Channel Allocation Problem in Computer Network
Channel allocation problem can be solved by two schemes: Static Channel Allocation in LANs and MANs, and Dynamic Channel Allocation.
These are explained as following below.
However, it is not suitable in case of a large number of users with variable bandwidth requirements. It is not efficient to divide into fixed number of chunks.
T = 1/(U*C-L) T(FDM) = N*T(1/U(C/N)-L/N) Where, �
T = mean time delay,
C = capacity of channel,
L = arrival rate of frames,
1/U = bits/frame,
N = number of sub channels,
T(FDM) = Frequency Division Multiplexing Time
2. Dynamic Channel Allocation:
In dynamic channel allocation scheme, frequency bands are not permanently assigned to the users. Instead channels are allotted to users dynamically as needed, from a central pool. The allocation is done considering a number of parameters so that transmission interference is minimized.
This allocation scheme optimises bandwidth usage and results is faster transmissions.
Dynamic channel allocation is further divided into:
Multiple Access
We categorize them into three groups. Protocols belonging to each group are shown in Figure 12.2
12.1 RANDOMACCESS
Two features give this method its name.
Random Access
ALOHA
There are four stations (unrealistic assumption) that contend with one another for access to the shared channel. The figure shows that each station sends two frames; there are a total of eight frames on the shared medium. Some of these frames collide because multiple frames are in contention for the shared channel. Figure 12.3 shows that only
Pure ALOHA has a second method to prevent congesting the channel with retransmitted frames. After a maximum number of retransmission attempts ‘Kmax ' a station must give up and try later. Figure 12.4 shows the procedure for pure ALOHA based on the above strategy.
ALOHA: Vulnerable time
Vulnerable time Let us find the length of time, the vulnerable time, in which there is a possibility of collision. We assume that the stations send fixed-length frames with each frame taking Tfr S to send. Figure 12.5 shows the vulnerable time for station A.
Slotted ALOHA
Slotted ALOHA vulnerable time =Tfr
Carrier Sense Multiple Access (CSMA)
Carrier Sense Multiple Access with Collision Detection (CSMA/CD)
Carrier Sense MultipleAccess with Collision Avoidance (CSMA/CA)
12.2 CONTROLLED ACCESS
Polling
If the primary wants to receive data, it asks the secondaries if they have anything to send; this is called poll function. If the primary wants to send data, it tells the secondary to get ready to receive; this is called select function.
Token Passing
12.3 CHANNELIZATION
Frequency-Division MultipleAccess (FDMA)
Time-Division Multiple Access (TDMA)
Code-Division Multiple Access (CDMA)