Medium Access Control Sub Layer

Download as ppt, pdf, or txt
Download as ppt, pdf, or txt
You are on page 1of 41

Medium Access Control Sub Layer

12.2

Contents
Multiple Access Protocols
ALOHA
Carrier Sense Multiple Access Protocols
Collision-Free Protocols

The Channel Allocation Problem

In broadcast networks the key issue is how to


determine how gets to use the channel when
there is competition for it

Static Channel Allocation in LANs and MANs

FDM or TDM allocation

Problems when there is a large number of users, since spectrum


will be wasted

Dynamic Channel Allocation in LANs and MANs

A number of assumptions are in place

Dynamic Channel Allocation (1)

Station Model.

Single Channel Assumption.

The model consists of N independent stations


A single channel is available for all communications

Collision Assumption.

If two frames are transmitted simultaneously , they


overlap in time and the resulting signal is garbled. This
event is called a collision.
All station can detect collisions
A collided frame must be transmitted again latter
There are no errors other than those generated by
collisions

Dynamic Channel Allocation (2)


(a) Continuous Time
Frame transmission can begin at any time
There is no master clock dividing the time into discrete intervals

(b) Slotted Time


Time is divided into discrete intervals called slots.
Frame transmission begins at the beginning of the slot
A slot may be idle, may have one frame (legal) and may have multiple frames
(collision)

(a) Carrier Sense


Stations can tell if the channel is in use before trying to use it
If channel is in use, no station will attempt to use it before goes idle

(b) No Carrier Sense


Stations cant sense the channel before trying to use it
They go ahead and transmit only later they can say it was an error

Multiple Access Protocols

ALOHA
Carrier Sense Multiple Access Protocols
Collision-Free Protocols
Wireless LAN Protocols

Pure ALOHA (1)


In pure ALOHA, frames are transmitted at completely
arbitrary times.

Figure 12.3 Frames in a pure ALOHA network

12.9

Pure ALOHA (2)


Frame time the amount of time needed to transmit
the standard fixed length frame
An infinite population of users generates new frames
according to a Poisson distribution, with mean N
frames per time frame.
If N >1 than more frames than the channel can handle
0<N<1 for reasonable throughput

Pure ALOHA (3)


In addition to new frames, stations generate
retransmissions. The probability of k transmission
attempts per frame time, old and new combined, is
also Poisson, with mean G per frame
G >= N (equal when there are no retransmissions)

Throughput of a channel is:


S = G P0, where P0 is the probability that a frame doesnt
suffer collisions

Pure ALOHA (3)


Vulnerable period for the shaded frame.

Figure 12.5 Vulnerable time for pure ALOHA protocol

12.13

Pure ALOHA (4)


The probability that k frames are generated during a given
frame time is given by Poisson distribution:

G k e G
Pr[k ]
k!
So the probability of zero frames is just e-G
In the vulnerable interval, the mean number of frames
generated is 2G, so the probability that there is no frame is
therefore P0 = e-2G
Using the formula S = G P0, we obtain:

S Ge

2 G

The maximum throughput occurs at G = 0.5.


For G = 0.5 we get S = 1/2e = 0.184

Slotted ALOHA
Assumptions
all frames same size
time is divided into equal
size slots, time to transmit 1
frame
nodes start to transmit frames
only at beginning of slots
nodes are synchronized
if 2 or more nodes transmit in
slot, all nodes detect collision

Operation
when node obtains fresh frame,
it transmits in next slot
no collision, node can send new
frame in next slot
if collision, node retransmits
frame in each subsequent slot
with prob. p until success

DataLink Layer

2-15

Slotted ALOHA

Pros
single active node can
continuously transmit at full
rate of channel
highly decentralized: only
slots in nodes need to be in
sync
simple

Cons
collisions, wasting slots
idle slots
nodes may be able to detect
collision in less than time to
transmit packet
clock synchronization

DataLink Layer

2-16

Figure 12.6 Frames in a slotted ALOHA network

12.17

Figure 12.7 Vulnerable time for slotted ALOHA protocol

12.18

Slotted ALOHA
The time is divided into discrete intervals, each interval
corresponding to one frame.
The users will need to be synchronized with the beginning of
the slot
Special station can emit a pip at the start of each interval

A computer is not allowed to send data at any arbitrary times,


it will be forced to wait until the next valid time interval
Since the vulnerable period is now halved, the throughput of
this method would be:
Slotted ALOHA peaks at G=1 :: so S=1/e=.368 (i.e. 37 %
success)..a small increase in channel load will drastically
reduce its performance.

S Ge

Pure ALOHA vs. Slotted ALOHA


Throughput versus offered traffic for ALOHA systems.

CSMA Protocols
Are protocols in which stations listen for a carrier
(i.e. transmission) and act accordingly
Networks based on these protocols can achieve better
channel utilization than 1/e
Protocols

1 persistent CSMA
Non persistent CSMA
p persistent CSMA
CSMA CD

1 Persistent CSMA
1 persistent CSMA
When a station has data to send, it first listens to the
channel
If channel is busy, the station waits until the channel is
free. When detects an idle channel, it transmits the frame
If collision occurs, it will wait an random amount of time
and starts again
The protocol is called 1 persistent, because the station
sends with probability of 1 when finds the channel idle,
meaning that is continuously listening
Propagation delay

Non Persistent CSMA


Before sending a station senses the channel. If no
activity, it sends its frame
If channel is busy, then will not continue to sense the
channel until it becomes idle, but it will retry at a
latter time (waiting a random period of time and
repeating the algorithm)
With this algorithm, fewer collisions will happen;
thus better channel utilization but with longer delays
than 1 persistent CSMA algorithm

12.24

p Persistent CSMA
It applies to slotted channels
When a station becomes ready to send, it senses the channel.
If it is idle will transmit with a probability of p. With a
probability of q it defers to the next slot.
If next slot is also idle, it transmits or it defers again with
probabilities of p and q
This process is repeated until the frame gets either
transmitted or another station it began transmission
For latter case, the unlucky station acts the same as it would
have been a collision (waits a random time and starts again)

Persistent and Non-persistent CSMA


Comparison of the channel utilization versus
load for various random access protocols.

CSMA with Collision Detection


An improvement over CSMA protocols is for a
station to abort its transmission when it senses a
collision.
If two stations sense the channel idle and begin
transmission at the same time, they will both detect
the collision immediately; there is no point in
continuing to send their frames, since they will be
garbled.
Rather than finishing the transmission, they will stop
as soon as the collision is detected
Saves time and bandwidth

CSMA/CD
CSMA method that weve learnt just now doesnt
specify the procedure following a collision.
CSMA/CD augments the algorithm to handle the
collision
In the CSMA/CD method, a station monitors the
medium after it sends a frame to see of the
transmission was a successful. If so, the station is
finished. If, however, there is a collision, the frame is
sent again.
To better understand CSMA/CD, see fig 12.12

12.28

Figure 12.12 Collision of the first bit in CSMA/CD

12.29

Explanation of CSMA/CD in fig 12.12


In the fig, the 1st bits transmitted by the two
stations involved in the collision.
Although each station continues to send bits in the
frame until it detects the collision, it show what
happens as the first bits collide. In fig 12.12,
station A and C are involved in the collision

12.30

At t1, station A starts sending the bits of its frame.


At time t2, station C hasnt yet sensed the 1st bit sent
by A. it then start sending its bits of frame which
propagate both to the left and right.
The collision occurs sometime after time t2. station C
detects a collision at time t3 when it receives the 1st
bit of As frame.
Station C immediately abort transmission.
Station A detects collision at time t4 when it receives
the 1st bit of Cs frame. It also immediately aborts
transmission

12.31

Minimum frame Size:


One of the solution for the case of collision in
CSMA/CD method the minimum frame size is
determined so that the propagation delay of a
frame travel is reduced in order to avoid collision
with other frame.
Tfr = at least two times Tp
Discuss worst case

12.32

CSMA with Collision Detection

CSMA/CD can be in one of three states:


contention, transmission, or idle.

12.35

12.36

CSMA/CA
USED IN WIRELESS (WI-FI and etc.)
For this lectures pls refer to chapter 12 of text book.
Forouzans. Page 363 - 390

12.37

Collision Free Protocols


Collisions adversely affect the system performance,
especially if the cable is long and the frames are short
The collision free protocols solve the contention for
the transmission channel without an collisions at all
N stations are assumed to be connected to the same
transmission channel
Protocols
Bit-Map Protocol
Binary Countdown

Collision-Free Protocols (1)


The basic bit-map protocol.

If station j has a frame to send, it will transmit a 1 in j-th contention slot

Collision-Free Protocols (2)


The binary countdown protocol. A dash indicates
silence.

References
Andrew S. Tanenbaum Computer Networks, ISBN
0-13-066102-3

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy