ALOHA Class of Multiple Access Protocols

Similar documents
LANs. Local Area Networks. via the Media Access Control (MAC) SubLayer. Networks: Local Area Networks

Local Area Networks transmission system private speedy and secure kilometres shared transmission medium hardware & software

Ethernet. Ethernet Frame Structure. Ethernet Frame Structure (more) Ethernet: uses CSMA/CD

Ring Local Area Network. Ring LANs

TCOM 370 NOTES LOCAL AREA NETWORKS AND THE ALOHA PROTOCOL

CS263: Wireless Communications and Sensor Networks

How To Make A Multi-User Communication Efficient

EECS 122: Introduction to Computer Networks Multiaccess Protocols. ISO OSI Reference Model for Layers

ECE 333: Introduction to Communication Networks Fall 2002

Data Link Layer. Page 1. Ethernet

RTT 60.5 msec receiver window size: 32 KB

Network Categories. Network Types for the Local Range. Ethernet. Carrier Sense Multiple Access

Random Access Protocols

CSMA/CA. Information Networks p. 1

Unit of Learning # 2 The Physical Layer. Sergio Guíñez Molinos sguinez@utalca.cl

EXAMPLES AND PROBLEMS. Competence Based Education Internet Protocols

2. What is the maximum value of each octet in an IP address? A. 128 B. 255 C. 256 D. None of the above

standard. Acknowledgement: Slides borrowed from Richard Y. Yale

Controlled Random Access Methods

Real-Time (Paradigms) (51)

Based on Computer Networking, 4 th Edition by Kurose and Ross

CSE331: Introduction to Networks and Security. Lecture 6 Fall 2006

How To Communicate With A Token Ring Network (Dihon)

High-Level Data Link Control

LAN Switching Computer Networking. Switched Network Advantages. Hubs (more) Hubs. Bridges/Switches, , PPP. Interconnecting LANs

CSE 123A Computer Networks

Collision of wireless signals. The MAC layer in wireless networks. Wireless MAC protocols classification. Evolutionary perspective of distributed MAC

Chapter 4. Medium Access Control. IN2P3 Octobre 2002 Jean-Pierre Thomesse

a. CSMA/CD is a random-access protocol. b. Polling is a controlled-access protocol. c. TDMA is a channelization protocol.

BCS THE CHARTERED INSTITUTE FOR IT. BCS HIGHER EDUCATION QUALIFICATIONS BCS Level 5 Diploma in IT COMPUTER NETWORKS

Note! The problem set consists of two parts: Part I: The problem specifications pages Part II: The answer pages

ESSENTIALS. Understanding Ethernet Switches and Routers. April 2011 VOLUME 3 ISSUE 1 A TECHNICAL SUPPLEMENT TO CONTROL NETWORK

Direct Link Networks. Introduction. Physical Properties. Lecture - Ethernet 1. Areas for Discussion. Ethernet (Section 2.6)

Local Area Networks. Guest Instructor Elaine Wong. Elaine_06_I-1

Algorithms for Interference Sensing in Optical CDMA Networks

Token Ring and. Fiber Distributed Data Interface (FDDI) Networks: Token Ring and FDDI 1

Adaptive DCF of MAC for VoIP services using IEEE networks

Performance Evaluation of Wired and Wireless Local Area Networks

Attenuation (amplitude of the wave loses strength thereby the signal power) Refraction Reflection Shadowing Scattering Diffraction

Data Link Layer Overview

... neither PCF nor CA used in practice

Operating System Concepts. Operating System 資 訊 工 程 學 系 袁 賢 銘 老 師

CS6956: Wireless and Mobile Networks Lecture Notes: 2/11/2015. IEEE Wireless Local Area Networks (WLANs)

Computer Network. Interconnected collection of autonomous computers that are able to exchange information

Fast Ethernet and Gigabit Ethernet. Networks: Fast Ethernet 1

ECE 358: Computer Networks. Homework #3. Chapter 5 and 6 Review Questions 1

Overview of Network Hardware and Software. CS158a Chris Pollett Jan 29, 2007.

Chapter 7 Low-Speed Wireless Local Area Networks

Medium Access Control (MAC) Protocols for Ad hoc Wireless Networks - III

Module 5. Broadcast Communication Networks. Version 2 CSE IIT, Kharagpur

RESOURCE ALLOCATION FOR INTERACTIVE TRAFFIC CLASS OVER GPRS

Wiereless LAN

Transport Layer. Chapter 3.4. Think about

EPL 657 Wireless Networks

Network Categories. Network Types for the Local Range. Ethernet

LLC: Frame Construction. Layer 2: Division into two Parts. Error-detecting and -correcting Codes. Error-correcting Codes

Tutorial.

Fast Ethernet and Gigabit Ethernet. Computer Networks: Fast and Gigabit Ethernet

Wireless LAN Protocol CS 571 Fall Kenneth L. Calvert All rights reserved

Computer Networks. Definition of LAN. Connection of Network. Key Points of LAN. Lecture 06 Connecting Networks

What is CSG150 about? Fundamentals of Computer Networking. Course Outline. Lecture 1 Outline. Guevara Noubir noubir@ccs.neu.

Introduction to Ethernet

TCP over Multi-hop Wireless Networks * Overview of Transmission Control Protocol / Internet Protocol (TCP/IP) Internet Protocol (IP)

DATA COMMUNICATIONS AND NETWORKING. Solved Examples

Transport Layer Protocols

Level 2 Routing: LAN Bridges and Switches

Module 15: Network Structures

DATA COMMUNICATION AND NETWORKS

CMPE 150 Winter 2009

MAC Algorithms in Wireless Networks

CCNA R&S: Introduction to Networks. Chapter 5: Ethernet

RFC 2544 Testing of Ethernet Services in Telecom Networks

Lecture 7 Multiple Access Protocols and Wireless

Guide to TCP/IP, Third Edition. Chapter 3: Data Link and Network Layer TCP/IP Protocols

LAN Performance Measurements Lab

Chapter 14: Distributed Operating Systems

Lecture 17: Wireless Networking"

Midterm Exam CMPSCI 453: Computer Networks Fall 2011 Prof. Jim Kurose

Improving Throughput Performance of the IEEE MAC Layer Using Congestion Control Methods

IEEE Broadband Wireless Access Working Group. ATM Based MAC Layer Proposal for the Air Interface Specification

An Experimental Study of Throughput for UDP and VoIP Traffic in IEEE b Networks

Ethernet, VLAN, Ethernet Carrier Grade

Chapter 16: Distributed Operating Systems

Networking Test 4 Study Guide

Wireless LAN advantages. Wireless LAN. Wireless LAN disadvantages. Wireless LAN disadvantages WLAN:

Markku Renfors. Partly based on student presentation by: Lukasz Kondrad Tomasz Augustynowicz Jaroslaw Lacki Jakub Jakubiak

Data Link Protocols. TCP/IP Suite and OSI Reference Model

What is it all about? Some simple solutions. Multiple Access. Contexts for the multiple access problem. Outline. Contexts

Wireless LAN Concepts

Ethernet. Ethernet. Network Devices

WiFi. Is for Wireless Fidelity Or IEEE Standard By Greg Goldman. WiFi 1

Note! The problem set consists of two parts: Part I: The problem specifications pages Part II: The answer pages

IEEE Wireless LAN Standard. Updated: 5/10/2011

WAN Data Link Protocols

VoIP in Mika Nupponen. S Postgraduate Course in Radio Communications 06/04/2004 1

Basic processes in IEEE networks

WIRELESS ETHERNET (IEEE )

IEEE Technical Tutorial. Introduction. IEEE Architecture

ECE 428 Computer Networks and Security

Network Performance Evaluation. Throughput. Troy Bennett. Computer Science Department. School of Engineering. California Polytechnic State University

Transcription:

ALOHA Class of Multiple Access Protocols ALOHA, also called pure ALOHA: Whenever a user has a frame to send, it simply transmits the frame. If collision occurs, it waits for a random period of time and re-sends it again Sender can always find out if its frame was destroyed by listening to channel. For a LAN, feedback is immediate, while for a satellite there is a long delay of 270 ms before sender knows If listening while transmitting is not possible, ACKs are needed, e.g. in packet radio, collision from simultaneous transmissions of multiple transmitters is detected by base station, who sends out ACK or NAK accordingly (via reverse channel) Performance: throughput S (frames/s) which defines average number of frames successfully transmitted per unit time, and average delay D (s) experienced by a frame Assuming average frame length τ f (s) and fixed channel rate, frame transmission can be modelled by Poisson distribution with mean arrival rate λ (frames/s) Normalised channel traffic or average number of old and new frames submitted per frame time is ALOHA: Tx 1 time G = λτ f (unit in Erlang) The throughput is then given by S = G Prob(no collision) Tx 2 τ Vulnerable period: 2 τ f f 71

ALOHA Class (continue) Slotted ALOHA: time is divided into slots of equal length greater or equal to average frame duration τ f, and frame transmission can only start at beginning of a time slot Probability that a frame does not suffer from a collision is given by P 0 = The throughput/frame time is then j e 2G, e G, ALOHA slotted ALOHA S = j G e 2G, G e G, ALOHA slotted ALOHA Maximum throughput of ALOHA: ds dg = e 2G 2Ge 2G = 0 G max = 1 2 S max = 1 2 e 1 = 0.1839 Maximum throughput of slotted ALOHA: ds dg = e G Ge G = 0 G max = 1 S max = e 1 = 0.3679 ALOHA class is simple to implement but efficiency is low. By listening before transmitting, lots of collisions can be avoided carrier sense multiple access (CSMA) 72

Carrier Sense Multiple Access A user wishing to transmit first listens to the medium to see if another transmission is in progress (carrier sense) If the channel is in use, it must wait. If the medium is idle, it may transmit 1-persistent: a user keeps listening to see if channel is free and, as soon as the channel is idle, it transmits Nonpersistent: when the channel is busy, it waits for a random period of time before trying to listen again. This is less greedy p-persistent: for slotted systems. When the channel is free during current slot, it may transmit with probability p or may defer until next slot with probability 1 p Detection or sensing delay is determined by receiver hardware: a small detection time means that a user can detect a free channel rapidly Propagation delay is critical to performance: a small propagation delay means that as soon as a user launches a packet, others knows quickly and will defer to transmit, thus reducing collisions CSMA is effective for LANs, where propagation delay is usually very small compared with frame transmission, i.e. small link parameter a Performance of a random access scheme is specified by S versus G and D versus G 73

CSMA (continue) Throughput versus load: For CSMA with small p, the method performs very well in terms of throughput at high load (almost 100%). However, for smaller p, users must wait longer (larger delay) to attempt transmission 0 1 2 3 4 5 6 7 8 9 In the extreme case: only single user G (attempts per packet time) wishes to transmit, expected number of deferring is 1/p. If p = 0.01, at low load, a user will wait an average of 99 time slots before transmitting on an idle line For low load, slotted ALOHA is preferred due to its low delay S (throughput per packet time) 1.0 0.9 0.8 0.7 0.6 0.5 0.4 0.3 0.2 0.1 0 Pure ALOHA Slotted ALOHA 0.5-persistent CSMA 1-persistent CSMA 0.01persistent CSMA Nonpersistent CSMA 0.1-persistent CSMA Trade-off throughput versus delay: multiple access protocol with the characteristics of dashed curve is preferred Better performance can be achieved if user continues to listen to medium while transmitting and stops transmission immediately if collision is detected CSMA with collision detection Throughput Normalized delay 74

CSMA with Collision Detection A user wishes to transmit: 1. Listens to see if the channel is free. If the channel is idle, it transmits. If the channel is busy, it keeps listening until the channel is free, then transmits immediately (1-persistent) 2. During the transmission, it keeps listening to detect collision. If a collision is detected, it stops transmitting immediately, and waits a random period of time before goes back to step 1. States of CSMA/CD: transmission period, contention period and idle period Let τ be end-to-end (two farthest users) propagation time Worst case time to detect collision is 2τ: Frames should be long enough to allow collision detection prior to the end of transmission, otherwise CSMA/CD degrades to CSMA Binary exponential backoff is used: when repeatedly facing collisions, mean value of random delay is doubled Transmission period t o Contention period Contention slots Frame Frame Frame Frame Time Idle period A Packet starts at time 0 B A Packet almost at B at τ - B A (a) (c) Collision at time τ B A (b) Noise burst gets back to A at 2τ (d) B 75

MAC for IEEE 802.3 Ethernet IEEE 802.3 Ethernet uses 1-persistent CSMA with CD and the frame format is: Preamble: seven 10101010 for receiver and sender clock synchronisation Start of frame delimiter: 10101011, 1-byte frame flag Bytes 7 1 2 or 6 2 or 6 2 Preamble Start of frame delimiter Destination address Source address Length of data field 0-1500 0-46 4 Data Pad Checksum Address: 48 bits, the 1st bit is 0/1 for ordinary/group address and the 2nd bit is 0/1 for global/local address, and address consisting of all 1 bits is for broadcast Frame worst-case time to detect collision. For 10-Mbps Ethernet specification with maximum cable length 2.5 km and 4 repeaters, minimum frame time is 51.2 µs minimum 64 bytes Data length and pad: If length of data is less than 46 bytes, pad field is filled out to achieve minimum frame size of 64 bytes. This in turn requires to indicate actual data length MAC frame does not have control field and hence no sequence number it alone can only offer unacknowledged connectionless datagram services For connection-oriented services or for error and flow control LLC protocol frames are inserted in data fields of MAC frames LLC is very similar to HDLC, with address, control and data fields but no frame flag and checksum: completed layer-2 frame is MAC frame, which already has frame flag and frame checksum 76

CSMA with CD Performance Let R be data rate (bps), d be end-to-end link distance (m), V be propagation velocity (m/s), and L average frame length (bits). The link parameter is defined as: a = propagation time frame time = R d L V Maximum possible utilisation of the channel is expressed as the ratio of throughput to capacity View time in slots, with slot length 2τ and τ = d V being end-to-end propagation time Recall CSMA/CD model: transmission, contention and idle periods. Under heavy load assumption no idle time Let T t be average transmission interval and T c be average contention interval. The maximum utilisation or efficiency is given by U = T t + T c Since T t = 1 2a 2τ and it can be shown T c = e 2τ, U = T t 1 1 + 5.44a Example. Guided media V = 2 10 8 (m/s), 10 Mbps LANs (Ethernet) with τ = 25.6 µs: Frame length 64 bytes U = 0.27, and frame length 1024 bytes U = 0.85 77

IEEE 802.4 Token Bus Contention protocol in IEEE 802.3 Ethernet is stochastic, i.e. worst case waiting may be unbounded. Some applications prefer known or fixed worst case waiting round-robin Token bus: physically all users are connected to a bus (as in Ethernet) but they are logically organised in a ring Special control frame, token, is handed from user to user in turn. User currently holding token may transmit Token bus MAC: Frame control: indicates whether a frame is data or control For data, frame control contains the frame s priority and a frame Broadband coaxial cable 17 Bytes 1 1 1 2 or 6 2 or 6 14 20 13 11 7 19 Direction of token motion Destination address Frame control Start delimiter Preamble Source address Data Logical ring Checksum This station not currently in the logical ring 0-8182 4 1 End delimiter status indicator for destination to acknowledge correct or incorrect receipt of the frame. Otherwise destination would not be allowed to do anything since it does not have token For control, it indicates type of control frame, such as claim token during initialisation, allow new stations to enter, recover from token loss, resolve contending stations for position, actual token, allow stations to leave 78

IEEE 802.5 Token Ring Token bus has very high complexity, much to do with converting a physical bus into a logical ring Token ring: Why make thing difficult? Just physically connect stations into a ring Ring interface Station 1 bit delay Ring interface Bit physical length: Let the data rate be R Mbps and propagation speed 200 m/µs A bit lasts 1/R µs or has a length 200/R m e.g. for R = 4 Mbps, bit physical length is 50 m Unidirectional ring To station From station To station (a) (b) (c) From station Ring physical length in bits must be large enough to contain token e.g. 1 km ring with R = 4 Mbps, ring physical length is 20 bits, not enough for a 24-bit token If ring physical length is too small insert artificial delay to increase it Characteristics: for 802.3 Ethernet bus, a minimum frame length is required; for 802.5 token ring, a minimum ring physical length is required 79

802.5 Token Ring (continue) MAC for token ring: with token/frame format as follows, 3-byte token circulates around the ring User wishing to transmit must wait for token to arrive and captures it (turns token into 3 bytes of a normal frame) It can then transmit and, when transmitted frame bits circulate back to sender, it removes them After user has finished Tx, it regenerates and releases token 1 1 1 SD AC ED (a) Bytes 1 1 1 2 or 6 2 or 6 SD AC FC Destination address Frame control Access control Starting delimiter Source address No limit 4 Data Ending delimiter Frame status Checksum Access control: contains token bit (0 for token, 1 for frame), monitor, priority and reservation bits Frame control: indicate data or control frame, latter for ring maintenance/fault management Token holding time: a user is allowed to hold token for THT, default value 10 ms Frame Status: contains A (address recognised) and C (frame copied) bits, both are reset to logic 0 at sender When receiver recognises destination address as its own, it sets A to logic 1, and if receiver is able to copy frame, it sets C to logic 1 This provides automatic ACK for each frame, otherwise receiver cannot do anything as it does not have token (b) 1 1 ED FS 80

Token Bus and Ring MAC Performance Assume n active users and recall the definition of link parameter a Maximum utilisation or efficiency is U = ( 1 1+a/n, a < 1 1 a(1+1/n), a > 1 Under a heavy load assumption, n, Comparison of three LANs 802.3, 802.4 and 802.5 use roughly similar technology and get roughly similar performance Under most circumstances, all three perform well 802.3 Ethernet is most popular Three standards have three different frame formats Bridging them can have serious difficulties U = j 1, a < 1 1 a, a > 1 Issue 802.3 802.4 802.5 Performance OK OK OK Simplicity yes no yes deterministic no yes yes Priorities no yes yes Heavy-load Perf bad good good Reliability OK very good good User base large small large 81

Summary For broadcast networks, data link layer is divided into medium access control and logical link control sublayers: LLC deals with point-to-point connection issues, and MAC deals with how to access shared medium Three medium access strategies are: contention (random access); round-robin and reservation (scheduled access) Contention methods: ALOHA, slotted ALOHA, CSMA, CSMA with CD Ethernet: CSMA with CD, frame time must be no less than 2 end-to-end propagation delay minimum frame length Token bus and ring standards (round-robin based): bit has a physical length and therefore minimum ring length is needed Comparison of three LANs, how their MACs operate, frame formats, special features 82