The Medium Access Control Sublayer
The Medium Access Control Sublayer
Chapter 4
Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, ? Pearson Education-Prentice Hall, 2011
Channel Allocation Problem
? Static channel allocation
FDM/TDM
? Assumptions for dynamic channel allocation
Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, ? Pearson Education-Prentice Hall, 2011
Assumptions for Dynamic Channel Allocation
1. Independent traffic: independent stations 2. Single channel: available for all communication. All
stations can transmit/receive on/from it. The stations are equally capable. 3. Observable Collisions: All stations can detect a collision. 4. Continuous or slotted time (for transmission) 5. Carrier sense or no carrier sense: With carrier sense, stations can tell if the channel is in use before trying to use it.
Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, ? Pearson Education-Prentice Hall, 2011
Multiple Access Protocols
? ALOHA: Early 1970s.
Pure Aloha Slotted Aloha
? Carrier Sense Multiple Access ? Collision-free protocols ? Limited-contention protocols ? Wireless LAN protocols
Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, ? Pearson Education-Prentice Hall, 2011
ALOHA
Basic idea of ALOHA: let users transmit whenever they have data to be sent.
Collisions are possible! Sender might be able to listen for collisions while transmitting If the frame was destroyed, the sender just waits a random
amount of time to retransmit it.
The waiting time must be random or the frames will collide again.
Contention systems: Systems in which multiple users share a common channel in a way that can lead to conflicts.
Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, ? Pearson Education-Prentice Hall, 2011
ALOHA (1)
User A B C D E
Collision
Time
Collision
In pure ALOHA, frames are transmitted at completely arbitrary times
Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, ? Pearson Education-Prentice Hall, 2011
ALOHA (2)
Vulnerable period for the shaded frame.
Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, ? Pearson Education-Prentice Hall, 2011
ALOHA (3)
(Including retransmission)
Throughput versus offered traffic for ALOHA systems.
Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, ? Pearson Education-Prentice Hall, 2011
Slotted Aloha
Divide time into discrete intervals called slots, each interval corresponding to one frame.
Require the users to agree on slot boundaries A station is not permit to send at any time. It is required to
wait for the beginning of the next slot
Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, ? Pearson Education-Prentice Hall, 2011
Carrier Sense Multiple Access Protocol
When a station has data to send, it first listens to the channel to see if anyone else is transmitting.
If the channel is idle, the station sends data. Otherwise, it just waits until it become idle.
If a collision occurs, the station waits a random amount of time and starts all over again.
1-persistent: the station transmits with a probability of 1 when it finds the channel idle.
p-persistent: the station transmits with a probability of p when it finds the channel idle.
Non-persistent CSMA: If the channel is already in use, the station does not continuously sense the channel for the purpose of seizing it immediately upon detecting the end of the previous transmission. Instead, it waits a random period of time and then repeats the algorithm.
Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, ? Pearson Education-Prentice Hall, 2011
Persistent and Nonpersistent CSMA
Comparison of the channel utilization versus load for various random access protocols.
Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, ? Pearson Education-Prentice Hall, 2011
CSMA with Collision Detection
The stations quickly detect the collision and abruptly stop transmitting (rather than finishing them).
Saves time and bandwidth. CSMA/CD (Collision Detection): basis of the classic Ethernet The station hardware must listen to the channel while it is
transmitting. A received signal must not be tiny compared to the transmitted signal (for reading back transmitting data). Chose appropriate modulation method to allow collisions to be detected.
Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, ? Pearson Education-Prentice Hall, 2011
CSMA with Collision Detection
CSMA/CD can be in one of three states: contention, transmission, or idle.
Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, ? Pearson Education-Prentice Hall, 2011
Collision-Free Protocols (1)
Each contention period consists of exactly N slots. If station 0 has a frame to send, it transmits a 1 bit during slot 0. No other station is allowed to transmit during this slot.
Each station has complete knowledge of which stations wish to transmit.
After the last station has transmitted its frame, another N-bit contention period is begun.
Reservation protocol
The basic bit-map protocol
Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, ? Pearson Education-Prentice Hall, 2011
Collision-Free Protocols (2)
Token: A small message representing permission to send
If a station has a frame queued for transmission when it
receives the token, it can send that frame before it passes
the token to the next station. The network topology defines the order in which stations
send.
Token Bus: We do not need a physical ring to implement token
passing. Station
Token
Direction of transmission
Token ring
Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, ? Pearson Education-Prentice Hall, 2011
Binary Countdown
Scaling problem: One bit per station for basic bit-map protocol
A station wanting to use the channel broadcasts its address as a binary bit string with the high-order bit.
The bits in each address position from different stations are ORed together when they are sent. Higher-numbered stations have a higher priority than low-numbered stations
The binary countdown protocol. A dash indicates silence.
Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, ? Pearson Education-Prentice Hall, 2011
................
................
In order to avoid copyright disputes, this page is only a partial summary.
To fulfill the demand for quickly locating and searching documents.
It is intelligent file search solution for home and business.
Related download
- lecture notes on computer networks pdf
- data link layer computer science academics wpi
- tanenbaum computer networks 5th edition
- lab 0 introduction to networks lab
- computer networks
- computer networks 1 mạng máy tính 1
- the medium access control sublayer
- introduction to distributed computing
- medium access control sublayer eazynotes
- the data link layer asia university
Related searches
- control systems in the workplace
- how do i access the internet
- the hartford retirement access account
- the hartford retirement access 401k
- control the narrative meaning
- magic the gathering access database
- cbs all access the good wife
- different ways to access the internet
- where is the control panel windows 10
- access the internet for me
- unable to access the internet
- does the government control everything