# Random Access Protocols

Save this PDF as:

Size: px
Start display at page:

## Transcription

1 Lecture Today slotted vs unslotted ALOHA Carrier sensing multiple access Ethernet DataLink Layer 1 Random Access Protocols When node has packet to send transmit at full channel data rate R. no a priori coordination among nodes two or more transmitting nodes collision, random access MAC protocol specifies: how to detect collisions how to recover from collisions (e.g., via delayed retransmissions) Examples of random access MAC protocols: slotted ALOHA ALOHA CSMA, CSMA/CD, CSMA/CA DataLink Layer 2 1

2 Slotted ALOHA Assumptions all frames same size time is divided into equal size slots, time to transmit 1 frame nodes start to transmit frames only at beginning of slots nodes are synchronized if 2 or more nodes transmit in slot, all nodes detect collision Operation when node obtains fresh frame, it transmits in next slot no collision, node can send new frame in next slot if collision, node retransmits frame in each subsequent slot with prob. p until success DataLink Layer 3 Slotted ALOHA Pros single active node can continuously transmit at full rate of channel highly decentralized: only slots in nodes need to be in sync simple Cons collisions, wasting slots idle slots nodes may be able to detect collision in less than time to transmit packet DataLink Layer 4 2

3 Slotted Aloha efficiency Efficiency is the long-run fraction of successful slots when there are many nodes, each with many frames to send N nodes with many frames to send, each transmits in slot with probability q (new arrival or re-tx) prob that node 1 has success in a slot = q(1-q) N-1 Total expected utilization = Nq(1-q) N-1 For max efficiency with N nodes, find q* that maximizes Nq(1-q) N-1 For many nodes, take limit of Nq*(1-q*) N-1 as N goes to infinity, gives 1/e =.37 At best: channel used for useful transmissions 37% of time! DataLink Layer 5 Pure (unslotted) ALOHA unslotted Aloha: simpler, no synchronization when frame first arrives transmit immediately collision probability increases: frame sent at t 0 collides with other frames sent in [t 0-1,t 0 +1] DataLink Layer 6 3

4 Pure Aloha efficiency P(success by given node) = P(node transmits at to). P(no other node transmits in [t 0-1,t 0 ]). P(no other node transmits in [t 0,t 0 +1]) = q. (1-q) N-1. (1-q) N-1 = q. (1-q) 2(N-1) choosing optimum q and then letting N -> infty... Even worse! = 1/(2e) =.18 DataLink Layer 7 CSMA (Carrier Sense Multiple Access) CSMA: listen before transmit: If channel sensed idle: transmit entire frame If channel sensed busy, defer transmission Human analogy: don t interrupt others! Do we then get effective channel partitioning, with no collisions possible? DataLink Layer 8 4

5 CSMA collisions spatial layout of nodes collisions can still occur: propagation delay means two nodes may not hear each other s transmission collision: entire packet transmission time wasted note: role of propagation delay in determining collision probability DataLink Layer 9 CSMA Efficiency Key parameters: Propagation delay (in seconds): t prop packet transmission time t trans Efficiency depends only on t prop /t tran, and decreases with this parameter. DataLink Layer 10 5

6 CSMA Efficiency Decreases with t prop /t trans Decreases with increasing distance between nodes. t_{trans} = R/L, where R is the link speed in bits/s and L is the frame length in bits. So efficiency decreases with increasing link speed R. DataLink Layer 11 CSMA/CD (Collision Detection) CSMA/CD: carrier sensing, deferral as in CSMA collisions detected within short time colliding transmissions aborted, reducing channel wastage collision detection: easy in wired LANs: measure signal strengths, compare transmitted, received signals difficult in wireless LANs: receiver shut off while transmitting human analogy: the polite conversationalist DataLink Layer 12 6

7 CSMA/CD collision detection DataLink Layer 13 Ethernet dominant wired LAN technology: cheap \$20 for 100Mbs! first widely used LAN technology Simpler, cheaper than token LANs and ATM Kept up with speed race: 10 Mbps 10 Gbps Metcalfe s Ethernet sketch DataLink Layer 14 7

8 Star topology Bus topology popular through mid 90s Now star topology prevails hub DataLink Layer 15 Unreliable, connectionless service Connectionless: No handshaking between sending and receiving adapter. Unreliable: receiving adapter doesn t send acks or nacks to sending adapter stream of datagrams passed to network layer can have gaps gaps will be filled if app is using TCP otherwise, app will see the gaps DataLink Layer 16 8

### Based on Computer Networking, 4 th Edition by Kurose and Ross

Computer Networks Ethernet Hubs and Switches Based on Computer Networking, 4 th Edition by Kurose and Ross Ethernet dominant wired LAN technology: cheap \$20 for NIC first widely used LAN technology Simpler,

### EECS 122: Introduction to Computer Networks Multiaccess Protocols. ISO OSI Reference Model for Layers

EECS 122: Introduction to Computer Networks Multiaccess Protocols Computer Science Division Department of Electrical Engineering and Computer Sciences University of California, Berkeley Berkeley, CA 94720-1776

### Lecture 7 Multiple Access Protocols and Wireless

Lecture 7 Multiple Access Protocols and Wireless Networks and Security Jacob Aae Mikkelsen IMADA November 11, 2013 November 11, 2013 1 / 57 Lecture 6 Review What is the responsibility of the link layer?

### Star topology. Ethernet. Ethernet Frame Structure (more) Ethernet Frame Structure. Ethernet uses CSMA/CD. Unreliable, connectionless service

thernet dominant wired LN technology: cheap \$0 for 00Mbs! first widely used LN technology Simpler, cheaper than token LNs and TM Kept up with speed race: 0 Mbps 0 bps Star topology us topology popular

### Ethernet. Ethernet Frame Structure. Ethernet Frame Structure (more) Ethernet: uses CSMA/CD

Ethernet dominant LAN technology: cheap -- \$20 for 100Mbs! first widely used LAN technology Simpler, cheaper than token rings and ATM Kept up with speed race: 10, 100, 1000 Mbps Metcalfe s Etheret sketch

### Ethernet, VLAN, Ethernet Carrier Grade

Ethernet, VLAN, Ethernet Carrier Grade Dr. Rami Langar LIP6/PHARE UPMC - University of Paris 6 Rami.langar@lip6.fr www-phare.lip6.fr/~langar RTEL 1 Point-to-Point vs. Broadcast Media Point-to-point PPP

M ddresses and RP Mac ddressing, thernet, and Interconnections 32-bit IP address: network-layer address used to get datagram to destination IP subnet M (or LN or physical or thernet) address: used to get

### LANs. Local Area Networks. via the Media Access Control (MAC) SubLayer. Networks: Local Area Networks

LANs Local Area Networks via the Media Access Control (MAC) SubLayer 1 Local Area Networks Aloha Slotted Aloha CSMA (non-persistent, 1-persistent, p-persistent) CSMA/CD Ethernet Token Ring 2 Network Layer

### Local Area Networks transmission system private speedy and secure kilometres shared transmission medium hardware & software

Local Area What s a LAN? A transmission system, usually private owned, very speedy and secure, covering a geographical area in the range of kilometres, comprising a shared transmission medium and a set

### CSE331: Introduction to Networks and Security. Lecture 6 Fall 2006

CSE331: Introduction to Networks and Security Lecture 6 Fall 2006 Open Systems Interconnection (OSI) End Host Application Reference model not actual implementation. Transmits messages (e.g. FTP or HTTP)

### Local Area Networks (LANs)

Local Area Networks (LANs) Broadcast Networks Multiple Access Protocols Ethernet (IEEE 802.3) Token Ring (IEEE 802.5, FDDI) Introduction So far, we have dealt with switched communication networks. Recall

### Medium Access Control (MAC) protocol

Medium Access ontrol (MA) protocol omputers DNS Shared medium Point-to-Point. R R. WLAN AP R LAN. Shared medium AP DNS DNS: Domain Name System Figure 1: Different components of a network The Internet consists

### Local & Metropolitan Area Networks

Local & Metropolitan Area Networks CS455 Yonshik Choi, Ph.D. Department of Computer Science Illinois Institute of Technology Rice Campus Local Area Networks Characteristic Smaller geographical area a

### 06/02/ Local & Metropolitan Area Networks. Overview. Medium Access Sublayer (1) ACOE322

1 Local & Metropolitan Area Networks ACOE322 Lecture 2 Medium Access Control and Logical Link Control 1 Overview The architecture of a LAN is best described in terms of a layering of protocols that organize

### TCOM 370 NOTES 99-12 LOCAL AREA NETWORKS AND THE ALOHA PROTOCOL

1. Local Area Networks TCOM 370 NOTES 99-12 LOCAL AREA NETWORKS AND THE ALOHA PROTOCOL These are networks spanning relatively short distances (e.g. within one building) for local point-to-point and point-to-multipoint

### CS263: Wireless Communications and Sensor Networks

CS263: Wireless Communications and Sensor Networks Matt Welsh Lecture 4: Medium Access Control October 5, 2004 2004 Matt Welsh Harvard University 1 Today's Lecture Medium Access Control Schemes: FDMA TDMA

### CSE 123A Computer Networks

CSE 123A Computer Networks Winter 2005 Lecture 5: Data-Link II: Media Access Some portions courtesy Srini Seshan or David Wetherall Last Time Framing: How to translate a bitstream into separate packets

### 6.1. Why do LANs tend to use broadcast networks? Why not use networks consisting of multiplexers and switches?

TUTORIAL 2 (EKT 332) 6.1. Why do LANs tend to use broadcast networks? Why not use networks consisting of multiplexers and switches? Why broadcast network? -The computers in a LAN are separated by a short

Real-Time (Paradigms) (51) 5. Real-Time Communication Data flow (communication) in embedded systems : Sensor --> Controller Controller --> Actor Controller --> Display Controller Controller Major

### CS 5480/6480: Computer Networks Spring 2012 Homework 4 Solutions Due by 1:25 PM on April 11 th 2012

CS 5480/6480: Computer Networks Spring 2012 Homework 4 Solutions Due by 1:25 PM on April 11 th 2012 Important: The solutions to the homework problems from the course book have been provided by the authors.

### Performance Evaluation of Wired and Wireless Local Area Networks

International Journal of Engineering Research and Development ISSN: 2278-067X, Volume 1, Issue 11 (July 2012), PP.43-48 www.ijerd.com Performance Evaluation of Wired and Wireless Local Area Networks Prof.

### Lecture 17: 802.11 Wireless Networking"

Lecture 17: 802.11 Wireless Networking" CSE 222A: Computer Communication Networks Alex C. Snoeren Thanks: Lili Qiu, Nitin Vaidya Lecture 17 Overview" Project discussion Intro to 802.11 WiFi Jigsaw discussion

### CS6956: Wireless and Mobile Networks Lecture Notes: 2/11/2015. IEEE 802.11 Wireless Local Area Networks (WLANs)

CS6956: Wireless and Mobile Networks Lecture Notes: //05 IEEE 80. Wireless Local Area Networks (WLANs) CSMA/CD Carrier Sense Multi Access/Collision Detection detects collision and retransmits, no acknowledgement,

### ALOHA Class of Multiple Access Protocols

ALOHA Class of Multiple Access Protocols ALOHA, also called pure ALOHA: Whenever a user has a frame to send, it simply transmits the frame. If collision occurs, it waits for a random period of time and

### Operating System Concepts. Operating System 資 訊 工 程 學 系 袁 賢 銘 老 師

Lecture 7: Distributed Operating Systems A Distributed System 7.2 Resource sharing Motivation sharing and printing files at remote sites processing information in a distributed database using remote specialized

### Introduction to Local Area Networks

For Summer Training on Computer Networking visit Introduction to Local Area Networks Prepared by : Swapan Purkait Director Nettech Private Limited swapan@nettech.in + 91 93315 90003 Introduction A local

### CSMA/CA. Information Networks p. 1

Information Networks p. 1 CSMA/CA IEEE 802.11 standard for WLAN defines a distributed coordination function (DCF) for sharing access to the medium based on the CSMA/CA protocol Collision detection is not

### Collision of wireless signals. The MAC layer in wireless networks. Wireless MAC protocols classification. Evolutionary perspective of distributed MAC

The MAC layer in wireless networks The wireless MAC layer roles Access control to shared channel(s) Natural broadcast of wireless transmission Collision of signal: a /space problem Who transmits when?

### Unit of Learning # 2 The Physical Layer. Sergio Guíñez Molinos sguinez@utalca.cl 2-2009

Unit of Learning # 2 The Physical Layer Sergio Guíñez Molinos sguinez@utalca.cl 2-2009 Local Area Network (LAN) Redes de Computadores 2 Historic topologies more used in LAN Ethernet Logical Bus and Physical

### Wired Local Area Network (Ethernet)

Chapter 13 Wired Local Area Network (Ethernet) IEEE Standards In 1985, the Computer Society of the IEEE started a project, called Project 802, to set standards to enable intercommunication among equipment

### Multiple Access Techniques PROF. MICHAEL TSAI 2011/12/8

Multiple Access Techniques PROF. MICHAEL TSAI 2011/12/8 Multiple Access Scheme Allow many users to share simultaneously a finite amount of radio spectrum Need to be done without severe degradation of the

### EPL 657 Wireless Networks

EPL 657 Wireless Networks Some fundamentals: Multiplexing / Multiple Access / Duplex Infrastructure vs Infrastructureless Panayiotis Kolios Recall: The big picture... Modulations: some basics 2 Multiplexing

### Controlled Random Access Methods

Helsinki University of Technology S-72.333 Postgraduate Seminar on Radio Communications Controlled Random Access Methods Er Liu liuer@cc.hut.fi Communications Laboratory 09.03.2004 Content of Presentation

### 4. MAC protocols and LANs

4. MAC protocols and LANs 1 Outline MAC protocols and sublayers, LANs: Ethernet, Token ring and Token bus Logic Link Control (LLC) sublayer protocol Bridges: transparent (spanning tree), source routing

### IEEE 802 LANs. LAN: Local Area Network What is a local area network?

IEEE 802 LANs LAN: Local Area Network What is a local area network? A LAN is a network that resides in a geographically restricted area LANs usually span a building or a campus 1 Characteristics of LANs

### Review of Legacy LANs: IEEE 802.{2,3,5} MACs

Review of Legacy LANs: IEEE 802.{2,3,5} MACs 1 Medium Access Control Methods (MACs) Most LANs use shared transmission media. Hence need a mechanism to control access for one station at a time. Most common

### ECE 333: Introduction to Communication Networks Fall 2001

ECE 333: Introduction to Communication Networks Fall 2001 Lecture 17: Medium Access Control V Perfectly scheduled approaches Token ring networks 1 We have categorized channel allocation techniques as either

### Medium Access Control (MAC) Protocols for Ad hoc Wireless Networks - III

Medium Access Control (MAC) Protocols for Ad hoc Wireless Networks - III CS: 647 Advanced Topics in Wireless Networks Drs. Baruch Awerbuch & Amitabh Mishra Department of Computer Science Johns Hopkins

### Chapter 4. Medium Access Control. IN2P3 Octobre 2002 Jean-Pierre Thomesse

Chapter 4 Medium Access Control 1 Introduction Objectives To manage the access to the medium or channel To take into account the time constraints To schedule the traffics Different solutions History Different

### Lecture 6: Media Access Control. CSE 123: Computer Networks Stefan Savage

Lecture 6: Media Access Control CSE 123: Computer Networks Stefan Savage Today: Media access How to share a channel among different hosts? Channel partitioning FDMA (frequency division multiple access)

### How does IEEE fit into ISO OSI-7 layer model? Existing IEEE LAN standards. Access to physical medium. model?

Existing IEEE LAN standards slide 1 slide 2 How does IEEE fit into ISO OSI-7 layer model? the standards produced by IEEE in LANs have widely been adopted by industry the 802 committee have become internationally

### EEC-484/584 Computer Networks

EEC-484/584 Computer Networks Lecture 8 wenbing@ieee.org (Lecture nodes are based on materials supplied by Dr. Louise Moser at UCSB and Prentice-Hall) Outline 2 Homework #1 Review Protocol verification

### Medium Access Sublayer

Medium Access Sublayer Topology of the Network Bus, Ring, Tree Protocols IEEE 802.3 for bus topology IEEE 802.4 for token bus IEEE 802.5 for token ring FDDI for fibre ring IEEE 802.11 for wireless networks

### Overview of Network Hardware and Software. CS158a Chris Pollett Jan 29, 2007.

Overview of Network Hardware and Software CS158a Chris Pollett Jan 29, 2007. Outline Scales of Networks Protocol Hierarchies Scales of Networks Last day, we talked about broadcast versus point-to-point

### Attenuation (amplitude of the wave loses strength thereby the signal power) Refraction Reflection Shadowing Scattering Diffraction

Wireless Physical Layer Q1. Is it possible to transmit a digital signal, e.g., coded as square wave as used inside a computer, using radio transmission without any loss? Why? It is not possible to transmit

### Module 15: Network Structures

Module 15: Network Structures Background Topology Network Types Communication Communication Protocol Robustness Design Strategies 15.1 A Distributed System 15.2 Motivation Resource sharing sharing and

### RETI DI TELECOMUNICAZIONI

Accademia Navale Armi Navali LAUREA in INGEGNERIA DELLE TELECOMUNICAZIONI RETI DI TELECOMUNICAZIONI Stefano Giordano Lezione n.18n Ethernet Gruppo di Ricerca in Reti di Telecomunicazioni Dipartimento di

### Communication Networks. MAP-TELE 2011/12 José Ruela

Communication Networks MAP-TELE 2011/12 José Ruela Network basic mechanisms Multiple Access Multiple Access In early data communication systems, one solution to provide access of remote terminals to a

### EXAMPLES AND PROBLEMS. Competence Based Education Internet Protocols

EXAMPLES AND PROBLEMS Competence Based Education Internet Protocols Example 1 In following figure frames are generated at node A and sent to node C through node B. Determine the minimum transmission rate

### Chapter 2 Network Devices

Chapter 2 Network Devices Objectives Explain the uses, advantages, and disadvantages of repeaters, hubs, wireless access points, bridges, switches, and routers Define the standards associated with wireless

### ECE 428 Computer Networks and Security

ECE 428 Computer Networks and Security 1 Instructor: Sagar Naik About the Instructor Office: EIT 4174, ECE Dept. Other courses that I teach ECE 355: Software Engineering ECE 453/CS 447/ SE 465: Software

### TCP/IP Tutorial. Transmission Control Protocol Internet Protocol

TCP/IP Tutorial Transmission Control Protocol Internet Protocol 1 TCP/IP & OSI In OSI reference model terminology -the TCP/IP protocol suite covers the network and transport layers. TCP/IP can be used

### Computer Network. Interconnected collection of autonomous computers that are able to exchange information

Introduction Computer Network. Interconnected collection of autonomous computers that are able to exchange information No master/slave relationship between the computers in the network Data Communications.

### Data Link Layer. Page 1. Ethernet

Sicherungsebene Network Categories Local Area Networks (LAN): 10m - few km, simple connection structure Ethernet/Fast Ethernet/Gigabit Ethernet Token Bus, Token Ring LAN Wireless LAN (WLAN, up to a few

### Frame Burst Adjusting for Transmitting Video Conference in Gigabit Ethernet

Frame Burst Adjusting for Transmitting Video Conference in Gigabit Ethernet Han-Chieh Chao and Yao-Chung Chang Institute of Electrical Engineering National Dong Hwa University Hualien, Taiwan E-mail: hcc@cc.ndhu.edu.tw

### Second Midterm for ECE374 04/23/12 Solution!!

1 Second Midterm for ECE374 04/23/12 Solution!! Instructions: Put your name and student number on each sheet of paper! The exam is closed book. You have 90 minutes to complete the exam. Be a smart exam

### ECE 333: Introduction to Communication Networks Fall 2002

ECE 333: Introduction to Communication Networks Fall 2002 Lecture 14: Medium Access Control II Dynamic Channel Allocation Pure Aloha In the last lecture we began discussing medium access control protocols

### Chapter 14: Distributed Operating Systems

Chapter 14: Distributed Operating Systems Chapter 14: Distributed Operating Systems Motivation Types of Distributed Operating Systems Network Structure Network Topology Communication Structure Communication

### ECE 358: Computer Networks. Homework #3. Chapter 5 and 6 Review Questions 1

ECE 358: Computer Networks Homework #3 Chapter 5 and 6 Review Questions 1 Chapter 5: The Link Layer P26. Let's consider the operation of a learning switch in the context of a network in which 6 nodes labeled

### Protocol Stack: ISO OSI Model. Layer 2: Data Link Layer. Layer 1: Physical Layer. Layer 4: Transport Layer. Layer 3: Network Layer

Protocol Stack: ISO OSI Model CSCE 515: Computer Programming OSI Models & layer Wenyuan Xu Department of Computer Science and Engineering University of South Carolina Some slides are made by Dave Hollinger

### Inst: Chris Davison

ICS 153 Introduction to Computer Networks Inst: Chris Davison cbdaviso@uci.edu ICS 153 Introduction to Computer Networks MAC Sublayer Contents Fixed Assignment Protocols Demand Assignment Protocols Contention

### Wireless Networks. Reading: Sec5on 2.8. COS 461: Computer Networks Spring 2011. Mike Freedman

1 Wireless Networks Reading: Sec5on 2.8 COS 461: Computer Networks Spring 2011 Mike Freedman hep://www.cs.princeton.edu/courses/archive/spring11/cos461/ 2 Widespread Deployment Worldwide cellular subscribers

### a. CSMA/CD is a random-access protocol. b. Polling is a controlled-access protocol. c. TDMA is a channelization protocol.

CHAPTER 12 PRACTICE SET Questions Q12-1. The answer is CSM/CD. a. CSMA/CD is a random-access protocol. b. Polling is a controlled-access protocol. c. TDMA is a channelization protocol. Q12-3. The answer

### Agent and Object Technology Lab Dipartimento di Ingegneria dell Informazione Università degli Studi di Parma. Computer Network. Local Area Network

Agent and Object Technology Lab Dipartimento di Ingegneria dell Informazione Università degli Studi di Parma Computer Network Local Area Network Prof. Agostino Poggi LAN Properties Properties characterizing

### Local Area Networks (LAN)

Lecture 4 Local Area Networks (LAN) - Sharing Transmission Media by Computers - Classifications of Computer Networks: LAN, MAN, WAN Point-To-Point Connection and Shared Medium LAN Topology: Star, Ring,

### Chapter 16: Distributed Operating Systems

Module 16: Distributed ib System Structure, Silberschatz, Galvin and Gagne 2009 Chapter 16: Distributed Operating Systems Motivation Types of Network-Based Operating Systems Network Structure Network Topology

### Local and Metropolitan Area Networks

Local and Metropolitan Area Networks Local Area Networks (LAN)- Networks that optimized for a moderate-size geographic area, such as a single office building, a warehouse, or a campus. - low bit error

### Local Area Networks. Guest Instructor Elaine Wong. Elaine_06_I-1

Local Area Networks Guest Instructor Elaine Wong Elaine_06_I-1 Outline Introduction to Local Area Networks (LANs) Network architecture Geographical area LAN applications LAN Technologies Ethernet Fiber

### Local Area Networks. Ethernet 802.3 LAN - 7-1.

Local Area Networks Ethernet 802.3 LAN - 7-1 Local Area Networks (Lokale Netze) Wide Area Network LAN - 7-2 Local Area Networks What is a LAN? Multiple systems attached to an often shared medium high total

### Adaptive DCF of MAC for VoIP services using IEEE 802.11 networks

Adaptive DCF of MAC for VoIP services using IEEE 802.11 networks 1 Mr. Praveen S Patil, 2 Mr. Rabinarayan Panda, 3 Mr. Sunil Kumar R D 1,2,3 Asst. Professor, Department of MCA, The Oxford College of Engineering,

### The Internet. The Internet. The Internet. What is the internet, and how does it work?

ECS 15; Lectures 17 and 18 Final paper: The Abstract 1-2 sentences defining the research problem. What is the internet, and how does it work? 1-2 sentences explaining your approach. 1-2 sentences describing

### LAN Switching. 15-441 Computer Networking. Switched Network Advantages. Hubs (more) Hubs. Bridges/Switches, 802.11, PPP. Interconnecting LANs

LAN Switching 15-441 Computer Networking Bridges/Switches, 802.11, PPP Extend reach of a single shared medium Connect two or more segments by copying data frames between them Switches only copy data when

### Slotted FAMA: a MAC protocol for underwater acoustic networks

Slotted FAMA: a MAC protocol for underwater acoustic networks Marçal Molins Sea Grant College Program Massachusetts Institute of Technology Email: marcalmolins@gmail.com Milica Stojanovic Sea Grant College

### DATA COMMUNICATION AND NETWORKS

DATA COMMUNICATION AND NETWORKS 1. Define the term Computer Networks. A Computer network is a number if computers interconnected by one or more transmission paths. The transmission path often is the telephone

### 51-30-21 Selecting a Web Server Connection Rate Gilbert Held

51-30-21 Selecting a Web Server Connection Rate Gilbert Held Payoff Determining the best operating rate for a WAN connection to the Internet is a common problem for organizations wishing to obtain a presence

### Overview. Next Lecture. Last Lecture. This Lecture. Flow control and error control. Local area networking 1 Source: Sections 13

Overview Last Lecture Flow control and error control This Lecture Local area networking 1 Source: Sections 13 Next Lecture Local area networking 2 Source: Sections 17.1-17.2 1 Data Link Layer Standards

### 1. The subnet must prevent additional packets from entering the congested region until those already present can be processed.

Congestion Control When one part of the subnet (e.g. one or more routers in an area) becomes overloaded, congestion results. Because routers are receiving packets faster than they can forward them, one

### Express Forwarding : A Distributed QoS MAC Protocol for Wireless Mesh

Express Forwarding : A Distributed QoS MAC Protocol for Wireless Mesh, Ph.D. benveniste@ieee.org Mesh 2008, Cap Esterel, France 1 Abstract Abundant hidden node collisions and correlated channel access

### MAC Algorithms in Wireless Networks

Department of Computing Science Master Thesis MAC Algorithms in Wireless Networks Applications, Issues and Comparisons Shoaib Tariq Supervisor: Dr. Jerry Eriksson Examiner: Dr. Per Lindström Dedicated

### UNIT I Introduction to Computer Networks & Reference model - I

SIDDHARTH GROUP OF INSTITUTIONS :: PUTTUR Siddharth Nagar, Narayanavanam Road 517583 QUESTION BANK (DESCRIPTIVE) Subject with Code : Computer Networks(9F00302) Year & Sem: II-MCA & I-Sem Course : MCA Regulation:

### Wiereless LAN 802.11

Tomasz Kurzawa Wiereless LAN 802.11 Introduction The 802.11 Architecture Channels and Associations The 802.11 MAC Protocol The 802.11 Frame Introduction Wireless LANs are most important access networks

### IT4405 Computer Networks (Compulsory)

IT4405 Computer Networks (Compulsory) INTRODUCTION This course provides a comprehensive insight into the fundamental concepts in data communications, computer network systems and protocols both fixed and

### Token Passing: IEEE802.5 standard. IEEE802.5 standard

Token Passing: IEEE802.5 standard. 4 Mbps. maximum token holding time: 10 ms, limiting packet length. packet (token, data) format:. SD, ED mark start, end of packet 1 IEEE802.5 standard. AC access control

### J.GODWIN PONSAM & S.CHRISTOBEL DIANA ASST.PROFESSOR SRM University, Kattankulathur

8/22/2011 School of Computing, Department of IT IT 0305 COMPUTER NETWORKS FIFTH SEMESTER UNIT III J.GODWIN PONSAM & S.CHRISTOBEL DIANA ASST.PROFESSOR SRM University, Kattankulathur 1 Unit iii School of

### Point-to-Point Vs. Shared Channel Communication In LANs Point-to-point:

Point-to-Point Vs. Shared Channel Communication In LANs Point-to-point: Computers connected by communication channels that each connect exactly two computers with access to full channel bandwidth. Forms

### 1 Which network type is a specifically designed configuration of computers and other devices located within a confined area? A Peer-to-peer network

Review questions 1 Which network type is a specifically designed configuration of computers and other devices located within a confined area? A Peer-to-peer network B Local area network C Client/server

### Architecture and Performance of the Internet

SC250 Computer Networking I Architecture and Performance of the Internet Prof. Matthias Grossglauser School of Computer and Communication Sciences EPFL http://lcawww.epfl.ch 1 Today's Objectives Understanding

### Answer: that dprop equals dtrans. seconds. a) d prop. b) d trans

Chapter 1 1) p. 98: P-6 This elementary problem begins to explore propagation delay and transmission delay, two central concepts in data networking. Consider two hosts, A and B, connected by single link

### Agenda. Distributed System Structures. Why Distributed Systems? Motivation

Agenda Distributed System Structures CSCI 444/544 Operating Systems Fall 2008 Motivation Network structure Fundamental network services Sockets and ports Client/server model Remote Procedure Call (RPC)

### Data Link Protocols. TCP/IP Suite and OSI Reference Model

Data Link Protocols Relates to Lab. This module covers data link layer issues, such as local area networks (LANs) and point-to-point links, Ethernet, and the Point-to-Point Protocol (PPP). 1 TCP/IP Suite

### What is it all about? Some simple solutions. Multiple Access. Contexts for the multiple access problem. Outline. Contexts

Multiple Access An Engineering Approach to Computer Networking What is it all about? ider an audioconference where if one person speaks, all can hear if more than one person speaks at the same time, both

### Gigabit Ethernet: Architectural Design and Issues

Gigabit Ethernet: Architectural Design and Issues Professor of Computer and Information Sciences Columbus, OH 43210 http://www.cis.ohio-state.edu/~jain/ 9-1 Overview Distance-Bandwidth Principle 10 Mbps

### Wired LANs: Ethernet

Chapter 13 Wired LANs: Ethernet Behrouz A. Forouzan Data communication and Networking 1 13-1 IEEE STANDARDS In 1985, the Computer Society of the IEEE started a project, called Project 802, to set standards

### Second Midterm for ECE374 04/16/12 Solution!!

ECE374: Second Midterm 1 Second Midterm for ECE374 04/16/12 Solution!! Instructions: Put your name and student number on each sheet of paper! The exam is closed book. You have 90 minutes to complete the

### CS/ECE 438: Communication Networks for Computers Spring 2014 Midterm Study Guide

CS/ECE 438: Communication Networks for Computers Spring 2014 Midterm Study Guide 1. Channel Rates and Shared Media You are entrusted with the design of a network to interconnect a set of geographically

### 802.11. Markku Renfors. Partly based on student presentation by: Lukasz Kondrad Tomasz Augustynowicz Jaroslaw Lacki Jakub Jakubiak

802.11 Markku Renfors Partly based on student presentation by: Lukasz Kondrad Tomasz Augustynowicz Jaroslaw Lacki Jakub Jakubiak Contents 802.11 Overview & Architecture 802.11 MAC 802.11 Overview and Architecture

### Chapter 5: Data Link Layer

Chapter 5: Data Link Layer Silvia Giordano ICA, EPFL 5: DataLink Layer 5-1 The data-link layer is responsible for transferring a datagram across an individual link. A link is the communication channels

### Computer Networks. Unit 5: Local Area Networks. LANs basics The IEEE 802 standard Ethernet MAC protocols Internetworking: repeaters and bridges

Computer Networks Unit 5: Local Area Networks LANs basics The IEEE 802 standard Ethernet MAC protocols Internetworking: repeaters and bridges unit 5 1 Introduction A local area network is a communication

### Network Protocol Design and Evaluation

Network Protocol Design and Evaluation 08 - Analytical Evaluation Stefan Rührup Summer 2009 Overview In the last chapter: Simulation In this part: Analytical Evaluation: case studies 2 Analytical Evaluation

### Protocolo IEEE 802.15.4. Sergio Scaglia SASE 2012 - Agosto 2012

Protocolo IEEE 802.15.4 SASE 2012 - Agosto 2012 IEEE 802.15.4 standard Agenda Physical Layer for Wireless Overview MAC Layer for Wireless - Overview IEEE 802.15.4 Protocol Overview Hardware implementation