Ch4-Multiple Radio Access
Ch4-Multiple Radio Access
Ch4-Multiple Radio Access
Chapter 4 :
Multiple Radio Access
Slides based on publisher’s slides for 1st and 2nd edition of:
Introduction to Wireless and Mobile Systems by Agrawal & Zeng
© 2003, 2006, Dharma P. Agrawal and Qing-An Zeng. All rights reserved. 1
Chapter 4
Multiple Radio Access
Copyright © 2003, Dharma P. Agrawal and Qing-An Zeng. All rights reserved 2
Outline
n Introduction
n Contention Protocols
n ALOHA
n Slotted ALOHA
n CSMA (Carrier Sense Multiple Access)
n CSMA/CD (CSMA with Collision Detection)
n CSMA/CA (CSMA with Collision Avoidance)
Copyright © 2003, Dharma P. Agrawal and Qing-An Zeng. All rights reserved 3
6.1. Introduction ch
an
ne
l
l
n tro el
c o n
n Recall l i nk)
l c ha
n
wn tro l
n Large # of traffic ( d o c o n n ne
a rd n k) c ha
channels on each BS Fo rw
( u pli
tr a ffic
l
s e ) ne
n Bec. traffic channels used by ve
r
lin
k
ha
n
Re w n
fic
c
1 MS exclusively for call duration ( do a f
a rd k ) tr
rw lin
n Small # of control F o
e(
u p
r s
channels on each BS R e ve
n Bec. control channels MS BS
shared by many MSs
for short periods
n Too expensive/inefficient to assign control channnel for call duration
© 2007 by©Leszek
Copyright T. LilienP. Agrawal and Qing-An Zeng. All rights reserved
2003, Dharma 4
Introduction – cont. 1
n Multiple access control channels
n Each MS attached to a transmitter/receiver
MS 3
MS 4
MS 2 Shared Multiple
Access Medium
…
…
MS 1 MS n
Copyright © 2003, Dharma P. Agrawal and Qing-An Zeng. All rights reserved 5
Introduction – cont. 2
MS 3
MS 2 Shared Multiple
MS 4
Access Medium
……
MS 1 MS n
n Multiple access issue
n If more than one MS transmits at a time on a CC to BS,
Copyright © 2003, Dharma P. Agrawal and Qing-An Zeng. All rights reserved (Modified by LTL) 6
Medium (Channel) Sharing Techniques
Static
Channelization
Medium-
sharing
Techniques Scheduled
Dynamic
Medium
Access Control Random
Access
Copyright © 2003, Dharma P. Agrawal and Qing-An Zeng. All rights reserved (Modified by LTL) 7
6.2. Multiple (Radio) Access Protocols =
MAC Sublayer Protocols
n Recall ISO Open Systems Interconnection Reference Model
for networks
n Communication subnetwork = 3 lowest layers of OSI
© 2007 by©Leszek
Copyright T. LilienP. Agrawal and Qing-An Zeng. All rights reserved
2003, Dharma 8
6.2. Multiple (Radio) Access Protocols = MAC Sublayer Protocols – cont. 1
© 2007 by©Leszek
Copyright T. LilienP. Agrawal and Qing-An Zeng. All rights reserved
2003, Dharma 9
6.2. Multiple (Radio) Access Protocols = MAC Sublayer Protocols – cont. 1
© 2007 by©Leszek
Copyright T. LilienP. Agrawal and Qing-An Zeng. All rights reserved
2003, Dharma (Modified by LTL) 10
Types of Multiple Access Protocols
occurs
n Execute a collision resolution protocol after each collision
Copyright © 2003, Dharma P. Agrawal and Qing-An Zeng. All rights reserved (Modified by LTL) 11
Classification of
Multiple Access Multiple-access protocols
© 2007 by©Leszek
Copyright T. LilienP. Agrawal and Qing-An Zeng. All rights reserved
2003, Dharma 13
6.3.1. ALOHA (a.k.a. Pure ALOHA)
n Developed in the 1970s for a packet radio network by
University of Hawaii
n To interconnect islands’ campuses / Single-hop network
n Principles:
n Sender S may transmit a packet at any time (hoping no
collision will occur)
n S finds out whether transmission was successful or
experienced a collision by listening for an ACK broadcast
from the destination station
n Successful if an ACK arrrives within a time-out period T
n If no ACK within T, S assumes that there was a collision
n => packet was lost after colliding with pckt of another station
n If there was a collision, S retransmits after some random
time
n Analogy: 2 people entering a doorway simultaneously
n Collision can occur
Copyright © 2003, Dharma P. Agrawal and Qing-An Zeng. All rights reserved (Modified by LTL) 14
6.3.1. ALOHA – cont.
n Recall ALOHA principles:
n Sender S may xmit a packet at any time
1 2 3 3 2
Time
Collision
t-T t t+T
T
Collision in Pure ALOHA (can last up to 2T)
Copyright © 2003, Dharma P. Agrawal and Qing-An Zeng. All rights reserved (Modified by LTL) 15
** OPTIONAL ** Throughput of ALOHA
• T – packet length (duration)
• Probability P(n) that n packets arrive in time 2T
-- If 2 packets of length T arrive in time > 2T, they didn’t collide
n -2G
Analogy: two people sufficiently
(2G) e
P(n ) = distant from each other do not
n! collide in a doorway
P(0 ) = e -2G
• Throughput S
S = G × P(0 ) = G × e -2G
Copyright © 2003, Dharma P. Agrawal and Qing-An Zeng. All rights reserved (Modified by LTL) 17
6.3.2. Slotted ALOHA – cont.
n Recall Slotted ALOHA improvements:
n Time is slotted / Packet can only start at the beginning of a slot
n Note: Shows again that collision can block channel for period T
1 2&3 2 3
Time
Slots Collision
Collision in Slotted ALOHA (can last max. T)
Copyright © 2003, Dharma P. Agrawal and Qing-An Zeng. All rights reserved (Modified by LTL) 18
** OPTIONAL **
Throughput of Slotted ALOHA
• Probability of no collision
P(0 ) = e - G
• Throughput S
S = G × P(0 ) = G × e - G
Copyright © 2003, Dharma P. Agrawal and Qing-An Zeng. All rights reserved 19
Comparison of Throughputs
for ALOHA and Slotted ALOHA
0.5
§ Max. throughput for
ALOHA (A) Sth = 0.184
0.4 at G = ½
0.368
§ Max. throughput for
Throughput Sth
Copyright © 2003, Dharma P. Agrawal and Qing-An Zeng. All rights reserved (Modified by LTL) 20
6.3.2-B. CSMA (Carrier Sense Multiple
Access) Group of Protocols
n Max. throughputs for Pure & Slotted ALOHA are 0.184 &
0.368
n CSMA protocols give better throughput than both Aloha
protocols
n By avoiding collisions
Copyright © 2003, Dharma P. Agrawal and Qing-An Zeng. All rights reserved 21
Perspective on MAC & Access Methods
n Medium Access Control (MAC) NET
n Different nodes must gain access to
n Access methods
n FDMA - assigning channels in frequency domain
© 2006, ©
Copyright Michael Hall, Helsinki
2003, Dharma P. AgrawalUniv. of Technology
and Qing-An Zeng. All rights reserved 22
Basic Collision Mechanism in CSMA Protocols
MS 5 senses,
MS 2 senses, avoids collision
sends packet
MS 1 senses, MS 7 senses, sends packet
MS 3 senses,
sends packet sends packet MS 5 Delay
7
1 2 3 6
Delay for MS 4 Collision Time
MS 4 senses,
avoids collision MS 6 senses, sends packet
n Some collisions avoided
n Packet 4 was not sent so it did not collide with Packet 2
Copyright © 2003, Dharma P. Agrawal and Qing-An Zeng. All rights reserved (Modified by LTL) 23
Types of CSMA Protocols
© 2007 by©Leszek
Copyright T. LilienP. Agrawal and Qing-An Zeng. All rights reserved
2003, Dharma 24
6.3.3 (Basic) CSMA Protocol
n (Basic) CSMA improvement over ALOHAs:
Sender S starts transmission only if no transmission is
ongoing
© 2007 by©Leszek
Copyright T. LilienP. Agrawal and Qing-An Zeng. All rights reserved
2003, Dharma 25
Types of CSMA Protocols
Unslotted nonpersistent CSMA
Nonpersistent
CSMA
Slotted nonpersistent CSMA
CSMA
Unslotted persistent CSMA
Persistent CSMA
Slotted persistent CSMA
1-persistent CSMA
p-persistent CSMA
Copyright © 2003, Dharma P. Agrawal and Qing-An Zeng. All rights reserved 26
Nonpersistent/x-persistent CSMA Protocols
n Nonpersistent CSMA Protocol:
Step 1: If the medium is idle, transmit immediately
Step 2: If the medium is busy, wait a random amount of time and
then go to Step 1
n Note:
n Random backoff reduces probability of collisions
n Wasted idle time if the backoff time is too long
Copyright © 2003, Dharma P. Agrawal and Qing-An Zeng. All rights reserved 27
Nonpersistent/x-persistent CSMA Protocols – cont.
n Note:
n P-persistent CSMA is a good tradeoff between nonpersistent
Copyright © 2003, Dharma P. Agrawal and Qing-An Zeng. All rights reserved 28
How to Select Probability p ?
n Assume:
N - # nodes that can be active at a time
(i.e., ready to send a packet)
n => Np - the expected number of nodes that will attempt to
transmit once the medium becomes idle
n Np ≥ 1 => a collision is expected to occur
n => to avoid collisions,
network must make sure that Np < 1
Copyright © 2003, Dharma P. Agrawal and Qing-An Zeng. All rights reserved (Modified by LTL) 29
Throughput for Different ALOHA and CSMA
Protocols with a=0.01 a = t / T (p. 132)
t - propagation
1.0 0.01-persistent CSMA delay
0.9 Nonpersistent CSMA T – packet
0.8 transmission
time
Throughput Sth
0.7
0.1-persistent CSMA
0.6
Recall:
0.5-persistent CSMA p-persistent:
0.5
1-persistent CSMA transmit with
0.4 probability p if
0.3 medium idle
Slotted Aloha
0.2 Observe:
Aloha
0.1 p = 0.01 is best
0 in this Fig. (others
suffer more
0 1 2 3 4 5 6 7 8 9
collisions reducing
Traffic Load G thruput => “don’t
hurry too much”)
Copyright © 2003, Dharma P. Agrawal and Qing-An Zeng. All rights reserved (Modified by LTL) 30
6.3.4. CSMA/CD
(CSMA with Collision Detection)
n In Basic CSMA: If 2 terminals begin sending packets at the
same time, each will transmit its complete packet
n Even if collision is taking place
Copyright © 2003, Dharma P. Agrawal and Qing-An Zeng. All rights reserved Modified by LTL 31
6.3.4. CSMA/CD (CSMA with Collision Detection) – cont.
Copyright © 2003, Dharma P. Agrawal and Qing-An Zeng. All rights reserved Modified by LTL 32
T – packet xmission
time
G = gT – normalized
offered load
t - propagation delay
a= t / T - normalized
time unit
g’ = g / T, where g is
propagation path
loss slope
Copyright © 2003, Dharma P. Agrawal and Qing-An Zeng. All rights reserved 33
6.3.5. CSMA/CA
(CSMA with Collision Avoidance)
n A basic collision avoidance (CA) scheme
n CSMA/CA rule: Backoff before collision (to avoid collisions)
Copyright © 2003, Dharma P. Agrawal and Qing-An Zeng. All rights reserved (Modified by LTL) 34
6.3.5. CSMA/CA (CSMA with Collision Avoidance) – cont. 1
->
DIFS
© 2006, ©
Copyright Michael Hall, Helsinki
2003, Dharma P. AgrawalUniv. of Technology
and Qing-An Zeng. All rights reserved (Modified by LTL) 35
Types of CSMA/CA
n Types of CSMA/CA
1) Basic CSMA/CA
2) CSMA/CA with ACK
3) CSMA/CA with RTS and CTS
© 2007 by©Leszek
Copyright T. LilienP. Agrawal and Qing-An Zeng. All rights reserved
2003, Dharma 36
1) Basic CSMA/CA
n Terminal T senses the medium before xmission
1) If medium is busy, T defers access until the end of current xmission - (b1) in Fig.
2) If medium is idle or once it becomes idle:
n T defers access for time period DIFS - (a) and (b2) in Fig.
n T picks a random backoff period - (c) in Fig.
n As long as medium idle during this backoff period, T keeps counting down
n Whenever medium busy during this backoff period, T freezes its counter
n After medium becomes idle again:
n T defers access for the DIFS period
n T resumes countdown
Copyright © 2003, Dharma P. Agrawal and Qing-An Zeng. All rights reserved (Modified by LTL) 37
1) Basic CSMA/CA – cont. 1
All except red text repeated (in larger font)
n Terminal T senses the medium before xmission
1) If medium is busy, T defers access until the end of current
xmission
2) If medium is idle or once it becomes idle:
n T defers access for time period DIFS
©
© 2006,
2007 by©
Copyright Michael
Leszek T.Hall,
LilienHelsinki
2003, Dharma P. AgrawalUniv. of Technology
and Qing-An (sl.19)
Zeng. All rights reserved (Modified by LTL) 40
1) Basic CSMA/CA – cont. 4
©
© 2006,
2007 by©
Copyright Michael
Leszek T.Hall,
LilienHelsinki
2003, Dharma P. AgrawalUniv. of Technology
and Qing-An (sl. 20)
Zeng. All rights reserved (Modified by LTL) 41
2) CSMA/CA with ACK
n Positive Acknowledgement (ACK) frame from receiver upon
reception of each data frame
n ACK sent after receipt + after time interval SIFS
n SIFS = Short Interframe Space
n Receiver transmits ACK without sensing the medium (cf. next)
n If ACK lost, retransmission of ACK
n SIFS < DIFS
E.g., in 802.11b networks:
DIFS n SIFS = 10 μs / DIFS = 50 μs
Source Data
MS Time
SIFS
Destination ACK
MS
DIFS Contention window
->
->
©
© 2006,
2007 by©
Copyright Michael
Leszek T.Hall,
LilienHelsinki
2003, Dharma P. AgrawalUniv. of Technology
and Qing-An Zeng. All rights reserved 43
CSMA/CA with ACK – cont. 2
->
->
© 2006, ©
Copyright Michael Hall, Helsinki
2003, Dharma P. AgrawalUniv. of Technology
and Qing-An Zeng. All rights reserved (Modified by LTL) 44
CSMA/CA with ACK – cont. 3
n Recal: SIFS < DIFS -- E.g., in 802.11b: SIFS = 10 μs / DIFS = 50 μs
Figure
© 2007 based onDharma
by©Leszek
Copyright 2003, ©Lilien
T. 2006, Michael
P. Agrawal andHall, Helsinki
Qing-An Zeng. Univ. of reserved
All rights Technology (Modified by LTL) 45
CSMA/CA with ACK – cont. 4
©
© 2006,
2007 by©
Copyright Michael
Leszek T.Hall,
LilienHelsinki
2003, Dharma P. AgrawalUniv. of Technology
and Qing-An (sl. 16)
Zeng. All rights reserved 46
CSMA/CA with ACK – cont. 5
©
© 2006,
2007 by©
Copyright Michael
Leszek T.Hall,
LilienHelsinki
2003, Dharma P. AgrawalUniv. of Technology
and Qing-An (sl. 17)
Zeng. All rights reserved 47
CSMA/CA with ACK – cont. 6
n Random backoff => Pr { collision } is reduced
n Contending stations generate random backoff numbers bn
n Backoff counters count down, starting from bn
n When backoff counter reaches zero,
station allowed to send its frame
n All other counters stop counting until the channel becomes idle
again
n Example below (fig): B & C back off after deferring for DIFS
n C has small bn – xmits sooner
n B has large bn – waits longer
©
© 2006,
2007 by©
Copyright Michael
Leszek T.Hall,
LilienHelsinki
2003, Dharma P. AgrawalUniv. of Technology
and Qing-An (sl. 18)
Zeng. All rights reserved (Modified by LTL) 48
Example for CSMA/CA with ACK
n Four stations: A, B, C, D
n Observe:
n C attempts to access medium before B does
n Coincidentally, C’s backoff number is smaller
©
© 2006,
2007 by©
Copyright Michael
Leszek T.Hall,
LilienHelsinki
2003, Dharma P. AgrawalUniv. of Technology
and Qing-An (sl. 21)
Zeng. All rights reserved (Modified by LTL) 49
Example for CSMA/CA with ACK – cont. 1
© 2006, ©
Copyright Michael Hall, Helsinki
2003, Dharma P. AgrawalUniv. of Technology
and Qing-An (sl.22)
Zeng. All rights reserved (Modified by LTL) 50
Example for CSMA/CA with ACK – cont. 2
© 2006, ©
Copyright Michael Hall, Helsinki
2003, Dharma P. AgrawalUniv. of Technology
and Qing-An (sl. 23)
Zeng. All rights reserved (Modified by LTL) 51
3) CSMA/CA with RTS and CTS
n Transmitter sends an RTS (Request To Send) after medium
has been idle for time interval > DIFS
n Receiver responds with CTS (Clear To Send) after medium
has been idle for SIFS
n Data can be xmitted (after SIFS)
n ACK sent after SIFS
DIFS SIFS
RTS Data Time
Source MS
SIFS SIFS
Medium Busy
Other MS
Defer access Backoff
Copyright © 2003, Dharma P. Agrawal and Qing-An Zeng. All rights reserved (Modified by LTL) 52
3) CSMA/CA with RTS and CTS – cont. 1a
Ladder Diagram for CSMA/CA with RTS/CTS
Compare this diagram to the previous one
Source MS Destination MS Other MS
DIFS
RTS
Propagation delay
SIFS
CTS
Propagation delay
SIFS Data
Propagation delay
SIFS
A CK Propagation delay
DIFS
Copyright © 2003, Dharma P. Agrawal and Qing-An Zeng. All rights reserved 53
3) CSMA/CA with RTS and CTS – cont. 1b
message
n Bec. SIFS (preceding CTS, Data, ACK) < DIFS (preceding other
MS’s RTS)
DIFS SIFS
RTS Data Time
Source MS
SIFS SIFS
Medium Busy
Other MS
© 2006, ©
Copyright Michael Hall, Helsinki
2003, Dharma P. AgrawalUniv. of Technology
and Qing-An (sl. 25)
Zeng. All rights reserved 55
3) CSMA/CA with RTS/CTS – cont. 1b
©Copyright
2006, Michael Hall, Helsinki
© 2003, Dharma Univ.
P. Agrawal and of Technology
Qing-An Zeng. All(sl. 26)reserved
rights 56
3) CSMA/CA with RTS/CTS – cont. 2
©Copyright
2006, Michael Hall, Helsinki
© 2003, Dharma Univ.
P. Agrawal and of Technology
Qing-An Zeng. All rights reserved 57
Advantages of RTS & CTS
n Advantage #1 of RTS/CTS:
Reduces collision probability if the data frame is very long
compared to the RTS frame
n Does not prevent collisions during very short RTS frames
©Copyright
2006, Michael Hall, Helsinki
© 2003, Dharma Univ.
P. Agrawal and of Technology
Qing-An Zeng. All(sl. 28)reserved
rights 58
Advantage of RTS & CTS – cont.
n Advantage #2 of RTS/CTS
Avoids having long intervals with high collision danger (same Fig)
© 2007 by©Leszek
Copyright T. LilienP. Agrawal and Qing-An Zeng. All rights reserved
2003, Dharma 60