ISSN: (Online) Volume 2, Issue 6, June 2014 International Journal of Advance Research in Computer Science and Management Studies

Similar documents
COS 140: Foundations of Computer Science

LANs. Local Area Networks. via the Media Access Control (MAC) SubLayer. Networks: Local Area Networks

COS 140: Foundations of Computer Science

ECEN 5032 Data Networks Medium Access Control Sublayer

ECE453 Introduction to Computer Networks. Broadcast vs. PPP. Delay. Lecture 7 Multiple Access Control (I)

Multiple Access. Data Communications and Networking

Random Access. 1. Aloha. 2. Slotted Aloha 3. CSMA 4. CSMA/CD

MAC Sublayer(1) Principal service of the Medium Access Control Sublayer: Allocating a single broadcast channel (mostly a LAN) among competing users

LANs Local Area Networks LANs provide an efficient network solution : To support a large number of stations Over moderately high speed

Chapter 4 (Week 7) The Medium Access Control Sublayer ANDREW S. TANENBAUM COMPUTER NETWORKS FOURTH EDITION PP CN&DC Dr.

Chapter 4. The Medium Access Control Sublayer. Points and Questions to Consider. Multiple Access Protocols. The Channel Allocation Problem.

Data Link Layer: Collisions

Chapter 6 Medium Access Control Protocols and Local Area Networks

COMMUNICATION NETWORKS NETW 501

CS 716: Introduction to communication networks. - 9 th class; 19 th Aug Instructor: Sridhar Iyer IIT Bombay

Random Assignment Protocols

Access Technologies! Fabio Martignon

CHAPTER 7 MAC LAYER PROTOCOLS. Dr. Bhargavi Goswami Associate Professor & Head Department of Computer Science Garden City College

Wireless Communications

ECE 4450:427/527 - Computer Networks Spring 2017

COMPUTER NETWORKS - Local area networks

Local area networks. Copyright

Redes de Computadores. Medium Access Control

CCM 4300 Lecture 5 Computer Networks, Wireless and Mobile Communications. Dr Shahedur Rahman. Room: T115

Jaringan Komputer. Broadcast Network. Outline. MAC (Medium Access Control) Channel Allocation Problem. Dynamic Channel Allocation

ECE 358 MAC Examples. Xuemin (Sherman) Shen Office: EIT 4155 Phone: x

Ethernet. Introduction. CSE 3213 Fall 2011

Data and Computer Communications. Chapter 11 Local Area Network

Data Communications. Automatic Repeat Request Medium Access Control

Multiple-access protocols

Protocols for Multiaccess Networks

Chapter 12 Multiple Access 12.1

CS 123: Lecture 12, LANs, and Ethernet. George Varghese. October 24, 2006

Markov Chains and Multiaccess Protocols: An. Introduction

Data Link Layer, Part 3 Medium Access Control. Preface

Data Link Layer -2- Network Access

EITF25 Internet Techniques and Applications L4: Network Access. Stefan Höst

Medium Access Control

Telecommunication Protocols Laboratory Course. Lecture 2

CS 43: Computer Networks Media Access. Kevin Webb Swarthmore College November 30, 2017

Aloha and slotted aloha

Media Access Control. Networked Systems (H) Lecture 5

ICE 1332/0715 Mobile Computing (Summer, 2008)

College of Computer and Information Sciences Department of Computer Engineering CEN444 Computer Networks Midterm 2 Exam Second Semester 1434/1435

Data Link Layer, Part 5. Medium Access Control

Data and Computer Communications

Chapter 4. The Medium Access Control Sublayer

Multiple Access (1) Required reading: Garcia 6.1, 6.2.1, CSE 3213, Fall 2010 Instructor: N. Vlajic

Data Link Layer. Goals of This Lecture. Engineering Questions. Outline of the Class

Multiple Access Protocols

Lecture 4: Wireless MAC Overview. Hung-Yu Wei National Taiwan University

Unit 7 Media Access Control (MAC)

Data Link Layer -2- Network Access

COMPUTER NETWORK Model Test Paper

The Medium Access Control Scheme (MAC Layer) Reference: Andrew S. Tanenbaum, Computer Networks, 3rd Edition, Prentice Hall, 1996.

LAN PROTOCOLS. Beulah A AP/CSE

Problem Set Name the 7 OSI layers and give the corresponding functionalities for each layer.

Computer Networks. Medium Access Sublayer (Part I)

Local Networks. Lecture 4 6-Apr-2016

COMP476 Networked Computer Systems. Polling. Sharing the Wire. LAN Technologies. COMP476 Networked Computer Systems 1

CSE 461 Multiple Access. David Wetherall

Lecture 8 The Data Link Layer part I. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it

CS 716: Introduction to communication networks. - 8 th class; 17 th Aug Instructor: Sridhar Iyer IIT Bombay

Chapter 1 Basic concepts of wireless data networks (cont d)

CS 43: Computer Networks. 27: Media Access Contd. December 3, 2018

High Level View. EE 122: Ethernet and Random Access protocols. Medium Access Protocols

TSIN01 Information Networks Lecture 3

Goals. Fundamentals of Network Media. More topics. Topics. Multiple access communication. Multiple access solutions

COMP/ELEC 429/556 Introduction to Computer Networks

Media Access Control (MAC) Sub-layer and Ethernet

Multiple Access Communications. EEE 538, WEEK 11 Dr. Nail Akar Bilkent University Electrical and Electronics Engineering Department

Lecture 6. Data Link Layer (cont d) Data Link Layer 1-1

Lecture 19. Principles behind data link layer services Framing Multiple access protocols

Physical Layer. Medium Access Links and Protocols. Point-to-Point protocols. Modems: Signaling. Modems Signaling. Srinidhi Varadarajan

Power Laws in ALOHA Systems

EE 122: Ethernet and

LECTURE PLAN. Script. Introduction about MAC Types o ALOHA o CSMA o CSMA/CD o CSMA/CA

Link Layer and LANs 안상현서울시립대학교컴퓨터 통계학과.

Outline. Introduction to Networked Embedded Systems - Embedded systems Networked embedded systems Embedded Internet - Network properties

Computer Networks Medium Access Control. Mostafa Salehi Fall 2008

2. Modelling of telecommunication systems (part 1)

The Link Layer and LANs. Chapter 6: Link layer and LANs

12.2. Figure 12.1 Data link layer divided into two functionality-oriented sublayers

1-1. Switching Networks (Fall 2010) EE 586 Communication and. November 8, Lecture 30

Direct Link Networks (II)

Chapter 6 Medium Access Control Protocols and Local Area Networks

SRM ARTS AND SCIENCE COLLEGE SRM NAGAR, KATTANKULATHUR

Computer Network Fundamentals Spring Week 3 MAC Layer Andreas Terzis

Chapter 4: The Medium Access Layer

CMPE 150/L : Introduction to Computer Networks. Chen Qian Computer Engineering UCSC Baskin Engineering Lecture 16

Topics. Link Layer Services (more) Link Layer Services LECTURE 5 MULTIPLE ACCESS AND LOCAL AREA NETWORKS. flow control: error detection:

The MAC layer in wireless networks

Multiple Access Links and Protocols

Mobile Communications Chapter 3 : Media Access

Your favorite blog : (popularly known as VIJAY JOTANI S BLOG..now in facebook.join ON FB VIJAY

Packet multiple access and the Aloha protocol

Computer Networks Chapter 4: Medium Access Control (MAC)

CS 455/555 Intro to Networks and Communications. Link Layer

Link Layer: Retransmissions

The Medium Access Control Sublayer

Transcription:

ISSN: 2321-7782 (Online) Volume 2, Issue 6, June 2014 International Journal of Advance Research in Computer Science and Management Studies Research Article / Survey Paper / Case Study Available online at: www.ijarcsms.com Multiple Accesses Sharing of Channel Resources Kalyani Raval Teaching Assistant M. J. College of Commerce Maharaja Krishnakumarsinhji Bhavnagar University Vidhyanagar Gujarat India Abstract: Media Access Control sub layer s primary function is to manage the allocation of one broadcast channel among N competing users. For the same, many methods are available such as static and dynamic allocation method. In the static channel allocation method, allocating a single channel among N competing users can be either Frequency division multiplexing (FDM) or Time division multiplexing (TDM). In FDM the total bandwidth will be divided into N equal parts for N users. This way, every user will have their own frequency band so no conflict or collision will occur among user in the network. But, this is feasible only when the numbers of users are small and traffic is also limited. If, the number of users becomes large this system has face many problems like either one user is gets one frequency band that is not used at all or the other user does not get a frequency band for transmission. Hence, it is simple and efficient for a small number of users. Similarly, in TDM (Time Division Multiplexing), discussed with first Block every user will get a fixed Nth time slot. In the dynamic channel allocation the important issues to be considered are whether, time is continuous or discrete or whether the station is carrier sensing large number of stations each with small and bursty traffic. Keywords: Static and Dynamic Channel, Pure ALOHA, Slotted ALOHA. I. INTRODUCTION The Data Link Layer (DLL) is divided into two sub layers i.e., the Media Access Control (MAC) layer and the Logical Link Control (LLC) layer. In a network nodes are connected to or use a common transmission media. Based on the connection of nodes, a network can be divided into two categories, that is, point-to-point link and broadcast link. Here, I have study, broadcast link and their protocols then a control process for solving the problem of accessing a multi access channel is required. Many protocols are available for solving the problem of multi-access channel. These protocols can control an access on shared link as in broadcast network. It is an important issue to be taken into consideration that is, how to who gets access to the channel while, many nodes are in competition as shown in below Figure. Shared media 2014, IJARCSMS All Rights Reserved 187 P a g e

The protocol which decides who will get access to the channel and who will go next on the channel belongs to MAC sublayer of DLL. Channel allocation is categorized into two, based on the allocation of broadcast among competeting users that is Static channel allocation problem and Dynamic Channel allocation problem as shown in below Figure. Channel allocation technique II. OBJECTIVE The need for accessing multi-access channel; Common methods for accessing multi-access channel like FDM, TDM; The need for Dynamic channel allocation method; Pure ALOHA method for channel allocation; Slotted ALOHA method for channel allocation; III. PURE ALOHA If, one node sends a frame to another node, there can be some error in the frame. For the same we discussed some retransmission strategies to deal with the error. But, in case of allocating a single channel among N uncoordinated competing users, then the probability of collision will be high. Station accesses the channel and when their frames are ready. This is called random access. In an ALOHA network one station will work as the central controller and the other station will be connected to the central station. If, any of stations want to transmit data among themselves, then, the station sends the data first to the central station, which broadcast it to all the stations. ALOHA Here, the medium is shared between the stations. So, if two stations transmit a frame at overlapping time then, collision will occur in the system. Here, no station is constrained; any station that has data /frame to transmit can transmit at any time. Once one station sends a frame after 2 times the maximum propagation time. If the sender station does not receive its own frame during this time limit then, it retransmits this frame by using backoff algorithm. And if, after a number of repeats if it does receive own pocket then the station gives up and stops retransmitting the same frame. Let R be the bit rate of the transmission channel and L be the length of the frame. Here, we are assuming that the size of frame will be constant and hence, it will take constant time t= L/R for transmission of each packet. 2014, IJARCSMS All Rights Reserved ISSN: 2321-7782 (Online) 188 P a g e

As in the case of Pure ALOHA protocol frames can be sent any time so, the probability of collision will be very high. Hence, to present a frame from colliding, no other frame should be sent within its transmission time. We will explain this with the help of the concept of vulnerable period as shown in below Figure. Vulnerable Period Let a frame is that transmitted at time t0 and t be the time required for its transmission. If, any other station sends a frame between t0 and t0+t then the end of the frame will collide with that earlier sent frame. Similarly, if any other station transmits a frame between the time interval t0+t and t0+2t again, it will result in a garbage frame due to collision with the reference frame. Hence, 2t is the vulnerable interval for the frame. In case a frame meets with collision that frame is retransmitted after a random delay. 2t. Hence, for the probability of successful transmission, no additional frame should be transmitted in the vulnerable interval To find the probability of no collision with a reference a frame, we assume that a number of users are generating new frames according to Poisons distribution. Let S be the arrival rate of new frames per frame time. As we find probability of no collision, S will represent the throughput of the system. Let G be the total arrival rate of frames including retransmission frames (also called load of the system). For finding the probability of transmission from the new and retransmitted frame. It is assumed that frames arrival is Poisson distributed with an average number of arrivals of G frames/ frame time. The probability of k frames transmission in 2t seconds is given by the Poisson distribution as follows: The throughput of the system S is equal to total arrival rate G times the probability of successful transmission with no collision, That is S = G * P S=G * P (zero frame transmission in the vulnerable interval i.e.,2t seconds) Since P [K frame in vulnerable interval 2t] = (2G) e 2G, K = 0, 1, 2,3 Thus P [K = 0 in 2t] = 2G Hence, S = G * P = G. e 2G Note that the averages load is G. Hence it is 2G in 2t S=G * e-2g 2014, IJARCSMS All Rights Reserved ISSN: 2321-7782 (Online) 189 P a g e

The relationship between S vs. G can be shown in below Figure. Throughput vs. load graph of pure ALOHA As G is increasing, S is also increasing for small values of G. At G=1/2, S attains its peak value i.e., S=1/2e i.e., 0.18(approx). After that, it starts decreasing for increasing values of G. Here, the average number of successful transmission attempts/frames can be given as G/S = e2g. An average number of unsuccessful transmission attempts/frame is G/S 1 = e2g 1. IV. SLOTTED ALOHA In this, we can improve the performance by reducing the probability of collision. In the slotted ALOHA stations are allowed to transmit frames in slots only. If more than one station transmit in the same slot, it will lead to collision this reduces the occurrence of collision in the network system. Here, every station has to maintain the record of time slot. The process of transmission will be initiated by any station at the beginning of the time slot only. Here also, frames are assumed to be of constant length and with the same transmission time. Here the frame will collide with the reference frame only if, it arrives in the interval t0-t to t0. Hence, here the vulnerable period is reduced that is to t seconds long. The throughput of the system S is equal to the total arrival rate G times the probability of successful transmission with no collision That is S = G * P S=G * P (zero frame transmission in t seconds) The probability of k frames transmission in t seconds and is given by the Poisson distribution as follows: P[ k ]= (G)k * e-g/k!, k=0,1,2,3 Here average load in the vulnerable interval is G (one frame time) Hence, the probability of zero frames in t seconds = e-g S= G * e-g The relationship between S vs G can be shown in below Figure. 2014, IJARCSMS All Rights Reserved ISSN: 2321-7782 (Online) 190 P a g e

Throughput vs. load graph of slotted ALOHA From the figure we can see that the system is exhibiting its performance. Maximum throughput that can be achieved with Slotted ALOHA S=1/e= 36 % (Approx.) V. CONCLUSION In some networks, if a single channel and many users use that channel, then, allocation strategy is required for the channel. We have study in this paper, FDM and TDM allocation method. They are the simplest methods for allocation. They work efficiently for a small number of users. For a large number of users the ALOHA protocol is considered. There are two versions of ALOHA that is Pure ALOHA and Slotted ALOHA. In Pure ALOHA no slotting was done but the efficiency was poor. In Slotted ALOHA, slots have been made, so that every frame transmission starts at the beginning of the slot and throughput is increased by a factor of 2. However, with this performance also we are not able to utilize the medium in an efficient manner. Due to the high rate of collision systems the bandwidth is which was designed to implement random access in LANs. So, for avoiding collision and to increase efficiency in sensing the channel, CSMA is used. IEEE 802.3 Ethernet uses 1 persistent CSMA/CD access method. Books: References 1. Dr. Arvind Mohan Parashar, Chandresh Shah, Saurab Mishra, Sunilkumar Ojha Computer Science & Application. Agra: Upkar Prakashan. Pg no 871 to 875 2. Martin J. Michael, Understanding the Network: A Practical Guide to Internetworking, March-2007 (Publisher: Sams) 3. Olivier Bonaventure, Computer Networking : Principles, Protocols and Practice, January-2012 (Publisher: Cnp 3book) 4. Behrouz A. Forouzan, Sophia Chung Fegan, Data Communications and Networking, Aug-2013 (Publisher: McGraw-Hill Higher Education) 5. Michael G. Solomon, David Kim, Fundamentals of Communications and Networking, 2011 (Publisher: Jones & Bartlett) 6. Michael G. Solomon, Mike Chapple, Information Security Illuminated, 2005 (Publisher: Jones & Bartlett) 7. Clayton Coulter, Understanding Networking Technologies, 1997 (Publisher: Atrium Technical Inc.) AUTHOR(S) PROFILE Kalyani Raval has received B.com (Accountancy), M.sc I.T. degree and pursuing M.Com from Maharaja Krishnakumarsinhji Bhavnagar University. She has more than 3 years of experience in teaching. Currently working as a Teaching Assistant at M. J. College of Commerce, Vidyanagar, Bhavnagar. She is member of International Association of Engineers (IAENG). In her academic career up till now 9 Research articles have been published. Also, she has presented papers at different seminars at national and an international level. An experienced faculty and mentor with an extensive knowledge of Research, Literature and Communication Skill. 2014, IJARCSMS All Rights Reserved ISSN: 2321-7782 (Online) 191 P a g e