Professional Documents
Culture Documents
Transmission Technology
Transmission technology can be categorized into two categories :
Point-to point networks Broadcast networks
Point-to-Point Link
Broadcast Link
Broadcast networks
Broadcast networks have a single communication channel that is shared by all the machines on the network. A packet sent by one computer is received by all the other computers on the network. The packets that are sent contain the address of the receiving computer; each computer checks this field to see if it matches its own address. If it does not then it is usually ignored; if it does then it is read. Broadcast channels are sometimes known as multi-access channel.
Due to shared channel and unregulated traffic over the network ..collisions and data loss occur. Some protocol must be followed for regulated and safe transmission over the network.
Aloha protocol Carrier Sense Multiple Access Protocols(CSMA) Collision-free protocols : Limited contention protocol Wireless LAN protocol Digital Cellular radio
of Hawaii devised a new and elegant method to solve the channel allocation problem and this method is known as ALOHA SYSTEM users are competing for the use of single shared channel.
The basic idea is applicable to any system in which uncoordinated There are two versions of Aloha system which differ with respect to
whether or not time is divided up into discrete slots into which all frames must fit. :
PURE ALOHA The basic idea on which pure aloha is based upon is : It let users
transmit whenever they have data to be sent. So there will be collisions ,of course, and the colliding frames will be damaged. However due to feed back property of broadcasting a sender can always find out whether its frame was destroyed by listening to the channel. All the receivers acknowledge the packets which means that the packet is received and if there is no acknowledgement from the receiver then the transmission is assumed to be unsuccessful and the station then retransmits the packet after random amount of time.
The systems in which multiple users share a common channel in a way that can lead to conflict are widely known as contention systems.
Pure Aloha
If the first bit of a new frame overlaps with just the last bit of a frame almost finished, both the frames will be totally destroyed. It does not distinguish between a total loss or a near miss.
Slotted Aloha
In 1987, Roberts publish a method called slotted aloha which doubled
packet.
The stations can only transmit data in one of the time slots only. The vulnerable period is now reduced in half. If the frames collide they
Max
Slotted ALOHA
Assumptions All frames same size Time divided into equal slots (time to transmit a frame) Nodes are synchronized Nodes begin to transmit frames only at start of slots If two or more nodes transmit, all nodes detect collision Operation When node gets fresh data, transmits in next slot No collision: success! Collision: node retransmits frame in each subsequent slot with probability p until success
16
Slotted
Pros Single active node can continuously transmit at full rate of channel Highly decentralized: only need slot synchronization
Simple
Summary
Aloha Protocol:
Whenever a station has data, it transmits immediately Receivers ACK all packets No ACK = collision. Wait a random time and retransmit
CSMA
CSMA: Carrier sense multiple access Based on the principle sense before transmit or listen before talk Can reduce the possibility of collision Cannot eliminate it
Q: Why may there be a collision if each station listens to the medium before transmitting a frame? A: Possibility of collision still exists because of propagation delay. When a station sends a frame, it takes time for the first bit to reach every station and for every station to sense it.
Persistence Strategies
Define what a station should do if, when sensing the medium, it finds the medium busy
Figure 1-2
Definition
Figure 8-12
p-Persistent Approach
<
Attempts to minimize the idle time, while at the same time minimize the chance of simultaneous transmissions
Token Passing
Common Features
A token rotates around a ring to each node in turn. We will
define: PROP = minimum rotation time around ring. All nodes (computers, routers, etc.) copy all data and tokens, and repeat them along the ring. When a node wishes to transmit packet(s), it grabs the token as it passes. It holds the token while it transmits. When it is done, it releases the token again and sends it on its way.
CS244a Handout 10 25
Winter 2008
Figure 8-15
Summary
28
Fast Ethernet
MAP application
Name of a specification for a suite of high level communication protocols using small, low-power digital radios
MAC layer: CSMA/CA
32
Conclusion
Simplest allocation schemes: FDM and TDM Poor choices for large, variable or bursty traffic Alternative: ALOHA (Dynamic Allocation) Carrier Sensing in LANs and MANs led to variety of protocols Binaray Countdown Eliminates contention completely Tree Walk Reduces contention by dividing stations dynamically Ethernet Dominant in Wired LANs Uses CSMA/CD
33
References
1. Andrew S. Tanenbaum, Computer Networks, Fourth Edition
1. Holger Karl, Andreas Willig, Protocols and Architectures for Wireless Sensor Networks
1. http://en.wikipedia.org
2. Alaa Muqattash, Marwan Krunz, CDMA-Based MAC Protocol for Wireless Ad Hoc Networks
34