly a LAN) among competing users Static Channel Allocation: Frequency Division Multiplexing (FDM) - each user (channel) has exclusive possession of some frequency band - FDM requires analog circuitry and is not amenable to being controlled by computer

MAC Sublayer(2) Time Division Multiplexing (TDM) - the user periodically (round robin) gets the entire bandwidth for a short time slot - TDM can be handled entirely by digital electronics (a computer) Main drawbacks of static allocation - raises problems (waste or lack of bandwidth) when number of users varies - inherently inefficient (in most computer systems, data traffic is extremely bursty (1000:1 ratios) Dynamic Channel Allocation: Underlying most of the work done in this area are 5 key assumptions: Station model Single channel assumption Collision assumption Continuous or Slotted time Carrier Sense or No Carrier Sense

MAC Sublayer(3) ALOHA most prominent representative of No Carrier Sense - protocols two versions: pure and slotted uniform frame (message units) size to maximize throughput Pure ALOHA Basic idea: Let users transmit whenever they have data to be sent

Vulnerable period for the shaded frame: MAC Sublayer(4) Throughput versus effective load (traffic) for ALOHA protocols:

MAC Sublayer(5) Slotted ALOHA Basic idea: Divide time into discrete intervals, each interval corresponding to one frame time Properties: Vulnerable period is halved Throughput is doubled Best case: - 37% successes (= maximum throughput) - 37% of the slots are empty - 26% collisions Small increases in the effective load can drastically reduce performance ---> Let us move to Carrier Sense Medium Access (CSMA) - protocols

MAC Sublayer(6) Types of CSMA protocols 1-persistent Behavior: When a station has data to send, it transmits with a probability of 1 whenever it finds the channel idle. If the channel is busy, the station waits until it becomes idle (greedy approach). nonpersistent Behavior: It differs from 1-persistent w.r.t. the case where the channel is busy.then, the station deliberately waits a random period of time before sensing the channel again. p-persistent (applies to slotted channels) Behavior: When a station has data to send, it transmits with a probability of p whenever it finds the channel idle. With a probability of q = 1- p it defers until the next slot and the same procedure iterates. If the channel has become busy meanwhile, the station waits a random time and starts again.if the channel is busy when first sensing it, the station waits until the next slot and repeats the procedure.

MAC Sublayer(7) Comparison of channel utilization versus load for the various random access protocols: Conceptual model of CSMA with Collision Detection (CSMA/CD):

MAC Sublayer(8) How to resolve the contention for the channel without any collisions at all, i.e. including the contention period? Assumptions: There are N stations, each with a unique address The contention interval is modeled as discrete contention slots with slot width 2 Basic question: Which station gets the channel after a successful transmission? The basic Bit - Map Protocol This protocol belongs to the class called reservation protocols.

MAC Sublayer(9) Performance analysis Assumptions: time is measured in units of the contention bit slot data frames consist of d time units waiting time T of a station:= time from being ready to sent until beginning of sending its contention bit Under conditions of low load (0 or 1 station ready to send) for low-numbered stations (<N/2): T = 1.5 N slots for high-numbered stations (>N/2): T = 0.5 N slots ---> mean T = N slots per frame : overhead = N bits amount of data = d bits ---> channel efficiency = d / (N + d) Under conditions of high load (all stations have something to send all time): channel efficiency = d / (d + 1) mean delay for a frame = N (d + 1) / 2 after getting to the head of the internal queue

MAC Sublayer(10) The Binary Countdown Protocol If the sender s address id the first field in the frame, channel efficiency is 100 %! Limited Contention Protocols Idea: Combine the best properties of the contention and the collision-free protocols

MAC Sublayer(11) Probability of channel acquisition for a symmetric contention protocol Consequence: Dynamic station assignment to slots depending on the load. Example: The Adaptive Tree Walk Protocol

MAC Sublayer(13) Wireless Networks New trend in information technology: Mobile Computing Aspects of mobility: User mobility: Users communicate via wireless infrastructure (wireless phones, laptops, Personal Digital Assistenants) Device mobility: devices can be connected via wireless links to surrounding IT infrastructure (computer peripherials, machines,mobile robots) Example applications Replacing wired networks in home / office environments Traffic control applications Data collection / diagnosis (hospitals, damage assesment) Hot spots (airports, hotels etc) Mobile robots, manufacturing

MAC Sublayer(13a) The Wireless LAN Protocols for the MAC layer Overlapping radio transmitter ranges: hidden station problem exposed station problem Solution Example: The MACA (Multiple Access with Collision Avoidance) protocol

MAC Sublayer(14) The IEEE 802.11 Standard 1997 cleared by IEEE, 1999 adopted as international standard by ISIO/IEC specifies MAC layer on top of 3 variants for physical layer (1 infrared, 2 radio) Ad-Hoc networks

MAC Sublayer(15) Infrastructure networks Medium access: CSMA/CA DCF (Distributed Coordination Function) PCF (Point Coordination Function), optionally

MAC Sublayer(17) PCF: A central access point grants access to the medium by polling the stations Broadcast Broadcast Poll Poll Poll Broadcast Poll Broadcast a good base for QoS group communication,but there are still...

MAC Sublayer(18) Distinguishing aspects of wireless LAN networks: no exact range limits for receiving messages no protection against unfriendly environment dynamic topologies not completely connected But High potential for many industrial applications

MAC Sublayer(19) The Problem: Usage of WLAN for reliable, real-time or even safety-critical applications, e.g. Automotive applications Robotics Industrial automation General Problem: Is it possible to give QoS (timing and reliability) guarantees for WLAN communication? Especially: Is it possible to give any QoS guarantees for WLAN communication in the presence of other interfering wireless communication?

MAC Sublayer(20) Remaining problems to be solved (w.r.t. reliable wireless communication on the MAC layer): Messages can be lost, even worse: Some stations may receive a message, some others may not Stations can crash Stations can be out of reach No timing guarantees are given Must make specific fault assumptions for giving any kind of guarantees