Protocols for Multiaccess Networks

Similar documents
Where Are We? Basics: Network Classification Network Architecture Reliable Data Transfer Delay Models Implementation: Protocol Design

EITF25 Internet Techniques and Applications L4: Network Access. Stefan Höst

LAN PROTOCOLS. Beulah A AP/CSE

High Level View. EE 122: Ethernet and Random Access protocols. Medium Access Protocols

EE 122: Ethernet and

Review. Error Detection: CRC Multiple access protocols. LAN addresses and ARP Ethernet. Slotted ALOHA CSMA/CD

CS 716: Introduction to communication networks. - 9 th class; 19 th Aug Instructor: Sridhar Iyer IIT Bombay

COMP476 Networked Computer Systems. Polling. Sharing the Wire. LAN Technologies. COMP476 Networked Computer Systems 1

Computer Networks Medium Access Control. Mostafa Salehi Fall 2008

Data Link Layer, Part 5. Medium Access Control

Computer Network Fundamentals Spring Week 3 MAC Layer Andreas Terzis

Data Link Layer, Part 3 Medium Access Control. Preface

Chapter 6 Medium Access Control Protocols and Local Area Networks

Random Access. 1. Aloha. 2. Slotted Aloha 3. CSMA 4. CSMA/CD

Local Area Networks. Aloha Slotted Aloha CSMA (non-persistent, 1-persistent, p-persistent) CSMA/CD Ethernet Token Ring

The Link Layer II: Ethernet

CSMA/CD (Collision Detection)

Data and Computer Communications. Chapter 11 Local Area Network

CS 43: Computer Networks. 27: Media Access Contd. December 3, 2018

Ethernet. Introduction. CSE 3213 Fall 2011

COMP/ELEC 429/556 Introduction to Computer Networks

LANs. Local Area Networks. via the Media Access Control (MAC) SubLayer. Networks: Local Area Networks

Link Layer and Ethernet

Contention Protocols and Networks

Data Link Layer -2- Network Access

Access Technologies! Fabio Martignon

CSE 461: Multiple Access Networks. This Lecture

Computer Networks. Medium Access Sublayer (Part I)

CS 43: Computer Networks Media Access. Kevin Webb Swarthmore College November 30, 2017

ECEN 5032 Data Networks Medium Access Control Sublayer

Data Link Layer -2- Network Access

Link Layer and Ethernet

Redes de Computadores. Medium Access Control

Summary of MAC protocols

Link Layer. (continued)

Ethernet. Networks: Ethernet 1

Getting Connected (Chapter 2 Part 4) Networking CS 3470, Section 1 Sarah Diesburg

Links Reading: Chapter 2. Goals of Todayʼs Lecture. Message, Segment, Packet, and Frame

CS 3640: Introduction to Networks and Their Applications

Data and Computer Communications

Packet multiple access and the Aloha protocol

Wireless Medium Access Control Protocols

ECE 4450:427/527 - Computer Networks Spring 2017

CS 123: Lecture 12, LANs, and Ethernet. George Varghese. October 24, 2006

Networking Technologies and Applications

Chapter 4. The Medium Access Control Sublayer

Medium Access Protocols

ICE 1332/0715 Mobile Computing (Summer, 2008)

Multiple Access Channels

Lecture 6 The Data Link Layer. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it

Topics. Link Layer Services (more) Link Layer Services LECTURE 5 MULTIPLE ACCESS AND LOCAL AREA NETWORKS. flow control: error detection:

Link Layer: Retransmissions

CARRIER SENSE MULTIPLE ACCESS (CSMA):

ECSE-4670: Computer Communication Networks (CCN) Informal Quiz 3

King Fahd University of Petroleum and Minerals College of Computer Sciences and Engineering Department of Computer Engineering

The Link Layer and LANs. Chapter 6: Link layer and LANs

Multiple Access Communications. EEE 538, WEEK 11 Dr. Nail Akar Bilkent University Electrical and Electronics Engineering Department

Links. Error Detection. Link Layer. Multiple access protocols. Nodes Links Frame. Shared channel Problem: collisions How nodes share a channel

Networks Homework # 2

Link Layer and LANs. Our Goals. Link Layer

Multiple Access Links and Protocols

Power Laws in ALOHA Systems

EECS Introduction to Computer Networking. Local Area Networks / Ethernet. Hub

Introduction to Computer Networks. IEEE Ethernet

Chapter 4. The Medium Access Control Sublayer. Points and Questions to Consider. Multiple Access Protocols. The Channel Allocation Problem.

RMIT University. Data Communication and Net-Centric Computing COSC 1111/2061/1110. Lecture 8. Medium Access Control Methods & LAN

ECE 4450:427/527 - Computer Networks Spring 2017

Unit 7 Media Access Control (MAC)

Lecture 12 December 04, Wireless Access. Graduate course in Communications Engineering. University of Rome La Sapienza. Rome, Italy

Ethernet. Lecture 6. Outline. Ethernet - Physical Properties. Ethernet - Physical Properties. Ethernet

Lecture 8 The Data Link Layer part I. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it

COS 140: Foundations of Computer Science

LAN. CS 4/55231 Internet Engineering. Kent State University Dept. of Computer Science

Lecture 9: Bridging. CSE 123: Computer Networks Alex C. Snoeren

Lecture 5 The Data Link Layer. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it

1-1. Switching Networks (Fall 2010) EE 586 Communication and. November 8, Lecture 30

ECE453 Introduction to Computer Networks. Broadcast vs. PPP. Delay. Lecture 7 Multiple Access Control (I)

Lecture 6. Reminder: Homework 2, Programming Project 2 due on Thursday. Questions? Tuesday, September 13 CS 475 Networks - Lecture 6 1

CSE 461: Multiple Access. Homework: Chapter 2, problems 1, 8, 12, 18, 23, 24, 35, 43, 46, and 58

Goals. Fundamentals of Network Media. More topics. Topics. Multiple access communication. Multiple access solutions

LECTURE PLAN. Script. Introduction about MAC Types o ALOHA o CSMA o CSMA/CD o CSMA/CA

CHAPTER 7 MAC LAYER PROTOCOLS. Dr. Bhargavi Goswami Associate Professor & Head Department of Computer Science Garden City College

TSIN01 Information Networks Lecture 8

Ethernet. Network Fundamentals Chapter Cisco Systems, Inc. All rights reserved. Cisco Public 1

Chapter V: Link Layer

Chapter V: Link Layer

Link Layer and LANs 안상현서울시립대학교컴퓨터 통계학과.

CMPE 257: Wireless and Mobile Networking

Medium Access Control

Local Area Networks (LANs) SMU CSE 5344 /

Midterm Review EECS 122. University of California Berkeley

Computer Networks Principles LAN - Ethernet

College of Computer and Information Sciences Department of Computer Engineering CEN444 Computer Networks Midterm 2 Exam Second Semester 1434/1435

Chapter 4: The Medium Access Layer

Direct Link Networks (II)

CMPE 150/L : Introduction to Computer Networks. Chen Qian Computer Engineering UCSC Baskin Engineering Lecture 16

Data Link Layer: Overview, operations

Chapter 5 Link Layer and LANs

Medium Access Control. CSCI370 Lecture 5 Michael Hutt New York Institute of Technology

CS 43: Computer Networks Switches and LANs. Kevin Webb Swarthmore College December 5, 2017

Transcription:

Protocols for Multiaccess Networks Hosts broadcast packets When a collision occurs, all transmitted packets are lost Lost packets have to be retransmitted => Need Multiaccess Protocol

Model - Slotted Aloha Time is divided into slots: unit time = L C seconds Packet arrival rate (over all hosts) of λ packets/time unit Collision or Perfect Reception Immediate Feedback: 0, 1, e Transmission Probability: q r Infinite number of hosts (i.e. each node has at most one packet to transmit)

Model - Slotted Aloha Throughput: G(n)e G(n) where G(n) = nq r Note: Arrivals according to a Poisson distribution with rate G: p k = Gk k! e G

Model - Slotted Aloha If G(n)e G(n) > λ: If G(n)e G(n) < λ: Optimal G(n) = nq r = 1, or q r = 1 n

Model - Slotted Aloha If G(n)e G(n) > λ: If G(n)e G(n) < λ: Optimal G(n) = nq r = 1, or q r = 1 n

Model - Slotted Aloha What did we learn? λ max = e 1 0.368 q r should dynamically change Binary Exponential Backoff q r = 2 k

Model - Slotted Aloha What did we learn? λ max = e 1 0.368 q r should dynamically change Binary Exponential Backoff q r = 2 k

Model - Slotted Aloha What did we learn? λ max = e 1 0.368 q r should dynamically change Binary Exponential Backoff q r = 2 k

Model - Slotted Aloha What did we learn? λ max = e 1 0.368 q r should dynamically change Binary Exponential Backoff q r = 2 k

Next Step Questions: Can we do better than Slotted Aloha? How close to the maximal throughput can we get? To improve Slotted Aloha: Where do we waste time?

Improving Slotted Aloha Approaches Carrier Sensing (CSMA) Collisions Detection (CD) Ethernet uses CSMA/CD

Goal Understand CSMA Understand CD Understand Ethernet

Model - CSMA Time is divided into slots (unit time = L C seconds): Length of idle slot β = τ C L seconds Packet arrival rate (overall nodes) of λ packets/time unit Collision or Perfect Reception Immediate Feedback: 0, 1, e Transmission Probability: q r Note: Stations only transmit after an idle slot!

Observations - CSMA Events Average Length of Events E[T ] = E[T no transmission attempt]p{no transmission attempt} E[T transmission attempt]p{transmission attempt}

Using the Poisson approximation with g(n) = nq r we obtain E[T ] = β e g(n) + (1 + β) (1 e g(n)) = β + 1 e g(n) and throughput(n) = P succ E[T ] = g(n)e g(n) E[T ] = g(n)e g(n) β + 1 e g(n)

Results - CSMA For β very small Maximal throughput for g = 2β Maximal throughput is 1 1+ 2β Stability is an issue

Model - CSMA/CD Time is divided into slots: Length of collision slot β = τ C L seconds Packet arrival rate (overall nodes) of λ packets/time unit Collision or Perfect Reception Immediate Feedback: 0, 1, e Transmission Probability: q r

Observations - CSMA/CD Events Average Length of Events E[T ] = E[T no trans. attempt]p{no trans. attempt} + E[T one trans. attempt]p{ one trans. attempt} + E[T > one trans. attempt]p{ > one trans. attempt}

Using the Poisson approximation with g(n) = nq r we obtain E[T ] = β e g(n) + ( (1 + β) g(n)e g(n)) + 2β (1 e g(n) g(n)e g(n)) = β + g(n)e g(n) β [1 (1 + g(n))e g(n)] and throughput(n) = P succ E[T ] = g(n)e g(n) ] β + g(n)e g(n) β [1 (1 + g(n))e g(n)

Results - CSMA/CD Maximal throughput for g = 0.77 Maximal throughput is 1 1+3.31β Stability is an issue

Ethernet Uses CSMA/CD Uses Binary Backoff Does not use time slots

Ethernet Frame Preamble (8 bytes): Synchronization Destination Address (6 bytes) - Source Address (6 bytes) MAC-Address (hexadecimal notation): 1A-3B-0D-08-9B Type (2 bytes): Multiplexing (of Network protocols) Data (46-1500 bytes) Cyclic-Redundancy Check (4 bytes): Error detection

Ethernet Protocol If the adapter senses that the channel is idle and has a frame to transmit, it starts to transmit the frame. If the adapter senses that the channel is busy, it waits until it senses no signal (plus 96 bit times) and then starts to transmit. If the adapter detects a signal from other adapters while transmitting, it stops transmitting its frames and instead transmits a 48-bit jam signal. After aborting, the adapter enters an exponential backoff phase. After experiencing the nth collision in a row for this frame, the adapter chooses at random a value K from {0, 1,..., 2 m 1 } where m := min(n, 10). The adapter then waits K 512 bit frames and then tries to retransmit the frame. > Connectionless Service

Data Link Layer for Random Access

10Base2 Ethernet 10 Mbps Thin coaxial wire Maximal Length (without repeaters) is 185m.

10BaseT and 100BaseT Ethernet 10 Mbps / 100 Mbps Twisted-pair copper wire Maximal Length (host to hub) is 100m.

Interconnecting Ethernets

WaveLAN s: IEEE 802.11 Hidden-Terminal Problem: ACK CSMA/CA