Lab 3: Performance Analysis of ALOHA
|
|
- Roberta Townsend
- 5 years ago
- Views:
Transcription
1 Lab 3: Performance Analysis of ALOHA ALOHA is one of the basic random access methods in mobile data networks. It is based on mobile terminals sending their packets without any coordination between them. The main advantage of using ALOHA access method is its simplicity and the ease of applicability. No synchronization between mobile transmitters is required. The terminals basically transmit their packets as soon as they receive them from higher layers and if there is a collision at the receiver side, they basically retransmit the packet. The collision is detected at the receiver side by a simple error detection code. The disadvantage of the ALOHA is its low throughput under heavy load conditions. (i.e. the number of collisions are going to increase as the number of users increase.) In this third OPNET lab, we are going to simulate ALOHA random access protocol and answer the following simple questions about ALOHA based random access methods. 1) What is the behavior of ALOHA throughout as the load of the network increases? 2) What is the maximum achievable network throughput by using ALOHA? 3) Do the simulation results verify analytical results? (Show that the maximum throughout values match) 4) How one can improve the throughout performance of ALOHA? 5) What type of relation would be observed between network load and throughput if there is one and only one user transmitting? Overview In this lab, the complete simulation model of ALOHA protocol is explained and simulated step-bystep. All the simulation components that are going to be used in ALOHA model is designed from scratch in order to understand the capabilities and the structure of OPNET. Such a detailed analysis is not going to be performed and built in functions and modules are going to be used in the following lab. The main task of this lab is to design a model that includes a multi-tap bus link, where multiple stations (i.e. transmitters) utilizing ALOHA random access protocol share a common channel. ALOHA Simulation Hierarchy in OPNET In order to implement ALOHA method, we must have multiple transmitters, a multi-tap bus line and a single receiver in the network configuration. We will use node model to build each transmitter and receiver structure. And we know from Lab 2, OPNET Tutorial, that we will need to use the process model in order to define the behavior of the each node in the node model. (e.g. Transmitter should retransmit the packet in case of collision.) The generic OPNET hierarchy and the corresponding names that we will assign on each model is illustrated in the figure below. When working with new files, you can use your student number in order to differentiate the files you are working from already built-in ones. A possible file name and an example illustration for the corresponding model is shown in the figure. The network model consists of two node models (one for transmitter and one for receiver node) and each node model is made up of process models, which define the behavior of each node. Step-bystep design and construction of each model is illustrated. The main purpose of this lab is to illustrate the interactions between different OPNET hierarchy. (i.e. How process models are assigned to node models or how do two different node models communicate with each other?) CEG4190 Lab 3 page 1 of 11
2 Illustration 1: ALOHA simulation components and simulation overview Step by step building of the network structure is as follows: Create a transmitter process model and specify the characteristic of transmitter node Create a node for transmitter in node model Create a receiver process model and specify the characteristic of receiver node Create a node for receiver in node model Create a bus link model for shared environment Create a network model by using the created transmitter and receiver nodes Choose the simulation parameters to observe and vary Analyze the performance of the system CEG4190 Lab 3 page 2 of 11
3 The network model, node model and the process model that we are going to built for ALOHA random access method is illustrated in the figure below. It shows the network that consist of 20 transmitters sharing the same bus link and sending packets to a single receiver. The node models and process models of each receiver and transmitter are illustrated. Before starting the network design, lets look at the each node and process model individually. Illustration 2: ALOHA network-node-process model illustration The transmitter node basically generates packets, process them (i.e. counts the number of packets it generates for network load calculation) and sends them on the bus. This can be modeled in the node model by using a simple source, a processor and a bus transmitter nodes. Data source and bustransmitter nodes are built-in nodes in the node model. We only need to create processor node that relays the packets to bus-transmitter when activated and counts the number of packets sent. The receiver node basically monitors the collisions on the bus. Therefore it is consist of a bus receiver and a processor module. The receiver process model specifies the behavior of the custom processor module. It is responsible for handling received packets for statistical collection. It manages this statistics by creating and modifying global variables. Basically it counts the number of the successfully received packets (network throughput) and destroys the received packets (i.e. We are only concerned about the number of the packets that are received correctly, the contents of packets are not important). After creating the relevant process and node models for receiver and transmitters, we will connect those models with a multi-tab bus on the network model. We will be investigating the throughput performance of ALOHA random access protocol. Using a built-in simulation sequence editor we will simulate the same network in different loading conditions. That is to say, the already prepared simulation sequence editor will assign different packet inter-arrival times to transmitters in each simulation. In total, 12 simulations are going to be performed. Simulation results will be written on a scalar file and simulation analysis editor will be used to observe simulation results. Let's start building our model with transmitter (Tx) process model. CEG4190 Lab 3 page 3 of 11
4 Designing ALOHA Tx Process Model 1) Start modeler. 2) From the menu choose: File > New > Process Model. And click Ok. 3) We are going to create two states for transmitter by create state button. Name them Idle state (transmitter waiting for an transmit interrupt) and Transmit state (Transmitter is actively involved in transmission.). You can turn off the state creation by right clicking on the process model window. 4) A transmitter is supposed to transmit when a new packet arrived and go back to listen ( Idle ) state. Therefore, we should change the status of the Transmit state to forced by right clicking on it and choosing Make State Forced option from the pop-up menu. 5) Draw the transitions between states by. Remember that the transition from Idle to Transmit occurs if a new packet arrives. Therefore it is a conditional transition. To implement this condition on the transition, right click on the transition line and type PKT_ARVL to condition attribute. Draw another transition from Transmit to idle state with no condition. 6) Header block of the process model is used for defining the conditions in the transitions, declaring global variables and indicating the streaming of the process node (The connectivity of the node. e.g. input stream from data generator and output stream to bus transmitter). Open the header block and enter the code shown. /* Input stream from generator module */ #define IN_STRM 0 /* Output stream to bus transmitter module */ #define OUT_STRM 0 /* Conditional macros */ #define PKT_ARVL (op_intrpt_type() == OPC_INTRPT_STRM) /* Global Variable */ extern int subm_pkts; 7) Temporary variables are the ones that change on every call of the process model. The only parameter that changes on each call of the processor is the incoming packet. Therefore define a packet pointer in the temporary variable block. /* Outgoing packet */ Packet *out_pkt; When we start the simulation, we don t want it to continue forever. Therefore we create an integer variable max_packet_count on state variable tab of process model. State variables keep their value throughout the simulation. We will assign its value while specifying simulation parameters. 8) After defining the parameters, we will set the enter and exit executives of the Idle and Transmit states. The Idle state only retrieves the maximum packet number value. The Transmit state acquire the packet from the input stream, send the packet, updates the global submitted packet counter and ends the simulation if the packet counter value reaches to max_packet_count. Therefore enter the following code for enter executive block of the Idle state /* Get the maximum packet count, */ /* set at simulation run-time */ CEG4190 Lab 3 page 4 of 11
5 op_ima_sim_attr_get (OPC_IMA_INTEGER, "max packet count", &max_packet_count); and the following code to enter executive block of Transmit state: /* A packet has arrived for transmission. Acquire */ /* the packet from the input stream, send the packet */ /* and update the global submitted packet counter. */ out_pkt = op_pk_get (IN_STRM); op_pk_send (out_pkt, OUT_STRM); ++subm_pkts; /* Compare the total number of packets submitted with */ /* the maximum set for this simulation run. If equal */ /* end the simulation run. */ if (subm_pkts == max_packet_count) { op_sim_end ("max packet count reached.", "", "", ""); } The variable subm_pkts is a global variable that will be declared later by the receiver. 9) When we want to run a simulation, we will need to assign the max_packet_count value to simulation editor in order to let him know when to end the simulation. Therefore, we need to define a global attribute that could be set at simulation run time and loaded into the state variable max_packet_count. From process model menu, go to : Interfaces > Global Attributes and enter max packet count as a type integer. 10) Finally you should edit process interfaces. From the menu go to : Interfaces > Process Interfaces and change the initial value of the begsim_intrpt attribute to enabled and change the status of all the attributes to hidden. This would enable the first interrupt event when the simulation begins. 11) After writing the source code and doing all the modification we should compile the code by clicking on the orange compile process model button and save the process model as pm_<student_number>_tx e.g. pm_ _tx. After all the steps, your process model should look like: CEG4190 Lab 3 page 5 of 11
6 Illustration 3: Transmitter process model Designing ALOHA Tx Node Model 1) From the menu of Process Model choose: File > New >Node Model. And click Ok. 2) Create two processor modules and one bus transmitter. Name the two processor modules as gen and tx_proc and name bus transmitter as bus_tx. 3) Connect the gen to tx_proc and tx_proc to bus transmitter by packet streams. 4) Set the process model attribute of the gen to simple_source and the same attribute of tx_proc to the created process model pm_ _tx. 5) In the transmitter node model, we are interested in assigning different values to the generators inter arrival time attribute of the gen. Therefore we had better promote this attribute to a higher layer (network layer) so we could more easily change the value and observe the changes. We can do that change by right clicking on the Packet Interarrival Time attribute of gen and choosing Promote to higher layer option. 6) Finally save the node model as nm_ _tx. Your node model should look like: CEG4190 Lab 3 page 6 of 11
7 Illustration 4: Transmitter node model Designing ALOHA Rx Process Model Illustration 5: Receiver process model 1) From the menu of Process Model choose: File > New >Process Model. And click Ok. 2) Create two states and name them as init and idle. Change the status of the init state to forced by right clicking on the state and choosing make state forced option. 3) Draw the state transitions as shown below. We should understand the functionality of each state and each transition of the process model. The basic functionality of the receiver is to wait for the packet to arrive and upon arrival, to update the relevant statistics of the network. This behavior can be clearly seen from the process model illustrated below. When simulation starts receiver goes into init state, where it assigns an initial value to all the simulation parameters (e.g. max_packet_count = 0). Upon arrival of a packet (PKT_RCVD condition) it executes proc_pkt() function and changes state to idle. proc_pkt() function basically receives packet, increases the packet count and deletes the packet. The transition between init and idle state can occur if simulation terminated (END_SIM condition). At the end of the simulation all the statistics should be collected by record_stats() function. After passing to idle state, receiver CEG4190 Lab 3 page 7 of 11
8 basically waits for either packet to arrive or simulation end command. default condition is required in case of any other interrupt affecting the receiver. 4) Assign the conditions of transitions by modifying condition attribute of the transitions and functions to be executed by modifying executive attribute of the transitions in the process model as illustrated in the figure. 5) Using the header block of process model, define conditional macros, global variables and input streams by typing: /* Input stream from bus receiver */ #define IN_STRM 0 /*conditional macros */ #define PKT_RCVD (op_intrpt_type () == OPC_INTRPT_STRM) #define END_SIM (op_intrpt_type () == OPC_INTRPT_ENDSIM) /* Global variable */ int subm_pkts = 0; 6) The receiver process model uses rcvd_pkts state variable to keep track of the number of valid received packets. (Notice that it is a state variable which keeps its value between process model executions.) Open the state variables block and define rcvd_pkts variable as an integer 7) In the receiver process model, we utilize two different functions: proc_pkt() and record_stats() for packet receiving and statistic writing. We should define those functions in the function block of the process model. Open the function block of the process model and enter the following code: /* This function gets the received packet, destroys */ /* it, and logs the incremented received packet total*/ void proc_pkt () { Packet* in_pkt; /* Get packet from bus receiver input stream */ in_pkt = op_pk_get (IN_STRM); /*Destroy the received packet */ op_pk_destroy (in_pkt); /* Increment the count of received packet */ ++rcvd_pkts; } /* This function writes the end-of-simulation channel */ /* traffic and channel throughput statistics to a */ /* scalar file */ void record_stats () { /* Record final statistics */ op_stat_scalar_write("channel Traffic G",(double) subm_pkts / op_sim_time ()); op_stat_scalar_write("channel Throughput S",(double) rcvd_pkts / op_sim_time ()); } CEG4190 Lab 3 page 8 of 11
9 As seen from the code the channel load (G) is defined as the number of packets sent during the simulation interval and the channel throughput (S) is defined as the number or successfully received packets during the simulation interval. 8) After defining the variables and functions of the process model, we only need to define the enter executive of the init state. Double click on the top half of the init state and enter the following code: /* Initialize accumulator */ rcvd_pkts = 0; 9) Like we have done for the transmitter process model, we need to modify the process interfaces of receiver model too. Namely, Choose Interfaces > Process Interfaces. Change the initial value of the endsim intrpt attribute to enabled and change the status of all the attributes to hidden 10) Finally, compile the process model by clicking orange compile process model button on the process model window and save the process model as pm_ _rx. Designing ALOHA Rx Node Model 1) From the menu of Process Model choose: File > New >Node Model. And click Ok. 2) Create one process module and one bus receiver module. Name process module as rx_proc and bus receiver module as bus_rx. 3) Connect bus_rx with packet stream to rx_proc. 4) Open rx_proc s attribute dialog box by right clicking and assign its process model to pm_ _tx process model that we have created in the previous section. 5) Change the node interfaces. Choose Interfaces > Node Interfaces. In the Node Types table, change the Supported value to no for the mobile and satellite types. In the Attributes table, change the Status of all the attributes to hidden. 6) Save the Node Model as nm_ _rx. Designing ALOHA Link Model 1) From the menu of Process Model choose: File > New >Link Model. And click Ok. 2) In the Supported Link Types table, change the supported value to no for the ptsimp and ptdup types. Which means this link supports only the bus and bus tap types. 3) Save the Link Model as lm_ Designing ALOHA Network Model 1) From the menu of Process Model choose: File > New >Project. And click Ok. 2) Name the project as: proj_ and the scenario as Aloha. Click Ok. Follow the widzard as: Create Empty Scenario > Office > 700 m x 700 m > None of the technologies and Ok. 3) On the object palette: Configure Palette > Clear. Add lm_ link model and nm_ _tx, nm_ _rx node models to the palette 4) From the Project window menu: Topology > Rapid configuration > Bus. Enter the values as given below: 5) With that topology we created 20 transmitters. But we need to add drag and drop the receiver node model and connect bus to receiver with the tap link. Be aware that connecting the receiver to bus would result in different results. To be on the safe side connect bus to the receiver. CEG4190 Lab 3 page 9 of 11
10 Illustration 6: Rapid configuration example 6) After completing all the steps and naming the receiver node model as RX, your project editor should look like the figure below: Illustration 7: Project model Executing the ALOHA Simulation In this section we will analyze the throughput performance of ALOHA random access protocol under different load conditions. 12 different simulation are done simultaneously with simulation editor. The network loading is going to be changed by editing data inter-arrival time of transmitters. We will CEG4190 Lab 3 page 10 of 11
11 analyze the simulations and compare with the theoretical results. Simulation sequence is already prepared for you, so you need to import and configure the Simulation sequence. 1) Choose Scenarios > Scenario Components > Import 2) Select Simulation Sequence from the menu and select cct_network-csma 3) Choose Simulation > Configure Discrete Event Simulation (Advanced) 4) Right click on the simulation sequence icon and select Edit Attributes 5) Click on Advanced tab. Verify that Network is set to Proj_ Aloha. 6) Set Probe file to NONE 7) Set Scalar file to lab2_cct_a. 8) Click on Global Attributes tab and verify that max packet count is ) Click on the Object Attributes tab to see 12 values that have been set for transmitter inter arrival times. 10) Save the file. 11) Click on the Execute Simulation Sequence action button and confirm the execution. Analyzing the Aloha Results Aloha random access performance can be measured by comparing the number of successfully received packets to the number of transmitted packets. Because of the collision on the bus link, some of the packets will be lost. And as the loading increases, the number of collisions would increase which would cause the number of successfully received packets decrease. In network communication terminology, throughput term is used to represent the number of successfully received packets. The result of the simulations are stored in a scalar file. In the simulation editor, 12 different inter-arrival times for the transmitters are assigned and the network throughput is calculated for each simulation. The network performance can be observed by plotting the network throughput with the network loading. To open the scalar output file: 1) In the Project Editor, choose File > New then select Analysis Configuration. Click Ok. 2) Choose File > Load Output Scalar File 3) Select lab2_cct_a from the list of available files. 4) Click on the Create a graph of two scalars action button. 5) Select the horizontal variable Channel Traffic G first, then select the vertical variable Channel Throughput S from the menu of available scalars that appears. 6) Observe the graph and comment on the following questions. Questions 1) Explain the increase the channel throughput until the loading of 0.5 G and the reason behind the decrease of the throughput. 2) What is the value of the maximum throughput and prove the obtained value by working on the theoretical network throughput formula of ALOHA random access model: S = Ge -2G 3) In the network set up we had 20 transmitters. Would we have the same network throughput graph by increasing the number of transmitters to 40 and decrease the inter-arrival time of each transmitter by half? Why or why not? 4) On the project editor, keep only one transmitter and erase the rest 19 transmitters. Plot the throughput and load curve and comment on the obtained curve. 5) We know that slotted ALOHA has a better throughput performance than ALOHA protocol. If we want to implement slotted ALOHA, what type of changes and where (i.e. transmitter module, receiver module) should we make the changes on the network simulation set up? CEG4190 Lab 3 page 11 of 11
Ethernet. A Direct Link Network with Media Access Control. Laboratory 1. Objective. Overview
Laboratory 1 Ethernet A Direct Link Network with Media Access Control Objective This lab is designed to demonstrate the operation of the Ethernet network. The simulation in this lab will help you examine
More informationIT Guru Academic Edition does not work correctly with number representations different from English.
PGRI PLANEAMENTO E GESTÃO DE REDES INFORMÁTICAS LAB ASSIGNMENT 1 DATE: 2009.10.19 OVERVIEW The purpose of this lab is to introduce the main concepts involved in modeling Local Area Networks (LAN) based
More informationCPSC 441 Tutorial-19. Department of Computer Science University of Calgary
CPSC 441 Tutorial-19 Department of Computer Science University of Calgary Problem-1 Consider n nodes that use the slotted CSMA/ CD with binary exponential back-off to access a shared broadcast channel.
More informationLecture 9 November 12, Wireless Access. Graduate course in Communications Engineering. University of Rome La Sapienza. Rome, Italy
Lecture 9 November 12, 2018 Wireless Access Graduate course in Communications Engineering University of Rome La Sapienza Rome, Italy 2018-2019 Medium Access Control Scheduled access Classification of wireless
More informationEng 3553 Lab #5 TCP Throughput
Eng 3553 Lab #5 TCP Throughput Overview TCP (Transmission Control Protocol) is a means for building a reliable communications stream, enabling two hosts to establish a connection and exchange streams of
More informationIntroduction to OPNET Modeler
Introduction to OPNET Modeler Karann Chew CCSR 1 Contents Session #1 (week#6, Friday, 9-10am) Overview OPNET Environment various editors Session #2 (week#7, Friday, 9-10am) Process Modelling Event and
More informationSwitched LANs A Set of Local Area Networks Interconnected by Switches
Switched LANs A Set of Local Area Networks Interconnected by Switches Objective This lab is designed to demonstrate the implementation of switched local area networks. The simulation in this lab will help
More informationAdvanced Communication Lab OPNET Tutorial
Advanced Communication Lab OPNET Tutorial SS 2013 Authors: Mohammad M. Siddique, Andreas J. Könsgen 1 1. Log on to the computer. 2. Open the OPNET program by clicking on the respective icon. 3. After the
More informationMultiple Access (1) Required reading: Garcia 6.1, 6.2.1, CSE 3213, Fall 2010 Instructor: N. Vlajic
1 Multiple Access (1) Required reading: Garcia 6.1, 6.2.1, 6.2.2 CSE 3213, Fall 2010 Instructor: N. Vlajic Multiple Access Communications 2 Broadcast Networks aka multiple access networks multiple sending
More informationRMIT University. Data Communication and Net-Centric Computing COSC 1111/2061/1110. Lecture 8. Medium Access Control Methods & LAN
RMIT University Data Communication and Net-Centric Computing COSC 1111/2061/1110 Medium Access Control Methods & LAN Technology Slide 1 Lecture Overview During this lecture, we will Look at several Multiple
More informationOPNET. Mustafa Ergen. UC Berkeley
OPNET Mustafa Ergen ergen@eecs.berkeley.edu UC Berkeley Overview Introduction Design Process domain Node domain Network domain Communication mechanism Simulation Statistics Probe Analysis IEEE 802.11 MAC
More informationShared Ethernet Networks
Lab 1 Shared Ethernet Networks Overview In a shared Ethernet network, end systems are typically connected together using a hub. The hub retransmits any incoming frames on all outgoing lines creating a
More informationThis tutorial teaches you the basics of using Modeler. If you are new to Modeler, this short introduction will help get you started.
Introduction Overview Welcome to Modeler! This tutorial teaches you the basics of using Modeler. If you are new to Modeler, this short introduction will help get you started. If you are performing this
More informationData Communications. Automatic Repeat Request Medium Access Control
Data Communications Automatic Repeat Request Medium Access Control Handling Error Cases Automatic Repeat request(arq), also known as Automatic Repeat Query, is an error-control method ARQ uses acknowledgements
More informationObjective To examine the throughput of a TCP connection as the flow control window size is varied.
Lab 7 TCP Throughput Overview TCP uses a sliding window mechanism to provide flow control. The destination advertises how much space it has available in its buffers, and the source restricts its transmissions
More informationTCP versus UDP Response Time
Lab 9 TCP versus UDP Response Time Overview TCP provides connection-oriented service at the transport layer, and UDP provides connectionless service. As a result, a data exchange using TCP can take longer
More informationCOS 140: Foundations of Computer Science
COS 140: Foundations of Computer Science ALOHA Network Protocol Family Fall 2017 Homework 2 Introduction 3 Network Protocols.......................................................... 3 Problem.................................................................
More informationObjective To examine the change in throughput in a local area network when upgrading from a hub to a switch.
Lab 2 Switches versus Hubs Overview Ethernet hubs work at the physical layer, simply repeating any frames they receive on one port onto all other ports. For this reason, they are also called multiport
More informationSwitched LANs. A Set of Local Area Networks Interconnected by Switches
Laboratory 3 Switched LANs A Set of Local Area Networks Interconnected by Switches Objective This lab is designed to demonstrate the implementation of switched local area networks. The simulation in this
More informationMarkov Chains and Multiaccess Protocols: An. Introduction
Markov Chains and Multiaccess Protocols: An Introduction Laila Daniel and Krishnan Narayanan April 8, 2012 Outline of the talk Introduction to Markov Chain applications in Communication and Computer Science
More informationHigh Level View. EE 122: Ethernet and Random Access protocols. Medium Access Protocols
High Level View EE 122: Ethernet and 802.11 Ion Stoica September 18, 2002 Goal: share a communication medium among multiple hosts connected to it Problem: arbitrate between connected hosts Solution goals:
More informationCOMPUTER NETWORKS - Local area networks
Local area networks Telecommunication Networks Group firstname.lastname@polito.it http://www.telematica.polito.it/ COMPUTER NETWORKS LANs - 1 Copyright Quest opera è protetta dalla licenza Creative Commons
More informationRandom Access. 1. Aloha. 2. Slotted Aloha 3. CSMA 4. CSMA/CD
Random Access 1. Aloha 2. Slotted Aloha 3. CSMA 4. CSMA/CD Background Communication medium B No Collision collision A C Modern Local Area Networks (LANs) operate as follows Users are connected to communication
More informationLocal area networks. Copyright
Local area networks Telecommunication Networks Group firstname.lastname@polito.it http://www.telematica.polito.it/ COMPUTER NETWORKS LANs - 1 Copyright Quest opera è protetta dalla licenza Creative Commons
More informationSIMON FRASER UNIVERSITY SCHOOL OF ENGINEERING SCIENCE. Spring 2013 ENSC 427: COMMUNICATION NETWORKS. Midterm No. 2(b) Monday, March 18, 2013
SIMON FRASER UNIVERSITY SCHOOL OF ENGINEERING SCIENCE Spring 2013 ENSC 427: COMMUNICATION NETWORKS Midterm No. 2(b) Monday, March 18, 2013 Duration: 50 minutes. Attempt all problems. Questions may not
More informationPacket multiple access and the Aloha protocol
Packet multiple access and the Aloha protocol Massachusetts Institute of Technology Department of Aeronautics and Astronautics Slide 1 Packet Multiple Access PMA SHARED UPLINK TERMINAL TERMINAL APPL TRANS
More informationOPNET Modeler. Tommy Svensson Alex Popescu
OPNET Modeler Development of laboratory exercises based on OPNET Modeler Tommy Svensson This thesis is presented as a part of the Master of Science Degree in Electrical Engineering with emphasis on Telecommunications
More informationChapter 3 Process Domain
Chapter 3 Process Domain 173-Prdef 174-Prdef Modeling Concepts Modeling Concepts Introduction Prdef.1 Introduction Process models are used to specify the behavior of processor and queue modules which exist
More informationEE 122: Ethernet and
EE 122: Ethernet and 802.11 Ion Stoica September 18, 2002 (* this talk is based in part on the on-line slides of J. Kurose & K. Rose) High Level View Goal: share a communication medium among multiple hosts
More informationAnalysis of BitTorrent Protocol and Its Effect on the Network
SIMON FRASER UNIVERSITY Analysis of BitTorrent Protocol and Its Effect on the Network ENSC 427: Final Project Report Spring 2011 Group 11 www.sfu.ca/~kna5/ensc427 Ken Kyoungwoo Nam 301046747 Kna5 @sfu.ca
More informationComputer Network Fundamentals Spring Week 3 MAC Layer Andreas Terzis
Computer Network Fundamentals Spring 2008 Week 3 MAC Layer Andreas Terzis Outline MAC Protocols MAC Protocol Examples Channel Partitioning TDMA/FDMA Token Ring Random Access Protocols Aloha and Slotted
More informationMultimedia Communication Services Traffic Modeling and Streaming
Multimedia Communication Services Traffic Modeling and Streaming Medium Access Control algorithms Introduction and details on Aloha networks with infinite nodes Università degli Studi di Brescia A.A. 2014/2015
More informationIntroduction to Modeler
Table of Contents Lab: Using The Project Editor...2 Lab: Building a First Network...11 Lab: Using Other Editors...28 Extra Credit Lab: Discrete Event Simulation Studies...32 Lab: Node Modeling...39 Lab:
More informationJaringan Komputer. Broadcast Network. Outline. MAC (Medium Access Control) Channel Allocation Problem. Dynamic Channel Allocation
Broadcast Network Jaringan Komputer Medium Access Control Sublayer 2 network categories: point-to-point connections broadcast channels Key issue in broadcast network: how to determine who gets to use the
More informationAdvanced Communication Lab OPNET Tutorial
Advanced Communication Lab OPNET Tutorial SS 2014 Authors: Mohammad M. Siddique, Andreas J. Könsgen 1 1. Log on to the computer. 2. Open the OPNET program by clicking on the respective icon. 3. After the
More informationThis document presents the basics of OPNET Modeler. The content of this document is mainly transcript from the OPNET documentation [www.opnet.com].
Instituto Superior de Engenharia do Porto (ISEP) Departamento de Engenharia Informática (DEI) Mestrado em Engenharia Informática (MEI) Área: Arquitectura, Sistemas e Redes Sistemas Móveis (SIMOV) Paulo
More informationPeer-to-Peer Networks: Gnutella. Team #6
1 Peer-to-Peer Networks: Gnutella Frigo, Daniel Alwaris, Tauseef Ma, Mark Team #6 daf2@sfu.ca talwaris@sfu.ca mma58@sfu.ca 2 Table of contents 1. Abstract...... 3 2. Introduction......3 3. Objectives......3
More informationCSMA/CD (Collision Detection)
CSMA/CD (Collision Detection) CD (collision detection): easy in wired LANs: measure signal strengths, compare transmitted, received signals difficult in wireless LANs: received signal strength overwhelmed
More informationChapter 4. The Medium Access Control Sublayer. Points and Questions to Consider. Multiple Access Protocols. The Channel Allocation Problem.
Dynamic Channel Allocation in LANs and MANs Chapter 4 The Medium Access Control Sublayer 1. Station Model. 2. Single Channel Assumption. 3. Collision Assumption. 4. (a) Continuous Time. (b) Slotted Time.
More informationReview. Error Detection: CRC Multiple access protocols. LAN addresses and ARP Ethernet. Slotted ALOHA CSMA/CD
Review Error Detection: CRC Multiple access protocols Slotted ALOHA CSMA/CD LAN addresses and ARP Ethernet Some slides are in courtesy of J. Kurose and K. Ross Overview Ethernet Hubs, bridges, and switches
More informationProblem Set Name the 7 OSI layers and give the corresponding functionalities for each layer.
Problem Set 1 1. Why do we use layering in computer networks? 2. Name the 7 OSI layers and give the corresponding functionalities for each layer. 3. Compare the network performance of the 3 Multiple Access
More informationWireless Medium Access Control Protocols
Wireless Medium Access Control Protocols Telecomunicazioni Undergraduate course in Electrical Engineering University of Rome La Sapienza Rome, Italy 2007-2008 Classification of wireless MAC protocols Wireless
More informationMultiple Access Protocols
Multiple Access Protocols Computer Networks Lecture 2 http://goo.gl/pze5o8 Multiple Access to a Shared Channel The medium (or its sub-channel) may be shared by multiple stations (dynamic allocation) just
More informationEITF25 Internet Techniques and Applications L4: Network Access. Stefan Höst
EITF25 Internet Techniques and Applications L4: Network Access Stefan Höst Repetition The link layer protocol should make sure that the data is correctly transmitted over the physical link using error
More informationAloha and slotted aloha
CSMA 2/13/06 Aloha and slotted aloha Slotted aloha: transmissions are synchronized and only start at the beginning of a time slot. Aloha sender A sender B collision sender C t Slotted Aloha collision sender
More informationMedium Access Control
Medium Access Control Fundamental Problem N nodes in vicinity want to transmit (to, say, N other nodes). How to do this interference free? Interference free means SINR Otherwise, we say that packets collide.
More informationRedes de Computadores. Medium Access Control
Redes de Computadores Medium Access Control Manuel P. Ricardo Faculdade de Engenharia da Universidade do Porto 1 » How to control the access of computers to a communication medium?» What is the ideal Medium
More informationKing Fahd University of Petroleum and Minerals College of Computer Sciences and Engineering Department of Computer Engineering
Student Name: Section #: King Fahd University of Petroleum and Minerals College of Computer Sciences and Engineering Department of Computer Engineering COE 344 Computer Networks (T072) Final Exam Date
More informationChapter 6 Medium Access Control Protocols and Local Area Networks
Chapter 6 Medium Access Control Protocols and Local Area Networks Part I: Medium Access Control Part II: Local Area Networks CSE 3213, Winter 2010 Instructor: Foroohar Foroozan Chapter Overview Broadcast
More informationCSE/EE 461 Section 2
CSE/EE 461 Section 2 Latency in a store-and-forward network 4ms, 10MB/s B How long does it take to send a 2kB packet from to B? 2ms, 10MB/s C 2ms, 10MB/s B What if it has to pass through a node C? Plan
More informationOPNET Editors and Features
OPNET Steven Gordon Sirindhorn International Institute of Technology Thammasat University June 2010 Contents OPNET Menus Nodes and Links Communication Running Multiple OPNET Commonly used editors: 1. Project
More informationCOMMUNICATION NETWORKS NETW 501
COMMUNICATION NETWORKS NETW 501 TUTORIAL 6 Presented by: Eng. Hana Hesham Eng. Mohamed Atef Data Link Layer Data Link Layer is split into 2 sublayers which are the Logical Link Control (LLC) and the Medium
More informationCS 716: Introduction to communication networks. - 9 th class; 19 th Aug Instructor: Sridhar Iyer IIT Bombay
CS 716: Introduction to communication networks - 9 th class; 19 th Aug 2011 Instructor: Sridhar Iyer IIT Bombay Contention-based MAC: ALOHA Users transmit whenever they have data to send Collisions occur,
More informationProgramming Project. Remember the Titans
Programming Project Remember the Titans Due: Data and reports due 12/10 & 12/11 (code due 12/7) In the paper Measured Capacity of an Ethernet: Myths and Reality, David Boggs, Jeff Mogul and Chris Kent
More informationContention Protocols and Networks
4/13/2005 314 Lecture Contention Protocols and Networks 1 Contention Protocols and Networks Contention Protocols CSMA/CD Network Topologies Ethernet 4/13/2005 314 Lecture Contention Protocols and Networks
More informationCHAPTER 7 MAC LAYER PROTOCOLS. Dr. Bhargavi Goswami Associate Professor & Head Department of Computer Science Garden City College
CHAPTER 7 MAC LAYER PROTOCOLS Dr. Bhargavi Goswami Associate Professor & Head Department of Computer Science Garden City College MEDIUM ACCESS CONTROL - MAC PROTOCOLS When the two stations transmit data
More informationLecture 5 The Data Link Layer. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it
Lecture 5 The Data Link Layer Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it Link Layer: setting the context two physically connected devices: host-router, router-router, host-host,
More informationMultiple Access. Data Communications and Networking
Multiple Access In the previous part we discussed data link control, a mechanism which provides a link with reliable communication. In the protocols we described, we assumed that there is an available
More informationRandom Assignment Protocols
Random Assignment Protocols Random assignment strategies attempt to reduce problem occur in fixed assignment strategy by eliminating pre allocation of bandwidth to communicating nodes. Random assignment
More informationChapter 5: Link layer
Chapter 5: Link layer our goals: v understand principles behind link layer services: error detection, correction sharing a broadcast channel: multiple access link layer addressing local area networks:
More informationLANs. Local Area Networks. via the Media Access Control (MAC) SubLayer. Networks: Local Area Networks
LANs Local Area Networks via the Media Access Control (MAC) SubLayer 1 Local Area Networks Aloha Slotted Aloha CSMA (non-persistent, 1-persistent, p-persistent) CSMA/CD Ethernet Token Ring 2 Network Layer
More informationCOS 140: Foundations of Computer Science
COS 140: Foundations of C S Network Protocol Family Fall 2017 Copyright c 2002 2017 UMaine School of Computing and Information S 1 / 25 Homework Homework Slides, book Chapter 24 on line Homework: All exercises
More informationSecurity Lab 1 Firewall Performance
Security Lab 1 Firewall Performance This lab has been partially based on OPNET Lab Manual To Accompany Data and Computer Communications, by Kevin Brown and Leann Christianson, Prentice Hall, 2004. Objective
More information2.1 CHANNEL ALLOCATION 2.2 MULTIPLE ACCESS PROTOCOLS Collision Free Protocols 2.3 FDDI 2.4 DATA LINK LAYER DESIGN ISSUES 2.5 FRAMING & STUFFING
UNIT-2 2.1 CHANNEL ALLOCATION 2.2 MULTIPLE ACCESS PROTOCOLS 2.2.1 Pure ALOHA 2.2.2 Slotted ALOHA 2.2.3 Carrier Sense Multiple Access 2.2.4 CSMA with Collision Detection 2.2.5 Collision Free Protocols 2.2.5.1
More informationMedium Access Control Sublayer
Wireless (WLAN) Medium Access Control Sublayer Mahalingam Mississippi State University, MS October 20, 2014 Outline Medium Access Protocols Wireless (WLAN) 1 Medium Access Protocols ALOHA Slotted ALOHA
More informationMultiple Access Links and Protocols
Multiple Access Links and Protocols Two types of links : point-to-point PPP for dial-up access point-to-point link between Ethernet switch and host broadcast (shared wire or medium) old-fashioned Ethernet
More informationTCP: Flow and Error Control
1 TCP: Flow and Error Control Required reading: Kurose 3.5.3, 3.5.4, 3.5.5 CSE 4213, Fall 2006 Instructor: N. Vlajic TCP Stream Delivery 2 TCP Stream Delivery unlike UDP, TCP is a stream-oriented protocol
More informationECE453 Introduction to Computer Networks. Broadcast vs. PPP. Delay. Lecture 7 Multiple Access Control (I)
ECE453 Introduction to Computer Networks Lecture 7 Multiple Access Control (I) 1 Broadcast vs. PPP Broadcast channel = multiaccess channel = random access channel Broadcast LAN Satellite network PPP WAN
More informationCSE 461: Multiple Access Networks. This Lecture
CSE 461: Multiple Access Networks This Lecture Key Focus: How do multiple parties share a wire? This is the Medium Access Control (MAC) portion of the Link Layer Randomized access protocols: 1. Aloha 2.
More informationChapter 4. The Medium Access Control Sublayer
Chapter 4 The Medium Access Control Sublayer The Channel Allocation Problem Static Channel Allocation in LANs and MANs Dynamic Channel Allocation in LANs and MANs Dynamic Channel Allocation in LANs and
More informationLECTURE PLAN. Script. Introduction about MAC Types o ALOHA o CSMA o CSMA/CD o CSMA/CA
Course- B.Sc. Applied Physical Science (Computer Science) Year- IIIrd, Sem- Vth Subject Computer Science Paper- XVIIth, Computer Networks Lecture -11 Lecture Title- Medium Access Layer Script Today in
More informationENGI 4557 Digital Communications Practice Problems 2017 (Part 2)
ENGI 4557 Digital Communications Practice Problems 207 (Part 2) H = n p i log 2 ( ) p i C = W log 2 ( + S N ) SNR = 6m + 0 log 0 ( 3σ2 x V ) 2 SNR = 6m 0 ( ) n n! = k k!(n k)! x = σ 2 = + + x p(x)dx (x
More informationEthernet. Introduction. CSE 3213 Fall 2011
Ethernet CSE 3213 Fall 2011 19 October 2011 1 Introduction Rapid changes in technology designs Broader use of LANs New schemes for high-speed LANs High-speed LAN technologies: Fast and gigabit Ethernet
More informationLecture 6 The Data Link Layer. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it
Lecture 6 The Data Link Layer Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it Link Layer: setting the context two physically connected devices: host-router, router-router, host-host,
More informationSummary of MAC protocols
Summary of MAC protocols What do you do with a shared media? Channel Partitioning, by time, frequency or code Time Division, Code Division, Frequency Division Random partitioning (dynamic) ALOHA, S-ALOHA,
More informationChapter 12 Multiple Access 12.1
Chapter 12 Multiple Access 12.1 Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. 12.2 Figure 12.1 Data link layer divided into two functionality-oriented sublayers
More informationLecture 8 The Data Link Layer part I. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it
Lecture 8 The Data Link Layer part I Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it Link Layer: setting the context two physically connected devices: host-router, router-router,
More informationData Link Layer: Collisions
Data Link Layer: Collisions 1 Multiple Access Data Link layer divided into two sublayers. The upper sublayer is responsible for datalink control, The lower sublayer is responsible for resolving access
More informationLecture 12 December 04, Wireless Access. Graduate course in Communications Engineering. University of Rome La Sapienza. Rome, Italy
Lecture 12 December 04, 2017 Wireless Access Graduate course in Communications Engineering University of Rome La Sapienza Rome, Italy 2017-2018 Random Medium Access Control Part II - CSMA and Collision
More informationChapter 6 Communication Mechanisms
Chapter 6 Communication Mechanisms 395-Comec 396-Comec Modeling Concepts Modeling Concepts Introduction Comec.1 Introduction Most OPNET models can be classified as distributed systems composed of multiple
More informationSecurity Labs in OPNET IT Guru
Security Labs in OPNET IT Guru Universitat Ramon Llull Barcelona 2004 Security Labs in OPNET IT Guru Authors: Cesc Canet Juan Agustín Zaballos Translation from Catalan: Cesc Canet -I- Overview This project
More informationChapter 1 Basic concepts of wireless data networks (cont d)
Chapter 1 Basic concepts of wireless data networks (cont d) Part 2: Medium access methods for mobile data networks Sept 15 2004 1 Fixed assignment access schemes in voice-oriented networks Frequency division
More informationSimulated SA Throughput vs. p
Problem 1. Simulation of Slotted Aloha network (A) There are n stations in the network that are trying to transmit messages to an access point. (B) All the stations are synchronized and they are using
More informationManaging Caching Performance and Differentiated Services
CHAPTER 10 Managing Caching Performance and Differentiated Services This chapter explains how to configure TCP stack parameters for increased performance ant throughput and how to configure Type of Service
More informationStrengthening Unlicensed Band Wireless Backhaul
be in charge Strengthening Unlicensed Band Wireless Backhaul Use TDD/TDMA Based Channel Access Mechanism WHITE PAPER Strengthening Unlicensed Band Wireless Backhaul: Use TDD/TDMA Based Channel Access Mechanism
More informationFrame Relay Network Performance
Lab 4 Frame Relay Network Performance Overview Frame Relay is a connection-oriented, unreliable technology based on virtual circuits. A virtual circuit must be set up between a source and destination before
More informationUsing OPNET to Enhance Student Learning in a Data Communications
Using OPNET to Enhance Student Learning in a Data Communications Course Michael W Dixon Murdoch University, Perth, Australia m.dixon@murdoch.edu.au Terry W Koziniec Murdoch University, Perth, Australia
More informationCover sheet for Assignment 3
Faculty of Arts and Science University of Toronto CSC 358 - Introduction to Computer Networks, Winter 2018, LEC0101 Cover sheet for Assignment 3 Due Monday March 5, 10:00am. Complete this page and attach
More informationThe Link Layer and LANs. Chapter 6: Link layer and LANs
The Link Layer and LANs EECS3214 2018-03-14 4-1 Chapter 6: Link layer and LANs our goals: understand principles behind link layer services: error detection, correction sharing a broadcast channel: multiple
More informationCommunication Network Simulations Using OPNET
521365S Tietoliikenteen simuloinnit ja työkalut Communication Network Simulations Using OPNET 20.4.2010 klo 12.15 TS407 Juha-Pekka Mäkelä juha.makela AT ee.oulu.fi 1 Network simulations Simulations are
More informationMedium Access Control. IEEE , Token Rings. CSMA/CD in WLANs? Ethernet MAC Algorithm. MACA Solution for Hidden Terminal Problem
Medium Access Control IEEE 802.11, Token Rings Wireless channel is a shared medium Need access control mechanism to avoid interference Why not CSMA/CD? 9/15/06 CS/ECE 438 - UIUC, Fall 2006 1 9/15/06 CS/ECE
More informationCMPE 257: Wireless and Mobile Networking
CMPE 257: Wireless and Mobile Networking Katia Obraczka Computer Engineering UCSC Baskin Engineering Lecture 3 CMPE 257 Winter'11 1 Announcements Accessing secure part of the class Web page: User id: cmpe257.
More informationLecture 05 Chapter 16 High Speed LANs
NET 456 High Speed Networks Lecture 05 Chapter 16 High Speed LANs Dr. Anis Koubaa Reformatted slides from textbook Data and Computer Communications, Ninth Edition by William Stallings, 1 (c) Pearson Education
More informationIntroduction to Real-Time Communications. Real-Time and Embedded Systems (M) Lecture 15
Introduction to Real-Time Communications Real-Time and Embedded Systems (M) Lecture 15 Lecture Outline Modelling real-time communications Traffic and network models Properties of networks Throughput, delay
More informationHomework 1. Question 1 - Layering. CSCI 1680 Computer Networks Fonseca
CSCI 1680 Computer Networks Fonseca Homework 1 Due: 27 September 2012, 4pm Question 1 - Layering a. Why are networked systems layered? What are the advantages of layering? Are there any disadvantages?
More informationCMPE 150/L : Introduction to Computer Networks. Chen Qian Computer Engineering UCSC Baskin Engineering Lecture 16
CMPE 150/L : Introduction to Computer Networks Chen Qian Computer Engineering UCSC Baskin Engineering Lecture 16 1 Final project demo Please do the demo next week to the TAs. So basically you may need
More information3. (a) Explain WDMA protocol. (b) Explain wireless LAN protocol. [8+8]
Code No: RR410402 Set No. 1 1. (a) List two advantages and two disadvantages of having international standards for network, Protocols? (b) With a neat diagram, explain the functionality of layers, protocols
More informationMobile Communications Chapter 3 : Media Access
Mobile Communications Chapter 3 : Media Access 2. Motivation 3. SDMA, FDMA, TDMA 1. Aloha and contention based schemes 4. Reservation schemes 5. Collision avoidance, MACA 6. Polling CDMA (Lecture 6) Prof.
More informationCSE 461 Multiple Access. David Wetherall
CSE 461 Multiple Access David Wetherall djw@cs.washington.edu How to share a link Multiplexing = networking term for sharing a resource among multiple users (e.g., link, protocol instance) Topics: Multiplexing
More informationData and Computer Communications
Data and Computer Communications Chapter 16 High Speed LANs Eighth Edition by William Stallings Why High Speed LANs? speed and power of PCs has risen graphics-intensive applications and GUIs see LANs as
More information