Random Access Protocols ALOHA

Similar documents
Chapter 5. Elementary Performance Analysis

requests/sec. The total channel load is requests/sec. Using slot as the time unit, the total channel load is 50 ( ) = 1

Multiaccess Communication

Multimedia Communication Services Traffic Modeling and Streaming

Analysis of random-access MAC schemes

Discrete Random Variables

Modeling and Simulation NETW 707

Power Laws in ALOHA Systems

Markov Chain Model for ALOHA protocol

Power Controlled FCFS Splitting Algorithm for Wireless Networks

16:330:543 Communication Networks I Midterm Exam November 7, 2005

Lan Performance LAB Ethernet : CSMA/CD TOKEN RING: TOKEN

Lecture on Sensor Networks

P e = 0.1. P e = 0.01

On the Throughput, Capacity and Stability Regions of Random Multiple Access over Standard Multi-Packet Reception Channels

FCFS Tree Algorithms with Interference Cancellation and Single Signal Memory Requirements

On the Stability and Optimal Decentralized Throughput of CSMA with Multipacket Reception Capability

Channel Allocation Using Pricing in Satellite Networks

CSE 123: Computer Networks

LECTURE 3. Last time:

Wireless Internet Exercises

Information in Aloha Networks

Mathematical Analysis of IEEE Energy Efficiency

Robustness of Q-ary collision resolution algorithms in random access systems

Maximum Sum Rate of Slotted Aloha with Capture

Analysis of tree algorithm for collision resolution

Giuseppe Bianchi, Ilenia Tinnirello

Kybernetika. Andrzej Dziech; Andrzej R. Pach Bounds on the throughput of an unslotted ALOHA channel in the case of a heterogeneous users' population

ECE 3511: Communications Networks Theory and Analysis. Fall Quarter Instructor: Prof. A. Bruce McDonald. Lecture Topic

TRANSMISSION STRATEGIES FOR SINGLE-DESTINATION WIRELESS NETWORKS

Performance analysis of IEEE WLANs with saturated and unsaturated sources

Queueing Theory I Summary! Little s Law! Queueing System Notation! Stationary Analysis of Elementary Queueing Systems " M/M/1 " M/M/m " M/M/1/K "

Answers to the problems from problem solving classes

Detecting Stations Cheating on Backoff Rules in Networks Using Sequential Analysis

Performance analysis of IEEE WLANs with saturated and unsaturated sources

Giuseppe Bianchi, Ilenia Tinnirello

CHAPTER 4. Networks of queues. 1. Open networks Suppose that we have a network of queues as given in Figure 4.1. Arrivals

TCP over Cognitive Radio Channels

Queuing Networks: Burke s Theorem, Kleinrock s Approximation, and Jackson s Theorem. Wade Trappe

Stability and Performance of Contention Resolution Protocols. Hesham M. Al-Ammal

Analysis and Performance Evaluation of Dynamic Frame Slotted-ALOHA in Wireless Machine-to-Machine Networks with Energy Harvesting

Lecture 7: Simulation of Markov Processes. Pasi Lassila Department of Communications and Networking

STABILITY OF FINITE-USER SLOTTED ALOHA UNDER PARTIAL INTERFERENCE IN WIRELESS MESH NETWORKS

Performance Evaluation of Deadline Monotonic Policy over protocol

Performance Evaluation of Queuing Systems

Design and Analysis of a Propagation Delay Tolerant ALOHA Protocol for Underwater Networks

Tuning the TCP Timeout Mechanism in Wireless Networks to Maximize Throughput via Stochastic Stopping Time Methods

Queues and Queueing Networks

CS115 Computer Simulation Project list

Week 5: Markov chains Random access in communication networks Solutions

Reliable Data Transport: Sliding Windows

IN conventional spectrum management, most of the spectrum

Part I Stochastic variables and Markov chains

Stochastic Models in Computer Science A Tutorial

Queueing Theory and Simulation. Introduction

A Simple Model for the Window Size Evolution of TCP Coupled with MAC and PHY Layers

6 Solving Queueing Models

Exploiting the Capture Effect to Enhance RACH Performance in Cellular-Based M2M Communications

Delay and throughput analysis of tree algorithms for random access over noisy collision channels

Operational Laws Raj Jain

Approximate Queueing Model for Multi-rate Multi-user MIMO systems.

Conference Paper. Stability and Delay of Network-Diversity Multiple Access with Backlog Retransmission Control. Ramiro Robles CISTER-TR

6.1 Occupancy Problem

Queueing Networks G. Rubino INRIA / IRISA, Rennes, France

Radio Network Clustering from Scratch

Introduction to Markov Chains, Queuing Theory, and Network Performance

Job Scheduling and Multiple Access. Emre Telatar, EPFL Sibi Raj (EPFL), David Tse (UC Berkeley)

PBW 654 Applied Statistics - I Urban Operations Research

An Evolutionary Game Perspective to ALOHA with power control

Computer Networks More general queuing systems

Design and Analysis of Multichannel Slotted ALOHA for Machine-to-Machine Communication

Performance Analysis of a System with Bursty Traffic and Adjustable Transmission Times

Continuous-time Markov Chains

A New Technique for Link Utilization Estimation

Discrete-event simulations

ENERGY harvesting (EH), a technology to collect energy. Optimal Relaying in Energy Harvesting Wireless Networks with Wireless-Powered Relays

Bounded Delay for Weighted Round Robin with Burst Crediting

ANALYSIS OF THE RTS/CTS MULTIPLE ACCESS SCHEME WITH CAPTURE EFFECT

Sebastian Marban, Peter van de Ven, Peter Borm, Herbert Hamers. A cooperative game-theoretic approach to ALOHA RM/10/049

CDA6530: Performance Models of Computers and Networks. Chapter 2: Review of Practical Random Variables

Throughput-Delay Analysis of Random Linear Network Coding for Wireless Broadcasting

Link Models for Circuit Switching

On the Throughput-Optimality of CSMA Policies in Multihop Wireless Networks

Random Access Game. Medium Access Control Design for Wireless Networks 1. Sandip Chakraborty. Department of Computer Science and Engineering,

Stability analysis of a cognitive multiple access channel with primary QoS constraints

A POMDP Framework for Cognitive MAC Based on Primary Feedback Exploitation

cs/ee/ids 143 Communication Networks

Performance of Dynamic-Frame-Aloha protocols: Closing the gap with tree protocols

Stability and Instability Conditions for Slotted Aloha with Exponential Backoff

ABSTRACT WIRELESS COMMUNICATIONS. criterion. Therefore, it is imperative to design advanced transmission schemes to

Link Models for Packet Switching

Queue length analysis for multicast: Limits of performance and achievable queue length with random linear coding

ECE-517: Reinforcement Learning in Artificial Intelligence. Lecture 4: Discrete-Time Markov Chains

Chapter 2 Queueing Theory and Simulation

Input-queued switches: Scheduling algorithms for a crossbar switch. EE 384X Packet Switch Architectures 1

ABSTRACT CROSS-LAYER ASPECTS OF COGNITIVE WIRELESS NETWORKS. Title of dissertation: Anthony A. Fanous, Doctor of Philosophy, 2013

Performance comparison of aggressive push and traditional pull strategies in large distributed systems

Cooperative Spectrum Prediction for Improved Efficiency of Cognitive Radio Networks

On the MAC for Power-Line Communications: Modeling Assumptions and Performance Tradeoffs

Transcription:

Random Access Protocols ALOHA 1

ALOHA Invented by N. Abramson in 1970-Pure ALOHA Uncontrolled users (no coordination among users) Same packet (frame) size Instant feedback Large (~ infinite) population 2

Protocol Simple Protocol Users transmit packets as and when these are ready Packets are broadcast by a hub to all users. Any overlap of packets Collision All packets involved in a collision are back-logged Back logged packets are retransmitted after a random delay. Throughput packets suffering no collision (fresh or retransmitted) 3

The Pure ALOHA Algorithm 1. Transmit whenever you have data to send 2. Listen to the broadcast Because broadcast is fed back, the sending host can always find out if its packet was destroyed just by listening to the downward broadcast one round-trip time after sending the packet 3. If the packet was destroyed, wait a random amount of time and send it again The waiting time must be random to prevent the same packets from colliding over and over again 4

Pure ALOHA (cont d) Note that if the first bit of a new packet overlaps with the last bit of a packet almost finished, both packets are totally destroyed. t : one packet transmission time Vulnerable period: 2t P1 P3 P2 t t 0 t 0 +t t 0 +2t t 0 +3t Vulnerable 5

Pure ALOHA Channel load = freshly generated packets +Retransmitted packets G = Channel load per packet time S = Throughput per packet time P(k arrivals) = G K e G! G, k = 0,1,2... Psuc= Pr(Packet is successfully transmitted) = Pr(No collision in vulnerability interval) 6

Pure ALOHA (contd.) Vulnerability interval = 2 x packet time Average channel load in the vulnerability interval = 2G P succ = Pr (channel is silent in the vulnerability interval) = e -2G = P suc Normalized Throughput = S = Average Channel load x P suc = G e -2G S max = 1 / 2e =0.184 at G=1 / 2 Maximum throughput 18% but protocol is simple. 7

Slotted ALOHA (L.G. Roberts) Users can transmit packets in slots only. Slot boundaries cannot be transgressed. Packets P2 and P3 collide Vulnerability interval is one slot (packet) time P suc =e -G S max = 1/e = 0.368 at G=1 8

Slotted ALOHA Assumptions all frames same size time is divided into equal size slots, time to transmit 1 frame nodes start to transmit frames only at beginning of slots nodes are synchronized if 2 or more nodes transmit in slot, all nodes detect collision Operation when node obtains fresh frame, it transmits in next slot no collision, node can send new frame in next slot if collision, node retransmits frame in each subsequent slot with prob. p until success 9

Slotted ALOHA (contd.) P 1 X P 3 X P 2 P 1 P 2 P 3 10

Slotted Aloha maximum efficiency: 1/e maximum efficiency: 1/2e Throughput versus offered traffic for ALOHA network 11

Average Number of transmission per packet P(k) = P r (exactly k attempts are required for a successful transmission) = P r [(k-1) collisions and one success] P(k) = (1-e -G ) k-1 e -G (Geometric Distribution) Hence, E[K] = K = 1 K P( k) = e G Average number of transmissions increase exponentially with channel load 12

Slotted ALOHA- Cycle Time Analysis Cycle = Busy Period + Idle Period C = B + I Busy Period = Collision Intervals + Successful transmission intervals For a cycle to complete : at least one slot be present in the idle period and at least one transmission is scheduled in the slot following Idle Period. 13

Cycle Time Busy Period Idle Period P5, P6, P7 P1, P2 P3 P4 P8 S0 S1 S2 S3 S4 S5 S6 S7 S8 P1 P2 P3 P4 P5 P6 P7 P8 P9 14

Slotted ALOHA- Cycle Time Analysis P1, P2 scheduled in S1 : both packets collide P3 scheduled in S2 : successful P4 scheduled in S3 : successful P5, P6, P7 scheduled in S4 : all the packets collide P8 scheduled in S5 : successful No arrivals in S5 and S6 : S6 and S7 are idle P9 arrives in S7 : it is scheduled in the first slot of the next cycle. Busy period : S1 S5 Collision periods : S1 + S4 Successful periods : S2 + S3 + S5 Idle period : S6 + S7 15

Slotted ALOHA- Cycle Time Analysis Busy period, B, and idle period, I, are RVs. P (I=1) = P (one or more packets scheduled in the first slot) = 1-P (no packet is scheduled in the first slot) = 1 e -G P(I=2) = P (no packet is scheduled in the first slot and at least one packet is scheduled in the following slot) = e -G (1-e -G ) 16

In General P(I = k) = (e -G ) k-1 (1-e -G ) (Geometric Distribution) Average Idle Period = E[I] = 1 /(1- e -G ) P(B=k) = P(one or more arrivals in k-1 slots and no arrival in kth slot) = (1-e -G ) k-1 e -G (Geometric Distribution) Average Busy Period = E[B] = 1 / e -G 17

U = Utilization = Number of successful slots in a busy period P (Successful Transmission) = P (one arrival in the previous slot given some arrivals have occurred) P suc = Ge -G / (1- e -G ) P(U=k/B) = P (k slots are successful/ busy period is B slots) B = ( ) ( ) B k P k suc 1 Psuc k Binomial Distribution 18

Hence E[U/B] = B. P suc E[U/B] = E[E[U/B]] = E[B] P suc Throughput = E[U] / E[C] = E[U] / ( E[B] + E[I] ) = E[B]. P suc / ( E[B] + E[I] ) Using E[B], E[I] and P suc expressions S= G e -G 19

Finite Population ALOHA Define, G i = P (ith user will transmit in some slot) S i = P (ith users packet does not suffer a collision) Normalized Channel Load for n users n G = G i = 1 i Normalized Channel throughput for n n users = S = i = 1 S i 20

Finite Population ALOHA Hence, n Π ( ) j = 1 1 G j S i = G i j i = (ith users packet is in the system and remaining users are not attempting) Case 1: Identical users, G i = G / n and S i = S/n S/n = G/n (1-G/n) n-1 using limn 1 + x n n = e n x 21

Finite Population ALOHA Case 2: Two classes of users Class 1: n 1 users, S 1, G 1 Class 2: n 2 users, S 2, G 2 n = n1 + n2 S 1 = G 1 (1-G 1 ) n1-1 (1-G2) n2 S2 = G1(1-G2) n2-1 (1-G1) n1 Condition for maximum throughput n 1 G 1 + n 2 G 2 = 1 Throughput in Class 1 : n 1 S 1 Throughput in Class 2 : n 1 S 1 22

Delay and throughput in S-ALOHA Assume finite number of users (=N) Thinking State : P (Generation of a fresh packet) = p Backlogged State: P (retransmission of a collided packet in the next slot = α) P (exactly R slots is the retransmission delay) P(R) = (1-α) R-1 α [Geometric Distribution] Average retransmission delay = E[k] = 1/α 23

Markov Chain (S-ALOHA) State of the system users State = K (thinking) Markov Chain : Number of backlogged => (N-K) unblocked users 0 1 2 3 N-1 N 24

Delay and throughput in S-ALOHA All S i to S j (j>i) forward transitions are possible except S 0 to S 1 Only S j to S j-1 backward transitions are possible. All S i to S i transitions are possible P (system is in state i) = P(i) i N = 1 P () i P (transition from state S i to S j ) = p ij = 1 25

Delay and throughput in S-ALOHA When the system is in S i, some of (N-i) stations can inject fresh packets (=f) Some of i stations can attempt retransmissions (=r) 0 f ( N i) 0 r i 26

Delay and throughput in S-ALOHA (a) Backward Transitions p i, j = 0 for f i 2 p i, i-1 = (no fresh packet generated and exactly one retransmission occurs) p i, i-1 = P(f=0). P(r=1) 27

Same state transitions E1 : No fresh packet generated and no successful retransmission(r 1) E2 : One fresh packet generated (and through) and no retransmission attempted (r=0). (same backlogged stations) p ii = P(E 1 ) + P(E 2 ) p ii = P(f=0) P(r 1) + P(f=1) P(r=0) 28

Forward Transitions p 0,1 = 0 p i, i+1 = P (one fresh packet generated and at least one retransmission attempt) p i, i+1 = P(f=1) P(r 1) p i,j = P(f=j-i) for j i+2 P(f=0) = N 0 i (1 p) N i p 0 = (1 p) N i 29

30 Forward Transitions (contd.) P(f=1) = P(f=j-i) = P(r=0) = P(r=1) = 1 1 ) (1 ) ( ) (1 1 = i N i N p p i N p p i N j N i j p p i j i N ) (1 ( ) ( ) i i i α α α = 1 1 0 0 ( ) ( ) 1 1 1 1 1 = i i i i α α α α

P(r 1) = P(r 1) = 1 P ( ) ( ) i r = 1 = 1 iα 1 α 1 ( r = 0) = 1 ( α ) i 1 P 1 P ( k ) = N i = 0 P () i p ik 31

Throughput Successful transmission when state is S i : All backlog users are silent and one fresh packet is transmitted or one backlogged user transmits and no fresh packet is generated 32

Throughput and Backlog P suc (i) = P(f=1) P (r=0) + P(f=0) P(r=1) P suc (i)= ( ) ( ) N i 1 ( ) i ( ) N i N i p p p i ( ) i 1 1 1 α + 1 α 1 α = S( i) Mean throughput = S = P suc = E [ ] Mean backlog = E D = MeanDelay= Overall average packet arrival rate = p N [ P () i ] = P () i P() i suc [ ] E k S = k S i= 0 = D suc ( N k ) = S [ Little' sformu 33

Delay Total number of packets in the system = Average back logged packets + Average fresh arrivals W = K + p( N k ) Using Little s Formula D. p D ( N k ) = K + p( N k ) = 1 + p K ( N K ) 34

Stability in S-ALOHA ALHOA Systems are potentially unstable When S N, Np λ = () ( ) i s ( ) i 1 s i = 1 α Se + iα 1 α e S(i) vs i is throughput backlog plot for fixed α S 35

S(i) S(i)< λ Equilibrium S(i)= λ S(i)> λ i 36

Stability in S-ALOHA Packets leave system at S(i) rate Packets enter the system at S=(N-i)p=λ rate S(i) > λ Packets are leaving at faster rate than the input λ = ( N i)p is the load line 37

Global Equilibrium λ,s(i) E i 38

E 1 λ,s(i) E 2 E 3 i 39

Load line λ,s(i) E i 40

E 2 is unstable equilibrium E 1 and E 3 are stable equilibrium E 3 is high backlog equilibrium High backlog equilibrium Backlog-throughput curve is lifted up by decreasing α For n input = λ 41

λ, S E1 E2 Beyond E2 system will move to high backlog state (input remains λ) i 42

Looking at G-S Curve (E 1 =G 1, E 2 =G 2, i=g) Around G 1 (Small backlog) (a) λ increases (λ+ λ) : Small variation Packets leave faster than they arrive G tends to reduce (Slower arrivals) Stabilizes at G 1 43

(b) λ decreases (λ- λ) : Small variation Throughput decreases Packets leave slower than they arrive G tends to increase (faster arrivals) Stabilizes at G 1 44

Around G 2 (Large Backlog) G exceeds G 2 (Large variation in λ) Throughput decreases Packets leave slower than they arrive Further increase in G and backlog Unstable System 45

CAPTURE IN ALOHA Packets arriving at receiver with highest energy get detected Low energy packets are not deemed to be through Power variations can occur due to Varying distance of receivers from hub Fading in radio environment Overall system throughput increases 46

Demonstration of Capture Two classes of users (Metzner) High Power Class (H), [G H, S H ] Low Power Class (L), [G L, S L ] Low power packets cannot affect high power packets S H = G H. e -G H 47

Low power packet transfer requires no transmission from high power class S L = G L. G L. S L ( max) at G L = 1 = e e G H e e GH = 1 e S G H H 48

Plot Total throughput S T [ S L (max) + S H ] vs S H Fix G H Obtain S H = G H. Compute S T For G G H H e G H 1 1, S H =, S = 0.503 e 0.8, S = 0.359, S = 0.524 = T = H T It shows, capture increases throughput (maximum throughput 0.53) Throughput can be increased by increasing power based classes (Hellman): 18 classes required for S T = 0.9 49

ANOTHER CAPTURE PHENOMENON IN FINITE POPULATION ALOHA Small α, Nα << 1 Non-negligible p Most users backlogged (state is N or (N-1)) Then, Np S N + ( N 1)p D = N + ( N 1) p 50

Throughput increases with increasing load (p)!! Delay decreases with increasing load (p)!! S, D independent of α 51

Why?? Eventually some station tried retransmission and is through (small α). This station generates a fresh packet (probability p) sends and is through generates next packet and is through (small α), and so on until back-logged This station has captured the system for a while. Larger p increases throughput and decreases delay 52

Collision Resolution Tree (splitting) Algorithm(s) [Capatanakis, Sybakov & Mikhailov, Hayes] Resolve collisions of back-logged population by splitting into sub-sets. Splitting continues until all back-logged packets are transmitted. Splitting can be done on Flipping an unbiased coin (Probabilistic). Binary string identifier. Time of arrival of the collided packet No new users 53

Basic Algorithm Collision detected in kth slot. Stations not involved in collision go to waiting mode. Colliding nodes split in two sub-sets, L and R. All member of L transmit in (k+1)th slot. If (k+1)th slot is idle or successful then members of R transmit in (k+2)th slot. If collision occurs in (k+1)th slot then L is split in LL and LR sub-sets. Splitting continues until collisions resolved. 54

Basic Algorithm example Three back-logged nodes A, B and C Collision (error) : e Success : 1 Idle : 0 Null Set : * 55

Slot Transmit Set Waiting Set Feedback 1 S(ABC) - e 2 L(ABC) R(*) e 3 LL(A) LR(BC), R(*) 1 4 LR(BC) R(*) e 5 LRL(*) LRR(BC), R(*) 0 6 LRR(BC) R(*) e 7 LRRL(B) LRRR, R(*) 1 8 LRRR R(*) 1 9 R(*) - 0 56

Resultant Tree Suc LL coll Idle LRL LR L coll S coll Suc LRRL R LRR Idle Suc coll LRRR 57

Equivalent Stack Algorithm All nodes in transmit set are at top of the stack In case of collision waiting set is pushed down. After Idle or Success contents of stack are pushed up. 58

S 1 ABC S 2 ABC S 3 A (e) - (e) * (1) BC * S 4 BC S 5 * S 6 BC (e) * (0) BC * * S 7 B S 8 C S 9 * (1) C (1) * (0) * 59

Improvement (Massey) In the previous algorithm When 0 is followed by e, R set is null. L set transmission in the next slot will certainly generate e. Hence, split L set and then transmit. 60

In the example it would be Slot Transmit Set Waiting Set Feedback : 4 LR R e 5 LRL(*) LRR, R O 6 LRRL LRRR, R. : 61

Split has taken place in slot 6. Split is dependent on correct detection of o. If incorrect, splitting will continue indefinitely. 62

CONTROLLED ALOHA ALOHA can be stabilized by controlling α When G > G Th, Choose α = α 1 G <= G Th, Choose α = α 2 α 1 < α 2 G Th can be estimated by counting empty slots (probability is e -G ). More than one thresholds can be chosen. It is possible to choose optimal state dependent α(i). 63

TIME FREQUENCY RANDOM MULTIPLE ACCESS (RMA) RMA sequences proposed by Wu Symbol is given a time-frequency code Example 0 1 2 f 2 T-F matrix (3x3) 3 6 4 7 5 8 f f 1 0 Binary 1 : (3,1,2) = Binary 0 : (6,4,8) = t 0 t 1 t 2 f + 1t0 + f 2t1 f 2t2 f + 0t0 + f1t1 f 0t2 64

RMA RMA sequences are generated using finite Euclidean geometry difference sets Number of time divisions = n Number of frequency divisions = n 2 Number of symbols = n 3 Number of sequences = n 2 (n 2 +n+1) Minimum distance in sequences = n-1 65

RMA Distance in sequences = Number of symbols disagreements between a pair of sequences Symbols are considered in agreement if they appear in any position of the pair of sequences. Any two code sequences can have at most one symbol in common. 66

RMA Collision of two packets Collision (overlap) of bits More than one symbol match. One symbol match is not a collision. RMA Protocol can operate in Pure [Satija & Gupta] and slotted [Gupta & Sharma] mode 67

RMA Clash scenario in Pure RMA (n=3) 8 e f (Packet 1) c 8 d (Packet 2) 6 a b (Packet 3) 3 6 8 (Test Packet) Symbols 6 and 8 match Here the clashing symbols (8) can occur at first, second or the last position 68

RMA Clash scenario in slotted RMA 36 8 (Test Packet) a 6 b (Packet 1) c d 8 (Packet 2) Matching symbols need to be at the same position. 69

RMA Simulations show significant improvement over slotted ALOHA at higher loads. Unity slope upto G=2 in G-S curve (n=3). At G=10, slotted RMA (n=3) utilization is 48% against slotted ALOHA utilization of 0.045%. Bandwidth utilization of Slotted RMA is (Throughput/n) (16% at G=10, n=3) Higher sequence length increases the throughput. Complex coding and synchronization procedures. 70