Beruflich Dokumente
Kultur Dokumente
187
among geographically distributed, fixed or mobile, user second; (c) the total channel has a bandwidth of W hertz
terminals and to provide improved frequency management modulated at 1 bit/hertz-sec (giving a channel capacity of
strategies to meet the critical shortage of r.f. spectrum. The W bits/sec). Thus, with M users in this FDMA mode, each is
research presented in this paper is an integral part of the assigned a channel of W / M bits/sec. Each such channel
total design effort, of this system which encompasses many behaves as an M/D/l queueing system giving an average
other research topics. A number of these are considered in time in system 5) (waiting plus transmission) as follows :12
this set of papers. In this paper, we are concerned with one
aspect of design and analysis, namely the consideration of
various random access protocols, their behavior, and the
difficult problem of controlling a channel which must carry 5)= - - - - (1)
its own control information. Specifically, we do not investigate I-p
the networking issues when radio relays (repeaters) are where p=Mbm/W. .
required to extend the range of the terminals; such issues Weare assuming that queueing is permitted at each ter-
(layout, routing, etc.) are dealt with in References 1 and 4. minal. However, the analysis for slotted ALOHA assumes an
We consider an environment in which all terminals are within infinite population of users with an aggregate input rate of
radio range and line-of-sight of a common receiver station. M A packets per second and this produces an upper bound
One of the first protocols studied in conjunction with ground on delay. (We note that a finite population model with M
radio and satellite packet switching was "pure ALOHA" as users at rate A and with queueing permitted will produce
mentioned above. In this mode, users are permitted to fewer collisions than the infinite population would since each
transmit any time they desire. If they receive an acknowl- terminal will avoid conflicts among its own packets).
edgment within some predetermined time-out period, then Equation (1) for FDMA is compared with the results for
they know their transmission was successful. Otherwise delay in slotted ALOHA with an infinite population (see
they assume a multi-access collision occurred and they must Reference 8 and Figure 7 below) as follows. We consider the
retransmit. To avoid the same collision again (and forever!) (M, A) plane in Figure 1, in which we represent constant 5)
anyone of many schemes may be used for introducing a contours. Comparing the delay performance of the two
random retransmission delay, thereby spreading the con- systems, we note that when we are in presence of bursty
flicting packets over time. It is known that the maximum users (small A), slotted ALOHA can support many more
fraction of successful packet transmissions on the average is users than FDMA, for the same packet delay. For example, at
simply Y2e( ~ 18 percent) for random ALOHA.7 This is 5)=0.1 sec, slotted ALOHA can support a number of users
abominably small compared to the maximum of 100 percent which is over 3 orders of magnitude greater than the number
successful if transmission were perfectly scheduled to avoid that FDMA can support when A= 10-3 packet/sec; as A
all collisions. A second method for using the radio channel is increases (i.e., as the burstiness decreases), this difference
to modify the completely unsychronized use of the ALOHA reduces until at A ~ 5 the two systems can support roughly
channel by "slotting" time into segments whose duration is an equal number of users. Beyond this point, FDMA is
exactly equal to the transmission time of a single packet superior. This crossover point clearly depends upon the value
(assuming constant length packets). If we require each user of 5) examined. In fact, slotted ALOHA can support total
to start his packets only at the beginning of a slot, then when traffic only in the range M Abm/W < 1/e""'" .37 and beyond
two packets conffict, they will overlap completely rather
than partially, providing an increase in channel efficiency.
This method is referred to as "slotted ALOHA."9 The
optimum performance of this system is twice that of random
ALOHA, namely l/e( ~37 percent); this is still poor. Not
only is the capacity of the ALOHA channels wanting, but so
too is the average delay 5) until successful transmission; we
give the throughput-delay characteristic later in Figure 7.
Let us compare slotted ALOHA to Frequency Division
IVlultiple Access (FDMA) which is a common method for
partitioning a channel into a given number of separate sub-
channels which are assigned on a point-to-point basis be-
t\,veen user pairs; synchronous Time Division Multiple
Access (TDMA) is equivalent to FDMA so far as we are
concerned here (we neglect guard bands). The fixed channel 10 .1 SEC
assignment in FDMA is effective in preventing collisions but
succeeds in this at the expense of possibly poor utilization of
each channel since the smoothing effect of a large population
1
is absent. To analyze FDMA, we adopt the following assump- 10.4 10.3 1Ir2 10.1 1 10 102 103
tions: (a) an assumed finite (but large) population of M USER INPUT RATE A (PACKETS/SECOND)
users; (b) each user generates a new fixed length packet Figure I-FDMA and slotted ALOHA ramdom access:
(of bm bits) according to a Poisson process at a rate A per Performance with 100 KBPS bandwidth
106~----------------------~~---~---~
that, FDMA will always be superior until it too saturates at
- - FDMA
M Abm/W = 1; this tradeoff is clearly evident in the curves - - - SLOTTED ALOHA
of Reference 10.
The above result can be alternatively presented in the 105 .............. 10.5 SEC
--~------
that a terminal takes after sensing the channel. However, in the channel busy upon its arrival. On the other hand, this
all cases, when a terminal determines (by the absence of a scheme may introduce idle periods between two consecutive
positive acknowledgment) that its transmission was un- non-overlapped transmissions. More precisely, a ready
successful, then it reschedules the transmission of the packet terminal senses the channel and operates as follows:
according to a randomly distributed retransmission delay.
At this new point in time, the transmitter senses the channel • If the channel is sensed idle, it transmits the packet.
and repeats the algorithm dictated by the protocol. At any • If the channel is sensed busy, then the terminal schedules
instant a terminal is called a ready terminal if it has a packet the retransmission of the packet to some later time
ready for transmission at this insta:nt (either a new packet according to the retransmission delay distribution. At
just generated or a previously confi'icted packet rescheduled this new point in time, it senses the channel and repeats
for transmission at this instant) . the algorithm described.
A terminal may, at anyone time, either be transmitting
or receiving (but not both simultaneously). However, the A slotted version of this Non-Persistent CSMA can also be
delay incurred to" switch from one mode to the other is considered by slotting the time axis and synchronizing the
negligible. All packets are of constant length and are trans- transmission of packets in much the same way as for the
mitted over an assumed noiseless channel (i.e., the errors in previous protocol.
packet reception caused by random noise are not considered
to be a serious problem and are neglected in comparison with
errors caused by overlap interference). The system assumes p-Persistent CSMA
non-capture (i.e., the overlap of any fraction of two packets
results in destructive interference and both packets must be The two previous protocols differ by the probability (one
retransmitted). We further simplify the problem by as- or zero) of not rescheduling a packet which upon arrival
suming the propagation delay r (small compared to the finds the channel busy. In the case of a I-Persistent CSMA,
packet transmission time) to be identical* for all source- we note that whenever two or more terminals become ready
destination pairs. during a transmission period, they wait for the channel to
become idle (at the end of that transmission) and then they
all transmit with probability one. A conflict will also occur
I-Persistent CSMA with probability one! The idea of randomizing the' starting
times of transmission of packets accumulating at the end of a
The I-Persistent CSMA protocol is devised in order to transmission period suggests itself for interference reduction
(presumably) achieve acceptable throughput by never and throughput improvement. The scheme' consists of in-
letting the channel go idle if some ready terminal is available. cluding an additional parameter p, the probability that a
l\10re precisely, a ready terminal senses the channel and ready packet persists (1- p being the probability of delaying
operates as follows: transmission by r seconds). The parameter p will be chosen
so as to reduce the level of interference while keeping the idle
• If the channel is sensed idle, it transmits the packet with periods between any two consecutive non-overlapped trans-
probability one. missions as small as possible .
• If the channel is sensed busy, it waits until the channel More precisely, the protocol consists of the following: the
goes idle (i.e., persisting on transmitting) and only then time axis is slotted where the slot size is r seconds. For
transmits the packet (with probability one-hence, the simplicity of analysis, we consider the system to be syn-
name I-Persistent) . chronized such that all packets begin their transmission at
the beginning of a slot.
A slotted version of the I-Persistent CSMAcan be con- Consider a ready terminal:
sidered in which the time axis is slotted and the slot size is r
seconds (the propagation delay). All terminals are syn- • If the channel is sensed idle, then
chronized and are forced to start transmission only at the
beginning of a slot. When a packet's arrival occurs during a ----:-with probability p, the terminal transmits the packet.
slot, the terminal senses the channel at the beginning of the -with probability I-p, the terminal delays the trans-
next slot and operates according to the protocol described mission of the packet by r seconds (i.e., one slot). If
above. at this new point in time, the channel is still detected
idle, the same process above is repeated; otherwise,
some packet must have started transmission, and our
Non-Persistent CSMA terminal schedules the retransmission of the packet
according to the retransmission delay distribution
While the previous protocol 'was meant to make "full" use (i.e., acts as if it had conflicted and learned about the
of the channel, the idea here is to limit the interference
conflict) .
among packets by always rescheduling a packet which finds
• If the ready terminal senses the channel busy, it waits
* By considering this cons tan t propagation delay equal to the largest until it becomes idle (at the end of the current trans-
possible, one gets lower (i.e., pessimistic) bounds on performance. mission) and then operates as above.
Note that I-Persistent is the special case of p-Persistent with Slotted I-Persistent CSMA
p=l.
Ge-G(l+a) [1 +a - e-aG ]
S= ----=----~----=-- (2)
Throughput equations (1 +a) (1-e- aG ) +ae-G(l+a)
(I) 10
<.7
Z NON-PERStSTENT CSMA
..J
.8 0=0.01 :::>
o
w
:I:
.03 - PERSISTENT CSMA (,J
.6
.1 - PERSISTENT CSMA (I)
~ 5
<t 0.03-PERSISTENT CSMA """"-.."'--
(I)
.4 z
o
en
(I)
.2 i
(I)
Z
<t
a:
~
g.Ob1=::::=---0.l..1-----....J1--.=::::..-~--=-----;!100
IL.
G (OFFERED CHANNEL TRAFFIC) o
a:
Figure 4-Throughput for the various random access modes (a=O.Ol) w
CO
~
:>
z 1·PERSISTENT CSMA
z
Delay performance <t
w
~ o .2 .4 .6 .8
We introduce at this point the expected packet delay ~ S (THROUGHPUT)
defined as the average time from when a packet is generated
until it is successfully received. Our principal concern in this Figure 6-CSMA and ALOHA:
section is to investigate the tradeoff between the average GIS versus throughput (a=O.01)
delay and the throughput S.
For the present study, it is assumed that the acknowledg-
a minimum delay can be achieved by choosing an optimal
ment packets are always correctly received with probability
X. Such an optimization problem is difficult to solve analyti-
one. The simplest way to accomplish this is to create a
cally and simulation techniques have been employed.
separate channel to handle acknowledgment traffic. If suffi-
cient bandwidth is provided, overlaps between acknowledg-
B~fore we proceed with the discussion of the simulation
results, we compare the various access modes in terms of the
ment packets are avoided, since a positive acknowledgment
average number of transmissions (or average number ?f
packet is created only when a packet is correctly received,
schedulings) GIS. For this purpose, we plot GIS versus S m
and there will be at most one such packet at any given time.
Figure 6 for the ALOHA and CSMA modes, when a=O.Ol.
Thus, if T a denotes the transmission time of the acknowl-
Note that CSMA modes provide lower values for G/ S than
edgment packet on the separate channel, then the time-out
the ALOHA modes. Furthennore, for each value of the
for receiving a positive acknowledgment is T+r+Ta+r,
throughput, there exists, a value of p such that p-Persistent
provided that the processing time needed to perform the
is optimal. For small values of S, p= 1 (i.e., I-Persistent) is
sumcheck and to generate the acknowledgment packet is
optimal. As S increases, the optimal p decreases.
assumed negligible. _
The Delay ~ is a function of Sand X. Thus, for each S,
Simulation results
)0-
e::(
..J
w 10
20
I1 b.
Definitions and representation of configurations with hidden
elements
2
J know the hearing matrix of the population. See References
14 and 15). Let h(i) be the set of groups that group i can hear.
We shall further assume that each group i consists of a
large number of users who collectively form an independent
Poisson source with an aggregate mean packet generation
1 rate Ai packets per second such that L:~1 Ai = A. Let 8 i = AiT .
o .1 .2 .3 .4 .5 .6 .7 .8 .9 and 8 = AT = L:~1 8 i ; S is the total throughput of the
S (THROUGHPUT) channel.
Figure 7-CSMA and ALOHA: Throughput-delay trade-offs from Let S= (81,82 , ••• , 8 N ).
simulation (a=O.Ol)
We can write S as S = 8U such that
the system already "reaches" the asymptotic results (The vector U describes a direction in N-dimensional space.)
(K---7oo), i.e., for some finite values of X, assumption The capacity of the channel along the directionU is defined as
(A2) is satisfied and delays are acceptable. Simulation
experiments were conducted to find the optimal delay, C(U) = Maximum 8
O~S~l
that is, the value of X(8) which allows one to achieve
the indicated throughput with the minimum delay. such that the set of inputs determined by the vector S(U) is
achievable. Equivalently, we say that a set S (U) of input
Finally, in Figure 7, we give the throughput-minimum rates is feasible if and only if
delay trade-off for the three Carrier Sense Multiple Access S(U) :::;C(U)
modes and a =0.01. This is the basic performance curve.
LetG i denote the mean offered traffic rate of group i(G i 2 Si).
Let G= (G I , G2 , ••• ,GN ) and G= L:~l Gi • Finally, we
THE EFFECT OF HIDDEN TERMINALS ON consider X to be the same for all groups and the assumptions
CHANNEL CAPACITY FOR CARRIER SENSE "Concerning the retransmission delay and the independence of
MULTIPLE ACCESS arrivals for the offered traffic to still hold true.
.8
INDENDENT GROUPS
For I-Persistent CSMA a = 0.01
.6 NON·PERSISTENT CSMA
PURE ALOHA
.1
.7~------------------------------------------~
ture. 16 The quality of the decision can be characterized by
two probabilities:
.6
.3
The detector at the receiver consists of a filter, an integrator
and a threshold decision box. Assuming the step response of NON.pERSISTENT BTMA
F = 10.3
the busy tone detect filter to be exponential, and considering W = 100 kHz
the same peak power to be used for the busy tone as for the 1
b",
= 100 ~SEC
= 1000 BITS
message on the message channel, then the signal-to-noise a ~ 0.01
.8,---------------------------------------------,
NON.pERSISTENT BTMA
T = 100 "SEC
CASE I
a ~ 0.01
W • 1 MHz
;J' { b". = 104 BITS
1;" .5 ~ .7L-------------------~~:---------------------l
~ ~
i i
X .4
..: X
::. ..:
>
::.
....
~ .3 ~
(3
5 ~ .6
NON.pERSISTENT BTMA
~ .2 W = 100 kHz ...J
w
z T = 100 ~SEC Z
z
5 bm = 1000 BITS
a ~ 0.01 5
.5~--~~~~~~----~~~~~~----~~~~~~
10.3
FALSE ALARM PROBABILITY F
Figure ll-BTMA: Channel capacity (maximized over td) versus if/ Figure 12-BTMA: Channel capacity
(maximized over td and if/) versus F
LL. F
Case II) is obtained for F---?1. However, the channel capacity 0
1/1
IX:
is not very sensitive to variations of F. Case II offers a w 5
CD ttt
channel capacity higher than that offered by Case I; we :::ii!
::l
Z
note that this gain does not consider other factors such as w
increased power requirements. * ~
<
IX:
To compare the delay performance of BTMA for various w
> = 10.2
values of the system parameters, we first consider the quan- <
= 10.2
2
tity G/ S, the average number of transmissions and sched- = 7 x ,0-4
ulings that a packet incurs before successful transmission. = 10.1 SEC
the message, the terminal sends, on the request channel, a departure times (i.e., time between successive successful
request packet containing information about the address of packets) of the Non-Persistent CSMA simulator and com-
the terminal and, in the case of variable length or multi- paring it to the exponential density function. Except for
packet messages, the length of the message. At the correct interarrivals in the range of one or two packet transmission
reception of the request packet, the scheduling station com- times the match is acceptable and the smaller Sr is, the more
putes the time at which the message channel will be available valid is the assumption. Under this assumption, the message
and transmits back to the terminal, on the answer-to- channel can be modeled as an M/G/1 queueing system. 12
request channel, an answer packet containing the address of The maximum bandwidth utilization is determined by the
the terminal and the time at which it can start transmission. fact that the throughput on the request channel does not
exceed its capacity (under the access mode in use) and the
utilization of the message channel does not exceed one.
Analysis
The total delay is composed of the two following com- Numerical results
ponents:
Systelll Capacity
(i) ~1,
the time for the request packet to be successfully
received at the station, and In Figure 15 we plot system capacity versus '1/ (which
(ii) ~2, the time between reception of the request packet represents a relative measure of the overhead due to control
at the station and the end of the message transmission. information) for the following access modes:
Let W m be the bandwidth allocated to the message channel Pure ALOHA SRMA
and (J = W m/W. The answer-to-request channel is an inter- Slotted ALOHA SRMA
ference-free channel since the station is the only transmitter. Slotted N on-Persistent Carrier Sense SRlVIA
That is, answer packets can be queued at the station and (rW/b m =O.01, 0.05)
transmitted without conflicts. It is possible to give the
answer-to-request channel enough bandwidth Wa such that We note that the system capacity in SRl\1A reaches 1 for
answer packets do not incur any queueing delay at the very small '1/. A case of interest considered throughout the
station. Indeed, if br and ba are the number of bits per request paper corresponds to bm = 1000 bits and br anywhere from 10
packet and answer-to-request packet respectively, then Wa to 100 bits (b r is directly related to the number of terminals
should satisfy in the population, since addressing information increases with
increasing M). Thus, the interesting range for '1/ is 0.01 to
(14) 0.1. For '1/ >0.01, the effect on the system capacity of the
random access used to operate the request channel is impor-
where Wr is the bandwidth assigned to the request channel. tant: a large improvement is gained when t~ request channel
Let A be the average number of messages generated per is operated in slotted Non-Persistent CSMA as compared to
second. As usual, we shall assume the generation process to ALOHA. On the other hand, in comparing the capacity of
be Poisson. The maximum generation rate that the total 'SRMA to the capacity of random access modes, we note that
bandwidth W can ever handle is W/b m • The channel utiliza- SRMA can be superior only for relatively small values of '1/.
tion denoted again by S is then expressed as
(15)
Since both control packets contain the same type of informa-
tion, it is reasonable to assume that ba = br and therefore let
'I/=br/b m. We further let W r = Wa. In this case we have .8 SLOTTED
NON-PERSISTENT
1a = 0.01 I
CSMA a = 0.05 \
(16) .6
100 .---------------------------------~r_----~
SLOTTED NON-PERSISTENT Figure 17-Minimum packet delay in SRMA
CARRIER-SENSE SRMA
TW/b m = 0.01 I
I
{j = 2 I
50 I
17 = 0.01 I
17 = 0.1
Delay Considerations
I
S = .7
Let us restrict ourselves here to r W Ibm = 0.01. :For given 1]
~
.c
E and S, the total message delay ~ is a function of (J, the band-
u..
o 20
width assignment. As an example, we show slotted N on-
~
Persistent Carrier Sense SRMA with fixed message length
Z (packet) and rWlb m =O.01 in Figure 16. Similar plots can be
:::>
obtained for other random access modes used for the request
~
channel. For each value of S, (J must lie in a feasible range
~ 10
...I
W
denoted as [(Jmin, (Jinax]; (Jrnin and (Jtnax are determined by the
o saturation of the message channel and the request channel
I-
w
~
respectively. For small values of (J ((J close to (Jmin) , the major
u
f 5
part of delay is due to ~2; for (J close to (Jmax, it is due to ~1.
...I The optimal bandwidth assignment is defined as the value
«
I- of () which minimizes total delay. We note that the higher the
g
load is, the more critical is the choice of ()opt. The minimum
delay for ALOHA-SRMA and Slotted Non-Persistent
2
Carrier Sense SRMA is shown in Figure 17 as a function of S
for various values of 1]. First, in comparing the two systems
between themselves, we note again an important improve-
ment in using CSMA for the request channel. The improve-
1 ~ __ ~ __ ~ __-'-__- L__ ~ __- L__~__~__~~~ ment is more important when larger values of 1] are involved.
o .2 .4 .6 .8 In comparing Carrier Sense SR1\1A with CSMA or BT1\1A,
BANDWIDTH ASSIGNMENT (j
we note that, unless 1] is large (0.1 and above), there is a
Figure 16-Slotted non-persistent carrier sense SRMA: value of S below which CSMA or BTMA performs better
Packet delay versus bandwith assignment than SRMA and above which the opposite is true.
Split-Channel Reservation Multiple Access (SRMA) was Computer Communications," Fall Joint Computer Conference,
considered which employs random access techniques for the AFIPS Conference Proceedings, 1970, Vol. 37, pp. 281-285.
8. Kleinrock, L. and S. S. Lam, "Packet-Switching in a Slotted
request channel. The capacity of the channel under SRMA
Satellite Channel," National Computer Conference, New York,
is heavily affected by the level of overhead introduced. June 4-8, 1973, AFIPS Conference Proceedings, 1973, Vol. 42,
Moreover, the throughput delay performance is significantly pp. 703-710.
dependent on the performance of the random access mode 9. Abramson, N., "Packet Switching with Satellites," National Com-
used on the request channel: aNon-Persistent Carrier Sense puter Conference, New York, June 4-8, 1973, AFIPS Conference
Proceedings, 1973, Vol. 42, pp. 695-702.
SRMA provides better performance than ALOHA-SRMA.
10. Roberts, L. G., "Dynamic Allocation of Satellite Capacity Through
In all these comparisons we note that most of the channel Packet Reservation," National Computer -Conference, New York,
capacity which was unavailable with pure and slotted June 4-8, 1973, AFIPS Conference Proceedings, 1973, Vol. 42,
ALOHA may be recovered by use of these more sophisticated pp. 711-716.
access schemes. 11. Spring Joint Computer Conference, AFIPS Conference Proceedings,
1970, Vol. 36, pp. 543-597; 1972, Vol. 40, pp. 243-298.
12. Kleinrock, L., Queueing Systems, Vol. I, Theory, Vol. II, Computer
Applications, Wiley Interscience (1975).
13. Kleinrock, L. and F. A. Tobagi, "Packet Switching in Radio
REFERENCES Channels: Carrier Sense Multiple Access Modes and their Through-
put-Delay Characteristics," to appear in IEEE Transactions on
Communications.
1. Kahn, R. E., "The Organization of Computer Resources into a 14. Tobagi, F. A. and L. Kleinrock, "Packet Switching in Radio
Packet Radio Network," NCC 1975 Proceedings. Channels: The Hidden Terminal Problem and the Carrier Sense
2. Abramson, N., R. Binder, F. Kuo, A. Okinaka, and D. Wax, Multiple Access Mode with a Busy Tone," to appear in IEEE
"ALOHA Packet Broadcasting-A Retrospect," NCC 1975 Transactions on Communications.
Proceedings. 15. Tobagi, F. A., Random Access Techniques for Data Transmission
3. Garrett, J. and S. C. Fralick, "A Technology for Packet Radio," Over Packet Switched Radio Networks, School of Engineering and
NCC 1975 Proceedings. Applied Science, University of California, Los Angeles, UCLA-
4. Frank, H., R. Van Slyke, and I. Gitman, "Packet Radio Network ENGR 7499, December 1974.
Design-System Considerations," NCC 1975 Proceedings. 16. Wainstein, L. A. and V. D. Zubakov, Extraction of Signals from
5. Fralick, S. C., D. Brandin, F. Kuo, and C. Harrison, "Digital Noise, Prentice Hall, Englewood Cliffs, New Jersey, 1962.
Portable Terminals," NCC 1975 Proceedings. 17. Chu, W. W., "A Study of Asynchronous Time Division Multiplexing
6. Burchfiel, J., R. Tomlinson and M. Beeler, "Functions and Structure for Time-Sharing Computer Systems," Spring Joint Computer
of a Packet Radio Station," NCC 1975 Proceedings. Conference, AFIPS Conference Proceedings, 1969, Vol. 35, pp.
7. Abramson, N., "THE ALOHA SYSTEM-Another Alternative for 669-678.