Page 1. Reference:

Similar documents
LANs. Local Area Networks. via the Media Access Control (MAC) SubLayer. Networks: Local Area Networks

Ethernet. Ethernet Frame Structure. Ethernet Frame Structure (more) Ethernet: uses CSMA/CD

Higher Computing Networking 1

Local Area Networks transmission system private speedy and secure kilometres shared transmission medium hardware & software

Wireless LAN Concepts

Module 15: Network Structures

Controlled Random Access Methods

Operating System Concepts. Operating System 資 訊 工 程 學 系 袁 賢 銘 老 師

Introduction to Ethernet

Performance Evaluation of Wired and Wireless Local Area Networks

TCOM 370 NOTES LOCAL AREA NETWORKS AND THE ALOHA PROTOCOL

Chapter 14: Distributed Operating Systems

CSMA/CA. Information Networks p. 1

Chapter 16: Distributed Operating Systems

ECE 358: Computer Networks. Homework #3. Chapter 5 and 6 Review Questions 1

EPL 657 Wireless Networks

ECE 333: Introduction to Communication Networks Fall 2002

Real-Time (Paradigms) (51)

Ring Local Area Network. Ring LANs

LAN Performance Measurements Lab

Local Area Networks. Guest Instructor Elaine Wong. Elaine_06_I-1

Computer Networks. Definition of LAN. Connection of Network. Key Points of LAN. Lecture 06 Connecting Networks

Unit of Learning # 2 The Physical Layer. Sergio Guíñez Molinos sguinez@utalca.cl

How To Make A Multi-User Communication Efficient

Attenuation (amplitude of the wave loses strength thereby the signal power) Refraction Reflection Shadowing Scattering Diffraction

Token-ring local area network management

ESSENTIALS. Understanding Ethernet Switches and Routers. April 2011 VOLUME 3 ISSUE 1 A TECHNICAL SUPPLEMENT TO CONTROL NETWORK

LAN Switching Computer Networking. Switched Network Advantages. Hubs (more) Hubs. Bridges/Switches, , PPP. Interconnecting LANs


CS263: Wireless Communications and Sensor Networks

White Paper. Technical Capabilities of the DF1 Half-Duplex Protocol

EVALUATING INDUSTRIAL ETHERNET

Level 2 Routing: LAN Bridges and Switches

Chapter 4. Medium Access Control. IN2P3 Octobre 2002 Jean-Pierre Thomesse

Computer Network. Interconnected collection of autonomous computers that are able to exchange information

EXAMPLES AND PROBLEMS. Competence Based Education Internet Protocols

Ethernet, VLAN, Ethernet Carrier Grade

Selecting a Web Server Connection Rate Gilbert Held

Network Structure or Topology

Random Access Protocols

2. What is the maximum value of each octet in an IP address? A. 128 B. 255 C. 256 D. None of the above

Token Ring and. Fiber Distributed Data Interface (FDDI) Networks: Token Ring and FDDI 1

CSE331: Introduction to Networks and Security. Lecture 6 Fall 2006

CS6956: Wireless and Mobile Networks Lecture Notes: 2/11/2015. IEEE Wireless Local Area Networks (WLANs)

Wireless Personal Area Networks (WPANs)

Chapter 7 Low-Speed Wireless Local Area Networks

RTT 60.5 msec receiver window size: 32 KB

Adaptive DCF of MAC for VoIP services using IEEE networks

Wiereless LAN

Discussion Paper Category 6 vs Category 5e Cabling Systems and Implications for Voice over IP Networks

How To Communicate With A Token Ring Network (Dihon)

A Simulation Analysis of BACnet Local. Area Networks

Gigabit Ethernet. Abstract. 1. Introduction. 2. Benefits of Gigabit Ethernet

Computer Networks: LANs, WANs The Internet

A network is a group of devices (Nodes) connected by media links. A node can be a computer, printer or any other device capable of sending and

NZQA Expiring unit standard 6857 version 4 Page 1 of 5. Demonstrate an understanding of local and wide area computer networks

Mac Protocols for Wireless Sensor Networks

PERFORMANCE ANALYSIS OF LOW RATE WIRELESS TECHNOLOGIES FOR MEDICAL APPLICATIONS. N. Golmie, D. Cypher, O. Rebala

... neither PCF nor CA used in practice

EECS 122: Introduction to Computer Networks Multiaccess Protocols. ISO OSI Reference Model for Layers

AE64 TELECOMMUNICATION SWITCHING SYSTEMS

Collision of wireless signals. The MAC layer in wireless networks. Wireless MAC protocols classification. Evolutionary perspective of distributed MAC

2.0 System Description

Optimizing Enterprise Network Bandwidth For Security Applications. Improving Performance Using Antaira s Management Features

Network Topologies. Network Topologies

Remote I/O Network Determinism

What is it all about? Some simple solutions. Multiple Access. Contexts for the multiple access problem. Outline. Contexts

CCNA R&S: Introduction to Networks. Chapter 5: Ethernet

Algorithms for Interference Sensing in Optical CDMA Networks

Wireless LAN advantages. Wireless LAN. Wireless LAN disadvantages. Wireless LAN disadvantages WLAN:

Real-Time (Paradigms) (70)

RFC 2544 Testing of Ethernet Services in Telecom Networks

- Hubs vs. Switches vs. Routers -

Mathatma Gandhi University

Module 5. Broadcast Communication Networks. Version 2 CSE IIT, Kharagpur

1 Which network type is a specifically designed configuration of computers and other devices located within a confined area? A Peer-to-peer network

Final Exam. Route Computation: One reason why link state routing is preferable to distance vector style routing.

Protocolo IEEE Sergio Scaglia SASE Agosto 2012

OSI Reference Model: An Overview

What You Will Learn About. Computers Are Your Future. Chapter 8. Networks: Communicating and Sharing Resources. Network Fundamentals

Chapter 9A. Network Definition. The Uses of a Network. Network Basics

Based on Computer Networking, 4 th Edition by Kurose and Ross

Assessment of Traffic Prioritization in Switched Local Area Networks Carrying Multimedia Traffic

CSE 123A Computer Networks

VOICE OVER WI-FI CAPACITY PLANNING

Tutorial.

Overview of Network Hardware and Software. CS158a Chris Pollett Jan 29, 2007.

Cloud Infrastructure Planning. Chapter Six

19 Comparison of Ethernet Systems

New protocol concept for wireless MIDI connections via Bluetooth

MANAGEMENT INFORMATION SYSTEMS 8/E

standard. Acknowledgement: Slides borrowed from Richard Y. Yale

Linear Motion and Assembly Technologies Pneumatics Service. Industrial Ethernet: The key advantages of SERCOS III

Network Performance Evaluation. Throughput. Troy Bennett. Computer Science Department. School of Engineering. California Polytechnic State University

SFWR 4C03: Computer Networks & Computer Security Jan 3-7, Lecturer: Kartik Krishnan Lecture 1-3

R2. The word protocol is often used to describe diplomatic relations. How does Wikipedia describe diplomatic protocol?

Lecture 7 Multiple Access Protocols and Wireless

Overview of Routing between Virtual LANs

Wireless Links - Wireless communication relies on radio signals or infrared signals for transmitting data.

CHAPTER - 4 CHANNEL ALLOCATION BASED WIMAX TOPOLOGY

Transcription:

Page 1 Reference: http://www.delmar.edu/courses/itnw2313/access.htm 1

! " # " # Page 2 It is unproductive to have everyone in a meeting speak at once, so rules of order were defined long ago for managing meetings. Theoretically independent of the topologies. In reality, however, only a few combinations of physical and logical topologies work well together. Access methods use a certain amount of the channel's bandwidth for access control. The usable portion of the channel's bandwidth is limited by the access method being used. Each method has a different effect on network traffic. 2

# Page 3 Polling resembles a well-ordered meeting in which the chairman must recognize an attendee before that person is allowed to speak. The chairman's responsibility is to maintain order in the meeting and ensure that each person who wants to speak has an opportunity to do so. It s also called master-slave method The master device calls out the slave device s address, the slave responds 3

# %! && ' "! ( ( ) * + Page 4 Advantages of Polling: Many characteristics of polling can be determined centrally, including the polling order and node priorities. Polling ensures that channel access is predictable and fixed. Because the time delays between the primary and secondary devices can be calculated, this access method is called deterministic. Deterministic access methods are suitable for controlling some automated equipment because each piece of equipment is guaranteed access to the network at predetermined intervals. Polled channels cannot be over saturated with traffic. As demand increases, traffic increases up to a maximum level. The polling mechanism ensures that maximum traffic level cannot be exceeded. Nor can excess traffic reduce the performance of the network. Disadvantages of Polling : Some applications cannot function with the time delays required for polling other devices. The process of polling involves large numbers of messages that take up available band width. Traffic is required to poll each node, even nodes that are idle. Some polled networks use half-duplex transmission lines. This means that the primary and secondary devices must "turn around" the line, requiring some band width. Polling requires a sophisticated central control mechanism that requires extensive configuration. 4

* Page 5 5

+,' + ' " +,' &! +,' % * Page 6 CSMA/CD likes a dinner party in a dark room: Everyone around the table must listen for a period of quiet before speaking (Carrier Sense). Once a space occurs everyone has an equal chance to say something (Multiple Access). If two people start talking at the same instant they detect that fact, and quit speaking (Collision Detection). CSMA/CD is covered by IEEE 802.3 standard 6

+! Page 7 7

-!!!! Page 8 8

' +!.!!! // Page 9 Since signals take a finite time to travel from one end of an Ethernet system to the other, the first bits of a transmitted frame do not reach all parts of the network simultaneously. Therefore, it's possible for two interfaces to sense that the network is idle and to start transmitting their frames simultaneously. When this happens, the Ethernet system has a way to sense the "collision" of signals and to stop the transmission and resend the frames. 9

+ 0 ' '! 1 # Page 10 Advantages of Contention : Contention is a very simple access method that has low administrative overhead requirements. No network traffic is necessary to manage the access scheme. Actual user data throughput is rather high at low traffic levels in comparison to the total amount of utilized network band width. Disadvantages of Contention: At high traffic levels, data collisions and the resulting retransmission diminish performance dramatically. It is theoretically possible that collisions can be so frequent at higher traffic levels that no station has a clear chance to transmit. Channel access is probabilistic rather than deterministic. Because of retransmissions and the time it takes to sense collisions, automated equipment that cannot tolerate delays cannot use this type of access. Contention offers no means of establishing the frequency of a station's opportunities to transmit. 10

" # Token-ring Page 11 Token passing on different topology: token bus (IEEE802.3) and token ring (IEEE802.4) Only one device can talk at a time The device wait for a free token in order to use the communication channel to talk The token circulates among the devices until one of them wants to use the channel The device then grabs the token and uses the channel The sending device sets the token busy bit, adds an information field, adds the message it would like to send, and adds a trailer packet The header packet contains the address of the device for which the message was intended The entire message is then sent out on the communication channel Every device examines the header and checks the address to see if it is being talked to. If not, it ignores the message The intended device copies the message and sets bits in the trailer field to indicate that the message was received, then sends the message back out on the communication channel The original device receives the message back and checks that the message was received. It then frees the token and sends it out for other device to use 11

" # 2 ' # ' 2 %*! -! Page 12 Advantages of Token Passing: Token passing offers the highest data throughput possible under high traffic conditions. Only one transmission can occur at a time, and collisions cannot occur (non-contention). Therefore, token passing experiences less performance degradation at higher traffic levels than contention. Token passing is deterministic. Each station is guaranteed an opportunity to transmit each time the token travels around the ring. Some token passing systems enable you to set priorities for devices that need controlled access to the token. As the traffic increases, data throughput also increases to a certain level, and then stabilizes. Disadvantages of Token Passing: Token passing involves complicated protocols for managing the network and recovering from errors. The traffic associated with these protocols has higher band width overhead then is required for CSMA. All devices require complicated software that needs to be modified whenever a station is added or removed. Some systems require an additional central controller that adds to the overhead and reduces throughput. Cabling and network hardware can be more expensive for token passing networks than for CSMA networks. 12

# Page 13 Token passing and CSMA, the most common access methods used in networks, have different performance characteristics (see the graphs above). The Load x- axis represents the demand being placed on the network. The Throughput y-axis represents the data actually being transmitted. Notice that the throughput of a CSMA network rises smoothly with increased traffic levels up to a point. At that point, collisions begin to occur with greater frequency, resulting in a gradual reduction in network throughput. At some point, network throughput reaches unacceptably low levels. Token passing exhibits reduced performance at lower traffic levels than CSMA. This is a result of the many administrative mechanisms required for token access. Throughput rises smoothly until the network is fully utilized. At that point, throughput stabilizes. Throughput does not degrade because no collisions can occur. However, beyond the plateau, all workstations are sharing a strictly limited band width. Although total throughput remains stable, the bandwidth available to a given station diminishes as demand increases. 13