ECSE-4670: Computer Communication Networks (CCN) Informal Quiz 3

Similar documents
Informal Quiz #01: SOLUTIONS

Topics. Link Layer Services (more) Link Layer Services LECTURE 5 MULTIPLE ACCESS AND LOCAL AREA NETWORKS. flow control: error detection:

Data Link Layer: Multi Access Protocols

Computer Networks Medium Access Control. Mostafa Salehi Fall 2008

Link layer, LANs: outline. Chapter 5-1 Link Layer. Link layer: introduction. Link layer services

CCM 4300 Lecture 5 Computer Networks, Wireless and Mobile Communications. Dr Shahedur Rahman. Room: T115

CHAPTER 7 MAC LAYER PROTOCOLS. Dr. Bhargavi Goswami Associate Professor & Head Department of Computer Science Garden City College

The Link Layer and LANs. Chapter 6: Link layer and LANs

COMP476 Networked Computer Systems. Polling. Sharing the Wire. LAN Technologies. COMP476 Networked Computer Systems 1

CS 43: Computer Networks. 27: Media Access Contd. December 3, 2018

Chapter 5 Link Layer and LANs

CS 455/555 Intro to Networks and Communications. Link Layer

Protocols for Multiaccess Networks

CS 43: Computer Networks Media Access. Kevin Webb Swarthmore College November 30, 2017

Link Layer and LANs 안상현서울시립대학교컴퓨터 통계학과.

Computer Network Fundamentals Spring Week 3 MAC Layer Andreas Terzis

Redes de Computadores. Medium Access Control

Chapter 12 Multiple Access 12.1

Multiple-access protocols

EECS 563 Fall Review Test 2. Review Test 2

Chapter 4. The Medium Access Control Sublayer. Points and Questions to Consider. Multiple Access Protocols. The Channel Allocation Problem.

ECE 4450:427/527 - Computer Networks Spring 2017

RMIT University. Data Communication and Net-Centric Computing COSC 1111/2061/1110. Lecture 8. Medium Access Control Methods & LAN

Chapter 5 Link Layer and LANs

Link Layer and Ethernet

EITF25 Internet Techniques and Applications L4: Network Access. Stefan Höst

Multiple Access Protocols

Lecture 9: Bridging. CSE 123: Computer Networks Alex C. Snoeren

Chapter 6 Medium Access Control Protocols and Local Area Networks

Summary of MAC protocols

Medium Access Protocols

ECSE 414 Fall 2014 Final Exam Solutions

Chapter 5: Link layer

Computer Networks. Today. Principles of datalink layer services Multiple access links Adresavimas, ARP LANs Wireless LANs VU MIF CS 1/48 2/48

CSC 4900 Computer Networks: The Link Layer

CSE 461: Multiple Access Networks. This Lecture

CMPE 150/L : Introduction to Computer Networks. Chen Qian Computer Engineering UCSC Baskin Engineering Lecture 16

Chapter 6 Local Area Networks and Media Access Control. School of Info. Sci. & Eng. Shandong Univ.

Link Layer and Ethernet

High Level View. EE 122: Ethernet and Random Access protocols. Medium Access Protocols

The Medium Access Sublayer

Contention Protocols and Networks

EE 122: Ethernet and

ENGI 4557 Digital Communications Practice Problems 2017 (Part 2)

The Medium Access Control Sublayer

Goals. Fundamentals of Network Media. More topics. Topics. Multiple access communication. Multiple access solutions

Medium Access Control. CSCI370 Lecture 5 Michael Hutt New York Institute of Technology

Outline. Introduction to Networked Embedded Systems - Embedded systems Networked embedded systems Embedded Internet - Network properties

Medium Access Control Sublayer Chapter 4

Lecture 6 The Data Link Layer. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it

Local Area Networks (LANs) SMU CSE 5344 /

Chapter 4. The Medium Access Control Sublayer

Networking Technologies and Applications

CSE 461: Multiple Access. Homework: Chapter 2, problems 1, 8, 12, 18, 23, 24, 35, 43, 46, and 58

COMPUTER NETWORK Model Test Paper

RAJIV GANDHI COLLEGE OF ENGINEERING AND TECHNOLOGY

Links Reading: Chapter 2. Goals of Todayʼs Lecture. Message, Segment, Packet, and Frame

Physical Layer. Medium Access Links and Protocols. Point-to-Point protocols. Modems: Signaling. Modems Signaling. Srinidhi Varadarajan

Data Link Layer -2- Network Access

Links. CS125 - mylinks 1 1/22/14

Lecture 6. Data Link Layer (cont d) Data Link Layer 1-1

Local Area Networks. Aloha Slotted Aloha CSMA (non-persistent, 1-persistent, p-persistent) CSMA/CD Ethernet Token Ring

Lecture 8 Link Layer: functionality, error detection, media access algorithm

1-1. Switching Networks (Fall 2010) EE 586 Communication and. November 8, Lecture 30

COS 140: Foundations of Computer Science

Direct Link Communication II: Wired Media. Multi-Access Communication

Chapter 5 Link Layer. Computer Networking: A Top Down Approach. 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012

Lecture 5 The Data Link Layer. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it

Chapter 5: DataLink Layer

Multiple Access (1) Required reading: Garcia 6.1, 6.2.1, CSE 3213, Fall 2010 Instructor: N. Vlajic

Physical and Data Link layers

CSC 401 Data and Computer Communications Networks

Data Link Layer Technologies

Data Link Layer -2- Network Access

CSE/EE 461 Wireless and Contention-Free Protocols

A closer look at network structure:

Data Link Layer: Collisions

Chapter 3. Underlying Technology. TCP/IP Protocol Suite 1 Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display.

Data Link Layer, Part 5. Medium Access Control

Topics for Today. More on Ethernet. Wireless LANs Readings. Topology and Wiring Switched Ethernet Fast Ethernet Gigabit Ethernet. 4.3 to 4.

CS 4453 Computer Networks Winter

LAN PROTOCOLS. Beulah A AP/CSE

CSCI-1680 Link Layer Wrap-Up Rodrigo Fonseca

Medium Access Control

CSCI-1680 Link Layer Wrap-Up Rodrigo Fonseca

Getting Connected (Chapter 2 Part 4) Networking CS 3470, Section 1 Sarah Diesburg

Chapter Seven. Local Area Networks: Part 1. Data Communications and Computer Networks: A Business User s Approach Seventh Edition

Medium Access Control Sublayer

King Fahd University of Petroleum and Minerals College of Computer Sciences and Engineering Department of Computer Engineering

Master Course Computer Networks IN2097

CSE 461 Multiple Access. David Wetherall

Electrical and Computer Engineering Technology

Local Area Network Overview

Media Access Control (MAC) Sub-layer and Ethernet

COMP/ELEC 429/556 Introduction to Computer Networks

Lecture 19. Principles behind data link layer services Framing Multiple access protocols

Wireless Communications

Internetworking is connecting two or more computer networks with some sort of routing device to exchange traffic back and forth, and guide traffic on

ET4254 Communications and Networking 1

Review. Error Detection: CRC Multiple access protocols. LAN addresses and ARP Ethernet. Slotted ALOHA CSMA/CD

Transcription:

ECSE-4670: Computer Communication Networks (CCN) Informal Quiz 3 : shivkuma@ecse.rpi.edu Biplab Sikdar: sikdab@rpi.edu 1

T F Slotted ALOHA has improved utilization since the window of vulnerability is halved compared to pure ALOHA. CSMA/CD is likely to be much better than CSMA when t_prop/t_trans >1 The logical bus model used in Ethernet implies that the channel is used in a half-duplex mode. Hubs connect two collision domains, whereas bridges connect two broadcast domains. Bridges and switches in Ethernet allow separation of collision domains, and reduce the degree of sharing of the physical media. 100Base-T was made possible because the maximum segment length necessary in UTP tree architectures was 100m. The smallest valid Type field in the Ethernet header is 0x0800 because of interoperability concerns with IEEE 802.3 which has a MTU of 1518 bytes The reason Ethernet has a minimum frame size is to guarantee detection of collision (or the lack of it) before the end of frame transmission The reason a collection of bridged collision domains do not scale is because the probability of broadcasts (by nodes or bridges) increases. 2

Randomness (in service and arrival) is what causes queuing at buffers. The inter-arrival times of a poisson arrival process are exponentially distributed. The P-K formula for M/G/1 queuing systems reduces to the E(n) formulas for M/M/1 and M/D/1 if we substitute the value for σ 2 (I.e. σ 2 = 1/µ 2 and σ 2 = 0 for exponential deterministic service processes respectively) The throughput of a M/M/1/N system is the same as that of an M/M/1 system The blocking probability of a M/M/1/N system can be approximated by that of an M/M/1 system for small buffer sizes The number of packets in an M/M/1 system is Σn(1-ρ)ρ n which can be written as (1-ρ)ρ * d/dρ{σ ρ n-1 } = ρ/(1-ρ) 3

Little s law which relates expected queuing delay E(T) and expected number in the system E(n) is applicable only to M/M/1 queues (I.e. it cannot be applied to M/G/1 and D/D/1 systems) Little s law also applies to instantaneous (as opposed to average) queuing delay and instantaneous number in the system. The number of packets in the system refers to the number of packets waiting in the queue plus the number of packets in service. In an M/M/1 system with λ = 1000 bits/s and µ = 900 bits/s, the expected delay E(T) is 5 seconds. Once a telephone circuit is established, voice samples which are switched see no (waiting) delay because it is a D/D/1 system The P-K formulas (for E(n)) for M/G/1 systems tells us that queues and queuing delay increases dramatically as utilization ρ > 0.9 and as the variance of the service times σ 2 increases. An M/G/1 system with service rate of 10 Mbps is likely to have smaller queues than a similar system with a service rate of 1Mbps, assuming other parameters are equal. Larger queues (I.e. larger E(n), as may happen in higher speed bottlenecks) does not necessarily imply larger queuing delay (I.e. larger E(T)) 4

The M/M/k/k system and the Erlang formula models the probability of your phone call being connected (I.e. not blocked). At light loads, an M/D/1 system has half the queues as an M/M/1 system, and at heavy loads, both of them have nearly equal queues. Consider a point-to-point link with no multiple-access, bit-errors or flow-control issues. Framing is not required for such a link. Parity (odd or even) works because it transforms the transmitted bits into codewords with a Hamming distance of 2. CRC is based upon the idea that it is highly unlikely for an uncorrupted packet (including CRC bits) to be perfectly divisible (I.e. zero remainder) by the CRC polynomial. The set of bits in the CRC field is the remainder of the following division operation: D. 2r/G, where D is the set of data bits, and G is a r+1 bit generator pattern. Channel partitioning MAC protocols can lead of waste of bandwidth if some users do not use their allocations. 5

Random access MAC protocols tend to perform very well at low loads in terms of channel multiplexing; but suffers from high delay at high loads. Taking turns or token-based protocols like token-ring offer a best of both partitioning and random access worlds. In Local area networks, t_prop/t_trans < 1, and number of users accessing the channel is not too large. TDMA is simply a distributed form of TDM scheduling (which does not allow statistical multiplexing); token-passing is simply a distributed form of round-robin scheduling (which allows statistical multiplexing); random access is similar to a distributed version of FCFS, with adjustments for collisions. The primary reasons a bus-protocol for LANs is different from that of a computer bus is because of distance and the number of nodes attached. The suitability of MAC protocols to a particular scenario depends upon the expected utilization levels, number of users, distances (I.e. propagation delay), transmission speeds (I.e. transmission delays), and the complexity of protocol mechanisms. This is why we have a slew of MAC protocols for a variety of applications from Ethernet to Wireless LANs to satellite networks to cable networks. 6

CDMA divides frequency into multiple bands and has users transmitting in an assigned band only. Orthogonal CDMA codes lead to interference in transmission. Fixed-channel assignment protocols for packet switched data (with markovian arrival/service distribution) leads to a reduction in average delay by a factor of N. Slotted ALOHA has a maximum utilization of 18%. Slotted ALOHA increases utilization over unslotted ALOHA because it does not allow collisions to occur between users who arrive in adjacent time slots. The CSMA part of Ethernet uses p-persistent transmission with a p of 0.5. The collision detection part of Ethernet really pays off in practice because average transmission time >> propagation time. In Ethernet, all nodes detect collision at precisely the same time instant. In Ethernet, a node which sees collision and backs off tends to remain in backoff phases if other nodes which have not seen a collision are constantly accessing the channel (a.k.a. the capture effect). Ethernet uses a linear backoff system when it detects collision. 7

Token ring is essentially a distributed polling implementation where the revolving token polls a node to see if it has something to transmit. Token-based protocols cannot be implemented on a bus-architecture. Reservation protocols cannot be implemented on a ring architecture. Ethernet succeeded in the real-world because the protocol was flexible enough to be applied to a variety of media and topology architectures, especially the tree architectures which could leverage the existing PBX twisted pair wiring & conduits in buildings. Ethernet has a minimum packet size because the transmission of packet at the source node without hearing a collision is assumed to be an acknowledgement of the transmission (I.e. no collisions are allowed to happen if the source has not heard it till end of packet transmission). Token ring has a minimum packet size of 64 bytes. CRC bits are placed at the end of the packet (I.e. as a trailer instead of at the header ), because the CRC can be calculated as the packet bits are processed, and be appended to the end. Hubs isolate collision domains. Routers are placed at the border of broadcast domains. The 10BaseT notation represents 100 Mbps Ethernet operating over coaxial cable. 8

Hubs are essentially repeaters with multiple ports, I.e., they operate at layer 1, regenerate and broadcast signals to all the connected ports. Full-duplex Point-to-point Gigabit Ethernet implies that only the Ethernet framing format is used, but the CSMA/CD protocol is not used (coz CSMA/CD assumes a half-duplex and multiple-access channel) Layer 2 switches are just bridges with a high speed switching fabric (I.e. high speed parallel forwarding). The primarily difference between interconnection devices at Layer 1 (hubs, repeaters), Layer 2 (bridges) and Layer 3 (routers) is the degree and intelligence of filtering packets. Their efficiency of filtering also fundamentally limits their scalability. Bridges filtering capability is through a learning algorithm where the bridge snoops on passing packets and determines which side a node lies. In the absence of any packets seen, a bridge resorts to flooding something a router (I.e. layer 3 device) will never do. The purpose of a dynamically constructed spanning tree between bridges is to limit the scope of flooded packets so that they don t appear on the same LAN twice. The 802.11 wireless LAN MAC protocol uses CSMA/CA instead of CSMA/CD because collisions can be heard only at the receiver (and not at the source node) because of the hidden terminal problem. 9

T F Slotted ALOHA has improved utilization since the window of vulnerability is halved compared to pure ALOHA. CSMA/CD is likely to be much better than CSMA when t_prop/t_trans >1 The logical bus model used in Ethernet implies that the channel is used in a half-duplex mode. Hubs connect two collision domains, whereas bridges connect two broadcast domains. Bridges and switches in Ethernet allow separation of collision domains, and reduce the degree of sharing of the physical media. 100Base-T was made possible because the maximum segment length necessary in UTP (twisted pair) tree architectures was 100m. The smallest valid Type field in the Ethernet header is 0x0800 because of interoperability concerns with IEEE 802.3 which has a MTU of 1518 bytes The reason Ethernet has a minimum frame size is to guarantee detection of collision (or the lack of it) before the end of frame transmission The reason a collection of bridged collision domains do not scale is because the probability of broadcasts (by nodes or bridges) Shivkumar increases. Kalyanaraman Solutions 10

Randomness (in service and arrival) is what causes queuing at buffers. The inter-arrival times of a poisson arrival process are exponentially distributed. The P-K formula for M/G/1 queuing systems reduces to the E(n) formulas for M/M/1 and M/D/1 if we substitute the value for σ 2 (I.e. σ 2 = 1/µ 2 and σ 2 = 0 for exponential deterministic service processes respectively) The throughput of a M/M/1/N system is the same as that of an M/M/1 system The blocking probability of a M/M/1/N system can be approximated by that of an M/M/1 system for small buffer sizes The number of packets in an M/M/1 system is Σn(1-ρ)ρ n which can be written as (1-ρ)ρ * d/dρ{σ ρ n-1 } = ρ/(1-ρ) 11

Little s law which relates expected queuing delay E(T) and expected number in the system E(n) is applicable only to M/M/1 queues (I.e. it cannot be applied to M/G/1 and D/D/1 systems) Little s law also applies to instantaneous (as opposed to average) queuing delay and instantaneous number in the system. The number of packets in the system refers to the number of packets waiting in the queue plus the number of packets in service. In an M/M/1 system with λ = 1000 bits/s and µ = 900 bits/s, the expected delay E(T) is 5 seconds. Once a telephone circuit is established, voice samples which are switched see no (waiting) delay because it is a D/D/1 system The P-K formulas (for E(n)) for M/G/1 systems tells us that queues and queuing delay increases dramatically as utilization ρ > 0.9 and as the variance of the service times σ 2 increases. An M/G/1 system with service rate of 10 Mbps is likely to have smaller queues than a similar system with a service rate of 1Mbps, assuming other parameters are equal. Larger queues (I.e. larger E(n), as may happen in higher speed bottlenecks) does not necessarily imply larger queuing delay (I.e. larger E(T)) 12

The M/M/k/k system and the Erlang formula models the probability of your phone call being connected (I.e. not blocked). At light loads, an M/D/1 system has half the queues as an M/M/1 system, and at heavy loads, both of them have nearly equal queues. Consider a point-to-point link with no multiple-access, bit-errors or flow-control issues. Framing is not required for such a link. Parity (odd or even) works because it transforms the transmitted bits into codewords with a Hamming distance of 2. CRC is based upon the idea that it is highly unlikely for an uncorrupted packet (including CRC bits) to be perfectly divisible (I.e. zero remainder) by the CRC polynomial. The set of bits in the CRC field is the remainder of the following division operation: D. 2r/G, where D is the set of data bits, and G is a r+1 bit generator pattern. Channel partitioning MAC protocols can lead of waste of bandwidth if some users do not use their allocations. 13

Random access MAC protocols tend to perform very well at low loads in terms of channel multiplexing; but suffers from high delay at high loads. Taking turns or token-based protocols like token-ring offer a best of both partitioning and random access worlds. In Local area networks, t_prop/t_trans < 1, and number of users accessing the channel is not too large. TDMA is simply a distributed form of TDM scheduling (which does not allow statistical multiplexing); token-passing is simply a distributed form of round-robin scheduling (which allows statistical multiplexing); random access is similar to a distributed version of FCFS, with adjustments for collisions. The primary reasons a bus-protocol for LANs is different from that of a computer bus is because of distance and the number of nodes attached. The suitability of MAC protocols to a particular scenario depends upon the expected utilization levels, number of users, distances (I.e. propagation delay), transmission speeds (I.e. transmission delays), and the complexity of protocol mechanisms. This is why we have a slew of MAC protocols for a variety of applications from Ethernet to Wireless LANs to satellite networks to cable networks. 14

CDMA divides frequency into multiple bands and has users transmitting in an assigned band only. Orthogonal CDMA codes lead to interference in transmission. Fixed-channel assignment protocols for packet switched data (with markovian arrival/service distribution) leads to a reduction in average delay by a factor of N. Slotted ALOHA has a maximum utilization of 18%. Slotted ALOHA increases utilization over unslotted ALOHA because it does not allow collisions to occur between users who arrive in adjacent time slots. The CSMA part of Ethernet uses p-persistent transmission with a p of 0.5. The collision detection part of Ethernet really pays off in practice because average transmission time >> propagation time. In Ethernet, all nodes detect collision at precisely the same time instant. In Ethernet, a node which sees collision and backs off tends to remain in backoff phases if other nodes which have not seen a collision are constantly accessing the channel (a.k.a. the capture effect). Ethernet uses a linear backoff system when it detects collision. 15

Token ring is essentially a distributed polling implementation where the revolving token polls a node to see if it has something to transmit. Token-based protocols cannot be implemented on a bus-architecture. Reservation protocols cannot be implemented on a ring architecture. Ethernet succeeded in the real-world because the protocol was flexible enough to be applied to a variety of media and topology architectures, especially the tree architectures which could leverage the existing PBX twisted pair wiring & conduits in buildings. Ethernet has a minimum packet size because the transmission of packet at the source node without hearing a collision is assumed to be an acknowledgement of the transmission (I.e. no collisions are allowed to happen if the source has not heard it till end of packet transmission). Token ring has a minimum packet size of 64 bytes. CRC bits are placed at the end of the packet (I.e. as a trailer instead of at the header ), because the CRC can be calculated as the packet bits are processed, and be appended to the end. Hubs isolate collision domains. Routers are placed at the border of broadcast domains. The 10BaseT notation represents 100 Mbps Ethernet operating over coaxial cable. 16

Hubs are essentially repeaters with multiple ports, I.e., they operate at layer 1, regenerate and broadcast signals to all the connected ports. Full-duplex Point-to-point Gigabit Ethernet implies that only the Ethernet framing format is used, but the CSMA/CD protocol is not used (coz CSMA/CD assumes a half-duplex and multiple-access channel) Layer 2 switches are just bridges with a high speed switching fabric (I.e. high speed parallel forwarding). The primarily difference between interconnection devices at Layer 1 (hubs, repeaters), Layer 2 (bridges) and Layer 3 (routers) is the degree and intelligence of filtering packets. Their efficiency of filtering also fundamentally limits their scalability. Bridges filtering capability is through a learning algorithm where the bridge snoops on passing packets and determines which side a node lies. In the absence of any packets seen, a bridge resorts to flooding something a router (I.e. layer 3 device) will never do. The purpose of a dynamically constructed spanning tree between bridges is to limit the scope of flooded packets so that they don t appear on the same LAN twice. The 802.11 wireless LAN MAC protocol uses CSMA/CA instead of CSMA/CD because collisions can be heard only at the receiver (and not at the source node) because of the hidden terminal problem. 17