Medium Access Control Protocols of the PRMA Type in non-geostationary Satellites
|
|
- Basil Reeves
- 5 years ago
- Views:
Transcription
1 Medium Access Control Protocols of the PRMA Type in non-geostationary Satellites Giovanni Giambene Dipartimento di Ingegneria dell Informazione Università degli Studi di Siena Via Roma, Siena, Italy Abstract The challenge of future mobile multimedia networks is to provide worldwide tetherless communication services. Low Earth Orbit-Mobile Satellite Systems (LEO-MSSs) will play a significant role by filling the coverage gaps of future generation terrestrial cellular networks. This lecture presents research results on demand-assignment Medium Access Control (MAC) schemes able to share efficiently LEO satellite resources among users and to support isochronous traffics and the ubiquitous access to the Internet. 1 Introduction Future generation mobile communication systems will achieve a global coverage by integrating a terrestrial cellular component and a satellite one [1],[2]. The satellite system will play a complementary role with respect to its terrestrial counterpart; typical operational environments for satellite systems are regions where the provision of the terrestrial coverage is either technically or economically unfeasible. The role of mobile satellite systems is: (i) to allow the global roaming of users; (ii) to provide Quality of Service (QoS) levels comparable with those of terrestrial systems; (iii) to permit the rapid deployment of mobile services in underdeveloped regions. The satellite component of future mobile communication systems will be based (partly or totally) on non-geostationary constellations. In particular, this study focuses on Low Earth Orbit Mobile Satellite Systems (LEO-MSSs), since they are close to the earth and allow the use of low-power lightweight mobile terminals [3]. In what follows, an earth-fixed cell system [4] will be assumed where antenna beams are steered so as to point towards a given cell on the earth during the satellite visibility time. Satellites are power and bandwidth limited. Therefore, it is essential that satellite resources are efficiently utilized. Hence, suitable Medium Access Control (MAC) protocols must be identified for the management of resources in a cell. MAC schemes contain a set of rules according to which the power-bandwidth resource is assigned to the different communications. In particular, real-time traffic (i.e., isochronous voice traffic) and Available Bit Rate (ABR) data traffic are considered. Several types of Medium Access Control (MAC) schemes have been proposed for satellite systems [5], but the identification of an efficient MAC protocol, able to guarantee suitable QoS for different traffics, is still an open research issue. A MAC protocol taxonomy can be envisaged as described below. 1. Fixed access protocols that grant permission to transmit only to one terminal at once, avoiding collisions of messages on the shared medium. Access rights are statically defined for the terminals. 1
2 2. Contention-based protocols that may give transmission rights to several terminals at the same time. These policies may cause two or more terminals to transmit simultaneously and their messages to collide on the shared medium. This class encompasses pure Aloha, Slotted-Aloha and Reservation-Aloha [6]. 3. Demand-assignment protocols that grant the access to the network on the basis of requests made by the terminals. The reason for the presence of many different MAC protocols is that they are suitable for some applications, but often do not meet the requirements for other applications. For instance, fixed access schemes are not efficient with bursty traffics, because they can not adapt to varying traffic conditions. This lecture presents research results concerning new demandassignment MAC schemes that are evolutions of the classical Packet Reservation Multiple Access (PRMA) protocol. These novel protocols are able to integrate the management of isochronous and data bursty traffics and, therefore, can be useful in the Satellite- Asynchronous Transfer Mode (S-ATM) scenario. 2 The classical PRMA protocol in LEO-MSSs The PRMA protocol was originally proposed for terrestrial microcellular systems [6]: it is based on Time Division Multiple Access (TDMA) and combines random access with slot reservation. The efficiency of PRMA relies on managing voice sources with Speech Activity Detection (SAD): only during a talkspurt, a voice source has reserved one slot per frame to transmit its packets. A feedback channel broadcast by the cell controller informs the terminals about the state of each slot (i.e., idle or reserved) in a frame. As soon as a new talkspurt is revealed, the terminal tries to transmit a packet in the first idle slot (contending state), according to a permission probability scheme [6]. When the transmission attempt of a terminal is successful on a slot, the terminal obtains the reservation of this slot. The main limiting factor for the use of PRMA in LEO-MSSs is the high Round Trip propagation Delay (RTD) value that prevents the mobile terminals on the earth to know immediately the outcome of their transmission attempts. In LEO-MSSs, RTD values vary from 5 ms to 30 ms, depending on the satellite constellation altitude and the minimum elevation angle from mobile terminals to the satellite. The satellite recognizes the request made by a terminal by decoding the header of the received packet on an unreserved slot. For a conservative study, RTD is assumed always equal to its maximum value, RTD max, for a given LEO-MSS. For the correct protocol behavior, T f must be greater than or equal to RTD max + ε, where ε is the packet header transmission time. Consequently, when a terminal attempts to transmit on a given slot, it receives the outcome of its attempt before the beginning of the same slot in the next frame. Of course, the selection of the T f value must also account for both the requirements on the voice end-to-end delay, the voice codec and the packetization process. It is considered here T f RTD max (ε is negligible). If more terminals attempt to send their packets on the same slot, there is a collision (unless capture phenomena occur [6]): these terminals know that they must reschedule new transmissions only after RTD. This delay is particularly significant for the real-time voice service. In order to relax these problems, the following Section presents several solutions that are also suitable for other scenarios where RTD is greater than the packet transmission time (e.g., high altitude aeronautical platforms recently proposed to provide high bit-rate transmissions in heavy traffic urban areas [7]). 3 Novel schemes based on PRMA This Section surveys three novel MAC schemes that derive from the modification of PRMA in order to make it more suitable for the LEO satellite scenario. Let us consider M v Voice Terminals (VTs) and M w Data Terminals (DTs) per carrier per cell. 2
3 3.1 PRMA with hindering states In the classical PRMA scheme, assuming a typical LEO system where RTD max is about equal to 16 ms, a terminal could perform at most two access attempts before dropping the first packet (as shown in Section 4.1, the voice packet deadline is 32 ms). To remove this constraint, a modified PRMA protocol is presented here, where a terminal is allowed to attempt transmissions (according to the permission probability scheme) also while it is waiting for the outcome of a previous attempt. If the previous attempt has been unsuccessful, this modification permits a faster access scheme. Otherwise, these further attempts are useless and may hinder the accesses to other terminals. Accordingly, this scheme has been called PRMA with Hindering States (PRMA-HS). It has been shown in [8] that the advantages of this fast retransmission scheme overcome the problems due to useless attempts. In order to integrate VT and DT traffics, different permission probabilities values have been considered; p v and p d, respectively, where p v > p d to prioritize the voice real-time traffic. 3.2 Modified PRMA scheme In the Modified PRMA (MPRMA) protocol, a given field in the packet header is devoted to notify the satellite if a transmission request (i.e., the first packet of a terminal that must acquire transmission rights) comes from a DT or from a VT; accordingly, different algorithms are used. In particular, the management of VTs is as in the classical PRMA scheme. Whereas, DT requests are served as described below. If a message is generated by a DT when its buffer is idle, its first packet (= request packet) is transmitted on an available slot, according to a permission probability, p d. Collisions may occur with the attempts of other terminals. If this first packet does not experience a collision, its header contains a DT transmission request that is stored into a buffer on the satellite in order to form a queue of DTs that need to transmit. The controller on board of the satellite manages a queue of uplink transmission requests for each MPRMA carrier of a cell and decides allocations of slots (not used by VTs) to DTs [9]. In order to guarantee a certain number of idle slots for new accesses of DTs and VTs, the controller assigns an idle slot to a given DT (with its request at the head of the satellite queue) in the next frame, according to an access probability p a. Let us consider a DT that is allowed to transmit the last packet of its presently served message and that has in its buffer other messages arrived in the meanwhile. A suitable flag is set in the header of this last packet so that the DT requests the transmission of another message to the satellite (piggybacked request). Both the random access packet and the packet used for the piggybacked request use a suitable field in the header to notify the message length to the satellite. 3.3 DRAMA protocol In the Dynamic Resource Assignment Multiple Access (DRAMA) scheme, the frame contains first access slots and, then, information slots. Access slots are minislotted: a terminal sends an access burst on a minislot to request transmission resources. The number of minislots per slot is about equal to the number of packet headers that can be transmitted in a slot time. The number of minisloted slots per frame is always greater than or equal to one. This value is dynamically updated trying to have a total number of minislots equal to the number of terminals that have set-up a connection (satellite-atm) and that are not transmitting. This permits to maximize the throughput of successful requests per minislot. Colliding terminals will reattempt in the next contention phase. A feedback channel informs the mobile terminals at the beginning of each frame about the number of minislotted slots for the next access phase. With the DRAMA protocol the satellite becomes an ATM scheduler: slot allocations are dynamically updated; the feedback channel is used to send assignment commands for each 3
4 slot. Slots are first assigned to fulfill the VT requests. Remaining slots are used to serve DT requests. On the basis of currently active transmission requests, the satellite knows how many slots will be destined to the VTs in the next frame and decides slot assignments to data traffics by using a cyclic policy among all DTs. Each data traffic transmission request conveys the number of packet of the related message. Hence, the satellite may decide also multiple slot allocations to a given DT in a frame (if room). The piggybacking scheme is used by data sources to communicate new access requests when they are already transmitting to the satellite. 4 Traffic source models The traffic models for generating isochronous and data bursty traffics are detailed below. 4.1 Voice sources Each VT uses SAD to distinguish between talkspurts and silent pauses in a conversation. Talking and silent phases lengths are exponentially distributed with mean values t 1 = 1 s and t 2 = 1.35 s, respectively. The voice activity factor is ψ v = t 1 / (t 1 + t 2 ) An active VT generates one packet per frame (L pkt = R s T f information bits and H p header bits). The number of slots per frame and the slot duration are: N = R c T f / (L pkt + H p ) [slots/frame] and T s = T f /N where. is the floor function, R c is the channel bit-rate and R s is the voice source bit-rate. A VT discards the first packet from its buffer, when it experiences a transmission delay greater than a maximum value, D max ; typically, D max = 32 ms [6]. When a packet is discarded, the VT tries to obtain a reservation with the next packet. Let P drop denote the packet dropping probability for a VT (P drop 1% for an acceptable speech quality). The voice throughput is η v = M v ψ v (1 - P drop )/N [packets/slot]. 4.2 Internet-like traffic sources A simplified WWW traffic model is used [10], where a DT produces packet calls separated by a reading time (traffic at session level). The number of datagrams generated per packet call is geometrically distributed with expected value N p. During a packet call, the datagram interarrival time is exponentially distributed with mean rate µ pkt. The reading time is exponentially distributed with mean rate µ rd. For numerical evaluations it is considered: N p = 25 datagrams/packet call, µ rd = 0.25 s -1 and µ pkt = 2q datagrams/s, where q {1, 2, 3, 4, 5, 6, 7}. The datagram length in bytes has the same truncated and discretized Pareto distribution shown in [10]. The activity factor for this type of DT is given by ψ w = (N pc /µ pkt )/(N pc /µ pkt +1/µ rd ). The mean message arrival rate is λ = µ pkt ψ w datagrams/s. The total traffic load produced by all DTs is: t d = λt s L w M w [packets/slot] where L w denotes the mean length of a datagram in packets. The burstiness degree of a traffic source is defined as the peak-to-mean traffic ratio. The variable value for µ pkt (depending on q) allows modulating the DT burstiness degree that is equal to 1/ψ w. The service for DTs is characterized by the average datagram delay, T dtg, i.e., the time from the datagram arrival to the DT buffer until the complete datagram transmission. 4
5 4.3 Stability considerations Under the assumption of stability, the total data throughput must be equal to the total input data traffic, i.e., t d, and the probability that a slot is used to send a packet successfully must be lower than 1 (the maximum possible utilization): t d + η v < 1 [packets/slot] λt s L w M w + M v ψ v (1 - P drop )/N < 1 [packets/slot] This condition may be used for a proper sizing of the connection admission control protocol. 5 Results and comparisons Extensive simulation runs have permitted to compare the proposed MAC schemes in a typical LEO satellite constellation at 780 km altitude with RTD max = 15 ms. Simulation results have been obtained assuming: a channel bit-rate R c = 765 kbit/s, a source bit-rate R s = 32 kbit/s, a packet header of H p = 64 bits, a frame duration T f = RTD max = 15 ms. Moreover, for PRMA and PRMA-HS p v = 0.6 and p d = 0.2 [8]; for MPRMA p v = 0.6, p d = 0.4 and p a = 0.8 [9]; for DRAMA, the number of minislots per slot N m = 8. Assuming a configuration with 12 DTs and 21 VTs, simulation results have been shown in Figs. 1 and 2 for P drop and T dtg, respectively. The data traffic increase in abscissa has been obtained by progressively increasing q (i.e., q = 1, 2, 3, ) in the mean datagram interarrival rate. On the basis of these results, it is evident that MPRMA outperforms PRMA-HS in terms of T dtg and maintains P drop below the maximum acceptable value. However, the MPRMA scheme does not allow a significant performance improvement. Hence, the novel DRAMA scheme has to be considered since it considerably reduces both T dtg and P drop so achieving a better utilization of satellite resources with respect to PRMA, PRMA-HS and MPRMA. 6 Conclusions This lecture has shown research results on MAC protocols for LEO-MSSs. Three different evolutions of the PRMA scheme have been compared; in particular: PRMA-HS, MPRMA and DRAMA. It has been shown that the DRAMA scheme permits to improve the management of isochronous and data bursty traffics. The study presented in this lecture provides useful considerations for the design of MAC protocols able to support isochronous traffics and the ubiquitous access to the Internet in S-ATM systems. 1.0E-01 Packet dropping probability, Pdrop 1.0E E E-04 PRMA MPRMA PRMA-HS DRAMA 1.0E Total data traffic, td Figure 1. Performance comparison among the considered schemes in terms of P drop. 5
6 Mean datagram delay, Tdtg [slots] 5.7E+03 PRMA PRMA-HS 4.9E+03 MPRMA DRAMA 4.1E E E E E E Total data traffic, t d Figure 2. Performance comparison among the considered schemes in terms of T dtg. References [1] A. Guntsch, M. Ibnkahla, G. Losquadro, M. Mazella, D. Roviras, A. Timm, EU s R&D Activities on Third-Generation Mobile Satellite Systems (S-UMTS), IEEE Comm. Mag., Vol. 36, No. 2, Feb [2] P. Taaghol, B. G. Evans, E. Buracchini, R. De Gaudenzi, G. Gallinaro, J. Ho Lee, C. Gu Kang, Satellite UMTS/IMT2000 W-CDMA Air Interfaces, IEEE Communications Magazine, Vol. 37, No. 9, pp , Sept [3] Official Web sites with addresses: [4] J. Restrepo and G. Maral, Coverage Concepts for Satellite Constellations Providing Communications Services to Fixed and Mobile Users, Space Communications, Vol. 13, No. 2, pp , [5] H. Peyravi, Medium Access Control Protocols Performance in Satellite Communications, IEEE Comm. Mag., Vol. 37, No. 3, March [6] S. Nanda, D. J. Goodman, U. Timor, Performance of PRMA: a Packet Voice Protocol for Cellular Systems, IEEE Trans. on Veh. Tech., Vol. 40, No. 3, Aug [7] G. M. Djunknic, J. Freidenfelds, Y. Okunev, Establishing Wireless Communications Services via High-Altitude Aeronautical Platforms: A Concept Whose Time Has Come?, IEEE Comm. Mag., Vol. 35, No. 9, Sept [8] E. Del Re, R. Fantacci, G. Giambene, and S. Walter, Performance Analysis of an Improved PRMA Protocol for Low Earth Orbit Mobile Satellite Systems, IEEE Trans. on Veh. Tech., Vol. 48, No. 3, May [9] R. Fantacci, G. Giambene, R. Angioloni, A Modified PRMA Protocol for Voice and Data Transmissions in Low Earth Orbit Mobile Satellite Systems, to appear on IEEE Trans. on Veh. Tech. [10] ETSI, Selection Procedures for the Choice of Radio Transmission Technologies of the UMTS (UMTS Version 3.1.0); ETSI, Sophia-Antipolis, Cedex, France, Nov
Network and MAC Issues for Mobile Satellite Multimedia Networks
Network and MAC Issues for Mobile Satellite Multimedia Networks 1, E. Del Re 2, I. Mertzanis 3 1 DLR Oberpfaffenhofen, Wessling, Germany 2 University of Florence, Florence, Italy 3 University of Surrey,
More informationPROTOCOLS FOR HIGH-EFFICIENCY WIRELESS NETWORKS
PROTOCOLS FOR HIGH-EFFICIENCY WIRELESS NETWORKS PROTOCOLS FOR HIGH-EFFICIENCY WIRELESS NETWORKS by Alessandro Andreadis Giovanni Giambene KLUWER ACADEMIC PUBLISHERS NEW YORK, BOSTON, DORDRECHT, LONDON,
More informationFAIR DELAY OPTIMIZATION-BASED RESOURCE ALLOCATION ALGORITHM FOR VIDEO TRAFFIC OVER WIRELESS MULTIMEDIA SYSTEM
FAIR DELAY OPTIMIZATION-BASED RESOURCE ALLOCATION ALGORITHM FOR VIDEO TRAFFIC OVER WIRELESS MULTIMEDIA SYSTEM 1 M. R. M. Rizk, Senior Member, IEEE, 2 M. I. Dessouky, 3 Sami A. El-Dolil, and 4 Mohammed
More informationChapter 1 Basic concepts of wireless data networks (cont d)
Chapter 1 Basic concepts of wireless data networks (cont d) Part 2: Medium access methods for mobile data networks Sept 15 2004 1 Fixed assignment access schemes in voice-oriented networks Frequency division
More informationMAC protocols. Lecturer: Dmitri A. Moltchanov
MAC protocols Lecturer: Dmitri A. Moltchanov E-mail: moltchan@cs.tut.fi http://www.cs.tut.fi/kurssit/tlt-2616/ OUTLINE: Problems for MAC to deal with; Design goals; Classification of MAC protocols Contention-based
More informationTSIN01 Information Networks Lecture 3
TSIN01 Information Networks Lecture 3 Danyo Danev Division of Communication Systems Department of Electrical Engineering Linköping University, Sweden September 10 th, 2018 Danyo Danev TSIN01 Information
More informationECEN 5032 Data Networks Medium Access Control Sublayer
ECEN 5032 Data Networks Medium Access Control Sublayer Peter Mathys mathys@colorado.edu University of Colorado, Boulder c 1996 2005, P. Mathys p.1/35 Overview (Sub)networks can be divided into two categories:
More informationABSTRACT ON-DEMAND MULTIPLE ACCESS FOR NEXT- GENERATION NASA MISSIONS. Dr. John S. Baras Department of Electrical and Computer Engineering
ABSTRACT Title of Thesis: ON-DEMAND MULTIPLE ACCESS FOR NEXT- GENERATION NASA MISSIONS Degree candidate: Lin Lin Degree and year: Master of Science, 2001 Thesis directed by: Dr. Michael Hadjitheodosiou
More informationImproving TCP Performance in TDMA-based Satellite Access Networks
Improving TCP Performance in TDMA-based Satellite Access Networks Jing Zhu, Sumit Roy {zhuj, roy}@ee.washington.edu Department of Electrical Engineering, University of Washington, Seattle, WA 98105 Abstract-
More informationPacket multiple access and the Aloha protocol
Packet multiple access and the Aloha protocol Massachusetts Institute of Technology Department of Aeronautics and Astronautics Slide 1 Packet Multiple Access PMA SHARED UPLINK TERMINAL TERMINAL APPL TRANS
More informationCHAPTER 7 MAC LAYER PROTOCOLS. Dr. Bhargavi Goswami Associate Professor & Head Department of Computer Science Garden City College
CHAPTER 7 MAC LAYER PROTOCOLS Dr. Bhargavi Goswami Associate Professor & Head Department of Computer Science Garden City College MEDIUM ACCESS CONTROL - MAC PROTOCOLS When the two stations transmit data
More informationCS 43: Computer Networks. 27: Media Access Contd. December 3, 2018
CS 43: Computer Networks 27: Media Access Contd. December 3, 2018 Last Class The link layer provides lots of functionality: addressing, framing, media access, error checking could be used independently
More informationA Cross-Layer PEP for DVB-RCS Networks
A Cross-Layer PEP for DVB-RCS Networks Giovanni Giambene 1 and Snezana Hadzic 1 CNIT - University of Siena, Via Roma, 56, I-53100 Siena, Italy giambene@unisi.it Abstract. The aim of this paper is to consider
More informationMultiple Access Protocols
Multiple Access Protocols Computer Networks Lecture 2 http://goo.gl/pze5o8 Multiple Access to a Shared Channel The medium (or its sub-channel) may be shared by multiple stations (dynamic allocation) just
More informationIN RECENT years, many satellite projects have been
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 22, NO. 3, APRIL 2004 559 A Dynamic Reservation Protocol for LEO Mobile Satellite Systems Henry C. B. Chan, Member, IEEE, Jie Zhang, Hui Chen Abstract
More informationChapter - 1 INTRODUCTION
Chapter - 1 INTRODUCTION Worldwide Interoperability for Microwave Access (WiMAX) is based on IEEE 802.16 standard. This standard specifies the air interface of fixed Broadband Wireless Access (BWA) system
More informationECE 4450:427/527 - Computer Networks Spring 2017
ECE 4450:427/527 - Computer Networks Spring 2017 Dr. Nghi Tran Department of Electrical & Computer Engineering Lecture 5.4: Multiple Access Protocols Dr. Nghi Tran (ECE-University of Akron) ECE 4450:427/527
More informationMaximum Number of Users Which Can Be Served by TETRA Systems
Maximum Number of Users Which Can Be Served by TETRA Systems Martin Steppler Aachen University of Technology Communication Networks Prof. Dr.-Ing. Bernhard Walke Kopernikusstr. 16 D-52074 Aachen Germany
More informationCOMPUTER NETWORKS - Local area networks
Local area networks Telecommunication Networks Group firstname.lastname@polito.it http://www.telematica.polito.it/ COMPUTER NETWORKS LANs - 1 Copyright Quest opera è protetta dalla licenza Creative Commons
More informationLocal area networks. Copyright
Local area networks Telecommunication Networks Group firstname.lastname@polito.it http://www.telematica.polito.it/ COMPUTER NETWORKS LANs - 1 Copyright Quest opera è protetta dalla licenza Creative Commons
More informationRECENTLY, the information exchange using wired and
Fast Dedicated Retransmission Scheme for Reliable Services in OFDMA Systems Howon Lee and Dong-Ho Cho Department of Electrical Engineering and Computer Science Korea Advanced Institute of Science and Technology
More informationChapter 6 Medium Access Control Protocols and Local Area Networks
Chapter 6 Medium Access Control Protocols and Local Area Networks Part I: Medium Access Control Part II: Local Area Networks CSE 3213, Winter 2010 Instructor: Foroohar Foroozan Chapter Overview Broadcast
More informationTopics. Link Layer Services (more) Link Layer Services LECTURE 5 MULTIPLE ACCESS AND LOCAL AREA NETWORKS. flow control: error detection:
1 Topics 2 LECTURE 5 MULTIPLE ACCESS AND LOCAL AREA NETWORKS Multiple access: CSMA/CD, CSMA/CA, token passing, channelization LAN: characteristics, i basic principles i Protocol architecture Topologies
More informationLecture 9. Quality of Service in ad hoc wireless networks
Lecture 9 Quality of Service in ad hoc wireless networks Yevgeni Koucheryavy Department of Communications Engineering Tampere University of Technology yk@cs.tut.fi Lectured by Jakub Jakubiak QoS statement
More informationAdaptive Dynamic Channel Allocation Scheme for Spotbeam Handover in LEO Satellite Networks*
Adaptive Dynamic Channel Allocation Scheme for Spotbeam Handover in LEO Satellite Networks* Sungrae Cho Broadband and Wireless Networking Laboratory School of Electrical and Computer Engineering Georgia
More informationChapter 12 Multiple Access 12.1
Chapter 12 Multiple Access 12.1 Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. 12.2 Figure 12.1 Data link layer divided into two functionality-oriented sublayers
More informationMSIT 413: Wireless Technologies Week 8
MSIT 413: Wireless Technologies Week 8 Michael L. Honig Department of EECS Northwestern University November 2017 The Multiple Access Problem How can multiple mobiles access (communicate with) the same
More informationPower Laws in ALOHA Systems
Power Laws in ALOHA Systems E6083: lecture 7 Prof. Predrag R. Jelenković Dept. of Electrical Engineering Columbia University, NY 10027, USA predrag@ee.columbia.edu February 28, 2007 Jelenković (Columbia
More informationA RLC/MAC PROTOCOL ARCHITECTURE FOR A WIRELESS IP NETWORK
A RLC/MAC PROTOCOL ARCHITECTURE FOR A WIRELESS IP NETWORK Jamil Y. Khan School of Electrical Engineering & Computer Science, University of Newcastle, Callaghan, NSW 238, Australia, jkhan@ecemail.newcastle.edu.au
More informationSimulation Study for a Broadband Multimedia VSAT Network
Simulation Study for a Broadband Multimedia Yi Qian, Rose Hu, and Hosame Abu-Amara Nortel s 2201 Lakeside Blvd., Mail Stop 992-02-E70 Richardson, Texas 75082, USA Phone: 972-685-7264 Fax: 972-685-3463
More informationLecture 4: Wireless MAC Overview. Hung-Yu Wei National Taiwan University
Lecture 4: Wireless MAC Overview Hung-Yu Wei National Taiwan University Medium Access Control Topology 3 Simplex and Duplex 4 FDMA TDMA CDMA DSSS FHSS Multiple Access Methods Notice: CDMA and spread spectrum
More informationData Link Layer: Collisions
Data Link Layer: Collisions 1 Multiple Access Data Link layer divided into two sublayers. The upper sublayer is responsible for datalink control, The lower sublayer is responsible for resolving access
More information2. Modelling of telecommunication systems (part 1)
2. Modelling of telecommunication systems (part ) lect02.ppt S-38.45 - Introduction to Teletraffic Theory - Fall 999 2. Modelling of telecommunication systems (part ) Contents Telecommunication networks
More informationMultiple Access (1) Required reading: Garcia 6.1, 6.2.1, CSE 3213, Fall 2010 Instructor: N. Vlajic
1 Multiple Access (1) Required reading: Garcia 6.1, 6.2.1, 6.2.2 CSE 3213, Fall 2010 Instructor: N. Vlajic Multiple Access Communications 2 Broadcast Networks aka multiple access networks multiple sending
More informationA hybrid medium access control for convergence of broadband wireless and wireline ATM networks
Downloaded from orbit.dtu.dk on: Oct 07, 2018 A hybrid medium access control for convergence of broadband wireless and wireline ATM networks Liu, Hong; Gliese, Ulrik Bo; Dittmann, Lars Published in: Proceeding
More informationMultiple Access Communications. EEE 538, WEEK 11 Dr. Nail Akar Bilkent University Electrical and Electronics Engineering Department
Multiple Access Communications EEE 538, WEEK 11 Dr. Nail Akar Bilkent University Electrical and Electronics Engineering Department 1 Multiple Access Satellite systems, radio networks (WLAN), ethernet segment
More informationPerformance of UMTS Radio Link Control
Performance of UMTS Radio Link Control Qinqing Zhang, Hsuan-Jung Su Bell Laboratories, Lucent Technologies Holmdel, NJ 77 Abstract- The Radio Link Control (RLC) protocol in Universal Mobile Telecommunication
More informationMultimedia Communication Services Traffic Modeling and Streaming
Multimedia Communication Services Traffic Modeling and Streaming Medium Access Control algorithms Introduction and details on Aloha networks with infinite nodes Università degli Studi di Brescia A.A. 2014/2015
More informationMultiple Access Links and Protocols
Multiple Access Links and Protocols Two types of links : point-to-point PPP for dial-up access point-to-point link between Ethernet switch and host broadcast (shared wire or medium) old-fashioned Ethernet
More informationIEEE P Wireless Access Method and Physical Layer Specification. April 30, 1991 REVISED: May 2, 1991
IEEE P802.11 Wireless Access Method and Physical Layer Specification DATE: April 30, 1991 REVISED: May 2, 1991 TITLE: ACCESS PROTOCOL METHODS FOR FIXED AND ADAPTIVE WIDTH TIME SLOTS AUTHOR: Chandos A.
More informationCS 43: Computer Networks Media Access. Kevin Webb Swarthmore College November 30, 2017
CS 43: Computer Networks Media Access Kevin Webb Swarthmore College November 30, 2017 Multiple Access Links & Protocols Two classes of links : point-to-point dial-up access link between Ethernet switch,
More informationCHAPTER 3 EFFECTIVE ADMISSION CONTROL MECHANISM IN WIRELESS MESH NETWORKS
28 CHAPTER 3 EFFECTIVE ADMISSION CONTROL MECHANISM IN WIRELESS MESH NETWORKS Introduction Measurement-based scheme, that constantly monitors the network, will incorporate the current network state in the
More informationECE453 Introduction to Computer Networks. Broadcast vs. PPP. Delay. Lecture 7 Multiple Access Control (I)
ECE453 Introduction to Computer Networks Lecture 7 Multiple Access Control (I) 1 Broadcast vs. PPP Broadcast channel = multiaccess channel = random access channel Broadcast LAN Satellite network PPP WAN
More informationA QoS Architecture for IDMA-based Multi-service Wireless Networks
A QoS Architecture for IDMA-based Multi-service Wireless Networks Qian Huang, Sammy Chan, King-Tim Ko, Li Ping, and Peng Wang Department of Electronic Engineering, City University of Hong Kong Kowloon,
More informationWireless Medium Access Control Protocols
Wireless Medium Access Control Protocols Telecomunicazioni Undergraduate course in Electrical Engineering University of Rome La Sapienza Rome, Italy 2007-2008 Classification of wireless MAC protocols Wireless
More informationGLOBECOM'94, San Francisco, CA, Nov.-Dic C-PRMA: the Centralized Packet Reservation Multiple Access for
GLOBECOM'94, San Francisco, CA, Nov.-Dic. 1994 1 C-PRMA: the Centralized Packet Reservation Multiple Access for Local Wireless Communications? Giuseppe Bianchi, Flaminio Borgonovo, Luigi Fratta, Luigi
More informationLecture 8 The Data Link Layer part I. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it
Lecture 8 The Data Link Layer part I Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it Link Layer: setting the context two physically connected devices: host-router, router-router,
More informationETSN01 Exam Solutions
ETSN01 Exam Solutions March 014 Question 1 (a) See p17 of the cellular systems slides for a diagram and the full procedure. The main points here were that the HLR needs to be queried to determine the location
More informationAn Efficient Scheduling Scheme for High Speed IEEE WLANs
An Efficient Scheduling Scheme for High Speed IEEE 802.11 WLANs Juki Wirawan Tantra, Chuan Heng Foh, and Bu Sung Lee Centre of Muldia and Network Technology School of Computer Engineering Nanyang Technological
More informationData and Computer Communications
Data and Computer Communications Chapter 16 High Speed LANs Eighth Edition by William Stallings Why High Speed LANs? speed and power of PCs has risen graphics-intensive applications and GUIs see LANs as
More informationCMPE 150/L : Introduction to Computer Networks. Chen Qian Computer Engineering UCSC Baskin Engineering Lecture 16
CMPE 150/L : Introduction to Computer Networks Chen Qian Computer Engineering UCSC Baskin Engineering Lecture 16 1 Final project demo Please do the demo next week to the TAs. So basically you may need
More informationIntelligent Transportation Systems. Medium Access Control. Prof. Dr. Thomas Strang
Intelligent Transportation Systems Medium Access Control Prof. Dr. Thomas Strang Recap: Wireless Interconnections Networking types + Scalability + Range Delay Individuality Broadcast o Scalability o Range
More informationDigital Communication Networks
Digital Communication Networks MIT PROFESSIONAL INSTITUTE, 6.20s July 25-29, 2005 Professor Muriel Medard, MIT Professor, MIT Slide 1 Digital Communication Networks Introduction Slide 2 Course syllabus
More informationChapter 6 Medium Access Control Protocols and Local Area Networks
Chapter 6 Medium Access Control Protocols and Local Area Networks Part I: Medium Access Control Part II: Local Area Networks Chapter Overview Broadcast Networks All information sent to all users No routing
More informationA Probing Process for Dynamic Resource Allocation in Fixed Broadband Wireless Access Networks
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, VOL. 52, NO. 4, JULY 2003 1143 A Probing Process for Dynamic Resource Allocation in Fixed Broadband Wireless Access Networks Qiang Wang and Anjali Agarwal, Member,
More informationLink Layer and LANs 안상현서울시립대학교컴퓨터 통계학과.
Link Layer and LANs 안상현서울시립대학교컴퓨터 통계학과 ahn@venus.uos.ac.kr Data Link Layer Goals: understand principles behind data link layer services: error detection, correction sharing a broadcast channel: multiple
More informationChapter 3 MEDIA ACCESS CONTROL
Chapter 3 MEDIA ACCESS CONTROL Distributed Computing Group Mobile Computing Winter 2005 / 2006 Overview Motivation SDMA, FDMA, TDMA Aloha Adaptive Aloha Backoff protocols Reservation schemes Polling Distributed
More informationScheduling of real-time traffic in IEEE networks
Scheduling of real-time traffic in IEEE 802.11 networks Afonso, José A. Neves, Joaquim E. Universidade do Minho, Departamento de Electrónica Industrial Campus de Azurém, 4800-058 Guimarães, ortugal jose.afonso@dei.uminho.pt
More informationRandom Assignment Protocols
Random Assignment Protocols Random assignment strategies attempt to reduce problem occur in fixed assignment strategy by eliminating pre allocation of bandwidth to communicating nodes. Random assignment
More informationLecture 12 December 04, Wireless Access. Graduate course in Communications Engineering. University of Rome La Sapienza. Rome, Italy
Lecture 12 December 04, 2017 Wireless Access Graduate course in Communications Engineering University of Rome La Sapienza Rome, Italy 2017-2018 Random Medium Access Control Part II - CSMA and Collision
More informationMAC protocols for ad hoc networks
MAC protocols for ad hoc networks Lecturer: Dmitri A. Moltchanov E-mail: moltchan@cs.tut.fi http://www.cs.tut.fi/kurssit/tlt-2756/ OUTLINE: Problems for MAC to deal with; Design goals; Classification of
More informationReminder: Datalink Functions Computer Networking. Datalink Architectures
Reminder: Datalink Functions 15-441 15 441 15-641 Computer Networking Lecture 5 Media Access Control Peter Steenkiste Fall 2015 www.cs.cmu.edu/~prs/15-441-f15 Framing: encapsulating a network layer datagram
More informationPerformance Analysis of Cell Switching Management Scheme in Wireless Packet Communications
Performance Analysis of Cell Switching Management Scheme in Wireless Packet Communications Jongho Bang Sirin Tekinay Nirwan Ansari New Jersey Center for Wireless Telecommunications Department of Electrical
More informationETSI Project BRAN Hiperlan Type 2 for IEEE 1394 Applications System Overview
ETSI Project BRAN Hiperlan Type 2 for IEEE 1394 Applications System Overview Source : Jamshid Khun Jush (Ericsson) (THOMSON multimedia) 1 HIPERLAN/2 Standard A new standard developed by the ETSI Project
More informationWireless Communications
4. Medium Access Control Sublayer DIN/CTC/UEM 2018 Why do we need MAC for? Medium Access Control (MAC) Shared medium instead of point-to-point link MAC sublayer controls access to shared medium Examples:
More informationCOMPUTER NETWORK Model Test Paper
Model Test Paper Question no. 1 is compulsory. Attempt all parts. Q1. Each question carries equal marks. (5*5 marks) A) Difference between Transmission Control Protocol (TCP) and User Datagram Protocol.
More informationMultiple Access. Data Communications and Networking
Multiple Access In the previous part we discussed data link control, a mechanism which provides a link with reliable communication. In the protocols we described, we assumed that there is an available
More informationIT IS anticipated that traffic in next-generation cellular
146 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 7, NO. 2, APRIL 1999 A Slotted CDMA Protocol with BER Scheduling for Wireless Multimedia Networks Ian F. Akyildiz, Fellow, IEEE, David A. Levine, and Inwhee
More informationVideo Traffic Management in HSDPA via GEO Satellite
Video Traffic Management in HSDPA via GEO Satellite Giovanni Giambene, Samuele Giannetti, Cristina Párraga Niebla, Michal Ries CNIT University of Siena, Via Roma, 56, I-53100 Siena, Italy, email: giambene@unisi.it
More informationData Link Layer, Part 5. Medium Access Control
CS 455 Medium Access Control, Page 1 Data Link Layer, Part 5 Medium Access Control These slides are created by Dr. Yih Huang of George Mason University. Students registered in Dr. Huang s courses at GMU
More informationA-MAC: Adaptive Medium Access Control for Next Generation Wireless Terminals
University of Nebraska - Lincoln DigitalCommons@University of Nebraska - Lincoln CSE Journal Articles Computer Science and Engineering, Department of 2007 A-MAC: Adaptive Medium Access Control for Next
More informationPerformance Evaluation of Scheduling Mechanisms for Broadband Networks
Performance Evaluation of Scheduling Mechanisms for Broadband Networks Gayathri Chandrasekaran Master s Thesis Defense The University of Kansas 07.31.2003 Committee: Dr. David W. Petr (Chair) Dr. Joseph
More informationAdaptive Resource Allocation Mechanisms for Support of Data Traffic over ATM Satellite Networks Introduction The Dynamic Flow Control Scheme
Adaptive Resource Allocation Mechanisms for Support of Traffic over ATM Satellite Networks Tanja Lang and Nirmala Shenoy, Co-operative Research Centre for Satellite Systems, Institute for Telecommunications
More informationCHAPTER 5 PROPAGATION DELAY
98 CHAPTER 5 PROPAGATION DELAY Underwater wireless sensor networks deployed of sensor nodes with sensing, forwarding and processing abilities that operate in underwater. In this environment brought challenges,
More informationCS 455/555 Intro to Networks and Communications. Link Layer
CS 455/555 Intro to Networks and Communications Link Layer Dr. Michele Weigle Department of Computer Science Old Dominion University mweigle@cs.odu.edu http://www.cs.odu.edu/~mweigle/cs455-s13 1 Link Layer
More informationA NEW THRESHOLD SWITCHING SCHEME FOR A DVB-RCS MOBILE RETURN LINK IN A TERRESTRIAL RAILWAY SCENARIO
A NEW THRESHOLD SWITCHING SCHEME FOR A DVB-RCS MOBILE RETURN LINK IN A TERRESTRIAL RAILWAY SCENARIO Mauro TROPEA 1 1 Department of Electronics, Computer Science and Systems, Faculty of Engineering, University
More informationAloha and slotted aloha
CSMA 2/13/06 Aloha and slotted aloha Slotted aloha: transmissions are synchronized and only start at the beginning of a time slot. Aloha sender A sender B collision sender C t Slotted Aloha collision sender
More informationQoS based vertical handoff method between UMTS systems and wireless LAN networks
QoS based vertical handoff method between UMTS systems and wireless LAN networks Sungkwan Jung and Dong-ho Cho Div. of EE, Dept. of EECS Korea Advanced Institute of Science and Technology Daejeon, Rep.
More informationAn Hybrid Reservation-Polling MAC Protocol for Powerline Communications
An Hybrid Reservation-Polling MAC Protocol for Powerline Communications Giuseppe Bianchi 1, Giuseppe Conigliaro 2 1 Università di Palermo, Dipartimento di Ingegneria Elettrica Viale Delle Scienze, Parco
More informationChapter 4. The Medium Access Control Sublayer. Points and Questions to Consider. Multiple Access Protocols. The Channel Allocation Problem.
Dynamic Channel Allocation in LANs and MANs Chapter 4 The Medium Access Control Sublayer 1. Station Model. 2. Single Channel Assumption. 3. Collision Assumption. 4. (a) Continuous Time. (b) Slotted Time.
More informationA STUDY ON THE MAC TECHNOLOGY AND ACCESS NETWORK OVER 3G SYSTEMS
A STUDY ON THE MAC TECHNOLOGY AND ACCESS NETWORK OVER 3G SYSTEMS Shalu Chauhan 1, Ankit Tripathi 2, Vartika Anand 3 1 Department of CSE,SRM University, Modinagar, India 2 Department of ECE, RKGIT, Ghaziabad,
More informationThird generation WCDMA radio evolution
WIRELESS COMMUNICATIONS AND MOBILE COMPUTING Wirel. Commun. Mob. Comput. 2003; 3:987 992 (DOI: 10.1002/wcm.134) Third generation WCDMA radio evolution Harri Holma*,y and Antti Toskala Nokia Networks, IP
More informationA DYNAMIC RESOURCE ALLOCATION STRATEGY FOR SATELLITE COMMUNICATIONS. Eytan Modiano MIT LIDS Cambridge, MA
A DYNAMIC RESOURCE ALLOCATION STRATEGY FOR SATELLITE COMMUNICATIONS Aradhana Narula-Tam MIT Lincoln Laboratory Lexington, MA Thomas Macdonald MIT Lincoln Laboratory Lexington, MA Eytan Modiano MIT LIDS
More informationOutline. Introduction to Networked Embedded Systems - Embedded systems Networked embedded systems Embedded Internet - Network properties
Outline Introduction to Networked Embedded Systems - Embedded systems Networked embedded systems Embedded Internet - Network properties Layered Network Architectures - OSI framework descriptions of layers
More informationPerformance Analysis of WLANs Under Sporadic Traffic
Performance Analysis of 802.11 WLANs Under Sporadic Traffic M. Garetto and C.-F. Chiasserini Dipartimento di Elettronica, Politecnico di Torino, Italy Abstract. We analyze the performance of 802.11 WLANs
More informationBasic reference models and performance parameters of Internet Protocol packet network transmission in the mobile-satellite service
ecommendation ITU- M.1636 (06/2003) Basic reference models and performance parameters of Internet Protocol packet network transmission in the mobile-satellite service M Series Mobile, radiodetermination,
More informationEECS 563 Fall Review Test 2. Review Test 2
EECS 563 Fall 2013 1 Network traffic Request for resources Rate of requests= λ Average resource hold time = T h Common Assumptions Time between arrivals ~ exponentially Holding time ~ exponentially Voice
More information1-1. Switching Networks (Fall 2010) EE 586 Communication and. November 8, Lecture 30
EE 586 Communication and Switching Networks (Fall 2010) Lecture 30 November 8, 2010 1-1 Announcements Quiz on Wednesday Next Monday hands-on training on Contiki OS Bring your laptop 4-2 Multiple Access
More informationMobile Communications Chapter 3 : Media Access
Mobile Communications Chapter 3 : Media Access 2. Motivation 3. SDMA, FDMA, TDMA 1. Aloha and contention based schemes 4. Reservation schemes 5. Collision avoidance, MACA 6. Polling CDMA (Lecture 6) Prof.
More informationLinks Reading: Chapter 2. Goals of Todayʼs Lecture. Message, Segment, Packet, and Frame
Links Reading: Chapter 2 CS 375: Computer Networks Thomas Bressoud 1 Goals of Todayʼs Lecture Link-layer services Encoding, framing, and error detection Error correction and flow control Sharing a shared
More informationDepartment of Electrical and Computer Systems Engineering
Department of Electrical and Computer Systems Engineering Technical Report MECSE-6-2006 Medium Access Control (MAC) Schemes for Quality of Service (QoS) provision of Voice over Internet Protocol (VoIP)
More informationDifferent Resource Sharing Policies under a General Channel Management Strategy for Multi-Class Traffic in LEO-MSS
www.iji.org 126 Different Resource Sharing Policies under a General Channel Management Strategy for Multi-Class Traffic in LEO-MSS Amr S. Matar, Gamal Abd-Elfadeel, Ibrahim I. Ibrahim and Hesham M. Z.
More informationSupporting Service Differentiation for Real-Time and Best-Effort Traffic in Stateless Wireless Ad-Hoc Networks (SWAN)
Supporting Service Differentiation for Real-Time and Best-Effort Traffic in Stateless Wireless Ad-Hoc Networks (SWAN) G. S. Ahn, A. T. Campbell, A. Veres, and L. H. Sun IEEE Trans. On Mobile Computing
More informationSupporting QoS over Handovers in LEO Satellite Systems
Supporting QoS over Handovers in LEO Satellite Systems E. Papapetrou, E. Stathopoulou, F.-N. Pavlidou Aristotle University of Thessaloniki, School of Engineering, Dept. of Electrical & Computer Engineering,
More informationECE 333: Introduction to Communication Networks Fall Lecture 19: Medium Access Control VII
ECE : Introduction to Communication Networks Fall 2002 Lecture 9: Medium Access Control VII More on token ring networks LAN bridges and switches. More on token rings In the last lecture we began discussing
More informationPhysical Layer. Medium Access Links and Protocols. Point-to-Point protocols. Modems: Signaling. Modems Signaling. Srinidhi Varadarajan
P Physical Layer Srinidhi Varadarajan Medium Access Links and Protocols Three types of links : point-to-point (single wire, e.g. PPP, SLIP) broadcast (shared wire or medium; e.g, Ethernet, Wavelan, etc.)
More informationData Link Layer: Multi Access Protocols
Digital Communication in the Modern World Data Link Layer: Multi Access Protocols http://www.cs.huji.ac.il/~com1 com1@cs.huji.ac.il Some of the slides have been borrowed from: Computer Networking: A Top
More informationChapter 1 Introduction
Emerging multimedia, high-speed data, and imaging applications are generating a demand for public networks to be able to multiplex and switch simultaneously a wide spectrum of data rates. These networks
More informationLecture 19. Principles behind data link layer services Framing Multiple access protocols
Link Layer Lecture 19 Principles behind data link layer services Framing Multiple access protocols ALOHA *The slides are adapted from ppt slides (in substantially unaltered form) available from Computer
More informationThe Medium Access Control Scheme (MAC Layer) Reference: Andrew S. Tanenbaum, Computer Networks, 3rd Edition, Prentice Hall, 1996.
The Medium Access Control Scheme (MAC Layer) Reference: Andrew S. Tanenbaum, Computer Networks, 3rd Edition, Prentice Hall, 1996. 1 Table of Contents Introduction ALOHA Carrier Sense Multiple Sense (CSMA)
More information