multiple access
play

Multiple Access garbled garbled what if the moderator what if the - PowerPoint PPT Presentation

What is it all about? Some simple solutions Consider an audioconference where Consider an audioconference where Use a moderator Use a moderator if one person speaks, all can hear if one person speaks, all can hear a speaker must


  1. What is it all about? Some simple solutions  Consider an audioconference where Consider an audioconference where  Use a moderator Use a moderator  if one person speaks, all can hear if one person speaks, all can hear  a speaker must wait for moderator to call on him or her, even if no a speaker must wait for moderator to call on him or her, even if no one else wants to speak one else wants to speak  if more than one person speaks at the same time, both voices are if more than one person speaks at the same time, both voices are Multiple Access garbled garbled  what if the moderator what if the moderator ʼ s connection breaks? s connection breaks?  How should participants coordinate actions so that How should participants coordinate actions so that  Distributed solution Distributed solution  the number of messages exchanged per second is maximized the number of messages exchanged per second is maximized  speak if no one else is speaking speak if no one else is speaking  time spent waiting for a chance to speak is minimized time spent waiting for a chance to speak is minimized  but if two speakers are waiting for a third to finish, guarantee but if two speakers are waiting for a third to finish, guarantee An Engineering Approach to Computer Networking An Engineering Approach to Computer Networking collision collision  This is the This is the multiple access problem multiple access problem  Designing good schemes is surprisingly hard! Designing good schemes is surprisingly hard! Outline Contexts for the multiple access problem Contexts  Contexts for the problem Contexts for the problem  Broadcast Broadcast transmission medium transmission medium  Choices and constraints Choices and constraints  message from any transmitter is received by all receivers message from any transmitter is received by all receivers  Colliding messages are garbled Colliding messages are garbled  Performance metrics Performance metrics  Goal Goal  Base technologies Base technologies  maximize message throughput maximize message throughput  Centralized schemes Centralized schemes  minimize mean waiting time minimize mean waiting time  Distributed schemes Distributed schemes  Shows up in five main contexts Shows up in five main contexts

  2. Contexts Solving the problem Outline  First, choose a First, choose a base technology base technology  Contexts for the problem Contexts for the problem  to isolate traffic from different stations to isolate traffic from different stations  Choices and constraints Choices and constraints  can be in time domain or frequency domain can be in time domain or frequency domain  Performance metrics Performance metrics  Then, choose how to allocate a limited number of transmission Then, choose how to allocate a limited number of transmission  Base technologies Base technologies resources to a larger set of contending users resources to a larger set of contending users  Centralized schemes Centralized schemes  Distributed schemes Distributed schemes Choices Constraints The parameter ʻ a ʼ  Centralized vs. distributed design Centralized vs. distributed design  Spectrum scarcity Spectrum scarcity  The number of packets sent by a source before the farthest The number of packets sent by a source before the farthest station receives the first bit station receives the first bit  is there a moderator or not? is there a moderator or not?  radio spectrum is hard to come by radio spectrum is hard to come by  in a centralized solution one of the stations is a in a centralized solution one of the stations is a master master and the and the  only a few frequencies available for long-distance communication only a few frequencies available for long-distance communication others are others are slaves slaves  multiple access schemes must be careful not to waste bandwidth multiple access schemes must be careful not to waste bandwidth  master->slave = downlink master->slave = downlink  Radio link properties Radio link properties  slave->master = uplink slave->master = uplink  radio links are error prone radio links are error prone  in a distributed solution, all stations are peers in a distributed solution, all stations are peers  fading fading  Circuit-mode vs. packet-mode Circuit-mode vs. packet-mode  multipath interference multipath interference  do stations send steady streams or bursts of packets? do stations send steady streams or bursts of packets?  hidden terminals hidden terminals  with streams, doesn with streams, doesn ʼ t make sense to contend for every packet t make sense to contend for every packet  transmitter heard only by a subset of receivers transmitter heard only by a subset of receivers  allocate resources to streams allocate resources to streams  capture capture  with packets, makes sense to contend for every packet to avoid with packets, makes sense to contend for every packet to avoid  on collision, station with higher power overpowers the other on collision, station with higher power overpowers the other wasting bandwidth wasting bandwidth  lower powered station may never get a chance to be heard lower powered station may never get a chance to be heard

  3. Outline Performance metrics Performance metrics  Contexts for the problem Contexts for the problem  Normalized throughput Normalized throughput  Stability Stability  Choices and constraints Choices and constraints  fraction of link capacity used to carry non-retransmitted packets fraction of link capacity used to carry non-retransmitted packets  with heavy load, is all the time spent on resolving contentions? with heavy load, is all the time spent on resolving contentions?  example example  => unstable => unstable  Performance metrics Performance metrics  with no collisions, 1000 packets/sec with no collisions, 1000 packets/sec  with a stable algorithm, throughput does not decrease with offered with a stable algorithm, throughput does not decrease with offered  Base technologies Base technologies load load  with a particular scheme and workload, 250 packets/sec with a particular scheme and workload, 250 packets/sec  if infinite number of uncontrolled stations share a link, then if infinite number of uncontrolled stations share a link, then  Centralized schemes Centralized schemes  => goodput = 0.25 => goodput = 0.25 instability is guaranteed instability is guaranteed  Mean delay Mean delay  Distributed schemes Distributed schemes  but if sources reduce load when overload is detected, can achieve but if sources reduce load when overload is detected, can achieve  amount of time a station has to wait before it successfully transmits amount of time a station has to wait before it successfully transmits stability stability a packet a packet  Fairness Fairness  depends on the load and the characteristics of the medium depends on the load and the characteristics of the medium  no single definition no single definition  ʻ no-starvation no-starvation ʼ : source eventually gets a chance to send : source eventually gets a chance to send  max-min fair share: will study later max-min fair share: will study later Outline Base technologies FDMA  Contexts for the problem Contexts for the problem  Isolates data from different sources Isolates data from different sources  Simplest Simplest  Choices and constraints Choices and constraints  Three basic choices Three basic choices  Best suited for analog links Best suited for analog links  Performance metrics Performance metrics  Frequency division multiple access (FDMA) Frequency division multiple access (FDMA)  Each station has its own frequency band, separated by guard Each station has its own frequency band, separated by guard  Time division multiple access (TDMA) Time division multiple access (TDMA) bands bands  Base technologies Base technologies  Code division multiple access (CDMA) Code division multiple access (CDMA)  Receivers tune to the right frequency Receivers tune to the right frequency  Centralized schemes Centralized schemes  Number of frequencies is limited Number of frequencies is limited  Distributed schemes Distributed schemes  reduce transmitter power; reuse frequencies in non-adjacent cells reduce transmitter power; reuse frequencies in non-adjacent cells  example: voice channel = 30 KHz example: voice channel = 30 KHz  833 channels in 25 MHz band 833 channels in 25 MHz band  with hexagonal cells, partition into 118 channels each with hexagonal cells, partition into 118 channels each  but with N cells in a city, can get 118N calls => win if N > 7 but with N cells in a city, can get 118N calls => win if N > 7

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend