Data Link
Data Link
Read about
• Internet checksum
• Cyclic Redundancy Check
Link Layer Multiple Access Protocols
two types of “links”:
• point-to-point
• PPP for dial-up access
• point-to-point link between Ethernet switch, host
• broadcast (shared wire or medium)
• Older Ethernet
• upstream Hybrid fiber-coaxial (HFC)
• 802.11 wireless LAN
Multiple Access Protocol
• Multiple access protocol:
• distributed algorithm that determines how nodes share channel, i.e.,
• determine when node can transmit
• communication about channel sharing must use channel itself!
• Ideal multiple access protocol:
For a multiple access channel of rate R bps
1. When one node wants to transmit, it can send at rate R.
2. When M nodes want to transmit, each can send at average rate
R/M.
3. Fully decentralized:
• no special node to coordinate transmissions
• no synchronized clocks
• fault-tolerant/robust
Types of Multiple access Protocols
• Three broad classes:
• Channel partitioning
• divide channel into smaller “pieces” (time slots, frequency, code)
• allocate piece to node for exclusive use
• Random access
• channel not divided, allow collisions
• “recover” from collisions
• Centrally controlled/coordinated
• tightly coordinate shared access to avoid collisions
Channel partitioning
• TDMA: Time Division Multiple Access
• access to channel in "rounds"
• each station gets fixed length slot (length = pkt trans time) in
each round
• unused slots go idle
• F/TDMA
• 2G cellular
network
CDMA
3G cellular
network
How good are channel portioning
protocols
• Broadcast channel of rate R bps
1. When all M nodes want to transmit each can send at average
rate R/M
2. When one node wants to transmit it can send at rate R/M.
Inefficient!
3. Decentralization/fault tolerance:
• no special node to coordinate transmissions
• synchronized clocks for all but FDMA
Random Access protocols
• When node has data to send
• transmit at full channel data rate R.
• no a priori coordination among nodes
• Two or more transmitting nodes -> “collision”,
• Random access protocol specifies:
• how to detect collisions
• how to recover from collisions (e.g., via delayed retransmissions)
• Examples of random access protocols:
• slotted ALOHA
• ALOHA
• CSMA, CSMA/CD
CSMA/CD
Used in ethernet
After
If a collision transmittin
If the is detected, g the
If the medium is transmit a jamming
medium busy, brief signal,
jamming wait a
is idle, continue to signal to random
transmit; listen until assure that amount of
otherwis the channel all stations time,
e, go to is idle, then know that referred to
step 2 transmit there has as the
been a backoff,
immediately collision and then
cease attempt to
transmission transmit
again
Ethernet
• dominant” for local-area networks:
• Developed at Xerox PARC in 1970s
• First widely used LAN technology
• Random access multiple access control