Markov Chains and Multiaccess Protocols: An. Introduction

Similar documents
Multiple Access Communications. EEE 538, WEEK 11 Dr. Nail Akar Bilkent University Electrical and Electronics Engineering Department

TSIN01 Information Networks Lecture 3

Random Access. 1. Aloha. 2. Slotted Aloha 3. CSMA 4. CSMA/CD

ECEN 5032 Data Networks Medium Access Control Sublayer

LANs. Local Area Networks. via the Media Access Control (MAC) SubLayer. Networks: Local Area Networks

Multiple Access. Data Communications and Networking

Power Laws in ALOHA Systems

COS 140: Foundations of Computer Science

Packet multiple access and the Aloha protocol

Multiple Access (1) Required reading: Garcia 6.1, 6.2.1, CSE 3213, Fall 2010 Instructor: N. Vlajic

The Medium Access Control Scheme (MAC Layer) Reference: Andrew S. Tanenbaum, Computer Networks, 3rd Edition, Prentice Hall, 1996.

Chapter 6 Medium Access Control Protocols and Local Area Networks

COS 140: Foundations of Computer Science

ECE453 Introduction to Computer Networks. Broadcast vs. PPP. Delay. Lecture 7 Multiple Access Control (I)

Outline. Application examples

Ethernet. Introduction. CSE 3213 Fall 2011

Multiple Access Protocols

ITERATIVE COLLISION RESOLUTION IN WIRELESS NETWORKS

Redes de Computadores. Medium Access Control

Random Assignment Protocols

LECTURE PLAN. Script. Introduction about MAC Types o ALOHA o CSMA o CSMA/CD o CSMA/CA

CHAPTER 7 MAC LAYER PROTOCOLS. Dr. Bhargavi Goswami Associate Professor & Head Department of Computer Science Garden City College

Lecture 19. Principles behind data link layer services Framing Multiple access protocols

Computer Network Fundamentals Spring Week 3 MAC Layer Andreas Terzis

TSIN01 Information Networks Lecture 8

Computer Networks. Medium Access Sublayer (Part I)

Protocols for Multiaccess Networks

ICE 1332/0715 Mobile Computing (Summer, 2008)

Media Access Control. Networked Systems (H) Lecture 5

Chapter 4. The Medium Access Control Sublayer. Points and Questions to Consider. Multiple Access Protocols. The Channel Allocation Problem.

Aloha and slotted aloha

Written Exam in Information Networks TSIN01

Splitting Algorithms

CS 716: Introduction to communication networks. - 9 th class; 19 th Aug Instructor: Sridhar Iyer IIT Bombay

CHAPTER 5 PROPAGATION DELAY

Intelligent Transportation Systems. Medium Access Control. Prof. Dr. Thomas Strang

EITF25 Internet Techniques and Applications L4: Network Access. Stefan Höst

CS 43: Computer Networks. 27: Media Access Contd. December 3, 2018

Multimedia Communication Services Traffic Modeling and Streaming

Com S 611 Spring Semester 2007 Discrete Algorithms for Mobile and Wireless Networks. Lecture 3: Tuesday, 23rd January 2007

Data Communications. Automatic Repeat Request Medium Access Control

LANs Local Area Networks LANs provide an efficient network solution : To support a large number of stations Over moderately high speed

Data Link Layer -2- Network Access

Announcements / Wireless Networks and Applications Lecture 9: Wireless LANs Wireless. Regular Ethernet CSMA/CD.

Wireless Medium Access Control Protocols

COMP/ELEC 429/556 Introduction to Computer Networks

CS 43: Computer Networks Media Access. Kevin Webb Swarthmore College November 30, 2017

Data Link Layer -2- Network Access

MAC Sublayer(1) Principal service of the Medium Access Control Sublayer: Allocating a single broadcast channel (mostly a LAN) among competing users

Wireless Sensor Networks 7th Lecture

NMA Radio Networks Network Level: Medium Access Control Roberto Verdone

Medium Access Control Sublayer

The MAC layer in wireless networks

ETSN01 Exam Solutions

Wireless Communications

COMPUTER NETWORKS - Local area networks

Local area networks. Copyright

Chapter 6 Medium Access Control Protocols and Local Area Networks

ECE 4450:427/527 - Computer Networks Spring 2017

Chapter 4 (Week 7) The Medium Access Control Sublayer ANDREW S. TANENBAUM COMPUTER NETWORKS FOURTH EDITION PP CN&DC Dr.

Jaringan Komputer. Broadcast Network. Outline. MAC (Medium Access Control) Channel Allocation Problem. Dynamic Channel Allocation

EP2210 FEP3210 Performance analysis of Communication networks. Topic 2 Medium access control (or multiple access protocols)

Multiple Access Links and Protocols

Where Are We? Basics: Network Classification Network Architecture Reliable Data Transfer Delay Models Implementation: Protocol Design

High Level View. EE 122: Ethernet and Random Access protocols. Medium Access Protocols

Data Link Layer: Collisions

Chapter 12 Multiple Access 12.1

Slotted Aloha UHFHLYHU. Recall assumptions:

1-1. Switching Networks (Fall 2010) EE 586 Communication and. November 8, Lecture 30

CSEN 503 Introduction to Communication Networks. Mervat AbuElkheir Hana Medhat Ayman Dayf. **Slides are attributed to J. F. Kurose

EE 122: Ethernet and

Mobile Communications Chapter 3 : Media Access

Problem Set Name the 7 OSI layers and give the corresponding functionalities for each layer.

Chapter 5: Link layer

Medium Access Control. IEEE , Token Rings. CSMA/CD in WLANs? Ethernet MAC Algorithm. MACA Solution for Hidden Terminal Problem

Performance Analysis of WLANs Under Sporadic Traffic

RMIT University. Data Communication and Net-Centric Computing COSC 1111/2061/1110. Lecture 8. Medium Access Control Methods & LAN

IEEE , Token Rings. 10/11/06 CS/ECE UIUC, Fall

Reminder: Datalink Functions Computer Networking. Datalink Architectures

Chapter 3 MEDIA ACCESS CONTROL

Access Technologies! Fabio Martignon

Medium Access Control

Connection-Level Scheduling in Wireless Networks Using Only MAC-Layer Information

The MAC layer in wireless networks

CS 716: Introduction to communication networks. - 8 th class; 17 th Aug Instructor: Sridhar Iyer IIT Bombay

Link Layer: Retransmissions

Medium Access Control Protocols With Memory Jaeok Park, Member, IEEE, and Mihaela van der Schaar, Fellow, IEEE

Lecture 6. Data Link Layer (cont d) Data Link Layer 1-1

Computer Communication III

CMPE 257: Wireless and Mobile Networking

Lecture 12 December 04, Wireless Access. Graduate course in Communications Engineering. University of Rome La Sapienza. Rome, Italy

King Fahd University of Petroleum and Minerals College of Computer Sciences and Engineering Department of Computer Engineering

CS 455/555 Intro to Networks and Communications. Link Layer

CSE 461: Multiple Access Networks. This Lecture

The Link Layer and LANs. Chapter 6: Link layer and LANs

June 20th, École Polytechnique, Paris, France. A mean-field model for WLANs. Florent Cadoux. IEEE single-cell WLANs

CCM 4300 Lecture 5 Computer Networks, Wireless and Mobile Communications. Dr Shahedur Rahman. Room: T115

COMMUNICATION NETWORKS NETW 501

CSMA/CD (Collision Detection)

Chapter 4. The Medium Access Control Sublayer

Transcription:

Markov Chains and Multiaccess Protocols: An Introduction Laila Daniel and Krishnan Narayanan April 8, 2012

Outline of the talk Introduction to Markov Chain applications in Communication and Computer Science Introduction to multiaccess protocols ALOHA and CSMA/CD as multiaccess protocols A simple model for Pure ALOHA and Slotted ALOHA and its analysis Summary Slides on ALOHA are based on Chapter 4, The medium access control sublayer of the book Computer Networks by A.S. Tanenbaum (B21) and Chapter 4, Multiaccess Communication of the book Data Networks by Bertsekas and Gallager (B21)

Some Examples of Markov Chain applications in Communication and Computer Science MC modelling for ALOHA protocols MC and Wireless scheduling MC and Pagerank computations MC and Epidemic protocols MC and Uniform generation and counting MC and algorithms for computing volumes

Markov Chain: an informal view MC models the evolution (time) of random phenomena A simple example: A two state Markov model for Finnish weather in summer If sunny today, the probability that if it rains tomorrow is p If rainy today, the probability that if it is sunny tomorrow is q What is the percentage sunny days during the entire summer? If there are two consecutive sunny days, what is the probability that the third day is also sunny? Local, microscopic rules leading to global, macroscopic laws and behaviour Markov Chains are to stochastic dynamics what differential equations are to deterministic dynamics

Markov Chain: an informal view In MC time discrete i.e, n = 1,2,3... or continuous i.e t (0, ) and states finite or countable i.e 1,2,3,... We focus on DTMC i.e, discrete time Markov chains Key property of Markov chain : the future state depends on the past only though the present : P(future present, past) = P(future present) More formally P(X i+1 = j X n = i, X n 1 = i 1,...,X 1 = 1) = P(X n+1 = j X n = i) for all states i 0,i 1,...i n 1 and for all n 0 A property is Markov if the past influences the future only through the present. This can also be stated as the present containing the entire summary of the past as it affects the future. This can also be stated in a more technical way that conditioned on the present the future and the past are independent of each other

MC Mathematical formulation We consider a stochastic process X = {X n = 0,1,2,...} that takes a finite or countable set of values. The set of values taken by X is the state space of the system. It is usually a finite set (of integers) or a countable set (set of natural numbers or integers) A stochastic process X is a collection of random variables X 0,X 1,X 2... corresponding to different time instants n = 0,1,2... Interpretation: If X n = i, we say that the random variable X n takes the value i at time n. We also can say that the process X is in state i at time n. Let P denote the one-step transition matrix of a Markov Chain P = (p i,j ) where, p i,j is the probability of transition from state i to state j

Multiaccess Protocols A multiple-access channel is a broadcast channel that allows multiple users to communicate with each other by sending messages onto the channel. If two or more users simultaneously send messages, then the messages interfere with each other (collide), and all the messages are not transmitted successfully. The channel is not centrally controlled. Instead, the users use a contention-resolution protocol to resolve collisions. Thus, after a collision, each user involved in the collision waits a random amount of time (which is determined by the protocol) before resending the packet

Multiaccess Protocols Several transmitters share a common channel to transmit their data Eg. Several earth stations transmit to a common satellite receiver and the received message is relayed to the ground stations ALOHA and Ethernet are examples of this scheme ALOHA, early packet radio network invented by Abramson around 1970 Provide a radio communication between the central computer and data terminals located at various campuses of University of Hawaii All the data terminals communicate with the central station by transmitting their packets using the common radio channel. Ethernet scheme for communication between several computers in a LAN connected via a shared medium is a variant of the ALOHA scheme.

Multiaccess Protocols In many communication networks, the communication medium is shared by multiple users who compete with one another for access. Two basic examples are CSMA/CD as (MAC protocol in Ethernet) and ALOHA (and its slotted variants) in wireless networks and satellite communication In CSMA/CD setting, nodes sense the channel to see if the channel is available before they start to send in order to avoid collisions. However for wireless adhoc networks, this (CSMA/CD) may not be effective as nodes may not be able to sense each others presence due to hidden-terminal problem. So is the case of competing 802.11 gateways in hotspots for wireless access.

ALOHA ALOHA is a decentralized (distributed) protocol for medium access which does not perform carrier sensing. ALOHA protocol originally introduced by Abramson (in 1970) is known as Pure ALOHA (P-ALOHA). Slotted ALOHA (S-ALOHA) is a synchronized variant of Pure ALOHA that uses synchronization of transmitters at the beginning of each slot (a unit of time corresponding to the duration to send a packet), improves the efficiency of use of the shared medium and has greater efficiency than P-ALOHA. S-ALOHA protocols used widely in current GSM wireless networks.

Congestion control vs Contention Control In Congestion Control, all the sender simultaneously use all the resources (links) in the network. In Contention Control, all the senders share a single resource (multiaccess channel) in such a manner at any time instant, only one of them can use the shared resource to communicate. Both congestion control and contention control are distributed algorithms and both rely on feedback from the network to adapt their sending behaviour. Congestion control algorithm of the sources is given by differential equation whereas the contention algorithm is a randomized algorithm. The equilibrium property of both congestion control algorithm and contention control algorithm are of interest. Stability of congestion control algorithm at equilibrium point proved by Lyapunov method whereas in congestion control algorithm such a result is obtained by analysis of the Markov chain model for the protocol.

ALOHA - Basic model and preliminary analysis Several users (say m) transmit using a common broadcast channel. Users transmit whenever they have data to be sent. Collisions occur whenever the transmissions (from two or more senders) overlap in time. Whenever a collision occurs, all the colliding packets are lost and the senders have to retransmit them. As the transmission channel is a broadcast channel, the senders can know whether their transmissions have suffered collision or not by listening to the channel. This property of the broadcast channel is called feedback property of the broadcast channel. Senders try to send the packets lost due to collision after a random waiting time as sending them immediately will surely result in another collision.

ALOHA - Basic model and preliminary analysis Multiaccess systems are systems in which multiple users share a common channel that is prone to contention due to the shared usage. Questions: How should the retransmission strategy of the nodes for the collided packets be designed? What about the stability of the system? (informally, this means the backlog does not grow without bound) What is the throughput (efficiency) of the system? i.e, what fraction of the transmitted packets go through without undergoing collisions?

Slotted ALOHA model An idealized scheme that enables modelling of the ALOHA protocol that provides valuable insights into protocol behaviour There are m nodes in the system and one receiver Slotted system All transmitted packets of same length; each packet takes one time unit ( a slot) for transmission. All transmitters synchronized - so the reception of each packet begins at an integer time and it ends before the next integer time Poisson arrivals Packets arrive at each of the m transmitting nodes Assumptions in the model All transmitted packets are of the same length Aloha network

Pure ALOHA- basic model and its analysis (1/7) An idealized scheme that enables modelling of the ALOHA protocol that provides valuable insights into protocol behaviour The following assumptions are made. There are infinitely many transmitters in the system and one receiver All transmitted packets are of same length; each packet takes one time unit (a slot), for transmission. The infinitely many transmitters generate new packets according to a Poisson distribution with a mean s packets per slot, denoted by S Poisson(s) or just P(s)

Pure ALOHA- basic model and its analysis (2/7) In order to avoid technical difficulties, we do not allow queues at the transmitting nodes. Each node can be thought of as giving rise to as many virtual nodes as there are packets to be sent. If a packet is lost due to collision, each node repeatedly attempts to send the packet till the packet is successfully received. s 1, the packets are generated at a greater rate than they can be handled by the channel and nearly every packet sent will suffer collision So the assumption that 0 < s < 1 is reasonable to make.

Pure ALOHA -basic model and its analysis (3/7) Besides the new packets, the packets that were lost due to collisions have to be retransmitted by the nodes. Let the random variable G denote the number of transmission attempts of both the new and old packets in each slot. Under suitable randomization, we can assume that G is a Poisson random variable with mean g. The Poisson distribution assumption is justified when there are a large number of nodes (infinite in this case) that attempt to transmit, each with a small probability of sending a packet in a slot. clearly g s

Pure ALOHA -basic model and its analysis (4/7) In the case of low load, s 0, there are few collisions and so there are few retransmissions and so g s In the case of high load, due to many collisions, g > s In all cases, the mean throughput s is given by the mean load g times p 0,the probability that a packet under transmission does not suffer collision. So the probability that k packets, old and new combined, are sent in a given slot is given by P(k) = e g g k k! A random variable X has Poisson distribution with parameter λ denoted by X P(λ) if the probability P(X = k) = e λ λ k k!

Pure ALOHA -basic model and its analysis (5/7) The probability that zero packets are sent in a time slot is e g A given packet transmitted at time t will be successful if no other packet is sent in the interval (t 1,t +1) (otherwise the given packet will suffer collisions) So the probability that a given packet is successful is that there are no packet transmissions during an interval of 2 slots, and this probability is given by e 2g and the success rate s = ge 2g The vulnerable period for a packet is the interval during which it can suffer a collision and it is twice the duration of the packet, so is two slots long. The mean number of packets generated during a two slot interval is 2g and the probability that no other packets are generated during the entire vulnerable period is therefore given by p(0) = e 2g. This yields s = gp(0) = ge 2g

Pure ALOHA -basic model and its analysis (6/7) For the case of S-ALOHA, where the sending of packets of all the nodes is synchronized at the beginning of each slot, a similar analysis is valid with the change that the period in which no other packet is transmitted is now limited a single slot during which the given packet is transmitted. So for S-ALOHA, s = gp(0) = ge g. By differentiation, the maximum of ge 2g occurs at g = 1/2, so for P-ALOHA, the efficiency is s 1 2e = 18% Similarly, we find that for S-ALOHA, the efficiency is s 1 e So the maximum efficiency of S-ALOHA is twice that of P-ALOHA 36 %

Pure ALOHA -basic model and its analysis (7/7) 0.5 Throughput of ALOHA Slotted ALOHA Pure ALOHA 0.4 S (Throughput per frame time) 0.3 0.2 0.1 0 0 0.5 1 1.5 2 2.5 3 G (attempts per packet time)

A critique of the analysis of ALOHA (1/2) Consider the plot of the departure rate g exp g as a function of the load G (which is the combined rate for the retransmissions of old packets and the transmissions of new packets) for S-ALOHA. As the number of backlogged packets change, the parameter G will change. So to analyze the dynamics of the protocol, we have to take the backlog into account. So the present analysis provides a first, still useful, step in the analysis of the protocol though it ignores the dynamic behaviour of G. ( G is constant in our analysis) The present analysis identifies the maximum throughput rate of S-ALOHA as 1 e (corresponding to g = 1 in ge g )

A critique of the analysis of ALOHA (1/2) Ignoring the dynamic behaviour of g, when the arrival rate λ and the departure rate of successful transmissions ge g are equal, there exists a plausible equilibrium point However, the diagram shows that for two different values of g, the arrival rate λ is equal to the departure rate given by ge g. How do we interpret this observation? The maximum throughput of 1 e corresponding to g = 1 shows that the mean number of attempts per slot should be of the order of 1 (i.e, g close to 1) to get throughput close to the maximum. We walk a tight rope here, as g < 1 implies that too many idle slots are generated whereas g > 1 implies that too many collisions are generated! We now turn to the construction of a more suitable model to capture the dynamics of the backoff- a model based on Markov chains.

Summary We introduced probabilistic models for P-ALOHA and S-ALOHA and analyzed the efficiency of these protocols. The Markov chain model for S-ALOHA plays a crucial role in the stability analysis of the protocol to be discussed next.