4.1 THE CHANNEL ALLOCATION PROBLEM THE CHANNEL ALLOCATION PROBLEM : how to allocate a single broadcast channel among competing users. The channel might.

Slides:



Advertisements
Similar presentations
Chapter Thirteen: Multiplexing and Multiple- Access Techniques.
Advertisements

14-MAC Sub-layer Dr. John P. Abraham Professor UTPA.
EECC694 - Shaaban #1 lec #5 Spring Data Link In Broadcast Networks: The Media Access Sublayer Broadcast networks with multi-access (or random.
1 The Medium Access Control Sublayer Chapter 4. 2 The Medium Access Control Sublayer This chapter deals with broadcast networks and their protocols. In.
Multiple access What if multiple machines are sharing the same link?
Multiple Access Methods. When nodes or stations are connected and use a common link (cable or air), called a multipoint or broadcast link, we need a.
1 Pertemuan 13 Teknik Akses Jaringan - Random Matakuliah: H0174/Jaringan Komputer Tahun: 2006 Versi: 1/0.
EEC-484/584 Computer Networks Lecture 7 Wenbing Zhao
MAC Protocols Media Access Control (who gets the use the channel) zContention-based yALOHA and Slotted ALOHA. yCSMA. yCSMA/CD. TDM and FDM are inefficient.
CS 5253 Workshop 1 MAC Protocol and Traffic Model.
EEC-484/584 Computer Networks Lecture 13 Wenbing Zhao
EEC-484/584 Computer Networks Lecture 9 Wenbing Zhao (Part of the slides are based on materials supplied by Dr. Louise Moser at UCSB and.
EEC-484/584 Computer Networks Lecture 7 Wenbing Zhao
Teknik Akses Jaringan - Non Carrier Sense Pertemuan 11 Matakuliah: H0484/Jaringan Komputer Tahun: 2007.
CMPE 150- Introduction to Computer Networks 1 CMPE 150 Fall 2005 Lecture 16 Introduction to Computer Networks.
EEC-484/584 Computer Networks Lecture 13 Wenbing Zhao
EEC-484/584 Computer Networks Lecture 9 Wenbing Zhao (Part of the slides are based on materials supplied by Dr. Louise Moser at UCSB and.
Studying Local Area Networks Via Media Access Control (MAC) SubLayer
CS 5253 Workshop 1 MAC Protocol and Traffic Model.
Networks: Local Area Networks1 LANs Studying Local Area Networks Via Media Access Control (MAC) SubLayer.
EEC-484/584 Computer Networks Lecture 7 Wenbing Zhao
Medium Access Control Sublayer
1 SATELLITE NETWORKS 이 은 진. 2 Contents Introduction Polling ALOHA FDM(Frequency-Division Multiplex) TDM(Time-Division Multiplex) CDMA(Code.
1 ECE453 – Introduction to Computer Networks Lecture 7 – Multiple Access Control (I)
CIS 725 Media Access Layer. Medium Access Control Sublayer MAC sublayer resides between physical and data link layer Broadcast/multiacess channels N independent.
Data Comm. & Networks Instructor: Ibrahim Tariq Lecture 3.
Chi-Cheng Lin, Winona State University CS412 Introduction to Computer Networking & Telecommunication Medium Access Control Sublayer.
CHAPTER 4: THE MEDIUM ACCESS SUBLAYER 4.1: The Channel Allocation Problem 4.2: Multiple Access Protocols.
جلسه دهم شبکه های کامپیوتری به نــــــــــــام خدا.
Medium Access Control NWEN302 Computer Network Design.
Chi-Cheng Lin, Winona State University CS 313 Introduction to Computer Networking & Telecommunication Medium Access Control Sublayer.
Cyclic Redundancy Check (CRC).  An error detection mechanism in which a special number is appended to a block of data in order to detect any changes.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2000 Unit-II Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Medium Access Control Sub Layer
CS3502: Data and Computer Networks Local Area Networks - 1 introduction and early broadcast protocols.
5: DataLink Layer 5a-1 Multiple Access protocol. 5: DataLink Layer 5a-2 Multiple Access Links and Protocols Three types of “links”: r point-to-point (single.
CS3502: Data and Computer Networks Local Area Networks - 1 introduction and early broadcast protocols.
Chapter 4 The Medum Access Sublayer. MA Sublayer Additional Reference –Local and Metropolitan Area Networks, William Stallings, Prentice Hall, 2000, 6th.
THE MEDIUM ACCESS CONTROL SUBLAYER 4.1 THE CHANNEL ALLOCATION PROBLEM 4.2 MULTIPLE ACCESS PROTOCOLS.
COMPUTER NETWORKS Data-link Layer (The Medium Access Control Sublayer) MAC Sublayer.
THE MEDIUM ACCESS CONTROL SUBLAYER 4.1 THE CHANNEL ALLOCATION PROBLEM 4.2 MULTIPLE ACCESS PROTOCOLS.
Multiple Access By, B. R. Chandavarkar, CSE Dept., NITK, Surathkal Ref: B. A. Forouzan, 5 th Edition.
CS 5253 Workshop 1 MAC Protocol and Traffic Model.
Week3 The Medium Access Sublayer
Multiple Access Methods
CT301 lecture7 10/29/2015 Lect 7 NET301.
Bandwidth Utilization (Multiplexing and Spectrum Spreading)
Data link layer divided into two functionality-oriented sublayers
CT301 LECTURE 8.
Part III Datalink Layer 10.
Module 3 Medium Access Control.
Multiple Access Problem: When two or more nodes transmit at the same time, their frames will collide and the link bandwidth is wasted during collision.
Computer Communication Networks
Multiple Access Mahesh Jangid Assistant Professor JVW University.
Channel Allocation (MAC)
Net301 lecture9 11/5/2015 Lect 9 NET301.
THE IEEE MAC SUB-LAYER – chapter 14
Multiple Access Methods
CT301 lecture7 10/29/2015 Lect 7 NET301.
The Medium Access Control Sublayer
Channel Allocation Problem/Multiple Access Protocols Group 3
Link Layer and LANs Not everyone is meant to make a difference. But for me, the choice to lead an ordinary life is no longer an option 5: DataLink Layer.
Channel Allocation Problem/Multiple Access Protocols Group 3
CSE 313 Data Communication
Multiple Access Methods
Dr. John P. Abraham Professor UTPA
Multiple Access Control (MAC) Protocols
Part III Datalink Layer 10.
Chapter 12 Media Access Control (MAC)
Chapter 12 Media Access Control (MAC)
Presentation transcript:

4.1 THE CHANNEL ALLOCATION PROBLEM THE CHANNEL ALLOCATION PROBLEM : how to allocate a single broadcast channel among competing users. The channel might be a portion of the wireless spectrum in a geographic region, or a single wire or optical fiber to which multiple nodes are connected. 2 Dr Loai Bani Melhim

4.1.1 Static Channel Allocation The traditional way of allocating a single channel among multiple competing users is to chop up its capacity by using one of the multiplexing schemes such as FDM (Frequency Division Multiplexing). If there are N users, the bandwidth is divided into N equal-sized portions, with each user being assigned one portion. Since each user has a private frequency band, there is no interference among users. 3 Dr Loai Bani Melhim

4.1.1 Static Channel Allocation When there is only a small and constant number of users, each of which has a steady stream or a heavy load of traffic, this division is a simple and efficient allocation mechanism. A wireless example is FM radio stations. Each station gets a portion of the FM band and uses it most of the time to broadcast its signal. 4 Dr Loai Bani Melhim

4.1.1 Static Channel Allocation However, when the number of senders is large and varying or the traffic is bursty, FDM presents some problems. – If the spectrum is cut up into N regions while fewer than N users are currently interested in communicating, a large piece of valuable spectrum will be wasted. – If more than N users want to communicate, some of them will be denied permission for lack of bandwidth. – Even if the number of users held constant at N; dividing the single available channel into some number of static subchannels is inherently inefficient. The basic problem is that when some users are quiescent, their bandwidth is simply lost. They are not using it, and no one else is allowed to use it either. 5 Dr Loai Bani Melhim

4.1.1 Static Channel Allocation A static allocation is a poor fit to most computer systems, in which data traffic is extremely bursty, often with peak traffic to mean traffic ratios of 1000:1. Consequently, most of the channels will be idle most of the time. 6 Dr Loai Bani Melhim

4.2 MULTIPLE ACCESS PROTOCOLS MULTIPLE ACCESS :enabling many devices to gain access to the channel at the same time ALOHA: Use short-range radios, with each user terminal sharing the same upstream frequency to send frames to the central computer. It included a simple and elegant method to solve the channel allocation problem. Their work has been extended by many researchers since then (Schwartz and Abramson, 2009). Although Abramson’s work, called the ALOHA system, used ground based radio broadcasting, the basic idea is applicable to any system in which uncoordinated users are competing for the use of a single shared channel. 7 Dr Loai Bani Melhim

4.2 MULTIPLE ACCESS PROTOCOLS Two versions of ALOHA – Pure : time is continuous – Slotted: Time is divided into discrete slots into which all frames must fit. 8 Dr Loai Bani Melhim

Pure ALOHA The basic idea of an ALOHA system is simple: let users transmit whenever they have data to be sent. There will be collisions, of course, and the colliding frames will be damaged. Senders need some way to find out if this is the case. In the ALOHA system, after each station has sent its frame to the central computer, this computer rebroadcasts the frame to all of the stations. A sending station can thus listen for the broadcast from the hub to see if its frame has gotten through. In other systems, such as wired LANs, the sender might be able to listen for collisions while transmitting. 9 Dr Loai Bani Melhim

Pure ALOHA If the frame was destroyed, the sender just waits a random amount of time and sends it again. The waiting time must be random or the same frames will collide over and over, in lockstep. Systems in which multiple users share a common channel in a way that can lead to conflicts are known as contention systems. A sketch of frame generation in an ALOHA system is given in Fig Dr Loai Bani Melhim

Pure ALOHA Whenever two frames try to occupy the channel at the same time, there will be a collision (as seen in Fig. 4-1) and both will be garbled. If the first bit of a new frame overlaps with just the last bit of a frame that has almost finished, both frames will be totally destroyed and both will have to be retransmitted later. 11 Dr Loai Bani Melhim

Pure ALOHA 12 Dr Loai Bani Melhim

Slotted ALOHA Divide time into discrete intervals called slots, each interval corresponding to one frame. In Slotted ALOHA station is not permitted to send whenever the user types a line. Instead, it is required to wait for the beginning of the next slot. Thus, the continuous time ALOHA is turned into a discrete time one. 13 Dr Loai Bani Melhim