MAC SIMULATOR FOR HYBRID TDMA/CDMA ACCESS NETWORKS

Size: px
Start display at page:

Download "MAC SIMULATOR FOR HYBRID TDMA/CDMA ACCESS NETWORKS"

Transcription

1 MAC SIMULATOR FOR HYBRID TDMA/CDMA ACCESS NETWORKS Danny Goderis, Rudy Hoebeke, Kristiaan Venken. Alcatel Corporate Research Center Department Access to Networks Francis Wellesplein 1, 2018 Antwerp, Belgium ABSTRACT In a TDMA/CDMA access network the transport channel is divided into sub-channels according to orthogonal codes. Each sub-channel is again divided into time-slots. CDMA spread spectrum techniques are used for wireless communication and HFC systems. Recently the European Telecommunication Standards Institute (ETSI) decided to retain a hybrid TD-CDMA interface as one of the two possible interfaces for the third generation mobile system UMTS. Dynamic MAC protocols for such communication systems allocate bandwidth to users in a twodimensional plane, taking into account Quality of Service (QoS) guarantees of individual connections, throughput efficiency and the typical 2D multi-user interference caused by simultaneous transmissions. The paper describes an OPNET MAC simulator with a generic two-dimensional (2D) channel interface. Channel characteristics such as multi-user interference are modelled as stand-alone modules. Simulation results are provided, allowing the comparison of alternative 2D- MAC protocols using TCP-, ON/OFF- and CBR sources for different media. TDMA ACCESS NETWORKS The main function of a shared-medium access network is to collect and multiplex traffic from several customers and offer it to the core network; and to distribute the traffic from the core network to the relevant customers. This involves the multiplexing and de-multiplexing of several connections. Typically the access network has a point to multi-point topology where all traffic between users (terminals or Network Terminations-NT) andcore network flows through the head-end (or Line Termination-LT) of the access network. Data-packets are broadcast in the downstream direction (from LT to NT), whereas multiple users share the upstream direction. Therefore a Medium Access Control (MAC) function is needed for controlling the upstream channel. Centrally controlled request-based MAC protocols for one-dimensional Time Division Multiple Access (TDMA) transport systems are very well known (fig 1). One time-slot corresponds with one packet or cell. Different timeslots are dynamically assigned to different terminals (NTs), under control of the MAC function implemented at the head-end (LT). Downstream Data Traffic LT MAC Controller Upstream D ata Traffic Traffic Requirements Traffic Profiles Connection Info Downstream M ac Control Info (permits) Network Span NT1 NT2 NTn Splitting Factor Data Traffic Figure 1: One-dimensional TDMA access network The allocation of time-slots is based on the traffic parameters, i.e. connection set-up information, and the Quality of Service requirements (QoS) of the connections. Dynamic bandwidth allocation also takes into account the instantaneous traffic-needs of the connections, e.g. the number of waiting cells at the terminals. The MAC-channel consists of the requests of the NTs sent to the LT and the permits broadcast from LT to NTs. In 1998 we reported at the OPNET conference how an OPNET MAC simulator was built for packet-based TDMA networks. This OPNET simulator enabled the study of advanced MAC protocols for e.g. ATM Passive Optical Networks (APON) and Hybrid Fibre Coax (HFC) access networks [1]. TWO-DIMENSIONAL MULTIPLEXING In this section we enlarge the one-dimensional model into a two-dimensional TD-CDMA framework enabling the study of generic MAC protocols for 2D-channels. In the next section we give an overview how the TDMA MAC simulator described in [1] is enhanced with 2Dmultiplexing functionality. 1

2 Code Division Multiple Access (CDMA) is a spread spectrum technique, which is mainly used for modulating signals in a bad communication medium with high noise characteristics and multi-path interference, e.g. the wireless communication channel. Recently the ETSI decided to retain a hybrid TD-CDMA interface as one of the two possible interfaces for the third generation mobile system UMTS (Universal Mobile Tele-communications System). Code axis One Sub-channel An important issue is the interdependency of the subchannels. Indeed, if the sub-channels were completely independent, i.e. any terminal can transmit on any subchannel independent of the events on the other subchannels, the problem simplifies into M-times a 1Dproblem. This is of course equivalent with the study of a one-dimensional TDMA system. However the subchannels are in general not independent due to the multiuser interference of the different sub-channels. For example in a CDMA system, distinct transmitting terminals (on different codes or sub-channels) are disturbing each other due to synchronisation problems on chip level. It means that the overall capacity of the channel decreases with an increasing number of distinct transmitting terminals (see fig. 3). Time axis Physical channel Fast performance loss channel capacity Slow performance loss Figure 2: Two-dimensional TD-CDMA access network The communication channel has a two-dimensional multiplexing structure (fig. 2). The channel is divided into M orthogonal sub-channels (with equal capacity C sub ) according to orthogonal codes. The sub-channel itself is divided into time-slots. The existence of sub-channels, i.e. of a 2D-channel, allows for the simultaneous, collision-free access or transmission of different users. This is the inherent multiple access property of CDMA. A physical channel is a 2D-point (slot, code) and corresponds with one packet or cell. A simple MAC protocol for such systems is the static allocation of sub-channels (or codes) to connections for the whole duration of this connection. The number of allocated sub-channels is proportional to the bandwidthneeds of the connection (e.g. the Peak Cell Rate) divided by the capacity of one sub-channel C sub. A dynamic request-based MAC protocol allocates physical channels based on the traffic parameters, the service requirements and the instantaneous bandwidthneeds of the connections. Contrary to one-dimensional systems, the MAC controller generates each timeslot a multi-permit, i.e. a series of single permits with the same x-coördinate (time-slot number). The multi-permit can either be a series of single permits to different terminals or it can be multiple permits to the same terminal; or a combination of both t# terminals Figure 3: Modelling multi-user interference As a general rule, the performance of the (M-code) 2Dchannel is less than the superposition of M independent 1D-TDMA channels. Modelling the influence of multiuser interference is however a very complicated physical layer issue. It depends on the physical medium, the number of terminals and the network topology, and the design of the physical layer. An optimal design should result in a minimal performance loss leading to almost independent sub-channels. MAC SIMULATOR OBJECT MODEL The OPNET MAC simulator for hybrid TDMA/CDMA access networks is an enhancement of our MAC simulator previously developed for networks with a onedimensional multiplexing structure [1]. This approach was possible because the 1D-TDMA simulator is a generic highly parameterised and modular OPNET program. Indeed, our strategy was to build further on the object-oriented modelling approach inherently present in the OPNET development tool. 2

3 The main building blocks (objects) in the MAC configuration are the bus transmission medium, the LT, the NT and the traffic sources (fig 4). The simulator supports CBR-, ON/OFF- and TCP traffic sources. The sources are implemented as independent nodes or as child processes of the main process model into the NTnode. Figure 4: The Network Model-view of the simulator For a detailed description of the bus model, the source model, the NT and LT state-machines and process models we refer to [1]. Here we limit ourselves to the typical 2D issues and enhancements necessary to support TDMA/CDMA access networks. Figure 5 gives the modular architecture of the MAC layer. It is a (simplified) high-level object model of the MAC OPNET simulator. CAC Static traffic parameters Dynamic traffic parameters Service Class Interface [MAC Transfer Capabilities] MAC Algorithm Permit Generator LT per time slot MAC LAYER Multi-Permit (nt_id, #codes) The NT and LT are the main static object classes. Naturally there are several instances of the NT-class while the LT-class is instantiated only once. The main sub-component of the LT is the MAC algorithm. The Interface of the MAC layer to higher layers is the Service Class Interface. It describes which services the network supports (e.g. POTS, TCP/IP traffic ) and gives a qualitative description of the traffic characteristics and requirements of the services. The static traffic parameters, such as the Peak Cell rate of a connection, serves as input for the MAC algorithm. Analogously to the well-known ATM Transfer Capabilities, the services are called MAC Transfer Capabilities. The interface to the physical layer is the Physical Channel Interface (PCI) module within the MAC Layer. This interface contains all physical layer related data such as the channel capacity, the number of sub-channels and timeslot length. A very important 2D function is the modelling of the multi-user interference. The interdependency of the sub-channels is thus expressed as a well-defined mathematical formula within the PCImodule. The MAC algorithm is responsible for the allocation of bandwidth amongst users in the 2D-plane. Based on the traffic parameters of the connections the MAC algorithm generates each time-slot a multi-permit. The PCIboundary conditions put constraints on this permitgeneration algorithm, reflecting the interdependency of the channels. Two object classes are modelling the dynamics of the system: the MAC_Credit and the MAC_Multi-permit class. A multi-permit object is created each time-slot by the MAC algorithm itself and is broadcasted from the LT to all NTs. An instantiation of MAC_Credit contains the dynamic traffic parameter of a connection, i.e. the number of cells at the NT waiting for transmission. A MAC_Credit object is instantiated by an NT and contains the NT_id and the number of waiting cells (requests). The MAC_Credit is transmitted from NT to LT either by polling or by piggybacking. It is the main dynamical input for the MAC algorithm. MAC Channel UP NT MAC Channel DOWN 2D-Physical Channel Interface For more implementation details about the MAC channel, especially the polling and piggybacking, we refer to [1]. Figure 5. MAC Layer Object Model Architecture 3

4 2D IMPLEMENTATION CONSIDERATIONS There are two main implementation differences between the 1D-TDMA and 2D-TDMA/CDMA access networks. First, the 2D-MAC algorithm generates each time slot a multi-permit object and - second the algorithm must take into account the PCI-boundary conditions Figure 6 illustrates the functional implementation of the MAC algorithm as a 2D-MAC permit-generator. timeslot n get_permit() OPNET LT multi-permit-list External MAC code (algorithm) multi-permit parallel datacell transmission get_pci () available codestructure OPNET NTs OPNET simulator body External PCI code Figure 6. OPNET simulator implementation The OPNET simulator body includes the implementation of the LT-node, the NT-nodes, the traffic sources and all communication aspects between nodes such as datapacket transmission, MAC polling and piggybacking. The OPNET simulator is also responsible for performance measuring and statistics monitoring such as the NT-queue lengths. All these functions are essentially the same for 1D and 2D access systems. The main implementation features and enhancements for networks with a two-dimensional multiplexing structure are the following: A basic timeslot is defined as the duration to send 1 cell with a single code (on one sub-channel). Each timeslot n the MAC simulator triggers the MAC algorithm with the function get_permit (). The algorithm is implemented by external C-code, enabling the simulation of different concrete algorithms. The interface between the simulator and the MAC algorithm is implemented as the argument of the function get_permit (). This argument is a pointer representing a list (or array) of multi-permits. Each entry in the multi-permit list represents one NT_id. A multi-permit is a structure with the following multi-permit (integer) attributes: NT_id QoS_class Number_of_Codes The latter indicates the number of single permits the NT receives during timeslot n, i.e. the number of orthogonal codes allocated to the terminal for the duration of one timeslot. The triggering of the MAC permit generator results in a number of transmission codes suitable for cell transmission by one or more NTs. These multipermits are broadcasted from LT to the NTs. As such each NT may receive from 0 up to M (number of sub-channels) codes. Upon reception of the multipermit the NT transmits simultaneously the appropriate number of cells indicated by the multipermit. No physical layer related stuff is implemented neither in the simulator body nor in the MAC external code. A separate external module represents the Physical Channel Interface modelling amongst other things the multi-user interference. The interface between the MAC permit generator and the PCI-module is a configuration of NTs which should be served during the same timeslot n. In response PCI returns the available code-structure, i.e. the maximum number of codes available per NT in the configuration. The code-structure is such that the multi-user interference caused by the simultaneous transmission is small enough for not causing any cell loss. A simple example is given in the next section. Based on a given available code-structure, the MAC algorithm decides which NTs will effectively be served, also taking into account the traffic parameters and the MAC strategy. Therefore PCI may be triggered several times - with different NTconfigurations - during the same timeslot. 4

5 SIMULATION EXAMPLES In this section we give as an illustration some simulation results for an ATM-based access network with a twodimensional multiplexing structure. Channel characteristics The network has a point to multi-point topology with 30 connected terminals with a maximum distance of 1000m, resulting in a round trip delay of about 10µs. The total channel upstream capacity is 1 Mega bit/s. The channel is divided into 15 sub-channels. The slot size of the TDMA sub-channels is 56 bytes: 1 ATM cell + 3 physical overhead bytes. The capacity reserved for fixed rate polling is 3%. The mutual NT-distances between terminals have no significant influence on the multi-user interference. The number of simultaneous transmitting terminals uniquely determines the interference-degree. In the example it is assumed that the capacity decreases with about 10% per extra transmitting terminal. number of transmitting terminals total number of available subchannels (codes) maximum number codes per terminal >6 0 0 Figure 7. 2D-interference simulation conditions (PCI) Simulations with ON/OFF sources We monitored the performance of several MAC protocols for different traffic scenarios and using different types of sources. A first series of simulation runs have been executed with ON/OFF sources representing best-effort, bursty data-traffic. Non of the connections has a bandwidth guarantee. Using the available OPNET statistics the queue-length is monitored at each terminal. Averaging these queuelength statistics results in a number of global network performance metrics such as the mean and maximum queue-length. The graph in figure 8 gives the mean NTqueue-length as a function of the network load. The latter is determined by the sum of the sustainable cell rate (SCR) of the ON/OFF sources. Mean Queue Size DAdvanced Protocol 1DTDMAStatic Priority 2D Static Priority Protocol 32% 42% 53% 63% 74% 85% 90% 94% Load Figure 8.Mean queue-length performance measurements Two 2D-MAC protocols are compared with the wellknown 1D-Static Priority protocol for TDMA channels (SP-MAC). Of course, the total capacity of the 2D channel is exactly the same as the capacity of the TDMA-channel. Also the packet size and the overhead bytes are taken to be the same in the 1D- and 2Dsimulation scenarios. Clearly the TDMA channel combined with the 1D SP- MAC protocol performs the best, because it does not suffer from multi-user interference. A simple extension of SP-MAC for 2D channels performs very badly (divergence at a load of 50%). This 2D SP-MAC allocates the codes as well as the time-slots in a Round Robin way to requesting terminals. This shows that a more advanced dynamic MAC protocol, taking into account the specific 2D-channel multi-userinterference, is really necessary. Indeed, figure 8 also illustrates that such an advanced dynamic 2D-MAC performs well up to a load of 90% Simulations with CBR sources Figure 9 illustrates some results for simulations with CBR-sources of 64 kbit/s, representing POTSconnections. The transport channel (1Mbit/s) supports in theory at most 15 connections. Simulation results show that the 1D-TDMA Static Priority MAC protocol (explained above) supports 14 connections. 5

6 The 2D-static allocation of sub-channels supports 4 simultaneous connections. This minimum can be calculated taking into account the performance loss given by figure 7. The number of connections supported by dynamic 2D- MAC protocols should be between 4 and 14. Dynamic protocols can support more connections than static ones based on the mechanism of cell clumping. The MAC protocol induces an extra cell-delay allowing the simultaneous transmission of cells by the same terminal. # connections D Advanced Protocol + time-mechanism 2D Static Priority Protocol Static Sub-Channel Allocation induced cell-delay in timeslot units Figure 9. Supported POTS-connections for a given (allowed) cell delay ThecellsarebufferedattheNTandthentransmittedas a group by using several sub-channels simultaneously for the same connection. This mechanism yields less multi-user interference, but at the cost of extra-induced jitter or delay. A supplementary time-delay mechanism is also needed in order to guarantee delay-bounds for all active POTS connections. An advanced 2D protocol can support the same number of connections as the 1D TDMA SP protocol if the allowed jitter is large enough. The 2D-SP protocol however can never support more than 7 connections. This behaviour corresponds with the divergence of the queue-length at a load of 50% measured for ON/OFF sources (fig. 8). Simulations with TCP sources Figure 10 shows the results of simulations with 5 TCP sources. Each source has a (different) minimum bandwidth guarantee (guaranteed frame rate GFRservice). The same MAC protocols are evaluated as in figure 8. However, each of the protocols is now exhibited with an extra mechanism, known as Weighted Round Robin. This mechanism takes into account the minimum bandwidth guarantee of connections and distributes in a fair way the available bandwidth amongst the NTs according to their relative weights. In the simulation example (1,2,4,8,16) gives the relative weight distribution. kbit/s TCP Goodput 1D TDMA Static Priority 2D Static Priority Protocol 2D Advanced Protocol terminal Id Figure 10. TCP-traffic with bandwidth guarantees The 1D-SP-protocol and the 2D-advanced MAC protocol almost perform equally good. The 2D-MAC protocol for example obtains a total TCP-goodput of 707 kbit/s. The maximum obtainable TCP goodput is 714 kbit/s. This theoretical number can be calculated based on the header overheads of the protocol stack TCP/IP/AAL5/ATM. The 2D-SP protocol again performs very badly. The obtained TCP-goodput is only 284 kbit/s, which is even less than 50%. CONCLUSIONS In this paper we described an OPNET simulator suited for the evaluation of MAC protocols for access networks with a two-dimensional multiplexing structure. This has been realised by an upgrade of a simulator for TDMA networks. This approach was possible based on our object-oriented development approach and the inherent object-oriented characteristics of the OPNET simulation tool. REFERENCES [1] MAC Simulator for ATM-based Shared-Medium Access Networks. Kristiaan Venken, Rudy Hoebeke, Frank Ploumen. OPNETWORK Conference

Data Link Layer Technologies

Data Link Layer Technologies Chapter 2.2 La 2 Data Link La Technologies 1 Content Introduction La 2: Frames Error Handling 2 Media Access Control General approaches and terms Aloha Principles CSMA, CSMA/CD, CSMA / CA Master-Slave

More information

CHAPTER TWO LITERATURE REVIEW

CHAPTER TWO LITERATURE REVIEW CHAPTER TWO LITERATURE REVIEW 2.1 Introduction. This chapter provides in detail about the multiple access technologies and the OCDMA system. It starts with a discussion on various existing multiple-access

More information

COMPUTER NETWORK Model Test Paper

COMPUTER NETWORK Model Test Paper Model Test Paper Question no. 1 is compulsory. Attempt all parts. Q1. Each question carries equal marks. (5*5 marks) A) Difference between Transmission Control Protocol (TCP) and User Datagram Protocol.

More information

CABLE NETWORKS INTRODUCTION TO CABLE NETWORK TECHNOLOGIES AND PROTOCOLS

CABLE NETWORKS INTRODUCTION TO CABLE NETWORK TECHNOLOGIES AND PROTOCOLS CABLE NETWORKS INTRODUCTION TO CABLE NETWORK TECHNOLOGIES AND PROTOCOLS Peter R. Egli 1/15 Contents 1. Cable network architecture 2. Relevant cable network standards 3. DOCSIS 2/15 1. Cable Network architecture

More information

Performance of UMTS Radio Link Control

Performance of UMTS Radio Link Control Performance of UMTS Radio Link Control Qinqing Zhang, Hsuan-Jung Su Bell Laboratories, Lucent Technologies Holmdel, NJ 77 Abstract- The Radio Link Control (RLC) protocol in Universal Mobile Telecommunication

More information

Performance Evaluation of Scheduling Mechanisms for Broadband Networks

Performance Evaluation of Scheduling Mechanisms for Broadband Networks Performance Evaluation of Scheduling Mechanisms for Broadband Networks Gayathri Chandrasekaran Master s Thesis Defense The University of Kansas 07.31.2003 Committee: Dr. David W. Petr (Chair) Dr. Joseph

More information

Chapter 1 Introduction

Chapter 1 Introduction Emerging multimedia, high-speed data, and imaging applications are generating a demand for public networks to be able to multiplex and switch simultaneously a wide spectrum of data rates. These networks

More information

SIMON FRASER UNIVERSITY SCHOOL OF ENGINEERING SCIENCE. Spring 2013 ENSC 427: COMMUNICATION NETWORKS. Midterm No. 2(b) Monday, March 18, 2013

SIMON FRASER UNIVERSITY SCHOOL OF ENGINEERING SCIENCE. Spring 2013 ENSC 427: COMMUNICATION NETWORKS. Midterm No. 2(b) Monday, March 18, 2013 SIMON FRASER UNIVERSITY SCHOOL OF ENGINEERING SCIENCE Spring 2013 ENSC 427: COMMUNICATION NETWORKS Midterm No. 2(b) Monday, March 18, 2013 Duration: 50 minutes. Attempt all problems. Questions may not

More information

Link Layer and LANs 안상현서울시립대학교컴퓨터 통계학과.

Link Layer and LANs 안상현서울시립대학교컴퓨터 통계학과. Link Layer and LANs 안상현서울시립대학교컴퓨터 통계학과 ahn@venus.uos.ac.kr Data Link Layer Goals: understand principles behind data link layer services: error detection, correction sharing a broadcast channel: multiple

More information

Gigabit Ethernet Passive Optical Network (GEPON) Tutorial. June 2004

Gigabit Ethernet Passive Optical Network (GEPON) Tutorial. June 2004 Gigabit Ethernet Passive Optical Network (GEPON) Tutorial June 2004 1 Ethernet Passive Optical Network (EPON) Tutorial OVERVIEW... 2 EPON TOPOLOGIES... 4 EPON NETWORK... 4 EPON SYSTEMS... 5 EPON PROTOCOL...

More information

Flexibility Evaluation of Hybrid WDM/TDM PONs

Flexibility Evaluation of Hybrid WDM/TDM PONs Flexibility Evaluation of Hybrid WD/TD PONs Abhishek Dixit, Bart Lannoo, Goutam Das, Didier Colle, ario Pickavet, Piet Demeester Department of Information Technology, Ghent University IBBT, B-9 Gent, Belgium

More information

Asynchronous Transfer Mode (ATM) ATM concepts

Asynchronous Transfer Mode (ATM) ATM concepts Asynchronous Transfer Mode (ATM) Asynchronous Transfer Mode (ATM) is a switching technique for telecommunication networks. It uses asynchronous time-division multiplexing,[1][2] and it encodes data into

More information

Multiple Access Techniques for epon. Glen Kramer

Multiple Access Techniques for epon. Glen Kramer Multiple Access Techniques for epon len Kramer glen.kramer@alloptic.com IEEE 802.3 EFM Study roup Meeting, March 2001 First Mile LAN HAVE Non-cooperative (independent) users Non-uniform traffic: most traffic

More information

Modeling a MAC Scheduler: Experiences with a DOCSIS Cable

Modeling a MAC Scheduler: Experiences with a DOCSIS Cable Modeling a MAC Scheduler: Experiences with a DOCSIS Cable Network Simulation Model Jim Martin Department of Computer Science Clemson University jim.martin@cs.clemson.edu Phone: 864 656 4529 Fax: 864 656

More information

different problems from other networks ITU-T specified restricted initial set Limited number of overhead bits ATM forum Traffic Management

different problems from other networks ITU-T specified restricted initial set Limited number of overhead bits ATM forum Traffic Management Traffic and Congestion Management in ATM 3BA33 David Lewis 3BA33 D.Lewis 2007 1 Traffic Control Objectives Optimise usage of network resources Network is a shared resource Over-utilisation -> congestion

More information

The Link Layer and LANs. Chapter 6: Link layer and LANs

The Link Layer and LANs. Chapter 6: Link layer and LANs The Link Layer and LANs EECS3214 2018-03-14 4-1 Chapter 6: Link layer and LANs our goals: understand principles behind link layer services: error detection, correction sharing a broadcast channel: multiple

More information

Lecture 9. Quality of Service in ad hoc wireless networks

Lecture 9. Quality of Service in ad hoc wireless networks Lecture 9 Quality of Service in ad hoc wireless networks Yevgeni Koucheryavy Department of Communications Engineering Tampere University of Technology yk@cs.tut.fi Lectured by Jakub Jakubiak QoS statement

More information

Goals. Fundamentals of Network Media. More topics. Topics. Multiple access communication. Multiple access solutions

Goals. Fundamentals of Network Media. More topics. Topics. Multiple access communication. Multiple access solutions Fundamentals of Network Media Local Area Networks Ursula Holmström Goals Learn the basic concepts related to LAN technologies, for example use of shared media medium access control topologies Know the

More information

Media Access Control Protocol Based on DOCSIS 1.1

Media Access Control Protocol Based on DOCSIS 1.1 Document Number: IEEE 802.16mp-99/16 Title: Media Access Control Protocol Based on DOCSIS 1.1 Date Submitted: 1999-11-08 Source: Karl Stambaugh Voice: 480-441-7842 Motorola Inc. Fax: 480-675-2116 8220

More information

ETSI Project BRAN Hiperlan Type 2 for IEEE 1394 Applications System Overview

ETSI Project BRAN Hiperlan Type 2 for IEEE 1394 Applications System Overview ETSI Project BRAN Hiperlan Type 2 for IEEE 1394 Applications System Overview Source : Jamshid Khun Jush (Ericsson) (THOMSON multimedia) 1 HIPERLAN/2 Standard A new standard developed by the ETSI Project

More information

Chapter 5 Link Layer and LANs

Chapter 5 Link Layer and LANs Chapter 5 Link Layer and LANs Computer Networking: A Top Down Approach 4 th edition. Jim Kurose, Keith Ross Addison-Wesley, July 2007. All material copyright 1996-2007 J.F Kurose and K.W. Ross, All Rights

More information

MAC Protocol Proposal for Fixed BWA Networks Based on DOCSIS. Re: Medium Access Control Task Group Call for Contributions Session #4

MAC Protocol Proposal for Fixed BWA Networks Based on DOCSIS. Re: Medium Access Control Task Group Call for Contributions Session #4 Project Title Date Submitted IEEE 802.16 Broadband Wireless Access Working Group MAC Protocol Proposal for Fixed BWA Networks Based on DOCSIS 1999-10-29 Source Phil Guillemette SpaceBridge Networks Corporation

More information

ACLASS of users that has drawn much attention over the

ACLASS of users that has drawn much attention over the 296 IEEE TRANSACTIONS ON BROADCASTING, VOL. 56, NO. 3, SEPTEMBER 2010 Statistical Multiplexing of Upstream Transmissions in DOCSIS Cable Networks César Heyaime-Duvergé and Vasant K. Prabhu, Life Fellow,

More information

Implementation of WiFiRe PHY Sectorization in OPNET

Implementation of WiFiRe PHY Sectorization in OPNET P Sreedhar Reddy Roll No. 06305024 24th July, 2007 Under the Guidance Of Prof. Sridhar Iyer Department Of Computer Science and Engineering Indian Institute Of Technology, Bombay Outline WiFiRe overview.

More information

A NOVEL DECENTRALIZED ETHERNET-BASED PASSIVE OPTICAL NETWORK ARCHITECTURE

A NOVEL DECENTRALIZED ETHERNET-BASED PASSIVE OPTICAL NETWORK ARCHITECTURE A NOVEL DECENTRALIZED ETHERNET-BASED PASSIVE OPTICAL NETWORK ARCHITECTURE A. Hadjiantonis, S. Sherif, A. Khalil, T. Rahman, G. Ellinas, M. F. Arend, and M. A. Ali, Department of Electrical Engineering,

More information

Chapter 6 The Link Layer and LANs

Chapter 6 The Link Layer and LANs Chapter 6 The Link Layer and LANs A note on the use of these Powerpoint slides: We re making these slides freely available to all (faculty, students, readers). They re in PowerPoint form so you see the

More information

CSC 401 Data and Computer Communications Networks

CSC 401 Data and Computer Communications Networks CSC 401 Data and Computer Communications Networks Link Layer: Intro, Errors, Multiple Access Sec 6.1, 6.2, 6.3 Prof. Lina Battestilli Fall 2017 Chapter 6: Link layer Goals: understand principles behind

More information

Module objectives. Integrated services. Support for real-time applications. Real-time flows and the current Internet protocols

Module objectives. Integrated services. Support for real-time applications. Real-time flows and the current Internet protocols Integrated services Reading: S. Keshav, An Engineering Approach to Computer Networking, chapters 6, 9 and 4 Module objectives Learn and understand about: Support for real-time applications: network-layer

More information

Cover Page. Performance Evaluation of the DOCSIS 1.1 MAC Protocol According to the Structure of a MAP Message

Cover Page. Performance Evaluation of the DOCSIS 1.1 MAC Protocol According to the Structure of a MAP Message Cover Page 1. Title of Paper Performance Evaluation of the DOCSIS 1.1 MAC Protocol According to the Structure of a MAP Message 2. Name of the authors, Sung-Han Park, and Jae-Hyun Kim 3. About authors Affiliation

More information

MPEG4 VIDEO OVER PACKET SWITCHED CONNECTION OF THE WCDMA AIR INTERFACE

MPEG4 VIDEO OVER PACKET SWITCHED CONNECTION OF THE WCDMA AIR INTERFACE MPEG4 VIDEO OVER PACKET SWITCHED CONNECTION OF THE WCDMA AIR INTERFACE Jamil Y. Khan 1, Pratik Das 2 School of Electrical Engineering and Computer Science, University of Newcastle, Callaghan, NSW 238,

More information

PON Functional Requirements: Services and Performance

PON Functional Requirements: Services and Performance PON Functional Requirements: Services and Performance Dolors Sala Ajay Gummalla {dolors,ajay}@broadcom.com July 10-12, 2001 Ethernet in the First Mile Study Group 1 July 2001 Objective Outline the PON-specific

More information

CS 716: Introduction to communication networks. - 8 th class; 17 th Aug Instructor: Sridhar Iyer IIT Bombay

CS 716: Introduction to communication networks. - 8 th class; 17 th Aug Instructor: Sridhar Iyer IIT Bombay CS 716: Introduction to communication networks - 8 th class; 17 th Aug 2011 Instructor: Sridhar Iyer IIT Bombay Key points to consider for MAC Types/Modes of communication: Although the medium is shared,

More information

Converged Networks. Objectives. References

Converged Networks. Objectives. References Converged Networks Professor Richard Harris Objectives You will be able to: Discuss what is meant by convergence in the context of current telecommunications terminology Provide a network architecture

More information

Internetworking Part 1

Internetworking Part 1 CMPE 344 Computer Networks Spring 2012 Internetworking Part 1 Reading: Peterson and Davie, 3.1 22/03/2012 1 Not all networks are directly connected Limit to how many hosts can be attached Point-to-point:

More information

Unit 2 Packet Switching Networks - II

Unit 2 Packet Switching Networks - II Unit 2 Packet Switching Networks - II Dijkstra Algorithm: Finding shortest path Algorithm for finding shortest paths N: set of nodes for which shortest path already found Initialization: (Start with source

More information

ECSE-4670: Computer Communication Networks (CCN) Informal Quiz 3

ECSE-4670: Computer Communication Networks (CCN) Informal Quiz 3 ECSE-4670: Computer Communication Networks (CCN) Informal Quiz 3 : shivkuma@ecse.rpi.edu Biplab Sikdar: sikdab@rpi.edu 1 T F Slotted ALOHA has improved utilization since the window of vulnerability is

More information

Lecture 4: Wireless MAC Overview. Hung-Yu Wei National Taiwan University

Lecture 4: Wireless MAC Overview. Hung-Yu Wei National Taiwan University Lecture 4: Wireless MAC Overview Hung-Yu Wei National Taiwan University Medium Access Control Topology 3 Simplex and Duplex 4 FDMA TDMA CDMA DSSS FHSS Multiple Access Methods Notice: CDMA and spread spectrum

More information

Performance Evaluation of WiFiRe using OPNET

Performance Evaluation of WiFiRe using OPNET Performance Evaluation of WiFiRe using OPNET Under the guidance of: Prof. Sridhar Iyer and Prof. Varsha Apte Dept. of CSE (KReSIT) July 16, 2007 Goal Goal Building. Finding minimum slot length to support

More information

Subject: Adhoc Networks

Subject: Adhoc Networks ISSUES IN AD HOC WIRELESS NETWORKS The major issues that affect the design, deployment, & performance of an ad hoc wireless network system are: Medium Access Scheme. Transport Layer Protocol. Routing.

More information

Local Area Networks NETW 901

Local Area Networks NETW 901 Local Area Networks NETW 901 Lecture 4 Wireless LAN Course Instructor: Dr.-Ing. Maggie Mashaly maggie.ezzat@guc.edu.eg C3.220 1 Contents What is a Wireless LAN? Applications and Requirements Transmission

More information

University of Agder Department of Information and Communication Technology EXAM

University of Agder Department of Information and Communication Technology EXAM University of Agder Department of Information and Communication Technology EXAM Course code: IKT 444 Course title: Mobile Communication Networks Date: Tuesday, 6 th December 2016 Duration: 09:00 13:00

More information

RED behavior with different packet sizes

RED behavior with different packet sizes RED behavior with different packet sizes Stefaan De Cnodder, Omar Elloumi *, Kenny Pauwels Traffic and Routing Technologies project Alcatel Corporate Research Center, Francis Wellesplein, 1-18 Antwerp,

More information

Packet multiple access and the Aloha protocol

Packet multiple access and the Aloha protocol Packet multiple access and the Aloha protocol Massachusetts Institute of Technology Department of Aeronautics and Astronautics Slide 1 Packet Multiple Access PMA SHARED UPLINK TERMINAL TERMINAL APPL TRANS

More information

Initial PHY Layer System Proposal for Sub 11 GHz BWA

Initial PHY Layer System Proposal for Sub 11 GHz BWA Initial PHY Layer System Proposal for Sub 11 GHz BWA Document Number: 802.16.3p-00/40 Date Submitted: 2000-11-08 Source: Anader Benyamin-Seeyar Voice: (514) 822-2014 Harris Corporation Inc. Fax: (514)

More information

Fixed Innovative Bandwidth Utilization in TDM EPON

Fixed Innovative Bandwidth Utilization in TDM EPON 634 Fixed Innovative Bandwidth Utilization in TDM EPON Muhammad Bilal 1, Muhammad Awais 2, Muhammad Irfan 3, Ammar Rafiq 4 1 Department of Computer Science, NFC Institute of Engineering & Fertilizer Research,

More information

Wireless Communications

Wireless Communications 4. Medium Access Control Sublayer DIN/CTC/UEM 2018 Why do we need MAC for? Medium Access Control (MAC) Shared medium instead of point-to-point link MAC sublayer controls access to shared medium Examples:

More information

Advanced Computer Networks

Advanced Computer Networks Advanced Computer Networks QoS in IP networks Prof. Andrzej Duda duda@imag.fr Contents QoS principles Traffic shaping leaky bucket token bucket Scheduling FIFO Fair queueing RED IntServ DiffServ http://duda.imag.fr

More information

CHAPTER 2 - NETWORK DEVICES

CHAPTER 2 - NETWORK DEVICES CHAPTER 2 - NETWORK DEVICES TRUE/FALSE 1. Repeaters can reformat, resize, or otherwise manipulate the data packet. F PTS: 1 REF: 30 2. Because active hubs have multiple inbound and outbound connections,

More information

Residential Broadband (RBB)

Residential Broadband (RBB) Residential Broadband (RBB) Professor of Computer and Information Science Columbus, OH 43210 Jain@CIS.Ohio-State.Edu http://www.cis.ohio-state.edu/~jain/ 1 Service Aspects and Applications (SAA) Voice

More information

Simulation Study for a Broadband Multimedia VSAT Network

Simulation Study for a Broadband Multimedia VSAT Network Simulation Study for a Broadband Multimedia Yi Qian, Rose Hu, and Hosame Abu-Amara Nortel s 2201 Lakeside Blvd., Mail Stop 992-02-E70 Richardson, Texas 75082, USA Phone: 972-685-7264 Fax: 972-685-3463

More information

Chapter 5: Link layer

Chapter 5: Link layer Chapter 5: Link layer our goals: v understand principles behind link layer services: error detection, correction sharing a broadcast channel: multiple access link layer addressing local area networks:

More information

Network management and QoS provisioning - revise. When someone have to share the same resources is possible to consider two particular problems:

Network management and QoS provisioning - revise. When someone have to share the same resources is possible to consider two particular problems: Revise notes Multiplexing & Multiple Access When someone have to share the same resources is possible to consider two particular problems:. multiplexing;. multiple access. The first one is a centralized

More information

SIMULATION FRAMEWORK MODELING

SIMULATION FRAMEWORK MODELING CHAPTER 5 SIMULATION FRAMEWORK MODELING 5.1 INTRODUCTION This chapter starts with the design and development of the universal mobile communication system network and implementation of the TCP congestion

More information

Lecture 7: Flow & Media Access Control"

Lecture 7: Flow & Media Access Control Lecture 7: Flow & Media Access Control" CSE 123: Computer Networks Alex C. Snoeren HW 2 due next Wednesday! Lecture 7 Overview" Flow control Go-back-N Sliding window Methods to share physical media: multiple

More information

FAIR DELAY OPTIMIZATION-BASED RESOURCE ALLOCATION ALGORITHM FOR VIDEO TRAFFIC OVER WIRELESS MULTIMEDIA SYSTEM

FAIR DELAY OPTIMIZATION-BASED RESOURCE ALLOCATION ALGORITHM FOR VIDEO TRAFFIC OVER WIRELESS MULTIMEDIA SYSTEM FAIR DELAY OPTIMIZATION-BASED RESOURCE ALLOCATION ALGORITHM FOR VIDEO TRAFFIC OVER WIRELESS MULTIMEDIA SYSTEM 1 M. R. M. Rizk, Senior Member, IEEE, 2 M. I. Dessouky, 3 Sami A. El-Dolil, and 4 Mohammed

More information

CS519: Computer Networks

CS519: Computer Networks Lets start at the beginning : Computer Networks Lecture 1: Jan 26, 2004 Intro to Computer Networking What is a for? To allow two or more endpoints to communicate What is a? Nodes connected by links Lets

More information

Preliminary Performance Evaluation of QoS in DOCSIS 1.1

Preliminary Performance Evaluation of QoS in DOCSIS 1.1 The University of Kansas Technical Report Preliminary Performance Evaluation of QoS in DOCSIS 1.1 Gayathri Chandrasekaran, Mohammed Hawa and David W. Petr ITTC-FY2003-TR-22736-01 January 2003 Sponsor:

More information

CS 455/555 Intro to Networks and Communications. Link Layer

CS 455/555 Intro to Networks and Communications. Link Layer CS 455/555 Intro to Networks and Communications Link Layer Dr. Michele Weigle Department of Computer Science Old Dominion University mweigle@cs.odu.edu http://www.cs.odu.edu/~mweigle/cs455-s13 1 Link Layer

More information

Data Link Layer: Collisions

Data Link Layer: Collisions Data Link Layer: Collisions 1 Multiple Access Data Link layer divided into two sublayers. The upper sublayer is responsible for datalink control, The lower sublayer is responsible for resolving access

More information

CSMA based Medium Access Control for Wireless Sensor Network

CSMA based Medium Access Control for Wireless Sensor Network CSMA based Medium Access Control for Wireless Sensor Network H. Hoang, Halmstad University Abstract Wireless sensor networks bring many challenges on implementation of Medium Access Control protocols because

More information

Scheduling. Scheduling algorithms. Scheduling. Output buffered architecture. QoS scheduling algorithms. QoS-capable router

Scheduling. Scheduling algorithms. Scheduling. Output buffered architecture. QoS scheduling algorithms. QoS-capable router Scheduling algorithms Scheduling Andrea Bianco Telecommunication Network Group firstname.lastname@polito.it http://www.telematica.polito.it/ Scheduling: choose a packet to transmit over a link among all

More information

Scheduling of real-time traffic in IEEE networks

Scheduling of real-time traffic in IEEE networks Scheduling of real-time traffic in IEEE 802.11 networks Afonso, José A. Neves, Joaquim E. Universidade do Minho, Departamento de Electrónica Industrial Campus de Azurém, 4800-058 Guimarães, ortugal jose.afonso@dei.uminho.pt

More information

WSN NETWORK ARCHITECTURES AND PROTOCOL STACK

WSN NETWORK ARCHITECTURES AND PROTOCOL STACK WSN NETWORK ARCHITECTURES AND PROTOCOL STACK Sensing is a technique used to gather information about a physical object or process, including the occurrence of events (i.e., changes in state such as a drop

More information

Topics. Link Layer Services (more) Link Layer Services LECTURE 5 MULTIPLE ACCESS AND LOCAL AREA NETWORKS. flow control: error detection:

Topics. Link Layer Services (more) Link Layer Services LECTURE 5 MULTIPLE ACCESS AND LOCAL AREA NETWORKS. flow control: error detection: 1 Topics 2 LECTURE 5 MULTIPLE ACCESS AND LOCAL AREA NETWORKS Multiple access: CSMA/CD, CSMA/CA, token passing, channelization LAN: characteristics, i basic principles i Protocol architecture Topologies

More information

RTT TECHNOLOGY TOPIC October 1998 WCDMA

RTT TECHNOLOGY TOPIC October 1998 WCDMA RTT TECHNOLOGY TOPIC October 1998 WCDMA In our last hot topic, we reviewed the future positioning of TD-CDMA including the rationale of taking the existing DECT time multiplexing structure to front end

More information

. 14 Byte for Acks. Due to this fact, the overhead is more relevant if the data contained in packets is sent to high rates:

. 14 Byte for Acks. Due to this fact, the overhead is more relevant if the data contained in packets is sent to high rates: QoS in IEEE 802.11 Issues Some issues are important for quality of service: the first one mentioned is the difference of performances expired by nodes based on their position in the network. Indeed, considering

More information

A hybrid medium access control for convergence of broadband wireless and wireline ATM networks

A hybrid medium access control for convergence of broadband wireless and wireline ATM networks Downloaded from orbit.dtu.dk on: Oct 07, 2018 A hybrid medium access control for convergence of broadband wireless and wireline ATM networks Liu, Hong; Gliese, Ulrik Bo; Dittmann, Lars Published in: Proceeding

More information

CONTENTION RESOLUTION ALGORITHMS FOR CATV NETWORKS BASED ON THE DVB/DAVIC PROTOCOL

CONTENTION RESOLUTION ALGORITHMS FOR CATV NETWORKS BASED ON THE DVB/DAVIC PROTOCOL CONTENTION RESOLUTION ALGORITHMS FOR CATV NETWORKS BASED ON THE DVB/DAVIC PROTOCOL V. Rangel 1, R. Edwards 1, and K. Schunke 2 1 C4MCR, University of Sheffield, UK and 2 ICT, Braunschweig Technical University,

More information

Lecture 19. Principles behind data link layer services Framing Multiple access protocols

Lecture 19. Principles behind data link layer services Framing Multiple access protocols Link Layer Lecture 19 Principles behind data link layer services Framing Multiple access protocols ALOHA *The slides are adapted from ppt slides (in substantially unaltered form) available from Computer

More information

Medium Access Control. MAC protocols: design goals, challenges, contention-based and contention-free protocols

Medium Access Control. MAC protocols: design goals, challenges, contention-based and contention-free protocols Medium Access Control MAC protocols: design goals, challenges, contention-based and contention-free protocols 1 Why do we need MAC protocols? Wireless medium is shared Many nodes may need to access the

More information

Chapter 5. Voice Network Concepts. Voice Network Concepts. Voice Communication Concepts and Technology

Chapter 5. Voice Network Concepts. Voice Network Concepts. Voice Communication Concepts and Technology Chapter 5 Voice Communication Concepts and Technology Voice Network Concepts Telephone switchboard - Circa 1898 Voice Network Concepts Telephone calls are connected from source via circuit switching. Circuit

More information

CSC 4900 Computer Networks: The Link Layer

CSC 4900 Computer Networks: The Link Layer CSC 4900 Computer Networks: The Link Layer Professor Henry Carter Fall 2017 Last Time We talked about intra-as routing protocols: Which routing algorithm is used in RIP? OSPF? What techniques allow OSPF

More information

Objectives. Learn how computers are connected. Become familiar with different types of transmission media

Objectives. Learn how computers are connected. Become familiar with different types of transmission media Objectives Learn how computers are connected Become familiar with different types of transmission media Learn the differences between guided and unguided media Learn how protocols enable networking 2 Objectives

More information

Data and Computer Communications. Chapter 2 Protocol Architecture, TCP/IP, and Internet-Based Applications

Data and Computer Communications. Chapter 2 Protocol Architecture, TCP/IP, and Internet-Based Applications Data and Computer Communications Chapter 2 Protocol Architecture, TCP/IP, and Internet-Based s 1 Need For Protocol Architecture data exchange can involve complex procedures better if task broken into subtasks

More information

Mobile Communications Chapter 3 : Media Access

Mobile Communications Chapter 3 : Media Access Mobile Communications Chapter 3 : Media Access 2. Motivation 3. SDMA, FDMA, TDMA 1. Aloha and contention based schemes 4. Reservation schemes 5. Collision avoidance, MACA 6. Polling CDMA (Lecture 6) Prof.

More information

Exercises TCP/IP Networking With Solutions

Exercises TCP/IP Networking With Solutions Exercises TCP/IP Networking With Solutions Jean-Yves Le Boudec Fall 2009 3 Module 3: Congestion Control Exercise 3.2 1. Assume that a TCP sender, called S, does not implement fast retransmit, but does

More information

Wireless Local Area Networks (WLANs)) and Wireless Sensor Networks (WSNs) Computer Networks: Wireless Networks 1

Wireless Local Area Networks (WLANs)) and Wireless Sensor Networks (WSNs) Computer Networks: Wireless Networks 1 Wireless Local Area Networks (WLANs)) and Wireless Sensor Networks (WSNs) Computer Networks: Wireless Networks 1 Wireless Local Area Networks The proliferation of laptop computers and other mobile devices

More information

CS 4453 Computer Networks Winter

CS 4453 Computer Networks Winter CS 4453 Computer Networks Chapter 2 OSI Network Model 2015 Winter OSI model defines 7 layers Figure 1: OSI model Computer Networks R. Wei 2 The seven layers are as follows: Application Presentation Session

More information

The MAC layer in wireless networks

The MAC layer in wireless networks The MAC layer in wireless networks The wireless MAC layer roles Access control to shared channel(s) Natural broadcast of wireless transmission Collision of signal: a /space problem Who transmits when?

More information

Performance Evaluation and Design Improvement of Media Access Control Protocols for Broadband Wireless Local Loop

Performance Evaluation and Design Improvement of Media Access Control Protocols for Broadband Wireless Local Loop Performance Evaluation and Design Improvement of Media Access Control Protocols for Broadband Wireless Local Loop Mihir Thaker Masters Thesis Presentation Department of Electrical Engineering and Computer

More information

Adaptive Resource Allocation Mechanisms for Support of Data Traffic over ATM Satellite Networks Introduction The Dynamic Flow Control Scheme

Adaptive Resource Allocation Mechanisms for Support of Data Traffic over ATM Satellite Networks Introduction The Dynamic Flow Control Scheme Adaptive Resource Allocation Mechanisms for Support of Traffic over ATM Satellite Networks Tanja Lang and Nirmala Shenoy, Co-operative Research Centre for Satellite Systems, Institute for Telecommunications

More information

High efficiency MAC protocols for IoT: iqueue-mac and implementation on RIOT OS

High efficiency MAC protocols for IoT: iqueue-mac and implementation on RIOT OS High efficiency MAC protocols for IoT: iqueue-mac and implementation on RIOT OS Ye-Qiong SONG LORIA INRIA Université de Lorraine as part of ADT RIOT RIOT Siminar, Inria Paris, April 13 th 2017 1 Outline

More information

Homework 1. Question 1 - Layering. CSCI 1680 Computer Networks Fonseca

Homework 1. Question 1 - Layering. CSCI 1680 Computer Networks Fonseca CSCI 1680 Computer Networks Fonseca Homework 1 Due: 27 September 2012, 4pm Question 1 - Layering a. Why are networked systems layered? What are the advantages of layering? Are there any disadvantages?

More information

Physical Layer. Medium Access Links and Protocols. Point-to-Point protocols. Modems: Signaling. Modems Signaling. Srinidhi Varadarajan

Physical Layer. Medium Access Links and Protocols. Point-to-Point protocols. Modems: Signaling. Modems Signaling. Srinidhi Varadarajan P Physical Layer Srinidhi Varadarajan Medium Access Links and Protocols Three types of links : point-to-point (single wire, e.g. PPP, SLIP) broadcast (shared wire or medium; e.g, Ethernet, Wavelan, etc.)

More information

Getting Connected (Chapter 2 Part 4) Networking CS 3470, Section 1 Sarah Diesburg

Getting Connected (Chapter 2 Part 4) Networking CS 3470, Section 1 Sarah Diesburg Getting Connected (Chapter 2 Part 4) Networking CS 3470, Section 1 Sarah Diesburg Five Problems Encoding/decoding Framing Error Detection Error Correction Media Access Five Problems Encoding/decoding Framing

More information

1/29/2008. From Signals to Packets. Lecture 6 Datalink Framing, Switching. Datalink Functions. Datalink Lectures. Character and Bit Stuffing.

1/29/2008. From Signals to Packets. Lecture 6 Datalink Framing, Switching. Datalink Functions. Datalink Lectures. Character and Bit Stuffing. /9/008 From Signals to Packets Lecture Datalink Framing, Switching Peter Steenkiste Departments of Computer Science and Electrical and Computer Engineering Carnegie Mellon University Analog Signal Digital

More information

The Effect of Code-Multiplexing on the High Speed Downlink Packet Access (HSDPA) in a WCDMA Network

The Effect of Code-Multiplexing on the High Speed Downlink Packet Access (HSDPA) in a WCDMA Network The Effect of Code-Multiplexing on the High Speed Downlink Packet Access (HSDPA) in a WCDMA Network Raymond Kwan, Peter H. J. Chong 2, Eeva Poutiainen, Mika Rinne Nokia Research Center, P.O. Box 47, FIN-45

More information

CHAPTER 7 MAC LAYER PROTOCOLS. Dr. Bhargavi Goswami Associate Professor & Head Department of Computer Science Garden City College

CHAPTER 7 MAC LAYER PROTOCOLS. Dr. Bhargavi Goswami Associate Professor & Head Department of Computer Science Garden City College CHAPTER 7 MAC LAYER PROTOCOLS Dr. Bhargavi Goswami Associate Professor & Head Department of Computer Science Garden City College MEDIUM ACCESS CONTROL - MAC PROTOCOLS When the two stations transmit data

More information

Asynchronous Transfer Mode

Asynchronous Transfer Mode ATM Asynchronous Transfer Mode CS420/520 Axel Krings Page 1 Protocol Architecture (diag) CS420/520 Axel Krings Page 2 1 Reference Model Planes User plane Provides for user information transfer Control

More information

A QoS Control Scheme for Voice and Data Services in cdma2000 System

A QoS Control Scheme for Voice and Data Services in cdma2000 System A QoS Control Scheme for Voice and Data Services in cdma System Omneya Issa and Jean-Charles Grégoire INRS-EMT, Place Bonaventure, 8, de la Gauchetière Ouest, bureau 69 Montréal (Québec), H5A 1K6 Canada

More information

Tutorial 9 : TCP and congestion control part I

Tutorial 9 : TCP and congestion control part I Lund University ETSN01 Advanced Telecommunication Tutorial 9 : TCP and congestion control part I Author: Antonio Franco Course Teacher: Emma Fitzgerald January 27, 2015 Contents I Before you start 3 II

More information

Network protocols and. network systems INTRODUCTION CHAPTER

Network protocols and. network systems INTRODUCTION CHAPTER CHAPTER Network protocols and 2 network systems INTRODUCTION The technical area of telecommunications and networking is a mature area of engineering that has experienced significant contributions for more

More information

Multimedia Systems. Networks WS 2009/2010

Multimedia Systems. Networks WS 2009/2010 Multimedia Systems WS 2009/2010 Networks Prof. Dr. Paul Müller University of Kaiserslautern, Germany Integrated Communication Systems Lab Email: pmueller@informatik.uni-kl.de 1 Outline Network basics for

More information

COLLEGE OF ENGINEERING DEPARTMENT OF INFORMATION TECHNOLOGY QUESTION BANK UNIT-1 WIRELESS COMMUNICATION FUNDAMENTALS

COLLEGE OF ENGINEERING DEPARTMENT OF INFORMATION TECHNOLOGY QUESTION BANK UNIT-1 WIRELESS COMMUNICATION FUNDAMENTALS KINGS COLLEGE OF ENGINEERING DEPARTMENT OF INFORMATION TECHNOLOGY QUESTION BANK SUBJECT CODE& NAME: IT1403 MOBILE COMPUTING YEAR / SEM : IV / VIII UNIT-1 WIRELESS COMMUNICATION FUNDAMENTALS PART A (2MARKS)

More information

Computer Networks Robin Sharp Informatics and Mathematical Modelling Technical University of Denmark Phone: (+45)

Computer Networks Robin Sharp Informatics and Mathematical Modelling Technical University of Denmark Phone: (+45) Computer Networks Robin Sharp Informatics and Mathematical Modelling Technical University of Denmark Phone: (+45) 4525 3749 e-mail: robin@imm.dtu.dk Basic Network Concepts A computer network is a set of

More information

CS 856 Latency in Communication Systems

CS 856 Latency in Communication Systems CS 856 Latency in Communication Systems Winter 2010 Latency Challenges CS 856, Winter 2010, Latency Challenges 1 Overview Sources of Latency low-level mechanisms services Application Requirements Latency

More information

Chapter 8: Multiplexing

Chapter 8: Multiplexing NET 456 High Speed Networks Chapter 8: Multiplexing Dr. Anis Koubaa Reformatted slides from textbook Data and Computer Communications, Ninth Edition by William Stallings, 1 (c) Pearson Education - Prentice

More information

Distributed Video Systems Chapter 4 Network Technologies

Distributed Video Systems Chapter 4 Network Technologies Distributed Video Systems Chapter 4 Network Technologies Jack Yiu-bun Lee Department of Information Engineering The Chinese University of Hong Kong Contents 4.1 Introduction 4.2 Multiple Access Protocols

More information

Performance Comparison of Reservation MAC Protocols for Broadband Powerline Communications Networks

Performance Comparison of Reservation MAC Protocols for Broadband Powerline Communications Networks Performance Comparison of Reservation MAC Protocols for Broadband Powerline Communications Networks Halid Hrasnica *, Abdelfatteh Haidine, Ralf Lehnert Chair for Telecommunications, Dresden University

More information

CDMA-Based MAC Protocol for Wireless Ad Hoc Networks

CDMA-Based MAC Protocol for Wireless Ad Hoc Networks CDMA-Based MAC Protocol for Wireless Ad Hoc Networks Alaa Muqattash and Marwan Krunz Presented by: Habibullah Pagarkar for 600.647-Advanced Topics in Wireless Networks. JHU. Spring 04 Today s Presentation

More information