Queueing Theory Pillars
Multiple access methods techniques belong to Data-Link layer. They are a field of study under Queueing Theory.
Within a queue system:
- born rate is equivalent to packets arrival rate
- dead rate is equivalent to packets departure rate
- mean service time
- utilization factor
A given number of hosts (users) have to utilize the same shared resource. Hosts access the shared resource can be in the following ways:
- Deterministic: the resource usage is determined beforehand,
- Controlled: a host asks for its turn and exclusively use the resource until the drop,
- Random: the access of each host is independent from each other host’s access
Characterization parameters are:
- S: throughput,
- G: offered load,
- : access time.
Throughput is the radio of correctly transmitted bits per second to the average speed of a section of the network. It is a pure number (no measure unit). Offered load is the ratio of the average bits per second a host tries to transmit to the average speed of a section of the network. is the average time between packet arrival at the transmitting station and successful delivery at the receiving station. It is measured in seconds (sec
).
Furthermore, it is possible to demonstrate that:
Given the following definitions:
- N: number of hosts that want to communicate through the shared resource,
- C: mean transmission speed of the link (
bit/sec
), - F: length of the packet to transmit (
bit
), - : transmission time of F (random variable)
- : propagation delay
For simplicity’s sake, the article below is based on these assumptions:
- failure probability is irrelevant,
- the distribution of inter-arrival times is poissonian
There is no optimal multiple access technique. As any good engineer would say: “It depends”. The transmission medium (physical layer) is crucial for all layers above.
Deterministic Multiple Access Methods
Channels are orthogonal to each other so that the flow of information can be distinguished.
Orthogonality means having high spectral efficiency (at the same bit-rate), using all the available bandwidth. Orthogonality requires extremely high synchronization between the local frequencies of the receiver and transmitter. Frequency deviation would cause inter-carrier interference: crosstalk.
Time Division Multiple Access
TDMA subdivides the time into different slots called waves (or plots). Each wave is then divided into N different time slot, one for each transmitting host. The hosts transmit with C bit/sec
of speed every N time slot periods.
Neglecting the so-called “guard times” that are supposed to avoid overlapping signals on the slots, each station transmits at a rate of bit/sec
.
Packets departure rate is:
Frequency Division Multiple Access
FDMA requires all stations to transmit simultaneously, but at different frequencies. Neglecting the so-called “guard band”, that should avoid overlapping signals on the frequencies, each station transmits at a rate of bit/sec
.
Given the overall band B, the -th band is . Packets departure rate remains the same of TDMA.
Characterization parameters
For both TDMA ad FDMA, the throughput S is:
is the average queuing time for a M/D/1 system:
is the average time slot waiting time:
is the average service time affected by speed C:
Transmission time of F is:
is the propagation delay normalized against :
Due to several random factors that insist on the shared resource access, in a TDMA system the access time is:
Within FDMA systems, average service time is not affected by speed C:
The access time is:
Random Multiple Access Methods
The hosts independently decide when to use the shared resource. This behavior cause collisions, that implies retransmission of the packets. Those methods are used in scenarios where stations need to communicate rarely, or small packets.
Pure Aloha System
When a host wants to use the resource, it just does. This leas to partial or total packets overlaps. It becomes then necessary to retransmit the packets. Retransmissions are performed after a random back-off time called .
Characterization of a Pure Aloha system can be performed under the following hypotheses:
- packets have all the same length F
- : ACK/NACK packets are negligible compared to F, ACK/NACK overlaps are not taken into account
First hypothesis tells that the mean value of F is actually F: no randomness. Same as for its transmission time . The second one tells that A is small enough compared to F.
G has an arrival rate of , given the arrival rate of the retransmissions.
The distribution of arrival times is not no more poissonian. The system is being studied at steady state, so .
The vulnerability time is the time in which an overlap can happen.
Given , the probability of packets’ arrival in a time is:
Then the probability to have no collisions is:
This leas to the throughput formula for Pure Aloha systems:
The maximum point of a graph is found by performing the derivative operation: .
Supposing a poissonian traffic despite retransmissions:
Given the random variable , the back-off time is evenly distributed between and . Its mean value is:
Time for a retransmission is:
is the mean number of transmissions, so is the mean number of retransmissions. Access time is given by:
Slotted Aloha
Time is subdivided into -long time slots. Hosts access the shared resource randomly, but they wait for the start of the next time slot to communicate. Partially overlapped transmissions can no longer occur. The down arrows in the diagram below denote the time instant where the host would start to transmit.
Time slotting implies vulnerability time to be equal to the transmission time of F: . The ratio of S to G is the probability of no packets’ arrival in time:
By performing the derivatives again, given it gets as maximum throughput.
Slotted time subdivision implies synchronization between hosts, which leads to increasing realization costs.
The access time to the shared resource is given by the average number of retransmissions multiplied by the average retransmission time, to which the transmission time is added.
Remind that
Carrier Sensing Multiple Access
Within CSMA, the host that wants to communicate, before starting the transmission, tries to understand if the shared resource is already in use. It is said that the host performs carrier sensing. If the resource is busy, the host does not even start to communicate: it avoids collisions and the subsequent retransmissions.
CSMA can be distinguished into three categories:
- Non-persistent CSMA
- -persistent CSMA
- -persistent CSMA
Non-persistent CSMA
Let’s analyze the collision between packets on the time axis.
Transmission lasts , plus the propagation delay . The resource remains busy for an additional collision time . It is the time from the transmission start of the first packet to the transmission start of the last packet that cause the collision (in the case of packets collision).
Before using the shared resource again, it must be left free for an additional idle time . Its mean value is:
Note that and are random variables, unlike and .
Collision time mean value is:
Busy time mean value is:
Vulnerability time is equal to the propagation delay: , .
The probability to find the resource busy is:
The usable time is the time in which the resource is being used without suffering conflicts. It applies to every transmission:
Its mean value is:
It is now possible to define the cycle time to rewrite the throughput formula:
For , it gets
The access time to the shared resource is given by the average time of retransmissions, multiplied by the average time of the single retransmission, to which the average time of the last transmission is finally added.
Before communicating, the waiting time that hosts are subject to, is:
1-persistent CSMA
p-persistent CSMA
is the probability to decide to communicate, by having the resource free. is the probability to decide not to communicate, despite having the resource free.
In other words, when the resource is free, the host decide to communicate or not with probability .
Back-off time must be (at least) equal to the maximum network delay:
Note that non-persistent CSMA is different from 0-persistent CSMA.