EITF25 Internet Techniques and Applications L4: Network Access. Stefan Höst

Similar documents
Data Link Layer -2- Network Access

Data Link Layer -2- Network Access

EITF25 Internet- - Techniques and Applica8ons Stefan Höst. L5 Data link (part 2)

Data Link Layer: Collisions

CHAPTER 7 MAC LAYER PROTOCOLS. Dr. Bhargavi Goswami Associate Professor & Head Department of Computer Science Garden City College

Multiple Access. Data Communications and Networking

Random Access. 1. Aloha. 2. Slotted Aloha 3. CSMA 4. CSMA/CD

COS 140: Foundations of Computer Science

Data and Computer Communications

Chapter 12 Multiple Access 12.1

Ethernet. Introduction. CSE 3213 Fall 2011

Protocols for Multiaccess Networks

LAN PROTOCOLS. Beulah A AP/CSE

Chapter 4. The Medium Access Control Sublayer

RMIT University. Data Communication and Net-Centric Computing COSC 1111/2061/1110. Lecture 8. Medium Access Control Methods & LAN

COS 140: Foundations of Computer Science

Topics. Link Layer Services (more) Link Layer Services LECTURE 5 MULTIPLE ACCESS AND LOCAL AREA NETWORKS. flow control: error detection:

Chapter 4. The Medium Access Control Sublayer. Points and Questions to Consider. Multiple Access Protocols. The Channel Allocation Problem.

Local Area Networks. Aloha Slotted Aloha CSMA (non-persistent, 1-persistent, p-persistent) CSMA/CD Ethernet Token Ring

CS 43: Computer Networks Media Access. Kevin Webb Swarthmore College November 30, 2017

Redes de Computadores. Medium Access Control

Access Technologies! Fabio Martignon

Chapter 6 Medium Access Control Protocols and Local Area Networks

ECE 4450:427/527 - Computer Networks Spring 2017

LANs. Local Area Networks. via the Media Access Control (MAC) SubLayer. Networks: Local Area Networks

Computer Network Fundamentals Spring Week 3 MAC Layer Andreas Terzis

Local Area Networks (LANs) SMU CSE 5344 /

Lecture 6: Example LAN: Ethernet

Networking Technologies and Applications

CS 43: Computer Networks. 27: Media Access Contd. December 3, 2018

Contention Protocols and Networks

Multiple Access Protocols

Lecture 05 Chapter 16 High Speed LANs

CSE 461: Multiple Access Networks. This Lecture

Medium Access Control Sublayer Chapter 4

Unit 7 Media Access Control (MAC)

Medium Access Control. CSCI370 Lecture 5 Michael Hutt New York Institute of Technology

The Medium Access Control Sublayer

CS 716: Introduction to communication networks. - 9 th class; 19 th Aug Instructor: Sridhar Iyer IIT Bombay

COMMUNICATION NETWORKS NETW 501

Data Link Layer. Goals of This Lecture. Engineering Questions. Outline of the Class

LANs Local Area Networks LANs provide an efficient network solution : To support a large number of stations Over moderately high speed

Data Link Layer Technologies

CARRIER SENSE MULTIPLE ACCESS (CSMA):

CSMA/CD (Collision Detection)

Data Link Layer, Part 3 Medium Access Control. Preface

Medium Access Control Sublayer

Introduction Computer Networks. Applications Requiring High Speed LANs. Why High Speed LANs? IEEE802.3 Medium Access Control

High Speed LANs. Range of technologies. Fast and Gigabit Ethernet Fibre Channel High Speed Wireless LANs. CS420/520 Axel Krings Page 2

CMPE 257: Wireless and Mobile Networking

Goals. Fundamentals of Network Media. More topics. Topics. Multiple access communication. Multiple access solutions

The random access methods we study in this chapter have evolved from a very interesting protocol known as ALOHA, which used a very simple procedure

Computer Networks. Medium Access Sublayer (Part I)

Multiple-access protocols

CCNA Exploration Network Fundamentals. Chapter 09 Ethernet

COMP476 Networked Computer Systems. Polling. Sharing the Wire. LAN Technologies. COMP476 Networked Computer Systems 1

Jaringan Komputer. Broadcast Network. Outline. MAC (Medium Access Control) Channel Allocation Problem. Dynamic Channel Allocation

CHAPTER 15 LOCAL AREA NETWORKS ANSWERS TO QUESTIONS

Link Layer and LANs 안상현서울시립대학교컴퓨터 통계학과.

Chapter 3. Underlying Technology. TCP/IP Protocol Suite 1 Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display.

Chapter 5 Link Layer and LANs

ECEN 5032 Data Networks Medium Access Control Sublayer

ECE 158A: Lecture 13. Fall 2015

The Medium Access Control Scheme (MAC Layer) Reference: Andrew S. Tanenbaum, Computer Networks, 3rd Edition, Prentice Hall, 1996.

Lecture 5 The Data Link Layer. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it

The Link Layer and LANs. Chapter 6: Link layer and LANs

CMPE 257: Wireless and Mobile Networking

Midterm Review EECS 122. University of California Berkeley

Data and Computer Communications. Chapter 11 Local Area Network

Computer Networks. Lecture 8 Local Area Network, IEEE 802.x

Integrating Information Systems: Technology, Strategy, and Organizational Factors

Ethernet. Networks: Ethernet 1

COMPUTER NETWORKS - Local area networks

Local area networks. Copyright

Link Layer and Ethernet

Links Reading: Chapter 2. Goals of Todayʼs Lecture. Message, Segment, Packet, and Frame

Link Layer and Ethernet

COMPUTER NETWORKS UNIT 3

Chapter 4: The Medium Access Layer

Multiple Access Links and Protocols

Outline. Introduction to Networked Embedded Systems - Embedded systems Networked embedded systems Embedded Internet - Network properties

Lecture 8 The Data Link Layer part I. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it

CSE 461 Multiple Access. David Wetherall

High Level View. EE 122: Ethernet and Random Access protocols. Medium Access Protocols

King Fahd University of Petroleum and Minerals College of Computer Sciences and Engineering Department of Computer Engineering

Lecture 6 The Data Link Layer. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it

Medium Access Control Sublayer Chapter 4

Computer Networks Medium Access Control. Mostafa Salehi Fall 2008

Problem Set Name the 7 OSI layers and give the corresponding functionalities for each layer.

Links. Error Detection. Link Layer. Multiple access protocols. Nodes Links Frame. Shared channel Problem: collisions How nodes share a channel

Goal and Outline. Computer Networking. What Do We Need? Today s Story Lecture 3: Packet Switched Networks Peter Steenkiste

ECE 4450:427/527 - Computer Networks Spring 2017

Lecture 6. Data Link Layer (cont d) Data Link Layer 1-1

Lecture 4: Wireless MAC Overview. Hung-Yu Wei National Taiwan University

Data Link Layer, Part 5. Medium Access Control

EE 122: Ethernet and

COMP/ELEC 429/556 Introduction to Computer Networks

Multiple Access (1) Required reading: Garcia 6.1, 6.2.1, CSE 3213, Fall 2010 Instructor: N. Vlajic

The MAC layer in wireless networks

IEEE standards for local area networks

Transcription:

EITF25 Internet Techniques and Applications L4: Network Access Stefan Höst

Repetition The link layer protocol should make sure that the data is correctly transmitted over the physical link using error detection and control. application Link data application protocol link protocol application Link data PHY bits PHY bits 2

Types of connections 3

Local Area Networks (LAN) A Local Area Network (LAN) is usually privately owned and links the devices in a single office, building or campus. LAN size is limited to a few kilometers. Traditionally, LANs use a shared medium, which means that the stations share a common physical link. Wireless LANs (WLANs) are common everywhere. 4

Concept of shared medium Today, we usually don t share a wired medium, however we all use wireless LANs (WLANs) that share a wireless medium. Therefore, the concept is still valid. 5

Characteristics for LANs with shared medium All data that is transmitted on the link, reaches all stations (broadcast). Due to attenuation on the link, the network has a limited size. The link can be extended with a repeater that amplifies the signal on the link. 6

LAN addresses In a network, all stations need an address so that the data can reach the right destination. All computers connected to standardized LANs have a unique physical address (called MAC-address). 7

Data transfer on a shared medium Packet to C A B C D The computer with the right destination address copies the packet and delivers it to the application. 8

Media Access Control (MAC) All computers in a multiple access network, need to have the same rules for sending and receiving data. This is called a Media Access Control (MAC) (or Multiple-Access Protocol). 9

Controlled access methods In controlled access, the stations consult one another to find which station has the right to send. A station cannot send unless it has been authorized by other stations. Controlled access is used in different parts of the mobile networks. 10

Reservation access method In the reservation method, time is divided into intervals, and a reservation frame precedes the data frames. A station needs to make a reservation before sending data. 11

Polling In Polling, one station is designated as a Primary Station (Master) and the other stations are Secondary Stations (Slaves). The primary station controls the link, and the secondary stations follow its instructions. All data exchange must be made through the primary station. If the primary station has anything to send, it uses a Select function. If it wants to receive data it uses a Poll function. 12

Poll and Select functions 13

Token Passing In Token passing the stations are organized in a logical ring. Each station has a predecessor and a successor. A special packet, called a token, circulates through the ring. The possesion of the token gives a station the right to access the link and send data. A station can only possess the token for a certain time, then it must release the token and pass it on. 14

Logical ring and physical topology 15

Random access methods In random access or contention methods, no station is superior to another station and none is assigned the control over another. No station permits, or does not permit, another station to send. At each instance, a station that has data to send uses a procedure defined by the protocol to make a decision on whether or not to send. 16

ALOHA ALOHANET was devloped by the University of Hawaii already in 1970. ALOHANET was a wireless LAN (one of the first). The multiple-access method in ALOHANET is called ALOHA. 17

ALOHANET Mainframe 18

Pure ALOHA The stations share one frequency band. The mainframe sends data on another frequency (broadcast channel). A station sends a frame whenever it has a frame to send. If the station receives an ACK from the mainframe on the broadcast channel, the transmission is successful. If not, the frame needs to be retransmitted. 19

Frames in Pure ALOHA 20

Collisions in Pure ALOHA 21

Resend strategy After a collision Wait a random time and resend (T B backoff time) After K max attempts give Tup B and try later (abort) Often K max =15. Example: In binary exponential backoff the backoff time is chosen T B U 0, 2 k 1 T f where k is the attempt number 22

Slotted ALOHA In Slotted ALOHA, the time is divided into slots, where each slot contains one frame in time. A station can only send in the beginning of a slot. 23

Frames in Slotted ALOHA 24

Colllisions in Slotted ALOHA 25

Throughput of slotted ALOHA Assume New packats with intenity λ (acc to Poisson proc.) New and resent packets with intensity G (Poisson) Probability of k packets in slot: The mean throughput is P (X = k) = Gk e G Throughput = E[# success] = Ge G k! 26

Throughput of slotted ALOHA 1 e 0.4 0.35 0.3 0.25 0.2 Ge G Stable system: < 1 e 0.15 0.1 0.05 0 0 0.5 1 1.5 2 2.5 3 3.5 4 G 27

Throughput ALOHA Slotted ALOHA Ge G with maximum 1 at G=1 e 0.37 Pure ALOHA Ge 2G with maximum 1 at G=1/2 2e 0.18 28

Carrier Sense Multiple Access (CSMA) Before a station sends data, it listens (senses) to the medium. If the medium is occupied, the station waits with the transmission. The vulnerable time is the propagation time (i.e. the time it takes for the signal to propagate from one of the medium to the other). 29

Vulnerable time in CSMA 30

Persistence methods What if the channel is busy. 1-persistent: As soon as the channel becomes idle, the station transmits its data. Nonpersistent: The station waits a random amount of time and then senses the channel again. p-persistent: The station transmits with probability p. With probability 1-p, check line Idle: Restart (and transmit with prob p) Busy: Wait T B and then restart 31

Behavior of the persistence methods 32

CSMA with Collision Detection (CSMA/ CD) The original CSMA method does not specify the procedure following a collision. CSMA/CD was developed to better handle collisions. After a station monitors the medium after it sends a frame to see if the transmission was successful. A station that detects a collision, immediately aborts the transmission and sends a jamming signal. 33

Energy levels on link 34

Minimum frame size A sending station must be able to detect a collision before transmitting the last bit of a frame. Therefore, the frame transmission time must be at least two times the maximum propagation time on the link, so that the colliding signal can propagate back to the sending station before the last bit is transmitted. 35

CSMA with Collision Avoidance (CSMA/ CA) CSMA/CD was developed for wired networks that have low attenuation. Therefore, the energy level during a collision can easily be detected. In a wireless network much of the energy is lost in transmission. A collision may add only 5-10% additional energy, which is not useful for effective collision detection as in CSMA/CD. Therefore, CSMA/CA tries to avoid collisions. 36

Collision avoidance strategies CSMA/CA has three collision avoidance strategies: 1. Interframe space (IFS) 2. Contention Window 3. Acknowledgment 37

Interframe space A station does not send immediately after finding the medium idle. Instead it waits a period of time, called Interframe space (IFS), since a distant station may have already started transmitting. If, after the IFS time the channel is still idle, the station can send. 38

Contention window The contention window is an amount of time divided into slots. A station that is ready to send chooses a random number of slots as its wait time. During the wait time, the station monitors the channel. If the channel is found busy, the timer is stopped and then restarted when the channel is idle. 39

Acknowledgments When a station has sent a frame, there is a time-out on the channel (no other station can send a frame). During this time-out the receiving station sends an ACK if the data is received correctly. If the sending station has not received an ACK within the time-out period, the data is assumed to be lost (either due to collision or bit errors). 40

Collision avoidance in CSMA/CA 41

IEEE standardization project 802 The IEEE project 802 started in 1985. Ethernet was originally developed in the 1970s at Xerox, and it was inspired by ALOHAnet 42

Wired LAN topologies Mesh Bus Star Ring 43

Physical address (MAC address) All hosts with a network card for an IEEE 802.x-network have a unique physical address. 44

Ethernet MAC frame 45

Unicast and Broadcast addresses Data transfer is usually peformed in unicast, that is there is one source and one destination. Some messages need to be sent in broadcast, that is one source sends the message to all hosts on the network. In 802-networks, the broadcast address is defined as all 1:s. 46

Medium Access method for standard Ethernet: 1-persistent CSMA/CD 47

Encoding: Manchester Early Ethernet standard uses Manchester encoding. 48

Bus topology The first versions of Ethernet used a bus topology where all hosts were connected to the same cable using taps. 49

Hubs Later versions of Ethernet used hubs. A hub transfers packets from an incoming link to all other links. It therefore works on the physical layer. 50

Collision domain All hosts that share the same medium belong to a collision domain. This adds constraints on the size of the shared link. 51

Bridges Bridges were developed to separate the shared links into two collision domains. The bridge acts as a host on all links and can transfer packets between links. 52

Basic principle for a switch The switch keeps an address table for forwarding of packets. 53

Full-duplex communication Modern Ethernets uses full-duplex communication. 54

Switched Ethernets Ethernet switches can be used to build larger access networks. Broadcast messages are sent to all hosts in the network (defined by the router). 55

Ethernet (IEEE 802.3) evolution Access networks Backbone networks 56

Gigabit Ethernet (IEEE 802.3z) Used as Metropolitan Area Network (MAN) Access network Ethernet frames over optic fibre (or twisted pair) full duplex, no collisions Forward Error Correction on physical layer 57

Topologies 58