Lab 3: Performance Analysis of ALOHA

Size: px
Start display at page:

Download "Lab 3: Performance Analysis of ALOHA"

Transcription

1 Lab 3: Performance Analysis of ALOHA ALOHA is one of the basic random access methods in mobile data networks. It is based on mobile terminals sending their packets without any coordination between them. The main advantage of using ALOHA access method is its simplicity and the ease of applicability. No synchronization between mobile transmitters is required. The terminals basically transmit their packets as soon as they receive them from higher layers and if there is a collision at the receiver side, they basically retransmit the packet. The collision is detected at the receiver side by a simple error detection code. The disadvantage of the ALOHA is its low throughput under heavy load conditions. (i.e. the number of collisions are going to increase as the number of users increase.) In this third OPNET lab, we are going to simulate ALOHA random access protocol and answer the following simple questions about ALOHA based random access methods. 1) What is the behavior of ALOHA throughout as the load of the network increases? 2) What is the maximum achievable network throughput by using ALOHA? 3) Do the simulation results verify analytical results? (Show that the maximum throughout values match) 4) How one can improve the throughout performance of ALOHA? 5) What type of relation would be observed between network load and throughput if there is one and only one user transmitting? Overview In this lab, the complete simulation model of ALOHA protocol is explained and simulated step-bystep. All the simulation components that are going to be used in ALOHA model is designed from scratch in order to understand the capabilities and the structure of OPNET. Such a detailed analysis is not going to be performed and built in functions and modules are going to be used in the following lab. The main task of this lab is to design a model that includes a multi-tap bus link, where multiple stations (i.e. transmitters) utilizing ALOHA random access protocol share a common channel. ALOHA Simulation Hierarchy in OPNET In order to implement ALOHA method, we must have multiple transmitters, a multi-tap bus line and a single receiver in the network configuration. We will use node model to build each transmitter and receiver structure. And we know from Lab 2, OPNET Tutorial, that we will need to use the process model in order to define the behavior of the each node in the node model. (e.g. Transmitter should retransmit the packet in case of collision.) The generic OPNET hierarchy and the corresponding names that we will assign on each model is illustrated in the figure below. When working with new files, you can use your student number in order to differentiate the files you are working from already built-in ones. A possible file name and an example illustration for the corresponding model is shown in the figure. The network model consists of two node models (one for transmitter and one for receiver node) and each node model is made up of process models, which define the behavior of each node. Step-bystep design and construction of each model is illustrated. The main purpose of this lab is to illustrate the interactions between different OPNET hierarchy. (i.e. How process models are assigned to node models or how do two different node models communicate with each other?) CEG4190 Lab 3 page 1 of 11

2 Illustration 1: ALOHA simulation components and simulation overview Step by step building of the network structure is as follows: Create a transmitter process model and specify the characteristic of transmitter node Create a node for transmitter in node model Create a receiver process model and specify the characteristic of receiver node Create a node for receiver in node model Create a bus link model for shared environment Create a network model by using the created transmitter and receiver nodes Choose the simulation parameters to observe and vary Analyze the performance of the system CEG4190 Lab 3 page 2 of 11

3 The network model, node model and the process model that we are going to built for ALOHA random access method is illustrated in the figure below. It shows the network that consist of 20 transmitters sharing the same bus link and sending packets to a single receiver. The node models and process models of each receiver and transmitter are illustrated. Before starting the network design, lets look at the each node and process model individually. Illustration 2: ALOHA network-node-process model illustration The transmitter node basically generates packets, process them (i.e. counts the number of packets it generates for network load calculation) and sends them on the bus. This can be modeled in the node model by using a simple source, a processor and a bus transmitter nodes. Data source and bustransmitter nodes are built-in nodes in the node model. We only need to create processor node that relays the packets to bus-transmitter when activated and counts the number of packets sent. The receiver node basically monitors the collisions on the bus. Therefore it is consist of a bus receiver and a processor module. The receiver process model specifies the behavior of the custom processor module. It is responsible for handling received packets for statistical collection. It manages this statistics by creating and modifying global variables. Basically it counts the number of the successfully received packets (network throughput) and destroys the received packets (i.e. We are only concerned about the number of the packets that are received correctly, the contents of packets are not important). After creating the relevant process and node models for receiver and transmitters, we will connect those models with a multi-tab bus on the network model. We will be investigating the throughput performance of ALOHA random access protocol. Using a built-in simulation sequence editor we will simulate the same network in different loading conditions. That is to say, the already prepared simulation sequence editor will assign different packet inter-arrival times to transmitters in each simulation. In total, 12 simulations are going to be performed. Simulation results will be written on a scalar file and simulation analysis editor will be used to observe simulation results. Let's start building our model with transmitter (Tx) process model. CEG4190 Lab 3 page 3 of 11

4 Designing ALOHA Tx Process Model 1) Start modeler. 2) From the menu choose: File > New > Process Model. And click Ok. 3) We are going to create two states for transmitter by create state button. Name them Idle state (transmitter waiting for an transmit interrupt) and Transmit state (Transmitter is actively involved in transmission.). You can turn off the state creation by right clicking on the process model window. 4) A transmitter is supposed to transmit when a new packet arrived and go back to listen ( Idle ) state. Therefore, we should change the status of the Transmit state to forced by right clicking on it and choosing Make State Forced option from the pop-up menu. 5) Draw the transitions between states by. Remember that the transition from Idle to Transmit occurs if a new packet arrives. Therefore it is a conditional transition. To implement this condition on the transition, right click on the transition line and type PKT_ARVL to condition attribute. Draw another transition from Transmit to idle state with no condition. 6) Header block of the process model is used for defining the conditions in the transitions, declaring global variables and indicating the streaming of the process node (The connectivity of the node. e.g. input stream from data generator and output stream to bus transmitter). Open the header block and enter the code shown. /* Input stream from generator module */ #define IN_STRM 0 /* Output stream to bus transmitter module */ #define OUT_STRM 0 /* Conditional macros */ #define PKT_ARVL (op_intrpt_type() == OPC_INTRPT_STRM) /* Global Variable */ extern int subm_pkts; 7) Temporary variables are the ones that change on every call of the process model. The only parameter that changes on each call of the processor is the incoming packet. Therefore define a packet pointer in the temporary variable block. /* Outgoing packet */ Packet *out_pkt; When we start the simulation, we don t want it to continue forever. Therefore we create an integer variable max_packet_count on state variable tab of process model. State variables keep their value throughout the simulation. We will assign its value while specifying simulation parameters. 8) After defining the parameters, we will set the enter and exit executives of the Idle and Transmit states. The Idle state only retrieves the maximum packet number value. The Transmit state acquire the packet from the input stream, send the packet, updates the global submitted packet counter and ends the simulation if the packet counter value reaches to max_packet_count. Therefore enter the following code for enter executive block of the Idle state /* Get the maximum packet count, */ /* set at simulation run-time */ CEG4190 Lab 3 page 4 of 11

5 op_ima_sim_attr_get (OPC_IMA_INTEGER, "max packet count", &max_packet_count); and the following code to enter executive block of Transmit state: /* A packet has arrived for transmission. Acquire */ /* the packet from the input stream, send the packet */ /* and update the global submitted packet counter. */ out_pkt = op_pk_get (IN_STRM); op_pk_send (out_pkt, OUT_STRM); ++subm_pkts; /* Compare the total number of packets submitted with */ /* the maximum set for this simulation run. If equal */ /* end the simulation run. */ if (subm_pkts == max_packet_count) { op_sim_end ("max packet count reached.", "", "", ""); } The variable subm_pkts is a global variable that will be declared later by the receiver. 9) When we want to run a simulation, we will need to assign the max_packet_count value to simulation editor in order to let him know when to end the simulation. Therefore, we need to define a global attribute that could be set at simulation run time and loaded into the state variable max_packet_count. From process model menu, go to : Interfaces > Global Attributes and enter max packet count as a type integer. 10) Finally you should edit process interfaces. From the menu go to : Interfaces > Process Interfaces and change the initial value of the begsim_intrpt attribute to enabled and change the status of all the attributes to hidden. This would enable the first interrupt event when the simulation begins. 11) After writing the source code and doing all the modification we should compile the code by clicking on the orange compile process model button and save the process model as pm_<student_number>_tx e.g. pm_ _tx. After all the steps, your process model should look like: CEG4190 Lab 3 page 5 of 11

6 Illustration 3: Transmitter process model Designing ALOHA Tx Node Model 1) From the menu of Process Model choose: File > New >Node Model. And click Ok. 2) Create two processor modules and one bus transmitter. Name the two processor modules as gen and tx_proc and name bus transmitter as bus_tx. 3) Connect the gen to tx_proc and tx_proc to bus transmitter by packet streams. 4) Set the process model attribute of the gen to simple_source and the same attribute of tx_proc to the created process model pm_ _tx. 5) In the transmitter node model, we are interested in assigning different values to the generators inter arrival time attribute of the gen. Therefore we had better promote this attribute to a higher layer (network layer) so we could more easily change the value and observe the changes. We can do that change by right clicking on the Packet Interarrival Time attribute of gen and choosing Promote to higher layer option. 6) Finally save the node model as nm_ _tx. Your node model should look like: CEG4190 Lab 3 page 6 of 11

7 Illustration 4: Transmitter node model Designing ALOHA Rx Process Model Illustration 5: Receiver process model 1) From the menu of Process Model choose: File > New >Process Model. And click Ok. 2) Create two states and name them as init and idle. Change the status of the init state to forced by right clicking on the state and choosing make state forced option. 3) Draw the state transitions as shown below. We should understand the functionality of each state and each transition of the process model. The basic functionality of the receiver is to wait for the packet to arrive and upon arrival, to update the relevant statistics of the network. This behavior can be clearly seen from the process model illustrated below. When simulation starts receiver goes into init state, where it assigns an initial value to all the simulation parameters (e.g. max_packet_count = 0). Upon arrival of a packet (PKT_RCVD condition) it executes proc_pkt() function and changes state to idle. proc_pkt() function basically receives packet, increases the packet count and deletes the packet. The transition between init and idle state can occur if simulation terminated (END_SIM condition). At the end of the simulation all the statistics should be collected by record_stats() function. After passing to idle state, receiver CEG4190 Lab 3 page 7 of 11

8 basically waits for either packet to arrive or simulation end command. default condition is required in case of any other interrupt affecting the receiver. 4) Assign the conditions of transitions by modifying condition attribute of the transitions and functions to be executed by modifying executive attribute of the transitions in the process model as illustrated in the figure. 5) Using the header block of process model, define conditional macros, global variables and input streams by typing: /* Input stream from bus receiver */ #define IN_STRM 0 /*conditional macros */ #define PKT_RCVD (op_intrpt_type () == OPC_INTRPT_STRM) #define END_SIM (op_intrpt_type () == OPC_INTRPT_ENDSIM) /* Global variable */ int subm_pkts = 0; 6) The receiver process model uses rcvd_pkts state variable to keep track of the number of valid received packets. (Notice that it is a state variable which keeps its value between process model executions.) Open the state variables block and define rcvd_pkts variable as an integer 7) In the receiver process model, we utilize two different functions: proc_pkt() and record_stats() for packet receiving and statistic writing. We should define those functions in the function block of the process model. Open the function block of the process model and enter the following code: /* This function gets the received packet, destroys */ /* it, and logs the incremented received packet total*/ void proc_pkt () { Packet* in_pkt; /* Get packet from bus receiver input stream */ in_pkt = op_pk_get (IN_STRM); /*Destroy the received packet */ op_pk_destroy (in_pkt); /* Increment the count of received packet */ ++rcvd_pkts; } /* This function writes the end-of-simulation channel */ /* traffic and channel throughput statistics to a */ /* scalar file */ void record_stats () { /* Record final statistics */ op_stat_scalar_write("channel Traffic G",(double) subm_pkts / op_sim_time ()); op_stat_scalar_write("channel Throughput S",(double) rcvd_pkts / op_sim_time ()); } CEG4190 Lab 3 page 8 of 11

9 As seen from the code the channel load (G) is defined as the number of packets sent during the simulation interval and the channel throughput (S) is defined as the number or successfully received packets during the simulation interval. 8) After defining the variables and functions of the process model, we only need to define the enter executive of the init state. Double click on the top half of the init state and enter the following code: /* Initialize accumulator */ rcvd_pkts = 0; 9) Like we have done for the transmitter process model, we need to modify the process interfaces of receiver model too. Namely, Choose Interfaces > Process Interfaces. Change the initial value of the endsim intrpt attribute to enabled and change the status of all the attributes to hidden 10) Finally, compile the process model by clicking orange compile process model button on the process model window and save the process model as pm_ _rx. Designing ALOHA Rx Node Model 1) From the menu of Process Model choose: File > New >Node Model. And click Ok. 2) Create one process module and one bus receiver module. Name process module as rx_proc and bus receiver module as bus_rx. 3) Connect bus_rx with packet stream to rx_proc. 4) Open rx_proc s attribute dialog box by right clicking and assign its process model to pm_ _tx process model that we have created in the previous section. 5) Change the node interfaces. Choose Interfaces > Node Interfaces. In the Node Types table, change the Supported value to no for the mobile and satellite types. In the Attributes table, change the Status of all the attributes to hidden. 6) Save the Node Model as nm_ _rx. Designing ALOHA Link Model 1) From the menu of Process Model choose: File > New >Link Model. And click Ok. 2) In the Supported Link Types table, change the supported value to no for the ptsimp and ptdup types. Which means this link supports only the bus and bus tap types. 3) Save the Link Model as lm_ Designing ALOHA Network Model 1) From the menu of Process Model choose: File > New >Project. And click Ok. 2) Name the project as: proj_ and the scenario as Aloha. Click Ok. Follow the widzard as: Create Empty Scenario > Office > 700 m x 700 m > None of the technologies and Ok. 3) On the object palette: Configure Palette > Clear. Add lm_ link model and nm_ _tx, nm_ _rx node models to the palette 4) From the Project window menu: Topology > Rapid configuration > Bus. Enter the values as given below: 5) With that topology we created 20 transmitters. But we need to add drag and drop the receiver node model and connect bus to receiver with the tap link. Be aware that connecting the receiver to bus would result in different results. To be on the safe side connect bus to the receiver. CEG4190 Lab 3 page 9 of 11

10 Illustration 6: Rapid configuration example 6) After completing all the steps and naming the receiver node model as RX, your project editor should look like the figure below: Illustration 7: Project model Executing the ALOHA Simulation In this section we will analyze the throughput performance of ALOHA random access protocol under different load conditions. 12 different simulation are done simultaneously with simulation editor. The network loading is going to be changed by editing data inter-arrival time of transmitters. We will CEG4190 Lab 3 page 10 of 11

11 analyze the simulations and compare with the theoretical results. Simulation sequence is already prepared for you, so you need to import and configure the Simulation sequence. 1) Choose Scenarios > Scenario Components > Import 2) Select Simulation Sequence from the menu and select cct_network-csma 3) Choose Simulation > Configure Discrete Event Simulation (Advanced) 4) Right click on the simulation sequence icon and select Edit Attributes 5) Click on Advanced tab. Verify that Network is set to Proj_ Aloha. 6) Set Probe file to NONE 7) Set Scalar file to lab2_cct_a. 8) Click on Global Attributes tab and verify that max packet count is ) Click on the Object Attributes tab to see 12 values that have been set for transmitter inter arrival times. 10) Save the file. 11) Click on the Execute Simulation Sequence action button and confirm the execution. Analyzing the Aloha Results Aloha random access performance can be measured by comparing the number of successfully received packets to the number of transmitted packets. Because of the collision on the bus link, some of the packets will be lost. And as the loading increases, the number of collisions would increase which would cause the number of successfully received packets decrease. In network communication terminology, throughput term is used to represent the number of successfully received packets. The result of the simulations are stored in a scalar file. In the simulation editor, 12 different inter-arrival times for the transmitters are assigned and the network throughput is calculated for each simulation. The network performance can be observed by plotting the network throughput with the network loading. To open the scalar output file: 1) In the Project Editor, choose File > New then select Analysis Configuration. Click Ok. 2) Choose File > Load Output Scalar File 3) Select lab2_cct_a from the list of available files. 4) Click on the Create a graph of two scalars action button. 5) Select the horizontal variable Channel Traffic G first, then select the vertical variable Channel Throughput S from the menu of available scalars that appears. 6) Observe the graph and comment on the following questions. Questions 1) Explain the increase the channel throughput until the loading of 0.5 G and the reason behind the decrease of the throughput. 2) What is the value of the maximum throughput and prove the obtained value by working on the theoretical network throughput formula of ALOHA random access model: S = Ge -2G 3) In the network set up we had 20 transmitters. Would we have the same network throughput graph by increasing the number of transmitters to 40 and decrease the inter-arrival time of each transmitter by half? Why or why not? 4) On the project editor, keep only one transmitter and erase the rest 19 transmitters. Plot the throughput and load curve and comment on the obtained curve. 5) We know that slotted ALOHA has a better throughput performance than ALOHA protocol. If we want to implement slotted ALOHA, what type of changes and where (i.e. transmitter module, receiver module) should we make the changes on the network simulation set up? CEG4190 Lab 3 page 11 of 11

Ethernet. A Direct Link Network with Media Access Control. Laboratory 1. Objective. Overview

Ethernet. A Direct Link Network with Media Access Control. Laboratory 1. Objective. Overview Laboratory 1 Ethernet A Direct Link Network with Media Access Control Objective This lab is designed to demonstrate the operation of the Ethernet network. The simulation in this lab will help you examine

More information

IT Guru Academic Edition does not work correctly with number representations different from English.

IT Guru Academic Edition does not work correctly with number representations different from English. PGRI PLANEAMENTO E GESTÃO DE REDES INFORMÁTICAS LAB ASSIGNMENT 1 DATE: 2009.10.19 OVERVIEW The purpose of this lab is to introduce the main concepts involved in modeling Local Area Networks (LAN) based

More information

CPSC 441 Tutorial-19. Department of Computer Science University of Calgary

CPSC 441 Tutorial-19. Department of Computer Science University of Calgary CPSC 441 Tutorial-19 Department of Computer Science University of Calgary Problem-1 Consider n nodes that use the slotted CSMA/ CD with binary exponential back-off to access a shared broadcast channel.

More information

Lecture 9 November 12, Wireless Access. Graduate course in Communications Engineering. University of Rome La Sapienza. Rome, Italy

Lecture 9 November 12, Wireless Access. Graduate course in Communications Engineering. University of Rome La Sapienza. Rome, Italy Lecture 9 November 12, 2018 Wireless Access Graduate course in Communications Engineering University of Rome La Sapienza Rome, Italy 2018-2019 Medium Access Control Scheduled access Classification of wireless

More information

Eng 3553 Lab #5 TCP Throughput

Eng 3553 Lab #5 TCP Throughput Eng 3553 Lab #5 TCP Throughput Overview TCP (Transmission Control Protocol) is a means for building a reliable communications stream, enabling two hosts to establish a connection and exchange streams of

More information

Introduction to OPNET Modeler

Introduction to OPNET Modeler Introduction to OPNET Modeler Karann Chew CCSR 1 Contents Session #1 (week#6, Friday, 9-10am) Overview OPNET Environment various editors Session #2 (week#7, Friday, 9-10am) Process Modelling Event and

More information

Switched LANs A Set of Local Area Networks Interconnected by Switches

Switched LANs A Set of Local Area Networks Interconnected by Switches Switched LANs A Set of Local Area Networks Interconnected by Switches Objective This lab is designed to demonstrate the implementation of switched local area networks. The simulation in this lab will help

More information

Advanced Communication Lab OPNET Tutorial

Advanced Communication Lab OPNET Tutorial Advanced Communication Lab OPNET Tutorial SS 2013 Authors: Mohammad M. Siddique, Andreas J. Könsgen 1 1. Log on to the computer. 2. Open the OPNET program by clicking on the respective icon. 3. After the

More information

Multiple Access (1) Required reading: Garcia 6.1, 6.2.1, CSE 3213, Fall 2010 Instructor: N. Vlajic

Multiple Access (1) Required reading: Garcia 6.1, 6.2.1, CSE 3213, Fall 2010 Instructor: N. Vlajic 1 Multiple Access (1) Required reading: Garcia 6.1, 6.2.1, 6.2.2 CSE 3213, Fall 2010 Instructor: N. Vlajic Multiple Access Communications 2 Broadcast Networks aka multiple access networks multiple sending

More information

RMIT University. Data Communication and Net-Centric Computing COSC 1111/2061/1110. Lecture 8. Medium Access Control Methods & LAN

RMIT University. Data Communication and Net-Centric Computing COSC 1111/2061/1110. Lecture 8. Medium Access Control Methods & LAN RMIT University Data Communication and Net-Centric Computing COSC 1111/2061/1110 Medium Access Control Methods & LAN Technology Slide 1 Lecture Overview During this lecture, we will Look at several Multiple

More information

OPNET. Mustafa Ergen. UC Berkeley

OPNET. Mustafa Ergen. UC Berkeley OPNET Mustafa Ergen ergen@eecs.berkeley.edu UC Berkeley Overview Introduction Design Process domain Node domain Network domain Communication mechanism Simulation Statistics Probe Analysis IEEE 802.11 MAC

More information

Shared Ethernet Networks

Shared Ethernet Networks Lab 1 Shared Ethernet Networks Overview In a shared Ethernet network, end systems are typically connected together using a hub. The hub retransmits any incoming frames on all outgoing lines creating a

More information

This tutorial teaches you the basics of using Modeler. If you are new to Modeler, this short introduction will help get you started.

This tutorial teaches you the basics of using Modeler. If you are new to Modeler, this short introduction will help get you started. Introduction Overview Welcome to Modeler! This tutorial teaches you the basics of using Modeler. If you are new to Modeler, this short introduction will help get you started. If you are performing this

More information

Data Communications. Automatic Repeat Request Medium Access Control

Data Communications. Automatic Repeat Request Medium Access Control Data Communications Automatic Repeat Request Medium Access Control Handling Error Cases Automatic Repeat request(arq), also known as Automatic Repeat Query, is an error-control method ARQ uses acknowledgements

More information

Objective To examine the throughput of a TCP connection as the flow control window size is varied.

Objective To examine the throughput of a TCP connection as the flow control window size is varied. Lab 7 TCP Throughput Overview TCP uses a sliding window mechanism to provide flow control. The destination advertises how much space it has available in its buffers, and the source restricts its transmissions

More information

TCP versus UDP Response Time

TCP versus UDP Response Time Lab 9 TCP versus UDP Response Time Overview TCP provides connection-oriented service at the transport layer, and UDP provides connectionless service. As a result, a data exchange using TCP can take longer

More information

COS 140: Foundations of Computer Science

COS 140: Foundations of Computer Science COS 140: Foundations of Computer Science ALOHA Network Protocol Family Fall 2017 Homework 2 Introduction 3 Network Protocols.......................................................... 3 Problem.................................................................

More information

Objective To examine the change in throughput in a local area network when upgrading from a hub to a switch.

Objective To examine the change in throughput in a local area network when upgrading from a hub to a switch. Lab 2 Switches versus Hubs Overview Ethernet hubs work at the physical layer, simply repeating any frames they receive on one port onto all other ports. For this reason, they are also called multiport

More information

Switched LANs. A Set of Local Area Networks Interconnected by Switches

Switched LANs. A Set of Local Area Networks Interconnected by Switches Laboratory 3 Switched LANs A Set of Local Area Networks Interconnected by Switches Objective This lab is designed to demonstrate the implementation of switched local area networks. The simulation in this

More information

Markov Chains and Multiaccess Protocols: An. Introduction

Markov Chains and Multiaccess Protocols: An. Introduction Markov Chains and Multiaccess Protocols: An Introduction Laila Daniel and Krishnan Narayanan April 8, 2012 Outline of the talk Introduction to Markov Chain applications in Communication and Computer Science

More information

High Level View. EE 122: Ethernet and Random Access protocols. Medium Access Protocols

High Level View. EE 122: Ethernet and Random Access protocols. Medium Access Protocols High Level View EE 122: Ethernet and 802.11 Ion Stoica September 18, 2002 Goal: share a communication medium among multiple hosts connected to it Problem: arbitrate between connected hosts Solution goals:

More information

COMPUTER NETWORKS - Local area networks

COMPUTER NETWORKS - Local area networks Local area networks Telecommunication Networks Group firstname.lastname@polito.it http://www.telematica.polito.it/ COMPUTER NETWORKS LANs - 1 Copyright Quest opera è protetta dalla licenza Creative Commons

More information

Random Access. 1. Aloha. 2. Slotted Aloha 3. CSMA 4. CSMA/CD

Random Access. 1. Aloha. 2. Slotted Aloha 3. CSMA 4. CSMA/CD Random Access 1. Aloha 2. Slotted Aloha 3. CSMA 4. CSMA/CD Background Communication medium B No Collision collision A C Modern Local Area Networks (LANs) operate as follows Users are connected to communication

More information

Local area networks. Copyright

Local area networks. Copyright Local area networks Telecommunication Networks Group firstname.lastname@polito.it http://www.telematica.polito.it/ COMPUTER NETWORKS LANs - 1 Copyright Quest opera è protetta dalla licenza Creative Commons

More information

SIMON FRASER UNIVERSITY SCHOOL OF ENGINEERING SCIENCE. Spring 2013 ENSC 427: COMMUNICATION NETWORKS. Midterm No. 2(b) Monday, March 18, 2013

SIMON FRASER UNIVERSITY SCHOOL OF ENGINEERING SCIENCE. Spring 2013 ENSC 427: COMMUNICATION NETWORKS. Midterm No. 2(b) Monday, March 18, 2013 SIMON FRASER UNIVERSITY SCHOOL OF ENGINEERING SCIENCE Spring 2013 ENSC 427: COMMUNICATION NETWORKS Midterm No. 2(b) Monday, March 18, 2013 Duration: 50 minutes. Attempt all problems. Questions may not

More information

Packet multiple access and the Aloha protocol

Packet multiple access and the Aloha protocol Packet multiple access and the Aloha protocol Massachusetts Institute of Technology Department of Aeronautics and Astronautics Slide 1 Packet Multiple Access PMA SHARED UPLINK TERMINAL TERMINAL APPL TRANS

More information

OPNET Modeler. Tommy Svensson Alex Popescu

OPNET Modeler. Tommy Svensson Alex Popescu OPNET Modeler Development of laboratory exercises based on OPNET Modeler Tommy Svensson This thesis is presented as a part of the Master of Science Degree in Electrical Engineering with emphasis on Telecommunications

More information

Chapter 3 Process Domain

Chapter 3 Process Domain Chapter 3 Process Domain 173-Prdef 174-Prdef Modeling Concepts Modeling Concepts Introduction Prdef.1 Introduction Process models are used to specify the behavior of processor and queue modules which exist

More information

EE 122: Ethernet and

EE 122: Ethernet and EE 122: Ethernet and 802.11 Ion Stoica September 18, 2002 (* this talk is based in part on the on-line slides of J. Kurose & K. Rose) High Level View Goal: share a communication medium among multiple hosts

More information

Analysis of BitTorrent Protocol and Its Effect on the Network

Analysis of BitTorrent Protocol and Its Effect on the Network SIMON FRASER UNIVERSITY Analysis of BitTorrent Protocol and Its Effect on the Network ENSC 427: Final Project Report Spring 2011 Group 11 www.sfu.ca/~kna5/ensc427 Ken Kyoungwoo Nam 301046747 Kna5 @sfu.ca

More information

Computer Network Fundamentals Spring Week 3 MAC Layer Andreas Terzis

Computer Network Fundamentals Spring Week 3 MAC Layer Andreas Terzis Computer Network Fundamentals Spring 2008 Week 3 MAC Layer Andreas Terzis Outline MAC Protocols MAC Protocol Examples Channel Partitioning TDMA/FDMA Token Ring Random Access Protocols Aloha and Slotted

More information

Multimedia Communication Services Traffic Modeling and Streaming

Multimedia Communication Services Traffic Modeling and Streaming Multimedia Communication Services Traffic Modeling and Streaming Medium Access Control algorithms Introduction and details on Aloha networks with infinite nodes Università degli Studi di Brescia A.A. 2014/2015

More information

Introduction to Modeler

Introduction to Modeler Table of Contents Lab: Using The Project Editor...2 Lab: Building a First Network...11 Lab: Using Other Editors...28 Extra Credit Lab: Discrete Event Simulation Studies...32 Lab: Node Modeling...39 Lab:

More information

Jaringan Komputer. Broadcast Network. Outline. MAC (Medium Access Control) Channel Allocation Problem. Dynamic Channel Allocation

Jaringan Komputer. Broadcast Network. Outline. MAC (Medium Access Control) Channel Allocation Problem. Dynamic Channel Allocation Broadcast Network Jaringan Komputer Medium Access Control Sublayer 2 network categories: point-to-point connections broadcast channels Key issue in broadcast network: how to determine who gets to use the

More information

Advanced Communication Lab OPNET Tutorial

Advanced Communication Lab OPNET Tutorial Advanced Communication Lab OPNET Tutorial SS 2014 Authors: Mohammad M. Siddique, Andreas J. Könsgen 1 1. Log on to the computer. 2. Open the OPNET program by clicking on the respective icon. 3. After the

More information

This document presents the basics of OPNET Modeler. The content of this document is mainly transcript from the OPNET documentation [www.opnet.com].

This document presents the basics of OPNET Modeler. The content of this document is mainly transcript from the OPNET documentation [www.opnet.com]. Instituto Superior de Engenharia do Porto (ISEP) Departamento de Engenharia Informática (DEI) Mestrado em Engenharia Informática (MEI) Área: Arquitectura, Sistemas e Redes Sistemas Móveis (SIMOV) Paulo

More information

Peer-to-Peer Networks: Gnutella. Team #6

Peer-to-Peer Networks: Gnutella. Team #6 1 Peer-to-Peer Networks: Gnutella Frigo, Daniel Alwaris, Tauseef Ma, Mark Team #6 daf2@sfu.ca talwaris@sfu.ca mma58@sfu.ca 2 Table of contents 1. Abstract...... 3 2. Introduction......3 3. Objectives......3

More information

CSMA/CD (Collision Detection)

CSMA/CD (Collision Detection) CSMA/CD (Collision Detection) CD (collision detection): easy in wired LANs: measure signal strengths, compare transmitted, received signals difficult in wireless LANs: received signal strength overwhelmed

More information

Chapter 4. The Medium Access Control Sublayer. Points and Questions to Consider. Multiple Access Protocols. The Channel Allocation Problem.

Chapter 4. The Medium Access Control Sublayer. Points and Questions to Consider. Multiple Access Protocols. The Channel Allocation Problem. Dynamic Channel Allocation in LANs and MANs Chapter 4 The Medium Access Control Sublayer 1. Station Model. 2. Single Channel Assumption. 3. Collision Assumption. 4. (a) Continuous Time. (b) Slotted Time.

More information

Review. Error Detection: CRC Multiple access protocols. LAN addresses and ARP Ethernet. Slotted ALOHA CSMA/CD

Review. Error Detection: CRC Multiple access protocols. LAN addresses and ARP Ethernet. Slotted ALOHA CSMA/CD Review Error Detection: CRC Multiple access protocols Slotted ALOHA CSMA/CD LAN addresses and ARP Ethernet Some slides are in courtesy of J. Kurose and K. Ross Overview Ethernet Hubs, bridges, and switches

More information

Problem Set Name the 7 OSI layers and give the corresponding functionalities for each layer.

Problem Set Name the 7 OSI layers and give the corresponding functionalities for each layer. Problem Set 1 1. Why do we use layering in computer networks? 2. Name the 7 OSI layers and give the corresponding functionalities for each layer. 3. Compare the network performance of the 3 Multiple Access

More information

Wireless Medium Access Control Protocols

Wireless Medium Access Control Protocols Wireless Medium Access Control Protocols Telecomunicazioni Undergraduate course in Electrical Engineering University of Rome La Sapienza Rome, Italy 2007-2008 Classification of wireless MAC protocols Wireless

More information

Multiple Access Protocols

Multiple Access Protocols Multiple Access Protocols Computer Networks Lecture 2 http://goo.gl/pze5o8 Multiple Access to a Shared Channel The medium (or its sub-channel) may be shared by multiple stations (dynamic allocation) just

More information

EITF25 Internet Techniques and Applications L4: Network Access. Stefan Höst

EITF25 Internet Techniques and Applications L4: Network Access. Stefan Höst EITF25 Internet Techniques and Applications L4: Network Access Stefan Höst Repetition The link layer protocol should make sure that the data is correctly transmitted over the physical link using error

More information

Aloha and slotted aloha

Aloha and slotted aloha CSMA 2/13/06 Aloha and slotted aloha Slotted aloha: transmissions are synchronized and only start at the beginning of a time slot. Aloha sender A sender B collision sender C t Slotted Aloha collision sender

More information

Medium Access Control

Medium Access Control Medium Access Control Fundamental Problem N nodes in vicinity want to transmit (to, say, N other nodes). How to do this interference free? Interference free means SINR Otherwise, we say that packets collide.

More information

Redes de Computadores. Medium Access Control

Redes de Computadores. Medium Access Control Redes de Computadores Medium Access Control Manuel P. Ricardo Faculdade de Engenharia da Universidade do Porto 1 » How to control the access of computers to a communication medium?» What is the ideal Medium

More information

King Fahd University of Petroleum and Minerals College of Computer Sciences and Engineering Department of Computer Engineering

King Fahd University of Petroleum and Minerals College of Computer Sciences and Engineering Department of Computer Engineering Student Name: Section #: King Fahd University of Petroleum and Minerals College of Computer Sciences and Engineering Department of Computer Engineering COE 344 Computer Networks (T072) Final Exam Date

More information

Chapter 6 Medium Access Control Protocols and Local Area Networks

Chapter 6 Medium Access Control Protocols and Local Area Networks Chapter 6 Medium Access Control Protocols and Local Area Networks Part I: Medium Access Control Part II: Local Area Networks CSE 3213, Winter 2010 Instructor: Foroohar Foroozan Chapter Overview Broadcast

More information

CSE/EE 461 Section 2

CSE/EE 461 Section 2 CSE/EE 461 Section 2 Latency in a store-and-forward network 4ms, 10MB/s B How long does it take to send a 2kB packet from to B? 2ms, 10MB/s C 2ms, 10MB/s B What if it has to pass through a node C? Plan

More information

OPNET Editors and Features

OPNET Editors and Features OPNET Steven Gordon Sirindhorn International Institute of Technology Thammasat University June 2010 Contents OPNET Menus Nodes and Links Communication Running Multiple OPNET Commonly used editors: 1. Project

More information

COMMUNICATION NETWORKS NETW 501

COMMUNICATION NETWORKS NETW 501 COMMUNICATION NETWORKS NETW 501 TUTORIAL 6 Presented by: Eng. Hana Hesham Eng. Mohamed Atef Data Link Layer Data Link Layer is split into 2 sublayers which are the Logical Link Control (LLC) and the Medium

More information

CS 716: Introduction to communication networks. - 9 th class; 19 th Aug Instructor: Sridhar Iyer IIT Bombay

CS 716: Introduction to communication networks. - 9 th class; 19 th Aug Instructor: Sridhar Iyer IIT Bombay CS 716: Introduction to communication networks - 9 th class; 19 th Aug 2011 Instructor: Sridhar Iyer IIT Bombay Contention-based MAC: ALOHA Users transmit whenever they have data to send Collisions occur,

More information

Programming Project. Remember the Titans

Programming Project. Remember the Titans Programming Project Remember the Titans Due: Data and reports due 12/10 & 12/11 (code due 12/7) In the paper Measured Capacity of an Ethernet: Myths and Reality, David Boggs, Jeff Mogul and Chris Kent

More information

Contention Protocols and Networks

Contention Protocols and Networks 4/13/2005 314 Lecture Contention Protocols and Networks 1 Contention Protocols and Networks Contention Protocols CSMA/CD Network Topologies Ethernet 4/13/2005 314 Lecture Contention Protocols and Networks

More information

CHAPTER 7 MAC LAYER PROTOCOLS. Dr. Bhargavi Goswami Associate Professor & Head Department of Computer Science Garden City College

CHAPTER 7 MAC LAYER PROTOCOLS. Dr. Bhargavi Goswami Associate Professor & Head Department of Computer Science Garden City College CHAPTER 7 MAC LAYER PROTOCOLS Dr. Bhargavi Goswami Associate Professor & Head Department of Computer Science Garden City College MEDIUM ACCESS CONTROL - MAC PROTOCOLS When the two stations transmit data

More information

Lecture 5 The Data Link Layer. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it

Lecture 5 The Data Link Layer. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it Lecture 5 The Data Link Layer Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it Link Layer: setting the context two physically connected devices: host-router, router-router, host-host,

More information

Multiple Access. Data Communications and Networking

Multiple Access. Data Communications and Networking Multiple Access In the previous part we discussed data link control, a mechanism which provides a link with reliable communication. In the protocols we described, we assumed that there is an available

More information

Random Assignment Protocols

Random Assignment Protocols Random Assignment Protocols Random assignment strategies attempt to reduce problem occur in fixed assignment strategy by eliminating pre allocation of bandwidth to communicating nodes. Random assignment

More information

Chapter 5: Link layer

Chapter 5: Link layer Chapter 5: Link layer our goals: v understand principles behind link layer services: error detection, correction sharing a broadcast channel: multiple access link layer addressing local area networks:

More information

LANs. Local Area Networks. via the Media Access Control (MAC) SubLayer. Networks: Local Area Networks

LANs. Local Area Networks. via the Media Access Control (MAC) SubLayer. Networks: Local Area Networks LANs Local Area Networks via the Media Access Control (MAC) SubLayer 1 Local Area Networks Aloha Slotted Aloha CSMA (non-persistent, 1-persistent, p-persistent) CSMA/CD Ethernet Token Ring 2 Network Layer

More information

COS 140: Foundations of Computer Science

COS 140: Foundations of Computer Science COS 140: Foundations of C S Network Protocol Family Fall 2017 Copyright c 2002 2017 UMaine School of Computing and Information S 1 / 25 Homework Homework Slides, book Chapter 24 on line Homework: All exercises

More information

Security Lab 1 Firewall Performance

Security Lab 1 Firewall Performance Security Lab 1 Firewall Performance This lab has been partially based on OPNET Lab Manual To Accompany Data and Computer Communications, by Kevin Brown and Leann Christianson, Prentice Hall, 2004. Objective

More information

2.1 CHANNEL ALLOCATION 2.2 MULTIPLE ACCESS PROTOCOLS Collision Free Protocols 2.3 FDDI 2.4 DATA LINK LAYER DESIGN ISSUES 2.5 FRAMING & STUFFING

2.1 CHANNEL ALLOCATION 2.2 MULTIPLE ACCESS PROTOCOLS Collision Free Protocols 2.3 FDDI 2.4 DATA LINK LAYER DESIGN ISSUES 2.5 FRAMING & STUFFING UNIT-2 2.1 CHANNEL ALLOCATION 2.2 MULTIPLE ACCESS PROTOCOLS 2.2.1 Pure ALOHA 2.2.2 Slotted ALOHA 2.2.3 Carrier Sense Multiple Access 2.2.4 CSMA with Collision Detection 2.2.5 Collision Free Protocols 2.2.5.1

More information

Medium Access Control Sublayer

Medium Access Control Sublayer Wireless (WLAN) Medium Access Control Sublayer Mahalingam Mississippi State University, MS October 20, 2014 Outline Medium Access Protocols Wireless (WLAN) 1 Medium Access Protocols ALOHA Slotted ALOHA

More information

Multiple Access Links and Protocols

Multiple Access Links and Protocols Multiple Access Links and Protocols Two types of links : point-to-point PPP for dial-up access point-to-point link between Ethernet switch and host broadcast (shared wire or medium) old-fashioned Ethernet

More information

TCP: Flow and Error Control

TCP: Flow and Error Control 1 TCP: Flow and Error Control Required reading: Kurose 3.5.3, 3.5.4, 3.5.5 CSE 4213, Fall 2006 Instructor: N. Vlajic TCP Stream Delivery 2 TCP Stream Delivery unlike UDP, TCP is a stream-oriented protocol

More information

ECE453 Introduction to Computer Networks. Broadcast vs. PPP. Delay. Lecture 7 Multiple Access Control (I)

ECE453 Introduction to Computer Networks. Broadcast vs. PPP. Delay. Lecture 7 Multiple Access Control (I) ECE453 Introduction to Computer Networks Lecture 7 Multiple Access Control (I) 1 Broadcast vs. PPP Broadcast channel = multiaccess channel = random access channel Broadcast LAN Satellite network PPP WAN

More information

CSE 461: Multiple Access Networks. This Lecture

CSE 461: Multiple Access Networks. This Lecture CSE 461: Multiple Access Networks This Lecture Key Focus: How do multiple parties share a wire? This is the Medium Access Control (MAC) portion of the Link Layer Randomized access protocols: 1. Aloha 2.

More information

Chapter 4. The Medium Access Control Sublayer

Chapter 4. The Medium Access Control Sublayer Chapter 4 The Medium Access Control Sublayer The Channel Allocation Problem Static Channel Allocation in LANs and MANs Dynamic Channel Allocation in LANs and MANs Dynamic Channel Allocation in LANs and

More information

LECTURE PLAN. Script. Introduction about MAC Types o ALOHA o CSMA o CSMA/CD o CSMA/CA

LECTURE PLAN. Script. Introduction about MAC Types o ALOHA o CSMA o CSMA/CD o CSMA/CA Course- B.Sc. Applied Physical Science (Computer Science) Year- IIIrd, Sem- Vth Subject Computer Science Paper- XVIIth, Computer Networks Lecture -11 Lecture Title- Medium Access Layer Script Today in

More information

ENGI 4557 Digital Communications Practice Problems 2017 (Part 2)

ENGI 4557 Digital Communications Practice Problems 2017 (Part 2) ENGI 4557 Digital Communications Practice Problems 207 (Part 2) H = n p i log 2 ( ) p i C = W log 2 ( + S N ) SNR = 6m + 0 log 0 ( 3σ2 x V ) 2 SNR = 6m 0 ( ) n n! = k k!(n k)! x = σ 2 = + + x p(x)dx (x

More information

Ethernet. Introduction. CSE 3213 Fall 2011

Ethernet. Introduction. CSE 3213 Fall 2011 Ethernet CSE 3213 Fall 2011 19 October 2011 1 Introduction Rapid changes in technology designs Broader use of LANs New schemes for high-speed LANs High-speed LAN technologies: Fast and gigabit Ethernet

More information

Lecture 6 The Data Link Layer. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it

Lecture 6 The Data Link Layer. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it Lecture 6 The Data Link Layer Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it Link Layer: setting the context two physically connected devices: host-router, router-router, host-host,

More information

Summary of MAC protocols

Summary of MAC protocols Summary of MAC protocols What do you do with a shared media? Channel Partitioning, by time, frequency or code Time Division, Code Division, Frequency Division Random partitioning (dynamic) ALOHA, S-ALOHA,

More information

Chapter 12 Multiple Access 12.1

Chapter 12 Multiple Access 12.1 Chapter 12 Multiple Access 12.1 Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. 12.2 Figure 12.1 Data link layer divided into two functionality-oriented sublayers

More information

Lecture 8 The Data Link Layer part I. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it

Lecture 8 The Data Link Layer part I. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it Lecture 8 The Data Link Layer part I Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it Link Layer: setting the context two physically connected devices: host-router, router-router,

More information

Data Link Layer: Collisions

Data Link Layer: Collisions Data Link Layer: Collisions 1 Multiple Access Data Link layer divided into two sublayers. The upper sublayer is responsible for datalink control, The lower sublayer is responsible for resolving access

More information

Lecture 12 December 04, Wireless Access. Graduate course in Communications Engineering. University of Rome La Sapienza. Rome, Italy

Lecture 12 December 04, Wireless Access. Graduate course in Communications Engineering. University of Rome La Sapienza. Rome, Italy Lecture 12 December 04, 2017 Wireless Access Graduate course in Communications Engineering University of Rome La Sapienza Rome, Italy 2017-2018 Random Medium Access Control Part II - CSMA and Collision

More information

Chapter 6 Communication Mechanisms

Chapter 6 Communication Mechanisms Chapter 6 Communication Mechanisms 395-Comec 396-Comec Modeling Concepts Modeling Concepts Introduction Comec.1 Introduction Most OPNET models can be classified as distributed systems composed of multiple

More information

Security Labs in OPNET IT Guru

Security Labs in OPNET IT Guru Security Labs in OPNET IT Guru Universitat Ramon Llull Barcelona 2004 Security Labs in OPNET IT Guru Authors: Cesc Canet Juan Agustín Zaballos Translation from Catalan: Cesc Canet -I- Overview This project

More information

Chapter 1 Basic concepts of wireless data networks (cont d)

Chapter 1 Basic concepts of wireless data networks (cont d) Chapter 1 Basic concepts of wireless data networks (cont d) Part 2: Medium access methods for mobile data networks Sept 15 2004 1 Fixed assignment access schemes in voice-oriented networks Frequency division

More information

Simulated SA Throughput vs. p

Simulated SA Throughput vs. p Problem 1. Simulation of Slotted Aloha network (A) There are n stations in the network that are trying to transmit messages to an access point. (B) All the stations are synchronized and they are using

More information

Managing Caching Performance and Differentiated Services

Managing Caching Performance and Differentiated Services CHAPTER 10 Managing Caching Performance and Differentiated Services This chapter explains how to configure TCP stack parameters for increased performance ant throughput and how to configure Type of Service

More information

Strengthening Unlicensed Band Wireless Backhaul

Strengthening Unlicensed Band Wireless Backhaul be in charge Strengthening Unlicensed Band Wireless Backhaul Use TDD/TDMA Based Channel Access Mechanism WHITE PAPER Strengthening Unlicensed Band Wireless Backhaul: Use TDD/TDMA Based Channel Access Mechanism

More information

Frame Relay Network Performance

Frame Relay Network Performance Lab 4 Frame Relay Network Performance Overview Frame Relay is a connection-oriented, unreliable technology based on virtual circuits. A virtual circuit must be set up between a source and destination before

More information

Using OPNET to Enhance Student Learning in a Data Communications

Using OPNET to Enhance Student Learning in a Data Communications Using OPNET to Enhance Student Learning in a Data Communications Course Michael W Dixon Murdoch University, Perth, Australia m.dixon@murdoch.edu.au Terry W Koziniec Murdoch University, Perth, Australia

More information

Cover sheet for Assignment 3

Cover sheet for Assignment 3 Faculty of Arts and Science University of Toronto CSC 358 - Introduction to Computer Networks, Winter 2018, LEC0101 Cover sheet for Assignment 3 Due Monday March 5, 10:00am. Complete this page and attach

More information

The Link Layer and LANs. Chapter 6: Link layer and LANs

The Link Layer and LANs. Chapter 6: Link layer and LANs The Link Layer and LANs EECS3214 2018-03-14 4-1 Chapter 6: Link layer and LANs our goals: understand principles behind link layer services: error detection, correction sharing a broadcast channel: multiple

More information

Communication Network Simulations Using OPNET

Communication Network Simulations Using OPNET 521365S Tietoliikenteen simuloinnit ja työkalut Communication Network Simulations Using OPNET 20.4.2010 klo 12.15 TS407 Juha-Pekka Mäkelä juha.makela AT ee.oulu.fi 1 Network simulations Simulations are

More information

Medium Access Control. IEEE , Token Rings. CSMA/CD in WLANs? Ethernet MAC Algorithm. MACA Solution for Hidden Terminal Problem

Medium Access Control. IEEE , Token Rings. CSMA/CD in WLANs? Ethernet MAC Algorithm. MACA Solution for Hidden Terminal Problem Medium Access Control IEEE 802.11, Token Rings Wireless channel is a shared medium Need access control mechanism to avoid interference Why not CSMA/CD? 9/15/06 CS/ECE 438 - UIUC, Fall 2006 1 9/15/06 CS/ECE

More information

CMPE 257: Wireless and Mobile Networking

CMPE 257: Wireless and Mobile Networking CMPE 257: Wireless and Mobile Networking Katia Obraczka Computer Engineering UCSC Baskin Engineering Lecture 3 CMPE 257 Winter'11 1 Announcements Accessing secure part of the class Web page: User id: cmpe257.

More information

Lecture 05 Chapter 16 High Speed LANs

Lecture 05 Chapter 16 High Speed LANs NET 456 High Speed Networks Lecture 05 Chapter 16 High Speed LANs Dr. Anis Koubaa Reformatted slides from textbook Data and Computer Communications, Ninth Edition by William Stallings, 1 (c) Pearson Education

More information

Introduction to Real-Time Communications. Real-Time and Embedded Systems (M) Lecture 15

Introduction to Real-Time Communications. Real-Time and Embedded Systems (M) Lecture 15 Introduction to Real-Time Communications Real-Time and Embedded Systems (M) Lecture 15 Lecture Outline Modelling real-time communications Traffic and network models Properties of networks Throughput, delay

More information

Homework 1. Question 1 - Layering. CSCI 1680 Computer Networks Fonseca

Homework 1. Question 1 - Layering. CSCI 1680 Computer Networks Fonseca CSCI 1680 Computer Networks Fonseca Homework 1 Due: 27 September 2012, 4pm Question 1 - Layering a. Why are networked systems layered? What are the advantages of layering? Are there any disadvantages?

More information

CMPE 150/L : Introduction to Computer Networks. Chen Qian Computer Engineering UCSC Baskin Engineering Lecture 16

CMPE 150/L : Introduction to Computer Networks. Chen Qian Computer Engineering UCSC Baskin Engineering Lecture 16 CMPE 150/L : Introduction to Computer Networks Chen Qian Computer Engineering UCSC Baskin Engineering Lecture 16 1 Final project demo Please do the demo next week to the TAs. So basically you may need

More information

3. (a) Explain WDMA protocol. (b) Explain wireless LAN protocol. [8+8]

3. (a) Explain WDMA protocol. (b) Explain wireless LAN protocol. [8+8] Code No: RR410402 Set No. 1 1. (a) List two advantages and two disadvantages of having international standards for network, Protocols? (b) With a neat diagram, explain the functionality of layers, protocols

More information

Mobile Communications Chapter 3 : Media Access

Mobile Communications Chapter 3 : Media Access Mobile Communications Chapter 3 : Media Access 2. Motivation 3. SDMA, FDMA, TDMA 1. Aloha and contention based schemes 4. Reservation schemes 5. Collision avoidance, MACA 6. Polling CDMA (Lecture 6) Prof.

More information

CSE 461 Multiple Access. David Wetherall

CSE 461 Multiple Access. David Wetherall CSE 461 Multiple Access David Wetherall djw@cs.washington.edu How to share a link Multiplexing = networking term for sharing a resource among multiple users (e.g., link, protocol instance) Topics: Multiplexing

More information

Data and Computer Communications

Data and Computer Communications Data and Computer Communications Chapter 16 High Speed LANs Eighth Edition by William Stallings Why High Speed LANs? speed and power of PCs has risen graphics-intensive applications and GUIs see LANs as

More information