1
play

1 Multiple Access protocols Multiple Access protocols single - PDF document

Medium Access Links and Protocols Three types of links: point-to-point (single wire, e.g. PPP, SLIP) broadcast (shared wire or medium; e.g, Ethernet, Wavelan, etc.) Physical Layer switched (e.g., telephone systems, switched


  1. Medium Access Links and Protocols Three types of “links”: • point-to-point (single wire, e.g. PPP, SLIP) • broadcast (shared wire or medium; e.g, Ethernet, Wavelan, etc.) Physical Layer • switched (e.g., telephone systems, switched Ethernet, ATM etc) Srinidhi Varadarajan Point-to-Point protocols Modems: Signaling • Modems: • Telephone networks – Work over low bandwidth telephone lines (3000 – Switched hierarchy. Hz) – Local Loop is the last mile interface to customer • Signaling schemes: (why not just use digital premises equipment. (generally referred to in the networking world as the source of all evil) bit patterns?) – Originally involved a physical connection between the – Possible choices: sender and the receiver. • Amplitude modulation (AM) – Nowadays, telephone networks use circuit switched • Frequency modulation (FM or FSK) medium access control • Phase modulation (PSK) • Modems: Digital interface to the world of telephony Modems Signaling RS-232C, RS449: Point-to-Point Communication • RS-232C and RS449 specify physical layer point- • Modern modems use a combination of PSK and to-point serial communication AM • 25 or 9 pin connectors, 15m cable length • Create charts called constellation patterns. – <-3V = 1, >+4V=0, – Multiple bits encoded per signal. – BW: 20Kbps (originally, upgraded now to up to 115Kbps) – Trellis encoding is used to minimize the chance of error. – Main communication occurs using the RTS/CTS Errors cause loss of several bits protocol. • Echo cancellation/suppression • RS-449 is an upgraded RS-232C with 2 modes of – Needed for long-haul voice communication. communication – Prevents full duplex – Unbalanced mode, physically is similar to RS-232C, with – In-band signaling at 2100 Hz is used to inhibit echo common ground signaling. cancellation circuitry. – Balanced mode uses independent ground. Data rate – Newer solution uses end-point resources for echo 2Mbps with lengths up to 60m suppression. 1

  2. Multiple Access protocols Multiple Access protocols • single shared communication channel • two or more simultaneous transmissions by nodes: interference • claim: humans use multiple access protocols – only one node can send successfully at a time all the time • multiple access protocol: • class can "guess" multiple access protocols – distributed algorithm that determines how stations share channel, i.e., determine when station can transmit – multiaccess protocol 1: – communication about channel sharing must use channel itself! – what to look for in multiple access protocols: – multiaccess protocol 2: • synchronous or asynchronous – multiaccess protocol 3: • information needed about other stations • robustness (e.g., to channel errors) – multiaccess protocol 4: • performance MAC Protocols: a taxonomy Channel Partitioning MAC protocols: TDMA Three broad classes: TDMA: time division multiple access • Channel Partitioning • access to channel in "rounds" – divide channel into smaller “pieces” (time slots, • each station gets fixed length slot (length = pkt trans frequency) time) in each round – allocate piece to node for exclusive use • unused slots go idle • Random Access • example: 6-station LAN, 1,3,4 have pkt, slots 2,5,6 idle – allow collisions – “recover” from collisions • “Taking turns” – tightly coordinate shared access to avoid collisions Goal: ef f icient , f air, simple, decent ralized Channel Partitioning MAC protocols: FDMA Channel Partitioning (CDMA) FDMA: frequency division multiple access CDMA (Code Division Multiple Access) • channel spectrum divided into frequency bands • unique “code” assigned to each user; ie, code set • each station assigned fixed frequency band partitioning • unused transmission time in frequency bands go idle • used mostly in wireless broadcast channels (cellular, • example: 6-station LAN, 1,3,4 have pkt, frequency bands satellite,etc) 2,5,6 idle • all users share same frequency, but each user has own “chipping” sequence (ie, code) to encode data t i m e • encoded signal = (original data) X (chipping sequence) f r equency bands • decoding: inner-product of encoded signal and chipping sequence • allows multiple users to “coexist” and transmit simultaneously with minimal interference (if codes are “orthogonal”) 2

  3. CDMA Encode/Decode CDMA: two-sender interference Slotted Aloha Random Access protocols • time is divided into equal size slots (= pkt trans. • When node has packet to send time) – transmit at full channel data rate R. • node with new arriving pkt: transmit at beginning – no a priori coordination among nodes of next slot • two or more transmitting nodes -> “collision”, • if collision: retransmit pkt in future slots with • random access MAC protocol specifies: probability p, until successful. – how to detect collisions – how to recover from collisions (e.g., via delayed retransmissions) • Examples of random access MAC protocols: – slotted ALOHA – ALOHA – CSMA and CSMA/CD Success (S), Collision (C), Empty (E) slots Slotted Aloha efficiency Pure (unslotted) ALOHA Q: what is max fraction slots successful? • unslotted Aloha: simpler, no synchronization A: Suppose N stations have packets to send • pkt needs transmission: – each transmits in slot with probability p – send without awaiting for beginning of slot – prob. successful transmission S is: • collision probability increases: – pkt sent at t 0 collide with other pkts sent in [t 0 -1, by single node: S= p (1-p) (N-1) t 0 +1] by any of N nodes At best : channel S = Prob (only one transmits) use f or usef ul t r ansmissions 37% = N p (1-p) (N-1) of t ime! … choosing optimum p as n -> infty ... = 1/e = .37 as N -> infty 3

  4. Pure Aloha (cont.) CSMA: Carrier Sense Multiple Access P(success by given node) = P(node transmits) . CSMA : listen before transmit: P(no other node transmits in [p 0 -1,p 0 ] . P(no other node transmits in [p 0 ,p 0 +1] • If channel sensed idle: transmit entire pkt = p . (1-p) . (1-p) • If channel sensed busy, defer transmission P(success by any of N nodes) = N p . (1-p) . (1-p) – Persistent CSMA: retry immediately with … choosing optimum p as n -> infty ... S = t hr oughput = “goodput ” probability p when channel becomes idle (may = 1/(2e) = .18 0.4 cause instability) 0.3 (success r at e) – Non-persistent CSMA: retry after random pr ot ocol const r ains Slot t ed Aloha ef f ect ive channel interval 0.2 t hr oughput ! • human analogy: don’t interrupt others! 0.1 P ur e Aloha 0.5 1.0 1.5 2.0 G = of f er ed load = Np CSMA collisions CSMA/CD (Collision Detection) spat ial layout of nodes along et her net CSMA/CD: carrier sensing, deferral as in CSMA collisions can occur: propagat ion delay means – collisions detected within short time t wo nodes may not year – colliding transmissions aborted, reducing channel hear each ot her’s wastage t ransmission – persistent or non-persistent retransmission • collision detection: collision: – easy in wired LANs: measure signal strengths, ent ire packet t ransmission compare transmitted, received signals t ime wast ed – difficult in wireless LANs: receiver shut off while not e: transmitting role of dist ance and • human analogy: the polite conversationalist propagat ion delay in det ermining collision prob. CSMA/CD collision detection “Taking Turns” MAC protocols channel partitioning MAC protocols: – share channel efficiently at high load – inefficient at low load: delay in channel access, 1/N bandwidth allocated even if only 1 active node! Random access MAC protocols – efficient at low load: single node can fully utilize channel – high load: collision overhead “taking turns” protocols look for best of both worlds! 4

  5. “Taking Turns” MAC protocols Reservation-based protocols Token passing: Distributed Polling: Polling: • time divided into slots • control token passed from • master node “invites” • begins with N short reservation slots one node to next sequentially. slave nodes to – reservation slot time equal to channel end-end propagation • token message transmit in turn delay • concerns: • Request to Send, – station with message to send posts reservation Clear to Send msgs – token overhead – reservation seen by all stations – latency • concerns: • after reservation slots, message transmissions ordered by known – single point of failure (token) – polling overhead priority – latency – single point of failure (master) 5

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend