SlideShare a Scribd company logo
PACKET RADIO
PROTOCOL
PRESENTED BY:
PRIYA KAUSHAL
ROLL NO. 152615
ME(ECE) REGULAR
PRESENTED TO:
Dr. S B L SACHAN
Introduction
Multiple access control
channels:
•Each node is attached
to at transmitter and
receiver which
communicates via a
channel shared by
other nodes.
Introduction
•Transmission from any
node is received by
other nodes.
Introduction
•Multiple access issues
•If more than one node transmit at a time on
the control channel to BS, a collision occurs
•How to determine which node can transmit
to BS?
•Multiple access protocols
•Solving multiple access issues
Channel Sharing Techniques
Classification of Multiple Access
Protocols
Contention protocols
•Contention protocols
resolve a collision after it
occurs. These protocols
execute a collision
resolution protocol after
each collision
Collision-free protocols
•Collision-free protocols
(e.g., a bit-map protocol
and binary countdown)
ensure that a collision can
never occur.
RANDOM ACCESS
•A station that has data to
send uses a procedure
defined by a protocol to
make a decision on whether
or not to send.
•This decision depends on
the state of the medium(idle
or busy).
RANDOM ACCESS
•There is no scheduled time for a station to transmit.
Transmission is random among the stations. That is why
these methods are called random access.
•If more than one station tries to send at a time , there is
an access conflict - collision
RANDOM ACCESS
•No rules specify which station should send next .
Stations compete with one another to access the
medium. That is why these methods are also
called contention methods.
Packet Radio
•In packet radio access techniques,
many subscribers attempts to
access a single channel in
uncoordinated manner.
•Transmission is done by using bursts
of data.
Packet Radio
•Collision from the simultaneous transmissions of
multiple transmitters are detected at each base
station receiver.
• In which case an ACK or NACK signal is
broadcast by the base station to alert the
desired user ( and all other users) of received
transmission .
Packet Radio
•The ACK signal indicate an
acknowledgment of received burst from
particular user by the base station.
•NACK (negative acknowledgment) indicate
that the previous burst was not received
correctly by the base station.
Packet Radio
• By using ACK and NACK signals, PR system
employs perfect feedback, even though
traffic delay due to collisions may be high.
Packet Radio Multiple access
•Easy to implement
•But low spectral efficiency include delays
•The subscriber use contention technique to
transmit on common channel.
•ALOHA protocol , developed for early satellite
system, are the best example of contention
technique
ALOHA Protocol
•ALOHA allow each
subscriber to transmit
whenever they have
data to send.
ALOHA Protocol
•The transmitting
subscriber listen to the
acknowledgment
feedback to determine
if transmission has
been successful or not.
ALOHA Protocol
•If the collision
occur, the
subscriber wait a
random amount
of time, and then
re-transmits the
packet.
Advantage
•The advantage of packet contention
technique is the ability to serve a large
number of subscriber with virtually no
overhead.
Performance
•The performance of contention technique can be
evaluated by the
• Throughput(T): Which is defined as the average
number of messages successfully transmitted per unit
time.
•Average delay(D): Experienced by a typical message
burst.
Performance
•Vulnerable Period (Vp): which is defined as
the time interval during which the packets
are susceptible to collisions with
transmission from other users.
Vulnerable Period
• The packet A will suffer a
collision if the other terminals
transmit packets during the
periods t ₁ to t₁+2τ.
• Even if only a small portion of
packet A sustains a collision,
the interference may render
the message useless.
Packet Radio Protocol
•It is assumed that all the packets sent by all users
have a constant packet length and fixed channel
data rate and all other users may generate new
packets at random time intervals.
•Furthermore, it is assumed that packet
transmissions having a mean arrival rate of λ packet
per second.
Packet Radio Protocol
•If τ is the packet duration in seconds then the traffic
occupancy or throughput R of a packet radio network
is given by
R=λτ
•R is the normalized channel traffic due to arriving and
buffered packets and is a relative measures of the
channel utilization.
Packet Radio Protocol
•If R>1 , then the packets generated by the users
exceed the maximum transmission rate of the
channel. Thus, to obtain a reasonable throughput,
the rate at which new packets are generated must
lie within 0<R<1.
•Under the condition of normal loading, throughput T
is the same as the total offered load, L.
Packet Radio Protocol
•The normalized throughput is given as the total
offered load times the probability of successful
transmission:
T=R.Pr[no collision]=λτ.Pr[no collision] (1)
Where Pr[no collision] is the probability of the user
making successful packet transmission.
Probability
•The probability that n packets are generated by the
user population during a given packet duration
interval is assumed to be the poisson distributed and
is given by:
Pr(n)= Rⁿe⁻ᴿ/nᴉ
Probability
•A packet is assumed successfully transmitted if there
are no other packets transmitted during the given
time interval. The probability that zero packets are
generated (i.e., no collision) during this interval is
given by
Pr(0)=e⁻ᴿ
Multiple access protocols
RANDOM ACCESS
•ALOHA
(Pure ALOHA and Slotted ALOHA)
•CSMA
•CSMA/CD
•CSMA/CA
ALOHA Protocol
•ALOHA is developed in the 1970s at the University of
Hawaii.
•The basic idea is simple:
•Let users transmit whenever they have data to be sent.
•If two or more users send their packets at the same time,
a collision occurs and the packets are destroyed.
ALOHA Protocol
• The original ALOHA protocol is called pure
ALOHA.
• Each station sends a frame whenever it has a frame
to send.
• However , there is only one channel for them to
share.
ALOHA Protocol
•If two or more stations transmit at same time, there is
a collision
•the sender waits a random amount of time and
sends it again.
•The waiting time must be random. Otherwise, the
same packets will collide again
Types of ALOHA Protocol
Pure ALOHA
•The Pure ALOHA protocol is a random access protocol
used for data transfer.
•A user accesses a channel as soon as a message is ready
to be transmitted.
•After a transmission, the user wait for an
acknowledgement on either the same channel or a
separate feedback channel.
Pure ALOHA
• In case of collisions (i.e., when NACK is received), the
terminal waits for a random period of times and
retransmits the message.
• As the number of users increase, a greater delay
occurs because the probability of collision increases.
Pure ALOHA
•In fig there are four
stations that contended
with one another for
access to shared channel.
All these stations are
transmitting frames.
Pure ALOHA
•Some of these frames
collide because multiple
frames are in contention
for the shared channel.
Only two frames, frame
1.1 and frame 2.2 survive.
All other frames are
destroyed.
Pure ALOHA
•Whenever two
frames try to occupy
the channel at the
same time, there will
be a collision and
both will be
damaged.
Pure ALOHA
•If first bit of a new frame
overlaps with just the
last bit of a frame almost
finished, both frames
will be totally destroyed
and both will have to be
retransmitted.
Pure ALOHA
•For the ALOHA protocol, the vulnerable is double the
packet duration.
•Thus the probability of no collision during the interval
of 2τ is found by evaluating Pr(n) given as
Pr(n)=(2R)ⁿe⁻²ᴿ/nᴉ at n=0 (2)
Pure ALOHA
•One may evaluate the mean of eqn(2) to determine
the average number of packets sent during 2τ.
•The probability of no collision is Pr(0)=e⁻²ᴿ.
•The throughput of the ALOHA protocol is found by
equation(1)
T=Re⁻²ᴿ
Slotted ALOHA
•In slotted ALOHA,
time is divided into
equal time slots of
length greater than
the packet duration
τ.
Slotted ALOHA
•The subscriber each
have synchronized clocks
and transmit a message
only at the beginning of
a new time slot, thus
resulting in a discrete
distribution of packets .
Slotted ALOHA
•This prevents partial
collisions, where one
packet collides with a
portion of another.
Slotted ALOHA
•As the number of users
increase, a greater a
delay will occur due to
complete collision and
resulting repeated
transmissions of those
packets originally lost.
Slotted ALOHA
•The number of slots which a transmitter waits prior to
retransmitting also determines the delay
characteristics of the traffic.
•The vulnerable period for slotted ALOHA is only one
packet duration, since partial collisions are prevented
through synchronization.
Slotted ALOHA
•The probability that no other packets will be
generated during the vulnerable period is e⁻ᴿ.
•The throughput for the case of slotted ALOHA is thus
given by
T=R e⁻ᴿ
ALOHA and slotted ALOHA
Numerical(1)
Problem: 56 kbps unslotted Aloha channel shared
by N stations. Stations: 1 packet(1000 bits)
every 100 seconds.
Solution:
a) Required data rate
Numerical(1)
b). Available data rate:
•The pure Aloha has a maximum efficiency of 18.4
% therefore the maximum available data rate is:
•Available Data Rate = 0.184*56000bps =
10.304kbps
Numerical(1)
c). Maximum Number of Stations:
The maximum sustainable number of stations is:
N=10304/10 =1030
Numerical(2)
•Problem: Slotted aloha channel with 10% of the
slots are idle.
•Solution:
a). What is the channel load R?
The fraction of idle slots is: P(idle)=0.1
Since P (idle)= e⁻ᴿ →R=−ln(P(idle) = −ln(0.1) = 2.3
R=2.3
Numerical(2)
b). What is the system throughput in
packets/slot?
The throughput is:
throughput = P(success)=Re⁻ᴿ=23%
Numerical(2)
c). Is the channel overloaded or under-loaded?
• The maximum throughput (36.8%) is achieved
for R=1.
•For R>1 the channel efficiency drops because it
is overloaded.
Thank You

More Related Content

What's hot

TDMA
TDMATDMA
2.2 frequency division multiple access
2.2   frequency division multiple access2.2   frequency division multiple access
2.2 frequency division multiple access
JAIGANESH SEKAR
 
Time Division Multiplexing
Time Division MultiplexingTime Division Multiplexing
Time Division Multiplexing
Spandit Lenka
 
GSM channels
GSM channelsGSM channels
GSM channels
Mohd Nazir Shakeel
 
OFDM
OFDMOFDM
Mobile computing unit2,SDMA,FDMA,CDMA,TDMA Space Division Multi Access,Frequ...
Mobile computing unit2,SDMA,FDMA,CDMA,TDMA  Space Division Multi Access,Frequ...Mobile computing unit2,SDMA,FDMA,CDMA,TDMA  Space Division Multi Access,Frequ...
Mobile computing unit2,SDMA,FDMA,CDMA,TDMA Space Division Multi Access,Frequ...
Pallepati Vasavi
 
WSN network architecture -Sensor Network Scenarios & Transceiver Design Consi...
WSN network architecture -Sensor Network Scenarios & Transceiver Design Consi...WSN network architecture -Sensor Network Scenarios & Transceiver Design Consi...
WSN network architecture -Sensor Network Scenarios & Transceiver Design Consi...
ArunChokkalingam
 
Handoff in Mobile Communication
Handoff in Mobile CommunicationHandoff in Mobile Communication
Handoff in Mobile Communication
Noushad Hasan
 
Multiple Access in wireless communication
Multiple Access in wireless communicationMultiple Access in wireless communication
Multiple Access in wireless communication
Maulik Togadiya
 
Concepts of & cell sectoring and micro cell
Concepts of & cell sectoring and micro cellConcepts of & cell sectoring and micro cell
Concepts of & cell sectoring and micro cell
Kundan Kumar
 
4.5 equalizers and its types
4.5   equalizers and its types4.5   equalizers and its types
4.5 equalizers and its types
JAIGANESH SEKAR
 
Satellite link design
Satellite link designSatellite link design
Satellite link design
RAVIKIRAN ANANDE
 
Small scale fading
Small scale fadingSmall scale fading
Small scale fading
AJAL A J
 
Frequency Division Multiple Access (FDMA)
Frequency Division Multiple Access (FDMA)Frequency Division Multiple Access (FDMA)
Frequency Division Multiple Access (FDMA)Miles Kevin Galario
 
IEEE 802.11 Architecture and Services
IEEE 802.11 Architecture and ServicesIEEE 802.11 Architecture and Services
IEEE 802.11 Architecture and Services
Sayed Chhattan Shah
 
SPACE DIVISION MULTIPLE ACCESS (SDMA) SATELLITE COMMUNICATION
SPACE DIVISION MULTIPLE ACCESS (SDMA) SATELLITE COMMUNICATION  SPACE DIVISION MULTIPLE ACCESS (SDMA) SATELLITE COMMUNICATION
SPACE DIVISION MULTIPLE ACCESS (SDMA) SATELLITE COMMUNICATION
Soumen Santra
 
Combating fading channels (1) (3)
Combating fading channels (1) (3)Combating fading channels (1) (3)
Combating fading channels (1) (3)
liril sharma
 
Multiple Access
Multiple AccessMultiple Access
Multiple Access
RAVIKIRAN ANANDE
 
Multiple Access Techniques
Multiple Access TechniquesMultiple Access Techniques
Chapter 7 multiple access techniques
Chapter 7 multiple access techniquesChapter 7 multiple access techniques
Chapter 7 multiple access techniquesKaushal Kabra
 

What's hot (20)

TDMA
TDMATDMA
TDMA
 
2.2 frequency division multiple access
2.2   frequency division multiple access2.2   frequency division multiple access
2.2 frequency division multiple access
 
Time Division Multiplexing
Time Division MultiplexingTime Division Multiplexing
Time Division Multiplexing
 
GSM channels
GSM channelsGSM channels
GSM channels
 
OFDM
OFDMOFDM
OFDM
 
Mobile computing unit2,SDMA,FDMA,CDMA,TDMA Space Division Multi Access,Frequ...
Mobile computing unit2,SDMA,FDMA,CDMA,TDMA  Space Division Multi Access,Frequ...Mobile computing unit2,SDMA,FDMA,CDMA,TDMA  Space Division Multi Access,Frequ...
Mobile computing unit2,SDMA,FDMA,CDMA,TDMA Space Division Multi Access,Frequ...
 
WSN network architecture -Sensor Network Scenarios & Transceiver Design Consi...
WSN network architecture -Sensor Network Scenarios & Transceiver Design Consi...WSN network architecture -Sensor Network Scenarios & Transceiver Design Consi...
WSN network architecture -Sensor Network Scenarios & Transceiver Design Consi...
 
Handoff in Mobile Communication
Handoff in Mobile CommunicationHandoff in Mobile Communication
Handoff in Mobile Communication
 
Multiple Access in wireless communication
Multiple Access in wireless communicationMultiple Access in wireless communication
Multiple Access in wireless communication
 
Concepts of & cell sectoring and micro cell
Concepts of & cell sectoring and micro cellConcepts of & cell sectoring and micro cell
Concepts of & cell sectoring and micro cell
 
4.5 equalizers and its types
4.5   equalizers and its types4.5   equalizers and its types
4.5 equalizers and its types
 
Satellite link design
Satellite link designSatellite link design
Satellite link design
 
Small scale fading
Small scale fadingSmall scale fading
Small scale fading
 
Frequency Division Multiple Access (FDMA)
Frequency Division Multiple Access (FDMA)Frequency Division Multiple Access (FDMA)
Frequency Division Multiple Access (FDMA)
 
IEEE 802.11 Architecture and Services
IEEE 802.11 Architecture and ServicesIEEE 802.11 Architecture and Services
IEEE 802.11 Architecture and Services
 
SPACE DIVISION MULTIPLE ACCESS (SDMA) SATELLITE COMMUNICATION
SPACE DIVISION MULTIPLE ACCESS (SDMA) SATELLITE COMMUNICATION  SPACE DIVISION MULTIPLE ACCESS (SDMA) SATELLITE COMMUNICATION
SPACE DIVISION MULTIPLE ACCESS (SDMA) SATELLITE COMMUNICATION
 
Combating fading channels (1) (3)
Combating fading channels (1) (3)Combating fading channels (1) (3)
Combating fading channels (1) (3)
 
Multiple Access
Multiple AccessMultiple Access
Multiple Access
 
Multiple Access Techniques
Multiple Access TechniquesMultiple Access Techniques
Multiple Access Techniques
 
Chapter 7 multiple access techniques
Chapter 7 multiple access techniquesChapter 7 multiple access techniques
Chapter 7 multiple access techniques
 

Viewers also liked

Packet Radio Overview
Packet Radio OverviewPacket Radio Overview
Packet Radio Overview
Matthew Maguire
 
ALOHA Protocol (in detail)
ALOHA Protocol (in detail)ALOHA Protocol (in detail)
ALOHA Protocol (in detail)
Hinal Lunagariya
 
MARINE COMMUNICATION MASTER VHF SHORT RANGE CERTIFICATE (SRC)
MARINE COMMUNICATION MASTER VHF SHORT RANGE CERTIFICATE (SRC)MARINE COMMUNICATION MASTER VHF SHORT RANGE CERTIFICATE (SRC)
MARINE COMMUNICATION MASTER VHF SHORT RANGE CERTIFICATE (SRC)Alfred Weber
 
What is a VHF Contest?
What is a VHF Contest? What is a VHF Contest?
What is a VHF Contest?
Sussex County Amateur Radio Club Inc.
 
VoIP phone systems | VoIP System
VoIP phone systems | VoIP SystemVoIP phone systems | VoIP System
VoIP phone systems | VoIP System
businessphones123
 
Routing in telephone networks
Routing in telephone networksRouting in telephone networks
Routing in telephone networks
Renjith Ravi
 
Dasar teknik pabx
Dasar teknik pabxDasar teknik pabx
Dasar teknik pabx
'Syahrizal IcHal'
 
Hybrid ip – pbx telephone system
Hybrid ip – pbx telephone systemHybrid ip – pbx telephone system
Hybrid ip – pbx telephone system
Essay Writing Pk
 
Numbering plan system
Numbering plan systemNumbering plan system
Numbering plan system
nimay1
 
Air to ground datalink communication
Air to ground datalink communicationAir to ground datalink communication
Air to ground datalink communicationLintang Widayanto
 
UHF/VHFEnergy Harvesting Radio System Physical and MAC Layer Consideration
UHF/VHFEnergy Harvesting Radio System Physical and MAC Layer ConsiderationUHF/VHFEnergy Harvesting Radio System Physical and MAC Layer Consideration
UHF/VHFEnergy Harvesting Radio System Physical and MAC Layer Consideration
xiaohuzhang
 
Srikarsh Awp
Srikarsh AwpSrikarsh Awp
Srikarsh Awp
Kolanu Reddy
 
PPt Presentation on CNS (AAI)
PPt Presentation on CNS (AAI)PPt Presentation on CNS (AAI)
PPt Presentation on CNS (AAI)
Abhishek Raj
 
4 Types of VoIP Phone Systems for Businesses
4 Types of VoIP Phone Systems for Businesses4 Types of VoIP Phone Systems for Businesses
4 Types of VoIP Phone Systems for Businesses
Kirti Khanna
 
Circuit switch telecommunication network
Circuit switch telecommunication networkCircuit switch telecommunication network
Circuit switch telecommunication network
mangal das
 
SIP Trunking
SIP TrunkingSIP Trunking
SIP Trunking
orionnow
 
HF Communication Basics Part 2
HF Communication Basics Part 2HF Communication Basics Part 2
HF Communication Basics Part 2
Afghanistan civil aviation institute
 

Viewers also liked (20)

Packet Radio Overview
Packet Radio OverviewPacket Radio Overview
Packet Radio Overview
 
ALOHA Protocol (in detail)
ALOHA Protocol (in detail)ALOHA Protocol (in detail)
ALOHA Protocol (in detail)
 
MARINE COMMUNICATION MASTER VHF SHORT RANGE CERTIFICATE (SRC)
MARINE COMMUNICATION MASTER VHF SHORT RANGE CERTIFICATE (SRC)MARINE COMMUNICATION MASTER VHF SHORT RANGE CERTIFICATE (SRC)
MARINE COMMUNICATION MASTER VHF SHORT RANGE CERTIFICATE (SRC)
 
What is a VHF Contest?
What is a VHF Contest? What is a VHF Contest?
What is a VHF Contest?
 
VoIP phone systems | VoIP System
VoIP phone systems | VoIP SystemVoIP phone systems | VoIP System
VoIP phone systems | VoIP System
 
Routing in telephone networks
Routing in telephone networksRouting in telephone networks
Routing in telephone networks
 
IP PBX Solution
IP PBX SolutionIP PBX Solution
IP PBX Solution
 
Dasar teknik pabx
Dasar teknik pabxDasar teknik pabx
Dasar teknik pabx
 
Hybrid ip – pbx telephone system
Hybrid ip – pbx telephone systemHybrid ip – pbx telephone system
Hybrid ip – pbx telephone system
 
WWOR Fox Ch9
WWOR Fox Ch9WWOR Fox Ch9
WWOR Fox Ch9
 
Numbering plan system
Numbering plan systemNumbering plan system
Numbering plan system
 
Air to ground datalink communication
Air to ground datalink communicationAir to ground datalink communication
Air to ground datalink communication
 
UHF/VHFEnergy Harvesting Radio System Physical and MAC Layer Consideration
UHF/VHFEnergy Harvesting Radio System Physical and MAC Layer ConsiderationUHF/VHFEnergy Harvesting Radio System Physical and MAC Layer Consideration
UHF/VHFEnergy Harvesting Radio System Physical and MAC Layer Consideration
 
Srikarsh Awp
Srikarsh AwpSrikarsh Awp
Srikarsh Awp
 
IP PBX
IP PBXIP PBX
IP PBX
 
PPt Presentation on CNS (AAI)
PPt Presentation on CNS (AAI)PPt Presentation on CNS (AAI)
PPt Presentation on CNS (AAI)
 
4 Types of VoIP Phone Systems for Businesses
4 Types of VoIP Phone Systems for Businesses4 Types of VoIP Phone Systems for Businesses
4 Types of VoIP Phone Systems for Businesses
 
Circuit switch telecommunication network
Circuit switch telecommunication networkCircuit switch telecommunication network
Circuit switch telecommunication network
 
SIP Trunking
SIP TrunkingSIP Trunking
SIP Trunking
 
HF Communication Basics Part 2
HF Communication Basics Part 2HF Communication Basics Part 2
HF Communication Basics Part 2
 

Similar to Packet radio protocol

UNIT-V Wireless Communication.pdf
UNIT-V Wireless Communication.pdfUNIT-V Wireless Communication.pdf
UNIT-V Wireless Communication.pdf
vadasairaju143
 
MEDIUM-ACCESS CONTROL SUB LAYER.ppt
MEDIUM-ACCESS CONTROL SUB LAYER.pptMEDIUM-ACCESS CONTROL SUB LAYER.ppt
MEDIUM-ACCESS CONTROL SUB LAYER.ppt
DrTThendralCompSci
 
multipleaccessprotocol-140213082552-phpapp02.pdf
multipleaccessprotocol-140213082552-phpapp02.pdfmultipleaccessprotocol-140213082552-phpapp02.pdf
multipleaccessprotocol-140213082552-phpapp02.pdf
GauravWankar2
 
Multipleaccessprotocol 140213082552-phpapp02
Multipleaccessprotocol 140213082552-phpapp02Multipleaccessprotocol 140213082552-phpapp02
Multipleaccessprotocol 140213082552-phpapp02
arifur rahman
 
seminar report on multiple access control protocol submitted by munesh
seminar report on multiple access control protocol submitted by munesh seminar report on multiple access control protocol submitted by munesh
seminar report on multiple access control protocol submitted by munesh meenamunesh
 
aloha
alohaaloha
aloha
DeepikaT13
 
Media Access Control
Media Access ControlMedia Access Control
Media Access Control
HusnainHadi
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
upamatechverse
 
Csma protocols
Csma protocolsCsma protocols
Csma protocols
Manal Shah
 
Medium range protocol and multiple access
Medium range protocol and multiple accessMedium range protocol and multiple access
Medium range protocol and multiple access
sushmitjivtode4
 
CN.pptx
CN.pptxCN.pptx
CN.pptx
kidoson243
 
Multiple Access Techniques
Multiple Access TechniquesMultiple Access Techniques
Multiple Access Techniques
inayat khan
 
Multiple access protocols in data communication networks
Multiple access protocols in data communication networksMultiple access protocols in data communication networks
Multiple access protocols in data communication networks
Nt Arvind
 
link-medium-access-control.pptx
link-medium-access-control.pptxlink-medium-access-control.pptx
link-medium-access-control.pptx
patrickwang85
 
the Multiple Access SLIDE for university students
the Multiple Access SLIDE for university studentsthe Multiple Access SLIDE for university students
the Multiple Access SLIDE for university students
novrain1
 
Multiple Access Protocal
Multiple Access ProtocalMultiple Access Protocal
Multiple Access Protocal
tes31
 

Similar to Packet radio protocol (20)

The medium access sublayer
 The medium  access sublayer The medium  access sublayer
The medium access sublayer
 
UNIT-V Wireless Communication.pdf
UNIT-V Wireless Communication.pdfUNIT-V Wireless Communication.pdf
UNIT-V Wireless Communication.pdf
 
MEDIUM-ACCESS CONTROL SUB LAYER.ppt
MEDIUM-ACCESS CONTROL SUB LAYER.pptMEDIUM-ACCESS CONTROL SUB LAYER.ppt
MEDIUM-ACCESS CONTROL SUB LAYER.ppt
 
Mac sub layer
Mac sub layerMac sub layer
Mac sub layer
 
Multiple access protocol
Multiple access protocolMultiple access protocol
Multiple access protocol
 
multipleaccessprotocol-140213082552-phpapp02.pdf
multipleaccessprotocol-140213082552-phpapp02.pdfmultipleaccessprotocol-140213082552-phpapp02.pdf
multipleaccessprotocol-140213082552-phpapp02.pdf
 
Multipleaccessprotocol 140213082552-phpapp02
Multipleaccessprotocol 140213082552-phpapp02Multipleaccessprotocol 140213082552-phpapp02
Multipleaccessprotocol 140213082552-phpapp02
 
seminar report on multiple access control protocol submitted by munesh
seminar report on multiple access control protocol submitted by munesh seminar report on multiple access control protocol submitted by munesh
seminar report on multiple access control protocol submitted by munesh
 
aloha
alohaaloha
aloha
 
Media Access Control
Media Access ControlMedia Access Control
Media Access Control
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
 
Csma protocols
Csma protocolsCsma protocols
Csma protocols
 
Medium range protocol and multiple access
Medium range protocol and multiple accessMedium range protocol and multiple access
Medium range protocol and multiple access
 
CN.pptx
CN.pptxCN.pptx
CN.pptx
 
Multiple Access Techniques
Multiple Access TechniquesMultiple Access Techniques
Multiple Access Techniques
 
Multiple access protocols in data communication networks
Multiple access protocols in data communication networksMultiple access protocols in data communication networks
Multiple access protocols in data communication networks
 
link-medium-access-control.pptx
link-medium-access-control.pptxlink-medium-access-control.pptx
link-medium-access-control.pptx
 
the Multiple Access SLIDE for university students
the Multiple Access SLIDE for university studentsthe Multiple Access SLIDE for university students
the Multiple Access SLIDE for university students
 
Lecture set 4
Lecture set 4Lecture set 4
Lecture set 4
 
Multiple Access Protocal
Multiple Access ProtocalMultiple Access Protocal
Multiple Access Protocal
 

Recently uploaded

road safety engineering r s e unit 3.pdf
road safety engineering  r s e unit 3.pdfroad safety engineering  r s e unit 3.pdf
road safety engineering r s e unit 3.pdf
VENKATESHvenky89705
 
block diagram and signal flow graph representation
block diagram and signal flow graph representationblock diagram and signal flow graph representation
block diagram and signal flow graph representation
Divya Somashekar
 
ethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.pptethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.ppt
Jayaprasanna4
 
weather web application report.pdf
weather web application report.pdfweather web application report.pdf
weather web application report.pdf
Pratik Pawar
 
Gen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdfGen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdf
gdsczhcet
 
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&BDesign and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Sreedhar Chowdam
 
English lab ppt no titlespecENG PPTt.pdf
English lab ppt no titlespecENG PPTt.pdfEnglish lab ppt no titlespecENG PPTt.pdf
English lab ppt no titlespecENG PPTt.pdf
BrazilAccount1
 
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
MdTanvirMahtab2
 
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdfTop 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Teleport Manpower Consultant
 
Water Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdfWater Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation & Control
 
Fundamentals of Electric Drives and its applications.pptx
Fundamentals of Electric Drives and its applications.pptxFundamentals of Electric Drives and its applications.pptx
Fundamentals of Electric Drives and its applications.pptx
manasideore6
 
J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang,  ICLR 2024, MLILAB, KAIST AI.pdfJ.Yang,  ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
MLILAB
 
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
Amil Baba Dawood bangali
 
ASME IX(9) 2007 Full Version .pdf
ASME IX(9)  2007 Full Version       .pdfASME IX(9)  2007 Full Version       .pdf
ASME IX(9) 2007 Full Version .pdf
AhmedHussein950959
 
Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024
Massimo Talia
 
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdfHybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
fxintegritypublishin
 
space technology lecture notes on satellite
space technology lecture notes on satellitespace technology lecture notes on satellite
space technology lecture notes on satellite
ongomchris
 
ethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.pptethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.ppt
Jayaprasanna4
 
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
bakpo1
 
The Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdfThe Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdf
Pipe Restoration Solutions
 

Recently uploaded (20)

road safety engineering r s e unit 3.pdf
road safety engineering  r s e unit 3.pdfroad safety engineering  r s e unit 3.pdf
road safety engineering r s e unit 3.pdf
 
block diagram and signal flow graph representation
block diagram and signal flow graph representationblock diagram and signal flow graph representation
block diagram and signal flow graph representation
 
ethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.pptethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.ppt
 
weather web application report.pdf
weather web application report.pdfweather web application report.pdf
weather web application report.pdf
 
Gen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdfGen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdf
 
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&BDesign and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
 
English lab ppt no titlespecENG PPTt.pdf
English lab ppt no titlespecENG PPTt.pdfEnglish lab ppt no titlespecENG PPTt.pdf
English lab ppt no titlespecENG PPTt.pdf
 
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
 
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdfTop 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
 
Water Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdfWater Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdf
 
Fundamentals of Electric Drives and its applications.pptx
Fundamentals of Electric Drives and its applications.pptxFundamentals of Electric Drives and its applications.pptx
Fundamentals of Electric Drives and its applications.pptx
 
J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang,  ICLR 2024, MLILAB, KAIST AI.pdfJ.Yang,  ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
 
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
 
ASME IX(9) 2007 Full Version .pdf
ASME IX(9)  2007 Full Version       .pdfASME IX(9)  2007 Full Version       .pdf
ASME IX(9) 2007 Full Version .pdf
 
Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024
 
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdfHybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
 
space technology lecture notes on satellite
space technology lecture notes on satellitespace technology lecture notes on satellite
space technology lecture notes on satellite
 
ethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.pptethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.ppt
 
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
 
The Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdfThe Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdf
 

Packet radio protocol

  • 1. PACKET RADIO PROTOCOL PRESENTED BY: PRIYA KAUSHAL ROLL NO. 152615 ME(ECE) REGULAR PRESENTED TO: Dr. S B L SACHAN
  • 2. Introduction Multiple access control channels: •Each node is attached to at transmitter and receiver which communicates via a channel shared by other nodes.
  • 3. Introduction •Transmission from any node is received by other nodes.
  • 4. Introduction •Multiple access issues •If more than one node transmit at a time on the control channel to BS, a collision occurs •How to determine which node can transmit to BS? •Multiple access protocols •Solving multiple access issues
  • 6. Classification of Multiple Access Protocols
  • 7. Contention protocols •Contention protocols resolve a collision after it occurs. These protocols execute a collision resolution protocol after each collision
  • 8. Collision-free protocols •Collision-free protocols (e.g., a bit-map protocol and binary countdown) ensure that a collision can never occur.
  • 9. RANDOM ACCESS •A station that has data to send uses a procedure defined by a protocol to make a decision on whether or not to send. •This decision depends on the state of the medium(idle or busy).
  • 10. RANDOM ACCESS •There is no scheduled time for a station to transmit. Transmission is random among the stations. That is why these methods are called random access. •If more than one station tries to send at a time , there is an access conflict - collision
  • 11. RANDOM ACCESS •No rules specify which station should send next . Stations compete with one another to access the medium. That is why these methods are also called contention methods.
  • 12. Packet Radio •In packet radio access techniques, many subscribers attempts to access a single channel in uncoordinated manner. •Transmission is done by using bursts of data.
  • 13. Packet Radio •Collision from the simultaneous transmissions of multiple transmitters are detected at each base station receiver. • In which case an ACK or NACK signal is broadcast by the base station to alert the desired user ( and all other users) of received transmission .
  • 14. Packet Radio •The ACK signal indicate an acknowledgment of received burst from particular user by the base station. •NACK (negative acknowledgment) indicate that the previous burst was not received correctly by the base station.
  • 15. Packet Radio • By using ACK and NACK signals, PR system employs perfect feedback, even though traffic delay due to collisions may be high.
  • 16. Packet Radio Multiple access •Easy to implement •But low spectral efficiency include delays •The subscriber use contention technique to transmit on common channel. •ALOHA protocol , developed for early satellite system, are the best example of contention technique
  • 17. ALOHA Protocol •ALOHA allow each subscriber to transmit whenever they have data to send.
  • 18. ALOHA Protocol •The transmitting subscriber listen to the acknowledgment feedback to determine if transmission has been successful or not.
  • 19. ALOHA Protocol •If the collision occur, the subscriber wait a random amount of time, and then re-transmits the packet.
  • 20. Advantage •The advantage of packet contention technique is the ability to serve a large number of subscriber with virtually no overhead.
  • 21. Performance •The performance of contention technique can be evaluated by the • Throughput(T): Which is defined as the average number of messages successfully transmitted per unit time. •Average delay(D): Experienced by a typical message burst.
  • 22. Performance •Vulnerable Period (Vp): which is defined as the time interval during which the packets are susceptible to collisions with transmission from other users.
  • 23. Vulnerable Period • The packet A will suffer a collision if the other terminals transmit packets during the periods t ₁ to t₁+2τ. • Even if only a small portion of packet A sustains a collision, the interference may render the message useless.
  • 24. Packet Radio Protocol •It is assumed that all the packets sent by all users have a constant packet length and fixed channel data rate and all other users may generate new packets at random time intervals. •Furthermore, it is assumed that packet transmissions having a mean arrival rate of λ packet per second.
  • 25. Packet Radio Protocol •If τ is the packet duration in seconds then the traffic occupancy or throughput R of a packet radio network is given by R=λτ •R is the normalized channel traffic due to arriving and buffered packets and is a relative measures of the channel utilization.
  • 26. Packet Radio Protocol •If R>1 , then the packets generated by the users exceed the maximum transmission rate of the channel. Thus, to obtain a reasonable throughput, the rate at which new packets are generated must lie within 0<R<1. •Under the condition of normal loading, throughput T is the same as the total offered load, L.
  • 27. Packet Radio Protocol •The normalized throughput is given as the total offered load times the probability of successful transmission: T=R.Pr[no collision]=λτ.Pr[no collision] (1) Where Pr[no collision] is the probability of the user making successful packet transmission.
  • 28. Probability •The probability that n packets are generated by the user population during a given packet duration interval is assumed to be the poisson distributed and is given by: Pr(n)= Rⁿe⁻ᴿ/nᴉ
  • 29. Probability •A packet is assumed successfully transmitted if there are no other packets transmitted during the given time interval. The probability that zero packets are generated (i.e., no collision) during this interval is given by Pr(0)=e⁻ᴿ
  • 31. RANDOM ACCESS •ALOHA (Pure ALOHA and Slotted ALOHA) •CSMA •CSMA/CD •CSMA/CA
  • 32. ALOHA Protocol •ALOHA is developed in the 1970s at the University of Hawaii. •The basic idea is simple: •Let users transmit whenever they have data to be sent. •If two or more users send their packets at the same time, a collision occurs and the packets are destroyed.
  • 33. ALOHA Protocol • The original ALOHA protocol is called pure ALOHA. • Each station sends a frame whenever it has a frame to send. • However , there is only one channel for them to share.
  • 34. ALOHA Protocol •If two or more stations transmit at same time, there is a collision •the sender waits a random amount of time and sends it again. •The waiting time must be random. Otherwise, the same packets will collide again
  • 35. Types of ALOHA Protocol
  • 36. Pure ALOHA •The Pure ALOHA protocol is a random access protocol used for data transfer. •A user accesses a channel as soon as a message is ready to be transmitted. •After a transmission, the user wait for an acknowledgement on either the same channel or a separate feedback channel.
  • 37. Pure ALOHA • In case of collisions (i.e., when NACK is received), the terminal waits for a random period of times and retransmits the message. • As the number of users increase, a greater delay occurs because the probability of collision increases.
  • 38. Pure ALOHA •In fig there are four stations that contended with one another for access to shared channel. All these stations are transmitting frames.
  • 39. Pure ALOHA •Some of these frames collide because multiple frames are in contention for the shared channel. Only two frames, frame 1.1 and frame 2.2 survive. All other frames are destroyed.
  • 40. Pure ALOHA •Whenever two frames try to occupy the channel at the same time, there will be a collision and both will be damaged.
  • 41. Pure ALOHA •If first bit of a new frame overlaps with just the last bit of a frame almost finished, both frames will be totally destroyed and both will have to be retransmitted.
  • 42. Pure ALOHA •For the ALOHA protocol, the vulnerable is double the packet duration. •Thus the probability of no collision during the interval of 2τ is found by evaluating Pr(n) given as Pr(n)=(2R)ⁿe⁻²ᴿ/nᴉ at n=0 (2)
  • 43. Pure ALOHA •One may evaluate the mean of eqn(2) to determine the average number of packets sent during 2τ. •The probability of no collision is Pr(0)=e⁻²ᴿ. •The throughput of the ALOHA protocol is found by equation(1) T=Re⁻²ᴿ
  • 44. Slotted ALOHA •In slotted ALOHA, time is divided into equal time slots of length greater than the packet duration τ.
  • 45. Slotted ALOHA •The subscriber each have synchronized clocks and transmit a message only at the beginning of a new time slot, thus resulting in a discrete distribution of packets .
  • 46. Slotted ALOHA •This prevents partial collisions, where one packet collides with a portion of another.
  • 47. Slotted ALOHA •As the number of users increase, a greater a delay will occur due to complete collision and resulting repeated transmissions of those packets originally lost.
  • 48. Slotted ALOHA •The number of slots which a transmitter waits prior to retransmitting also determines the delay characteristics of the traffic. •The vulnerable period for slotted ALOHA is only one packet duration, since partial collisions are prevented through synchronization.
  • 49. Slotted ALOHA •The probability that no other packets will be generated during the vulnerable period is e⁻ᴿ. •The throughput for the case of slotted ALOHA is thus given by T=R e⁻ᴿ
  • 51. Numerical(1) Problem: 56 kbps unslotted Aloha channel shared by N stations. Stations: 1 packet(1000 bits) every 100 seconds. Solution: a) Required data rate
  • 52. Numerical(1) b). Available data rate: •The pure Aloha has a maximum efficiency of 18.4 % therefore the maximum available data rate is: •Available Data Rate = 0.184*56000bps = 10.304kbps
  • 53. Numerical(1) c). Maximum Number of Stations: The maximum sustainable number of stations is: N=10304/10 =1030
  • 54. Numerical(2) •Problem: Slotted aloha channel with 10% of the slots are idle. •Solution: a). What is the channel load R? The fraction of idle slots is: P(idle)=0.1 Since P (idle)= e⁻ᴿ →R=−ln(P(idle) = −ln(0.1) = 2.3 R=2.3
  • 55. Numerical(2) b). What is the system throughput in packets/slot? The throughput is: throughput = P(success)=Re⁻ᴿ=23%
  • 56. Numerical(2) c). Is the channel overloaded or under-loaded? • The maximum throughput (36.8%) is achieved for R=1. •For R>1 the channel efficiency drops because it is overloaded.