Unit 2
Unit 2
• Space(s): Same frequency can be reused when the base stations are separated in
space.
For remaining K4 to K6
other three additional
space is required.
Highway example –
Each driver had his or
her own lane
Old Telephone systems-
each subscriber is given
a separate pair of
copper wires to local
exchange.
Solution:
Multiplexing through
Frequency
Time
Code
Frequency Division Multiplexing (FDMA)
• Example: Radio stations within same region – will have their own frequency for
transmitting. Used for radio stations within same range.
• Advantage: Very Simple scheme – To receive data, receiver only has to tune to
particular sender's frequency.
Time Division Multiplexing (TDMA)
• Disadvantage:
• All senders need time synchronization
• For a receiver tuning in to a sender – need to adjust to
sender’s frequency as well as correct time slot.
Time +Frequency Division Multiplexing
(TDMA+FDMA)
• Discuss Disadvantage?
Time +Frequency Division Multiplexing
(TDMA+FDMA)
• Disadvantage
• Necessary coordination between different senders.
• One has to control the sequence of frequencies and the time of changing to
another frequency.
• Two senders will interfere as soon as they select same frequency at the
same time.
Code Division Multiplexing (CDMA)
• Disadvantage:
• Complex receiver - has to know the
code for decoding
Source: http://www.cs.cornell.edu/skeshav/book/slides/index.html
S. Keshav, An Engineering Approach to Computer Networking
Performance metrics
• Stability
• with heavy load, is all the time spent on resolving contentions?
• => unstable
• with a stable algorithm, throughput does not decrease with offered load
• if infinite number of uncontrolled stations share a link, then instability is
guaranteed
• but if sources reduce load when overload is detected, can achieve stability
• Fairness
• no single definition
• ‘no-starvation’: source eventually gets a chance to send
• max-min fair share
Source: http://www.cs.cornell.edu/skeshav/book/slides/index.html
S. Keshav, An Engineering Approach to Computer Networking
Medium Access Control
Review
• Control user access to the medium
• Traffic signal analogy
• One vehicle passes at a time at a crossing
• If there is a collision, wait till road cleared, start again
• Medium access control can be centralized or decentralized
• Improvised MAC required for wireless (?later)
Medium Access in Wireless
Review
• Wireline assumptions fail
• Signal strength is not constant throughout the medium
• Signal attenuates with distance; condition detected at one end is not same at the other
• Collisions at receiver cannot be detected by listening to the medium
• CSMA/CD operation in wireless
• Hidden / exposed terminal problems
• Near / far terminal problems
• TDMA
• Dynamic or Fixed slot allocation
• Aloha – simple MAC
Improving Aloha
• Aloha
• Low Throughput
• What is missing in Aloha?
• How can it be improved?
Improving Aloha
Carrier Sense Multiple Access (CSMA)
• What is missing in Aloha?
• Carrier sensing not done; a node transmits whenever it node wants to
• How to improve?
• Sense the carrier before transmission
• Will this improve Aloha?
Persistence Methods
• 1 Persistent CSMA
• In 1-persistent CSMA, the station continuously senses the channel
to check its state i.e. idle or busy so that it can transfer data or not.
• In case when the channel is busy, the station will wait for the
channel to become idle.
• When station found idle channel, it transmits the frame to the
channel without any delay.
11.44
1 Persistent CSMA
11.45
1- Persistent CSMA
11.46
Non-Persistent CSMA
• In this method, the station that has frames to send, only
that station senses for the channel.
• In case of an idle channel, it will send frame immediately to
that channel.
• In case when the channel is found busy, it will wait for the
random time and again sense for the state of the station
whether idle or busy.
• In this method, the station does not immediately sense for
the channel for only the purpose of capturing it when it
detects the end of the previous transmission.
11.47
Non-Persistent CSMA
• The main advantage of using this method is that it reduces
the chances of collision.
• The problem with this is that it reduces the efficiency of the
network.
11.48
Non-persistent CSMA
11.49
Q&A
11.50
P-Persistent CSMA
• P-Persistent CSMA is applied to Slotted Channels.
• When a station becomes ready to send, it senses the
channel.
• If it is idle, it transmits with a probability P
• With a probability Q=1-P, it defers until the next slot
• If that slot is also idle, it either transmits or defers again ,
with probabilities P and Q.
• This process is repeated until either the frame has been
transmitted or another station has begun transmitting.
• If the station initially senses the channel busy, it waits until
the next slot and applies the above algorithm.
11.51
Figure 12.10 Behavior of three persistence methods
12.52
Figure 12.11 Flow diagram for three persistence methods
12.53
Improving Aloha
Carrier Sense Multiple Access (CSMA)
• When medium sensed two possibilities
• Medium busy or free
a) If medium free → transmit immediately
b) If medium busy → wait (how long?)
i. Goto (a)
• This is non-persistent CSMA; what are the variables?
• Improving CSMA: the variables here are
• wait time – when to sense again
• instant when to transmit
Improving Aloha
Carrier Sense Multiple Access (CSMA)
• Wait time and transmit instant – each can be
• Random, 0, changing according to some algorithm
• Wait time
• 0 = persistent
• Random = non-persistent
• Transmit instant
• Transmit with probability ‘p’
• Node can transmit now, since medium is free
• It tosses a coin and then decides (p=0.5)
• If wait time=0; and p=1 then called p-persistent CSMA
Improving Aloha
• How can Aloha be improved, if a central controller is available?
• Justify your design
• Discuss the pros/cons
Improving Aloha
Demand Assigned Multiple Access
• Improvement of Aloha access systems can also be achieved by
reservation mechanisms and combinations with some (fixed) TDM
patterns.
• These schemes typically have a reservation period followed by a
transmission period.
• Explicit reservation of slots
• Initially regular Aloha; only for reservation of slots
• Later data transmission in assigned slots
• No collisions during data transmissions
Improving Aloha
Analyzing DAMA
Improving Aloha Analyzing DAMA
• Initial time needed to reserve slots
• If there are few or one nodes, time is wasted in reserving slots
• If too many contending nodes, slot assignment may take more time
• Slots are assigned after Aloha
• No mechanism to assign priorities to nodes
• A node may always lose the Aloha competition!
• Is this possible? How to ensure fairness?
Improving Aloha Analyzing DAMA
• Different stations on earth try to reserve access time for satellite transmission.
• Collisions during the reservation phase do not destroy data transmission, but
only the short requests for data transmission.
• If successful, a time slot in the future is reserved, and no other station is allowed
to transmit during this slot.
• Therefore, the satellite collects all successful requests (the others are destroyed)
and sends back a reservation list indicating access rights for future slots.
• All ground stations have to obey this list.
• To maintain the fixed TDM pattern of reservation and transmission, the stations
have to be synchronized from time to time.
• DAMA is an explicit reservation scheme. Each transmission slot has to be
reserved explicitly.
Implicit Reservation
• Aloha
• Use data for getting a slot and transmitting
• Contend for all packet transmissions
• DAMA
• Explicit reservation of slots, before sending data
• Do not use data for reservation
• Another approach
• Use data for implicit reservation
• Hold on to reservation till done – Packet Reservation Multiple Access
reservation 1 2 3 4 5 6 7 8 time-slot
ACDABA-F frame1 A C D A B A F
ACDABA-F frame2 A C A B A
AC-ABAF- frame3 A B A F collision at
reservation
A---BAFD frame4 A B A F D attempts
t
ACEEBAFD frame5 A C E E B 64A F D
Access method DAMA: Reservation-TDMA
• Reservation Time Division Multiple Access
• every frame consists of N mini-slots and x data-slots
• every station has its own mini-slot and can reserve up to k
data-slots using this mini-slot (i.e. x = N * k).
• other stations can send data in unused data-slots according to
a round-robin sending scheme (best-effort traffic)
e.g. N=6, k=2
N mini-slots N * k data-slots
71
MACA examples
• MACA avoids the problem of exposed terminals
• B wants to send to A, C
want to send to D.
• B will send RTS to A.
• RTS will be received by C also.
• A will send CTS to B. C can’t listen CTS from A.
• So C will continue its transmission to D.
RTS RTS
CTS
A B C D
72
Multiple access with collision avoidance
(MACA)
• Is there any possibility of collision? Where and when?