Multiple-access protocols

Similar documents
Data Link Layer: Collisions

CHAPTER 7 MAC LAYER PROTOCOLS. Dr. Bhargavi Goswami Associate Professor & Head Department of Computer Science Garden City College

Chapter 12 Multiple Access 12.1

CCM 4300 Lecture 5 Computer Networks, Wireless and Mobile Communications. Dr Shahedur Rahman. Room: T115

Chapter 6 Medium Access Control Protocols and Local Area Networks

Data Link Layer. Goals of This Lecture. Engineering Questions. Outline of the Class

Lecture 4: Wireless MAC Overview. Hung-Yu Wei National Taiwan University

EITF25 Internet Techniques and Applications L4: Network Access. Stefan Höst

ECE 4450:427/527 - Computer Networks Spring 2017

Topics. Link Layer Services (more) Link Layer Services LECTURE 5 MULTIPLE ACCESS AND LOCAL AREA NETWORKS. flow control: error detection:

Physical Layer. Medium Access Links and Protocols. Point-to-Point protocols. Modems: Signaling. Modems Signaling. Srinidhi Varadarajan

Multiple Access. Data Communications and Networking

Multiple Access (1) Required reading: Garcia 6.1, 6.2.1, CSE 3213, Fall 2010 Instructor: N. Vlajic

COS 140: Foundations of Computer Science

Data Link Layer -2- Network Access

ECSE-4670: Computer Communication Networks (CCN) Informal Quiz 3

Chapter 1 Basic concepts of wireless data networks (cont d)

Data Link Layer: Multi Access Protocols

Data Link Layer -2- Network Access

COMPUTER NETWORK Model Test Paper

MULTIPLE ACCESS PROTOCOLS 2. 1

Computer Network Fundamentals Spring Week 3 MAC Layer Andreas Terzis

Wireless Communications

Link Layer and LANs 안상현서울시립대학교컴퓨터 통계학과.

ECEN 5032 Data Networks Medium Access Control Sublayer

Chapter 6 Local Area Networks and Media Access Control. School of Info. Sci. & Eng. Shandong Univ.

COMPUTER NETWORKS UNIT 3

Aloha and slotted aloha

Data Link Layer Technologies

COS 140: Foundations of Computer Science

CS 43: Computer Networks Media Access. Kevin Webb Swarthmore College November 30, 2017

CS 4453 Computer Networks Winter

6.9 Summary. 11/20/2013 Wireless and Mobile Networks (SSL) 6-1. Characteristics of selected wireless link standards a, g point-to-point

CS 43: Computer Networks. 27: Media Access Contd. December 3, 2018

Packet multiple access and the Aloha protocol

Jaringan Komputer. Broadcast Network. Outline. MAC (Medium Access Control) Channel Allocation Problem. Dynamic Channel Allocation

Outline. Introduction to Networked Embedded Systems - Embedded systems Networked embedded systems Embedded Internet - Network properties

Redes de Computadores. Medium Access Control

CSE 461 Multiple Access. David Wetherall

Multiple Access Protocols

COMP476 Networked Computer Systems. Polling. Sharing the Wire. LAN Technologies. COMP476 Networked Computer Systems 1

MAC Sublayer(1) Principal service of the Medium Access Control Sublayer: Allocating a single broadcast channel (mostly a LAN) among competing users

G 364: Mobile and Wireless Networking. CLASS 2, Wed. Jan Stefano Basagni Spring 2004 M-W, 11:40am-1:20pm, 109 Rob

ECE453 Introduction to Computer Networks. Broadcast vs. PPP. Delay. Lecture 7 Multiple Access Control (I)

Random Assignment Protocols

Communication and Networks. Problems

CS 455/555 Intro to Networks and Communications. Link Layer

CS 716: Introduction to communication networks. - 9 th class; 19 th Aug Instructor: Sridhar Iyer IIT Bombay

SC250 Computer Networking I. Link Layer. Prof. Matthias Grossglauser LCA/I&C.

LANs. Local Area Networks. via the Media Access Control (MAC) SubLayer. Networks: Local Area Networks

Link layer, LANs: outline. Chapter 5-1 Link Layer. Link layer: introduction. Link layer services

CSC 4900 Computer Networks: The Link Layer

Chapter 4. The Medium Access Control Sublayer. Points and Questions to Consider. Multiple Access Protocols. The Channel Allocation Problem.

Mobile Communications Chapter 3 : Media Access

COMMUNICATION NETWORKS NETW 501

CS 716: Introduction to communication networks. - 8 th class; 17 th Aug Instructor: Sridhar Iyer IIT Bombay

Lecture 6. Data Link Layer (cont d) Data Link Layer 1-1

Medium Access Control. MAC protocols: design goals, challenges, contention-based and contention-free protocols

Chapter 6 Medium Access Control Protocols and Local Area Networks

The Link Layer and LANs. Chapter 6: Link layer and LANs

Chapter 5: Link layer

Multiple Access Links and Protocols

Data Communications. Automatic Repeat Request Medium Access Control

Medium Access Control

Computer Networks Medium Access Control. Mostafa Salehi Fall 2008

COMPUTER NETWORKS - Local area networks

Local area networks. Copyright

Strengthening Unlicensed Band Wireless Backhaul

Data Link Layer: Overview, operations

Lecture 8 Link Layer: functionality, error detection, media access algorithm

Physical Layer: Multiplexing, Spectrum Spreading and Switching. Covers Chapters# 06 & 08 from Text Book

Chapter 5 Link Layer and LANs

LECTURE PLAN. Script. Introduction about MAC Types o ALOHA o CSMA o CSMA/CD o CSMA/CA

Problem Set Name the 7 OSI layers and give the corresponding functionalities for each layer.

Shared Access Networks Wireless. 1/27/14 CS mywireless 1

The MAC layer in wireless networks

CSC 4900 Computer Networks: Wireless Networks

Protocols for Multiaccess Networks

1-1. Switching Networks (Fall 2010) EE 586 Communication and. November 8, Lecture 30

The Medium Access Control Scheme (MAC Layer) Reference: Andrew S. Tanenbaum, Computer Networks, 3rd Edition, Prentice Hall, 1996.

Chapter 5 Link Layer. Computer Networking: A Top Down Approach. 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012

Mobile Wireless Networking Medium Access Control

Wireless Sensor Networks 7th Lecture

CARRIER SENSE MULTIPLE ACCESS (CSMA):

EITF25 Internet- - Techniques and Applica8ons Stefan Höst. L5 Data link (part 2)

Media Access Control. Networked Systems (H) Lecture 5

MSIT 413: Wireless Technologies Week 8

Wireless LAN -Architecture

Lecture 19. Principles behind data link layer services Framing Multiple access protocols

CMPE 257: Wireless and Mobile Networking

Wireless Communication and Networking CMPT 371

Random Access. 1. Aloha. 2. Slotted Aloha 3. CSMA 4. CSMA/CD

Medium Access Control

Outline: Connecting Many Computers

CHAPTER TWO LITERATURE REVIEW

CC451 Computer Networks

Wireless Medium Access Control Protocols

Chapter 6 The Link Layer and LANs

A closer look at network structure:

Computer Networks. Medium Access Sublayer (Part I)

Transcription:

Multiple Access

Multiple-access protocols

Random Access MA CSMA CSMA/CD CSMA/CA

RANDOM ACCESS In a random access method, each station has the right to the medium without being controlled by any other station. However, if more than one station tries to send, there is an access conflict (collision) and the frames will be either destroyed or modified. To avoid access conflict or to resolve it when it happens, it is necessary a procedure that answers the following questions: When can the station access the medium? What can the station do if the medium is busy? How can the station determine the success or failure of the transmission? What can the station do if there is an access conflict?

Evolution of random-access methods

Aloha method Aloha, also called the Aloha method, refers to a simple communications scheme in which each source (transmitter) in a network sends data whenever there is a frame to send. This protocol was originally developed at the University of Hawaii for use with satellite communication systems in the Pacific. In a wireless broadcast system or a half-duplex two-way link, Aloha works perfectly. But as networks become more complex, trouble occurs because data frames collide (conflict). The heavier the communications volume, the worse the collision problems become. The result is degradation of system efficiency, because when two frames collide, the data contained in both frames is lost. To minimize the number of collisions, thereby optimizing network efficiency and increasing the number of subscribers that can use a given network, a scheme called slotted Aloha was developed. This system employs signals called beacons that are sent at precise intervals and tell each source when the channel is clear to send a frame.

ALOHA network Every station that need to send a frame to another station first sends it to the base station. The base station receives the frame and relays it to the intended destination. The base station acts as a HOP. The ALOHA protocol is based on the following rules: Multiple access: Any station sends a frame when it has a frame to send. Acknowledgement: After sending the frame, the station waits as ACK. If it does not receive an ACK during the allotted time ( 2x propagation time) it assumes that the frame is lost; it tries sending again after a random amount of time.

Procedure for ALOHA protocol

The Aloha Protocol simple: if you have Packet to send, "just do it" if Packet suffers collision, will try resending later

Analyzing the Aloha Protocol Goal: quantitative understanding of performance of Aloha protocol fixed length Packets Packet transmission time is unit of time throughput: S: number Packets successfully (without collision) transmitted per unit time in previous example, S = 0.2 Packet/unit time offered load: G: number Packet transmissions attempted per unit time note: S<G, but S depends on G Poisson model: probability of k Packet transmission attempts in t time units: Prob[k trans in t] = ((Gt)**k )(e**(-gt))/(k!) capacity of multiple access protocol: maximum value of S over all values of G

Analyzing Aloha (cont) focus on a given attempted packet transmission S = rate attempted Packet trans * prob[trans successful] = G*prob[no other Packet's overlap with attempted trans] = G*prob[0 other attempted trans in 2 time units] = Ge*(-2G)

Aloha throughput Note: maximum throughput is 18% of physical channel capacity you buy 1 Mb link, throughput will never be more than 180Kb!

Collision in CSMA

Persistence strategies

CSMA/CD procedure

CSMA/CA procedure After transmission of each frame, a transmitter must wait for a period of 9.6 microseconds (at 10 Mbps) to allow the signal to propagate through the receiver electronics at the destination. This period of time is known as the Inter-Frame Gap (IFG). While every transmitter must wait for this time between sending frames, receivers do not necessarily see a "silent" period of 9.6 microseconds. The way in which repeaters operate is such that they may reduce the IFG between the frames which they regenerate.

Control Access Reservation Polling Token Passing

Reservation access method

Select

Poll

Token-passing network

Token-passing procedure

Channelization FDMA TDMA CDMA

In frequency-division multiple access (FDMA), the bandwidth is divided into channels. Each station uses its allocated band to send its data. Each band is reserved for a specific station. The band belongs to the station all the time. FDMA is a data link layer protocol that use FDM at the physical layer. FDMA is used in cellular telephone and satellite networks

In time division multiple access (TDMA), the bandwidth is just one channel that is timeshared. The stations share the capacity of the channel in time. Each station is allocated a time slot which it can send data. TDMA is a data link protocol that uses TDM at physical layer. TDMA is used in the cellular telephone network

In CDMA- Code division multiple access, one channel carries all transmissions simultaneously. CDMA differs from FDMA because: One channel occupies the entire bandwidth of the link CDMA differs from FDMA because: All stations can send data simultaneously; there is no timesharing

Chip sequences CDMA is based on coding theory. Each station is assigned a code, which is a sequence of numbers called chips. The chip sequences are generated using Walsh table.

CDMA multiplexer 1. The multiplexer receives one encoded number from each station (-1,-1,0,+1) 2. The encoded number sent by station 1 is multiplied by each chip sequence A. (station 2 by chip sequence b, etc) 3. All first chips are added, as are all second, third, and four chips => one new sequence 4. The sequence is transmitted on through the link

CDMA demultiplexer 1. The multiplexer receives the sequence sent across the link 2. It multiplies the sequence by the code for each receiver. The multiplication is done chip by chip 3. The chips in each sequence are added. The result is always +,-4 or 0 4. The result is divided by 4 and decoded to 0, 1 or silence by receiver

Walsh table W1 and W2N for ortogonal sequences To generate orthogonal sequences is used Walsh Table A two dimensional table [n,n] Wn complement of Wn, where each +1 is changed in -1 and vice versa

Sequence generation

Properties of Orthogonal Sequences Orthogonal sequences have properties that are suitable for CDMA: If we multiply a sequence by -1, every element in the sequence is complemented. If we multiply two sequences, element by element and add the results, we get a number called the inner product. If the two sequences are the same, we get N (N is the number of sequences); if they are different, we get 0. (AxA=N AxB=0) The inner product of a sequence by its complement is N (Ax(-A)=-N)

Example Check to see if the second property about orthogonal codes holds for our CDMA example. Solution The inner product of each code by itself is N. This is shown for code C; you can prove for yourself that it holds true for the other codes. C. C = If two sequences are different, the inner product is 0. B. C =

Example Check to see if the third property about orthogonal codes holds for our CDMA example. Solution The inner product of each code by its complement is N. This is shown for code C; you can prove for yourself that it holds true for the other codes. C. ( C ) = The inner product of a code with the complement of another code is 0. B. ( C ) =