Medium Access Control Protocols of the PRMA Type in non-geostationary Satellites

Size: px
Start display at page:

Download "Medium Access Control Protocols of the PRMA Type in non-geostationary Satellites"

Transcription

1 Medium Access Control Protocols of the PRMA Type in non-geostationary Satellites Giovanni Giambene Dipartimento di Ingegneria dell Informazione Università degli Studi di Siena Via Roma, Siena, Italy Abstract The challenge of future mobile multimedia networks is to provide worldwide tetherless communication services. Low Earth Orbit-Mobile Satellite Systems (LEO-MSSs) will play a significant role by filling the coverage gaps of future generation terrestrial cellular networks. This lecture presents research results on demand-assignment Medium Access Control (MAC) schemes able to share efficiently LEO satellite resources among users and to support isochronous traffics and the ubiquitous access to the Internet. 1 Introduction Future generation mobile communication systems will achieve a global coverage by integrating a terrestrial cellular component and a satellite one [1],[2]. The satellite system will play a complementary role with respect to its terrestrial counterpart; typical operational environments for satellite systems are regions where the provision of the terrestrial coverage is either technically or economically unfeasible. The role of mobile satellite systems is: (i) to allow the global roaming of users; (ii) to provide Quality of Service (QoS) levels comparable with those of terrestrial systems; (iii) to permit the rapid deployment of mobile services in underdeveloped regions. The satellite component of future mobile communication systems will be based (partly or totally) on non-geostationary constellations. In particular, this study focuses on Low Earth Orbit Mobile Satellite Systems (LEO-MSSs), since they are close to the earth and allow the use of low-power lightweight mobile terminals [3]. In what follows, an earth-fixed cell system [4] will be assumed where antenna beams are steered so as to point towards a given cell on the earth during the satellite visibility time. Satellites are power and bandwidth limited. Therefore, it is essential that satellite resources are efficiently utilized. Hence, suitable Medium Access Control (MAC) protocols must be identified for the management of resources in a cell. MAC schemes contain a set of rules according to which the power-bandwidth resource is assigned to the different communications. In particular, real-time traffic (i.e., isochronous voice traffic) and Available Bit Rate (ABR) data traffic are considered. Several types of Medium Access Control (MAC) schemes have been proposed for satellite systems [5], but the identification of an efficient MAC protocol, able to guarantee suitable QoS for different traffics, is still an open research issue. A MAC protocol taxonomy can be envisaged as described below. 1. Fixed access protocols that grant permission to transmit only to one terminal at once, avoiding collisions of messages on the shared medium. Access rights are statically defined for the terminals. 1

2 2. Contention-based protocols that may give transmission rights to several terminals at the same time. These policies may cause two or more terminals to transmit simultaneously and their messages to collide on the shared medium. This class encompasses pure Aloha, Slotted-Aloha and Reservation-Aloha [6]. 3. Demand-assignment protocols that grant the access to the network on the basis of requests made by the terminals. The reason for the presence of many different MAC protocols is that they are suitable for some applications, but often do not meet the requirements for other applications. For instance, fixed access schemes are not efficient with bursty traffics, because they can not adapt to varying traffic conditions. This lecture presents research results concerning new demandassignment MAC schemes that are evolutions of the classical Packet Reservation Multiple Access (PRMA) protocol. These novel protocols are able to integrate the management of isochronous and data bursty traffics and, therefore, can be useful in the Satellite- Asynchronous Transfer Mode (S-ATM) scenario. 2 The classical PRMA protocol in LEO-MSSs The PRMA protocol was originally proposed for terrestrial microcellular systems [6]: it is based on Time Division Multiple Access (TDMA) and combines random access with slot reservation. The efficiency of PRMA relies on managing voice sources with Speech Activity Detection (SAD): only during a talkspurt, a voice source has reserved one slot per frame to transmit its packets. A feedback channel broadcast by the cell controller informs the terminals about the state of each slot (i.e., idle or reserved) in a frame. As soon as a new talkspurt is revealed, the terminal tries to transmit a packet in the first idle slot (contending state), according to a permission probability scheme [6]. When the transmission attempt of a terminal is successful on a slot, the terminal obtains the reservation of this slot. The main limiting factor for the use of PRMA in LEO-MSSs is the high Round Trip propagation Delay (RTD) value that prevents the mobile terminals on the earth to know immediately the outcome of their transmission attempts. In LEO-MSSs, RTD values vary from 5 ms to 30 ms, depending on the satellite constellation altitude and the minimum elevation angle from mobile terminals to the satellite. The satellite recognizes the request made by a terminal by decoding the header of the received packet on an unreserved slot. For a conservative study, RTD is assumed always equal to its maximum value, RTD max, for a given LEO-MSS. For the correct protocol behavior, T f must be greater than or equal to RTD max + ε, where ε is the packet header transmission time. Consequently, when a terminal attempts to transmit on a given slot, it receives the outcome of its attempt before the beginning of the same slot in the next frame. Of course, the selection of the T f value must also account for both the requirements on the voice end-to-end delay, the voice codec and the packetization process. It is considered here T f RTD max (ε is negligible). If more terminals attempt to send their packets on the same slot, there is a collision (unless capture phenomena occur [6]): these terminals know that they must reschedule new transmissions only after RTD. This delay is particularly significant for the real-time voice service. In order to relax these problems, the following Section presents several solutions that are also suitable for other scenarios where RTD is greater than the packet transmission time (e.g., high altitude aeronautical platforms recently proposed to provide high bit-rate transmissions in heavy traffic urban areas [7]). 3 Novel schemes based on PRMA This Section surveys three novel MAC schemes that derive from the modification of PRMA in order to make it more suitable for the LEO satellite scenario. Let us consider M v Voice Terminals (VTs) and M w Data Terminals (DTs) per carrier per cell. 2

3 3.1 PRMA with hindering states In the classical PRMA scheme, assuming a typical LEO system where RTD max is about equal to 16 ms, a terminal could perform at most two access attempts before dropping the first packet (as shown in Section 4.1, the voice packet deadline is 32 ms). To remove this constraint, a modified PRMA protocol is presented here, where a terminal is allowed to attempt transmissions (according to the permission probability scheme) also while it is waiting for the outcome of a previous attempt. If the previous attempt has been unsuccessful, this modification permits a faster access scheme. Otherwise, these further attempts are useless and may hinder the accesses to other terminals. Accordingly, this scheme has been called PRMA with Hindering States (PRMA-HS). It has been shown in [8] that the advantages of this fast retransmission scheme overcome the problems due to useless attempts. In order to integrate VT and DT traffics, different permission probabilities values have been considered; p v and p d, respectively, where p v > p d to prioritize the voice real-time traffic. 3.2 Modified PRMA scheme In the Modified PRMA (MPRMA) protocol, a given field in the packet header is devoted to notify the satellite if a transmission request (i.e., the first packet of a terminal that must acquire transmission rights) comes from a DT or from a VT; accordingly, different algorithms are used. In particular, the management of VTs is as in the classical PRMA scheme. Whereas, DT requests are served as described below. If a message is generated by a DT when its buffer is idle, its first packet (= request packet) is transmitted on an available slot, according to a permission probability, p d. Collisions may occur with the attempts of other terminals. If this first packet does not experience a collision, its header contains a DT transmission request that is stored into a buffer on the satellite in order to form a queue of DTs that need to transmit. The controller on board of the satellite manages a queue of uplink transmission requests for each MPRMA carrier of a cell and decides allocations of slots (not used by VTs) to DTs [9]. In order to guarantee a certain number of idle slots for new accesses of DTs and VTs, the controller assigns an idle slot to a given DT (with its request at the head of the satellite queue) in the next frame, according to an access probability p a. Let us consider a DT that is allowed to transmit the last packet of its presently served message and that has in its buffer other messages arrived in the meanwhile. A suitable flag is set in the header of this last packet so that the DT requests the transmission of another message to the satellite (piggybacked request). Both the random access packet and the packet used for the piggybacked request use a suitable field in the header to notify the message length to the satellite. 3.3 DRAMA protocol In the Dynamic Resource Assignment Multiple Access (DRAMA) scheme, the frame contains first access slots and, then, information slots. Access slots are minislotted: a terminal sends an access burst on a minislot to request transmission resources. The number of minislots per slot is about equal to the number of packet headers that can be transmitted in a slot time. The number of minisloted slots per frame is always greater than or equal to one. This value is dynamically updated trying to have a total number of minislots equal to the number of terminals that have set-up a connection (satellite-atm) and that are not transmitting. This permits to maximize the throughput of successful requests per minislot. Colliding terminals will reattempt in the next contention phase. A feedback channel informs the mobile terminals at the beginning of each frame about the number of minislotted slots for the next access phase. With the DRAMA protocol the satellite becomes an ATM scheduler: slot allocations are dynamically updated; the feedback channel is used to send assignment commands for each 3

4 slot. Slots are first assigned to fulfill the VT requests. Remaining slots are used to serve DT requests. On the basis of currently active transmission requests, the satellite knows how many slots will be destined to the VTs in the next frame and decides slot assignments to data traffics by using a cyclic policy among all DTs. Each data traffic transmission request conveys the number of packet of the related message. Hence, the satellite may decide also multiple slot allocations to a given DT in a frame (if room). The piggybacking scheme is used by data sources to communicate new access requests when they are already transmitting to the satellite. 4 Traffic source models The traffic models for generating isochronous and data bursty traffics are detailed below. 4.1 Voice sources Each VT uses SAD to distinguish between talkspurts and silent pauses in a conversation. Talking and silent phases lengths are exponentially distributed with mean values t 1 = 1 s and t 2 = 1.35 s, respectively. The voice activity factor is ψ v = t 1 / (t 1 + t 2 ) An active VT generates one packet per frame (L pkt = R s T f information bits and H p header bits). The number of slots per frame and the slot duration are: N = R c T f / (L pkt + H p ) [slots/frame] and T s = T f /N where. is the floor function, R c is the channel bit-rate and R s is the voice source bit-rate. A VT discards the first packet from its buffer, when it experiences a transmission delay greater than a maximum value, D max ; typically, D max = 32 ms [6]. When a packet is discarded, the VT tries to obtain a reservation with the next packet. Let P drop denote the packet dropping probability for a VT (P drop 1% for an acceptable speech quality). The voice throughput is η v = M v ψ v (1 - P drop )/N [packets/slot]. 4.2 Internet-like traffic sources A simplified WWW traffic model is used [10], where a DT produces packet calls separated by a reading time (traffic at session level). The number of datagrams generated per packet call is geometrically distributed with expected value N p. During a packet call, the datagram interarrival time is exponentially distributed with mean rate µ pkt. The reading time is exponentially distributed with mean rate µ rd. For numerical evaluations it is considered: N p = 25 datagrams/packet call, µ rd = 0.25 s -1 and µ pkt = 2q datagrams/s, where q {1, 2, 3, 4, 5, 6, 7}. The datagram length in bytes has the same truncated and discretized Pareto distribution shown in [10]. The activity factor for this type of DT is given by ψ w = (N pc /µ pkt )/(N pc /µ pkt +1/µ rd ). The mean message arrival rate is λ = µ pkt ψ w datagrams/s. The total traffic load produced by all DTs is: t d = λt s L w M w [packets/slot] where L w denotes the mean length of a datagram in packets. The burstiness degree of a traffic source is defined as the peak-to-mean traffic ratio. The variable value for µ pkt (depending on q) allows modulating the DT burstiness degree that is equal to 1/ψ w. The service for DTs is characterized by the average datagram delay, T dtg, i.e., the time from the datagram arrival to the DT buffer until the complete datagram transmission. 4

5 4.3 Stability considerations Under the assumption of stability, the total data throughput must be equal to the total input data traffic, i.e., t d, and the probability that a slot is used to send a packet successfully must be lower than 1 (the maximum possible utilization): t d + η v < 1 [packets/slot] λt s L w M w + M v ψ v (1 - P drop )/N < 1 [packets/slot] This condition may be used for a proper sizing of the connection admission control protocol. 5 Results and comparisons Extensive simulation runs have permitted to compare the proposed MAC schemes in a typical LEO satellite constellation at 780 km altitude with RTD max = 15 ms. Simulation results have been obtained assuming: a channel bit-rate R c = 765 kbit/s, a source bit-rate R s = 32 kbit/s, a packet header of H p = 64 bits, a frame duration T f = RTD max = 15 ms. Moreover, for PRMA and PRMA-HS p v = 0.6 and p d = 0.2 [8]; for MPRMA p v = 0.6, p d = 0.4 and p a = 0.8 [9]; for DRAMA, the number of minislots per slot N m = 8. Assuming a configuration with 12 DTs and 21 VTs, simulation results have been shown in Figs. 1 and 2 for P drop and T dtg, respectively. The data traffic increase in abscissa has been obtained by progressively increasing q (i.e., q = 1, 2, 3, ) in the mean datagram interarrival rate. On the basis of these results, it is evident that MPRMA outperforms PRMA-HS in terms of T dtg and maintains P drop below the maximum acceptable value. However, the MPRMA scheme does not allow a significant performance improvement. Hence, the novel DRAMA scheme has to be considered since it considerably reduces both T dtg and P drop so achieving a better utilization of satellite resources with respect to PRMA, PRMA-HS and MPRMA. 6 Conclusions This lecture has shown research results on MAC protocols for LEO-MSSs. Three different evolutions of the PRMA scheme have been compared; in particular: PRMA-HS, MPRMA and DRAMA. It has been shown that the DRAMA scheme permits to improve the management of isochronous and data bursty traffics. The study presented in this lecture provides useful considerations for the design of MAC protocols able to support isochronous traffics and the ubiquitous access to the Internet in S-ATM systems. 1.0E-01 Packet dropping probability, Pdrop 1.0E E E-04 PRMA MPRMA PRMA-HS DRAMA 1.0E Total data traffic, td Figure 1. Performance comparison among the considered schemes in terms of P drop. 5

6 Mean datagram delay, Tdtg [slots] 5.7E+03 PRMA PRMA-HS 4.9E+03 MPRMA DRAMA 4.1E E E E E E Total data traffic, t d Figure 2. Performance comparison among the considered schemes in terms of T dtg. References [1] A. Guntsch, M. Ibnkahla, G. Losquadro, M. Mazella, D. Roviras, A. Timm, EU s R&D Activities on Third-Generation Mobile Satellite Systems (S-UMTS), IEEE Comm. Mag., Vol. 36, No. 2, Feb [2] P. Taaghol, B. G. Evans, E. Buracchini, R. De Gaudenzi, G. Gallinaro, J. Ho Lee, C. Gu Kang, Satellite UMTS/IMT2000 W-CDMA Air Interfaces, IEEE Communications Magazine, Vol. 37, No. 9, pp , Sept [3] Official Web sites with addresses: [4] J. Restrepo and G. Maral, Coverage Concepts for Satellite Constellations Providing Communications Services to Fixed and Mobile Users, Space Communications, Vol. 13, No. 2, pp , [5] H. Peyravi, Medium Access Control Protocols Performance in Satellite Communications, IEEE Comm. Mag., Vol. 37, No. 3, March [6] S. Nanda, D. J. Goodman, U. Timor, Performance of PRMA: a Packet Voice Protocol for Cellular Systems, IEEE Trans. on Veh. Tech., Vol. 40, No. 3, Aug [7] G. M. Djunknic, J. Freidenfelds, Y. Okunev, Establishing Wireless Communications Services via High-Altitude Aeronautical Platforms: A Concept Whose Time Has Come?, IEEE Comm. Mag., Vol. 35, No. 9, Sept [8] E. Del Re, R. Fantacci, G. Giambene, and S. Walter, Performance Analysis of an Improved PRMA Protocol for Low Earth Orbit Mobile Satellite Systems, IEEE Trans. on Veh. Tech., Vol. 48, No. 3, May [9] R. Fantacci, G. Giambene, R. Angioloni, A Modified PRMA Protocol for Voice and Data Transmissions in Low Earth Orbit Mobile Satellite Systems, to appear on IEEE Trans. on Veh. Tech. [10] ETSI, Selection Procedures for the Choice of Radio Transmission Technologies of the UMTS (UMTS Version 3.1.0); ETSI, Sophia-Antipolis, Cedex, France, Nov

Network and MAC Issues for Mobile Satellite Multimedia Networks

Network and MAC Issues for Mobile Satellite Multimedia Networks Network and MAC Issues for Mobile Satellite Multimedia Networks 1, E. Del Re 2, I. Mertzanis 3 1 DLR Oberpfaffenhofen, Wessling, Germany 2 University of Florence, Florence, Italy 3 University of Surrey,

More information

PROTOCOLS FOR HIGH-EFFICIENCY WIRELESS NETWORKS

PROTOCOLS FOR HIGH-EFFICIENCY WIRELESS NETWORKS PROTOCOLS FOR HIGH-EFFICIENCY WIRELESS NETWORKS PROTOCOLS FOR HIGH-EFFICIENCY WIRELESS NETWORKS by Alessandro Andreadis Giovanni Giambene KLUWER ACADEMIC PUBLISHERS NEW YORK, BOSTON, DORDRECHT, LONDON,

More information

FAIR DELAY OPTIMIZATION-BASED RESOURCE ALLOCATION ALGORITHM FOR VIDEO TRAFFIC OVER WIRELESS MULTIMEDIA SYSTEM

FAIR DELAY OPTIMIZATION-BASED RESOURCE ALLOCATION ALGORITHM FOR VIDEO TRAFFIC OVER WIRELESS MULTIMEDIA SYSTEM FAIR DELAY OPTIMIZATION-BASED RESOURCE ALLOCATION ALGORITHM FOR VIDEO TRAFFIC OVER WIRELESS MULTIMEDIA SYSTEM 1 M. R. M. Rizk, Senior Member, IEEE, 2 M. I. Dessouky, 3 Sami A. El-Dolil, and 4 Mohammed

More information

Chapter 1 Basic concepts of wireless data networks (cont d)

Chapter 1 Basic concepts of wireless data networks (cont d) Chapter 1 Basic concepts of wireless data networks (cont d) Part 2: Medium access methods for mobile data networks Sept 15 2004 1 Fixed assignment access schemes in voice-oriented networks Frequency division

More information

MAC protocols. Lecturer: Dmitri A. Moltchanov

MAC protocols. Lecturer: Dmitri A. Moltchanov MAC protocols Lecturer: Dmitri A. Moltchanov E-mail: moltchan@cs.tut.fi http://www.cs.tut.fi/kurssit/tlt-2616/ OUTLINE: Problems for MAC to deal with; Design goals; Classification of MAC protocols Contention-based

More information

TSIN01 Information Networks Lecture 3

TSIN01 Information Networks Lecture 3 TSIN01 Information Networks Lecture 3 Danyo Danev Division of Communication Systems Department of Electrical Engineering Linköping University, Sweden September 10 th, 2018 Danyo Danev TSIN01 Information

More information

ECEN 5032 Data Networks Medium Access Control Sublayer

ECEN 5032 Data Networks Medium Access Control Sublayer ECEN 5032 Data Networks Medium Access Control Sublayer Peter Mathys mathys@colorado.edu University of Colorado, Boulder c 1996 2005, P. Mathys p.1/35 Overview (Sub)networks can be divided into two categories:

More information

ABSTRACT ON-DEMAND MULTIPLE ACCESS FOR NEXT- GENERATION NASA MISSIONS. Dr. John S. Baras Department of Electrical and Computer Engineering

ABSTRACT ON-DEMAND MULTIPLE ACCESS FOR NEXT- GENERATION NASA MISSIONS. Dr. John S. Baras Department of Electrical and Computer Engineering ABSTRACT Title of Thesis: ON-DEMAND MULTIPLE ACCESS FOR NEXT- GENERATION NASA MISSIONS Degree candidate: Lin Lin Degree and year: Master of Science, 2001 Thesis directed by: Dr. Michael Hadjitheodosiou

More information

Improving TCP Performance in TDMA-based Satellite Access Networks

Improving TCP Performance in TDMA-based Satellite Access Networks Improving TCP Performance in TDMA-based Satellite Access Networks Jing Zhu, Sumit Roy {zhuj, roy}@ee.washington.edu Department of Electrical Engineering, University of Washington, Seattle, WA 98105 Abstract-

More information

Packet multiple access and the Aloha protocol

Packet multiple access and the Aloha protocol Packet multiple access and the Aloha protocol Massachusetts Institute of Technology Department of Aeronautics and Astronautics Slide 1 Packet Multiple Access PMA SHARED UPLINK TERMINAL TERMINAL APPL TRANS

More information

CHAPTER 7 MAC LAYER PROTOCOLS. Dr. Bhargavi Goswami Associate Professor & Head Department of Computer Science Garden City College

CHAPTER 7 MAC LAYER PROTOCOLS. Dr. Bhargavi Goswami Associate Professor & Head Department of Computer Science Garden City College CHAPTER 7 MAC LAYER PROTOCOLS Dr. Bhargavi Goswami Associate Professor & Head Department of Computer Science Garden City College MEDIUM ACCESS CONTROL - MAC PROTOCOLS When the two stations transmit data

More information

CS 43: Computer Networks. 27: Media Access Contd. December 3, 2018

CS 43: Computer Networks. 27: Media Access Contd. December 3, 2018 CS 43: Computer Networks 27: Media Access Contd. December 3, 2018 Last Class The link layer provides lots of functionality: addressing, framing, media access, error checking could be used independently

More information

A Cross-Layer PEP for DVB-RCS Networks

A Cross-Layer PEP for DVB-RCS Networks A Cross-Layer PEP for DVB-RCS Networks Giovanni Giambene 1 and Snezana Hadzic 1 CNIT - University of Siena, Via Roma, 56, I-53100 Siena, Italy giambene@unisi.it Abstract. The aim of this paper is to consider

More information

Multiple Access Protocols

Multiple Access Protocols Multiple Access Protocols Computer Networks Lecture 2 http://goo.gl/pze5o8 Multiple Access to a Shared Channel The medium (or its sub-channel) may be shared by multiple stations (dynamic allocation) just

More information

IN RECENT years, many satellite projects have been

IN RECENT years, many satellite projects have been IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 22, NO. 3, APRIL 2004 559 A Dynamic Reservation Protocol for LEO Mobile Satellite Systems Henry C. B. Chan, Member, IEEE, Jie Zhang, Hui Chen Abstract

More information

Chapter - 1 INTRODUCTION

Chapter - 1 INTRODUCTION Chapter - 1 INTRODUCTION Worldwide Interoperability for Microwave Access (WiMAX) is based on IEEE 802.16 standard. This standard specifies the air interface of fixed Broadband Wireless Access (BWA) system

More information

ECE 4450:427/527 - Computer Networks Spring 2017

ECE 4450:427/527 - Computer Networks Spring 2017 ECE 4450:427/527 - Computer Networks Spring 2017 Dr. Nghi Tran Department of Electrical & Computer Engineering Lecture 5.4: Multiple Access Protocols Dr. Nghi Tran (ECE-University of Akron) ECE 4450:427/527

More information

Maximum Number of Users Which Can Be Served by TETRA Systems

Maximum Number of Users Which Can Be Served by TETRA Systems Maximum Number of Users Which Can Be Served by TETRA Systems Martin Steppler Aachen University of Technology Communication Networks Prof. Dr.-Ing. Bernhard Walke Kopernikusstr. 16 D-52074 Aachen Germany

More information

COMPUTER NETWORKS - Local area networks

COMPUTER NETWORKS - Local area networks Local area networks Telecommunication Networks Group firstname.lastname@polito.it http://www.telematica.polito.it/ COMPUTER NETWORKS LANs - 1 Copyright Quest opera è protetta dalla licenza Creative Commons

More information

Local area networks. Copyright

Local area networks. Copyright Local area networks Telecommunication Networks Group firstname.lastname@polito.it http://www.telematica.polito.it/ COMPUTER NETWORKS LANs - 1 Copyright Quest opera è protetta dalla licenza Creative Commons

More information

RECENTLY, the information exchange using wired and

RECENTLY, the information exchange using wired and Fast Dedicated Retransmission Scheme for Reliable Services in OFDMA Systems Howon Lee and Dong-Ho Cho Department of Electrical Engineering and Computer Science Korea Advanced Institute of Science and Technology

More information

Chapter 6 Medium Access Control Protocols and Local Area Networks

Chapter 6 Medium Access Control Protocols and Local Area Networks Chapter 6 Medium Access Control Protocols and Local Area Networks Part I: Medium Access Control Part II: Local Area Networks CSE 3213, Winter 2010 Instructor: Foroohar Foroozan Chapter Overview Broadcast

More information

Topics. Link Layer Services (more) Link Layer Services LECTURE 5 MULTIPLE ACCESS AND LOCAL AREA NETWORKS. flow control: error detection:

Topics. Link Layer Services (more) Link Layer Services LECTURE 5 MULTIPLE ACCESS AND LOCAL AREA NETWORKS. flow control: error detection: 1 Topics 2 LECTURE 5 MULTIPLE ACCESS AND LOCAL AREA NETWORKS Multiple access: CSMA/CD, CSMA/CA, token passing, channelization LAN: characteristics, i basic principles i Protocol architecture Topologies

More information

Lecture 9. Quality of Service in ad hoc wireless networks

Lecture 9. Quality of Service in ad hoc wireless networks Lecture 9 Quality of Service in ad hoc wireless networks Yevgeni Koucheryavy Department of Communications Engineering Tampere University of Technology yk@cs.tut.fi Lectured by Jakub Jakubiak QoS statement

More information

Adaptive Dynamic Channel Allocation Scheme for Spotbeam Handover in LEO Satellite Networks*

Adaptive Dynamic Channel Allocation Scheme for Spotbeam Handover in LEO Satellite Networks* Adaptive Dynamic Channel Allocation Scheme for Spotbeam Handover in LEO Satellite Networks* Sungrae Cho Broadband and Wireless Networking Laboratory School of Electrical and Computer Engineering Georgia

More information

Chapter 12 Multiple Access 12.1

Chapter 12 Multiple Access 12.1 Chapter 12 Multiple Access 12.1 Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. 12.2 Figure 12.1 Data link layer divided into two functionality-oriented sublayers

More information

MSIT 413: Wireless Technologies Week 8

MSIT 413: Wireless Technologies Week 8 MSIT 413: Wireless Technologies Week 8 Michael L. Honig Department of EECS Northwestern University November 2017 The Multiple Access Problem How can multiple mobiles access (communicate with) the same

More information

Power Laws in ALOHA Systems

Power Laws in ALOHA Systems Power Laws in ALOHA Systems E6083: lecture 7 Prof. Predrag R. Jelenković Dept. of Electrical Engineering Columbia University, NY 10027, USA predrag@ee.columbia.edu February 28, 2007 Jelenković (Columbia

More information

A RLC/MAC PROTOCOL ARCHITECTURE FOR A WIRELESS IP NETWORK

A RLC/MAC PROTOCOL ARCHITECTURE FOR A WIRELESS IP NETWORK A RLC/MAC PROTOCOL ARCHITECTURE FOR A WIRELESS IP NETWORK Jamil Y. Khan School of Electrical Engineering & Computer Science, University of Newcastle, Callaghan, NSW 238, Australia, jkhan@ecemail.newcastle.edu.au

More information

Simulation Study for a Broadband Multimedia VSAT Network

Simulation Study for a Broadband Multimedia VSAT Network Simulation Study for a Broadband Multimedia Yi Qian, Rose Hu, and Hosame Abu-Amara Nortel s 2201 Lakeside Blvd., Mail Stop 992-02-E70 Richardson, Texas 75082, USA Phone: 972-685-7264 Fax: 972-685-3463

More information

Lecture 4: Wireless MAC Overview. Hung-Yu Wei National Taiwan University

Lecture 4: Wireless MAC Overview. Hung-Yu Wei National Taiwan University Lecture 4: Wireless MAC Overview Hung-Yu Wei National Taiwan University Medium Access Control Topology 3 Simplex and Duplex 4 FDMA TDMA CDMA DSSS FHSS Multiple Access Methods Notice: CDMA and spread spectrum

More information

Data Link Layer: Collisions

Data Link Layer: Collisions Data Link Layer: Collisions 1 Multiple Access Data Link layer divided into two sublayers. The upper sublayer is responsible for datalink control, The lower sublayer is responsible for resolving access

More information

2. Modelling of telecommunication systems (part 1)

2. Modelling of telecommunication systems (part 1) 2. Modelling of telecommunication systems (part ) lect02.ppt S-38.45 - Introduction to Teletraffic Theory - Fall 999 2. Modelling of telecommunication systems (part ) Contents Telecommunication networks

More information

Multiple Access (1) Required reading: Garcia 6.1, 6.2.1, CSE 3213, Fall 2010 Instructor: N. Vlajic

Multiple Access (1) Required reading: Garcia 6.1, 6.2.1, CSE 3213, Fall 2010 Instructor: N. Vlajic 1 Multiple Access (1) Required reading: Garcia 6.1, 6.2.1, 6.2.2 CSE 3213, Fall 2010 Instructor: N. Vlajic Multiple Access Communications 2 Broadcast Networks aka multiple access networks multiple sending

More information

A hybrid medium access control for convergence of broadband wireless and wireline ATM networks

A hybrid medium access control for convergence of broadband wireless and wireline ATM networks Downloaded from orbit.dtu.dk on: Oct 07, 2018 A hybrid medium access control for convergence of broadband wireless and wireline ATM networks Liu, Hong; Gliese, Ulrik Bo; Dittmann, Lars Published in: Proceeding

More information

Multiple Access Communications. EEE 538, WEEK 11 Dr. Nail Akar Bilkent University Electrical and Electronics Engineering Department

Multiple Access Communications. EEE 538, WEEK 11 Dr. Nail Akar Bilkent University Electrical and Electronics Engineering Department Multiple Access Communications EEE 538, WEEK 11 Dr. Nail Akar Bilkent University Electrical and Electronics Engineering Department 1 Multiple Access Satellite systems, radio networks (WLAN), ethernet segment

More information

Performance of UMTS Radio Link Control

Performance of UMTS Radio Link Control Performance of UMTS Radio Link Control Qinqing Zhang, Hsuan-Jung Su Bell Laboratories, Lucent Technologies Holmdel, NJ 77 Abstract- The Radio Link Control (RLC) protocol in Universal Mobile Telecommunication

More information

Multimedia Communication Services Traffic Modeling and Streaming

Multimedia Communication Services Traffic Modeling and Streaming Multimedia Communication Services Traffic Modeling and Streaming Medium Access Control algorithms Introduction and details on Aloha networks with infinite nodes Università degli Studi di Brescia A.A. 2014/2015

More information

Multiple Access Links and Protocols

Multiple Access Links and Protocols Multiple Access Links and Protocols Two types of links : point-to-point PPP for dial-up access point-to-point link between Ethernet switch and host broadcast (shared wire or medium) old-fashioned Ethernet

More information

IEEE P Wireless Access Method and Physical Layer Specification. April 30, 1991 REVISED: May 2, 1991

IEEE P Wireless Access Method and Physical Layer Specification. April 30, 1991 REVISED: May 2, 1991 IEEE P802.11 Wireless Access Method and Physical Layer Specification DATE: April 30, 1991 REVISED: May 2, 1991 TITLE: ACCESS PROTOCOL METHODS FOR FIXED AND ADAPTIVE WIDTH TIME SLOTS AUTHOR: Chandos A.

More information

CS 43: Computer Networks Media Access. Kevin Webb Swarthmore College November 30, 2017

CS 43: Computer Networks Media Access. Kevin Webb Swarthmore College November 30, 2017 CS 43: Computer Networks Media Access Kevin Webb Swarthmore College November 30, 2017 Multiple Access Links & Protocols Two classes of links : point-to-point dial-up access link between Ethernet switch,

More information

CHAPTER 3 EFFECTIVE ADMISSION CONTROL MECHANISM IN WIRELESS MESH NETWORKS

CHAPTER 3 EFFECTIVE ADMISSION CONTROL MECHANISM IN WIRELESS MESH NETWORKS 28 CHAPTER 3 EFFECTIVE ADMISSION CONTROL MECHANISM IN WIRELESS MESH NETWORKS Introduction Measurement-based scheme, that constantly monitors the network, will incorporate the current network state in the

More information

ECE453 Introduction to Computer Networks. Broadcast vs. PPP. Delay. Lecture 7 Multiple Access Control (I)

ECE453 Introduction to Computer Networks. Broadcast vs. PPP. Delay. Lecture 7 Multiple Access Control (I) ECE453 Introduction to Computer Networks Lecture 7 Multiple Access Control (I) 1 Broadcast vs. PPP Broadcast channel = multiaccess channel = random access channel Broadcast LAN Satellite network PPP WAN

More information

A QoS Architecture for IDMA-based Multi-service Wireless Networks

A QoS Architecture for IDMA-based Multi-service Wireless Networks A QoS Architecture for IDMA-based Multi-service Wireless Networks Qian Huang, Sammy Chan, King-Tim Ko, Li Ping, and Peng Wang Department of Electronic Engineering, City University of Hong Kong Kowloon,

More information

Wireless Medium Access Control Protocols

Wireless Medium Access Control Protocols Wireless Medium Access Control Protocols Telecomunicazioni Undergraduate course in Electrical Engineering University of Rome La Sapienza Rome, Italy 2007-2008 Classification of wireless MAC protocols Wireless

More information

GLOBECOM'94, San Francisco, CA, Nov.-Dic C-PRMA: the Centralized Packet Reservation Multiple Access for

GLOBECOM'94, San Francisco, CA, Nov.-Dic C-PRMA: the Centralized Packet Reservation Multiple Access for GLOBECOM'94, San Francisco, CA, Nov.-Dic. 1994 1 C-PRMA: the Centralized Packet Reservation Multiple Access for Local Wireless Communications? Giuseppe Bianchi, Flaminio Borgonovo, Luigi Fratta, Luigi

More information

Lecture 8 The Data Link Layer part I. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it

Lecture 8 The Data Link Layer part I. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it Lecture 8 The Data Link Layer part I Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it Link Layer: setting the context two physically connected devices: host-router, router-router,

More information

ETSN01 Exam Solutions

ETSN01 Exam Solutions ETSN01 Exam Solutions March 014 Question 1 (a) See p17 of the cellular systems slides for a diagram and the full procedure. The main points here were that the HLR needs to be queried to determine the location

More information

An Efficient Scheduling Scheme for High Speed IEEE WLANs

An Efficient Scheduling Scheme for High Speed IEEE WLANs An Efficient Scheduling Scheme for High Speed IEEE 802.11 WLANs Juki Wirawan Tantra, Chuan Heng Foh, and Bu Sung Lee Centre of Muldia and Network Technology School of Computer Engineering Nanyang Technological

More information

Data and Computer Communications

Data and Computer Communications Data and Computer Communications Chapter 16 High Speed LANs Eighth Edition by William Stallings Why High Speed LANs? speed and power of PCs has risen graphics-intensive applications and GUIs see LANs as

More information

CMPE 150/L : Introduction to Computer Networks. Chen Qian Computer Engineering UCSC Baskin Engineering Lecture 16

CMPE 150/L : Introduction to Computer Networks. Chen Qian Computer Engineering UCSC Baskin Engineering Lecture 16 CMPE 150/L : Introduction to Computer Networks Chen Qian Computer Engineering UCSC Baskin Engineering Lecture 16 1 Final project demo Please do the demo next week to the TAs. So basically you may need

More information

Intelligent Transportation Systems. Medium Access Control. Prof. Dr. Thomas Strang

Intelligent Transportation Systems. Medium Access Control. Prof. Dr. Thomas Strang Intelligent Transportation Systems Medium Access Control Prof. Dr. Thomas Strang Recap: Wireless Interconnections Networking types + Scalability + Range Delay Individuality Broadcast o Scalability o Range

More information

Digital Communication Networks

Digital Communication Networks Digital Communication Networks MIT PROFESSIONAL INSTITUTE, 6.20s July 25-29, 2005 Professor Muriel Medard, MIT Professor, MIT Slide 1 Digital Communication Networks Introduction Slide 2 Course syllabus

More information

Chapter 6 Medium Access Control Protocols and Local Area Networks

Chapter 6 Medium Access Control Protocols and Local Area Networks Chapter 6 Medium Access Control Protocols and Local Area Networks Part I: Medium Access Control Part II: Local Area Networks Chapter Overview Broadcast Networks All information sent to all users No routing

More information

A Probing Process for Dynamic Resource Allocation in Fixed Broadband Wireless Access Networks

A Probing Process for Dynamic Resource Allocation in Fixed Broadband Wireless Access Networks IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, VOL. 52, NO. 4, JULY 2003 1143 A Probing Process for Dynamic Resource Allocation in Fixed Broadband Wireless Access Networks Qiang Wang and Anjali Agarwal, Member,

More information

Link Layer and LANs 안상현서울시립대학교컴퓨터 통계학과.

Link Layer and LANs 안상현서울시립대학교컴퓨터 통계학과. Link Layer and LANs 안상현서울시립대학교컴퓨터 통계학과 ahn@venus.uos.ac.kr Data Link Layer Goals: understand principles behind data link layer services: error detection, correction sharing a broadcast channel: multiple

More information

Chapter 3 MEDIA ACCESS CONTROL

Chapter 3 MEDIA ACCESS CONTROL Chapter 3 MEDIA ACCESS CONTROL Distributed Computing Group Mobile Computing Winter 2005 / 2006 Overview Motivation SDMA, FDMA, TDMA Aloha Adaptive Aloha Backoff protocols Reservation schemes Polling Distributed

More information

Scheduling of real-time traffic in IEEE networks

Scheduling of real-time traffic in IEEE networks Scheduling of real-time traffic in IEEE 802.11 networks Afonso, José A. Neves, Joaquim E. Universidade do Minho, Departamento de Electrónica Industrial Campus de Azurém, 4800-058 Guimarães, ortugal jose.afonso@dei.uminho.pt

More information

Random Assignment Protocols

Random Assignment Protocols Random Assignment Protocols Random assignment strategies attempt to reduce problem occur in fixed assignment strategy by eliminating pre allocation of bandwidth to communicating nodes. Random assignment

More information

Lecture 12 December 04, Wireless Access. Graduate course in Communications Engineering. University of Rome La Sapienza. Rome, Italy

Lecture 12 December 04, Wireless Access. Graduate course in Communications Engineering. University of Rome La Sapienza. Rome, Italy Lecture 12 December 04, 2017 Wireless Access Graduate course in Communications Engineering University of Rome La Sapienza Rome, Italy 2017-2018 Random Medium Access Control Part II - CSMA and Collision

More information

MAC protocols for ad hoc networks

MAC protocols for ad hoc networks MAC protocols for ad hoc networks Lecturer: Dmitri A. Moltchanov E-mail: moltchan@cs.tut.fi http://www.cs.tut.fi/kurssit/tlt-2756/ OUTLINE: Problems for MAC to deal with; Design goals; Classification of

More information

Reminder: Datalink Functions Computer Networking. Datalink Architectures

Reminder: Datalink Functions Computer Networking. Datalink Architectures Reminder: Datalink Functions 15-441 15 441 15-641 Computer Networking Lecture 5 Media Access Control Peter Steenkiste Fall 2015 www.cs.cmu.edu/~prs/15-441-f15 Framing: encapsulating a network layer datagram

More information

Performance Analysis of Cell Switching Management Scheme in Wireless Packet Communications

Performance Analysis of Cell Switching Management Scheme in Wireless Packet Communications Performance Analysis of Cell Switching Management Scheme in Wireless Packet Communications Jongho Bang Sirin Tekinay Nirwan Ansari New Jersey Center for Wireless Telecommunications Department of Electrical

More information

ETSI Project BRAN Hiperlan Type 2 for IEEE 1394 Applications System Overview

ETSI Project BRAN Hiperlan Type 2 for IEEE 1394 Applications System Overview ETSI Project BRAN Hiperlan Type 2 for IEEE 1394 Applications System Overview Source : Jamshid Khun Jush (Ericsson) (THOMSON multimedia) 1 HIPERLAN/2 Standard A new standard developed by the ETSI Project

More information

Wireless Communications

Wireless Communications 4. Medium Access Control Sublayer DIN/CTC/UEM 2018 Why do we need MAC for? Medium Access Control (MAC) Shared medium instead of point-to-point link MAC sublayer controls access to shared medium Examples:

More information

COMPUTER NETWORK Model Test Paper

COMPUTER NETWORK Model Test Paper Model Test Paper Question no. 1 is compulsory. Attempt all parts. Q1. Each question carries equal marks. (5*5 marks) A) Difference between Transmission Control Protocol (TCP) and User Datagram Protocol.

More information

Multiple Access. Data Communications and Networking

Multiple Access. Data Communications and Networking Multiple Access In the previous part we discussed data link control, a mechanism which provides a link with reliable communication. In the protocols we described, we assumed that there is an available

More information

IT IS anticipated that traffic in next-generation cellular

IT IS anticipated that traffic in next-generation cellular 146 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 7, NO. 2, APRIL 1999 A Slotted CDMA Protocol with BER Scheduling for Wireless Multimedia Networks Ian F. Akyildiz, Fellow, IEEE, David A. Levine, and Inwhee

More information

Video Traffic Management in HSDPA via GEO Satellite

Video Traffic Management in HSDPA via GEO Satellite Video Traffic Management in HSDPA via GEO Satellite Giovanni Giambene, Samuele Giannetti, Cristina Párraga Niebla, Michal Ries CNIT University of Siena, Via Roma, 56, I-53100 Siena, Italy, email: giambene@unisi.it

More information

Data Link Layer, Part 5. Medium Access Control

Data Link Layer, Part 5. Medium Access Control CS 455 Medium Access Control, Page 1 Data Link Layer, Part 5 Medium Access Control These slides are created by Dr. Yih Huang of George Mason University. Students registered in Dr. Huang s courses at GMU

More information

A-MAC: Adaptive Medium Access Control for Next Generation Wireless Terminals

A-MAC: Adaptive Medium Access Control for Next Generation Wireless Terminals University of Nebraska - Lincoln DigitalCommons@University of Nebraska - Lincoln CSE Journal Articles Computer Science and Engineering, Department of 2007 A-MAC: Adaptive Medium Access Control for Next

More information

Performance Evaluation of Scheduling Mechanisms for Broadband Networks

Performance Evaluation of Scheduling Mechanisms for Broadband Networks Performance Evaluation of Scheduling Mechanisms for Broadband Networks Gayathri Chandrasekaran Master s Thesis Defense The University of Kansas 07.31.2003 Committee: Dr. David W. Petr (Chair) Dr. Joseph

More information

Adaptive Resource Allocation Mechanisms for Support of Data Traffic over ATM Satellite Networks Introduction The Dynamic Flow Control Scheme

Adaptive Resource Allocation Mechanisms for Support of Data Traffic over ATM Satellite Networks Introduction The Dynamic Flow Control Scheme Adaptive Resource Allocation Mechanisms for Support of Traffic over ATM Satellite Networks Tanja Lang and Nirmala Shenoy, Co-operative Research Centre for Satellite Systems, Institute for Telecommunications

More information

CHAPTER 5 PROPAGATION DELAY

CHAPTER 5 PROPAGATION DELAY 98 CHAPTER 5 PROPAGATION DELAY Underwater wireless sensor networks deployed of sensor nodes with sensing, forwarding and processing abilities that operate in underwater. In this environment brought challenges,

More information

CS 455/555 Intro to Networks and Communications. Link Layer

CS 455/555 Intro to Networks and Communications. Link Layer CS 455/555 Intro to Networks and Communications Link Layer Dr. Michele Weigle Department of Computer Science Old Dominion University mweigle@cs.odu.edu http://www.cs.odu.edu/~mweigle/cs455-s13 1 Link Layer

More information

A NEW THRESHOLD SWITCHING SCHEME FOR A DVB-RCS MOBILE RETURN LINK IN A TERRESTRIAL RAILWAY SCENARIO

A NEW THRESHOLD SWITCHING SCHEME FOR A DVB-RCS MOBILE RETURN LINK IN A TERRESTRIAL RAILWAY SCENARIO A NEW THRESHOLD SWITCHING SCHEME FOR A DVB-RCS MOBILE RETURN LINK IN A TERRESTRIAL RAILWAY SCENARIO Mauro TROPEA 1 1 Department of Electronics, Computer Science and Systems, Faculty of Engineering, University

More information

Aloha and slotted aloha

Aloha and slotted aloha CSMA 2/13/06 Aloha and slotted aloha Slotted aloha: transmissions are synchronized and only start at the beginning of a time slot. Aloha sender A sender B collision sender C t Slotted Aloha collision sender

More information

QoS based vertical handoff method between UMTS systems and wireless LAN networks

QoS based vertical handoff method between UMTS systems and wireless LAN networks QoS based vertical handoff method between UMTS systems and wireless LAN networks Sungkwan Jung and Dong-ho Cho Div. of EE, Dept. of EECS Korea Advanced Institute of Science and Technology Daejeon, Rep.

More information

An Hybrid Reservation-Polling MAC Protocol for Powerline Communications

An Hybrid Reservation-Polling MAC Protocol for Powerline Communications An Hybrid Reservation-Polling MAC Protocol for Powerline Communications Giuseppe Bianchi 1, Giuseppe Conigliaro 2 1 Università di Palermo, Dipartimento di Ingegneria Elettrica Viale Delle Scienze, Parco

More information

Chapter 4. The Medium Access Control Sublayer. Points and Questions to Consider. Multiple Access Protocols. The Channel Allocation Problem.

Chapter 4. The Medium Access Control Sublayer. Points and Questions to Consider. Multiple Access Protocols. The Channel Allocation Problem. Dynamic Channel Allocation in LANs and MANs Chapter 4 The Medium Access Control Sublayer 1. Station Model. 2. Single Channel Assumption. 3. Collision Assumption. 4. (a) Continuous Time. (b) Slotted Time.

More information

A STUDY ON THE MAC TECHNOLOGY AND ACCESS NETWORK OVER 3G SYSTEMS

A STUDY ON THE MAC TECHNOLOGY AND ACCESS NETWORK OVER 3G SYSTEMS A STUDY ON THE MAC TECHNOLOGY AND ACCESS NETWORK OVER 3G SYSTEMS Shalu Chauhan 1, Ankit Tripathi 2, Vartika Anand 3 1 Department of CSE,SRM University, Modinagar, India 2 Department of ECE, RKGIT, Ghaziabad,

More information

Third generation WCDMA radio evolution

Third generation WCDMA radio evolution WIRELESS COMMUNICATIONS AND MOBILE COMPUTING Wirel. Commun. Mob. Comput. 2003; 3:987 992 (DOI: 10.1002/wcm.134) Third generation WCDMA radio evolution Harri Holma*,y and Antti Toskala Nokia Networks, IP

More information

A DYNAMIC RESOURCE ALLOCATION STRATEGY FOR SATELLITE COMMUNICATIONS. Eytan Modiano MIT LIDS Cambridge, MA

A DYNAMIC RESOURCE ALLOCATION STRATEGY FOR SATELLITE COMMUNICATIONS. Eytan Modiano MIT LIDS Cambridge, MA A DYNAMIC RESOURCE ALLOCATION STRATEGY FOR SATELLITE COMMUNICATIONS Aradhana Narula-Tam MIT Lincoln Laboratory Lexington, MA Thomas Macdonald MIT Lincoln Laboratory Lexington, MA Eytan Modiano MIT LIDS

More information

Outline. Introduction to Networked Embedded Systems - Embedded systems Networked embedded systems Embedded Internet - Network properties

Outline. Introduction to Networked Embedded Systems - Embedded systems Networked embedded systems Embedded Internet - Network properties Outline Introduction to Networked Embedded Systems - Embedded systems Networked embedded systems Embedded Internet - Network properties Layered Network Architectures - OSI framework descriptions of layers

More information

Performance Analysis of WLANs Under Sporadic Traffic

Performance Analysis of WLANs Under Sporadic Traffic Performance Analysis of 802.11 WLANs Under Sporadic Traffic M. Garetto and C.-F. Chiasserini Dipartimento di Elettronica, Politecnico di Torino, Italy Abstract. We analyze the performance of 802.11 WLANs

More information

Basic reference models and performance parameters of Internet Protocol packet network transmission in the mobile-satellite service

Basic reference models and performance parameters of Internet Protocol packet network transmission in the mobile-satellite service ecommendation ITU- M.1636 (06/2003) Basic reference models and performance parameters of Internet Protocol packet network transmission in the mobile-satellite service M Series Mobile, radiodetermination,

More information

EECS 563 Fall Review Test 2. Review Test 2

EECS 563 Fall Review Test 2. Review Test 2 EECS 563 Fall 2013 1 Network traffic Request for resources Rate of requests= λ Average resource hold time = T h Common Assumptions Time between arrivals ~ exponentially Holding time ~ exponentially Voice

More information

1-1. Switching Networks (Fall 2010) EE 586 Communication and. November 8, Lecture 30

1-1. Switching Networks (Fall 2010) EE 586 Communication and. November 8, Lecture 30 EE 586 Communication and Switching Networks (Fall 2010) Lecture 30 November 8, 2010 1-1 Announcements Quiz on Wednesday Next Monday hands-on training on Contiki OS Bring your laptop 4-2 Multiple Access

More information

Mobile Communications Chapter 3 : Media Access

Mobile Communications Chapter 3 : Media Access Mobile Communications Chapter 3 : Media Access 2. Motivation 3. SDMA, FDMA, TDMA 1. Aloha and contention based schemes 4. Reservation schemes 5. Collision avoidance, MACA 6. Polling CDMA (Lecture 6) Prof.

More information

Links Reading: Chapter 2. Goals of Todayʼs Lecture. Message, Segment, Packet, and Frame

Links Reading: Chapter 2. Goals of Todayʼs Lecture. Message, Segment, Packet, and Frame Links Reading: Chapter 2 CS 375: Computer Networks Thomas Bressoud 1 Goals of Todayʼs Lecture Link-layer services Encoding, framing, and error detection Error correction and flow control Sharing a shared

More information

Department of Electrical and Computer Systems Engineering

Department of Electrical and Computer Systems Engineering Department of Electrical and Computer Systems Engineering Technical Report MECSE-6-2006 Medium Access Control (MAC) Schemes for Quality of Service (QoS) provision of Voice over Internet Protocol (VoIP)

More information

Different Resource Sharing Policies under a General Channel Management Strategy for Multi-Class Traffic in LEO-MSS

Different Resource Sharing Policies under a General Channel Management Strategy for Multi-Class Traffic in LEO-MSS www.iji.org 126 Different Resource Sharing Policies under a General Channel Management Strategy for Multi-Class Traffic in LEO-MSS Amr S. Matar, Gamal Abd-Elfadeel, Ibrahim I. Ibrahim and Hesham M. Z.

More information

Supporting Service Differentiation for Real-Time and Best-Effort Traffic in Stateless Wireless Ad-Hoc Networks (SWAN)

Supporting Service Differentiation for Real-Time and Best-Effort Traffic in Stateless Wireless Ad-Hoc Networks (SWAN) Supporting Service Differentiation for Real-Time and Best-Effort Traffic in Stateless Wireless Ad-Hoc Networks (SWAN) G. S. Ahn, A. T. Campbell, A. Veres, and L. H. Sun IEEE Trans. On Mobile Computing

More information

Supporting QoS over Handovers in LEO Satellite Systems

Supporting QoS over Handovers in LEO Satellite Systems Supporting QoS over Handovers in LEO Satellite Systems E. Papapetrou, E. Stathopoulou, F.-N. Pavlidou Aristotle University of Thessaloniki, School of Engineering, Dept. of Electrical & Computer Engineering,

More information

ECE 333: Introduction to Communication Networks Fall Lecture 19: Medium Access Control VII

ECE 333: Introduction to Communication Networks Fall Lecture 19: Medium Access Control VII ECE : Introduction to Communication Networks Fall 2002 Lecture 9: Medium Access Control VII More on token ring networks LAN bridges and switches. More on token rings In the last lecture we began discussing

More information

Physical Layer. Medium Access Links and Protocols. Point-to-Point protocols. Modems: Signaling. Modems Signaling. Srinidhi Varadarajan

Physical Layer. Medium Access Links and Protocols. Point-to-Point protocols. Modems: Signaling. Modems Signaling. Srinidhi Varadarajan P Physical Layer Srinidhi Varadarajan Medium Access Links and Protocols Three types of links : point-to-point (single wire, e.g. PPP, SLIP) broadcast (shared wire or medium; e.g, Ethernet, Wavelan, etc.)

More information

Data Link Layer: Multi Access Protocols

Data Link Layer: Multi Access Protocols Digital Communication in the Modern World Data Link Layer: Multi Access Protocols http://www.cs.huji.ac.il/~com1 com1@cs.huji.ac.il Some of the slides have been borrowed from: Computer Networking: A Top

More information

Chapter 1 Introduction

Chapter 1 Introduction Emerging multimedia, high-speed data, and imaging applications are generating a demand for public networks to be able to multiplex and switch simultaneously a wide spectrum of data rates. These networks

More information

Lecture 19. Principles behind data link layer services Framing Multiple access protocols

Lecture 19. Principles behind data link layer services Framing Multiple access protocols Link Layer Lecture 19 Principles behind data link layer services Framing Multiple access protocols ALOHA *The slides are adapted from ppt slides (in substantially unaltered form) available from Computer

More information

The Medium Access Control Scheme (MAC Layer) Reference: Andrew S. Tanenbaum, Computer Networks, 3rd Edition, Prentice Hall, 1996.

The Medium Access Control Scheme (MAC Layer) Reference: Andrew S. Tanenbaum, Computer Networks, 3rd Edition, Prentice Hall, 1996. The Medium Access Control Scheme (MAC Layer) Reference: Andrew S. Tanenbaum, Computer Networks, 3rd Edition, Prentice Hall, 1996. 1 Table of Contents Introduction ALOHA Carrier Sense Multiple Sense (CSMA)

More information