Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
Chapter 3
MEDIA ACCESS
CONTROL
Motivation
SDMA, FDMA, TDMA
Aloha
Adaptive Aloha
Backoff protocols
Reservation schemes
Polling
Mobile Computing
Summer 2004
Distributed
Computing
Group
Motivation
R. Wattenhofer
3/2
Example CSMA/CD
Carrier Sense Multiple Access with Collision Detection
send as soon as the medium is free, listen into the medium if a collision
occurs (original method in IEEE 802.3)
MOBILE COMPUTING
MOBILE COMPUTING
R. Wattenhofer
3/3
MOBILE COMPUTING
R. Wattenhofer
3/4
A
A
MOBILE COMPUTING
R. Wattenhofer
3/5
MOBILE COMPUTING
R. Wattenhofer
3/6
124
935.2 MHz
200 kHz
1
20 MHz
915 MHz
124
MOBILE COMPUTING
R. Wattenhofer
3/7
MOBILE COMPUTING
R. Wattenhofer
3/8
TDMA Motivation
417 s
1 2 3
11 12 1 2 3
downlink
11 12
uplink
MOBILE COMPUTING
R. Wattenhofer
3/9
MOBILE COMPUTING
R. Wattenhofer
maximize P :
MOBILE COMPUTING
R. Wattenhofer
3/11
In our time slot model, this means that the probability that a new
packet is received by the buffer is ; the probability that sending
succeeds is , for any time slot. To keep the queue bounded we
need = / < 1.
pn = 1
3/10
MOBILE COMPUTING
R. Wattenhofer
3/12
Slotted aloha uses not every slot of the channel; the round robin
protocol is better.
+ What happens in round robin when a new station joins? What
about more than one new station? Slotted aloha is more flexible.
MOBILE COMPUTING
R. Wattenhofer
3/13
MOBILE COMPUTING
R. Wattenhofer
3/14
P1 (1 )
Model:
n n
( P0 + P2 )
P1 + P0
n n + 1, if success or idle
n n + +
1
, if collision
e2
MOBILE COMPUTING
R. Wattenhofer
3/15
MOBILE COMPUTING
R. Wattenhofer
3/16
Backoff Protocols
MOBILE COMPUTING
R. Wattenhofer
Channel efficiency only 36% for Slotted Aloha, and even worse for
Aloha or backoff protocols.
Practical systems therefore use reservation whenever possible.
But: Every scalable system needs an Aloha style component.
Reservation:
3/17
MOBILE COMPUTING
Aloha
Aloha
reserved
Aloha
reserved
Aloha
reserved
MOBILE COMPUTING
reserved
R. Wattenhofer
3/19
1 2 3 4 5 6 7 8
ACDABA-F
frame1 A C D A B A
ACDABA-F
frame2 A C
AC-ABAF-
3/18
collisions
R. Wattenhofer
frame3
A B A
collision at
reservation
attempts
B A F
A---BAFD
frame4 A
ACEEBAFD
frame5 A C E E B A F D
time-slot
B A F D
MOBILE COMPUTING
R. Wattenhofer
t
3/20
Nk data-slots
reservations
for data-slots
Request (or ready) to send RTS: a sender requests the right to send
from a receiver with a short RTS packet before it sends a data packet
Clear to send CTS: the receiver grants the right to send as soon as it is
ready to receive
n=6, k=2
R. Wattenhofer
RTS
CTS
R. Wattenhofer
3/22
B wants to send to A,
and C to D
now C does not have
to wait for it cannot
receive CTS from A
ACK
RTS
MOBILE COMPUTING
idle
idle
R. Wattenhofer
time-out
time-out
or NAK
RTS
CTS
RTS
3/23
RTS
time-out
data
or corrupt
data
ACK
NAK
CTS
data
wait for
data
CTS
A
receiver
RxBusy
RTS
sender
RTS
CTS
MOBILE COMPUTING
3/21
MACA examples
MOBILE COMPUTING
MOBILE COMPUTING
RTS
R. Wattenhofer
RxBusy
3/24
Polling mechanisms
MOBILE COMPUTING
R. Wattenhofer
3/25
Comparison SDMA/TDMA/FDMA/CDMA
SDMA
segment space into
cells/sectors
Terminals
Signal
separation
TDMA
segment sending
time into disjoint
time-slots, demand
driven or fixed
patterns
all terminals are
active for short
periods of time on
the same frequency
synchronization in
the time domain
FDMA
segment the
frequency band into
disjoint sub-bands
CDMA
spread the spectrum
using orthogonal codes
simple, established,
robust
inflexible, antennas
Disadvantages typically fixed
inflexible,
frequencies are a
scarce resource
typically combined
with TDMA
(frequency hopping
patterns) and SDMA
(frequency reuse)
capacity per km
Comment
only in combination
with TDMA, FDMA or
CDMA useful
digital, flexible
guard space
needed (multipath
propagation),
synchronization
difficult
standard in fixed
networks, together
with FDMA/SDMA
used in many
mobile networks
MOBILE COMPUTING
R. Wattenhofer
3/27
[J.Schiller]
Approach
Idea
MOBILE COMPUTING
R. Wattenhofer
3/26