Controlled Random Access Methods



Similar documents
TCOM 370 NOTES LOCAL AREA NETWORKS AND THE ALOHA PROTOCOL

Local Area Networks transmission system private speedy and secure kilometres shared transmission medium hardware & software

Token Ring and. Fiber Distributed Data Interface (FDDI) Networks: Token Ring and FDDI 1

Ring Local Area Network. Ring LANs

Unit of Learning # 2 The Physical Layer. Sergio Guíñez Molinos sguinez@utalca.cl

EECS 122: Introduction to Computer Networks Multiaccess Protocols. ISO OSI Reference Model for Layers

CS263: Wireless Communications and Sensor Networks

Ethernet. Ethernet Frame Structure. Ethernet Frame Structure (more) Ethernet: uses CSMA/CD

Based on Computer Networking, 4 th Edition by Kurose and Ross

CSE331: Introduction to Networks and Security. Lecture 6 Fall 2006

RTT 60.5 msec receiver window size: 32 KB

What is it all about? Some simple solutions. Multiple Access. Contexts for the multiple access problem. Outline. Contexts

Network Topologies. Network Topologies

1 Which network type is a specifically designed configuration of computers and other devices located within a confined area? A Peer-to-peer network

Fiber Distributed Data Interface

EPL 657 Wireless Networks

How To Communicate With A Token Ring Network (Dihon)

Network Categories. Network Types for the Local Range. Ethernet. Carrier Sense Multiple Access


CSE 123A Computer Networks

Attenuation (amplitude of the wave loses strength thereby the signal power) Refraction Reflection Shadowing Scattering Diffraction

Random Access Protocols

Data Link Layer. Page 1. Ethernet

Collision of wireless signals. The MAC layer in wireless networks. Wireless MAC protocols classification. Evolutionary perspective of distributed MAC

Local Area Networks. Guest Instructor Elaine Wong. Elaine_06_I-1

How To Make A Multi-User Communication Efficient

Real-Time (Paradigms) (51)

ECE/CS 372 introduction to computer networks. Lecture 13

Gigabit Ethernet: Architectural Design and Issues

Ethernet, VLAN, Ethernet Carrier Grade

IT4405 Computer Networks (Compulsory)

EXAMPLES AND PROBLEMS. Competence Based Education Internet Protocols

Module 15: Network Structures

Computer Network. Interconnected collection of autonomous computers that are able to exchange information

RFC 2544 Testing of Ethernet Services in Telecom Networks

Operating System Concepts. Operating System 資 訊 工 程 學 系 袁 賢 銘 老 師

LAN Switching Computer Networking. Switched Network Advantages. Hubs (more) Hubs. Bridges/Switches, , PPP. Interconnecting LANs

Performance Evaluation of Wired and Wireless Local Area Networks

Network Design. Yiannos Mylonas

Overview of Network Hardware and Software. CS158a Chris Pollett Jan 29, 2007.

Introduction to Ethernet

Latency on a Switched Ethernet Network

TABLE OF CONTENTS. Dedication. Table of Contents. Preface. Overview of Wireless Networks. vii xvii

Using Industrial Ethernet Networks for PROFInet

Chapter 14: Distributed Operating Systems

Analog vs. Digital Transmission

LANs. Local Area Networks. via the Media Access Control (MAC) SubLayer. Networks: Local Area Networks

Assessment of Traffic Prioritization in Switched Local Area Networks Carrying Multimedia Traffic

Introduction To Computer Networks

ECE 333: Introduction to Communication Networks Fall 2002

Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc

Chapter 16: Distributed Operating Systems

Ethernet Passive Optical Networks EPON

Fast Ethernet and Gigabit Ethernet. Networks: Fast Ethernet 1

Computer Networks. Definition of LAN. Connection of Network. Key Points of LAN. Lecture 06 Connecting Networks

Lecture 7 Multiple Access Protocols and Wireless

Chapter 9A. Network Definition. The Uses of a Network. Network Basics

CHAPTER - 4 CHANNEL ALLOCATION BASED WIMAX TOPOLOGY

2. What is the maximum value of each octet in an IP address? A. 128 B. 255 C. 256 D. None of the above

Data Link Protocols. TCP/IP Suite and OSI Reference Model

Introduction to Optical Networks

Computer Networking: A Survey

Local-Area Network -LAN

Network Categories. Network Types for the Local Range. Ethernet

Certified Telecommunications & Network Professional (CTNP) Syllabus. Version 1.0

Token-ring local area network management

Computer Network and Communication

This course has been retired. View the schedule of current <a href=

ESSENTIALS. Understanding Ethernet Switches and Routers. April 2011 VOLUME 3 ISSUE 1 A TECHNICAL SUPPLEMENT TO CONTROL NETWORK

ECE 358: Computer Networks. Homework #3. Chapter 5 and 6 Review Questions 1

Routing in packet-switching networks

Local Area Networks (LANs) Blueprint (May 2012 Release)

Selecting a Web Server Connection Rate Gilbert Held

DATA COMMUNICATION AND NETWORKS

Wired & Wireless LAN Connections

Chapter 4. Medium Access Control. IN2P3 Octobre 2002 Jean-Pierre Thomesse

Fast Ethernet and Gigabit Ethernet. Computer Networks: Fast and Gigabit Ethernet

CS6956: Wireless and Mobile Networks Lecture Notes: 2/11/2015. IEEE Wireless Local Area Networks (WLANs)

Fundamentals of Telecommunications

a. CSMA/CD is a random-access protocol. b. Polling is a controlled-access protocol. c. TDMA is a channelization protocol.

Module 5. Broadcast Communication Networks. Version 2 CSE IIT, Kharagpur

Adaptive DCF of MAC for VoIP services using IEEE networks

Level 2 Routing: LAN Bridges and Switches

What is CSG150 about? Fundamentals of Computer Networking. Course Outline. Lecture 1 Outline. Guevara Noubir noubir@ccs.neu.

Understanding Latency in IP Telephony

Planeamento e Gestão de Redes. Análise de Requisitos

A research perspective on the adaptive protocols' architectures and system infrastructures to support QoS in wireless communication systems

Note! The problem set consists of two parts: Part I: The problem specifications pages Part II: The answer pages

Chapter 8: Computer Networking. AIMS The aim of this chapter is to give a brief introduction to computer networking.

Communication Networks. MAP-TELE 2011/12 José Ruela

Module 5. Broadcast Communication Networks. Version 2 CSE IIT, Kharagpur

By: Mohsen Aminifar Fall 2014

A network is a group of devices (Nodes) connected by media links. A node can be a computer, printer or any other device capable of sending and

Ethernet. Ethernet. Network Devices

Computer Networks Vs. Distributed Systems

The Impact of QoS Changes towards Network Performance

Chapter 3 ATM and Multimedia Traffic

2 Basic Concepts. Contents

Transcription:

Helsinki University of Technology S-72.333 Postgraduate Seminar on Radio Communications Controlled Random Access Methods Er Liu liuer@cc.hut.fi Communications Laboratory 09.03.2004

Content of Presentation Classification of MAC Protocols Motivations for controlled random access methods Controlled random access methods Reservation Protocols (Dynamic) R-ALOHA Packet Reservation Multiple Access (PRMA) Polling Techniques Hub polling Roll polling Token Passing Ring Bus FDDI Page 2

Classification of MAC Protocols MAC protocols Random Access Controlled access ALOHA Slotted ALOHA CSMA(/CD) Controlled random access Fixed assignment Reservation (ALOHA) Polling Token passing TDMA FDMA CDMA Page 3

Motivations for Controlled Random Access Why not Fixed-assignment MAC protocols? Efficient in steady flow of information Resource wasting in bursty or intermittent transmission Why not Random-access MAC protocols? Contention-based protocols Flexible and efficient way for short message Throughput: ALOHA 37%, CSMA 50% (Without capture effect) High collisions in heavy traffic loads (Why: sender can t anticipate the collision) Why Controlled random access MAC protocols? More control over access Limited or free contention Tradeoff between Random-access and Fixed-assignment access methods Page 4

Controlled Random Access Methods Reservation Protocols (Dynamic) R-ALOHA Packet Reservation Multiple Access (PRMA) Polling Techniques Hub polling Roll polling Token Passing Ring Bus FDDI Page 5

Reservation ALOHA R-ALOHA (Bit MAP) Combination of Slotted-ALOHA & TDMA Transmission time Vs traffic demand Centralized control structure Applications: Multi-user satellite system Terrestrial radio system WLAN R-ALOHA operation Fixed frame length Frame length >> longest propagation delay Each frame is divided into equal-length slots Reservation (sub) slots Message slots The number of message slots < the number of stations (in general) Page 6

Diagram of R-ALOHAR Message Slots Reservation Subslots Message Slots Reservation Subslots Reserved Slots Reservation Request Two operation modes Unreserved mode Reserved mode Page 7

Two operation models Unreserved mode No message slots Every slot is composed of reservation sub slots Reservation request Slotted ALOHA Positive acknowledgement and slot assignment (single or multiple) Reserved mode One frame One slot for reservation sub slots Others for message slots, on reservation basis Only the station getting the reservation can send its packets Reservation can be heard by all the stations Sub slot number Small? --- low overhead Large? --- accommodate the expected number of reservation requests Reasonable choice: about 3 reservation sub slots / message slot Page 8

Characteristics and Performance Efficiently in handling bursty data traffic, and less contention then random access methods It also allows dynamic mixture of stream and bursty traffic In bursty traffic S-ALOHA The performance is worse than S-ALOHA if the messages are one slot length In stream traffic TDMA For high throughput, the R-ALOHA has good delay characteristic Station could be added or removed without affecting the mechanics of protocol Require queuing buffers Keep the reservations for all the other stations Slots at which its own reservation begins Queue length drops to zero, system switches to unreserved mode If propagation delay is large, frame size could be excessive Page 9

Packet Reservation Multiple Access PRMA is closely related to R-ALOHA Centralized networks over short-range radio channels Integrate the voice and data service Frame rate is identical to the arrival rate of speech Each slot is either reserved or available Reserved slots: only used by the user that reserved the slot Available slots: can be used by any user that has information to transmit Terminals can send two types of information Periodic: Voice packets and long unbroken data packets Random: Isolated data packets Page 10

Polling Techniques (1) Centralized control One station is equipped as a controller Periodically polling all the other stations Classification Hub polling Roll polling Polling procedure Hub polling From furthest station Polled station starts sending if it has something to transmit If not, a negative response is detected by the controller The polled station transmits the poll message to its neighbor in upstream (control) Control message finally is regained by the controller Page 11

Polling Techniques (2) Roll polling Controller keeps a polling list, giving the order in which the terminals are polled Polled station starts sending if it has something to transmit If not, a negative reply is detected by the controller Controller then polls the next terminals in the sequence Initial exchange of short messages required (between a station and the controller )... N P Page 12

Characteristics and performance Polling protocols are efficient in systems Propagation delay is small Overhead is low Number of stations shouldn t be large (proportional to overhead) Polling protocols are inefficient Lightly loaded Part of stations have data to transmit Subdivide stations into subsets (variations) Hub polling overhead is much smaller than that of roll polling Applications: Widely used in dedicated telephone networks for data communications Generally not been adopted in existing mobile data network or WLAN Page 13

Token Passing Protocol (1) Two logical topologies Bus Ring Token ring is originally developed by IBM, specified in IEEE 802.5 Token ring protocol operation Networks move a small frame, called a token, around the network Possession of the token grants the right to transmit. If the node, receiving the token, has no information to send, it passes the token to the next station. If the node, possessing the token does have information to transmit Seize the token Alter 1 bit of the token Append the information to be transmitted, and send to the next station in the ring The intended destination station flips the recognized address and framecopied bits in frame status field in the frame, and sends the modified frame back out to the ring Page 14

Token Passing Protocol (2) When information reaches the sending station again, it examines and removed the frame from the ring The source station then transmits a new token Physically star topology, logically ring topology Page 15

Token Ring Characteristics Token passing networks are deterministic, so the maximum propagation time is possibly calculated, more predictable than Ethernet Priority schemes can be deployed User-designated, high priority station can use network more frequently Priority Station >= Priority token can capture the token Several mechanisms for detecting and compensating for network fault One station is selected as active monitor It provides centralized source of timing information for other stations Ring-maintenance function Removal of continuously circulating frames Generation of the new token No collisions occur, contention-free! Page 16

IBM Token Ring vs. IEEE 802.5 Data rates Stations/segment Topology Media Signaling Access method Encoding IBM Token Ring network 4.16 Mbps 260 (shielded) 72 (unshielded) Star Twisted pair Baseband Token passing Differential manchester IEEE 802.5 4.16 Mbps 250 Not specified Not specified Baseband Token passing Differential manchester Page 17

Token Format (1) Page 18

Token Format (2) SD (starting delimiter) Identify the beginning of a transmission and for synchronization purpose The Access Control field Priority field: at most 3 bits, ranging from 0-7 Reservation field: at least 3 bits Token bit Set to 0 if it is a token Set to 1 if it is a data frame The monitor bit Set to 0 by the transmitting station Set to 1 by the active monitor station If the active monitor station sees the frame again, the frame is removed from the network The ED (ending delimiter) end of the frame Page 19

Token Ring Message Frame Format (1) Page 20

Token Ring Frame Format (2) The access control field is the same as the token format (the token bit is set to 1) The frame control field specifies the types of information Control information Data information The route info field is used in the network with multiple token ring LANS The data field contains the data (generally, the data is between 0-4,500 bytes) The FCS (frame check sequence) is used to detect an error The FS (frame status) field us to indicate to the transmitter if the frame was copied by the intended destination Page 21

Token Ring Example ---- FDDI FDDI (Fiber Distributed Data Interface) Developed by ANSI in mid 1980s Serving as a backbone due to its high bandwidth and long transmission distance 100 Mbps transmission Up to 500 network attachments Uses a token passing protocol Dual ring topology (primary and secondary rings) Normal operation The token and frames travel only on the primary ring in a single direction. The secondary ring transmits idle signals in the opposite direction Page 22

FDDI Token Ring Protocol Page 23

FDDI Wrap Condition Page 24

FDDI Dual Ring Topology Wrap condition (Fault tolerance) Cable or a device becomes disabled The primary ring wraps back into the secondary ring Fault tolerance is for single failure only When two or more failures occur, ring segments into independent rings, that are incapable of communicating with each other Page 25

Token Bus Protocol IEEE 802.4 The network implements token passing protocol over bus topology The token bus standard uses a linear topology more suitable for factory assembly lines. The token bus standard does not specify the physical topology. When powered up, the station with the highest address has the right of the channel. When the station has finished transmitting its data frame (if there is one), it sends a token frame specifically addresses to its successor. Now the next station gets the token, and the channel. After finishing data transmission, the token is sent to the next station etc. Page 26

Summary Controlled random access methods Reservation Protocols (Dynamic) R-ALOHA Packet Reservation Multiple Access (PRMA) Polling Techniques Hub polling Roll polling Token Passing Ring Bus FDDI Page 27

Reference [1] Kaveh Pahlavan & Allen H. Levesque, Wireless Information Networks, John Wiley & Sons, inc 1995. [2] Tin Yi Jang, Investigation of A Polling MAC Protocol with Capture Effect for Wireless LANs, Master thesis, California State Polytechnic University, 2002 www.csupomona.edu/~cs/ms/thesis/tjang.doc. [3] Web material, Token passing protocols http://courses.csusm.edu/htm426jl/lecture%20notes/3.%20token%20passing %20Protocols.ppt (07/03/2004). [4] IEEE 802 website http://standards.ieee.org/getieee802/ Page 28

Homework 1. Please list some systems using polling access methods 2. What is CDDI? How it works? Please give a detailed description on its MAC protocol operation. Page 29

Helsinki University of Technology S-72.333 Postgraduate Seminar on Radio Communications Any questions? Thanks!