CHAPTER 7 MAC LAYER PROTOCOLS. Dr. Bhargavi Goswami Associate Professor & Head Department of Computer Science Garden City College

Similar documents
Chapter 12 Multiple Access 12.1

Data Link Layer: Collisions

Data Link Layer -2- Network Access

Data Link Layer -2- Network Access

CS 43: Computer Networks. 27: Media Access Contd. December 3, 2018

CS 43: Computer Networks Media Access. Kevin Webb Swarthmore College November 30, 2017

EITF25 Internet Techniques and Applications L4: Network Access. Stefan Höst

Chapter 6 Medium Access Control Protocols and Local Area Networks

ECE 4450:427/527 - Computer Networks Spring 2017

Multiple Access. Data Communications and Networking

Aloha and slotted aloha

Multiple Access Protocols

CS 716: Introduction to communication networks. - 9 th class; 19 th Aug Instructor: Sridhar Iyer IIT Bombay

Topics. Link Layer Services (more) Link Layer Services LECTURE 5 MULTIPLE ACCESS AND LOCAL AREA NETWORKS. flow control: error detection:

COMP476 Networked Computer Systems. Polling. Sharing the Wire. LAN Technologies. COMP476 Networked Computer Systems 1

ECE453 Introduction to Computer Networks. Broadcast vs. PPP. Delay. Lecture 7 Multiple Access Control (I)

The MAC layer in wireless networks

Random Access. 1. Aloha. 2. Slotted Aloha 3. CSMA 4. CSMA/CD

Chapter 4. The Medium Access Control Sublayer. Points and Questions to Consider. Multiple Access Protocols. The Channel Allocation Problem.

Unit 7 Media Access Control (MAC)

EITF25 Internet- - Techniques and Applica8ons Stefan Höst. L5 Data link (part 2)

The Medium Access Control Scheme (MAC Layer) Reference: Andrew S. Tanenbaum, Computer Networks, 3rd Edition, Prentice Hall, 1996.

Multiple-access protocols

Computer Network Fundamentals Spring Week 3 MAC Layer Andreas Terzis

Medium Access Control. MAC protocols: design goals, challenges, contention-based and contention-free protocols

CSE 461: Multiple Access Networks. This Lecture

The MAC layer in wireless networks

LECTURE PLAN. Script. Introduction about MAC Types o ALOHA o CSMA o CSMA/CD o CSMA/CA

CARRIER SENSE MULTIPLE ACCESS (CSMA):

ECEN 5032 Data Networks Medium Access Control Sublayer

CSMA/CD (Collision Detection)

Data Link Layer. Goals of This Lecture. Engineering Questions. Outline of the Class

Links Reading: Chapter 2. Goals of Todayʼs Lecture. Message, Segment, Packet, and Frame

COMMUNICATION NETWORKS NETW 501

Outline. Introduction to Networked Embedded Systems - Embedded systems Networked embedded systems Embedded Internet - Network properties

ECE 158A: Lecture 13. Fall 2015

Lecture 9: Bridging. CSE 123: Computer Networks Alex C. Snoeren

1-1. Switching Networks (Fall 2010) EE 586 Communication and. November 8, Lecture 30

Media Access Control. Networked Systems (H) Lecture 5

Local Networks. Lecture 4 6-Apr-2016

Lecture 6. Data Link Layer (cont d) Data Link Layer 1-1

LANs. Local Area Networks. via the Media Access Control (MAC) SubLayer. Networks: Local Area Networks

COS 140: Foundations of Computer Science

Physical Layer. Medium Access Links and Protocols. Point-to-Point protocols. Modems: Signaling. Modems Signaling. Srinidhi Varadarajan

CMPE 257: Wireless and Mobile Networking

Links. CS125 - mylinks 1 1/22/14

Wireless Communications

Lecture 4: Wireless MAC Overview. Hung-Yu Wei National Taiwan University

Random Assignment Protocols

Contention Protocols and Networks

CS 455/555 Intro to Networks and Communications. Link Layer

The Medium Access Control Sublayer

ICE 1332/0715 Mobile Computing (Summer, 2008)

Computer Networks Medium Access Control. Mostafa Salehi Fall 2008

Lecture 23 Overview. Last Lecture. This Lecture. Next Lecture ADSL, ATM. Wireless Technologies (1) Source: chapters 6.2, 15

CSE 461 Multiple Access. David Wetherall

LAN PROTOCOLS. Beulah A AP/CSE

Networking Technologies and Applications

Access Technologies! Fabio Martignon

Reminder: Datalink Functions Computer Networking. Datalink Architectures

The Link Layer and LANs. Chapter 6: Link layer and LANs

Jaringan Komputer. Broadcast Network. Outline. MAC (Medium Access Control) Channel Allocation Problem. Dynamic Channel Allocation

CSC 4900 Computer Networks: The Link Layer

Telecommunication Protocols Laboratory Course. Lecture 2

Link layer, LANs: outline. Chapter 5-1 Link Layer. Link layer: introduction. Link layer services

Redes de Computadores. Medium Access Control

Multiple Access Links and Protocols

High Level View. EE 122: Ethernet and Random Access protocols. Medium Access Protocols

Mobile Communications Chapter 3 : Media Access

Goals. Fundamentals of Network Media. More topics. Topics. Multiple access communication. Multiple access solutions

Chapter 1 Basic concepts of wireless data networks (cont d)

CMPE 150/L : Introduction to Computer Networks. Chen Qian Computer Engineering UCSC Baskin Engineering Lecture 16

Medium Access Control Sublayer Chapter 4

Getting Connected (Chapter 2 Part 4) Networking CS 3470, Section 1 Sarah Diesburg

Chapter 6 Medium Access Control Protocols and Local Area Networks

COMPUTER NETWORKS UNIT 3

Link Layer and LANs 안상현서울시립대학교컴퓨터 통계학과.

CSE 461: Multiple Access. Homework: Chapter 2, problems 1, 8, 12, 18, 23, 24, 35, 43, 46, and 58

CMPE 257: Wireless and Mobile Networking

Data Communications. Automatic Repeat Request Medium Access Control

COS 140: Foundations of Computer Science

Data Link Layer, Part 5. Medium Access Control

Data Link Layer Technologies

Goals of Today s Lecture. Adaptors Communicating

EE 122: Ethernet and

Medium Access Control. CSCI370 Lecture 5 Michael Hutt New York Institute of Technology

CCM 4300 Lecture 5 Computer Networks, Wireless and Mobile Communications. Dr Shahedur Rahman. Room: T115

Lecture 6 The Data Link Layer. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it

Multiple Access (1) Required reading: Garcia 6.1, 6.2.1, CSE 3213, Fall 2010 Instructor: N. Vlajic

Medium Access Control

Problem Set Name the 7 OSI layers and give the corresponding functionalities for each layer.

CSE/EE 461 Wireless and Contention-Free Protocols

Data Link Layer: Multi Access Protocols

Chapter 4. The Medium Access Control Sublayer

Lecture 6: Example LAN: Ethernet

Rahman 1. Application

Lecture 8 Link Layer: functionality, error detection, media access algorithm

Lecture 8 The Data Link Layer part I. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it

Computer Networks. Medium Access Sublayer (Part I)

CS 716: Introduction to communication networks. - 8 th class; 17 th Aug Instructor: Sridhar Iyer IIT Bombay

Transcription:

CHAPTER 7 MAC LAYER PROTOCOLS Dr. Bhargavi Goswami Associate Professor & Head Department of Computer Science Garden City College

MEDIUM ACCESS CONTROL - MAC PROTOCOLS When the two stations transmit data simultaneously, data signal will interfere or collide with each other. The role of MAC protocols is to coordinate multiple accesses to the channel so that information from the source reaches destination reliably.

Approaches for Sharing Transmission Medium:

MAC PROTOCOLS

CHANNALIZATION METHODS FREQUENCY DIVISION MULTIPLE ACCESS (FDMA) TIME DIVISION MULTIPLE ACCESS (TDMA) CODE DIVISION MULTIPLE ACCESS (CDMA)

FDMA

TDMA

CDMA

RANDOM ACCESS PROTOCOLS ALOHA Pure Aloha Slotted Aloha Career Sense Multiple Access (CSMA) Career Sense Multiple Access with Collision Detection (CSMA/CD) Career Sense Multiple Access with Collision Avoidance (CSMA/CA)

ALOHA Norman Abramson at University of Hawaii, in 70 s wanted to connect computer centers of all the islands of Hawaii. Hawaii is a collection of islands and it was not possible to connect them with telephone lines. Joining islands with wires laid on seabed was very expensive, so they started thinking about wireless solution. Solution: ALOHA Using short range radios. Half duplex by nature. At a time, only can send or receiver. Switching also takes time. Two different frequencies, one for sending, another for receiving. But, problem of collision, how to solve it? Solution: Let the users communicate, if signals collide, not acknowledged and so, sender resends data. Adding randomness reduces the chance of collision. Algorithm is called Binary Exponential Back-off Algorithm. Also had problem: While transmitting, sender can not sense collision. In ALOHA, maximum 18 out of 100 packets pass without collision if ALOHA works with optimum speed.

ALOHA connecting islands at Hawaii

PURE ALOHA

Slotted ALOHA Solution: Slotted ALOHA Robert, in 1972 proposed a scheme. Packets are vulnerable to collide with only those packets which were transmitted before, but not during the lifetime. He divided timeslots equal to lifetime of packets. Packet can be transmitted only in beginning of next slot only. Slotted ALOHA introduces additional delay. Eg : B is to be transmitted during A s lifetime, B will be delayed till next slot. Thus, reducing collision probability to half and performance is doubled. In slotted ALOHA, 36 out of 100 packets are delivered without collision at optimum speed. In slotted ALOHA time is divided into discrete intervals, each corresponding to one frame. A computer is not permitted to send whenever it has data to send. Instead it is required to wait for the next available slot. Well, it still needs improvement. See next figures that explain ALOHA and Slotted ALOHA.

SLOTTED ALOHA

CSMA: TYPES: 1. 1 Persistent CSMA 2. Non Persistent CSMA 3. P Persistent CSMA 4. CSMA/CD 5. CSMA/CA

Carrier Sense Multiple Access (CSMA) Protocols in which stations listen for a carrier (i.e. transmission) and act accordingly are called carrier sense protocols. 1. 1-persistent CSMA Channel Busy Continue sensing until free and then grab. Channel Idle Transmit with probability 1. Collision Wait for a random length of time and try again. 2. Non-persistent CSMA: Channel Busy Does not continually sense the channel. Wait for a random length of time and try again. Channel Idle Transmit. Collision Wait for a random length of time and try again.

3. P-persistent CSMA: Channel Busy Continue sensing until free (same as idle). Channel Idle Transmit with probability p, and defer transmitting until the next slot with probability q = 1-p. Collision Wait for a random length of time and try again. Analysis: The non-persistent CSMA has better channel utilization but longer delays than 1-persistent CSMA. CSMA are an improvement over ALOHA because they ensure that no station begins to transmit when it senses the channel busy. Another improvement is for stations to abort their transmissions as soon as they detect a collision. Quickly terminating damaged frames saves time and bandwidth. This protocol is called CSMA/CD (CSMA with Collision Detection).

CSMA/CD Carrier Sense: Ethernet card listen to channel before transmission and differ to transmit if somebody else is already transmitting. Multiple Access: More than one user needs channel access. Collision Detection: Protocol listen when transmission is going on and find stop transmitting when it finds colliding. Interframe gap: As soon as channel becomes free, it waits for small interframe gap and then transmits. Interframe gap is idle time between frames. After a frame has been sent, transmitters are required to transmit a minimum of 96 bits (12 octets) of idle line state before transmitting the next frame. Maximum distance limitation: Frame size min 64 bytes. Minimum frame size limitation: Frame length min 250 m. Both, distance and size can not be increased together. More bandwidth deteriorates performance. If first 64 bytes are successfully received, means later there would be no collision.

Collision Detection & Avoidance Collision garble the frames. Collision Detection: Let collision happen and then solve it. If sender detects collision, it can stop sending and restart later by following binary back-off algorithm. Need a mechanism to listen to channel. Used by classic Ethernet. Collision Avoidance: See that collision do not occur by carefully avoiding it. Here, it is possible to extract any component signal from collided signal. So retransmission is not needed. We just extract what we need from the received signals. Preferred by 802.11 wireless LANs. CDMA Code Division Multiple Access is used in Mobile phones.

CSMA/CA Collision Avoidance with Career Sense Multiple Access. On Wireless Networks Strategies: 1. Inter-frame Spacing (IFS) 2. Contention Window Binary Exponential Back off Algorithm 3. Acknowledgement

Different Inter-frame spacing

Binary Exponential Backoff Sender sends immediately with idle channel Continues to listen while transmitting In case of a collision, the sender waits for a random period (maximum of two time slots) In case they collide again, the interval is just doubled every time it experiences a collision, When doubling is repeated to the slot size to 0 1023 it will not increase further

Binary Exponential Back off Algorithm Time is divided into discrete slots whose length is equal to the worst-case round-trip propagation time on the either (2τ). minimum frame is 64 bytes (header + 46 bytes of data) = 512 bits Channel capacity 10 Mbps, 512/10 M = 51.2µ After 1 st collision, each station waits for 0 or 1 time slot before trying again. After 2 nd collision, each station picks up either 0,1,2 or 3 at random and waits for that much time slots. If 3 rd collision occurs, then next time number of slots to wait is chosen randomly from interval 0 to 2 3-1. In general, after i th collision, random number between 0 to 2 i -1 is chosen, that number of time slot is skipped. After 10 th collision, randomized interval is frozen at max of 1023 slots. After 16 th collision, controller reports failure back to computer sending and further recovery is upto higher layers. This algorithm is called Binary Exponential Back off Algorithm. Advantage: Ensures a low delay when only a few stations collide, but also assures that the collision is resolved in a reasonable interval when many stations collide. Disadvantage: Could introduce significant delay.

SCHEDULING APPROACH / CONTROLLED ACCESS RESERVATION POLLING TOKEN RING

RESERVATION

POLLING Network that employs polling uses a centralized controller. Controller cycles through all the stations on network gives each station an opportunity to transmit packets, one station at a time. Two general polling policies Round Robin Priority Scheduling

TOKEN PASSING Stations have limited time for possession of token Token must be monitored to ensure it is neither lost nor destroyed Priorities can be assigned to the station

Assignment: Differentiate between all the three scheduling approaches. Differentiate between Random Access Approach and Scheduling Approach. Differentiate between FDMA, TDMA and CDMA.

THANK YOU 4 th Unit is Over, we will start with last/5 th unit from next lecture.