37

Click here to load reader

Multiple access control protocol

Embed Size (px)

Citation preview

Page 1: Multiple access control protocol

MOHANLAL SUKHADIA

UNIVERSITY

shared wire or medium

Submitted To:Ms. Sheetal Agrawal

Submitted By:Munesh meena

MCA III Sem.

Page 2: Multiple access control protocol

MOHANLAL SUKHADIA

UNIVERSITY

shared wire or medium

Multiple Access Protocol

Submitted To:Ms. Sheetal Agrawal

Submitted By:Munesh meena

MCA III Sem.

Page 3: Multiple access control protocol

Multiple Access Links and Protocols

Two types of “links”:

• point-to-point

– PPP for dial-up access

– point-to-point link between Ethernet switch and host

• broadcast (shared wire or medium)

– old-fashioned Ethernet

– 802.11 wireless LAN

shared wire (e.g.,

cabled Ethernet)

shared RF

(e.g., 802.11 WiFi)

humans at a

cocktail party

(shared air, acoustical)shared RF

(satellite)

MUNESH MEENA

MCA 3rd Sem (MLSU)

Page 4: Multiple access control protocol

Point-to-point networks

Point-to-point networks are those in which,when a message is sent from one computer

to another, it usually has to be sent via other computers in the network.

MUNESH MEENA

MCA 3rd Sem (MLSU)

Page 5: Multiple access control protocol

Broadcast networks

Broadcast networks have a single communication channel that is shared by all the

machines on the network.

Shared channel

MUNESH MEENA

MCA 3rd Sem (MLSU)

Page 6: Multiple access control protocol

Multiple Access protocols

• single shared broadcast channel

• two or more simultaneous transmissions by nodes: interference

– collision if node receives two or more signals at the same time

multiple access protocol

• distributed algorithm that determines how nodes share channel, i.e., determine when node can transmit

• communication about channel sharing must use channel itself!

– no out-of-band channel for coordination

MUNESH MEENA

MCA 3rd Sem (MLSU)

Page 7: Multiple access control protocol

Need of protocols in Broadcast channel

Issues in multi-access channel :

• WHO is going to use the channel ?

• WHEN the channel is going to be used ?

• For HOW much time the channel is used ?

MUNESH MEENA

MCA 3rd Sem (MLSU)

Page 8: Multiple access control protocol

Types of Multiple –access protocol

MUNESH MEENA

MCA 3rd Sem (MLSU)

Page 9: Multiple access control protocol

RANDOM ACCESS

• Single channel shared by a large number of hosts

• No coordination between hosts

• Control is completely distributed

• Examples: ALOHA, CSMA, CSMA/CD

MUNESH MEENA

MCA 3rd Sem (MLSU)

Page 10: Multiple access control protocol

There are two versions of Aloha system which differ with respect to

whether or not time is divided up into discrete slots into which all

frames must fit. :

PURE ALOHA

SLOTTED ALOHA

ALOHA

MUNESH MEENA

MCA 3rd Sem (MLSU)

Page 11: Multiple access control protocol

Pure Aloha

MUNESH MEENA

MCA 3rd Sem (MLSU)

Page 12: Multiple access control protocol

If the first bit of a new frame overlaps with just the last bit of a frame

almost finished, both the frames will be totally destroyed. It does not

distinguish between a total loss or a near miss.

MUNESH MEENA

MCA 3rd Sem (MLSU)

Page 13: Multiple access control protocol

Slotted Aloha

• Divide time up into discrete intervals, each corresponding to one packet.

• The stations can only transmit data in one of the time slots only.

• The vulnerable period is now reduced in half. If the frames collide they will overlap completely instead of partially.

MUNESH MEENA

MCA 3rd Sem (MLSU)

Page 14: Multiple access control protocol

Vulnerable time for slotted ALOHA protocol

MUNESH MEENA

MCA 3rd Sem (MLSU)

Page 15: Multiple access control protocol

MUNESH MEENA

MCA 3rd Sem (MLSU)

Page 16: Multiple access control protocol

CSMA (Carrier Sense Multiple Access)

CSMA: listen before transmit:

• If channel sensed idle: transmit entire frame

• If channel sensed busy, defer transmission

• human analogy: don’t interrupt others!

MUNESH MEENA

MCA 3rd Sem (MLSU)

Page 17: Multiple access control protocol

CSMA collisions

collisions can still occur:

propagation delay means

two nodes may not hear

each other’s transmissioncollision:

entire packet transmission

time wastednote:

role of distance & propagation delay in

determining collision probability

spatial layout of nodes

MUNESH MEENA

MCA 3rd Sem (MLSU)

Page 18: Multiple access control protocol

Carrier sense multiple access with collision detection

• Carrier Sense:- listen for traffic on medium and determines gap between frames.

• Multiple Access:- Station can transmit any time when find network quite.

• Collision Detection:- Occurs when two stations transmits at same time. It gets detected and trans. Holds for random time.

MUNESH MEENA

MCA 3rd Sem (MLSU)

Page 19: Multiple access control protocol

CSMA/CD (Collision Detection)

CSMA/CD: carrier sensing, deferral as in CSMA

– collisions detected within short time

– colliding transmissions aborted, reducing channel wastage

• collision detection:

– easy in wired LANs: measure signal strengths, compare

transmitted, received signals

– difficult in wireless LANs: received signal strength overwhelmed

by local transmission strength

• human analogy: the polite conversationalist

MUNESH MEENA

MCA 3rd Sem (MLSU)

Page 20: Multiple access control protocol

Station is ready to send

Station is

ready to send

Station is ready to send

Transmit data and sense

channel

(4)

Station is ready to send

Transmit

jam signal

(5)

Station is ready to send

Wait according to backoff

strategy

(6)

Sense

channel

(1)

Channel free (2)

Channel busy (3)

Collision detected

New attempt

MUNESH MEENA

MCA 3rd Sem (MLSU)

Page 21: Multiple access control protocol

Carrier sense multiple access with collision avoidance(CSMA/CA)

• Motivation

– In a wireless network, the received signal has very little energy due to energy loss in transmission a collision may

add only 5~10% additional energy not useful for effective collision detection

• Features

– Tries to avoids collision

– Used in Wireless LAN

Difficult to detect collisions

Hidden node problem!

(CTS/RTS used in 802.11)

MUNESH MEENA

MCA 3rd Sem (MLSU)

Page 22: Multiple access control protocol

• Timing in CSMA/CA

• Interframe Space (IFS)

– When an idle channel is found, the station does not send immediately but waits for a period of time call IFS

– The IFS time allows the front of the transmitted signal by the distant station to reach this station

– The IFS variable can also be used to prioritize stations or frame types

• e.g., DIFS(Distributed IFS) , SIFS((Short)

MUNESH MEENA

MCA 3rd Sem (MLSU)

Page 23: Multiple access control protocol

1-persistent

MUNESH MEENA

MCA 3rd Sem (MLSU)

Page 24: Multiple access control protocol

Controlled Access• Approach

– The stations consult one another to find which station has the right to send

• Controlled access methods

– Reservation

• Ex. DQDB, Cable modem, …

– Polling

• Select and Poll

• Ex. HDLC (normal response mode)

– Token passing

• Ex. Token ring (FDDI), token bus, …

MUNESH MEENA

MCA 3rd Sem (MLSU)

Page 25: Multiple access control protocol

Reservation

• Features

– Time is divided into intervals

• In each interval, a reservation frame precedes the data frames sent in that interval

– N stations N reservation minislots in the reservation frame

• When a station needs to send a data frame it makes a reservation in its own minislot

MUNESH MEENA

MCA 3rd Sem (MLSU)

Page 26: Multiple access control protocol

Polling

• Motivation and features

– Communication for primary-secondary stations topology

• Ex. NRM mode of HDLC

– The primary station is always the initiator of a session

• By polling (PS) and selecting (PS)

• Select and Poll

MUNESH MEENA

MCA 3rd Sem (MLSU)

Page 27: Multiple access control protocol

Token Passing

• Features

– A station is authorized to send data when it receives a special frame called a token

– Stations are arranged around a ring (physically or logically)

• A token circulates around the ring

– If a station needs to send data, it waits for the token

– The station captures the token and sends one or more frames as long as the allocated time has not expired

– It releases the token to be used by the successor station

MUNESH MEENA

MCA 3rd Sem (MLSU)

Page 28: Multiple access control protocol

• Procedure

MUNESH MEENA

MCA 3rd Sem (MLSU)

Page 29: Multiple access control protocol

Channelization• Definition

– A Multiple-access method in which the available BW of a link is shared in time, frequency, or through code,

between different stations

• Features

– FDMA, TDMA are based on FDM and TDM in the physical layer

– CDMA is a data link multiple-access protocol

MUNESH MEENA

MCA 3rd Sem (MLSU)

Page 30: Multiple access control protocol

• Approach and features

– A data link layer protocol that uses FDM at the physical layer

– The available BW is shared by all stations

– Each stations uses its allocated band to send its data

– Ex. AMPS (1G cellular networks)

FDMA

MUNESH MEENA

MCA 3rd Sem (MLSU)

Page 31: Multiple access control protocol

MUNESH MEENA

MCA 3rd Sem (MLSU)

Page 32: Multiple access control protocol

TDMA

• Approach and features

– A data link layer protocol that uses TDM at the physical layer

– The stations share the capacity of the channel in time

– Each station is allocated a time slot during which it can send data

– Ex. GSM (2G cellular networks - Europe)

MUNESH MEENA

MCA 3rd Sem (MLSU)

Page 33: Multiple access control protocol

MUNESH MEENA

MCA 3rd Sem (MLSU)

Page 34: Multiple access control protocol

Code Division Multiple Access (CDMA)

• used in several wireless broadcast channels (cellular, satellite, etc) standards

• unique “code” assigned to each user; i.e., code set partitioning

• all users share same frequency, but each user has own “chipping” sequence (i.e., code) to encode data

• encoded signal = (original data) X (chipping sequence)

• decoding: inner-product of encoded signal and chipping sequence

• allows multiple users to “coexist” and transmit simultaneously with minimal interference (if codes are

“orthogonal”)

MUNESH MEENA

MCA 3rd Sem (MLSU)

Page 35: Multiple access control protocol

MUNESH MEENA

MCA 3rd Sem (MLSU)

slot 1 slot 0

d1 = -1

1 1 1 1

1- 1- 1- 1-

Zi,m= di.cmd0 = 1

1 1 1 1

1- 1- 1- 1-

1 1 1 1

1- 1- 1- 1-

1 1 11

1-1- 1- 1-

slot 0

channel

output

slot 1

channel

output

sender

code

data

bits

slot 1 slot 0

d1 = -1

d0 = 1

1 1 1 1

1- 1- 1- 1-

1 1 1 1

1- 1- 1- 1-

1 1 1 1

1- 1- 1- 1-

1 1 11

1-1- 1- 1-

slot 0

channel

output

slot 1

channel

output

receiver

code

received

input

Di = S Zi,m.cmm=1

M

M

CDMA Encode/Decode

Page 36: Multiple access control protocol

CDMA: two-sender interference

MUNESH MEENA

MCA 3rd Sem (MLSU)

Page 37: Multiple access control protocol

MUNESH MEENA

MCA 3rd Sem (MLSU)

Thanks!