ImageVerifierCode 换一换
格式:PPT , 页数:200 ,大小:10.32MB ,
资源ID:3485932      下载积分:2 积分
快捷下载
登录下载
邮箱/手机:
温馨提示:
快捷下载时,用户名和密码都是您填写的邮箱或者手机号,方便查询和重复下载(系统自动生成)。 如填写123,账号就是123,密码也是123。
特别说明:
请自助下载,系统不会自动发送文件的哦; 如果您已付费,想二次下载,请登录后访问:我的下载记录
支付方式: 支付宝扫码支付 微信扫码支付   
验证码:   换一换

加入VIP,免费下载
 

温馨提示:由于个人手机设置不同,如果发现不能下载,请复制以下地址【https://www.wnwk.com/docdown/3485932.html】到电脑端继续下载(重复下载不扣费)。

已注册用户请登录:
账号:
密码:
验证码:   换一换
  忘记密码?
三方登录: QQ登录  

下载须知

1: 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。
2: 试题试卷类文档,如果标题没有明确说明有答案则都视为没有答案,请知晓。
3: 文件的所有权益归上传用户所有。
4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
5. 本站仅提供交流平台,并不能对任何下载内容负责。
6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。

版权提示 | 免责声明

本文(Chapter4+The+Medium+Access+Control+Subayer.ppt)为本站会员(a****2)主动上传,蜗牛文库仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对上载内容本身不做任何修改或编辑。 若此文所含内容侵犯了您的版权或隐私,请立即通知蜗牛文库(发送邮件至admin@wnwk.com或直接QQ联系客服),我们立即给予删除!

Chapter4+The+Medium+Access+Control+Subayer.ppt

1、Chapter 4 The Medium Access Control Sublayer,College of Computer Science Chongqing University,Medium Access Control,Networks can be divided into point-to-point connections and multiaccess(broadcast)channels.In broadcast network,the key issue is how to determine who gets to use the channel.The protoc

2、ols used to determine who goes next on a multiaccess channel belong to a sublayer of the data link layer called the MAC(Medium Access Control)sublayer.介质访问(控制)子层 The MAC sublayer is especially important in LANs,many of which use a multiaccess channel.WANs,in contrast,use point-to-point links,except

3、for satellite networks.,The MAC Sublayer,Responsible for deciding who sends next on a multi-access linkAn important part of the link layer,especially for LANs,MAC is in here!,Contents,4.1 The Channel Allocation Problem4.2 Multiple Access Protocols4.3 Ethernet4.4 Ethernet Switch technology4.5 Wireles

4、s LANs4.6 Summary,4.1 The Channel Allocation Problem,Shared Wired Cabled Ethernet,Shared RF/Wireless802.11 WiFi,Shared RF/WirelessSatellite,Radio frequency is a shared medium,multiple users are using the same spectrum(e.g.800-825MHz),Network Links(1)point-to-point Link(2)multiaccess(broadcast)channe

5、ls,shared wire or medium,Features of broadcast channels(1)a single shared channel is used by all nodes,multiple sending and receiving nodes(2)two or more simultaneous transmissions by nodes:interference-collision if node receives two or more signals at the same time(3)usually,all nodes are equal to

6、each other,The multi-access problem:In a single channel broadcast network,When multiple nodes try to send messages simultaneously,who has the right to use the channel?,Solution:Multi Access Protocols:the protocols used to solve the multi-access problem,The multi-access problem:How to let distributed

7、 users(efficiently)share a single broadcast channel?,The multi-access problem:How to form a access queue for distributed users?The queueing theory can be use to efficiency of various multi-access protocols,The multi-access Problem,Multiple access protocols,FDMA,TDMA,CDMA,Controlled-access protocol,S

8、tatic model,Dynamic model,WDMA,switching,Random AccessProtocol,Multiplexing allows several transmission sources to share a larger transmission capacity.Often used in hierarchical structures.Multiple access:two or more simultaneous transmissions share a broadcast channel.Often used in access networks

9、,4.2 Multiple Access Protocol,Limited-ContentionProtocol,One-bit map,Binary Countdown,Tree walk,8,Ideal Multiple Access Protocol,Broadcast channel of rate R bpsWhen one node wants to transmit,it can send at rate R.When M nodes want to transmit,each can send at average rate R/MFully decentralized:no

10、special node to coordinate transmissionsno synchronization of clocks,slotsSimple,Channel Partitioningdivide channel into smaller“pieces”(time slots,frequency,code)allocate piece to node for exclusive use,Multiplexing:allows several transmission sources to share a larger transmission capacity.Often u

11、sed in hierarchical structures.Multiple access:two or more simultaneous transmissions share a broadcast channel Often used in access networks,FDM:Frequency Division Multiplexing(FDMA:frequency division multiple access)Each node has a frequency bandTDM:Time Division Multiplexing(TDMA:time division mu

12、ltiple access)Each node has a series of fixed time slotsWDM:Optical-domain version of FDM,wavelength division multiplexing Code Division Multiple Access(CDMA)each node has a different code,4.2.1 Static channel allocation,Independent traffic.N independent nodes generate frames for transmission.The pr

13、obability of a frame being generated in an interval of length t is t,where is a constant(the arrival rate of new frames).Single Channel.No external way to coordinate sendersObservable Collision.All nodes can detect collisions.A collided frame must be transmitted again later.There are no errors.4a.Co

14、ntinuous Time.4b.Slotted Time.Time is divided into discrete intervals(slots).Frame transmissions always begin at the start of a slot.5a.Carrier Sense.Nodes can tell if the channel is in use before trying to use it.5b.No Carrier Sense.Nodes cannot sense the channel.,4.2.2 dynamic channel allocation,f

15、ive key assumptions,4.2.3 Random Access Protocol,FeaturesNo node is superior to another nodeNo node is assigned the control over another.No node permits,or does not permit,another station to sendAt each instance,a node that has data to send uses a procedure defined by the protocol to make a decision

16、 on whether or not to send.random access:there is no scheduled time for a node to transmit.Transmission is random among the nodescontention methods(Collision):no rules specify which node should send next.nodes compete with one another to access the medium.,Considerations for random access protocol W

17、hen can the node access the medium?What can the node do if the medium is busy?How can the node determine the success or failure of the transmission?What can the node do if there is an access conflict?,ALOHA:uses MA(Multiple Access)No carrier sensepure-ALOHAslotted ALOHACSMA:Carrier Sense Multiple Ac

18、cessCSMA/CD:Collision Detection,used in classical EthernetCSMA/CA:Collision Avoidance,used in wireless channel,Evolution of random-access methods,Random Access Protocol,4.2.3.1 ALOHA(pure ALOHA),the earliest random access method for ALOHA System(ALOHANET)be developed at the University of Hawaii in e

19、arly 1970.ALOHA System was designed to Use the lost-cost commercial radio equipment to connect the central computer on Oahu island with the consoles on the other islands(4 islands,7 campuses)it can be used on any shared medium.The original ALOHA protocol is called pure ALOHA.This is simple,but elega

20、nt protocol.,ALOHA Protocols,Anyone may transmit whenever they want(Continuous time model.)Each node waits for the acknowlwdge packet when a packet is sent out.if node has received the postive acknowledge packet,then it sends the next packetthis process is repeated until a successful transmission an

21、d acknowledgement occurs or until the process is terminated by the users console,Operation in ALOHA,errors:(1)random noise errors and(2)errors caused by interference with a packet sent by other consoles,collision in ALOHA,Vulnerable time is 2T,15,Slotted ALOHA,Assumptionsall frames same sizetime is

22、divided into equal size slots,time to transmit 1 framenodes start to transmit frames only at beginning of slotsnodes are synchronizedif 2 or more nodes transmit in slot,all nodes detect collision,Operationwhen node obtains fresh frame,it transmits in next slotno collision,node can send new frame in

23、next slotif collision,node retransmits frame in each subsequent slot with prob.p until success,Problem in pure ALOHA Problem 1:collision occurs at any time Solution:slotted time model any other problems?,Prossingle active node can continuously transmit at full rate of channelhighly decentralized:onl

24、y slots in nodes need to be in syncsimple,Conscollisions,wasting slotsidle slotsnodes may be able to detect collision in less than time to transmit packetclock synchronization,Slotted ALOHA,Throughput versus offered traffic for ALOHA systems,At best for Pure ALOHA:channel used for useful transmissio

25、ns 18%of time!,At best for Slotted ALOHA:channel used for useful transmissions 37%of time!,Performance of ALOHA,4.2.3.2 CSMA(carrier sense multiple access),Principle:sense before transmit or listen before talkIf channel sensed idle:transmit entire frameIf channel sensed busy,defer transmission Advan

26、tages:CSMA can reduce the possibility of collision,but cant eliminate it,Problem in ALOHA Problem 2:sender doesnt know the status of the channel when it tries to send data out Solution:detect the channel,sense the carrier any other problems?,At time t1,node B senses the medium and finds it idle,so i

27、t sends a frame.At time t2(t2 t1),node C senses the medium and finds it idle because,at this time,the first bits from node B have not reached node C.node C also sends a frame.The two signals collide and both frames are destroyed.,Collision in CSMA,Vulnerable Time(collision time)The vulnerable time f

28、or CSMA is the propagation time Tp.A collision will result if a node is ending a frame and any other node tries to send a frame during Tp simultaneously After the Tp,every node will already have heard the bit and will refrain from sending.,Vulnerable Time in CSMA,persistent vs.non-persistent CSMA,Ra

29、ndomAccess,No CarrierSense,CSMA,Persistant,Summary:CSMA,PureALOHO,SlottedALOHO,Non-Persistant,1-Persistant,p-Persistant,CSMA improves on ALOHA by sensing the channel!User doesnt send if it senses someone elseVariations on what to do if the channel is busy:1-persistent(greedy)sends as soon as idleNon

30、persistent waits a random time then tries againp-persistent sends with probability p when idle,Comparison of the channel utilization versus load for various random access protocols,Collision problem in CSMA:A collision will result during the vulnerable time(propagation time),it will waste the bandwi

31、dth to send data continually if collision occursHow to solve this problem?CD:collision detection,4.2.3.3 CSMA/CD,Flash,Collision of the first bit in CSMA/CD,Collision and abortion in CSMA/CD,Collision and abortion in CSMA/CD,If the two nodes involved in a collision are the maximum distance apart,the

32、 signal from the first takes time to reach the second,and the effect of the collision takes another time to reach the first.So the requirement is that the first node must still be transmitting after 2.,Minimum Frame Size is necessary in CSMA/CD,Minimum Frame Size=2 Ts(transmission rate),1 km,A,B,t,t

33、=B sends data when idle,t=/2Collision,A,B,A,B,t=0 A sends datawhen idle,A,B,t=0,A,B,Tp=,CSMA/CD can be in one of three states:contention,transmission,or idle.,CSMA/CD improvement is to detect/abort collisions-Reduced contention times improve performance,Collision time is much shorter than frame time

34、,4.2.3.4 wireless protocol,Question:Can we apply media access methods from fixed networks in wireless network?for example,can the CSMA/CD be used in the wireless LAN network?,Wireless has complications compared to wired.Nodes may have different coverage regionsLeads to hidden and exposed terminalsNo

35、des cant detect collisions,i.e.,sense while sendingMakes collisions expensive and to be avoided,Hidden terminals 隐蔽站A sends to B,C cannot receive A C wants to send to B,C senses a“free”medium(CS fails)collision at B,A cannot receive the collision(CD fails)A is“hidden”for C,hidden and exposed termina

36、ls in wireless LAN,3.2.1,hidden and exposed terminals in wireless LAN,Exposed terminals暴露站B sends to A,C wants to send to another terminal(not A or B)C has to wait,CS signals a medium in usebut A is outside the radio range of C,therefore waiting is not necessaryC is“exposed”to B,MACA(Multiple Access

37、 with Collision Avoidance),MACA uses short signaling packets for collision avoidanceRTS(request to send):a sender request the right to send from a receiver with a short RTS packet before it sends a data packetCTS(clear to send):the receiver grants the right to send as soon as it is ready to receiveS

38、ignaling packets containsender addressreceiver addresspacket size(indicates the transmission time between sender and receiver)Variants of this method can be found in IEEE802.11 as DFWMAC(Distributed Foundation Wireless MAC),MACA avoids the problem of hidden terminalsA and C want to send to BA sends

39、RTS(Request To Send)firstC waits after receiving CTS(Clear To Send)from BMACA avoids the problem of exposed terminalsB wants to send to A,C to another terminalnow C does not have to wait for it cannot receive CTS from A,MACA examples,4.2.4 Controlled Access Protocol,In controlled access,the stations

40、 consult one another to find which station has the right to send.A station cannot send unless it has been authorized by other stations.Usually,controlled access protocol is a collision-free protocol,Reservation for example:a bit-map protocol,binary countdown protocolPollingToken Passing,Basic Idea:a

41、 node needs to make a reservation before sending data.Each contention period consists of N slots(N nodes).If node i have a frame to send,it transmits a 1 bit during the slot.After all N slots passed by,each node has the knowledge of which node wishes to transmit the frame.Then frames transmission ca

42、n be conducted in order,One-bit map protocol:reservation protocol,Binary Countdown,Basic idea Stations send their address in contention slot(log N bits instead of N bits)Medium ORs bits;stations give up when they send a“0”but see a“1”Station that sees its full address is next to send,.A dash indicat

43、es silence,Problem in One-bit map protocol it does not scale will to the networks with thousands of nodes because of the extra token 1 for each node,one primary node+many secondary nodes.All data exchanges must be made through the primary device even when the ultimate destination is a secondary devi

44、ce.The primary node controls the link;the secondary nodes follow its instructions.It is up to the primary device to determine which device is allowed to use the channel at a given time.,Polling,Flash,token-passing,The nodes in a network are organized in a logical ring,for each node,there is a predec

45、essor and a successorThe token will be passed to the successor when the current node has no more data to send,For physical ring,the token does not have to have the addressFor the dual ring,main token+second token(for emergencies only),Used in FDDIFor Bus ring,the token has to have the addressFor Sta

46、r ring,it makes the network less prone to failure,used in IBM Token-ring LAN,Flash,4.2.5 Limited-Contention protocols,Contention protocol(1)work well with the light load(2)wok badly with the high loadContention-free protocol(1)work well with the high load(2)wok badly with the light load,Problem How

47、to combine the two ways togetherSolution Limited-Contention protocols,Each node has probability p to transmit frameThen Probability Ps that some node successfully acquires the channel during a given slot is given by kp(1-p)k-1.The best value of p is 1/k,Analysis of successful transmission,Acquisitio

48、n probability for a symmetric contention channel,Problem:how to get the high acquisition probability?Solution:divided the nodes into groups,members in a group can contend the given slotExample:(1)each group has only node,such as the Binary Countdown protocol(2)each group contains all nodes,such as t

49、he ALOHA(3)Good:assign nodes to slot dynamically.Many nodes per slot when load is light.Few nodes per slot when load is high,Limited-Contention protocols,Already too many contenders for a good chance of one winner,Tree divides stations into groups(nodes)to pollDepth first search under nodes with poll collisionsStart search at lower levels if 1 station expected,

copyright@ 2008-2023 wnwk.com网站版权所有

经营许可证编号:浙ICP备2024059924号-2