Professional Documents
Culture Documents
MULTIPLE ACCESS
TECHNIQUES
A LI O U BA MB A , PHD
PLAN
•INTRODUCTION
•RANDOM ACCESS
•CONTROLLED ACCESS
•CHANNELIZATION
•CONCLUSION
PLAN
•INTRODUCTION
•RANDOM ACCESS
•CONTROLLED ACCESS
•CHANNELIZATION
•CONCLUSION
INTRODUCTION
Multiple-access resolution
INTRODUCTION
• Taxonomy of multiple
Multiple-access protocols
•INTRODUCTION
•RANDOM ACCESS
•CONTROLLED ACCESS
•CHANNELIZATION
•CONCLUSION
RANDOM ACCESS
➢In random access or contention methods,
• No station is superior to another station and none is assigned the control over another.
• No station permits, or does not permit, another station to send.
• At each instance, a station that has data to send uses a procedure to make a decision on whether or not to send.
• The decision depends on the state of the medium.
▪ Pure ALOHA
• Original ALOHA, simple and elegant
• Each station sends a frame whenever it has a frame to send
• Since the channel is shared, there is the possibility of collision between frames from different station
• Need of retransmission in case of collision (when ACK is not received within the time-out)
• If several stations resend their frames after the time-out, this results again in collision. Therefore, a station waits
a random time TB (back-off time) after the time-out to resend his frame.
• To prevent againt congestions, a station must give up (and try later) after a maximum number of attempts Kmax.
RANDOM ACCESS
▪ Pure ALOHA
• Collision and frames in pure ALOHA
Collision duration
RANDOM ACCESS
➢ALOHA
Station has a frame to
Start
▪ Pure ALOHA (procedure) send
Choose a random
number R Wait time-out time
(2*Tp)
Abort Success
RANDOM ACCESS
➢ALOHA
▪ Pure ALOHA (example 1)
The stations on a wireless ALOHA network are a maximum of 600 km apart. If we assume that signals propagate at 3*108 m/s, We find Tp
= (600*105 ) / (3*108 ) = 2 ms.
Now it is straightforward to find the value of TB for different values of K, depending on the outcome of the random number.
RANDOM ACCESS
▪ Pure ALOHA
• Vulnerable time: the length of time in which there is a possibility of collision
B‘s end collides with A‘s A‘s end collides with C‘s
beginning beginning
B
Begin
End
A
End
Begin
C
End
Begin
t t+tfr time
Vulnerable time=2*tfr
RANDOM ACCESS
➢ALOHA
▪ Pure ALOHA (Vulnerable time)
Example: A pure ALOHA network transmits 200-bit frames on a shared channel of 200 kbps. What is the
requirement to make this frame collision-free?
Average frame transmission time tfr is 200 bits/200 kbps or 1 ms. The vulnerable time is therefore 2*1 ms = 2 ms.
RANDOM ACCESS
➢ALOHA
▪ Pure ALOHA (Throughput)
The number of successful transmissions in pure ALOHA is given by:
𝑆 = 𝐺 ∗ 𝑒 −2𝐺 ,
where
S: ratio of successful transmission
G: the average number of frames generated by the system during one frame transmission time.
For instance, Smax=0,184 for G=0,5. This is, if one-half a frame is generated during one frame transmission time, then 18,4 % of these
frames reach their destinations successfully.
RANDOM ACCESS
➢ALOHA
• Earliest random access method (developed in earlier 1970 at the University of Hawaii)
• Designed for a radio LAN, but can be used on any shared medium
• The medium is shared between the stations
▪ Slotted ALOHA
• Low efficiency of pure ALOHA due to its (large) vulnerable time. Slotted ALOHA was invented to improve this.
• Time is divided into slots of tfr and the stations are forced to send only at the beginning of the time slot.
• Of course, two stations may send at the beginning of the same frame, this results in collision
RANDOM ACCESS
▪ Slotted ALOHA
• Collision and frames in slotted ALOHA
A collides with C
B
Begin
End
A
End
Begin
C
End
Begin
t t+tfr time
Vulnerable time=tfr
RANDOM ACCESS
➢ALOHA
• Earliest random access method (developed in earlier 1970 at the University of Hawaii)
• Designed for a radio LAN, but can be used on any shared medium
• The medium is shared between the stations
▪ Slotted ALOHA
• Vulnerable time is reduced to tfr
• Throughput
𝑆 = 𝐺 ∗ 𝑒 −𝐺
A B C D
t1
t2
Area where B‘s
signal exists
A B C D
t1 Vulnerable time =
propagation time =
tp= t2-t1
B senses here
t2
C senses here
D senses here
time time
RANDOM ACCESS
➢Carrier Sense Multiple Access (CSMA)
▪ Persistence methods
• What should a station do if the channel is busy (or idle)?
• Three persistence methods answer these questions.
1. I-persistent
✓ Simple and straightforward
✓ If a station finds the line idle, it sends its frame immediately
✓ Highest chance of collision
2. Non-persistent
✓ A station that wants to send a frame senses the line. If idle, it sends it immediately, if not it waits a random amount of time before
sensing the line again.
✓ Reduce the efficiency of the network
3. P-persistent
✓ After the station finds the line idle:
o The station sends the frame with probability p
o With probability q=1-p, the station waits for the beginning of the next time slot and senses the line again. If the line is idle, it
applies the previous point, if not, it acts as a collision has occurred and uses the back off procedure.
RANDOM ACCESS
➢Carrier Sense Multiple Access (CSMA)
▪ Persistence methods (behavior)
1. I-persistent Sense and
Continuously sense transmit
time
busy
Channel?
Busy
Idle
Idle
Probability
Channel? Wait a slot
outcome
Busy >p ≤p
Use back-off process
Station can transmit
RANDOM ACCESS
➢Carrier Sense Multiple Access with Collision Detection (CSMA/CD)
▪ CSMA does not specify the procedure following a collision
▪ CSMA/CD enhances the algorithm to handle the collision
▪ A station monitors the medium after it sends a frame to ensure the transmission was successful (or
not).
▪ If the transmission is successful, the station is ok? Otherwise, there is a collision and the frame is
sent again
RANDOM ACCESS
➢Carrier Sense Multiple Access (CSMA/CD)
• Collision of the first bit in CSMA/CD
A B C D
t1
t2 Transmission time
Transmission time
t3
t4
A‘s collision, detection and C‘s collision, detection and
abortion Collision occurs abortion
time time
RANDOM ACCESS
➢Carrier Sense Multiple Access (CSMA/CD)
• Collision of the first bit in CSMA/CD
A B C D
A B C D
Collision occurs
t1
Transmission time
t2 Transmission time
t3
t4
A detects collison and
aborts C detects collison and
aborts
time time
RANDOM ACCESS Start Station has a frame to
K=0
No
Yes No
Abort Success
RANDOM ACCESS
➢CSMA/CD
▪ Energy level
Collision
Frame transmission Frame transmission
Energy
▪ Throughput
• Greater than that of pure or slotted ALOHA
• Maximum value depends on G, and the persistence method
RANDOM ACCESS
➢Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA)
▪ Review of basic idea of CSMA/CD, i.e., ability to detect collision while transmitting
▪ CSMA/CD suits for wired networks
▪ Need of avoiding collision, especially in wireless networks, i.e., CSMA/CA
▪ CSMA/CA avoids collisions through the use of three strategies
Size: Binary
Found idle
exponentiel
Continuously sense
IFS
▪ Acknowledgment
✓ Despite the previous precautions, there may still be a collision resulting in destroyed data.
✓ Positive acknowledgment and time-out timer can help guarantee that the receiver has received the frame
RANDOM ACCESS
➢Different networks architecture (IEEE 802,11)
▪ Basic service set (BSS)
✓ Made of stationary or mobile wireless stations and an optional central base station
✓ A BSS with (resp. without) access point (AP) is referred to as an infrastructure (resp. ad hoc) network.
RANDOM ACCESS
➢Different networks architecture (IEEE 802,11)
▪ Basic service set (BSS)
✓ Made of stationary or mobile wireless stations and an optional central base station
✓ A BSS with (resp. without) access point (AP) is referred to as an infrastructure (resp. ad hoc) network.
AP AP AP
LLC
sublayer IEEE 802,11
Data link layer
Contention-free
service
Contention
Point coordination function (PCF) service
MAC
sublayer
Distributed coordination function (DCF)
Physical
Persistence
strategy
No CTS received
Wait back-off time
before time-out
Yes
No
Yes
Yes
Abort Success
RANDOM ACCESS
➢Hidden station problem
•INTRODUCTION
•RANDOM ACCESS
•CONTROLLED ACCESS
•CHANNELIZATION
•CONCLUSION
CONTROLLED ACCESS
▪ Stations consult each other to find which station has the right to send
▪ A station cannot send unless it has been authorized by other stations
▪ There are three popular controlled-access methods
CONTROLLED ACCESS
➢Reservation
▪ A station needs to make a reservation before sending data
▪ Time is divided into intervals. In each interval, a reservation frame precedes the data to be sent in
that interval
▪ For N stations in the system, there are exactly N reservations minislots in the reservation frame.
▪ Reservation access method
1 23 4 5
Reservation frame
CONTROLLED ACCESS
➢Polling
▪ Works with topologies in which one device is designated as primary whereas the other are secondary
stations
▪ The primary device controls the link while the secondary devices follow its instructions.
▪ It is up to the primary station to determine which station is allowed to used the channel at a given
time.
▪ Select mode (the primary device has something to send)
▪ The primary must alert the secondary to the upcoming transmission and wait for an ACK of the secondary‘s
ready status.
▪ Before sending the data, the primary creates a SEL frame
▪ Poll mode
▪ Use by the primary to solicit transmissions from the secondary devices
▪ When ready to receive data, it polls each device if it has something to send
▪ If no data to send, the secondary sends a NAK frame, otherwise it send the data frame. The primary reads the
frame and ACK the reception.
CONTROLLED ACCESS
➢Polling
▪ Select and poll functions
Primary Secondary Secondary Primary Secondary Secondary
Poll
SEL
NACK
ACK
Poll
DATA
Data
ACK
ACK
CONTROLLED ACCESS
➢Token passing
▪ Stations in the networks are organized in a logical ring
▪ The right to send data is obtained from a predecessor and passed to the successor
▪ A special packet called token gives the right to access the channel
▪ Stations must be limited in the time they possess the token. Token management is hence required.
▪ Another type of token is to assign priorities to the stations and to the types of data being transmitted
CONTROLLED ACCESS
➢Token passing
▪ Logical ring
▪ Stations do have to necessarily be physically connected in a ring
▪ Several physical topologies to create a logical ring
1 2 1 2
4 3 4 3
1 2 1 2
Hub
4 3 4 3
PLAN
•INTRODUCTION
•RANDOM ACCESS
•CONTROLLED ACCESS
•CHANNELIZATION
•CONCLUSION
CHANNELIZATION
▪ Multiple access method wherein the available bandwidth of a link is shared in time, frequency, or
through code between different stations
▪ Three channelization protocols are discussed : FDMA, TDMA, and CDMA
CHANNELIZATION
➢Frequency-Division Multiple Access (FDMA)
▪ The available bandwidth is divided into frequency bands
▪ Each band is allocated all the time to a specific station
▪ Each station uses a bandpass filter to confine the transmitter frequencies
▪ To prevent station interferences, the allocated bands may be separated from one another by small
guard bands
CHANNELIZATION
➢Frequency-Division Multiple Access (FDMA)
▪ The data link layer in each station tells its PHY to make a bandpass signal from the data
Data f Data f
1 2
t t
f
Common
channel
f f
3 4
Data Data
CHANNELIZATION
➢Time-Division Multiple Access (TDMA)
▪ The available bandwidth is allocated to all the stations
▪ Each station is allocated a time slot during which it can send data
▪ Synchronization problems occur in TDMA
▪ Knowing the beginning and exact location of the slots may be difficult due to extra delays introduced
in the system
▪ To compensate this, guard times can be inserted
▪ Synchronization is normally achieved by having some synchronization bits, i.e., preamble bits
CHANNELIZATION
➢Time-Division Multiple Access (TDMA)
▪ The data link layer in each station tells its PHY to use the allocated time slot
Data f Data f
1 2
t t
f
Common
channel
f f
3 4
Data Data
CHANNELIZATION
➢Code-Division Multiple Access (CDMA)
▪ CDMA means communications with different codes
▪ Each station is assigned a code that multiplies the data prior to be send on the common channel
▪ At the reception, a station multiplies the common data with its code to recover (or not) the
transmitted
▪ CDMA is based on coding theory, and is based on chips (sequence of numbers)
▪ Codes in CDMA
✓ CDMA is based on coding theory, and is based on chips (sequence of numbers)
✓ Each station is assigned a code
CHANNELIZATION
➢Code-Division Multiple Access (CDMA)
▪ Chips sequence
✓ CDMA is based on coding theory, and is based on chips (sequence of numbers)
✓ Each station is assigned a code
▪ Each sequence is made of N elements or chips, where N is the number of stations
▪ The codes are orthogonal, i.e., orthogonal sequences
▪ When a sequence is multiplied by a number, every element is multiplied by that element, i.e.,
multiplication of a sequence by a scalar
▪ Adding two sequences gives rises to another sequence
CHANNELIZATION
➢Code-Division Multiple Access (CDMA)
▪ Example: Assume four stations connected to the same channel with data (resp. codes) d1, d2, d3, d4
(resp. c1, c2, c3, c4)
✓ C1=+1 +1 +1 +1
✓ C2=+1 -1 +1 -1
✓ C3=+1 +1 -1 -1
✓ C4=+1 -1 -1 +1
✓ 2.C1=+2 +2 +2 +2
✓ C3,C3=4
✓ C3,C1=0
✓ C3+C3=+2 +2 0 0
▪ Data representation in CDMA
✓ If station needs to send a 0 (resp. 1) bit, it is encoded as a -1 (resp. +1)
✓ When a station is idle, it sends no signal, interpreted as a 0
CHANNELIZATION
➢Code-Division Multiple Access (CDMA)
d1
d2
1 2 Common
d1,c1 d2,c2 channel
Data = 𝑑1 𝑐1 + 𝑑2 𝑐2 + 𝑑3 𝑐3 + 𝑑4 𝑐4
d3,c3 d4,c4
3 4
d3 d4
d1
d2
1 2
Canal
d1.c1 d2.c2 commun
Data = 𝑑1 𝑐1 + 𝑑2 𝑐2 + 𝑑3 𝑐3 + 𝑑4 𝑐4
d3.c3 d4.c4
3 4
d3 d4
CHANNELIZATION
➢Code-Division Multiple Access (CDMA)
▪ Data encoding and decoding (example)
✓ Consider the previous figure, where station 1 and 2 send a 0 bit, station 3 is silent, and station 4 sends a 1 bit.
✓ Therefore, the transmitted data is respectively -1 -1 0 +1
✓ We assume that all stations are synchronized
✓ The sequence of the channel is the sum of all four sequences as defined before
CHANNELIZATION
➢Code-Division Multiple Access (CDMA)
bit 0 bit 0
d1=-1 d2=-1
1 2 Common
d1,c1=-1 -1 -1 -1 d2,c2=-1 +1 -1 +1 channel
Data = -1 -1 -3 +1
d3,c3=0 0 0 0 d4,c4=+1 -1 -1 +1
3 4
d3=0 d3=+1
silent bit 1
Canal
commun
bit 0 bit 0
d1=-1 d2=-1
1 2
d1.c1=-1 -1 -1 -1 d2.c2=-1 +1 -1 +1
Data = -1 -1 -3 +1
d3.c3=0 0 0 0 d4.c4=+1 -1 -1 +1
3 4
d3=0 d3=+1
silent bit 1
CHANNELIZATION
➢Code-Division Multiple Access (CDMA)
▪ Sequence generation
✓ We use a Walsh table, which is a two dimensional table with an equal number of rows and columns.
✓ Each row is a sequence of chips
✓ According to Walsh, if we know the table for N sequences, we can create the table for 2N sequences as
follow:
𝑊𝑁 𝑊𝑁
𝑊1 = +1 𝑊2𝑁 =
𝑊𝑁 𝑊𝑁
•INTRODUCTION
•RANDOM ACCESS
•CONTROLLED ACCESS
•CHANNELIZATION
•CONCLUSION
CONCLUSION (1/4)
▪ There are several protocols to handle access to a shared medium. We categorize them into three
groups of protocols: random access, controlled access, and channelization
▪ In random access or contention methods, no station is superior to another, and none is assigned the
control over another
▪ ALOHA is a simple multiple access wherein there are potential collisions, resulting in poor
performances
▪ CSMA was developed to minimize the collision risks and therefore increase the throughput. The is
performed by sensing the medium prior to send data
▪ To avoid collision on wireless networks, CSMA/CA is introduced. Collision are avoided by the use of the
IFS, contention window and ACK
CONCLUSION (2/4)
▪ In controlled access, the stations consult one another to find which stations has to right to send.
▪ In the reservation access method, a station needs to make a reservation before sending the data. Time
is divided into intervals.
▪ In polling method, all data exchanges must be made through the primary device, which controls the
link. The secondary devices follow its instructions
▪ In the token-passing method, the stations in a network are organized in a logical ring. A special packet
called token circulates through the ring
CONCLUSION (3/4)
▪ Channelization is a multiple access method in which the available bandwidth is shared in time,
frequency, or through code, between the different stations
▪ In FDMA, the available bandwidth is divided into frequency bands. Each station is allocated a band for
its transmissions, for all the time
▪ In TDMA, the stations share the bandwidth of the channel in time. Each station is allocated a time slot
wherein it can use all the bandwidth to send (or receive) data
▪ In CDMA, the stations use different codes to achieve multiple access. CDMA uses sequences of
numbers called chips. The sequence are orthogonal and generated using i.e., the Walsh table.
CONCLUSION (4/4)
▪ The IEEE 802,11 standard defines two services: BSS and ESS
▪ Three types of stations mobility in a wireless LAN architecture
▪ The MAC sublayer is comprised of two functions: PCF and DCF
▪ Wireless LAN uses management and control frames to avoid collision
▪ The management of collisions give rise to hidden and exposed stations problems