Random Access Protocols



Similar documents
Based on Computer Networking, 4 th Edition by Kurose and Ross

EECS 122: Introduction to Computer Networks Multiaccess Protocols. ISO OSI Reference Model for Layers

Lecture 7 Multiple Access Protocols and Wireless

Ethernet. Ethernet Frame Structure. Ethernet Frame Structure (more) Ethernet: uses CSMA/CD

Ethernet, VLAN, Ethernet Carrier Grade

LANs. Local Area Networks. via the Media Access Control (MAC) SubLayer. Networks: Local Area Networks

Local Area Networks transmission system private speedy and secure kilometres shared transmission medium hardware & software

CSE331: Introduction to Networks and Security. Lecture 6 Fall 2006

TCOM 370 NOTES LOCAL AREA NETWORKS AND THE ALOHA PROTOCOL

CSE 123A Computer Networks

CS263: Wireless Communications and Sensor Networks

Real-Time (Paradigms) (51)

CS 5480/6480: Computer Networks Spring 2012 Homework 4 Solutions Due by 1:25 PM on April 11 th 2012

Performance Evaluation of Wired and Wireless Local Area Networks

CS6956: Wireless and Mobile Networks Lecture Notes: 2/11/2015. IEEE Wireless Local Area Networks (WLANs)

Lecture 17: Wireless Networking"

Operating System Concepts. Operating System 資 訊 工 程 學 系 袁 賢 銘 老 師

Collision of wireless signals. The MAC layer in wireless networks. Wireless MAC protocols classification. Evolutionary perspective of distributed MAC

CSMA/CA. Information Networks p. 1

Unit of Learning # 2 The Physical Layer. Sergio Guíñez Molinos sguinez@utalca.cl

How To Make A Multi-User Communication Efficient

Controlled Random Access Methods

EPL 657 Wireless Networks

Medium Access Control (MAC) Protocols for Ad hoc Wireless Networks - III

Chapter 4. Medium Access Control. IN2P3 Octobre 2002 Jean-Pierre Thomesse

Attenuation (amplitude of the wave loses strength thereby the signal power) Refraction Reflection Shadowing Scattering Diffraction

Module 15: Network Structures

EXAMPLES AND PROBLEMS. Competence Based Education Internet Protocols

ECE 428 Computer Networks and Security

Computer Network. Interconnected collection of autonomous computers that are able to exchange information

Overview of Network Hardware and Software. CS158a Chris Pollett Jan 29, 2007.

Chapter 14: Distributed Operating Systems

RETI DI TELECOMUNICAZIONI

ECE 358: Computer Networks. Homework #3. Chapter 5 and 6 Review Questions 1

Data Link Layer. Page 1. Ethernet

Chapter 16: Distributed Operating Systems

Adaptive DCF of MAC for VoIP services using IEEE networks

a. CSMA/CD is a random-access protocol. b. Polling is a controlled-access protocol. c. TDMA is a channelization protocol.

ECE 333: Introduction to Communication Networks Fall 2002

Local Area Networks. Guest Instructor Elaine Wong. Elaine_06_I-1

Wireless Networks. Reading: Sec5on 2.8. COS 461: Computer Networks Spring Mike Freedman

LAN Switching Computer Networking. Switched Network Advantages. Hubs (more) Hubs. Bridges/Switches, , PPP. Interconnecting LANs

Selecting a Web Server Connection Rate Gilbert Held

Frame Burst Adjusting for Transmitting Video Conference in Gigabit Ethernet

Express Forwarding : A Distributed QoS MAC Protocol for Wireless Mesh

MAC Algorithms in Wireless Networks

1. The subnet must prevent additional packets from entering the congested region until those already present can be processed.

IT4405 Computer Networks (Compulsory)

Architecture and Performance of the Internet

Wiereless LAN

DATA COMMUNICATION AND NETWORKS

1 Which network type is a specifically designed configuration of computers and other devices located within a confined area? A Peer-to-peer network

Data Link Protocols. Link Layer Services. Framing, Addressing, link access: Error Detection:

Agenda. Distributed System Structures. Why Distributed Systems? Motivation

RTT 60.5 msec receiver window size: 32 KB

Data Link Protocols. TCP/IP Suite and OSI Reference Model

Answer: that dprop equals dtrans. seconds. a) d prop. b) d trans

Markku Renfors. Partly based on student presentation by: Lukasz Kondrad Tomasz Augustynowicz Jaroslaw Lacki Jakub Jakubiak

Protocolo IEEE Sergio Scaglia SASE Agosto 2012

Network Protocol Design and Evaluation

PERFORMANCE ANALYSIS OF LOW RATE WIRELESS TECHNOLOGIES FOR MEDICAL APPLICATIONS. N. Golmie, D. Cypher, O. Rebala

Network Categories. Network Types for the Local Range. Ethernet. Carrier Sense Multiple Access

Wireless LAN Concepts

Note! The problem set consists of two parts: Part I: The problem specifications pages Part II: The answer pages

DATA COMMUNICATIONS AND NETWORKING. Solved Examples

Gigabit Ethernet: Architectural Design and Issues

CMPE 150: Introduction to Computer Networks FINAL REVIEW. Venkatesh Rajendran. Spring 2003 UCSC CMPE150 1

TCP for Wireless Networks

Ring Local Area Network. Ring LANs

ISSN: ISO 9001:2008 Certified International Journal of Engineering Science and Innovative Technology (IJESIT) Volume 2, Issue 5, September

CS Cellular and Mobile Network Security: GSM - In Detail

An Experimental Study of Throughput for UDP and VoIP Traffic in IEEE b Networks

28 Networks and Communication Protocols

What is it all about? Some simple solutions. Multiple Access. Contexts for the multiple access problem. Outline. Contexts

ECE/CS 372 introduction to computer networks. Lecture 13

Gigabit Ethernet. Abstract. 1. Introduction. 2. Benefits of Gigabit Ethernet

Overview of Computer Networks

Network Categories. Network Types for the Local Range. Ethernet

Lecture 6 Types of Computer Networks and their Topologies Three important groups of computer networks: LAN, MAN, WAN

Network Topologies. Network Topologies

Wireless LAN Services for Hot-Spot


Network-Oriented Software Development. Course: CSc4360/CSc6360 Instructor: Dr. Beyah Sessions: M-W, 3:00 4:40pm Lecture 2

Final for ECE374 05/06/13 Solution!!

Wireless LAN Protocol CS 571 Fall Kenneth L. Calvert All rights reserved

SPI I2C LIN Ethernet. u Today: Wired embedded networks. u Next lecture: CAN bus u Then: wireless embedded network

CSC 313 Data Communications COURSE PARTICULARS COURSE INSTRUCTORS COURSE DESCRIPTION COURSE OBJECTIVES

Computer Networks and the Internet

Topics: The Internet Network Edge Network Core Internet Backbone Loss & Delay Internet Protocol Stack CHAPTER 1: OVERVIEW OF COMPUTER NETWORKS

Dynamic Load Balance Algorithm (DLBA) for IEEE Wireless LAN

TCP in Wireless Networks

COMPUTER NETWORKS HANDOUTS LECTURERS # PREPARED BY: HAMMAD KHALID KHAN. Copyright Virtual University of Pakistan

CS698T Wireless Networks: Principles and Practice

CSCI 362 Computer and Network Security

A research perspective on the adaptive protocols' architectures and system infrastructures to support QoS in wireless communication systems

ESSENTIALS. Understanding Ethernet Switches and Routers. April 2011 VOLUME 3 ISSUE 1 A TECHNICAL SUPPLEMENT TO CONTROL NETWORK

Module 1. Introduction. Version 2 CSE IIT, Kharagpur

COMP 3331/9331: Computer Networks and Applications

How To Determine The Capacity Of An B Network

Transcription:

Lecture Today slotted vs unslotted ALOHA Carrier sensing multiple access Ethernet DataLink Layer 1 Random Access Protocols When node has packet to send transmit at full channel data rate R. no a priori coordination among nodes two or more transmitting nodes collision, random access MAC protocol specifies: how to detect collisions how to recover from collisions (e.g., via delayed retransmissions) Examples of random access MAC protocols: slotted ALOHA ALOHA CSMA, CSMA/CD, CSMA/CA DataLink Layer 2 1

Slotted ALOHA Assumptions all frames same size time is divided into equal size slots, time to transmit 1 frame nodes start to transmit frames only at beginning of slots nodes are synchronized if 2 or more nodes transmit in slot, all nodes detect collision Operation when node obtains fresh frame, it transmits in next slot no collision, node can send new frame in next slot if collision, node retransmits frame in each subsequent slot with prob. p until success DataLink Layer 3 Slotted ALOHA Pros single active node can continuously transmit at full rate of channel highly decentralized: only slots in nodes need to be in sync simple Cons collisions, wasting slots idle slots nodes may be able to detect collision in less than time to transmit packet DataLink Layer 4 2

Slotted Aloha efficiency Efficiency is the long-run fraction of successful slots when there are many nodes, each with many frames to send N nodes with many frames to send, each transmits in slot with probability q (new arrival or re-tx) prob that node 1 has success in a slot = q(1-q) N-1 Total expected utilization = Nq(1-q) N-1 For max efficiency with N nodes, find q* that maximizes Nq(1-q) N-1 For many nodes, take limit of Nq*(1-q*) N-1 as N goes to infinity, gives 1/e =.37 At best: channel used for useful transmissions 37% of time! DataLink Layer 5 Pure (unslotted) ALOHA unslotted Aloha: simpler, no synchronization when frame first arrives transmit immediately collision probability increases: frame sent at t 0 collides with other frames sent in [t 0-1,t 0 +1] DataLink Layer 6 3

Pure Aloha efficiency P(success by given node) = P(node transmits at to). P(no other node transmits in [t 0-1,t 0 ]). P(no other node transmits in [t 0,t 0 +1]) = q. (1-q) N-1. (1-q) N-1 = q. (1-q) 2(N-1) choosing optimum q and then letting N -> infty... Even worse! = 1/(2e) =.18 DataLink Layer 7 CSMA (Carrier Sense Multiple Access) CSMA: listen before transmit: If channel sensed idle: transmit entire frame If channel sensed busy, defer transmission Human analogy: don t interrupt others! Do we then get effective channel partitioning, with no collisions possible? DataLink Layer 8 4

CSMA collisions spatial layout of nodes collisions can still occur: propagation delay means two nodes may not hear each other s transmission collision: entire packet transmission time wasted note: role of propagation delay in determining collision probability DataLink Layer 9 CSMA Efficiency Key parameters: Propagation delay (in seconds): t prop packet transmission time t trans Efficiency depends only on t prop /t tran, and decreases with this parameter. DataLink Layer 10 5

CSMA Efficiency Decreases with t prop /t trans Decreases with increasing distance between nodes. t_{trans} = R/L, where R is the link speed in bits/s and L is the frame length in bits. So efficiency decreases with increasing link speed R. DataLink Layer 11 CSMA/CD (Collision Detection) CSMA/CD: carrier sensing, deferral as in CSMA collisions detected within short time colliding transmissions aborted, reducing channel wastage collision detection: easy in wired LANs: measure signal strengths, compare transmitted, received signals difficult in wireless LANs: receiver shut off while transmitting human analogy: the polite conversationalist DataLink Layer 12 6

CSMA/CD collision detection DataLink Layer 13 Ethernet dominant wired LAN technology: cheap $20 for 100Mbs! first widely used LAN technology Simpler, cheaper than token LANs and ATM Kept up with speed race: 10 Mbps 10 Gbps Metcalfe s Ethernet sketch DataLink Layer 14 7

Star topology Bus topology popular through mid 90s Now star topology prevails hub DataLink Layer 15 Unreliable, connectionless service Connectionless: No handshaking between sending and receiving adapter. Unreliable: receiving adapter doesn t send acks or nacks to sending adapter stream of datagrams passed to network layer can have gaps gaps will be filled if app is using TCP otherwise, app will see the gaps DataLink Layer 16 8

Ethernet uses CSMA/CD No slots adapter doesn t transmit if it senses that some other adapter is transmitting, that is, carrier sense transmitting adapter aborts when it senses that another adapter is transmitting, that is, collision detection Before attempting a retransmission, adapter waits a random time, that is, random access DataLink Layer 17 Ethernet CSMA/CD algorithm 1. Adaptor receives datagram from net layer & creates frame 2. If adapter senses channel idle, it starts to transmit frame. If it senses channel busy, waits until channel idle and then transmits 3. If adapter transmits entire frame without detecting another transmission, the adapter is done with frame! 4. If adapter detects another transmission while transmitting, aborts and sends jam signal 5. After aborting, adapter enters exponential backoff: after the mth collision, adapter chooses a K at random from {0,1,2,,2 m -1}. Adapter waits K 512 bit times and returns to Step 2 DataLink Layer 18 9