Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
Fi ure 5.3-!" A broadcast channel interconnecting four nodes. -ecause all nodes are capable of trans(itting fra(es, (ore than two nodes can trans(it fra(es at the sa(e ti(e. /hen this happens, all of the nodes receive (ultiple fra(es at the sa(e ti(e, that is, the trans(itted fra(es collide at all of the receivers. 'ypically, when there is a collision, none of the receiving nodes can (ake any sense of any of the fra(es that were trans(itted; in a sense, the signals of the colliding fra(e beco(e ine,tricably tangled together. 'hus, all the fra(es involved in the collision are lost, and the broadcast channel is wasted during the collision interval. %learly, if (any nodes want to fre3uently trans(it fra(es, (any trans(issions will result in collisions, and (uch of the bandwidth of the broadcast channel will be wasted. In order to ensure that the broadcast channel perfor(s useful work when (ultiple nodes are active, it is necessary to so(ehow coordinate the trans(issions of the active nodes. 'his coordination 8ob is the responsibility of the multiple access protocol. 9ver the past thirty years, thousands of papers and hundreds of Ph.#. dissertations have been written on (ultiple access protocols; a co(prehensive survey of this body of work is :2o( 6;<=> 4urther(ore, do1ens of different protocols have been i(ple(ented in a variety of link-layer technologies. .evertheless, we can classify 8ust about any (ultiple access protocol as belonging to one of three categories: c#annel partitionin protocols, random access protocols, and takin -turns protocols. /e&ll cover these categories of (ultiple access protocols in the following three subsections. $et us conclude this overview by noting that ideally, a (ultiple access protocol for a broadcast channel of rate R bits per second should have the following desirable characteristics: 6. /hen only one node has data to send, that node has a throughput of R bps. 7. /hen M nodes have data to send, each of these nodes has a throughput of R/M bps. 'his need not necessarily i(ply that each of the M nodes always
have an instantaneous rate of R/M , but rather that each node should have an average trans(ission rate of R/M over so(e suitably-defined interval of ti(e. 5. 'he protocol is decentrali1ed, i.e., there are no (aster nodes that can fail and bring down the entire syste(. ?. 'he protocol is si(ple, so that it is ine,pensive to i(ple(ent.
nodes will pick a delay that is sufficiently less than the delays of the other colliding nodes, and will therefore be able to )sneak) its fra(e into the channel without a collision. 'here are do1ens if not hundreds of rando( access protocols described in the literature :2o( 6;;=, -ertsekas 6;;7>. In this section we&ll describe a few of the (ost co((only used rando( access protocols - the A$9"A protocols :Abra(son 6;A=, Abra(son 6;<+> and the %arrier Bense Multiple Access %BMA! protocols :Cleinrock 6;A+>. $ater, in section +.+, we&ll cover the details of *thernet :Metcalfe 6;AD>, a popular and widely deployed %BMA protocol.
Listen before speaking. If so(eone else is speaking, wait until they are done. In the networking world, this is ter(ed carrier sensin - a node listens to the channel before trans(itting. If a fra(e fro( another node is currently being trans(itted into the channel, a node then waits )backs off)! a rando( a(ount of ti(e and then again senses the channel. If the channel is sensed to be idle, the node then begins fra(e trans(ission. 9therwise, the node waits another rando( a(ount of ti(e and repeats this process. If someone else begins talking at the same time, stop talking. In the networking world, this is ter(ed collision detection - a trans(itting node listens to the channel while it is trans(itting. If it detects that another node is trans(itting an interfering fra(e, it stops trans(itting and uses so(e protocol to deter(ine when it should ne,t atte(pt to trans(it.
'hese two rules are e(bodied in the fa(ily of &'MA %arrier Bense Multiple Access! and &'MA(&) %BMA with %ollision #etection! protocols :Cleinrock 6;A+, Metcalfe 6;AD, $a( 6;<=, 2o( 6;;=> . Many variations on %BMA and %BMA@%# have been proposed, with the differences being pri(arily in the (anner in which nodes perfor( backoff. 'he reader can consult these references for the details of these protocols. /e&ll study the %BMA@%# sche(e used in *thernet in detail in Bection +.+. "ere, we&ll consider a few of the (ost i(portant, and funda(ental, characteristics of %BMA and %BMA@%#.
5.!.! *akin -*urns Protocols 2ecall that two desirable properties of a (ultiple access protocol are (i) when only one node is active, the active node has a throughput of 2 bps, and (ii) when M nodes are active, then each active node has a throughput of nearly R/M bps. 'he A$9"A and %BMA protocols have this first property but not the second. 'his has (otivated researchers to create another class of protocols -- the takin -turns protocols. As with rando(-access protocols, there are do1ens of taking-turns protocols, and each one of these protocols has (any variations. /e&ll discuss two of the (ore i(portant protocols here. 'he first one is the pollin protocol. 'he polling protocol re3uires one of the nodes to be designated as a )(aster node) or re3uires the introduction of a new node serving as the (aster!. 'he (aster node polls each of the nodes in a roundrobin fashion. In particular, the (aster node first sends a (essage to node 6, saying that it can trans(it up to so(e (a,i(u( nu(ber of fra(es. After node 6 trans(its so(e fra(es fro( 1ero up to the (a,i(u( nu(ber!, the (aster node tells node 7 it can trans(it up to the (a,i(u( nu(ber of fra(es. 'he (aster node can deter(ine when a node has finished sending its fra(es by observing the lack of a signal on the channel.! 'he procedure continues in this (anner, with the (aster node polling each of the nodes in a cyclic (anner. 'he polling protocol eli(inates the collisions and the e(pty slots that plague the rando( access protocols. 'his allows it to have a (uch higher efficiency. -ut it also has a few drawbacks. 'he first drawback is that the protocol introduces a polling delay, the a(ount of ti(e re3uired to notify a node that it can trans(it. If, for e,a(ple, only one node is active, then the node will trans(it at a rate less than 2 bps, as the (aster node (ust poll each of the inactive nodes in turn, each ti(e the active node sends its (a,i(u( nu(ber of fra(es. 'he second drawback, which is potentially (ore serious, is that if the (aster node fails, the entire channel beco(es inoperative. 'he second taking-turn protocol is the token-passin protocol. In this protocol there is no (aster node. A s(all, special-purpose fra(e known as a token is e,changed a(ong the nodes in so(e fi,ed order. 4or e,a(ple, node 6 (ight always send the token to node 7, node 7 (ight always send the token to node 5, node . (ight always send the token to node 6. /hen a node receives a token, it holds onto the token only if it has so(e fra(es to trans(it; otherwise, it i((ediately forwards the token to the ne,t node. If a node does have fra(es to trans(it when it receives the token, it sends up to a (a,i(u( nu(ber of fra(es and then forwards the token to the ne,t node. 'oken passing is decentrali1ed and has a high efficiency. -ut it has its proble(s as well. 4or e,a(ple, the failure of one node can crash the entire channel. 9r if a node accidentally neglects to release the token, then so(e recovery procedure (ust be invoked to get the token back in circulationE 9ver the years (any token-passing products have been developed, and each one had to address these as well as other sticky issues. 5.!.3 Local Area Networks Multiple access protocols are used in con8unction with (any different types of broadcast channels. 'hey have been used for satellite and wireless channels, whose
nodes trans(it over a co((on fre3uency spectru(. 'hey are currently used in the upstrea( channel for cable access to the Internet see Bection 6.+!. And they are e,tensively used in local area networks $A.s!. 2ecall that a LAN is a co(puter network that is concentrated in a geographical area, such as in a building or on a university ca(pus. /hen a user accesses the Internet fro( a university or corporate ca(pus, the access is al(ost always by way of a $A.. 4or this type of Internet access, the user&s host is a node on the $A., and the $A. provides access to the Internet through a router, as shown in 4igure +.5-;. 'he $A. is a single )link) between each user host and the router; it therefore uses a link-layer protocol, which incorporates a (ultiple access protocol. 'he trans(ission rate, 2, of (ost $A.s is very high. *ven in the early 6;<=s, 6= Mbps $A.s were co((on; today, 6== Mbps $A.s are co((on, and 6 0bps $A.s are available.
Fi ure 5.3-+" Fser hosts access an Internet /eb server through a $A.. 'he broadcast channel between a user host and the router consists of one )link). In the 6;<=s and the early 6;;=s, two classes of $A. technologies were popular in the workplace. 'he first class consists of the *thernet $A.s also known as <=7.5 $A.s :I*** 6;;<b, Bpurgeon 6;;;>!, which are rando(-access based. 'he second class of $A. technologies are token-passing technologies, including token ring also known as I*** <=7.+ :I*** 6;;<>! and F I also known as 4iber #istributed #ata Interface :Gain 6;;?>!. -ecause we shall e,plore the *thernet technologies in so(e detail in Bection +.?, we focus our discussion here on the token-passing $A.s. 9ur discussion on token-passing technologies is intentionally brief, since these technologies have beco(e relatively (inor players in the face of relentless *thernet co(petition. .evertheless, in order to provide e,a(ples about token-passing technology and to give a little historical perspective, it is useful to say a few words about token rings. In a token ring $A., the N nodes of the $A. hosts and routers! are connected in a ring by direct links. 'he topology of the token ring defines the token-passing order. /hen a node obtains the token and sends a fra(e, the fra(e propagates around the entire ring, thereby creating a virtual broadcast channel. 'he node that sends the
fra(e has the responsibility of re(oving the fra(e fro( the ring. 4##I was designed for geographically larger $A.s so called MA.s, that is, (etropolitan area networks!. 4or geographically large $A.s spread out over several kilo(eters! it is inefficient to let a fra(e propagate back to the sending node once the fra(e has passed the destination node. 4##I has the destination node re(ove the fra(e fro( the ring. Btrictly speaking, 4##I is not a pure broadcast channel, as every node does not receive every trans(itted fra(e.! Hou can learn (ore about token ring and 4##I by visiting the 5%o( adapter page :5%o(>.
References
,Abramson -+./0 .. Abra(son, )'he Aloha syste(,) !FI"# $onf. "ro%., Iol. 5A, 6;A= 4all Goint %o(puter %onfernce, A4IPB Press, Montvale, ..G., 6;A=, pp. 7<67<+. ,Abramson -+150 .. Abra(son, )#evelop(ent of the Alohanet,) I*** 'ransactions on Infor(ation 'heory,) Iol. I'-56, .o. 5 March 6;<+!, pp. 66;-675. ,2ertsekas -++!0 #. -ertsekas and 2. 0allager, #ata .etworks, Becond *dition, Prentice "all, *nglewood %liffs, .ew Gersey, 6;;7. ,3&om -+++0 http:@@www.5co(.co(@products@nics.ht(l ,2o s -+110 #. -oggs, G. Mogul, and %. Cent, )Measured capacity of an *thernet: (yths and reality;) "ro% !$M #ig%omm &'((, pp. 777 - 75? ,3444 -++10 I***, 'oken 2ing Access Method IB9@I*% <<=7-+: 6;;< and <<=7-+ : 6;;<@A(d 6!, 6;;<. Bee the <=7.+ standards page at http:@@www.<=7+.org@<=7.+@docu(ents@ ,3444 -++1b0 I***, )%arrier sense (ultiple access with collision detection %BMA@%#! access (ethod and physical layer specifications.) Bee the I*** <=7.5 publication catalog at http:@@standards.ieee.org@catalog@I***<=7.5.ht(l ,5ain -++60 2. Gain, )4##I "andbook : "igh-Bpeed .etworking Fsing 4iber and 9ther Media,) Addison-/esley 2eading MA, 6;;?!. ,7leinrock -+.50 $. Cleinrock and 4. A. 'obagi, )Packet Bwitching in 2adio %hannels: Part I -- %arrier Bense Multiple-Access Modes and 'heir 'hroughput#elay %haracteristics,) I))) *ransa%tions on $omm+ni%ations, Iol. %9M-75, .o. 67, pp. 6?==-6?6D, #ec. 6;A+. ,Lam -+1/0 B. $a(, A %arrier Bense Multiple Access Protocol for $ocal .etworks,) %o(puter .etworks, Iolu(e ?, pp. 76-57, 6;<=. ,Metcal$e -+.80 2. Metcalfe, #. -oggs, )*thernet: #istributed packet switching for local co(puter networks,) $omm+ni%ations of the !$M, 6; A! 6;AD!, pp. 5;+-?=?. ,Molle 1.0 M. Molle, )Bpace 'i(e Analysis of %BMA Protocol,) I))) ,o+rnal on #ele%ted !reas in $omm+ni%ations, 6;<A. ,Pick#olt9 -+1!0 2. Pickholt1, #. Bchilling, $. Milstein, )'heory of Bpread Bpectru( %o((unication - a 'utorial,) I))) *ransa%tions on $omm+ni%ations, %ol. %9M-5=, .o. + May 6;<7!, pp. <++-<<?. ,%om -++/0 2. 2o( and M. Bidi, )Multiple Access Protocols: Perfor(ance and Analysis,) Bpringer-Ierlag, .ew Hork, 6;;=. :'pur eon -+++0 %. Bpurgeon, )%harles Bpurgeon&s *thernet /eb Bite,) http:@@wwwhost.ots.ute,as.edu@ethernet@ethernet-ho(e.ht(l ,:iterbi -++50 A. Iiterbi, $ M!- "rin%iples of #pread #pe%tr+m $omm+ni%ation, Addison-/esley, 2eading MA 6;;+!.