Professional Documents
Culture Documents
Networks
1
Disclaimer Statement
In preparation of these slides, materials have been taken from
different online sources in the shape of books, websites,
research papers and presentations etc. However, the author
does not have any intention to take any benefit of these in
her/his own name. This lecture (audio, video, slides etc) is
prepared and delivered only for educational purposes and is not
intended to infringe upon the copyrighted material. Sources
have been acknowledged where applicable. The views
expressed are presenter’s alone and do not necessarily
represent actual author(s) or the institution.
3
Channel Access
Schemes
Channel Access Schemes
– Random access
• Any advantage or disadvantage … ?
Control Based Access
• Controlling entity
– Responsible for fair distribution of channel among nodes
• Network nodes
– No (or little) responsibility to control access to channel
– Have more resources available to manage their own data
• Major constraint
– Each node must maintain a reliable connection with the
central entity
– Very difficult to employ in a multi-hop network!
Random Access Schemes
• No concept of central entity
– Independent nodes compete for channel when needed
– Each node decides itself how and when to transmit
• Two or more transmitting nodes -> collision
– When node has pkt to send, transmit at channel rate R
– No a priori coordination among nodes
• Main challenge is to avoid or minimize collisions
– Random access MAC protocol specifies how to detect
collisions, and then how to recover from collisions
(delayed retransmissions?)
Ideal Multiple Access Protocol
Broadcast channel of rate R bps
1. When one node wants to transmit, it can send at
rate R.
2. When M nodes want to transmit, each can send at
average rate R/M
3. Fully decentralized:
– no special node to coordinate transmissions
– no synchronization of clocks, slots
4. Simple
Some Terminologies
• Contention systems
– Systems in which multiple users share a common channel
in a way that can lead to conflicts
• Throughput
– The maximum continuous traffic rate that a device can
handle without dropping a single packet.
– Measured in terms of the number of frames per second at
a given frame size
• Frame Time
– Time used to transmit a frame (frame_size/data rate)
Channel Access
• Three main key words for design of multiple
access schemes:
– Flexibility
– Quality
– Fairness
Taxonomy of MAC Protocols
• What can be the different and distinguishable
approaches to access the wireless channel?
time
Time Division Multiple Access
(TDMA)
• Divide time into multiple slots (n channels)
– Station gets a slot (length=pkt trans time) in each round
– User accesses full bandwidth, but only for 1/n of time
– Reserved or fixed and dynamic, on-demand assignment
– One channel could be reserved for control functions
• Node send in a defined slot to each flow direction
– Access to channel in ‘rounds’, unused slots go idle
– Example: 6-station LAN, 1,3,4 have pkt, slots 2,5,6 idle
Code Division Multiple Access
(CDMA)
• Multiple orthogonal codes to partition the spectrum
– n channels defined by assigning n codes, 1 each to n users
– Same freq, but unique chipping sequence to encode data
– Code is used to ‘spread’ the spectrum of transmission
– Each data bit (symbol) is transmitted by sending the code
• Receiver correlate code to received data to decode it
– encoded signal = original data x chipping sequence
– decoding: product of encoded signal x chipping sequence
Code Division Multiple Access
(CDMA)
TDMA, FDMA and CDMA
Channel Access in Cellular
Telephony
• First generation
– Capacity sharing based on FDMA, analog
voice+signaling
• 2G: Capacity sharing based on TDMA or CDMA
– Digital voice+control signaling, encryption, error correctn
– Bandwidth allocated when needed (idle, dedicated mode)
• 3G standard based on wideband CDMA
– 5 MHz carrier as compared with 200 kHz for narrowband
• 3G “widens the data pipe”
– Typically require different access and routing strategies
• Data is bursty, whereas voice is continuous, both packet switched
Orthogonal Frequency Division
Multiple Access (OFDMA)
• OFDMA divides a signal into sub-channels
– Using OFDMA/TDMA, sub channels allocated in
freq domain, and OFDM symbols in time domain
– Each sub-channel allocated to different subscriber
– Sub-channels can be combined from diff carriers
Random Access
Schemes
Channel Allocation Problem
• Static channel allocation in LAN/MAN
– Issues with FDM or TDM
• Fewer than N users
– Valuable chunk of time (TDM) or bandwidth (FDM) wasted
• More than N users
– Some users are denied access (even if another user is idle)
• Exactly N users
– Idle users waste bandwidth e.g. bursty traffic (worst of both)
• Dynamic channel allocation in LANs/MANs
Assumptions for Dynamic Channel
Allocation
• Station model
– N independent stations generate frames, blocked in access
• Single channel assumption
– Single channel for communication, stations are equivalent
• Collision assumption
– If two frames transmitted simultaneously, overlap in time,
result in a garbled signal; all stations can detect collisions
• Time assumption
– Continuous time or slotted time
• Carrier assumption
– Carrier Sense (LAN) or no Carrier Sense (Satellite)
Multiple Access Schemes
• Single shared broadcast channel
– Two or more simultaneous transmissions: interference
– Only one node can send successfully at a time
A multiple access protocol is characterized as follows:
• Distributed algorithm determines sharing of channel
– i.e. to determine how and when node can transmit
• Communication about channel sharing must use
channel itself!
• Scheduled or contention-based TDM
– Typically used in LANs, wireless and wired
– Contention-based, or explicitly / implicitly scheduled
TDM Based Schemes
• Contention Based TDM Schemes
– Aloha and Slotted Aloha
– Carrier Sense Multiple Access (CSMA)
– Multiple Access with Collision Avoidance (MACA)
– MACA for Wireless (MACAW)
– Inhibit Sense Multiple Access (ISMA)
• Reservation Based TDM Schemes
– Polling
– Reservation TDMA
– Demand Assigned Multiple Access (DAMA)
– Packet Reservation Multiple Access (PRMA)
Contention-based Multiple
Access
• FDMA, TDMA and CDMA are all scheduled
multiple access schemes
– Need distributed or centralized scheduling algorithm
– Overhead for scheduling
• Contention-based or “free-for-all” schemes are
probabilistic
– Transmission may succeed or fail due to “collision”
– Collisions delay transmission and waste capacity
Contention or ‘Free-for-all’
Approach - Distributed
• ALOHA (Pure and slotted)
• Carrier Sense Multiple Access (CSMA)
– 1-persistent, non-persistent and p-persistent
– CSMA/CD (Ethernet)
• CSMA with Collision Avoidance (CSMA/CA)
• Elimination Yield Non-Preemptive Multiple Access (EY-
NPMA)
• Collision-Free Protocols
– Bitmap protocol
– Binary countdown
• Limited-Contention Protocols
– Contention when load is light, collision-free when load is heavy
Collision-Free Protocols
• Assumption
– N stations with unique address, propagation delay is negligible
• Bit-map protocol
– A reservation protocol: the desire to transmit is broadcasted before
the actual transmission
• Binary countdown
Limited-Contention Protocols
• ALOHA
– Low load: improved efficiency
– High load: high delay
• Collision-free protocols
– Low load: high delay
– High load: improved efficiency
• New protocol? – limited contention protocol
– Uses contention at low load
– Uses collision-free at high load
ALOHA
• 1971 by Norman Abramson, Univ. of Hawaii
– Extremely simple scheme, no coordination of medium
access, no resolution if there are collisions
• Stations attempt to transmit randomly (users
transmit whenever they have data)
– Collision if transmission of two or more stations overlap
– Hosts wait a timeout for an ACK, if no ACK received
within timeout, assume ‘collision’
– When collision occurs, wait for a random amount
of time (to avoid repeated collisions) and then
retransmit
Aloha
• Wasted time due to collision is 2 packet intervals
• Probability of collision increases with number of
transmitting nodes
– Assuming Poisson arrivals, maximum throughput
achieved at 18% load
– pkt sent at t0 collide with other pkts sent in [t0-1, t0+1]
ALOHA – Performance
Analysis
• Poisson process (1837)
– Simplest model for arrivals
into a queue system
– the probability of an arrival
in a small interval of time
depends only on the size of
the interval
– The probability that k
frames are generated during
a given frame time follows
the Poisson distribution
Slotted ALOHA
• Improvement over classical Aloha, 1972 by Roberts
– No coordination of medium access or resolution of
collisions (like Aloha)
– Divide time into discrete intervals; all transmitters are
synchronized to define fixed time slots (pkt trans time)
• Stations attempt to transmit only at the beginning of
next time slot
– Transmissions of two or more stations overlap
=‘collision’
– If collision: retransmit packet in future slots with
probability p, until successful
Slotted Aloha
• Collision are confined to one time slot
– Wasted time due to a collision = 1 packet interval
• Collision occurs if two or more stations receive new
packets during the preceding time slot
– Max throughput achieved at 36% load, for Poisson arrivals
– Doubles the maximum throughput
start start
transmission at transmission at
time 0 time T