R ANDOM A CCESS N ETWORKS CSMA F AMILIES 1. References Chapter 9 of the book. Throughput Analysis for Persistent CSMA Systems, HIDEAKI TAKAGI AND LEONARD.

Slides:



Advertisements
Similar presentations
Channel Allocation Protocols. Dynamic Channel Allocation Parameters Station Model. –N independent stations, each acting as a Poisson Process for the purpose.
Advertisements

The ALOHA Protocol “Free for all”: whenever station has a frame to send, it does so. –Station listens for maximum RTT for an ACK. –If no ACK after a specified.
EECC694 - Shaaban #1 lec #5 Spring Data Link In Broadcast Networks: The Media Access Sublayer Broadcast networks with multi-access (or random.
Ethernet – CSMA/CD Review
Fundamentals of Computer Networks ECE 478/578
Multiple access What if multiple machines are sharing the same link?
Lecture 9: Multiple Access Protocols
Communication Networks Lecture 5 NETW 501-L5: NETW 501-L5: Medium Access Control Dr.-Ing. Khaled Shawky Hassan Room: C3-222, ext: 1204,
1 K. Salah Module 4.2: Media Access Control The Media Access Control (MAC) sublayer –Random Access (CSMA), IEEE –Token Passing, IEEE Ch 13-
MAC Protocols Media Access Control (who gets the use the channel) zContention-based yALOHA and Slotted ALOHA. yCSMA. yCSMA/CD. TDM and FDM are inefficient.
CS 5253 Workshop 1 MAC Protocol and Traffic Model.
CMPE 150- Introduction to Computer Networks 1 CMPE 150 Fall 2005 Lecture 17 Introduction to Computer Networks.
Chapter 14 LAN Systems Ethernet (CSMA/CD) ALOHA Slotted ALOHA CSMA
Copyright © 2003, Dr. Dharma P. Agrawal and Dr. Qing-An Zeng. All rights reserved. 1 Chapter 6 Multiple Radio Access.
Teknik Akses Jaringan Carrier Sense Pertemuan 12 Matakuliah: H0484/Jaringan Komputer Tahun: 2007.
CMPE 150- Introduction to Computer Networks 1 CMPE 150 Fall 2005 Lecture 16 Introduction to Computer Networks.
Studying Local Area Networks Via Media Access Control (MAC) SubLayer
CS 5253 Workshop 1 MAC Protocol and Traffic Model.
Networks: Local Area Networks1 LANs Studying Local Area Networks Via Media Access Control (MAC) SubLayer.
Computer Networks: Local Area Networks 1 LANs Studying Local Area Networks via the Media Access Control (MAC) SubLayer.
Semester EEE449 Computer Networks The Data Link Layer Part 2: Media Access Control En. Mohd Nazri Mahmud MPhil (Cambridge, UK) BEng (Essex,
Shashank Srivastava Motilal Nehru National Institute Of Technology, Allahabad Medium Access Control.
Chap 4 Multiaccess Communication (Part 1)
1 ECE453 – Introduction to Computer Networks Lecture 7 – Multiple Access Control (I)
9/11/2015 5:55 AM1 Ethernet and CSMA/CD CSE 6590 Fall 2010.
Multiple Access Protocols Chapter 6 of Hiroshi Harada Book
Wireless Application Protocol
McGraw-Hill © The McGraw-Hill Companies, Inc., 2004 Chapter 12 Multiple Access Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction.
Chi-Cheng Lin, Winona State University CS412 Introduction to Computer Networking & Telecommunication Medium Access Control Sublayer.
Chapter 4: Medium Access Control (MAC) Sublayer
CHAPTER 4: THE MEDIUM ACCESS SUBLAYER 4.1: The Channel Allocation Problem 4.2: Multiple Access Protocols.
LECTURE9 NET301. DYNAMIC MAC PROTOCOL: CONTENTION PROTOCOL Carrier Sense Multiple Access (CSMA): A protocol in which a node verifies the absence of other.
LOCAL AREA NETWORKS. CSMA Carrier Sense Multiple Access To minimize the chance of collision and, therefore, increase the performance, the CSMA method.
© Janice Regan, CMPT 128, CMPT 371 Data Communications and Networking LANs 2: MAC protocols.
Chi-Cheng Lin, Winona State University CS 313 Introduction to Computer Networking & Telecommunication Medium Access Control Sublayer.
1 Poisson Random Process. 2 Mean and Variance Results You have to memorize these! You should be able to derive any of the above Exponential: Poisson:
جلسه یازدهم شبکه های کامپیوتری به نــــــــــــام خدا.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2000 Unit-II Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
LOCAL AREA NETWORKS. CSMA/CD Carrier Sense Multiple Access with Collision Detection The CSMA method does not specify the procedure following a collision.
Medium Access Control Sub Layer
7-1 Introduction to Queueing Theory l Components of a queueing system n probability density function (pdf) of interarrival times n pdf of service times.
Multiple Access.
Data Communications, Kwangwoon University12-1 Chapter 12. Multiple Access 1.Random Access 2.Controlled Access 3.Channelization.
Chapter 6 Multiple Radio Access
Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter Four LAN Access Techniques.
Ethernet. Ethernet (802.3) 1-persistent CSMA, CD, binary exponential backoff Carrier sense: station listens to channel first. 1-persistent: If idle, station.
CS3502: Data and Computer Networks Local Area Networks - 1 introduction and early broadcast protocols.
Ch 12. Multiple Access. Multiple Access for Shared Link Dedicated link – Point-to-point connection is sufficient Shared link – Link is not dedicated –
CS3502: Data and Computer Networks Local Area Networks - 1 introduction and early broadcast protocols.
LECTURE9 NET301 11/5/2015Lect 9 NET DYNAMIC MAC PROTOCOL: CONTENTION PROTOCOL Carrier Sense Multiple Access (CSMA): A protocol in which a node verifies.
實驗三 媒體存取協定模擬 教師: 助教: 1998/10/19 High Speed Network Lab. Department of Computer Information Science, NCTU.
1 Ethernet CSE 3213 Fall February Introduction Rapid changes in technology designs Broader use of LANs New schemes for high-speed LANs High-speed.
CSMA/CD Simulation Carrier Sense Multiple Access (CSMA), although more efficient than ALOHA or slotted ALOHA, still has one glaring inefficiency: When.
Tel Hai Academic College Department of Computer Science Prof. Reuven Aviv Markov Models for Access Control in Computer Networks Resource: Fayez Gebali,
Chapter 4 The Medum Access Sublayer. MA Sublayer Additional Reference –Local and Metropolitan Area Networks, William Stallings, Prentice Hall, 2000, 6th.
Medium Access Control Protocols, Local Area Networks, and Wireless Local Area Networks Lecture Note 10.
COMPUTER NETWORKS Data-link Layer (The Medium Access Control Sublayer) MAC Sublayer.
Lecture Focus: Data Communications and Networking  Data Link Layer  Media Access Control (MAC) Lecture 23 CSCS 311.
Multiple Access By, B. R. Chandavarkar, CSE Dept., NITK, Surathkal Ref: B. A. Forouzan, 5 th Edition.
CS 5253 Workshop 1 MAC Protocol and Traffic Model.
Example DLL Protocols 1. High-Level Data Link Control (HDLC).
Introduction to Queueing Theory
High Speed LANs – Ethernet and Token Ring
Services of DLL Framing Link access Reliable delivery
Learning Objectives After interacting with this Learning Object, the learner will be able to: Explain the process of collision detection in CSMA/CD.
Chapter 12 Multiple Access
Ethernet – CSMA/CD Review
King Fahd University of Petroleum & Minerals Computer Engineering Dept
CARRIER SENSE MULTIPLE ACCESS (CSMA)
Chapter 6 Multiple Radio Access.
Presentation transcript:

R ANDOM A CCESS N ETWORKS CSMA F AMILIES 1

References Chapter 9 of the book. Throughput Analysis for Persistent CSMA Systems, HIDEAKI TAKAGI AND LEONARD KLEINROCK. IEEE TRANSACTIONS ON COMMUNICATIONS, VOL. COM-33, NO. 7, JULY 1985 Performance Analysis and Enhancement of MAC Protocols, Chuan Heng Foh, A Thesis submitted in total fulfillment of the requirements of the degree of Doctor of Philosophy. Department of Electrical and Electronic Engineering, The University of Melbourne,

CSMA Motivation In Aloha and slotted Aloha: a station initiates a transmission without making sure that the broadcast channel is clear for transmission. Therefore, During a data frame transmission, there is a chance of collision. Carrier Sense Multiple Access (CSMA) protocol was proposed as a refinement over SLOTTED ALLOHA by providing Carrier Sensing. The main Objective of this added functionality is to minimize the length of the collision period. 3

CSMA Motivation If all stations initiate transmissions only when the broadcast channel is sensed idle, the chances of collisions can be reduced. “listen before transmit”. NOTE: Due to signal propagation delay, tow or more stations may not be aware of other transmissions even after the channel is sensed idle. Therefore, If two or more stations start their transmissions at the same time, Collisions are still possible !! 4

CSMA Motivation In the case that a ready station senses a busy channel, the transmission may defer based on various schemes described in the following: 5

CSMA Transmission Modes 1) Non-persistent CSMA (NP): If channel is sensed idle then transmit packet Else (channel busy) use backoff algorithm to delay transmission. 6

CSMA Transmission Modes 1-persistent CSMA (p-persistent and P=1): If the channel is sensed busy, a ready station will keep sensing the busy channel until the channel turns idle. As soon as the channel is sensed idle, the station starts its transmission immediately, that is, with probability one. 7

CSMA Transmission Modes p-persistent CSMA (NP): If the broadcast channel is sensed busy by a ready station, it will persist in sensing the channel until the channel becomes idle. As soon as the channel is sensed idle, with probability p, the station transmits the data frame, or with probability (1-p), it waits for a predefined time period before sensing the channel again. The same process is repeated then. If channel is sensed idle then Transmit packet with probability of p. Else Wait for end to end delay (time slot) with probability (1-p) & repeat. Else (channel busy) keep spin sensing until channel is idle in which case repeat the algorithm. 8

CSMA Transmission Modes p-persistent CSMA (NP): wait 9

10

Flow diagram of CSMA 11

Assumption for throughput analysis: Infinite # of stations, arrivals are following Poisson distribution. Propagation delay between stations is τ. That is the one –way propagation delay for bus. Fixed packet length and transmission time is Δt. Each ST has at most one packet ready for transmission In the case of slotted protocols Δt = k τ. Where k is integer. No overhead for sensing, channel is noiseless. Any packet time overlap is destructive. Throughput Analysis CSMA 12

T HROUGHPUT A NALYSIS CSMA 13

T HROUGHPUT A NALYSIS CSMA Let the arrival rate of the combined load and retransmission traffic be G data frames per data frame transmission time In non-persistent CSMA protocol, the broadcast channel is repeating two periods: an idle period and a busy period 14

T HROUGHPUT A NALYSIS 15

T HROUGHPUT A NALYSIS CSMA Busy Period: (B)  During this there are no attempts to access the network  May contain busy packets and or not colliding packets Idle Period: (I) Depends on the load of the network, it maybe empty and maybe start of transmission Duration of a cycle: (B+I) : Useful period (U) The duration that the channel carries useful information within a cycle. It is the average time in Busy period during which there is a successful transmission B and I variables are two independent random variables. 16

Using the results from the renewal theory: The throughput can be expressed as T HROUGHPUT A NALYSIS 17

T HROUGHPUT A NALYSIS CSMA, E[U]  When a transmission occurs, it takes a units of time to reach all other stations.  To get a successful transmission, it is required to have no other stations initiating transmissions during vulnerable period, a, when a transmission is started.  Since the arrival process is a Poisson process Therefore, 18

T HROUGHPUT A NALYSIS CSMA, E[I] The idle period, I,  is the duration from the end of a transmission to the arrival of the next transmission.  In other words, I is the inter-arrival time of the arrival process.  Since the arrival process is a Poisson process Thus the idle period is exponentially distributed, and its mean value is given by 19

The busy period, B Is the sum of  the time difference between the first and the last arrivals within a vulnerable period, denoted Y, plus  The data frame transmission time and the signal propagation time.  How to find Y ??? T HROUGHPUT A NALYSIS CSMA, E[B] 20

0 arrival in -y 0 y T HROUGHPUT A NALYSIS CSMA, E[B] 21

T HROUGHPUT A NALYSIS CSMA, E[B] 22

T HROUGHPUT A NALYSIS CSMA By substituting the expressions for E[U], E[I], E[B] the throughput for the non-persistent CSMA protocol is thus a : The normalized propagation delay. It is clear that non-persistent CSMA performs better for small values of a. 23

As (a) approaches 0 == > S = G/G+1 As (a) approaches 0 & G >>1 == > S=1 For (a) = 1: S is the lowest, this is because time & are equal, and by the time we get information about the status of channel, the actual status may have changed. 24

Slotted CSMA 25

S LOTTED CSMA Since Therefore 26

S LOTTED CSMA 27

S LOTTED CSMA Similarly: Therefore: 28

S LOTTED CSMA 29

S LOTTED CSMA Substituting all the previous terms back in S: 30

31 T HROUGHPUT A NALYSIS CSMA Notes: For small G the persistent CSMA is the best. For large G the non persistent CSMA is the best.

32 T HROUGHPUT A NALYSIS CSMA

33 T HROUGHPUT A NALYSIS CSMA Notes: ALOHA protocols are not sensitive to varying (a) since it does not depend on it (constant). 1-persistant (slotted/un-slotted) are not sensitive to varying (a) for small (a). however, as (a) increases the sensitivity increases as well-this goes for non-persistent also-. For large (a) ALOHA gives highest S because sensing became useless as 2 τ is very large. p-persistent performance is between S-NP & NP. p- persistent is optimized for a given (a)

34 A VG. N ORMALIZED D ELAY VS T HROUGHPUT

35 NOTES The Previous figure was a result of simulation for the throughput average delay tradeoffs for the ALOHA and CSMA procedures for a = 0.01 For each value of S, the average delay was optimized with respect to the mean backoff time.

CSMA/CD 36

CSMA/CD Collision Detection: Listen while transmitting the Packet A Timer is used to broadcast t jamming signal in case a collision is detected. This will take J seconds If the Jamming is heard, other transmitting stations back- off. 37

CSMA/DC Flow Chart 38

CSMA/CD: B ACK OFF Truncated binary Exponential Back off: Initial Transmission + 15 attempts: If this happens == > give up ( report a failure network) i=1 Step i: k = min(10,i) r = rand[0, ] wait for: r * 2 Exit 39

40 T IMING DIAGRAM OF CSMA /CD: Notes: Time during which channel is idle as seen by each station is : Where J is jamming time WHY ??

41

T HROUGHPUT A NALYSIS 42

T HROUGHPUT A NALYSIS 43

44

T HROUGHPUT A NALYSIS 45

T HROUGHPUT A NALYSIS 46

T HROUGHPUT A NALYSIS 47

S LOTTED CSMA/CD 48

49 P ERFORMANCE A NALYSIS CSMA/CD Notes: γ is normalized Jamming time (in plot γ =1). SNP is better for low value of (a) (slotted is good for high G). Slotting time has negligible effect for low G.

50 P ERFORMANCE A NALYSIS CSMA/CD

51 NOTES The previous figure plots the throughput S versus offered Traffic G, for various schemes. The normalized jamming time is unity in all cases, and a takes several shown values. Non-persistence CSMA/CD both slotted and un-slotted give for small a greater maximum throughput than 1-persistence CSMA/CD Slotting the time access tend to increase throughput at higher values of G but has negligible effects for small values.

52

53 NOTES The previous figure shows the sensitivity of throughput S for the jamming time γ for 3 values of normalized propagation delay. minimizing the jamming time, maximizes S.

54 P ERFORMANCE A NALYSIS CSMA/CD

55 NOTES The previous figure shows the effect of propagation delay on throughput S, by plotting max throughput versus normalized propagation delay a, for normalized jamming time equal to unity. Increasing a decreases S for all cases, with the least effect felt by slotted non-persistence CSMA/CD. That is due to the fact that: longer propagation delays cause the contention period to become: A) larger because collision detection occurs later. B) more numerous. because carrier sensing is based on less current information.

56 P ERFORMANCE A NALYSIS CSMA/CD

57 NOTES The previous figure assumes the backoff times are drown from exponential distribution. The infinite population of CSMA/CD is unstable. The finite population networks, practical, can be made stable by increasing the mean backoff time to sufficiently very large value.

58 P ERFORMANCE A NALYSIS CSMA/CD

59 NOTES In the previous figure, a = 0.01 and γ =1 For CD protocols, the figure shows the improvement in maximum throughput achieved by CSMA/CD over all others. Since CSMA/CD maintain a throughput relatively high and close to the maximum over a large range of offered Load suggests that CSMA/CD is probably more stable than other random access protocols Notice that: this improvement is to a large extent depend on a. this is shown in the next figure.

60 P ERFORMANCE A NALYSIS CSMA/CD