chapter 4 managing multiple access. introduction look at: –design issues (4.1) –implementation...

45
Chapter 4 Managing Multiple Access

Upload: dale-carter

Post on 16-Dec-2015

222 views

Category:

Documents


2 download

TRANSCRIPT

Page 1: Chapter 4 Managing Multiple Access. Introduction Look at: –Design Issues (4.1) –Implementation Issues (4.2) –Centralized Access (4.3) –Distributed Access

Chapter 4

Managing Multiple Access

Page 2: Chapter 4 Managing Multiple Access. Introduction Look at: –Design Issues (4.1) –Implementation Issues (4.2) –Centralized Access (4.3) –Distributed Access

Introduction

• Look at:– Design Issues (4.1)– Implementation Issues (4.2)– Centralized Access (4.3)– Distributed Access (4.4)– Hardware Addressing (1.5)

Page 3: Chapter 4 Managing Multiple Access. Introduction Look at: –Design Issues (4.1) –Implementation Issues (4.2) –Centralized Access (4.3) –Distributed Access

Introduction

• Multiple access allows more than one device to communicate

• Network data congestion is a consistent issue

• Several types of multiple access links are available, such as point-to-point, broadcast, and switched

Page 4: Chapter 4 Managing Multiple Access. Introduction Look at: –Design Issues (4.1) –Implementation Issues (4.2) –Centralized Access (4.3) –Distributed Access

Design Issues

• Based on network architecture, networks can be logically divided into two classes: – In a distributed design, all nodes have

approximately the same kinds and amounts of information

– In a centralized design, there is a central node or a manager, which manages all communication decisions

Page 5: Chapter 4 Managing Multiple Access. Introduction Look at: –Design Issues (4.1) –Implementation Issues (4.2) –Centralized Access (4.3) –Distributed Access

Design Issues

• Circuit mode is used to send steady streams of data at a continuous bit rate

• Circuit mode provides a physical, dedicated path called a time slot for the data

• Because this time slot is dedicated, no other node can use its path

Page 6: Chapter 4 Managing Multiple Access. Introduction Look at: –Design Issues (4.1) –Implementation Issues (4.2) –Centralized Access (4.3) –Distributed Access

Design Issues

• Packet-mode design provides increased network efficiency by providing system resources to system users only when the user has data to send– With packet mode, the nodes contend for

every packet to avoid wasting bandwidth – Packet mode is shared, the network media

serves many more users with the same system resources

Page 7: Chapter 4 Managing Multiple Access. Introduction Look at: –Design Issues (4.1) –Implementation Issues (4.2) –Centralized Access (4.3) –Distributed Access

Implementation Issues

• Implementation issues that need to be addressed where multiple access is concerned: – The first is spectrum scarcity – The next issue is the properties that radio

links possess– In wireless systems it is very difficult to

receive data when the transmitter is sending data

Page 8: Chapter 4 Managing Multiple Access. Introduction Look at: –Design Issues (4.1) –Implementation Issues (4.2) –Centralized Access (4.3) –Distributed Access

Implementation Issues

• Implementation issues that need to be addressed where multiple access is concerned:– When a node is transmitting data, a large

fraction of the signal energy leaks into the receive path

– There also has to be a method devised for communication that can help control errors, fading, and interference

Page 9: Chapter 4 Managing Multiple Access. Introduction Look at: –Design Issues (4.1) –Implementation Issues (4.2) –Centralized Access (4.3) –Distributed Access

Implementation Issues

• The four factors that affect performance are: – Normalized throughput in which a fraction

of the link capacity is used to carry non-retransmitted packets

– Mean delay which is the amount of time a node has to wait before it successfully transmits a packet

Page 10: Chapter 4 Managing Multiple Access. Introduction Look at: –Design Issues (4.1) –Implementation Issues (4.2) –Centralized Access (4.3) –Distributed Access

Implementation Issues

• The four factors that affect performance are: – Stability to counter when a load becomes

heavy and the majority of time is spent on resolving contentions

– Fairness so that each contending node receives an equal share of the bandwidth and an equal chance to send data

Page 11: Chapter 4 Managing Multiple Access. Introduction Look at: –Design Issues (4.1) –Implementation Issues (4.2) –Centralized Access (4.3) –Distributed Access

Implementation Issues

• Base technologies isolate data from different sources

• A base technology uses a line driver to introduce voltage shifts in digital signals onto a channel

• The channel acts a a transport mechanism for the digital voltage pulses as they travel through the channel

• In general, only one communication channel is available at any given time

Page 12: Chapter 4 Managing Multiple Access. Introduction Look at: –Design Issues (4.1) –Implementation Issues (4.2) –Centralized Access (4.3) –Distributed Access

Implementation Issues

• The wireless industry began to explore converting the existing analog network to digital as a means of improving capacity

• Currently there are three choices : – FDMA– TDMA– CDMA

Page 13: Chapter 4 Managing Multiple Access. Introduction Look at: –Design Issues (4.1) –Implementation Issues (4.2) –Centralized Access (4.3) –Distributed Access

Implementation Issues

• FDMA works by dividing the frequency spectrum allocated for wireless cellular telephone communication into channels of equal bandwidth

• TDMA is analog’s FDMA with a built-in, time-sharing component

Page 14: Chapter 4 Managing Multiple Access. Introduction Look at: –Design Issues (4.1) –Implementation Issues (4.2) –Centralized Access (4.3) –Distributed Access

Implementation Issues

• CDMA combines spread spectrum technology with analog-to-digital conversion– Audio input is first digitized into binary

elements– The data is then scattered across the

frequency band in a random pattern

Page 15: Chapter 4 Managing Multiple Access. Introduction Look at: –Design Issues (4.1) –Implementation Issues (4.2) –Centralized Access (4.3) –Distributed Access

Centralized Access

• A centralized design, there is a central node or a manager that keeps important information and makes all decisions

• Centralized access is simple, and the master controller provides a single point of management and synchronization

• The master is the single point of failure and it needs a re-election protocol

Page 16: Chapter 4 Managing Multiple Access. Introduction Look at: –Design Issues (4.1) –Implementation Issues (4.2) –Centralized Access (4.3) –Distributed Access

Centralized Access

• The master controller is involved in every single data transfer, causing added delay and slowing the network

• Several different methods of centralized control include:– circuit-mode– polling or packet mode – reservation based

Page 17: Chapter 4 Managing Multiple Access. Introduction Look at: –Design Issues (4.1) –Implementation Issues (4.2) –Centralized Access (4.3) –Distributed Access

Centralized Access

• The way circuit-mode data transfer works is as follows:– When a station wants to transmit data, it

sends a message to the master– The master allocates transmission

resources to the slave– The slaves use the allocated resources

until it completes transmission

Page 18: Chapter 4 Managing Multiple Access. Introduction Look at: –Design Issues (4.1) –Implementation Issues (4.2) –Centralized Access (4.3) –Distributed Access

Centralized Access

• Radio link protocols for circuit-mode data transmissions on cellular systems are based on the premise that the error-prone link must be reliable

• The first protocol, Protocol S, uses a flexible segmentation and recovery sub layer to package data frames into multiplexed physical layer bursts

Page 19: Chapter 4 Managing Multiple Access. Introduction Look at: –Design Issues (4.1) –Implementation Issues (4.2) –Centralized Access (4.3) –Distributed Access

Centralized Access

• The second one, Protocol T, consists of two levels of recovery

• Because the partial recovery provided by the first level usually recovers the data, the second recovery level is seldom used

• This type of centralized access is used primarily in cellular home systems

Page 20: Chapter 4 Managing Multiple Access. Introduction Look at: –Design Issues (4.1) –Implementation Issues (4.2) –Centralized Access (4.3) –Distributed Access

Centralized Access

• In polling- or packet-mode access, a user's data stream is broken down into smaller segments, called packets

• Each packet then has network control information added before it is transmitted through the network

• Once the packet transmission is complete, that resource becomes available for use by other nodes to transmit packets

Page 21: Chapter 4 Managing Multiple Access. Introduction Look at: –Design Issues (4.1) –Implementation Issues (4.2) –Centralized Access (4.3) –Distributed Access

Centralized Access

• Polling is the process in which the master broadcasts a query to every node in the network asking each node in turn whether it has anything to communicate

• Polling can be thought of as a combination of broadcasting and gathering information from the nodes

• To ensure that only one message is transmitted at any time, the master either polls or selects each terminal connected to the line in a specific sequence

Page 22: Chapter 4 Managing Multiple Access. Introduction Look at: –Design Issues (4.1) –Implementation Issues (4.2) –Centralized Access (4.3) –Distributed Access

Centralized Access

• The poll control message is used to request a specific terminal to send any waiting data message it may have

• Usually, the master polls all the nodes in round-robin fashion, but in some circumstances some nodes may get more than one poll per cycle

• On half-duplex lines each poll requires two line turnarounds, one for the master to send, and one for the node to send

Page 23: Chapter 4 Managing Multiple Access. Introduction Look at: –Design Issues (4.1) –Implementation Issues (4.2) –Centralized Access (4.3) –Distributed Access

Centralized Access

• Polling is considered an inefficient method especially if only a few stations are active

• Because it is centrally controlled, the network will slow down if the system has many terminals

• The overhead for polling messages is high because all nodes have to be polled and will cause network performance to suffer when the controllers on the link become overloaded

Page 24: Chapter 4 Managing Multiple Access. Introduction Look at: –Design Issues (4.1) –Implementation Issues (4.2) –Centralized Access (4.3) –Distributed Access

Centralized Access

• If it takes a long time for the data to reach the farthest station, the master coordinates access to links using reservations

• The master assigns slots that are devoted to sending just these reservation messages

• The nodes either contend for a slot or they own one

• Packet collisions are limited only to slots, so the overhead on contention is reduced

Page 25: Chapter 4 Managing Multiple Access. Introduction Look at: –Design Issues (4.1) –Implementation Issues (4.2) –Centralized Access (4.3) –Distributed Access

Distributed Access

• The premise behind distributed access is similar to that of a distributed design

• There is no central node or manager; all nodes have equal access

• A distributed scheme is more reliable, has lower message or propagation delays, and often allow higher network bandwidth utilization

Page 26: Chapter 4 Managing Multiple Access. Introduction Look at: –Design Issues (4.1) –Implementation Issues (4.2) –Centralized Access (4.3) –Distributed Access

Distributed Access

• Almost all distributed access methods are packet mode

• In distributed access, a station starts transmission after it satisfies a set of network requirements by using a random access Media Access Control (MAC) low-level protocol

• This is the preferred method of access for LANs and many WANs also use it

Page 27: Chapter 4 Managing Multiple Access. Introduction Look at: –Design Issues (4.1) –Implementation Issues (4.2) –Centralized Access (4.3) –Distributed Access

Distributed Access

• There are several methods of distributed access:– Decentralized polling– Carrier sense multiple access– Busy tone multiple access– Multiple access collision avoidance – Token passing– ALOHA

Page 28: Chapter 4 Managing Multiple Access. Introduction Look at: –Design Issues (4.1) –Implementation Issues (4.2) –Centralized Access (4.3) –Distributed Access

Distributed Access

• The principle behind decentralized polling is similar to centralized polling except there is no master to control the transmitting and collection of packets

• All stations must share a time base• The access time is divided into slots

and then each station is assigned a slot which it uses for transmissions

Page 29: Chapter 4 Managing Multiple Access. Introduction Look at: –Design Issues (4.1) –Implementation Issues (4.2) –Centralized Access (4.3) –Distributed Access

Distributed Access

• Ethernet networks use carrier sense multiple access (CSMA) to improve performance and reduce traffic

• When a node has data to transmit, it first listens on the cable by using a transceiver to check and determine if a signal is being transmitted by another node

• If the channel is sensed as idle, it transmits. If the channel is sensed as busy, it holds off the transmission until it can sense that the medium is idle

Page 30: Chapter 4 Managing Multiple Access. Introduction Look at: –Design Issues (4.1) –Implementation Issues (4.2) –Centralized Access (4.3) –Distributed Access

Distributed Access

• There are two types of CSMA:– Persistent: The transmission is immediately

retried based on a probability (p) of when the transmission medium will become available

– Non-Persistent: The transmission is retried after random intervals

Page 31: Chapter 4 Managing Multiple Access. Introduction Look at: –Design Issues (4.1) –Implementation Issues (4.2) –Centralized Access (4.3) –Distributed Access

Distributed Access

• Due to propagation delay, two nodes may not hear each other's transmission

• The role that distance and propagation delay play in collisions is important because these factors determine the probability of a collision

• When a collision occurs, the entire packet transmission time is wasted

• Obviously if a collision happens, we want to detect and resolve it

Page 32: Chapter 4 Managing Multiple Access. Introduction Look at: –Design Issues (4.1) –Implementation Issues (4.2) –Centralized Access (4.3) –Distributed Access

Distributed Access

• In carrier sense multiple access with collision detection (CSMA/CD), if a node observes a collision, it stops transmission immediately

• Instead, it sends a random 32-bit pattern for a short period of time, referred to as jam sequence or a jam signal

• This causes the other nodes to discard the frame and assures that all stations are aware of a collision so that they can increment the timeout range

Page 33: Chapter 4 Managing Multiple Access. Introduction Look at: –Design Issues (4.1) –Implementation Issues (4.2) –Centralized Access (4.3) –Distributed Access

Distributed Access

• When two or more transmitting nodes each detect a collision, each responds in the same way by transmitting the jam sequence

• CSMA/CD uses exponential backoff • When a collision occurs, a timeout is

randomly chosen from a doubled range• The backoff range then adapts to number of

contending stations

Page 34: Chapter 4 Managing Multiple Access. Introduction Look at: –Design Issues (4.1) –Implementation Issues (4.2) –Centralized Access (4.3) –Distributed Access

Distributed Access

• In a wireless environment, it is very important that the number of collisions be limited to the absolute minimum

• This can be achieved by a protocol called carrier sense multiple access with collision avoidance (CSMA/CA)

• CSMA/CA is actually a variation of CSMA/CD

• The idea behind CSMA/CA is to prevent collisions at the moment they are most likely to occur

Page 35: Chapter 4 Managing Multiple Access. Introduction Look at: –Design Issues (4.1) –Implementation Issues (4.2) –Centralized Access (4.3) –Distributed Access

Distributed Access

• In collision avoidance, when a node wants to send a data packet, it sends a message called a Request to Send (RTS) to the destination device

• If the node receives a Clear to Send (CTS) message back from the device, it sends its data

• When the data packet has been received, the receiving device sends an acknowledgement (ACK) packet

Page 36: Chapter 4 Managing Multiple Access. Introduction Look at: –Design Issues (4.1) –Implementation Issues (4.2) –Centralized Access (4.3) –Distributed Access

Distributed Access

• Packet-radios or stations use the MAC protocol for sharing a common broadcast channel

• Busy tone multiple access (BTMA) is designed for station-based networks and divides the channel into two categories:– Message channel– Busy-tone channel

Page 37: Chapter 4 Managing Multiple Access. Introduction Look at: –Design Issues (4.1) –Implementation Issues (4.2) –Centralized Access (4.3) –Distributed Access

Distributed Access

• Multiple access collision avoidance (MACA) attempts to detect collisions at the receiver by establishing a request-response channel between the sender and receiver

• Instead of using two channels like BMTA, it uses a single frequency band, and uses explicit messages to tell others that the receiver is busy

• This protocol was designed to solve the hidden and exposed terminal issues, but it doesn't completely eliminate them

Page 38: Chapter 4 Managing Multiple Access. Introduction Look at: –Design Issues (4.1) –Implementation Issues (4.2) –Centralized Access (4.3) –Distributed Access

Distributed Access

• Other distributed access protocols:– MACAW uses a message exchange that

consists of five steps and includes a backoff algorithm

– The floor acquisition multiple access (FAMA) protocol is used when a station acquires control of a channel before sending a packet, yet it ensures no collisions happen at the receiver

Page 39: Chapter 4 Managing Multiple Access. Introduction Look at: –Design Issues (4.1) –Implementation Issues (4.2) –Centralized Access (4.3) –Distributed Access

Distributed Access

• Other distributed access protocols:– In the DBTMA protocol, two narrow-

bandwidth tones are implemented in a single channel

– DBTMA resolves the hidden and exposed terminal issues, but extra hardware is required

Page 40: Chapter 4 Managing Multiple Access. Introduction Look at: –Design Issues (4.1) –Implementation Issues (4.2) –Centralized Access (4.3) –Distributed Access

Distributed Access

• Token passing is an alternative to CSMA/CD Ethernet networks

• Possession of the token allows exclusive access to the network for transmission

• When the transmission is finished, the node passes the token to next station

• Every computer in the network is responsible for either passing the token or creating a new one

Page 41: Chapter 4 Managing Multiple Access. Introduction Look at: –Design Issues (4.1) –Implementation Issues (4.2) –Centralized Access (4.3) –Distributed Access

Distributed Access

• Token-passing networks, also called token Ring networks, are either single or double rings

• With a single ring, the failure of a single link or station breaks the network

• With a double ring, if there is a failure on one ring, the second ring can be used to avoid a single point of failure

Page 42: Chapter 4 Managing Multiple Access. Introduction Look at: –Design Issues (4.1) –Implementation Issues (4.2) –Centralized Access (4.3) –Distributed Access

Distributed Access

• ALOHA is one of the earliest multiple access schemes

• It is a simple communications scheme where each transmitter in a network sends data whenever there is a frame to send

• If the frame successfully reaches the receiver, the next frame is sent

• If the frame is not received, it is sent again

Page 43: Chapter 4 Managing Multiple Access. Introduction Look at: –Design Issues (4.1) –Implementation Issues (4.2) –Centralized Access (4.3) –Distributed Access

Distributed Access

• There are several variants of ALOHA:– Pure ALOHA can work well when the

medium has a low bandwidth utilization– Slotted ALOHA is commonly used in

cellular phone uplinks– Reservation ALOHA is a combination of a

slot reservation design with slotted ALOHA

Page 44: Chapter 4 Managing Multiple Access. Introduction Look at: –Design Issues (4.1) –Implementation Issues (4.2) –Centralized Access (4.3) –Distributed Access

Hardware Addressing

• Most network technologies have a unique physical address scheme that identifies computers on the network

• This unique physical address is called a hardware address or Media Access Control (MAC) address

• This address is the MAC hexadecimal address of the system's network interface card (NIC) and is 48 bits long

Page 45: Chapter 4 Managing Multiple Access. Introduction Look at: –Design Issues (4.1) –Implementation Issues (4.2) –Centralized Access (4.3) –Distributed Access

Hardware Addressing

• A MAC address looks like this: 00-10-A4-A8-DA-D0

• IEEE designates an addressing scheme and assigns unique blocks of addresses to NIC manufacturer

• The NIC transmits outgoing data in frames and accepts incoming data

• The NIC is a link between a computer and a network