Top Banner
Eytan Modiano Slide 1 Packet multiple access and the Aloha protocol Eytan Modiano Massachusetts Institute of Technology Department of Aeronautics and Astronautics
24

Packet multiple access and the Aloha protocol

Dec 12, 2021

Download

Documents

dariahiddleston
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Packet multiple access and the Aloha protocol

Eytan ModianoSlide 1

Packet multiple accessand the Aloha protocol

Eytan ModianoMassachusetts Institute of Technology

Department of Aeronautics and Astronautics

Page 2: Packet multiple access and the Aloha protocol

Eytan ModianoSlide 2

Packet Multiple Access

TERMINAL

TERMINAL

TERMINAL

TERMINAL

TERMINAL

PMA

SHAREDUPLINK

PHYS

DLC

NET

TRANS

APPL

LLC

MAC

• Medium Access Control (MAC)– Regulates access to channel

• Logical Link Control (LLC)– All other DLC functions

Page 3: Packet multiple access and the Aloha protocol

Eytan ModianoSlide 3

Examples of Multiple Access Channels

• Local area networks (LANs)

• Satellite channels

• Wireless radio

• Characteristics of Multiple Access Channel– Shared Transmission Medium

A receiver can hear multiple transmitters A transmitter can be heard by multiple receivers

– The major problem with multiple access is allocating the channelbetween the users

Nodes do not know when other nodes have data to send Need to coordinate transmissions

Page 4: Packet multiple access and the Aloha protocol

Eytan ModianoSlide 4

Approaches to Multiple Access

• Fixed Assignment (TDMA, FDMA, CDMA)– Each node is allocated a fixed fraction of bandwidth– Equivalent to circuit switching– very inefficient for low duty factor traffic

• Packet multiple access

– Polling

– Reservations and Scheduling

– Random Access

Page 5: Packet multiple access and the Aloha protocol

Eytan ModianoSlide 5

Aloha

Single receiver, many transmitters

Receiver

Transmitters

....

E.g., Satellite system, wireless

Page 6: Packet multiple access and the Aloha protocol

Eytan ModianoSlide 6

Slotted Aloha

• Time is divided into “slots” of one packet duration– E.g., fixed size packets

• When a node has a packet to send, it waits until the start of thenext slot to send it

– Requires synchronization• If no other nodes attempt transmission during that slot, the

transmission is successful– Otherwise “collision”– Collided packet are retransmitted after a random delay

Page 7: Packet multiple access and the Aloha protocol

Eytan ModianoSlide 7

Slotted Aloha Assumptions

• Poisson external arrivals

• No capture– Packets involved in a collision are lost– Capture models are also possible

• Immediate feedback– Idle (0) , Success (1), Collision (e)

• If a new packet arrives during a slot, transmit in next slot

• If a transmission has a collision, it becomes backlogged andretransmitted after a random delay

– Let n be the number of backlogged nodes

Page 8: Packet multiple access and the Aloha protocol

Eytan ModianoSlide 8

slotted aloha

• Let g be the attempt rate (the expected number of packetstransmitted in a slot)

– The number of attempted packets per slot is approximately a Poissonrandom variable of mean g = λ + n*qr

qr = probability that a backlogged packet is retransmitted in a slot n = number of backlogged packets

– P (m attempts) = gme-g/m!– P (idle) = probability of no attempts in a slot = e-g

– p (success) = probability of one attempt in a slot = ge-g

– P (collision) = P (two or more attempts) = 1 - P(idle) - P(success)

Page 9: Packet multiple access and the Aloha protocol

Eytan ModianoSlide 9

Throughput of Slotted Aloha

• The throughput is the fraction of slots that contain a successfultransmission = P(success) = ge-g

– When system is stable throughput must also equal the externalarrival rate (λ)

– What value of gmaximizes throughput?

– g < 1 => too many idle slots– g > 1 => too many collisions– If g can be kept close to 1, an external arrival rate of 1/e packets per

slot can be sustained

ddg(n)

ge− g = e−g − ge−g = 0

⇒ g =1

⇒ P(success) =ge− g = 1/ e≈ 0.36

Page 10: Packet multiple access and the Aloha protocol

Eytan ModianoSlide 10

Instability of slotted aloha

• if backlog increases beyond unstable point (bad luck) then it tendsto increase without limit and the departure rate drops to 0

– Aloha is inherently unstable and needs algorithm to keep it stable

• Drift in state n, D(n) is the expected change in backlog over onetime slot

– D(n) = λ - P(success) = λ - g(n)e-g(n)

Page 11: Packet multiple access and the Aloha protocol

Eytan ModianoSlide 11

TDM vs. slotted aloha

• Aloha achieves lower delays when arrival rates are low• TDM results in very large delays with large number of users, while

Aloha is independent of the number of users

0 0.2 0.4 0.6 0.8

ARRIVAL RATE

4

8

DELAY

ALOHA

TDM, m=8

TDM, m=16

Page 12: Packet multiple access and the Aloha protocol

Eytan ModianoSlide 12

Pure (unslotted) Aloha

• New arrivals are transmitted immediately (no slots)– No need for synchronization– No need for fixed length packets

• A backlogged packet is retried after an exponentially distributedrandom delay with some mean 1/x

• The total arrival process is a time varying Poisson process of rateg(n) = λ + nx (n = backlog, 1/x = ave. time between retransmissions)

• Note that an attempt suffers a collision if the previous attempt is notyet finished (ti-ti-1<1) or the next attempt starts too soon (ti+1-ti<1)

t t t1 2 3 t 4 t 5

Retransmission

New Arrivals

43τ τ

Collision

Page 13: Packet multiple access and the Aloha protocol

Eytan ModianoSlide 13

Throughput of Unslotted Aloha

• An attempt is successful if the inter-attempt intervals on bothsides exceed 1 (for unit duration packets)

– P(success) = e-g x e-g = e-2g

– Throughput (success rate) = ge-2g

– Max throughput at g = 1/2, Throughput = 1/2e ~ 0.18

– Stabilization issues are similar to slotted aloha

– Advantages of unslotted aloha are simplicity and possibility ofunequal length packets

Page 14: Packet multiple access and the Aloha protocol

Eytan ModianoSlide 14

Splitting Algorithms

• More efficient approach to resolving collisions– Simple feedback (0,1,e)– Basic idea: assume only two packets are involved in a collision

Suppose all other nodes remain quiet until collision is resolved, andnodes in the collision each transmit with probability 1/2 until one issuccessful

On the next slot after this success, the other node transmits

The expected number of slots for the first success is 2, so the expectednumber of slots to transmit 2 packets is 3 slots

Throughput over the 3 slots = 2/3

– In practice above algorithm cannot really work Cannot assume only two users involved in collision Practical algorithm must allow for collisions involving unknown number

of users

Page 15: Packet multiple access and the Aloha protocol

Eytan ModianoSlide 15

Tree algorithms

• After a collision, all new arrivals and all backlogged packets notinvolved in the collision wait

• Each colliding packet randomly joins either one of two groups(Left and Right groups)

– Toss of a fair coin– Left group transmits during next slot while Right group waits

If collision occurs Left group splits again (stack algorithm) Right group waits until Left collision is resolved

– When Left group is done, right group transmits(1,2,3,4)

(1,2,3)4

successcollision

1

success(2,3)

collision

idle

collision(2,3)

2 3success success

Notice that after the idle slot, collision between (2,3) was sure to happen and could have been avoided

Many variations and improvementson the original tree splitting algorithm

Page 16: Packet multiple access and the Aloha protocol

Eytan ModianoSlide 16

Throughput comparison

• Stabilized pure aloha T = 0.184 = (1/(2e))

• Stabilized slotted aloha T = 0.368 = (1/e)

• Basic tree algorithm T = 0.434

• Best known variation on tree algorithm T = 0.4878

• Upper bound on any collision resolution algorithm with (0,1,e)feedback T <= 0.568

• TDM achieves throughputs up to 1 packet per slot, but the delayincreases linearly with the number of nodes

Page 17: Packet multiple access and the Aloha protocol

Eytan ModianoSlide 17

CSMA/CD and Ethernet

• CSMA with Collision Detection (CD) capability– Nodes able to detect collisions– Upon detection of a collision nodes stop transmission

Reduce the amount of time wasted on collisions

• Protocol:

– All nodes listen to transmissions on the channel

– When a node has a packet to send: Channel idle => Transmit Channel busy => wait a random delay (binary exponential backoff)

– If a transmitting node detects a collision it stops transmission Waits a random delay and tries again

Two way cable

WS WS WS WS WS WS

Page 18: Packet multiple access and the Aloha protocol

Eytan ModianoSlide 18

Time to detect collisions

• A collision can occur while the signal propagates between the two nodes• It would take an additional propagation delay for both users to detect the

collision and stop transmitting

• If τ is the maximum propagation delay on the cable then if a collisionoccurs, it can take up to 2τ seconds for all nodes involved in the collisionto detect and stop transmission

WS WSττ = prop delay

Page 19: Packet multiple access and the Aloha protocol

Eytan ModianoSlide 19

Approximate model for CSMA/CD

• Simplified approximation for added insight

• Consider a slotted system with “mini-slots” of duration 2τ

• If a node starts transmission at the beginning of a mini-slot, by the end ofthe mini-slot either

– No collision occurred and the rest of the transmission will be uninterrupted– A collision occurred, but by the end of the mini-slot the channel would be idle

again

• Hence a collision at most affects one mini-slot

2τ <−−>minislotspacket

<----------- 1 ---------------->

Page 20: Packet multiple access and the Aloha protocol

Eytan ModianoSlide 20

Analysis of CSMA/CD

• Assume N users and that each attempts transmission during afree “mini-slot” with probability p

– P includes new arrivals and retransmissions

P(i users attempt) = Ni

⎝ ⎜ ⎜

⎠ ⎟ ⎟ Pi(1− P )N−i

P(exactly 1 attempt) = P(success) = NP(1-P )N-1

To maximize P(success),

ddp

[NP(1- P )N- 1] = N(1-P )N-1 −N(N−1)P(1− P )N−2 = 0

⇒Popt =1N

⇒ Average attempt rate of one per slot

⇒ Notice the similarity to slotted Aloha

Page 21: Packet multiple access and the Aloha protocol

Eytan ModianoSlide 21

Analysis of CSMA/CD, continued

• Once a mini-slot has been successfully captured, transmission continueswithout interruption

• New transmission attempts will begin at the next mini-slot after the end ofthe current packet transmission

P(success)=NP(1- p)N-1 = (1− 1N

)N−1

Ps = limit (N→ ∞) P(success) = 1e

Let X = Average number of slots per succesful transmission

P(X= i) = (1- Ps)i−1Ps

⇒ E[X]= 1Ps

= e

Page 22: Packet multiple access and the Aloha protocol

Eytan ModianoSlide 22

Analysis of CSMA/CD, continued

• Let S = Average amount of time between successful packettransmissions

S = (e-1)2τ + DTp + τ

• Efficiency = DTp/S = DTp / (DTp + τ + 2τ(e-1))

• Let β = τ/ DTp => Efficiency ≈ 1/(1+4.4β) = λ < 1/(1+4.4β)

Ave time until start of next Mini-slot

Packet transmission timeIdle/collisionMini-slots

Page 23: Packet multiple access and the Aloha protocol

Eytan ModianoSlide 23

Notes on CSMA/CD

• Can be viewed as a reservation system where the mini-slots areused for making reservations for data slots

• In this case, Aloha is used for making reservations during themini-slots

• Once a users captures a mini-slot it continues to transmit withoutinterruptions

• In practice, of course, there are no mini-slots

– Minimal impact on performance but analysis is more complex

Page 24: Packet multiple access and the Aloha protocol

Eytan ModianoSlide 24

CSMA/CD examples

• Example (Ethernet)– Transmission rate = 10 Mbps– Packet length = 1000 bits, DTp = 10-4 sec– Cable distance = 1 mile, τ = 5x10-6 sec

– ➨ β = 5x10-2 and E = 80%

• Example (GEO Satellite) - propagation delay 1/4 second– β = 2,500 and E ~ 0%

• CSMA/CD only suitable for short propagation scenarios!

• How is Ethernet extended to 100 Mbps?

• How is Ethernet extended to 1 Gbps?