An Overview of the Aloha protocols J.-F. Pâris University of Houston.

Slides:



Advertisements
Similar presentations
Nick Feamster CS 4251 Computer Networking II Spring 2008
Advertisements

Data and Computer Communications Eighth Edition by William Stallings Lecture slides by Lawrie Brown Chapter 16 – High Speed LANs.
Channel Allocation Protocols. Dynamic Channel Allocation Parameters Station Model. –N independent stations, each acting as a Poisson Process for the purpose.
The ALOHA Protocol “Free for all”: whenever station has a frame to send, it does so. –Station listens for maximum RTT for an ACK. –If no ACK after a specified.
EECC694 - Shaaban #1 lec #5 Spring Data Link In Broadcast Networks: The Media Access Sublayer Broadcast networks with multi-access (or random.
Ethernet – CSMA/CD Review
Fundamentals of Computer Networks ECE 478/578
Lecture 9: Multiple Access Protocols
Multiple Access Methods. When nodes or stations are connected and use a common link (cable or air), called a multipoint or broadcast link, we need a.
Communication Networks Lecture 5 NETW 501-L5: NETW 501-L5: Medium Access Control Dr.-Ing. Khaled Shawky Hassan Room: C3-222, ext: 1204,
1 Pertemuan 13 Teknik Akses Jaringan - Random Matakuliah: H0174/Jaringan Komputer Tahun: 2006 Versi: 1/0.
MAC Protocols Media Access Control (who gets the use the channel) zContention-based yALOHA and Slotted ALOHA. yCSMA. yCSMA/CD. TDM and FDM are inefficient.
CS 5253 Workshop 1 MAC Protocol and Traffic Model.
Copyright © 2003, Dr. Dharma P. Agrawal and Dr. Qing-An Zeng. All rights reserved. 1 Chapter 6 Multiple Radio Access.
CMPE 150- Introduction to Computer Networks 1 CMPE 150 Fall 2005 Lecture 16 Introduction to Computer Networks.
7C Cimini-9/97 RANDOM ACCESS TECHNIQUES ALOHA Carrier-Sense Techniques Reservation Protocols PRMA.
Studying Local Area Networks Via Media Access Control (MAC) SubLayer
ECE358: Computer Networks Spring 2012
Semester EEE449 Computer Networks The Data Link Layer Part 2: Media Access Control En. Mohd Nazri Mahmud MPhil (Cambridge, UK) BEng (Essex,
1 Chapter 5 The Medium Access Sublayer. 2 Chapter 5 The Medium Access Layer 5.1 The Channel Allocation problem - Static and dynamic channel allocation.
Medium Access Control Sublayer
1 ECE453 – Introduction to Computer Networks Lecture 7 – Multiple Access Control (I)
9/11/2015 5:55 AM1 Ethernet and CSMA/CD CSE 6590 Fall 2010.
Multiple Access Protocols Chapter 6 of Hiroshi Harada Book
Wireless Application Protocol
1 Computer Communication & Networks Lecture 12 Datalink Layer: Multiple Access Waleed Ejaz
Chi-Cheng Lin, Winona State University CS412 Introduction to Computer Networking & Telecommunication Medium Access Control Sublayer.
CHAPTER 4: THE MEDIUM ACCESS SUBLAYER 4.1: The Channel Allocation Problem 4.2: Multiple Access Protocols.
LECTURE9 NET301. DYNAMIC MAC PROTOCOL: CONTENTION PROTOCOL Carrier Sense Multiple Access (CSMA): A protocol in which a node verifies the absence of other.
جلسه دهم شبکه های کامپیوتری به نــــــــــــام خدا.
Layer 2 Technologies At layer 2 we create and transmit frames over communications channels Format of frames and layer 2 transmission protocols are dependent.
Chi-Cheng Lin, Winona State University CS 313 Introduction to Computer Networking & Telecommunication Medium Access Control Sublayer.
Cyclic Redundancy Check (CRC).  An error detection mechanism in which a special number is appended to a block of data in order to detect any changes.
Ethernet: Distributed Packet Switching for Local Computer Networks Authors: Robert M. Metcalfe and David R. Boggs Presentation: Christopher Peery.
جلسه یازدهم شبکه های کامپیوتری به نــــــــــــام خدا.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2000 Unit-II Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Medium Access Control Sub Layer
Multiple Access.
Chapter 6 Multiple Radio Access
Medium Access Control Protocols, Local Area Networks, and Wireless Local Area Networks Lecture Note 9.
CS3502: Data and Computer Networks Local Area Networks - 1 introduction and early broadcast protocols.
CS3502: Data and Computer Networks Local Area Networks - 1 introduction and early broadcast protocols.
LECTURE9 NET301 11/5/2015Lect 9 NET DYNAMIC MAC PROTOCOL: CONTENTION PROTOCOL Carrier Sense Multiple Access (CSMA): A protocol in which a node verifies.
1 Ethernet CSE 3213 Fall February Introduction Rapid changes in technology designs Broader use of LANs New schemes for high-speed LANs High-speed.
CSMA/CD Simulation Carrier Sense Multiple Access (CSMA), although more efficient than ALOHA or slotted ALOHA, still has one glaring inefficiency: When.
Medium Access Control Protocols, Local Area Networks, and Wireless Local Area Networks Lecture Note 10.
COMPUTER NETWORKS Data-link Layer (The Medium Access Control Sublayer) MAC Sublayer.
Multiple Access By, B. R. Chandavarkar, CSE Dept., NITK, Surathkal Ref: B. A. Forouzan, 5 th Edition.
MEDIUM ACCESS CONTROL PROTOCOL
Data link layer divided into two functionality-oriented sublayers
Chapter 12 Multiple Access.
Lab 7 – CSMA/CD (Data Link Layer Layer)
Part III Datalink Layer 10.
Module 3 Medium Access Control.
High Speed LANs – Ethernet and Token Ring
Multiple Access Mahesh Jangid Assistant Professor JVW University.
Net301 lecture9 11/5/2015 Lect 9 NET301.
THE IEEE MAC SUB-LAYER – chapter 14
The Medium Access Control Sublayer
Communication Networks NETW 501
Link Layer and LANs Not everyone is meant to make a difference. But for me, the choice to lead an ordinary life is no longer an option 5: DataLink Layer.
Data Communication Networks
CSE 313 Data Communication
CARRIER SENSE MULTIPLE ACCESS (CSMA)
Chapter 6 Multiple Radio Access.
Dr. John P. Abraham Professor UTPA
Multiple Access Control (MAC) Protocols
Part III Datalink Layer 10.
Chapter 12 Media Access Control (MAC)
Satellite Packet Communications A UNIT -V Satellite Packet Communications.
Presentation transcript:

An Overview of the Aloha protocols J.-F. Pâris University of Houston

History One of the early computer networking designs Developed at the U of Hawaii in 1970 under the leadership of N Abramson. Wanted to create a wireless network that would allow remote UH campuses to access centrally-located computing resources

Basic design Original version used hub/star topology  Hub computer broadcasted packets to everyone on an outbound channel  Client machines sent data to the hub on a shared inbound channel

Handling contention Client machines transmit without knowing whether another clients transmit at the same  No reservations  No time-domain multiplexing Cannot either detect collisions  Their own signal always overpowers signals from other clients

The solution Hub site immediately retransmits the packets it has received on its broadcast channel Any client noticing one of its packets was not acknowledged  Waits a short time  Retransmits the packet

Aloha and Ethernet (I) Aloha predates Ethernet by several years Like Aloha  Ethernet clients share a single contention channel  Retransmits packets that were damaged due to a collision

Aloha and Ethernet (II) Unlike Aloha  Ethernet clients sense the network before transmitting a packet  Abort packet transmission as soon as they detect a collision  Both options are not possible on a packet radio network

A concise view of the protocol If you have data to send, send the data If the message collides with another transmission, try resending "later"

Analysis (I) Let d be the duration of a packet transmission interval Let G the average number of packets transmitted per transmission interval  Including retransmissions A packet will collide with any packet sent  Less than d time units before it was transmitted  While it was transmitted

The “danger zone” Colliding packet Packet being sent Colliding packet 2d2d

The results Throughput S  = G Prob[successful transmission]  = G Prob[no collision]  = G Prob[no other transmission within 2d]  = G exp(-2G) Reaches maximum for G = 0.5  Maximum throughput is 18.4% of bandwidth

Slotted Aloha (Roberts 1972) Divides time into fixed-size slots  Slot sizes is equals to packet transmission time Clients must wait until start of next slot before sending a packet  Packets either overlap completely or not at all  Danger zone is duration of a slot

The “danger zone” for slotted Aloha Packet being sent Colliding packet d Packet being sent Slot

Analysis Throughput S  = G Prob[successful transmission]  = G Prob[no collision]  = G Prob[no other transmission within slot]  = G exp(-G) Reaches maximum for G = 1  Maximum throughput is 36.8% of bandwidth

Finite-population slotted Aloha Let G i be the total transmission rate of user i for i = 1, 2, …, N in number of packets per slot Let S i be the number of new packets generated by user i during a given slot. G i is also the probability that user i transmits a packet during a slot.

Finite-population slotted Aloha We have  S i = G i Π i ≠ j (1 – G j ) If S i = S/N and G i = G/N  S = G [1 – G/N ] N-1 and  lim N->∞ S = G [1 – G/N ] N-1 = exp(-G)

Implementation details Clients never schedule the transmission of a new packet before the previous packet has been correctly received by the hub site  Each client maintains a queue of packets ready for transmission and transmits them one by one