communication sem.ppt
TRANSCRIPT
-
8/13/2019 communication sem.ppt
1/34
Multiple ACCESS protocol
-
8/13/2019 communication sem.ppt
2/34
pes of Multipleaccess protocol
-
8/13/2019 communication sem.ppt
3/34
Transmission Technology
Transmission technology can be
categorized into two categories :
Point-to point networks
Broadcast networks
-
8/13/2019 communication sem.ppt
4/34
Two types of transmissiontechnology
Point-to-Point Link Broadcast Link
-
8/13/2019 communication sem.ppt
5/34
Point-to-pointnetworksPoint-to-point networks are those in which when a message issent from one computer to another, it usually has to be sent via
other computers in the network.A point-to-point network consists
of many connections between individual pairs of computers.
-
8/13/2019 communication sem.ppt
6/34
BroadcastnetworksBroadcast networks have a single communication channel that is shared by all themachines on the network. Apacketsent by one computer is received by all theother computers on the network. The packets that are sent contain the address ofthe receiving computer; each computer checks this field to see if it matches itsown address. If it does not then it is usually ignored; if it does then it is read.
Broadcast channels are sometimes known as multi-access channel.
One Shared
channel
-
8/13/2019 communication sem.ppt
7/34
Need of protocols in
Broadcast channelIssues in multi-access channel :
WHO is going to use the channel ?
WHEN the channel is going to be used ? For HOW much time the channel is used ?
Due to shared channel and unregulated traffic over the
network ..collisions and data loss occur.Some protocol must
be followed for regulated and safe transmission over the
network.
-
8/13/2019 communication sem.ppt
8/34
Multiple ACCESS protocol
(Medium access protocol) is a sub layer of Data linklayer. MAC is the bottom part of the Data link layer. The protocols usedto determine who goes next on a multi-access channel belongs to thislayer. Some of the algorithms for allocating multi-access channel are as
follows:
Aloha protocol Carrier Sense Multiple Access Protocols(CSMA) Collision-free protocols :
Limited contention protocol Wireless LAN protocol Digital Cellular radio
-
8/13/2019 communication sem.ppt
9/34
-
8/13/2019 communication sem.ppt
10/34
-
8/13/2019 communication sem.ppt
11/34
PURE ALOHAThe basic idea on which pure aloha is based upon is : It let userstransmit whenever they have data to be sent.So there will be collisions ,of course, and the colliding frames will bedamaged. However due to feed back property of broadcasting asender can always find out whether its frame was destroyed by
listening to the channel. All the receivers acknowledge the packetswhich means that the packet is received and if there is noacknowledgement from the receiver then the transmission isassumed to be unsuccessful and the station then retransmits the
packet after random amount of time.
The systems in which multiple users share a common channel in away that can lead to conflict are widely known as contentionsystems
-
8/13/2019 communication sem.ppt
12/34
Pure Aloha
-
8/13/2019 communication sem.ppt
13/34
If the first bit of a new frame overlaps with just the last bit of a frame
almost finished, both the frames will be totally destroyed. It does not
distinguish between a total loss or a near miss.
-
8/13/2019 communication sem.ppt
14/34
Slotted Aloha In 1987, Roberts publish a method called slotted aloha which doubled
the capacity of pure aloha.
Divide time up into discrete intervals, each corresponding to onepacket.
The stations can only transmit data in one of the time slots only.
The vulnerable period is now reduced in half. If the frames collide theywill overlap completely instead of partially.
-
8/13/2019 communication sem.ppt
15/34
Slotted ALOHA
Offered Load vs. Throughput
Max at G= 1, S = 1/e, only about 0.368
(37%)
-
8/13/2019 communication sem.ppt
16/34
Slotted ALOHAAssumptions
All frames same size
Time divided into equal slots(time to transmit a frame)
Nodes are synchronized
Nodes begin to transmit
frames only at start of slots If two or more nodes
transmit, all nodes detectcollision
Operation
When node gets fresh data,transmits in next slot
No collision: success!
Collision: node retransmitsframe in each subsequent slot
with probability puntilsuccess
16
-
8/13/2019 communication sem.ppt
17/34
-
8/13/2019 communication sem.ppt
18/34
Pros and Cons of Slotted Aloha
Pros
Single active node cancontinuously transmit atfull rate of channel
Highly decentralized: onlyneed slot synchronization
Simple
Cons
Wasted slots: Idle
Collisions
Nodes should detectcollision in less than time totransmit packet
Clock synchronization18
-
8/13/2019 communication sem.ppt
19/34
SummaryAloha Protocol:
Whenever a station has data, it transmits immediately
Receivers ACK all packets
No ACK = collision. Wait a random time and retransmit
-
8/13/2019 communication sem.ppt
20/34
The Slotted Aloha Protocol
Slotted Aloha - Aloha with an additional constraint
Time is divided into discrete time intervals (=slot) A station can transmit only at the beginning of a frame
-
8/13/2019 communication sem.ppt
21/34
-
8/13/2019 communication sem.ppt
22/34
-
8/13/2019 communication sem.ppt
23/34
Definition
Figure 8 12
-
8/13/2019 communication sem.ppt
24/34
Figure 8-12
p-Persistent
Approach
Attempts to minimize the idle time, while at the
same time minimize the chance of simultaneous transmissions
-
8/13/2019 communication sem.ppt
25/34
-
8/13/2019 communication sem.ppt
26/34
-
8/13/2019 communication sem.ppt
27/34
-
8/13/2019 communication sem.ppt
28/34
ALOHA Network application
28
h h i l
-
8/13/2019 communication sem.ppt
29/34
Ethernet Physical Layer
standards10Base5 10 Mbps, Baseband transmission, 500m cable length
10Base2
10 Mbps, Baseband transmission, ~200m cable length
10Base-T
10 Mbps, Baseband transmission, UTP cable
100Base-TX
100 Mbps, Baseband transmission, UTP cable
-
8/13/2019 communication sem.ppt
30/34
Fast Ethernet
-
8/13/2019 communication sem.ppt
31/34
MAP application
Comparison of MAC protocols in wired systems and wireless systems
-
8/13/2019 communication sem.ppt
32/34
32
Wireless Sensor Networks
Comparison of MAC protocols in wired systems and wireless systems
IEEE standard 802.15.4
Name of a specification for a suite of high level communication
protocols using small, low-power digital radios
MAC layer: CSMA/CA
Comparison of MAC protocols in wired systems and wireless systems
-
8/13/2019 communication sem.ppt
33/34
33
Conclusion
Comparison of MAC protocols in wired systems and wireless systems
Simplest allocation schemes: FDM and TDM
Poor choices for large, variable or bursty traffic
Alternative: ALOHA (Dynamic Allocation)
Carrier Sensing in LANs and MANs led to variety of protocols
Binaray Countdown
Eliminates contention completelyTree Walk
Reduces contention by dividing stations dynamically
Ethernet
Dominant in Wired LANs
Uses CSMA/CD
-
8/13/2019 communication sem.ppt
34/34
34
References1. Andrew S. Tanenbaum, Computer Networks, Fourth Edition
1. William Stallings, Data and Computer Communications, Eighth
Edition
1. Holger Karl, Andreas Willig, Protocols and Architectures for
Wireless Sensor Networks
1. http://en.wikipedia.org
2. Alaa Muqattash, Marwan Krunz, CDMA-Based MAC Protocol for
Wireless Ad Hoc Networks