# ALOHA Class of Multiple Access Protocols

Save this PDF as:

Size: px
Start display at page:

## Transcription

1 ALOHA Class of Multiple Access Protocols ALOHA, also called pure ALOHA: Whenever a user has a frame to send, it simply transmits the frame. If collision occurs, it waits for a random period of time and re-sends it again Sender can always find out if its frame was destroyed by listening to channel. For a LAN, feedback is immediate, while for a satellite there is a long delay of 270 ms before sender knows If listening while transmitting is not possible, ACKs are needed, e.g. in packet radio, collision from simultaneous transmissions of multiple transmitters is detected by base station, who sends out ACK or NAK accordingly (via reverse channel) Performance: throughput S (frames/s) which defines average number of frames successfully transmitted per unit time, and average delay D (s) experienced by a frame Assuming average frame length τ f (s) and fixed channel rate, frame transmission can be modelled by Poisson distribution with mean arrival rate λ (frames/s) Normalised channel traffic or average number of old and new frames submitted per frame time is ALOHA: Tx 1 time G = λτ f (unit in Erlang) The throughput is then given by S = G Prob(no collision) Tx 2 τ Vulnerable period: 2 τ f f 71

2 ALOHA Class (continue) Slotted ALOHA: time is divided into slots of equal length greater or equal to average frame duration τ f, and frame transmission can only start at beginning of a time slot Probability that a frame does not suffer from a collision is given by P 0 = The throughput/frame time is then j e 2G, e G, ALOHA slotted ALOHA S = j G e 2G, G e G, ALOHA slotted ALOHA Maximum throughput of ALOHA: ds dg = e 2G 2Ge 2G = 0 G max = 1 2 S max = 1 2 e 1 = Maximum throughput of slotted ALOHA: ds dg = e G Ge G = 0 G max = 1 S max = e 1 = ALOHA class is simple to implement but efficiency is low. By listening before transmitting, lots of collisions can be avoided carrier sense multiple access (CSMA) 72

3 Carrier Sense Multiple Access A user wishing to transmit first listens to the medium to see if another transmission is in progress (carrier sense) If the channel is in use, it must wait. If the medium is idle, it may transmit 1-persistent: a user keeps listening to see if channel is free and, as soon as the channel is idle, it transmits Nonpersistent: when the channel is busy, it waits for a random period of time before trying to listen again. This is less greedy p-persistent: for slotted systems. When the channel is free during current slot, it may transmit with probability p or may defer until next slot with probability 1 p Detection or sensing delay is determined by receiver hardware: a small detection time means that a user can detect a free channel rapidly Propagation delay is critical to performance: a small propagation delay means that as soon as a user launches a packet, others knows quickly and will defer to transmit, thus reducing collisions CSMA is effective for LANs, where propagation delay is usually very small compared with frame transmission, i.e. small link parameter a Performance of a random access scheme is specified by S versus G and D versus G 73

4 CSMA (continue) Throughput versus load: For CSMA with small p, the method performs very well in terms of throughput at high load (almost 100%). However, for smaller p, users must wait longer (larger delay) to attempt transmission In the extreme case: only single user G (attempts per packet time) wishes to transmit, expected number of deferring is 1/p. If p = 0.01, at low load, a user will wait an average of 99 time slots before transmitting on an idle line For low load, slotted ALOHA is preferred due to its low delay S (throughput per packet time) Pure ALOHA Slotted ALOHA 0.5-persistent CSMA 1-persistent CSMA 0.01persistent CSMA Nonpersistent CSMA 0.1-persistent CSMA Trade-off throughput versus delay: multiple access protocol with the characteristics of dashed curve is preferred Better performance can be achieved if user continues to listen to medium while transmitting and stops transmission immediately if collision is detected CSMA with collision detection Throughput Normalized delay 74

5 CSMA with Collision Detection A user wishes to transmit: 1. Listens to see if the channel is free. If the channel is idle, it transmits. If the channel is busy, it keeps listening until the channel is free, then transmits immediately (1-persistent) 2. During the transmission, it keeps listening to detect collision. If a collision is detected, it stops transmitting immediately, and waits a random period of time before goes back to step 1. States of CSMA/CD: transmission period, contention period and idle period Let τ be end-to-end (two farthest users) propagation time Worst case time to detect collision is 2τ: Frames should be long enough to allow collision detection prior to the end of transmission, otherwise CSMA/CD degrades to CSMA Binary exponential backoff is used: when repeatedly facing collisions, mean value of random delay is doubled Transmission period t o Contention period Contention slots Frame Frame Frame Frame Time Idle period A Packet starts at time 0 B A Packet almost at B at τ - B A (a) (c) Collision at time τ B A (b) Noise burst gets back to A at 2τ (d) B 75

7 CSMA with CD Performance Let R be data rate (bps), d be end-to-end link distance (m), V be propagation velocity (m/s), and L average frame length (bits). The link parameter is defined as: a = propagation time frame time = R d L V Maximum possible utilisation of the channel is expressed as the ratio of throughput to capacity View time in slots, with slot length 2τ and τ = d V being end-to-end propagation time Recall CSMA/CD model: transmission, contention and idle periods. Under heavy load assumption no idle time Let T t be average transmission interval and T c be average contention interval. The maximum utilisation or efficiency is given by U = T t + T c Since T t = 1 2a 2τ and it can be shown T c = e 2τ, U = T t a Example. Guided media V = (m/s), 10 Mbps LANs (Ethernet) with τ = 25.6 µs: Frame length 64 bytes U = 0.27, and frame length 1024 bytes U =

8 IEEE Token Bus Contention protocol in IEEE Ethernet is stochastic, i.e. worst case waiting may be unbounded. Some applications prefer known or fixed worst case waiting round-robin Token bus: physically all users are connected to a bus (as in Ethernet) but they are logically organised in a ring Special control frame, token, is handed from user to user in turn. User currently holding token may transmit Token bus MAC: Frame control: indicates whether a frame is data or control For data, frame control contains the frame s priority and a frame Broadband coaxial cable 17 Bytes or 6 2 or Direction of token motion Destination address Frame control Start delimiter Preamble Source address Data Logical ring Checksum This station not currently in the logical ring End delimiter status indicator for destination to acknowledge correct or incorrect receipt of the frame. Otherwise destination would not be allowed to do anything since it does not have token For control, it indicates type of control frame, such as claim token during initialisation, allow new stations to enter, recover from token loss, resolve contending stations for position, actual token, allow stations to leave 78

9 IEEE Token Ring Token bus has very high complexity, much to do with converting a physical bus into a logical ring Token ring: Why make thing difficult? Just physically connect stations into a ring Ring interface Station 1 bit delay Ring interface Bit physical length: Let the data rate be R Mbps and propagation speed 200 m/µs A bit lasts 1/R µs or has a length 200/R m e.g. for R = 4 Mbps, bit physical length is 50 m Unidirectional ring To station From station To station (a) (b) (c) From station Ring physical length in bits must be large enough to contain token e.g. 1 km ring with R = 4 Mbps, ring physical length is 20 bits, not enough for a 24-bit token If ring physical length is too small insert artificial delay to increase it Characteristics: for Ethernet bus, a minimum frame length is required; for token ring, a minimum ring physical length is required 79

10 802.5 Token Ring (continue) MAC for token ring: with token/frame format as follows, 3-byte token circulates around the ring User wishing to transmit must wait for token to arrive and captures it (turns token into 3 bytes of a normal frame) It can then transmit and, when transmitted frame bits circulate back to sender, it removes them After user has finished Tx, it regenerates and releases token SD AC ED (a) Bytes or 6 2 or 6 SD AC FC Destination address Frame control Access control Starting delimiter Source address No limit 4 Data Ending delimiter Frame status Checksum Access control: contains token bit (0 for token, 1 for frame), monitor, priority and reservation bits Frame control: indicate data or control frame, latter for ring maintenance/fault management Token holding time: a user is allowed to hold token for THT, default value 10 ms Frame Status: contains A (address recognised) and C (frame copied) bits, both are reset to logic 0 at sender When receiver recognises destination address as its own, it sets A to logic 1, and if receiver is able to copy frame, it sets C to logic 1 This provides automatic ACK for each frame, otherwise receiver cannot do anything as it does not have token (b) 1 1 ED FS 80

11 Token Bus and Ring MAC Performance Assume n active users and recall the definition of link parameter a Maximum utilisation or efficiency is U = ( 1 1+a/n, a < 1 1 a(1+1/n), a > 1 Under a heavy load assumption, n, Comparison of three LANs 802.3, and use roughly similar technology and get roughly similar performance Under most circumstances, all three perform well Ethernet is most popular Three standards have three different frame formats Bridging them can have serious difficulties U = j 1, a < 1 1 a, a > 1 Issue Performance OK OK OK Simplicity yes no yes deterministic no yes yes Priorities no yes yes Heavy-load Perf bad good good Reliability OK very good good User base large small large 81

12 Summary For broadcast networks, data link layer is divided into medium access control and logical link control sublayers: LLC deals with point-to-point connection issues, and MAC deals with how to access shared medium Three medium access strategies are: contention (random access); round-robin and reservation (scheduled access) Contention methods: ALOHA, slotted ALOHA, CSMA, CSMA with CD Ethernet: CSMA with CD, frame time must be no less than 2 end-to-end propagation delay minimum frame length Token bus and ring standards (round-robin based): bit has a physical length and therefore minimum ring length is needed Comparison of three LANs, how their MACs operate, frame formats, special features 82

### Local Area Networks (LANs)

Local Area Networks (LANs) Broadcast Networks Multiple Access Protocols Ethernet (IEEE 802.3) Token Ring (IEEE 802.5, FDDI) Introduction So far, we have dealt with switched communication networks. Recall

### 4. MAC protocols and LANs

4. MAC protocols and LANs 1 Outline MAC protocols and sublayers, LANs: Ethernet, Token ring and Token bus Logic Link Control (LLC) sublayer protocol Bridges: transparent (spanning tree), source routing

### Local & Metropolitan Area Networks

Local & Metropolitan Area Networks CS455 Yonshik Choi, Ph.D. Department of Computer Science Illinois Institute of Technology Rice Campus Local Area Networks Characteristic Smaller geographical area a

### LANs. Local Area Networks. via the Media Access Control (MAC) SubLayer. Networks: Local Area Networks

LANs Local Area Networks via the Media Access Control (MAC) SubLayer 1 Local Area Networks Aloha Slotted Aloha CSMA (non-persistent, 1-persistent, p-persistent) CSMA/CD Ethernet Token Ring 2 Network Layer

### IEEE 802 LANs. LAN: Local Area Network What is a local area network?

IEEE 802 LANs LAN: Local Area Network What is a local area network? A LAN is a network that resides in a geographically restricted area LANs usually span a building or a campus 1 Characteristics of LANs

### Overview. Next Lecture. Last Lecture. This Lecture. Flow control and error control. Local area networking 1 Source: Sections 13

Overview Last Lecture Flow control and error control This Lecture Local area networking 1 Source: Sections 13 Next Lecture Local area networking 2 Source: Sections 17.1-17.2 1 Data Link Layer Standards

### Inst: Chris Davison

ICS 153 Introduction to Computer Networks Inst: Chris Davison cbdaviso@uci.edu ICS 153 Introduction to Computer Networks MAC Sublayer Contents Fixed Assignment Protocols Demand Assignment Protocols Contention

### Token Passing: IEEE802.5 standard. IEEE802.5 standard

Token Passing: IEEE802.5 standard. 4 Mbps. maximum token holding time: 10 ms, limiting packet length. packet (token, data) format:. SD, ED mark start, end of packet 1 IEEE802.5 standard. AC access control

### Local Area Networks transmission system private speedy and secure kilometres shared transmission medium hardware & software

Local Area What s a LAN? A transmission system, usually private owned, very speedy and secure, covering a geographical area in the range of kilometres, comprising a shared transmission medium and a set

### Review of Legacy LANs: IEEE 802.{2,3,5} MACs

Review of Legacy LANs: IEEE 802.{2,3,5} MACs 1 Medium Access Control Methods (MACs) Most LANs use shared transmission media. Hence need a mechanism to control access for one station at a time. Most common

### 06/02/ Local & Metropolitan Area Networks. Overview. Medium Access Sublayer (1) ACOE322

1 Local & Metropolitan Area Networks ACOE322 Lecture 2 Medium Access Control and Logical Link Control 1 Overview The architecture of a LAN is best described in terms of a layering of protocols that organize

### CPS 422 Computer Networks IEEE 802.5 (TOKEN RING) STANDARD IEEE 802.4 (TOKEN BUS) AND IEEE 802.5 (TOKEN RING) STANDARDS. A Token Ring Layout

CPS 422 Computer Networks DATA LINK LAYER IEEE 802.4 (TOKEN BUS) AND IEEE 802.5 (TOKEN RING) STANDARDS IEEE 802.5 (TOKEN RING) STANDARD TEXT BOOK:- Andrew S. Tenenbaum 3 rd Edition A Token Ring Layout

### EEC-484/584 Computer Networks

EEC-484/584 Computer Networks Lecture 8 wenbing@ieee.org (Lecture nodes are based on materials supplied by Dr. Louise Moser at UCSB and Prentice-Hall) Outline 2 Homework #1 Review Protocol verification

### Not all Ethernet standards utilize CSMA/CD MAC, the most commonly used 3 Ethernet Standards that support shared transmission medium are:

Ethernet is a family of computer networking technologies for LANs. Typical Ethernet standards (e.g. IEEE 802.3) model the Physical and Data Link Layers of OSI/RM. Not all Ethernet standards utilize CSMA/CD

### Ethernet. Outline Multiple Access and Ethernet Intro Ethernet Framing CSMA/CD protocol Exponential backoff

Ethernet Outline Multiple Access and Ethernet Intro Ethernet Framing CSMA/CD protocol Exponential backoff Our Focus is Ethernet History Developed by Bob Metcalfe and others at Xerox PARC in mid-1970s Roots

### How does IEEE fit into ISO OSI-7 layer model? Existing IEEE LAN standards. Access to physical medium. model?

Existing IEEE LAN standards slide 1 slide 2 How does IEEE fit into ISO OSI-7 layer model? the standards produced by IEEE in LANs have widely been adopted by industry the 802 committee have become internationally

### ECE 333: Introduction to Communication Networks Fall 2001

ECE 333: Introduction to Communication Networks Fall 2001 Lecture 17: Medium Access Control V Perfectly scheduled approaches Token ring networks 1 We have categorized channel allocation techniques as either

### Ring Local Area Network. Ring LANs

Ring Local Area Network Ring interface (1-bit buffer) Ring interface To station From station Ring LANs The ring is a series of bit repeaters, each connected by a unidirectional transmission link All arriving

### Chapter 9 Multiple Access Techniques for Wireless Communications

Chapter 9 Multiple Access Techniques for Wireless Communications Yimin Zhang, Ph.D. Department of Electrical & Computer Engineering Villanova University http://yiminzhang.com/ece8708 Yimin Zhang, Villanova

### LAN. Kent State University Dept. of Computer Science. CS 4/55231 Internet Engineering. LAN Topologies-1. Disadvantage. Advantages LECT-4A4

CS 4/55231 Internet Engineering Kent State University Dept. of Computer Science LECT-4A4 LAN 1 2 In the last class we saw how two computers can connect to each other. In this class we will see how a group

### Introduction to LAN Protocols

CHAPTER 2 Chapter Goals Learn about different LAN protocols. Understand the different methods used to deal with media contention. Learn about different LAN topologies. This chapter introduces the various

### Point-to-Point Vs. Shared Channel Communication In LANs Point-to-point:

Point-to-Point Vs. Shared Channel Communication In LANs Point-to-point: Computers connected by communication channels that each connect exactly two computers with access to full channel bandwidth. Forms

### Local and Metropolitan Area Networks

Local and Metropolitan Area Networks Local Area Networks (LAN)- Networks that optimized for a moderate-size geographic area, such as a single office building, a warehouse, or a campus. - low bit error

### Ethernet. Ethernet Frame Structure. Ethernet Frame Structure (more) Ethernet: uses CSMA/CD

Ethernet dominant LAN technology: cheap -- \$20 for 100Mbs! first widely used LAN technology Simpler, cheaper than token rings and ATM Kept up with speed race: 10, 100, 1000 Mbps Metcalfe s Etheret sketch

### Medium Access Control (MAC) protocol

Medium Access ontrol (MA) protocol omputers DNS Shared medium Point-to-Point. R R. WLAN AP R LAN. Shared medium AP DNS DNS: Domain Name System Figure 1: Different components of a network The Internet consists

### Local Area Networks. Ethernet 802.3 LAN - 7-1.

Local Area Networks Ethernet 802.3 LAN - 7-1 Local Area Networks (Lokale Netze) Wide Area Network LAN - 7-2 Local Area Networks What is a LAN? Multiple systems attached to an often shared medium high total

### LAN Topologies, Access methods

LAN Topologies, Access methods (Week 1, Wednesday 1/10/2007) Abdou Illia, Spring 2007 1 Learning Objectives Describe LAN topologies Describe major LAN access methods (Ethernet, Token ring, and FDDI) 2

### TCOM 370 NOTES 99-12 LOCAL AREA NETWORKS AND THE ALOHA PROTOCOL

1. Local Area Networks TCOM 370 NOTES 99-12 LOCAL AREA NETWORKS AND THE ALOHA PROTOCOL These are networks spanning relatively short distances (e.g. within one building) for local point-to-point and point-to-multipoint

### CS263: Wireless Communications and Sensor Networks

CS263: Wireless Communications and Sensor Networks Matt Welsh Lecture 4: Medium Access Control October 5, 2004 2004 Matt Welsh Harvard University 1 Today's Lecture Medium Access Control Schemes: FDMA TDMA

### 6.1. Why do LANs tend to use broadcast networks? Why not use networks consisting of multiplexers and switches?

TUTORIAL 2 (EKT 332) 6.1. Why do LANs tend to use broadcast networks? Why not use networks consisting of multiplexers and switches? Why broadcast network? -The computers in a LAN are separated by a short

### Multiple Access Techniques PROF. MICHAEL TSAI 2011/12/8

Multiple Access Techniques PROF. MICHAEL TSAI 2011/12/8 Multiple Access Scheme Allow many users to share simultaneously a finite amount of radio spectrum Need to be done without severe degradation of the

### MEDIA ACCESS CONTROL

MEDIA ACCESS CONTROL Random Access & Token Rings 18 The Data Link Layer Simplest way to create a network of nodes Ø Connect the nodes directly with a physical medium Point-to-point links: Ø Choice of Media

### Wired Local Area Network (Ethernet)

Chapter 13 Wired Local Area Network (Ethernet) IEEE Standards In 1985, the Computer Society of the IEEE started a project, called Project 802, to set standards to enable intercommunication among equipment

### EECS 122: Introduction to Computer Networks Multiaccess Protocols. ISO OSI Reference Model for Layers

EECS 122: Introduction to Computer Networks Multiaccess Protocols Computer Science Division Department of Electrical Engineering and Computer Sciences University of California, Berkeley Berkeley, CA 94720-1776

### Communication Networks. MAP-TELE 2011/12 José Ruela

Communication Networks MAP-TELE 2011/12 José Ruela Network basic mechanisms Multiple Access Multiple Access In early data communication systems, one solution to provide access of remote terminals to a

### J.GODWIN PONSAM & S.CHRISTOBEL DIANA ASST.PROFESSOR SRM University, Kattankulathur

8/22/2011 School of Computing, Department of IT IT 0305 COMPUTER NETWORKS FIFTH SEMESTER UNIT III J.GODWIN PONSAM & S.CHRISTOBEL DIANA ASST.PROFESSOR SRM University, Kattankulathur 1 Unit iii School of

### SEN366 (SEN374) (Introduction to) Computer Networks

SEN366 (SEN374) (Introduction to) Computer Networks Prof. Dr. Hasan Hüseyin BALIK (10 th Week) Ethernet 10.Outline Traditional Ethernet High-Speed Ethernet IEEE 802.1Q VLAN Standard end of 2013 (projected)

### Introduction to Local Area Networks

For Summer Training on Computer Networking visit Introduction to Local Area Networks Prepared by : Swapan Purkait Director Nettech Private Limited swapan@nettech.in + 91 93315 90003 Introduction A local

### Topics. Computer Networks. Fixed Channel Allocation. Introduction Remember, two categories of networks. Multiple Access FDM

Topics Computer Networks Medium Access Sublayer Introduction Multiple Access Protocols IEEE 802 Standard Bridges Misc (brief) High-Speed LANs Satellite Networks Introduction Remember, two categories of

### Lecture 6: Media Access Control. CSE 123: Computer Networks Stefan Savage

Lecture 6: Media Access Control CSE 123: Computer Networks Stefan Savage Today: Media access How to share a channel among different hosts? Channel partitioning FDMA (frequency division multiple access)

### Network Categories. Network Types for the Local Range. Ethernet. Carrier Sense Multiple Access

Sicherungsebene Network Categories Local Area Networks (LAN): 0m - few km, simple connection structure Ethernet/Fast Ethernet/Gigabit Ethernet Token Bus, Token Ring LAN Wireless LAN (WLAN, up to a few

### 17.4 IEEE MEDIUM ACCESS CONTROL

17.4 / IEEE 802.11 MEDIUM ACCESS CONTROL 535 refers to a wired LAN that is physically connected to the DS and whose stations may be logically connected to an IEEE 802.11 LAN via the integration service.

### ECE 333: Introduction to Communication Networks Fall 2002

ECE 333: Introduction to Communication Networks Fall 2002 Lecture 14: Medium Access Control II Dynamic Channel Allocation Pure Aloha In the last lecture we began discussing medium access control protocols

### Medium Access Sublayer

Medium Access Sublayer Topology of the Network Bus, Ring, Tree Protocols IEEE 802.3 for bus topology IEEE 802.4 for token bus IEEE 802.5 for token ring FDDI for fibre ring IEEE 802.11 for wireless networks

### Module 5. Broadcast Communication Networks. Version 2 CSE IIT, Kharagpur

Module 5 Broadcast Communication Networks Lesson 4 IEEE Ring LANs Specific Instructional Objectives At the end of this lesson, the students will become familiar with the following concepts: Explain the

### Notes Odom, Chapter 3 Flashcards Set:

EDTECH 552 (SP11) Susan Ferdon Notes Odom, Chapter 3 Flashcards Set: http://www.flashcardmachine.com/1101574/4vb4 LAN Ethernet UTP IEEE NIC 10BASE5 10BASE2 CSMA/CD Local Area Network Layer 1 and 2 standards

### Data Link Layer. Page 1. Ethernet

Sicherungsebene Network Categories Local Area Networks (LAN): 10m - few km, simple connection structure Ethernet/Fast Ethernet/Gigabit Ethernet Token Bus, Token Ring LAN Wireless LAN (WLAN, up to a few

### CSMA/CA. Information Networks p. 1

Information Networks p. 1 CSMA/CA IEEE 802.11 standard for WLAN defines a distributed coordination function (DCF) for sharing access to the medium based on the CSMA/CA protocol Collision detection is not

### Unit of Learning # 2 The Physical Layer. Sergio Guíñez Molinos sguinez@utalca.cl 2-2009

Unit of Learning # 2 The Physical Layer Sergio Guíñez Molinos sguinez@utalca.cl 2-2009 Local Area Network (LAN) Redes de Computadores 2 Historic topologies more used in LAN Ethernet Logical Bus and Physical

### COMPUTER NETWORKS - LAN standardization

IEEE standards for local area networks Telecommunication Networks Group firstname.lastname@polito.it http://www.telematica.polito.it/ COMPUTER NETWORKS Standard for LANs 1 Copyright Quest opera è protetta

### 1. LAN ARCHITECTURE. LAN Protocol Architecture

Chap. 12 LAN Technology 1 1. LAN ARCHITECTURE LAN Protocol Architecture LAN protocol architectures are specified by IEEE 802 reference model In IEEE 802 reference model, there are two separate layers corresponding

### Module 5 Local Area Networks

Module 5 Local Area Networks Lesson 18 Token Passing LANs OBJECTIVE General The lesson will discuss the Token Passing LANs Specific The focus areas of this lesson are: 1. Idea of Token passing LANs 2.

### JAVA NETWORK SIMULATOR

Rhushabh Goradia and Piyush Porwal Computer Science and Engineering IIT Bombay rhushabh@cse.iitb.ac.in, porwalpiyush@cse.iitb.ac.in November 29, 2004 Outline of Presentation Overview of JNS Working Structure

### Random Access Protocols

Lecture Today slotted vs unslotted ALOHA Carrier sensing multiple access Ethernet DataLink Layer 1 Random Access Protocols When node has packet to send transmit at full channel data rate R. no a priori

### CS/ECE 438: Communication Networks for Computers Spring 2014 Midterm Study Guide

CS/ECE 438: Communication Networks for Computers Spring 2014 Midterm Study Guide 1. Channel Rates and Shared Media You are entrusted with the design of a network to interconnect a set of geographically

### Lecture 5 Medium Access Control (MAC) MAC Medium Access Control

Data communication I Lecture 5 Medium Access Control (MAC) MAC Medium Access Control A MAC protocol organizes the access of several sources to the common medium Who decides who is to talk when and for

### Wired LANs: Ethernet

Chapter 13 Wired LANs: Ethernet Behrouz A. Forouzan Data communication and Networking 1 13-1 IEEE STANDARDS In 1985, the Computer Society of the IEEE started a project, called Project 802, to set standards

### EXAMPLES AND PROBLEMS. Competence Based Education Internet Protocols

EXAMPLES AND PROBLEMS Competence Based Education Internet Protocols Example 1 In following figure frames are generated at node A and sent to node C through node B. Determine the minimum transmission rate

### Communication Systems I

Communication Systems I Course Map Contents Recap of the networks we ve seen so far Basics of protocols HTTP example The OSI model Packet and Circuit switching Physical media What to expect next Recap

### Controlled Random Access Methods

Helsinki University of Technology S-72.333 Postgraduate Seminar on Radio Communications Controlled Random Access Methods Er Liu liuer@cc.hut.fi Communications Laboratory 09.03.2004 Content of Presentation

### 2. What is the maximum value of each octet in an IP address? A. 128 B. 255 C. 256 D. None of the above

1. How many bits are in an IP address? A. 16 B. 32 C. 64 2. What is the maximum value of each octet in an IP address? A. 128 B. 255 C. 256 3. The network number plays what part in an IP address? A. It

### Lecture Computer Networks

Prof. Dr. Hans Peter Großmann mit M. Rabel sowie H. Hutschenreiter und T. Nau Sommersemester 2012 Institut für Organisation und Management von Informationssystemen Lecture Computer Networks Ethernet and

### Based on Computer Networking, 4 th Edition by Kurose and Ross

Computer Networks Ethernet Hubs and Switches Based on Computer Networking, 4 th Edition by Kurose and Ross Ethernet dominant wired LAN technology: cheap \$20 for NIC first widely used LAN technology Simpler,

Real-Time (Paradigms) (51) 5. Real-Time Communication Data flow (communication) in embedded systems : Sensor --> Controller Controller --> Actor Controller --> Display Controller Controller Major

### RTT 60.5 msec receiver window size: 32 KB

Real-World ARQ Performance: TCP Ex.: Purdue UCSD Purdue (NSL): web server UCSD: web client traceroute to planetlab3.ucsd.edu (132.239.17.226), 30 hops max, 40 byte packets 1 switch-lwsn2133-z1r11 (128.10.27.250)

### 1/21. Ethernet. Surasak Sanguanpong Last updated: 11 July Ethernet 1/21

1/21 Ethernet Surasak Sanguanpong nguan@ku.ac.th http://www.cpe.ku.ac.th/~nguan Last updated: 11 July 2000 Ethernet 1/21 Ethernet and IEEE 802.3 2/21 Developed during the mid- 1970s at Xerox Palo Alto

### 802.11 standard. Acknowledgement: Slides borrowed from Richard Y. Yang @ Yale

802.11 standard Acknowledgement: Slides borrowed from Richard Y. Yang @ Yale IEEE 802.11 Requirements Design for small coverage (e.g. office, home) Low/no mobility High data-rate applications Ability to

### CSE 123: Computer Networks

Total Points = 28 CSE 123: Computer Networks Homework 2 Solutions Out: 4/20, Due: 4/27 Problems 1. High Frequency Trading [5 pts] Companies like Goldman Sachs put a high value on using very low latency

### CSE331: Introduction to Networks and Security. Lecture 6 Fall 2006

CSE331: Introduction to Networks and Security Lecture 6 Fall 2006 Open Systems Interconnection (OSI) End Host Application Reference model not actual implementation. Transmits messages (e.g. FTP or HTTP)

### Token Bus. Message Exchange in Token Bus. Example. Problems with Token Bus. Two types of messages are used: Token messages T ID, nextid ID

Token us Token -procedure: Only someone who possesses a certain ken (= bit sequence), may send. One example for a ken network: IEEE 80. Token us All s should be treated equally, i.e. they have pass on

### Local Area Networks (LAN)

Lecture 4 Local Area Networks (LAN) - Sharing Transmission Media by Computers - Classifications of Computer Networks: LAN, MAN, WAN Point-To-Point Connection and Shared Medium LAN Topology: Star, Ring,

### Token Bus. Message Exchange in Token Bus. Example. Problems with Token Bus. Two types of messages are used: Token messages T ID, nextid ID

Token us Token -procedure: Only someone who possesses a certain ken (= bit sequence), may send. One example for a ken network: IEEE 80. Token us All stations should be treated equally, i.e. they have pass

### Tutorial Questions EG/ES The tutorial questions illustrate the style of examination questions for EG/ES 3567.

The tutorial questions illustrate the style of examination questions for EG/ES 3567. The paper will be of 3 hours duration, and each student should attempt four questions during this time. You should aim

High-Level Data Link Control This class of data link layer protocols includes High-level Data Link Control (HDLC), Link Access Procedure Balanced (LAPB) for X.25, Link Access Procedure for D-channel (LAPD)

### Local Area Networks The Basics

Local Area Networks The Basics Chapter 7 Learning Objectives After reading this chapter, you should be able to: State the definition of a local area network List the primary function, activities, and application

### LAN Switching. 15-441 Computer Networking. Switched Network Advantages. Hubs (more) Hubs. Bridges/Switches, 802.11, PPP. Interconnecting LANs

LAN Switching 15-441 Computer Networking Bridges/Switches, 802.11, PPP Extend reach of a single shared medium Connect two or more segments by copying data frames between them Switches only copy data when

### LAN Systems. Raj Jain. Professor of CIS. The Ohio State University

LAN Systems Professor of CIS Columbus, OH 43210 Jain@cis.ohio-state.edu This presentation is available on-line at http://www.cis.ohio-state.edu/~jain/cis677-98/ 1 Overview IEEE 802.3: Ethernet and fast

### a. CSMA/CD is a random-access protocol. b. Polling is a controlled-access protocol. c. TDMA is a channelization protocol.

CHAPTER 12 PRACTICE SET Questions Q12-1. The answer is CSM/CD. a. CSMA/CD is a random-access protocol. b. Polling is a controlled-access protocol. c. TDMA is a channelization protocol. Q12-3. The answer

### Computer Networks. Unit 5: Local Area Networks. LANs basics The IEEE 802 standard Ethernet MAC protocols Internetworking: repeaters and bridges

Computer Networks Unit 5: Local Area Networks LANs basics The IEEE 802 standard Ethernet MAC protocols Internetworking: repeaters and bridges unit 5 1 Introduction A local area network is a communication

### Data Communication Prof. A. Pal Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur. Lecture # 28 IEEE 802 LANs

Data Communication Prof. A. Pal Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Lecture # 28 IEEE 802 LANs Hello and welcome to today s lecture on IEEE 802 LANs.

### CSE 123: Computer Networks

CSE 123: Computer Networks Homework 2 Out: 4/20, Due: 4/27 Instructions 1. Turn in a physical copy at the beginning of the class on 4/27 2. Ensure the HW cover page has the following information clearly

### Collision of wireless signals. The MAC layer in wireless networks. Wireless MAC protocols classification. Evolutionary perspective of distributed MAC

The MAC layer in wireless networks The wireless MAC layer roles Access control to shared channel(s) Natural broadcast of wireless transmission Collision of signal: a /space problem Who transmits when?

### Chapter 4. Medium Access Control. IN2P3 Octobre 2002 Jean-Pierre Thomesse

Chapter 4 Medium Access Control 1 Introduction Objectives To manage the access to the medium or channel To take into account the time constraints To schedule the traffics Different solutions History Different

### DigiPoints Volume 1. Student Workbook. Module 10 Local Area Network (LAN)

Local Area Network (LAN) Page 10.1 DigiPoints Volume 1 Module 10 Local Area Network (LAN) Summary This module describes the -peed data networks found on customers premises that make possible connections

### Star topology. Ethernet. Ethernet Frame Structure (more) Ethernet Frame Structure. Ethernet uses CSMA/CD. Unreliable, connectionless service

thernet dominant wired LN technology: cheap \$0 for 00Mbs! first widely used LN technology Simpler, cheaper than token LNs and TM Kept up with speed race: 0 Mbps 0 bps Star topology us topology popular

### CSE 123A Computer Networks

CSE 123A Computer Networks Winter 2005 Lecture 5: Data-Link II: Media Access Some portions courtesy Srini Seshan or David Wetherall Last Time Framing: How to translate a bitstream into separate packets

### IEEE 802 Architecture. Lecture 07 IEEE802.2 and Ethernet. IEEE 802.3 Cabling. Baseband IEEE 802.3 LANs. Network Adapter. Data Link Layer in IEEE 802

IEEE 8 rchitecture Lecture 7 IEEE8. and Ethernet 8. Network Connection Technology 8. Data Link Kuang-hua Chen Department of Library and Information Science National Taiwan University 8. CSM /CD 8. Token-

### Note! The problem set consists of two parts: Part I: The problem specifications pages Part II: The answer pages

Part I: The problem specifications NTNU The Norwegian University of Science and Technology Department of Telematics Note! The problem set consists of two parts: Part I: The problem specifications pages

### Local Area Networks. Guest Instructor Elaine Wong. Elaine_06_I-1

Local Area Networks Guest Instructor Elaine Wong Elaine_06_I-1 Outline Introduction to Local Area Networks (LANs) Network architecture Geographical area LAN applications LAN Technologies Ethernet Fiber

### OSI MODEL. TCP/IP Protocol Suite 2

OSI Model UNIT I OSI MODEL TCP/IP Protocol Suite 2 OSI Model Communication Architecture Strategy for connecting host computers and other communicating equipment. Defines necessary elements for data communication

### Token Ring and. Fiber Distributed Data Interface (FDDI) Networks: Token Ring and FDDI 1

Token Ring and Fiber Distributed Data Interface (FDDI) Networks: Token Ring and FDDI 1 IEEE 802.5 Token Ring Proposed in 1969 and initially referred to as a Newhall ring. Token ring :: a number of stations

### BCS THE CHARTERED INSTITUTE FOR IT. BCS HIGHER EDUCATION QUALIFICATIONS BCS Level 5 Diploma in IT COMPUTER NETWORKS

BCS THE CHARTERED INSTITUTE FOR IT BCS HIGHER EDUCATION QUALIFICATIONS BCS Level 5 Diploma in IT COMPUTER NETWORKS Friday 2 nd October 2015 Morning Answer any FOUR questions out of SIX. All questions carry

### Performance Evaluation of Wired and Wireless Local Area Networks

International Journal of Engineering Research and Development ISSN: 2278-067X, Volume 1, Issue 11 (July 2012), PP.43-48 www.ijerd.com Performance Evaluation of Wired and Wireless Local Area Networks Prof.

### Protocol Stack: ISO OSI Model. Layer 2: Data Link Layer. Layer 1: Physical Layer. Layer 4: Transport Layer. Layer 3: Network Layer

Protocol Stack: ISO OSI Model CSCE 515: Computer Programming OSI Models & layer Wenyuan Xu Department of Computer Science and Engineering University of South Carolina Some slides are made by Dave Hollinger

### ESSENTIALS. Understanding Ethernet Switches and Routers. April 2011 VOLUME 3 ISSUE 1 A TECHNICAL SUPPLEMENT TO CONTROL NETWORK

VOLUME 3 ISSUE 1 A TECHNICAL SUPPLEMENT TO CONTROL NETWORK Contemporary Control Systems, Inc. Understanding Ethernet Switches and Routers This extended article was based on a two-part article that was

### Direct Link Networks. Introduction. Physical Properties. Lecture - Ethernet 1. Areas for Discussion. Ethernet (Section 2.6)

reas for Discussion Direct Link Networks Joseph Spring School of Computer Science Sc - Computer Network Protocols & rch s ased on Chapter 2, Peterson & Davie, Computer Networks: Systems pproach, 5 th Ed

### Slotted FAMA: a MAC protocol for underwater acoustic networks

Slotted FAMA: a MAC protocol for underwater acoustic networks Marçal Molins Sea Grant College Program Massachusetts Institute of Technology Email: marcalmolins@gmail.com Milica Stojanovic Sea Grant College

### Chapter 5: Data Link Layer

Chapter 5: ata Link Layer Abdullah Konak School of Information Sciences and Technology Penn State erks Learning Objectives Understand the functions of the data link layer. Understand the concept of the