Channel Allocation Problem/Multiple Access Protocols Group 3

Slides:



Advertisements
Similar presentations
14-MAC Sub-layer Dr. John P. Abraham Professor UTPA.
Advertisements

Channel Allocation Protocols. Dynamic Channel Allocation Parameters Station Model. –N independent stations, each acting as a Poisson Process for the purpose.
EECC694 - Shaaban #1 lec #5 Spring Data Link In Broadcast Networks: The Media Access Sublayer Broadcast networks with multi-access (or random.
Fundamentals of Computer Networks ECE 478/578
Multiple access What if multiple machines are sharing the same link?
Multiple Access Methods. When nodes or stations are connected and use a common link (cable or air), called a multipoint or broadcast link, we need a.
1 K. Salah Module 4.2: Media Access Control The Media Access Control (MAC) sublayer –Random Access (CSMA), IEEE –Token Passing, IEEE Ch 13-
1 Pertemuan 13 Teknik Akses Jaringan - Random Matakuliah: H0174/Jaringan Komputer Tahun: 2006 Versi: 1/0.
Wireless & Mobile Networking: Multiple Radio Access Azizol Bin Abdullah (A2.04) Rujukan: Text Book Chapter 6.
MAC Protocols Media Access Control (who gets the use the channel) zContention-based yALOHA and Slotted ALOHA. yCSMA. yCSMA/CD. TDM and FDM are inefficient.
CS 5253 Workshop 1 MAC Protocol and Traffic Model.
Copyright © 2003, Dr. Dharma P. Agrawal and Dr. Qing-An Zeng. All rights reserved. 1 Chapter 6 Multiple Radio Access.
CMPE 150- Introduction to Computer Networks 1 CMPE 150 Fall 2005 Lecture 16 Introduction to Computer Networks.
EEC-484/584 Computer Networks Lecture 13 Wenbing Zhao
EEC-484/584 Computer Networks Lecture 9 Wenbing Zhao (Part of the slides are based on materials supplied by Dr. Louise Moser at UCSB and.
Semester EEE449 Computer Networks The Data Link Layer Part 2: Media Access Control En. Mohd Nazri Mahmud MPhil (Cambridge, UK) BEng (Essex,
Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011 The Medium Access Control Sublayer Chapter.
Medium Access Control Sublayer
1 ECE453 – Introduction to Computer Networks Lecture 7 – Multiple Access Control (I)
Multiple Access Protocols Chapter 6 of Hiroshi Harada Book
Chi-Cheng Lin, Winona State University CS412 Introduction to Computer Networking & Telecommunication Medium Access Control Sublayer.
Chapter 4: Medium Access Control (MAC) Sublayer
CHAPTER 4: THE MEDIUM ACCESS SUBLAYER 4.1: The Channel Allocation Problem 4.2: Multiple Access Protocols.
LECTURE9 NET301. DYNAMIC MAC PROTOCOL: CONTENTION PROTOCOL Carrier Sense Multiple Access (CSMA): A protocol in which a node verifies the absence of other.
جلسه دهم شبکه های کامپیوتری به نــــــــــــام خدا.
Chi-Cheng Lin, Winona State University CS 313 Introduction to Computer Networking & Telecommunication Medium Access Control Sublayer.
جلسه یازدهم شبکه های کامپیوتری به نــــــــــــام خدا.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2000 Unit-II Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
4: DataLink Layer1 Multiple Access Links and Protocols Three types of “links”: r point-to-point (single wire, e.g. PPP, SLIP) r broadcast (shared wire.
Medium Access Control Sub Layer
5: DataLink Layer 5a-1 Multiple Access protocol. 5: DataLink Layer 5a-2 Multiple Access Links and Protocols Three types of “links”: r point-to-point (single.
Ch 12. Multiple Access. Multiple Access for Shared Link Dedicated link – Point-to-point connection is sufficient Shared link – Link is not dedicated –
LECTURE9 NET301 11/5/2015Lect 9 NET DYNAMIC MAC PROTOCOL: CONTENTION PROTOCOL Carrier Sense Multiple Access (CSMA): A protocol in which a node verifies.
Chapter 4 The Medum Access Sublayer. MA Sublayer Additional Reference –Local and Metropolitan Area Networks, William Stallings, Prentice Hall, 2000, 6th.
THE MEDIUM ACCESS CONTROL SUBLAYER 4.1 THE CHANNEL ALLOCATION PROBLEM 4.2 MULTIPLE ACCESS PROTOCOLS.
COMPUTER NETWORKS Data-link Layer (The Medium Access Control Sublayer) MAC Sublayer.
THE MEDIUM ACCESS CONTROL SUBLAYER 4.1 THE CHANNEL ALLOCATION PROBLEM 4.2 MULTIPLE ACCESS PROTOCOLS.
Multiple Access By, B. R. Chandavarkar, CSE Dept., NITK, Surathkal Ref: B. A. Forouzan, 5 th Edition.
4.1 THE CHANNEL ALLOCATION PROBLEM THE CHANNEL ALLOCATION PROBLEM : how to allocate a single broadcast channel among competing users. The channel might.
CS 5253 Workshop 1 MAC Protocol and Traffic Model.
Week3 The Medium Access Sublayer
Multiple Access Methods
Data link layer divided into two functionality-oriented sublayers
CT301 LECTURE 8.
Chapter 12 Multiple Access
Part III Datalink Layer 10.
Module 3 Medium Access Control.
Multiple Access Mahesh Jangid Assistant Professor JVW University.
Channel Allocation (MAC)
Net301 lecture9 11/5/2015 Lect 9 NET301.
Services of DLL Framing Link access Reliable delivery
Figure 12.1 Data link layer divided into two functionality-oriented sublayers Networks can be divided into two categories: those using point-to-point.
THE IEEE MAC SUB-LAYER – chapter 14
Multiple Access Methods
Learning Objectives After interacting with this Learning Object, the learner will be able to: Explain the process of collision detection in CSMA/CD.
Overview Jaringan Komputer (3)
The Medium Access Control Sublayer
Chapter 13 Multiple Access
Link Layer and LANs Not everyone is meant to make a difference. But for me, the choice to lead an ordinary life is no longer an option 5: DataLink Layer.
Channel Allocation Problem/Multiple Access Protocols Group 3
Data Communication Networks
Chapter 13 Multiple Access
Multiple Access Methods
CARRIER SENSE MULTIPLE ACCESS (CSMA)
Chapter 6 Multiple Radio Access.
Dr. John P. Abraham Professor UTPA
Multiple Access Control (MAC) Protocols
Part III Datalink Layer 10.
Chapter 12 Media Access Control (MAC)
Chapter 12 Media Access Control (MAC)
Presentation transcript:

Channel Allocation Problem/Multiple Access Protocols Group 3 ITCS 3166 Channel Allocation Problem/Multiple Access Protocols Group 3

What is channel allocation? Channel allocation deals with the allocation of channels to cells in a cellular network. Once the channels are allocated, cells may then allow users within the cell to communicate via the available channels. In other words, certain protocols are needed to allow each user to communicate without interference. Even though there are variety of practices, channel allocation can be better achieved either by static or dynamic approach.

Static channel Allocation: Two common static channel allocation techniques are TDMA and FDMA. Time Division Multiple Access (TDMA) Frequency Division Multiple Access (FDMA) The performance of static channel allocation depends on: The variation in the number of users over time. The nature of the traffic sent by the user.

If there are n users, the bandwidth is divided into N equal sized portions. If fewer than n users are currently interested, a large piece of bandwidth is wasted. If more than n users want to communicate, some of them access will be denied due to the lack of bandwidth. In some cases, even if users are assigned to a particular frequency bandwidth, they hardly ever transmit or receive anything. Even though, the static approach is continues to be used in telephone networks, as well as cellular, terrestrial wireless, and satellite networks at a higher level of granularity, it is a poor fit to most of the computers where data traffic is extremely bursty.

The poor performance of static channel allocation can be calculated by the formula T = 1/(µC-λ). Where T is mean time delay Channel of capacity = C Average arrival rate = 1/µ Frame arrival rate is =λ

What are the two common static channel allocation techniques? Question: What are the two common static channel allocation techniques? TDMA, & FDMA

Dynamic Channel Allocation With a dynamic approach the allocation of the channel changes based on the traffic generated by the users. In DCA systems, no set relationship exists between channels and cells. Instead, channels are part of a pool of resources. Whenever a channel is needed by a cell, the channel is allocated under the constraint that frequency reuse requirements cannot be violated.

5 Assumptions for Dynamic Channel Allocation Continuous or Slotted time – Continuous time transmission can begin at any time Slotted time means that transmission must start at the beginning of the interval Independent Traffic – n amount of stations generates frames for transmission, once the frame is generated the station is blocked until frame transmission Carrier Sense or No Carrier Sense – carrier sense checks to see if channel is in use before transmission, whereas if there was no carrier sense it transmits first and then it checks to see if the transmission was successful.·

5 Assumptions for Dynamic Channel Allocation cont. Single Channel – One channel is used for communication Observed Collision – when two frames are overlapped it may cause it to “collide” Collisions needs to be transmitted again.

ALOHA ALOHA is wireless data system that was developed at the University of Hawaii by Norman Abramson. ALOHA was developed due to the need to run communications between all of the small islands making up hawaii. The impracticality of using cables between the islands necessitated the development of a wireless system. ALOHA uses the same upstream frequency for each user and uploads the frames to a central terminal. ALOHA deals with sending frames 2 different ways, pure and slotted.

Pure ALOHA Pure ALOHA sends out the users frames without regard for collision avoidance. The senders only listen for if the frame is destroyed before reaching the central terminal. If the frame was destroyed then the senders wait a random interval before sending another. This process repeats until the sender gets confirmation that the frame has successfully made it to the central terminal. This process embodies the idea of quantity over quality, the more times a frame is sent out the greater chance of it not colliding with any other frame. Due to the random nature of the collisions this process is not very efficient and only has an 18% channel utilization.

Slotted ALOHA Slotted ALOHA was developed as a way to make pure ALOHA more efficient. Instead of each sender transmitting frames at random intervals slotted ALOHA segments time into specific intervals called slots for frames to travel in. This method requires a station to indicate when the boundaries between the slots occur, usually determined beforehand by the users. This method is almost double the efficiency of pure aloha as randomness is eliminated as a factor of collision frequency. Even though this process was developed in the 70’s it proved useful when Internet over cable was developed as it solved the problem of allocating a shared channel to multiple users.

True or false: Slotted ALOHA prevents collision entirely. Question True or false: Slotted ALOHA prevents collision entirely. False: Slotted ALOHA only allocates segments it does not control if multiple users attempt to send on the same segment.

Carrier Sense MAP Carrier Sense Multiple Access Protocols are protocols in which stations listen for a carrier (i.e. a transmission) and act accordingly There are three basic Carrier Sense Multiple Access Protocols: 1-persistent CSMA - When a station needs to send data, it listens to the channel. If the channel is idle, the station transmits but if the channel is busy, it just waits until it becomes idle. If a collision occurs, the station waits a random amount of time and repeats. This is called 1-persistent because the station transmits with a probability of 1 when the channel is idle. nonpersistent CSMA - The station listens to, or senses, the channel and if it's idle, it transmits but if the channel is busy, it waits a random amount of time before repeating the algorithm instead of continuously waiting for the channel to be idle. p-persistent CSMA - Applies to slotted channels. If the channel is idle, the station transmits with a probability p. Then, it defers until the next slot with a probability of q = 1 - p.

CSMA with Collision Detection This protocol is the basis of the classic ethernet LAN. Similar to previous protocols except CSMA/CD has collision detection built in A collision is when two stations sense that a channel is idle and start transmitting simultaneously If a collision occurs in this protocol, the station aborts its transmission, waits a random period of time, and tries again if the channel is idle. CSMA/CD can be in contention, idle, or transmission state

1-Persistent, Non-Persistent, P-Persistent Question Name one of the three basic CSMA protocols 1-Persistent, Non-Persistent, P-Persistent

Collision Free Protocols Bit-map Protocol There is a contention period in which each station announces they have data to send by sending a 1 bit. After this they send their frames Token Passing Stations passes a token from one station to another The token is for permission to send, if it doesn’t need to send it passes the token

Multiple Access with collision avoidance MACA is primarily done with wireless because of the limitations wireless has that wired does not A sender request to send and the receiver clears the station for the incoming transmission.

Question What is the difference between CSMA/CD and CSMA/CA CSMA/CD is Collision Detection CSMA/CA is Collision Avoidance

Limited-Contention Protocols Collisions are rare Prefered under conditions of light load because of delay Attempt to combine the best properties of contention and collision free protocols

How limited-contention protocols work Stations get divided into groups Only members of group 0 can compete for slot 0 If successful, the member acquires the channel and transmits its frame If not, the members of group 1 compete for slot 1

What group members can compete for slot 0? Question What group members can compete for slot 0? Members of group 0