Professional Documents
Culture Documents
Protocol Layers
Presentation Upper
Layer
Session Protocols
Transport TCP
Network IP Layer
Logical Link Control Scope of most
Data Link
Medium Access Control standards
Physical Physical
Medium Medium
Power
… Si Sj Sk Sl Sm … …
Time
Tim e Frequency
Time
Power
Frequency
R/N
R
Time Frequency
frequency
subcarriers are orthogonal and
subchannels do not interfere with one another
Spectrum of an OFDM
signal with
multiple subchannels
frequency
QAM N
Demod 1 Mux
N2
Received Guard interval Parallel to serial High speed
FFT
OFDM signal removal conversion data stream
….
Nn
CK Tham, ECE 9
QAM
Polling
• Central controller sends polling messages to each station in a logically
arranged sequence.
• When station receives polling message addressed to it, then it transmits data
to central controller followed by go-ahead message to indicate it has
completed its transmission.
• Polling sequence is repeated.
1
Central
2
Controller
M
ALOHA
• Developed by University of Hawaii (1971)
• Node sends packet and waits for acknowledgement
• Total delay from Base 1 to Base 2 is:
ALOHA (cont.)
• Packet transmission algorithm at each station
Packet No
Ready
?
Yes
Transmit
Delay k packet
transmission
Wait 2-way times
propagation
delay
P (0) e 2Ttxm
dS
• Differentiating S w.r.t. and setting to 0, i.e. 0 , we obtain:
d
max 1 / (2Ttxm )
1
S max packets/s
2Ttxm e
ALOHA (cont.)
• Now Ttxm is packet duration, so:
Traffic offered A = maxTtxm
= (0.5/Ttxm).Ttxm
= 0.5 erlang
• Retransmission traffic
= Offered traffic
– Actual carried traffic
= 0.5 - 1/(2e)
= 0.316 erlang
Note: Traffic Intensity (erlang) = Ave. request rate x Service holding time
Packet No
Ready
?
Yes
Delay to
beginning of next
slot
Transmit
Delay k packet
transmission
Wait 2-way
times
propagation
delay, aligned to
slot time
SS Aloha e Ttxm
dSS Aloha 1 1
0 SS Aloha, max and S Aloha, max
d eTtxm Ttxm
1
Traffic carried SS Aloha, max .Ttxm
e
Packet No
Ready
?
Yes
A
Carrier sense C
strategy
B
Delay to beginning of
consider slotted case
next slot
Channel C
busy?
p-Persistent CSMA
• 2 constants used for this algorithm A
= maximum propagation delay between 2 stations
p = specified probability
• No “C” connection used
Channel
• p-persistence algorithm works as follows: busy?
Yes
If channel is sensed idle, a random
number uniformly distributed on [0,1] No
is chosen. If selected number is less
than or equal to p, the packet is Select random
transmitted; if not, station waits number, r, from [0,1]
seconds and repeats the algorithm
If channel is busy, station persists in
sensing the channel until it is found
to be idle and then proceeds as Delay
No
r p?
described above seconds
Yes
CSMA-CA (cont.)
The CSMA-CA MAC works as follows:
Part 1 – Before Transmitting
• If channel is idle for more than a Distributed coordination function Inter-
Frame Space (DIFS) time and the backoff counter is zero, a station can
transmit immediately
• If channel is busy, the station generates a random backoff period that is
uniformly distributed from 0 to current Contention Window (CW) size.
• At the initial backoff stage, the current CW is set at the minimum contention
window (CWmin) size.
• Backoff counter decrements by 1 if channel is idle for each time slot and
freezes if channel is sensed busy.
• Backoff counter is re-activated to count down when channel is sensed idle
for more than DIFS time.
• If backoff counter reaches 0, station will attempt to transmit.
DIFS
Medium
Busy
SIFS
Backoff
Window Frame
Idle
Time
CK Tham, ECE NUS 24
CSMA-CA (cont.)
Part 2 – After Transmitting
• If successful, the destination station sends an acknowledgement after a
Short Inter-Frame Space (SIFS) time and the current CW size is reset to
CWmin.
• If a station does not receive an acknowledgement within an
acknowledgement timeout period after a frame is transmitted,
i.e. it is not successful, it will increase the current contention window CW
size by doubling it plus one (until a maximum contention window (CWmax)
size is reached) in the next backoff stage and a new random backoff period
is selected as before.
• This process repeats itself until the packet is successfully transmitted or until
the maximum retry limit is reached. If the packet is still not successfully
transmitted, then it is dropped.
CSMA-CA (cont.)
CWmax
CWmin
4th retransmission
3rd retransmission
2nd retransmission
1st retransmission
Initial attempt
Medium
busy
ACK ACK
Station 0
time
DIFS DIFS
Packet
Station 1
time
3 SIFS
Packet arrival,
backoff counter = 3
Packet
Station 2
time
2 SIFS
Packet arrival, backoff counter = 5
A B C
Exposed node problem: Occurs when a node is prevented from sending packets
to other nodes due to a neighbouring transmitter.
A B C
• IEEE 802.11 solves the hidden node problem by using the RTS/CTS
mechanism found in the four-way handshaking access method.
• In the figure, B may receive RTSs from both A and C, and decides to
respond only to A by sending a CTS to A.
• C will also receive the CTS meant for A, which it will take to mean that B is
currently busy with a hidden node.
• C will continue to sense B until it becomes idle again.