COMP476 Networked Computer Systems. Polling. Sharing the Wire. LAN Technologies. COMP476 Networked Computer Systems 1

Similar documents
CHAPTER 7 MAC LAYER PROTOCOLS. Dr. Bhargavi Goswami Associate Professor & Head Department of Computer Science Garden City College

CS 43: Computer Networks Media Access. Kevin Webb Swarthmore College November 30, 2017

CARRIER SENSE MULTIPLE ACCESS (CSMA):

Protocols for Multiaccess Networks

Goals. Fundamentals of Network Media. More topics. Topics. Multiple access communication. Multiple access solutions

CS 43: Computer Networks. 27: Media Access Contd. December 3, 2018

CSE 461: Multiple Access Networks. This Lecture

Chapter 12 Multiple Access 12.1

Contention Protocols and Networks

Summary of MAC protocols

Ethernet. Introduction. CSE 3213 Fall 2011

Medium Access Protocols

LAN. CS 4/55231 Internet Engineering. Kent State University Dept. of Computer Science

Networking Technologies and Applications

Data Link Layer, Part 3 Medium Access Control. Preface

Introduction to Networks and the Internet

Local Area Networks. Aloha Slotted Aloha CSMA (non-persistent, 1-persistent, p-persistent) CSMA/CD Ethernet Token Ring

Lecture 9: Bridging. CSE 123: Computer Networks Alex C. Snoeren

Data Link Layer -2- Network Access

CSE/EE 461 Wireless and Contention-Free Protocols

EITF25 Internet Techniques and Applications L4: Network Access. Stefan Höst

Chapter 8 LAN Topologies

Data Link Layer -2- Network Access

Frames, Packets and Topologies

Reminder: Datalink Functions Computer Networking. Datalink Architectures

Redes de Computadores. Medium Access Control

High Level View. EE 122: Ethernet and Random Access protocols. Medium Access Protocols

Data Link Layer, Part 5. Medium Access Control

Access Technologies! Fabio Martignon

Computer Networks. Medium Access Sublayer (Part I)

CMPE 257: Wireless and Mobile Networking

LAN PROTOCOLS. Beulah A AP/CSE

EE 122: Ethernet and

Getting Connected (Chapter 2 Part 4) Networking CS 3470, Section 1 Sarah Diesburg

Multiple Access Protocols

ECE 158A: Lecture 13. Fall 2015

Data Link Layer: Collisions

Network Topology. By Dr. Piya Techateerawat. Bus Topology Ring Topology Star Topology Fully Connected Topology. Combined Topology

Topics. Link Layer Services (more) Link Layer Services LECTURE 5 MULTIPLE ACCESS AND LOCAL AREA NETWORKS. flow control: error detection:

ECSE-4670: Computer Communication Networks (CCN) Informal Quiz 3

Lecture 6: Example LAN: Ethernet

CSE 461 Multiple Access. David Wetherall

Computer Networks Medium Access Control. Mostafa Salehi Fall 2008

CMPE 257: Wireless and Mobile Networking

Lecture 6. Reminder: Homework 2, Programming Project 2 due on Thursday. Questions? Tuesday, September 13 CS 475 Networks - Lecture 6 1

Local Area Networks (LANs) SMU CSE 5344 /

Data and Computer Communications. Chapter 11 Local Area Network

COS 140: Foundations of Computer Science

Computer Network Fundamentals Spring Week 3 MAC Layer Andreas Terzis

Goal and Outline. Computer Networking. What Do We Need? Today s Story Lecture 3: Packet Switched Networks Peter Steenkiste

CS 716: Introduction to communication networks. - 9 th class; 19 th Aug Instructor: Sridhar Iyer IIT Bombay

ECE 4450:427/527 - Computer Networks Spring 2017

Medium Access Control

ECEN 5032 Data Networks Medium Access Control Sublayer

COMPUTER NETWORKS - Local area networks

Local area networks. Copyright

Aloha and slotted aloha

CSE 461: Multiple Access. Homework: Chapter 2, problems 1, 8, 12, 18, 23, 24, 35, 43, 46, and 58

Link Layer and Ethernet

CSMA/CD (Collision Detection)

Introduction to LAN Topologies Cabling. 2000, Cisco Systems, Inc. 3-1

The Medium Access Control Scheme (MAC Layer) Reference: Andrew S. Tanenbaum, Computer Networks, 3rd Edition, Prentice Hall, 1996.

CS 3640: Introduction to Networks and Their Applications

COMMUNICATION NETWORKS NETW 501

Chapter 6 Medium Access Control Protocols and Local Area Networks

Ethernet. Lecture 6. Outline. Ethernet - Physical Properties. Ethernet - Physical Properties. Ethernet

Multiple Access Channels

Review. Error Detection: CRC Multiple access protocols. LAN addresses and ARP Ethernet. Slotted ALOHA CSMA/CD

Local Networks. Lecture 4 6-Apr-2016

Ethernet. Networks: Ethernet 1

The Link Layer and LANs. Chapter 6: Link layer and LANs

Data Link Layer Technologies

Link Layer and Ethernet

CSE/EE 461 Section 2

Multiple Access. Data Communications and Networking

Lecture 6. Data Link Layer (cont d) Data Link Layer 1-1

Computer and Network Security

The Medium Access Sublayer

RMIT University. Data Communication and Net-Centric Computing COSC 1111/2061/1110. Lecture 8. Medium Access Control Methods & LAN

Objectives. Hexadecimal Numbering and Addressing. Ethernet / IEEE LAN Technology. Ethernet

Lecture 4b. Local Area Networks and Bridges

Media Access Control. Networked Systems (H) Lecture 5

Lecture 05 Chapter 16 High Speed LANs

Lecture 19. Principles behind data link layer services Framing Multiple access protocols

LANs. Local Area Networks. via the Media Access Control (MAC) SubLayer. Networks: Local Area Networks

Lecture 6 The Data Link Layer. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it

Outline. Introduction to Networked Embedded Systems - Embedded systems Networked embedded systems Embedded Internet - Network properties

COS 140: Foundations of Computer Science

Lecture 5 The Data Link Layer. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it

Link Layer: Retransmissions

Introductory to Computer Networks Local Area Networks. Lecture 16 Fall Isfahan University of technology Dr.

Internet Architecture and Protocol

Part3. Local Area Networks (LAN)

CIS 551 / TCOM 401 Computer and Network Security. Spring 2007 Lecture 7

Computer Networks. Today. Principles of datalink layer services Multiple access links Adresavimas, ARP LANs Wireless LANs VU MIF CS 1/48 2/48

ECE453 Introduction to Computer Networks. Broadcast vs. PPP. Delay. Lecture 7 Multiple Access Control (I)

Master Course Computer Networks IN2097

Jaringan Komputer. Broadcast Network. Outline. MAC (Medium Access Control) Channel Allocation Problem. Dynamic Channel Allocation

College of Computer and Information Sciences Department of Computer Engineering CEN444 Computer Networks Midterm 2 Exam Second Semester 1434/1435

Local Area Networks. Ethernet LAN

Transcription:

Media Access Control Sub Layer COMP476 Networked Computer Systems Sharing Common Media There are several ways to share common media. Some methods are: Frequency division multiplexing Time division multiplexing Code Division Multiple Access Carrier Sense Multiple Access Token based Anarchy Sharing the Wire Only one node can transmit at a time. If two or more nodes transmit at the same time, the messages will be garbled. The challenge in a LAN is to allow all nodes to transmit at maximum speed without interfering with each other. Polling Polling relies on a central controller that asks (polls) each station ti ifitit wants to send something When a station is polled, it can send a data packet or a special short packet indicating it has nothing to send The central controller can poll the station in a round robin order or by priority order COMP476 Networked Computer Systems 1

Reservation System Aloha Networks In a reservation system, a common poll is sent tto all stations ti Each station indicates, in order, if they want to send something Once each station knows who wants to transmit, the transmit in order terminals Channel A Central Computer Channel B Aloha networks were developed at the University of Hawaii for communication to remote islands. Aloha Networks All terminals transmit to the central computer on channel B. When the central computer receives a message correctly, it will send an acknowledgement to the terminal on channel A. If two stations send something at the same time, the messages would collide and nothing would be received correctly by the central receiver. If a node didn t get an acknowledgement, it sent it again after a random wait. Advantages Disadvantages Analysis of Aloha Network The throughput of a network is the amount of data that actually gets through the network. A node s transmission is successful if another node does not transmit at the same time. Network runs efficiently for a small number of users. No coordination between sending nodes is required. Collisions drain the capacity of the channel. COMP476 Networked Computer Systems 2

Slotted Aloha Aloha vs. Slotted Aloha Slotted Aloha only sends packets during specified time slots. This reduces the probability of a collision since packets cannot overlap part way. The throughput of Aloha (dark line) and slotted Aloha (purple line) Aloha Throughput If you have a 1 Mb/s wireless network using Aloha, what is the maximum amount of data you can transmit in one minute? 1. 1.35 MB 2. 2.78 MB 3. 10.8 MB 4. 60.0 MB 25% 25% 25% 25% 1.35 MB 2.78 MB 10.8 MB 60.0 MB COMP476 Networked Computer Systems 3

Ethernet Uses the Carrier Sense Multiple Access with Collision Detect (CSMA/CD) )protocol. Similar to Aloha except that a station senses the line before transmitting. This produces better throughput than Aloha because it tries to avoid collisions. Ethernet can run as a bus network on coax cables or as a star with twisted pair or fiber. CSMA/CD Protocol The sending station senses the line to see if another transmission is taking place. If nothing is being transmitted, the sender transmits its frame. If another node is currently transmitting, the sender waits until the current transmission ends. While the sender transmits, it checks that it is receiving exactly the same signal. If the sender detects a collision, it stops, waits a random length of time and tries again. Exponential Backoff The 8 byte Ethernet preamble helps in detecting ti collisions i The first time a station detects a collision, it randomly waits 0 or 1 transmission times If it gets another collision, it waits 0 3 transmission times Another collision makes it wait 0 7 times Each collision doubles the maximum wait Traditional Coax Ethernet Original Ethernet used a shared coax cable. The cable length impacted CSMA/CD COMP476 Networked Computer Systems 4

To detect a collision, a node has to be transmitting when it receives the signal from another node Consider a very long cable A transmits a packet The packet propagates down the cable Just before the signal from A reaches station D, station D starts to transmit Station A continues to transmit because it has not yet received the signal from D Station A does not see a collision, but stations D, C then B do COMP476 Networked Computer Systems 5

Station A completes its transmission just before the signal from station D arrives. Station A never observes a collision which is counter to the collision detect protocol Maximum Cable Length If the minimum packet size was 27 bytes (1 data byte), what is the maximum cable length? 1. 8 m 2. 21.6 m 3. 216 m 4. 576 m 25% 25% 25% 25% Ethernet is frequently identified by the speed and media type 10Base5 10Base2 10BaseT 100BaseT 100BaseF thick coax, 10Mbps thin coax, 10Mbps twisted pair cable, 10Mbps twisted pair cable, 100Mbps fiber optic cable, 100Mbps 8 m 21.6 m 216 m 576 m COMP476 Networked Computer Systems 6

Ethernet Cables There are different cable standards for different speed Ethernetst Cat3 10 Mbits/sec Cat5 100 Mbits/sec Cat6 1 Gbits/sec Cat7 10 Gbits/sec WiFi Networks CSMA/CD does not work as well in wireless LANs because a transmitter used in a wireless LAN has a limited range A receiver that is more than δ away from the transmitter will not receive a signal and will not be able to detect a collision 2009 Pearson Education Inc. Missed Collisions Consider three computers with wireless LAN If computer 3 is transmitting a packet to computer 2, computer 1's carrier sense mechanism will not detect the transmission Sometimes called the hidden station problem CSMA with Collision Avoidance (CSMA/CA) CSMA/CA triggers a brief transmission from the intended receiver before transmitting a packet All computers within range of either will know a packet transmission is beginning COMP476 Networked Computer Systems 7

Token Based LAN Token Ring Protocol Token Ring and Token Bus networks do not have any collisions as those encountered in Aloha and Ethernet networks. To avoid collisions, the network has only one logical token. Only the station that currently holds the token is allowed to transmit. The token is cycled between the connected stations until it reaches the next station waiting to transmit. Advantages Disadvantages Tk Token based systems have an At low loads, the station must advantage when the network wait for its turn to use the is very busy token. Continue to work efficiently Limited to predetermined at high loads. amount of time for transmission. A logical object called the token is continually sent around the ring. The station that has the token can send a few frames if it has any to send. As a station receives a bit, it stores the bit and sends it to the next station in the ring. The sending node does not forward bits. Upon sending its frames, the station sends the token to the next station in the ring. Token Ring Each station receives a bit and sends a bit The transmitting station does not forward the incoming bits The receiving station sends a bit after the last bit if it received the message correctly IEEE 802 standards 802.3 Ethernet 802.4 Token Bus 802.5 Token Ring 802.6 Distributed Queue Dual Bus 802.11 Wireless LAN COMP476 Networked Computer Systems 8