LANs. Local Area Networks. via the Media Access Control (MAC) SubLayer. Networks: Local Area Networks



Similar documents
TCOM 370 NOTES LOCAL AREA NETWORKS AND THE ALOHA PROTOCOL

ECE 333: Introduction to Communication Networks Fall 2002

Random Access Protocols

Local Area Networks transmission system private speedy and secure kilometres shared transmission medium hardware & software

Real-Time (Paradigms) (51)

CS263: Wireless Communications and Sensor Networks

EECS 122: Introduction to Computer Networks Multiaccess Protocols. ISO OSI Reference Model for Layers

CSE331: Introduction to Networks and Security. Lecture 6 Fall 2006

How To Make A Multi-User Communication Efficient

Ethernet. Ethernet Frame Structure. Ethernet Frame Structure (more) Ethernet: uses CSMA/CD

CS6956: Wireless and Mobile Networks Lecture Notes: 2/11/2015. IEEE Wireless Local Area Networks (WLANs)

CSMA/CA. Information Networks p. 1

Collision of wireless signals. The MAC layer in wireless networks. Wireless MAC protocols classification. Evolutionary perspective of distributed MAC

Chapter 4. Medium Access Control. IN2P3 Octobre 2002 Jean-Pierre Thomesse

RTT 60.5 msec receiver window size: 32 KB

ECE 358: Computer Networks. Homework #3. Chapter 5 and 6 Review Questions 1

a. CSMA/CD is a random-access protocol. b. Polling is a controlled-access protocol. c. TDMA is a channelization protocol.

Performance Evaluation of Wired and Wireless Local Area Networks

Introduction to Ethernet

Medium Access Control (MAC) Protocols for Ad hoc Wireless Networks - III

Based on Computer Networking, 4 th Edition by Kurose and Ross

LAN Switching Computer Networking. Switched Network Advantages. Hubs (more) Hubs. Bridges/Switches, , PPP. Interconnecting LANs

Data Link Layer. Page 1. Ethernet

Network Protocol Design and Evaluation

Ethernet, VLAN, Ethernet Carrier Grade

... neither PCF nor CA used in practice

Final Exam. Route Computation: One reason why link state routing is preferable to distance vector style routing.

CSE 123A Computer Networks

Lecture 7 Multiple Access Protocols and Wireless

Wireless LAN Protocol CS 571 Fall Kenneth L. Calvert All rights reserved

Overview of Network Hardware and Software. CS158a Chris Pollett Jan 29, 2007.

Lecture 17: Wireless Networking"

Controlled Random Access Methods

ECE 428 Computer Networks and Security

Algorithms for Interference Sensing in Optical CDMA Networks

MAC Algorithms in Wireless Networks

Random access protocols for channel access. Markov chains and their stability. Laurent Massoulié.

Wireless LAN Concepts

Module 15: Network Structures

Operating System Concepts. Operating System 資 訊 工 程 學 系 袁 賢 銘 老 師

Answer: that dprop equals dtrans. seconds. a) d prop. b) d trans

What is it all about? Some simple solutions. Multiple Access. Contexts for the multiple access problem. Outline. Contexts

Computer Network. Interconnected collection of autonomous computers that are able to exchange information

Local Area Networks. Guest Instructor Elaine Wong. Elaine_06_I-1

Chapter 14: Distributed Operating Systems

LLC: Frame Construction. Layer 2: Division into two Parts. Error-detecting and -correcting Codes. Error-correcting Codes

Attenuation (amplitude of the wave loses strength thereby the signal power) Refraction Reflection Shadowing Scattering Diffraction

EPL 657 Wireless Networks

2. What is the maximum value of each octet in an IP address? A. 128 B. 255 C. 256 D. None of the above

Tutorial.

Chapter 16: Distributed Operating Systems

standard. Acknowledgement: Slides borrowed from Richard Y. Yale

EXAMPLES AND PROBLEMS. Competence Based Education Internet Protocols

ISSN: ISO 9001:2008 Certified International Journal of Engineering Science and Innovative Technology (IJESIT) Volume 2, Issue 5, September

CS 5480/6480: Computer Networks Spring 2012 Homework 4 Solutions Due by 1:25 PM on April 11 th 2012

Chapter 7 Low-Speed Wireless Local Area Networks

ESSENTIALS. Understanding Ethernet Switches and Routers. April 2011 VOLUME 3 ISSUE 1 A TECHNICAL SUPPLEMENT TO CONTROL NETWORK

Level 2 Routing: LAN Bridges and Switches

Wiereless LAN

Ring Local Area Network. Ring LANs

Unit of Learning # 2 The Physical Layer. Sergio Guíñez Molinos sguinez@utalca.cl

Adaptive DCF of MAC for VoIP services using IEEE networks

Enhanced Power Saving for IEEE WLAN with Dynamic Slot Allocation

Agenda. Distributed System Structures. Why Distributed Systems? Motivation

COMPUTER NETWORKS SECOND EDITION. ANDREW S.fjANENBAUM. Vrije Universiteit Amsterdam, The Netherlands. Nachrichtentechnische Bib'iothek THD Inv.

Network Categories. Network Types for the Local Range. Ethernet

Improving Throughput Performance of the IEEE MAC Layer Using Congestion Control Methods

Stop And Wait. ACK received; transmit frame 2 CS 455 3

Performance Analysis of the IEEE Wireless LAN Standard 1

>>> SOLUTIONS <<< c) The OSI Reference Model has two additional layers. Where are these layers in the stack and what services do they provide?

COMMUNICATION NETWORKS WITH LAYERED ARCHITECTURES. Gene Robinson E.A.Robinsson Consulting

Token Ring and. Fiber Distributed Data Interface (FDDI) Networks: Token Ring and FDDI 1

28 Networks and Communication Protocols

Markku Renfors. Partly based on student presentation by: Lukasz Kondrad Tomasz Augustynowicz Jaroslaw Lacki Jakub Jakubiak

Wireless Personal Area Networks (WPANs)

Chapter 6: Medium Access Control Layer

Dynamic Source Routing in Ad Hoc Wireless Networks

Final for ECE374 05/06/13 Solution!!

PERFORMANCE ANALYSIS OF LOW RATE WIRELESS TECHNOLOGIES FOR MEDICAL APPLICATIONS. N. Golmie, D. Cypher, O. Rebala

1 Which network type is a specifically designed configuration of computers and other devices located within a confined area? A Peer-to-peer network

Real-Time (Paradigms) (70)

IEEE Wireless LAN Standard. Updated: 5/10/2011

Multiple Access Protocols

PEDAMACS: Power efficient and delay aware medium access protocol for sensor networks

10. Wireless Networks

ECE/CS 372 introduction to computer networks. Lecture 13

DATA COMMUNICATIONS AND NETWORKING. Solved Examples

TABLE OF CONTENTS. Dedication. Table of Contents. Preface. Overview of Wireless Networks. vii xvii

Networking Test 4 Study Guide

Synchronization in. Distributed Systems. Cooperation and Coordination in. Distributed Systems. Kinds of Synchronization.

A research perspective on the adaptive protocols' architectures and system infrastructures to support QoS in wireless communication systems

Selfish MAC Layer Misbehavior in Wireless Networks

Wireless Networks. Reading: Sec5on 2.8. COS 461: Computer Networks Spring Mike Freedman

The MAC layer in wireless networks

Ad hoc On Demand Distance Vector (AODV) Routing Protocol

Dynamic Load Balance Algorithm (DLBA) for IEEE Wireless LAN

Wide Area Networks. Learning Objectives. LAN and WAN. School of Business Eastern Illinois University. (Week 11, Thursday 3/22/2007)

Selecting a Web Server Connection Rate Gilbert Held

RESOURCE ALLOCATION FOR INTERACTIVE TRAFFIC CLASS OVER GPRS

Medium Access Control (MAC) and Wireless LANs

Transcription:

LANs Local Area Networks via the Media Access Control (MAC) SubLayer 1

Local Area Networks Aloha Slotted Aloha CSMA (non-persistent, 1-persistent, p-persistent) CSMA/CD Ethernet Token Ring 2

Network Layer Network Layer LLC 802.2 Logical Link Control Data Link Layer MAC 802.3 CSMA-CD 802.5 Token Ring 802.11 Wireless LAN Other LANs Physical Layer Various Physical Layers Physical Layer Copyright 2000 The McGraw Hill Companies IEEE 802 OSI Figure 6.11 3

Channel Access Abstraction 1 2 3 4 Shared Multiple Access Medium N 5 Copyright 2000 The McGraw Hill Companies Leon-Garcia & Widjaja: Communication Networks Figure 6.1 4

Static Channel Allocation Problem The history of broadcast networks includes satellite and packet radio networks. Let us view a satellite as a repeater amplifying and rebroadcasting everything that comes in. To generalize this problem, consider networks where every frame sent is automatically received by every site (node). 5

Satellite Channel = f in = f out Copyright 2000 The McGraw Hill Companies Leon-Garcia & Widjaja: Communication Networks Figure 6.3 6

Static Channel Allocation Problem We model this situation as n independent users (one per node), each wanting to communicate with another user and they have no other form of communication. The Channel Allocation Problem To manage a single broadcast channel which must be shared efficiently and fairly among n uncoordinated users. 7

Specific LAN Topologies Ring networks Multitapped Bus Networks Copyright 2000 The McGraw Hill Companies Leon-Garcia & Widjaja: Communication Networks Figure 6.5 8

Possible Model Assumptions for the Channel Allocation Problem 0. Listen property :: (applies to satellites) The sender is able to listen to sent frame one roundtrip after sending it. no need for explicit ACKs. 1. The model consists of n independent stations. 2. A single channel is available for communications. 9

Possible Model Assumptions for the Channel Allocation Problem 3. Collision Assumption :: If two frames are transmitted simultaneously, they overlap in time and the resulting signal is garbled. This event is a collision. 4a. Continuous Time Assumption :: frame transmissions can begin at any time instant. 4b. Slotted Time Assumption :: time is divided into discrete intervals (slots). Frame transmissions always begin at the start of a time slot. 10

Possible Model Assumptions for the Channel Allocation Problem 5a. Carrier Sense Assumption (CS) :: Stations can tell if the channel is busy (in use) before trying to use it. If the channel is busy, no station will attempt to use the channel until it is idle. 5b. No Carrier Sense Assumption :: Stations are unable to sense channel before attempting to send a frame. They just go ahead and transmit a frame. 11

a :: Relative Propagation Time length of the data path (in bits) a = -------------------------------------------------- length of a standard frame (in bits) -ORpropagation time ( in seconds) a = ------------------------------------------------ transmission time (in seconds) -ORbandwidth-delay product* a = ----------------------------------------- [ LG&W def p.346] average frame size * bandwidth-delay product :: the product of the capacity (bit rate) and the delay. 12

13

Relative Propagation Time R = capacity (data rate) d = maximum distance of communications path v = propagation velocity (Assume v = 2/3 speed of light 2 x 10 8 meters/second) L = frame length d / v Rd a = ------- = ------ L/R vl 14

Upper Bound on Utilization for Shared Media LAN Assume a perfect, efficient access that allows one transmission at a time where there are no collisions, no retransmissions, no delays between transmissions and no bits wasted on overhead. {These are best-case assumptions} Tput L Util = --------------- = ------------------------------------------------ Capacity propagation time + transmission time -------------------------------------------------------- R 15

Maximum Utilization for LANs L --------------- d L L 1 max. Util = ---- + ---- = --------------- = ------------ v R Rd a + 1 ------------------- ---- + L R v 1 max. Util = --------- 1 + a 16

A transmits at t = 0 A detects collision at t = 2 t prop A A A Distance d meters t prop = d / ν seconds B B B B transmits before t = t prop and detects collision shortly thereafter Copyright 2000 The McGraw Hill Companies Leon-Garcia & Widjaja: Communication Networks Figure 6.7 17

LAN Design Performance For broadcast LANs what are the factors under the designer s control that affect LAN performance? Capacity {function of media} Propagation delay {function of media, distance} Bits /frame (frame size) MAC protocol Offered load depends on how retransmissions are handled Number of stations Bit error rate 18

Typical frame delay versus Throughput performance E[T]/E[X] Transfer Delay 1 Copyright 2000 The McGraw Hill Companies Load Leon-Garcia & Widjaja: Communication Networks ρ max 1 ρ Figure 6.8 19

Delay-Throughput Performance E[T]/E[X] Dependence on a a > a a a Transfer Delay 1 Copyright 2000 The McGraw Hill Companies ρ max Load Leon-Garcia & Widjaja: Communication Networks ρ max 1 ρ Figure 6.9 20

Multiple Access Protocols 21

Historic LAN Performance Notation I :: input load - the total (normalized) rate of data generated by all n stations G :: offered load - the total (normalized) data rate presented to the network including retransmissions S :: LAN throughput - the total (normalized) data rate transferred between stations D :: average frame delay - the time from when a frame is ready for transmission until completion of a successful transmission. 22

Normalizing Throughput (S) [assuming one packet = one frame] Throughput (S) is normalized using packets/packet time where packet time :: the time to transmit a standard fixed-length packet i.e., packet length packet time = ----------------- bit rate NOTE: Since the channel capacity is one packet /packet time, S can be viewed as throughput as a fraction of capacity. Represented in LG&W by ρ in later graphs. 23

Historic LAN Performance Notation 1 retransmissions 2 I G S 3 X X X n D 24

ALOHA Abramson solved the channel allocation problem for ground radio at University of Hawaii in 1970 s. Aloha Transmission Strategy Stations transmit whenever they have data to send. Collisions will occur and colliding frames are destroyed. Aloha Retransmission Strategy Station waits a random amount of time before sending again. 25

ALOHA Figure 4-2. Vulnerable period for the shaded frame. 26

ALOHA First transmission Retransmission t 0 -X t 0 t 0 +X t 0 +X+2t prop t 0 +X+2t prop +Β t Vulnerable period Time-out Backoff period Retransmission if necessary random backoff period B Copyright 2000 The McGraw Hill Companies Leon-Garcia & Widjaja: Communication Networks Figure 6.16 27

ALOHA Vulnerable period :: t 0 X to t 0 + X two frame transmission times Assume: Poisson Arrivals with average number of arrivals of 2G arrivals/ 2 X S = G e-2 (1+a) G 28

Slotted ALOHA (Roberts 1972) uses discrete time intervals as slots (i.e., slot = one packet transmission time) and synchronize the send time (e.g., use pip from a satellite). Slotted Aloha Strategy Station transmits ONLY at the beginning of a time slot. Collisions will occur and colliding frames are destroyed. Slotted Aloha Retransmission Strategy Station waits a random amount of time before sending again. 29

Slotted ALOHA (k+1)x kx t 0 +X+2t prop +Β t 0 +X+2t prop t Vulnerable period Time-out Backoff period Retransmission if necessary random backoff period B slots Copyright 2000 The McGraw Hill Companies Leon-Garcia & Widjaja: Communication Networks Figure 6.18 30

Slotted ALOHA Vulnerable period :: t 0 X to t 0 one frame transmission time Assume: Poisson Arrivals with average number of arrivals of G arrivals/ X P 0 = P[k=0, t=1] = e G S = G P 0 S = G e G and an adjustment for a yields S = G e -(1+a) G 31

ALOHA and Slotted AlOHA Throughput versus Load 0.4 0.35 0.368 0.3 S 0.25 0.2 0.184 Ge -G Slotted Aloha 0.15 0.1 0.05 Ge -2G Aloha 0 0.01563 0.03125 0.0625 0.125 0.25 0.5 1 2 4 8 G Copyright 2000 The McGraw Hill Companies Leon-Garcia & Widjaja: Communication Networks Figure 6.17 32

Carrier Sense with Multiple Access (CSMA) 33

1-persistent CSMA Transmission Strategy the greedy algorithm 1. Sense the channel. 2. IF the channel is idle, THEN transmit. 3. IF the channel is busy, THEN continue to listen until channel is idle and transmit immediately. 34

nonpersistent CSMA Transmission Strategy the less-greedy algorithm Sense the channel. IF the channel is idle, THEN transmit. 1. IF the channel is busy, THEN wait a random amount of time and repeat the algorithm. 35

p - persistent CSMA Transmission Strategy a slotted approximation 1. Sense the channel. 2. IF the channel is idle, THEN with probability p transmit and with probability (1-p) delay one time slot and repeat the algorithm. 3. IF the channel is busy, THEN delay one time slot and repeat the algorithm. 36

P Persistent CSMA details the time slot is usually set to the maximum propagation delay. as p decreases, stations wait longer to transmit but the number of collisions decreases. Consideration for the choice of p : (n x p) must be < 1 for stability, where n is maximum number of stations, i.e., p < 1/n 37

CSMA Collisions In all three strategies a collision is possible. CSMA determines collisions by the lack of an ACK which results in a TIMEOUT. {This is extremely expensive with respect to performance.} If a collision occurs, THEN wait a random amount of time and retransmit. 38

CSMA/CD CSMA with Collision Detection If a collision is detected during transmission, THEN immediately cease transmitting the frame. The first station to detect a collision sends a jam signal to all stations to indicate that there has been a collision. After receiving a jam signal, a station that was attempting to transmit waits a random amount of time before attempting to retransmit. The maximum time needed to detect a collision is 2 x propagation delay. 39

CSMA vs CSMA/CD CSMA is essentially a historical technology until we include Wireless LANs. If propagation time is short compared to transmission time, station can be listening before sending with CSMA. Collision detection (CD) is accomplished by detecting voltage levels outside acceptable range. Thus attenuation limits distance without a repeater. If the collision time is short compared to packet time (i.e., small a), performance will increase due to CD. 40

Figure 6.23 frame contention frame Probability of 1 successful transmission: P s ucces s P success is maximized at p=1/n: max P success = np(1 p ) n 1 = n(1 1 n )n 1 1 e P max 0.6 0.5 0.4 0.3 0.2 0.1 0 2 4 6 8 10 12 14 16 n 41

Persistent and Non-persistent CSMA Figure 4-4.Comparison of the channel utilization versus load for various random access protocols. 42

Throughput versus Load with varying a 0.6 S 0.5 0.4 0.53 0.45 1-Persistent CSMA 0.3 0.2 0.1 0.16 a = 0.01 a = 0.1 0 0.02 0.03 0.06 0.13 0.25 0.5 1 2 4 8 16 a = 1 32 64 G Copyright 2000 The McGraw Hill Companies Leon-Garcia & Widjaja: Communication Networks Figure 6.21 - Part 2 43

Throughput versus Load with varying a S 0.9 0.8 0.81 0.7 Non-Persistent CSMA 0.6 0.5 0.4 0.3 0.2 0.14 0.51 a = 0.1 a = 0.01 0.1 0 0.02 0.03 0.06 0.13 0.25 0.5 1 2 4 8 16 32 64 G a = 1 Copyright 2000 The McGraw Hill Companies Leon-Garcia & Widjaja: Communication Networks Figure 6.21 - Part 1 44

Maximim Achievable Throughputs 1 0.8 CSMA/CD 1-P CSMA Non-P CSMA ρ max 0.6 0.4 0.2 Slotted Aloha Aloha 0 0.01 0.1 1 a Copyright 2000 The McGraw Hill Companies Leon-Garcia & Widjaja: Communication Networks Figure 6.24 45

Frame Delay with varying a Avg. Transfer Delay 30 25 20 15 10 5 0 CSMA-CD a = 0.2 a = 0.1 a = 0.01 0 0.06 0.12 0.18 0.24 0.3 0.36 0.42 0.48 0.54 0.6 0.66 0.72 0.78 0.84 0.9 0.96 Load Copyright 2000 The McGraw Hill Companies Leon-Garcia & Widjaja: Communication Networks Figure 6.51 46