EECS 122: Introduction to Computer Networks Multiaccess Protocols - PowerPoint PPT Presentation

1 / 41
About This Presentation
Title:

EECS 122: Introduction to Computer Networks Multiaccess Protocols

Description:

Router deals with short-term contention by queueing packets. Switch algorithms and router buffers ensure no packets are dropped due to short-term contention ... – PowerPoint PPT presentation

Number of Views:39
Avg rating:3.0/5.0
Slides: 42
Provided by: sto2
Category:

less

Transcript and Presenter's Notes

Title: EECS 122: Introduction to Computer Networks Multiaccess Protocols


1
EECS 122 Introduction to Computer Networks
Multiaccess Protocols
  • Computer Science Division
  • Department of Electrical Engineering and Computer
    Sciences
  • University of California, Berkeley
  • Berkeley, CA 94720-1776

2
ISO OSI Reference Model for Layers
  • Application
  • Presentation
  • Session
  • Transport
  • Network
  • Datalink
  • Physical
  • Service
  • Framing (attach frame separators)
  • Send data frames between peers
  • Others
  • Arbitrate the access to common physical media
  • Per-hop reliable transmission
  • Per-hop flow control

Media Access
3
Up Until Now...
  • Short-term contention is lossless just wait
  • Main resource (link bandwidth) is controlled by
    router
  • Router deals with short-term contention by
    queueing packets
  • Switch algorithms and router buffers ensure no
    packets are dropped due to short-term contention
  • Have focused on managing long-term contention
  • Queueing schemes (FQ, FIFO, RED, etc.)
  • End-to-end congestion control (TCP)

4
This Lecture
  • Short-term contention for media yields losses!
  • Focus on networking over shared media
  • Ethernet
  • Short-range radio (e.g., wireless LANs)
  • Long-range radio (e.g., packet radio, satellite)
  • AKA multiple-access problem
  • Dont go through central router to get access to
    link
  • Instead, multiple users can access shared medium

5
Medium Access Protocols
  • Channel partitioning
  • Divide channel into smaller pieces (e.g., time
    slots, frequency, code selection)
  • Allocate a piece to given node for exclusive use
  • Random access
  • Allow collisions
  • Recover from collisions
  • Taking-turns
  • Tightly coordinate shared access to avoid
    collisions

6
Problem Statement
  • Managing shared media
  • If two users send at the same time, collision
    results in no packet being received (e.g.,
    interference)
  • If no users send, channel goes idle
  • Thus, want to have only one user send at a time
  • Achieve high network utilization
  • TDMA doesnt give high utilization
  • But also use a simple distributed algorithm
  • No fancy token-passing schemes to avoid
    collisions

7
What Layer?
  • Where should short-term contention be handled?
  • Network layer?
  • Application layer?
  • Link layer?

8
Focus of Lecture
  • Understanding basic algorithmic choices
  • Simple performance analysis
  • Will not stress the practical details
  • Framing, packet formats, etc.

9
Where it all StartedAlohaNet
  • Norm Abramson left Stanford in search of surfing
  • Set up first radio-based data communication
    system connecting the Hawaiian islands
  • Hub at Alohanet HQ (Univ. Hawaii, Oahu)
  • Other sites spread among the islands
  • Had two radio channels
  • Random access sites sent data on this channel
  • Broadcast only used by hub to rebroadcast
    incoming data

10
Aloha Transmission Strategy
  • When new data arrived at site, send to hub for
    transmission
  • Site listened to broadcast channel
  • If it heard data repeated, knew transmission was
    recd
  • If it didnt hear data correctly, it assumed a
    collision
  • If collision, site waited random delay before
    retransmitting

11
Simple, but Radical in Concept!
  • Aloha is to multiple access what Internet is to
    telephony, i.e., revolutionary!
  • Previous attempts all partitioned channel
  • TDMA, FDMA, CDMA, etc.
  • Aloha optimized the common case (few senders) and
    dealt with collisions through retries
  • Sound familiar?

12
Why Better thanTime Slot Schemes?
  • In TDMA, you have to wait your turn
  • Delay proportional to number of participating
    sites
  • In Aloha, can send immediately
  • Aloha gives much lower delays, at the price of
    lower utilization (as we will see)

13
Variation Slotted Aloha
  • Divide time into slots
  • Requires some way to synchronize geographically
    distributed sites (non-trivial problem!)
  • Contend for transmission only at the beginning of
    slots, never in the middle of slots
  • Effect is to decreases chance of partial
    collisions

14
Performance of Slotted Aloha
  • Time is divided into equal size slots (packet
    transmission time)
  • Node with new arriving packet transmit at
    beginning of next slot
  • If collision retransmit packet in future slots
    with probability p, until successful.

Success (S), Collision (C), Empty (E) slots
15
Efficiency of Slotted Aloha
  • What is the maximum fraction of successful
    transmissions?
  • Suppose N stations have packets to send
  • Each transmits in slot with probability p
  • Probability of successful transmission S is(very
    approximate analysis!)
  • by a particular node i Si p (1-p)(N-1)
  • by exactly one of N nodes S Prob (only one
    transmits) N p (1-p)(N-1) lt 1/e 0.37
  • but must have p proportional to 1/N

16
Ethernet
  • Bob Metcalfe, Xerox PARC, visits Hawaii and gets
    an idea!
  • Shared medium (coax cable)
  • Can sense carrier to see if other nodes are
    broadcasting at the same time
  • Sensing is subject to time-lag
  • Only detect those sending a short while before
  • Monitor channel to detect collisions
  • Once sending, can tell if anyone else is sending
    too

17
CSMA and CSMA/CD
  • Carrier sense multiple access CSMA
  • Listen before you start sending
  • CSMA with collision detect CSMA/CD
  • Stop sending when you detect another station is
    sending

18
CSMA Carrier Sense Multiple Access
  • CS (Carrier Sense) implies that each node can
    distinguish between an idle and a busy link
  • Sender operations
  • If channel sensed idle transmit entire packet
  • If channel sensed busy, defer transmission
  • Various retry algorithms

19
CSMA collisions
spatial layout of nodes along ethernet
Collisions can occur propagation delay means
two nodes may not hear each others transmission
Collision entire packet transmission time wasted
Note role of distance and propagation delay in
determining collision probability
20
CSMA/CD (Collision Detection)
  • Collisions detected within short time
  • Colliding transmissions aborted, reducing channel
    wastage
  • This is relatively easy in wired LANs
  • Measure signal strengths
  • Compare transmitted, received signals
  • Difficult in wireless LANs

21
CSMA/CD Collision Detection
22
Ethernet Frame Structure
  • Sending adapter encapsulates IP datagram
  • Preamble
  • 7 bytes with pattern 10101010 followed by one
    byte with pattern 10101011
  • Used to synchronize receiver, sender clock rates

23
Ethernet Frame Structure (more)
  • Addresses 6 bytes, frame is received by all
    adapters on a LAN and dropped if address does not
    match
  • Type 2 bytes, indicates the higher layer
    protocol
  • E.g., IP, Novell IPX, AppleTalk
  • CRC 4 bytes, checked at receiver, if error is
    detected, the frame is simply dropped
  • Data payload maximum 1500 bytes, minimum 46 bytes

24
Ethernets CSMA/CD
  • Sense channel, if idle
  • If detect another transmission
  • Abort, send jam signal
  • Delay, and try again
  • Else
  • Send frame
  • Receiver accepts
  • Frames addressed to its own address
  • Frames addressed to the broadcast address
    (broadcast)
  • Frames addressed to a multicast address, if it
    was instructed to listen to that address
  • All frames (promiscuous mode)

25
Ethernets CSMA/CD (more)
  • Jam signal make sure all other transmitters are
    aware of collision 48 bits
  • Exponential back-off
  • Goal adapt retransmission attempts to estimated
    current load
  • Heavy load random wait will be longer
  • First collision choose K from 0,1 delay is K
    x 512 bit transmission times
  • After second collision choose K from 0,1,2,3
  • After ten or more collisions, choose K from
    0,1,2,3,4,,1023

26
Next Few Slides
  • Practical aspects of ethernet
  • Then on to theoretical aspects

27
Minimum Packet Size
  • Why put a minimum packet size?
  • Give a host enough time to detect collisions
  • In Ethernet, minimum packet size 64 bytes (two
    6-byte addresses, 2-byte type, 4-byte CRC, and 46
    bytes of data)
  • If host has less than 46 bytes to send, the
    adaptor pads (adds) bytes to make it 46 bytes
  • What is the relationship between minimum packet
    size and the length of the LAN?

28
Minimum Packet Size (more)
Host 1
Host 2
a) Time t Host 1 starts to send frame
propagation delay (d)
LAN length (min_frame_size)(light_speed)/(2ban
dwidth)
(864b)(2.5108mps)/(2107 bps) 6400m
approx What about 100 mbps? 1 gbps? 10 gbps?
29
Ethernet Technologies 10Base2
  • 10 10Mbps 2 under 200 meters max cable length
  • Thin coaxial cable in a bus topology
  • Repeaters used to connect up to multiple segments
  • Repeater repeats bits it hears on one interface
    to its other interfaces physical layer device
    only!

30
10BaseT and 100BaseT
  • 10/100 Mbps rate later called fast ethernet
  • T stands for Twisted Pair
  • Hub to which nodes are connected by twisted pair,
    thus star topology

31
10BaseT and 100BaseT (more)
  • Max distance from node to Hub is 100 meters
  • Hub can disconnect jabbering adapter
  • Hub can gather monitoring information, statistics
    for display to LAN administrators
  • Hubs still preserve one collision domain
  • Every packet is forwarded to all hosts
  • Use bridges to address this problem
  • Bridges forward a packet only to the destination
    leading to the destination

32
GigaBit Ethernet
  • Use standard Ethernet frame format
  • Allows for point-to-point links and shared
    broadcast channels
  • In shared mode, CSMA/CD is used very short
    distances between nodes to be efficient
  • Uses hubs, called here Buffered Distributors
  • Full-Duplex at 1 Gbps for point-to-point links

33
Interconnecting LANs
  • Why not just one big LAN?
  • Limited amount of supportable traffic on single
    LAN, all stations must share bandwidth
  • Limited length
  • Large collision domain (can collide with many
    stations)

34
Family of Backoff Algorithms
  • Use slotted transmission scheme
  • Carrier sense is irrelevant in slotted model
  • When experience kth collision for a particular
    packet, send packet with probability 1/f(k) in
    each successive slot (until transmitted)
  • Ethernet uses f(k)2k (with a bound on k)

35
Dynamics of Backoff Algorithms
  • Is ethernet asymptotically stable?
  • if we let number of hosts increase without bound,
    will the channel have a nonzero throughput?
  • Answer no (no matter what f(k) is)
  • Insight jam medium for time taken to achieve
    sizable backlog once this happens, very little
    chance channel will become unclogged

36
Is Ethernet Fair?
  • No, it has capture effect
  • Consider two nodes competing for the ethernet,
    both with an infinite set of packets to send
  • Finite chance that one will never send another
    packet, ever (also known as starvation)
  • Moreover, with probability one only one node will
    achieve an infinite number of transmissions

37
Capture Effect
  • Assume there is a collision between a node with
    backoff counter 1 and backoff counter k
  • First node will win unless
  • It chooses the second slot (probability 1/2) and
  • Other node chooses first slot (probability
    1/f(k))
  • Probability that second node loses all subsequent
    collisions
  • L?k (1-1/f(k)) exp(-?k1/f(k))
  • If f(k) grows faster than linearly, then L is
    nonzero

38
Wasted Time
  • If nodes dont have infinite backlog of packets,
    then the nodes will take turns on long time
    scales first one dumps its queue, then the next
  • For backoff functions faster than linear, but
    slower than exponential, the wasted time when
    switching over is small compared to the dumping
    time
  • For exponential backoffs, the wasted time is
    proportional to dumping times

39
Summary of Backoff
  • Slower than linear
  • No capture
  • Bounded utilization (due to ongoing collisions)
  • Between linear and exponential
  • Capture
  • Full utilization
  • Exponential and faster
  • Capture
  • Bounded utilization (idle time between turns)

40
Ethernet vs 802.11
  • Ethernet one shared collision domain
  • 802.11 radios have small range compared to
    overall system collisions are local
  • Collisions are at receiver, not sender
  • Carrier-sense plays different role
  • CSMA/CA not CSMA/CD
  • Collision avoidance, not collision detection

41
802.11
  • Designed for use in limited geographical area
    (i.e., couple of hundreds of meters)
  • Designed for three physical media (run at either
    1Mbps or 2 Mbps)
  • Two based on spread spectrum radio
  • One based on diffused infrared

42
Physical Link
  • Frequency hoping
  • Transmit the signal over multiple frequencies
  • The sequence of frequencies is pseudo-random,
    i.e., both sender and receiver use the same
    algorithm to generate their sequences
  • Direct sequence
  • Represent each bit by multiple (e.g., n) bits in
    a frame XOR signal with a pseudo-random
    generated sequence with a frequency n times
    higher
  • Infrared signal
  • Sender and receiver do not need a clear line of
    sight
  • Limited range order of meters

43
Collision Avoidance The Problems
  • Reachability is not transitive if A can reach B,
    and B can reach C, it doesnt necessary mean that
    A can reach C
  • Hidden nodes A and C send a packet to B neither
    A nor C will detect the collision!
  • Exposed node B sends a packet to A C hears this
    and decides not to send a packet to D (despite
    the fact that this will not cause interference)!

D
A
B
C
44
Multiple Access with Collision Avoidance (MACA)
other node in senders range
sender
receiver
RTS
CTS
data
ACK
  • Before every data transmission
  • Sender sends a Request to Send (RTS) frame
    containing the length of the transmission
  • Receiver respond with a Clear to Send (CTS) frame
  • Sender sends data
  • Receiver sends an ACK now another sender can
    send data
  • When sender doesnt get a CTS back, it assumes
    collision

45
Other Nodes
  • When you hear a CTS, you keep quiet until
    scheduled transmission is over (hear ACK)
  • If you hear RTS, but not CTS, you can send
  • Interfering at source but not at receiver is ok
  • Can cause problems when a CTS is interfered with

46
Summary
  • Problem arbitrate between multiple hosts sharing
    a common communication media
  • Wired solution Ethernet (use CSMA/CD)
  • Detect collisions
  • Backoff exponentially on collision
  • Wireless solution 802.11 (CSMA/CA)
  • Use MACA protocol
  • Cannot detect collisions try to avoid them
  • Distribution system frame format in discussion
    sections

47
What You Need to Know
  • Basics of Aloha and Ethernet contention
    algorithms
  • Basics of 802.11 contention algorithm
Write a Comment
User Comments (0)
About PowerShow.com