Random Access For Mac Layer

Results 1 - 3 of 3

Quality of service issues in hybrid fiber-coax networks

'.. The IEEE 802.14 working group is currently standardizing a new media access control (MAC) protocol for the emerging Hybrid Fiber Coax (HFC) networks. Crucial for the success of 802.14 will be its ability to support Quality of Service(QoS) for delay and throughput sensitive applications such as multi ..'
Abstract - Cited by 1 (1 self) - Add to MetaCart

CSMA, or listen with random access carrier Technical CSMA (Carrier Sense Multiple Access) is to listen to the channel before transmitting. If the module detects a signal on the line, it differs his show at a later date. This significantly reduces the risk of collision, but does not eliminate them completely. Here I only post the MAC CE that is added only LTE Advanced. MAC CE - Activation/Deactivation MAC Control Element. Refer to 36.321 6.1.3.8 Activation/Deactivation MAC Control Element if you want to have formal description. The field structure is as shown below. MAC control element. This module discusses the need for medium access control (MAC), and introduces representative random access and scheduling MAC protocols - including the carrier-sense multiple access with collision detection CSMA-CS protocol which forms the basis for the Ethernet LAN standard.

The IEEE 802.14 working group is currently standardizing a new media access control (MAC) protocol for the emerging Hybrid Fiber Coax (HFC) networks. Crucial for the success of 802.14 will be its ability to support Quality of Service(QoS) for delay and throughput sensitive applications such as multimedia. Two methods are presented in this thesis to provide QoS, efficient interoperability with Asynchronous Transfer Mode(ATM) services and the design and simulation of a novel priority scheme. HFC networks must support higher layer traffic services, namely, ATM Constant Bit Rate (CBR), Variable Bit Rate (VBR) and Available Bit Rate (ABR) traffic classes. This first part of this thesis investigates the inter-operation of the MAC protocol, as defined by 802.14, with ABR transmissions. An important finding of this

Adaptive MAC Protocol for a Cable Modem

'.. Cable plants were initially designed for one-way broadcast communication (from the head-end to the neighborhood). They are now being upgraded to provide an upstream path (from the home to the head-end). New challenges arise in using the upstream channel since the available bandwidth is low and the n ..'
Abstract - Cited by 1 (0 self) - Add to MetaCart
Cable plants were initially designed for one-way broadcast communication (from the head-end to the neighborhood). They are now being upgraded to provide an upstream path (from the home to the head-end). New challenges arise in using the upstream channel since the available bandwidth is low and the noise levels are high. In this paper we present a MAC protocol especially designed to efficiently share the scarce upstream capacity. The protocol dynamically adjusts operating parameters to the current workload on the system. The control mechanism does not require any framing structure and is built around a "sea of mini-slots". The performance under both static and highly dynamic loads is close to optimum. The station implementation is particularly simple and the downstream control structure is also simple. Results are given here for fixed length data units (ATM cells) but the algorithm extends very simply to variable length MAC frames. School of Electrical and Computer Engineering HeadE..
(Show Context)

Virtual time scheduling in HFC networks with support for priority implementation

'.. This paper proposes the application of virtual time scheduling to the request admission mechanism used in the IEEE 802.14 MAC protocol. For each contention minislot, arrivals within a certain interval are allowed to contend for transmission. The length of this interval is determined using one of two ..'
Abstract - Add to MetaCart
This paper proposes the application of virtual time scheduling to the request admission mechanism used in the IEEE 802.14 MAC protocol. For each contention minislot, arrivals within a certain interval are allowed to contend for transmission. The length of this interval is determined using one of two clock increments, depending on whether the virtual time lags behind the actual time or not. The virtual time is based on a mapping involving the unused contention minislots, and the frame length. It is shown through simulation that virtual time scheduling enhances the system performance and results in a close to FCFS strategy. In addition, through the differential handling of virtual clocks of the different user classes, virtual time scheduling can be used to implement prioritized access. Simulation experiments are also used to show the merit of this priority mechanism. An important feature of the proposed virtual time scheduling is that it does not require any
(Show Context)

Random Access Protocols is a Multiple access protocol that is divided into four categories which are ALOHA, CSMA, CSMA/CD, and CSMA/CA. In this article, we will cover all of these Random Access Protocols in detail.

Have you ever been to a railway station? And noticed the ticket counter over there?

Above are the scenarios for approaching a ticket counter. Which one do you think is more productive? The ordered one, right? And we all know the reason why. Just to get things working and avoid problems we have some rules or protocols, like 'please stand in the queue', 'do not push each other', 'wait for your turn', etc. in the same way computer network channels also have protocols like multiple access protocols, random access protocols, etc.

Let's say you are talking to your friend using a mobile phone. This means there is a link established between you and him. But the point to be remembered is that the communication channel between you and him (the sender & the receiver or vice-versa) is not always a dedicated link, which means the channels are not only providing service to you at that time but to others as well. This means multiple users might be communicating through the same channel.

How is that possible? The reason behind this is the multiple access protocols. If you refer to the OSI model you will come across the data link layer. Now divide the layers into 2 parts, the upper part of the layer will take care of the data link control, and the lower half will be taking care in resolving the access to the shared media, as shown in the above diagram.

The following diagram classifies the multiple-access protocol. In this article, we are going to cover Random Access Protocol.

Random Access Protocols

Once again, let's use the example of mobile phone communication. Whenever you call someone, a connection between you and the desired person is established, also anyone can call anyone. So here we have all the users (stations) at an equal priority, where any station can send data depending on medium's state whether it is idle or busy, meaning that if you friend is talking to someone else through the mobile phone, then its status is busy and you cannot establish a connection and since all the users are assigned equal priority you can not disconnect your friend's ongoing call and connect yours.

The random access protocols consist of the following characteristics:

  1. There is no time restriction for sending the data (you can talk to your friend without a time restriction).

  2. There is a fixed sequence of stations which are transmitting the data.

As in the above diagram you might have observed that the random-access protocol is further divided into four categories, which are:

  1. ALOHA

  2. CSMA

  3. CSMA/CD

  4. CSMA/CA

Let's cover each one of them, one by one.

ALOHA Random Access Protocol

The ALOHA protocol or also known as the ALOHA method is a simple communication scheme in which every transmitting station or source in a network will send the data whenever a frame is available for transmission. If we succeed and the frame reaches its destination, then the next frame is lined-up for transmission. But remember, if the data frame is not received by the receiver (maybe due to collision) then the frame is sent again until it successfully reaches the receiver's end.

Whenever we talk about a wireless broadcast system or a half-duplex two-way link, the ALOHA method works efficiently. But as the network becomes more and more complex e.g. the ethernet. Now here in the ethernet, the system involves multiple sources and destinations which share a common data path or channel, then the conflict occurs because cellpadding='10' cellspacing='0'>

PURE ALOHA

SLOTTED ALOHA

Data transmission

Stations can transmit the data randomly i.e. any number of stations can transmit data at any time.

here, any random station can transmit the data at the beginning of any random time slot

Time status

Here, the time is continuous and is not globally synchronized with any other station.

Here, the time is discrete unlike pure ALOHA and is also globally synchronized

Vulnerable time

2*Frame transmission time

Frame transmission time

Probability of successful transmission of a data packet

G*e-2G

where, G = no. of stations willing to transmit data

G*e-G

Maximum efficiency

18.4%

36.8%

Collision status

It does not reduce the total number of collisions to half

Here, it reduces the total number of collisions to half and doubles the efficiency of pure ALOHA

CSMA Random Access Protocol

CSMA stands for Carrier Sense Multiple Access. Till now we have understood that when 2 or more stations start sending data, then a collision occurs, so this CSMA method was developed to decrease the chances of collisions when 2 or more stations start sending their signals over the data link layer. But how do they do it? The CSMA makes each station to first check the medium (whether it is busy or not) before sending any data packet.

Here, Vulnerable time = Propagation Time

But, what to do if the channels are busy? Now, here the persistence methods can be applied to help the station act when the channel is busy or idle.

The CSMA has 4 access modes:

  • 1-persistent mode: In this, first the node checks the channel, if the channel is idle then the node or station transmits data, otherwise it keeps on waiting and whenever the channel is idle, the stations transmit the data-frame.

  • Non-persistent mode: In this, the station checks the channel similarly as 1-persistent mode, but the only difference is that when the channel is busy it checks it again after a random amount of time, unlike the 1-persistent where the stations keep on checking continuously.

  • P-persistent mode: In this, the station checks the channel and if found idle then it transmits the data frame with the probability of P and if the data is not transmitted (1-P) then the station waits for a random amount of time and again transmits the data with the probability P and this cycle goes on continuously until the data-frame is successfully sent.

  • O-persistent: In this, the transmission occurs based on the superiority of stations which is decided beforehand and transmission occurs in that order. If the channel is idle, then the station waits for its turn to send the data-frame.

Throughput & Efficiency of CSMA:

It is comparatively much greater than the throughput of pure and slotted ALOHA. Here, for the 1-persistent mode, the throughput is 50% when G=1 and for Non-persistent mode, the throughput can reach up to 90%.

CSMA/CD Random Access Protocol

CSMA/CD means CSMA with Collision Detection.

In this, whenever station transmits data-frame it then monitors the channel or the medium to acknowledge the state of the transmission i.e. successfully transmitted or failed. If the transmission succeeds, then it prepares for the next frame otherwise it resends the previously failed data-frame. The point to remember here is, that the frame transmission time should be at least twice the maximum propagation time, which can be deduced when the distance between the two stations involved in a collision is maximum.

Layer

Random Access For Mac Layers

CSMA/CA Random Access Protocol

CSMA/CA means CSMA with collision avoidance.

To detect the possible collisions, the sender receives the acknowledgement and if there is only one acknowledgment present (it's own) then this means that the data-frame has been sent successfully. But, if there are 2 or more acknowledgment signals then this indicates that the collision has occurred.

Random Access For Mac Layer Cheese

This method avoids collisions by:

  • Interframe space: in this case, assume that your station waits for the channel to become idle and found that the channel is idle, then it will not send the data-frame immediately (in order to avoid collision due to propagation delay) it rather waits for some time called interframe space or IFS, and after this time the station again checks the medium for being idle. But it should be kept in mind that the IFS duration depends on the priority of the station.

  • Contention Window: here, the time is divided into slots. Mac won't download software update. Say, if the sender is ready for transmission of the data, it then chooses a random number of slots as waiting time which doubles every time whenever the channel is busy. But, if the channel is not idle at that moment, then it does not restart the entire process but restarts the timer when the channel is found idle again.

  • Acknowledgment: as we discussed above that the sender station will re-transmits the data if acknowledgment is not received before the timer expires.