Multiple access in Communication Netwroks

48
Multiple Access Multiple Access 01204325: Data 01204325: Data Communication and Communication and Computer Networks Computer Networks Asst. Prof. Chaiporn Jaikaeo, Ph.D. Asst. Prof. Chaiporn Jaikaeo, Ph.D. [email protected] http://www.cpe.ku.ac.th/~cpj http://www.cpe.ku.ac.th/~cpj Computer Engineering Department Computer Engineering Department Kasetsart University, Bangkok, Thailand Kasetsart University, Bangkok, Thailand Adapted from lecture slides by Behrouz A. Forouzan © The McGraw-Hill Companies, Inc. All rights reserved

Transcript of Multiple access in Communication Netwroks

Page 1: Multiple access in Communication Netwroks

Multiple AccessMultiple Access

01204325: Data 01204325: Data Communication and Communication and Computer NetworksComputer Networks

Asst. Prof. Chaiporn Jaikaeo, Ph.D.Asst. Prof. Chaiporn Jaikaeo, [email protected]

http://www.cpe.ku.ac.th/~cpjhttp://www.cpe.ku.ac.th/~cpjComputer Engineering DepartmentComputer Engineering Department

Kasetsart University, Bangkok, ThailandKasetsart University, Bangkok, ThailandAdapted from lecture slides by Behrouz A. Forouzan© The McGraw-Hill Companies, Inc. All rights reserved

Page 2: Multiple access in Communication Netwroks

22

OutlineOutline Multiple access mechanismsMultiple access mechanisms Random accessRandom access Controlled accessControlled access ChannelizationChannelization

Page 3: Multiple access in Communication Netwroks

33

Sublayers of Data Link Sublayers of Data Link LayerLayer

Page 4: Multiple access in Communication Netwroks

44

Multiple Access Multiple Access MechanismsMechanisms

Page 5: Multiple access in Communication Netwroks

Random AccessRandom Access

Page 6: Multiple access in Communication Netwroks

66

Random AccessRandom Access Also called Also called contention-basedcontention-based access access No station is assigned to control No station is assigned to control

anotheranother

Page 7: Multiple access in Communication Netwroks

77

ALOHA NetworkALOHA Network

Page 8: Multiple access in Communication Netwroks

88

Frames in Pure ALOHAFrames in Pure ALOHA

Page 9: Multiple access in Communication Netwroks

99

ALOHA ProtocolALOHA Protocol

Page 10: Multiple access in Communication Netwroks

1010

ExampleExample Calculate possible values of Calculate possible values of TTBB when when

stations on an ALOHA network are a stations on an ALOHA network are a maximum of 600 km apartmaximum of 600 km apart

TTpp = (600 × 10 = (600 × 1033) / (3 × 10) / (3 × 1088) = 2 ms) = 2 ms

When When KK=1, =1, TTBB {0ms,2ms} {0ms,2ms} When When KK=2, =2, TTBB {0ms,2ms,4ms,6ms} {0ms,2ms,4ms,6ms} ::

Page 11: Multiple access in Communication Netwroks

1111

ALOHA: Vulnerable TimeALOHA: Vulnerable Time

Page 12: Multiple access in Communication Netwroks

1212

ALOHA: ThroughputALOHA: Throughput Assume number of stations trying to Assume number of stations trying to

transmit follow Poisson Distributiontransmit follow Poisson Distribution The throughput for pure ALOHA isThe throughput for pure ALOHA is

S = G × eS = G × e−2G−2G

where G is the average number of where G is the average number of frames requested per frame-timeframes requested per frame-time

The maximum throughputThe maximum throughput SSmaxmax = 0.184 when G= 1/2 = 0.184 when G= 1/2

Page 13: Multiple access in Communication Netwroks

1313

ExampleExample A pure ALOHA network transmits A pure ALOHA network transmits

200-bit frames on a shared channel 200-bit frames on a shared channel of 200 kbps. What is the throughput of 200 kbps. What is the throughput if the system (all stations together) if the system (all stations together) producesproduces 1000 frames per second1000 frames per second 500 frames per second500 frames per second 250 frames per second250 frames per second

Page 14: Multiple access in Communication Netwroks

1414

Slotted ALOHASlotted ALOHA

Page 15: Multiple access in Communication Netwroks

1515

Slotted ALOHA: Vulnerable Slotted ALOHA: Vulnerable TimeTime

Page 16: Multiple access in Communication Netwroks

1616

Slotted ALOHA: Slotted ALOHA: ThroughputThroughput The throughput for Slotted ALOHA isThe throughput for Slotted ALOHA is

S = G × eS = G × e−G−G

where G is the average number of where G is the average number of frames requested per frame-timeframes requested per frame-time

The maximum throughputThe maximum throughput SSmaxmax = 0.368 when G= 1 = 0.368 when G= 1

Page 17: Multiple access in Communication Netwroks

1717

ExampleExample A Slotted ALOHA network transmits A Slotted ALOHA network transmits

200-bit frames on a shared channel 200-bit frames on a shared channel of 200 kbps. What is the throughput of 200 kbps. What is the throughput if the system (all stations together) if the system (all stations together) producesproduces 1000 frames per second1000 frames per second 500 frames per second500 frames per second 250 frames per second250 frames per second

Page 18: Multiple access in Communication Netwroks

1818

CSMACSMA CCarrier arrier SSense ense MMultiple ultiple AAccessccess

"Listen before talk""Listen before talk" Reduce the possibility of collisionReduce the possibility of collision

But cannot completely eliminate itBut cannot completely eliminate it

Page 19: Multiple access in Communication Netwroks

1919

Collision in CSMACollision in CSMA

B

C

Page 20: Multiple access in Communication Netwroks

2020

CSMA: Vulnerable TimeCSMA: Vulnerable Time

Page 21: Multiple access in Communication Netwroks

2121

Persistence MethodsPersistence Methods What a station does when channel is idle or What a station does when channel is idle or

busybusy

Page 22: Multiple access in Communication Netwroks

2222

Persistence MethodsPersistence Methods

Page 23: Multiple access in Communication Netwroks

2323

CSMA/CDCSMA/CD CCarrier arrier SSense ense MMultiple ultiple AAccess with ccess with

CCollision ollision DDetectionetection Station monitors channel while Station monitors channel while

sending a framesending a frame

Page 24: Multiple access in Communication Netwroks

2424

Energy LevelsEnergy Levels

Page 25: Multiple access in Communication Netwroks

2525

CSMA/CD: Minimum Frame CSMA/CD: Minimum Frame SizeSize Each frame must be large enough for a Each frame must be large enough for a

sender to detect a collisionsender to detect a collision Worst case scenario:Worst case scenario:

"A" is transmitting"A" is transmitting "D" starts transmitting just before A's signal "D" starts transmitting just before A's signal

arrivesarrivesA B C D

Long enough tohear colliding signalfrom D

Page 26: Multiple access in Communication Netwroks

2626

ExampleExample A CSMA/CD network has a bandwidth A CSMA/CD network has a bandwidth

of 10 Mbps. If the maximum of 10 Mbps. If the maximum propagation time is 25.6 μs, what is propagation time is 25.6 μs, what is the minimum size of the frame?the minimum size of the frame?

Page 27: Multiple access in Communication Netwroks

2727

CSMA/CD: Flow DiagramCSMA/CD: Flow Diagram

Page 28: Multiple access in Communication Netwroks

2828

CSMA/CACSMA/CA CCarrier arrier SSense ense MMultiple ultiple AAccess with ccess with

CCollision ollision AAvoidancevoidance Used in a network where collision Used in a network where collision

cannot be detectedcannot be detected E.g., wireless LANE.g., wireless LAN

IFS – Interframe Space

Page 29: Multiple access in Communication Netwroks

2929

CSMA/CA: Flow DiagramCSMA/CA: Flow Diagram

contention window size is 2K-1

After each slot:- If idle, continue counting- If busy, stop counting

Page 30: Multiple access in Communication Netwroks

Controlled AccessControlled Access

Page 31: Multiple access in Communication Netwroks

3131

Control AccessControl Access A station must be authorized by A station must be authorized by

someone (e.g., other stations) before someone (e.g., other stations) before transmittingtransmitting

Three common methods:Three common methods: ReservationReservation PollingPolling Token passingToken passing

Page 32: Multiple access in Communication Netwroks

3232

Reservation MethodReservation Method

Page 33: Multiple access in Communication Netwroks

3333

Polling MethodPolling Method

Page 34: Multiple access in Communication Netwroks

3434

Token PassingToken Passing

Page 35: Multiple access in Communication Netwroks

ChannelizationChannelization

Page 36: Multiple access in Communication Netwroks

3636

ChannelizationChannelization Similar to Similar to multiplexingmultiplexing Three schemesThree schemes

Frequency-Division Multiple Access Frequency-Division Multiple Access (FDMA)(FDMA)

Time-Division Multiple Access (TDMA)Time-Division Multiple Access (TDMA) Code-Division Multiple Access (CDMA)Code-Division Multiple Access (CDMA)

Page 37: Multiple access in Communication Netwroks

3737

FDMAFDMA

Page 38: Multiple access in Communication Netwroks

3838

TDMATDMA

Page 39: Multiple access in Communication Netwroks

3939

CDMACDMA One channel carries all transmissions One channel carries all transmissions

at the same timeat the same time Each channel is separated by Each channel is separated by codecode

Page 40: Multiple access in Communication Netwroks

4040

CDMA: Chip SequencesCDMA: Chip Sequences Each station is assigned a unique Each station is assigned a unique chip chip

sequencesequence

Chip sequences are Chip sequences are orthogonal vectorsorthogonal vectors Inner productInner product of any pair must be zero of any pair must be zero

With N stations, sequences must have the With N stations, sequences must have the following properties:following properties: They are of length NThey are of length N Their self inner product is always NTheir self inner product is always N

Page 41: Multiple access in Communication Netwroks

4141

CDMA: Bit CDMA: Bit RepresentationRepresentation

Page 42: Multiple access in Communication Netwroks

4242

Transmission in CDMATransmission in CDMA

Page 43: Multiple access in Communication Netwroks

4343

CDMA EncodingCDMA Encoding

Page 44: Multiple access in Communication Netwroks

4444

Signal Created by CDMASignal Created by CDMA

Page 45: Multiple access in Communication Netwroks

4545

CDMA DecodingCDMA Decoding

Page 46: Multiple access in Communication Netwroks

4646

Sequence GenerationSequence Generation Common method: Common method: Walsh TableWalsh Table

Number of sequences is always a power Number of sequences is always a power of twoof two

Page 47: Multiple access in Communication Netwroks

4747

Example: Walsh TableExample: Walsh Table Find chip sequences for eight Find chip sequences for eight

stationsstations

Page 48: Multiple access in Communication Netwroks

4848

Example: Walsh TableExample: Walsh Table There are 80 stations in a CDMA There are 80 stations in a CDMA

network. What is the length of the network. What is the length of the sequences generated by Walsh sequences generated by Walsh Table?Table?