Channel Allocation (MAC)

Slides:



Advertisements
Similar presentations
14-MAC Sub-layer Dr. John P. Abraham Professor UTPA.
Advertisements

12.1 Chapter 12 Multiple Access Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Multiple access What if multiple machines are sharing the same link?
Multiple Access Methods. When nodes or stations are connected and use a common link (cable or air), called a multipoint or broadcast link, we need a.
Comp 361, Spring 20056:Basic Wireless 1 Chapter 6: Basic Wireless (last updated 02/05/05) r A quick intro to CDMA r Basic
12.1 Chapter 12 Multiple Access Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
1 Pertemuan 13 Teknik Akses Jaringan - Random Matakuliah: H0174/Jaringan Komputer Tahun: 2006 Versi: 1/0.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Chapter 13 Multiple Access.
5: DataLink Layer5-1 Chapter 5 Link Layer and LANs Computer Networking: A Top Down Approach Featuring the Internet, 3 rd edition. Jim Kurose, Keith Ross.
CS352- Link Layer Dept. of Computer Science Rutgers University.
Medium Access Control Sublayer
Lecture 16 Random Access protocols r A node transmits at random at full channel data rate R. r If two or more nodes “collide”, they retransmit at random.
1 ECE453 – Introduction to Computer Networks Lecture 7 – Multiple Access Control (I)
Chi-Cheng Lin, Winona State University CS412 Introduction to Computer Networking & Telecommunication Medium Access Control Sublayer.
4-1 Last time □ Link layer overview ♦ Services ♦ Adapters □ Error detection and correction ♦ Parity check ♦ Internet checksum ♦ CRC □ PPP ♦ Byte stuffing.
CHAPTER 4: THE MEDIUM ACCESS SUBLAYER 4.1: The Channel Allocation Problem 4.2: Multiple Access Protocols.
LECTURE9 NET301. DYNAMIC MAC PROTOCOL: CONTENTION PROTOCOL Carrier Sense Multiple Access (CSMA): A protocol in which a node verifies the absence of other.
© Janice Regan, CMPT 128, CMPT 371 Data Communications and Networking LANs 2: MAC protocols.
جلسه دهم شبکه های کامپیوتری به نــــــــــــام خدا.
Medium Access Control NWEN302 Computer Network Design.
Chi-Cheng Lin, Winona State University CS 313 Introduction to Computer Networking & Telecommunication Medium Access Control Sublayer.
© 2009 Pearson Education Inc., Upper Saddle River, NJ. All rights reserved. © The McGraw-Hill Companies, Inc. Medium Access Control Asst. Prof. Chaiporn.
4: DataLink Layer1 Multiple Access Links and Protocols Three types of “links”: r point-to-point (single wire, e.g. PPP, SLIP) r broadcast (shared wire.
Medium Access Control Sub Layer
12.1 Chapter 12 Multiple Access Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Data Communications, Kwangwoon University12-1 Chapter 12. Multiple Access 1.Random Access 2.Controlled Access 3.Channelization.
5: DataLink Layer 5a-1 Multiple Access protocol. 5: DataLink Layer 5a-2 Multiple Access Links and Protocols Three types of “links”: r point-to-point (single.
LECTURE9 NET301 11/5/2015Lect 9 NET DYNAMIC MAC PROTOCOL: CONTENTION PROTOCOL Carrier Sense Multiple Access (CSMA): A protocol in which a node verifies.
Chapter 12 Multiple Access
1 Kyung Hee University Prof. Choong Seon HONG Multiple Access.
THE MEDIUM ACCESS CONTROL SUBLAYER 4.1 THE CHANNEL ALLOCATION PROBLEM 4.2 MULTIPLE ACCESS PROTOCOLS.
Chapter 12 Media Access Control (MAC)
Multiple Access. Figure 12.1 Data link layer divided into two functionality-oriented sublayers.
COMPUTER NETWORKS Data-link Layer (The Medium Access Control Sublayer) MAC Sublayer.
2. Data Link Layer: Medium Access Control. Scheduling.
Chapter 5 Link Layer Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 A note on the use of these.
Part III. Data Link Layer
A Taxonomy of Mechanisms for Multi-Access
Multiple Access Methods
CT301 lecture7 10/29/2015 Lect 7 NET301.
Data link layer divided into two functionality-oriented sublayers
CT301 LECTURE 8.
Chapter 5 Link Layer and LANs
Chapter 12 Multiple Access
Part III Datalink Layer 10.
Module 3 Medium Access Control.
Multiple Access Problem: When two or more nodes transmit at the same time, their frames will collide and the link bandwidth is wasted during collision.
Computer Communication Networks
Multiple Access Mahesh Jangid Assistant Professor JVW University.
Subject Name: Computer Communication Networks Subject Code: 10EC71
Net301 lecture9 11/5/2015 Lect 9 NET301.
THE IEEE MAC SUB-LAYER – chapter 14
Communication Networks NETW 501
Multiple Access Methods
Learning Objectives After interacting with this Learning Object, the learner will be able to: Explain the process of collision detection in CSMA/CD.
CT301 lecture7 10/29/2015 Lect 7 NET301.
The Medium Access Control Sublayer
Chapter 13 Multiple Access
Channel Allocation Problem/Multiple Access Protocols Group 3
Chapter 12 Multiple Access
Link Layer and LANs Not everyone is meant to make a difference. But for me, the choice to lead an ordinary life is no longer an option 5: DataLink Layer.
Channel Allocation Problem/Multiple Access Protocols Group 3
Chapter 13 Multiple Access
Lecture 5- Data Link Layer
Multiple Access Methods
Dr. John P. Abraham Professor UTPA
Multiple Access Control (MAC) Protocols
Part III Datalink Layer 10.
Chapter 12 Media Access Control (MAC)
Chapter 12 Media Access Control (MAC)
Presentation transcript:

Channel Allocation (MAC) Advanced Computer Networks

Outline Channel Allocation Problem Channel Allocation Classification FCA,DCA,… TDMA, FDMA Aloha, Slotted Aloha CSMA (non-persistent, 1-persistent, p-persistent), CSMA/CD Performance Results

Data Link Sub Layers IEEE 802 OSI Network Layer Network Layer 802.2 Logical Link Control LLC Data Link Layer 802.11 Wireless LAN 802.3 Ethernet 802.5 Token Ring MAC Other Physical Layer Physical Layer Physical Layers IEEE 802 OSI

Channel Allocation Problem

Channel Allocation Problem

Channel Allocation Problem

Channel Allocation Problem

Channel Allocation Problem

Channel Allocation Greedy Channel Allocation This strategy attempts to handle the channel requests (accept the connection requests) with the minimum number of available channels.

Channel Allocation Graph Coloring Problem in Channel Allocation Greedy Strategy Vertex coloring Problem Edge Coloring Problem Multicoloring Problem Bandwidth Coloring Problem Bandwidth Multicoloring Problem …

Channel Allocation Co-channel reuse distance: The minimum distance at which co-channels can be reused with no interferences is called co-channel reuse distance.

Possible Model Assumptions Collision :: If two frames are transmitted simultaneously, they overlap in time and the resulting signal is garbled. This event is a collision. Continuous Time :: frame transmissions can begin at any time instant. Slotted Time :: time is divided into discrete intervals (slots). Frame transmissions always begin at the start of a time slot.

Possible Model Assumptions Carrier Sense (CS) :: Stations can tell if the channel is busy (in use) before trying to use it. If the channel is busy, no station will attempt to use the channel until it is idle. No Carrier Sense :: Stations do not sense channel before attempting to send a frame. They just go ahead and transmit a frame. The collision is detected and recovered then.

Channel Allocation Schemes

Channel Allocation Schemes Fixed channel assignment (FCA) FCA is the simplest off-line channel allocation scheme in which channels are assigned to the users Either permanently Or for a long time interval In a fixed channel assignment strategy, each user is allocated a predetermined set of channels. No Collision: FCA protocols assure the users that their transmitting messages will not collide with the messages from the others. TDMA, FDMA, and CDMA are typical FCA protocols

Channel Allocation Schemes Time Division Multiple Access Scheme (TDMA)

Channel Allocation Schemes Time Division Multiple Access Scheme (TDMA) A single channel is time-shared Channel is divided among several users Each users accesses the channel periodically for a small period of time (called time slot)

Channel Allocation Schemes Time Division Multiple Access Scheme (TDMA) A set of time slots is known as the TDMA frame During a time slot, the entire bandwidth is available TDMA is a collision-free scheme A guard band is period of time during which the channel is assigned to no host

Channel Allocation Schemes TDMA: Time Division Multiple Access Unused slots go idle Example: 6-station LAN, 1,3,4 have pkt, slots 2,5,6 idle 6-slot frame 1 3 4 1 3 4

Channel Allocation Schemes FDMA: Frequency Division Multiple Access Spectrum is divided into a number of equal frequency channels. One or more channel is assigned to each user. Frequency subchannels are sufficiently separated (via guard bands) to prevent co-channel interference. A significant portion of channel is wasted by the guard bands. FDMA Provides simultaneous packet transmissions without collision.

Channel Allocation Schemes FDMA: Frequency Division Multiple Access

Channel Allocation Schemes FDMA: Frequency Division Multiple Access Unused transmission time in frequency bands go idle Example: 6-station LAN, 1,3,4 have pkt, frequency bands 2,5,6 idle

Channel Allocation Schemes CDMA: Code Division Multiple Access In CDMA, transmitter spreads the information signal in a wide frequency band by using a spreading code. Receiver uses the same code to retrieve the received signal Each group of nodes can be given a shared code Several codes occupy the same channel

Channel Allocation Schemes CDMA: Code Division Multiple Access Only nodes associated with a particular code can understand each other. Simultaneous transmissions can be isolated by using different spreading codes

Channel Allocation Schemes CDMA, TDMA, and FDMA

Channel Allocation Schemes Hybrid Multiple Access Scheme CDMA-TDMA Assigning a code to a group of nodes TDMA intergroup FDMA-TDMA Assigning a band to a group of nodes CDMA-FDMA FDMA intergroup ?

Channel Allocation Schemes On-Demand Channel Assignment Schemes (ODCA) Efficient usage of the available spectrum Reassigning the unused channels to the users Channels are not pre-allocated to any user Channels are dynamically assigned as the calls arrive ODCA is also called dynamic channel assignment (DCA)

Channel Allocation Schemes On-Demand Channel Assignment Schemes (ODCA) DCA schemes attempt to optimize the system performance by adapting to the traffic variations All channels can be used by all users as long as the co-channel constraints are satisfied ODCA Schemes are collision-free ODCA algorithms are generally time consuming ODCA schemes need more complex control

Channel Allocation Schemes On-Demand Channel Assignment Schemes (ODCA) Polling technique, Reservation method, and Trunking are several wellknown ODCA Schemes

Channel Allocation Schemes Polling Scheme Centralized controller queries nodes in a cyclic predetermined order Whether they have data to transmit or not, Controller polls (one by one) the nodes to give them an opportunity to access the medium The node with no packet decline the request

Channel Allocation Schemes Polling Scheme Others begin the packet transmission upon receiving the query Polling is a collision-free scheme The entire bandwidth is available for nodes which is permitted to transmit data Polling is able to adapt to the user traffics

Channel Allocation Schemes Reservation The basic idea is to set some time slots for carrying reservation messages. Requires a controller device to reserve a communication channel prior to transmission Time is subdivided into super-frames Each super-frame is divided into a reservation period and a data-transmission period Reservation period is divided into frames one for each node

Channel Allocation Schemes Reservation In reservation frame, each user sends a signal indicating whether or not it has message traffic the number of data-transmission slots it requires Controller computes a transmission schedule Schedule is sent to all nodes at the end of reservation period This avoids the collisions since each host sends only in its assigned time slot.

Channel Allocation Schemes Reservation This method is not fair, since There are a finite number of available slots Hosts request slots in a preferred order Initial hosts (in predefined order) are always able to transmit The last ones can send if the initials have left some for them. What’s the solution (?)

Channel Allocation Schemes Reservation

Channel Allocation Schemes Trunking ?

End