Aloha and slotted aloha

Similar documents
Mobile Communications Chapter 3 : Media Access

Chapter 3 MEDIA ACCESS CONTROL

ICE 1332/0715 Mobile Computing (Summer, 2008)

Wireless Transmission and Mobility

Mobile Communications

Chapter 12 Multiple Access 12.1

CS 43: Computer Networks Media Access. Kevin Webb Swarthmore College November 30, 2017

CHAPTER 7 MAC LAYER PROTOCOLS. Dr. Bhargavi Goswami Associate Professor & Head Department of Computer Science Garden City College

Multiple Access Links and Protocols

CS 43: Computer Networks. 27: Media Access Contd. December 3, 2018

Computer Communication III

CMPE 257: Wireless and Mobile Networking

Medium Access Control. MAC protocols: design goals, challenges, contention-based and contention-free protocols

High Level View. EE 122: Ethernet and Random Access protocols. Medium Access Protocols

ECE453 Introduction to Computer Networks. Broadcast vs. PPP. Delay. Lecture 7 Multiple Access Control (I)

ECEN 5032 Data Networks Medium Access Control Sublayer

CMPE 257: Wireless and Mobile Networking

MAC LAYER. Murat Demirbas SUNY Buffalo

EE 122: Ethernet and

Lecture 12 December 04, Wireless Access. Graduate course in Communications Engineering. University of Rome La Sapienza. Rome, Italy

Lecture 4: Wireless MAC Overview. Hung-Yu Wei National Taiwan University

CSE 461: Multiple Access Networks. This Lecture

Multiple Access Technique. Media Access Control (Intro.) Outline. Multiple Access Technique. Designing Issues of MAC protocols. Protocols examples

Multiple Access Protocols

Intelligent Transportation Systems. Medium Access Control. Prof. Dr. Thomas Strang

COMP/ELEC 429/556 Introduction to Computer Networks

Chapter 6 Medium Access Control Protocols and Local Area Networks

Computer Network Fundamentals Spring Week 3 MAC Layer Andreas Terzis

COMMUNICATION NETWORKS NETW 501

CS 716: Introduction to communication networks. - 9 th class; 19 th Aug Instructor: Sridhar Iyer IIT Bombay

ECE 4450:427/527 - Computer Networks Spring 2017

The MAC layer in wireless networks

Unit 7 Media Access Control (MAC)

Wireless Medium Access Control Protocols

Chapter 1 Basic concepts of wireless data networks (cont d)

Mobile and Sensor Systems

Random Access. 1. Aloha. 2. Slotted Aloha 3. CSMA 4. CSMA/CD

LECTURE PLAN. Script. Introduction about MAC Types o ALOHA o CSMA o CSMA/CD o CSMA/CA

Data Communications. Data Link Layer Protocols Wireless LANs

Medium Access Control

Physical Layer. Medium Access Links and Protocols. Point-to-Point protocols. Modems: Signaling. Modems Signaling. Srinidhi Varadarajan

Packet multiple access and the Aloha protocol

Local Networks. Lecture 4 6-Apr-2016

The MAC layer in wireless networks

Data Communications. Automatic Repeat Request Medium Access Control

Chapter 4. The Medium Access Control Sublayer. Points and Questions to Consider. Multiple Access Protocols. The Channel Allocation Problem.

Lecture 6. Data Link Layer (cont d) Data Link Layer 1-1

CSE 461: Wireless Networks

LANs. Local Area Networks. via the Media Access Control (MAC) SubLayer. Networks: Local Area Networks

Multiple Access in Cellular and Systems

Logical Link Control (LLC) Medium Access Control (MAC)

Outline. Introduction to Networked Embedded Systems - Embedded systems Networked embedded systems Embedded Internet - Network properties

MULTIPLE ACCESS PROTOCOLS 2. 1

Multiple Access. Data Communications and Networking

Ethernet. Introduction. CSE 3213 Fall 2011

Wireless Communications

Media Access Control in Ad Hoc Networks

CSMA/CD (Collision Detection)

Multiple Access (1) Required reading: Garcia 6.1, 6.2.1, CSE 3213, Fall 2010 Instructor: N. Vlajic

College of Computer and Information Sciences Department of Computer Engineering CEN444 Computer Networks Midterm 2 Exam Second Semester 1434/1435

Random Assignment Protocols

Rahman 1. Application

Computer Networks. Today. Principles of datalink layer services Multiple access links Adresavimas, ARP LANs Wireless LANs VU MIF CS 1/48 2/48

Lecture 9: Bridging. CSE 123: Computer Networks Alex C. Snoeren

CSE 461 Multiple Access. David Wetherall

MAC protocols. Lecturer: Dmitri A. Moltchanov

Data Link Layer -2- Network Access

MAC in /20/06

1-1. Switching Networks (Fall 2010) EE 586 Communication and. November 8, Lecture 30

Wireless MACs: MACAW/802.11

Topics. Link Layer Services (more) Link Layer Services LECTURE 5 MULTIPLE ACCESS AND LOCAL AREA NETWORKS. flow control: error detection:

COS 140: Foundations of Computer Science

Link layer, LANs: outline. Chapter 5-1 Link Layer. Link layer: introduction. Link layer services

Medium Access Control Sublayer Chapter 4

Chapter 4. The Medium Access Control Sublayer

The Medium Access Control Scheme (MAC Layer) Reference: Andrew S. Tanenbaum, Computer Networks, 3rd Edition, Prentice Hall, 1996.

Medium Access Control. CSCI370 Lecture 5 Michael Hutt New York Institute of Technology

Data Link Layer -2- Network Access

MAC Sublayer(1) Principal service of the Medium Access Control Sublayer: Allocating a single broadcast channel (mostly a LAN) among competing users

Data and Computer Communications. Chapter 11 Local Area Network

CSE/EE 461 Wireless and Contention-Free Protocols

Strengthening Unlicensed Band Wireless Backhaul

Lecture 25: CSE 123: Computer Networks Alex C. Snoeren. HW4 due NOW

Link Layer and LANs 안상현서울시립대학교컴퓨터 통계학과.

Data Link Layer: Collisions

Redes de Computadores. Medium Access Control

MSIT 413: Wireless Technologies Week 8

ECE 4450:427/527 - Computer Networks Spring 2017

Media Access Control. Networked Systems (H) Lecture 5

Link Layer: Retransmissions

CSE 6811 Ashikur Rahman

COMPUTER NETWORKS - Local area networks

Local area networks. Copyright

Chapter 6 Wireless and Mobile Networks

Telecommunication Protocols Laboratory Course. Lecture 2

COS 140: Foundations of Computer Science

Problem Set Name the 7 OSI layers and give the corresponding functionalities for each layer.

Shared Access Networks Wireless. 1/27/14 CS mywireless 1

Chapter 6 Medium Access Control Protocols and Local Area Networks

Chapter 4 Data Link Layer

Transcription:

CSMA 2/13/06

Aloha and slotted aloha Slotted aloha: transmissions are synchronized and only start at the beginning of a time slot. Aloha sender A sender B collision sender C t Slotted Aloha collision sender A sender B sender C t

Aloha schemes Random schemes, simple. Good for initial call setup. Channel efficiency only 18% for Aloha, 36% for Slotted Aloha (assuming Poisson distribution for packet arrival and packet length) No delay guarantee. Combine Aloha with other schemes.

Improvement I: sense the carrier before access the medium

Evolution Aloha: invented in the 70s. Slotted Aloha: only transmit at the beginning of a time slot. CSMA: Carrier Sense Multiple Access, Start transmission only if no transmission is ongoing CSMA/CD: CD = Collision Detection. Stop ongoing transmission if a collision is detected (e.g. Ethernet).

CSMA Non-persistent CSMA: stations sense the carrier and start sending immediately if the medium is idle; otherwise wait for a random amount of time and retry. P-persistent CSMA: sense the carrier and if idle, only transmit with probability p; defer to the next slot with probability 1-p. 1-persistent CSMA: many stations listen and transmit at the same time which causes collisions.

Random backoff Non-persistent CSMA: stations sense the carrier and start sending immediately if the medium is idle; otherwise wait for a random amount of time (K) and retry. Exponential Backoff: 1st collision: choose K randomly from [0, T]. 2nd collision: choose K randomly from [0, 2T]. after next collision double K (and keep doubling on collisions until success.

Random backoff Probability of retransmission attempt (equivalently length of randomization interval) adapted to current load simple, load-adaptive, multiple access more collisions heavier Load (most likely), more nodes trying to send randomize retransmissions over longer time interval, to reduce collision probability

MAC in wireless networks Can we apply media access methods from fixed networks? Example CSMA/CD Carrier Sense Multiple Access with Collision Detection send as soon as the medium is free, listen into the medium if a collision occurs (original method in IEEE 802.3)

CDMA/CD in wireless networks Problems in wireless networks signal strength decreases proportional to the square of the distance the sender would apply CS and CD, but the collisions happen at the receiver it might be the case that a sender cannot hear the collision, i.e., CD does not work furthermore, CS might not work if, e.g., a terminal is hidden

Hidden terminals Hidden terminals A sends to B, C cannot receive A C wants to send to B, C senses a free medium (CS fails) collision at B, A cannot receive the collision (CD fails) A is hidden for C A B C

Exposed terminals Exposed terminals B sends to A, C wants to send to another terminal (not A or B) C has to wait, CS signals a medium in use but A is outside the radio range of C, therefore waiting is not necessary C is exposed to B A B C

The problem with CSMA/CD Carrier sense and collision detection are performed at the transmitter, not the receiver. But only collision at the receiver matters.

Near and far terminals Terminals A and B send, C receives signal strength decreases proportional to the square of the distance the signal of terminal B therefore drowns out A s signal C cannot receive A precise power control needed! A B C

MACA - collision avoidance MACA (Multiple Access with Collision Avoidance) uses short signaling packets for collision avoidance RTS (request to send): a sender request the right to send from a receiver with a short RTS packet before it sends a data packet CTS (clear to send): the receiver grants the right to send as soon as it is ready to receive Signaling packets contain sender address receiver address packet size

MACA: hidden terminals MACA avoids the problem of hidden terminals A and C want to send to B A sends RTS first C waits after receiving CTS from B RTS CTS CTS A B C

Does this fully solve the problem? RTS can still collide. Both A and C send RTS to B at the same time. But RTS is a small size packet so the chance of collision is much lower. RTS CTS CTS A B C

MACA: exposed terminals MACA avoids the problem of exposed terminals B wants to send to A, C to another terminal now C does not have to wait for it cannot receive CTS from A RTS RTS CTS A B C

MACA variant: DFWMAC in sender IEEE802.11 receiver idle idle RxBusy time-out NAK; RTS packet ready to send; RTS wait for the right to send CTS; data time-out; RTS data; ACK time-out data; NAK RTS; CTS wait for ACK wait for data ACK: positive acknowledgement NAK: negative acknowledgement RxBusy: receiver busy RTS; RxBusy

Improvement II: make reservations

Demand Assigned Multiple Access Channel efficiency only 18% for Aloha, 36% for Slotted Aloha (assuming Poisson distribution for packet arrival and packet length) Reservation can increase efficiency to 80% a sender reserves a future time-slot sending within this reserved time-slot is possible without collision reservation also causes higher delays typical scheme for satellite links

Demand Assigned Multiple Access Examples for reservation algorithms: Explicit Reservation according to Roberts (Reservation-ALOHA) Implicit Reservation (PRMA) Reservation-TDMA

Access method DAMA: Explicit Reservation Explicit Reservation (Reservation Aloha): two modes: ALOHA mode for reservation: competition for small reservation slots, collisions possible reserved mode for data transmission within successful reserved slots (no collisions possible) it is important for all stations to keep the reservation list consistent at any point in time and, therefore, all stations have to synchronize from time to time

Access method DAMA: Explicit Reservation collision Aloha reserved Aloha reserved Aloha reserved Aloha t

PRMA: packet reservation MA Implicit reservation (PRMA - Packet Reservation MA): a certain number of slots form a frame, frames are repeated stations compete for empty slots according to the slotted aloha principle once a station reserves a slot successfully, this slot is automatically assigned to this station in all following frames as long as the station has data to send competition for this slots starts again as soon as the slot was empty in the last frame

PRMA: packet reservation MA reservation ACDABA-F ACDABA-F AC-ABAF- A---BAFD ACEEBAFD frame 1 frame 2 frame 3 frame 4 frame 5 1 2 3 4 5 6 7 8 time-slot A C D A B A F A C A B A A B A F A B A F D A C E E B A F D t collision at reservation attempts

Access method DAMA: Reservation-TDMA Reservation Time Division Multiple Access every frame consists of N mini-slots and x data-slots every station has its own mini-slot and can reserve up to k data-slots using this mini-slot (i.e. x = N * k). other stations can send data in unused dataslots according to a round-robin sending scheme (best-effort traffic) or Aloha.

Access method DAMA: Reservation-TDMA N mini-slots N * k data-slots e.g. N=6, k=2 reservations for data-slots other stations can use free data-slots based on a round-robin scheme

Access method DAMA: Reservation-TDMA Guarantee for worst-case delay. Allows a combination of two service models: Fixed delay; Best-effort traffic.

Improvement III: use the basestation for coordination

Polling mechanisms If one terminal can be heard by all others, this central terminal (a.k.a. base station) can poll all other terminals according to a certain scheme now all schemes known from fixed networks can be used (typical mainframe - terminal scenario)

Polling mechanisms Example: Randomly Addressed Polling base station signals readiness to all mobile terminals terminals ready to send can now transmit a random number without collision with the help of CDMA or FDMA (the random number can be seen as dynamic address) the base station now chooses one address for polling from the list of all random numbers (collision if two terminals choose the same address) the base station acknowledges correct packets and continues polling the next terminal this cycle starts again after polling all terminals of the list

ISMA (Inhibit Sense Multiple Access) Current state of the medium is signaled via a busy tone the base station signals on the downlink (base station to terminals) if the medium is free or not terminals must not send if the medium is busy terminals can access the medium as soon as the busy tone stops the base station signals collisions and successful transmissions via the busy tone and acknowledgements, respectively (media access is not coordinated within this approach)

ISMA (Inhibit Sense Multiple Access)

Summary Basic Aloha has a low throughput. Extension of basic Aloha Schemes Carrier sense/avoidance Reservation Explore the power of basestation