Chapter 5 part 1 LINK LAYER

Similar documents
Link Layer and LANs 안상현서울시립대학교컴퓨터 통계학과.

The Link Layer and LANs. Chapter 6: Link layer and LANs

Lecture 8 The Data Link Layer part I. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it

CS 455/555 Intro to Networks and Communications. Link Layer

Chapter 5 Link Layer and LANs

CSC 4900 Computer Networks: The Link Layer

Lecture 6 The Data Link Layer. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it

CMPE 150/L : Introduction to Computer Networks. Chen Qian Computer Engineering UCSC Baskin Engineering Lecture 16

Chapter 5: Link layer

Data Link Layer: Multi Access Protocols

Outline. Introduction to Networked Embedded Systems - Embedded systems Networked embedded systems Embedded Internet - Network properties

Lecture 8 Link Layer: functionality, error detection, media access algorithm

Chapter 5 Link Layer. Computer Networking: A Top Down Approach. 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012

Lecture 5 The Data Link Layer. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it

Physical Layer. Medium Access Links and Protocols. Point-to-Point protocols. Modems: Signaling. Modems Signaling. Srinidhi Varadarajan

Topics. Link Layer Services (more) Link Layer Services LECTURE 5 MULTIPLE ACCESS AND LOCAL AREA NETWORKS. flow control: error detection:

CSC 401 Data and Computer Communications Networks

Links. CS125 - mylinks 1 1/22/14

CS 43: Computer Networks. 27: Media Access Contd. December 3, 2018

ECE 4450:427/527 - Computer Networks Spring 2017

CS 43: Computer Networks Media Access. Kevin Webb Swarthmore College November 30, 2017

Chapter 3 MEDIA ACCESS CONTROL

Link layer, LANs: outline. Chapter 5-1 Link Layer. Link layer: introduction. Link layer services

Chapter 5 Link Layer and LANs

Links Reading: Chapter 2. Goals of Todayʼs Lecture. Message, Segment, Packet, and Frame

Data Link Layer: Overview, operations

Computer Networks. Today. Principles of datalink layer services Multiple access links Adresavimas, ARP LANs Wireless LANs VU MIF CS 1/48 2/48

Chapter 5 LINK LAYER. Distributed Computing Group. Computer Networks Summer 2005

Lecture 6. Data Link Layer (cont d) Data Link Layer 1-1

Adaptors Communicating. Link Layer: Introduction. Parity Checking. Error Detection. Multiple Access Links and Protocols

Chapter V: Link Layer

Chapter 6 The Link Layer and LANs

1-1. Switching Networks (Fall 2010) EE 586 Communication and. November 8, Lecture 30

Broadcast Links, Addressing and Media Access Control. Link Layer B. Link and Physical Layers. MAC Addresses

Adaptors Communicating. Link Layer: Introduction. Parity Checking. Error Detection. Multiple Access Links and Protocols

CC451 Computer Networks

High Level View. EE 122: Ethernet and Random Access protocols. Medium Access Protocols

CSCD 330 Network Programming

Redes de Computadores. Medium Access Control

Module 10 Data Link Layer CS655! 10-1!

Lecture 19. Principles behind data link layer services Framing Multiple access protocols

transferring datagram from one node data-link layer has responsibility of to adjacent node over a link 5-1 TDTS06 Computer networks

ECSE-4670: Computer Communication Networks (CCN) Informal Quiz 3

Multiple Access Links and Protocols

MULTIPLE ACCESS PROTOCOLS 2. 1

Local Area Networks (LANs) SMU CSE 5344 /

Computer Network Fundamentals Spring Week 3 MAC Layer Andreas Terzis

EE 122: Ethernet and

Message, Segment, Packet, and Frame Link-layer services Encoding, framing, error detection, transmission control Error correction and flow control

Chapter 4 Network Layer

Goals of Today s Lecture. Adaptors Communicating

Chapter V: Link Layer

Link Layer and Ethernet

COMPUTER NETWORKS - Local area networks

Local area networks. Copyright

CSE 461: Multiple Access. Homework: Chapter 2, problems 1, 8, 12, 18, 23, 24, 35, 43, 46, and 58

Chapter 6: Link layer and LANs. Link layer, LANs: outline. Link layer: introduction. Link layer: context. Link layer services (more)

Computer Networks Medium Access Control. Mostafa Salehi Fall 2008

CSE 461: Multiple Access Networks. This Lecture

Multiple Access Protocols

Master Course Computer Networks IN2097

Getting Connected (Chapter 2 Part 4) Networking CS 3470, Section 1 Sarah Diesburg

Link Layer and Ethernet

CMPE 150: Introduction to Computer Networks

CSCD 330 Network Programming Fall 2012

Computer and Network Security

Chapter 6 Medium Access Control Protocols and Local Area Networks

CS 4453 Computer Networks Winter

Master Course Computer Networks IN2097

SC250 Computer Networking I. Link Layer. Prof. Matthias Grossglauser LCA/I&C.

Goals. Fundamentals of Network Media. More topics. Topics. Multiple access communication. Multiple access solutions

Module 4 Data Link Layer CS655! 4-1!

Chapter 5: DataLink Layer

Link Layer: Introduction. Chapter 5 Link Layer & LANS. Link layer: context. Link Layer Services

CIS 551 / TCOM 401 Computer and Network Security. Spring 2007 Lecture 7

Principles behind data link layer services

Jaringan Komputer. Broadcast Network. Outline. MAC (Medium Access Control) Channel Allocation Problem. Dynamic Channel Allocation

Chapter 5 Link Layer. Computer Networking: A Top Down Approach. 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012

Data Link Technology. Suguru Yamaguchi Nara Institute of Science and Technology Department of Information Science

EITF25 Internet Techniques and Applications L4: Network Access. Stefan Höst

Medium Access Control

Physical and Data Link layers

Chapter 5 Link Layer and LANs

Multiple Access Communications. EEE 538, WEEK 11 Dr. Nail Akar Bilkent University Electrical and Electronics Engineering Department

Goal and Outline. Computer Networking. What Do We Need? Today s Story Lecture 3: Packet Switched Networks Peter Steenkiste

Lecture 9: Bridging. CSE 123: Computer Networks Alex C. Snoeren

CMPE 257: Wireless and Mobile Networking

CS 123: Lecture 12, LANs, and Ethernet. George Varghese. October 24, 2006

Link Layer and LANs. Our Goals. Link Layer

Links. Error Detection. Link Layer. Multiple access protocols. Nodes Links Frame. Shared channel Problem: collisions How nodes share a channel

CSE/EE 461 Wireless and Contention-Free Protocols

CS 3516: Computer Networks

Reminder: Datalink Functions Computer Networking. Datalink Architectures

CS 716: Introduction to communication networks. - 8 th class; 17 th Aug Instructor: Sridhar Iyer IIT Bombay

Chapter 15 Local Area Network Overview

Introduction to Computer Networks. 03 Data Link Layer Introduction

CSE/EE 461 Section 2

COMP/ELEC 429/556 Introduction to Computer Networks

Link Layer and LANs. CMPS 4750/6750: Computer Networks

LANs Local Area Networks LANs provide an efficient network solution : To support a large number of stations Over moderately high speed

Transcription:

Overview - today Chapter 5 part 1 LINK LAYER Computer Networks Timothy Roscoe Summer 2007 Context Link layer services Framing Error detection and correction Data Link layer protocols ultiple access protocols and LANs Channel Partitioning Taking turns Random Access Networks & Operating Systems Computer Networks T. Roscoe 5.1/1 Networks & Operating Systems Computer Networks T. Roscoe 5.1/2 Link Layer: setting the context Link Layer: setting the context two physically connected devices host-router, router-router, host-host unit of data is called frame Ht HnHt Hl HnHt application transport network link physical data link protocol phys. link network link physical Hl HnHt frame adapter card Networks & Operating Systems Computer Networks T. Roscoe 5.1/3 Networks & Operating Systems Computer Networks T. Roscoe 5.1/4

Link Layer: Implementation Link layer implemented in adapter (a.k.a. NIC) e.g., PCCIA card, Ethernet card typically includes: RA, DSP chips, host bus interface, and link interface Ht HnHt Hl HnHt application transport network link physical data link protocol phys. link adapter card network link physical Hl HnHt frame Networks & Operating Systems Computer Networks T. Roscoe 5.1/5 Link Layer Services Framing, link access encapsulate datagram into frame, adding header, trailer implement channel access if shared medium physical addresses used in frame headers to identify source, destination different from IP address! Error Detection errors caused by signal attenuation, noise receiver detects presence of errors: receiver signals sender for retransmission or drops frame Error Correction receiver identifies and corrects bit error(s) without resorting to retransmission Networks & Operating Systems Computer Networks T. Roscoe 5.1/6 Link Layer Services (more) Flow Control pacing between sender and receiver Half-duplex and full-duplex with half duplex, nodes at both ends of link can transmit, but not at same time Reliable delivery between two physically connected devices: we learned how to do this in chapter 3 seldom used on low error link (fiber, some twisted pair) wireless links: high error rates Q: why both link-level and end-end reliability? Networks & Operating Systems Computer Networks T. Roscoe 5.1/7 Aside: The End-to-End Argument The function in question can completely and correctly be implemented only with the knowledge and help of the application standing at the end points of the communication system. Therefore, providing that questioned function as a feature of the communication system itself is not possible. (Sometimes an incomplete version of the function provided by the communication system may be useful as a performance enhancement.) End-to-end arguments in system design, J.H.Saltzer, D.P. Reed and D.D. Clark. AC Transactions in Computer Systems vol.2, no.4, November, 1984, pages 277-288. Networks & Operating Systems Computer Networks T. Roscoe 5.1/8

E2E and reliability Framing Something to ponder: Reliable delivery is a function Does reliable link-level transmission provide end-to-end reliability? Can it be worse than no link-level reliability? When is it a good thing? A character stream. (a) Without errors. (b) With one error. Networks & Operating Systems Computer Networks T. Roscoe 5.1/9 Networks & Operating Systems Computer Networks T. Roscoe 5.1/10 Framing: bit-stuffing Framing: byte stuffing Bit stuffing (a) The original data. (b) The data as they appear on the line. (c) The data as they are stored in receiver s memory after destuffing. (a) A frame delimited by flag bytes. (b) Four examples of byte sequences before and after stuffing. Networks & Operating Systems Computer Networks T. Roscoe 5.1/11 Networks & Operating Systems Computer Networks T. Roscoe 5.1/12

Error Detection EDC = Error Detection and Correction bits (redundancy) D = Data protected by error checking, may include header fields Error detection not 100% reliable! protocol may miss some errors, but rarely larger EDC field yields better detection and correction Parity Checking Single Bit Parity Detect single bit errors Two Dimensional Bit Parity Detect and correct single bit errors 0 0 Networks & Operating Systems Computer Networks T. Roscoe 5.1/13 Networks & Operating Systems Computer Networks T. Roscoe 5.1/14 Error correcting codes Internet checksum Goal detect errors (e.g., flipped bits) in transmitted segment note: used at transport layer only Sender treat segment content as sequence of 16-bit integers checksum: addition (1 s complement sum) of segment content sender puts checksum value into UDP checksum field Receiver compute checksum of received segment check if computed checksum equals checksum field value NO error detected YES no error detected. But maybe errors nonetheless? ore later Networks & Operating Systems Computer Networks T. Roscoe 5.1/15 Networks & Operating Systems Computer Networks T. Roscoe 5.1/16

Cyclic Redundancy Check (CRC): Ring Cyclic Redundancy Check (CRC): Division Polynomials with binary coefficients b k x k + b k-1 x k-1 + + b 0 x 0 Order of polynomial: max i with b i 0 Generator polynomial G(x) = x 16 +x 12 +x 5 +1 Let the whole frame (D+EDC) be polynomial T(x) Binary coefficients b i (0 or 1) form a field with operations + (XOR) and (AND). Polynomials form ring R with operations + and : (R,+) is an abelian group, (R, ) is an associative set, Distributivity: a (b+c) = (a b) + (a c) and (b+c) a = (b a) + (c a) for a,b,c R. Example: (x 3 +1) (x 4 +x+1) 1001 10011 = x 3 (x 4 +x+1) + 1 (x 4 +x+1) = 10011 = (x 7 +x 4 +x 3 ) + (x 4 +x+1) + 10011000 = x 7 +x 3 +x+1 = 10001011 Networks & Operating Systems Computer Networks T. Roscoe 5.1/17 Idea: fill EDC (CRC) field such that T(x) mod G(x) = 0 How to divide with polynomials? Example with G(x) = x 2 +1 (=101) 11101100 / 101 = 110110, Remainder 10 100 011 111 100 010 Idea: Fill EDC with remainder when dividing T(x) with EDC=00 0 by G(x). Then calculating and testing CRC is the same operation. Networks & Operating Systems Computer Networks T. Roscoe 5.1/18 CRC calculation in Hardware CRCs: How to chose G(x)? Use cyclic shift register with r registers, where r is the order of G(x) Example G(x) = x 3 + x 2 + 1 + + T(x) Remainder of the division ends up in the registers Typical generator polynomial G(x) = x 16 +x 12 +x 5 +1 Why does G(x) look like this? Let E(x) be transmission errors: T(x) = (x) + E(x) T(x) mod G(x) = ((x) + E(x)) mod G(x) = (x) mod G(x) + E(x) mod G(x) And recall (x) mod G(x) = 0 We can detect all transmission errors iff E(x) is not divisible by G(x) without remainder Networks & Operating Systems Computer Networks T. Roscoe 5.1/19 Networks & Operating Systems Computer Networks T. Roscoe 5.1/20

CRCs: How to chose G(x)? High-level Data Link Control Protocol (HDLC) One can show that G(x) of order r can detect all single bit errors if G(x) has 2 or more coefficients all bursty errors (k-bit long 1xxxx1 string) with k r (note: needs G(x) to include the term 1) Any error with probability 2 -r Bit-oriented protocol bitstuffing for framing Checksum for error detection Networks & Operating Systems Computer Networks T. Roscoe 5.1/21 Networks & Operating Systems Computer Networks T. Roscoe 5.1/22 HDLC (2) Control field of (a) An information frame. (b) A supervisory frame. (c) An unnumbered frame. (Some) IEEE 802 working groups 802.1: Higher-layer LAN Protocols 802.2: Logical Link Control 802.3: Ethernet 802.4: Token Bus (what?) 802.5: Token Ring (almost dead) 802.6: etropolitan Area Network (DQDB ) 802.11: Wireless LAN (WiFi) 802.12: Demand Priority 802.14: Cable odem 802.15: Wireless Personal Area Network (Bluetooth) 802.16: Broadband Wireless Access (Wiax) 802.17: Resilient Packet Ring (SONET without circuits) Etc Networks & Operating Systems Computer Networks T. Roscoe 5.1/23 Networks & Operating Systems Computer Networks T. Roscoe 5.1/24

Sublayers: Link Control vs. edia Access ultiple Access Links and Protocols Three types of links point-to-point (single wire; e.g. PPP, SLIP) broadcast (shared wire or medium; e.g. Ethernet, WLAN) switched (e.g. switched Ethernet, AT) Networks & Operating Systems Computer Networks T. Roscoe 5.1/25 Networks & Operating Systems Computer Networks T. Roscoe 5.1/26 Frequency Division ultiplexing (FD) Time Division ultiplexing (TD) Separation of the whole spectrum into smaller frequency bands A channel gets the whole spectrum for a certain amount of time A channel gets a certain band of the spectrum for the whole time + only one carrier in the medium at any time + no dynamic coordination necessary + works also for analog signals waste of bandwidth if traffic is distributed unevenly c inflexible k 1 k 2 k 3 k 4 k 5 k 6 f + throughput high even for many users precise synchronization necessary Example: Ethernet c k 1 k 2 k 3 k 4 k 5 k 6 f Example: broadcast radio t t Networks & Operating Systems Computer Networks T. Roscoe 5.1/27 Networks & Operating Systems Computer Networks T. Roscoe 5.1/28

Time/Frequency Division ultiplexing Code Division ultiplexing (CD) Each channel has a unique code Combination of both methods A channel gets a certain frequency band for some time + protection against frequency selective interference + protection against tapping + adaptive precise coordination required c Example: GS k 1 k 2 k 3 k 4 k 5 k 6 f All channels use the same spectrum at the same time + bandwidth efficient + no coordination or synchronization + hard to tap + almost impossible to jam lower user data rates more complex signal regeneration Example: UTS k 1 k 2 k 3 k 4 k 5 k 6 c f Spread spectrum t U. S. Patent 2 292 387, Hedy K. arkey (a.k.a. Lamarr or Kiesler) and George Antheil (1942) t Networks & Operating Systems Computer Networks T. Roscoe 5.1/29 Networks & Operating Systems Computer Networks T. Roscoe 5.1/30 Cocktail party as analogy for multiplexing edia Access Protocols Space multiplex: Communicate in different rooms Frequency multiplex: Use soprano, alto, tenor, or bass voices to define the communication channels Time multiplex: Let other speaker finish Code multiplex: Use different languages and hone in on your language. The farther apart the languages the better you can filter the noise : German/Japanese better than German/Dutch. Can we have orthogonal languages? Single shared communication channel Two or more simultaneous transmissions by nodes: interference only one node can send successfully at a time edia Access Control (AC) Protocol distributed algorithm that determines how stations share channel, i.e., determine when station can transmit communication about channel sharing must use channel itself! what to look for in multiple access protocols synchronous or asynchronous information needed about other stations robustness (e.g. to channel errors) performance Networks & Operating Systems Computer Networks T. Roscoe 5.1/31 Networks & Operating Systems Computer Networks T. Roscoe 5.1/32

AC Protocols: a taxonomy Wavelength-Division ultiple Access Three broad classes Channel Partitioning divide channel into smaller pieces (time slots, frequency) allocate piece to node for exclusive use Taking turns tightly coordinate shared access to avoid collisions Random Access allow collisions recover from collisions Goals: decentralized, efficient, simple, fair Networks & Operating Systems Computer Networks T. Roscoe 5.1/33 Networks & Operating Systems Computer Networks T. Roscoe 5.1/34 Taking Turns AC protocols Taking Turns Protocols: Round Robin Polling master node invites slave nodes to transmit in turn Request to Send, Clear to Send messages concerns polling overhead latency single point of failure (master) Token passing (Token Ring) control token passed from one node to next sequentially token message concerns token overhead latency single point of failure (token) Round robin protocol: station k sends after station k 1 (mod n) If a station does not need to transmit data, then it sends ε There is a maximum message size m that can be transmitted Is this different from token ring protocol? Questions How efficient is round robin? What if a station breaks or leaves? Can a new station join? All deterministic protocols have these (or worse) problems Try randomized protocols instead! Networks & Operating Systems Computer Networks T. Roscoe 5.1/35 Networks & Operating Systems Computer Networks T. Roscoe 5.1/36

Random Access protocols When node has packet to send transmit at full channel data rate R no a priori coordination among nodes Two or more transmitting nodes collision Random access AC protocol specifies how to detect collisions how to recover from collisions via delayed retransmissions Examples of random access AC protocols: ALOHA and variants (slotted ALOHA, adaptive ALOHA) Backoff protocols (CSA, CSA/CD, CSA/CA) Slotted Aloha Time is divided into equal size slots A slot is equal to the packet transmission time Node with new arriving packet: transmit at beginning of next slot If collision: retransmit packet in future slots with probability p, until successful Success (S), Collision (C), Empty (E) slots Networks & Operating Systems Computer Networks T. Roscoe 5.1/37 Networks & Operating Systems Computer Networks T. Roscoe 5.1/38 Slotted Aloha (slightly simplified) Queuing Theory (Remember Chapter 3?) We assume that the stations are perfectly synchronous In each time slot each station transmits with probability p n 1 P1 = Pr[Station 1 succeeds] = p(1 p) P = Pr[any Station succeeds] = np1! dp n 2 maximize P : = n(1 p) (1 pn) = 0 dp pn = 1 1 n 1 1 then, P = (1 ) n e In slotted aloha, a station can transmit successfully with probability at least 1/e. How quickly can an application send packets to the radio transmission unit? Queuing Theory! Simplest //1 queuing model (=arkov): Poisson arrival rate λ, exponential service time with mean 1/μ λ In our time slot model, this means that the probability that a new packet is received by the buffer is λ; the probability that sending succeeds is μ = 1/e, for any time slot. To keep the queue bounded we need ρ = λ/μ < 1, thus λ < 1/e. In the equilibrium, the expected number of packets in the system is N = ρ/(1 ρ), the average time in the system is T = N/λ. μ Networks & Operating Systems Computer Networks T. Roscoe 5.1/39 Networks & Operating Systems Computer Networks T. Roscoe 5.1/40

Slotted Aloha vs. Round Robin Adaptive slotted aloha Slotted aloha uses not every slot of the channel; the round robin protocol is better in this respect. + What happens in round robin when a new station joins? What about more than one new station? Slotted aloha is more flexible. Idea: Change the access probability with the number of stations How can we estimate the current number of stations in the system? Assume that stations can distinguish whether 0, 1, or more than 1 stations send in a time slot. Example: If the actual number of stations is twice as high as expected, there is still a successful transmission with probability 27%. If it is only half, 30% of the slots are successful. Idea: Try to estimate the number of stations! If you see that nobody sends, increase p. If you see that more than one sends, decrease p. Analysis a little too tough for this course (unfortunately) Networks & Operating Systems Computer Networks T. Roscoe 5.1/41 Networks & Operating Systems Computer Networks T. Roscoe 5.1/42 Pure (unslotted) ALOHA Pure Aloha Analysis Unslotted Aloha: simpler, no synchronization Packet needs transmission send without awaiting for beginning of slot Collision probability increases: packet sent at t 0 collide with packets sent in (t 0-1, t 0 +1) Partition each slot of size 1 into x minislots of size ε (then x = 1/ε) Probability to start transmission in minislot is p ε for each station Since there are x minislots in 1 slot, the success rate of a slot is about 1/2e, that is, half the rate of slotted aloha Networks & Operating Systems Computer Networks T. Roscoe 5.1/43 Networks & Operating Systems Computer Networks T. Roscoe 5.1/44

Slotted Aloha vs. Pure Aloha Demand Assigned ultiple Access (DAA) S = throughput = goodput (success rate) 0.4 0.3 0.2 0.1 0.5 1.0 1.5 2.0 G = offered load = np protocol constrains effective channel throughput! Slotted Aloha Pure Aloha Channel efficiency only 36% for Slotted Aloha, and even worse for Aloha. Practical systems therefore use reservation whenever possible. But: Every scalable system needs an Aloha style component. Reservation a sender reserves a future time-slot sending within this reserved time-slot is possible without collision reservation also causes higher delays typical scheme for satellite systems Networks & Operating Systems Computer Networks T. Roscoe 5.1/45 Networks & Operating Systems Computer Networks T. Roscoe 5.1/46 Example for reservation-based protocol Backoff Protocols Distributed Polling time divided into slots begins with N short reservation slots reservation slot time equal to channel end-end propagation delay station with message to send posts reservation reservation seen by all stations after reservation slots, message transmissions ordered by known priority Backoff protocols rely on acknowledgements only. Binary exponential backoff, for example, works as follows: If a packet has collided k times, we set p = 2 -k Or alternatively: wait from random number of slots in [1..2 k ] It has been shown that binary exponential backoff is not stable for any λ > 0 (if there are infinitely many potential stations) Intuition: there s a small chance things get bad. Once they re bad, they only get worse: more stations waiting more likelyhood of collisions more backlog Interestingly when there are only finite stations, binary exponential backoff becomes unstable with λ > 0.568; Polynomial backoff however, remains stable for any λ < 1. Networks & Operating Systems Computer Networks T. Roscoe 5.1/47 Networks & Operating Systems Computer Networks T. Roscoe 5.1/48

CSA: Carrier Sense ultiple Access Idea of CSA: listen before transmit! If channel sensed idle: transmit entire packet If channel sensed busy, defer transmission. Two variants Persistent CSA retry immediately with probability p when channel becomes idle (may cause instability) Non-persistent CSA retry after random interval Human analogy 1. Don t interrupt anybody already speaking CSA collisions collisions can occur propagation delay: two nodes may not hear each other s transmission collision entire packet transmission time wasted note role of distance and propagation delay in determining collision prob. spatial layout of nodes along Ethernet Networks & Operating Systems Computer Networks T. Roscoe 5.1/49 Networks & Operating Systems Computer Networks T. Roscoe 5.1/50 CSA/CD (Collision Detection) CSA/CD collision detection CSA/CD: carrier sensing, as in CSA collisions detected within short time colliding transmissions aborted, reducing channel wastage persistent or non-persistent retransmission collision detection easy in wired LANs: measure signal strengths, compare transmitted, received signals difficult in wireless LANs: receiver shut off while transmitting Human analogy (the polite conversationalist) 1. Don t interrupt anybody already speaking 2. If another starts speaking with you, then back off. Networks & Operating Systems Computer Networks T. Roscoe 5.1/51 Networks & Operating Systems Computer Networks T. Roscoe 5.1/52

Summary of AC protocols Next week: What do you do with a shared medium? Channel Partitioning, by time, frequency or code Time Division, Code Division, Frequency Division Taking Turns polling from a central site, token passing Random partitioning (dynamic) ALOHA, S-ALOHA, CSA, CSA/CD carrier sensing easy in some technologies (wire) hard in others (wireless) CSA/CD used in Ethernet LAN addressing Ethernet! Bridges, Hubs, Switches PPP VLANS ore philosophy After that: Wireless. Networks & Operating Systems Computer Networks T. Roscoe 5.1/53 Networks & Operating Systems Computer Networks T. Roscoe 5.1/54