Chapter 6 Medium Access Control Protocols and Local Area Networks

Chapter 6 Medium Access Control Protocols and Local Area Networks

Chapter 6 Medium Access Control Protocols and Local Area Networks Part I: Medium Access Control Part II: Local Area Networks Chapter Overview l Broadcast Networks l Medium Access Control l All information sent to all l To coordinate access to users shared medium l No routing l Data link layer since direct l Shared media transfer of frames l Radio l Local Area Networks l Cellular telephony l High-speed, low-cost l Wireless LANs communications between co-located computers l Copper & Optical l Typically based on l Ethernet LANs broadcast networks l Cable Modem Access l Simple & cheap l Limited number of users Chapter 6 Medium Access Control Protocols and Local Area Networks Part I: Medium Access Control Multiple Access Communications Random Access Scheduling Channelization Delay Performance Chapter 6 Medium Access Control Protocols and Local Area Networks Part II: Local Area Networks Overview of LANs Ethernet Token Ring and FDDI 802.11 Wireless LAN LAN Bridges Chapter 6 Medium Access Control Protocols and Local Area Networks Multiple Access Communications Multiple Access Communications l Shared media basis for broadcast networks l Inexpensive: radio over air; copper or coaxial cable l M users communicate by broadcasting into medium l Key issue: How to share the medium? 3 2 4 1 Shared multiple access medium M 5 … Approaches to Media Sharing Medium sharing techniques Static Dynamic medium channelization access control l Partition medium Scheduling Random access l Dedicated allocation to users l Polling: take turns l Loose l Satellite l Request for slot in coordination transmission transmission l Send, wait, retry if l Cellular Telephone schedule necessary l Token ring l Aloha l Wireless LANs l Ethernet Channelization: Satellite Satellite Channel uplink fin downlink fout Channelization: Cellular uplink f1 ; downlink f2 uplink f3 ; downlink f4 Scheduling: Polling Inbound line Data fromData 1 from 2 Poll 1 Poll 2 Data to M Outbound line Host M computer 1 2 3 Stations Scheduling: Token-Passing Ring networks token Data to M token Station that holds token transmits into ring Random Access Multitapped Bus Crash!! Transmit when ready Transmissions can occur; need retransmission strategy Wireless LAN Ad Hoc: station-to-station Infrastructure: stations to base station Random access & polling Selecting a Medium Access Control l Applications l What type of traffic? l Voice streams? Steady traffic, low delay/jitter l Data? Short messages? Web page downloads? l Enterprise or Consumer market? Reliability, cost l Scale l How much traffic can be carried? l How many users can be supported? l Current Examples: l Design MAC to provide wireless DSL-equivalent access to rural communities l Design MAC to provide Wireless-LAN-equivalent access to mobile users (user in car travelling at 130 km/hr) Delay-Bandwidth Product l Delay-bandwidth product key parameter l Coordination in sharing medium involves using bandwidth (explicitly or implicitly) l Difficulty of coordination commensurate with delay-bandwidth product l Simple two-station example l Station with frame to send listens to medium and transmits if medium found idle l Station monitors medium to detect collision l If collision occurs, station that begin transmitting earlier retransmits (propagation time is known) Two-Station MAC Example Two stations are trying to share a common medium Distance d meters A tprop = d / ν seconds transmits A B at t = 0 B does not Case 1 transmit before A B t = tprop & A captures channel Case 2 B transmits before t = tprop A B and detects A detects collision soon collision at thereafter A t = 2 tprop B Efficiency of Two-Station Example l Each frame transmission requires 2tprop of quiet time l Station B needs to be quiet tprop before and after time when Station A transmits l R transmission bit rate l L bits/frame L 1 1 Efficiency = ρmax = = = L + 2t propR 1+ 2t propR / L 1+ 2a L 1 MaxThroughput = Reff = = R bits/second L / R + 2t prop 1+ 2a Normalized Propagation delay t prop Delay-Bandwidth a = Product L / R Time to transmit a frame Typical MAC Efficiencies Two-Station Example: 1 Efficiency = 1+ 2a l If a<<1, then efficiency close to CSMA-CD (Ethernet) protocol: 100% 1 Efficiency = l As a approaches 1+ 6.44a 1, the efficiency Token-ring network becomes low 1 Efficiency = 1+ aʹ a΄= latency of the ring (bits)/average frame length Typical Delay-Bandwidth Products Distance 10 Mbps 100 Mbps 1 Gbps Network Type 1 m 3.33 x 3.33 x 3.33 x 100 Desk area network 10-02 10-01 100 m 3.33 x 1001 3.33 x 1002 3.33 x 1003 Local area network 10 km 3.33 x 1002 3.33 x 1003 3.33 x 1004 Metropolitan area network 1000 km 3.33 x 1004 3.33 x 1005 3.33 x 1006 Wide area network 100000 km 3.33 x 1006 3.33 x 1007 3.33 x 1008 Global area network l Max size Ethernet frame: 1500 bytes = 12000 bits l Long and/or fat pipes give large a MAC protocol features l Delay-bandwidth product l Efficiency l Transfer delay l Fairness l Reliability l Capability to carry different types of traffic l Quality of service l Cost MAC Delay Performance l Frame transfer delay l From first bit of frame arrives at source MAC l To last bit of frame delivered at destination MAC l Throughput l Actual transfer rate through the shared medium l Measured in frames/sec or bits/sec l Parameters R bits/sec & L bits/frame X=L/R seconds/frame λ frames/second average arrival rate Load ρ = λ X, rate at which “work” arrives Maximum throughput (@100% efficiency): R/L fr/sec Chapter 6 Medium Access Control Protocols and Local Area Networks Random Access ALOHA l Wireless link to provide data transfer between main campus & remote campuses of University of Hawaii l Simplest solution: just do it l A station transmits whenever it has data to transmit l If more than one frames are transmitted, they interfere with each other (collide) and are lost l If ACK not received within timeout, then a station picks random backoff time (to avoid repeated collision) l Station retransmits frame after backoff time First transmission Retransmission Backoff period B t t -X t0 t0+X t +X+2t + B 0 t0+X+2tprop 0 prop+ Vulnerable Time-out period ALOHA Model l Definitions and assumptions l X frame transmission time (assume constant) l S: throughput (average # successful frame transmissions per X seconds) l G: load (average # transmission attempts per X sec.) l Psuccess : probability a frame transmission is successful S GP = success l Any transmission that begins during vulnerable period leads to collision l Success if no arrivals X X during 2X seconds Prior interval frame transmission Abramson’s Assumption l What is probability of no arrivals in vulnerable period? l Abramson assumption: Effect of backoff algorithm is that frame arrivals are equally likely to occur at any time interval l G is avg. # arrivals per X seconds l Divide X into n intervals of duration Δ=X/n l p = probability of arrival in Δ interval, then G = n p since there are n intervals in X seconds Psuccess = P[0 arrivals in 2X seconds] = = P[0 arrivals in 2n intervals] G = (1- p) 2n = (1− )2n → e−2G as n → ∞ n Throughput of ALOHA −2G S = GPsuccess = Ge l Collisions are means -2 for coordinating 0.2 e = 0.184 0.18 access 0.16 l Max throughput is 0.14 0.12 ρmax= 1/2e (18.4%) S 0.1 l Bimodal behavior: 0.08 0.06 Small G, S≈G 0.04 Large G, S↓0 0.02 0 l Collisions can 0 1 2 4 0.5 0.25 snowball and drop 0.125 0.0625 0.015625 0.03125 0.0078125 throughput to zero G Slotted ALOHA l Time is slotted in X seconds slots l Stations synchronized to frame times l Stations transmit frames in first slot after frame arrival l Backoff intervals in multiples of slots Backoff period B t (k+1)X t +X+2t kX 0 prop t0 +X+2tprop+ B Time-out Vulnerable period Only frames that arrive during prior X seconds collide Throughput of Slotted ALOHA S = GPsuccess = GP[no arrivals in X seconds] = GP[no arrivals in n intervals] G = G(1− p)n = G(1− )n → Ge−G n 0. 4 0.368 0. 35 0. 3 -G S 0. 25 Ge 0. 2 0.184 0. 15 0. 1 0. 05 Ge-2G 0 1 2 4 8 0. 5 0. 25 0. 125 0. 0625 0. 01563 0. 03125 G Application of Slotted Aloha cycle . Reservation X-second slot mini-slots l Reservation protocol allows a large number of stations with infrequent traffic to reserve slots to transmit their frames in future cycles l Each cycle has mini-slots allocated for making reservations l Stations use slotted Aloha during mini-slots to request slots Carrier Sensing Multiple Access (CSMA) l A station senses the channel before it starts transmission l If busy, either wait or schedule backoff (different options) l If idle, start transmission l Vulnerable period is reduced to tprop (due to channel capture effect) l When collisions occur they involve entire frame transmission times l If tprop >X (or if a>1), no gain compared to ALOHA or slotted ALOHA Station A begins transmission at t = 0 A Station A captures channel at t = tprop A CSMA Options l Transmitter behavior when busy channel is sensed l 1-persistent CSMA (most greedy) l Start transmission as soon as the channel becomes idle l Low delay and low efficiency l Non-persistent CSMA (least greedy) l Wait a backoff period, then sense carrier again l High delay and high efficiency l p-persistent CSMA (adjustable greedy) l Wait till channel becomes idle, transmit with prob.

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    85 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us