Lecture 8: Media Access Control. CSE 123: Computer Networks Stefan Savage

Similar documents
Lecture 8: Media Access Control

Lecture 23: Media Access Control. CSE 123: Computer Networks Alex C. Snoeren

Local Area Networks NETW 901

Multiple Access Methods

Medium Access Control. Wireless Networks: Guevara Noubir. Slides adapted from Mobile Communications by J. Schiller

6.1 Multiple Access Communications

Chapter 2 Overview. Duplexing, Multiple Access - 1 -

Cellular systems 02/10/06

Outline. EEC-484/584 Computer Networks. Homework #1. Homework #1. Lecture 8. Wenbing Zhao Homework #1 Review

Multiple Access System

Mobile Computing. Chapter 3: Medium Access Control

ECE 333: Introduction to Communication Networks Fall Lecture 15: Medium Access Control III

Multiple Access (3) Required reading: Garcia 6.3, 6.4.1, CSE 3213, Fall 2010 Instructor: N. Vlajic

Medium Access Control

DOPPLER SHIFT. Thus, the frequency of the received signal is

Medium Access Methods. Lecture 9

Department of Computer Science and Engineering. CSE 3213: Communication Networks (Fall 2015) Instructor: N. Vlajic Date: Dec 13, 2015

COSC 3213: Computer Networks I Instructor: Dr. Amir Asif Department of Computer Science York University Section B

Multiplexing Module W.tra.2

Mobile Communications

ICT 5305 Mobile Communications. Lecture - 4 April Dr. Hossen Asiful Mustafa

1. Introduction 1.2 Medium Access Control. Prof. JP Hubaux

Wireless Intro : Computer Networking. Wireless Challenges. Overview

Lecture 8 Mul+user Systems

Module 3: Physical Layer

Department of Computer Science and Engineering. CSE 3213: Computer Networks I (Fall 2009) Instructor: N. Vlajic Date: Dec 11, 2009.

Chapter 3 : Media Access. Mobile Communications. Collision avoidance, MACA

Medium Access Schemes

Multiple Access Schemes

Multiple access techniques

COM-405 Mobile Networks. Module A (Part A2) Introduction

Wireless Transmission & Media Access

Lecture 7: Centralized MAC protocols. Mythili Vutukuru CS 653 Spring 2014 Jan 27, Monday

Mobile Communication Systems. Part 7- Multiplexing

Mobile Communication and Mobile Computing

Multiple Access Techniques

Fine-grained Channel Access in Wireless LAN. Cristian Petrescu Arvind Jadoo UCL Computer Science 20 th March 2012

Chapter 14. Cellular Wireless Networks

Lecture on Sensor Networks

INTRODUCTION TO WIRELESS SENSOR NETWORKS. CHAPTER 3: RADIO COMMUNICATIONS Anna Förster

Multiple Access CHAPTER 12. Solutions to Review Questions and Exercises. Review Questions


T325 Summary T305 T325 B BLOCK 3 4 PART III T325. Session 11 Block III Part 3 Access & Modulation. Dr. Saatchi, Seyed Mohsen.

TSIN01 Information Networks Lecture 9

Access Methods and Spectral Efficiency

CSCD 433 Network Programming Fall Lecture 5 Physical Layer Continued

Network Management System for Telecommunication and Internet Application

Cooperation in Random Access Wireless Networks

CSCD 433 Network Programming Fall Lecture 5 Physical Layer Continued

CSE 461: Bits and Bandwidth. Next Topic

UNIT - 1 [INTRODUCTION TO WIRELESS COMMUNICATION SYSTEMS] OLUTION OF MOBILE RADIO COMMUNICATION

Structure of the Lecture

EITF25 Internet Techniques and Applications L2: Physical layer. Stefan Höst

INTRODUCTION TO COMMUNICATION SYSTEMS AND TRANSMISSION MEDIA

Channel partitioning protocols

ECS455: Chapter 4 Multiple Access

Multiple Access. Difference between Multiplexing and Multiple Access

Multiple Access Techniques for Wireless Communications

ITM 1010 Computer and Communication Technologies

ITM 1010 Computer and Communication Technologies

RADIO LINK ASPECT OF GSM

Free space loss: transmitting antenna: signal power P snd receiving antenna: signal power P rcv distance: d frequency: f.

Computer Networks: Multiplexing

GLOBAL SYSTEM FOR MOBILE COMMUNICATION. ARFCNS, CHANNELS ETI 2511 Thursday, March 30, 2017

Simple Algorithm in (older) Selection Diversity. Receiver Diversity Can we Do Better? Receiver Diversity Optimization.

Lecture 3: Modulation & Clock Recovery. CSE 123: Computer Networks Stefan Savage

Fiber Distributed Data Interface

Politecnico di Milano Scuola di Ingegneria Industriale e dell Informazione. Physical layer. Fundamentals of Communication Networks

Lecture 3: Modulation & Clock Recovery. CSE 123: Computer Networks Alex C. Snoeren

SC - Single carrier systems One carrier carries data stream

Wireless Communication

Wireless & Cellular Communications

Summary of Basic Concepts

Communication Networks

Lecture 5 Transmission. Physical and Datalink Layers: 3 Lectures

Background: Cellular network technology

CS 294-7: Wireless Local Area Networks. Professor Randy H. Katz CS Division University of California, Berkeley Berkeley, CA

Public Safety Radio Frequency Spectrum: A Comparison of Multiple Access Techniques

6. has units of bits/second. a. Throughput b. Propagation speed c. Propagation time d. (b)or(c)

Lecture Progression. Followed by more detail on: Quality of service, Security (VPN, SSL) Computer Networks 2

IS-95 /CdmaOne Standard. By Mrs.M.R.Kuveskar.

Multiple access and cellular systems

ECE 476/ECE 501C/CS Wireless Communication Systems Winter Lecture 9: Multiple Access, GSM, and IS-95

APPLICATION PROGRAMMING: MOBILE COMPUTING [ INEA00112W ] Marek Piasecki PhD Wireless Telecommunication

2. TELECOMMUNICATIONS BASICS

Politecnico di Milano Facoltà di Ingegneria dell Informazione. 3 Basic concepts. Wireless Networks Prof. Antonio Capone

Continuous Monitoring Techniques for a Cognitive Radio Based GSM BTS

Reti di Telecomunicazione. Channels and Multiplexing

PULSE: A MAC Protocol for RFID Networks

Chapter 5. North American Cellular System Based on Time Division Multiple Access

Lecture 5 Transmission

CS 218 Fall 2003 October 23, 2003

Difference Between. 1. Old connection is broken before a new connection is activated.

Chapter 1 Acknowledgment:

Final Exam (ECE 408/508 Digital Communications) (05/05/10, Wed, 6 8:30PM)

A feasibility study of CDMA technology for ATC. Summary

06/02/2006. Sharing the Medium. Peter Rounce Room Notes Courtesy of Graham Knight P.A.

Technical Aspects of LTE Part I: OFDM

TIME- OPTIMAL CONVERGECAST IN SENSOR NETWORKS WITH MULTIPLE CHANNELS

Computer Networks. Week 03 Founda(on Communica(on Concepts. College of Information Science and Engineering Ritsumeikan University

Transcription:

Lecture 8: Media Access Control CSE 123: Computer Networks Stefan Savage

Overview Methods to share physical media: multiple access Fixed partitioning Random access Channelizing mechanisms Contention-based mechanisms Aloha Ethernet 2

Fixed Partitioning Need to share media with multiple nodes (n) Multiple simultaneous conversations A simple solution Divide the channel into multiple, separate channels Channels are physically separate Bitrate of the channel is split across channels Nodes can only send/receive on their assigned channel Several different ways to do it Multiple Access madlibs 3

Frequency Division (FDMA) Divide bandwidth of f Hz into n channels each with bandwidth f/n Hz Easy to implement, but unused subchannels go idle Used by traditional analog cell phone service, radio, TV Amplitude Amplitude Frequency Frequency 4

Time Division (TDMA) Divide channel into rounds of n time slots each Assign different hosts to different time slots within a round Unused time slots are idle Used in GSM cell phones & digital cordless phones Example with 1-second rounds n=4 timeslots (250ms each) per round Host # 1 2 3 1 2 3 4 2 4 1 sec 1 sec 1 sec 5

Code Division (CDMA) Do nothing to physically separate the channels All stations transmit at same time in same frequency bands One of so-called spread-spectrum techniques Sender modulates their signal on top of unique code Sort of like the way Manchester modulates on top of clock The bit rate of resulting signal much lower than entire channel Receiver applies code filter to extract desired sender All other senders seem like noise with respect to signal Used in newer digital cellular technologies 6

Partitioning Visualization FDMA TDMA power power CDMA power Courtesy Takashi Inoue 7

Problem w/channel partitioning Not terribly well suited for random access usage Why? Instead, design schemes for more common situations Not all nodes want to send all the time Don t have a fixed number of nodes Potentially higher throughput for transmissions Active nodes get full channel bandwidth 8

Aloha Designed in 1970 to support wireless data connectivity Between Hawaiian Islands rough! Goal: distributed access control (no central arbitrator) Over a shared broadcast channel Aloha protocol in a nutshell: When you have data send it If data doesn t get through (receiver sends acknowledgement) then retransmit after a random delay Why not a fixed delay? 9

Collisions Frame sent at t 0 collides with frames sent in [t 0-1, t 0 +1] Assuming unit-length frames Ignores propagation delay 10

Slotted Aloha Time is divided into equal size slots (frame size) Host wanting to transmit starts at start of next slot Retransmit like w/aloha, but quantize to nearest next slot Requires time synchronization between hosts Success (S), Collision (C), Empty (E) slots 11

Channel Efficiency Q: What is max fraction slots successful? A: Suppose n stations have packets to send Each transmits in slot with probability p Prob[successful transmission], S, is: S = p (1-p) (n-1) any of n nodes: S = Prob[one transmits] = np(1-p) (n-1) (optimal p as n->infinity = 1/n) = 1/e =.37 0.4 0.3 0.2 0.1 0.5 1.0 1.5 2.0 offered load = n X p At best: channel used for useful transmissions 37% of time! Slotted Aloha Pure Aloha 12

Carrier Sense (CSMA) Aloha transmits even if another host is transmitting Thus guaranteeing a collision Instead, listen first to make sure channel is idle Useful only if channel is frequently idle Why? How long to be confident channel is idle? Depends on maximum propagation delay Small (<<1 frame length) for LANs Large (>>1 frame length) for satellites 13

Retransmission Options non-persistent CSMA Give up, or send after some random delay Problem: may incur larger delay when channel is idle 1-persistent CSMA Send as soon as channel is idle Problem: blocked senders all try to send at once P-persistent CSMA If idle, send packet with probability p; repeat Make sure (p * n) < 1 14

Jamming Even with CSMA there can still be collisions. Why? If nodes can detect collisions, abort! (CSMA/CD) Requires a minimum frame size ( acquiring the medium ) B must continue sending ( jam ) until A detects collision Requires a full duplex channel A Time for B to detect A s transmission X collision Wireless is typically half duplex; need an alternative B (wire) 15

Collision Detection How can A know that a collision has taken place? Worst case:» Latency between nodes A& B is d» A sends a message at time t and B sends a message at t + d epsilon (just before receiving A s message) B knows there is a collision, but not A A must keep transmitting until it can tell if a collision occurred How long? 2 * d IEEE 802.3 Ethernet specifies max value of 2d to be 51.2us This relates to maximum distance of 2500m between hosts At 10Mbps it takes 0.1us to transmit one bit so 512 bits take 51.2us to send So, Ethernet frames must be at least 64B (512 bits) long» Padding is used if data is too small Send jamming signal to insure all hosts see collision 48 bit signal 16

For Next Time Read 3-3.2 in P&D Keep going on the project CSE 123 Lecture 8: Carrier Sense Multiple Access 17

Forward Error Correction Use erasure codes to redundantly encode k data frames into m>k encoded frames Why do it at the frame level? E.g., Reed Solomon Codes, Tornado codes Multicast/broadcast encoded frames speculatively A receiver can reconstruct message from any k frames in the set of m encoded frames CSE 123 Lecture 7: Flow & Media Access Control 18

A Digital Fountain File Transmission 0 hours 1 hour 2 hours 3 hours CSE 123 Lecture 7: Flow & Media Access Control User 1 User 2 4 hours 5 hours 19