ALOHA
ALOHA
ALOHA
By:Dr.Parneet Kaur
Aloha means "Hello". Aloha is a multiple access protocol at the datalink layer and
proposes how multiple terminals access the medium without interference or collision. In
1972 Roberts developed a protocol that would increase the capacity of aloha two fold.
The Slotted Aloha protocol involves dividing the time interval into discrete slots and
each slot interval corresponds to the time period of one frame. This method requires
synchronization between the sending nodes to prevent collisions.
Pure ALOHA
• In pure ALOHA, the stations transmit frames whenever they have data to send.
• When two or more stations transmit simultaneously, there is collision and the frames
are destroyed.
• In pure ALOHA, whenever any station transmits a frame, it expects the
acknowledgement from the receiver.
• If acknowledgement is not received within specified time, the station assumes that the
frame (or acknowledgement) has been destroyed.
• If the frame is destroyed because of collision the station waits for a random amount of
time and sends it again. This waiting time must be random otherwise same frames will
collide again and again.
• Therefore pure ALOHA dictates that when time-out period passes, each station must
wait for a random amount of time before resending its frame. This randomness will help
avoid more collisions.
• In fig there are four stations that .contended with one another for access to shared
channel. All these stations are transmitting frames. Some of these frames collide
because multiple frames are in contention for the shared channel. Only two frames,
frame 1.1 and frame 2.2 survive. All other frames are destroyed.
• Whenever two frames try to occupy the channel at the same time, there will be a
collision and both will be damaged. If first bit of a new frame overlaps with just the last
bit of a frame almost finished, both frames will be totally destroyed and both will have to
be retransmitted.
Slotted ALOHA
• Slotted ALOHA was invented to improve the efficiency of pure ALOHA as chances of
collision in pure ALOHA are very high.
• In slotted ALOHA, the time of the shared channel is divided into discrete intervals
called slots.
• The stations can send a frame only at the beginning of the slot and only one frame is
sent in each slot.
• In slotted ALOHA, if any station is not able to place the frame onto the channel at the
beginning of the slot i.e. it misses the time slot then the station has to wait until the
beginning of the next time slot.
• In slotted ALOHA, there is still a possibility of collision if two stations try to send at the
beginning of the same time slot as shown in fig.
• Slotted ALOHA still has an edge over pure ALOHA as chances of collision are reduced
to one-half.
Carrier Sensed Multiple Access (CSMA) : CSMA is a network access method used
on shared network topologies such as Ethernet to control access to the network.
Devices attached to the network cable listen (carrier sense) before transmitting. If the
channel is in use, devices wait before transmitting. MA (Multiple Access) indicates that
many devices can connect to and share the same network. All devices have equal
access to use the network when it is clear.
In other words, a station that wants to communicate "listen" first on the media
communication and awaits a "silence" of a preset time (called the Distributed Inter
Frame Space or DIFS). After this compulsory period, the station starts a countdown for
a random period considered. The maximum duration of this countdown is called the
collision window (Window Collision, CW). If no equipment speaks before the end of the
countdown, the station simply deliver its package. However, if it is overtaken by another
station, it stops immediately its countdown and waits for the next silence. She then
continued his account countdown where it left off. This is summarized in Figure. The
waiting time random has the advantage of allowing a statistically equitable distribution of
speaking time between the various network equipment, while making little unlikely (but
not impossible) that both devices speak exactly the same time. The countdown system
prevents a station waiting too long before issuing its package. It's a bit what place in a
meeting room when no master session (and all the World's polite) expected a silence,
then a few moments before speaking, to allow time for someone else to speak. The time
is and randomly assigned, that is to say, more or less equally.
Again, this is what we do naturally in a meeting room if many people speak exactly the
same time, they are realizing account immediately (as they listen at the same time they
speak), and they interrupt without completing their sentence. After a while, one of them
speaks again. If a new collision occurs, the two are interrupted again and tend to wait a
little longer before speaking again.
CSMA protocol was developed to overcome the problem found in ALOHA i.e. to
minimize the chances of collision, so as to improve the performance. CSMA protocol is
based on the principle of 'carrier sense'. The station senses the carrier or channel
before transmitting a frame. It means the station checks the state of channel, whether it
is idle or busy.
Even though devices attempt to sense whether the network is in use, there is a good
chance that two stations will attempt to access it at the same time. On large networks,
the transmission time between one end of the cable and another is enough that one
station may access the cable even though another has already just accessed it.
The chances of collision still exist because of propagation delay. The frame transmitted
by one station takes some time to reach other stations. In the meantime, other stations
may sense the channel to be idle and transmit their frames. This results in the collision.
• The propagation delay time greatly affects this protocol. Let us suppose, just after the
station I begins its transmission, station 2 also became ready to send its data and
senses the channel. If the station I signal has not yet reached station 2, station 2 will
sense the channel to be idle and will begin its transmission. This will result in collision.
Even if propagation delay time is zero, collision will still occur. If two stations became
.ready in the middle of third station's transmission, both stations will wait until the
transmission of first station ends and then both will begin their transmission exactly
simultaneously. This will also result in collision.
• In this scheme, if a station wants to transmit a frame and it finds that the channel is
busy (some other station is transmitting) then it will wait for fixed interval oftime.
• After this time, it again checks the status of the channel and if the channel is.free it will
transmit.
Advantage of non-persistent
• It reduces the chance of collision because the stations wait a random amount of time.
It is unlikely that two or more stations will wait for same amount of time and will
retransmit at the same time.
Disadvantage of non-persistent
• It reduces the efficiency of network because the channel remains idle when there may
be stations with frames to send. This is due to the fact that the stations wait a random
amount of time after the collision.
(iii) p-persistent CSMA
• This method is used when channel has time slots such that the time slot duration is
equal to or greater than the maximum propagation delay time.
• Whenever a station becomes ready to send, it senses the channel.
• If channel is busy, station waits until next slot.
• If channel is idle, it transmits with a probability p.
• With the probability q=l-p, the station then waits for the beginning of the next time slot.
• If the next slot is also idle, it either transmits or waits again with probabilities p and q.
• This process is repeated till either frame has been transmitted or another station has
begun transmitting.
• In case of the transmission by another station, the station acts as though a collision
has occurred and it waits a random amount of time and starts again.
Advantage of p-persistent
• It reduces the chance of collision and improves the efficiency of the network.
Again, this is what we do naturally in a meeting room if many people speak exactly the
same time, they are realizing account immediately (as they listen at the same time they
speak), and they interrupt without completing their sentence. After a while, one of them
speaks again. If a new collision occurs, the two are interrupted again and tend to wait a
little longer before speaking again.
The frame format specified by IEEE 802.3 standard contains following fields.
1. Preamble: It is seven bytes (56 bits) that provides bit synchronization. It consists of
alternating Os and 1s. The purpose is to provide alert and timing pulse.
2. Start Frame Delimiter (SFD): It is one byte field with unique pattern: 10 10 1011.
It marks the beginning of frame.
3. Destination Address (DA): It is six byte field that contains physical address of
packet's destination.
4. Source Address (SA): It is also a six byte field and contains the physical address of
source or last device to forward the packet (most recent router to receiver).
5. Length: This two byte field specifies the length or number of bytes in data field.
6. Data: It can be of 46 to 1500 bytes, depending upon the type of frame and the length
of the information field.
7. Frame Check Sequence (FCS): This for byte field contains CRC for error
detection.
CSMA/CD Procedure:
Explanation:
• The station that has a ready frame sets the back off parameter to zero.
• Then it senses the line using one of the persistent strategies.
• If then sends the frame. If there is no collision for a period corresponding to one
complete frame, then the transmission is successful.
• Otherwise the station sends the jam signal to inform the other stations about the
collision.
• The station then increments the back off time and waits for a random back off time
and sends the frame again.
• If the back off has reached its limit then the station aborts the transmission.
• The MAC sublayer protocol does not guarantee reliable delivery. Even in absence of
collision the receiver may not have copied the frame correctly.
CSMA/CA protocol is used in wireless networks because they cannot detect the collision
so the only solution is collision avoidance.
(iii) Acknowledgements
• Whenever the channel is found idle, the station does not transmit immediately. It
waits for a period of time called interframe space (IFS).
• When channel is sensed to be idle, it may be possible that same distant station may
have already started transmitting and the signal of that distant station has not yet
reached other stations.
• Therefore the purpose of IFS time is to allow this transmitted signal to reach other
stations.
• If after this IFS time, the channel is still idle, the station can send, but it still needs to
wait a time equal to contention time.
• IFS variable can also be used to define the priority of a station or a frame.
2. Contention Window
• A station that is ready to send chooses a random number of slots as its wait time.
• The number of slots in the window changes according to the binary exponential back-
off strategy. It means that it is set of one slot the first time and then doubles each time
the station cannot detect an idle channel after the IFS time.
• This is very similar to the p-persistent method except that a random outcome defines
the number of slots taken by the waiting station.
• In contention window the station needs to sense the channel after each time slot.
• If the station finds the channel busy, it does not restart the process. It just stops the
timer & restarts it when the channel is sensed as idle.
3. Acknowledgement
• Despite all the precautions, collisions may occur and destroy the data.
• The positive acknowledgment and the time-out timer can help guarantee that receiver
has received the frame.
CSMA/CA Procedure:
• The station ready to transmit, senses the line by using one of the persistent strategies.
• As soon as it find the line to be idle, the station waits for an IFG (Interframe gap)
amount of time.
• If then waits for some random time and sends the frame.
• After sending the frame, it sets a timer and waits for the acknowledgement from the
receiver.
• If the acknowledgement is received before expiry of the timer, then the transmission is
successful.
• But if the transmitting station does not receive the expected acknowledgement before
the timer expiry then it increments the back off parameter, waits for the back off time
and resenses the line.
Ethernet
Ethernet is a widely deployed LAN technology.This technology was invented by Bob Metcalfe
and D.R. Boggs in the year 1970. It was standardized in IEEE 802.3 in 1980.
Ethernet shares media. Network which uses shared media has high probability of data collision.
Ethernet uses Carrier Sense Multi Access/Collision Detection (CSMA/CD) technology to detect
collisions. On the occurrence of collision in Ethernet, all its hosts roll back, wait for some
random amount of time, and then re-transmit the data.
Ethernet connector is,network interface card equipped with 48-bits MAC address. This helps
other Ethernet devices to identify and communicate with remote devices in Ethernet.
Fast-Ethernet
To encompass need of fast emerging software and hardware technologies, Ethernet extends itself
as Fast-Ethernet. It can run on UTP, Optical Fiber, and wirelessly too. It can provide speed up to
100 MBPS. This standard is named as 100BASE-T in IEEE 803.2 using Cat-5 twisted pair cable.
It uses CSMA/CD technique for wired media sharing among the Ethernet hosts and CSMA/CA
(CA stands for Collision Avoidance) technique for wireless Ethernet LAN.
Fast Ethernet on fiber is defined under 100BASE-FX standard which provides speed up to 100
MBPS on fiber. Ethernet over fiber can be extended up to 100 meters in half-duplex mode and
can reach maximum of 2000 meters in full-duplex over multimode fibers.
Giga-Ethernet
After being introduced in 1995, Fast-Ethernet could enjoy its high speed status only for 3 years
till Giga-Ethernet introduced. Giga-Ethernet provides speed up to 1000 mbits/seconds.
IEEE802.3ab standardize Giga-Ethernet over UTP using Cat-5, Cat-5e and Cat-6 cables.
IEEE802.3ah defines Giga-Ethernet over Fiber.
Virtual LAN
LAN uses Ethernet which in turn works on shared media. Shared media in Ethernet create one
single Broadcast domain and one single Collision domain. Introduction of switches to Ethernet
has removed single collision domain issue and each device connected to switch works in its
separate collision domain. But even Switches cannot divide a network into separate Broadcast
domains.
Virtual LAN is a solution to divide a single Broadcast domain into multiple Broadcast domains.
Host in one VLAN cannot speak to a host in another. By default, all hosts are placed into the
same VLAN.
In this diagram, different VLANs are depicted in different color codes. Hosts in one VLAN, even
if connected on the same Switch cannot see or speak to other hosts in different VLANs. VLAN is
Layer-2 technology which works closely on Ethernet. To route packets between two different
VLANs a Layer-3 device such as Router is required.
Repeater – A repeater operates at the physical layer. Its job is to regenerate the signal over the
same network before the signal becomes too weak or corrupted so as to extend the length to
which the signal can be transmitted over the same network. An important point to be noted about
repeaters is that they do not amplify the signal. When the signal becomes weak, they copy the
signal bit by bit and regenerate it at the original strength. It is a 2 port device.
2. Hub – A hub is basically a multiport repeater. A hub connects multiple wires coming from
different branches, for example, the connector in star topology which connects different stations.
Hubs cannot filter data, so data packets are sent to all connected devices. In other words,
collision domain of all hosts connected through Hub remains one. Also, they do not have
intelligence to find out best path for data packets which leads to inefficiencies and wastage.
Types of Hub
Active Hub :- These are the hubs which have their own power supply and can clean ,
boost and relay the signal along the network. It serves both as a repeater as well as wiring
center. These are used to extend maximum distance between nodes.
Passive Hub :- These are the hubs which collect wiring from nodes and power supply
from active hub. These hubs relay signals onto the network without cleaning and boosting
them and can’t be used to extend distance between nodes.
3. Bridge – A bridge operates at data link layer. A bridge is a repeater, with add on functionality
of filtering content by reading the MAC addresses of source and destination. It is also used for
interconnecting two LANs working on the same protocol. It has a single input and single output
port, thus making it a 2 port device.
Types of Bridges
Transparent Bridges :- These are the bridge in which the stations are completely
unaware of the
bridge’s existence i.e. whether or not a bridge is added or deleted from the network ,
reconfiguration of
the stations is unnecessary. These bridges makes use of two processes i.e. bridge
forwarding and bridge learning.
Source Routing Bridges :- In these bridges, routing operation is performed by source
station and the frame specifies which route to follow. The hot can discover frame by
sending a specical frame called discovery frame, which spreads through the entire
network using all possible paths to destination.
4. Switch – A switch is a multi port bridge with a buffer and a design that can boost its
efficiency(large number of ports imply less traffic) and performance. Switch is data link layer
device. Switch can perform error checking before forwarding data, that makes it very efficient as
it does not forward packets that have errors and forward good packets selectively to correct port
only. In other words, switch divides collision domain of hosts, but broadcast domain remains
same.
5. Routers – A router is a device like a switch that routes data packets based on their IP
addresses. Router is mainly a Network Layer device. Routers normally connect LANs and
WANs together and have a dynamically updating routing table based on which they make
decisions on routing the data packets. Router divide broadcast domains of hosts connected
through it.
6. Gateway – A gateway, as the name suggests, is a passage to connect two networks together
that may work upon different networking models. They basically works as the messenger agents
that take data from one system, interpret it, and transfer it to another system. Gateways are also
called protocol converters and can operate at any network layer. Gateways are generally more
complex than switch or router.
7. Brouter – It is also known as bridging router is a device which combines features of both
bridge and router. It can work either at data link layer or at network layer. Working as router, it is
capable of routing packets across networks and working as bridge, it is capable of filtering local
area network traffic.