5: datalink layer5-1 chapter 5 link layer and lans part 3: mac computer networking: a top down...

26
5: DataLink Layer 5-1 Chapter 5 Link Layer and LANs Part 3: MAC Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012

Upload: godwin-griffin

Post on 27-Dec-2015

221 views

Category:

Documents


1 download

TRANSCRIPT

Page 1: 5: DataLink Layer5-1 Chapter 5 Link Layer and LANs Part 3: MAC Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley

5 DataLink Layer 5-1

Chapter 5Link Layer and LANs

Part 3MAC

Computer Networking A Top Down Approach 6th edition Jim Kurose Keith RossAddison-WesleyMarch 2012

5 DataLink Layer 5-2

Link Layer

51 Introduction and services 52 Error detection and correction 53Multiple access protocols 54 Link-layer Addressing 55 Ethernet

56 Link-layer switches 57 PPP 58 Link virtualization

MPLS 59 A day in the life of

a web request

5 DataLink Layer 5-3

Multiple Access Links and Protocols

Two types of ldquolinksrdquo point-to-point

PPP for dial-up access point-to-point link between Ethernet switch and host

broadcast (shared wire or medium) old-fashioned Ethernet upstream HFC 80211 wireless LAN

shared wire (eg cabled Ethernet)

shared RF (eg 80211 WiFi)

shared RF(satellite)

humans at acocktail party

(shared air acoustical)

5 DataLink Layer 5-4

Multiple Access protocols single shared broadcast channel two or more simultaneous transmissions by nodes

interference collision if node receives two or more signals at the same

time

multiple access protocol distributed algorithm that determines how nodes

share channel ie determine when node can transmit

communication about channel sharing must use channel itself no out-of-band channel for coordination

5 DataLink Layer 5-5

Ideal Multiple Access Protocol

Broadcast channel of rate R bps1 when one node wants to transmit it can send

at rate R2 when M nodes want to transmit each can

send at average rate RM3 fully decentralized

no special node to coordinate transmissions no synchronization of clocks slots

4 simple

5 DataLink Layer 5-6

MAC Protocols a taxonomy

Three broad classes Channel Partitioning

divide channel into smaller ldquopiecesrdquo (time slots frequency code)

allocate piece to node for exclusive use Random Access

channel not divided allow collisions ldquorecoverrdquo from collisions

ldquoTaking turnsrdquo nodes take turns but nodes with more to send can

take longer turns

5 DataLink Layer 5-7

Channel Partitioning MAC protocols TDMA

TDMA time division multiple access access to channel in rounds each station gets fixed length slot (length =

pkt trans time) in each round unused slots go idle example 6-station LAN 134 have pkt slots

256 idle

1 3 4 1 3 4

6-slotframe

5 DataLink Layer 5-8

Channel Partitioning MAC protocols FDMA

FDMA frequency division multiple access channel spectrum divided into frequency bands each station assigned fixed frequency band unused transmission time in frequency bands go

idle example 6-station LAN 134 have pkt

frequency bands 256 idle fr

eq

uency

bands time

FDM cable

5 DataLink Layer 5-9

Random Access Protocols

When node has packet to send transmit at full channel data rate R no a priori coordination among nodes

two or more transmitting nodes ldquocollisionrdquo random access MAC protocol specifies

how to detect collisions how to recover from collisions (eg via delayed

retransmissions) Examples of random access MAC protocols

slotted ALOHA ALOHA CSMA CSMACD CSMACA

5 DataLink Layer 5-10

Slotted ALOHA

Assumptions all frames same size time divided into

equal size slots (time to transmit 1 frame)

nodes start to transmit only slot beginning

nodes are synchronized

if 2 or more nodes transmit in slot all nodes detect collision

Operation when node obtains fresh

frame transmits in next slot if no collision node

can send new frame in next slot

if collision node retransmits frame in each subsequent slot with prob p until success

5 DataLink Layer 5-11

Slotted ALOHA

Pros single active node

can continuously transmit at full rate of channel

highly decentralized only slots in nodes need to be in sync

simple

Cons collisions wasting

slots idle slots nodes may be able

to detect collision in less than time to transmit packet

clock synchronization

5 DataLink Layer 5-12

Slotted Aloha efficiency

suppose N nodes with many frames to send each transmits in slot with probability p

prob that given node has success in a slot = p(1-p)N-1

prob that any node has a success = Np(1-p)N-1

max efficiency find p that maximizes Np(1-p)N-1

for many nodes take limit of Np(1-p)N-1

as N goes to infinity gives

Max efficiency = 1e = 37

Efficiency long-run fraction of successful slots (many nodes all with many frames to send)

At best channelused for useful transmissions 37of time

5 DataLink Layer 5-13

Pure (unslotted) ALOHA unslotted Aloha simpler no synchronization when frame first arrives

transmit immediately collision probability increases

frame sent at t0 collides with other frames sent in [t0-1t0+1]

5 DataLink Layer 5-14

Pure Aloha efficiency

P(success by given node) = P(node transmits)

P(no other node transmits in [p0-1p0]

P(no other node transmits in [p0-1p0]

= p (1-p)N-1 (1-p)N-1

= p (1-p)2(N-1)

hellip choosing optimum p and then letting n -gt infty

= 1(2e) = 18 even worse than slotted Aloha

5 DataLink Layer 5-15

CSMA (Carrier Sense Multiple Access)

CSMA listen before transmitIf channel sensed idle transmit entire frame If channel sensed busy defer transmission

human analogy donrsquot interrupt others

5 DataLink Layer 5-16

CSMA collisions

collisions can still occurpropagation delay means two nodes may not heareach otherrsquos transmissioncollisionentire packet transmission time wasted

spatial layout of nodes

noterole of distance amp propagation delay in determining collision probability

5 DataLink Layer 5-17

CSMACD (Collision Detection)CSMACD carrier sensing deferral as in

CSMA collisions detected within short time colliding transmissions aborted reducing

channel wastage collision detection

easy in wired LANs measure signal strengths compare transmitted received signals

difficult in wireless LANs received signal strength overwhelmed by local transmission strength

human analogy the polite conversationalist

5 DataLink Layer 5-18

CSMACD collision detection

Link Layer 5-19

Ethernet CSMACD algorithm

1 NIC receives datagram from network layer creates frame

2 If NIC senses channel idle starts frame transmission If NIC senses channel busy waits until channel idle then transmits

3 If NIC transmits entire frame without detecting another transmission NIC is done with frame

4 If NIC detects another transmission while transmitting aborts and sends jam signal

5 After aborting NIC enters binary (exponential) backoff after mth collision NIC

chooses K at random from 012 hellip 2m-1 NIC waits K512 bit times returns to Step 2

longer backoff interval with more collisions

Link Layer 5-20

CSMACD efficiency

Tprop = max prop delay between 2 nodes in LAN ttrans = time to transmit max-size frame

efficiency goes to 1 as tprop goes to 0 as ttrans goes to infinity

better performance than ALOHA and simple cheap decentralized

transprop ttefficiency

51

1

5 DataLink Layer 5-21

ldquoTaking Turnsrdquo MAC protocols

channel partitioning MAC protocols share channel efficiently and fairly at high

load inefficient at low load delay in channel

access 1N bandwidth allocated even if only 1 active node

Random access MAC protocols efficient at low load single node can fully

utilize channel high load collision overhead

ldquotaking turnsrdquo protocolslook for best of both worlds

5 DataLink Layer 5-22

ldquoTaking Turnsrdquo MAC protocols

Polling controller node

ldquoinvitesrdquo client nodes to transmit in turn

typically used with ldquodumbrdquo client devices

concerns polling overhead latency single point of

failure (controller)

controller

clients

poll

data

data

5 DataLink Layer 5-23

ldquoTaking Turnsrdquo MAC protocolsToken passing control token

passed from one node to next sequentially

token message concerns

token overhead latency single point of failure

(token)

T

data

(nothingto send)

T

cable headend

CMTS

ISP

cable modemtermination system

multiple 40Mbps downstream (broadcast) channels single CMTS transmits into channels

multiple 30 Mbps upstream channels multiple access all users contend for certain

upstream channel time slots (others assigned)

Cable access network

cablemodem

splitter

hellip

hellip

Internet framesTV channels control transmitted downstream at different frequencies

upstream Internet frames TV control transmitted upstream at different frequencies in time slots

Link Layer 5-25

DOCSIS data over cable service interface spec

FDM over upstream downstream frequency channels

TDM upstream some slots assigned some have contention downstream MAP frame assigns upstream

slots request for upstream slots (and data)

transmitted random access (binary backoff) in selected slots

MAP frame forInterval [t1 t2]

Residences with cable modems

Downstream channel i

Upstream channel j

t1 t2

Assigned minislots containing cable modemupstream data frames

Minislots containing minislots request frames

cable headend

CMTS

Cable access network

5 DataLink Layer 5-26

Summary of MAC protocols

channel partitioning by time frequency or code Time Division Frequency Division

random access (dynamic) ALOHA S-ALOHA CSMA CSMACD carrier sensing easy in some technologies (wire)

hard in others (wireless) CSMACD used in Ethernet CSMACA used in 80211

taking turns polling from central site token passing Bluetooth FDDI IBM Token Ring

  • Slide 1
  • Link Layer
  • Multiple Access Links and Protocols
  • Multiple Access protocols
  • Ideal Multiple Access Protocol
  • MAC Protocols a taxonomy
  • Channel Partitioning MAC protocols TDMA
  • Channel Partitioning MAC protocols FDMA
  • Random Access Protocols
  • Slotted ALOHA
  • Slotted ALOHA (2)
  • Slotted Aloha efficiency
  • Pure (unslotted) ALOHA
  • Pure Aloha efficiency
  • CSMA (Carrier Sense Multiple Access)
  • CSMA collisions
  • CSMACD (Collision Detection)
  • CSMACD collision detection
  • Ethernet CSMACD algorithm
  • CSMACD efficiency
  • ldquoTaking Turnsrdquo MAC protocols
  • ldquoTaking Turnsrdquo MAC protocols (2)
  • ldquoTaking Turnsrdquo MAC protocols (3)
  • Slide 24
  • Slide 25
  • Summary of MAC protocols
Page 2: 5: DataLink Layer5-1 Chapter 5 Link Layer and LANs Part 3: MAC Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley

5 DataLink Layer 5-2

Link Layer

51 Introduction and services 52 Error detection and correction 53Multiple access protocols 54 Link-layer Addressing 55 Ethernet

56 Link-layer switches 57 PPP 58 Link virtualization

MPLS 59 A day in the life of

a web request

5 DataLink Layer 5-3

Multiple Access Links and Protocols

Two types of ldquolinksrdquo point-to-point

PPP for dial-up access point-to-point link between Ethernet switch and host

broadcast (shared wire or medium) old-fashioned Ethernet upstream HFC 80211 wireless LAN

shared wire (eg cabled Ethernet)

shared RF (eg 80211 WiFi)

shared RF(satellite)

humans at acocktail party

(shared air acoustical)

5 DataLink Layer 5-4

Multiple Access protocols single shared broadcast channel two or more simultaneous transmissions by nodes

interference collision if node receives two or more signals at the same

time

multiple access protocol distributed algorithm that determines how nodes

share channel ie determine when node can transmit

communication about channel sharing must use channel itself no out-of-band channel for coordination

5 DataLink Layer 5-5

Ideal Multiple Access Protocol

Broadcast channel of rate R bps1 when one node wants to transmit it can send

at rate R2 when M nodes want to transmit each can

send at average rate RM3 fully decentralized

no special node to coordinate transmissions no synchronization of clocks slots

4 simple

5 DataLink Layer 5-6

MAC Protocols a taxonomy

Three broad classes Channel Partitioning

divide channel into smaller ldquopiecesrdquo (time slots frequency code)

allocate piece to node for exclusive use Random Access

channel not divided allow collisions ldquorecoverrdquo from collisions

ldquoTaking turnsrdquo nodes take turns but nodes with more to send can

take longer turns

5 DataLink Layer 5-7

Channel Partitioning MAC protocols TDMA

TDMA time division multiple access access to channel in rounds each station gets fixed length slot (length =

pkt trans time) in each round unused slots go idle example 6-station LAN 134 have pkt slots

256 idle

1 3 4 1 3 4

6-slotframe

5 DataLink Layer 5-8

Channel Partitioning MAC protocols FDMA

FDMA frequency division multiple access channel spectrum divided into frequency bands each station assigned fixed frequency band unused transmission time in frequency bands go

idle example 6-station LAN 134 have pkt

frequency bands 256 idle fr

eq

uency

bands time

FDM cable

5 DataLink Layer 5-9

Random Access Protocols

When node has packet to send transmit at full channel data rate R no a priori coordination among nodes

two or more transmitting nodes ldquocollisionrdquo random access MAC protocol specifies

how to detect collisions how to recover from collisions (eg via delayed

retransmissions) Examples of random access MAC protocols

slotted ALOHA ALOHA CSMA CSMACD CSMACA

5 DataLink Layer 5-10

Slotted ALOHA

Assumptions all frames same size time divided into

equal size slots (time to transmit 1 frame)

nodes start to transmit only slot beginning

nodes are synchronized

if 2 or more nodes transmit in slot all nodes detect collision

Operation when node obtains fresh

frame transmits in next slot if no collision node

can send new frame in next slot

if collision node retransmits frame in each subsequent slot with prob p until success

5 DataLink Layer 5-11

Slotted ALOHA

Pros single active node

can continuously transmit at full rate of channel

highly decentralized only slots in nodes need to be in sync

simple

Cons collisions wasting

slots idle slots nodes may be able

to detect collision in less than time to transmit packet

clock synchronization

5 DataLink Layer 5-12

Slotted Aloha efficiency

suppose N nodes with many frames to send each transmits in slot with probability p

prob that given node has success in a slot = p(1-p)N-1

prob that any node has a success = Np(1-p)N-1

max efficiency find p that maximizes Np(1-p)N-1

for many nodes take limit of Np(1-p)N-1

as N goes to infinity gives

Max efficiency = 1e = 37

Efficiency long-run fraction of successful slots (many nodes all with many frames to send)

At best channelused for useful transmissions 37of time

5 DataLink Layer 5-13

Pure (unslotted) ALOHA unslotted Aloha simpler no synchronization when frame first arrives

transmit immediately collision probability increases

frame sent at t0 collides with other frames sent in [t0-1t0+1]

5 DataLink Layer 5-14

Pure Aloha efficiency

P(success by given node) = P(node transmits)

P(no other node transmits in [p0-1p0]

P(no other node transmits in [p0-1p0]

= p (1-p)N-1 (1-p)N-1

= p (1-p)2(N-1)

hellip choosing optimum p and then letting n -gt infty

= 1(2e) = 18 even worse than slotted Aloha

5 DataLink Layer 5-15

CSMA (Carrier Sense Multiple Access)

CSMA listen before transmitIf channel sensed idle transmit entire frame If channel sensed busy defer transmission

human analogy donrsquot interrupt others

5 DataLink Layer 5-16

CSMA collisions

collisions can still occurpropagation delay means two nodes may not heareach otherrsquos transmissioncollisionentire packet transmission time wasted

spatial layout of nodes

noterole of distance amp propagation delay in determining collision probability

5 DataLink Layer 5-17

CSMACD (Collision Detection)CSMACD carrier sensing deferral as in

CSMA collisions detected within short time colliding transmissions aborted reducing

channel wastage collision detection

easy in wired LANs measure signal strengths compare transmitted received signals

difficult in wireless LANs received signal strength overwhelmed by local transmission strength

human analogy the polite conversationalist

5 DataLink Layer 5-18

CSMACD collision detection

Link Layer 5-19

Ethernet CSMACD algorithm

1 NIC receives datagram from network layer creates frame

2 If NIC senses channel idle starts frame transmission If NIC senses channel busy waits until channel idle then transmits

3 If NIC transmits entire frame without detecting another transmission NIC is done with frame

4 If NIC detects another transmission while transmitting aborts and sends jam signal

5 After aborting NIC enters binary (exponential) backoff after mth collision NIC

chooses K at random from 012 hellip 2m-1 NIC waits K512 bit times returns to Step 2

longer backoff interval with more collisions

Link Layer 5-20

CSMACD efficiency

Tprop = max prop delay between 2 nodes in LAN ttrans = time to transmit max-size frame

efficiency goes to 1 as tprop goes to 0 as ttrans goes to infinity

better performance than ALOHA and simple cheap decentralized

transprop ttefficiency

51

1

5 DataLink Layer 5-21

ldquoTaking Turnsrdquo MAC protocols

channel partitioning MAC protocols share channel efficiently and fairly at high

load inefficient at low load delay in channel

access 1N bandwidth allocated even if only 1 active node

Random access MAC protocols efficient at low load single node can fully

utilize channel high load collision overhead

ldquotaking turnsrdquo protocolslook for best of both worlds

5 DataLink Layer 5-22

ldquoTaking Turnsrdquo MAC protocols

Polling controller node

ldquoinvitesrdquo client nodes to transmit in turn

typically used with ldquodumbrdquo client devices

concerns polling overhead latency single point of

failure (controller)

controller

clients

poll

data

data

5 DataLink Layer 5-23

ldquoTaking Turnsrdquo MAC protocolsToken passing control token

passed from one node to next sequentially

token message concerns

token overhead latency single point of failure

(token)

T

data

(nothingto send)

T

cable headend

CMTS

ISP

cable modemtermination system

multiple 40Mbps downstream (broadcast) channels single CMTS transmits into channels

multiple 30 Mbps upstream channels multiple access all users contend for certain

upstream channel time slots (others assigned)

Cable access network

cablemodem

splitter

hellip

hellip

Internet framesTV channels control transmitted downstream at different frequencies

upstream Internet frames TV control transmitted upstream at different frequencies in time slots

Link Layer 5-25

DOCSIS data over cable service interface spec

FDM over upstream downstream frequency channels

TDM upstream some slots assigned some have contention downstream MAP frame assigns upstream

slots request for upstream slots (and data)

transmitted random access (binary backoff) in selected slots

MAP frame forInterval [t1 t2]

Residences with cable modems

Downstream channel i

Upstream channel j

t1 t2

Assigned minislots containing cable modemupstream data frames

Minislots containing minislots request frames

cable headend

CMTS

Cable access network

5 DataLink Layer 5-26

Summary of MAC protocols

channel partitioning by time frequency or code Time Division Frequency Division

random access (dynamic) ALOHA S-ALOHA CSMA CSMACD carrier sensing easy in some technologies (wire)

hard in others (wireless) CSMACD used in Ethernet CSMACA used in 80211

taking turns polling from central site token passing Bluetooth FDDI IBM Token Ring

  • Slide 1
  • Link Layer
  • Multiple Access Links and Protocols
  • Multiple Access protocols
  • Ideal Multiple Access Protocol
  • MAC Protocols a taxonomy
  • Channel Partitioning MAC protocols TDMA
  • Channel Partitioning MAC protocols FDMA
  • Random Access Protocols
  • Slotted ALOHA
  • Slotted ALOHA (2)
  • Slotted Aloha efficiency
  • Pure (unslotted) ALOHA
  • Pure Aloha efficiency
  • CSMA (Carrier Sense Multiple Access)
  • CSMA collisions
  • CSMACD (Collision Detection)
  • CSMACD collision detection
  • Ethernet CSMACD algorithm
  • CSMACD efficiency
  • ldquoTaking Turnsrdquo MAC protocols
  • ldquoTaking Turnsrdquo MAC protocols (2)
  • ldquoTaking Turnsrdquo MAC protocols (3)
  • Slide 24
  • Slide 25
  • Summary of MAC protocols
Page 3: 5: DataLink Layer5-1 Chapter 5 Link Layer and LANs Part 3: MAC Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley

5 DataLink Layer 5-3

Multiple Access Links and Protocols

Two types of ldquolinksrdquo point-to-point

PPP for dial-up access point-to-point link between Ethernet switch and host

broadcast (shared wire or medium) old-fashioned Ethernet upstream HFC 80211 wireless LAN

shared wire (eg cabled Ethernet)

shared RF (eg 80211 WiFi)

shared RF(satellite)

humans at acocktail party

(shared air acoustical)

5 DataLink Layer 5-4

Multiple Access protocols single shared broadcast channel two or more simultaneous transmissions by nodes

interference collision if node receives two or more signals at the same

time

multiple access protocol distributed algorithm that determines how nodes

share channel ie determine when node can transmit

communication about channel sharing must use channel itself no out-of-band channel for coordination

5 DataLink Layer 5-5

Ideal Multiple Access Protocol

Broadcast channel of rate R bps1 when one node wants to transmit it can send

at rate R2 when M nodes want to transmit each can

send at average rate RM3 fully decentralized

no special node to coordinate transmissions no synchronization of clocks slots

4 simple

5 DataLink Layer 5-6

MAC Protocols a taxonomy

Three broad classes Channel Partitioning

divide channel into smaller ldquopiecesrdquo (time slots frequency code)

allocate piece to node for exclusive use Random Access

channel not divided allow collisions ldquorecoverrdquo from collisions

ldquoTaking turnsrdquo nodes take turns but nodes with more to send can

take longer turns

5 DataLink Layer 5-7

Channel Partitioning MAC protocols TDMA

TDMA time division multiple access access to channel in rounds each station gets fixed length slot (length =

pkt trans time) in each round unused slots go idle example 6-station LAN 134 have pkt slots

256 idle

1 3 4 1 3 4

6-slotframe

5 DataLink Layer 5-8

Channel Partitioning MAC protocols FDMA

FDMA frequency division multiple access channel spectrum divided into frequency bands each station assigned fixed frequency band unused transmission time in frequency bands go

idle example 6-station LAN 134 have pkt

frequency bands 256 idle fr

eq

uency

bands time

FDM cable

5 DataLink Layer 5-9

Random Access Protocols

When node has packet to send transmit at full channel data rate R no a priori coordination among nodes

two or more transmitting nodes ldquocollisionrdquo random access MAC protocol specifies

how to detect collisions how to recover from collisions (eg via delayed

retransmissions) Examples of random access MAC protocols

slotted ALOHA ALOHA CSMA CSMACD CSMACA

5 DataLink Layer 5-10

Slotted ALOHA

Assumptions all frames same size time divided into

equal size slots (time to transmit 1 frame)

nodes start to transmit only slot beginning

nodes are synchronized

if 2 or more nodes transmit in slot all nodes detect collision

Operation when node obtains fresh

frame transmits in next slot if no collision node

can send new frame in next slot

if collision node retransmits frame in each subsequent slot with prob p until success

5 DataLink Layer 5-11

Slotted ALOHA

Pros single active node

can continuously transmit at full rate of channel

highly decentralized only slots in nodes need to be in sync

simple

Cons collisions wasting

slots idle slots nodes may be able

to detect collision in less than time to transmit packet

clock synchronization

5 DataLink Layer 5-12

Slotted Aloha efficiency

suppose N nodes with many frames to send each transmits in slot with probability p

prob that given node has success in a slot = p(1-p)N-1

prob that any node has a success = Np(1-p)N-1

max efficiency find p that maximizes Np(1-p)N-1

for many nodes take limit of Np(1-p)N-1

as N goes to infinity gives

Max efficiency = 1e = 37

Efficiency long-run fraction of successful slots (many nodes all with many frames to send)

At best channelused for useful transmissions 37of time

5 DataLink Layer 5-13

Pure (unslotted) ALOHA unslotted Aloha simpler no synchronization when frame first arrives

transmit immediately collision probability increases

frame sent at t0 collides with other frames sent in [t0-1t0+1]

5 DataLink Layer 5-14

Pure Aloha efficiency

P(success by given node) = P(node transmits)

P(no other node transmits in [p0-1p0]

P(no other node transmits in [p0-1p0]

= p (1-p)N-1 (1-p)N-1

= p (1-p)2(N-1)

hellip choosing optimum p and then letting n -gt infty

= 1(2e) = 18 even worse than slotted Aloha

5 DataLink Layer 5-15

CSMA (Carrier Sense Multiple Access)

CSMA listen before transmitIf channel sensed idle transmit entire frame If channel sensed busy defer transmission

human analogy donrsquot interrupt others

5 DataLink Layer 5-16

CSMA collisions

collisions can still occurpropagation delay means two nodes may not heareach otherrsquos transmissioncollisionentire packet transmission time wasted

spatial layout of nodes

noterole of distance amp propagation delay in determining collision probability

5 DataLink Layer 5-17

CSMACD (Collision Detection)CSMACD carrier sensing deferral as in

CSMA collisions detected within short time colliding transmissions aborted reducing

channel wastage collision detection

easy in wired LANs measure signal strengths compare transmitted received signals

difficult in wireless LANs received signal strength overwhelmed by local transmission strength

human analogy the polite conversationalist

5 DataLink Layer 5-18

CSMACD collision detection

Link Layer 5-19

Ethernet CSMACD algorithm

1 NIC receives datagram from network layer creates frame

2 If NIC senses channel idle starts frame transmission If NIC senses channel busy waits until channel idle then transmits

3 If NIC transmits entire frame without detecting another transmission NIC is done with frame

4 If NIC detects another transmission while transmitting aborts and sends jam signal

5 After aborting NIC enters binary (exponential) backoff after mth collision NIC

chooses K at random from 012 hellip 2m-1 NIC waits K512 bit times returns to Step 2

longer backoff interval with more collisions

Link Layer 5-20

CSMACD efficiency

Tprop = max prop delay between 2 nodes in LAN ttrans = time to transmit max-size frame

efficiency goes to 1 as tprop goes to 0 as ttrans goes to infinity

better performance than ALOHA and simple cheap decentralized

transprop ttefficiency

51

1

5 DataLink Layer 5-21

ldquoTaking Turnsrdquo MAC protocols

channel partitioning MAC protocols share channel efficiently and fairly at high

load inefficient at low load delay in channel

access 1N bandwidth allocated even if only 1 active node

Random access MAC protocols efficient at low load single node can fully

utilize channel high load collision overhead

ldquotaking turnsrdquo protocolslook for best of both worlds

5 DataLink Layer 5-22

ldquoTaking Turnsrdquo MAC protocols

Polling controller node

ldquoinvitesrdquo client nodes to transmit in turn

typically used with ldquodumbrdquo client devices

concerns polling overhead latency single point of

failure (controller)

controller

clients

poll

data

data

5 DataLink Layer 5-23

ldquoTaking Turnsrdquo MAC protocolsToken passing control token

passed from one node to next sequentially

token message concerns

token overhead latency single point of failure

(token)

T

data

(nothingto send)

T

cable headend

CMTS

ISP

cable modemtermination system

multiple 40Mbps downstream (broadcast) channels single CMTS transmits into channels

multiple 30 Mbps upstream channels multiple access all users contend for certain

upstream channel time slots (others assigned)

Cable access network

cablemodem

splitter

hellip

hellip

Internet framesTV channels control transmitted downstream at different frequencies

upstream Internet frames TV control transmitted upstream at different frequencies in time slots

Link Layer 5-25

DOCSIS data over cable service interface spec

FDM over upstream downstream frequency channels

TDM upstream some slots assigned some have contention downstream MAP frame assigns upstream

slots request for upstream slots (and data)

transmitted random access (binary backoff) in selected slots

MAP frame forInterval [t1 t2]

Residences with cable modems

Downstream channel i

Upstream channel j

t1 t2

Assigned minislots containing cable modemupstream data frames

Minislots containing minislots request frames

cable headend

CMTS

Cable access network

5 DataLink Layer 5-26

Summary of MAC protocols

channel partitioning by time frequency or code Time Division Frequency Division

random access (dynamic) ALOHA S-ALOHA CSMA CSMACD carrier sensing easy in some technologies (wire)

hard in others (wireless) CSMACD used in Ethernet CSMACA used in 80211

taking turns polling from central site token passing Bluetooth FDDI IBM Token Ring

  • Slide 1
  • Link Layer
  • Multiple Access Links and Protocols
  • Multiple Access protocols
  • Ideal Multiple Access Protocol
  • MAC Protocols a taxonomy
  • Channel Partitioning MAC protocols TDMA
  • Channel Partitioning MAC protocols FDMA
  • Random Access Protocols
  • Slotted ALOHA
  • Slotted ALOHA (2)
  • Slotted Aloha efficiency
  • Pure (unslotted) ALOHA
  • Pure Aloha efficiency
  • CSMA (Carrier Sense Multiple Access)
  • CSMA collisions
  • CSMACD (Collision Detection)
  • CSMACD collision detection
  • Ethernet CSMACD algorithm
  • CSMACD efficiency
  • ldquoTaking Turnsrdquo MAC protocols
  • ldquoTaking Turnsrdquo MAC protocols (2)
  • ldquoTaking Turnsrdquo MAC protocols (3)
  • Slide 24
  • Slide 25
  • Summary of MAC protocols
Page 4: 5: DataLink Layer5-1 Chapter 5 Link Layer and LANs Part 3: MAC Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley

5 DataLink Layer 5-4

Multiple Access protocols single shared broadcast channel two or more simultaneous transmissions by nodes

interference collision if node receives two or more signals at the same

time

multiple access protocol distributed algorithm that determines how nodes

share channel ie determine when node can transmit

communication about channel sharing must use channel itself no out-of-band channel for coordination

5 DataLink Layer 5-5

Ideal Multiple Access Protocol

Broadcast channel of rate R bps1 when one node wants to transmit it can send

at rate R2 when M nodes want to transmit each can

send at average rate RM3 fully decentralized

no special node to coordinate transmissions no synchronization of clocks slots

4 simple

5 DataLink Layer 5-6

MAC Protocols a taxonomy

Three broad classes Channel Partitioning

divide channel into smaller ldquopiecesrdquo (time slots frequency code)

allocate piece to node for exclusive use Random Access

channel not divided allow collisions ldquorecoverrdquo from collisions

ldquoTaking turnsrdquo nodes take turns but nodes with more to send can

take longer turns

5 DataLink Layer 5-7

Channel Partitioning MAC protocols TDMA

TDMA time division multiple access access to channel in rounds each station gets fixed length slot (length =

pkt trans time) in each round unused slots go idle example 6-station LAN 134 have pkt slots

256 idle

1 3 4 1 3 4

6-slotframe

5 DataLink Layer 5-8

Channel Partitioning MAC protocols FDMA

FDMA frequency division multiple access channel spectrum divided into frequency bands each station assigned fixed frequency band unused transmission time in frequency bands go

idle example 6-station LAN 134 have pkt

frequency bands 256 idle fr

eq

uency

bands time

FDM cable

5 DataLink Layer 5-9

Random Access Protocols

When node has packet to send transmit at full channel data rate R no a priori coordination among nodes

two or more transmitting nodes ldquocollisionrdquo random access MAC protocol specifies

how to detect collisions how to recover from collisions (eg via delayed

retransmissions) Examples of random access MAC protocols

slotted ALOHA ALOHA CSMA CSMACD CSMACA

5 DataLink Layer 5-10

Slotted ALOHA

Assumptions all frames same size time divided into

equal size slots (time to transmit 1 frame)

nodes start to transmit only slot beginning

nodes are synchronized

if 2 or more nodes transmit in slot all nodes detect collision

Operation when node obtains fresh

frame transmits in next slot if no collision node

can send new frame in next slot

if collision node retransmits frame in each subsequent slot with prob p until success

5 DataLink Layer 5-11

Slotted ALOHA

Pros single active node

can continuously transmit at full rate of channel

highly decentralized only slots in nodes need to be in sync

simple

Cons collisions wasting

slots idle slots nodes may be able

to detect collision in less than time to transmit packet

clock synchronization

5 DataLink Layer 5-12

Slotted Aloha efficiency

suppose N nodes with many frames to send each transmits in slot with probability p

prob that given node has success in a slot = p(1-p)N-1

prob that any node has a success = Np(1-p)N-1

max efficiency find p that maximizes Np(1-p)N-1

for many nodes take limit of Np(1-p)N-1

as N goes to infinity gives

Max efficiency = 1e = 37

Efficiency long-run fraction of successful slots (many nodes all with many frames to send)

At best channelused for useful transmissions 37of time

5 DataLink Layer 5-13

Pure (unslotted) ALOHA unslotted Aloha simpler no synchronization when frame first arrives

transmit immediately collision probability increases

frame sent at t0 collides with other frames sent in [t0-1t0+1]

5 DataLink Layer 5-14

Pure Aloha efficiency

P(success by given node) = P(node transmits)

P(no other node transmits in [p0-1p0]

P(no other node transmits in [p0-1p0]

= p (1-p)N-1 (1-p)N-1

= p (1-p)2(N-1)

hellip choosing optimum p and then letting n -gt infty

= 1(2e) = 18 even worse than slotted Aloha

5 DataLink Layer 5-15

CSMA (Carrier Sense Multiple Access)

CSMA listen before transmitIf channel sensed idle transmit entire frame If channel sensed busy defer transmission

human analogy donrsquot interrupt others

5 DataLink Layer 5-16

CSMA collisions

collisions can still occurpropagation delay means two nodes may not heareach otherrsquos transmissioncollisionentire packet transmission time wasted

spatial layout of nodes

noterole of distance amp propagation delay in determining collision probability

5 DataLink Layer 5-17

CSMACD (Collision Detection)CSMACD carrier sensing deferral as in

CSMA collisions detected within short time colliding transmissions aborted reducing

channel wastage collision detection

easy in wired LANs measure signal strengths compare transmitted received signals

difficult in wireless LANs received signal strength overwhelmed by local transmission strength

human analogy the polite conversationalist

5 DataLink Layer 5-18

CSMACD collision detection

Link Layer 5-19

Ethernet CSMACD algorithm

1 NIC receives datagram from network layer creates frame

2 If NIC senses channel idle starts frame transmission If NIC senses channel busy waits until channel idle then transmits

3 If NIC transmits entire frame without detecting another transmission NIC is done with frame

4 If NIC detects another transmission while transmitting aborts and sends jam signal

5 After aborting NIC enters binary (exponential) backoff after mth collision NIC

chooses K at random from 012 hellip 2m-1 NIC waits K512 bit times returns to Step 2

longer backoff interval with more collisions

Link Layer 5-20

CSMACD efficiency

Tprop = max prop delay between 2 nodes in LAN ttrans = time to transmit max-size frame

efficiency goes to 1 as tprop goes to 0 as ttrans goes to infinity

better performance than ALOHA and simple cheap decentralized

transprop ttefficiency

51

1

5 DataLink Layer 5-21

ldquoTaking Turnsrdquo MAC protocols

channel partitioning MAC protocols share channel efficiently and fairly at high

load inefficient at low load delay in channel

access 1N bandwidth allocated even if only 1 active node

Random access MAC protocols efficient at low load single node can fully

utilize channel high load collision overhead

ldquotaking turnsrdquo protocolslook for best of both worlds

5 DataLink Layer 5-22

ldquoTaking Turnsrdquo MAC protocols

Polling controller node

ldquoinvitesrdquo client nodes to transmit in turn

typically used with ldquodumbrdquo client devices

concerns polling overhead latency single point of

failure (controller)

controller

clients

poll

data

data

5 DataLink Layer 5-23

ldquoTaking Turnsrdquo MAC protocolsToken passing control token

passed from one node to next sequentially

token message concerns

token overhead latency single point of failure

(token)

T

data

(nothingto send)

T

cable headend

CMTS

ISP

cable modemtermination system

multiple 40Mbps downstream (broadcast) channels single CMTS transmits into channels

multiple 30 Mbps upstream channels multiple access all users contend for certain

upstream channel time slots (others assigned)

Cable access network

cablemodem

splitter

hellip

hellip

Internet framesTV channels control transmitted downstream at different frequencies

upstream Internet frames TV control transmitted upstream at different frequencies in time slots

Link Layer 5-25

DOCSIS data over cable service interface spec

FDM over upstream downstream frequency channels

TDM upstream some slots assigned some have contention downstream MAP frame assigns upstream

slots request for upstream slots (and data)

transmitted random access (binary backoff) in selected slots

MAP frame forInterval [t1 t2]

Residences with cable modems

Downstream channel i

Upstream channel j

t1 t2

Assigned minislots containing cable modemupstream data frames

Minislots containing minislots request frames

cable headend

CMTS

Cable access network

5 DataLink Layer 5-26

Summary of MAC protocols

channel partitioning by time frequency or code Time Division Frequency Division

random access (dynamic) ALOHA S-ALOHA CSMA CSMACD carrier sensing easy in some technologies (wire)

hard in others (wireless) CSMACD used in Ethernet CSMACA used in 80211

taking turns polling from central site token passing Bluetooth FDDI IBM Token Ring

  • Slide 1
  • Link Layer
  • Multiple Access Links and Protocols
  • Multiple Access protocols
  • Ideal Multiple Access Protocol
  • MAC Protocols a taxonomy
  • Channel Partitioning MAC protocols TDMA
  • Channel Partitioning MAC protocols FDMA
  • Random Access Protocols
  • Slotted ALOHA
  • Slotted ALOHA (2)
  • Slotted Aloha efficiency
  • Pure (unslotted) ALOHA
  • Pure Aloha efficiency
  • CSMA (Carrier Sense Multiple Access)
  • CSMA collisions
  • CSMACD (Collision Detection)
  • CSMACD collision detection
  • Ethernet CSMACD algorithm
  • CSMACD efficiency
  • ldquoTaking Turnsrdquo MAC protocols
  • ldquoTaking Turnsrdquo MAC protocols (2)
  • ldquoTaking Turnsrdquo MAC protocols (3)
  • Slide 24
  • Slide 25
  • Summary of MAC protocols
Page 5: 5: DataLink Layer5-1 Chapter 5 Link Layer and LANs Part 3: MAC Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley

5 DataLink Layer 5-5

Ideal Multiple Access Protocol

Broadcast channel of rate R bps1 when one node wants to transmit it can send

at rate R2 when M nodes want to transmit each can

send at average rate RM3 fully decentralized

no special node to coordinate transmissions no synchronization of clocks slots

4 simple

5 DataLink Layer 5-6

MAC Protocols a taxonomy

Three broad classes Channel Partitioning

divide channel into smaller ldquopiecesrdquo (time slots frequency code)

allocate piece to node for exclusive use Random Access

channel not divided allow collisions ldquorecoverrdquo from collisions

ldquoTaking turnsrdquo nodes take turns but nodes with more to send can

take longer turns

5 DataLink Layer 5-7

Channel Partitioning MAC protocols TDMA

TDMA time division multiple access access to channel in rounds each station gets fixed length slot (length =

pkt trans time) in each round unused slots go idle example 6-station LAN 134 have pkt slots

256 idle

1 3 4 1 3 4

6-slotframe

5 DataLink Layer 5-8

Channel Partitioning MAC protocols FDMA

FDMA frequency division multiple access channel spectrum divided into frequency bands each station assigned fixed frequency band unused transmission time in frequency bands go

idle example 6-station LAN 134 have pkt

frequency bands 256 idle fr

eq

uency

bands time

FDM cable

5 DataLink Layer 5-9

Random Access Protocols

When node has packet to send transmit at full channel data rate R no a priori coordination among nodes

two or more transmitting nodes ldquocollisionrdquo random access MAC protocol specifies

how to detect collisions how to recover from collisions (eg via delayed

retransmissions) Examples of random access MAC protocols

slotted ALOHA ALOHA CSMA CSMACD CSMACA

5 DataLink Layer 5-10

Slotted ALOHA

Assumptions all frames same size time divided into

equal size slots (time to transmit 1 frame)

nodes start to transmit only slot beginning

nodes are synchronized

if 2 or more nodes transmit in slot all nodes detect collision

Operation when node obtains fresh

frame transmits in next slot if no collision node

can send new frame in next slot

if collision node retransmits frame in each subsequent slot with prob p until success

5 DataLink Layer 5-11

Slotted ALOHA

Pros single active node

can continuously transmit at full rate of channel

highly decentralized only slots in nodes need to be in sync

simple

Cons collisions wasting

slots idle slots nodes may be able

to detect collision in less than time to transmit packet

clock synchronization

5 DataLink Layer 5-12

Slotted Aloha efficiency

suppose N nodes with many frames to send each transmits in slot with probability p

prob that given node has success in a slot = p(1-p)N-1

prob that any node has a success = Np(1-p)N-1

max efficiency find p that maximizes Np(1-p)N-1

for many nodes take limit of Np(1-p)N-1

as N goes to infinity gives

Max efficiency = 1e = 37

Efficiency long-run fraction of successful slots (many nodes all with many frames to send)

At best channelused for useful transmissions 37of time

5 DataLink Layer 5-13

Pure (unslotted) ALOHA unslotted Aloha simpler no synchronization when frame first arrives

transmit immediately collision probability increases

frame sent at t0 collides with other frames sent in [t0-1t0+1]

5 DataLink Layer 5-14

Pure Aloha efficiency

P(success by given node) = P(node transmits)

P(no other node transmits in [p0-1p0]

P(no other node transmits in [p0-1p0]

= p (1-p)N-1 (1-p)N-1

= p (1-p)2(N-1)

hellip choosing optimum p and then letting n -gt infty

= 1(2e) = 18 even worse than slotted Aloha

5 DataLink Layer 5-15

CSMA (Carrier Sense Multiple Access)

CSMA listen before transmitIf channel sensed idle transmit entire frame If channel sensed busy defer transmission

human analogy donrsquot interrupt others

5 DataLink Layer 5-16

CSMA collisions

collisions can still occurpropagation delay means two nodes may not heareach otherrsquos transmissioncollisionentire packet transmission time wasted

spatial layout of nodes

noterole of distance amp propagation delay in determining collision probability

5 DataLink Layer 5-17

CSMACD (Collision Detection)CSMACD carrier sensing deferral as in

CSMA collisions detected within short time colliding transmissions aborted reducing

channel wastage collision detection

easy in wired LANs measure signal strengths compare transmitted received signals

difficult in wireless LANs received signal strength overwhelmed by local transmission strength

human analogy the polite conversationalist

5 DataLink Layer 5-18

CSMACD collision detection

Link Layer 5-19

Ethernet CSMACD algorithm

1 NIC receives datagram from network layer creates frame

2 If NIC senses channel idle starts frame transmission If NIC senses channel busy waits until channel idle then transmits

3 If NIC transmits entire frame without detecting another transmission NIC is done with frame

4 If NIC detects another transmission while transmitting aborts and sends jam signal

5 After aborting NIC enters binary (exponential) backoff after mth collision NIC

chooses K at random from 012 hellip 2m-1 NIC waits K512 bit times returns to Step 2

longer backoff interval with more collisions

Link Layer 5-20

CSMACD efficiency

Tprop = max prop delay between 2 nodes in LAN ttrans = time to transmit max-size frame

efficiency goes to 1 as tprop goes to 0 as ttrans goes to infinity

better performance than ALOHA and simple cheap decentralized

transprop ttefficiency

51

1

5 DataLink Layer 5-21

ldquoTaking Turnsrdquo MAC protocols

channel partitioning MAC protocols share channel efficiently and fairly at high

load inefficient at low load delay in channel

access 1N bandwidth allocated even if only 1 active node

Random access MAC protocols efficient at low load single node can fully

utilize channel high load collision overhead

ldquotaking turnsrdquo protocolslook for best of both worlds

5 DataLink Layer 5-22

ldquoTaking Turnsrdquo MAC protocols

Polling controller node

ldquoinvitesrdquo client nodes to transmit in turn

typically used with ldquodumbrdquo client devices

concerns polling overhead latency single point of

failure (controller)

controller

clients

poll

data

data

5 DataLink Layer 5-23

ldquoTaking Turnsrdquo MAC protocolsToken passing control token

passed from one node to next sequentially

token message concerns

token overhead latency single point of failure

(token)

T

data

(nothingto send)

T

cable headend

CMTS

ISP

cable modemtermination system

multiple 40Mbps downstream (broadcast) channels single CMTS transmits into channels

multiple 30 Mbps upstream channels multiple access all users contend for certain

upstream channel time slots (others assigned)

Cable access network

cablemodem

splitter

hellip

hellip

Internet framesTV channels control transmitted downstream at different frequencies

upstream Internet frames TV control transmitted upstream at different frequencies in time slots

Link Layer 5-25

DOCSIS data over cable service interface spec

FDM over upstream downstream frequency channels

TDM upstream some slots assigned some have contention downstream MAP frame assigns upstream

slots request for upstream slots (and data)

transmitted random access (binary backoff) in selected slots

MAP frame forInterval [t1 t2]

Residences with cable modems

Downstream channel i

Upstream channel j

t1 t2

Assigned minislots containing cable modemupstream data frames

Minislots containing minislots request frames

cable headend

CMTS

Cable access network

5 DataLink Layer 5-26

Summary of MAC protocols

channel partitioning by time frequency or code Time Division Frequency Division

random access (dynamic) ALOHA S-ALOHA CSMA CSMACD carrier sensing easy in some technologies (wire)

hard in others (wireless) CSMACD used in Ethernet CSMACA used in 80211

taking turns polling from central site token passing Bluetooth FDDI IBM Token Ring

  • Slide 1
  • Link Layer
  • Multiple Access Links and Protocols
  • Multiple Access protocols
  • Ideal Multiple Access Protocol
  • MAC Protocols a taxonomy
  • Channel Partitioning MAC protocols TDMA
  • Channel Partitioning MAC protocols FDMA
  • Random Access Protocols
  • Slotted ALOHA
  • Slotted ALOHA (2)
  • Slotted Aloha efficiency
  • Pure (unslotted) ALOHA
  • Pure Aloha efficiency
  • CSMA (Carrier Sense Multiple Access)
  • CSMA collisions
  • CSMACD (Collision Detection)
  • CSMACD collision detection
  • Ethernet CSMACD algorithm
  • CSMACD efficiency
  • ldquoTaking Turnsrdquo MAC protocols
  • ldquoTaking Turnsrdquo MAC protocols (2)
  • ldquoTaking Turnsrdquo MAC protocols (3)
  • Slide 24
  • Slide 25
  • Summary of MAC protocols
Page 6: 5: DataLink Layer5-1 Chapter 5 Link Layer and LANs Part 3: MAC Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley

5 DataLink Layer 5-6

MAC Protocols a taxonomy

Three broad classes Channel Partitioning

divide channel into smaller ldquopiecesrdquo (time slots frequency code)

allocate piece to node for exclusive use Random Access

channel not divided allow collisions ldquorecoverrdquo from collisions

ldquoTaking turnsrdquo nodes take turns but nodes with more to send can

take longer turns

5 DataLink Layer 5-7

Channel Partitioning MAC protocols TDMA

TDMA time division multiple access access to channel in rounds each station gets fixed length slot (length =

pkt trans time) in each round unused slots go idle example 6-station LAN 134 have pkt slots

256 idle

1 3 4 1 3 4

6-slotframe

5 DataLink Layer 5-8

Channel Partitioning MAC protocols FDMA

FDMA frequency division multiple access channel spectrum divided into frequency bands each station assigned fixed frequency band unused transmission time in frequency bands go

idle example 6-station LAN 134 have pkt

frequency bands 256 idle fr

eq

uency

bands time

FDM cable

5 DataLink Layer 5-9

Random Access Protocols

When node has packet to send transmit at full channel data rate R no a priori coordination among nodes

two or more transmitting nodes ldquocollisionrdquo random access MAC protocol specifies

how to detect collisions how to recover from collisions (eg via delayed

retransmissions) Examples of random access MAC protocols

slotted ALOHA ALOHA CSMA CSMACD CSMACA

5 DataLink Layer 5-10

Slotted ALOHA

Assumptions all frames same size time divided into

equal size slots (time to transmit 1 frame)

nodes start to transmit only slot beginning

nodes are synchronized

if 2 or more nodes transmit in slot all nodes detect collision

Operation when node obtains fresh

frame transmits in next slot if no collision node

can send new frame in next slot

if collision node retransmits frame in each subsequent slot with prob p until success

5 DataLink Layer 5-11

Slotted ALOHA

Pros single active node

can continuously transmit at full rate of channel

highly decentralized only slots in nodes need to be in sync

simple

Cons collisions wasting

slots idle slots nodes may be able

to detect collision in less than time to transmit packet

clock synchronization

5 DataLink Layer 5-12

Slotted Aloha efficiency

suppose N nodes with many frames to send each transmits in slot with probability p

prob that given node has success in a slot = p(1-p)N-1

prob that any node has a success = Np(1-p)N-1

max efficiency find p that maximizes Np(1-p)N-1

for many nodes take limit of Np(1-p)N-1

as N goes to infinity gives

Max efficiency = 1e = 37

Efficiency long-run fraction of successful slots (many nodes all with many frames to send)

At best channelused for useful transmissions 37of time

5 DataLink Layer 5-13

Pure (unslotted) ALOHA unslotted Aloha simpler no synchronization when frame first arrives

transmit immediately collision probability increases

frame sent at t0 collides with other frames sent in [t0-1t0+1]

5 DataLink Layer 5-14

Pure Aloha efficiency

P(success by given node) = P(node transmits)

P(no other node transmits in [p0-1p0]

P(no other node transmits in [p0-1p0]

= p (1-p)N-1 (1-p)N-1

= p (1-p)2(N-1)

hellip choosing optimum p and then letting n -gt infty

= 1(2e) = 18 even worse than slotted Aloha

5 DataLink Layer 5-15

CSMA (Carrier Sense Multiple Access)

CSMA listen before transmitIf channel sensed idle transmit entire frame If channel sensed busy defer transmission

human analogy donrsquot interrupt others

5 DataLink Layer 5-16

CSMA collisions

collisions can still occurpropagation delay means two nodes may not heareach otherrsquos transmissioncollisionentire packet transmission time wasted

spatial layout of nodes

noterole of distance amp propagation delay in determining collision probability

5 DataLink Layer 5-17

CSMACD (Collision Detection)CSMACD carrier sensing deferral as in

CSMA collisions detected within short time colliding transmissions aborted reducing

channel wastage collision detection

easy in wired LANs measure signal strengths compare transmitted received signals

difficult in wireless LANs received signal strength overwhelmed by local transmission strength

human analogy the polite conversationalist

5 DataLink Layer 5-18

CSMACD collision detection

Link Layer 5-19

Ethernet CSMACD algorithm

1 NIC receives datagram from network layer creates frame

2 If NIC senses channel idle starts frame transmission If NIC senses channel busy waits until channel idle then transmits

3 If NIC transmits entire frame without detecting another transmission NIC is done with frame

4 If NIC detects another transmission while transmitting aborts and sends jam signal

5 After aborting NIC enters binary (exponential) backoff after mth collision NIC

chooses K at random from 012 hellip 2m-1 NIC waits K512 bit times returns to Step 2

longer backoff interval with more collisions

Link Layer 5-20

CSMACD efficiency

Tprop = max prop delay between 2 nodes in LAN ttrans = time to transmit max-size frame

efficiency goes to 1 as tprop goes to 0 as ttrans goes to infinity

better performance than ALOHA and simple cheap decentralized

transprop ttefficiency

51

1

5 DataLink Layer 5-21

ldquoTaking Turnsrdquo MAC protocols

channel partitioning MAC protocols share channel efficiently and fairly at high

load inefficient at low load delay in channel

access 1N bandwidth allocated even if only 1 active node

Random access MAC protocols efficient at low load single node can fully

utilize channel high load collision overhead

ldquotaking turnsrdquo protocolslook for best of both worlds

5 DataLink Layer 5-22

ldquoTaking Turnsrdquo MAC protocols

Polling controller node

ldquoinvitesrdquo client nodes to transmit in turn

typically used with ldquodumbrdquo client devices

concerns polling overhead latency single point of

failure (controller)

controller

clients

poll

data

data

5 DataLink Layer 5-23

ldquoTaking Turnsrdquo MAC protocolsToken passing control token

passed from one node to next sequentially

token message concerns

token overhead latency single point of failure

(token)

T

data

(nothingto send)

T

cable headend

CMTS

ISP

cable modemtermination system

multiple 40Mbps downstream (broadcast) channels single CMTS transmits into channels

multiple 30 Mbps upstream channels multiple access all users contend for certain

upstream channel time slots (others assigned)

Cable access network

cablemodem

splitter

hellip

hellip

Internet framesTV channels control transmitted downstream at different frequencies

upstream Internet frames TV control transmitted upstream at different frequencies in time slots

Link Layer 5-25

DOCSIS data over cable service interface spec

FDM over upstream downstream frequency channels

TDM upstream some slots assigned some have contention downstream MAP frame assigns upstream

slots request for upstream slots (and data)

transmitted random access (binary backoff) in selected slots

MAP frame forInterval [t1 t2]

Residences with cable modems

Downstream channel i

Upstream channel j

t1 t2

Assigned minislots containing cable modemupstream data frames

Minislots containing minislots request frames

cable headend

CMTS

Cable access network

5 DataLink Layer 5-26

Summary of MAC protocols

channel partitioning by time frequency or code Time Division Frequency Division

random access (dynamic) ALOHA S-ALOHA CSMA CSMACD carrier sensing easy in some technologies (wire)

hard in others (wireless) CSMACD used in Ethernet CSMACA used in 80211

taking turns polling from central site token passing Bluetooth FDDI IBM Token Ring

  • Slide 1
  • Link Layer
  • Multiple Access Links and Protocols
  • Multiple Access protocols
  • Ideal Multiple Access Protocol
  • MAC Protocols a taxonomy
  • Channel Partitioning MAC protocols TDMA
  • Channel Partitioning MAC protocols FDMA
  • Random Access Protocols
  • Slotted ALOHA
  • Slotted ALOHA (2)
  • Slotted Aloha efficiency
  • Pure (unslotted) ALOHA
  • Pure Aloha efficiency
  • CSMA (Carrier Sense Multiple Access)
  • CSMA collisions
  • CSMACD (Collision Detection)
  • CSMACD collision detection
  • Ethernet CSMACD algorithm
  • CSMACD efficiency
  • ldquoTaking Turnsrdquo MAC protocols
  • ldquoTaking Turnsrdquo MAC protocols (2)
  • ldquoTaking Turnsrdquo MAC protocols (3)
  • Slide 24
  • Slide 25
  • Summary of MAC protocols
Page 7: 5: DataLink Layer5-1 Chapter 5 Link Layer and LANs Part 3: MAC Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley

5 DataLink Layer 5-7

Channel Partitioning MAC protocols TDMA

TDMA time division multiple access access to channel in rounds each station gets fixed length slot (length =

pkt trans time) in each round unused slots go idle example 6-station LAN 134 have pkt slots

256 idle

1 3 4 1 3 4

6-slotframe

5 DataLink Layer 5-8

Channel Partitioning MAC protocols FDMA

FDMA frequency division multiple access channel spectrum divided into frequency bands each station assigned fixed frequency band unused transmission time in frequency bands go

idle example 6-station LAN 134 have pkt

frequency bands 256 idle fr

eq

uency

bands time

FDM cable

5 DataLink Layer 5-9

Random Access Protocols

When node has packet to send transmit at full channel data rate R no a priori coordination among nodes

two or more transmitting nodes ldquocollisionrdquo random access MAC protocol specifies

how to detect collisions how to recover from collisions (eg via delayed

retransmissions) Examples of random access MAC protocols

slotted ALOHA ALOHA CSMA CSMACD CSMACA

5 DataLink Layer 5-10

Slotted ALOHA

Assumptions all frames same size time divided into

equal size slots (time to transmit 1 frame)

nodes start to transmit only slot beginning

nodes are synchronized

if 2 or more nodes transmit in slot all nodes detect collision

Operation when node obtains fresh

frame transmits in next slot if no collision node

can send new frame in next slot

if collision node retransmits frame in each subsequent slot with prob p until success

5 DataLink Layer 5-11

Slotted ALOHA

Pros single active node

can continuously transmit at full rate of channel

highly decentralized only slots in nodes need to be in sync

simple

Cons collisions wasting

slots idle slots nodes may be able

to detect collision in less than time to transmit packet

clock synchronization

5 DataLink Layer 5-12

Slotted Aloha efficiency

suppose N nodes with many frames to send each transmits in slot with probability p

prob that given node has success in a slot = p(1-p)N-1

prob that any node has a success = Np(1-p)N-1

max efficiency find p that maximizes Np(1-p)N-1

for many nodes take limit of Np(1-p)N-1

as N goes to infinity gives

Max efficiency = 1e = 37

Efficiency long-run fraction of successful slots (many nodes all with many frames to send)

At best channelused for useful transmissions 37of time

5 DataLink Layer 5-13

Pure (unslotted) ALOHA unslotted Aloha simpler no synchronization when frame first arrives

transmit immediately collision probability increases

frame sent at t0 collides with other frames sent in [t0-1t0+1]

5 DataLink Layer 5-14

Pure Aloha efficiency

P(success by given node) = P(node transmits)

P(no other node transmits in [p0-1p0]

P(no other node transmits in [p0-1p0]

= p (1-p)N-1 (1-p)N-1

= p (1-p)2(N-1)

hellip choosing optimum p and then letting n -gt infty

= 1(2e) = 18 even worse than slotted Aloha

5 DataLink Layer 5-15

CSMA (Carrier Sense Multiple Access)

CSMA listen before transmitIf channel sensed idle transmit entire frame If channel sensed busy defer transmission

human analogy donrsquot interrupt others

5 DataLink Layer 5-16

CSMA collisions

collisions can still occurpropagation delay means two nodes may not heareach otherrsquos transmissioncollisionentire packet transmission time wasted

spatial layout of nodes

noterole of distance amp propagation delay in determining collision probability

5 DataLink Layer 5-17

CSMACD (Collision Detection)CSMACD carrier sensing deferral as in

CSMA collisions detected within short time colliding transmissions aborted reducing

channel wastage collision detection

easy in wired LANs measure signal strengths compare transmitted received signals

difficult in wireless LANs received signal strength overwhelmed by local transmission strength

human analogy the polite conversationalist

5 DataLink Layer 5-18

CSMACD collision detection

Link Layer 5-19

Ethernet CSMACD algorithm

1 NIC receives datagram from network layer creates frame

2 If NIC senses channel idle starts frame transmission If NIC senses channel busy waits until channel idle then transmits

3 If NIC transmits entire frame without detecting another transmission NIC is done with frame

4 If NIC detects another transmission while transmitting aborts and sends jam signal

5 After aborting NIC enters binary (exponential) backoff after mth collision NIC

chooses K at random from 012 hellip 2m-1 NIC waits K512 bit times returns to Step 2

longer backoff interval with more collisions

Link Layer 5-20

CSMACD efficiency

Tprop = max prop delay between 2 nodes in LAN ttrans = time to transmit max-size frame

efficiency goes to 1 as tprop goes to 0 as ttrans goes to infinity

better performance than ALOHA and simple cheap decentralized

transprop ttefficiency

51

1

5 DataLink Layer 5-21

ldquoTaking Turnsrdquo MAC protocols

channel partitioning MAC protocols share channel efficiently and fairly at high

load inefficient at low load delay in channel

access 1N bandwidth allocated even if only 1 active node

Random access MAC protocols efficient at low load single node can fully

utilize channel high load collision overhead

ldquotaking turnsrdquo protocolslook for best of both worlds

5 DataLink Layer 5-22

ldquoTaking Turnsrdquo MAC protocols

Polling controller node

ldquoinvitesrdquo client nodes to transmit in turn

typically used with ldquodumbrdquo client devices

concerns polling overhead latency single point of

failure (controller)

controller

clients

poll

data

data

5 DataLink Layer 5-23

ldquoTaking Turnsrdquo MAC protocolsToken passing control token

passed from one node to next sequentially

token message concerns

token overhead latency single point of failure

(token)

T

data

(nothingto send)

T

cable headend

CMTS

ISP

cable modemtermination system

multiple 40Mbps downstream (broadcast) channels single CMTS transmits into channels

multiple 30 Mbps upstream channels multiple access all users contend for certain

upstream channel time slots (others assigned)

Cable access network

cablemodem

splitter

hellip

hellip

Internet framesTV channels control transmitted downstream at different frequencies

upstream Internet frames TV control transmitted upstream at different frequencies in time slots

Link Layer 5-25

DOCSIS data over cable service interface spec

FDM over upstream downstream frequency channels

TDM upstream some slots assigned some have contention downstream MAP frame assigns upstream

slots request for upstream slots (and data)

transmitted random access (binary backoff) in selected slots

MAP frame forInterval [t1 t2]

Residences with cable modems

Downstream channel i

Upstream channel j

t1 t2

Assigned minislots containing cable modemupstream data frames

Minislots containing minislots request frames

cable headend

CMTS

Cable access network

5 DataLink Layer 5-26

Summary of MAC protocols

channel partitioning by time frequency or code Time Division Frequency Division

random access (dynamic) ALOHA S-ALOHA CSMA CSMACD carrier sensing easy in some technologies (wire)

hard in others (wireless) CSMACD used in Ethernet CSMACA used in 80211

taking turns polling from central site token passing Bluetooth FDDI IBM Token Ring

  • Slide 1
  • Link Layer
  • Multiple Access Links and Protocols
  • Multiple Access protocols
  • Ideal Multiple Access Protocol
  • MAC Protocols a taxonomy
  • Channel Partitioning MAC protocols TDMA
  • Channel Partitioning MAC protocols FDMA
  • Random Access Protocols
  • Slotted ALOHA
  • Slotted ALOHA (2)
  • Slotted Aloha efficiency
  • Pure (unslotted) ALOHA
  • Pure Aloha efficiency
  • CSMA (Carrier Sense Multiple Access)
  • CSMA collisions
  • CSMACD (Collision Detection)
  • CSMACD collision detection
  • Ethernet CSMACD algorithm
  • CSMACD efficiency
  • ldquoTaking Turnsrdquo MAC protocols
  • ldquoTaking Turnsrdquo MAC protocols (2)
  • ldquoTaking Turnsrdquo MAC protocols (3)
  • Slide 24
  • Slide 25
  • Summary of MAC protocols
Page 8: 5: DataLink Layer5-1 Chapter 5 Link Layer and LANs Part 3: MAC Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley

5 DataLink Layer 5-8

Channel Partitioning MAC protocols FDMA

FDMA frequency division multiple access channel spectrum divided into frequency bands each station assigned fixed frequency band unused transmission time in frequency bands go

idle example 6-station LAN 134 have pkt

frequency bands 256 idle fr

eq

uency

bands time

FDM cable

5 DataLink Layer 5-9

Random Access Protocols

When node has packet to send transmit at full channel data rate R no a priori coordination among nodes

two or more transmitting nodes ldquocollisionrdquo random access MAC protocol specifies

how to detect collisions how to recover from collisions (eg via delayed

retransmissions) Examples of random access MAC protocols

slotted ALOHA ALOHA CSMA CSMACD CSMACA

5 DataLink Layer 5-10

Slotted ALOHA

Assumptions all frames same size time divided into

equal size slots (time to transmit 1 frame)

nodes start to transmit only slot beginning

nodes are synchronized

if 2 or more nodes transmit in slot all nodes detect collision

Operation when node obtains fresh

frame transmits in next slot if no collision node

can send new frame in next slot

if collision node retransmits frame in each subsequent slot with prob p until success

5 DataLink Layer 5-11

Slotted ALOHA

Pros single active node

can continuously transmit at full rate of channel

highly decentralized only slots in nodes need to be in sync

simple

Cons collisions wasting

slots idle slots nodes may be able

to detect collision in less than time to transmit packet

clock synchronization

5 DataLink Layer 5-12

Slotted Aloha efficiency

suppose N nodes with many frames to send each transmits in slot with probability p

prob that given node has success in a slot = p(1-p)N-1

prob that any node has a success = Np(1-p)N-1

max efficiency find p that maximizes Np(1-p)N-1

for many nodes take limit of Np(1-p)N-1

as N goes to infinity gives

Max efficiency = 1e = 37

Efficiency long-run fraction of successful slots (many nodes all with many frames to send)

At best channelused for useful transmissions 37of time

5 DataLink Layer 5-13

Pure (unslotted) ALOHA unslotted Aloha simpler no synchronization when frame first arrives

transmit immediately collision probability increases

frame sent at t0 collides with other frames sent in [t0-1t0+1]

5 DataLink Layer 5-14

Pure Aloha efficiency

P(success by given node) = P(node transmits)

P(no other node transmits in [p0-1p0]

P(no other node transmits in [p0-1p0]

= p (1-p)N-1 (1-p)N-1

= p (1-p)2(N-1)

hellip choosing optimum p and then letting n -gt infty

= 1(2e) = 18 even worse than slotted Aloha

5 DataLink Layer 5-15

CSMA (Carrier Sense Multiple Access)

CSMA listen before transmitIf channel sensed idle transmit entire frame If channel sensed busy defer transmission

human analogy donrsquot interrupt others

5 DataLink Layer 5-16

CSMA collisions

collisions can still occurpropagation delay means two nodes may not heareach otherrsquos transmissioncollisionentire packet transmission time wasted

spatial layout of nodes

noterole of distance amp propagation delay in determining collision probability

5 DataLink Layer 5-17

CSMACD (Collision Detection)CSMACD carrier sensing deferral as in

CSMA collisions detected within short time colliding transmissions aborted reducing

channel wastage collision detection

easy in wired LANs measure signal strengths compare transmitted received signals

difficult in wireless LANs received signal strength overwhelmed by local transmission strength

human analogy the polite conversationalist

5 DataLink Layer 5-18

CSMACD collision detection

Link Layer 5-19

Ethernet CSMACD algorithm

1 NIC receives datagram from network layer creates frame

2 If NIC senses channel idle starts frame transmission If NIC senses channel busy waits until channel idle then transmits

3 If NIC transmits entire frame without detecting another transmission NIC is done with frame

4 If NIC detects another transmission while transmitting aborts and sends jam signal

5 After aborting NIC enters binary (exponential) backoff after mth collision NIC

chooses K at random from 012 hellip 2m-1 NIC waits K512 bit times returns to Step 2

longer backoff interval with more collisions

Link Layer 5-20

CSMACD efficiency

Tprop = max prop delay between 2 nodes in LAN ttrans = time to transmit max-size frame

efficiency goes to 1 as tprop goes to 0 as ttrans goes to infinity

better performance than ALOHA and simple cheap decentralized

transprop ttefficiency

51

1

5 DataLink Layer 5-21

ldquoTaking Turnsrdquo MAC protocols

channel partitioning MAC protocols share channel efficiently and fairly at high

load inefficient at low load delay in channel

access 1N bandwidth allocated even if only 1 active node

Random access MAC protocols efficient at low load single node can fully

utilize channel high load collision overhead

ldquotaking turnsrdquo protocolslook for best of both worlds

5 DataLink Layer 5-22

ldquoTaking Turnsrdquo MAC protocols

Polling controller node

ldquoinvitesrdquo client nodes to transmit in turn

typically used with ldquodumbrdquo client devices

concerns polling overhead latency single point of

failure (controller)

controller

clients

poll

data

data

5 DataLink Layer 5-23

ldquoTaking Turnsrdquo MAC protocolsToken passing control token

passed from one node to next sequentially

token message concerns

token overhead latency single point of failure

(token)

T

data

(nothingto send)

T

cable headend

CMTS

ISP

cable modemtermination system

multiple 40Mbps downstream (broadcast) channels single CMTS transmits into channels

multiple 30 Mbps upstream channels multiple access all users contend for certain

upstream channel time slots (others assigned)

Cable access network

cablemodem

splitter

hellip

hellip

Internet framesTV channels control transmitted downstream at different frequencies

upstream Internet frames TV control transmitted upstream at different frequencies in time slots

Link Layer 5-25

DOCSIS data over cable service interface spec

FDM over upstream downstream frequency channels

TDM upstream some slots assigned some have contention downstream MAP frame assigns upstream

slots request for upstream slots (and data)

transmitted random access (binary backoff) in selected slots

MAP frame forInterval [t1 t2]

Residences with cable modems

Downstream channel i

Upstream channel j

t1 t2

Assigned minislots containing cable modemupstream data frames

Minislots containing minislots request frames

cable headend

CMTS

Cable access network

5 DataLink Layer 5-26

Summary of MAC protocols

channel partitioning by time frequency or code Time Division Frequency Division

random access (dynamic) ALOHA S-ALOHA CSMA CSMACD carrier sensing easy in some technologies (wire)

hard in others (wireless) CSMACD used in Ethernet CSMACA used in 80211

taking turns polling from central site token passing Bluetooth FDDI IBM Token Ring

  • Slide 1
  • Link Layer
  • Multiple Access Links and Protocols
  • Multiple Access protocols
  • Ideal Multiple Access Protocol
  • MAC Protocols a taxonomy
  • Channel Partitioning MAC protocols TDMA
  • Channel Partitioning MAC protocols FDMA
  • Random Access Protocols
  • Slotted ALOHA
  • Slotted ALOHA (2)
  • Slotted Aloha efficiency
  • Pure (unslotted) ALOHA
  • Pure Aloha efficiency
  • CSMA (Carrier Sense Multiple Access)
  • CSMA collisions
  • CSMACD (Collision Detection)
  • CSMACD collision detection
  • Ethernet CSMACD algorithm
  • CSMACD efficiency
  • ldquoTaking Turnsrdquo MAC protocols
  • ldquoTaking Turnsrdquo MAC protocols (2)
  • ldquoTaking Turnsrdquo MAC protocols (3)
  • Slide 24
  • Slide 25
  • Summary of MAC protocols
Page 9: 5: DataLink Layer5-1 Chapter 5 Link Layer and LANs Part 3: MAC Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley

5 DataLink Layer 5-9

Random Access Protocols

When node has packet to send transmit at full channel data rate R no a priori coordination among nodes

two or more transmitting nodes ldquocollisionrdquo random access MAC protocol specifies

how to detect collisions how to recover from collisions (eg via delayed

retransmissions) Examples of random access MAC protocols

slotted ALOHA ALOHA CSMA CSMACD CSMACA

5 DataLink Layer 5-10

Slotted ALOHA

Assumptions all frames same size time divided into

equal size slots (time to transmit 1 frame)

nodes start to transmit only slot beginning

nodes are synchronized

if 2 or more nodes transmit in slot all nodes detect collision

Operation when node obtains fresh

frame transmits in next slot if no collision node

can send new frame in next slot

if collision node retransmits frame in each subsequent slot with prob p until success

5 DataLink Layer 5-11

Slotted ALOHA

Pros single active node

can continuously transmit at full rate of channel

highly decentralized only slots in nodes need to be in sync

simple

Cons collisions wasting

slots idle slots nodes may be able

to detect collision in less than time to transmit packet

clock synchronization

5 DataLink Layer 5-12

Slotted Aloha efficiency

suppose N nodes with many frames to send each transmits in slot with probability p

prob that given node has success in a slot = p(1-p)N-1

prob that any node has a success = Np(1-p)N-1

max efficiency find p that maximizes Np(1-p)N-1

for many nodes take limit of Np(1-p)N-1

as N goes to infinity gives

Max efficiency = 1e = 37

Efficiency long-run fraction of successful slots (many nodes all with many frames to send)

At best channelused for useful transmissions 37of time

5 DataLink Layer 5-13

Pure (unslotted) ALOHA unslotted Aloha simpler no synchronization when frame first arrives

transmit immediately collision probability increases

frame sent at t0 collides with other frames sent in [t0-1t0+1]

5 DataLink Layer 5-14

Pure Aloha efficiency

P(success by given node) = P(node transmits)

P(no other node transmits in [p0-1p0]

P(no other node transmits in [p0-1p0]

= p (1-p)N-1 (1-p)N-1

= p (1-p)2(N-1)

hellip choosing optimum p and then letting n -gt infty

= 1(2e) = 18 even worse than slotted Aloha

5 DataLink Layer 5-15

CSMA (Carrier Sense Multiple Access)

CSMA listen before transmitIf channel sensed idle transmit entire frame If channel sensed busy defer transmission

human analogy donrsquot interrupt others

5 DataLink Layer 5-16

CSMA collisions

collisions can still occurpropagation delay means two nodes may not heareach otherrsquos transmissioncollisionentire packet transmission time wasted

spatial layout of nodes

noterole of distance amp propagation delay in determining collision probability

5 DataLink Layer 5-17

CSMACD (Collision Detection)CSMACD carrier sensing deferral as in

CSMA collisions detected within short time colliding transmissions aborted reducing

channel wastage collision detection

easy in wired LANs measure signal strengths compare transmitted received signals

difficult in wireless LANs received signal strength overwhelmed by local transmission strength

human analogy the polite conversationalist

5 DataLink Layer 5-18

CSMACD collision detection

Link Layer 5-19

Ethernet CSMACD algorithm

1 NIC receives datagram from network layer creates frame

2 If NIC senses channel idle starts frame transmission If NIC senses channel busy waits until channel idle then transmits

3 If NIC transmits entire frame without detecting another transmission NIC is done with frame

4 If NIC detects another transmission while transmitting aborts and sends jam signal

5 After aborting NIC enters binary (exponential) backoff after mth collision NIC

chooses K at random from 012 hellip 2m-1 NIC waits K512 bit times returns to Step 2

longer backoff interval with more collisions

Link Layer 5-20

CSMACD efficiency

Tprop = max prop delay between 2 nodes in LAN ttrans = time to transmit max-size frame

efficiency goes to 1 as tprop goes to 0 as ttrans goes to infinity

better performance than ALOHA and simple cheap decentralized

transprop ttefficiency

51

1

5 DataLink Layer 5-21

ldquoTaking Turnsrdquo MAC protocols

channel partitioning MAC protocols share channel efficiently and fairly at high

load inefficient at low load delay in channel

access 1N bandwidth allocated even if only 1 active node

Random access MAC protocols efficient at low load single node can fully

utilize channel high load collision overhead

ldquotaking turnsrdquo protocolslook for best of both worlds

5 DataLink Layer 5-22

ldquoTaking Turnsrdquo MAC protocols

Polling controller node

ldquoinvitesrdquo client nodes to transmit in turn

typically used with ldquodumbrdquo client devices

concerns polling overhead latency single point of

failure (controller)

controller

clients

poll

data

data

5 DataLink Layer 5-23

ldquoTaking Turnsrdquo MAC protocolsToken passing control token

passed from one node to next sequentially

token message concerns

token overhead latency single point of failure

(token)

T

data

(nothingto send)

T

cable headend

CMTS

ISP

cable modemtermination system

multiple 40Mbps downstream (broadcast) channels single CMTS transmits into channels

multiple 30 Mbps upstream channels multiple access all users contend for certain

upstream channel time slots (others assigned)

Cable access network

cablemodem

splitter

hellip

hellip

Internet framesTV channels control transmitted downstream at different frequencies

upstream Internet frames TV control transmitted upstream at different frequencies in time slots

Link Layer 5-25

DOCSIS data over cable service interface spec

FDM over upstream downstream frequency channels

TDM upstream some slots assigned some have contention downstream MAP frame assigns upstream

slots request for upstream slots (and data)

transmitted random access (binary backoff) in selected slots

MAP frame forInterval [t1 t2]

Residences with cable modems

Downstream channel i

Upstream channel j

t1 t2

Assigned minislots containing cable modemupstream data frames

Minislots containing minislots request frames

cable headend

CMTS

Cable access network

5 DataLink Layer 5-26

Summary of MAC protocols

channel partitioning by time frequency or code Time Division Frequency Division

random access (dynamic) ALOHA S-ALOHA CSMA CSMACD carrier sensing easy in some technologies (wire)

hard in others (wireless) CSMACD used in Ethernet CSMACA used in 80211

taking turns polling from central site token passing Bluetooth FDDI IBM Token Ring

  • Slide 1
  • Link Layer
  • Multiple Access Links and Protocols
  • Multiple Access protocols
  • Ideal Multiple Access Protocol
  • MAC Protocols a taxonomy
  • Channel Partitioning MAC protocols TDMA
  • Channel Partitioning MAC protocols FDMA
  • Random Access Protocols
  • Slotted ALOHA
  • Slotted ALOHA (2)
  • Slotted Aloha efficiency
  • Pure (unslotted) ALOHA
  • Pure Aloha efficiency
  • CSMA (Carrier Sense Multiple Access)
  • CSMA collisions
  • CSMACD (Collision Detection)
  • CSMACD collision detection
  • Ethernet CSMACD algorithm
  • CSMACD efficiency
  • ldquoTaking Turnsrdquo MAC protocols
  • ldquoTaking Turnsrdquo MAC protocols (2)
  • ldquoTaking Turnsrdquo MAC protocols (3)
  • Slide 24
  • Slide 25
  • Summary of MAC protocols
Page 10: 5: DataLink Layer5-1 Chapter 5 Link Layer and LANs Part 3: MAC Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley

5 DataLink Layer 5-10

Slotted ALOHA

Assumptions all frames same size time divided into

equal size slots (time to transmit 1 frame)

nodes start to transmit only slot beginning

nodes are synchronized

if 2 or more nodes transmit in slot all nodes detect collision

Operation when node obtains fresh

frame transmits in next slot if no collision node

can send new frame in next slot

if collision node retransmits frame in each subsequent slot with prob p until success

5 DataLink Layer 5-11

Slotted ALOHA

Pros single active node

can continuously transmit at full rate of channel

highly decentralized only slots in nodes need to be in sync

simple

Cons collisions wasting

slots idle slots nodes may be able

to detect collision in less than time to transmit packet

clock synchronization

5 DataLink Layer 5-12

Slotted Aloha efficiency

suppose N nodes with many frames to send each transmits in slot with probability p

prob that given node has success in a slot = p(1-p)N-1

prob that any node has a success = Np(1-p)N-1

max efficiency find p that maximizes Np(1-p)N-1

for many nodes take limit of Np(1-p)N-1

as N goes to infinity gives

Max efficiency = 1e = 37

Efficiency long-run fraction of successful slots (many nodes all with many frames to send)

At best channelused for useful transmissions 37of time

5 DataLink Layer 5-13

Pure (unslotted) ALOHA unslotted Aloha simpler no synchronization when frame first arrives

transmit immediately collision probability increases

frame sent at t0 collides with other frames sent in [t0-1t0+1]

5 DataLink Layer 5-14

Pure Aloha efficiency

P(success by given node) = P(node transmits)

P(no other node transmits in [p0-1p0]

P(no other node transmits in [p0-1p0]

= p (1-p)N-1 (1-p)N-1

= p (1-p)2(N-1)

hellip choosing optimum p and then letting n -gt infty

= 1(2e) = 18 even worse than slotted Aloha

5 DataLink Layer 5-15

CSMA (Carrier Sense Multiple Access)

CSMA listen before transmitIf channel sensed idle transmit entire frame If channel sensed busy defer transmission

human analogy donrsquot interrupt others

5 DataLink Layer 5-16

CSMA collisions

collisions can still occurpropagation delay means two nodes may not heareach otherrsquos transmissioncollisionentire packet transmission time wasted

spatial layout of nodes

noterole of distance amp propagation delay in determining collision probability

5 DataLink Layer 5-17

CSMACD (Collision Detection)CSMACD carrier sensing deferral as in

CSMA collisions detected within short time colliding transmissions aborted reducing

channel wastage collision detection

easy in wired LANs measure signal strengths compare transmitted received signals

difficult in wireless LANs received signal strength overwhelmed by local transmission strength

human analogy the polite conversationalist

5 DataLink Layer 5-18

CSMACD collision detection

Link Layer 5-19

Ethernet CSMACD algorithm

1 NIC receives datagram from network layer creates frame

2 If NIC senses channel idle starts frame transmission If NIC senses channel busy waits until channel idle then transmits

3 If NIC transmits entire frame without detecting another transmission NIC is done with frame

4 If NIC detects another transmission while transmitting aborts and sends jam signal

5 After aborting NIC enters binary (exponential) backoff after mth collision NIC

chooses K at random from 012 hellip 2m-1 NIC waits K512 bit times returns to Step 2

longer backoff interval with more collisions

Link Layer 5-20

CSMACD efficiency

Tprop = max prop delay between 2 nodes in LAN ttrans = time to transmit max-size frame

efficiency goes to 1 as tprop goes to 0 as ttrans goes to infinity

better performance than ALOHA and simple cheap decentralized

transprop ttefficiency

51

1

5 DataLink Layer 5-21

ldquoTaking Turnsrdquo MAC protocols

channel partitioning MAC protocols share channel efficiently and fairly at high

load inefficient at low load delay in channel

access 1N bandwidth allocated even if only 1 active node

Random access MAC protocols efficient at low load single node can fully

utilize channel high load collision overhead

ldquotaking turnsrdquo protocolslook for best of both worlds

5 DataLink Layer 5-22

ldquoTaking Turnsrdquo MAC protocols

Polling controller node

ldquoinvitesrdquo client nodes to transmit in turn

typically used with ldquodumbrdquo client devices

concerns polling overhead latency single point of

failure (controller)

controller

clients

poll

data

data

5 DataLink Layer 5-23

ldquoTaking Turnsrdquo MAC protocolsToken passing control token

passed from one node to next sequentially

token message concerns

token overhead latency single point of failure

(token)

T

data

(nothingto send)

T

cable headend

CMTS

ISP

cable modemtermination system

multiple 40Mbps downstream (broadcast) channels single CMTS transmits into channels

multiple 30 Mbps upstream channels multiple access all users contend for certain

upstream channel time slots (others assigned)

Cable access network

cablemodem

splitter

hellip

hellip

Internet framesTV channels control transmitted downstream at different frequencies

upstream Internet frames TV control transmitted upstream at different frequencies in time slots

Link Layer 5-25

DOCSIS data over cable service interface spec

FDM over upstream downstream frequency channels

TDM upstream some slots assigned some have contention downstream MAP frame assigns upstream

slots request for upstream slots (and data)

transmitted random access (binary backoff) in selected slots

MAP frame forInterval [t1 t2]

Residences with cable modems

Downstream channel i

Upstream channel j

t1 t2

Assigned minislots containing cable modemupstream data frames

Minislots containing minislots request frames

cable headend

CMTS

Cable access network

5 DataLink Layer 5-26

Summary of MAC protocols

channel partitioning by time frequency or code Time Division Frequency Division

random access (dynamic) ALOHA S-ALOHA CSMA CSMACD carrier sensing easy in some technologies (wire)

hard in others (wireless) CSMACD used in Ethernet CSMACA used in 80211

taking turns polling from central site token passing Bluetooth FDDI IBM Token Ring

  • Slide 1
  • Link Layer
  • Multiple Access Links and Protocols
  • Multiple Access protocols
  • Ideal Multiple Access Protocol
  • MAC Protocols a taxonomy
  • Channel Partitioning MAC protocols TDMA
  • Channel Partitioning MAC protocols FDMA
  • Random Access Protocols
  • Slotted ALOHA
  • Slotted ALOHA (2)
  • Slotted Aloha efficiency
  • Pure (unslotted) ALOHA
  • Pure Aloha efficiency
  • CSMA (Carrier Sense Multiple Access)
  • CSMA collisions
  • CSMACD (Collision Detection)
  • CSMACD collision detection
  • Ethernet CSMACD algorithm
  • CSMACD efficiency
  • ldquoTaking Turnsrdquo MAC protocols
  • ldquoTaking Turnsrdquo MAC protocols (2)
  • ldquoTaking Turnsrdquo MAC protocols (3)
  • Slide 24
  • Slide 25
  • Summary of MAC protocols
Page 11: 5: DataLink Layer5-1 Chapter 5 Link Layer and LANs Part 3: MAC Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley

5 DataLink Layer 5-11

Slotted ALOHA

Pros single active node

can continuously transmit at full rate of channel

highly decentralized only slots in nodes need to be in sync

simple

Cons collisions wasting

slots idle slots nodes may be able

to detect collision in less than time to transmit packet

clock synchronization

5 DataLink Layer 5-12

Slotted Aloha efficiency

suppose N nodes with many frames to send each transmits in slot with probability p

prob that given node has success in a slot = p(1-p)N-1

prob that any node has a success = Np(1-p)N-1

max efficiency find p that maximizes Np(1-p)N-1

for many nodes take limit of Np(1-p)N-1

as N goes to infinity gives

Max efficiency = 1e = 37

Efficiency long-run fraction of successful slots (many nodes all with many frames to send)

At best channelused for useful transmissions 37of time

5 DataLink Layer 5-13

Pure (unslotted) ALOHA unslotted Aloha simpler no synchronization when frame first arrives

transmit immediately collision probability increases

frame sent at t0 collides with other frames sent in [t0-1t0+1]

5 DataLink Layer 5-14

Pure Aloha efficiency

P(success by given node) = P(node transmits)

P(no other node transmits in [p0-1p0]

P(no other node transmits in [p0-1p0]

= p (1-p)N-1 (1-p)N-1

= p (1-p)2(N-1)

hellip choosing optimum p and then letting n -gt infty

= 1(2e) = 18 even worse than slotted Aloha

5 DataLink Layer 5-15

CSMA (Carrier Sense Multiple Access)

CSMA listen before transmitIf channel sensed idle transmit entire frame If channel sensed busy defer transmission

human analogy donrsquot interrupt others

5 DataLink Layer 5-16

CSMA collisions

collisions can still occurpropagation delay means two nodes may not heareach otherrsquos transmissioncollisionentire packet transmission time wasted

spatial layout of nodes

noterole of distance amp propagation delay in determining collision probability

5 DataLink Layer 5-17

CSMACD (Collision Detection)CSMACD carrier sensing deferral as in

CSMA collisions detected within short time colliding transmissions aborted reducing

channel wastage collision detection

easy in wired LANs measure signal strengths compare transmitted received signals

difficult in wireless LANs received signal strength overwhelmed by local transmission strength

human analogy the polite conversationalist

5 DataLink Layer 5-18

CSMACD collision detection

Link Layer 5-19

Ethernet CSMACD algorithm

1 NIC receives datagram from network layer creates frame

2 If NIC senses channel idle starts frame transmission If NIC senses channel busy waits until channel idle then transmits

3 If NIC transmits entire frame without detecting another transmission NIC is done with frame

4 If NIC detects another transmission while transmitting aborts and sends jam signal

5 After aborting NIC enters binary (exponential) backoff after mth collision NIC

chooses K at random from 012 hellip 2m-1 NIC waits K512 bit times returns to Step 2

longer backoff interval with more collisions

Link Layer 5-20

CSMACD efficiency

Tprop = max prop delay between 2 nodes in LAN ttrans = time to transmit max-size frame

efficiency goes to 1 as tprop goes to 0 as ttrans goes to infinity

better performance than ALOHA and simple cheap decentralized

transprop ttefficiency

51

1

5 DataLink Layer 5-21

ldquoTaking Turnsrdquo MAC protocols

channel partitioning MAC protocols share channel efficiently and fairly at high

load inefficient at low load delay in channel

access 1N bandwidth allocated even if only 1 active node

Random access MAC protocols efficient at low load single node can fully

utilize channel high load collision overhead

ldquotaking turnsrdquo protocolslook for best of both worlds

5 DataLink Layer 5-22

ldquoTaking Turnsrdquo MAC protocols

Polling controller node

ldquoinvitesrdquo client nodes to transmit in turn

typically used with ldquodumbrdquo client devices

concerns polling overhead latency single point of

failure (controller)

controller

clients

poll

data

data

5 DataLink Layer 5-23

ldquoTaking Turnsrdquo MAC protocolsToken passing control token

passed from one node to next sequentially

token message concerns

token overhead latency single point of failure

(token)

T

data

(nothingto send)

T

cable headend

CMTS

ISP

cable modemtermination system

multiple 40Mbps downstream (broadcast) channels single CMTS transmits into channels

multiple 30 Mbps upstream channels multiple access all users contend for certain

upstream channel time slots (others assigned)

Cable access network

cablemodem

splitter

hellip

hellip

Internet framesTV channels control transmitted downstream at different frequencies

upstream Internet frames TV control transmitted upstream at different frequencies in time slots

Link Layer 5-25

DOCSIS data over cable service interface spec

FDM over upstream downstream frequency channels

TDM upstream some slots assigned some have contention downstream MAP frame assigns upstream

slots request for upstream slots (and data)

transmitted random access (binary backoff) in selected slots

MAP frame forInterval [t1 t2]

Residences with cable modems

Downstream channel i

Upstream channel j

t1 t2

Assigned minislots containing cable modemupstream data frames

Minislots containing minislots request frames

cable headend

CMTS

Cable access network

5 DataLink Layer 5-26

Summary of MAC protocols

channel partitioning by time frequency or code Time Division Frequency Division

random access (dynamic) ALOHA S-ALOHA CSMA CSMACD carrier sensing easy in some technologies (wire)

hard in others (wireless) CSMACD used in Ethernet CSMACA used in 80211

taking turns polling from central site token passing Bluetooth FDDI IBM Token Ring

  • Slide 1
  • Link Layer
  • Multiple Access Links and Protocols
  • Multiple Access protocols
  • Ideal Multiple Access Protocol
  • MAC Protocols a taxonomy
  • Channel Partitioning MAC protocols TDMA
  • Channel Partitioning MAC protocols FDMA
  • Random Access Protocols
  • Slotted ALOHA
  • Slotted ALOHA (2)
  • Slotted Aloha efficiency
  • Pure (unslotted) ALOHA
  • Pure Aloha efficiency
  • CSMA (Carrier Sense Multiple Access)
  • CSMA collisions
  • CSMACD (Collision Detection)
  • CSMACD collision detection
  • Ethernet CSMACD algorithm
  • CSMACD efficiency
  • ldquoTaking Turnsrdquo MAC protocols
  • ldquoTaking Turnsrdquo MAC protocols (2)
  • ldquoTaking Turnsrdquo MAC protocols (3)
  • Slide 24
  • Slide 25
  • Summary of MAC protocols
Page 12: 5: DataLink Layer5-1 Chapter 5 Link Layer and LANs Part 3: MAC Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley

5 DataLink Layer 5-12

Slotted Aloha efficiency

suppose N nodes with many frames to send each transmits in slot with probability p

prob that given node has success in a slot = p(1-p)N-1

prob that any node has a success = Np(1-p)N-1

max efficiency find p that maximizes Np(1-p)N-1

for many nodes take limit of Np(1-p)N-1

as N goes to infinity gives

Max efficiency = 1e = 37

Efficiency long-run fraction of successful slots (many nodes all with many frames to send)

At best channelused for useful transmissions 37of time

5 DataLink Layer 5-13

Pure (unslotted) ALOHA unslotted Aloha simpler no synchronization when frame first arrives

transmit immediately collision probability increases

frame sent at t0 collides with other frames sent in [t0-1t0+1]

5 DataLink Layer 5-14

Pure Aloha efficiency

P(success by given node) = P(node transmits)

P(no other node transmits in [p0-1p0]

P(no other node transmits in [p0-1p0]

= p (1-p)N-1 (1-p)N-1

= p (1-p)2(N-1)

hellip choosing optimum p and then letting n -gt infty

= 1(2e) = 18 even worse than slotted Aloha

5 DataLink Layer 5-15

CSMA (Carrier Sense Multiple Access)

CSMA listen before transmitIf channel sensed idle transmit entire frame If channel sensed busy defer transmission

human analogy donrsquot interrupt others

5 DataLink Layer 5-16

CSMA collisions

collisions can still occurpropagation delay means two nodes may not heareach otherrsquos transmissioncollisionentire packet transmission time wasted

spatial layout of nodes

noterole of distance amp propagation delay in determining collision probability

5 DataLink Layer 5-17

CSMACD (Collision Detection)CSMACD carrier sensing deferral as in

CSMA collisions detected within short time colliding transmissions aborted reducing

channel wastage collision detection

easy in wired LANs measure signal strengths compare transmitted received signals

difficult in wireless LANs received signal strength overwhelmed by local transmission strength

human analogy the polite conversationalist

5 DataLink Layer 5-18

CSMACD collision detection

Link Layer 5-19

Ethernet CSMACD algorithm

1 NIC receives datagram from network layer creates frame

2 If NIC senses channel idle starts frame transmission If NIC senses channel busy waits until channel idle then transmits

3 If NIC transmits entire frame without detecting another transmission NIC is done with frame

4 If NIC detects another transmission while transmitting aborts and sends jam signal

5 After aborting NIC enters binary (exponential) backoff after mth collision NIC

chooses K at random from 012 hellip 2m-1 NIC waits K512 bit times returns to Step 2

longer backoff interval with more collisions

Link Layer 5-20

CSMACD efficiency

Tprop = max prop delay between 2 nodes in LAN ttrans = time to transmit max-size frame

efficiency goes to 1 as tprop goes to 0 as ttrans goes to infinity

better performance than ALOHA and simple cheap decentralized

transprop ttefficiency

51

1

5 DataLink Layer 5-21

ldquoTaking Turnsrdquo MAC protocols

channel partitioning MAC protocols share channel efficiently and fairly at high

load inefficient at low load delay in channel

access 1N bandwidth allocated even if only 1 active node

Random access MAC protocols efficient at low load single node can fully

utilize channel high load collision overhead

ldquotaking turnsrdquo protocolslook for best of both worlds

5 DataLink Layer 5-22

ldquoTaking Turnsrdquo MAC protocols

Polling controller node

ldquoinvitesrdquo client nodes to transmit in turn

typically used with ldquodumbrdquo client devices

concerns polling overhead latency single point of

failure (controller)

controller

clients

poll

data

data

5 DataLink Layer 5-23

ldquoTaking Turnsrdquo MAC protocolsToken passing control token

passed from one node to next sequentially

token message concerns

token overhead latency single point of failure

(token)

T

data

(nothingto send)

T

cable headend

CMTS

ISP

cable modemtermination system

multiple 40Mbps downstream (broadcast) channels single CMTS transmits into channels

multiple 30 Mbps upstream channels multiple access all users contend for certain

upstream channel time slots (others assigned)

Cable access network

cablemodem

splitter

hellip

hellip

Internet framesTV channels control transmitted downstream at different frequencies

upstream Internet frames TV control transmitted upstream at different frequencies in time slots

Link Layer 5-25

DOCSIS data over cable service interface spec

FDM over upstream downstream frequency channels

TDM upstream some slots assigned some have contention downstream MAP frame assigns upstream

slots request for upstream slots (and data)

transmitted random access (binary backoff) in selected slots

MAP frame forInterval [t1 t2]

Residences with cable modems

Downstream channel i

Upstream channel j

t1 t2

Assigned minislots containing cable modemupstream data frames

Minislots containing minislots request frames

cable headend

CMTS

Cable access network

5 DataLink Layer 5-26

Summary of MAC protocols

channel partitioning by time frequency or code Time Division Frequency Division

random access (dynamic) ALOHA S-ALOHA CSMA CSMACD carrier sensing easy in some technologies (wire)

hard in others (wireless) CSMACD used in Ethernet CSMACA used in 80211

taking turns polling from central site token passing Bluetooth FDDI IBM Token Ring

  • Slide 1
  • Link Layer
  • Multiple Access Links and Protocols
  • Multiple Access protocols
  • Ideal Multiple Access Protocol
  • MAC Protocols a taxonomy
  • Channel Partitioning MAC protocols TDMA
  • Channel Partitioning MAC protocols FDMA
  • Random Access Protocols
  • Slotted ALOHA
  • Slotted ALOHA (2)
  • Slotted Aloha efficiency
  • Pure (unslotted) ALOHA
  • Pure Aloha efficiency
  • CSMA (Carrier Sense Multiple Access)
  • CSMA collisions
  • CSMACD (Collision Detection)
  • CSMACD collision detection
  • Ethernet CSMACD algorithm
  • CSMACD efficiency
  • ldquoTaking Turnsrdquo MAC protocols
  • ldquoTaking Turnsrdquo MAC protocols (2)
  • ldquoTaking Turnsrdquo MAC protocols (3)
  • Slide 24
  • Slide 25
  • Summary of MAC protocols
Page 13: 5: DataLink Layer5-1 Chapter 5 Link Layer and LANs Part 3: MAC Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley

5 DataLink Layer 5-13

Pure (unslotted) ALOHA unslotted Aloha simpler no synchronization when frame first arrives

transmit immediately collision probability increases

frame sent at t0 collides with other frames sent in [t0-1t0+1]

5 DataLink Layer 5-14

Pure Aloha efficiency

P(success by given node) = P(node transmits)

P(no other node transmits in [p0-1p0]

P(no other node transmits in [p0-1p0]

= p (1-p)N-1 (1-p)N-1

= p (1-p)2(N-1)

hellip choosing optimum p and then letting n -gt infty

= 1(2e) = 18 even worse than slotted Aloha

5 DataLink Layer 5-15

CSMA (Carrier Sense Multiple Access)

CSMA listen before transmitIf channel sensed idle transmit entire frame If channel sensed busy defer transmission

human analogy donrsquot interrupt others

5 DataLink Layer 5-16

CSMA collisions

collisions can still occurpropagation delay means two nodes may not heareach otherrsquos transmissioncollisionentire packet transmission time wasted

spatial layout of nodes

noterole of distance amp propagation delay in determining collision probability

5 DataLink Layer 5-17

CSMACD (Collision Detection)CSMACD carrier sensing deferral as in

CSMA collisions detected within short time colliding transmissions aborted reducing

channel wastage collision detection

easy in wired LANs measure signal strengths compare transmitted received signals

difficult in wireless LANs received signal strength overwhelmed by local transmission strength

human analogy the polite conversationalist

5 DataLink Layer 5-18

CSMACD collision detection

Link Layer 5-19

Ethernet CSMACD algorithm

1 NIC receives datagram from network layer creates frame

2 If NIC senses channel idle starts frame transmission If NIC senses channel busy waits until channel idle then transmits

3 If NIC transmits entire frame without detecting another transmission NIC is done with frame

4 If NIC detects another transmission while transmitting aborts and sends jam signal

5 After aborting NIC enters binary (exponential) backoff after mth collision NIC

chooses K at random from 012 hellip 2m-1 NIC waits K512 bit times returns to Step 2

longer backoff interval with more collisions

Link Layer 5-20

CSMACD efficiency

Tprop = max prop delay between 2 nodes in LAN ttrans = time to transmit max-size frame

efficiency goes to 1 as tprop goes to 0 as ttrans goes to infinity

better performance than ALOHA and simple cheap decentralized

transprop ttefficiency

51

1

5 DataLink Layer 5-21

ldquoTaking Turnsrdquo MAC protocols

channel partitioning MAC protocols share channel efficiently and fairly at high

load inefficient at low load delay in channel

access 1N bandwidth allocated even if only 1 active node

Random access MAC protocols efficient at low load single node can fully

utilize channel high load collision overhead

ldquotaking turnsrdquo protocolslook for best of both worlds

5 DataLink Layer 5-22

ldquoTaking Turnsrdquo MAC protocols

Polling controller node

ldquoinvitesrdquo client nodes to transmit in turn

typically used with ldquodumbrdquo client devices

concerns polling overhead latency single point of

failure (controller)

controller

clients

poll

data

data

5 DataLink Layer 5-23

ldquoTaking Turnsrdquo MAC protocolsToken passing control token

passed from one node to next sequentially

token message concerns

token overhead latency single point of failure

(token)

T

data

(nothingto send)

T

cable headend

CMTS

ISP

cable modemtermination system

multiple 40Mbps downstream (broadcast) channels single CMTS transmits into channels

multiple 30 Mbps upstream channels multiple access all users contend for certain

upstream channel time slots (others assigned)

Cable access network

cablemodem

splitter

hellip

hellip

Internet framesTV channels control transmitted downstream at different frequencies

upstream Internet frames TV control transmitted upstream at different frequencies in time slots

Link Layer 5-25

DOCSIS data over cable service interface spec

FDM over upstream downstream frequency channels

TDM upstream some slots assigned some have contention downstream MAP frame assigns upstream

slots request for upstream slots (and data)

transmitted random access (binary backoff) in selected slots

MAP frame forInterval [t1 t2]

Residences with cable modems

Downstream channel i

Upstream channel j

t1 t2

Assigned minislots containing cable modemupstream data frames

Minislots containing minislots request frames

cable headend

CMTS

Cable access network

5 DataLink Layer 5-26

Summary of MAC protocols

channel partitioning by time frequency or code Time Division Frequency Division

random access (dynamic) ALOHA S-ALOHA CSMA CSMACD carrier sensing easy in some technologies (wire)

hard in others (wireless) CSMACD used in Ethernet CSMACA used in 80211

taking turns polling from central site token passing Bluetooth FDDI IBM Token Ring

  • Slide 1
  • Link Layer
  • Multiple Access Links and Protocols
  • Multiple Access protocols
  • Ideal Multiple Access Protocol
  • MAC Protocols a taxonomy
  • Channel Partitioning MAC protocols TDMA
  • Channel Partitioning MAC protocols FDMA
  • Random Access Protocols
  • Slotted ALOHA
  • Slotted ALOHA (2)
  • Slotted Aloha efficiency
  • Pure (unslotted) ALOHA
  • Pure Aloha efficiency
  • CSMA (Carrier Sense Multiple Access)
  • CSMA collisions
  • CSMACD (Collision Detection)
  • CSMACD collision detection
  • Ethernet CSMACD algorithm
  • CSMACD efficiency
  • ldquoTaking Turnsrdquo MAC protocols
  • ldquoTaking Turnsrdquo MAC protocols (2)
  • ldquoTaking Turnsrdquo MAC protocols (3)
  • Slide 24
  • Slide 25
  • Summary of MAC protocols
Page 14: 5: DataLink Layer5-1 Chapter 5 Link Layer and LANs Part 3: MAC Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley

5 DataLink Layer 5-14

Pure Aloha efficiency

P(success by given node) = P(node transmits)

P(no other node transmits in [p0-1p0]

P(no other node transmits in [p0-1p0]

= p (1-p)N-1 (1-p)N-1

= p (1-p)2(N-1)

hellip choosing optimum p and then letting n -gt infty

= 1(2e) = 18 even worse than slotted Aloha

5 DataLink Layer 5-15

CSMA (Carrier Sense Multiple Access)

CSMA listen before transmitIf channel sensed idle transmit entire frame If channel sensed busy defer transmission

human analogy donrsquot interrupt others

5 DataLink Layer 5-16

CSMA collisions

collisions can still occurpropagation delay means two nodes may not heareach otherrsquos transmissioncollisionentire packet transmission time wasted

spatial layout of nodes

noterole of distance amp propagation delay in determining collision probability

5 DataLink Layer 5-17

CSMACD (Collision Detection)CSMACD carrier sensing deferral as in

CSMA collisions detected within short time colliding transmissions aborted reducing

channel wastage collision detection

easy in wired LANs measure signal strengths compare transmitted received signals

difficult in wireless LANs received signal strength overwhelmed by local transmission strength

human analogy the polite conversationalist

5 DataLink Layer 5-18

CSMACD collision detection

Link Layer 5-19

Ethernet CSMACD algorithm

1 NIC receives datagram from network layer creates frame

2 If NIC senses channel idle starts frame transmission If NIC senses channel busy waits until channel idle then transmits

3 If NIC transmits entire frame without detecting another transmission NIC is done with frame

4 If NIC detects another transmission while transmitting aborts and sends jam signal

5 After aborting NIC enters binary (exponential) backoff after mth collision NIC

chooses K at random from 012 hellip 2m-1 NIC waits K512 bit times returns to Step 2

longer backoff interval with more collisions

Link Layer 5-20

CSMACD efficiency

Tprop = max prop delay between 2 nodes in LAN ttrans = time to transmit max-size frame

efficiency goes to 1 as tprop goes to 0 as ttrans goes to infinity

better performance than ALOHA and simple cheap decentralized

transprop ttefficiency

51

1

5 DataLink Layer 5-21

ldquoTaking Turnsrdquo MAC protocols

channel partitioning MAC protocols share channel efficiently and fairly at high

load inefficient at low load delay in channel

access 1N bandwidth allocated even if only 1 active node

Random access MAC protocols efficient at low load single node can fully

utilize channel high load collision overhead

ldquotaking turnsrdquo protocolslook for best of both worlds

5 DataLink Layer 5-22

ldquoTaking Turnsrdquo MAC protocols

Polling controller node

ldquoinvitesrdquo client nodes to transmit in turn

typically used with ldquodumbrdquo client devices

concerns polling overhead latency single point of

failure (controller)

controller

clients

poll

data

data

5 DataLink Layer 5-23

ldquoTaking Turnsrdquo MAC protocolsToken passing control token

passed from one node to next sequentially

token message concerns

token overhead latency single point of failure

(token)

T

data

(nothingto send)

T

cable headend

CMTS

ISP

cable modemtermination system

multiple 40Mbps downstream (broadcast) channels single CMTS transmits into channels

multiple 30 Mbps upstream channels multiple access all users contend for certain

upstream channel time slots (others assigned)

Cable access network

cablemodem

splitter

hellip

hellip

Internet framesTV channels control transmitted downstream at different frequencies

upstream Internet frames TV control transmitted upstream at different frequencies in time slots

Link Layer 5-25

DOCSIS data over cable service interface spec

FDM over upstream downstream frequency channels

TDM upstream some slots assigned some have contention downstream MAP frame assigns upstream

slots request for upstream slots (and data)

transmitted random access (binary backoff) in selected slots

MAP frame forInterval [t1 t2]

Residences with cable modems

Downstream channel i

Upstream channel j

t1 t2

Assigned minislots containing cable modemupstream data frames

Minislots containing minislots request frames

cable headend

CMTS

Cable access network

5 DataLink Layer 5-26

Summary of MAC protocols

channel partitioning by time frequency or code Time Division Frequency Division

random access (dynamic) ALOHA S-ALOHA CSMA CSMACD carrier sensing easy in some technologies (wire)

hard in others (wireless) CSMACD used in Ethernet CSMACA used in 80211

taking turns polling from central site token passing Bluetooth FDDI IBM Token Ring

  • Slide 1
  • Link Layer
  • Multiple Access Links and Protocols
  • Multiple Access protocols
  • Ideal Multiple Access Protocol
  • MAC Protocols a taxonomy
  • Channel Partitioning MAC protocols TDMA
  • Channel Partitioning MAC protocols FDMA
  • Random Access Protocols
  • Slotted ALOHA
  • Slotted ALOHA (2)
  • Slotted Aloha efficiency
  • Pure (unslotted) ALOHA
  • Pure Aloha efficiency
  • CSMA (Carrier Sense Multiple Access)
  • CSMA collisions
  • CSMACD (Collision Detection)
  • CSMACD collision detection
  • Ethernet CSMACD algorithm
  • CSMACD efficiency
  • ldquoTaking Turnsrdquo MAC protocols
  • ldquoTaking Turnsrdquo MAC protocols (2)
  • ldquoTaking Turnsrdquo MAC protocols (3)
  • Slide 24
  • Slide 25
  • Summary of MAC protocols
Page 15: 5: DataLink Layer5-1 Chapter 5 Link Layer and LANs Part 3: MAC Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley

5 DataLink Layer 5-15

CSMA (Carrier Sense Multiple Access)

CSMA listen before transmitIf channel sensed idle transmit entire frame If channel sensed busy defer transmission

human analogy donrsquot interrupt others

5 DataLink Layer 5-16

CSMA collisions

collisions can still occurpropagation delay means two nodes may not heareach otherrsquos transmissioncollisionentire packet transmission time wasted

spatial layout of nodes

noterole of distance amp propagation delay in determining collision probability

5 DataLink Layer 5-17

CSMACD (Collision Detection)CSMACD carrier sensing deferral as in

CSMA collisions detected within short time colliding transmissions aborted reducing

channel wastage collision detection

easy in wired LANs measure signal strengths compare transmitted received signals

difficult in wireless LANs received signal strength overwhelmed by local transmission strength

human analogy the polite conversationalist

5 DataLink Layer 5-18

CSMACD collision detection

Link Layer 5-19

Ethernet CSMACD algorithm

1 NIC receives datagram from network layer creates frame

2 If NIC senses channel idle starts frame transmission If NIC senses channel busy waits until channel idle then transmits

3 If NIC transmits entire frame without detecting another transmission NIC is done with frame

4 If NIC detects another transmission while transmitting aborts and sends jam signal

5 After aborting NIC enters binary (exponential) backoff after mth collision NIC

chooses K at random from 012 hellip 2m-1 NIC waits K512 bit times returns to Step 2

longer backoff interval with more collisions

Link Layer 5-20

CSMACD efficiency

Tprop = max prop delay between 2 nodes in LAN ttrans = time to transmit max-size frame

efficiency goes to 1 as tprop goes to 0 as ttrans goes to infinity

better performance than ALOHA and simple cheap decentralized

transprop ttefficiency

51

1

5 DataLink Layer 5-21

ldquoTaking Turnsrdquo MAC protocols

channel partitioning MAC protocols share channel efficiently and fairly at high

load inefficient at low load delay in channel

access 1N bandwidth allocated even if only 1 active node

Random access MAC protocols efficient at low load single node can fully

utilize channel high load collision overhead

ldquotaking turnsrdquo protocolslook for best of both worlds

5 DataLink Layer 5-22

ldquoTaking Turnsrdquo MAC protocols

Polling controller node

ldquoinvitesrdquo client nodes to transmit in turn

typically used with ldquodumbrdquo client devices

concerns polling overhead latency single point of

failure (controller)

controller

clients

poll

data

data

5 DataLink Layer 5-23

ldquoTaking Turnsrdquo MAC protocolsToken passing control token

passed from one node to next sequentially

token message concerns

token overhead latency single point of failure

(token)

T

data

(nothingto send)

T

cable headend

CMTS

ISP

cable modemtermination system

multiple 40Mbps downstream (broadcast) channels single CMTS transmits into channels

multiple 30 Mbps upstream channels multiple access all users contend for certain

upstream channel time slots (others assigned)

Cable access network

cablemodem

splitter

hellip

hellip

Internet framesTV channels control transmitted downstream at different frequencies

upstream Internet frames TV control transmitted upstream at different frequencies in time slots

Link Layer 5-25

DOCSIS data over cable service interface spec

FDM over upstream downstream frequency channels

TDM upstream some slots assigned some have contention downstream MAP frame assigns upstream

slots request for upstream slots (and data)

transmitted random access (binary backoff) in selected slots

MAP frame forInterval [t1 t2]

Residences with cable modems

Downstream channel i

Upstream channel j

t1 t2

Assigned minislots containing cable modemupstream data frames

Minislots containing minislots request frames

cable headend

CMTS

Cable access network

5 DataLink Layer 5-26

Summary of MAC protocols

channel partitioning by time frequency or code Time Division Frequency Division

random access (dynamic) ALOHA S-ALOHA CSMA CSMACD carrier sensing easy in some technologies (wire)

hard in others (wireless) CSMACD used in Ethernet CSMACA used in 80211

taking turns polling from central site token passing Bluetooth FDDI IBM Token Ring

  • Slide 1
  • Link Layer
  • Multiple Access Links and Protocols
  • Multiple Access protocols
  • Ideal Multiple Access Protocol
  • MAC Protocols a taxonomy
  • Channel Partitioning MAC protocols TDMA
  • Channel Partitioning MAC protocols FDMA
  • Random Access Protocols
  • Slotted ALOHA
  • Slotted ALOHA (2)
  • Slotted Aloha efficiency
  • Pure (unslotted) ALOHA
  • Pure Aloha efficiency
  • CSMA (Carrier Sense Multiple Access)
  • CSMA collisions
  • CSMACD (Collision Detection)
  • CSMACD collision detection
  • Ethernet CSMACD algorithm
  • CSMACD efficiency
  • ldquoTaking Turnsrdquo MAC protocols
  • ldquoTaking Turnsrdquo MAC protocols (2)
  • ldquoTaking Turnsrdquo MAC protocols (3)
  • Slide 24
  • Slide 25
  • Summary of MAC protocols
Page 16: 5: DataLink Layer5-1 Chapter 5 Link Layer and LANs Part 3: MAC Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley

5 DataLink Layer 5-16

CSMA collisions

collisions can still occurpropagation delay means two nodes may not heareach otherrsquos transmissioncollisionentire packet transmission time wasted

spatial layout of nodes

noterole of distance amp propagation delay in determining collision probability

5 DataLink Layer 5-17

CSMACD (Collision Detection)CSMACD carrier sensing deferral as in

CSMA collisions detected within short time colliding transmissions aborted reducing

channel wastage collision detection

easy in wired LANs measure signal strengths compare transmitted received signals

difficult in wireless LANs received signal strength overwhelmed by local transmission strength

human analogy the polite conversationalist

5 DataLink Layer 5-18

CSMACD collision detection

Link Layer 5-19

Ethernet CSMACD algorithm

1 NIC receives datagram from network layer creates frame

2 If NIC senses channel idle starts frame transmission If NIC senses channel busy waits until channel idle then transmits

3 If NIC transmits entire frame without detecting another transmission NIC is done with frame

4 If NIC detects another transmission while transmitting aborts and sends jam signal

5 After aborting NIC enters binary (exponential) backoff after mth collision NIC

chooses K at random from 012 hellip 2m-1 NIC waits K512 bit times returns to Step 2

longer backoff interval with more collisions

Link Layer 5-20

CSMACD efficiency

Tprop = max prop delay between 2 nodes in LAN ttrans = time to transmit max-size frame

efficiency goes to 1 as tprop goes to 0 as ttrans goes to infinity

better performance than ALOHA and simple cheap decentralized

transprop ttefficiency

51

1

5 DataLink Layer 5-21

ldquoTaking Turnsrdquo MAC protocols

channel partitioning MAC protocols share channel efficiently and fairly at high

load inefficient at low load delay in channel

access 1N bandwidth allocated even if only 1 active node

Random access MAC protocols efficient at low load single node can fully

utilize channel high load collision overhead

ldquotaking turnsrdquo protocolslook for best of both worlds

5 DataLink Layer 5-22

ldquoTaking Turnsrdquo MAC protocols

Polling controller node

ldquoinvitesrdquo client nodes to transmit in turn

typically used with ldquodumbrdquo client devices

concerns polling overhead latency single point of

failure (controller)

controller

clients

poll

data

data

5 DataLink Layer 5-23

ldquoTaking Turnsrdquo MAC protocolsToken passing control token

passed from one node to next sequentially

token message concerns

token overhead latency single point of failure

(token)

T

data

(nothingto send)

T

cable headend

CMTS

ISP

cable modemtermination system

multiple 40Mbps downstream (broadcast) channels single CMTS transmits into channels

multiple 30 Mbps upstream channels multiple access all users contend for certain

upstream channel time slots (others assigned)

Cable access network

cablemodem

splitter

hellip

hellip

Internet framesTV channels control transmitted downstream at different frequencies

upstream Internet frames TV control transmitted upstream at different frequencies in time slots

Link Layer 5-25

DOCSIS data over cable service interface spec

FDM over upstream downstream frequency channels

TDM upstream some slots assigned some have contention downstream MAP frame assigns upstream

slots request for upstream slots (and data)

transmitted random access (binary backoff) in selected slots

MAP frame forInterval [t1 t2]

Residences with cable modems

Downstream channel i

Upstream channel j

t1 t2

Assigned minislots containing cable modemupstream data frames

Minislots containing minislots request frames

cable headend

CMTS

Cable access network

5 DataLink Layer 5-26

Summary of MAC protocols

channel partitioning by time frequency or code Time Division Frequency Division

random access (dynamic) ALOHA S-ALOHA CSMA CSMACD carrier sensing easy in some technologies (wire)

hard in others (wireless) CSMACD used in Ethernet CSMACA used in 80211

taking turns polling from central site token passing Bluetooth FDDI IBM Token Ring

  • Slide 1
  • Link Layer
  • Multiple Access Links and Protocols
  • Multiple Access protocols
  • Ideal Multiple Access Protocol
  • MAC Protocols a taxonomy
  • Channel Partitioning MAC protocols TDMA
  • Channel Partitioning MAC protocols FDMA
  • Random Access Protocols
  • Slotted ALOHA
  • Slotted ALOHA (2)
  • Slotted Aloha efficiency
  • Pure (unslotted) ALOHA
  • Pure Aloha efficiency
  • CSMA (Carrier Sense Multiple Access)
  • CSMA collisions
  • CSMACD (Collision Detection)
  • CSMACD collision detection
  • Ethernet CSMACD algorithm
  • CSMACD efficiency
  • ldquoTaking Turnsrdquo MAC protocols
  • ldquoTaking Turnsrdquo MAC protocols (2)
  • ldquoTaking Turnsrdquo MAC protocols (3)
  • Slide 24
  • Slide 25
  • Summary of MAC protocols
Page 17: 5: DataLink Layer5-1 Chapter 5 Link Layer and LANs Part 3: MAC Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley

5 DataLink Layer 5-17

CSMACD (Collision Detection)CSMACD carrier sensing deferral as in

CSMA collisions detected within short time colliding transmissions aborted reducing

channel wastage collision detection

easy in wired LANs measure signal strengths compare transmitted received signals

difficult in wireless LANs received signal strength overwhelmed by local transmission strength

human analogy the polite conversationalist

5 DataLink Layer 5-18

CSMACD collision detection

Link Layer 5-19

Ethernet CSMACD algorithm

1 NIC receives datagram from network layer creates frame

2 If NIC senses channel idle starts frame transmission If NIC senses channel busy waits until channel idle then transmits

3 If NIC transmits entire frame without detecting another transmission NIC is done with frame

4 If NIC detects another transmission while transmitting aborts and sends jam signal

5 After aborting NIC enters binary (exponential) backoff after mth collision NIC

chooses K at random from 012 hellip 2m-1 NIC waits K512 bit times returns to Step 2

longer backoff interval with more collisions

Link Layer 5-20

CSMACD efficiency

Tprop = max prop delay between 2 nodes in LAN ttrans = time to transmit max-size frame

efficiency goes to 1 as tprop goes to 0 as ttrans goes to infinity

better performance than ALOHA and simple cheap decentralized

transprop ttefficiency

51

1

5 DataLink Layer 5-21

ldquoTaking Turnsrdquo MAC protocols

channel partitioning MAC protocols share channel efficiently and fairly at high

load inefficient at low load delay in channel

access 1N bandwidth allocated even if only 1 active node

Random access MAC protocols efficient at low load single node can fully

utilize channel high load collision overhead

ldquotaking turnsrdquo protocolslook for best of both worlds

5 DataLink Layer 5-22

ldquoTaking Turnsrdquo MAC protocols

Polling controller node

ldquoinvitesrdquo client nodes to transmit in turn

typically used with ldquodumbrdquo client devices

concerns polling overhead latency single point of

failure (controller)

controller

clients

poll

data

data

5 DataLink Layer 5-23

ldquoTaking Turnsrdquo MAC protocolsToken passing control token

passed from one node to next sequentially

token message concerns

token overhead latency single point of failure

(token)

T

data

(nothingto send)

T

cable headend

CMTS

ISP

cable modemtermination system

multiple 40Mbps downstream (broadcast) channels single CMTS transmits into channels

multiple 30 Mbps upstream channels multiple access all users contend for certain

upstream channel time slots (others assigned)

Cable access network

cablemodem

splitter

hellip

hellip

Internet framesTV channels control transmitted downstream at different frequencies

upstream Internet frames TV control transmitted upstream at different frequencies in time slots

Link Layer 5-25

DOCSIS data over cable service interface spec

FDM over upstream downstream frequency channels

TDM upstream some slots assigned some have contention downstream MAP frame assigns upstream

slots request for upstream slots (and data)

transmitted random access (binary backoff) in selected slots

MAP frame forInterval [t1 t2]

Residences with cable modems

Downstream channel i

Upstream channel j

t1 t2

Assigned minislots containing cable modemupstream data frames

Minislots containing minislots request frames

cable headend

CMTS

Cable access network

5 DataLink Layer 5-26

Summary of MAC protocols

channel partitioning by time frequency or code Time Division Frequency Division

random access (dynamic) ALOHA S-ALOHA CSMA CSMACD carrier sensing easy in some technologies (wire)

hard in others (wireless) CSMACD used in Ethernet CSMACA used in 80211

taking turns polling from central site token passing Bluetooth FDDI IBM Token Ring

  • Slide 1
  • Link Layer
  • Multiple Access Links and Protocols
  • Multiple Access protocols
  • Ideal Multiple Access Protocol
  • MAC Protocols a taxonomy
  • Channel Partitioning MAC protocols TDMA
  • Channel Partitioning MAC protocols FDMA
  • Random Access Protocols
  • Slotted ALOHA
  • Slotted ALOHA (2)
  • Slotted Aloha efficiency
  • Pure (unslotted) ALOHA
  • Pure Aloha efficiency
  • CSMA (Carrier Sense Multiple Access)
  • CSMA collisions
  • CSMACD (Collision Detection)
  • CSMACD collision detection
  • Ethernet CSMACD algorithm
  • CSMACD efficiency
  • ldquoTaking Turnsrdquo MAC protocols
  • ldquoTaking Turnsrdquo MAC protocols (2)
  • ldquoTaking Turnsrdquo MAC protocols (3)
  • Slide 24
  • Slide 25
  • Summary of MAC protocols
Page 18: 5: DataLink Layer5-1 Chapter 5 Link Layer and LANs Part 3: MAC Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley

5 DataLink Layer 5-18

CSMACD collision detection

Link Layer 5-19

Ethernet CSMACD algorithm

1 NIC receives datagram from network layer creates frame

2 If NIC senses channel idle starts frame transmission If NIC senses channel busy waits until channel idle then transmits

3 If NIC transmits entire frame without detecting another transmission NIC is done with frame

4 If NIC detects another transmission while transmitting aborts and sends jam signal

5 After aborting NIC enters binary (exponential) backoff after mth collision NIC

chooses K at random from 012 hellip 2m-1 NIC waits K512 bit times returns to Step 2

longer backoff interval with more collisions

Link Layer 5-20

CSMACD efficiency

Tprop = max prop delay between 2 nodes in LAN ttrans = time to transmit max-size frame

efficiency goes to 1 as tprop goes to 0 as ttrans goes to infinity

better performance than ALOHA and simple cheap decentralized

transprop ttefficiency

51

1

5 DataLink Layer 5-21

ldquoTaking Turnsrdquo MAC protocols

channel partitioning MAC protocols share channel efficiently and fairly at high

load inefficient at low load delay in channel

access 1N bandwidth allocated even if only 1 active node

Random access MAC protocols efficient at low load single node can fully

utilize channel high load collision overhead

ldquotaking turnsrdquo protocolslook for best of both worlds

5 DataLink Layer 5-22

ldquoTaking Turnsrdquo MAC protocols

Polling controller node

ldquoinvitesrdquo client nodes to transmit in turn

typically used with ldquodumbrdquo client devices

concerns polling overhead latency single point of

failure (controller)

controller

clients

poll

data

data

5 DataLink Layer 5-23

ldquoTaking Turnsrdquo MAC protocolsToken passing control token

passed from one node to next sequentially

token message concerns

token overhead latency single point of failure

(token)

T

data

(nothingto send)

T

cable headend

CMTS

ISP

cable modemtermination system

multiple 40Mbps downstream (broadcast) channels single CMTS transmits into channels

multiple 30 Mbps upstream channels multiple access all users contend for certain

upstream channel time slots (others assigned)

Cable access network

cablemodem

splitter

hellip

hellip

Internet framesTV channels control transmitted downstream at different frequencies

upstream Internet frames TV control transmitted upstream at different frequencies in time slots

Link Layer 5-25

DOCSIS data over cable service interface spec

FDM over upstream downstream frequency channels

TDM upstream some slots assigned some have contention downstream MAP frame assigns upstream

slots request for upstream slots (and data)

transmitted random access (binary backoff) in selected slots

MAP frame forInterval [t1 t2]

Residences with cable modems

Downstream channel i

Upstream channel j

t1 t2

Assigned minislots containing cable modemupstream data frames

Minislots containing minislots request frames

cable headend

CMTS

Cable access network

5 DataLink Layer 5-26

Summary of MAC protocols

channel partitioning by time frequency or code Time Division Frequency Division

random access (dynamic) ALOHA S-ALOHA CSMA CSMACD carrier sensing easy in some technologies (wire)

hard in others (wireless) CSMACD used in Ethernet CSMACA used in 80211

taking turns polling from central site token passing Bluetooth FDDI IBM Token Ring

  • Slide 1
  • Link Layer
  • Multiple Access Links and Protocols
  • Multiple Access protocols
  • Ideal Multiple Access Protocol
  • MAC Protocols a taxonomy
  • Channel Partitioning MAC protocols TDMA
  • Channel Partitioning MAC protocols FDMA
  • Random Access Protocols
  • Slotted ALOHA
  • Slotted ALOHA (2)
  • Slotted Aloha efficiency
  • Pure (unslotted) ALOHA
  • Pure Aloha efficiency
  • CSMA (Carrier Sense Multiple Access)
  • CSMA collisions
  • CSMACD (Collision Detection)
  • CSMACD collision detection
  • Ethernet CSMACD algorithm
  • CSMACD efficiency
  • ldquoTaking Turnsrdquo MAC protocols
  • ldquoTaking Turnsrdquo MAC protocols (2)
  • ldquoTaking Turnsrdquo MAC protocols (3)
  • Slide 24
  • Slide 25
  • Summary of MAC protocols
Page 19: 5: DataLink Layer5-1 Chapter 5 Link Layer and LANs Part 3: MAC Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley

Link Layer 5-19

Ethernet CSMACD algorithm

1 NIC receives datagram from network layer creates frame

2 If NIC senses channel idle starts frame transmission If NIC senses channel busy waits until channel idle then transmits

3 If NIC transmits entire frame without detecting another transmission NIC is done with frame

4 If NIC detects another transmission while transmitting aborts and sends jam signal

5 After aborting NIC enters binary (exponential) backoff after mth collision NIC

chooses K at random from 012 hellip 2m-1 NIC waits K512 bit times returns to Step 2

longer backoff interval with more collisions

Link Layer 5-20

CSMACD efficiency

Tprop = max prop delay between 2 nodes in LAN ttrans = time to transmit max-size frame

efficiency goes to 1 as tprop goes to 0 as ttrans goes to infinity

better performance than ALOHA and simple cheap decentralized

transprop ttefficiency

51

1

5 DataLink Layer 5-21

ldquoTaking Turnsrdquo MAC protocols

channel partitioning MAC protocols share channel efficiently and fairly at high

load inefficient at low load delay in channel

access 1N bandwidth allocated even if only 1 active node

Random access MAC protocols efficient at low load single node can fully

utilize channel high load collision overhead

ldquotaking turnsrdquo protocolslook for best of both worlds

5 DataLink Layer 5-22

ldquoTaking Turnsrdquo MAC protocols

Polling controller node

ldquoinvitesrdquo client nodes to transmit in turn

typically used with ldquodumbrdquo client devices

concerns polling overhead latency single point of

failure (controller)

controller

clients

poll

data

data

5 DataLink Layer 5-23

ldquoTaking Turnsrdquo MAC protocolsToken passing control token

passed from one node to next sequentially

token message concerns

token overhead latency single point of failure

(token)

T

data

(nothingto send)

T

cable headend

CMTS

ISP

cable modemtermination system

multiple 40Mbps downstream (broadcast) channels single CMTS transmits into channels

multiple 30 Mbps upstream channels multiple access all users contend for certain

upstream channel time slots (others assigned)

Cable access network

cablemodem

splitter

hellip

hellip

Internet framesTV channels control transmitted downstream at different frequencies

upstream Internet frames TV control transmitted upstream at different frequencies in time slots

Link Layer 5-25

DOCSIS data over cable service interface spec

FDM over upstream downstream frequency channels

TDM upstream some slots assigned some have contention downstream MAP frame assigns upstream

slots request for upstream slots (and data)

transmitted random access (binary backoff) in selected slots

MAP frame forInterval [t1 t2]

Residences with cable modems

Downstream channel i

Upstream channel j

t1 t2

Assigned minislots containing cable modemupstream data frames

Minislots containing minislots request frames

cable headend

CMTS

Cable access network

5 DataLink Layer 5-26

Summary of MAC protocols

channel partitioning by time frequency or code Time Division Frequency Division

random access (dynamic) ALOHA S-ALOHA CSMA CSMACD carrier sensing easy in some technologies (wire)

hard in others (wireless) CSMACD used in Ethernet CSMACA used in 80211

taking turns polling from central site token passing Bluetooth FDDI IBM Token Ring

  • Slide 1
  • Link Layer
  • Multiple Access Links and Protocols
  • Multiple Access protocols
  • Ideal Multiple Access Protocol
  • MAC Protocols a taxonomy
  • Channel Partitioning MAC protocols TDMA
  • Channel Partitioning MAC protocols FDMA
  • Random Access Protocols
  • Slotted ALOHA
  • Slotted ALOHA (2)
  • Slotted Aloha efficiency
  • Pure (unslotted) ALOHA
  • Pure Aloha efficiency
  • CSMA (Carrier Sense Multiple Access)
  • CSMA collisions
  • CSMACD (Collision Detection)
  • CSMACD collision detection
  • Ethernet CSMACD algorithm
  • CSMACD efficiency
  • ldquoTaking Turnsrdquo MAC protocols
  • ldquoTaking Turnsrdquo MAC protocols (2)
  • ldquoTaking Turnsrdquo MAC protocols (3)
  • Slide 24
  • Slide 25
  • Summary of MAC protocols
Page 20: 5: DataLink Layer5-1 Chapter 5 Link Layer and LANs Part 3: MAC Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley

Link Layer 5-20

CSMACD efficiency

Tprop = max prop delay between 2 nodes in LAN ttrans = time to transmit max-size frame

efficiency goes to 1 as tprop goes to 0 as ttrans goes to infinity

better performance than ALOHA and simple cheap decentralized

transprop ttefficiency

51

1

5 DataLink Layer 5-21

ldquoTaking Turnsrdquo MAC protocols

channel partitioning MAC protocols share channel efficiently and fairly at high

load inefficient at low load delay in channel

access 1N bandwidth allocated even if only 1 active node

Random access MAC protocols efficient at low load single node can fully

utilize channel high load collision overhead

ldquotaking turnsrdquo protocolslook for best of both worlds

5 DataLink Layer 5-22

ldquoTaking Turnsrdquo MAC protocols

Polling controller node

ldquoinvitesrdquo client nodes to transmit in turn

typically used with ldquodumbrdquo client devices

concerns polling overhead latency single point of

failure (controller)

controller

clients

poll

data

data

5 DataLink Layer 5-23

ldquoTaking Turnsrdquo MAC protocolsToken passing control token

passed from one node to next sequentially

token message concerns

token overhead latency single point of failure

(token)

T

data

(nothingto send)

T

cable headend

CMTS

ISP

cable modemtermination system

multiple 40Mbps downstream (broadcast) channels single CMTS transmits into channels

multiple 30 Mbps upstream channels multiple access all users contend for certain

upstream channel time slots (others assigned)

Cable access network

cablemodem

splitter

hellip

hellip

Internet framesTV channels control transmitted downstream at different frequencies

upstream Internet frames TV control transmitted upstream at different frequencies in time slots

Link Layer 5-25

DOCSIS data over cable service interface spec

FDM over upstream downstream frequency channels

TDM upstream some slots assigned some have contention downstream MAP frame assigns upstream

slots request for upstream slots (and data)

transmitted random access (binary backoff) in selected slots

MAP frame forInterval [t1 t2]

Residences with cable modems

Downstream channel i

Upstream channel j

t1 t2

Assigned minislots containing cable modemupstream data frames

Minislots containing minislots request frames

cable headend

CMTS

Cable access network

5 DataLink Layer 5-26

Summary of MAC protocols

channel partitioning by time frequency or code Time Division Frequency Division

random access (dynamic) ALOHA S-ALOHA CSMA CSMACD carrier sensing easy in some technologies (wire)

hard in others (wireless) CSMACD used in Ethernet CSMACA used in 80211

taking turns polling from central site token passing Bluetooth FDDI IBM Token Ring

  • Slide 1
  • Link Layer
  • Multiple Access Links and Protocols
  • Multiple Access protocols
  • Ideal Multiple Access Protocol
  • MAC Protocols a taxonomy
  • Channel Partitioning MAC protocols TDMA
  • Channel Partitioning MAC protocols FDMA
  • Random Access Protocols
  • Slotted ALOHA
  • Slotted ALOHA (2)
  • Slotted Aloha efficiency
  • Pure (unslotted) ALOHA
  • Pure Aloha efficiency
  • CSMA (Carrier Sense Multiple Access)
  • CSMA collisions
  • CSMACD (Collision Detection)
  • CSMACD collision detection
  • Ethernet CSMACD algorithm
  • CSMACD efficiency
  • ldquoTaking Turnsrdquo MAC protocols
  • ldquoTaking Turnsrdquo MAC protocols (2)
  • ldquoTaking Turnsrdquo MAC protocols (3)
  • Slide 24
  • Slide 25
  • Summary of MAC protocols
Page 21: 5: DataLink Layer5-1 Chapter 5 Link Layer and LANs Part 3: MAC Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley

5 DataLink Layer 5-21

ldquoTaking Turnsrdquo MAC protocols

channel partitioning MAC protocols share channel efficiently and fairly at high

load inefficient at low load delay in channel

access 1N bandwidth allocated even if only 1 active node

Random access MAC protocols efficient at low load single node can fully

utilize channel high load collision overhead

ldquotaking turnsrdquo protocolslook for best of both worlds

5 DataLink Layer 5-22

ldquoTaking Turnsrdquo MAC protocols

Polling controller node

ldquoinvitesrdquo client nodes to transmit in turn

typically used with ldquodumbrdquo client devices

concerns polling overhead latency single point of

failure (controller)

controller

clients

poll

data

data

5 DataLink Layer 5-23

ldquoTaking Turnsrdquo MAC protocolsToken passing control token

passed from one node to next sequentially

token message concerns

token overhead latency single point of failure

(token)

T

data

(nothingto send)

T

cable headend

CMTS

ISP

cable modemtermination system

multiple 40Mbps downstream (broadcast) channels single CMTS transmits into channels

multiple 30 Mbps upstream channels multiple access all users contend for certain

upstream channel time slots (others assigned)

Cable access network

cablemodem

splitter

hellip

hellip

Internet framesTV channels control transmitted downstream at different frequencies

upstream Internet frames TV control transmitted upstream at different frequencies in time slots

Link Layer 5-25

DOCSIS data over cable service interface spec

FDM over upstream downstream frequency channels

TDM upstream some slots assigned some have contention downstream MAP frame assigns upstream

slots request for upstream slots (and data)

transmitted random access (binary backoff) in selected slots

MAP frame forInterval [t1 t2]

Residences with cable modems

Downstream channel i

Upstream channel j

t1 t2

Assigned minislots containing cable modemupstream data frames

Minislots containing minislots request frames

cable headend

CMTS

Cable access network

5 DataLink Layer 5-26

Summary of MAC protocols

channel partitioning by time frequency or code Time Division Frequency Division

random access (dynamic) ALOHA S-ALOHA CSMA CSMACD carrier sensing easy in some technologies (wire)

hard in others (wireless) CSMACD used in Ethernet CSMACA used in 80211

taking turns polling from central site token passing Bluetooth FDDI IBM Token Ring

  • Slide 1
  • Link Layer
  • Multiple Access Links and Protocols
  • Multiple Access protocols
  • Ideal Multiple Access Protocol
  • MAC Protocols a taxonomy
  • Channel Partitioning MAC protocols TDMA
  • Channel Partitioning MAC protocols FDMA
  • Random Access Protocols
  • Slotted ALOHA
  • Slotted ALOHA (2)
  • Slotted Aloha efficiency
  • Pure (unslotted) ALOHA
  • Pure Aloha efficiency
  • CSMA (Carrier Sense Multiple Access)
  • CSMA collisions
  • CSMACD (Collision Detection)
  • CSMACD collision detection
  • Ethernet CSMACD algorithm
  • CSMACD efficiency
  • ldquoTaking Turnsrdquo MAC protocols
  • ldquoTaking Turnsrdquo MAC protocols (2)
  • ldquoTaking Turnsrdquo MAC protocols (3)
  • Slide 24
  • Slide 25
  • Summary of MAC protocols
Page 22: 5: DataLink Layer5-1 Chapter 5 Link Layer and LANs Part 3: MAC Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley

5 DataLink Layer 5-22

ldquoTaking Turnsrdquo MAC protocols

Polling controller node

ldquoinvitesrdquo client nodes to transmit in turn

typically used with ldquodumbrdquo client devices

concerns polling overhead latency single point of

failure (controller)

controller

clients

poll

data

data

5 DataLink Layer 5-23

ldquoTaking Turnsrdquo MAC protocolsToken passing control token

passed from one node to next sequentially

token message concerns

token overhead latency single point of failure

(token)

T

data

(nothingto send)

T

cable headend

CMTS

ISP

cable modemtermination system

multiple 40Mbps downstream (broadcast) channels single CMTS transmits into channels

multiple 30 Mbps upstream channels multiple access all users contend for certain

upstream channel time slots (others assigned)

Cable access network

cablemodem

splitter

hellip

hellip

Internet framesTV channels control transmitted downstream at different frequencies

upstream Internet frames TV control transmitted upstream at different frequencies in time slots

Link Layer 5-25

DOCSIS data over cable service interface spec

FDM over upstream downstream frequency channels

TDM upstream some slots assigned some have contention downstream MAP frame assigns upstream

slots request for upstream slots (and data)

transmitted random access (binary backoff) in selected slots

MAP frame forInterval [t1 t2]

Residences with cable modems

Downstream channel i

Upstream channel j

t1 t2

Assigned minislots containing cable modemupstream data frames

Minislots containing minislots request frames

cable headend

CMTS

Cable access network

5 DataLink Layer 5-26

Summary of MAC protocols

channel partitioning by time frequency or code Time Division Frequency Division

random access (dynamic) ALOHA S-ALOHA CSMA CSMACD carrier sensing easy in some technologies (wire)

hard in others (wireless) CSMACD used in Ethernet CSMACA used in 80211

taking turns polling from central site token passing Bluetooth FDDI IBM Token Ring

  • Slide 1
  • Link Layer
  • Multiple Access Links and Protocols
  • Multiple Access protocols
  • Ideal Multiple Access Protocol
  • MAC Protocols a taxonomy
  • Channel Partitioning MAC protocols TDMA
  • Channel Partitioning MAC protocols FDMA
  • Random Access Protocols
  • Slotted ALOHA
  • Slotted ALOHA (2)
  • Slotted Aloha efficiency
  • Pure (unslotted) ALOHA
  • Pure Aloha efficiency
  • CSMA (Carrier Sense Multiple Access)
  • CSMA collisions
  • CSMACD (Collision Detection)
  • CSMACD collision detection
  • Ethernet CSMACD algorithm
  • CSMACD efficiency
  • ldquoTaking Turnsrdquo MAC protocols
  • ldquoTaking Turnsrdquo MAC protocols (2)
  • ldquoTaking Turnsrdquo MAC protocols (3)
  • Slide 24
  • Slide 25
  • Summary of MAC protocols
Page 23: 5: DataLink Layer5-1 Chapter 5 Link Layer and LANs Part 3: MAC Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley

5 DataLink Layer 5-23

ldquoTaking Turnsrdquo MAC protocolsToken passing control token

passed from one node to next sequentially

token message concerns

token overhead latency single point of failure

(token)

T

data

(nothingto send)

T

cable headend

CMTS

ISP

cable modemtermination system

multiple 40Mbps downstream (broadcast) channels single CMTS transmits into channels

multiple 30 Mbps upstream channels multiple access all users contend for certain

upstream channel time slots (others assigned)

Cable access network

cablemodem

splitter

hellip

hellip

Internet framesTV channels control transmitted downstream at different frequencies

upstream Internet frames TV control transmitted upstream at different frequencies in time slots

Link Layer 5-25

DOCSIS data over cable service interface spec

FDM over upstream downstream frequency channels

TDM upstream some slots assigned some have contention downstream MAP frame assigns upstream

slots request for upstream slots (and data)

transmitted random access (binary backoff) in selected slots

MAP frame forInterval [t1 t2]

Residences with cable modems

Downstream channel i

Upstream channel j

t1 t2

Assigned minislots containing cable modemupstream data frames

Minislots containing minislots request frames

cable headend

CMTS

Cable access network

5 DataLink Layer 5-26

Summary of MAC protocols

channel partitioning by time frequency or code Time Division Frequency Division

random access (dynamic) ALOHA S-ALOHA CSMA CSMACD carrier sensing easy in some technologies (wire)

hard in others (wireless) CSMACD used in Ethernet CSMACA used in 80211

taking turns polling from central site token passing Bluetooth FDDI IBM Token Ring

  • Slide 1
  • Link Layer
  • Multiple Access Links and Protocols
  • Multiple Access protocols
  • Ideal Multiple Access Protocol
  • MAC Protocols a taxonomy
  • Channel Partitioning MAC protocols TDMA
  • Channel Partitioning MAC protocols FDMA
  • Random Access Protocols
  • Slotted ALOHA
  • Slotted ALOHA (2)
  • Slotted Aloha efficiency
  • Pure (unslotted) ALOHA
  • Pure Aloha efficiency
  • CSMA (Carrier Sense Multiple Access)
  • CSMA collisions
  • CSMACD (Collision Detection)
  • CSMACD collision detection
  • Ethernet CSMACD algorithm
  • CSMACD efficiency
  • ldquoTaking Turnsrdquo MAC protocols
  • ldquoTaking Turnsrdquo MAC protocols (2)
  • ldquoTaking Turnsrdquo MAC protocols (3)
  • Slide 24
  • Slide 25
  • Summary of MAC protocols
Page 24: 5: DataLink Layer5-1 Chapter 5 Link Layer and LANs Part 3: MAC Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley

cable headend

CMTS

ISP

cable modemtermination system

multiple 40Mbps downstream (broadcast) channels single CMTS transmits into channels

multiple 30 Mbps upstream channels multiple access all users contend for certain

upstream channel time slots (others assigned)

Cable access network

cablemodem

splitter

hellip

hellip

Internet framesTV channels control transmitted downstream at different frequencies

upstream Internet frames TV control transmitted upstream at different frequencies in time slots

Link Layer 5-25

DOCSIS data over cable service interface spec

FDM over upstream downstream frequency channels

TDM upstream some slots assigned some have contention downstream MAP frame assigns upstream

slots request for upstream slots (and data)

transmitted random access (binary backoff) in selected slots

MAP frame forInterval [t1 t2]

Residences with cable modems

Downstream channel i

Upstream channel j

t1 t2

Assigned minislots containing cable modemupstream data frames

Minislots containing minislots request frames

cable headend

CMTS

Cable access network

5 DataLink Layer 5-26

Summary of MAC protocols

channel partitioning by time frequency or code Time Division Frequency Division

random access (dynamic) ALOHA S-ALOHA CSMA CSMACD carrier sensing easy in some technologies (wire)

hard in others (wireless) CSMACD used in Ethernet CSMACA used in 80211

taking turns polling from central site token passing Bluetooth FDDI IBM Token Ring

  • Slide 1
  • Link Layer
  • Multiple Access Links and Protocols
  • Multiple Access protocols
  • Ideal Multiple Access Protocol
  • MAC Protocols a taxonomy
  • Channel Partitioning MAC protocols TDMA
  • Channel Partitioning MAC protocols FDMA
  • Random Access Protocols
  • Slotted ALOHA
  • Slotted ALOHA (2)
  • Slotted Aloha efficiency
  • Pure (unslotted) ALOHA
  • Pure Aloha efficiency
  • CSMA (Carrier Sense Multiple Access)
  • CSMA collisions
  • CSMACD (Collision Detection)
  • CSMACD collision detection
  • Ethernet CSMACD algorithm
  • CSMACD efficiency
  • ldquoTaking Turnsrdquo MAC protocols
  • ldquoTaking Turnsrdquo MAC protocols (2)
  • ldquoTaking Turnsrdquo MAC protocols (3)
  • Slide 24
  • Slide 25
  • Summary of MAC protocols
Page 25: 5: DataLink Layer5-1 Chapter 5 Link Layer and LANs Part 3: MAC Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley

Link Layer 5-25

DOCSIS data over cable service interface spec

FDM over upstream downstream frequency channels

TDM upstream some slots assigned some have contention downstream MAP frame assigns upstream

slots request for upstream slots (and data)

transmitted random access (binary backoff) in selected slots

MAP frame forInterval [t1 t2]

Residences with cable modems

Downstream channel i

Upstream channel j

t1 t2

Assigned minislots containing cable modemupstream data frames

Minislots containing minislots request frames

cable headend

CMTS

Cable access network

5 DataLink Layer 5-26

Summary of MAC protocols

channel partitioning by time frequency or code Time Division Frequency Division

random access (dynamic) ALOHA S-ALOHA CSMA CSMACD carrier sensing easy in some technologies (wire)

hard in others (wireless) CSMACD used in Ethernet CSMACA used in 80211

taking turns polling from central site token passing Bluetooth FDDI IBM Token Ring

  • Slide 1
  • Link Layer
  • Multiple Access Links and Protocols
  • Multiple Access protocols
  • Ideal Multiple Access Protocol
  • MAC Protocols a taxonomy
  • Channel Partitioning MAC protocols TDMA
  • Channel Partitioning MAC protocols FDMA
  • Random Access Protocols
  • Slotted ALOHA
  • Slotted ALOHA (2)
  • Slotted Aloha efficiency
  • Pure (unslotted) ALOHA
  • Pure Aloha efficiency
  • CSMA (Carrier Sense Multiple Access)
  • CSMA collisions
  • CSMACD (Collision Detection)
  • CSMACD collision detection
  • Ethernet CSMACD algorithm
  • CSMACD efficiency
  • ldquoTaking Turnsrdquo MAC protocols
  • ldquoTaking Turnsrdquo MAC protocols (2)
  • ldquoTaking Turnsrdquo MAC protocols (3)
  • Slide 24
  • Slide 25
  • Summary of MAC protocols
Page 26: 5: DataLink Layer5-1 Chapter 5 Link Layer and LANs Part 3: MAC Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley

5 DataLink Layer 5-26

Summary of MAC protocols

channel partitioning by time frequency or code Time Division Frequency Division

random access (dynamic) ALOHA S-ALOHA CSMA CSMACD carrier sensing easy in some technologies (wire)

hard in others (wireless) CSMACD used in Ethernet CSMACA used in 80211

taking turns polling from central site token passing Bluetooth FDDI IBM Token Ring

  • Slide 1
  • Link Layer
  • Multiple Access Links and Protocols
  • Multiple Access protocols
  • Ideal Multiple Access Protocol
  • MAC Protocols a taxonomy
  • Channel Partitioning MAC protocols TDMA
  • Channel Partitioning MAC protocols FDMA
  • Random Access Protocols
  • Slotted ALOHA
  • Slotted ALOHA (2)
  • Slotted Aloha efficiency
  • Pure (unslotted) ALOHA
  • Pure Aloha efficiency
  • CSMA (Carrier Sense Multiple Access)
  • CSMA collisions
  • CSMACD (Collision Detection)
  • CSMACD collision detection
  • Ethernet CSMACD algorithm
  • CSMACD efficiency
  • ldquoTaking Turnsrdquo MAC protocols
  • ldquoTaking Turnsrdquo MAC protocols (2)
  • ldquoTaking Turnsrdquo MAC protocols (3)
  • Slide 24
  • Slide 25
  • Summary of MAC protocols