Multiple Access Methods


Table of Contents

Queueing Theory Pillars

Multiple access methods techniques belong to Data-Link layer. They are a field of study under Queueing Theory.

Within a queue system:

  1. born rate λk\lambda_k is equivalent to packets arrival rate
  2. dead rate μk\mu_k is equivalent to packets departure rate
  3. mean service time E{Tx}=1/μE\big\{T_x\big\}=1/\mu
  4. utilization factor ρ=E{λ}E{Tx}\rho=E\big\{\lambda\big\}E\big\{T_x\big\}

A given number of hosts (users) have to utilize the same shared resource. Hosts access the shared resource can be in the following ways:

  1. Deterministic: the resource usage is determined beforehand,
  2. Controlled: a host asks for its turn and exclusively use the resource until the drop,
  3. Random: the access of each host is independent from each other host’s access

Characterization parameters are:

  • S: throughput,
  • G: offered load,
  • tACCt_{\rm ACC}: access time.

Throughput is the radio of correctly transmitted bits per second to the average speed of a section of the network. It is a pure number (no measure unit). Offered load is the ratio of the average bits per second a host tries to transmit to the average speed of a section of the network. tACCt_{\rm ACC} is the average time between packet arrival at the transmitting station and successful delivery at the receiving station. It is measured in seconds (sec).

Furthermore, it is possible to demonstrate that:

0S1;S=ρ;G00 \leq S \leq 1 \quad ; \quad S = \rho \quad ; \quad G \geq 0

Given the following definitions:

  • N: number of hosts that want to communicate through the shared resource,
  • C: mean transmission speed of the link (bit/sec),
  • F: length of the packet to transmit (bit),
  • tFt_F: transmission time of F (random variable)
  • τP\tau_P: propagation delay

For simplicity’s sake, the article below is based on these assumptions:

  • failure probability pp is irrelevant,
  • the distribution of inter-arrival times is poissonian

There is no optimal multiple access technique. As any good engineer would say: “It depends”. The transmission medium (physical layer) is crucial for all layers above.

Deterministic Multiple Access Methods

Channels are orthogonal to each other so that the flow of information can be distinguished.

Orthogonality means having high spectral efficiency (at the same bit-rate), using all the available bandwidth. Orthogonality requires extremely high synchronization between the local frequencies of the receiver and transmitter. Frequency deviation would cause inter-carrier interference: crosstalk.

Time Division Multiple Access

TDMA subdivides the time into different slots called waves (or plots). Each wave is then divided into N different time slot, one for each transmitting host. The hosts transmit with C bit/sec of speed every N time slot periods.

Neglecting the so-called “guard times” that are supposed to avoid overlapping signals on the slots, each station transmits at a rate of C/NC/N bit/sec.

Packets departure rate is:

μ=CNF[pkt.sec]\mu = \frac{C}{NF} \bigg[ \rm \frac{pkt.}{sec} \bigg]

Frequency Division Multiple Access

FDMA requires all stations to transmit simultaneously, but at different frequencies. Neglecting the so-called “guard band”, that should avoid overlapping signals on the frequencies, each station transmits at a rate of C/NC/N bit/sec.

Given the overall band B, the ii-th band is Bi=B/NB_i = B/N. Packets departure rate remains the same of TDMA.

Characterization parameters

For both TDMA ad FDMA, the throughput S is:

S=ρ=λμ=λNFCS = \rho = \frac{\lambda}{\mu} = \lambda \frac{NF}{C}

WqW_q is the average queuing time for a M/D/1 system:

Wq=λE{tx2}2(1ρ)=S1SNF2CW_q = \frac{\lambda E\big\{t_x^2\big\}}{2(1-\rho)}= \frac{S}{1-S}\frac{NF}{2C}

WslotW_{\rm slot} is the average time slot waiting time:

Wslot=NF2CW_{\rm slot} =\frac{NF}{2C}

txCt_x\big|_C is the average service time affected by speed C:

txC=FC  [sec]t_x\big|_C = \frac{F}{C}\; [\text{sec}]

Transmission time of F is:

tF=FCt_F = \frac{F}{C}

α\alpha is the propagation delay normalized against tFt_F:

α=τPtF\alpha = \frac{\tau_P}{t_F}

Due to several random factors that insist on the shared resource access, in a TDMA system the access time is:

tACC(TDMA)=Wq+Wslot+txC+τP==FC[S1SN2+N2+1+α]==tF[S1SN2+N2+1+α]\eq{ t_{\small \text{ACC}}^{\small (\rm TDMA)} &= W_q + W_{\rm slot} + t_x\big|_C + \tau_P =\\ &= \frac{F}{C}\bigg[\frac{S}{1-S}\frac{N}{2}+\frac{N}{2}+1+\alpha\bigg] =\\ &= t_F\bigg[\frac{S}{1-S}\frac{N}{2}+\frac{N}{2}+1+\alpha\bigg] }

Within FDMA systems, average service time is not affected by speed C:

tx=1μ=NFCt_x = \frac{1}{\mu}= \frac{NF}{C}

The access time is:

tACC(FDMA)=FC[S1SN2+N+α]t_{\small \text{ACC}}^{\small (\rm FDMA)} = \frac{F}{C}\bigg[\frac{S}{1-S}\frac{N}{2}+N+\alpha\bigg]

Random Multiple Access Methods

The hosts independently decide when to use the shared resource. This behavior cause collisions, that implies retransmission of the packets. Those methods are used in scenarios where stations need to communicate rarely, or small packets.

Pure Aloha System

When a host wants to use the resource, it just does. This leas to partial or total packets overlaps. It becomes then necessary to retransmit the packets. Retransmissions are performed after a random back-off time called tBt_B.

time analysis

Characterization of a Pure Aloha system can be performed under the following hypotheses:

  1. packets have all the same length F
        E{F}=F,  E{tF}=tF\implies E\{F\}=F,\;E\{t_F\}=t_F
  2. AFA \ll F: ACK/NACK packets are negligible compared to F, ACK/NACK overlaps are not taken into account

First hypothesis tells that the mean value of F is actually F: no randomness. Same as for its transmission time tFt_F. The second one tells that A is small enough compared to F.

G has an arrival rate of λ~=λ+λR\widetilde{\lambda} = \lambda + \lambda_R, given λR\lambda_R the arrival rate of the retransmissions.

S=λNFC=λNtFG=λ~NFC=Nλ~tF\eq{ S &= \lambda \frac{N F}{C} = \lambda N t_F \\ \\ G &= \widetilde{\lambda} \frac{N F}{C} = N \widetilde{\lambda} t_F }

The distribution of arrival times is not no more poissonian. The system is being studied at steady state, so λR0    λ~>λ\lambda_R \neq 0 \implies \widetilde{\lambda} > \lambda.

The vulnerability time tv=2tFt_v = 2 t_F is the time in which an overlap can happen.

vulnerability time

Given λTOT=Nλ~\lambda_{\rm TOT} = N \widetilde{\lambda}, the probability of kk packets’ arrival in a time tt is:

Pk(t)=(λTOTt)kk!eλTOTtP_k (t) = \frac{(\lambda_{\rm TOT} \cdot t)^k}{k!} e^{-\lambda_{\rm TOT} \cdot t}

Then the probability to have no collisions is:

P{no collisions}=SG=P{0 collisions in tv}=eNλ~2tF=e2G\mathbb{P}\{\text{no collisions}\}= \frac{S}{G}= \mathbb{P}\{0 \text{ collisions in } t_v\}= e^{-N \widetilde{\lambda} 2 t_F} = e^{-2G}

This leas to the throughput formula for Pure Aloha systems: S=Ge2GS = G e^{-2G}

pure aloha

The maximum point of a graph is found by performing the derivative operation: ddGS(G)\frac{d}{dG} S(G).

G=0.5    max {S(G)}=12e0.18G = 0.5 \implies \text{max } \{S(G)\}= \frac{1}{2e}\approx 0.18

Supposing a poissonian traffic despite retransmissions: Wq0W_q \longrightarrow 0

Given the random variable kk, the back-off time is evenly distributed between 00 and ktFk \cdot t_F. Its mean value is:

E{tB}=k2tFE\{t_B\} = \frac{k}{2}t_F

Time for a retransmission is:

trtx=tF+tA+2τP+E{tB}==tF+tA+2τP+k2tF\eq{ t_{\rm rtx} &= t_F + t_A + 2 \tau_P + E\{t_B\} = \\ &= t_F + t_A + 2 \tau_P + \frac{k}{2}t_F }

G/SG/S is the mean number of transmissions, so GS1\frac{G}{S}-1 is the mean number of retransmissions. Access time is given by:

tACC=(GS1)(tF+tA+2τP+E{tB})+tF+τP(GS1)tF(1+2α+k2)+tF+αtFtF[(GS1)(1+2α+k2)+1+α]FC[(e2G1)(1+2α+k2)+1+α]\eq{ t_{\text{ACC}} &= \bigg(\frac{G}{S}-1 \bigg) \bigg( t_F + t_A + 2 \tau_P + E\{t_B\} \bigg) + t_F + \tau_P \approx \\ & \approx \bigg(\frac{G}{S}-1 \bigg) t_F \bigg(1 + 2 \alpha + \frac{k}{2} \bigg) + t_F + \alpha t_F \approx \\ & \approx t_F \bigg[ \bigg(\frac{G}{S}-1 \bigg) \bigg(1 + 2 \alpha + \frac{k}{2} \bigg) +1 +\alpha \bigg] \approx \\ & \approx \frac{F}{C}\bigg[ \bigg(e^{2G}-1 \bigg)\bigg(1 + 2 \alpha + \frac{k}{2} \bigg)+1 +\alpha \bigg] }

Slotted Aloha

Time is subdivided into tFt_F-long time slots. Hosts access the shared resource randomly, but they wait for the start of the next time slot to communicate. Partially overlapped transmissions can no longer occur. The down arrows in the diagram below denote the time instant where the host would start to transmit.

Slotted Aloha Time

Time slotting implies vulnerability time to be equal to the transmission time of F: tv=tFt_v = t_F. The ratio of S to G is the probability of no packets’ arrival in tvt_v time:

SG=P0(tv)==eNλ~tv==eNλ~tF==eG    S=GeG\eq{ \frac{S}{G} &= P_0 (t_v) =\\ &= e^{-N \widetilde{\lambda} t_v} =\\ &= e^{-N \widetilde{\lambda} t_F} =\\ &= e^{-G} \\ \implies S &= G e^{-G} }

Pure VS Slotted Aloha

By performing the derivatives again, given G=1G=1 it gets max{S(G)}0.37\max\{S(G)\} \approx 0.37 as maximum throughput.

Slotted time subdivision implies synchronization between hosts, which leads to increasing realization costs.


The access time to the shared resource is given by the average number of retransmissions multiplied by the average retransmission time, to which the transmission time is added.

tACC=(GS1)(tF+2τP+tA+E{tB})+tF+tF2+τPtF[(eG1)(1+2α+k2)+32+α]\eq{ t_{\text{ACC}} &= \bigg( \frac{G}{S} -1 \bigg) \cdot \bigg( t_F + 2 \tau_P + t_A + E\{t_B\} \bigg) + t_F + \frac{t_F}{2} + \tau_P \approx \\ & \approx t_F \bigg[ (e^G -1)(1+2\alpha + \frac{k}{2}) + \frac{3}{2} + \alpha \bigg] }

Remind that tAtFt_A \ll t_F

Carrier Sensing Multiple Access

Within CSMA, the host that wants to communicate, before starting the transmission, tries to understand if the shared resource is already in use. It is said that the host performs carrier sensing. If the resource is busy, the host does not even start to communicate: it avoids collisions and the subsequent retransmissions.

CSMA can be distinguished into three categories:

  1. Non-persistent CSMA
  2. 11-persistent CSMA
  3. pp-persistent CSMA

Non-persistent CSMA

Non-persistent CSMA

Let’s analyze the collision between packets on the time axis.

Non-persistent CSMA caratterization

Transmission lasts tFt_F, plus the propagation delay τP\tau_P. The resource remains busy for an additional collision time tcalt_{cal}. It is the time from the transmission start of the first packet to the transmission start of the last packet that cause the collision (in the case of n2n\geq 2 packets collision).

tBUSY=tcal+tF+τPt_{\rm BUSY} = t_{cal}+t_F+\tau_P

Before using the shared resource again, it must be left free for an additional idle time tIt_I. Its mean value is:

E{tI}=1Nλ~=tFGE\{t_I\} = \frac{1}{N\widetilde{\lambda}} = \frac{t_F}{G}

Note that tcalt_{cal} and tBUSYt_{\rm BUSY} are random variables, unlike tFt_F and τP\tau_P.

Collision time mean value is:

E{tcal}=tF(α1eGαG)E\{t_{cal}\} = t_F \bigg( \alpha - \frac{1-e^{-G \alpha}}{G} \bigg)

Busy time mean value is:

E{tBUSY}=tF+τP+E{tcal}==tF(1+2α1eGαG)\eq{ E\{t_{\rm BUSY}\} &= t_F + \tau_P + E\{t_{cal}\} =\\ &= t_F \bigg(1+ 2\alpha - \frac{1-e^{-G \alpha}}{G} \bigg) }

Vulnerability time is equal to the propagation delay: tv=τPt_v = \tau_P, tcaltvt_{cal} \leq t_v.

The probability to find the resource busy is:

P0=P{resource busy}==E{tBUSY}τPE{tBUSY}+E{tI}==G(1+α)1+eGαG(1+2α)+eGα\eq{ P_0 &= \mathbb{P}\{\text{resource busy}\} =\\ &= \frac{E\{t_{\rm BUSY}\}-\tau_P}{E\{t_{\rm BUSY}\}+E\{t_I\}} =\\ &= \frac{G(1+\alpha ) -1 +e^{-G \alpha}}{G(1+2\alpha )+e^{-G \alpha}} }

The usable time tUt_U is the time in which the resource is being used without suffering conflicts. It applies to every transmission:

tU=tFP{no collisions}==tFP{0 arrival in tv}==tFP0(τP)==tFeNλ~τP\eq{ t_U &= t_F \cdot \mathbb{P}\{\text{no collisions}\} =\\ &= t_F \cdot \mathbb{P}\{0 \text{ arrival in } t_v\} =\\ &= t_F \cdot P_0 (\tau_P) =\\ &= t_F \cdot e^{-N\widetilde{\lambda}\tau_P} }

Its mean value is:

E{tU}=tFeGαE\{t_U\} = t_F \cdot e^{-G \alpha}

It is now possible to define the cycle time tCYCLE=tBUSY+tIt_{\rm CYCLE} = t_{\rm BUSY} + t_I to rewrite the throughput formula:

S=E{tU}E{tCYCLE}==tFeGαtF(1+2α1eGαG)+tFG==GeGαG(1+2α)+eGα\eq{ S &= \frac{E\{t_U\}}{E\{t_{\rm CYCLE}\}} =\\ &= \frac{t_F \cdot e^{-G \alpha}}{t_F \bigg(1+ 2\alpha - \frac{1-e^{-G \alpha}}{G} \bigg) + \frac{t_F}{G}} =\\ &= \frac{G e^{-G \alpha}}{G(1+2\alpha)+e^{-G \alpha}} }

S 1st graph

For α0\alpha \longrightarrow 0, it gets S1S \longrightarrow 1

S 2nd graph

The access time to the shared resource is given by the average time of retransmissions, multiplied by the average time of the single retransmission, to which the average time of the last transmission is finally added.

tACC=tF[(GS1)(1+2α+k2+k2P01P0)+k2P01P0+1+α]t_{\text{ACC}} = t_F \bigg[\bigg(\frac{G}{S}-1\bigg)\bigg(1+2\alpha+\frac{k}{2}+\frac{k}{2}\frac{P_0}{1-P_0}\bigg) +\frac{k}{2}\frac{P_0}{1-P_0}+1+\alpha \bigg]

Before communicating, the waiting time that hosts are subject to, is:

tLIB=tFk2P01P0t_{\rm LIB} = t_F \frac{k}{2} \frac{P_0}{1-P_0}

1-persistent CSMA

1-persistent CSMA

p-persistent CSMA

p-persistent CSMA

P{}=p\mathbb{P}\{\cdot\}=p is the probability to decide to communicate, by having the resource free. P{}=1p\mathbb{P}\{\cdot\}=1-p is the probability to decide not to communicate, despite having the resource free.

In other words, when the resource is free, the host decide to communicate or not with probability pp.

Back-off time must be (at least) equal to the maximum network delay: tBτPMAXt_B \geq \tau_{P_{\rm MAX}}

Note that non-persistent CSMA is different from 0-persistent CSMA.