Professional Documents
Culture Documents
Aloha 2
Aloha 2
Aloha 2
3 4
Page 1
Motivation Problems in wireless networks
Can we apply media access methods from fixed Signal strength decreases proportional to the
networks? square of the distance
Example CSMA/CD The sender would apply CS and CD, but the
‐ Carrier Sense Multiple Access with Collision Detection collisions happen at the receiver
‐ Send as soon as the medium is free, listen into the It might be the case that a sender cannot “hear”
medium if a collision occurs (original method in IEEE
802.3) the collision, i.e., CD does not work
Furthermore, CS might not work if, e.g., a
terminal is “hidden”
5 6
A B C D
A B C
7 8
Page 2
Near and Far Terminals Taxonomy of MAC Protocols
Terminals A and B send, C receives
‐ Signal strength decreases proportional to the square of the
distance
‐ The signal of terminal B therefore drowns out A’s signal
‐ C cannot receive A
A B C
Page 3
TDD/TDMA, e.g., DECT CDMA (Code Division Multiple Access)
13 14
15 16
Page 4
Another Example: CDMA on signal level (1) CDMA on signal level (2)
data A signal A As
1 0 1 Ad
key A data B 1 0 0 Bd
key
0 1 0 1 0 0 1 0 0 0 1 0 1 1 0 0 1 1 Ak
sequence A key B
data key 1 0 1 0 1 1 1 0 0 0 1 0 0 0 1 1 0 0
key 0 0 0 1 1 0 1 0 1 0 0 0 0 1 0 1 1 1 Bk
sequence B
As 1 1 1 0 0 1 1 0 1 0 0 0 0 1 0 1 1 1
signal A data key
Bs
signal B
17 18
As + Bs
As + Bs
Ak
Bk
(As + Bs)
* Ak (As + Bs)
* Bk
integrator
output integrator
output
comparator 1 0 1
output comparator 1 0 0
output
19 20
Page 5
CDMA on signal level (5) Implications for High‐Speed Wireless Data
As + Bs
Controlled multiple access performs well with
continuous stream traffic but inefficient for bursty
wrong traffic
key K
Complexity:
frequency division < time division < code division
(As + Bs) Multiple data rates
*K
‐ Multiple frequency bands
‐ Multiple time slots
‐ Multiple codes
integrator
output
comparator
output (0) (0) ?
21 22
Comparison
SDMA/TDMA/FDMA/CDMA Taxonomy of MAC Protocols
Approach SDMA TDMA FDMA CDMA
Idea segment space into segment sending segment the spread the spectrum
cells/sectors time into disjoint frequency band into using orthogonal codes
time-slots, demand disjoint sub-bands
driven or fixed
patterns
Terminals only one terminal can all terminals are every terminal has its all terminals can be active
be active in one active for short own frequency, at the same place at the
cell/one sector periods of time on uninterrupted same moment,
the same frequency uninterrupted
Signal cell structure, directed synchronization in filtering in the code plus special
separation antennas the time domain frequency domain receivers
Advantages very simple, increases established, fully simple, established, flexible, less frequency
capacity per km² digital, flexible robust planning needed, soft
handover
Dis- inflexible, antennas guard space inflexible, complex receivers, needs
advantages typically fixed needed (multipath frequencies are a more complicated power
propagation), scarce resource control for senders
synchronization
difficult
Comment only in combination standard in fixed typically combined still faces some problems,
with TDMA, FDMA or networks, together with TDMA higher complexity,
CDMA useful with FDMA/SDMA (frequency hopping lowered expectations; will
used in many patterns) and SDMA be integrated with
mobile networks (frequency reuse) TDMA/FDMA
23 24
Page 6
Random Access Techniques Pure Aloha
25 26
1. Data is packetized and users transmit whenever they 2. Listen to the broadcast
have something to send Assume the receiver rebroadcasts the received signal, so the
• Random, distributed (no central arbiter), time‐multiplex sender can find out if its packet was destroyed just by
listening to downward broadcast one round‐trip time after
If more than one node transmits at the same time sending it
=> Collision!
If there is a collision, both nodes need to retransmit 3. If packet was destroyed, wait a random amount of
time, and send it again
Central prevent the same packet from colliding over and over again
Node
27 28
Page 7
Contention Period in Pure Aloha Slotted Aloha
Just send: no waiting for beginning of slot How to reduce vulnerability/contention period?
A collision occurs for any partial overlap of Time is divided into equal size slots
packets Avoids partial overlap of packets
‐ If first bit of a new packet overlaps with last bit of a ‐ Nodes must always start transmit at the beginning of a slot
packet almost finished, both packets are destroyed.
‐ Packets must be transmitted within a slot
t: one packet transmission time (L/R) If collision, retransmit later
t0‐t t0 t0+t
29 30
sender A
t0‐t t0 t0+t sender B
sender C
t
Vulnerable period: t
31 32
Page 8
Demand Assigned Multiple Access
Performance of Aloha (DAMA)
Channel efficiency only 18% for Aloha, 36% for Slotted
Aloha (assuming Poisson distribution for packet arrival
and packet length) • Use a common reservation channel to assign
bandwidth on demand
‐ A sender reserves a future time‐slot => Sending within this
S (Throughput
Packet Time)
.30
.20 ‐ Typical scheme for satellite links
.10 Pure Aloha
0 0.5 1.0 1.5 2.0 3.0
G (Attempts per Packet TIme) Reservation can increase efficiency to 80%
‐ Very efficient if overhead traffic is a small percentage of the
Comments message traffic
‐ Inefficient for heavily loaded system
‐ Capture effect improves efficiency
‐ Combining SS with ALOHA reduces collisions
33 34
collision
t
Aloha reserved Aloha reserved Aloha reserved Aloha
35 36
Page 9
DAMA w/ Implicit Reservation (PRMA) Access method DAMA: PRMA
37 38
39 40
Page 10
MACA ‐ Collision Avoidance MACA examples
MACA (Multiple Access with Collision Avoidance) MACA avoids the problem of hidden terminals
uses short signaling packets for collision avoidance ‐ A and C want to
‐ RTS (request to send): a sender request the right to send from a send to B
receiver with a short RTS packet before it sends a data packet ‐ A sends RTS first RTS
‐ CTS (clear to send): the receiver grants the right to send as soon ‐ C waits after receiving CTS CTS
as it is ready to receive CTS from B
A B C
Signaling packets contain
‐ Sender address MACA avoids the problem of exposed terminals
‐ Receiver address ‐ B wants to send to A, C
‐ Packet size to another terminal
Variants of this method can be found in IEEE802.11 as ‐ Now C does not have
to wait for it cannot RTS RTS
DFWMAC (Distributed Foundation Wireless MAC) receive CTS from A
CTS
A B C
41 42
43 44
Page 11
ISMA (Inhibit Sense Multiple Access) Example Wireless Packet Data Services
45 46
47
Page 12