Скачать презентацию LAN MAC Medium Access Control protocols Скачать презентацию LAN MAC Medium Access Control protocols

ad228effe88d0dd49038fb046a0914c7.ppt

  • Количество слайдов: 40

LAN & MAC (Medium Access Control) protocols • Two basic types of networks: – LAN & MAC (Medium Access Control) protocols • Two basic types of networks: – Switched networks: transmission lines, multiplexers, and switches; routing, hierarchical address for scalability. – Broadcast networks: a single shared medium, simpler, no routing, messages received by all stations, flat address; however, when users try to transmit messages into the medium, potential conflict, so MAC is needed to orchestrate the transmission from various users. – LAN is a typical broadcast network. 1

Peer-to-peer protocols VS. MAC • Both are to transfer user information despite transmission impairments Peer-to-peer protocols VS. MAC • Both are to transfer user information despite transmission impairments • For peer-to-peer: – Main concern: loss, delay, resequencing – Using control frames to coordinate their actions – Delay-bandwidth is important – Involved only two peer processes • MAC: – Main concern: interference from users – Using some mechanisms to coordinate the access of channel – Delay-bandwidth is important – Need the coordination from all MAC entities, any one does not cooperate, the communication will not take place. 2

What are going to be discussed • Introduction to broadcast networks • Overview of What are going to be discussed • Introduction to broadcast networks • Overview of LANs: frame format & placement in OSI. • Random access: ALOHA & CSMA-CD (Carrier Sensing Multiple Access with Collision Detection ) i. e. , Ethernet. • Scheduling: token-ring. • LAN standards (brief view) • LAN bridges: used to connect several LANs. 3

Multiple access communications 1 3 2 4 Shared Multiple Access Medium 5 M 1. Multiple access communications 1 3 2 4 Shared Multiple Access Medium 5 M 1. Any transmission from any station can be heard by any other stations 2. If two or more stations transmit at the same time, collision occurs 4 Figure 6. 1

Satellite communication involves sharing of uplink and downlink frequency bands Satellite Channel = fin Satellite communication involves sharing of uplink and downlink frequency bands Satellite Channel = fin = fout 5 Figure 6. 3

Cellular networks: radio shared by mobile users and require MAC BSS MSC HLR VLR Cellular networks: radio shared by mobile users and require MAC BSS MSC HLR VLR EIR AC AC = authentication center BSS = base station subsystem EIR = equipment identity register HLR = home location register STP PSTN MSC PSTN STP VLR SS#7 wireline terminal = mobile switching center = public switched telephone network = signal transfer point = visitor location register 6 Figure 4. 52

Multi-drop telephone line requires access control Multidrop telephone lines Inbound line Host Outbound line Multi-drop telephone line requires access control Multidrop telephone lines Inbound line Host Outbound line Terminals 7 Figure 6. 4

Ring networks and multi-tapped buses require MAC Ring networks Multitapped Bus 8 Figure 6. Ring networks and multi-tapped buses require MAC Ring networks Multitapped Bus 8 Figure 6. 5

Wireless LAN: share wireless medium and require MAC 9 Figure 6. 6 Wireless LAN: share wireless medium and require MAC 9 Figure 6. 6

Approaches to sharing transmission medium Medium Sharing Techniques Static Channelization Partitioned channels are dedicated Approaches to sharing transmission medium Medium Sharing Techniques Static Channelization Partitioned channels are dedicated to individual users, so no collision at all. Good for steady traffic and achieve efficient usage of channels Dynamic Medium Access Control Scheduling Schedule a orderly access of medium. Good for heavier traffic. Minimize the incidence of collision to achieve reasonable usage of medium. Good for bursty traffic. Random Access Try and error. if no collision, that is good, otherwise wait a random time, try again. Good for light traffic. 10 Figure 6. 2

MAC and performance • Shared medium is the only means for stations to communicate MAC and performance • Shared medium is the only means for stations to communicate • Some kind of MAC technique is needed • Like ARQs, which use ACK frame to coordinate the transmission and consume certain bandwidth, the MAC will need to transfer some coordination information which will consume certain bandwidth of shared medium. • Delay-bandwidth product plays a key role in the performance of MAC (as in ARQs). 11

Delay-bandwidth product and performance (suppose two station A and B want to transmit information) Delay-bandwidth product and performance (suppose two station A and B want to transmit information) A transmits A at t = 0 Distance d meters tprop = d / seconds B A A detects collision at t = 2 tprop B A B B transmits before t = tprop and detects collision shortly thereafter 1. : the speed of light, 3*108 meters/second 2. Before A begins to transmit, A listens to medium, if busy, wait; otherwise, do it (suppose t=0) 3. If B wants to transmit after t=tprop A’s transmission has reached B, so B waits and A captures medium successfully and transmits entire message. 4. If B wants to transmit before t=tprop, it listens and no transmission is going on, so B begins to transmit, then collision occurs. B detects collision shortly, but A detects collision at t=2 tprop 5. Therefore, 2 tprop is required to coordinate the access for each packet transmitted. 12 Figure 6. 7

MAC efficiency • Suppose bit rate of medium is R, then number of bits MAC efficiency • Suppose bit rate of medium is R, then number of bits “wasted” in access coordination is 2 tprop. R. And suppose average length of packets is L. Then efficiency in use of the medium is: Efficiency = a=tprop. R / L L L + 2 tprop. R = 1 1+2 a L i. e. , the ratio of (one-way) delay-bandwidth product to the average packet length. Suppose a = 0. 01, then efficiency = 1/1. 02 = 0. 98 a = 0. 1, then efficiency = 1 / 2 = 0. 50 13

Examples of efficiency • Ethernet (CSMA-CD): – Efficiency = 1/(1+6. 44 a) where a Examples of efficiency • Ethernet (CSMA-CD): – Efficiency = 1/(1+6. 44 a) where a = tprop. R/L. • Token-ring networks: – Efficiency = 1/(1+a’ ) where a’ = ring-latency in bits/L where ring-latency contains: • The sum of bit delays introduced at each ring adapter. • Delay-bandwidth product where delay is the time required for a bit to circulate around the ring. 14

(a) Typical LAN structure and network interface card A LAN connects servers, workstations, Printers, (a) Typical LAN structure and network interface card A LAN connects servers, workstations, Printers, etc. , together to achieve sharing 1. NIC is parallel with memory but serial with network 2. ROM stores the implementation of MAC 3. Unique physical address burn into ROM 4. A hardware in NIC recognizes physical, broadcast & multicast addresses. 5. NIC can be Set to “promiscuous” mode to catch all transmissions. (b) Ethernet Processor RAM ROM RAM 15 Figure 6. 10

IEEE 802 LAN standards Network Layer LLC 802. 2 Logical Link Control MAC Physical IEEE 802 LAN standards Network Layer LLC 802. 2 Logical Link Control MAC Physical Layer 802. 3 CSMA-CD 802. 5 Token Ring 802. 11 Wireless LAN Various Physical Layers IEEE 802 Data Link Layer Other LANs Physical Layer OSI One LLC and several MACs, each MAC has an associated set of physical layers. MAC provides connectionless transfer. Generally no error control because of relatively error free. 16 MAC protocol is to direct when they should transmit frames into shared medium. Figure 6. 11

The MAC sublayer provides unreliable datagram service Unreliable Datagram Service MAC MAC PHY PHY The MAC sublayer provides unreliable datagram service Unreliable Datagram Service MAC MAC PHY PHY Important: all three MAC entities must cooperate to provide datagram service, I. e. , the interaction 17 between MAC entities is not between pairs of peers, but rather all entities must monitor all frames. Figure 6. 12

LLC provides three HDLC services: 1. Unacknowledged connectionless service, recall HDLC has unnumbered frames; LLC provides three HDLC services: 1. Unacknowledged connectionless service, recall HDLC has unnumbered frames; 2. Reliable connection-oriented service in the form of HDLC ABM mode; 3. Acknowledged connectionless service, need to add two unnumbered frames to HDLC frame set. C A A Reliable Packet Service C LLC LLC MAC MAC PHY PHY LLC can provide reliable packet transfer service 18 Figure 6. 13

 • LLC provides additional addressing, i. e. , SAP (Service Access Point). Like • LLC provides additional addressing, i. e. , SAP (Service Access Point). Like PPP, LLC can support several different network connections with different protocols at the same time. • Typical SAPs: IP: 06, IPX: E 0, OSI packets: FE etc. • In practice, LLC SAP specifies in which buffer the NIC places the frame, thus allowing the appropriate network protocol to retrieve the data. 1 byte Destination SAP Address 1 Source SAP Address 1 or 2 Control Source SAP Address Destination SAP Address C/R I/G 1 Information 7 bits I/G = Individual or group address 1 7 bits C/R = Command or response frame LLC PDU structure and its support for several SAPs 19 Figure 6. 14

Header overhead: TCP, IP: >=20 LLC: 3 or 4 MAC: 26 TCP segments IP Header overhead: TCP, IP: >=20 LLC: 3 or 4 MAC: 26 TCP segments IP Packet LLC PDU MAC frame LLC Header IP Header Reliable IP Data MAC Header Unreliable Orderly FCS LLC PDU and MAC frame Chaos 20 Figure 6. 15

Random Access • Why random access? – Reaction time (i. e. 2 times of Random Access • Why random access? – Reaction time (i. e. 2 times of propagation delay) is very important for performance, e. g. in Stop-and-Wait, when reaction time is small (i. e. the ACK will arrive soon) the performance is very good, however, if reaction time is large, then performance is very bad. – Therefore, proceed the transmission without waiting for ACK and deal with collision/error after the fact, i. e. random access. • Three types of random accesses: – ALOHA, slotted ALOHA, and CSMA-CD 21

ALOHA • Basic idea: – let users transmit whenever they have data to be ALOHA • Basic idea: – let users transmit whenever they have data to be sent. – When collision occurs, wait a random time ( why? ) and retransmit again. • Differences between regular errors &collision – – Regular errors only affect a single station Collision affects more than one The retransmission may collide again Even the first bit of a frame overlaps with the last bit of a frame almost finished, then two frames are totally destroyed. 22

ALOHA random access scheme Suppose L: the average frame length, R: rate, X=L/R: frame ALOHA random access scheme Suppose L: the average frame length, R: rate, X=L/R: frame time 1. Transmit a frame at t=t 0 (and finish transmission of the frame at t 0+X ) 2. If ACK does not come after t 0+X+2 tprop or hear collision, wait for random time: B 3. Retransmit the frame at t 0+X+2 tprop+B Two modes: collide only from time to time and snowball effect collision First transmission t 0 -X t 0+X Vulnerable period Retransmission t 0+X+2 tprop Time-out Backoff period: B When collision occurs? t Retransmission if necessary Vulnerable period: t 0 -X to t 0+X, (2 X seconds) if any other frames are transmitted during the period, the collision will occur. Therefore the probability of a successful transmission is the probability that there is no additional transmissions in the vulnerable period. 23 Figure 6. 16

The performance of ALOHA • Let S be the arrival rate of new frames The performance of ALOHA • Let S be the arrival rate of new frames in units of frames/X seconds, S is also the throughput of the system. • Let G be the total arrival rate in units of frames/X seconds, G contains the new and retransmissions and is the total load. • Assume that aggregate arrival process resulting from new and retransmitted frames has a Poisson distribution with an average number of arrivals of 2 G frames/2 X seconds, i. e. , (2 G)k -2 G P[k transmissions in 2 X seconds] = e k! Therefore, the throughput of the system is: , k=0, 1, 2, … S=G*P[no collision] =G*P[0 transmission in 2 X seconds] (2 G)0 e-2 G =G* 0! 24

What results can be obtained from the graph? 1. peak value at G=0. 5 What results can be obtained from the graph? 1. peak value at G=0. 5 with S=0. 184 2. for any given S, there are two values of G, corresponding to the two modes: occasional collision mode with S G and frequent collision mode with G >> S 0. 184 Ge-2 G Throughput S versus load G for ALOHA 25 Figure 6. 17

Slotted ALOHA Synchronize the transmissions of stations –All stations keep track of transmission time Slotted ALOHA Synchronize the transmissions of stations –All stations keep track of transmission time slots and are allowed to initiate transmissions only at the beginning of a time slot. Suppose a packet occupies one time slot –Vulnerable period is from t 0 -X to t 0, i. e. , X seconds long. Therefore, the throughput of the system is: S=GP[no collision] =GP[0 transmission in X seconds] (G)0 -G =G e-G 0! 26

Slotted ALOHA random access scheme t 0=(k+1)X First transmission k. X (k+1)X Retransmission t Slotted ALOHA random access scheme t 0=(k+1)X First transmission k. X (k+1)X Retransmission t 0+X+2 tprop Time-out Backoff period: B =n. X t Retransmission if necessary Vulnerable period: t 0 -X to t 0 , i. e. , X seconds long 27 Figure 6. 16

Peak value at G=1 with S=0. 368 for slotted ALOHA, double compared with ALOHA. Peak value at G=1 with S=0. 368 for slotted ALOHA, double compared with ALOHA. In LAN, propagation delay may be negligible and uncoordinated access of shared medium is possible but at the expense of significant wastage due to collisions and at very low throughput. Throughput of ALOHAs is not sensitive to the reaction time because stations act independently. 0. 368 Ge-G S 0. 184 Ge-2 G G Throughput S versus load G for ALOHA and slotted ALOHA 28 Figure 6. 17

CSMA (Carrier sensing multiple access) • Problem with ALOHAs: low throughput because the collision CSMA (Carrier sensing multiple access) • Problem with ALOHAs: low throughput because the collision wastes transmission bandwidth. • Solution: avoid transmission that are certain to cause collision, that is CSMA. Any station listens to the medium, if there is some transmission going on the medium, it will postpone its transmission. 29

Suppose tprop is propagation delay from one extreme end to the other extreme end Suppose tprop is propagation delay from one extreme end to the other extreme end of the medium. When transmission is going on, a station can listen to the medium and detect it. After tprop, A’s transmission will arrive the other end; every station will hear it and refrain from the transmission, so A captures the medium and can finish its transmission. But in ALOHAs, it is X or 2 X Vulnerable period = tprop Station A begins transmission at t=0 A Station A captures channel at t=tprop A In LAN, generally, tprop < X sense CSMA random access scheme 30 Figure 6. 19

Three different CSMA schemes • Based on how to do when medium is busy: Three different CSMA schemes • Based on how to do when medium is busy: – 1 -persistent CSMA – Non-persistent CSMA – p-persistent CSMA 31

1 -persistent CSMA sense channel when want to transmit a packet, if channel is 1 -persistent CSMA sense channel when want to transmit a packet, if channel is busy, then sense continuously, until the channel is idle, at this time, transmit the frame immediately. If more than one station are sensing, then they will begin transmission the same time when channel becomes idle, so collision. At this time, each station executes a backoff algorithm to wait for a random time, and then re-senses the channel again. Problem with 1 -persistent CSMA is “high collision rate”. 32

Non-persistent CSMA sense channel when want to transmit a packet, if channel is idle, Non-persistent CSMA sense channel when want to transmit a packet, if channel is idle, then transmit the packet immediately. If busy, run backoff algorithm immediately to wait a random time and then re-sense the channel again. Problem with non-persistent CSMA is that when the channel becomes idle from busy, there may be no one of waiting stations beginning the transmission, thus waste channel bandwidth, 33

p-persistent CSMA sense channel when want to transmit a packet, if channel is busy, p-persistent CSMA sense channel when want to transmit a packet, if channel is busy, then persist sensing the channel until the channel becomes idle. If the channel is idle, transmit the packet with probability of p, and wait, with probability of 1 -p, additional propagation delay tprop and then re-sense again 34

Throughput versus load G for 1 -persistent (three different a=tprop/X ) S 0. 53 Throughput versus load G for 1 -persistent (three different a=tprop/X ) S 0. 53 1 -Persistent CSMA 0. 01 0. 45 0. 16 0. 1 G 1 35 Figure 6. 21 - Part 2

Throughput versus load G for non-persistent (three different a=tprop/X ) S 0. 81 Non-Persistent Throughput versus load G for non-persistent (three different a=tprop/X ) S 0. 81 Non-Persistent CSMA 0. 01 0. 51 0. 14 0. 1 G 1 1 -persistent is sharper than non-persistent. a=tprop/X has import impact on the throughput. When a approaches 1, both 1 -persistent and non-persistent is worse than ALOHAs. 36 Figure 6. 21 - Part 1

CSMA-CD • When the transmitting station detects a collision, it stops its transmission immediately, CSMA-CD • When the transmitting station detects a collision, it stops its transmission immediately, Not transmit the entire frame which is already in collision. • The time for transmitting station to detect a collision is 2 tprop. • In detail: when a station wants to transmit a packet, it senses channel, if it is busy, use one of above three algorithms (i. e. , 1 persistent, non-persistent, and p-persistent schemes). The transmitter senses the channel during transmission. If a collision occurred and was sensed, transmitter stops its left transmission of the current frame; moreover, a short jamming signal is transmitted to ensure other stations that a collision has occurred and backoff algorithm is used to schedule a future re-sensing time. • The implication: frame time X >= 2 tprop, , since X=L/R, which means that there is a minimum limitation for frame length. 37

The reaction time in CSMA-CD is 2 tprop A begins to transmit at t=0 The reaction time in CSMA-CD is 2 tprop A begins to transmit at t=0 A B A B A detects collision at t= 2 tprop- B begins to transmit at t= tprop- B detects collision at t= tprop It takes 2 tprop to find out if channel has been captured 38 Figure 6. 22

1. 2. 3. When a is small, i. e, tprop << X, the CSMA-CD 1. 2. 3. When a is small, i. e, tprop << X, the CSMA-CD is best and all CSMAs are better than ALOHAs. When a is approaching 1, CSMAs become worse than ALOHAs are not sensitive to a because they do not depend on reaction time. CSMA/CD 1 -P CSMA max Non-P CSMA Slotted Aloha a = tprop /X Maximum achievable throughput of random access schemes 39 Figure 6. 24

Summary of random access schemes (Continuous) ALOHA: try to send a frame anytime, if Summary of random access schemes (Continuous) ALOHA: try to send a frame anytime, if collision, wait random time, resend. Vulnerable period: 2 X , maximum throughput: 0. 184. Slotted ALOHA: send a frame at the beginning of a time slot. If collision, wait a random time to a new time slot, and resend again. Vulnerable period: X , maximum throughput: 0. 368. 1 -persistent CSMA: listen before transmission, if busy, continuously listen until channel become idle, then transmit immediately. If collision, wait a random time, re-listen. Vulnerable period: tprop , throughput: 0. 53 for a=tprop/X=0. 01 Non-persistent CSMA: listen before transmission, if busy, wait a random time, re-listen. if idle, transmit. If collision, wait a random time, re-listen. Vulnerable period: tprop , throughput: 0. 81 for a=tprop/X=0. 01 p-persistent CSMA: persist listening to the channel until idle. At this time, with probability p, transmit the packet, and with probability of 1 -p, do not transmit but wait additional tprop and then re-listen. If collision, wait random time, re-listen. Vulnerable period: tprop throughput dependent on p. CSMA-CD: using any one of above three. Listen during transmission. If collision, stop its transmission immediately. Vulnerable period: tprop. throughput: >0. 90 for a=tprop/X=0. 01 Important: a=tprop/X affects performance. Requirement: certain value for given tprop, (the distance of LAN). frame length can not below 40