MAC SIMULATOR FOR HYBRID TDMA/CDMA ACCESS NETWORKS
|
|
- Jack Oliver
- 5 years ago
- Views:
Transcription
1 MAC SIMULATOR FOR HYBRID TDMA/CDMA ACCESS NETWORKS Danny Goderis, Rudy Hoebeke, Kristiaan Venken. Alcatel Corporate Research Center Department Access to Networks Francis Wellesplein 1, 2018 Antwerp, Belgium ABSTRACT In a TDMA/CDMA access network the transport channel is divided into sub-channels according to orthogonal codes. Each sub-channel is again divided into time-slots. CDMA spread spectrum techniques are used for wireless communication and HFC systems. Recently the European Telecommunication Standards Institute (ETSI) decided to retain a hybrid TD-CDMA interface as one of the two possible interfaces for the third generation mobile system UMTS. Dynamic MAC protocols for such communication systems allocate bandwidth to users in a twodimensional plane, taking into account Quality of Service (QoS) guarantees of individual connections, throughput efficiency and the typical 2D multi-user interference caused by simultaneous transmissions. The paper describes an OPNET MAC simulator with a generic two-dimensional (2D) channel interface. Channel characteristics such as multi-user interference are modelled as stand-alone modules. Simulation results are provided, allowing the comparison of alternative 2D- MAC protocols using TCP-, ON/OFF- and CBR sources for different media. TDMA ACCESS NETWORKS The main function of a shared-medium access network is to collect and multiplex traffic from several customers and offer it to the core network; and to distribute the traffic from the core network to the relevant customers. This involves the multiplexing and de-multiplexing of several connections. Typically the access network has a point to multi-point topology where all traffic between users (terminals or Network Terminations-NT) andcore network flows through the head-end (or Line Termination-LT) of the access network. Data-packets are broadcast in the downstream direction (from LT to NT), whereas multiple users share the upstream direction. Therefore a Medium Access Control (MAC) function is needed for controlling the upstream channel. Centrally controlled request-based MAC protocols for one-dimensional Time Division Multiple Access (TDMA) transport systems are very well known (fig 1). One time-slot corresponds with one packet or cell. Different timeslots are dynamically assigned to different terminals (NTs), under control of the MAC function implemented at the head-end (LT). Downstream Data Traffic LT MAC Controller Upstream D ata Traffic Traffic Requirements Traffic Profiles Connection Info Downstream M ac Control Info (permits) Network Span NT1 NT2 NTn Splitting Factor Data Traffic Figure 1: One-dimensional TDMA access network The allocation of time-slots is based on the traffic parameters, i.e. connection set-up information, and the Quality of Service requirements (QoS) of the connections. Dynamic bandwidth allocation also takes into account the instantaneous traffic-needs of the connections, e.g. the number of waiting cells at the terminals. The MAC-channel consists of the requests of the NTs sent to the LT and the permits broadcast from LT to NTs. In 1998 we reported at the OPNET conference how an OPNET MAC simulator was built for packet-based TDMA networks. This OPNET simulator enabled the study of advanced MAC protocols for e.g. ATM Passive Optical Networks (APON) and Hybrid Fibre Coax (HFC) access networks [1]. TWO-DIMENSIONAL MULTIPLEXING In this section we enlarge the one-dimensional model into a two-dimensional TD-CDMA framework enabling the study of generic MAC protocols for 2D-channels. In the next section we give an overview how the TDMA MAC simulator described in [1] is enhanced with 2Dmultiplexing functionality. 1
2 Code Division Multiple Access (CDMA) is a spread spectrum technique, which is mainly used for modulating signals in a bad communication medium with high noise characteristics and multi-path interference, e.g. the wireless communication channel. Recently the ETSI decided to retain a hybrid TD-CDMA interface as one of the two possible interfaces for the third generation mobile system UMTS (Universal Mobile Tele-communications System). Code axis One Sub-channel An important issue is the interdependency of the subchannels. Indeed, if the sub-channels were completely independent, i.e. any terminal can transmit on any subchannel independent of the events on the other subchannels, the problem simplifies into M-times a 1Dproblem. This is of course equivalent with the study of a one-dimensional TDMA system. However the subchannels are in general not independent due to the multiuser interference of the different sub-channels. For example in a CDMA system, distinct transmitting terminals (on different codes or sub-channels) are disturbing each other due to synchronisation problems on chip level. It means that the overall capacity of the channel decreases with an increasing number of distinct transmitting terminals (see fig. 3). Time axis Physical channel Fast performance loss channel capacity Slow performance loss Figure 2: Two-dimensional TD-CDMA access network The communication channel has a two-dimensional multiplexing structure (fig. 2). The channel is divided into M orthogonal sub-channels (with equal capacity C sub ) according to orthogonal codes. The sub-channel itself is divided into time-slots. The existence of sub-channels, i.e. of a 2D-channel, allows for the simultaneous, collision-free access or transmission of different users. This is the inherent multiple access property of CDMA. A physical channel is a 2D-point (slot, code) and corresponds with one packet or cell. A simple MAC protocol for such systems is the static allocation of sub-channels (or codes) to connections for the whole duration of this connection. The number of allocated sub-channels is proportional to the bandwidthneeds of the connection (e.g. the Peak Cell Rate) divided by the capacity of one sub-channel C sub. A dynamic request-based MAC protocol allocates physical channels based on the traffic parameters, the service requirements and the instantaneous bandwidthneeds of the connections. Contrary to one-dimensional systems, the MAC controller generates each timeslot a multi-permit, i.e. a series of single permits with the same x-coördinate (time-slot number). The multi-permit can either be a series of single permits to different terminals or it can be multiple permits to the same terminal; or a combination of both t# terminals Figure 3: Modelling multi-user interference As a general rule, the performance of the (M-code) 2Dchannel is less than the superposition of M independent 1D-TDMA channels. Modelling the influence of multiuser interference is however a very complicated physical layer issue. It depends on the physical medium, the number of terminals and the network topology, and the design of the physical layer. An optimal design should result in a minimal performance loss leading to almost independent sub-channels. MAC SIMULATOR OBJECT MODEL The OPNET MAC simulator for hybrid TDMA/CDMA access networks is an enhancement of our MAC simulator previously developed for networks with a onedimensional multiplexing structure [1]. This approach was possible because the 1D-TDMA simulator is a generic highly parameterised and modular OPNET program. Indeed, our strategy was to build further on the object-oriented modelling approach inherently present in the OPNET development tool. 2
3 The main building blocks (objects) in the MAC configuration are the bus transmission medium, the LT, the NT and the traffic sources (fig 4). The simulator supports CBR-, ON/OFF- and TCP traffic sources. The sources are implemented as independent nodes or as child processes of the main process model into the NTnode. Figure 4: The Network Model-view of the simulator For a detailed description of the bus model, the source model, the NT and LT state-machines and process models we refer to [1]. Here we limit ourselves to the typical 2D issues and enhancements necessary to support TDMA/CDMA access networks. Figure 5 gives the modular architecture of the MAC layer. It is a (simplified) high-level object model of the MAC OPNET simulator. CAC Static traffic parameters Dynamic traffic parameters Service Class Interface [MAC Transfer Capabilities] MAC Algorithm Permit Generator LT per time slot MAC LAYER Multi-Permit (nt_id, #codes) The NT and LT are the main static object classes. Naturally there are several instances of the NT-class while the LT-class is instantiated only once. The main sub-component of the LT is the MAC algorithm. The Interface of the MAC layer to higher layers is the Service Class Interface. It describes which services the network supports (e.g. POTS, TCP/IP traffic ) and gives a qualitative description of the traffic characteristics and requirements of the services. The static traffic parameters, such as the Peak Cell rate of a connection, serves as input for the MAC algorithm. Analogously to the well-known ATM Transfer Capabilities, the services are called MAC Transfer Capabilities. The interface to the physical layer is the Physical Channel Interface (PCI) module within the MAC Layer. This interface contains all physical layer related data such as the channel capacity, the number of sub-channels and timeslot length. A very important 2D function is the modelling of the multi-user interference. The interdependency of the sub-channels is thus expressed as a well-defined mathematical formula within the PCImodule. The MAC algorithm is responsible for the allocation of bandwidth amongst users in the 2D-plane. Based on the traffic parameters of the connections the MAC algorithm generates each time-slot a multi-permit. The PCIboundary conditions put constraints on this permitgeneration algorithm, reflecting the interdependency of the channels. Two object classes are modelling the dynamics of the system: the MAC_Credit and the MAC_Multi-permit class. A multi-permit object is created each time-slot by the MAC algorithm itself and is broadcasted from the LT to all NTs. An instantiation of MAC_Credit contains the dynamic traffic parameter of a connection, i.e. the number of cells at the NT waiting for transmission. A MAC_Credit object is instantiated by an NT and contains the NT_id and the number of waiting cells (requests). The MAC_Credit is transmitted from NT to LT either by polling or by piggybacking. It is the main dynamical input for the MAC algorithm. MAC Channel UP NT MAC Channel DOWN 2D-Physical Channel Interface For more implementation details about the MAC channel, especially the polling and piggybacking, we refer to [1]. Figure 5. MAC Layer Object Model Architecture 3
4 2D IMPLEMENTATION CONSIDERATIONS There are two main implementation differences between the 1D-TDMA and 2D-TDMA/CDMA access networks. First, the 2D-MAC algorithm generates each time slot a multi-permit object and - second the algorithm must take into account the PCI-boundary conditions Figure 6 illustrates the functional implementation of the MAC algorithm as a 2D-MAC permit-generator. timeslot n get_permit() OPNET LT multi-permit-list External MAC code (algorithm) multi-permit parallel datacell transmission get_pci () available codestructure OPNET NTs OPNET simulator body External PCI code Figure 6. OPNET simulator implementation The OPNET simulator body includes the implementation of the LT-node, the NT-nodes, the traffic sources and all communication aspects between nodes such as datapacket transmission, MAC polling and piggybacking. The OPNET simulator is also responsible for performance measuring and statistics monitoring such as the NT-queue lengths. All these functions are essentially the same for 1D and 2D access systems. The main implementation features and enhancements for networks with a two-dimensional multiplexing structure are the following: A basic timeslot is defined as the duration to send 1 cell with a single code (on one sub-channel). Each timeslot n the MAC simulator triggers the MAC algorithm with the function get_permit (). The algorithm is implemented by external C-code, enabling the simulation of different concrete algorithms. The interface between the simulator and the MAC algorithm is implemented as the argument of the function get_permit (). This argument is a pointer representing a list (or array) of multi-permits. Each entry in the multi-permit list represents one NT_id. A multi-permit is a structure with the following multi-permit (integer) attributes: NT_id QoS_class Number_of_Codes The latter indicates the number of single permits the NT receives during timeslot n, i.e. the number of orthogonal codes allocated to the terminal for the duration of one timeslot. The triggering of the MAC permit generator results in a number of transmission codes suitable for cell transmission by one or more NTs. These multipermits are broadcasted from LT to the NTs. As such each NT may receive from 0 up to M (number of sub-channels) codes. Upon reception of the multipermit the NT transmits simultaneously the appropriate number of cells indicated by the multipermit. No physical layer related stuff is implemented neither in the simulator body nor in the MAC external code. A separate external module represents the Physical Channel Interface modelling amongst other things the multi-user interference. The interface between the MAC permit generator and the PCI-module is a configuration of NTs which should be served during the same timeslot n. In response PCI returns the available code-structure, i.e. the maximum number of codes available per NT in the configuration. The code-structure is such that the multi-user interference caused by the simultaneous transmission is small enough for not causing any cell loss. A simple example is given in the next section. Based on a given available code-structure, the MAC algorithm decides which NTs will effectively be served, also taking into account the traffic parameters and the MAC strategy. Therefore PCI may be triggered several times - with different NTconfigurations - during the same timeslot. 4
5 SIMULATION EXAMPLES In this section we give as an illustration some simulation results for an ATM-based access network with a twodimensional multiplexing structure. Channel characteristics The network has a point to multi-point topology with 30 connected terminals with a maximum distance of 1000m, resulting in a round trip delay of about 10µs. The total channel upstream capacity is 1 Mega bit/s. The channel is divided into 15 sub-channels. The slot size of the TDMA sub-channels is 56 bytes: 1 ATM cell + 3 physical overhead bytes. The capacity reserved for fixed rate polling is 3%. The mutual NT-distances between terminals have no significant influence on the multi-user interference. The number of simultaneous transmitting terminals uniquely determines the interference-degree. In the example it is assumed that the capacity decreases with about 10% per extra transmitting terminal. number of transmitting terminals total number of available subchannels (codes) maximum number codes per terminal >6 0 0 Figure 7. 2D-interference simulation conditions (PCI) Simulations with ON/OFF sources We monitored the performance of several MAC protocols for different traffic scenarios and using different types of sources. A first series of simulation runs have been executed with ON/OFF sources representing best-effort, bursty data-traffic. Non of the connections has a bandwidth guarantee. Using the available OPNET statistics the queue-length is monitored at each terminal. Averaging these queuelength statistics results in a number of global network performance metrics such as the mean and maximum queue-length. The graph in figure 8 gives the mean NTqueue-length as a function of the network load. The latter is determined by the sum of the sustainable cell rate (SCR) of the ON/OFF sources. Mean Queue Size DAdvanced Protocol 1DTDMAStatic Priority 2D Static Priority Protocol 32% 42% 53% 63% 74% 85% 90% 94% Load Figure 8.Mean queue-length performance measurements Two 2D-MAC protocols are compared with the wellknown 1D-Static Priority protocol for TDMA channels (SP-MAC). Of course, the total capacity of the 2D channel is exactly the same as the capacity of the TDMA-channel. Also the packet size and the overhead bytes are taken to be the same in the 1D- and 2Dsimulation scenarios. Clearly the TDMA channel combined with the 1D SP- MAC protocol performs the best, because it does not suffer from multi-user interference. A simple extension of SP-MAC for 2D channels performs very badly (divergence at a load of 50%). This 2D SP-MAC allocates the codes as well as the time-slots in a Round Robin way to requesting terminals. This shows that a more advanced dynamic MAC protocol, taking into account the specific 2D-channel multi-userinterference, is really necessary. Indeed, figure 8 also illustrates that such an advanced dynamic 2D-MAC performs well up to a load of 90% Simulations with CBR sources Figure 9 illustrates some results for simulations with CBR-sources of 64 kbit/s, representing POTSconnections. The transport channel (1Mbit/s) supports in theory at most 15 connections. Simulation results show that the 1D-TDMA Static Priority MAC protocol (explained above) supports 14 connections. 5
6 The 2D-static allocation of sub-channels supports 4 simultaneous connections. This minimum can be calculated taking into account the performance loss given by figure 7. The number of connections supported by dynamic 2D- MAC protocols should be between 4 and 14. Dynamic protocols can support more connections than static ones based on the mechanism of cell clumping. The MAC protocol induces an extra cell-delay allowing the simultaneous transmission of cells by the same terminal. # connections D Advanced Protocol + time-mechanism 2D Static Priority Protocol Static Sub-Channel Allocation induced cell-delay in timeslot units Figure 9. Supported POTS-connections for a given (allowed) cell delay ThecellsarebufferedattheNTandthentransmittedas a group by using several sub-channels simultaneously for the same connection. This mechanism yields less multi-user interference, but at the cost of extra-induced jitter or delay. A supplementary time-delay mechanism is also needed in order to guarantee delay-bounds for all active POTS connections. An advanced 2D protocol can support the same number of connections as the 1D TDMA SP protocol if the allowed jitter is large enough. The 2D-SP protocol however can never support more than 7 connections. This behaviour corresponds with the divergence of the queue-length at a load of 50% measured for ON/OFF sources (fig. 8). Simulations with TCP sources Figure 10 shows the results of simulations with 5 TCP sources. Each source has a (different) minimum bandwidth guarantee (guaranteed frame rate GFRservice). The same MAC protocols are evaluated as in figure 8. However, each of the protocols is now exhibited with an extra mechanism, known as Weighted Round Robin. This mechanism takes into account the minimum bandwidth guarantee of connections and distributes in a fair way the available bandwidth amongst the NTs according to their relative weights. In the simulation example (1,2,4,8,16) gives the relative weight distribution. kbit/s TCP Goodput 1D TDMA Static Priority 2D Static Priority Protocol 2D Advanced Protocol terminal Id Figure 10. TCP-traffic with bandwidth guarantees The 1D-SP-protocol and the 2D-advanced MAC protocol almost perform equally good. The 2D-MAC protocol for example obtains a total TCP-goodput of 707 kbit/s. The maximum obtainable TCP goodput is 714 kbit/s. This theoretical number can be calculated based on the header overheads of the protocol stack TCP/IP/AAL5/ATM. The 2D-SP protocol again performs very badly. The obtained TCP-goodput is only 284 kbit/s, which is even less than 50%. CONCLUSIONS In this paper we described an OPNET simulator suited for the evaluation of MAC protocols for access networks with a two-dimensional multiplexing structure. This has been realised by an upgrade of a simulator for TDMA networks. This approach was possible based on our object-oriented development approach and the inherent object-oriented characteristics of the OPNET simulation tool. REFERENCES [1] MAC Simulator for ATM-based Shared-Medium Access Networks. Kristiaan Venken, Rudy Hoebeke, Frank Ploumen. OPNETWORK Conference
Data Link Layer Technologies
Chapter 2.2 La 2 Data Link La Technologies 1 Content Introduction La 2: Frames Error Handling 2 Media Access Control General approaches and terms Aloha Principles CSMA, CSMA/CD, CSMA / CA Master-Slave
More informationCHAPTER TWO LITERATURE REVIEW
CHAPTER TWO LITERATURE REVIEW 2.1 Introduction. This chapter provides in detail about the multiple access technologies and the OCDMA system. It starts with a discussion on various existing multiple-access
More informationCOMPUTER NETWORK Model Test Paper
Model Test Paper Question no. 1 is compulsory. Attempt all parts. Q1. Each question carries equal marks. (5*5 marks) A) Difference between Transmission Control Protocol (TCP) and User Datagram Protocol.
More informationCABLE NETWORKS INTRODUCTION TO CABLE NETWORK TECHNOLOGIES AND PROTOCOLS
CABLE NETWORKS INTRODUCTION TO CABLE NETWORK TECHNOLOGIES AND PROTOCOLS Peter R. Egli 1/15 Contents 1. Cable network architecture 2. Relevant cable network standards 3. DOCSIS 2/15 1. Cable Network architecture
More informationPerformance of UMTS Radio Link Control
Performance of UMTS Radio Link Control Qinqing Zhang, Hsuan-Jung Su Bell Laboratories, Lucent Technologies Holmdel, NJ 77 Abstract- The Radio Link Control (RLC) protocol in Universal Mobile Telecommunication
More informationPerformance Evaluation of Scheduling Mechanisms for Broadband Networks
Performance Evaluation of Scheduling Mechanisms for Broadband Networks Gayathri Chandrasekaran Master s Thesis Defense The University of Kansas 07.31.2003 Committee: Dr. David W. Petr (Chair) Dr. Joseph
More informationChapter 1 Introduction
Emerging multimedia, high-speed data, and imaging applications are generating a demand for public networks to be able to multiplex and switch simultaneously a wide spectrum of data rates. These networks
More informationSIMON FRASER UNIVERSITY SCHOOL OF ENGINEERING SCIENCE. Spring 2013 ENSC 427: COMMUNICATION NETWORKS. Midterm No. 2(b) Monday, March 18, 2013
SIMON FRASER UNIVERSITY SCHOOL OF ENGINEERING SCIENCE Spring 2013 ENSC 427: COMMUNICATION NETWORKS Midterm No. 2(b) Monday, March 18, 2013 Duration: 50 minutes. Attempt all problems. Questions may not
More informationLink Layer and LANs 안상현서울시립대학교컴퓨터 통계학과.
Link Layer and LANs 안상현서울시립대학교컴퓨터 통계학과 ahn@venus.uos.ac.kr Data Link Layer Goals: understand principles behind data link layer services: error detection, correction sharing a broadcast channel: multiple
More informationGigabit Ethernet Passive Optical Network (GEPON) Tutorial. June 2004
Gigabit Ethernet Passive Optical Network (GEPON) Tutorial June 2004 1 Ethernet Passive Optical Network (EPON) Tutorial OVERVIEW... 2 EPON TOPOLOGIES... 4 EPON NETWORK... 4 EPON SYSTEMS... 5 EPON PROTOCOL...
More informationFlexibility Evaluation of Hybrid WDM/TDM PONs
Flexibility Evaluation of Hybrid WD/TD PONs Abhishek Dixit, Bart Lannoo, Goutam Das, Didier Colle, ario Pickavet, Piet Demeester Department of Information Technology, Ghent University IBBT, B-9 Gent, Belgium
More informationAsynchronous Transfer Mode (ATM) ATM concepts
Asynchronous Transfer Mode (ATM) Asynchronous Transfer Mode (ATM) is a switching technique for telecommunication networks. It uses asynchronous time-division multiplexing,[1][2] and it encodes data into
More informationMultiple Access Techniques for epon. Glen Kramer
Multiple Access Techniques for epon len Kramer glen.kramer@alloptic.com IEEE 802.3 EFM Study roup Meeting, March 2001 First Mile LAN HAVE Non-cooperative (independent) users Non-uniform traffic: most traffic
More informationModeling a MAC Scheduler: Experiences with a DOCSIS Cable
Modeling a MAC Scheduler: Experiences with a DOCSIS Cable Network Simulation Model Jim Martin Department of Computer Science Clemson University jim.martin@cs.clemson.edu Phone: 864 656 4529 Fax: 864 656
More informationdifferent problems from other networks ITU-T specified restricted initial set Limited number of overhead bits ATM forum Traffic Management
Traffic and Congestion Management in ATM 3BA33 David Lewis 3BA33 D.Lewis 2007 1 Traffic Control Objectives Optimise usage of network resources Network is a shared resource Over-utilisation -> congestion
More informationThe Link Layer and LANs. Chapter 6: Link layer and LANs
The Link Layer and LANs EECS3214 2018-03-14 4-1 Chapter 6: Link layer and LANs our goals: understand principles behind link layer services: error detection, correction sharing a broadcast channel: multiple
More informationLecture 9. Quality of Service in ad hoc wireless networks
Lecture 9 Quality of Service in ad hoc wireless networks Yevgeni Koucheryavy Department of Communications Engineering Tampere University of Technology yk@cs.tut.fi Lectured by Jakub Jakubiak QoS statement
More informationGoals. Fundamentals of Network Media. More topics. Topics. Multiple access communication. Multiple access solutions
Fundamentals of Network Media Local Area Networks Ursula Holmström Goals Learn the basic concepts related to LAN technologies, for example use of shared media medium access control topologies Know the
More informationMedia Access Control Protocol Based on DOCSIS 1.1
Document Number: IEEE 802.16mp-99/16 Title: Media Access Control Protocol Based on DOCSIS 1.1 Date Submitted: 1999-11-08 Source: Karl Stambaugh Voice: 480-441-7842 Motorola Inc. Fax: 480-675-2116 8220
More informationETSI Project BRAN Hiperlan Type 2 for IEEE 1394 Applications System Overview
ETSI Project BRAN Hiperlan Type 2 for IEEE 1394 Applications System Overview Source : Jamshid Khun Jush (Ericsson) (THOMSON multimedia) 1 HIPERLAN/2 Standard A new standard developed by the ETSI Project
More informationChapter 5 Link Layer and LANs
Chapter 5 Link Layer and LANs Computer Networking: A Top Down Approach 4 th edition. Jim Kurose, Keith Ross Addison-Wesley, July 2007. All material copyright 1996-2007 J.F Kurose and K.W. Ross, All Rights
More informationMAC Protocol Proposal for Fixed BWA Networks Based on DOCSIS. Re: Medium Access Control Task Group Call for Contributions Session #4
Project Title Date Submitted IEEE 802.16 Broadband Wireless Access Working Group MAC Protocol Proposal for Fixed BWA Networks Based on DOCSIS 1999-10-29 Source Phil Guillemette SpaceBridge Networks Corporation
More informationACLASS of users that has drawn much attention over the
296 IEEE TRANSACTIONS ON BROADCASTING, VOL. 56, NO. 3, SEPTEMBER 2010 Statistical Multiplexing of Upstream Transmissions in DOCSIS Cable Networks César Heyaime-Duvergé and Vasant K. Prabhu, Life Fellow,
More informationImplementation of WiFiRe PHY Sectorization in OPNET
P Sreedhar Reddy Roll No. 06305024 24th July, 2007 Under the Guidance Of Prof. Sridhar Iyer Department Of Computer Science and Engineering Indian Institute Of Technology, Bombay Outline WiFiRe overview.
More informationA NOVEL DECENTRALIZED ETHERNET-BASED PASSIVE OPTICAL NETWORK ARCHITECTURE
A NOVEL DECENTRALIZED ETHERNET-BASED PASSIVE OPTICAL NETWORK ARCHITECTURE A. Hadjiantonis, S. Sherif, A. Khalil, T. Rahman, G. Ellinas, M. F. Arend, and M. A. Ali, Department of Electrical Engineering,
More informationChapter 6 The Link Layer and LANs
Chapter 6 The Link Layer and LANs A note on the use of these Powerpoint slides: We re making these slides freely available to all (faculty, students, readers). They re in PowerPoint form so you see the
More informationCSC 401 Data and Computer Communications Networks
CSC 401 Data and Computer Communications Networks Link Layer: Intro, Errors, Multiple Access Sec 6.1, 6.2, 6.3 Prof. Lina Battestilli Fall 2017 Chapter 6: Link layer Goals: understand principles behind
More informationModule objectives. Integrated services. Support for real-time applications. Real-time flows and the current Internet protocols
Integrated services Reading: S. Keshav, An Engineering Approach to Computer Networking, chapters 6, 9 and 4 Module objectives Learn and understand about: Support for real-time applications: network-layer
More informationCover Page. Performance Evaluation of the DOCSIS 1.1 MAC Protocol According to the Structure of a MAP Message
Cover Page 1. Title of Paper Performance Evaluation of the DOCSIS 1.1 MAC Protocol According to the Structure of a MAP Message 2. Name of the authors, Sung-Han Park, and Jae-Hyun Kim 3. About authors Affiliation
More informationMPEG4 VIDEO OVER PACKET SWITCHED CONNECTION OF THE WCDMA AIR INTERFACE
MPEG4 VIDEO OVER PACKET SWITCHED CONNECTION OF THE WCDMA AIR INTERFACE Jamil Y. Khan 1, Pratik Das 2 School of Electrical Engineering and Computer Science, University of Newcastle, Callaghan, NSW 238,
More informationPON Functional Requirements: Services and Performance
PON Functional Requirements: Services and Performance Dolors Sala Ajay Gummalla {dolors,ajay}@broadcom.com July 10-12, 2001 Ethernet in the First Mile Study Group 1 July 2001 Objective Outline the PON-specific
More informationCS 716: Introduction to communication networks. - 8 th class; 17 th Aug Instructor: Sridhar Iyer IIT Bombay
CS 716: Introduction to communication networks - 8 th class; 17 th Aug 2011 Instructor: Sridhar Iyer IIT Bombay Key points to consider for MAC Types/Modes of communication: Although the medium is shared,
More informationConverged Networks. Objectives. References
Converged Networks Professor Richard Harris Objectives You will be able to: Discuss what is meant by convergence in the context of current telecommunications terminology Provide a network architecture
More informationInternetworking Part 1
CMPE 344 Computer Networks Spring 2012 Internetworking Part 1 Reading: Peterson and Davie, 3.1 22/03/2012 1 Not all networks are directly connected Limit to how many hosts can be attached Point-to-point:
More informationUnit 2 Packet Switching Networks - II
Unit 2 Packet Switching Networks - II Dijkstra Algorithm: Finding shortest path Algorithm for finding shortest paths N: set of nodes for which shortest path already found Initialization: (Start with source
More informationECSE-4670: Computer Communication Networks (CCN) Informal Quiz 3
ECSE-4670: Computer Communication Networks (CCN) Informal Quiz 3 : shivkuma@ecse.rpi.edu Biplab Sikdar: sikdab@rpi.edu 1 T F Slotted ALOHA has improved utilization since the window of vulnerability is
More informationLecture 4: Wireless MAC Overview. Hung-Yu Wei National Taiwan University
Lecture 4: Wireless MAC Overview Hung-Yu Wei National Taiwan University Medium Access Control Topology 3 Simplex and Duplex 4 FDMA TDMA CDMA DSSS FHSS Multiple Access Methods Notice: CDMA and spread spectrum
More informationPerformance Evaluation of WiFiRe using OPNET
Performance Evaluation of WiFiRe using OPNET Under the guidance of: Prof. Sridhar Iyer and Prof. Varsha Apte Dept. of CSE (KReSIT) July 16, 2007 Goal Goal Building. Finding minimum slot length to support
More informationSubject: Adhoc Networks
ISSUES IN AD HOC WIRELESS NETWORKS The major issues that affect the design, deployment, & performance of an ad hoc wireless network system are: Medium Access Scheme. Transport Layer Protocol. Routing.
More informationLocal Area Networks NETW 901
Local Area Networks NETW 901 Lecture 4 Wireless LAN Course Instructor: Dr.-Ing. Maggie Mashaly maggie.ezzat@guc.edu.eg C3.220 1 Contents What is a Wireless LAN? Applications and Requirements Transmission
More informationUniversity of Agder Department of Information and Communication Technology EXAM
University of Agder Department of Information and Communication Technology EXAM Course code: IKT 444 Course title: Mobile Communication Networks Date: Tuesday, 6 th December 2016 Duration: 09:00 13:00
More informationRED behavior with different packet sizes
RED behavior with different packet sizes Stefaan De Cnodder, Omar Elloumi *, Kenny Pauwels Traffic and Routing Technologies project Alcatel Corporate Research Center, Francis Wellesplein, 1-18 Antwerp,
More informationPacket multiple access and the Aloha protocol
Packet multiple access and the Aloha protocol Massachusetts Institute of Technology Department of Aeronautics and Astronautics Slide 1 Packet Multiple Access PMA SHARED UPLINK TERMINAL TERMINAL APPL TRANS
More informationInitial PHY Layer System Proposal for Sub 11 GHz BWA
Initial PHY Layer System Proposal for Sub 11 GHz BWA Document Number: 802.16.3p-00/40 Date Submitted: 2000-11-08 Source: Anader Benyamin-Seeyar Voice: (514) 822-2014 Harris Corporation Inc. Fax: (514)
More informationFixed Innovative Bandwidth Utilization in TDM EPON
634 Fixed Innovative Bandwidth Utilization in TDM EPON Muhammad Bilal 1, Muhammad Awais 2, Muhammad Irfan 3, Ammar Rafiq 4 1 Department of Computer Science, NFC Institute of Engineering & Fertilizer Research,
More informationWireless Communications
4. Medium Access Control Sublayer DIN/CTC/UEM 2018 Why do we need MAC for? Medium Access Control (MAC) Shared medium instead of point-to-point link MAC sublayer controls access to shared medium Examples:
More informationAdvanced Computer Networks
Advanced Computer Networks QoS in IP networks Prof. Andrzej Duda duda@imag.fr Contents QoS principles Traffic shaping leaky bucket token bucket Scheduling FIFO Fair queueing RED IntServ DiffServ http://duda.imag.fr
More informationCHAPTER 2 - NETWORK DEVICES
CHAPTER 2 - NETWORK DEVICES TRUE/FALSE 1. Repeaters can reformat, resize, or otherwise manipulate the data packet. F PTS: 1 REF: 30 2. Because active hubs have multiple inbound and outbound connections,
More informationResidential Broadband (RBB)
Residential Broadband (RBB) Professor of Computer and Information Science Columbus, OH 43210 Jain@CIS.Ohio-State.Edu http://www.cis.ohio-state.edu/~jain/ 1 Service Aspects and Applications (SAA) Voice
More informationSimulation Study for a Broadband Multimedia VSAT Network
Simulation Study for a Broadband Multimedia Yi Qian, Rose Hu, and Hosame Abu-Amara Nortel s 2201 Lakeside Blvd., Mail Stop 992-02-E70 Richardson, Texas 75082, USA Phone: 972-685-7264 Fax: 972-685-3463
More informationChapter 5: Link layer
Chapter 5: Link layer our goals: v understand principles behind link layer services: error detection, correction sharing a broadcast channel: multiple access link layer addressing local area networks:
More informationNetwork management and QoS provisioning - revise. When someone have to share the same resources is possible to consider two particular problems:
Revise notes Multiplexing & Multiple Access When someone have to share the same resources is possible to consider two particular problems:. multiplexing;. multiple access. The first one is a centralized
More informationSIMULATION FRAMEWORK MODELING
CHAPTER 5 SIMULATION FRAMEWORK MODELING 5.1 INTRODUCTION This chapter starts with the design and development of the universal mobile communication system network and implementation of the TCP congestion
More informationLecture 7: Flow & Media Access Control"
Lecture 7: Flow & Media Access Control" CSE 123: Computer Networks Alex C. Snoeren HW 2 due next Wednesday! Lecture 7 Overview" Flow control Go-back-N Sliding window Methods to share physical media: multiple
More informationFAIR DELAY OPTIMIZATION-BASED RESOURCE ALLOCATION ALGORITHM FOR VIDEO TRAFFIC OVER WIRELESS MULTIMEDIA SYSTEM
FAIR DELAY OPTIMIZATION-BASED RESOURCE ALLOCATION ALGORITHM FOR VIDEO TRAFFIC OVER WIRELESS MULTIMEDIA SYSTEM 1 M. R. M. Rizk, Senior Member, IEEE, 2 M. I. Dessouky, 3 Sami A. El-Dolil, and 4 Mohammed
More informationCS519: Computer Networks
Lets start at the beginning : Computer Networks Lecture 1: Jan 26, 2004 Intro to Computer Networking What is a for? To allow two or more endpoints to communicate What is a? Nodes connected by links Lets
More informationPreliminary Performance Evaluation of QoS in DOCSIS 1.1
The University of Kansas Technical Report Preliminary Performance Evaluation of QoS in DOCSIS 1.1 Gayathri Chandrasekaran, Mohammed Hawa and David W. Petr ITTC-FY2003-TR-22736-01 January 2003 Sponsor:
More informationCS 455/555 Intro to Networks and Communications. Link Layer
CS 455/555 Intro to Networks and Communications Link Layer Dr. Michele Weigle Department of Computer Science Old Dominion University mweigle@cs.odu.edu http://www.cs.odu.edu/~mweigle/cs455-s13 1 Link Layer
More informationData Link Layer: Collisions
Data Link Layer: Collisions 1 Multiple Access Data Link layer divided into two sublayers. The upper sublayer is responsible for datalink control, The lower sublayer is responsible for resolving access
More informationCSMA based Medium Access Control for Wireless Sensor Network
CSMA based Medium Access Control for Wireless Sensor Network H. Hoang, Halmstad University Abstract Wireless sensor networks bring many challenges on implementation of Medium Access Control protocols because
More informationScheduling. Scheduling algorithms. Scheduling. Output buffered architecture. QoS scheduling algorithms. QoS-capable router
Scheduling algorithms Scheduling Andrea Bianco Telecommunication Network Group firstname.lastname@polito.it http://www.telematica.polito.it/ Scheduling: choose a packet to transmit over a link among all
More informationScheduling of real-time traffic in IEEE networks
Scheduling of real-time traffic in IEEE 802.11 networks Afonso, José A. Neves, Joaquim E. Universidade do Minho, Departamento de Electrónica Industrial Campus de Azurém, 4800-058 Guimarães, ortugal jose.afonso@dei.uminho.pt
More informationWSN NETWORK ARCHITECTURES AND PROTOCOL STACK
WSN NETWORK ARCHITECTURES AND PROTOCOL STACK Sensing is a technique used to gather information about a physical object or process, including the occurrence of events (i.e., changes in state such as a drop
More informationTopics. Link Layer Services (more) Link Layer Services LECTURE 5 MULTIPLE ACCESS AND LOCAL AREA NETWORKS. flow control: error detection:
1 Topics 2 LECTURE 5 MULTIPLE ACCESS AND LOCAL AREA NETWORKS Multiple access: CSMA/CD, CSMA/CA, token passing, channelization LAN: characteristics, i basic principles i Protocol architecture Topologies
More informationRTT TECHNOLOGY TOPIC October 1998 WCDMA
RTT TECHNOLOGY TOPIC October 1998 WCDMA In our last hot topic, we reviewed the future positioning of TD-CDMA including the rationale of taking the existing DECT time multiplexing structure to front end
More information. 14 Byte for Acks. Due to this fact, the overhead is more relevant if the data contained in packets is sent to high rates:
QoS in IEEE 802.11 Issues Some issues are important for quality of service: the first one mentioned is the difference of performances expired by nodes based on their position in the network. Indeed, considering
More informationA hybrid medium access control for convergence of broadband wireless and wireline ATM networks
Downloaded from orbit.dtu.dk on: Oct 07, 2018 A hybrid medium access control for convergence of broadband wireless and wireline ATM networks Liu, Hong; Gliese, Ulrik Bo; Dittmann, Lars Published in: Proceeding
More informationCONTENTION RESOLUTION ALGORITHMS FOR CATV NETWORKS BASED ON THE DVB/DAVIC PROTOCOL
CONTENTION RESOLUTION ALGORITHMS FOR CATV NETWORKS BASED ON THE DVB/DAVIC PROTOCOL V. Rangel 1, R. Edwards 1, and K. Schunke 2 1 C4MCR, University of Sheffield, UK and 2 ICT, Braunschweig Technical University,
More informationLecture 19. Principles behind data link layer services Framing Multiple access protocols
Link Layer Lecture 19 Principles behind data link layer services Framing Multiple access protocols ALOHA *The slides are adapted from ppt slides (in substantially unaltered form) available from Computer
More informationMedium Access Control. MAC protocols: design goals, challenges, contention-based and contention-free protocols
Medium Access Control MAC protocols: design goals, challenges, contention-based and contention-free protocols 1 Why do we need MAC protocols? Wireless medium is shared Many nodes may need to access the
More informationChapter 5. Voice Network Concepts. Voice Network Concepts. Voice Communication Concepts and Technology
Chapter 5 Voice Communication Concepts and Technology Voice Network Concepts Telephone switchboard - Circa 1898 Voice Network Concepts Telephone calls are connected from source via circuit switching. Circuit
More informationCSC 4900 Computer Networks: The Link Layer
CSC 4900 Computer Networks: The Link Layer Professor Henry Carter Fall 2017 Last Time We talked about intra-as routing protocols: Which routing algorithm is used in RIP? OSPF? What techniques allow OSPF
More informationObjectives. Learn how computers are connected. Become familiar with different types of transmission media
Objectives Learn how computers are connected Become familiar with different types of transmission media Learn the differences between guided and unguided media Learn how protocols enable networking 2 Objectives
More informationData and Computer Communications. Chapter 2 Protocol Architecture, TCP/IP, and Internet-Based Applications
Data and Computer Communications Chapter 2 Protocol Architecture, TCP/IP, and Internet-Based s 1 Need For Protocol Architecture data exchange can involve complex procedures better if task broken into subtasks
More informationMobile Communications Chapter 3 : Media Access
Mobile Communications Chapter 3 : Media Access 2. Motivation 3. SDMA, FDMA, TDMA 1. Aloha and contention based schemes 4. Reservation schemes 5. Collision avoidance, MACA 6. Polling CDMA (Lecture 6) Prof.
More informationExercises TCP/IP Networking With Solutions
Exercises TCP/IP Networking With Solutions Jean-Yves Le Boudec Fall 2009 3 Module 3: Congestion Control Exercise 3.2 1. Assume that a TCP sender, called S, does not implement fast retransmit, but does
More informationWireless Local Area Networks (WLANs)) and Wireless Sensor Networks (WSNs) Computer Networks: Wireless Networks 1
Wireless Local Area Networks (WLANs)) and Wireless Sensor Networks (WSNs) Computer Networks: Wireless Networks 1 Wireless Local Area Networks The proliferation of laptop computers and other mobile devices
More informationCS 4453 Computer Networks Winter
CS 4453 Computer Networks Chapter 2 OSI Network Model 2015 Winter OSI model defines 7 layers Figure 1: OSI model Computer Networks R. Wei 2 The seven layers are as follows: Application Presentation Session
More informationThe MAC layer in wireless networks
The MAC layer in wireless networks The wireless MAC layer roles Access control to shared channel(s) Natural broadcast of wireless transmission Collision of signal: a /space problem Who transmits when?
More informationPerformance Evaluation and Design Improvement of Media Access Control Protocols for Broadband Wireless Local Loop
Performance Evaluation and Design Improvement of Media Access Control Protocols for Broadband Wireless Local Loop Mihir Thaker Masters Thesis Presentation Department of Electrical Engineering and Computer
More informationAdaptive Resource Allocation Mechanisms for Support of Data Traffic over ATM Satellite Networks Introduction The Dynamic Flow Control Scheme
Adaptive Resource Allocation Mechanisms for Support of Traffic over ATM Satellite Networks Tanja Lang and Nirmala Shenoy, Co-operative Research Centre for Satellite Systems, Institute for Telecommunications
More informationHigh efficiency MAC protocols for IoT: iqueue-mac and implementation on RIOT OS
High efficiency MAC protocols for IoT: iqueue-mac and implementation on RIOT OS Ye-Qiong SONG LORIA INRIA Université de Lorraine as part of ADT RIOT RIOT Siminar, Inria Paris, April 13 th 2017 1 Outline
More informationHomework 1. Question 1 - Layering. CSCI 1680 Computer Networks Fonseca
CSCI 1680 Computer Networks Fonseca Homework 1 Due: 27 September 2012, 4pm Question 1 - Layering a. Why are networked systems layered? What are the advantages of layering? Are there any disadvantages?
More informationPhysical Layer. Medium Access Links and Protocols. Point-to-Point protocols. Modems: Signaling. Modems Signaling. Srinidhi Varadarajan
P Physical Layer Srinidhi Varadarajan Medium Access Links and Protocols Three types of links : point-to-point (single wire, e.g. PPP, SLIP) broadcast (shared wire or medium; e.g, Ethernet, Wavelan, etc.)
More informationGetting Connected (Chapter 2 Part 4) Networking CS 3470, Section 1 Sarah Diesburg
Getting Connected (Chapter 2 Part 4) Networking CS 3470, Section 1 Sarah Diesburg Five Problems Encoding/decoding Framing Error Detection Error Correction Media Access Five Problems Encoding/decoding Framing
More information1/29/2008. From Signals to Packets. Lecture 6 Datalink Framing, Switching. Datalink Functions. Datalink Lectures. Character and Bit Stuffing.
/9/008 From Signals to Packets Lecture Datalink Framing, Switching Peter Steenkiste Departments of Computer Science and Electrical and Computer Engineering Carnegie Mellon University Analog Signal Digital
More informationThe Effect of Code-Multiplexing on the High Speed Downlink Packet Access (HSDPA) in a WCDMA Network
The Effect of Code-Multiplexing on the High Speed Downlink Packet Access (HSDPA) in a WCDMA Network Raymond Kwan, Peter H. J. Chong 2, Eeva Poutiainen, Mika Rinne Nokia Research Center, P.O. Box 47, FIN-45
More informationCHAPTER 7 MAC LAYER PROTOCOLS. Dr. Bhargavi Goswami Associate Professor & Head Department of Computer Science Garden City College
CHAPTER 7 MAC LAYER PROTOCOLS Dr. Bhargavi Goswami Associate Professor & Head Department of Computer Science Garden City College MEDIUM ACCESS CONTROL - MAC PROTOCOLS When the two stations transmit data
More informationAsynchronous Transfer Mode
ATM Asynchronous Transfer Mode CS420/520 Axel Krings Page 1 Protocol Architecture (diag) CS420/520 Axel Krings Page 2 1 Reference Model Planes User plane Provides for user information transfer Control
More informationA QoS Control Scheme for Voice and Data Services in cdma2000 System
A QoS Control Scheme for Voice and Data Services in cdma System Omneya Issa and Jean-Charles Grégoire INRS-EMT, Place Bonaventure, 8, de la Gauchetière Ouest, bureau 69 Montréal (Québec), H5A 1K6 Canada
More informationTutorial 9 : TCP and congestion control part I
Lund University ETSN01 Advanced Telecommunication Tutorial 9 : TCP and congestion control part I Author: Antonio Franco Course Teacher: Emma Fitzgerald January 27, 2015 Contents I Before you start 3 II
More informationNetwork protocols and. network systems INTRODUCTION CHAPTER
CHAPTER Network protocols and 2 network systems INTRODUCTION The technical area of telecommunications and networking is a mature area of engineering that has experienced significant contributions for more
More informationMultimedia Systems. Networks WS 2009/2010
Multimedia Systems WS 2009/2010 Networks Prof. Dr. Paul Müller University of Kaiserslautern, Germany Integrated Communication Systems Lab Email: pmueller@informatik.uni-kl.de 1 Outline Network basics for
More informationCOLLEGE OF ENGINEERING DEPARTMENT OF INFORMATION TECHNOLOGY QUESTION BANK UNIT-1 WIRELESS COMMUNICATION FUNDAMENTALS
KINGS COLLEGE OF ENGINEERING DEPARTMENT OF INFORMATION TECHNOLOGY QUESTION BANK SUBJECT CODE& NAME: IT1403 MOBILE COMPUTING YEAR / SEM : IV / VIII UNIT-1 WIRELESS COMMUNICATION FUNDAMENTALS PART A (2MARKS)
More informationComputer Networks Robin Sharp Informatics and Mathematical Modelling Technical University of Denmark Phone: (+45)
Computer Networks Robin Sharp Informatics and Mathematical Modelling Technical University of Denmark Phone: (+45) 4525 3749 e-mail: robin@imm.dtu.dk Basic Network Concepts A computer network is a set of
More informationCS 856 Latency in Communication Systems
CS 856 Latency in Communication Systems Winter 2010 Latency Challenges CS 856, Winter 2010, Latency Challenges 1 Overview Sources of Latency low-level mechanisms services Application Requirements Latency
More informationChapter 8: Multiplexing
NET 456 High Speed Networks Chapter 8: Multiplexing Dr. Anis Koubaa Reformatted slides from textbook Data and Computer Communications, Ninth Edition by William Stallings, 1 (c) Pearson Education - Prentice
More informationDistributed Video Systems Chapter 4 Network Technologies
Distributed Video Systems Chapter 4 Network Technologies Jack Yiu-bun Lee Department of Information Engineering The Chinese University of Hong Kong Contents 4.1 Introduction 4.2 Multiple Access Protocols
More informationPerformance Comparison of Reservation MAC Protocols for Broadband Powerline Communications Networks
Performance Comparison of Reservation MAC Protocols for Broadband Powerline Communications Networks Halid Hrasnica *, Abdelfatteh Haidine, Ralf Lehnert Chair for Telecommunications, Dresden University
More informationCDMA-Based MAC Protocol for Wireless Ad Hoc Networks
CDMA-Based MAC Protocol for Wireless Ad Hoc Networks Alaa Muqattash and Marwan Krunz Presented by: Habibullah Pagarkar for 600.647-Advanced Topics in Wireless Networks. JHU. Spring 04 Today s Presentation
More information