Random Assignment Protocols

Similar documents
Unit 7 Media Access Control (MAC)

Random Access. 1. Aloha. 2. Slotted Aloha 3. CSMA 4. CSMA/CD

Ethernet. Introduction. CSE 3213 Fall 2011

Data Communications. Automatic Repeat Request Medium Access Control

ECE 4450:427/527 - Computer Networks Spring 2017

LANs Local Area Networks LANs provide an efficient network solution : To support a large number of stations Over moderately high speed

Chapter 12 Multiple Access 12.1

CHAPTER 7 MAC LAYER PROTOCOLS. Dr. Bhargavi Goswami Associate Professor & Head Department of Computer Science Garden City College

COS 140: Foundations of Computer Science

Outline. Introduction to Networked Embedded Systems - Embedded systems Networked embedded systems Embedded Internet - Network properties

Multiple Access Protocols

CS 716: Introduction to communication networks. - 9 th class; 19 th Aug Instructor: Sridhar Iyer IIT Bombay

Lecture 8 The Data Link Layer part I. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it

LANs. Local Area Networks. via the Media Access Control (MAC) SubLayer. Networks: Local Area Networks

SENSOR-MAC CASE STUDY

Multiple Access. Data Communications and Networking

Data and Computer Communications. Chapter 11 Local Area Network

CS 43: Computer Networks. 27: Media Access Contd. December 3, 2018

1-1. Switching Networks (Fall 2010) EE 586 Communication and. November 8, Lecture 30

Medium Access Control

CS 455/555 Intro to Networks and Communications. Link Layer

Intelligent Transportation Systems. Medium Access Control. Prof. Dr. Thomas Strang

LECTURE PLAN. Script. Introduction about MAC Types o ALOHA o CSMA o CSMA/CD o CSMA/CA

CS 43: Computer Networks Media Access. Kevin Webb Swarthmore College November 30, 2017

Data Link Layer: Collisions

Medium Access Control. MAC protocols: design goals, challenges, contention-based and contention-free protocols

MAC Sublayer(1) Principal service of the Medium Access Control Sublayer: Allocating a single broadcast channel (mostly a LAN) among competing users

COS 140: Foundations of Computer Science

CMPE 257: Wireless and Mobile Networking

Chapter 5: Link layer

Multiple Access Links and Protocols

CARRIER SENSE MULTIPLE ACCESS (CSMA):

Contention Protocols and Networks

Aloha and slotted aloha

ECEN 5032 Data Networks Medium Access Control Sublayer

Jaringan Komputer. Broadcast Network. Outline. MAC (Medium Access Control) Channel Allocation Problem. Dynamic Channel Allocation

Strengthening Unlicensed Band Wireless Backhaul

Redes de Computadores. Medium Access Control

Lecture 4: Wireless MAC Overview. Hung-Yu Wei National Taiwan University

Topics. Link Layer Services (more) Link Layer Services LECTURE 5 MULTIPLE ACCESS AND LOCAL AREA NETWORKS. flow control: error detection:

Wireless Medium Access Control Protocols

The Link Layer and LANs. Chapter 6: Link layer and LANs

Chapter 4. The Medium Access Control Sublayer. Points and Questions to Consider. Multiple Access Protocols. The Channel Allocation Problem.

King Fahd University of Petroleum and Minerals College of Computer Sciences and Engineering Department of Computer Engineering

Lecture 5 The Data Link Layer. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it

Link Layer and LANs 안상현서울시립대학교컴퓨터 통계학과.

Wireless Communications

Data Link Layer -2- Network Access

Computer Network Fundamentals Spring Week 3 MAC Layer Andreas Terzis

Data and Computer Communications

2.1 CHANNEL ALLOCATION 2.2 MULTIPLE ACCESS PROTOCOLS Collision Free Protocols 2.3 FDDI 2.4 DATA LINK LAYER DESIGN ISSUES 2.5 FRAMING & STUFFING

Chapter 5 Link Layer and LANs

Physical Layer. Medium Access Links and Protocols. Point-to-Point protocols. Modems: Signaling. Modems Signaling. Srinidhi Varadarajan

LAN PROTOCOLS. Beulah A AP/CSE

Data Link Layer -2- Network Access

The Medium Access Control Scheme (MAC Layer) Reference: Andrew S. Tanenbaum, Computer Networks, 3rd Edition, Prentice Hall, 1996.

Data Link Layer: Multi Access Protocols

EITF25 Internet Techniques and Applications L4: Network Access. Stefan Höst

Chapter 1 Basic concepts of wireless data networks (cont d)

College of Computer and Information Sciences Department of Computer Engineering CEN444 Computer Networks Midterm 2 Exam Second Semester 1434/1435

High Level View. EE 122: Ethernet and Random Access protocols. Medium Access Protocols

Computer Networks Medium Access Control. Mostafa Salehi Fall 2008

Real-Time (Paradigms) (47)

NMA Radio Networks Network Level: Medium Access Control Roberto Verdone

Computer Communication III

Lecture 6 The Data Link Layer. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it

CSE 461 Multiple Access. David Wetherall

Links. CS125 - mylinks 1 1/22/14

Chapter 6 Medium Access Control Protocols and Local Area Networks

EE 122: Ethernet and

Lecture 19. Principles behind data link layer services Framing Multiple access protocols

Problem Set Name the 7 OSI layers and give the corresponding functionalities for each layer.

Medium Access Control Sublayer Chapter 4

ECE453 Introduction to Computer Networks. Broadcast vs. PPP. Delay. Lecture 7 Multiple Access Control (I)

Packet multiple access and the Aloha protocol

Markov Chains and Multiaccess Protocols: An. Introduction

CSC 4900 Computer Networks: The Link Layer

CMPE 150/L : Introduction to Computer Networks. Chen Qian Computer Engineering UCSC Baskin Engineering Lecture 16

Multiple Access (1) Required reading: Garcia 6.1, 6.2.1, CSE 3213, Fall 2010 Instructor: N. Vlajic

The MAC layer in wireless networks

Links Reading: Chapter 2. Goals of Todayʼs Lecture. Message, Segment, Packet, and Frame

ICE 1332/0715 Mobile Computing (Summer, 2008)

RMIT University. Data Communication and Net-Centric Computing COSC 1111/2061/1110. Lecture 8. Medium Access Control Methods & LAN

Lecture 12 December 04, Wireless Access. Graduate course in Communications Engineering. University of Rome La Sapienza. Rome, Italy

Chapter 4 (Week 7) The Medium Access Control Sublayer ANDREW S. TANENBAUM COMPUTER NETWORKS FOURTH EDITION PP CN&DC Dr.

MULTIPLE ACCESS PROTOCOLS 2. 1

Computer Networks Principles LAN - Ethernet

Medium Access Control. CSCI370 Lecture 5 Michael Hutt New York Institute of Technology

Computer Networks. Today. Principles of datalink layer services Multiple access links Adresavimas, ARP LANs Wireless LANs VU MIF CS 1/48 2/48

Mobile Communications Chapter 3 : Media Access

COMMUNICATION NETWORKS NETW 501

MSIT 413: Wireless Technologies Week 8

Medium Access Control Sublayer

Lecture 6. Data Link Layer (cont d) Data Link Layer 1-1

Media Access Control. Networked Systems (H) Lecture 5

CSE 461: Multiple Access Networks. This Lecture

Chapter 4. The Medium Access Control Sublayer

Data and Computer Communications. Chapter 13 Wireless LANs

Networks Homework # 2

The MAC layer in wireless networks

Transcription:

Random Assignment Protocols Random assignment strategies attempt to reduce problem occur in fixed assignment strategy by eliminating pre allocation of bandwidth to communicating nodes. Random assignment strategies do not exercise any control to determine which communicating node can access the medium next. Furthermore, these strategies do not assign any predictable or scheduled time for any node to transmit. All backlogged nodes must contend to access the transmission medium. Collision occurs when more than one node attempts to transmit simultaneously. To deal with collisions, the protocol must include a mechanism to detect collisions and a scheme to schedule colliding packets for subsequent retransmissions.

ALOHA ALOHA is a simple random assignment protocol developed to regulate access to a shared transmission medium among uncoordinated contending users. Channel access in pure ALOHA is completely asynchronous and independent of the current activity on the transmission medium. A node is simply allowed to transmit data whenever it is ready to do so. Upon completing the data transmission, the communicating node listens for a period of time equal to the longest possible round-trip propagation time on the network.

This is typically the time it takes for the signal to travel between the two most distant nodes in the network. If the node receives an acknowledgment for data transmitted before this period of time elapses, the transmission is considered successful. The acknowledgment is issued by the receiving station after it determines the correctness of the data received by examining the error check sum. In the absence of an acknowledgment, however, the communicating node assumes that the data are lost due to errors caused by noise on the communication channel or because of collision, and retransmits the data. If the number of transmission attempts exceeds a specified threshold, the node stops retransmitting the data and reports a fatal error.

ALOHA is simple protocol that requires no central control, thereby allowing nodes to be added and removed easily. Furthermore, under light-load conditions, nodes can gain access to the channel within short periods of time. The main drawback of the protocol, however, is that network performance degrades severely as the number of collisions rises rapidly with increased load.

To improve the performance of pure ALOHA, slotted ALOHA was proposed. In slotted ALOHA, all communication nodes are synchronized and all packets have the same length. Furthermore, The communication channel is divided into uniform time slots whose duration is equal to the transmission time of a data packet. Contrary to pure ALOHA, transmission can occur only at a slot boundary. Consequently, collision can occur only in the beginning of a slot, and colliding packets overlap totally in time.

CSMA CSMA operates both in continuous time, unslotted CSMA, and in discrete time, slotted CSMA. Furthermore, the class of CSMA protocols can be divided into two categories, 1. non persistent CSMA and 2. persistent CSMA, depending on the strategy used to acquire a free channel and the strategy used to wait for a busy channel to become free.

In nonpersistent CSMA protocol, when a node becomes ready to transmit a packet, it first senses the carrier to determine if another transmission is in progress. If the channel is idle, the node transmits its packet immediately and waits for an acknowledgment. In the absence of an acknowledgment, before a timeout occurs, the sending node assumes that the data packet is lost due to collision or noise interference. The station schedules the packet for retransmission. If the channel is busy, the transmitting node backs off for a random period of time after which it senses the channel again. Depending on the status of the channel, the station transmits its packet if the channel is idle, or enters the back-off mode if the channel is busy. This process is repeated until the data packet is transmitted successfully.

CSMA/CD CSMA/CA scheme are susceptible to two problems, commonly referred to as the hidden- and exposed-node problems. A hidden node is defined as a node that is within the range of the destination node but out of range of the transmitting node.

Hidden Node

Hidden Node Node B is within the transmission range of nodes A and C. Furthermore, assume that nodes A and C are outside their mutual transmission ranges.. Given this network configuration, assume that node A needs to transmit a data packet to node B. According to the CSMA protocol, node A senses the channel and determines that it is free. Node A then proceeds to transmit its packet. Assume now that before node A completes its transmission to node B, nodec decides to transmit a data packet to node B. Using the CSMA protocol, node C senses the channel and also determines that the channel is free, since node C, which is outside the transmission range of node A, cannot hear the signal transmitted by node A. As a result, both transmissions collide at node B, thereby causing the loss of both data packets.

An exposed node is a node that is within the range of the sender but out of the range of the destination.

Exposed Node where node B is within the transmission range of nodes A and C, nodes A and C are outside their mutual transmission ranges, and node D is within the transmission range of node C. Assume that node B wants to transmit a message to node A. Node B executes the CSMA protocol to sense the channel, determines that the channel is free, and proceeds to transmit the data packet to node A. Assume now that node C needs to send a packet to D. Node C follows the CSMA rule and first senses the channel. Due to the ongoing transmission between nodes B and A, node C determines that the channel is busy and delays the transmission of its packet to a later time.