Multiple Access Communications. EEE 538, WEEK 11 Dr. Nail Akar Bilkent University Electrical and Electronics Engineering Department

Similar documents
Packet multiple access and the Aloha protocol

TSIN01 Information Networks Lecture 3

Power Laws in ALOHA Systems

Markov Chains and Multiaccess Protocols: An. Introduction

Multiple Access (1) Required reading: Garcia 6.1, 6.2.1, CSE 3213, Fall 2010 Instructor: N. Vlajic

Splitting Algorithms

TSIN01 Information Networks Lecture 8

Chapter 6 Medium Access Control Protocols and Local Area Networks

Where Are We? Basics: Network Classification Network Architecture Reliable Data Transfer Delay Models Implementation: Protocol Design

Protocols for Multiaccess Networks

Multiple Access Protocols

Link Layer and LANs 안상현서울시립대학교컴퓨터 통계학과.

ECE 4450:427/527 - Computer Networks Spring 2017

Multiple Access Links and Protocols

ECEN 5032 Data Networks Medium Access Control Sublayer

Slotted Aloha UHFHLYHU. Recall assumptions:

LANs. Local Area Networks. via the Media Access Control (MAC) SubLayer. Networks: Local Area Networks

EP2210 FEP3210 Performance analysis of Communication networks. Topic 2 Medium access control (or multiple access protocols)

Topics. Link Layer Services (more) Link Layer Services LECTURE 5 MULTIPLE ACCESS AND LOCAL AREA NETWORKS. flow control: error detection:

Random Access. 1. Aloha. 2. Slotted Aloha 3. CSMA 4. CSMA/CD

Computer Network Fundamentals Spring Week 3 MAC Layer Andreas Terzis

The Link Layer and LANs. Chapter 6: Link layer and LANs

Lecture 19. Principles behind data link layer services Framing Multiple access protocols

Performance Evaluation and Design Improvement of Media Access Control Protocols for Broadband Wireless Local Loop

Chapter 3 MEDIA ACCESS CONTROL

Simulated SA Throughput vs. p

Redes de Computadores. Medium Access Control

Aloha and slotted aloha

Written Exam in Information Networks TSIN01

ECE453 Introduction to Computer Networks. Broadcast vs. PPP. Delay. Lecture 7 Multiple Access Control (I)

CCM 4300 Lecture 5 Computer Networks, Wireless and Mobile Communications. Dr Shahedur Rahman. Room: T115

Chapter 1 Basic concepts of wireless data networks (cont d)

LANs Local Area Networks LANs provide an efficient network solution : To support a large number of stations Over moderately high speed

Performance Evaluation of Scheduling Mechanisms for Broadband Networks

Ethernet. Introduction. CSE 3213 Fall 2011

Wireless Medium Access Control Protocols

Physical Layer. Medium Access Links and Protocols. Point-to-Point protocols. Modems: Signaling. Modems Signaling. Srinidhi Varadarajan

CSC 4900 Computer Networks: The Link Layer

CS 455/555 Intro to Networks and Communications. Link Layer

COS 140: Foundations of Computer Science

CS 123: Lecture 12, LANs, and Ethernet. George Varghese. October 24, 2006

Data. Networks. Second Ed ition DIMITRI BERTSEKAS ROBERT GALLAGER. PRENTICE HALL, Englewood Cliffs, New Jersey 07632

COMMUNICATION NETWORKS NETW 501

Multimedia Communication Services Traffic Modeling and Streaming

Lecture 6. Data Link Layer (cont d) Data Link Layer 1-1

Random Assignment Protocols

The MAC layer in wireless networks

CS 43: Computer Networks Media Access. Kevin Webb Swarthmore College November 30, 2017

Chapter 5 Link Layer and LANs

CMPE 150/L : Introduction to Computer Networks. Chen Qian Computer Engineering UCSC Baskin Engineering Lecture 16

Intelligent Transportation Systems. Medium Access Control. Prof. Dr. Thomas Strang

Goals. Fundamentals of Network Media. More topics. Topics. Multiple access communication. Multiple access solutions

CS 43: Computer Networks. 27: Media Access Contd. December 3, 2018

COMP/ELEC 429/556 Introduction to Computer Networks

Outline. Introduction to Networked Embedded Systems - Embedded systems Networked embedded systems Embedded Internet - Network properties

Lecture 4: Wireless MAC Overview. Hung-Yu Wei National Taiwan University

CS 716: Introduction to communication networks. - 9 th class; 19 th Aug Instructor: Sridhar Iyer IIT Bombay

Com S 611 Spring Semester 2007 Discrete Algorithms for Mobile and Wireless Networks. Lecture 3: Tuesday, 23rd January 2007

Medium Access Control

CHAPTER 7 MAC LAYER PROTOCOLS. Dr. Bhargavi Goswami Associate Professor & Head Department of Computer Science Garden City College

1-1. Switching Networks (Fall 2010) EE 586 Communication and. November 8, Lecture 30

Introduction to CDMA ALOHA. 3. Access Control Techniques for CDMA ALOHA

Outline. Application examples

Medium Access Control. MAC protocols: design goals, challenges, contention-based and contention-free protocols

Computer Networks Medium Access Control. Mostafa Salehi Fall 2008

CSC 401 Data and Computer Communications Networks

Wireless Communications

Analyzing Multi-Channel Medium Access Control Schemes With ALOHA Reservation

Lecture 8 The Data Link Layer part I. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it

Computer Networks. Medium Access Sublayer (Part I)

The MAC layer in wireless networks

NMA Radio Networks Network Level: Medium Access Control Roberto Verdone

Data Link Layer: Multi Access Protocols

CSE 461: Wireless Networks

Chapter 6 Medium Access Control Protocols and Local Area Networks

CHAPTER 5 PROPAGATION DELAY

Wireless Sensor Networks 7th Lecture

Lecture 9: Bridging. CSE 123: Computer Networks Alex C. Snoeren

Lecture 12 December 04, Wireless Access. Graduate course in Communications Engineering. University of Rome La Sapienza. Rome, Italy

MULTIPLE ACCESS PROTOCOLS 2. 1

COS 140: Foundations of Computer Science

Access Technologies! Fabio Martignon

Random Access Suitable Protocols

Data Link Layer: Overview, operations

Chapter 5: Link layer

Data Link Layer. Goals of This Lecture. Engineering Questions. Outline of the Class

Multiple Access. Data Communications and Networking

Jaringan Komputer. Broadcast Network. Outline. MAC (Medium Access Control) Channel Allocation Problem. Dynamic Channel Allocation

COMPUTER NETWORKS - Local area networks

Local area networks. Copyright

Reminder: Datalink Functions Computer Networking. Datalink Architectures

Media Access Control in Ad Hoc Networks

Medium Access Control

College of Computer and Information Sciences Department of Computer Engineering CEN444 Computer Networks Midterm 2 Exam Second Semester 1434/1435

Local Area Networks (LANs) SMU CSE 5344 /

Chapter 5 Link Layer and LANs

Data Link Layer -2- Network Access

Data Link Layer Technologies

Lecture 6 The Data Link Layer. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it

2. Modelling of telecommunication systems (part 1)

Transcription:

Multiple Access Communications EEE 538, WEEK 11 Dr. Nail Akar Bilkent University Electrical and Electronics Engineering Department 1

Multiple Access Satellite systems, radio networks (WLAN), ethernet segment The received signal is the sum of attenuated transmitted signals from a set of other nodes, corrupted by distortion, delay and noise The multiaccess medium is allocated among the various nodes by the MAC (medium access control) sublayer We can view multiaccess communication in queueing terms: Each node has a queue of packets to be transmitted and the multiaccess channel is a common server. 2

In Queueing Terms Ideally, the server should view all the waiting packets as one combined queue to be served by an appropriate queueing discipline. Problem: The server doesn t know which nodes contain packets. Problem: The nodes are unaware of packets at other nodes. Knowledge about the state of the queue is distributed. 3

Approaches to multiple Access Fixed Assignment (TDMA, FDMA, CDMA) Each node is allocated a fixed fraction of bandwidth Equivalent to circuit switching Very inefficient for low duty factor traffic Contention systems Polling Reservations and Scheduling Random Access 4

Ex. Satellite Channel 5

Slotted Aloha Time is divided into slots of one packet duration E.g., fixed size packets When a node has a packet to send, it waits until the start of the next slot to send it Requires synchronization If no other nodes attempt transmission during that slot, the transmission is successful Otherwise collision Collided packet are retransmitted after a random 6

Slotted Aloha Model Slotted system: Same length of all packets, each packet needs one time unit (a slot) for transmission. All transmitters are synchronized, transmission starts at an integer time and ends before next integer time. Poisson arrivals: Packets arrive at each of the m transmitting nodes according to independent Poisson processes. Let λ be the overall arrival rate, and λ/m the arrival rate at each transmitting node. Collision or perfect reception: If two or mode nodes sends in a time slot there is a collision and the receiver obtains no information about the content or sources of the transmitted packages. If just one node sends the packet is correctly received. 7

Model Continued (0; 1; e) Immediate Feedback: At the end of each slot, each node obtains feedback specifying whether 0 packets (idle), 1 packet (successful transmission), or more that 1 packet (collision/error) were transmitted in that slot. Retransmission of collisions: Each packet involved in a collision will be retransmitted in some later slot, until successfully transmitted. A node with a packet that must be retransmitted is said to be backlogged 8

Model Continued One of the two following is assumed (a) No buffering: If one packet at a node is currently waiting for transmission or colliding with another packet during transmission, new arrivals at that node are discarded and never transmitted. (b) Infinite set of nodes (m = ): The system has an infinite set of nodes and each newly arriving packet arrives at a new node. 9

Slotted Aloha The Aloha network was developed around 1970 to provide radio communication between central computer and various data terminals at the campuses of University of Hawaii. The basic idea is an unbacklogged node transmits a newly arriving packet in the first slot after packet arrival, thus risking occasional collisions but achieving very small delay if collisions are rare. When a collision occurs each node sending one of the colliding packets discovers the collision at the end of the slot and becomes backlogged. Backlogged nodes wait for some random number of slots before retransmitting. 10

Preliminary Analysis Using infinite node assumption (b) New arrivals transmitted in a slot is a Poisson random variable with rate λ If retransmissions from backlogged nodes are sufficiently randomized, it is plausible to approximate the total number of retransmissions and new transmissions in a slot as a Poisson random variable with rate G > λ The probability that k nodes will transmit in a slot is then 11

Preliminary Analysis Continued 12

Preliminary Analysis Continued 13

Detailed Analysis 14

Detailed Analysis Continued 15

Detailed Analysis Continued 16

Detailed Analysis Continued 17

Detailed Analysis Continued 18

Detailed Analysis Cont. 19

Detailed analysis Cont. 20

Detailed Analysis Continued 21

Analysis 22

Infinite Node Assumption Undesirable stable point disappears If backlog increases beyond unstable point (bad luck) then it tends to increase without limit and the departure rate drops to 0 Instability of the slotted ALOHA 23

Stabilization of Slotted ALOHA Infinite Node 24

Cont. 25

Rivest s Pseudo-Bayesian Algorithm 26

Cont. 27

Motivation for the algorithm 28

Motivation for the algorithm 29

Motivation cont. 30

Motivation cont. 31

Motivation cont. 32

Approximate Delay Analysis 33

Approximate analysis Cont. 34

Approximate analysis Cont. 35

Approximate analysis Cont. 36

Approximate analysis Cont. 37

Approximate analysis Cont. 38

Approximate analysis Cont. 39

Approximate analysis Cont. 40

Approximate analysis Cont. 41

ALOHA vs TDM 42

Binary Exponential Backoff For packet radio networks and some other multiaccess situations the assumption of immediate (0,1,e) feedback is unrealistic In some systems a node only receives feedback about its own packets, no feedback in about slots in which it does not transmit This limited feedback is insufficient for the backlog estimation of pseudo-bayesian strategy An alternative stabilization strategy is binary exponential backoff used in Ethernet; If a packet has been transmitted unsuccessfully i times the transmission in successive slots is set to 43

Unslotted ALOHA 44

Unslotted ALOHA 45

Unslotted ALOHA 46

Unslotted ALOHA 47

Splitting 48

Tree Algorithms 49

Summary stabilized pure aloha T = 0.184 = (1/(2e)) stabilized slotted aloha T = 0.368 = (1/e) Basic tree algorithm T = 0.434 Best known variation on tree algorithm T = 0.4878 Upper bound on any collision resolution algorithm with (0,1,e)feedback T <= 0.568 TDM achieves throughputs up to 1 packet per slot, but the delay increases linearly with the number of users 50