Copyright © 2003, Dr. Dharma P. Agrawal and Dr. Qing-An Zeng. All rights reserved. 1 Chapter 6 Multiple Radio Access.

Slides:



Advertisements
Similar presentations
Nick Feamster CS 4251 Computer Networking II Spring 2008
Advertisements

Channel Allocation Protocols. Dynamic Channel Allocation Parameters Station Model. –N independent stations, each acting as a Poisson Process for the purpose.
EECC694 - Shaaban #1 lec #5 Spring Data Link In Broadcast Networks: The Media Access Sublayer Broadcast networks with multi-access (or random.
Ethernet – CSMA/CD Review
Fundamentals of Computer Networks ECE 478/578
Multiple access What if multiple machines are sharing the same link?
Communication Networks Lecture 5 NETW 501-L5: NETW 501-L5: Medium Access Control Dr.-Ing. Khaled Shawky Hassan Room: C3-222, ext: 1204,
1 K. Salah Module 4.2: Media Access Control The Media Access Control (MAC) sublayer –Random Access (CSMA), IEEE –Token Passing, IEEE Ch 13-
1 Pertemuan 13 Teknik Akses Jaringan - Random Matakuliah: H0174/Jaringan Komputer Tahun: 2006 Versi: 1/0.
Wireless & Mobile Networking: Multiple Radio Access Azizol Bin Abdullah (A2.04) Rujukan: Text Book Chapter 6.
MAC Protocols Media Access Control (who gets the use the channel) zContention-based yALOHA and Slotted ALOHA. yCSMA. yCSMA/CD. TDM and FDM are inefficient.
CS 5253 Workshop 1 MAC Protocol and Traffic Model.
CMPE 150- Introduction to Computer Networks 1 CMPE 150 Fall 2005 Lecture 17 Introduction to Computer Networks.
1 CS 6910 – Pervasive Computing Spring 2007 Section 6 (Ch.6): Multiple Radio Access Prof. Leszek Lilien Department of Computer Science Western Michigan.
20 – Collision Avoidance, : Wireless and Mobile Networks6-1.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Chapter 13 Multiple Access.
CMPE 150- Introduction to Computer Networks 1 CMPE 150 Fall 2005 Lecture 16 Introduction to Computer Networks.
EEC-484/584 Computer Networks Lecture 13 Wenbing Zhao
EEC-484/584 Computer Networks Lecture 9 Wenbing Zhao (Part of the slides are based on materials supplied by Dr. Louise Moser at UCSB and.
Studying Local Area Networks Via Media Access Control (MAC) SubLayer
Networks: Local Area Networks1 LANs Studying Local Area Networks Via Media Access Control (MAC) SubLayer.
Computer Networks: Local Area Networks 1 LANs Studying Local Area Networks via the Media Access Control (MAC) SubLayer.
Semester EEE449 Computer Networks The Data Link Layer Part 2: Media Access Control En. Mohd Nazri Mahmud MPhil (Cambridge, UK) BEng (Essex,
8/7/20151 Mobile Computing COE 446 Wireless Multiple Access Tarek Sheltami KFUPM CCSE COE hthttp://faculty.kfupm.edu.sa/coe/tarek/coe446.htm Principles.
Medium Access Control Sublayer
1 ECE453 – Introduction to Computer Networks Lecture 7 – Multiple Access Control (I)
9/11/2015 5:55 AM1 Ethernet and CSMA/CD CSE 6590 Fall 2010.
Multiple Access Protocols Chapter 6 of Hiroshi Harada Book
Opersating Mode DCF: distributed coordination function
MAC layer Taekyoung Kwon. Media access in wireless - start with IEEE In wired link, –Carrier Sense Multiple Access with Collision Detection –send.
Chi-Cheng Lin, Winona State University CS412 Introduction to Computer Networking & Telecommunication Medium Access Control Sublayer.
Lecture 4 Wireless Medium Access Control
CHAPTER 4: THE MEDIUM ACCESS SUBLAYER 4.1: The Channel Allocation Problem 4.2: Multiple Access Protocols.
LECTURE9 NET301. DYNAMIC MAC PROTOCOL: CONTENTION PROTOCOL Carrier Sense Multiple Access (CSMA): A protocol in which a node verifies the absence of other.
Chi-Cheng Lin, Winona State University CS 313 Introduction to Computer Networking & Telecommunication Medium Access Control Sublayer.
جلسه یازدهم شبکه های کامپیوتری به نــــــــــــام خدا.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2000 Unit-II Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
LOCAL AREA NETWORKS. CSMA/CD Carrier Sense Multiple Access with Collision Detection The CSMA method does not specify the procedure following a collision.
Medium Access Control Sub Layer
7-1 Introduction to Queueing Theory l Components of a queueing system n probability density function (pdf) of interarrival times n pdf of service times.
Multiple Access.
Data Communications, Kwangwoon University12-1 Chapter 12. Multiple Access 1.Random Access 2.Controlled Access 3.Channelization.
1 Kyung Hee University Chapter 12 Multiple Access.
Chapter 6 Multiple Radio Access
5: DataLink Layer 5a-1 Multiple Access protocol. 5: DataLink Layer 5a-2 Multiple Access Links and Protocols Three types of “links”: r point-to-point (single.
Ch 12. Multiple Access. Multiple Access for Shared Link Dedicated link – Point-to-point connection is sufficient Shared link – Link is not dedicated –
Background of Ad hoc Wireless Networks Student Presentations Wireless Communication Technology and Research Ad hoc Routing and Mobile IP and Mobility Wireless.
LECTURE9 NET301 11/5/2015Lect 9 NET DYNAMIC MAC PROTOCOL: CONTENTION PROTOCOL Carrier Sense Multiple Access (CSMA): A protocol in which a node verifies.
Medium Access Control in Wireless networks
MAC Layer Protocols for Wireless Networks. What is MAC? MAC stands for Media Access Control. A MAC layer protocol is the protocol that controls access.
1 Ethernet CSE 3213 Fall February Introduction Rapid changes in technology designs Broader use of LANs New schemes for high-speed LANs High-speed.
CSMA/CA Simulation  Course Name: Networking Level(UG/PG): UG  Author(s) : Amitendu Panja, Veedhi Desai  Mentor: Aruna Adil *The contents in this ppt.
Distributed-Queue Access for Wireless Ad Hoc Networks Authors: V. Baiamonte, C. Casetti, C.-F. Chiasserini Dipartimento di Elettronica, Politecnico di.
Tel Hai Academic College Department of Computer Science Prof. Reuven Aviv Markov Models for Access Control in Computer Networks Resource: Fayez Gebali,
Medium Access Control Protocols, Local Area Networks, and Wireless Local Area Networks Lecture Note 10.
UNIT 3 MULTIPLE ACCESS Adapted from lecture slides by Behrouz A. Forouzan © The McGraw-Hill Companies, Inc. All rights reserved.
COMPUTER NETWORKS Data-link Layer (The Medium Access Control Sublayer) MAC Sublayer.
Multiple Access By, B. R. Chandavarkar, CSE Dept., NITK, Surathkal Ref: B. A. Forouzan, 5 th Edition.
Lab 7 – CSMA/CD (Data Link Layer Layer)
Sidevõrgud IRT 4060/ IRT 0020 vooruloeng 6 / 20. okt 2004
High Speed LANs – Ethernet and Token Ring
Multiple Access Mahesh Jangid Assistant Professor JVW University.
Net301 lecture9 11/5/2015 Lect 9 NET301.
The Medium Access Control Sublayer
Channel Allocation Problem/Multiple Access Protocols Group 3
Channel Allocation Problem/Multiple Access Protocols Group 3
Data Communication Networks
Wireless LAN Simulation IEEE MAC Protocol
CSE 313 Data Communication
Chapter 6 Multiple Radio Access.
Presentation transcript:

Copyright © 2003, Dr. Dharma P. Agrawal and Dr. Qing-An Zeng. All rights reserved. 1 Chapter 6 Multiple Radio Access

Copyright © 2003, Dr. Dharma P. Agrawal and Dr. Qing-An Zeng. All rights reserved. 2 Outline Introduction Contention Protocols ALOHA Slotted ALOHA CSMA (Carrier Sense Multiple Access) CSMA/CD (CSMA with Collision Detection) CSMA/CA (CSMA with Collision Avoidance)

Copyright © 2003, Dr. Dharma P. Agrawal and Dr. Qing-An Zeng. All rights reserved. 3 Introduction Multiple access control channels Each node is attached to a transmitter/receiver which communicates via a channel shared by other nodes Transmission from any node is received by other nodes Shared Multiple Access Control Channel to BS Node 4 Node 3 Node 2 Node 1 … Node N

Copyright © 2003, Dr. Dharma P. Agrawal and Dr. Qing-An Zeng. All rights reserved. 4 Introduction (Cont’d) Multiple access issues If more than one node transmit at a time on the control channel to BS, a collision occurs How to determine which node can transmit to BS? Multiple access protocols Solving multiple access issues Different types: Contention protocols resolve a collision after it occurs. These protocols execute a collision resolution protocol after each collision Collision-free protocols (e.g., a bit-map protocol and binary countdown) ensure that a collision can never occur.

Copyright © 2003, Dr. Dharma P. Agrawal and Dr. Qing-An Zeng. All rights reserved. 5 Channel Sharing Techniques Static Channelization Dynamic Medium Access Control Scheduling Random Access

Copyright © 2003, Dr. Dharma P. Agrawal and Dr. Qing-An Zeng. All rights reserved. 6 Classification of Multiple Access Protocols Multiple access protocols Contention-basedConflict-free Random access Collision resolution FDMA, TDMA, CDMA, Token Bus, DQDB, etc ALOHA, CSMA, BTMA, ISMA, etc TREE, WINDOW, etc DQDB: Distributed Queue Dual Bus BTMA: Busy Tone Multiple Access ISMA: Internet Streaming Media Alliance

Copyright © 2003, Dr. Dharma P. Agrawal and Dr. Qing-An Zeng. All rights reserved. 7 Contention Protocols ALOHA Developed in the 1970s for a packet radio network by Hawaii University. Whenever a station has a data, it transmits. Sender finds out whether transmission was successful or experienced a collision by listening to the broadcast from the destination station. Sender retransmits after some random time if there is a collision. Slotted ALOHA Improvement: Time is slotted and a packet can only be transmitted at the beginning of one slot. Thus, it can reduce the collision duration.

Copyright © 2003, Dr. Dharma P. Agrawal and Dr. Qing-An Zeng. All rights reserved. 8 Contention Protocols (Cont’d) CSMA ( Carrier Sense Multiple Access ) Improvement: Start transmission only if no transmission is ongoing CSMA/CD ( CSMA with Collision Detection ) Improvement: Stop ongoing transmission if a collision is detected CSMA/CA ( CSMA with Collision Avoidance ) Improvement: Wait a random time and try again when carrier is quiet. If still quiet, then transmit CSMA/CA with ACK CSMA/CA with RTS/CTS

Copyright © 2003, Dr. Dharma P. Agrawal and Dr. Qing-An Zeng. All rights reserved. 9 ALOHA Time Collision Retransmission Node 1 Packet Collision mechanism in ALOHA Waiting a random time Node 2 Packet Node 3 Packet

Copyright © 2003, Dr. Dharma P. Agrawal and Dr. Qing-An Zeng. All rights reserved. 10 Throughput of ALOHA n  !n (2G) nP e 2G   The probability that n packets arrive in two packets time is given by where G is traffic load. The probability P(0) that a packet is successfully received without collision is calculated by letting n=0 in the above equation. We get We can calculate throughput S with a traffic load G as follows: The Maximum throughput of ALOHA is

Copyright © 2003, Dr. Dharma P. Agrawal and Dr. Qing-An Zeng. All rights reserved. 11 Slotted ALOHA 12&32 Time Collision Retransmission 3 Slot Node 1 Packet Nodes 2 & 3 Packets Collision mechanism in slotted ALOHA

Copyright © 2003, Dr. Dharma P. Agrawal and Dr. Qing-An Zeng. All rights reserved. 12 Throughput of Slotted ALOHA The probability of no collision is given by The throughput S is The Maximum throughput of slotted ALOHA is

Copyright © 2003, Dr. Dharma P. Agrawal and Dr. Qing-An Zeng. All rights reserved. 13 Throughput Slotted Aloha Aloha G S

Copyright © 2003, Dr. Dharma P. Agrawal and Dr. Qing-An Zeng. All rights reserved. 14 CSMA (Carrier Sense Multiple Access) Max throughput achievable by slotted ALOHA is CSMA gives improved throughput compared to Aloha protocols. Listens to the channel before transmitting a packet (avoid avoidable collisions).

Copyright © 2003, Dr. Dharma P. Agrawal and Dr. Qing-An Zeng. All rights reserved. 15 Collision Mechanism in CSMA 123 Time Collision 4 Node 4 sense Delay 5 Node 5 sense Delay Node 1 Packet Node 2 Packet Node 3 Packet

Copyright © 2003, Dr. Dharma P. Agrawal and Dr. Qing-An Zeng. All rights reserved. 16 Kinds of CSMA CSMA Nonpersistent CSMA Persistent CSMA Unslotted Nonpersistent CSMA Unslotted persistent CSMA Slotted Nonpersistent CSMA Slotted persistent CSMA 1-persistent CSMA p-persistent CSMA

Copyright © 2003, Dr. Dharma P. Agrawal and Dr. Qing-An Zeng. All rights reserved. 17 Nonpersistent/x-persistent CSMA Protocols Nonpersistent CSMA Protocol: Step 1: If the medium is idle, transmit immediately Step 2: If the medium is busy, wait a random amount of time and repeat Step 1 Random backoff reduces probability of collisions Waste idle time if the backoff time is too long 1-persistent CSMA Protocol: Step 1: If the medium is idle, transmit immediately Step 2: If the medium is busy, continue to listen until medium becomes idle, and then transmit immediately There will always be a collision if two nodes want to retransmit (usually you stop transmission attempts after few tries)

Copyright © 2003, Dr. Dharma P. Agrawal and Dr. Qing-An Zeng. All rights reserved. 18 Nonpersistent/x-persistent CSMA Protocols p-persistent CSMA Protocol: Step 1: If the medium is idle, transmit with probability p, and delay for worst case propagation delay for one packet with probability (1-p) Step 2: If the medium is busy, continue to listen until medium becomes idle, then go to Step 1 Step 3: If transmission is delayed by one time slot, continue with Step 1 A good tradeoff between nonpersistent and 1-persistent CSMA

Copyright © 2003, Dr. Dharma P. Agrawal and Dr. Qing-An Zeng. All rights reserved. 19 How to Select Probability p ? Assume that N nodes have a packet to send and the medium is busy Then, Np is the expected number of nodes that will attempt to transmit once the medium becomes idle If Np > 1, then a collision is expected to occur Therefore, network must make sure that Np < 1 to avoid collision, where N is the maximum number of nodes that can be active at a time

Copyright © 2003, Dr. Dharma P. Agrawal and Dr. Qing-An Zeng. All rights reserved. 20 Throughput G S Aloha Slotted Aloha 1-persistent CSMA 0.5-persistent CSMA 0.1-persistent CSMA 0.01-persistent CSMA Nonpersistent CSMA

Copyright © 2003, Dr. Dharma P. Agrawal and Dr. Qing-An Zeng. All rights reserved. 21 CSMA/CD (CSMA with Collision Detection) In CSMA, if 2 terminals begin sending packet at the same time, each will transmit its complete packet (although collision is taking place). Wasting medium for an entire packet time. CSMA/CD Step 1:If the medium is idle, transmit Step 2:If the medium is busy, continue to listen until the channel is idle then transmit Step 3:If a collision is detected during transmission, cease transmitting Step 4:Wait a random amount of time and repeats the same algorithm

Copyright © 2003, Dr. Dharma P. Agrawal and Dr. Qing-An Zeng. All rights reserved. 22 CSMA/CD (Cont’d) AB (  is the propagation time ) T0T0 A begins transmission AB B begins transmission Time T0+-T0+- AB B detects collision T0+T0+ AB A detects collision just before end of transmission T 0 +2  - 

Copyright © 2003, Dr. Dharma P. Agrawal and Dr. Qing-An Zeng. All rights reserved. 23 CSMA/CA (CSMA with collision Avoidance) All terminals listen to the same medium as CSMA/CD. Terminal ready to transmit senses the medium. If medium is busy it waits until the end of current transmission. It again waits for an additional predetermined time period DIFS (Distributed inter frame Space). Then picks up a random number of slots (the initial value of backoff counter) within a contention window to wait before transmitting its frame. If there are transmissions by other terminals during this time period (backoff time), the terminal freezes its counter. It resumes count down after other terminals finish transmission + DIFS. The terminal can start its transmission when the counter reaches to zero.

Copyright © 2003, Dr. Dharma P. Agrawal and Dr. Qing-An Zeng. All rights reserved. 24 CSMA/CA (Cont’d) Time Node A’s frame Nodes B & C sense the medium Nodes B resenses the medium and transmits its frame. Node C freezes its counter. Node B’s frame Nodes C starts transmitting. Delay: B Delay: C Nodes C resenses the medium and starts decrementing its counter. Node C’s frame

Copyright © 2003, Dr. Dharma P. Agrawal and Dr. Qing-An Zeng. All rights reserved. 25 CSMA/CA Explained DIFS Next Frame Medium Busy DIFS Contention window Defer access Backoff after defer Slot Time DIFS – Distributed Inter Frame Spacing Contention window

Copyright © 2003, Dr. Dharma P. Agrawal and Dr. Qing-An Zeng. All rights reserved. 26 CSMA/CA with ACK Immediate Acknowledgements from receiver upon reception of data frame without any need for sensing the medium. ACK frame transmitted after time interval SIFS (Short Inter-Frame Space) (SIFS < DIFS) Receiver transmits ACK without sensing the medium. If ACK is lost, retransmission done.

Copyright © 2003, Dr. Dharma P. Agrawal and Dr. Qing-An Zeng. All rights reserved. 27 CSMA/CA/ACK DIFS Next Frame ACK Data Other Source Destination DIFS SIFS Contention window Defer accessBackoff after defer SIFS – Short Inter Frame Spacing Time

Copyright © 2003, Dr. Dharma P. Agrawal and Dr. Qing-An Zeng. All rights reserved. 28 CSMA/CA with RTS/CTS Transmitter sends an RTS (request to send) after medium has been idle for time interval more than DIFS. Receiver responds with CTS (clear to send) after medium has been idle for SIFS. Then Data is exchanged. RTS/CTS is used for reserving channel for data transmission so that the collision can only occur in control message.

Copyright © 2003, Dr. Dharma P. Agrawal and Dr. Qing-An Zeng. All rights reserved. 29 CSMA/CA with RTS/CTS (Cont’d) DIFS Next Frame CTS RTS Other Source Destination DIFS SIFS Contention window Defer access Backoff after defer SIFS Data SIFS ACK Time

Copyright © 2003, Dr. Dharma P. Agrawal and Dr. Qing-An Zeng. All rights reserved. 30 RTS/CTS RTS CTS Data ACK Node ANode B Propagation delay