ECE 333: Introduction to Communication Networks Fall Lecture 15: Medium Access Control III

Similar documents
TSIN01 Information Networks Lecture 9

DOPPLER SHIFT. Thus, the frequency of the received signal is

Local Area Networks NETW 901

Lecture on Sensor Networks

Medium Access Methods. Lecture 9

6.1 Multiple Access Communications

Mobile Communications

Lecture 8: Media Access Control. CSE 123: Computer Networks Stefan Savage

Lecture 8: Media Access Control

Medium Access Control. Wireless Networks: Guevara Noubir. Slides adapted from Mobile Communications by J. Schiller

Outline. EEC-484/584 Computer Networks. Homework #1. Homework #1. Lecture 8. Wenbing Zhao Homework #1 Review

COSC 3213: Computer Networks I Instructor: Dr. Amir Asif Department of Computer Science York University Section B

Multiple Access Methods

Chapter 2 Overview. Duplexing, Multiple Access - 1 -

1. Introduction 1.2 Medium Access Control. Prof. JP Hubaux

Multiple Access (3) Required reading: Garcia 6.3, 6.4.1, CSE 3213, Fall 2010 Instructor: N. Vlajic

Kybernetika. Ioannis E. Pountourakis Performance of multichannel multiaccess protocols with receiver collisions

Mobile Computing. Chapter 3: Medium Access Control

Medium Access Control

ICT 5305 Mobile Communications. Lecture - 4 April Dr. Hossen Asiful Mustafa

Department of Computer Science and Engineering. CSE 3213: Computer Networks I (Fall 2009) Instructor: N. Vlajic Date: Dec 11, 2009.

INTRODUCTION TO WIRELESS SENSOR NETWORKS. CHAPTER 3: RADIO COMMUNICATIONS Anna Förster

Chapter 3 : Media Access. Mobile Communications. Collision avoidance, MACA

Lecture 23: Media Access Control. CSE 123: Computer Networks Alex C. Snoeren

COM-405 Mobile Networks. Module A (Part A2) Introduction

I. Introduction. and. North-Holland Computer Networks and ISDN Systems 12 (1986) 1-10

Analyzing Split Channel Medium Access Control Schemes

Multiple Access CHAPTER 12. Solutions to Review Questions and Exercises. Review Questions

Performance of ALOHA and CSMA in Spatially Distributed Wireless Networks

06/02/2006. Sharing the Medium. Peter Rounce Room Notes Courtesy of Graham Knight P.A.

FPGA-BASED DESIGN AND IMPLEMENTATION OF THREE-PRIORITY PERSISTENT CSMA PROTOCOL

Announcements. Tuesday April 15 covers material from chapters: 1-3, 5-6 emphasis on material since last midterm

Cooperation in Random Access Wireless Networks

Simple, Optimal, Fast, and Robust Wireless Random Medium Access Control

Achieving Network Consistency. Octav Chipara

Wireless Transmission & Media Access

HY448 Sample Problems

Medium Access Schemes

DiCa: Distributed Tag Access with Collision-Avoidance among Mobile RFID Readers

IN wireless communication networks, Medium Access Control

Wireless Communication

Multiple Access System

Medium Access Control via Nearest-Neighbor Interactions for Regular Wireless Networks

Wireless Networked Systems

Multiple access techniques

A Backlog-Based CSMA Mechanism to Achieve Fairness and Throughput-Optimality in Multihop Wireless Networks

Pseudo-Bayesian stability of CSMA and CSMA/CD local area networks

Wireless Intro : Computer Networking. Wireless Challenges. Overview

Wireless Communications Lecture 4: Multiple Access Technologies

Multiple Access Methods: Delay and Throughput

Average Delay in Asynchronous Visual Light ALOHA Network

Network Management System for Telecommunication and Internet Application


UTILIZATION OF AN IEEE 1588 TIMING REFERENCE SOURCE IN THE inet RF TRANSCEIVER

3644 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 57, NO. 6, JUNE 2011

Fine-grained Channel Access in Wireless LAN. Cristian Petrescu Arvind Jadoo UCL Computer Science 20 th March 2012

On Flow-Aware CSMA. in Multi-Channel Wireless Networks. Mathieu Feuillet. Joint work with Thomas Bonald CISS 2011

Analysis of Collided Signal Waveform on the Long Transmission Line of UART-CSMA/CD Control Network

Cellular systems 02/10/06

THROUGHPUT-DELAY PERFORMANCE ANALYSIS OF SSMA PACKET RADIO NETWORK

Carrier Sensing based Multiple Access Protocols for Cognitive Radio Networks

Multiple Access Schemes

Overview. Cognitive Radio: Definitions. Cognitive Radio. Multidimensional Spectrum Awareness: Radio Space

Lecture 9: Spread Spectrum Modulation Techniques

AN EFFICIENT MULTIACCESS PROTOCOL FOR WIRELESS NETWORKS. Benjamin W. Wah and Xiao Su

Multiple MAC Protocols Selection Strategies. Presented by Chen-Hsiang Feng

The Long Range Wide Area Network - LoraWAN

SC - Single carrier systems One carrier carries data stream

Performance Analysis of 100 Mbps PACE Technology Ethernet Networks

Politecnico di Milano Advanced Network Technologies Laboratory. Radio Frequency Identification

Starvation Mitigation Through Multi-Channel Coordination in CSMA Multi-hop Wireless Networks

Stochastic Modelling for Wireless Communication Networks-Multiple Access Methods.

Politecnico di Milano Advanced Network Technologies Laboratory. Beyond Standard MAC Sublayer

ECS455: Chapter 4 Multiple Access

Multiple Receiver Strategies for Minimizing Packet Loss in Dense Sensor Networks

Politecnico di Milano Scuola di Ingegneria Industriale e dell Informazione. Physical layer. Fundamentals of Communication Networks

Structure of the Lecture

Random Access Protocols for Collaborative Spectrum Sensing in Multi-Band Cognitive Radio Networks

SIGNAL PROCESSING CHALLENGES IN THE DESIGN OF THE HOMEPLUG AV POWERLINE STANDARD TO ENSURE CO-EXISTENCE WITH HOMEPLUG 1.0.1

Reliable and Efficient RFID Networks

Lecture 8 Mul+user Systems

Digi-Wave Technology Williams Sound Digi-Wave White Paper

IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. XX, NO. X, AUGUST 20XX 1

THE field of personal wireless communications is expanding

TIME- OPTIMAL CONVERGECAST IN SENSOR NETWORKS WITH MULTIPLE CHANNELS

By Ryan Winfield Woodings and Mark Gerrior, Cypress Semiconductor

Performance Limits of Fair-Access in Sensor Networks with Linear and Selected Grid Topologies John Gibson * Geoffrey G.

Wireless replacement for cables in CAN Network Pros and Cons. by Derek Sum

Energy-Efficient Communication Protocol for Wireless Microsensor Networks

RECOMMENDATION ITU-R F Characteristics of advanced digital high frequency (HF) radiocommunication systems

Jinbao Li, Desheng Zhang, Longjiang Guo, Shouling Ji, Yingshu Li. Heilongjiang University Georgia State University

Half-Duplex Spread Spectrum Networks

Lecture 5 Transmission. Physical and Datalink Layers: 3 Lectures

Channel Capacity. Tom McDermott, N5EG June 1997

Week 2 Lecture 1. Introduction to Communication Networks. Review: Analog and digital communications

A new protocol for the integration of Voice and Data over PRMA

A Multi-channel Medium Access Control Protocol for Vehicular Power Line Communication Systems

Medium Access Control Protocol for WBANS

Random access on graphs: Capture-or tree evaluation

3094 IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, VOL. 57, NO. 5, SEPTEMBER /$ IEEE

Transcription:

ECE 333: Introduction to Communication Networks Fall 200 Lecture 5: Medium Access Control III CSMA CSMA/CD Carrier Sense Multiple Access (CSMA) In studying Aloha, we assumed that a node simply transmitted a packet and was informed afterwards if a collision occurred. In many multi-access channels, it is possible for a node to detect when other nodes are transmitting after a small propagation delay, this is referred to carrier sensing. In such cases it is silly for a node to begin transmission if it detects another transmission on the link. A family of "Aloha"-like protocols for this situation are called Carrier Sense Multiple Access (CSMA) protocols. There are several different variations of CSMA - including persistent CSMA, nonpersistent CSMA, and p- persistent CSMA. 2

Persistent CSMA: ) If channel is idle, transmit. 2) If channel is busy, wait until the channel is idle then transmit. 3) If a collision occurs, wait a random amount of time then go to. Other variations of CSMA replace the first 2 steps as follows: Non-persistent: ) If channel idle, transmit. 2) If channel busy, wait a random amount of time and repeat step. p persistent : (for slotted system) ) If channel idle, transmit with probability p. Wait one slot with probability - p, and repeat step. 2) If channel busy, wait for idle and go to step. Persistent is also called -persistent (i.e. p = ). 3 With persistent CSMA, if multiple stations are waiting for the channel to become idle, then a collision will occur. Using non-persistent or p-persistent CSMA will reduce this probability, but at the expense of longer delays. The maximum time from when one node begins transmitting until another node can sense this is a fundamental performance parameter for all of these CSMA protocols. This time depends on the propagation delay as well as a detection delay required for the receiver to determine that a transmission is occurring. Intuitively, one would expect the performance to degrade as the maximum propagation and detection delay increases. 4

Slotted Non-Persistent CSMA for Analysis Let be the maximum propagation and detection delay between any two stations. Assume this is small relative to the transmission time of a packet. We'll again measure time in units of packet times - thus it takes packet time to transmit a packet. Consider time to be slotted and to consist of mini-slots of length time units and packet slots of duration. <----------- ----------------> packet In this case the protocol operates as follows: minislots ) Each node with a packet to send listens for one mini-slot to see if channel is idle. If the channel is idle the node transmits in the next mini-slot. 2) If mini-slot is busy or if a collision occurs, the node becomes backlogged. 3) While backlogged, the node transmits after each idle mini-slot with probability q. 5 Let denote the total arrival rate of new packets to all stations; thus is the average number of packets to arrive in a mini-slot. As in our analysis of Aloha, assume there are a large number of stations so that as the backlog increases, the arrival rate stays constant. The time axis can be divided into the following two types of "epochs". ) A success or a collision followed by an idle mini-slot 2) An idle mini-slot. In particular, there will never be two consecutive packet slots without an idle mini-slot between them. The first type of epoch has length + ; the second has length. The average number of transmission attempts in a mini-slot (not following a packet slot) with a backlog of n is: g( n) nq. 6

As in the Aloha analysis, assume that the number of transmissions in a mini-slot has a Poisson distribution. Then the probability an epoch corresponds to a successful transmission is the probability of exactly one arrival during the mini-slot. From the Poisson g( n) assumption, this is given by g ( n) e. Likewise, the probability that an epoch corresponds to an idle mini-slot is g(n) e Thus an epoch has length with probability g( n) probability e. So, g(n) e, and length with g( n) g( n) g( n) Expected length of an epoch = ( e ) ( )( e ) ( e ) Expected number of departures per epoch = * Prob of success + 0. g n Expected number of departures per epoch g( n) e ( ) 7 Thus the throughput (number of departures per unit time) is given by Number of departures/epoch Throughput = Number of frame times/epoch g ( n) g( n) e = g ( n) e This is plotted on the next page. The maximum throughput for small can be shown to be approximately. 2 Note as gets small, the maximum throughput is increasing towards. 8

Plot of departure rate and arrival rate for non-persistent CSMA. 2 Departure Rate g ge e g Arrival Rate Equilibrium g 2 g g(n)= +nq 9 When the outgoing rate is greater than the number of backlogged stations tends to increase and vice versa same stability problems as Aloha. However, with CSMA, the departure rate has a broad maximum with respect to n and g(n), making stability less critical. Choosing g(n) (through choice of q) to maximize departure rate is a trade-off between time wasted on idle mini-slots and that on collisions. For small throughputs very close to one are possible, and optimization is not that critical. The savings over slotted Aloha come from the smallness of. should be less than a few tenths for good performance.) In a shared bus with length L, and propagation speed, cm, the maximum propagation delay is L/cm. Thus, ignoring detection delays we have LR/Fcm where R is the transmission rate and F is the number of bits per frame. (Note is proportional to the bandwidth-delay product, a quantity that was also important in studying ARQ protocols.) Thus to avoid values that are too large, one should avoid large propagation delays and small packet sizes. 0

Unslotted CSMA In practice CSMA often implemented in an un-slotted version. In theory, this can be shown to decrease the maximum throughput for (nonpersistent) CSMA from to. 2 2 In practice, un-slotted CSMA has a smaller effective value of. This means the reduction in throughput seen by un-slotted systems in Aloha essentially disappears in CSMA. Also, a slotted CSMA system requires users to be synchronized at a mini-slot level; for short mini-slots, this synchronization is difficult. CSMA Plots (from Tanenbaum). 0.0-p CSMA.75 Non-p CSMA S 0.-p CSMA.5.5-p CSMA.25 -p CSMA ALOHA Slotted ALOHA. 2. 3. 4. 5. 6. G This shows offered load versus throughput for various CSMA and Aloha approaches. These curves will also depend on the value of. For very large value of Aloha will begin to outperform CSMA. 2

CSMA Clearly, CSMA is an improvement over Aloha. Which persistence should be chosen? This depends on what offered load we expect to operate at, and also depends on the average delay we desire. All these statistical schemes have lower delay than TDMA until they get near their throughput limit. The higher the total load (G(n)) at the operating point, the more backlogged stations and the higher the delay. Persistent gives best delay characteristic at the same G(n). 3 CSMA with Collision Detection (CSMA/CD) In some situations nodes can hear each other even when they are transmitting. (This is generally true for example on a shared bus, but not true in a wireless channel.) Thus if a collision occurs, all nodes can hear it within a maximum propagation delay. Once a node knows that a collision is occurring, it can stop transmitting and minimize the amount of time wasted on a collision. CSMA with this modification is referred to as CSMA/CD (CSMA with collision detection). This name is a little misleading since CSMA also assumes collisions are eventually detected. However with CSMA/CD they are detected before the entire packet is transmitted. Once a node begins transmitting how long before it will know whether or not a collision occurred? 4

Collision Detection A B A begins transmitting t = 0 A B B begins transmitting before A's message gets there. t = B detects collision t = A B A detects collision t = A B So, can take up to 2 seconds to detect a collision. 5 Slotted (non-persistent) CSMA/CD - again view time as mini-slots of length and packet slots of duration. Nodes transmit packets only following one idle mini-slot. If more than one node starts to transmit in a mini-slot, a collision is detected at end of 2nd mini-slot and all nodes become idle for next mini slot. This protocol can be thought of as using a slotted Aloha protocol in the minislots to make a reservation for the channel. Thus there are now three types of epochs: ) Successful transmission - length = + 2) Collisions - length 3 3) Idle slots - length 6

Using similar ideas as we have for Aloha and CSMA, the maximum throughput can be shown to be approximately 3.3 For small, this will be very close to. As with CSMA, an un-slotted version of CSMA/CD is commonly used in practice. The throughput for un-slotted CSMA/CD can be approximated by a similar expression to the above and does not require synchronization. Persistent CSMA/CD works reasonably well (as opposed to CSMA) - this is due to the fact that collisions are not very costly for CSMA/CD. Again, the performance depends on a small and thus decreases with increasing cable length, increasing data rate and decreasing packet size. 7