Datacommchapter 5 Part1

  • December 2019
  • PDF

This document was uploaded by user and they confirmed that they have the permission to share it. If you are author or own the copyright of this book, please report to us by using this DMCA report form. Report DMCA


Overview

Download & View Datacommchapter 5 Part1 as PDF for free.

More details

  • Words: 3,501
  • Pages: 52
Chapter 5 Multiple Access Networks

1 Main reference: Copyright © The McGraw-Hill Companies Inc.

PART 1: 5.1: RANDOM ACCESS 5.2 CONTROLLED ACCESS

2

Introduction

Local Area Network [LAN] - used to interconnect distributed communities of computerbased DTEs located within a single building or localized group of buildings - also referred to as private data networks Advantage: i. Inexpensive and fast interconnections of minicomputers, PCs, workstations, etc., in business, education and research environments ii. Allow users to share expensive resources, such as repository data [e.g., file servers] repository knowledge [e.g., database servers] service provider [e.g., printer, plotter]

3

Characteristics: i. Moderate-size geographic area [diameter of no more than a few km] ii. Located within a single building or localized group of buildings [warehouse, campus, hostel] iii. Total data rate of at least several Mbps iv. Complete ownership by a single organization The link layer is divided into 2 sub layers: Application i. Logical link control (LLC) Presentation ii. Medium access control (MAC) Session Transport Network LLC MAC Physical

Link layer

4

Medium Access Control [MAC] - regulates the access to the shared link Logical Link Control [LLC] - implements reliable packet transmission [flow and error control] LLC sublayer was originally designed to be the same for all LAN for interoperability Standards - MAC: IEEE 802.3-12 - LLC: IEEE 802.2 Most common protocols - ALOHA, Ethernet, Token Ring, WIFI Two main classes of LANs: i. Wired LANs ii. Wireless LANs 5

Main performance parameters of interest - Throughput: maximum bit transmission rate when the LAN is heavily loaded - Efficiency: fraction of throughput to channel rate - Delay: typical time taken to transmit a packet between two nodes

6

IEEE 802   

LAN protocols are concerned principally with lower layers of the OSI Model. Thus, higher-layer protocols are independent of network architecture and are applicable to LANs, MANs and WANs. IEEE 802 LAN/MAN Standards Committee (www.ieee802.org) has developed the IEEE 802 reference model for LAN specifications. OSI reference model

Application Presentation Session Transport Network Data link layer

IEEE 802 reference model

Upper layer protocol

LLC service access point [LSAP]

() () () Logical link control Medium access control

Physical

Physical

Medium

Medium

Scope of IEEE 802 standards

7









The lowest layer of the IEEE 802 reference model corresponds to the physical layer of the OSI model and includes functions: - Encoding/decoding signal - Preamble generation/removal [for synchronization] - Bit transmission/reception In addition, the physical layer of 802 model also includes specification of transmission medium and topology, as the choice of transmission medium and topology is critical in LAN. The data link layer in OSI model is implemented as 2 sublayers in IEEE 802 model: - logical link control [LLC] - medium access control [MAC] Logical link control layer provides interface to higher layers and perform flow and error control. 8





Medium access control layer provides functions such as: - assemble data into frame with address and error-detection fields on transmission - dissemble frame and perform address recognition and error detection on reception - Govern access to the LAN transmission medium The separation is required because: - The logic required to manage access to a shared-access medium is not found in traditional layer 2 data link control - For the same LLC, several MAC options may be provided

9

The architecture of IEEE 802 LAN standards

NL etc.

IEEE 802.1 Higher Layer Interfaces Bridging , Management , etc.

LLC

IEEE 802 .2

100(Base)

Shielded twisted pair Optical fiber

VG-AnyLAN

IEEE 802.12

Radio Infrared

Wireless

IEEE 802.11

Optical Fiber

DQDB

IEEE 802.6

Optical Fiber

Token Ring

FDDI

IEEE 802.5

Unshielded twisted pair Shielded twisted pair

Token Ring

Token Bus

IEEE 802.4

Unshielded twisted pair Broadband coaxial Optical fiber

IEEE 802.3

PHY

CSMA/CD

Broadband coaxial Optical fiber

MAC

1. Unacked CL 2. Acked CL 3. CO

CL – connectionless CO – connection oriented 10

Taxonomy of multiple-access protocols

.

.

11

5.1 RANDOM ACCESS In random access or contention methods, no station is superior to another station and none is assigned the control over another. No station permits, or does not permit, another station to send. At each instance, a station that has data to send uses a procedure defined by the protocol to make a decision on whether or not to send.

12

ALOHA

 First Multiple Access Protocol using contention scheme  Precursor to CSMA/CD  Applicable to any shared transmission medium: radio transmitters, coaxial cable, twisted pair or optical fiber  Two versions:  Pure ALOHA  Slotted ALOHA  Pure ALOHA is the original ALOHA  Each station starts transmitting whenever it has data to send  After transmitting a data frame, the sender expects the receiver to send an acknowledgment. 13

PURE ALOHA

 If the acknowledgement does not arrive after a timeout period, the sender assumes that the data frame has been destroyed and resends the frame.  If all stations experience collision try to resend their data frames after the timeout period, the data frames will collide again.  To overcome this, each station waits a random amount of time before resending its data frame.  This random waiting time is called the backoff time (TB) and it helps avoid more collisions.  To avoid congesting the channel with retransmitted frames, a station must give up after a maximum number of retransmission attempts 14

Frames in a pure ALOHA network

 

As there is only one channel to share, there is a possibility of collision if more stations are sending at about the same time. Due to its simplicity, the number of collisions rises rapidly with increased load.

15

Procedure for pure ALOHA protocol

16

Example 1 The stations on a wireless ALOHA network are a maximum of 600 km apart. If we assume that signals propagate at 3 × 108 m/s, we find Tp = (600 × 105 ) / (3 × 108 ) = 2 ms. Now we can find the value of TB for different values of K. a. For K = 1, the range is {0, 1}. The station needs to| generate a random number with a value of 0 or 1. This means that TB is either 0 ms (0 × 2) or 2 ms (1 × 2), based on the outcome of the random variable.

17

Example 1(continued) b. For K = 2, the range is {0, 1, 2, 3}. This means that TB can be 0, 2, 4, or 6 ms, based on the outcome of the random variable. c. For K = 3, the range is {0, 1, 2, 3, 4, 5, 6, 7}. This means that TB can be 0, 2, 4, . . . , 14 ms, based on the outcome of the random variable. d. We need to mention that if K > 10, it is normally set to 10.

18

Vulnerable time for pure ALOHA protocol

  

Vulnerable time is the duration with a possibility of collision Consider 3 stations (A, B & C) with each station sending a fixed length data frame taking transmission time Tfr Pure ALOHA vulnerable time= 2 x Tfr 19

Example 2 A pure ALOHA network transmits 200-bit frames on a shared channel of 200 kbps. What is the requirement to make this frame collision-free? Solution Average frame transmission time Tfr is 200 bits/200 kbps or 1 ms. The vulnerable time is 2 × 1 ms = 2 ms. This means no station should send later than 1 ms before this station starts transmission and no station should start sending during the one 1-ms period that this station is sending.

20

Note The throughput for pure ALOHA is S = G × e −2G . The maximum throughput Smax = 0.184 when G= (1/2).

21

Example 3 A pure ALOHA network transmits 200-bit frames on a shared channel of 200 kbps. What is the throughput if the system (all stations together) produces a. 1000 frames per second b. 500 frames per second c. 250 frames per second. Solution The frame transmission time is 200/200 kbps or 1 ms. a. If the system creates 1000 frames per second, this is 1 frame per millisecond. The load is 1. In this case S = G× e−2 G or S = 0.135 (13.5 percent). This means that the throughput is 1000 × 0.135 = 135 frames. Only 135 frames out of 1000 will probably survive. 22

Example 3 (continued) b. If the system creates 500 frames per second, this is (1/2) frame per millisecond. The load is (1/2). In this case S = G × e −2G or S = 0.184 (18.4 percent). This means that the throughput is 500 × 0.184 = 92 and that only 92 frames out of 500 will probably survive. Note that this is the maximum throughput case, percentagewise. c. If the system creates 250 frames per second, this is (1/4) frame per millisecond. The load is (1/4). In this case S = G × e −2G or S = 0.152 (15.2 percent). This means that the throughput is 250 × 0.152 = 38. Only 38 frames out of 250 will probably survive. 23

Frames in a slotted ALOHA network

   

Pure ALOHA has a vulnerable time of 2Tfr as there is no rule that defines when a station can send (stations may send at arbitrary time) Slotted ALOHA was invented to improve the efficiency In slotted ALOHA, time is divided into slots of Tfr each Each station can only transmit at the beginning of the time slot

24

Note The throughput for slotted ALOHA is S = G × e−G . The maximum throughput Smax = 0.368 when G = 1.

25

Vulnerable time for slotted ALOHA protocol  

There is still possibility of collision as two or more stations may send in the same time slot Nonetheless, the vulnerable time is reduced to only Tfrc

26

  

Efficiency ratio (ratio of throughput achieved to channel rate) o Pure ALOHA = 0.184 o Slotted ALOHA=0.368 Both versions exhibit poor utilization as they fail to take advantage of short propagation delay (w.r.t frame transmission time) in LANs For short propagation delay, when a station launches a frame, a;; other station will know it almost immediately ⇒CSMA

27

Example 4 A slotted ALOHA network transmits 200-bit frames on a shared channel of 200 kbps. What is the throughput if the system (all stations together) produces a. 1000 frames per second b. 500 frames per second c. 250 frames per second. Solution The frame transmission time is 200/200 kbps or 1 ms. a. If the system creates 1000 frames per second, this is 1 frame per millisecond. The load is 1. In this case S = G× e−G or S = 0.368 (36.8 percent). This means that the throughput is 1000 × 0.0368 = 368 frames. Only 386 frames out of 1000 will probably survive. 28

Example 4 (continued) b. If the system creates 500 frames per second, this is (1/2) frame per millisecond. The load is (1/2). In this case S = G × e−G or S = 0.303 (30.3 percent). This means that the throughput is 500 × 0.0303 = 151. Only 151 frames out of 500 will probably survive. c. If the system creates 250 frames per second, this is (1/4) frame per millisecond. The load is (1/4). In this case S = G × e −G or S = 0.195 (19.5 percent). This means that the throughput is 250 × 0.195 = 49. Only 49 frames out of 250 will probably survive. 29

Carrier Sense Multiple Access (CSMA)  

   

CSMA is a polite version of ALOHA With CSMA, a station wishing to transmit first listens to the medium (carrier sense) and obeys the following rules: 1) If the medium is idle, transmit; otherwise, go to step 2 2) If the medium is busy, continue to listen for idle medium; when medium becomes idle, transmit whole frame immediately CSMA reduces the possibility of collision, but cannot eliminate it Even though each station listens to the medium before transmitting, collision still exists due to propagation delay When a frame is sent, it takes a while(though very short) for every station to sense it A station may sense the medium and find it idle, only because the frame has not yet reach the station

30

Space/time model of the collision in CSMA  

CSMA reduces the possibility of collision, but cannot eliminate it Collision still exists because of propagation delay

At time t1, B senses that the medium is idle and send a frame. At time t2(t2 > t1), C senses that the medium is idle(as the frame from B has not arrived at C yet) and sends a frame Both frames collide and are destroyed

31

Vulnerable time in CSMA    

The vulnerable time for CSMA is the propagation time, Tp (the time time for a signal to propagate from one end to another end of the medium) If the first bit of the frame reaches the end of the medium, every station will already have heard the bit and will refrain from sending Consider the worst case where A at one end is sending a frame This frame is susceptible for collision until its first bit arrives at the other end.

32

Behavior of three persistence methods  

Persistence Strategy defines the procedure for a station that senses a busy medium. Two strategies: 1) Non-persistent o A station with frame to send senses the medium o If the medium is idle, it sends immediately o If the medium is busy, it waits a random time before sensing the medium again o Reduce the chance of collision as stations are unlikely to wait the same amount of time o Lower efficiency as the medium may be idle while the stations are waiting

33

2) Persistent o A station with frame to send senses the medium o If the medium is idle, it sends immediately o If the medium is busy, a) 1-persistent - The station sends a frame immediately ( with a probability of 1) if the medium is sensed idle -Increase the chance of collision as 2 or more stations may send their frames simultaneously after finding the medium idle.

34

b) p-persistent - The station send with probability p (i.e. may or may not send) if the medium is sensed idle - Reduce chance of collision and improve efficiency

35

Flow diagram for three persistence methods

36

Carrier Sense Multiple Access with Collision Detection (CSMA/CD)    

With CSMA, the medium remains unusable for the duration of frame transmission when two frames collide For long frames, the amount of wasted capacity can be significant [wasted time equal to frame transmission time] This waste can be reduced if a station continues to listen to the medium while transmitting [collision detection] How to detect: i. The station sends frame and senses the medium ii. Collision detected if Coax:station senses power exceeding transmitted signal strength [maximum length must be restricted to limit signal attenuation] UTP: there is signal on more than one port [sensed by hub and collision presence signal is generated and sent to all stations] 37



In CSMA/CD, a station wishing to transmit obey these rules: i. If the station senses that the channel is idle (for 96 bit times), it start to transmit the data frame and go to step (iii), otherwise go to step (ii). ii. If the channel is busy, the station waits (1-persistent) until it senses that the channel is idle for 96 bit times and start to transmit the frame and go to step (iii). iii. While transmitting, it monitors the channel for possible collision; if it transmits the entire frame without collision, the transmission is considered as successful. iv. If collision is detected, the station stops transmitting its frame, transmit a 48-bit jam signal and go to step (v) v. After aborting, the station enters an exponential backoff phase and waits a random time before returns to step (i) 38

Binary Exponential Backoff  

When transmitting a given frame, after experiencing the nth collision in a row for this frame, the station chooses a value K at random from {0, 1, 2, …2m-1}, where m = min(n, 10). The station then waits K slot times before it attempts to transmit 1st 2nd 3rd mth

collision waits 0 or 1 slot time collision waits 0, 1, 2 or 3 slot times collision waits 0, 1, 2 … 7 slot times collision waits 0 … 2m-1 slot times

After 10th collision, m fixed at 10 After 16th collision, frame is discarded and report failure to upper layer

Note: Slot time = worst-case round-trip propagation time

39

  

In the presence of collisions, the mean value of the random delay is doubled after each collision As congestion increases, stations back off by larger and larger amount to reduce the probability of collision After 16 unsuccessful attempts, the station gives up and report an error to the upper layer

40

CSMA/CD with exponential backoff

41

Collision Detection & Frame Transmission time  



In CSMA/CD, the transmitting station senses the voltage levels before and during transmissions A collision results in a change of voltage level, and it takes time to propagate back to the station

A station will only sense collision while transmitting; if a very short frame is transmitted, the station might stop transmitting/sensing before the collision signal arrives. 42



Consider the worst case scenario : A

B

C

D

t=0

t = tp

t = 2tp

i. At t = 0, A transmits a frame onto the medium. ii. At t = Tp − ε, frame from A almost arrives at D. iii. At t = Tp, D just starts to transmit frame onto medium. It immediately detects collision and transmit a jamming signal iv. At t = 2Tp, A detects the collision. Note: Tp is the end-to-end propagation time. 43

 

The amount of time required to detect a collision is no greater than twice the end-to-end propagation delay A frame must take at least 2Tp to send to prevent the sender from incorrectly concludes that the transmission was successfully

A starts to transmit frame A has been completely transmitted the frame B starts to transmit frame prior detecting frame from A Collision occurs

Collision propagates throught the network A does not detect the collision 44 as it has finished transmission

1. A starts to transmit frame

2. A continue to sense medium while transmitting

3. B starts to transmit frame just before frame from A arrives

A

7. A transmit 48bit jam signal 6. A detects collision and stop transmitting

B

5. Collision propagates through the network

4. Collision occurs 45

Example 5 A network using CSMA/CD has a bandwidth of 10 Mbps. If the maximum propagation time (including the delays in the devices and ignoring the time needed to send a jamming signal, as we see later) is 25.6 µs, what is the minimum size of the frame? Solution The frame transmission time is Tfr = 2 × Tp = 51.2 µs. This means, in the worst case, a station needs to transmit for a period of 51.2 µs to detect the collision. The minimum size of the frame is 10 Mbps × 51.2 µs = 512 bits or 64 bytes. This is actually the minimum size of the frame for Standard Ethernet. 46





Major difference between ALOHA and CSMA/CD - ALOHA: transmit as soon as there is a frame to be sent - CSMA/CD:wait first for the channel to be idle before a frame is transmitted Efficiency of CSMA/CD (empirical):

1 1 + 5a end − to − end propagationdelay a= frame transmissi on time U=

where



CSMA/CD will be more efficient than - pure ALOHA for a < 0.89 - slotted ALOHA for a < 0.34

47

Example of a > 1 and a < 1

48

5.2 CONTROLLED ACCESS

In controlled access, the stations consult one another to find which station has the right to send. A station cannot send unless it has been authorized by other stations.

49

Reservation access method

 A station needs to make a reservation before sending data.  Time is divided into intervals.  In each interval, a reservation frame frame precedes the data frames sent in that interval. 50

Select and poll functions in polling access method

 

All data exchanges must be made through the primary device even when the ultimate destination is a secondary device. The primary device controls the link; the secondary devices follow its instruction

51

Logical ring and physical topology in token-passing access method

  

The stations in a network are organized in a logical ring. Each processor has a predecessor and a successor. A special packet called a token circulates through the ring 52

Related Documents

Datacommchapter 5 Part1
December 2019 7
Datacommchapter 5 Part2
December 2019 12
Datacommchapter 5 Part3a
December 2019 10
Datacommchapter 5 Part3b
December 2019 5
Datacommchapter 1
December 2019 9
Datacommchapter 3
December 2019 6