MEDIA ACCESS CONTROL

Similar documents
CSE331: Introduction to Networks and Security. Lecture 6 Fall 2006

LANs. Local Area Networks. via the Media Access Control (MAC) SubLayer. Networks: Local Area Networks

CS263: Wireless Communications and Sensor Networks

RTT 60.5 msec receiver window size: 32 KB

EECS 122: Introduction to Computer Networks Multiaccess Protocols. ISO OSI Reference Model for Layers

EPL 657 Wireless Networks

Ethernet. Ethernet Frame Structure. Ethernet Frame Structure (more) Ethernet: uses CSMA/CD

Lecture 7 Multiple Access Protocols and Wireless

How To Make A Multi-User Communication Efficient

TCOM 370 NOTES LOCAL AREA NETWORKS AND THE ALOHA PROTOCOL

Local Area Networks transmission system private speedy and secure kilometres shared transmission medium hardware & software

Collision of wireless signals. The MAC layer in wireless networks. Wireless MAC protocols classification. Evolutionary perspective of distributed MAC

Random Access Protocols

Medium Access Control (MAC) Protocols for Ad hoc Wireless Networks - III

ECE 358: Computer Networks. Homework #3. Chapter 5 and 6 Review Questions 1

CSMA/CA. Information Networks p. 1

CSE 123A Computer Networks

ECE/CS 372 introduction to computer networks. Lecture 13

Final Exam. Route Computation: One reason why link state routing is preferable to distance vector style routing.

Attenuation (amplitude of the wave loses strength thereby the signal power) Refraction Reflection Shadowing Scattering Diffraction

... neither PCF nor CA used in practice

LAN Switching Computer Networking. Switched Network Advantages. Hubs (more) Hubs. Bridges/Switches, , PPP. Interconnecting LANs

a. CSMA/CD is a random-access protocol. b. Polling is a controlled-access protocol. c. TDMA is a channelization protocol.

standard. Acknowledgement: Slides borrowed from Richard Y. Yale

CS6956: Wireless and Mobile Networks Lecture Notes: 2/11/2015. IEEE Wireless Local Area Networks (WLANs)

10. Wireless Networks

Lecture 17: Wireless Networking"

Ethernet, VLAN, Ethernet Carrier Grade

Wireless LAN Concepts

Chapter 4. Medium Access Control. IN2P3 Octobre 2002 Jean-Pierre Thomesse

Introduction to Ethernet

Wiereless LAN

Real-Time (Paradigms) (51)

Based on Computer Networking, 4 th Edition by Kurose and Ross

Computer Network. Interconnected collection of autonomous computers that are able to exchange information

Wireless Networks. Reading: Sec5on 2.8. COS 461: Computer Networks Spring Mike Freedman

In this Lecture" Access method CDMA" Mobile and Sensor Systems Lecture 2: Mobile Medium Access Control Layer and Telecommunications

Overview of Network Hardware and Software. CS158a Chris Pollett Jan 29, 2007.

Wireless LAN Protocol CS 571 Fall Kenneth L. Calvert All rights reserved

Objectives. Lecture 4. How do computers communicate? How do computers communicate? Local asynchronous communication. How do computers communicate?

What is it all about? Some simple solutions. Multiple Access. Contexts for the multiple access problem. Outline. Contexts

EECC694 - Shaaban. Transmission Channel

ESSENTIALS. Understanding Ethernet Switches and Routers. April 2011 VOLUME 3 ISSUE 1 A TECHNICAL SUPPLEMENT TO CONTROL NETWORK

EXAMPLES AND PROBLEMS. Competence Based Education Internet Protocols

Data Link Layer. Page 1. Ethernet

MAC Algorithms in Wireless Networks

ECE 333: Introduction to Communication Networks Fall 2002

Data Center Networks, Link Layer Wireless (802.11)

COMP 3331/9331: Computer Networks and Applications

Unit of Learning # 2 The Physical Layer. Sergio Guíñez Molinos sguinez@utalca.cl

CHAPTER 8 MULTIPLEXING

Local Area Networks. Guest Instructor Elaine Wong. Elaine_06_I-1

2. What is the maximum value of each octet in an IP address? A. 128 B. 255 C. 256 D. None of the above

Chapter 6 Wireless and Mobile Networks

Wireless Personal Area Networks (WPANs)

Controlled Random Access Methods

Adaptive DCF of MAC for VoIP services using IEEE networks

RESOURCE ALLOCATION FOR INTERACTIVE TRAFFIC CLASS OVER GPRS

Direct Link Networks. Introduction. Physical Properties. Lecture - Ethernet 1. Areas for Discussion. Ethernet (Section 2.6)

WIRELESS ETHERNET (IEEE )

Module 5. Broadcast Communication Networks. Version 2 CSE IIT, Kharagpur

Figure 1: cellular system architecture

Administrivia. CSMA/CA: Recap. Mobility Management. Mobility Management. Channel Partitioning, Random Access and Scheduling

Performance Evaluation of Wired and Wireless Local Area Networks

Express Forwarding : A Distributed QoS MAC Protocol for Wireless Mesh

CS 5480/6480: Computer Networks Spring 2012 Homework 4 Solutions Due by 1:25 PM on April 11 th 2012

Data Link Protocols. Link Layer Services. Framing, Addressing, link access: Error Detection:

ECE 428 Computer Networks and Security

The MAC layer in wireless networks

IEEE Technical Tutorial. Introduction. IEEE Architecture

Note! The problem set consists of two parts: Part I: The problem specifications pages Part II: The answer pages

Mobile Communications Exercise: Satellite Systems and Wireless LANs. Georg von Zengen, IBR, TU Braunschweig,

Ring Local Area Network. Ring LANs

frequency experienced by mobile is not f but distorted version of f: call it f

Improving Throughput Performance of the IEEE MAC Layer Using Congestion Control Methods

GSM Channels. Physical & Logical Channels. Traffic and Control Mutltiframing. Frame Structure

Chapter 6: Medium Access Control Layer

A research perspective on the adaptive protocols' architectures and system infrastructures to support QoS in wireless communication systems

ISSN: ISO 9001:2008 Certified International Journal of Engineering Science and Innovative Technology (IJESIT) Volume 2, Issue 5, September

Markku Renfors. Partly based on student presentation by: Lukasz Kondrad Tomasz Augustynowicz Jaroslaw Lacki Jakub Jakubiak

Networks. Master of Science (Computer Science and Engineering), December 2004, 45 pp.,

1 Which network type is a specifically designed configuration of computers and other devices located within a confined area? A Peer-to-peer network

OSI Reference Model: An Overview

Introduction to Optical Networks

TCP in Wireless Networks

Module 15: Network Structures

communication over wireless link handling mobile user who changes point of attachment to network

How To Configure the WLAN with QoS

High-Level Data Link Control

Operating System Concepts. Operating System 資 訊 工 程 學 系 袁 賢 銘 老 師

Video Transmission over Wireless LAN. Hang Liu

CS Cellular and Mobile Network Security: GSM - In Detail

Network Categories. Network Types for the Local Range. Ethernet. Carrier Sense Multiple Access

A Short Look on Power Saving Mechanisms in the Wireless LAN Standard Draft IEEE

GSM and Similar Architectures Lesson 07 GSM Radio Interface, Data bursts and Interleaving

PERFORMANCE OF VOIP SERVICES ON A DOCSIS NETWORK TARGETED BY A DENIAL OF SERVICE ATTACK

Performance Evaluation Of Multiband CSMA/CA With RTS/CTS For M2M Communication With Finite Retransmission Strategy

Medium Access Control (MAC) and Wireless LANs

Computer Networks. Wireless and Mobile Networks. László Böszörményi Computer Networks Mobile - 1

CHAPTER 1 1 INTRODUCTION

Transcription:

MEDIA ACCESS CONTROL Random Access & Token Rings 18 The Data Link Layer Simplest way to create a network of nodes Ø Connect the nodes directly with a physical medium Point-to-point links: Ø Choice of Media Ø Encoding Ø Framing Ø Error detection Ø Error recovery Shared Media: Ø Media access control (a) Point- to- point Link (b) Shared Media 19 Copyright by Jasleen Kaur 1

Shared Access Networks One way of scaling up point-to-point links: Ø Connect multiple hosts to the same link Media access control protocols: Ø Arbitrate access if multiple hosts wish to transmit at the same time Protocol objectives (for a shared channel of capacity R): Ø Efficiency: When only one node has data to send, it gets throughput of R Ø Fairness: When M nodes want to send, each gets throughput of R/M Ø Support for low-latency applications Ø Decentralized protocol (no single point of failure) Ø Simple and inexpensive to implement 20 Types of Media Access Protocols Channel Partitioning protocols Ø e.g.: TDM, FDM, CDMA Random access protocols Ø e.g.: Ethernet, 802.11 Taking turns protocols Ø e.g.: Token ring 21 Copyright by Jasleen Kaur 2

Channel Partitioning Protocols Channel is statically partitioned among nodes Ø Transmission divided into slots Ø Slots allocated to nodes Frequency division multiplexing (FDM) Time division multiplexing (TDM) FDM Transmission Frequency Time 4 KHz Call 1 Call 2 Call 3 Call 4 Call data Link capacity Slots are idle if not used by owning node Ø No sharing of slots! Ø Fair and decentralized, but not efficient TDM 1 2 3 4 1 2 3 4 1 2 3 4 Slot Frame frames/sec X bits/slot = TDM per- node transmission rate 22 Examples of Types of Partitioning Partitioning frequency: Ø Different radio stations use different frequency bands Partitioning space: Ø FM channels in different cities use same frequency band Ø Sectors in cell networks Partitioning time: Ø Used by DECT (cordless phones) Partitioning frequency and time: Ø Used by GSM cellular systems Code division multiple access: Ø Used by CDMA cellular systems 23 Copyright by Jasleen Kaur 3

Random Access Protocols No fixed pre-determined schedule of transmission Ø Transmit, if data available Ø Detect if collision occurs Typically, CSMA/CD Ø Carrier Sense (CS): listen before transmitting Ø Collision Detection (CD): listen while transmitting and stop on detecting collision Ø Multiple Access (MA): Multiple nodes plugged into common medium ( bus ) Example protocols: Ø Slotted Aloha Ø Ethernet (multiple-access bus version) Ø 802.11 (wireless) 24 Ethernet: Shared Bus Media Access If line is idle Ø Send immediately (efficiency) Ø Upper bound message size: 1500 B (latency) If line is busy Ø Wait until idle and transmit immediately (efficiency) Ø Is this really efficient when multiple nodes waiting? Aloha: wait until idle and transmit with probability p How to guarantee that collision is detected (before frame is completely transmitted)? Ø Impose max propagation delay (51.2 µs), minimum frame size (64 B) Ø If collision, then what? A A A B B B 25 Copyright by Jasleen Kaur 4

Ethernet: If Collision, Then What? Exponential back-off Ø 1 st collision: randomly transmit after: 0 or 51.2 µs Ø 2 nd collision: randomly transmit after: 0, 51.5, 102.4, 153.6 µs Ø n th collision: transmit after k * 51.2 µs, for randomly selected k = 0,, 2 n 1 n capped at 10 Ø Give up after 16 tries How does randomization help here? Why increase back-off range with time? What fairness properties can you expect? What is the efficiency of this protocol? 26 Token Ring: Media Access Protocol Structure: Ø Set of nodes connected in a ring structure Data always flows in one direction Ø Each node receives frames and forwards it Destination saves a copy as frame passes by Basic Idea for Media Access: Ø A special token frame denotes right to transmit Node that currently holds the token can transmit Ø When a nodes with data to transmit sees a token, it forwards data instead of token When data frame reaches back to sender, it removes it and reinserts token 27 Copyright by Jasleen Kaur 5

Token Ring: Properties Basic Idea: Ø A special token frame denotes right to transmit Node that currently holds the token can transmit Ø When a nodes with data to transmit sees a token, it forwards data instead of token When data frame reaches back to sender, it removes it and reinserts token How to guarantee fairness? How to improve efficiency? How to guarantee low latency? How to provide failure resistance? 28 Token Ring: Failure Recovery On time expiry, a node that doesn t see token Ø Transmits a claim token with a token-holding-time bid Ø When others receive claim frame Replace with a lower bid (if needed) and forward Ø If your claim frame makes it back to you, Your bid was lowest (and everyone has agreed to it by now) Create and insert new token 29 Copyright by Jasleen Kaur 6

Challenges in a Wireless Setting Basic framework for Media Access: Ø Carrier-sense: like Ethernet, listen to medium & wait if busy Ø Collision avoidance: unlike Ethernet, no collision detection Complication with collision detection: Ø Expensive Ø Hidden node problem Both A and C transmit, unaware of collision Complication with carrier-sense: Ø Exposed node problem If B is transmitting to A, C will refrain from transmitting to D Even though it can! A B C D 30 802.11 Media Access Protocol: MACAW MACAW Protocol: Ø Multiple Access With Collision Avoidance for Wireless LANs Ø Basic philosophy: don t do collision detection, but collision avoidance Sender, receiver exchange control frames before a data frame Ø Sender sends RTS (Request to Send), with length of data frame Ø Receiver replies CTS (Clear to Send), with echo of frame length Ø If sender gets CTS frame, it sends data frame If not, does exponential back-off before trying again Ø Receiver sends ACK after receiving data frame What should other nodes do? Ø If they see a CTS frame? Ø If they see RTS, but not CTS? A B C D Properties: Fairness? Efficiency? Latency? Ø Zig-zag decoding: using collisions 31 Copyright by Jasleen Kaur 7

Media Access Control: Summary Protocol objectives (for a shared channel of capacity R): Ø Efficiency: when only one node has data to send, it gets throughput of R Ø Fairness: when M nodes want to send, each gets throughput of R/M Ø Support for low latency applications Ø Decentralized protocol (no single point of failure) Ø Simple and inexpensive to implement Ideas used: Ø Virtualization: helps guarantee fairness Partitioning (TDM/FDM), round-robin access opportunity (Token Ring) Ø Ø Ø Fine-grained multiplexing: helps achieve low latency Fixed slot size (TDM/FDM), Limited frame size (Ethernet, 802.11, Token Ring) Randomization: helps achieve fairness in many cases Exponential back-off on collision (Ethernet, 802.11) Signaling: helps achieve efficiency in mul6- node se9ngs Channel-grabbing protocol (MACAW) 32 Copyright by Jasleen Kaur 8