Medium Access Control. CSCI370 Lecture 5 Michael Hutt New York Institute of Technology

Similar documents
Chapter 4. The Medium Access Control Sublayer

Chapter 4. The Medium Access Control Sublayer. Points and Questions to Consider. Multiple Access Protocols. The Channel Allocation Problem.

The Medium Access Control Sublayer

Jaringan Komputer. Broadcast Network. Outline. MAC (Medium Access Control) Channel Allocation Problem. Dynamic Channel Allocation

High Level View. EE 122: Ethernet and Random Access protocols. Medium Access Protocols

Medium Access Control Sublayer Chapter 4

EE 122: Ethernet and

Review. Error Detection: CRC Multiple access protocols. LAN addresses and ARP Ethernet. Slotted ALOHA CSMA/CD

The Medium Access Control Scheme (MAC Layer) Reference: Andrew S. Tanenbaum, Computer Networks, 3rd Edition, Prentice Hall, 1996.

Computer Networks. Medium Access Sublayer (Part I)

Data Link Layer -2- Network Access

Medium Access Control Sublayer

Chapter 12 Multiple Access 12.1

ECEN 5032 Data Networks Medium Access Control Sublayer

Data Link Layer -2- Network Access

Chapter 4: The Medium Access Layer

EITF25 Internet Techniques and Applications L4: Network Access. Stefan Höst

Computer Networks Medium Access Control. Mostafa Salehi Fall 2008

CMPE 257: Wireless and Mobile Networking

CSE 461: Multiple Access Networks. This Lecture

Link Layer. (continued)

Computer Network Fundamentals Spring Week 3 MAC Layer Andreas Terzis

Lecture 23 Overview. Last Lecture. This Lecture. Next Lecture ADSL, ATM. Wireless Technologies (1) Source: chapters 6.2, 15

Chapter 4 (Week 7) The Medium Access Control Sublayer ANDREW S. TANENBAUM COMPUTER NETWORKS FOURTH EDITION PP CN&DC Dr.

Lecture 5 The Data Link Layer. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it

Contention Protocols and Networks

CMPE 257: Wireless and Mobile Networking

COS 140: Foundations of Computer Science

CHAPTER 7 MAC LAYER PROTOCOLS. Dr. Bhargavi Goswami Associate Professor & Head Department of Computer Science Garden City College

Lecture 6 The Data Link Layer. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it

Part3. Local Area Networks (LAN)

CCNA Exploration1 Chapter 7: OSI Data Link Layer

LECTURE PLAN. Script. Introduction about MAC Types o ALOHA o CSMA o CSMA/CD o CSMA/CA

Local Area Networks (LANs) SMU CSE 5344 /

Data and Computer Communications

LAN PROTOCOLS. Beulah A AP/CSE

Ethernet. Introduction. CSE 3213 Fall 2011

Medium Access Control Sublayer Chapter 4

Lecture 05 Chapter 16 High Speed LANs

RMIT University. Data Communication and Net-Centric Computing COSC 1111/2061/1110. Lecture 8. Medium Access Control Methods & LAN

Computer Networks. Today. Principles of datalink layer services Multiple access links Adresavimas, ARP LANs Wireless LANs VU MIF CS 1/48 2/48

Unit 7 Media Access Control (MAC)

Outline. EEC-484/584 Computer Networks. Multiple Access Protocols. Wireless LAN Protocols. Lecture 9. Wenbing Zhao

EEC-484/584 Computer Networks

1. Data Link Layer Protocols

ECE 158A: Lecture 13. Fall 2015

Aloha and slotted aloha

Introduction to LAN Protocols

6.9 Summary. 11/20/2013 Wireless and Mobile Networks (SSL) 6-1. Characteristics of selected wireless link standards a, g point-to-point

Introductory to Computer Networks Local Area Networks. Lecture 16 Fall Isfahan University of technology Dr.

Link Layer and Ethernet

CSMA/CD (Collision Detection)

Link Layer and Ethernet

Multiple Access Protocols

ECE453 Introduction to Computer Networks. Broadcast vs. PPP. Delay. Lecture 7 Multiple Access Control (I)

Local Networks. Lecture 4 6-Apr-2016

Data Link Layer, Part 3 Medium Access Control. Preface

COS 140: Foundations of Computer Science

CARRIER SENSE MULTIPLE ACCESS (CSMA):

Networking Technologies and Applications

CSE/EE 461 Wireless and Contention-Free Protocols

Summary of MAC protocols

Announcements / Wireless Networks and Applications Lecture 9: Wireless LANs Wireless. Regular Ethernet CSMA/CD.

Topics. Link Layer Services (more) Link Layer Services LECTURE 5 MULTIPLE ACCESS AND LOCAL AREA NETWORKS. flow control: error detection:

Lecture 6: Example LAN: Ethernet

Lecture 12 December 04, Wireless Access. Graduate course in Communications Engineering. University of Rome La Sapienza. Rome, Italy

Lecture 6. Reminder: Homework 2, Programming Project 2 due on Thursday. Questions? Tuesday, September 13 CS 475 Networks - Lecture 6 1

Networks Homework # 2

CSMC 417. Computer Networks Prof. Ashok K Agrawala Ashok Agrawala Set 5. February 12 CMSC417 Set 5 1

Getting Connected (Chapter 2 Part 4) Networking CS 3470, Section 1 Sarah Diesburg

Medium Access Protocols

CS 43: Computer Networks. 27: Media Access Contd. December 3, 2018

Link Layer: Retransmissions

Lectures Ethernet

Reminder: Datalink Functions Computer Networking. Datalink Architectures

Redes de Computadores. Medium Access Control

Data Link Layer: Collisions

Medium Access Control. MAC protocols: design goals, challenges, contention-based and contention-free protocols

ECE 4450:427/527 - Computer Networks Spring 2017

Lecture 4: Wireless MAC Overview. Hung-Yu Wei National Taiwan University

CSE/EE 461 Section 2

COMMUNICATION NETWORKS NETW 501

CCNA Exploration Network Fundamentals. Chapter 09 Ethernet

Introduction to Wireless Networking CS 490WN/ECE 401WN Winter Lecture 4: Wireless LANs and IEEE Part II

Outline / Wireless Networks and Applications Lecture 9: Wireless LANs Aloha and 802 Wireless. Regular Ethernet CSMA/CD

CSE 461 Multiple Access. David Wetherall

LAN Protocols. Required reading: Forouzan 13.1 to 13.5 Garcia 6.7, 6.8. CSE 3213, Fall 2015 Instructor: N. Vlajic

Data and Computer Communications. Chapter 11 Local Area Network

CSCD 433 Network Programming Fall Lecture 7 Ethernet and Wireless

Ethernet. Lecture 6. Outline. Ethernet - Physical Properties. Ethernet - Physical Properties. Ethernet

CS 43: Computer Networks Media Access. Kevin Webb Swarthmore College November 30, 2017

LANs. Local Area Networks. via the Media Access Control (MAC) SubLayer. Networks: Local Area Networks

Chapter 6 Local Area Networks and Media Access Control. School of Info. Sci. & Eng. Shandong Univ.

Wireless LAN. Access Point. Provides network connectivity over wireless media

CSE 461: Wireless Networks

COMP/ELEC 429/556 Introduction to Computer Networks

The Link Layer II: Ethernet

Data Link Layer, Part 5. Medium Access Control

Protocols for Multiaccess Networks

Principles behind data link layer services

Transcription:

Medium Access Control CSCI370 Lecture 5 Michael Hutt New York Institute of Technology

The Data Link Layer

Logical Link Control (LLC) IEEE 802.2 Standard RFC 1042 Provides three service options Unreliable datagram service Acknowledged datagram service Reliable connection-oriented service

Medium Access Control (MAC) Layer 2 addressing (MAC address or physical address) Channel access control mechanisms for multiaccess channels Determines who goes next on a multiaccess channel

Multiple Access Protocols Pure Aloha Transmit whenever data is available to be sent Does not listen before transmitting Listen to find out if frame was destroyed (collision) Slotted Aloha Forces all workstations to agree on time slots Can t start sending in the middle of a time slot Improves throughput to 2x of pure Aloha

Multiple Access Protocols Persistent Carrier Sense Multiple Access First listen to see if anyone else is transmitting If collision detected wait random amount of time and start over Propagation delay can have on performance Nonpersistent CSMA Listen first, if no one is sending, begin sending If channel is busy, wait a random period before listening again Better channel utilization, but longer delay

Multiple Access Protocols CSMA with Collision Detect CSMA/CD Terminate transmission immediately upon detecting a collision Basis for Ethernet Need to transmit for 2T, where T is the propagation delay between the 2 farthest workstations Transmitting stations must constantly monitor the channel (receive) for collisions - inherently half-duplex

Wireless LAN Protocols Can t use CSMA since we need to detect interference at the receiver Can t reliably detect all transmissions due to range of radios Multiple Access with Collision Avoidance (MACA) Force a short transmission from the receiver so stations around the receiver avoid transmitting A sends RTS frame to B. B replies with CTS Stations close to A hear the RTS Stations close to B hear the CTS MACW (MACA for Wireless) Added CSMA for transmitters, and ACKs

Ethernet Ethernet Cabling Manchester Encoding The Ethernet MAC Sublayer Protocol The Binary Exponential Backoff Algorithm Ethernet Performance Switched Ethernet Data Link Layer Switching Virtual LANs

Ethernet Cabling

Manchester Encoding

Ethernet MAC Sublayer Protocol

Ethernet MAC Sublayer Protocol Ethernet II (DIX) Used for IP 802.3 (Raw) - no type field 802.3 with 802.2 802.3 with 802.2 SNAP Used for IP, Appletalk, CDP and other proprietary protocols

Ethernet MAC Sublayer Protocol

Binary Exponential Backoff Algorithm After n collisions wait somewhere between 0 and 2^n-1 time slots Time slot = 51.2µsec (time it takes to transmit 512 bits) After 16 collisions failure is reported to higher layers

Ethernet Performance

Switched Ethernet Multiport bridge Each port is in its own collision domain Ports can now operate full duplex Switch disables collision detection in full duplex mode

Bus Topology

Bridging

Spanning-Tree Protocol

Bridges Store and forward Buffers the frame and checks the CRC, then forwards to destination port Cut Through DA MAC address appears first. Forward frame immediately to destination port. No CRC check.

Bridges

Layer 2 Switch

Network Devices Repeaters - L1 Hubs - L1 Bridges - L2 Switches - L2 Routers - L3/L4 Gateways - L4/L7

Network Devices

Virtual LANs

802.1Q

802.1Q

Wireless LANs IEEE 802.11 Standard 802.11a - 5 GHz, 54 Mbps (Net Bit Rate) 802.11b - 2.4 GHz, 11 Mbps 802.11g - 2.4 GHz, 54 Mbps 802.11n - 5 GHz and/or 2.4 GHz, 600 Mbps

The 802.11 Protocol Stack

The 802.11 MAC Sublayer Protocol a) the hidden station problem b) the exposed station problem

The 802.11 MAC Sublayer Protocol

The 802.11 Frame Structure

Wi-Fi Security WEP - no longer secure WPA (TKIP) 8/27/09 Computer scientists in Japan say they've developed a way to break the WPA encryption system used in wireless routers in about one minute. WPA2 (AES)