Medium Access Control. IEEE , Token Rings. CSMA/CD in WLANs? Ethernet MAC Algorithm. MACA Solution for Hidden Terminal Problem

Similar documents
IEEE , Token Rings. 10/11/06 CS/ECE UIUC, Fall

CSE 461: Wireless Networks

IEEE Medium Access Control. Medium Access Control

Mohamed Khedr.

Computer Network Fundamentals Spring Week 3 MAC Layer Andreas Terzis

CS/ECE 439: Wireless Networking. MAC Layer Road to Wireless

Medium Access Control. MAC protocols: design goals, challenges, contention-based and contention-free protocols

Lecture 16: QoS and "

ICE 1332/0715 Mobile Computing (Summer, 2008)

Chapter 12 Multiple Access 12.1

Data and Computer Communications. Chapter 13 Wireless LANs

Multiple Access Links and Protocols

CMPE 257: Wireless and Mobile Networking

CSE 6811 Ashikur Rahman

Logical Link Control (LLC) Medium Access Control (MAC)

Unit 7 Media Access Control (MAC)

1999, Scott F. Midkiff

Multiple Access Protocols

CARRIER SENSE MULTIPLE ACCESS (CSMA):

Data always flows in one direction around ring Like Ethernet, all nodes see all frames, and protocol is necessary to decide when to send

The MAC layer in wireless networks

04/11/2011. Wireless LANs. CSE 3213 Fall November Overview

CSE 461: Multiple Access Networks. This Lecture

Getting Connected (Chapter 2 Part 4) Networking CS 3470, Section 1 Sarah Diesburg

Rahman 1. Application

Wireless Local Area Network (IEEE )

CS 43: Computer Networks. 27: Media Access Contd. December 3, 2018

CSC344 Wireless and Mobile Computing. Department of Computer Science COMSATS Institute of Information Technology

Wireless Communications

Unit II. Part A (2 Marks)

CSE/EE 461 Wireless and Contention-Free Protocols

Computer Communication III

MAC in /20/06

The MAC layer in wireless networks

Topics. Link Layer Services (more) Link Layer Services LECTURE 5 MULTIPLE ACCESS AND LOCAL AREA NETWORKS. flow control: error detection:

Lecture 25: CSE 123: Computer Networks Alex C. Snoeren. HW4 due NOW

ECE 333: Introduction to Communication Networks Fall Lecture 19: Medium Access Control VII

CS 43: Computer Networks Media Access. Kevin Webb Swarthmore College November 30, 2017

Shared Access Networks. Media Access Protocols. Ethernet (802.3) Ethernet cont...

Media Access Control in Ad Hoc Networks

Multiple Access Channels

Data Communications. Data Link Layer Protocols Wireless LANs

Redes de Computadores. Medium Access Control

CSCD 433 Network Programming Fall Lecture 7 Ethernet and Wireless

MAC. Fall Data Communications II 1

Wireless LANs. ITS 413 Internet Technologies and Applications

Lecture 24: CSE 123: Computer Networks Stefan Savage. HW4 due NOW

Introduction to Wireless Networking CS 490WN/ECE 401WN Winter Lecture 4: Wireless LANs and IEEE Part II

Lecture 6. Data Link Layer (cont d) Data Link Layer 1-1

Wireless Local Area Networks (WLANs) Part I

standard. Acknowledgement: Slides borrowed from Richard Y. Yale

Topics for Today. More on Ethernet. Wireless LANs Readings. Topology and Wiring Switched Ethernet Fast Ethernet Gigabit Ethernet. 4.3 to 4.

Wireless Local Area Networks. Networks: Wireless LANs 1

Nomadic Communications WLAN MAC Fundamentals

CS 455/555 Intro to Networks and Communications. Link Layer

Introduction to IEEE

Outline. Introduction to Networked Embedded Systems - Embedded systems Networked embedded systems Embedded Internet - Network properties

Jaringan Komputer. Broadcast Network. Outline. MAC (Medium Access Control) Channel Allocation Problem. Dynamic Channel Allocation

CMPE 257: Wireless and Mobile Networking

Lesson 2-3: The IEEE x MAC Layer

Medium Access Control (MAC) Protocols for Ad hoc Wireless Networks -IV

CSE/EE 461 Section 2

The Link Layer and LANs. Chapter 6: Link layer and LANs

Mohammad Hossein Manshaei 1393

Performance anomaly of b

Local Area Networks. Lecture 17 Fall Token Ring and FDDI

Chapter 4. The Medium Access Control Sublayer. Points and Questions to Consider. Multiple Access Protocols. The Channel Allocation Problem.

Medium Access Control Sublayer

Local Area Networks NETW 901

Outline. CS5984 Mobile Computing. IEEE 802 Architecture 1/7. IEEE 802 Architecture 2/7. IEEE 802 Architecture 3/7. Dr. Ayman Abdel-Hamid, CS5984

CHAPTER 7 MAC LAYER PROTOCOLS. Dr. Bhargavi Goswami Associate Professor & Head Department of Computer Science Garden City College

4.3 IEEE Physical Layer IEEE IEEE b IEEE a IEEE g IEEE n IEEE 802.

Goal and Outline. Computer Networking. What Do We Need? Today s Story Lecture 3: Packet Switched Networks Peter Steenkiste

Wireless Local Area Networks (WLANs)) and Wireless Sensor Networks (WSNs) Computer Networks: Wireless Networks 1

MULTIPLE ACCESS PROTOCOLS 2. 1

ECE 4450:427/527 - Computer Networks Spring 2017

Chapter 6 Wireless and Mobile Networks. Csci 4211 David H.C. Du

Lecture 9: Bridging. CSE 123: Computer Networks Alex C. Snoeren

High Level View. EE 122: Ethernet and Random Access protocols. Medium Access Protocols

6th Slide Set Computer Networks

Link Layer and Ethernet

Midterm Review EECS 122. University of California Berkeley

Chapter 8 LAN Topologies

Wireless Communication and Networking CMPT 371

Data Link Layer -2- Network Access

CS 348: Computer Networks. - WiFi (contd.); 16 th Aug Instructor: Sridhar Iyer IIT Bombay

EE 122: Ethernet and

Shared Access Networks Wireless. 1/27/14 CS mywireless 1

Link Layer: Retransmissions

MAC protocols. Lecturer: Dmitri A. Moltchanov

Embedded Internet and the Internet of Things WS 12/13

Link Layer and Ethernet

Real-Time (Paradigms) (47)

CSC 4900 Computer Networks: The Link Layer

Multi-Channel MAC for Ad Hoc Networks: Handling Multi-Channel Hidden Terminals Using A Single Transceiver

Chapter 5 Link Layer and LANs

Data Link Layer -2- Network Access

Chapter 4. The Medium Access Control Sublayer

Wireless Communication and Networking CMPT 371

CSMC 417. Computer Networks Prof. Ashok K Agrawala Ashok Agrawala. Fall 2018 CMSC417 Set 1 1

Transcription:

Medium Access Control IEEE 802.11, Token Rings Wireless channel is a shared medium Need access control mechanism to avoid interference Why not CSMA/CD? 9/15/06 CS/ECE 438 - UIUC, Fall 2006 1 9/15/06 CS/ECE 438 - UIUC, Fall 2006 2 Ethernet MAC Algorithm CSMA/CD in WLANs? Node A Node B Listen for carrier sense before transmitting Collision: What you hear is not what you sent! Most (if not all) radios are half-duplex Listening while transmitting is not possible Collision might not occur at sender Collision at receiver might not be detected by sender! 9/15/06 CS/ECE 438 - UIUC, Fall 2006 3 9/15/06 CS/ECE 438 - UIUC, Fall 2006 4 Hidden Terminal Problem MACA Solution for Hidden Terminal Problem Node B can communicate with both A and C A and C cannot hear each other When A transmits to B, C cannot detect the transmission using the carrier sense mechanism If C transmits, collision will occur at node B A B C DATA DATA When node A wants to send a packet to node B Node A first sends a Request-to-Send () to A On receiving Node A responds by sending Clear-to-Send () provided node A is able to receive the packet When a node C overhears a, it keeps quiet for the duration of the transfer A s signal strength C s signal strength A B C space 9/15/06 CS/ECE 438 - UIUC, Fall 2006 5 A B C - UIUC, 9/15/06 CS/ECE 438 Fall 2006 6 1

Exposed Terminal Problem MACA Solution for Exposed Terminal Problem B talks to A C wants to talk to D C senses channel and finds it to be busy C stays quiet (when it could have ideally transmitted) Sender transmits Request to Send () Receiver replies with Clear to Send () Neighbors See - Stay quiet See, but no - OK to transmit A B C D A B C D 9/15/06 CS/ECE 438 - UIUC, Fall 2006 7 9/15/06 CS/ECE 438 - UIUC, Fall 2006 8 Collisions Reliability Still possible packets can collide! Binary exponential backoff Backoff counter doubles after every collision and reset to minimum value after successful transmission Performed by stations that experience collisions collisions not as bad as data collisions in CSMA Since packets are typically much smaller than DATA packets Wireless links are prone to errors High packet loss rate detrimental to transport-layer performance Mechanisms needed to reduce packet loss rate experienced by upper layers 9/15/06 CS/ECE 438 - UIUC, Fall 2006 9 9/15/06 CS/ECE 438 - UIUC, Fall 2006 10 A Simple Solution to Improve Reliability - MACAW Revisiting the Exposed Terminal Problem When node B receives a data packet from node A, node B sends an Acknowledgement (ACK) If node A fails to receive an ACK Retransmit the packet Problem Exposed terminal solution doesn't consider at node C With -, C doesn t wait since it doesn t hear A s With B transmitting DATA, C can t hear intended receiver s C trying while B is transmitting is useless DATA A ACK B ACK C A B C D 9/15/06 CS/ECE 438 - UIUC, Fall 2006 11 9/15/06 CS/ECE 438 - UIUC, Fall 2006 12 2

Revisiting the Exposed Terminal Problem - MACAW Deafness One solution Have C use carrier sense before Alternative B sends DS (data sending) packet before DATA: Short packet lets C know that B received A s Includes length of B s DATA so C knows how long to wait For the scenario below Node A sends an to B While node C is receiving from D, Node B cannot reply with a B knows that D is sending to C A keeps retransmitting and increasing its own BO timeout A B C D 9/15/06 CS/ECE 438 - UIUC, Fall 2006 13 9/15/06 CS/ECE 438 - UIUC, Fall 2006 14 Interframe Spacing IEEE 802.11 - CSMA/CA Interframe spacing Plays a large role in coordinating access to the transmission medium Varying interframe spacings Creates different priority levels for different types of traffic! 802.11 uses 4 different interframe spacings DIFS medium busy direct access if medium is free DIFS DIFS PIFS SIFS contention next frame 9/15/06 CS/ECE 438 - UIUC, Fall 2006 15 t Sensing the medium If free for an Inter-Frame Space (IFS) Station can start sending (IFS depends on service type) If busy Station waits for a free IFS, then waits a random back-off time (collision avoidance, multiple of slot-time) If another station transmits during back-off time The back-off timer stops (fairness) contention window DIFS DIFS (randomized back-off mechanism) medium busy direct access if medium is free DIFS slot time next frame 9/15/06 CS/ECE 438 - UIUC, Fall 2006 16 t Types of IFS SIFS Short interframe space Used for highest priority transmissions / frames and ACKs DIFS DCF interframe space Minimum idle time for contention-based services (> SIFS) Types of IFS PIFS PCF interframe space Minimum idle time for contention-free service (>SIFS, <DIFS) EIFS Extended interframe space Used when there is an error in transmission 9/15/06 CS/ECE 438 - UIUC, Fall 2006 17 9/15/06 CS/ECE 438 - UIUC, Fall 2006 18 3

Backoff Interval DCF Example When transmitting a packet, choose a backoff interval in the range [0,cw] cw is contention window Count down the backoff interval when medium is idle Count-down is suspended if medium becomes busy When backoff interval reaches 0, transmit B1 = 25 B2 = 20 cw = 31 wait data B1 = 5 B2 = 15 data wait B1 and B2 are backoff intervals at nodes 1 and 2 B2 = 10 9/15/06 CS/ECE 438 - UIUC, Fall 2006 19 9/15/06 CS/ECE 438 - UIUC, Fall 2006 20 Backoff Interval Backoff Interval The time spent counting down backoff intervals is a part of MAC overhead Large cw Large backoff intervals Can result in larger overhead Small cw larger number of collisions (when two nodes count down to 0 simultaneously) The number of nodes attempting to transmit simultaneously may change with time Some mechanism to manage contention is needed IEEE 802.11 DCF Contention window cw is chosen dynamically depending on collision occurrence 9/15/06 CS/ECE 438 - UIUC, Fall 2006 21 9/15/06 CS/ECE 438 - UIUC, Fall 2006 22 Binary Exponential Backoff in DCF Token Ring When a node fails to receive in response to its, it increases the contention window cw is doubled (up to an upper bound) When a node successfully completes a data transfer, it restores cw to Cw min cw follows a sawtooth curve Example Token Ring Networks IBM: 4Mbps token ring IEEE 802.5: 16Mbps 9/15/06 CS/ECE 438 - UIUC, Fall 2006 23 9/15/06 CS/ECE 438 - UIUC, Fall 2006 24 4

Token Ring Token Ring Focus on Fiber Distributed Data Interface (FDDI) 100 Mbps Was (not is) a candidate to replace Ethernet Used in some MAN backbones (LAN interconnects) Outline Rationale Topologies and components MAC algorithm Priority Feedback Token management Why emulate a shared medium with pointto-point links? Why a shared medium? Convenient broadcast capabilities Switches costly Why emulation? Simpler MAC algorithm Fairer access arbitration Fully digital (802.3 collision detection requires analog) 9/15/06 CS/ECE 438 - UIUC, Fall 2006 25 9/15/06 CS/ECE 438 - UIUC, Fall 2006 26 Token Ring: Topology and Components Token Ring: Dual Ring Relay Single Relay Multistation access units Example Token Ring Networks FDDI: 1000Mbps Fiber Distributed Data Interface From Previous Relay To Next From Previous Relay To Next From Previous MSAU To Next MSAU 9/15/06 CS/ECE 438 - UIUC, Fall 2006 27 9/15/06 CS/ECE 438 - UIUC, Fall 2006 28 FDDI Multistation Access Unit Dual ring configuration Self-healing Normal flow in green direction Can detect and recover from one failure Each station imposes a delay E.g. 50 ms Maximum of 500 Stations Upper limit of 100km Need 200km of fiber Uses 4B/5B encoding Can be implemented over copper 9/15/06 CS/ECE 438 - UIUC, Fall 2006 29 9/15/06 CS/ECE 438 - UIUC, Fall 2006 30 5

Token Ring: Basic Concepts Token Ring: Basic Concepts Frames flow in one direction Upstream to downstream Token Special bit pattern rotates around ring Stations Must capture token before transmitting Must remove frame after it has cycled Must release token after transmitting Service Stations get round-robin service Immediate release Used in FDDI Token follows last frame immediately Delayed release Used in IEEE 802.5 Token sent after last frame returns to sender 9/15/06 CS/ECE 438 - UIUC, Fall 2006 31 9/15/06 CS/ECE 438 - UIUC, Fall 2006 32 Token Release Token Ring: Media Access Control Parameters Token Holding Time (THT) Upper limit on how long a station can hold the token Each station is responsible for ensuring that the transmission time for its packet will not exceed THT Delayed Release Early Release Token Rotation Time (TRT) How long it takes the token to traverse the ring. TRT ActiveNodes x THT + RingLatency Target Token Rotation Time (TTRT) Agreed-upon upper bound on TRT 9/15/06 CS/ECE 438 - UIUC, Fall 2006 33 9/15/06 CS/ECE 438 - UIUC, Fall 2006 34 802.5 Reliability 802.5 Monitor Delivery status Trailer A bit Set by recipient at start of reception C bit Set by recipient on completion on reception Responsible for Inserting delay Token presence Should see a token at least once per TRT Check for corrupted frames Check for orphaned frames Header Monitor bit Monitor station sets bit first time it sees packet If monitor sees packet again, it discards packet 9/15/06 CS/ECE 438 - UIUC, Fall 2006 35 9/15/06 CS/ECE 438 - UIUC, Fall 2006 36 6

Token Maintenance: 802.5 Timing Algorithm: 802.5 Monitoring for a Valid Token All stations should periodically see valid transmission (frame or token) Maximum gap = ring latency + max frame < = 2.5ms Set timer at 2.5ms send claim frame if timer expires Each node measures TRT between successive tokens If measured-trt > TTRT Token is late Don t send If measured-trt < TTRT Token is early OK to send Worse case: 2xTTRT between seeing token Back-to-back 2xTTRT rotations not possible 9/15/06 CS/ECE 438 - UIUC, Fall 2006 37 9/15/06 CS/ECE 438 - UIUC, Fall 2006 38 Traffic Classes: FDDI Timing Algorithm: FDDI Two classes of traffic Synchronous Real time traffic Can always send Asynchronous Bulk data Can send only if token is early Each station is allocated S i time units for synchronous traffic per TRT TTRT is negotiated S 1 + S 2 + + S N + RingLatency TTRT Algorithm Goal Keep actual rotation time less than TTRT Allow station i to send S i units of synchronous traffic per TRT Fairly allocate remaining capacity to asynchronous traffic Regenerate token if lost 9/15/06 CS/ECE 438 - UIUC, Fall 2006 39 9/15/06 CS/ECE 438 - UIUC, Fall 2006 40 Timing Algorithm: FDDI FDDI example When a node gets the token Set TRT = time since last token Set THT = TTRT TRT If TRT > TTRT Token is late Send synchronous data Don t send asynchronous data If TRT < TTRT Token is early OK to send any data Send synchronous data, adjust THT If THT > 0, send asynchronous data Assume RingLatency=12 µs Three active stations Each with Si=20 µs TTRT=100 µs Stations have unlimited supply of asynchronous traffic. 9/15/06 CS/ECE 438 - UIUC, Fall 2006 41 9/15/06 CS/ECE 438 - UIUC, Fall 2006 42 7

FDDI example FDDI example Arrival time TRT s/a 0 0 0/0 12 12 20/88 172 160 20/0 252 140 20/0 344 132 20/0 432 120 20/0 Arrival time TRT s/a 4 0 0/0 124 120 20/0 196 92 20/8 276 80 20/20 368 92 20/8 456 88 20/12 Arrival time TRT s/a 8 0 0/0 148 140 20/0 228 120 20/0 320 112 20/0 400 92 20/8 492 92 20/8 Arrival time TRT A Arrival time TRT A Arrival time TRT A 0 0 0 4 0 0 8 0 0 12 12 88 124 120 0 148 140 0 172 160 0 196 92 8 228 120 0 252 140 0 276 80 20 320 112 0 344 132 0 368 92 8 400 92 8 432 120 0 456 88 12 492 92 8 524 112 0 548 92 8 580 88 12 616 104 0 640 92 8 672 92 8 704 92 8 736 96 4 764 92 8 796 92 8 828 92 8 860 96 4 888 92 8 920 92 8 952 92 8 984 96 4 1012 92 8 1044 92 8 1076 92 8 1108 96 4 1136 92 8 1168 92 8 1200 92 8 1232 96 4 1260 92 8 1292 92 8 1324 92 8 1356 96 4 1384 92 8 1416 92 8 1448 92 8 1480 96 4 1508 92 8 9/15/06 CS/ECE 438 - UIUC, Fall 2006 43 9/15/06 CS/ECE 438 - UIUC, Fall 2006 44 FDDI Performance FDDI Performance Synchronous traffic may consume one TTRT worth of time TRT > TTRT Worst case TRT < 2*TTRT Any asynchronous traffic plus RingLatency TTRT Synchronous traffic < TTRT Can t have two consecutive TRT = 2*TTRT After a cycle with TRT = 2*TTRT, no asynchronous traffic will be sent 9/15/06 CS/ECE 438 - UIUC, Fall 2006 45 9/15/06 CS/ECE 438 - UIUC, Fall 2006 46 Token Maintenance: FDDI Lost Token No token when initializing ring Bit error corrupts token pattern Node holding token crashes Monitoring for a valid token Should see valid transmission (frame or token) periodically within 2*TTRT Maximum gap = RingLatency + MaxFrame 2.5ms 9/15/06 CS/ECE 438 - UIUC, Fall 2006 47 8