UNIT 3: Multiple accesses: Random access, Controlled access, Channelisation 6 Hours Random access Random access or contention methods: No station: superior to other station None of the station: assigned the control over the other station No station permits, or not permits: other station to send Each instance in: station uses the procedure defined by the protocol - to decide - to send or not send the data - if it has the data to send Decision of the station: depends on the status of the link (idle or busy) - it connected of Each station: can transmit when it desires - on the condition that - it follows the procedure defined by the protocol - including the testing of the state of the medium Features that give its name: There is no scheduled time, for a station to transmit - transmission is random among the stations - so, these methods are - random methods
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
UNIT 3: Multiple accesses: Random access, Controlled access, Channelisation 6 Hours
Random access
Random access or contention methods:
No station: superior to other station
None of the station: assigned the control over the other station
No station permits, or not permits: other station to send
Each instance in: station uses the procedure defined by the protocol - to decide - to send or not send the data - if it has
the data to send
Decision of the station: depends on the status of the link (idle or busy) - it connected of
Each station: can transmit when it desires - on the condition that - it follows the procedure defined by the protocol -
including the testing of the state of the medium
Features that give its name:
There is no scheduled time, for a station to transmit - transmission is random among the stations - so, these
methods are - random methods
No rules specify, which station to send next - stations complete with one another, to transmit to the medium -
so, these methods are - contention methods
Random access method: each station has the right to the medium without being controlled by any other station
Collision (access conflict): which occurs when more than one station tries to send the data - if occurs, frames will be
either destroyed or modified
Collision to avoid or to resolve collision:
Each station follows the procedure - that answers the following questions:
When can the station access the medium?
What can the station do if the medium is busy?
How can the station determine the success or failure of the transmission?
What can the station do if there is an access conflict?
Random access methods evolution
came from ALOHA
ALOHA: simple procedure of multiple access (MA)
Carrier sense multiple access (CSMA): ALOHA been - improved by the addition of a procedure - that forces the station
to sense the medium before transmitting
CSMA two methods:
CSMA/CD: Carrier Sense Multiple Access/Collision Detection: tells the station - what to do when the
collision is detected
CSMA/CA: Carrier sense Multiple Access/Collision Avoidance: tries to avoid the collision
ALOHA
ALOHA: Earliest random access method - developed at the University of Hawaii - in early 1970
Designed for the radio (wireless) LAN - can be used on any shared medium
There are potential collisions: in this arrangement – medium, is shared between the stations
Station when sends the data - another station may attempt to do so at the same time - data from the 2 stations: collide
and garbled become
Types of ALOHA: pure ALOHA and slotted ALOHA
pure ALOHA
Original ALOHA - simple, elegant protocol
Idea: Each station sends a frame whenever it has a frame to send
Channel: since, only one - possibility of collision between frames from different stations - present
Fig. shows: ex. of frame collisions in pure ALOHA
Unrealistic assumption: 4 stations that contend with one another for access to the shared channel - Fig. shows: each
station sends 2 frames - total of 8 frames on the shared medium
Some frames collide because: multiple frames are in contention for the shared channel
Fig. shows: only 2 frames survive (frame 1.1 of station 1 and frame 3.2 of station 3) - if one bit of the frames coexists
on the channel with one bit of another frame: collision will and frames will destroy - Frame resending: of the destroyed
frames to be
pure ALOHA: relies on the acks from the receiver - Station when sends the frame, it expects the ack from the receiver
Methods to prevent congestion in pure ALOHA:
Ack if not arrived after a time-out period: each station waits for a random period - before resending its frame
Back-off period, TB: max. time within which ack had to back from receiver to transmitter - for the sent frame
Randomness: helps avoid more collisions
Prevent the congestion of the channel - with retransmitted frames
Max. no. of retransmission attempts, Kmax: max.: time up to which frame resending can be - to got ack of receipt of
that frame from the receiver - Kmax time: after station can give up resending of a frame, and try to later
Fig. shows: procedure for pure ALOHA - based on the above strategy
Max. round-trip propagation delay, 2Tp: amount of time required to send a frame - between the 2 most widely
separated stations
Time-out period: equal to max. no. of possible round-trip propagation delay
K: number of attempted unsuccessful transmissions
Back-off period, TB: is a random value - normally, depends on K - formula for TB - depends on implementation
Tp: max. propagation time
Tfr: avg. time required to send out a frame
Common formula for TB: Binary exponential back-off
For each retransmission: TB is the product of - a multiplier in the range of 0 to 2 power of (K-1), which is randomly
chosen and Tp or Tfr
Note: In this method - range of the random numbers increases - after each collision
Kmax.: usual value is chosen as 15
Tfr: frame transmission time
Vulnerable time: Time in which - there is the possibility of collision
Assumption: stations send fixed length frames - with each frame taking Tfr s to send
Fig. shows - vulnerable time for station A
Station A: sends the frame at time t
Assumption: station B has already send a frame between t - Tfr and t
It leads to collision, between the station A and of B - end of B's frame collide with the
Beginning of A's frame - suppose: station C sends the frame between t and t+Tfr - there is a collision between the
frames from stations A and C - beginning of C's frame, collide with the end of A's frame
Fig. : in vulnerable time - in pure ALOHA - is 2 times the frame transmission tim
Vulnerable time of pure ALOHA: 2 * Tp
Throughput
G: average number of frames generated by the system during one frame transmission time
S: average number of successful transmissions for pure ALOHA - S= G * e(power of -2G)
Smax, max. throughput: Smax. = 0.184 for G=0.5
0.5 a frame is generated during one Tfr or 1 frame generated during 2Tfr, if generated at transmitter: then 18.4 percent
of these frames, reaches the receiver successfully - because, vulnerable time in pure ALOHA is 2Tfr
Station if generates only one frame in vulnerable time (no other stations generate their frames during this time): frame
will reach the destination successfully
For pure ALOHA: Throughput: S=G*e(power of -2G) and
Max. throughput: Smax=0.184, when G=0.5
slotted ALOHA
pure ALOHA: has the vulnerable time of 2Tfr - because no rule that when the station can send the data
Station may send the data soon after another station has started or soon before another station has finished
slotted ALOHA: invented to improve - the efficiency of pure ALOHA
Time is divided into slots of Tfr s - Forces the station to send only at the beginning of the time slot
Fig. shows - ex. of frame collisions in slotted ALOHA
Station is allowed to send only at the beginning of the synchronized time slot
If the station misses the moment: it must wait until the beginning of the next time slot - i.e., station which started at the
beginning of this time slot has already finished sending its frame
Still there is the possibility of collision: if the stations try to send at the beginning of the same time slot vulnerable time
in slotted ALOHA: reduced to half of pure ALOHA - equal to Tfr
Fig. shows - this situation
slotted ALOHA: vulnerable time= Tfr
Throughput
S: avg. no. of successful transmissions for slotted ALOHA - S=G*e (power of -G)
Smax, max. throughput of slotted ALOHA: Smax=0.368, when G=1
During Tfr - if one frame is generated in transmitted: then 36.8% of these frames reach to receiver successfully -
because vulnerable time for slotted ALOHA is Tfr
Station in generated one frame in vulnerable time (no other stations generates a frame during this vulnerable time) - the
frame generated will reaches the receiver successfully
For slotted ALOHA: Throughput: S=G*e(power of -G) and
Max. throughput: Smax=0.368, when G=1
Carrier Sense Multiple Access (CSMA)
Collision chances to minimize and to increase the performance: CSMA was developed
Collision chances can be reduced: if a station senses the medium before trying to use it
CSMA: require that each station - first listens to the medium or check the state of the medium - before sending - based
on the principle - "sense before transmit" or "listen before talk" can reduce the possibility of collision - but, it
cannot eliminate it - Fig. in space and time model of CSMA been shown - stations are connected - to a shared channel -
usually, a dedicated medium possibility of collision: still exists - because, of propagation delay - station when sends a
frame, it still takes time, although very short, for the first bit to reach every station and for every station to sense it -
station may sense the medium and find it idle, only because the first bit sent by another station has not yet been
received
At t1: station B senses the medium and finds it idle - so, it sends a frame
At t2 (t2>t21): station C senses the medium and finds it idle - because, at this time, the first bits from station B have
not reached station C and station C also sends a frame - the two frames collide and both frames are destroyed
Vulnerable time (Propagation time, Tp): it’s the propagation time, Tp in slotted ALOHA
Vulnerable time:time needed for the signal to propagate from one end of the medium to the other
When a station sends a frame - and any other stations send the frames at this time - collision will result
If the first bit of the frame reaches the send of the medium - every station will already have heard the bit and will
refrain from sending
Leftmost station A sends a frame at time t1: it reaches the rightmost station D at time t1+Tfr
Grey area: shows the vulnerable area in time and space
Persistence methods: stations do what, if channel is busy and channel free: is answered by persistence methods