Multiple Access: An Engineering Approach To Computer Networking
Multiple Access: An Engineering Approach To Computer Networking
✦ slave->master = uplink
✦ multipath interference
◆ hidden terminals
✦ transmitter heard only by a subset of receivers
◆ capture
✦ on collision, station with higher power overpowers the other
■ Mean delay
◆ amount of time a station has to wait before it successfully transmits
a packet
✦ depends on the load and the characteristics of the medium
Performance metrics
■ Stability
◆ with heavy load, is all the time spent on resolving contentions?
◆ => unstable
◆ with a stable algorithm, throughput does not decrease with offered
load
◆ if infinite number of uncontrolled stations share a link, then
instability is guaranteed
◆ but if sources reduce load when overload is detected, can achieve
stability
■ Fairness
◆ no single definition
◆ ‘no-starvation’: source eventually gets a chance to send
◆ max-min fair share: will study later
Outline
■ Contexts for the problem
■ Choices and constraints
■ Performance metrics
■ Base technologies
■ Centralized schemes
■ Distributed schemes
Base technologies
■ Isolates data from different sources
■ Three basic choices
◆ Frequency division multiple access (FDMA)
◆ Time division multiple access (TDMA)
◆ Code division multiple access (CDMA)
FDMA
■ Simplest
■ Best suited for analog links
■ Each station has its own frequency band, separated by guard
bands
■ Receivers tune to the right frequency
■ Number of frequencies is limited
◆ reduce transmitter power; reuse frequencies in non-adjacent cells
◆ example: voice channel = 30 KHz
◆ 833 channels in 25 MHz band
◆ with hexagonal cells, partition into 118 channels each
◆ but with N cells in a city, can get 118N calls => win if N > 7
TDMA
■ All stations transmit data on same frequency, but at different
times
■ Needs time synchronization
■ Pros
◆ users can be given different amounts of bandwidth
◆ mobiles can use idle times to determine best base station
◆ can switch off power when not transmitting
■ Cons
◆ synchronization overhead
◆ greater problems with multipath interference on wireless links
CDMA
■ Users separated both by time and frequency
■ Send at a different frequency at each time slot (frequency
hopping)
■ Or, convert a single bit to a code (direct sequence)
◆ receiver can decipher bit by inverse process
■ Pros
◆ hard to spy
◆ immune from narrowband noise
◆ no need for all stations to synchronize
◆ no hard limit on capacity of a cell
◆ all cells can use all frequencies
CDMA
■ Cons
◆ implementation complexity
◆ need for power control
✦ to avoid capture
◆ simple
✦ no carrier sensing, no token, no timebase synchronization
◆ independent of ‘a’
■ Cons
◆ under some mathematical assumptions, goodput is at most .18
◆ at high loads, collisions are very frequent
◆ sudden burst of traffic can lead to instability
✦ unless backoff is exponential
Slotted ALOHA
■ A simple way to double ALOHA’s capacity
■ Make sure transmissions start on a slot boundary
■ Halves window of vulnerability
■ Used in cellular phone uplink
ALOHA schemes summarized
Reservation ALOHA
■ Combines slot reservation with slotted ALOHA
■ Contend for reservation minislots using slotted ALOHA
■ Stations independently examine reservation requests and come
to consistent conclusions
■ Simplest version
◆ divide time into frames = fixed length set of slots
◆ station that wins access to a reservation minislot using S-ALOHA
can keep slot as long as it wants
◆ station that loses keeps track of idle slots and contends for them in
next frame
Evaluating R-ALOHA
■ Pros
◆ supports both circuit and packet mode transfer
◆ works with large ‘a’
◆ simple
■ Cons
◆ arriving packet has to wait for entire frame before it has a chance to
send
◆ cannot preempt hogs
◆ variants of R-ALOHA avoid these problems
■ Used for cable-modem uplinks