Ch12 Multiple Access
Ch12 Multiple Access
Ch12 Multiple Access
Multiple Access
12.1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Figure 12.1 Data link layer divided into two functionality-oriented sublayers
12.2
Figure 12.2 Taxonomy of multiple-access protocols discussed in this chapter
12.3
Binary Exponential Backoff
◼ After 1st collision, each station waits for 0 or 1 time slot before trying again.
◼ After 2nd collision, each station picks up either 0,1,2 or 3 at random and waits for that
much time slots.
◼ If 3rd collision occurs, then next time number of slots to wait is chosen randomly from
interval 0 to 23-1.
◼ In general, after ith collision, random number between 0 to 2i -1 is chosen, that number of
time slot is skipped.
◼ After 10th collision, randomized interval is frozen at max of 1023 slots.
◼ After 16th collision, controller reports failure back to computer sending and further
recovery is upto higher layers.
◼ This algorithm is called Binary Exponential Back off Algorithm.
◼ Advantage: Ensures a low delay when only a few stations collide, but also assures that the
collision is resolved in a reasonable interval when many stations collide.
◼ Disadvantage: Could introduce significant delay.
12-1 RANDOM ACCESS
12.10
Figure 12.4 Procedure for pure ALOHA protocol
12.11
Figure 12.5 Vulnerable time for pure ALOHA protocol
12.12
Figure 12.6 Frames in a slotted ALOHA network
12.13
Figure 12.7 Vulnerable time for slotted ALOHA protocol
12.14
Figure 12.8 Space/time model of the collision in CSMA
12.15
Figure 12.9 Vulnerable time in CSMA
12.16
Figure 12.10 Behavior of three persistence methods
12.17
Figure 12.11 Flow diagram for three persistence methods
12.18
CSMA:
◼ TYPES:
◼ 1. 1 Persistent CSMA
◼ 2. Non Persistent CSMA
◼ 3. P Persistent CSMA
◼ 4. CSMA/CD
Carrier Sense Multiple Access (CSMA)
• Protocols in which stations listen for a carrier (i.e.
transmission) and act accordingly are called carrier
sense protocols.
1. 1-persistent CSMA
Channel Busy ➔ Continue sensing until free and
then grab.
Channel Idle ➔ Transmit with probability 1.
Collision ➔ Wait for a random length of time and
try again.
2. Non-persistent CSMA:
Channel Busy ➔ Does not continually sense the
channel. Wait for a random length of time and try
again.
Channel Idle ➔ Transmit.
Collision ➔ Wait for a random length of time and
try again.
20
3. P-persistent CSMA:
Channel Busy ➔ Continue sensing until free (same as
idle).
Channel Idle ➔ Transmit with probability p, and defer
transmitting until the next slot with probability q = 1-p.
Collision ➔ Wait for a random length of time and try
again.
• Analysis:
• The non-persistent CSMA has better channel utilization but
longer delays than 1-persistent CSMA.
• CSMA are an improvement over ALOHA because they ensure
that no station begins to transmit when it senses the
channel busy.
• Another improvement is for stations to abort their
transmissions as soon as they detect a collision.
• Quickly terminating damaged frames saves time and
bandwidth.
• This protocol is called CSMA/CD (CSMA with Collision
Detection).
26
Wireless LAN Protocols
• Hidden station problem: A is transmitting to B. C cannot
hear A. If C starts transmitting, it will interfere at B.
• Exposed station problem: B is transmitting to A. C
concludes that it may not send to D but the interference
exists only between B and C.
A wireless LAN.
(a) A transmitting. (b) B transmitting.
27
MACA and MACAW
◼ MACA: Multiple Access with Collision Avoidance:
◼ The sender transmits a RTS (Request To Send) frame.
◼ The receiver replies with a CTS (Clear To Send) frame.
◼ Neighbors
◼ see CTS, then keep quiet.
◼ see RTS but not CTS, then keep quiet until the CTS is back to the
sender.
◼ The receiver sends an ACK when receiving an frame.
◼ Neighbors keep silent until see ACK.
◼ Collisions
◼ There is no collision detection.
◼ The senders know collision when they don’t receive CTS.
◼ They each wait for the exponential backoff time.
28
Wireless LAN Protocols (2)
12.31
Figure 12.13 Collision and abortion in CSMA/CD
12.32
Figure 12.14 Flow diagram for the CSMA/CD
12.33
Figure 12.15 Energy level during transmission, idleness, or collision
12.34
Figure 12.16 Timing in CSMA/CA
12.35
Note
12.36
Note
12.37
Figure 12.17 Flow diagram for CSMA/CA
12.38
NAV – DIFS – SIFS – PIFS – EIFS – CTS - RTS
network allocation vector (NAV) that shows how much time must pass before
these stations are allowed to check the channel for idleness.
12.39
12-2 CONTROLLED ACCESS
12.40
Figure 12.18 Reservation access method
12.41
Figure 12.19 Select and poll functions in polling access method
12.42
Figure 12.20 Logical ring and physical topology in token-passing access method
12.43
12-3 CHANNELIZATION
12.44
Note
12.45
Figure 12.21 Frequency-division multiple access (FDMA)
12.46
Note
12.47
Figure 12.22 Time-division multiple access (TDMA)
12.48
Note
12.49
Note
12.50
Figure 12.23 Simple idea of communication with code
12.51
Figure 12.24 Chip sequences
12.52
Figure 12.25 Data representation in CDMA
12.53
Figure 12.26 Sharing channel in CDMA
12.54
Figure 12.27 Digital signal created by four stations in CDMA
12.55
Figure 12.28 Decoding of the composite signal for one in CDMA
12.56