Multiple Access (1) Required reading: Garcia 6.1, 6.2.1, CSE 3213, Fall 2010 Instructor: N. Vlajic

Similar documents
Chapter 6 Medium Access Control Protocols and Local Area Networks

Random Access. 1. Aloha. 2. Slotted Aloha 3. CSMA 4. CSMA/CD

Packet multiple access and the Aloha protocol

LANs. Local Area Networks. via the Media Access Control (MAC) SubLayer. Networks: Local Area Networks

Chapter 1 Basic concepts of wireless data networks (cont d)

ECE 4450:427/527 - Computer Networks Spring 2017

Multiple Access Communications. EEE 538, WEEK 11 Dr. Nail Akar Bilkent University Electrical and Electronics Engineering Department

COMP/ELEC 429/556 Introduction to Computer Networks

1-1. Switching Networks (Fall 2010) EE 586 Communication and. November 8, Lecture 30

CS 43: Computer Networks Media Access. Kevin Webb Swarthmore College November 30, 2017

CS 43: Computer Networks. 27: Media Access Contd. December 3, 2018

Power Laws in ALOHA Systems

Lecture 6. Data Link Layer (cont d) Data Link Layer 1-1

Chapter 6 Medium Access Control Protocols and Local Area Networks

Computer Network Fundamentals Spring Week 3 MAC Layer Andreas Terzis

EP2210 FEP3210 Performance analysis of Communication networks. Topic 2 Medium access control (or multiple access protocols)

The Link Layer and LANs. Chapter 6: Link layer and LANs

CS 716: Introduction to communication networks. - 9 th class; 19 th Aug Instructor: Sridhar Iyer IIT Bombay

CHAPTER 7 MAC LAYER PROTOCOLS. Dr. Bhargavi Goswami Associate Professor & Head Department of Computer Science Garden City College

LANs Local Area Networks LANs provide an efficient network solution : To support a large number of stations Over moderately high speed

Physical Layer. Medium Access Links and Protocols. Point-to-Point protocols. Modems: Signaling. Modems Signaling. Srinidhi Varadarajan

Where Are We? Basics: Network Classification Network Architecture Reliable Data Transfer Delay Models Implementation: Protocol Design

Markov Chains and Multiaccess Protocols: An. Introduction

Data Link Layer: Collisions

Aloha and slotted aloha

Wireless Communications

Redes de Computadores. Medium Access Control

Wireless Medium Access Control Protocols

Lecture 4: Wireless MAC Overview. Hung-Yu Wei National Taiwan University

Goals. Fundamentals of Network Media. More topics. Topics. Multiple access communication. Multiple access solutions

Multiple Access. Data Communications and Networking

Lecture 19. Principles behind data link layer services Framing Multiple access protocols

Link Layer and LANs 안상현서울시립대학교컴퓨터 통계학과.

EITF25 Internet Techniques and Applications L4: Network Access. Stefan Höst

Multiple Access Links and Protocols

ECEN 5032 Data Networks Medium Access Control Sublayer

TSIN01 Information Networks Lecture 3

Multiple-access protocols

Multiple Access Protocols

Outline. Introduction to Networked Embedded Systems - Embedded systems Networked embedded systems Embedded Internet - Network properties

Topics. Link Layer Services (more) Link Layer Services LECTURE 5 MULTIPLE ACCESS AND LOCAL AREA NETWORKS. flow control: error detection:

Data Link Layer: Overview, operations

CMPE 150/L : Introduction to Computer Networks. Chen Qian Computer Engineering UCSC Baskin Engineering Lecture 16

Wireless Sensor Networks 7th Lecture

Chapter 5: Link layer

COMPUTER NETWORKS - Local area networks

Local area networks. Copyright

Data Link Layer: Multi Access Protocols

COMMUNICATION NETWORKS NETW 501

CS 455/555 Intro to Networks and Communications. Link Layer

The Medium Access Control Scheme (MAC Layer) Reference: Andrew S. Tanenbaum, Computer Networks, 3rd Edition, Prentice Hall, 1996.

Chapter 12 Multiple Access 12.1

ICE 1332/0715 Mobile Computing (Summer, 2008)

Multimedia Communication Services Traffic Modeling and Streaming

MULTIPLE ACCESS PROTOCOLS 2. 1

Chapter 5 Link Layer and LANs

CSC 4900 Computer Networks: The Link Layer

Problem Set Name the 7 OSI layers and give the corresponding functionalities for each layer.

Mobile Communications Chapter 3 : Media Access

Chapter 4. The Medium Access Control Sublayer. Points and Questions to Consider. Multiple Access Protocols. The Channel Allocation Problem.

CSE 461: Multiple Access. Homework: Chapter 2, problems 1, 8, 12, 18, 23, 24, 35, 43, 46, and 58

Ethernet. Introduction. CSE 3213 Fall 2011

Local Area Networks (LANs) SMU CSE 5344 /

COS 140: Foundations of Computer Science

Data Link Layer -2- Network Access

Chapter 3 MEDIA ACCESS CONTROL

Random Assignment Protocols

COMPUTER NETWORK Model Test Paper

Lecture 8 The Data Link Layer part I. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it

Department of Electrical and Computer Systems Engineering

Chapter 6 Local Area Networks and Media Access Control. School of Info. Sci. & Eng. Shandong Univ.

Medium Access Control. MAC protocols: design goals, challenges, contention-based and contention-free protocols

Protocols for Multiaccess Networks

CPSC 441 Tutorial-19. Department of Computer Science University of Calgary

Multiple Access in Cellular and Systems

Computer Networks Medium Access Control. Mostafa Salehi Fall 2008

Reminder: Datalink Functions Computer Networking. Datalink Architectures

ETSN01 Exam Solutions

Data Link Layer -2- Network Access

Lecture 12 December 04, Wireless Access. Graduate course in Communications Engineering. University of Rome La Sapienza. Rome, Italy

CCM 4300 Lecture 5 Computer Networks, Wireless and Mobile Communications. Dr Shahedur Rahman. Room: T115

High Level View. EE 122: Ethernet and Random Access protocols. Medium Access Protocols

2. Modelling of telecommunication systems (part 1)

Link layer, LANs: outline. Chapter 5-1 Link Layer. Link layer: introduction. Link layer services

LECTURE PLAN. Script. Introduction about MAC Types o ALOHA o CSMA o CSMA/CD o CSMA/CA

Simulated SA Throughput vs. p

Multiple Access Channels

Intelligent Transportation Systems. Medium Access Control. Prof. Dr. Thomas Strang

Data Link Layer. Goals of This Lecture. Engineering Questions. Outline of the Class

ECSE-4670: Computer Communication Networks (CCN) Informal Quiz 3

Lecture 9: Bridging. CSE 123: Computer Networks Alex C. Snoeren

EE 122: Ethernet and

Department of Electrical Engineering and Computer Science MASSACHUSETTS INSTITUTE OF TECHNOLOGY Spring Quiz III

Data Link Layer Technologies

COS 140: Foundations of Computer Science

Lecture 5 The Data Link Layer. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it

Media Access Control in Ad Hoc Networks

Medium Access Control

Links. CS125 - mylinks 1 1/22/14

Chapter 4 Data Link Layer

Transcription:

1 Multiple Access (1) Required reading: Garcia 6.1, 6.2.1, 6.2.2 CSE 3213, Fall 2010 Instructor: N. Vlajic

Multiple Access Communications 2 Broadcast Networks aka multiple access networks multiple sending & receiving stations share the 1 M 2 3 Shared multiple access medium 4 5 same transmission medium advantages: 1) low cost infrastructure 2) all stations attached to the medium hear transmission from any other station routing not necessary disadvantages: access of multiple sending and receiving nodes to the shared medium must be coordinated 1) stations should not be transmitting simultaneously or interrupting each other 2) stations should not be able to monopolize the transmission/shared medium examples: LAN, cellular and satellite networks

Multiple Access Communications (cont.) 3 Approaches to Medium Sharing Medium Sharing Techniques Static Dynamic Medium Channelization Access Control Scheduling Random Access (1) Static Channelization static & collision free sharing partition medium into separate channels, which are then dedicated to particular users advantage: no collisions, perfect fairness each node gets a dedicated transmission rate R/N during each time interval (suitable for streaming data, e.g. voice streams) disadvantage: each user gets only a fraction of the full channel capacity, even when no other station is transmitting

Multiple Access Communications (cont.) 4 Example [ systems employing static channelization ] satellite = repeater uplink f 1 downlink f 2 uplink f3 downlink f 4 uplink f in downlink f out satellite network cellular network two frequency bands: one for uplink and one for downlink each station is allocated a channel in the uplink and in the downlink frequency band different approaches can be employed to create uplink/downlink channels (FDMA, TDMA, CDMA) although each station can theoretically transmit to and listen to any channel, stations remain within their pre-allocated channels to avoid interference

Multiple Access Communications (cont.) 5 (2) Dynamic Medium Access MAC Schemes the medium is shared on a per frame basis advantage: transmitting node transmits at the full rate of the channel (suitable for bursty data, e.g. short messages) disadvantage: simultaneous attempts by two or more stations to access the channel result in collision collision can be minimized through scheduling or random access control Ring Network Bus Network

Multiple Access Communications (cont.) 6 Medium Sharing Techniques Static Channelization FDMA TDMA Scheduling Dynamic Medium Access Control Reservation Polling Token Passing Random Access ALOHA CSMA continuous load heavier bursty load light bursty load

Random Access Techniques: ALOHA 7 ALOHA the earliest random-access method (1970s) still used in wireless cellular systems for its simplicity a station transmits whenever it has data to transmit, producing smallest possible delay receiver ACKs data if more than one frames are transmitted at the same time, they interfere with each other (collide) and are lost if ACK not received within timeout (2*propagation delay), the station picks random backoff time (to reduce likelihood of subseq. collisions) station retransmits frame after backoff time data ACK

Random Access Techniques: ALOHA (cont.) 8 Example [ Aloha throughput ] Station 1 1.1 1.2 Transmission Time (F) R 1.2' Station 2 2.1 2.2 Station 3 3.1 3.1' R Complete Collision Partial Collision Broadcast channel http://www.invocom.et.put.poznan.pl/~invocom/c/p1-4/p1-4_en/p1-4_3_7.htm#pureaapplet

Random Access Techniques: ALOHA (cont.) 9 Vulnerable Period assume frames of constant length (L) & transmission time (X=L/R) consider a frame with starting transmission time t o the frame will be successfully transmitted if no other frame collides with it any transmission that begins in interval [t 0, t 0 +X], or in the prior X seconds leads to collision vulnerable period = [ t 0 X, t 0 + X ] First transmission Backoff period B Retransmission if necessary t 0 -X t 0 t 0 +X t 0 +X+2t prop t 0 +X+2t prop +B t Vulnerable period Time-out What is the probability of no other transmission, i.e. no collision, in the vulnerable period?!

Random Access Techniques: ALOHA (cont.) 10 Throughput definitions and assumptions: S(S out ) throughput: average # of successful frame transmiss. per X sec (if network operates under stable conditions S out = S in, where S in - arrival rate of new frames to the system) G load average # of overall transmission attempts! per X sec P succ probability of a successful frame transmission S = P succ G How to find P succ? suppose a frame is ready for transmission at time t 0 frame will be transmitted successfully if no other frame attempts transmission X sec before and after t 0 random backoff spreads retransmissions so that frame transmission (arrivals) are equally likely at any instant in time Poisson process!!! stations new packets old packets S in G channel Collision? No, with P succ Yes, with (1-P succ ) S out t 0 -X 2X t 0 t 0 + X ready for transmission

Random Access Techniques: ALOHA (cont.) 11 if general, if frame arrivals are equally likely at any instant in time, and arrivals occur at an average rate of λ [arrivals per sec] Poisson process P[k arrivals in T seconds] = ( T) k! k λ λt e in our case, λ=g/x [arrivals per second] and T=2X, hence P[k transmissions in 2X seconds] = (2G) k! k e 2G accordingly, probability of successful transmission (no collision) is: P succ = P[0 transmissions in 2X seconds] = e 2G and throughput S = G P succ = G e 2G t 0 -X t 0 t 0 + X

Random Access Techniques: ALOHA (cont.) 12 S vs. G in Pure ALOHA NOTE: our analysis assumed that many nodes share a common channel & have comparable transmiss. rates (if only 1 node uses the medium, S=1) initially, as G increases S increases until it reaches S max after that point the network enters unstable operating conditions in which collisions become more likely and the number of backlogged stations increases (consequently, S in > S out ) max throughput of ALOHA (S max = 0.184) occurs at G=0.5, which corresponds to a total arrival rate of one frame per vulnerable period S max = 0.184 max ALOHA throughput = 18% of channel capacity S - throughput per frame time 0.2 0.18 0.16 0.14 0.12 0.1 0.08 0.06 0.04 0.02 0 stable operating area (S in ~S out ) unstable operating area (S in S ou ) 0 0.0078125 0.015625 0.03125 0.0625 0.125 0.25 0.5 1 2 G - attempts per frame time 4 18% of channel utilization, with Aloha, is not encouraging. But, with everyone transmitting at will we could hardly expected a 100% success rate.

Random Access Techniques: ALOHA (cont.) 13 Example [ Aloha ] a) What is the vulnerable period (in milliseconds) of a pure ALOHA broadcast system with R=50-kbps wireless channel, assuming 1000-byte frames. b) What is the maximum throughput S of such a channel (system), in kbps? a) (frame transmission time =) X = 1000 bytes / 50 kbps = 8000 bits / 50 kbps X = 160 milliseconds vulnerable period = 2*X = 320 milliseconds b) From theory, max throughput = 0.18 * R = 0.18 * 50 kbps = 9.179 kbps

Random Access Techniques: Slotted ALOHA 14 Slotted ALOHA improved ALOHA, with reduced probability of collision assumptions: time is divided into slots of size X=L/R (one frame time) nodes start to transmit only at the beginning of a slot nodes are synchronized so that each node knows when the slots begin operation: 1) when node has a fresh frame to send, it waits until next frame slot and transmits 3) if there is a collision, node retransmits the frame after a backoff-time (backoff-time = multiples of time-frames) http://www.invocom.et.put.poznan.pl/~invocom/c/p1-4/p1-4_en/p1-4_3_8.htm

Random Access Techniques: Slotted ALOHA (cont.) 15 Example [ Aloha vs. Slotted Aloha ] A B C D E Pure ALOHA tic tic tic tic tic tic tic tic tic tic tic tic tic A B C D E Slotted ALOHA

Random Access Techniques: Slotted ALOHA (cont.) 16 Vulnerable Period of Slotted ALOHA consider one arbitrary packet P that becomes ready for transmission at some time t during the time slot [k, k+1] packet P will be transmitted successfully if no other packet becomes available for transmission during the same time slot vulnerable period = [ t 0 X, t 0 ] P succ = P[0 arrivals in X seconds] = e G S = G P succ = G e G kx packet P (k+1)x Vulnerable period period in which packet P becomes ready for transmission Backoff period B t 0 +X+2t prop t 0 +X+2t prop + B Time-out t

Random Access Techniques: Slotted ALOHA (cont.) 17 S vs. G in Slotted ALOHA max throughput of Slotted ALOHA (S max = 0.36) occurs at G=1, which corresponds to a total arrival rate of one frame per vulnerable period S max = 0.36 max Slotted ALOHA throughput = 36% of actual channel capacity S Throughput (ALOHA) 0.5 0.4 0.3 0.2 0.1 ideal no collision Ideal (no collisions): R Slotted ALOHA: S=G*e -G Slotted ALOHA: Re -R Slotted ALOHA: S=G*e -2G Pure ALOHA: Re -2R 0 0 0.5 1 1.5 2 2.5 3 R G Slotted ALOHA vs. Pure ALOHA slotted ALOHA reduces vulnerability to collision, but also adds a waiting period for transmission if contention is low, it will prevent very few collisions, & delay many of the (few) packets that are sent

Random Access Techniques: Slotted ALOHA (cont.) 18 Example [ slotted Aloha ] Measurements of slotted ALOHA channel with an infinite number of users show that 10% of the slots are idle. a) What is the channel load, G? b) What is the throughput, S? c) Is the channel underloaded or overloaded? a) 10% of slots idle frame will be successfully transmitted if sent in those 10% of slots P succ = 0.1 According to theory, P succ = e -G G = -ln(p succ ) = - ln(0.1) = 2.3 b) According to theory, S = P succ *G = G*e -G as G=2.3 and e -G =0.1 S = 0.23 c) Whenever G>1, the channel is overloaded, so it is overloaded in this case.

Random Access Techniques: Slotted ALOHA (cont.) 19 Example [ slotted Aloha in cellular (GSM) systems ] http://www.tti.unipa.it/mat_bianchi/rm/04.pdf

Arrival: passengers arrive randomly and independently a Poisson process. Passenger arrivals are equally likely at any instant in time. average arrival rate = λ [passenger / sec] 20 average # of arrived passengers in T [sec]: average # of passengers in T [sec] = λt probability of having exactly k passengers in line after T [sec]: P[k arrivals in T seconds] = k λt) λt ( k! e Departure: passengers What is arrive the probability in batches that exactly NOT a 1 Poisson passenger process. arrives to the station, off the buss, in T sec? λ [passenger / sec]

21 P[k ( arrivals in T seconds] = T) k! k λ λt e T=1 k http://commons.wikimedia.org/wiki/file:poisson_distribution_pmf.png