Data Communications and Networking: Chapter 12

39
Multiple Access

Transcript of Data Communications and Networking: Chapter 12

Page 1: Data Communications and Networking: Chapter 12

Multiple Access

Page 2: Data Communications and Networking: Chapter 12

The upper sublayer is responsible for flow and error control is called Logical Link Control (LLC) layer.

The lower sublayer is responsible for multiple access resolution is called the Media Access Control (MAC) layer.

Page 3: Data Communications and Networking: Chapter 12
Page 4: Data Communications and Networking: Chapter 12

Random Access Traits

Attempt to ensure equal access to the medium for all stations

No scheduling or pollingSusceptible to collisions

Two or more stations trying to access the medium at the same, resulting in their frames interfering with each other.

Page 5: Data Communications and Networking: Chapter 12

Random Access Issues

When can a station access the medium?What should a station do if the medium is

occupied?What will determine the success or failure of

a given transmission?What should a station do if a collision occurs?

Page 6: Data Communications and Networking: Chapter 12

Random Access Protocols

AlohaSlotted AlohaCSMACSMA/CDCSMA/CA

Page 7: Data Communications and Networking: Chapter 12
Page 8: Data Communications and Networking: Chapter 12

Developed by the University of Hawaii to network the Hawaiian islands in 1970

Wireless LAN at 9600 bps Simple

Station sends frame as soon when it has a frame to send

It does not check the medium for availability It does not check for collisions If an acknowledgement is not received

within two propagation periods, it resends the frame

Page 9: Data Communications and Networking: Chapter 12

There are two versions of Aloha

PURE ALOHA

SLOTTED ALOHA

Page 10: Data Communications and Networking: Chapter 12

The basic idea on which pure aloha is based upon is : It let users

transmit whenever they have data to be sent. So there will be collisions ,of course, and the colliding frames will

be damaged. However due to feed back property of broadcasting a sender can always find out whether its frame was destroyed by listening to the channel. All the receivers acknowledge the packets which means that the packet is received and if there is no acknowledgement from the receiver then the transmission is assumed to be unsuccessful and the station then retransmits the packet after random amount of time.

The systems in which multiple users share a common

channel in a way that can lead to conflict are widely known as contention systems.

Page 11: Data Communications and Networking: Chapter 12
Page 12: Data Communications and Networking: Chapter 12
Page 13: Data Communications and Networking: Chapter 12
Page 14: Data Communications and Networking: Chapter 12

Vulnerable Time: the length of time in which there is a possibility of collision.

Page 15: Data Communications and Networking: Chapter 12

• In 1987, Robert’s publish a method called slotted aloha which doubled the capacity of pure aloha.

• Divide time up into discrete intervals, each corresponding to one packet.

• The stations can only transmit data in one of the time slots only.

• The vulnerable period is now reduced in half. If the frames collide they will overlap completely instead of partially.

Page 16: Data Communications and Networking: Chapter 12
Page 17: Data Communications and Networking: Chapter 12
Page 18: Data Communications and Networking: Chapter 12

• Aloha Protocol:– Whenever a station has data, it

transmits immediately– Receivers ACK all packets– No ACK = collision. Wait a random time

and retransmit

Page 19: Data Communications and Networking: Chapter 12

• The Slotted Aloha Protocol– Slotted Aloha - Aloha with an additional

constraint– Time is divided into discrete time

intervals (=slot)– A station can transmit only at the

beginning of a frame

Page 20: Data Communications and Networking: Chapter 12

Reduces the probability of collision by sensing the medium for the presence of a frame prior to transmitting “Listen before talking”

Collisions can still occur If a frame is sensed on the medium,

then a persistence strategy is employed

Page 21: Data Communications and Networking: Chapter 12

Vulnerability time = tprop

Page 22: Data Communications and Networking: Chapter 12

Persistence refers to the action a station takes if it senses a carrier on a CSMA system.

Three persistence strategies: Nonpersistent 1-Persistent p-Persistent

Page 23: Data Communications and Networking: Chapter 12

A station with a frame to send senses the line

If the line is idle, the frame is sent immediately

If the line is busy, the station waits a random amount of time before sensing the line again (backoff algorithm)

Probability of collision is reduced but the efficiency is decreased Medium has significant idle periods

even if stations have frames to send

Page 24: Data Communications and Networking: Chapter 12
Page 25: Data Communications and Networking: Chapter 12

A station with a frame to send senses the line

If the line is idle, the frame is sent immediately

If the line is busy, the station continues to sense the channel until the line is idle and then transmits

If more than one station is waiting a collision will occur

Relatively high collision rate

Page 26: Data Communications and Networking: Chapter 12
Page 27: Data Communications and Networking: Chapter 12

After a station senses an idle line it may or may not send the frame Sends with probability p Refrains with probability 1-p

A random number generator is used to determine whether the station sends

If the station refrains from sending, it waits one time slot before sensing again

Fewer collisions than 1-Persistent

Page 28: Data Communications and Networking: Chapter 12
Page 29: Data Communications and Networking: Chapter 12

0

0.1

0.2

0.3

0.4

0.5

0.6

0.7

0.8

0.90.01…

0.04…

0.125

0.35… 1

2.82… 8

22.6…

64

0.81

0.51

0.14

S

G

0.01

0.1

1S vs. G for different values of a

Page 30: Data Communications and Networking: Chapter 12

0

0.1

0.2

0.3

0.4

0.5

0.6

0.0…

0.0…

0.125

0.3… 1

2.8… 8

22.…

64

0.53

0.45

0.16

S

G

0.01

0.1

1S vs. G for different values of a

Page 31: Data Communications and Networking: Chapter 12

Carrier Sense Multiple Access with Collision Detection

When a frame is sent the line is monitored to determine if a collision occurs No collision: successful transmission Collision: the station sends a jam signal and

waits a random amount of time (backoff algorithm) before sensing the medium again

2 tprop is required before determining a transmission occurred without collision

Used in Ethernet

Page 32: Data Communications and Networking: Chapter 12

IEEE 802.3 standard specifies the truncated binary exponential backoff algorithm

A frame undergoing it’s nth retransmission attempt determines the delay by selecting an integer between the range of 0 and 2k-1 and multiplying by 2tprop, where k = min(n, 10)

Typically a maximum of 15 retransmissions are attempted before the frame is aborted

Page 33: Data Communications and Networking: Chapter 12
Page 34: Data Communications and Networking: Chapter 12

Maximum normalized throughput:

Average normalized delay:

aeettXEXE

propprop )12(11

2][][

max

2)1(2

)622)(1(21

)})12(1(1{2)12(45)24(1][

21

1222 a

eee

aaeeea

aeaeeaae

XTE

aa

a

Page 35: Data Communications and Networking: Chapter 12

0

0.2

0.4

0.6

0.8

1

0.01 0.1 1

Aloha

Slotted Aloha

1-P CSMANon-P CSMA

CSMA/CD

a

max

Page 36: Data Communications and Networking: Chapter 12

CSMA-CD

0

5

10

15

20

25

30

0

0.06

0.12

0.18

0.24 0.3

0.36

0.42

0.48

0.54 0.6

0.66

0.72

0.78

0.84 0.9

0.96

Load

Avg.

Tra

nsfe

r Del

ay

Page 37: Data Communications and Networking: Chapter 12

CSMA with Collision Avoidance Collisions are completely avoided by

using appropriate delays, acknowledgements, and time-out values.

Backoff algorithm is also employed Method similar to that used in IEEE

802.11 (Wireless LAN)

Page 38: Data Communications and Networking: Chapter 12
Page 39: Data Communications and Networking: Chapter 12

Most common method is Token Passing A token is passed around a physical or

logical ring Only the station with the token may

transmit Other methods:

Reservation Systems Polling