Data Communications. Automatic Repeat Request Medium Access Control

Similar documents
Data Link Layer. Goals of This Lecture. Engineering Questions. Outline of the Class

Problem Set Name the 7 OSI layers and give the corresponding functionalities for each layer.

Random Assignment Protocols

COS 140: Foundations of Computer Science

Aloha and slotted aloha

CHAPTER 7 MAC LAYER PROTOCOLS. Dr. Bhargavi Goswami Associate Professor & Head Department of Computer Science Garden City College

High Level View. EE 122: Ethernet and Random Access protocols. Medium Access Protocols

Chapter 1 Basic concepts of wireless data networks (cont d)

2.1 CHANNEL ALLOCATION 2.2 MULTIPLE ACCESS PROTOCOLS Collision Free Protocols 2.3 FDDI 2.4 DATA LINK LAYER DESIGN ISSUES 2.5 FRAMING & STUFFING

EE 122: Ethernet and

COMMUNICATION NETWORKS NETW 501

COS 140: Foundations of Computer Science

Random Access. 1. Aloha. 2. Slotted Aloha 3. CSMA 4. CSMA/CD

CS 716: Introduction to communication networks. - 9 th class; 19 th Aug Instructor: Sridhar Iyer IIT Bombay

ERROR AND FLOW CONTROL. Lecture: 10 Instructor Mazhar Hussain

LANs. Local Area Networks. via the Media Access Control (MAC) SubLayer. Networks: Local Area Networks

Multiple Access Protocols

LAN PROTOCOLS. Beulah A AP/CSE

Multiple Access Links and Protocols

Multiple Access. Data Communications and Networking

ECE453 Introduction to Computer Networks. Broadcast vs. PPP. Delay. Lecture 7 Multiple Access Control (I)

Ethernet. Introduction. CSE 3213 Fall 2011

The Link Layer II: Ethernet

ECEN 5032 Data Networks Medium Access Control Sublayer

MAC Sublayer(1) Principal service of the Medium Access Control Sublayer: Allocating a single broadcast channel (mostly a LAN) among competing users

ECE 4450:427/527 - Computer Networks Spring 2017

Medium Access Control

Wireless Medium Access Control Protocols

Chapter 12 Multiple Access 12.1

Chapter 6 Medium Access Control Protocols and Local Area Networks

Lecture 7: Flow Control"

Link Layer: Retransmissions

CS 43: Computer Networks. 27: Media Access Contd. December 3, 2018

CSE 461: Multiple Access Networks. This Lecture

COMPUTER NETWORKS UNIT 3

10.1 REVIEW QUESTIONS

Lecture 12 December 04, Wireless Access. Graduate course in Communications Engineering. University of Rome La Sapienza. Rome, Italy

Outline. Introduction to Networked Embedded Systems - Embedded systems Networked embedded systems Embedded Internet - Network properties

Data Link Layer: Overview, operations

Data and Computer Communications

Direct Link Networks (II)

Jaringan Komputer. Broadcast Network. Outline. MAC (Medium Access Control) Channel Allocation Problem. Dynamic Channel Allocation

Lecture 7: Flow & Media Access Control"

ECE/CSC 570 Section 001. Final test. December 11, 2006

Data Link Layer -2- Network Access

ICE 1332/0715 Mobile Computing (Summer, 2008)

CS 4453 Computer Networks Winter

Markov Chains and Multiaccess Protocols: An. Introduction

Medium Access Control. MAC protocols: design goals, challenges, contention-based and contention-free protocols

Link Layer. (continued)

Data Link Layer: Collisions

Local Area Networks (LANs) SMU CSE 5344 /

Lecture 7: Sliding Windows. CSE 123: Computer Networks Geoff Voelker (guest lecture)

Topics. Link Layer Services (more) Link Layer Services LECTURE 5 MULTIPLE ACCESS AND LOCAL AREA NETWORKS. flow control: error detection:

Media Access Control. Networked Systems (H) Lecture 5

EITF25 Internet Techniques and Applications L4: Network Access. Stefan Höst

The flow of data must not be allowed to overwhelm the receiver

CSMA/CD (Collision Detection)

Data Link Layer -2- Network Access

Data Link Control Protocols

CMPE 257: Wireless and Mobile Networking

Chapter 4 Data Link Layer

Data and Computer Communications. Chapter 11 Local Area Network

CONTENTION BASED PROTOCOLS WITH RESERVATION MECHANISMS

CPE 448/548 Exam #1 (100 pts) February 14, Name Class: 448

Rahman 1. Application

Review. Error Detection: CRC Multiple access protocols. LAN addresses and ARP Ethernet. Slotted ALOHA CSMA/CD

CS 43: Computer Networks Media Access. Kevin Webb Swarthmore College November 30, 2017

Physical Layer. Medium Access Links and Protocols. Point-to-Point protocols. Modems: Signaling. Modems Signaling. Srinidhi Varadarajan

Link Layer and LANs 안상현서울시립대학교컴퓨터 통계학과.

Redes de Computadores. Medium Access Control

Lecture 5 The Data Link Layer. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it

Wireless Sensor Networks 7th Lecture

CONNECTION-ORIENTED & CONNECTIONLESS NETWORKS

RMIT University. Data Communication and Net-Centric Computing COSC 1111/2061/1110. Lecture 8. Medium Access Control Methods & LAN

Chapter 4. The Medium Access Control Sublayer. Points and Questions to Consider. Multiple Access Protocols. The Channel Allocation Problem.

Telecommunication Protocols Laboratory Course. Lecture 2

Contention Protocols and Networks

COMPUTER NETWORKS - Local area networks

Local area networks. Copyright

12.2. Figure 12.1 Data link layer divided into two functionality-oriented sublayers

Medium Access Control. CSCI370 Lecture 5 Michael Hutt New York Institute of Technology

Lecture 4: Wireless MAC Overview. Hung-Yu Wei National Taiwan University

MAC LAYER. Murat Demirbas SUNY Buffalo

CSE 6811 Ashikur Rahman

Packet multiple access and the Aloha protocol

Protocols for Multiaccess Networks

Logical Link Control (LLC) Medium Access Control (MAC)

Multiple-access protocols

Computer Network Fundamentals Spring Week 3 MAC Layer Andreas Terzis

Solutions for Chapter similar to 1 and 3

CCM 4300 Lecture 5 Computer Networks, Wireless and Mobile Communications. Dr Shahedur Rahman. Room: T115

CS 123: Lecture 12, LANs, and Ethernet. George Varghese. October 24, 2006

Lecture 8 The Data Link Layer part I. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it

Multiple Access (1) Required reading: Garcia 6.1, 6.2.1, CSE 3213, Fall 2010 Instructor: N. Vlajic

ETSN01 Exam Solutions

LECTURE PLAN. Script. Introduction about MAC Types o ALOHA o CSMA o CSMA/CD o CSMA/CA

Chapter 5 Data-Link Layer: Wired Networks

Lecture 19. Principles behind data link layer services Framing Multiple access protocols

CMPE 257: Wireless and Mobile Networking

Transcription:

Data Communications Automatic Repeat Request Medium Access Control

Handling Error Cases Automatic Repeat request(arq), also known as Automatic Repeat Query, is an error-control method ARQ uses acknowledgements and timeouts to achieve reliable data transmission over an unreliable service. Acknowledgements (ACK): messages sent by the receiver indicating that it has correctly received a data frame Timeout: specified periods of time allowed to elapse before an acknowledgment is to be received

Re-transmission If the sender does not receive an acknowledgment before the timeout, it usually re-transmits the frame until an acknowledgment is received, or a predefined number of re-transmissions is exceeded. A receiver may also send a negative acknowledgement (NAK) to indicate an error

Types of ARQ The types of ARQ protocols include Stop-and-wait ARQ Go-Back-N ARQ Selective Repeat ARQ

Stop-and-Wait Stop-and-wait ARQ is a method used in telecommunications to send information between two connected devices. It is the simplest kind of automatic repeat-request (ARQ) method. A stop-and-wait ARQ sender sends one frame at a time. After sending each frame, the sender does NOT send any further frames until it receives an acknowledgement (ACK) signal. After receiving a good frame, the receiver sends an ACK. If the ACK does not reach the sender before a certain time, known as the timeout, the sender sends the same frame again.

Sliding Window Stop-and-wait does not utilize the bandwidth efficiently. The sender does not transmit until it receives an ACK. Sliding window methods let a sender to send more frames before receiving an ACK The window shows the frames waiting for ACK

Go-Back-N Sends N frames before receiving an ACK N is the window size If no ACK is received (timeout), re-transmits all frames in the window (goes back N frames) Advantages: Receiver does not need to keep the frames in buffer Disadvantage: Even the frames delivered correctly are re-transmitted

Selective Repeat Sends N frames before receiving an ACK If a frame is in error, the receiver sends NAK for it. The sender re-transmits the frame in error. The receiver collectively acknowledges the frames (ACK i means all frames up to and including i have been received) Advantages: Sender does not need to re-transmit correctly delivered frames. Disadvantage: Receiver has to keep track of the order of the frames. A large buffer is needed.

Sequence Numbers of the Frames To distinguish frames and ACK/NAK messages, sequence numbers are used Sequence number range should be at least twice the size of the window

Medium Access Control In a broadcast network, the medium is shared Only one message can be transmitted at any given time. If two or more messages are sent, a collision happens Medium access control methods try to reduce/eliminate collisions

Pure ALOHA If you have any data to send, send immediately If the message collides with another transmission, try resending "later" On collision, sender waits random time before trying again

Pure ALOHA Advantages: Simple, not initial waiting time, best for lightly loaded networks Disadvantages: High rate of collisions in heavily loaded networks

Slotted ALOHA An improvement to the original ALOHA protocol was "Slotted ALOHA", which introduced discrete timeslots and increased the maximum throughput. A station can send only at the beginning of a timeslot, and thus collisions are reduced.

Slotted ALOHA Advantages: Lower rate of collisions in heavily loaded networks (compared to pure ALOHA) Disadvantages: More complex, time synchronization is required for determining the time slots, includes initial waiting time, nor suitable for lightly loaded networks

Carrier Sensing Carrie Sense Multiple Access (CSMA) A carrier sensing scheme is used to avoid transmission when the medium is busy. A transmitting data station that detects another A transmitting data station that detects another signal while transmitting a frame, stops transmitting that frame, waits [for a random time interval] before trying to resend the frame

Collision Detection Transmission in presence of collision is waste of time/bandwidth. If sender detects collision, it stops, waits for a random time, re-transmit the frame. Collision detection procedure: Continue transmission until minimum packet time is reached to ensure that all receivers detect the collision. Read back the transmitted bits and check. If the transmitted and read back bits are different, then a collision has happened Wait for a random time, retry transmission

Accessing the Medium If the medium is busy the transmitter react by: 1-Persistent Non-Persistent P-Persistent

1-Persistent When the sender is ready to transmit data, it checks if the transmission medium is busy. If busy, it senses the medium continually (Persistently) until it becomes idle, and then it transmits the message (a frame). In case of a collision, the sender waits for a random period of time and attempts to transmit again.

Non-Persistent The sender senses the medium and if the channel is idle it starts transmitting the data. If the medium is busy, the sender does not persistentlysense it but instead it waits for a random amount of time and repeats the algorithm.

P-Persistent When the sender is ready to send data, it checks continually if the medium is busy. When the medium becomes idle, the sender transmits a frame with a probability p at the next time slot. If the sender chooses not to transmit (the probability of this event is 1-p), it waits until the next time slot and repeats the process until the frame is sent.