EP2210 FEP3210 Performance analysis of Communication networks. Topic 2 Medium access control (or multiple access protocols)

Similar documents
Multiple Access (1) Required reading: Garcia 6.1, 6.2.1, CSE 3213, Fall 2010 Instructor: N. Vlajic

Chapter 6 Medium Access Control Protocols and Local Area Networks

Packet multiple access and the Aloha protocol

ECE 4450:427/527 - Computer Networks Spring 2017

Data Link Layer: Collisions

CS 43: Computer Networks. 27: Media Access Contd. December 3, 2018

Outline. Introduction to Networked Embedded Systems - Embedded systems Networked embedded systems Embedded Internet - Network properties

Multiple Access Communications. EEE 538, WEEK 11 Dr. Nail Akar Bilkent University Electrical and Electronics Engineering Department

CS 43: Computer Networks Media Access. Kevin Webb Swarthmore College November 30, 2017

Wireless Medium Access Control Protocols

Chapter 1 Basic concepts of wireless data networks (cont d)

Random Access. 1. Aloha. 2. Slotted Aloha 3. CSMA 4. CSMA/CD

Multiple Access Protocols

Power Laws in ALOHA Systems

LANs. Local Area Networks. via the Media Access Control (MAC) SubLayer. Networks: Local Area Networks

LECTURE PLAN. Script. Introduction about MAC Types o ALOHA o CSMA o CSMA/CD o CSMA/CA

COMP/ELEC 429/556 Introduction to Computer Networks

LANs Local Area Networks LANs provide an efficient network solution : To support a large number of stations Over moderately high speed

Computer Network Fundamentals Spring Week 3 MAC Layer Andreas Terzis

Computer Networks Medium Access Control. Mostafa Salehi Fall 2008

Topics. Link Layer Services (more) Link Layer Services LECTURE 5 MULTIPLE ACCESS AND LOCAL AREA NETWORKS. flow control: error detection:

Wireless Communications

Medium Access Control. MAC protocols: design goals, challenges, contention-based and contention-free protocols

High Level View. EE 122: Ethernet and Random Access protocols. Medium Access Protocols

Ethernet. Introduction. CSE 3213 Fall 2011

ECEN 5032 Data Networks Medium Access Control Sublayer

Lecture 12 December 04, Wireless Access. Graduate course in Communications Engineering. University of Rome La Sapienza. Rome, Italy

EITF25 Internet Techniques and Applications L4: Network Access. Stefan Höst

EE 122: Ethernet and

TSIN01 Information Networks Lecture 3

Link Layer and LANs 안상현서울시립대학교컴퓨터 통계학과.

Physical Layer. Medium Access Links and Protocols. Point-to-Point protocols. Modems: Signaling. Modems Signaling. Srinidhi Varadarajan

Chapter 12 Multiple Access 12.1

Aloha and slotted aloha

Lecture 4: Wireless MAC Overview. Hung-Yu Wei National Taiwan University

CS 716: Introduction to communication networks. - 9 th class; 19 th Aug Instructor: Sridhar Iyer IIT Bombay

Markov Chains and Multiaccess Protocols: An. Introduction

The Medium Access Control Scheme (MAC Layer) Reference: Andrew S. Tanenbaum, Computer Networks, 3rd Edition, Prentice Hall, 1996.

Random Assignment Protocols

Chapter 6 Medium Access Control Protocols and Local Area Networks

Lecture 6. Data Link Layer (cont d) Data Link Layer 1-1

Where Are We? Basics: Network Classification Network Architecture Reliable Data Transfer Delay Models Implementation: Protocol Design

Media Access Control. Networked Systems (H) Lecture 5

1-1. Switching Networks (Fall 2010) EE 586 Communication and. November 8, Lecture 30

Multiple Access Links and Protocols

Goals. Fundamentals of Network Media. More topics. Topics. Multiple access communication. Multiple access solutions

Multiple Access. Data Communications and Networking

Contention Protocols and Networks

CHAPTER 7 MAC LAYER PROTOCOLS. Dr. Bhargavi Goswami Associate Professor & Head Department of Computer Science Garden City College

ECE453 Introduction to Computer Networks. Broadcast vs. PPP. Delay. Lecture 7 Multiple Access Control (I)

Intelligent Transportation Systems. Medium Access Control. Prof. Dr. Thomas Strang

ICE 1332/0715 Mobile Computing (Summer, 2008)

The Link Layer and LANs. Chapter 6: Link layer and LANs

Access Technologies! Fabio Martignon

Multimedia Communication Services Traffic Modeling and Streaming

MULTIPLE ACCESS PROTOCOLS 2. 1

Lecture 19. Principles behind data link layer services Framing Multiple access protocols

CSE 461: Multiple Access Networks. This Lecture

CS 3640: Introduction to Networks and Their Applications

RMIT University. Data Communication and Net-Centric Computing COSC 1111/2061/1110. Lecture 8. Medium Access Control Methods & LAN

Mobile Communications Chapter 3 : Media Access

CS 455/555 Intro to Networks and Communications. Link Layer

CMPE 257: Wireless and Mobile Networking

Lecture 8 The Data Link Layer part I. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it

ETSN01 Exam. August 22nd am 1pm. Clearly label each page you hand in with your name and the page number in the bottom right hand corner.

Link Layer: Retransmissions

Data Link Layer -2- Network Access

Protocols for Multiaccess Networks

College of Computer and Information Sciences Department of Computer Engineering CEN444 Computer Networks Midterm 2 Exam Second Semester 1434/1435

COMPUTER NETWORKS - Local area networks

Local area networks. Copyright

Lecture 9 November 12, Wireless Access. Graduate course in Communications Engineering. University of Rome La Sapienza. Rome, Italy

Chapter 4. The Medium Access Control Sublayer. Points and Questions to Consider. Multiple Access Protocols. The Channel Allocation Problem.

Local Area Networks (LANs) SMU CSE 5344 /

Data Link Layer Technologies

Announcements / Wireless Networks and Applications Lecture 9: Wireless LANs Wireless. Regular Ethernet CSMA/CD.

Data Link Layer -2- Network Access

Medium Access Control Sublayer

Chapter 5 Link Layer and LANs

Computer Networks. Today. Principles of datalink layer services Multiple access links Adresavimas, ARP LANs Wireless LANs VU MIF CS 1/48 2/48

Random Access Suitable Protocols

ETSN01 Exam Solutions

Computer Networks. Wenzhong Li. Nanjing University

Redes de Computadores. Medium Access Control

Medium Access Control

Wireless Sensor Networks 7th Lecture

Multiple Access Channels

Medium Access Control

Chapter 4 Data Link Layer

Strengthening Unlicensed Band Wireless Backhaul

Data Link Layer: Overview, operations

Links. CS125 - mylinks 1 1/22/14

CSE 461 Multiple Access. David Wetherall

CSC 4900 Computer Networks: The Link Layer

Data and Computer Communications

Media Access Control in Ad Hoc Networks

COMMUNICATION NETWORKS NETW 501

NMA Radio Networks Network Level: Medium Access Control Roberto Verdone

Chapter 3 MEDIA ACCESS CONTROL

Mohamed Khedr.

Transcription:

EP2210 FEP3210 Performance analysis of Communication networks Topic 2 Medium access control (or multiple access protocols) 1

Medium access control Lecture material: R. Rom, M. idi, Multiple access protocols, Ch. 2-4 TDMA, FDMA, Aloha Reading for next lecture: R. Rom, M. idi, Multiple access protocols, Ch. 2-4 lotted Aloha, CMA, CMA/CD main results 2

Control functions in communication networks Protocols or control functions? Control functions are selected to achieve given objectives (e.g., lossless transmission) Protocols are realizations of a set of control functions, where Control functions are coupled in some sensible way (e.g., loss and congestion control in TCP) 3

Control functions in communication networks fairness concept X X X congestion control rate control admission control error control delay control X medium access control scheduling (congestion control) (error control) (admission control) 4

Group work Give examples of protocols/methods that realize the following control functions. Where are these protocols/methods implemented in the network? Medium access cont. Error control Delay control Congestion control Admission control Rate control cheduling IEEE 802.x 5

Medium access control Medium access control to regulate the access to a shared medium (radio or cable) the main objectives of medium access control implicity have to work at very high speed Efficiency have to utilize the resources well Fairness all users should get the similar chances to access the network end users or routers/switches shered medium radio or bus/star cable 6

Classification Medium access control Channel partitioning Taking turns Random access tatic allocation Reservation Polling Token passing Dynamic resolution tatic resolution In time In freq. Probabilistic ID based - Centralized control 7

Group work Medium access control Channel partitioning Taking turns Random access tatic allocation Reservation Polling Token passing Dynamic resolution tatic resolution In time In freq. Probabilistic ID based Classify the followings: FDMA, TDMA, CMA/CD, Token-ring, Bluetooth, ZigBee, WirelessHART 8

FDMA performance analysis FDMA example: In a cellular system each user (or session) receives a subband of the available spectrum. Each user transmits at the same time, independently from each other. Networking scenario: Users receive an equal share of the spectrum. Each user transmits fixed size packets over the FDMA link. The packets are generated according to a Poisson process, with the same intensity at each user. Packet sizes are deterministic (and equal for all users.) Queues are infinite We re interested in the delay from packet generation to completed transmission 9

FDMA performance analysis Each user served independently: M independent M/D/1 queues Average delay as a function of the throughput R: channel bitrate M: number of users R/M bitrate per user λ: packet arrival rate from a single user, Poisson P: packet size, constant ρ: per channel load (ρλt <1) T: transmission time TP/(R/M) : per channel and system throughput, defined by the fraction of time the server is busy transmitting useful data, max throughput1 ρ: since no losses or unsuccessful transmissions happen D: average delay including waiting + transmission D*: and delay normalized by P/R 10

11 FDMA performance analysis Each user served independently: M independent M/D/1 queues Average delay as a function of the throughput R: channel bitrate M: number of users λ: packet arrival rate from a single user, Poisson P: packet size, constant T: transmission time ρ: per channel and system throughputs are equal D, D*: average waiting + transmission delay and delay normalized by P/R. + + + + + + + + M M M M R P D D R MP T T T T D T M R P T 1 1 1 2 1 1 1 2 1 2 2 ) 2(1 1 / * ) 2(1 1 ) 2(1 1 ) 2(1 ) / /( 2 λ λ λ ρ This depends on the channel bitrate and the packet size. Normalize!

FDMA performance analysis D* M 2 1 1+ 1 At small load the average delay is determined by the packet transmission time, that is, the number of users: D*~M. This means, the system uses the resources in an inefficient way if the load is small. imple, fair, but not efficient. 12

TDMA performance analysis Average delay as a function of the throughput R: channel bitrate M: number of users λ: packet arrival rate from a single user, Poisson P: packet size, constant T c TP/R: packet transmission time T c MT: frame duration ρλt c λ MT λ P/(R/M): for the same λ, R and M the same as for FDMA. Average delay of a packet: packet transmission time: T queuing time, 1 packet per frame transmitted: like queuing time in M/D/1 with T c average time until the beginning of a new frame: 0.5T c D T + 2 λtc 2(1 λt c ) + 0.5T c T + MT 2(1 ) + 0.5MT T + + 1 2(1 ) MT M D T 1 + 2(1 ) D* D P / R R P M 1+ 2(1 ) 1 + M 2(1 ) 13

TDMA-FDMA performance analysis D* D* D * FDMA TDMA FDMA M 2 M 1+ 2(1 ) D * M + 2(1 ) TDMA M 2 1 TDMA is more efficient than FDMA, independently of the load However, TDMA is more complex to implement (slot synchronization) 14

Random access or contention based protocols (Pure) Aloha The first contention based medium access protocol The naïve approach If you have data send If the transmission is not successful wait random amount of time then try again (back-off) 1971, Hawaii, communication between islands 15

Aloha protocol description All nodes share the common transmission medium (radio, bus, star) Nodes transmit newly generated packets immediately Colliding packets are lost, no bits can be recovered If no acknowledgement arrives, nodes retransmit with random delay Node 4 Node 3 Node 2 Node 1 Collision Retransmit, collision Collision time 16

Aloha maximum throughput Model assumptions and notation: infinite population transmitted and retransmitted packets from all users form a Poisson arrival process (g>λ) constant packet transmission time (T) offered load: GgT throughput (collision free): Vulnerable period: packet is lost if other packets arrive within this time interval: 2T Node 4 Node 3 Node 2 Node 1 Collision Retransmit, collision Collision time 17

Aloha maximum throughput k p( k) P succ P succ Ge 0.2 0.15 0.1 P{k arrivals in 2T period} P ( g 2T ) { no other arrivals in 2T period } gt 2G gte, ' xy 2 gt (1 2G) e 2G k! e e g 2T 2 gt Poisson arrival with g : throughput defined as useful load (<1) GgT: offered load 1 0.18 2e Max throughput of 0.18 Ge 2G At offered load (first and retransmissions) of 0.5 0.05 0.2 0.4 0.6 0.8 1 1.2 1.4 G 18

Aloha instability Pure Aloha throughput converges to 0 under Poisson load simple, fair, not efficient Poisson load is not realistic (off hours), so Aloha could work in practice It is not a perfect solution let s look at the modifications 0.2 0.15 0.1 0.05 0.2 0.4 0.6 0.8 1 1.2 1.4 Instability G 19

Aloha improvements home reading lotted version to decrease contention interval home reading, including throughput analysis (R- 3.2) Listen before talk: carrier sense multiple access, CMA home reading, basic ideas and results, discussed next lecture (R- 4.3) Listen while talking: CMA with collision detection, CMA/CD home reading, basic ideas and results (R- 4.4) IEEE 802.11 Markovian model maybe discussed next lecture 20

Carrier sense multiple access - CMA Pure Aloha throughput converges to 0 under Poisson load It is not a good solution let s look at the modifications Idea: Listen before you transmit carrier sense If channel is idle send data If channel is busy back off nonpersisten: packet rescheduled with a random delay 1-persistent: packet transmitted immediately as the channel becomes idle p-persistent one of the two with probability p and 1-p If no acknowledgement received transmit again If all nodes listen before transmit, and all nodes see the channel, is there collision in CMA? 21

CMA modeling slotted case Collision due to propagation delay Efficient only if the packet transmission time (T) is much larger than the propagation time (τ ) lotted CMA time divided into minislots propagation delay (τ) packets wait until the beginning of next minislot, and sense the channel if idle: transmit if busy: retries according to being persistent or non-persistent τ T 22

CMA modeling slotted case Modeling: Poisson packet arrival, λ fixed packet size, T Throughput(useful periods)/(idle+busy periods) busy perioduseful or collision slotted, nonpersistent (if busy, tries again with random back-off) minislot: propagation time (equal for all pair of nodes), τ normalized diameter, a τ /T <<1 (Packet transmission time >> propagation time) assume 1/a is integer, packets occupy a minislots. average idle period, I average busy period (successful transmission or collision), B average useful period (successful transmission), U 23

Idle period: Busy period: B P P CMA modeling slotted case g k P[ Iˆ τ 1 gτ kτ ] ( e ) ( 1 e ) (geometricdistr.) τ I 1 e Transmission periodsin busy period: P L succ gτ ( T + τ ) L [ single arrival some arrivals] l [ ˆ gτ l] ( 1 e ) [ single arrival ] [ some arrivals] T Useful periods within a busy period: U BP T + τ ag U age L ag B + I 1+ a e G a 0 1+ G T e + τ gτ P P succ 1 e gτ gτe 1 e LTP, succ gτ gτ L T e No arrival in k-1 slots, at least one in slot k gτ 1 gτ e At least one arrival in l-1 slots, no arrival in the l-th slot P succ 24

Aloha and CMA comparison 1.0 0.8 0.6 0.4 0.2 0 2 4 6 8 10 Group work: find the corresponding curve: slotted Aloha slotted CMA with a0.5 (packet length 2*propagation time) slotted CMA with a0.1 slotted CMA with a0.05 slotted CMA with a0 (packet length >> propagation time) G 25

CMA/CD slotted case To increase utilization: shorten busy periods -> shorten unsuccessful periods Listen while transmit if collision is detected transmit jamming signal and stop transmission γ: the length of the unsuccessful transmission, τ < γ <T Modeling: length of idle period transmission periods in busy period probability of success length of busy periods throughput Home reading! 26

CMA in wireless networks Does CMA/CD work fine in wireless networks? Problem 0: Can not sense while transmit -> CMA/CA Problem 1: Hidden terminal problem the two terminals can not hear each others transmission carrier sense does not work olution: CMA/CA with RT/CT request to send (RT) clear to send (CT) both terminals can hear the CT Problem 2: Exposed terminal problem B could transmit, but backs off, as it assumes that the channel to its receiver is busy 27

ummary Medium access control protocols tatic allocation: TDMA, FDMA Random access: Aloha, CMA, CMA/CD imple models for general conclusions and comparison Packet level models Poisson arrival implified network (e.g., equal distances, no hidden terminals) Reading assignment: Rom, idi, Multiple Access Protocols, excerpts Ch.2: page 9 to top of 15 (FDMA, TDMA) Ch.3: page 47 to 52 (ALOHA) Ch 4: page 79 to 83, 89 to top of 92, 94 to 98 (CMA variations) 28