3 Unit-3
3 Unit-3
2. Multicast: The multicast address allows the source to send a frame to a group
of devices. In Layer-2 (Ethernet) Multicast address, LSB (least significant bit) of
the first octet of an address is set to one. IEEE has allocated the address block 01-
80-C2-xx- xx-xx (01-80-C2-00-00-00 to 01-80-C2-FF-FF-FF) for group
addresses for use by standard protocols.
Pure Aloha
Whenever data is available for sending over a channel at stations, we use Pure
Aloha. In pure Aloha, when each station transmits data to a channel without
checking whether the channel is idle or not, the chances of collision may occur,
and the data frame can be lost. When any station transmits the data frame to a
channel, the pure Aloha waits for the receiver's acknowledgment. If it does not
acknowledge the receiver end within the specified time, the station waits for a
random amount of time, called the backoff time (Tb). And the station may
assume the frame has been lost or destroyed. Therefore, it retransmits the frame
until all the data are successfully transmitted to the receiver.
1. The total vulnerable time of pure Aloha is 2 * Tfr.Maximum throughput occurs when
As we can see in the figure above, there are four stations for accessing a shared
channel and transmitting data frames. Some frames collide because most stations
send their frames at the same time. Only two frames, frame 1.1 and frame 2.2,
are successfully transmitted to the receiver end. At the same time, other frames
are lost or destroyed. Whenever two frames fall on a shared channel
simultaneously, collisions can occur, and both will suffer damage. If the new
frame's first bit enters the channel before finishing the last bit of the second
frame. Both frames are completely finished, and both stations must retransmit the
data frame.
Slotted Aloha
The slotted Aloha is designed to overcome the pure Aloha's efficiency because pure
Aloha has a very high possibility of frame hitting. In slotted Aloha, the shared
channel is divided into a fixed time interval called slots. So that, if a station
wants to send a frame to a shared channel, the frame can only be sent at the
beginning of the slot, and only one frame is allowed to be sent to each slot. And if
the stations are unable to send data to the beginning of the slot, the station will have
to wait until the beginning of the slot for the next time. However, the possibility
of a collision remains when trying to send a frame at the beginning of two or
more station time slot.
1. Maximum throughput occurs in the slotted Aloha when G = 1 that is
37%.The probability of successfully transmitting the data frame in the
slotted Aloha is S = G * e ^ - 2 G.
2. The total vulnerable time required in slotted Aloha is Tfr.
CSMA (Carrier Sense Multiple Access)
It is a carrier sense multiple access based on media access protocol to sense the
traffic on a channel (idle or busy) before transmitting the data. It means that if the
channel is idle, the station can send data to the channel. Otherwise, it must wait
until the channel becomes idle. Hence, it reduces the chances of a collision on
a transmission medium.
CSMA Access Modes
1-Persistent: In the 1-Persistent mode of CSMA that defines each node, first
sense the shared channel and if the channel is idle, it immediately sends the data.
Else it must wait and keep track of the status of the channel to be idle and
broadcast the frame unconditionally as soon as the channel is idle.
Non-Persistent: It is the access mode of CSMA that defines before transmitting
the data, each node must sense the channel, and if the channel is inactive, it
immediately sends the data. Otherwise, the station must wait for a random time
(not continuously), and when the channel is found to be idle, it transmits the
frames.
P-Persistent: It is the combination of 1-Persistent and Non- persistent modes.
The P-Persistent mode defines that each node senses the channel, and if the
channel is inactive, it sends a frame with a P probability. If the data is not
transmitted, it waits for a (q = 1-p probability) random time and resumes the
framewith the next time slot.
collisions in the shared channel, it divides the channel into different frequency
slots that allocate stations to transmit the data frames. The same
frequency bandwidth into the shared channel by dividing the signal into various
time slots to transmit it. However, TDMA has an overhead of synchronization
that specifies each station's time slot by adding synchronization bits to each slot.
CDMA
The code division multiple access (CDMA) is a channel access method. In
CDMA, all stations can simultaneously send the dataover the same channel. It
means that it allows each station to transmit the data frames with full frequency
on the shared channel at all times. It does not require the division of bandwidth
on a shared channel based on time slots. If multiple stations send data to a
channel simultaneously, their data frames are separated by a unique code
sequence. Each station has a different unique code for transmitting the data over
a shared channel. For example, there are multiple users in a room that are
continuously speaking. Data is received by the users if only two- person interact
with each other using the same language. Similarly, in the network, if different
stations communicate with each other simultaneously with different code
language.
Multiple access protocols are a set of protocols operating in the Medium Access
Control sublayer (MAC sublayer) of the Open Systems Interconnection (OSI) model.
These protocols allow a number of nodes or users to access a shared network
channel. Several data streams originating from several nodes are transferred
through the multi-point transmission channel.
The objectives of multiple access protocols are optimization of transmission
time, minimization of collisions and avoidance of crosstalks.
How is that possible? The reason behind this is the multiple access protocols. If
you refer to the OSI model you will come across the data link layer. Now divide
the layers into 2 parts, the upper part of the layer will take care of the data link
control, and the lower half will be taking care in resolving the access to the
shared media, as shown in the above diagram.
The following diagram classifies the multiple-access protocol. In this article, we
are going to cover Random Access Protocol.
Random Access Protocols
Once again, let's use the example of mobile phone communication. Whenever
you call someone, a connection between you and the desired person is
established, also anyonecan call anyone. So here we have all the users (stations)
at an equal priority, where any station can send data depending on medium's state
whether it is idle or busy, meaning that if you friend is talking to someone else
through the mobile phone, then its status is busy and you cannot establish a
connection and since all the users are assigned equal priority you can not
disconnect your friend's ongoing call and connect yours.
The random access protocols consist of the following characteristics:
1. There is no time restriction for sending the data (you can talk to your
friend without a time restriction).
2. There is a fixed sequence of stations which are transmitting the data.
As in the above diagram you might have observed that the random-access
protocol is further divided into four categories, which are:
1. ALOHA
2. CSMA
3. CSMA/CD
4. CSMA/CA
Let's cover each one of them, one by one.
ALOHA Random Access Protocol
The ALOHA protocol or also known as the ALOHA method is a simple
communication scheme in which every transmitting station or source in a
network will send the data whenever a frame is available for transmission. If we
succeed and the frame reaches its destination, then the next frame is lined-up for
transmission. But remember, if the data frame is not received by the receiver
(maybe due to collision) then the frame is sent again until it successfully reaches
the receiver's end.
Whenever we talk about a wireless broadcast system or a half- duplex two-way
link, the ALOHA method works efficiently. But as the network becomes more
and more complex e.g. the ethernet. Now here in the ethernet, the system
involves multiple sources and destinations which share a common data path or
channel, then the conflict occurs because data-frames collide, and the
information is lost. Following is the flow chart of Pure ALOHA.
Collision status It does not reduce the Here, it reduces the total
total number of collisions number of collisions to
to half
half and doubles the
efficiency of pure
ALOHA
But, what to do if the channels are busy? Now, here the persistence methods can
be applied to help the station act when the channel is busy or idle.
The CSMA has 4 access modes:
o 1-persistent mode: In this, first the node checks the channel, if the
channel is idle then the node or station transmits data, otherwise it keeps
on waiting and whenever the channel is idle, the stations transmit the
data-frame.
o Non-persistent mode: In this, the station checks the channel similarly as
1-persistent mode, but the only difference is that when the channel is busy
it checks it again after a random amount of time, unlike the 1- persistent
where the stations keep on checking continuously.
o P-persistent mode: In this, the station checks the channel
and if found idle then it transmits the data frame with the probability of P
and if the data is not transmitted (1-P) then the station waits for a random
amount of time and again transmits the data with the probability P and this
cycle goes on continuously until the data-frame is successfully sent.
o O-persistent: In this, the transmission occurs based on the superiority of
stations which is decided beforehand and transmission occurs in that order.
If the channel is idle, then the station waits for its turn to send the data-
frame.
Throughput & Efficiency of CSMA:
It is comparatively much greater than the throughput of pure and slotted
ALOHA. Here, for the 1-persistent mode, the throughput is 50% when G=1
and for Non-persistent mode, the throughput can reach up to 90%.
CSMA/CD Random Access Protocol
CSMA/CD means CSMA with Collision Detection.
In this, whenever station transmits data-frame it then monitors the channel or the
medium to acknowledge the state of the transmission i.e. successfully transmitted
or failed. If the transmission succeeds, then it prepares for the next frame
otherwise it resends the previously failed data-frame. The point to remember here
is, that the frame transmission time should be at least twice the maximum
propagation time, which can be deduced when the distance between the two
stations involved in a collision is maximum.
CSMA/CA Random Access Protocol
CSMA/CA means CSMA with collision avoidance.
To detect the possible collisions, the sender receives the acknowledgement and if
there is only one acknowledgment present (it's own) then this means that the data-
frame has been sent successfully. But, if there are 2 or more acknowledgment
signals then this indicates that the collision has occurred.
This method avoids collisions by:
o Interframe space: in this case, assume that your station waits for the
channel to become idle and found that the channel is idle, then it will not
send the data-frame immediately (in order to avoid collision due to
propagation delay) it rather waits for some time called interframe space or
IFS, and after this time the station again checks the medium for being idle.
But it should be kept in mind that the IFS duration depends on the
priority of the station.
o Contention Window: here, the time is divided into slots. Say, if the
sender is ready for transmission of the data, it then chooses a random
number of slots as waiting time
which doubles every time whenever the channel is busy. But, if the
channel is not idle at that moment, then it does not restart the entire
process but restarts the timer when the channel is found idle again.
o Acknowledgment: as we discussed above that the sender station will re-
transmits the data if acknowledgment is not received before the timer
expires.
Collision-Free Protocols in Computer Network
Almost collisions can be avoided in CSMA/CD.they can still occur during the
contention period.the collision during contention period adversely affects the
system performance, this happens when the cable is long and length of packet are
short. This problem becomes serious as fiber optics network come into use. Here
we shall discuss some protocols that resolve the collision during the contention
period.
Bit-map Protocol
Binary Countdown
Limited Contention Protocols
The Adaptive Tree Walk Protocol
Pure and slotted Aloha, CSMA and CSMA/CD are Contention based
Protocols:
Try-if collide-Retry
No guarantee of performance
What happen if the network load is high?
Collision Free Protocols:
Pay constant overhead to achieve performance guarantee
Good when network load is high
1. Bit-map Protocol:
Bit map protocol is collision free Protocol in In bitmap protocol method, each
contention period consists of exactly N slots. if any station has to send frame, then
it transmits a 1 bit in the respective slot. For example if station 2 has a frame
to send, it transmits a 1 bit during the second slot.
In general Station 1 Announce the fact that it has a frame questions by inserting a
1 bit into slot 1. In this way, each station has complete knowledge of which
station wishes to transmit. There will never be any collisions because everyone
agrees on who goes next. Protocols like this in which the desire to transmit is
broadcasting for the actual transmission are called Reservation Protocols.
For analyzing the performance of this protocol, We will measure time in units of the
contention bits slot, with a data frame consisting of d time units. Under low load
conditions, the bitmap will simply be repeated over and over, for lack of data
frames.All the stations have something to send all the time at high load, the N
bit contention period is prorated over N frames, yielding an overhead of only 1 bit
per frame.
Generally, high numbered stations have to wait for half a scan before starting
to transmit low numbered stations have to wait for half a scan(N/2 bit slots)
before starting to transmit, low numbered stations have to wait on an average
1.5 N slots.
2. Binary Countdown:
Binary countdown protocol is used to overcome the overhead 1 bit per binary
station. In binary countdown, binary station addresses are used. A station
wanting to use the channel broadcast its address as binary bit string starting with
the high order bit. All addresses are assumed of the same length. Here, we will
see the example to illustrate the working of the binary countdown.
In this method, different station addresses are ORed together who decide the
priority of transmitting. If these stations 0001, 1001, 1100, 1011 all are trying to
seize the channel for transmission. All the station at first broadcast their most
significant address bit that is 0, 1, 1, 1 respectively. The most significant bits are
ORed together. Station 0001 see the 1MSB in another station addresses and
knows that a higher numbered station is competing for the channel, so it gives up
for the current round.
Other three stations 1001, 1100, 1011 continue. The next bit is 1 at station 1100,
swiss station 1011 and 1001 give up. Then station 110 starts transmitting a
frame, after which another bidding cycle starts.