4.medium Access Control
4.medium Access Control
4.medium Access Control
Overview
• Specifically adapted to wireless domain
• This layer compromises all mechanisms that regulate user
access to a medium using
– SDM
– FDM
– TDM
– CDM
Motivation
Can we apply media access methods from fixed networks?
Example CSMA/CD
• Carrier Sense Multiple Access with Collision Detection - send as
soon as the medium is free, listen into the medium if a collision
occurs. If so, stops immediately and sends a jamming signal
Problems in wireless networks
• CSMA/CD identifies the collision only at the receiver, not at the
sender
• Since the signal strength decreases at least proportional to the
square of the distance, the sender cant trace the signal at the
receivers end
• Senders apply CS and CD, but the collisions happen at receivers
due to second sender
Hidden terminal problem
• Terminal A is communicating with terminal C.
• Terminal B doesn’t know A is communicating with C and it
thinks C is idle.
• As a result, B also tries to communicate with C and thus cause
collision at C.
• Therefore, B is a hidden terminal to A
Exposed terminal problem
• Terminal A is communicating with some terminals other than B
and C.
• However, C is within the effective signal range of A and it
thinks the channel is busy.
• As a result, C is will not communicate with B even though both
C and B are idle.
• Therefore, A is an exposed terminal for C.
Near and far terminals
• Terminals A and B send (same transmission power), C receives
- the signal of terminal B hides A’s signal - C cannot
receive A as B’s signal drowns out A’s signal
• If C is the authority for sending rights, it could not give a
fair scheme, as B would drown out A
A B C
For channel n,
the Uplink frequency fu = between 890.2 and 915 MHz
downlink frequency fd = between 935.2 and 960 MHz
TDMA (Time Division Multiple Access)
- Assign a fixed sending frequency for a certain amount of time
- Hence tuning the frequency is not necessary. But synchronization is
necessary between sender and receiver
- A pattern of time slots is allocated for each senders. This is done by, Fixed
Allocation or Dynamic Allocation schemes
- The following are some of the techniques for allocating time slots
1. Fixed TDM
2. Classical Aloha
3. Slotted Aloha
4. Carrier Sense Multiple Access
5. Demand assigned multiple access
6. Packet reservation multiple access
7. Reservation TDMA
8. Multiple access with collision avoidance
9. Polling
10.Inhibit sense Multiple access
1. Fixed TDM
• Assigning the reserved time slot at the right time
• The slot is assured and each Mobile Station knows its turn. No
interference
• The fixed pattern is assigned by the Base Station.
• Duplex channel – Allocation of different time slots for uplink and
downlink using the same frequency – Time Division Duplex
(TDDD)
• Each connection will have its own uplink and downlink pair
• 1 to 12 stations can use same frequency, each for 10ms.
• Not efficient for Client/ Server communication (asymmetric) and
Bursty data
2. Classical Aloha
• Aloha does not co-ordinate the medium or resolve contention in
the Medium Access Control layer
• Each station can access the medium at any time. Random access
scheme without a central arbiter
• If collision occurs, then data is retransmitted
• Throughput is 18% of the load
3. Slotted Aloha
• Aloha + time slots
• All senders should be synchronized. Transmission should start
only on the start of time slot.
• Throughput is 36% of the load (Slotting doubles the
throughput)
• Both Aloha techniques are used only in light load.
4. Carrier Sense Multiple Access (CSMA)
• Senses the carrier and sends only if idle (in wireless LANs)
• Versions
non-persistent CSMA
senses and uses the carrier immediately if its idle
p-persistent CSMA
senses, but uses only at the probability p, if carrier is idle
1-persistent CSMA
Back-off algorithms are used after sensing, which depends
upon the sensing time
CSMA/CA (Collision Avoidance)
Back-off schemes is used to achieve fairness among competing
stations
Elimination Yield Non-preemptive multiple access (EY-
NMPA)
Several phases of sensing and accessing is done before one
winner access the medium. Priority is introduced for more
important data.
5. Demand Assigned multiple access
• Reservation mechanism + TDM patterns (above methods)
• Used for satellite communications
• Two periods
Reservation period – Stations reserve for future slots
Transmission period – transmits according to reservation
• Reservation period follows Aloha scheme, Collision will not
destroy data
• The satellite collects the reserved slots and sends to all stations.
All should obey this list
• Stations are synchronized time to time
• Its an Explicit reservation scheme
6. Packet Reservation multiple access (PRMA)
• Its an implicit reservation scheme
• A certain number of slots forms a “Frame”, which is repeated in
time (Fixed TDM)
• BS broadcasts the status of each slot to all MS.
• Hence MS knows which slot is free and which is occupied
• When a station succeeds in reserving a slot, it is implicitly
reserved for further transmission
7. Reservation TDMA
• Here, N mini-slots is followed by N * k data-slots for a frame.
Where k data- slots transmitted.
• Each station is allotted its own mini-slot.
• If there is any unused data-slots, other stations can use that in
round-robin scheme
8. Multiple Access with Collision Avoidance (MACA)
• Solves the hidden terminal problem. Also used in Ad hoc
networks
• It’s a random access aloha scheme + dynamic reservation
• Use short signaling packets for collision avoidance
RTS (Request To Send) – contains names of sender, receiver,
and the time required for transmission
CTS (Clear To Send) – contains names of sender, receiver, and
the time required for transmission
• Initially A sends RTS to B which is not heard by C.
• Now B sends CTS to A. Heard by C, hence it will not send
transmit to B until the time of transmission expires
• But collision can occur while sending RTS by A and C at same
time. But this does not effects the messages
• No transmission is started without an appropriate CTS.
Hidden terminal Problem
-1
1
Sender B
Data : 100 Step3: Since the two signals are using the
Step1: XOR the data with the key Step4: Resulting signal = As+Bs
-1
-1
1
Receiver A
Step1: Apply Key A (010100100010110011) Step3: Give the resulting signal to the
-1
1
-1
-1
Receiver B
Step1: Apply Key B (000110101000010111) Step3: Give the resulting signal to the
CDMA
Reconstruction
Classical
ALOHA Carrier Sense
Multiple Access
Reservation
TDMA
Fixed
TDM
TDMA
Demand Assigned
Multiple Access
Comparison SDMA/TDMA/FDMA/CDMA
Approach SDMA TDMA FDMA CDMA
Idea segment space into segment sending segment the spread the spectrum
cells/sectors time into disjoint frequency band into using orthogonal codes
time-slots, demand disjoint sub-bands
driven or fixed
patterns
Terminals only one terminal can all terminals are every terminal has its all terminals can be active
be active in one active for short own frequency, at the same place at the
cell/one sector periods of time on uninterrupted same moment,
the same frequency uninterrupted
Signal cell structure, directed synchronization in filtering in the code plus special
separation antennas the time domain frequency domain receivers
Advantages very simple, increases established, fully simple, established, flexible, less frequency
capacity per km² digital, flexible robust planning needed, soft
handover
Dis- inflexible, antennas guard space inflexible, complex receivers, needs
advantages typically fixed needed (multipath frequencies are a more complicated power
propagation), scarce resource control for senders
synchronization
difficult
Comment only in combination standard in fixed typically combined still faces some problems,
with TDMA, FDMA or networks, together with TDMA higher complexity,
CDMA useful with FDMA/SDMA (frequency hopping lowered expectations; will
used in many patterns) and SDMA be integrated with
mobile networks (frequency reuse) TDMA/FDMA