Lecture 3 Notes Multiple Access Techniques I Fall22
Lecture 3 Notes Multiple Access Techniques I Fall22
3.1 Definition
The data link layer is divided into two sub-layers: Logical link control (LLC) and Medium access
control (MAC) sub layers. The LLC is responsible for flow and error control, and the lower
sublayer, MAC sublayer, is responsible for resolving access to the shared media. If the channel is
dedicated, we do not need the MAC sublayer. When stations are connected and use a common
link, called a multipoint or broadcast link, we need a multiple-access protocol to coordinate access
to the link. Many protocols have been devised to handle access to a shared link. All of these
protocols belong to a sublayer in the data-link layer called media access control (MAC). We
categorize them into three groups, as shown in Fig. 3.1.
FDMA
In frequency-division multiple access (FDMA), the available bandwidth is divided into
frequency bands. Each station is allocated a band to send its data. In other words, each band is
reserved for a specific station, and it belongs to the station all the time. Each station also uses a
bandpass filter to confine the transmitter frequencies. To prevent station interferences, the
allocated bands are separated from one another by small guard bands. Depending on applications,
this guard band can consumes up to 40% of the available bandwidth which ultimately reduces
throughput. FDMA specifies a predetermined frequency band for the entire period of
communication. This means that stream data (a continuous flow of data that may not be packetized)
can easily be used with FDMA. Fig. 3.2 shows the idea of FDMA.
TDMA
In time-division multiple access (TDMA), the stations share the bandwidth of the channel in
time. Each station is allocated a time slot during which it can send data. Each station transmits its
data in its assigned time slot. The main problem with TDMA lies in achieving synchronization
between the different stations. Each station needs to know the beginning of its slot and the location
of its slot. This may be difficult because of propagation delays introduced in the system if the
stations are spread over a large area. To compensate for the delays, we can insert guard times.
Synchronization is normally accomplished by having some synchronization bits (normally referred
to as preamble bits) at the beginning of each slot. The concept of TDMA is illustrated in Fig. 3.3.
CDMA
In code division multiple access (CDMA), all stations can send their data using the whole
bandwidth all the time. CDMA differs from FDMA in that only one channel occupies the entire
bandwidth of the link. It differs from TDMA in that all stations can send data simultaneously; there
is no timesharing. Instead of time or bandwidth, each user is allocated a unique code. The codes
must be orthogonal in that if we multiply any two codes, the result will be zero. Suppose that we
have four users to send their data using CDMA. Then, CDMA procedure can be summarized as
follows:
1. Each user is given a unique code.
2. Each user multiplies the bit he wants to send by his code.
3. The result of multiplications of all users are added together and transmitted.
4. At the receiving end, if any other user wants to decode (recovering the original bit) the bit
sent from any of the send, he multiplies the received sequence by the unique code of the
sender.
5. Then, he divides the result of the multiplication done in step 4 by the length of the code,
where the length of a code is the number of elements in the code. The result of the
division is the bit sent from the intended sender.
1 1
𝐻2 = [ ]
1 −1
1 1 1 1
1 −1 1 −1
𝐻4 = [ ]
1 1 −1 −1
1 −1 −1 1
1 1 1 1 1 1 1 1
1 −1 1 −1 1 −1 1 −1
1 1 −1 −1 1 1 −1 −1
1 −1 −1 1 1 −1 −1 1
𝐻8 =
1 1 1 1 −1 −1 −1 −1
1 −1 1 −1 −1 1 −1 1
1 1 −1 −1 −1 −1 1 1
[1 −1 −1 1 −1 1 1 −1]
Each row of each of the matrix represents a unique code. If we multiply any two codes (rows)
of a matrix using vector multiplications, the results will be zero. For example, if we multiply first
two rows of 𝐻 4 , we get 1×1+1×-1+1×1+1×-1=0. If we have two users, we can allocate code to
each user from 𝐻 2 : one row for each user. If we have three or four users, we can allocate codes
from 𝐻 4 and so on.
Suppose there are five users A, B, C, D and E. They want to send 0, +1, +1, -1, -1, respectively.
Here, 0 indicates A is not going to send any data. Whereas +1 indicates binary 1, -1 indicates
binary 0. To find the transmit sequence, first allocate code to each user. Since we have five users,
we have to allocate code from 𝐻 8 . Suppose that we allocate first five rows to the users sequentially;
i.e., First row (R1) to A, second row (R2) to B. Similarly, R3, R4 and R5 to C, D and E,
respectively.
Next, multiply the code of each user by the data he wants to send. Then, add all the results.
0 × 𝑅1 = [0 0 0 0 0 0 0 0]
1 × 𝑅2 = [1 −1 1 −1 1 −1 1 −1]
1 × 𝑅3 = [1 1 − 1 −1 1 1 −1 −1]
−1 × 𝑅4 = [−1 1 1 −1 −1 1 1 − 1]
−1 × 𝑅5 = [−1 −1 −1 −1 1 1 1 1]
[0 0 0 −4 2 2 2 − 2]
=[0 0 0 −4 2 2 2 − 2] 1
−1
1
−1
1
−1
1
[−1]
= 0 × 1 + 0 ×-1 + 0 ×1 - 4 ×-1 + 2 ×1 + 2 ×-1 + 2 ×1 - 2 ×-1
=0+0+0+4 +2-2 +2 +2
=8
The result will be multiplied by the length of the code which is 8 as the code consists of eight
elements.
The bit sent from user B =𝑅𝑒𝑐𝑒𝑖𝑣𝑒𝑑 𝑠𝑒𝑞𝑢𝑒𝑛𝑐𝑒 × 𝐵′𝑠 𝑐𝑜𝑑𝑒 /(length of the code)
=8/8= 1
Thus, the G recovers the value sent from B correctly. Similarly, any recipient can recover
the data sent from any sender as long as he has the code of the sender whose data he wants to
recover.
Reservation Technique
In the reservation method, a station needs to make a reservation before sending data. Time is
divided into intervals. In each interval, a reservation frame precedes the data frames sent in that
interval. If there are N stations in the system, there are exactly N reservation minislots in the
reservation frame. Each minislot belongs to a station. When a station needs to send a data frame,
it makes a reservation in its own minislot. The stations that have made reservations can send their
data frames after the reservation frame. Fig. 3.4 shows a situation with five stations and a five-
minislot reservation frame. In the first interval, only stations 1, 3, and 4 have made reservations.
In the second interval, only station 1 has made a reservation.
Polling Technique
Polling works with topologies in which one device is designated as a primary station and the other
devices are secondary stations. All data exchanges must be made through the primary device even
when the ultimate destination is a secondary device. The primary device controls the link; the
secondary devices follow its instructions. It is up to the primary device to determine which device
is allowed to use the channel at a given time. The primary device, therefore, is always the initiator
of a session (see Figure 3.5). This method uses poll and select functions to prevent collisions.
However, the drawback is if the primary station fails, the system goes down.
Select
The select function is used whenever the primary device has something to send. Remember that
the primary controls the link. If the primary is neither sending nor receiving data, it knows the link
is available. If it has something to send, the primary device sends it. What it does not know,
however, is whether the target device is prepared to receive. So the primary must alert the
secondary to the upcoming transmission and wait for an acknowledgment of the secondary’s ready
status. Before sending data, the primary creates and transmits a select (SEL) frame, one field of
which includes the address of the intended secondary.
Poll
The poll function is used by the primary device to solicit transmissions from the secondary devices.
When the primary is ready to receive data, it must ask (poll) each device in turn if it has anything
to send. When the first secondary is approached, it responds either with a NAK frame if it has
nothing to send or with data (in the form of a data frame) if it does. If the response is negative (a
NAK frame), then the primary polls the next secondary in the same manner until it finds one with
data to send. When the response is positive (a data frame), the primary reads the frame and returns
an acknowledgment (ACK frame), verifying its receipt.
Figure 3.6 Logical rings and physical topology in a token-passing access method
In the physical ring topology, when a station sends the token to its successor, the token cannot
be seen by other stations; the successor is the next one in line. This means that the token does not
have to have the address of the next successor. The problem with this topology is that if one of the
links—the medium between two adjacent stations—fails, the whole system fails.
The dual ring topology uses a second (auxiliary) ring which operates in the reverse direction
compared with the main ring. The second ring is for emergencies only (such as a spare tire for a
car). If one of the links in the main ring fails, the system automatically combines the two rings to
form a temporary ring. After the failed link is restored, the auxiliary ring becomes idle again. Note
that for this topology to work, each station needs to have two transmitter ports and two receiver
ports. The high-speed Token Ring networks called FDDI (Fiber Distributed Data Interface) and
CDDI (Copper Distributed Data Interface) use this topology.
In the bus ring topology, also called a token bus, the stations are connected to a single cable
called a bus. They, however, make a logical ring, because each station knows the address of its
successor (and also predecessor for token management purposes). When a station has finished
sending its data, it releases the token and inserts the address of its successor in the token. Only the
station with the address matching the destination address of the token gets the token to access the
shared media. The Token Bus LAN, standardized by IEEE, uses this topology.
In a star ring topology, the physical topology is a star. There is a hub, however, that acts as the
connector. The wiring inside the hub makes the ring; the stations are connected to this ring through
the two wire connections. This topology makes the network less prone to failure because if a link
goes down, it will be bypassed by the hub and the rest of the stations can operate. Also adding and
removing stations from the ring is easier. This topology is still used in the Token Ring LAN
designed by IBM.