[Back to Lecture Notes page]

The Channel Allocation Problem

 

Multiple Access Protocols

 

Pure Aloha

 

Slotted Aloha

Figure 4-2 shows the time a frame (the shaded one) is vulnerable to collisions from other frames. That vulnerable time is from t0 to t0+2t. If the frames are only allowed to be transmitted in slots (that is, at time t0, t0+t and t0+2t), the only vulnerable time is in the second slot (t0+t to t0+2t) which is only half of before (t0 to t0+2t).

Figure 4-3 compares the throughput between the two ALOHA schemes. The Y-axis is the average percentage of frames that gets through ungarbled over one slot time interval. The X-axis is the average number of times frame transmissions attempted in one slot over the whole network. The best if when we average one frame per slot. Any less, and we're not making full use of each slot. Any more, and we start getting many collisions.

 

Carrier Sense Multiple Access (CSMA) Protocols

 

1-Persistent CSMA

 

Non-persistent CSMA

 

p-persistent CSMA

 

Figure 4-4 shows the performance of the various CSMA protocols

 

CSMA with Collision Detection (CSMA/CD)

Figure 4-5

In CSMA/CD, there are times called contention periods where stations are transmitting and detecting if there are collisons. If a station transmits and doesn't detect a collision within this contention period, it knows it will be able to transmit the rest of the frame without collision. We consider that the station has seized the channel.

 

Collision Free Protocols

 

Bit-Map Protocols

Figure 4-6

All stations knows who is going to transmit, because they all got the bits bits during the contention period, so they can all determine when the next contention period will come up again.

 

Binary Countdown

Like the game spin-the-bottle: at every stage, depending on where the spinning bottle points, some competitors are eliminated.

Read the textbook p255 for an example. The example uses the binary operation OR, which favours addresses having bits 1.

 

Limited Contention Protocols

Limited Contention Protocols are combines contention-based protocols with collision free protocols. Due to the lack of time, we won’t go into it in this unit. For those interested, read section 4.2.4 in the textbook.

 

Wavelength Division Multiple Access (WDMA) Protocols

An example of how to use this, consider we want to send data to station X. So we have one control transmitter, one control receiver, one data transmitter, and one data receiver. Both we and station would already have specific parts of the spectrum’s wavelength allocated to our control channel and data channel.

To establish a connection with station X, we notify X by sending frames to the X’s control channel (ie. we send frames using the wavelength allocated to X’s control – X’s control receiver will ALWAYS be listening on this wavelength range). Station X will now tune its data receiver to our data transmitter’s wavelength. Now when we transmit, X will receive it. The reason we want just send directly without initially notifying X on its control channel is that X’s data receiver could be tuned to one of many stations on the network.

 

Wireless LAN Protocols

 

Multiple Access with Collision Avoidance (MACA)

Figure 4-12 textbook p265

 

Digital Cellular Radio

In this unit, we won’t go into the details of these standards, since they are still mainly directed at voice telephony. But keep in mind that with the upcoming convergence of voice and data communications, some of these standards may become very relevant in data communications.

Currently ,CDMA is getting more and more popular. It is also used in Satellite transmissions. It is probably the most complicated of the few above to understand, since it is based on Boolean Algebra to construct the code. Qualcomm developed the standard and compares it to several couples in a room all speaking a different language. Only a specific couple can communicate, and each is "tuned in" to only their conversation. In more technical terms, CDMA uses specific codes that convert analog voice sounds into digitized code that is undigitized on the receiving end, whether handset or cell site. All possible signals are added together, and every receiver receives the same final signal. But depending on how they decode it, they will get their relevant original signal.

Also, please note that it is a very common mistake for students to confuse CDMA with CSMA, I guess because the acronym is similar, and they both are LAN technologies. But please don't make this mistake. One is for wire-based LANs like Ethernets and the other is for wireless WANs like satellites systems.

 

[Back to Lecture Notes page]