SlideShare a Scribd company logo
Lecture 16 -1
Random Access protocols
A node transmits at random at full channel data rate R.
If two or more nodes “collide”, they retransmit at random times
The random access MAC protocol specifies how to detect collisions
and how to recover from them (via delayed retransmissions, for
example)
Examples of random access MAC protocols
SLOTTED ALOHA
ALOHA
CSMA and CSMA/CD
Lecture 16 -2
Slotted Aloha
Time is divided into equal size slots (= sending one frame)
a newly arriving station transmits at the beginning of the next slot
if collision occurs (assume channel feedback, eg the receiver
informs the source of a collision), the source retransmits the
packet at each slot with probability P, until successful.
Success (S), Collision (C), Empty (E) slots
Fully decentralized
Lecture 16 -3
Slotted Aloha efficiency
If N stations always have frames to send, and each transmits in
each slot with probability P, the probability of successful
transmission S is:
S = Prob (only one transmits) = N P (1-P)^(N-1)
Optimal value of P: P = 1/N
For example, if N=2, S= .5
For N very large one finds S= 1/e (approximately, .37)
Lecture 16 -4
Pure (unslotted) ALOHA
Slotted ALOHA requires slot synchronization
A simpler version, pure ALOHA, does not require slots
A node transmits without awaiting for the beginning of a slot
Collision probability increases (packet can collide with other
packets which are transmitted within a window twice as large as in
S-Aloha)
Throughput is reduced by one half, S= 1/2e
Lecture 16 -5
CSMA (Carrier Sense Multiple Access)
CSMA: listen before transmit. If channel is sensed busy, defer
transmission
Persistent CSMA: retry immediately when channel becomes idle
(this may cause instability)
Non persistent CSMA: retry after random interval of time
Note: collisions may still exist, since two stations may sense the
channel idle at the same time ( or better, within a “vulnerable”
window = round trip delay)
In case of collision, the entire pkt transmission time is wasted
Lecture 16 -6
CSMA collisions
Lecture 16 -7
CSMA/CD (Collision Detection)
CSMA/CD: like in CSMA
collisions are detected within a few bit times
Transmission is then aborted, reducing the channel wastage
considerably
persistent retransmission is implemented
Collision detection is easy in wired LANs:
can measure signal strength on the line
Collision detection cannot be done in wireless LANs :
CSMA/CD can approach channel utilization =1 in LANs:
low ratio of propagation over frame transmission time
Lecture 16 -8
CSMA/CD collision detection
Lecture 16 -9
“Taking Turns” MAC protocols
Recall the first 2 types of MAC Protocols:
channel partitioning MAC protocols :TDM, FDM and CDMA
+ can share channel fairly
- a single station cannot use it all
Random access MAC protocols
+ a single station can use full channel rate
- cannot share the channel fairly
Third type of MAC protocol is Taking Turns protocol:
Taking Turns MAC protocols:
Achieve both fair and full rate
with some extra control overhead
(a) Polling: Master “invites” slaves
- Request/Clear overhead, latency, single point of failure
(b) Token passing: token is passed from one node to the next
+ Reduce latency, improve fault tolerance
- elaborate procedures to recover from lost token
Lecture 16 -10
LAN technologies
MAC protocols used in LANs, to control access to the channel
Token Rings: IEEE 802.5 (IBM token ring), for computer room, or
Department connectivity, up to 16Mbps; FDDI (Fiber Distributed
Data Interface), for Campus and Metro connectivity, up to 200
stations, at 100Mbps.
Ethernets: employ the CSMA/CD protocol; 10Mbps (IEEE 802.3),
Fast E-net (100Mbps), Giga E-net (1,000 Mbps); by far the most
popular LAN technology
Lecture 16 -11
LAN Addresses and ARP
IP address: drives the packet to destination network
LAN (or MAC or Physical) address: drives the packet to the
destination node’s LAN interface card on the local LAN
48 bit MAC address (for most LANs); burned in the adapter ROM
(alias Ethernet address, alias physical address)
Lecture 16 -12
LAN Address (cont)
MAC address allocation administered by IEEE
A manufacturer buys a portion of the address space
to assure uniqueness
Analogy:
(a) MAC address: like Social Security Number
(b) IP address: like postal address
MAC flat address => portability
IP hierarchical address NOT portable (need mobile IP)
Broadcast LAN address: 1111………….1111 (FF-FF-FF-FF-FF-FF)
Lecture 16 -13
ARP: Address Resolution Protocol
Each IP node (Host, Router) on the LAN has ARP module and Table
ARP Table: IP/MAC address mappings for some LAN nodes
< IP address; MAC address; TTL>
< ………………………….. >
TTL (Time To Live): timer, typically 20 min
Lecture 16 -14
ARP (cont)
Host A wants to send packet to destination IP addr XYZ on same
LAN
Source Host first checks own ARP Table for IP addr XYZ
If XYZ not in the ARP Table, ARP module broadcasts ARP pkt:
< XYZ, MAC (?) >
ALL nodes on the LAN accept and inspect the ARP pkt
Node XYZ responds with unicast ARP pkt carrying own MAC addr:
< XYZ, MAC (XYZ) >
MAC address cached in ARP Table
Lecture 16 -15
Routing pkt to another LAN
Say, route packet from source IP addr <111.111.111.111> to
destination addr <222.222.222.222>
In routing table at source Host, find router 111.111.111.110
In ARP table at source, find MAC address E6-E9-00-17-BB-4B, etc

More Related Content

What's hot

IPC SOCKET
IPC SOCKETIPC SOCKET
IPC SOCKET
Sanoj Kumar
 
Socket programming in c
Socket programming in cSocket programming in c
Socket programming in c
Md. Golam Hossain
 
Socket Programming Tutorial
Socket Programming TutorialSocket Programming Tutorial
Socket Programming Tutorial
Jignesh Patel
 
Socket Programming
Socket ProgrammingSocket Programming
Socket Programming
VisualBee.com
 
Socket programming
Socket programmingSocket programming
Socket programming
harsh_bca06
 
Programming TCP/IP with Sockets
Programming TCP/IP with SocketsProgramming TCP/IP with Sockets
Programming TCP/IP with Sockets
elliando dias
 
Chap 02 osi model
Chap 02 osi modelChap 02 osi model
Chap 02 osi model
Noctorous Jamal
 
Np unit iv ii
Np unit iv iiNp unit iv ii
Np unit iv ii
vamsitricks
 
Sockets
SocketsSockets
Chap 06 delivery and routing of ip packets
Chap 06 delivery and routing of ip packetsChap 06 delivery and routing of ip packets
Chap 06 delivery and routing of ip packets
Noctorous Jamal
 
Chap 12 tcp
Chap 12 tcpChap 12 tcp
Chap 12 tcp
Noctorous Jamal
 
Socket programming
Socket programmingSocket programming
Socket programming
Ujjwal Kumar
 
Chap 05 ip addresses classfless
Chap 05 ip addresses classflessChap 05 ip addresses classfless
Chap 05 ip addresses classfless
Noctorous Jamal
 
Np unit1
Np unit1Np unit1
Np unit1
vamsitricks
 
Socket programming in C
Socket programming in CSocket programming in C
Socket programming in C
Deepak Swain
 
Ports & sockets
Ports  & sockets Ports  & sockets
Ports & sockets
myrajendra
 
Client server examples for tcp abnormal conditions
Client server examples for tcp abnormal conditionsClient server examples for tcp abnormal conditions
Client server examples for tcp abnormal conditions
CEC Landran
 
Arp and rarp
Arp and rarpArp and rarp
Meeting 7 : host configuration: dhcp
Meeting 7 : host configuration: dhcpMeeting 7 : host configuration: dhcp
Meeting 7 : host configuration: dhcp
Syaiful Ahdan
 
Socket programming using C
Socket programming using CSocket programming using C
Socket programming using C
Ajit Nayak
 

What's hot (20)

IPC SOCKET
IPC SOCKETIPC SOCKET
IPC SOCKET
 
Socket programming in c
Socket programming in cSocket programming in c
Socket programming in c
 
Socket Programming Tutorial
Socket Programming TutorialSocket Programming Tutorial
Socket Programming Tutorial
 
Socket Programming
Socket ProgrammingSocket Programming
Socket Programming
 
Socket programming
Socket programmingSocket programming
Socket programming
 
Programming TCP/IP with Sockets
Programming TCP/IP with SocketsProgramming TCP/IP with Sockets
Programming TCP/IP with Sockets
 
Chap 02 osi model
Chap 02 osi modelChap 02 osi model
Chap 02 osi model
 
Np unit iv ii
Np unit iv iiNp unit iv ii
Np unit iv ii
 
Sockets
SocketsSockets
Sockets
 
Chap 06 delivery and routing of ip packets
Chap 06 delivery and routing of ip packetsChap 06 delivery and routing of ip packets
Chap 06 delivery and routing of ip packets
 
Chap 12 tcp
Chap 12 tcpChap 12 tcp
Chap 12 tcp
 
Socket programming
Socket programmingSocket programming
Socket programming
 
Chap 05 ip addresses classfless
Chap 05 ip addresses classflessChap 05 ip addresses classfless
Chap 05 ip addresses classfless
 
Np unit1
Np unit1Np unit1
Np unit1
 
Socket programming in C
Socket programming in CSocket programming in C
Socket programming in C
 
Ports & sockets
Ports  & sockets Ports  & sockets
Ports & sockets
 
Client server examples for tcp abnormal conditions
Client server examples for tcp abnormal conditionsClient server examples for tcp abnormal conditions
Client server examples for tcp abnormal conditions
 
Arp and rarp
Arp and rarpArp and rarp
Arp and rarp
 
Meeting 7 : host configuration: dhcp
Meeting 7 : host configuration: dhcpMeeting 7 : host configuration: dhcp
Meeting 7 : host configuration: dhcp
 
Socket programming using C
Socket programming using CSocket programming using C
Socket programming using C
 

Viewers also liked

Speech coding std
Speech coding stdSpeech coding std
Speech coding std
Swapnil Sonawane
 
Bluetooth Summer Gift Guide
Bluetooth Summer Gift GuideBluetooth Summer Gift Guide
Bluetooth Summer Gift Guide
Sean O'Sullivan
 
Bluetooth wireless technology basics
Bluetooth wireless technology basicsBluetooth wireless technology basics
Bluetooth wireless technology basics
Kumar
 
WCDMA
WCDMAWCDMA
Bluetooth Wireless Technology
Bluetooth Wireless TechnologyBluetooth Wireless Technology
Bluetooth Wireless Technology
Aman Kumar Dutt
 
Code Division Multiple Access
Code Division Multiple AccessCode Division Multiple Access
Code Division Multiple Access
Vishal Pawar
 
W cdma
W cdmaW cdma
Wcdma channels
Wcdma channelsWcdma channels
Wcdma channels
Terra Sacrifice
 
Basics of speech coding
Basics of speech codingBasics of speech coding
Basics of speech coding
sakshij91
 
Presentation on fhss
Presentation on fhssPresentation on fhss
Presentation on fhss
tanu_jaswal
 
EQUALIZATION
EQUALIZATIONEQUALIZATION
Equalization
EqualizationEqualization
Equalization
@zenafaris91
 
Spread spectrum modulation
Spread spectrum modulationSpread spectrum modulation
Spread spectrum modulation
METHODIST COLLEGE OF ENGG & TECH
 
Frequency hopping spread spectrum
Frequency hopping spread spectrumFrequency hopping spread spectrum
Frequency hopping spread spectrum
Harshit Gupta
 
3 handoff management
3 handoff management3 handoff management
3 handoff management
వం శీ
 
ALOHA Protocol (in detail)
ALOHA Protocol (in detail)ALOHA Protocol (in detail)
ALOHA Protocol (in detail)
Hinal Lunagariya
 
OFDM
OFDMOFDM
Handoff management
Handoff managementHandoff management
Handoff management
Mounika Uade
 
WLAN - IEEE 802.11
WLAN - IEEE 802.11WLAN - IEEE 802.11
WLAN - IEEE 802.11
Rahul Hada
 
Aloha
AlohaAloha
Aloha
mangal das
 

Viewers also liked (20)

Speech coding std
Speech coding stdSpeech coding std
Speech coding std
 
Bluetooth Summer Gift Guide
Bluetooth Summer Gift GuideBluetooth Summer Gift Guide
Bluetooth Summer Gift Guide
 
Bluetooth wireless technology basics
Bluetooth wireless technology basicsBluetooth wireless technology basics
Bluetooth wireless technology basics
 
WCDMA
WCDMAWCDMA
WCDMA
 
Bluetooth Wireless Technology
Bluetooth Wireless TechnologyBluetooth Wireless Technology
Bluetooth Wireless Technology
 
Code Division Multiple Access
Code Division Multiple AccessCode Division Multiple Access
Code Division Multiple Access
 
W cdma
W cdmaW cdma
W cdma
 
Wcdma channels
Wcdma channelsWcdma channels
Wcdma channels
 
Basics of speech coding
Basics of speech codingBasics of speech coding
Basics of speech coding
 
Presentation on fhss
Presentation on fhssPresentation on fhss
Presentation on fhss
 
EQUALIZATION
EQUALIZATIONEQUALIZATION
EQUALIZATION
 
Equalization
EqualizationEqualization
Equalization
 
Spread spectrum modulation
Spread spectrum modulationSpread spectrum modulation
Spread spectrum modulation
 
Frequency hopping spread spectrum
Frequency hopping spread spectrumFrequency hopping spread spectrum
Frequency hopping spread spectrum
 
3 handoff management
3 handoff management3 handoff management
3 handoff management
 
ALOHA Protocol (in detail)
ALOHA Protocol (in detail)ALOHA Protocol (in detail)
ALOHA Protocol (in detail)
 
OFDM
OFDMOFDM
OFDM
 
Handoff management
Handoff managementHandoff management
Handoff management
 
WLAN - IEEE 802.11
WLAN - IEEE 802.11WLAN - IEEE 802.11
WLAN - IEEE 802.11
 
Aloha
AlohaAloha
Aloha
 

Similar to Lect16

Medium Access PROTOCOL b yENGR. FAWAD KHAN UET BANNU KP PAKISTAN
Medium Access PROTOCOL b yENGR.  FAWAD KHAN UET BANNU KP PAKISTANMedium Access PROTOCOL b yENGR.  FAWAD KHAN UET BANNU KP PAKISTAN
Medium Access PROTOCOL b yENGR. FAWAD KHAN UET BANNU KP PAKISTAN
irfan sami
 
Lecture 6
Lecture 6Lecture 6
Lecture 6
Joe Christensen
 
Mac
MacMac
Carrier Sense Multiple Access With Collision Detection (CSMA/CD) Details : Me...
Carrier Sense Multiple Access With Collision Detection (CSMA/CD) Details : Me...Carrier Sense Multiple Access With Collision Detection (CSMA/CD) Details : Me...
Carrier Sense Multiple Access With Collision Detection (CSMA/CD) Details : Me...
Soumen Santra
 
MACPresentation based on medium access control mechanism
MACPresentation based on medium access control mechanismMACPresentation based on medium access control mechanism
MACPresentation based on medium access control mechanism
supriyaharlapur1
 
16 high speedla-ns
16 high speedla-ns16 high speedla-ns
16 high speedla-ns
Mayur Garg
 
16 high speedla-ns
16 high speedla-ns16 high speedla-ns
16 high speedla-ns
Mayur Garg
 
Jaimin chp-4 - media access sub-layer- 2011 batch
Jaimin   chp-4 - media access sub-layer- 2011 batchJaimin   chp-4 - media access sub-layer- 2011 batch
Jaimin chp-4 - media access sub-layer- 2011 batch
Jaimin Jani
 
Media Access Control (MAC Layer)
Media Access Control (MAC Layer)Media Access Control (MAC Layer)
Media Access Control (MAC Layer)
Meenakshi Paul
 
MultipleAccess.ppt
MultipleAccess.pptMultipleAccess.ppt
MultipleAccess.ppt
Jayaprasanna4
 
MAC
MACMAC
Lecture 10
Lecture 10Lecture 10
Lecture 10
Anwal Mirza
 
Direct Link Lan
Direct Link LanDirect Link Lan
Direct Link Lan
yanhul
 
Multiple access protocol
Multiple access protocolMultiple access protocol
Multiple access protocol
Merlin Florrence
 
wireless.ppt
wireless.pptwireless.ppt
wireless.ppt
SandipPradhan23
 
10 high speedla-ns
10 high speedla-ns10 high speedla-ns
10 high speedla-ns
Hattori Sidek
 
Ch5 data layer network
Ch5 data layer networkCh5 data layer network
Ch5 data layer network
cairo university
 
multipleaccessprotocol-140213082552-phpapp02.pdf
multipleaccessprotocol-140213082552-phpapp02.pdfmultipleaccessprotocol-140213082552-phpapp02.pdf
multipleaccessprotocol-140213082552-phpapp02.pdf
GauravWankar2
 
link layer
link layerlink layer
link layer
GS Kosta
 
Multipleaccessprotocol 140213082552-phpapp02
Multipleaccessprotocol 140213082552-phpapp02Multipleaccessprotocol 140213082552-phpapp02
Multipleaccessprotocol 140213082552-phpapp02
arifur rahman
 

Similar to Lect16 (20)

Medium Access PROTOCOL b yENGR. FAWAD KHAN UET BANNU KP PAKISTAN
Medium Access PROTOCOL b yENGR.  FAWAD KHAN UET BANNU KP PAKISTANMedium Access PROTOCOL b yENGR.  FAWAD KHAN UET BANNU KP PAKISTAN
Medium Access PROTOCOL b yENGR. FAWAD KHAN UET BANNU KP PAKISTAN
 
Lecture 6
Lecture 6Lecture 6
Lecture 6
 
Mac
MacMac
Mac
 
Carrier Sense Multiple Access With Collision Detection (CSMA/CD) Details : Me...
Carrier Sense Multiple Access With Collision Detection (CSMA/CD) Details : Me...Carrier Sense Multiple Access With Collision Detection (CSMA/CD) Details : Me...
Carrier Sense Multiple Access With Collision Detection (CSMA/CD) Details : Me...
 
MACPresentation based on medium access control mechanism
MACPresentation based on medium access control mechanismMACPresentation based on medium access control mechanism
MACPresentation based on medium access control mechanism
 
16 high speedla-ns
16 high speedla-ns16 high speedla-ns
16 high speedla-ns
 
16 high speedla-ns
16 high speedla-ns16 high speedla-ns
16 high speedla-ns
 
Jaimin chp-4 - media access sub-layer- 2011 batch
Jaimin   chp-4 - media access sub-layer- 2011 batchJaimin   chp-4 - media access sub-layer- 2011 batch
Jaimin chp-4 - media access sub-layer- 2011 batch
 
Media Access Control (MAC Layer)
Media Access Control (MAC Layer)Media Access Control (MAC Layer)
Media Access Control (MAC Layer)
 
MultipleAccess.ppt
MultipleAccess.pptMultipleAccess.ppt
MultipleAccess.ppt
 
MAC
MACMAC
MAC
 
Lecture 10
Lecture 10Lecture 10
Lecture 10
 
Direct Link Lan
Direct Link LanDirect Link Lan
Direct Link Lan
 
Multiple access protocol
Multiple access protocolMultiple access protocol
Multiple access protocol
 
wireless.ppt
wireless.pptwireless.ppt
wireless.ppt
 
10 high speedla-ns
10 high speedla-ns10 high speedla-ns
10 high speedla-ns
 
Ch5 data layer network
Ch5 data layer networkCh5 data layer network
Ch5 data layer network
 
multipleaccessprotocol-140213082552-phpapp02.pdf
multipleaccessprotocol-140213082552-phpapp02.pdfmultipleaccessprotocol-140213082552-phpapp02.pdf
multipleaccessprotocol-140213082552-phpapp02.pdf
 
link layer
link layerlink layer
link layer
 
Multipleaccessprotocol 140213082552-phpapp02
Multipleaccessprotocol 140213082552-phpapp02Multipleaccessprotocol 140213082552-phpapp02
Multipleaccessprotocol 140213082552-phpapp02
 

Recently uploaded

办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理
办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理
办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理
uehowe
 
一比一原版(USYD毕业证)悉尼大学毕业证如何办理
一比一原版(USYD毕业证)悉尼大学毕业证如何办理一比一原版(USYD毕业证)悉尼大学毕业证如何办理
一比一原版(USYD毕业证)悉尼大学毕业证如何办理
k4ncd0z
 
怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样
怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样
怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样
rtunex8r
 
HijackLoader Evolution: Interactive Process Hollowing
HijackLoader Evolution: Interactive Process HollowingHijackLoader Evolution: Interactive Process Hollowing
HijackLoader Evolution: Interactive Process Hollowing
Donato Onofri
 
存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理
存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理
存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理
fovkoyb
 
[HUN][hackersuli] Red Teaming alapok 2024
[HUN][hackersuli] Red Teaming alapok 2024[HUN][hackersuli] Red Teaming alapok 2024
[HUN][hackersuli] Red Teaming alapok 2024
hackersuli
 
Ready to Unlock the Power of Blockchain!
Ready to Unlock the Power of Blockchain!Ready to Unlock the Power of Blockchain!
Ready to Unlock the Power of Blockchain!
Toptal Tech
 
快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
3a0sd7z3
 
留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理
留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理
留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理
uehowe
 
manuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaal
manuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaalmanuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaal
manuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaal
wolfsoftcompanyco
 
成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理
成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理
成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理
ysasp1
 
办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理
办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理
办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理
uehowe
 
不能毕业如何获得(USYD毕业证)悉尼大学毕业证成绩单一比一原版制作
不能毕业如何获得(USYD毕业证)悉尼大学毕业证成绩单一比一原版制作不能毕业如何获得(USYD毕业证)悉尼大学毕业证成绩单一比一原版制作
不能毕业如何获得(USYD毕业证)悉尼大学毕业证成绩单一比一原版制作
bseovas
 
Should Repositories Participate in the Fediverse?
Should Repositories Participate in the Fediverse?Should Repositories Participate in the Fediverse?
Should Repositories Participate in the Fediverse?
Paul Walk
 
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
xjq03c34
 
Discover the benefits of outsourcing SEO to India
Discover the benefits of outsourcing SEO to IndiaDiscover the benefits of outsourcing SEO to India
Discover the benefits of outsourcing SEO to India
davidjhones387
 
Design Thinking NETFLIX using all techniques.pptx
Design Thinking NETFLIX using all techniques.pptxDesign Thinking NETFLIX using all techniques.pptx
Design Thinking NETFLIX using all techniques.pptx
saathvikreddy2003
 
快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样
快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样
快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样
3a0sd7z3
 
Gen Z and the marketplaces - let's translate their needs
Gen Z and the marketplaces - let's translate their needsGen Z and the marketplaces - let's translate their needs
Gen Z and the marketplaces - let's translate their needs
Laura Szabó
 

Recently uploaded (19)

办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理
办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理
办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理
 
一比一原版(USYD毕业证)悉尼大学毕业证如何办理
一比一原版(USYD毕业证)悉尼大学毕业证如何办理一比一原版(USYD毕业证)悉尼大学毕业证如何办理
一比一原版(USYD毕业证)悉尼大学毕业证如何办理
 
怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样
怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样
怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样
 
HijackLoader Evolution: Interactive Process Hollowing
HijackLoader Evolution: Interactive Process HollowingHijackLoader Evolution: Interactive Process Hollowing
HijackLoader Evolution: Interactive Process Hollowing
 
存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理
存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理
存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理
 
[HUN][hackersuli] Red Teaming alapok 2024
[HUN][hackersuli] Red Teaming alapok 2024[HUN][hackersuli] Red Teaming alapok 2024
[HUN][hackersuli] Red Teaming alapok 2024
 
Ready to Unlock the Power of Blockchain!
Ready to Unlock the Power of Blockchain!Ready to Unlock the Power of Blockchain!
Ready to Unlock the Power of Blockchain!
 
快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
 
留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理
留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理
留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理
 
manuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaal
manuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaalmanuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaal
manuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaal
 
成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理
成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理
成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理
 
办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理
办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理
办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理
 
不能毕业如何获得(USYD毕业证)悉尼大学毕业证成绩单一比一原版制作
不能毕业如何获得(USYD毕业证)悉尼大学毕业证成绩单一比一原版制作不能毕业如何获得(USYD毕业证)悉尼大学毕业证成绩单一比一原版制作
不能毕业如何获得(USYD毕业证)悉尼大学毕业证成绩单一比一原版制作
 
Should Repositories Participate in the Fediverse?
Should Repositories Participate in the Fediverse?Should Repositories Participate in the Fediverse?
Should Repositories Participate in the Fediverse?
 
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
 
Discover the benefits of outsourcing SEO to India
Discover the benefits of outsourcing SEO to IndiaDiscover the benefits of outsourcing SEO to India
Discover the benefits of outsourcing SEO to India
 
Design Thinking NETFLIX using all techniques.pptx
Design Thinking NETFLIX using all techniques.pptxDesign Thinking NETFLIX using all techniques.pptx
Design Thinking NETFLIX using all techniques.pptx
 
快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样
快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样
快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样
 
Gen Z and the marketplaces - let's translate their needs
Gen Z and the marketplaces - let's translate their needsGen Z and the marketplaces - let's translate their needs
Gen Z and the marketplaces - let's translate their needs
 

Lect16

  • 1. Lecture 16 -1 Random Access protocols A node transmits at random at full channel data rate R. If two or more nodes “collide”, they retransmit at random times The random access MAC protocol specifies how to detect collisions and how to recover from them (via delayed retransmissions, for example) Examples of random access MAC protocols SLOTTED ALOHA ALOHA CSMA and CSMA/CD
  • 2. Lecture 16 -2 Slotted Aloha Time is divided into equal size slots (= sending one frame) a newly arriving station transmits at the beginning of the next slot if collision occurs (assume channel feedback, eg the receiver informs the source of a collision), the source retransmits the packet at each slot with probability P, until successful. Success (S), Collision (C), Empty (E) slots Fully decentralized
  • 3. Lecture 16 -3 Slotted Aloha efficiency If N stations always have frames to send, and each transmits in each slot with probability P, the probability of successful transmission S is: S = Prob (only one transmits) = N P (1-P)^(N-1) Optimal value of P: P = 1/N For example, if N=2, S= .5 For N very large one finds S= 1/e (approximately, .37)
  • 4. Lecture 16 -4 Pure (unslotted) ALOHA Slotted ALOHA requires slot synchronization A simpler version, pure ALOHA, does not require slots A node transmits without awaiting for the beginning of a slot Collision probability increases (packet can collide with other packets which are transmitted within a window twice as large as in S-Aloha) Throughput is reduced by one half, S= 1/2e
  • 5. Lecture 16 -5 CSMA (Carrier Sense Multiple Access) CSMA: listen before transmit. If channel is sensed busy, defer transmission Persistent CSMA: retry immediately when channel becomes idle (this may cause instability) Non persistent CSMA: retry after random interval of time Note: collisions may still exist, since two stations may sense the channel idle at the same time ( or better, within a “vulnerable” window = round trip delay) In case of collision, the entire pkt transmission time is wasted
  • 6. Lecture 16 -6 CSMA collisions
  • 7. Lecture 16 -7 CSMA/CD (Collision Detection) CSMA/CD: like in CSMA collisions are detected within a few bit times Transmission is then aborted, reducing the channel wastage considerably persistent retransmission is implemented Collision detection is easy in wired LANs: can measure signal strength on the line Collision detection cannot be done in wireless LANs : CSMA/CD can approach channel utilization =1 in LANs: low ratio of propagation over frame transmission time
  • 8. Lecture 16 -8 CSMA/CD collision detection
  • 9. Lecture 16 -9 “Taking Turns” MAC protocols Recall the first 2 types of MAC Protocols: channel partitioning MAC protocols :TDM, FDM and CDMA + can share channel fairly - a single station cannot use it all Random access MAC protocols + a single station can use full channel rate - cannot share the channel fairly Third type of MAC protocol is Taking Turns protocol: Taking Turns MAC protocols: Achieve both fair and full rate with some extra control overhead (a) Polling: Master “invites” slaves - Request/Clear overhead, latency, single point of failure (b) Token passing: token is passed from one node to the next + Reduce latency, improve fault tolerance - elaborate procedures to recover from lost token
  • 10. Lecture 16 -10 LAN technologies MAC protocols used in LANs, to control access to the channel Token Rings: IEEE 802.5 (IBM token ring), for computer room, or Department connectivity, up to 16Mbps; FDDI (Fiber Distributed Data Interface), for Campus and Metro connectivity, up to 200 stations, at 100Mbps. Ethernets: employ the CSMA/CD protocol; 10Mbps (IEEE 802.3), Fast E-net (100Mbps), Giga E-net (1,000 Mbps); by far the most popular LAN technology
  • 11. Lecture 16 -11 LAN Addresses and ARP IP address: drives the packet to destination network LAN (or MAC or Physical) address: drives the packet to the destination node’s LAN interface card on the local LAN 48 bit MAC address (for most LANs); burned in the adapter ROM (alias Ethernet address, alias physical address)
  • 12. Lecture 16 -12 LAN Address (cont) MAC address allocation administered by IEEE A manufacturer buys a portion of the address space to assure uniqueness Analogy: (a) MAC address: like Social Security Number (b) IP address: like postal address MAC flat address => portability IP hierarchical address NOT portable (need mobile IP) Broadcast LAN address: 1111………….1111 (FF-FF-FF-FF-FF-FF)
  • 13. Lecture 16 -13 ARP: Address Resolution Protocol Each IP node (Host, Router) on the LAN has ARP module and Table ARP Table: IP/MAC address mappings for some LAN nodes < IP address; MAC address; TTL> < ………………………….. > TTL (Time To Live): timer, typically 20 min
  • 14. Lecture 16 -14 ARP (cont) Host A wants to send packet to destination IP addr XYZ on same LAN Source Host first checks own ARP Table for IP addr XYZ If XYZ not in the ARP Table, ARP module broadcasts ARP pkt: < XYZ, MAC (?) > ALL nodes on the LAN accept and inspect the ARP pkt Node XYZ responds with unicast ARP pkt carrying own MAC addr: < XYZ, MAC (XYZ) > MAC address cached in ARP Table
  • 15. Lecture 16 -15 Routing pkt to another LAN Say, route packet from source IP addr <111.111.111.111> to destination addr <222.222.222.222> In routing table at source Host, find router 111.111.111.110 In ARP table at source, find MAC address E6-E9-00-17-BB-4B, etc