ECE453 Introduction to Computer Networks. Broadcast vs. PPP. Delay. Lecture 7 Multiple Access Control (I)

Similar documents
ECEN 5032 Data Networks Medium Access Control Sublayer

Chapter 4. The Medium Access Control Sublayer. Points and Questions to Consider. Multiple Access Protocols. The Channel Allocation Problem.

Chapter 4 (Week 7) The Medium Access Control Sublayer ANDREW S. TANENBAUM COMPUTER NETWORKS FOURTH EDITION PP CN&DC Dr.

The Medium Access Control Scheme (MAC Layer) Reference: Andrew S. Tanenbaum, Computer Networks, 3rd Edition, Prentice Hall, 1996.

COS 140: Foundations of Computer Science

Chapter 12 Multiple Access 12.1

COS 140: Foundations of Computer Science

CHAPTER 7 MAC LAYER PROTOCOLS. Dr. Bhargavi Goswami Associate Professor & Head Department of Computer Science Garden City College

MAC Sublayer(1) Principal service of the Medium Access Control Sublayer: Allocating a single broadcast channel (mostly a LAN) among competing users

Jaringan Komputer. Broadcast Network. Outline. MAC (Medium Access Control) Channel Allocation Problem. Dynamic Channel Allocation

Computer Networks. Medium Access Sublayer (Part I)

Aloha and slotted aloha

LANs. Local Area Networks. via the Media Access Control (MAC) SubLayer. Networks: Local Area Networks

Telecommunication Protocols Laboratory Course. Lecture 2

Chapter 4. The Medium Access Control Sublayer

Link Layer: Retransmissions

The Medium Access Control Sublayer

Random Access. 1. Aloha. 2. Slotted Aloha 3. CSMA 4. CSMA/CD

Data Link Layer: Collisions

Multiple Access. Data Communications and Networking

CS 43: Computer Networks. 27: Media Access Contd. December 3, 2018

Multiple Access Protocols

Computer Network Fundamentals Spring Week 3 MAC Layer Andreas Terzis

CS 43: Computer Networks Media Access. Kevin Webb Swarthmore College November 30, 2017

College of Computer and Information Sciences Department of Computer Engineering CEN444 Computer Networks Midterm 2 Exam Second Semester 1434/1435

Medium Access Control Sublayer Chapter 4

ECE 4450:427/527 - Computer Networks Spring 2017

Local Networks. Lecture 4 6-Apr-2016

High Level View. EE 122: Ethernet and Random Access protocols. Medium Access Protocols

TSIN01 Information Networks Lecture 3

Chapter 6 Medium Access Control Protocols and Local Area Networks

CMPE 257: Wireless and Mobile Networking

EE 122: Ethernet and

Medium Access Control Sublayer Chapter 4

CSE 461: Multiple Access Networks. This Lecture

Lecture 4: Wireless MAC Overview. Hung-Yu Wei National Taiwan University

Mobile Communications Chapter 3 : Media Access

Medium Access Control. CSCI370 Lecture 5 Michael Hutt New York Institute of Technology

LECTURE PLAN. Script. Introduction about MAC Types o ALOHA o CSMA o CSMA/CD o CSMA/CA

Lecture 12 December 04, Wireless Access. Graduate course in Communications Engineering. University of Rome La Sapienza. Rome, Italy

Contention Protocols and Networks

Multiple Access Links and Protocols

Markov Chains and Multiaccess Protocols: An. Introduction

Lecture 6. Data Link Layer (cont d) Data Link Layer 1-1

Problem Set Name the 7 OSI layers and give the corresponding functionalities for each layer.

ECE 158A: Lecture 13. Fall 2015

LANs Local Area Networks LANs provide an efficient network solution : To support a large number of stations Over moderately high speed

Link Layer. (continued)

CMPE 257: Wireless and Mobile Networking

Data Communications. Automatic Repeat Request Medium Access Control

Protocols for Multiaccess Networks

Lecture 19. Principles behind data link layer services Framing Multiple access protocols

Wireless Medium Access Control Protocols

The MAC layer in wireless networks

Media Access Control. Networked Systems (H) Lecture 5

1-1. Switching Networks (Fall 2010) EE 586 Communication and. November 8, Lecture 30

Random Assignment Protocols

ISSN: (Online) Volume 2, Issue 6, June 2014 International Journal of Advance Research in Computer Science and Management Studies

EITF25 Internet Techniques and Applications L4: Network Access. Stefan Höst

CMPE 150/L : Introduction to Computer Networks. Chen Qian Computer Engineering UCSC Baskin Engineering Lecture 16

COMP/ELEC 429/556 Introduction to Computer Networks

Link Layer and LANs 안상현서울시립대학교컴퓨터 통계학과.

Lecture 8 The Data Link Layer part I. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it

MAC LAYER. Murat Demirbas SUNY Buffalo

Data Link Layer -2- Network Access

ICE 1332/0715 Mobile Computing (Summer, 2008)

The MAC layer in wireless networks

CSE 461 Multiple Access. David Wetherall

Chapter 1 Basic concepts of wireless data networks (cont d)

Intelligent Transportation Systems. Medium Access Control. Prof. Dr. Thomas Strang

Computer Networks. Today. Principles of datalink layer services Multiple access links Adresavimas, ARP LANs Wireless LANs VU MIF CS 1/48 2/48

Topics. Link Layer Services (more) Link Layer Services LECTURE 5 MULTIPLE ACCESS AND LOCAL AREA NETWORKS. flow control: error detection:

CCM 4300 Lecture 5 Computer Networks, Wireless and Mobile Communications. Dr Shahedur Rahman. Room: T115

RMIT University. Data Communication and Net-Centric Computing COSC 1111/2061/1110. Lecture 8. Medium Access Control Methods & LAN

Data Link Layer -2- Network Access

Medium Access Control

COMPUTER NETWORKS - Local area networks

Local area networks. Copyright

Chapter 4: The Medium Access Layer

Medium Access Control Sublayer

Chapter 6 Medium Access Control Protocols and Local Area Networks

COMMUNICATION NETWORKS NETW 501

Wireless Communications

Multiple Access in Cellular and Systems

COMP476 Networked Computer Systems. Polling. Sharing the Wire. LAN Technologies. COMP476 Networked Computer Systems 1

Multiple Access Communications. EEE 538, WEEK 11 Dr. Nail Akar Bilkent University Electrical and Electronics Engineering Department

Chapter 5: Link layer

Chapter 3 MEDIA ACCESS CONTROL

The Link Layer and LANs. Chapter 6: Link layer and LANs

Physical Layer. Medium Access Links and Protocols. Point-to-Point protocols. Modems: Signaling. Modems Signaling. Srinidhi Varadarajan

Computer Networks. Wenzhong Li. Nanjing University

Data and Computer Communications. Chapter 11 Local Area Network

Multiple-access protocols

2.1 CHANNEL ALLOCATION 2.2 MULTIPLE ACCESS PROTOCOLS Collision Free Protocols 2.3 FDDI 2.4 DATA LINK LAYER DESIGN ISSUES 2.5 FRAMING & STUFFING

Link Layer. (continued)

Computer Networks Medium Access Control. Mostafa Salehi Fall 2008

Reminder: Datalink Functions Computer Networking. Datalink Architectures

MULTIPLE ACCESS PROTOCOLS 2. 1

Outline: Connecting Many Computers

Demo (Visit

Transcription:

ECE453 Introduction to Computer Networks Lecture 7 Multiple Access Control (I) 1 Broadcast vs. PPP Broadcast channel = multiaccess channel = random access channel Broadcast LAN Satellite network PPP WAN (router-router lease line) Home user ISP 2 Delay A Packet experiences delay from end to end Nodal delay = processing delay + queuing delay + transmission delay + propagation delay transmission propagation B nodal processing (processing delay) queuing 3 1

The Channel Allocation Problem Static Channel Allocation in LANs and MANs FDM or TDM Problems Fewer than N users A valuable chunk of time (TDM) or bandwidth (FDM) is wasted More than N users Some users are denied (even if another user is idle) Exactly N users Idle users waste bandwidth e.g. bursty traffic Dynamic Channel Allocation in LANs and MANs 4 Five Assumptions for Dynamic Channel Allocation Station Model N independent stations generating frames Once a frame is generated, the station is blocked until the frame has been transmitted Single Channel Assumption A single channel is available for all communication All stations are equivalent Collision Assumption If two frames are transmitted simultaneously, they overlap in time and the resulting signal is garbled. This event is called a collision. All stations can detect collisions. Time Assumption Continuous time Slotted time Carrier assumption Carrier Sense (LAN) No Carrier Sense (Satellite) 5 Multiple Access Protocols Carrier Sense Multiple Access Protocols Collision-Free Protocols Limited-Contention Protocols 6 2

Some Terminologies Contention systems Systems in which multiple users share a common channel in a way that can lead to conflicts Throughput The maximum continuous traffic rate that a device can handle without dropping a single packet. Measured in terms of the number of frames per second at a given frame size Frametime Time used to transmit a frame (frame_size/data rate) 7 Pure 1970, Norman Abramson, U. of Hawaii Users transmit whenever they have data When collision occurs, wait for a random amount of time and send again Slotted 1972, Roberts Divide time into discrete intervals A computer is not permitted to send until the beginning of the next slot Doubles the maximum throughput 8 * Performance Analysis Poisson process (1837) Simplest model for arrivals into a queue system the probability of an arrival in a small interval of time depends only on the size of the interval The probability that k frames are generated during a given frame time follows the Poisson distribution k G G e Pr[ k] = k! 9 3

CSMA Carrier Sense Multiple Access (LAN) 1-persistent When idle, transmit a frame When busy, continuously sensing When collision, wait for a random amount of time Non-persistent When idle, transmit a frame When busy, wait for a random amount of time When collision, wait for a random amount of time then re-sense p-persistent Slotted channels When idle, transmit with a probability p, defers until the next slot with probability 1-p CSMA with collision detection (CSMA/CD) As soon as a collision is detected, abort the transmission Basis of Ethernet LAN 10 A Worst Case Scenario Collision detection can take as long as 2 τ. 11 Collision-Free Protocols Assumption N stations with a unique address from 0 to N-1 Propagation delay is negligible The bit-map protocol A reservation protocol: the desire to transmit is broadcast before the actual transmission Binary countdown 12 4

Limited-Contention Protocols Low load: improved efficiency High load: high delay Collision-free protocols Low load: high delay High load: improved efficiency New protocol? limited contention protocol Uses contention at low load Uses collision-free at high load Adaptive tree walk protocol Pr[success with optimal p] k 1 k 1 = k q i = log2 13 (a) The hidden station problem (C B) (b) the exposed station problem (C D) Activity around the receiver vs. activity around the sender Problem: limited radio range 14 MACA Multiple Access with Collision Avoidance (Karn, 1990) Solution: RTS (Request To Send) contains the length of frame CTS (Clear To Send) contains the data length too 15 5

Multiple Access Protocols Pure Slotted Carrier Sense Multiple Access Protocols (CDMA) 1-persistent Non-persistent p-persistent CDMA/CD (Ethernet) Collision-Free Protocols Bitmap protocol Binary countdown Limited-Contention Protocols Contention when load is light Collision-free when load is heavy 16 6