CS 716: Introduction to communication networks. - 8 th class; 17 th Aug Instructor: Sridhar Iyer IIT Bombay

Similar documents
CS 716: Introduction to communication networks. - 9 th class; 19 th Aug Instructor: Sridhar Iyer IIT Bombay

ECE 4450:427/527 - Computer Networks Spring 2017

CS 43: Computer Networks. 27: Media Access Contd. December 3, 2018

Lecture 4: Wireless MAC Overview. Hung-Yu Wei National Taiwan University

CS 43: Computer Networks Media Access. Kevin Webb Swarthmore College November 30, 2017

Local Area Networks NETW 901

1-1. Switching Networks (Fall 2010) EE 586 Communication and. November 8, Lecture 30

CS 348: Computer Networks. - PHY; 30 th July Instructor: Sridhar Iyer IIT Bombay

CHAPTER 7 MAC LAYER PROTOCOLS. Dr. Bhargavi Goswami Associate Professor & Head Department of Computer Science Garden City College

MAC Sublayer(1) Principal service of the Medium Access Control Sublayer: Allocating a single broadcast channel (mostly a LAN) among competing users

Multiple Access Links and Protocols

Media Access Control. Networked Systems (H) Lecture 5

Lecture 6. Data Link Layer (cont d) Data Link Layer 1-1

Multiple Access Protocols

Mobile Communications Chapter 3 : Media Access

CMPE 257: Wireless and Mobile Networking

Wireless Communications

Outline. Introduction to Networked Embedded Systems - Embedded systems Networked embedded systems Embedded Internet - Network properties

CS 455/555 Intro to Networks and Communications. Link Layer

Topics. Link Layer Services (more) Link Layer Services LECTURE 5 MULTIPLE ACCESS AND LOCAL AREA NETWORKS. flow control: error detection:

CSC 4900 Computer Networks: The Link Layer

Data Link Layer: Collisions

CMPE 257: Wireless and Mobile Networking

MULTIPLE ACCESS PROTOCOLS 2. 1

CS 348: Computer Networks. - WiFi (contd.); 16 th Aug Instructor: Sridhar Iyer IIT Bombay

Lecture 19. Principles behind data link layer services Framing Multiple access protocols

CS 4453 Computer Networks Winter

ICE 1332/0715 Mobile Computing (Summer, 2008)

The Link Layer and LANs. Chapter 6: Link layer and LANs

Physical Layer. Medium Access Links and Protocols. Point-to-Point protocols. Modems: Signaling. Modems Signaling. Srinidhi Varadarajan

Chapter 12 Multiple Access 12.1

CCM 4300 Lecture 5 Computer Networks, Wireless and Mobile Communications. Dr Shahedur Rahman. Room: T115

Links. CS125 - mylinks 1 1/22/14

Chapter 5: Link layer

CMPE 150/L : Introduction to Computer Networks. Chen Qian Computer Engineering UCSC Baskin Engineering Lecture 16

Links Reading: Chapter 2. Goals of Todayʼs Lecture. Message, Segment, Packet, and Frame

CSE 461: Multiple Access. Homework: Chapter 2, problems 1, 8, 12, 18, 23, 24, 35, 43, 46, and 58

Local Area Networks (LANs) SMU CSE 5344 /

COS 140: Foundations of Computer Science

Chapter 4. The Medium Access Control Sublayer. Points and Questions to Consider. Multiple Access Protocols. The Channel Allocation Problem.

Link Layer: Retransmissions

Chapter 5 Link Layer and LANs

CSE 461: Multiple Access Networks. This Lecture

ECEN 5032 Data Networks Medium Access Control Sublayer

The MAC layer in wireless networks

Data Link Layer Technologies

CHAPTER TWO LITERATURE REVIEW

Multiple Access. Data Communications and Networking

Data Link Layer: Overview, operations

Multimedia Communication Services Traffic Modeling and Streaming

Data Link Layer. Goals of This Lecture. Engineering Questions. Outline of the Class

CARRIER SENSE MULTIPLE ACCESS (CSMA):

Rahman 1. Application

COMP476 Networked Computer Systems. Polling. Sharing the Wire. LAN Technologies. COMP476 Networked Computer Systems 1

CS 3640: Introduction to Networks and Their Applications

Link Layer and LANs 안상현서울시립대학교컴퓨터 통계학과.

Direct Link Communication II: Wired Media. Multi-Access Communication

Computer Communication III

Direct Link Communication II: Wired Media. Multi-Access Communication

CS 3516: Computer Networks

COS 140: Foundations of Computer Science

Medium Access Control. MAC protocols: design goals, challenges, contention-based and contention-free protocols

CSE 461 Multiple Access. David Wetherall

CSCI Computer Networks

Review of Topology and Access Techniques / Switching Concepts

Medium Access Control

Contention Protocols and Networks

Data Link Layer: Multi Access Protocols

Aloha and slotted aloha

High Level View. EE 122: Ethernet and Random Access protocols. Medium Access Protocols

Multiple-access protocols

Getting Connected (Chapter 2 Part 4) Networking CS 3470, Section 1 Sarah Diesburg

04/11/2011. Wireless LANs. CSE 3213 Fall November Overview

Medium Access Control Sublayer Chapter 4

Strengthening Unlicensed Band Wireless Backhaul

RMIT University. Data Communication and Net-Centric Computing COSC 1111/2061/1110. Lecture 8. Medium Access Control Methods & LAN

Lecture 8 Link Layer: functionality, error detection, media access algorithm

INTRODUCTION DATA COMMUNICATION TELECOMMUNICATIONS SYSTEM COMPONENTS 1/28/2015. Satish Chandra satish0402.weebly.com

EE 122: Ethernet and

Lecture 23 Overview. Last Lecture. This Lecture. Next Lecture ADSL, ATM. Wireless Technologies (1) Source: chapters 6.2, 15

Random Access. 1. Aloha. 2. Slotted Aloha 3. CSMA 4. CSMA/CD

Chapter 5 Link Layer. Computer Networking: A Top Down Approach. 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012

BROADBAND AND HIGH SPEED NETWORKS

ECE 158A: Lecture 13. Fall 2015

Chapter 1 Basic concepts of wireless data networks (cont d)

CSC 401 Data and Computer Communications Networks

Goals. Fundamentals of Network Media. More topics. Topics. Multiple access communication. Multiple access solutions

Intelligent Transportation Systems. Medium Access Control. Prof. Dr. Thomas Strang

Message, Segment, Packet, and Frame Link-layer services Encoding, framing, error detection, transmission control Error correction and flow control

Redes de Computadores. Medium Access Control

Real-Time (Paradigms) (47)

MSIT 413: Wireless Technologies Week 8

Long Distance Wireless Communication. Principally satellite communication:

LANs Local Area Networks LANs provide an efficient network solution : To support a large number of stations Over moderately high speed

Outline: Connecting Many Computers

Packet multiple access and the Aloha protocol

Chapter 3 MEDIA ACCESS CONTROL

Delivering Voice over IEEE WLAN Networks

Chapter 6 Medium Access Control Protocols and Local Area Networks

Adaptors Communicating. Link Layer: Introduction. Parity Checking. Error Detection. Multiple Access Links and Protocols

Transcription:

CS 716: Introduction to communication networks - 8 th class; 17 th Aug 2011 Instructor: Sridhar Iyer IIT Bombay

Key points to consider for MAC Types/Modes of communication: Although the medium is shared, who is talking to whom? 1-to-1: Conversation between two students in a corner. One-to-Many: Instructor lecturing. Many-to-One: Students responding to instructor's question. Many-to-Many: Your group discussion! Protocols for each modes of communication: 1-to-1: Separate space; Separate channel (language/frequency). 1-to-Many: Broadcast; Often associated with notion of Priority. Many-to-One: Polling; Round-robin; Some notion of taking turns. Many-to-Many: Speak at will; Listen before talk; Handle collisions! IIT Bombay cs 716 2

Multiplexing in MAC layer IIT Bombay cs 716 3

Effective resource sharing Need to share (multiplex) network resources (nodes and links) among multiple users. Logical view: Wired LAN B A C Logical view: Wireless LAN IIT Bombay cs 716 4

Common Multiplexing Strategies Space-Division Multiplexing (SDM): Different user groups are separated physically. Time-Division Multiplexing (TDM): Each user periodically gets the entire bandwidth for a small burst of time. Frequency-Division Multiplexing (FDM): Frequency spectrum divided into logical channels.; Each user has exclusive access to his channel. Code-Division Multiplexing (CDM): Each user has access to the entire spectrum but uses a different code sequence. Variants and combinations of above are used in practical networks. IIT Bombay cs 716 5

Frequency multiplex Separation of the whole spectrum into smaller frequency bands A channel gets a certain band of the spectrum for the whole time Advantages: no dynamic coordination necessary works also for analog signals k 1 Disadvantages: waste of bandwidth if the traffic is distributed unevenly inflexible guard spaces c k 2 k 3 k 4 k 5 k 6 f t Source: Schiller - Mobile Communincations IIT Bombay cs 716 6

Time multiplex A channel gets the whole spectrum for a certain amount of time Advantages: only one carrier in the medium at any time throughput high even for many users c k 1 k 2 k 3 k 4 k 5 k 6 f Disadvantages: precise synchronization t necessary Source: Schiller - Mobile Communincations IIT Bombay cs 716 7

Code multiplex Each channel has a unique code All channels use the same spectrum at the same time Advantages: bandwidth efficient no coordination and synchronization necessary good protection against interference and tapping Disadvantages: lower user data rates more complex signal regeneration Implemented using spread spectrum technology k 1 k 2 k 3 k 4 k 5 k 6 t c f Source: Schiller - Mobile Communincations IIT Bombay cs 716 8

Activity: Pair-Solo Consider a channel having Time Division Multiplexing. Each time slot is of 100 millisec duration. The total bandwidth available on the channel is 64 Mbps. There are 10 users. Slots are alloted to users in a round-robin fashion. Users always have data to send. How much data would each user have transmitted at end of 5 seconds? What is the throughput per user? Pair - Discuss the solution approach with your neighbour. Solo - Work out the answer by yourself. IIT Bombay CS 716 9

Designing multiple access protocols Problem: control access so that Throughput (the number of frames, packets, or segments, exchanged per second) is maximized. Access delay (time spent waiting for a chance to transmit) is minimized. IIT Bombay cs 716 10

Control methods options- Where? Centralized A controller grants access to the network. Distributed The stations collectively determine the order of transmission. IIT Bombay cs 716 11

Control methods options - How? Unrestricted v/s Scheduled Transmit freely v/s only during reserved intervals. Synchronous v/s Asynchronous Specific capacity dedicated to a connection versus capacity made available in response to dynamic needs. IIT Bombay cs 716 12

Multiple access protocols Fall into two categories Deterministic access: Stations talk only when they are authorized by access protocol Time Division Multiple Access (TDMA): telephony, GSM. Non-deterministic access: Contention based schemes. Collisions are avoided if possible, else resolved. ALOHA: pure and slotted CSMA/CD (Ethernet); CSMA/CA (WiFi) IIT Bombay cs 716 13

Activity: Think-Pair-Share Questions: What factors need to be considered for MAC protocol design? How does each factor influence the MAC protocol? Example: Factors Mode of communication Cost of medium How they affect Duration of access to the medium; If all have equal priority, round-robin time-slots could be used. Licensed v/s unlicensed spectrum in wireless. Think Individually Add as many entries as you can to the above table. Pair - Discuss with your neighbour. Copy answers from your neighbour's list that you have missed out! Share - Discuss with entire class. IIT Bombay CS 716 14

Key: Choice of strategy depends on Do stations send steady streams or bursts of packets? with streams, doesn t make sense to contend for medium access on a perpacket basis. with bursts, makes sense to contend for medium access, per-packet, to avoid wasting bandwidth. Do applications need guaranteed delay bounds? with delay-guarantees, need to have a scheduled access and admission control. with no-guarantees, simple contention-based schemes could be sufficient. What is the licensing cost for using the medium? with licensed medium, need to make efficient use of the spectrum (resulting in complex protocols and expensive hardware). with 'free' medium, often need to keep the hardware costs low (resulting in simple protocols but lower efficiency). IIT Bombay cs 716 15

Concept-level summary MAC implementations in most technologies are some variations or combinations of: Multiplexing strategies: FDM, TDM, CDM.. Control strategies: Centralized, Distributed, Priority.. Sharing strategies: Round robin, Polling, Carrier Sensing.. Next class - details of design decisions for some specific technologies. IIT Bombay cs 716 16

At the end of this topic You should be able to do: State the pros and cons of sharing a PHY link. Describe the functions and services of the MAC layer in a network. Identify the multiplexing, control and sharing strategies being used in a given scenario. Describe three multiplexing strategies used to share a medium. Describe three control strategies to regulate access to a medium. Describe three sharing strategies to access a medium. Evaluate tradeoff between deterministic and non-deterministic access. IIT Bombay CS 716 17

Reflection What did I learn in today's class? Each student to mention one point. Take-home questions: On what basis do we select a scheme or variations, while designing a MAC for our network? How do we evaluate our solution? IIT Bombay CS 716 18