1 computer communication & networks lecture 12 datalink layer: multiple access waleed ejaz...
TRANSCRIPT
![Page 1: 1 Computer Communication & Networks Lecture 12 Datalink Layer: Multiple Access Waleed Ejaz waleed.ejaz@uettaxila.edu.pk](https://reader035.vdocuments.us/reader035/viewer/2022062516/56649e605503460f94b5bab0/html5/thumbnails/1.jpg)
1
Computer Communication & Networks
Lecture 12
Datalink Layer: Multiple Access
http://web.uettaxila.edu.pk/CMS/coeCCNbsSp09/index.asp
Waleed [email protected]
![Page 2: 1 Computer Communication & Networks Lecture 12 Datalink Layer: Multiple Access Waleed Ejaz waleed.ejaz@uettaxila.edu.pk](https://reader035.vdocuments.us/reader035/viewer/2022062516/56649e605503460f94b5bab0/html5/thumbnails/2.jpg)
2
Data Link Layer
![Page 3: 1 Computer Communication & Networks Lecture 12 Datalink Layer: Multiple Access Waleed Ejaz waleed.ejaz@uettaxila.edu.pk](https://reader035.vdocuments.us/reader035/viewer/2022062516/56649e605503460f94b5bab0/html5/thumbnails/3.jpg)
3
Data Link Layer Topics to CoverError Detection and Correction
Data Link Control and Protocols
Multiple Access
Local Area Networks
Wireless LANs
![Page 4: 1 Computer Communication & Networks Lecture 12 Datalink Layer: Multiple Access Waleed Ejaz waleed.ejaz@uettaxila.edu.pk](https://reader035.vdocuments.us/reader035/viewer/2022062516/56649e605503460f94b5bab0/html5/thumbnails/4.jpg)
4
Multiple access problem Example: Cocktail party – many people gather together in
a large room Broadcast medium – air Another example: a classroom Human protocols:
“Give everyone a chance to speak” “Don’t speak until you are spoken to” “Don’t monopolize the conversation” “Raise your hand if you have a question” “Don’t interrupt when someone is speaking” “Don’t fall asleep when someone else is talking”
![Page 5: 1 Computer Communication & Networks Lecture 12 Datalink Layer: Multiple Access Waleed Ejaz waleed.ejaz@uettaxila.edu.pk](https://reader035.vdocuments.us/reader035/viewer/2022062516/56649e605503460f94b5bab0/html5/thumbnails/5.jpg)
5
Multiple access protocols In LANs, WiFi, satellite networks, cocktail party If more than 2 users send @ the same time -
collision All collided packets are lost -> waste of bandwidth
Ideally, the MAC protocol for a broadcast channel with the bit-rate R bps should satisfy: if only 1 node is sending than the throughput is R when M nodes have data to send than the throughput is R/M
decentralized protocol – no master simple & inexpensive to implement
![Page 6: 1 Computer Communication & Networks Lecture 12 Datalink Layer: Multiple Access Waleed Ejaz waleed.ejaz@uettaxila.edu.pk](https://reader035.vdocuments.us/reader035/viewer/2022062516/56649e605503460f94b5bab0/html5/thumbnails/6.jpg)
6
Taxonomy of Multiple-Access Protocols
![Page 7: 1 Computer Communication & Networks Lecture 12 Datalink Layer: Multiple Access Waleed Ejaz waleed.ejaz@uettaxila.edu.pk](https://reader035.vdocuments.us/reader035/viewer/2022062516/56649e605503460f94b5bab0/html5/thumbnails/7.jpg)
7
Random Access Protocols
In In random accessrandom access or or contentioncontention methods, no methods, no station is superior to another station and station is superior to another station and none is assigned the control over another. No none is assigned the control over another. No station permits, or does not permit, another station permits, or does not permit, another station to send. At each instance, a station station to send. At each instance, a station that has data to send uses a procedure that has data to send uses a procedure defined by the protocol to make a decision on defined by the protocol to make a decision on whether or not to send.whether or not to send.
![Page 8: 1 Computer Communication & Networks Lecture 12 Datalink Layer: Multiple Access Waleed Ejaz waleed.ejaz@uettaxila.edu.pk](https://reader035.vdocuments.us/reader035/viewer/2022062516/56649e605503460f94b5bab0/html5/thumbnails/8.jpg)
8
ALOHA Network
Developed by Norm Abramson at the Univ. of Hawaii the guy had interest in surfing and packet switching mountainous islands → land-based network difficult to install fully decentralized protocol
ACK
ACK ACK
ACK
![Page 9: 1 Computer Communication & Networks Lecture 12 Datalink Layer: Multiple Access Waleed Ejaz waleed.ejaz@uettaxila.edu.pk](https://reader035.vdocuments.us/reader035/viewer/2022062516/56649e605503460f94b5bab0/html5/thumbnails/9.jpg)
9
Pure Aloha
The node immediately transmits its frame completely If the frame is collided it retransmits the frame again (after
completely transmitting its collided frame) with the probability p
![Page 10: 1 Computer Communication & Networks Lecture 12 Datalink Layer: Multiple Access Waleed Ejaz waleed.ejaz@uettaxila.edu.pk](https://reader035.vdocuments.us/reader035/viewer/2022062516/56649e605503460f94b5bab0/html5/thumbnails/10.jpg)
10
Slotted Aloha Assumptions all frames same size time is divided into equal
size slots, time to transmit 1 frame
nodes start to transmit frames only at beginning of slots
nodes are synchronized if 2 or more nodes transmit
in slot, all nodes detect collision
Operation when node obtains fresh
frame, it transmits in next slot no collision, node can send
new frame in next slot if collision, node retransmits
frame in each subsequent slot with prob. p until success
![Page 11: 1 Computer Communication & Networks Lecture 12 Datalink Layer: Multiple Access Waleed Ejaz waleed.ejaz@uettaxila.edu.pk](https://reader035.vdocuments.us/reader035/viewer/2022062516/56649e605503460f94b5bab0/html5/thumbnails/11.jpg)
11
Frames in a Slotted ALOHA Network
![Page 12: 1 Computer Communication & Networks Lecture 12 Datalink Layer: Multiple Access Waleed Ejaz waleed.ejaz@uettaxila.edu.pk](https://reader035.vdocuments.us/reader035/viewer/2022062516/56649e605503460f94b5bab0/html5/thumbnails/12.jpg)
12
Slotted Aloha
Pros single active node can
continuously transmit at full rate of channel
highly decentralized: only slots in nodes need to be in sync
simple
Cons collisions, wasting slots idle slots nodes may be able to
detect collision in less than time to transmit packet
clock synchronization
![Page 13: 1 Computer Communication & Networks Lecture 12 Datalink Layer: Multiple Access Waleed Ejaz waleed.ejaz@uettaxila.edu.pk](https://reader035.vdocuments.us/reader035/viewer/2022062516/56649e605503460f94b5bab0/html5/thumbnails/13.jpg)
13
Multiple Access Protocols
ALOHA
![Page 14: 1 Computer Communication & Networks Lecture 12 Datalink Layer: Multiple Access Waleed Ejaz waleed.ejaz@uettaxila.edu.pk](https://reader035.vdocuments.us/reader035/viewer/2022062516/56649e605503460f94b5bab0/html5/thumbnails/14.jpg)
14
Carrier Sense Multiple Access Invented to minimize collisions and increase the
performance A station now “follows” the activity of other stations Simple rules for a polite human conversation
Listen before talking If someone else begins talking at the same time as you,
stop talking CSMA:
A node should not send if another node is already sending carrier sensing
CD (collision detection): A node should stop transmission if there is interference
collision detection
![Page 15: 1 Computer Communication & Networks Lecture 12 Datalink Layer: Multiple Access Waleed Ejaz waleed.ejaz@uettaxila.edu.pk](https://reader035.vdocuments.us/reader035/viewer/2022062516/56649e605503460f94b5bab0/html5/thumbnails/15.jpg)
15
Carrier Sense Multiple Access If everyone is sensing the medium how come that
collisions still occur?
channel propagation delay
![Page 16: 1 Computer Communication & Networks Lecture 12 Datalink Layer: Multiple Access Waleed Ejaz waleed.ejaz@uettaxila.edu.pk](https://reader035.vdocuments.us/reader035/viewer/2022062516/56649e605503460f94b5bab0/html5/thumbnails/16.jpg)
16
CSMA (cnt’d)
Reduces the chance of collisions reduces the efficiency
increases the chance for collisions 1-persistant
p-persistant Decreases the chance for collisions Improves efficiency
![Page 17: 1 Computer Communication & Networks Lecture 12 Datalink Layer: Multiple Access Waleed Ejaz waleed.ejaz@uettaxila.edu.pk](https://reader035.vdocuments.us/reader035/viewer/2022062516/56649e605503460f94b5bab0/html5/thumbnails/17.jpg)
17
Multiple Access Protocols
ALOHA
![Page 18: 1 Computer Communication & Networks Lecture 12 Datalink Layer: Multiple Access Waleed Ejaz waleed.ejaz@uettaxila.edu.pk](https://reader035.vdocuments.us/reader035/viewer/2022062516/56649e605503460f94b5bab0/html5/thumbnails/18.jpg)
18
![Page 19: 1 Computer Communication & Networks Lecture 12 Datalink Layer: Multiple Access Waleed Ejaz waleed.ejaz@uettaxila.edu.pk](https://reader035.vdocuments.us/reader035/viewer/2022062516/56649e605503460f94b5bab0/html5/thumbnails/19.jpg)
19
CSMA with Collision Detection (CSMA/CD)
CSMA/CD can be in one of the three states: contention, transmission, or idle.
Example of CSMA/CD: Ethernet How long does it take before stations realize that there has
been a collision?
![Page 20: 1 Computer Communication & Networks Lecture 12 Datalink Layer: Multiple Access Waleed Ejaz waleed.ejaz@uettaxila.edu.pk](https://reader035.vdocuments.us/reader035/viewer/2022062516/56649e605503460f94b5bab0/html5/thumbnails/20.jpg)
20
Collision Detection
How the station detects a collision?
There are many collision detection methods! Most of them are analog processes.
Examples: detecting voltage level on the line detecting power level detecting simultaneous transmission & reception
![Page 21: 1 Computer Communication & Networks Lecture 12 Datalink Layer: Multiple Access Waleed Ejaz waleed.ejaz@uettaxila.edu.pk](https://reader035.vdocuments.us/reader035/viewer/2022062516/56649e605503460f94b5bab0/html5/thumbnails/21.jpg)
21
Multiple Access Protocols
ALOHA
![Page 22: 1 Computer Communication & Networks Lecture 12 Datalink Layer: Multiple Access Waleed Ejaz waleed.ejaz@uettaxila.edu.pk](https://reader035.vdocuments.us/reader035/viewer/2022062516/56649e605503460f94b5bab0/html5/thumbnails/22.jpg)
22
CSMA with Collision Avoidance -CSMA/CA-
• no collisions
![Page 23: 1 Computer Communication & Networks Lecture 12 Datalink Layer: Multiple Access Waleed Ejaz waleed.ejaz@uettaxila.edu.pk](https://reader035.vdocuments.us/reader035/viewer/2022062516/56649e605503460f94b5bab0/html5/thumbnails/23.jpg)
23
Readings
Chapter 12 (B.A Forouzan) Section 12.1 (Cover only those contents which are related to topics
covered in class)
![Page 24: 1 Computer Communication & Networks Lecture 12 Datalink Layer: Multiple Access Waleed Ejaz waleed.ejaz@uettaxila.edu.pk](https://reader035.vdocuments.us/reader035/viewer/2022062516/56649e605503460f94b5bab0/html5/thumbnails/24.jpg)
24