Wireless Access. Practice 15 November 14, 2018
|
|
- Hector Day
- 5 years ago
- Views:
Transcription
1 Practice 15 November 14, 2018 Wireless Access Graduate course in Telecommunications School of Engineering University of Rome La Sapienza Rome, Italy
2 Token ring queueing time analysis with OMNeT++
3 Goal Verify the following relation for the time in queue in a token ring network: W = R + Y 1 ρ = λe X ρ = λe X ρ ( )v ( )v ( ) + 1 ρ 2( 1 ρ) + m 1 2( 1 ρ) = ( )v ( ) + m ρ 2( 1 ρ) by using token ring for OMNeT++, available at: _files.zip and considering the traffic scenarios and settings presented in the next slide 3
4 Traffic scenarios and settings Traffic scenarios: Low traffic: Packet interarrival time at each node set to 100 times the average packet duration High traffic: Packet interarrival time at each node set to 20 times the average packet duration Settings: Parameter Packet size in bytes: Value Transmission bit rate 4 Mb/s Randomly distributed according to a uniform distribution in the interval [1000, 4000]; Number of stations {5,10,15,20,50} Propagation delay 10-6 s 4
5 A network of m nodes Token ring in OMNeT++ Each node is a compound module organized as follows: Generates packets Generates MAC frames Generates and handles token Keeps packets in queue Receives packets and evaluates statistics 5
6 Token ring in OMNeT++ The MAC module keeps track of the following variables (in.vec files): Queueing time (s): the time spent by each packet in queue, measured in seconds Queue length (packets): the length of the queue as a function of time, measured in packets Queue length (bytes): the length of the queue as a function of time, measured in bytes Note that the.vec file for a given run will have a value of the above variables for each node (so, 5 values for a network of 5 nodes, and so on) We will be interested in the average of the mean value of one of the above variables (guess which one ) 6
7 MAC Frame generation: Token ring in OMNeT++ PL Generator PL=8*uniform(1000, 4000) bits HL PL MAC HL=8*21=168 bits Token generation: TL MAC TL=8*3=24 bits The token is generated by node 0 7
8 Token ring in OMNeT++ Token handling: When a node receives the token it keeps it for a maximum time of THT seconds The node (at MAC layer) keeps on transmitting packets in the transmit queue until either of the following two conditions applies: a) The packet queue is empty b) The transmission time of the next packet in queue would not fit within the time THT When either a) or b) is verified the token is released Note that a node that has no packets to send forwards the token immediately to the next node in the ring Queue handling: when the transmit queue is full packets coming from the Generator are dropped 8
9 Evaluation of time in queue based on theory We will proceed by following three steps: 1. Determine the expression of the parameters determining W 2. Determine the value of the parameters 3. Evaluate W by substituting in its formula the values of the parameters 9
10 Evaluation of time in queue in OMNeT++ We will proceed by following three steps: 1. Adapt the OMNeT++ model in order to meet the assumptions made in deriving the theoretical formula for W 2. Carry out simulations for several values of m (at least in one traffic scenario) 3. Compare the values of the average time in queue recorded by the simulator with the theoretical value of W 10
Lecture 9 November 12, Wireless Access. Graduate course in Communications Engineering. University of Rome La Sapienza. Rome, Italy
Lecture 9 November 12, 2018 Wireless Access Graduate course in Communications Engineering University of Rome La Sapienza Rome, Italy 2018-2019 Medium Access Control Scheduled access Classification of wireless
More informationLecture 12 December 04, Wireless Access. Graduate course in Communications Engineering. University of Rome La Sapienza. Rome, Italy
Lecture 12 December 04, 2017 Wireless Access Graduate course in Communications Engineering University of Rome La Sapienza Rome, Italy 2017-2018 Random Medium Access Control Part II - CSMA and Collision
More informationThis formula shows that partitioning the network decreases the total traffic if 1 N R (1 + p) < N R p < 1, i.e., if not all the packets have to go
Chapter 3 Problem 2 In Figure 3.43 of the text every node transmits R bps, and we assume that both network partitions consist of 1 N nodes. So the total traffic generated by the nodes 2 of each Ethernet
More informationWireless Medium Access Control Protocols
Wireless Medium Access Control Protocols Telecomunicazioni Undergraduate course in Electrical Engineering University of Rome La Sapienza Rome, Italy 2007-2008 Classification of wireless MAC protocols Wireless
More informationModel suitable for virtual circuit networks
. The leinrock Independence Approximation We now formulate a framework for approximation of average delay per packet in telecommunications networks. Consider a network of communication links as shown in
More informationAnalyzing Multi-Channel Medium Access Control Schemes With ALOHA Reservation
Analyzing Multi-Channel Medium Access Control Schemes With ALOHA Reservation Yunghsiang S. Han, Jing Deng and Zygmunt J. Haas Graduate Institute of Communication Engineering National Taipei University,
More informationPerformance Analysis of Darwin: Transient State
Performance Analysis of Darwin: Transient State Mark Joseph Francisco Changcheng Huang Advanced Optical Networks Laboratory Carleton University May 6, 2002 May 6, 2002 802-17-01, mjf_darprf_02 Changcheng
More informationEECS 563 Fall Review Test 2. Review Test 2
EECS 563 Fall 2013 1 Network traffic Request for resources Rate of requests= λ Average resource hold time = T h Common Assumptions Time between arrivals ~ exponentially Holding time ~ exponentially Voice
More informationETSN01 Exam Solutions
ETSN01 Exam Solutions March 014 Question 1 (a) See p17 of the cellular systems slides for a diagram and the full procedure. The main points here were that the HLR needs to be queried to determine the location
More informationChapter 6 Medium Access Control Protocols and Local Area Networks
Chapter 6 Medium Access Control Protocols and Local Area Networks Part I: Medium Access Control Part II: Local Area Networks CSE 3213, Winter 2010 Instructor: Foroohar Foroozan Chapter Overview Broadcast
More information2. Modelling of telecommunication systems (part 1)
2. Modelling of telecommunication systems (part ) lect02.ppt S-38.45 - Introduction to Teletraffic Theory - Fall 999 2. Modelling of telecommunication systems (part ) Contents Telecommunication networks
More informationCOMP476 Networked Computer Systems. Polling. Sharing the Wire. LAN Technologies. COMP476 Networked Computer Systems 1
Media Access Control Sub Layer COMP476 Networked Computer Systems Sharing Common Media There are several ways to share common media. Some methods are: Frequency division multiplexing Time division multiplexing
More informationMultiple Access (1) Required reading: Garcia 6.1, 6.2.1, CSE 3213, Fall 2010 Instructor: N. Vlajic
1 Multiple Access (1) Required reading: Garcia 6.1, 6.2.1, 6.2.2 CSE 3213, Fall 2010 Instructor: N. Vlajic Multiple Access Communications 2 Broadcast Networks aka multiple access networks multiple sending
More informationTutorial 8 : Congestion Control
Lund University ETSN01 Advanced Telecommunication Tutorial 8 : Congestion Control Author: Antonio Franco Emma Fitzgerald Tutor: Farnaz Moradi December 18, 2015 Contents I Before you start 3 II Exercises
More informationCHAPTER 3 EFFECTIVE ADMISSION CONTROL MECHANISM IN WIRELESS MESH NETWORKS
28 CHAPTER 3 EFFECTIVE ADMISSION CONTROL MECHANISM IN WIRELESS MESH NETWORKS Introduction Measurement-based scheme, that constantly monitors the network, will incorporate the current network state in the
More informationENGI 4557 Digital Communications Practice Problems 2017 (Part 2)
ENGI 4557 Digital Communications Practice Problems 207 (Part 2) H = n p i log 2 ( ) p i C = W log 2 ( + S N ) SNR = 6m + 0 log 0 ( 3σ2 x V ) 2 SNR = 6m 0 ( ) n n! = k k!(n k)! x = σ 2 = + + x p(x)dx (x
More informationRMIT University. Data Communication and Net-Centric Computing COSC 1111/2061/1110. Lecture 8. Medium Access Control Methods & LAN
RMIT University Data Communication and Net-Centric Computing COSC 1111/2061/1110 Medium Access Control Methods & LAN Technology Slide 1 Lecture Overview During this lecture, we will Look at several Multiple
More informationTeletraffic theory (for beginners)
Teletraffic theory (for beginners) samuli.aalto@hut.fi teletraf.ppt S-38.8 - The Principles of Telecommunications Technology - Fall 000 Contents Purpose of Teletraffic Theory Network level: switching principles
More informationCSCI Spring Final Exam Solution
CSCI 4211 16Spring Final Exam Solution 1. When an IP packet arrives a router, how the router decides what is the next router (output link) this packet to be forwarded to? What are the routing table and
More informationMidterm Exam CSCE 232: Computer Networks Fall Instructions:
Midterm Exam CSCE 232: Computer Networks Fall 2007 Last Name: First Name: Student ID: Instructions: 1. This is a close-book and close-notes exam. 2. There are seven questions in total. The number of points
More informationNetwork traffic engineering
University of Roma Sapienza DIET Network traffic engineering Lecturer: Andrea Baiocchi DIET - University of Roma Sapienza E-mail: andrea.baiocchi@uniroma1.it URL: http://net.infocom.uniroma1.it/corsi/ing_traffico/
More informationMultiple Access Protocols
Multiple Access Protocols Computer Networks Lecture 2 http://goo.gl/pze5o8 Multiple Access to a Shared Channel The medium (or its sub-channel) may be shared by multiple stations (dynamic allocation) just
More informationCOMPUTER NETWORKS - Local area networks
Local area networks Telecommunication Networks Group firstname.lastname@polito.it http://www.telematica.polito.it/ COMPUTER NETWORKS LANs - 1 Copyright Quest opera è protetta dalla licenza Creative Commons
More informationLocal area networks. Copyright
Local area networks Telecommunication Networks Group firstname.lastname@polito.it http://www.telematica.polito.it/ COMPUTER NETWORKS LANs - 1 Copyright Quest opera è protetta dalla licenza Creative Commons
More informationLAB PROJECT Nº1 1 INTRODUCTION REDES MÓVEIS E SEM FIOS , MEEC PERFORMANCE OF WIRELESS PERSONAL AREA NETWORKS
LAB PROJECT Nº1 REDES MÓVEIS E SEM PERFORMANCE OF WIRELESS PERSONAL AREA NETWORKS 1 INTRODUCTION The performance of wireless networks is highly dependent of physical phenomena, such as path loss, shadowing,
More informationTraffic-based, mobility-aware clustering for IEEE a UWB networks
21st Annual IEEE International Symposium on Personal, Indoor and Mobile Radio Communications Traffic-based, mobility-aware clustering for IEEE 802.15.4a UWB networks Luca De Nardis, Daniele Domenicali
More informationCMPE 257: Wireless and Mobile Networking
CMPE 257: Wireless and Mobile Networking Katia Obraczka Computer Engineering UCSC Baskin Engineering Lecture 4 1 Announcements Project proposals. Due April 17 th. Submit by e-mail to katia@soe.ucsc.edu.
More informationTHE IEEE standard was created in 2003, and its
ADVANCES IN ELECTRONICS AND TELECOMMUNICATIONS, VOL. 1, NO. 2, NOVEMBER 2010 7 Simulation Study of the IEEE 802.15.4 Standard Low Rate Wireless Personal Area Networks Dariusz Kościelnik and Jacek Stępień
More informationEE 122 Fall st Midterm. Professor: Lai Stoica
EE 122 Fall 2001 1 st Midterm Professor: Lai Stoica Question 1 (15 pt) Layering is a key design principle in computer networks. Name two advantages, and one disadvantage to layering. Explain. Use no more
More informationCOMPUTER NETWORK Model Test Paper
Model Test Paper Question no. 1 is compulsory. Attempt all parts. Q1. Each question carries equal marks. (5*5 marks) A) Difference between Transmission Control Protocol (TCP) and User Datagram Protocol.
More informationAnalysis of the Distribution of the Backoff Delay in DCF: A Step Towards End-to-end Delay Guarantees in WLANs
Analysis of the Distribution of the Backoff Delay in 802.11 DCF: A Step Towards End-to-end Delay Guarantees in WLANs Albert Banchs Universidad Carlos III de Madrid banchs@it.uc3m.es Outline I. The Daidalos
More informationMedia Access Control. Networked Systems (H) Lecture 5
Media Access Control Networked Systems (H) Lecture 5 Lecture Outline Controlling access to the channel Link contention Media access control protocols Contention-based protocols CSMA/CD Token ring Slotted
More informationCSE/EE 461 Section 2
CSE/EE 461 Section 2 Latency in a store-and-forward network 4ms, 10MB/s B How long does it take to send a 2kB packet from to B? 2ms, 10MB/s C 2ms, 10MB/s B What if it has to pass through a node C? Plan
More informationECE 333: Introduction to Communication Networks Fall Lecture 19: Medium Access Control VII
ECE : Introduction to Communication Networks Fall 2002 Lecture 9: Medium Access Control VII More on token ring networks LAN bridges and switches. More on token rings In the last lecture we began discussing
More informationCongestion Control In The Internet Part 2: How it is implemented in TCP. JY Le Boudec 2014
1 Congestion Control In The Internet Part 2: How it is implemented in TCP JY Le Boudec 2014 Contents 1. Congestion control in TCP 2. The fairness of TCP 3. The loss throughput formula 4. Explicit Congestion
More informationDelay Analysis of ML-MAC Algorithm For Wireless Sensor Networks
Delay Analysis of ML-MAC Algorithm For Wireless Sensor Networks Madhusmita Nandi School of Electronics Engineering, KIIT University Bhubaneswar-751024, Odisha, India ABSTRACT The present work is to evaluate
More informationChapter 6 Medium Access Control Protocols and Local Area Networks
Chapter 6 Medium Access Control Protocols and Local Area Networks Part I: Medium Access Control Part II: Local Area Networks Chapter Overview Broadcast Networks All information sent to all users No routing
More informationCongestion Control In The Internet Part 2: How it is implemented in TCP. JY Le Boudec 2014
1 Congestion Control In The Internet Part 2: How it is implemented in TCP JY Le Boudec 2014 Contents 1. Congestion control in TCP 2. The fairness of TCP 3. The loss throughput formula 4. Explicit Congestion
More informationAn Efficient Scheduling Scheme for High Speed IEEE WLANs
An Efficient Scheduling Scheme for High Speed IEEE 802.11 WLANs Juki Wirawan Tantra, Chuan Heng Foh, and Bu Sung Lee Centre of Muldia and Network Technology School of Computer Engineering Nanyang Technological
More informationTelematics. 5th Tutorial - LLC vs. MAC, HDLC, Flow Control, E2E-Arguments
19531 - Telematics 5th Tutorial - LLC vs. MAC, HDLC, Flow Control, E2E-Arguments Bastian Blywis Department of Mathematics and Computer Science Institute of Computer Science 18. November, 2010 Institute
More informationECEN Final Exam Fall Instructor: Srinivas Shakkottai
ECEN 424 - Final Exam Fall 2013 Instructor: Srinivas Shakkottai NAME: Problem maximum points your points Problem 1 10 Problem 2 10 Problem 3 20 Problem 4 20 Problem 5 20 Problem 6 20 total 100 1 2 Midterm
More informationComparison of pre-backoff and post-backoff procedures for IEEE distributed coordination function
Comparison of pre-backoff and post-backoff procedures for IEEE 802.11 distributed coordination function Ping Zhong, Xuemin Hong, Xiaofang Wu, Jianghong Shi a), and Huihuang Chen School of Information Science
More informationCS244a: An Introduction to Computer Networks
Do not write in this box MCQ 13: /10 14: /10 15: /0 16: /0 17: /10 18: /10 19: /0 0: /10 Total: Name: Student ID #: Campus/SITN-Local/SITN-Remote? CS44a Winter 004 Professor McKeown CS44a: An Introduction
More informationAN ABSTRACT OF THE THESIS OF
AN ABSTRACT OF THE THESIS OF Richard Edgecombe for the degree of Master of Science in Computer Science presented on March 17, 2008. Title: An Implementation of a Reliable Broadcast Scheme for 802.11 using
More informationCS 218- QoS Routing + CAC Fall 2003
CS 218- QoS Routing + CAC Fall 2003 M. Gerla et al: Resource Allocation and Admission Control Styles in QoS DiffServ Networks, QoS-IP 2001, Rome, Italy. A. Dubrovsky, M. Gerla, S. S. Lee, and D. Cavendish,Internet
More informationData Link Control Protocols
Protocols : Introduction to Data Communications Sirindhorn International Institute of Technology Thammasat University Prepared by Steven Gordon on 23 May 2012 Y12S1L07, Steve/Courses/2012/s1/its323/lectures/datalink.tex,
More informationFAIR DELAY OPTIMIZATION-BASED RESOURCE ALLOCATION ALGORITHM FOR VIDEO TRAFFIC OVER WIRELESS MULTIMEDIA SYSTEM
FAIR DELAY OPTIMIZATION-BASED RESOURCE ALLOCATION ALGORITHM FOR VIDEO TRAFFIC OVER WIRELESS MULTIMEDIA SYSTEM 1 M. R. M. Rizk, Senior Member, IEEE, 2 M. I. Dessouky, 3 Sami A. El-Dolil, and 4 Mohammed
More informationMedium Access Control
TC 3TCA NET Département Télécommunications Services & Usages Intervenant Razvan Stanica razvan.stanica@insa-lyon.fr. Ingénieur Télécom-Réseaux ENSEEIHT, promo 2008. Thèse sur le Contrôle de Congestion
More informationPerformance of Telecommunication Networks
MONASH UNIVERSITY DEPARTMENT OF ELECTRICAL & COMPUTER SYSTEMS ENGINEERING Performance of Telecommunication Networks Experiment IV: Delay and Queueing in Packet Switching Networks Y. Ahmet Şekercioğlu Aims
More informationSWITCHED REAL-TIME ETHERNET WITH EARLIEST DEADLINE FIRST SCHEDULING - PROTOCOLS, TRAFFIC HANDLING AND SIMULATION ANALYSIS
SWITCHED REAL-TIME ETHERNET WITH EARLIEST DEADLINE FIRST SCHEDULING - PROTOCOLS, TRAFFIC HANDLING AND SIMULATION ANALYSIS HOAI HOANG, MAGNUS JONSSON, ULRIK HAGSTROM, AND ANDERS KALLERDAHL Abstract. There
More informationCongestion Control In The Internet Part 2: How it is implemented in TCP. JY Le Boudec 2015
1 Congestion Control In The Internet Part 2: How it is implemented in TCP JY Le Boudec 2015 Contents 1. Congestion control in TCP 2. The fairness of TCP 3. The loss throughput formula 4. Explicit Congestion
More informationAn Energy Consumption Analytic Model for A Wireless Sensor MAC Protocol
An Energy Consumption Analytic Model for A Wireless Sensor MAC Protocol Hung-Wei Tseng, Shih-Hsien Yang, Po-Yu Chuang,Eric Hsiao-Kuang Wu, and Gen-Huey Chen Dept. of Computer Science and Information Engineering,
More informationFairness in the IEEE network. Shun Y. Cheung
Fairness in the IEEE 802.11 network Shun Y. Cheung Simple FIFO queueing High data rate flow Output queue (infinite size) Low data rate flow Packets from low data rate flow experience excessive queueing
More informationFuzzy Duty Cycle Adaption Algorithm for IEEE Star Topology Networks
Computer Systems Department, Technical Institute / Qurna, Basra, Iraq email: hayderaam@gmail.com Received: 4/1 /212 Accepted: 22/7 /213 Abstract IEEE 82.15.4 is a standard designed for low data rate, low
More informationTop-Down Network Design
Top-Down Network Design Chapter Two Analyzing Technical Goals and Tradeoffs Original slides by Cisco Press & Priscilla Oppenheimer Scalability Availability Performance Accuracy Security Manageability Usability
More informationPerformance Analysis of FDDI. By Raj Jain
Performance Analysis of FDDI By Raj Jain This paper is a modified version of "Performance Analysis of FDDI Token Ring Networks: Effect of Parameters and Guidelines for Setting TTRT," by Raj Jain, published
More informationSupporting VBR VoIP Traffic in IEEE WLAN in PCF Mode
Supporting VBR VoIP Traffic in IEEE 802.11 WLAN in PCF Mode Dongyan Chen*, Sachin Garg**, Martin Kappes** and Kishor S. Trivedi* * Center for Advanced Computing and Communications, ECE Department Duke
More informationPolitecnico di Milano Scuola di Ingegneria Industriale e dell Informazione. E4 Local Area Networks
Politecnico di Milano Scuola di Ingegneria Industriale e dell Informazione E4 Local Area Networks Exercise Consider the LAN in the figure with stations A, B, C, and D (with addresses MAC.A, MAC.B, MAC.C,
More informationPerformance of Multihop Communications Using Logical Topologies on Optical Torus Networks
Performance of Multihop Communications Using Logical Topologies on Optical Torus Networks X. Yuan, R. Melhem and R. Gupta Department of Computer Science University of Pittsburgh Pittsburgh, PA 156 fxyuan,
More information802.1 TIME-SENSITIVE NETWORKING (TSN) ON 802.3CG MULTIDROP NETWORKS
802.1 TIME-SENSITIVE NETWORKING (TSN) ON 802.3CG MULTIDROP NETWORKS AUTHOR: CRAIG GUNTHER, HARMAN INTERNATIONAL SUPPORTERS: DON PANNELL, MARVELL RODNEY CUMMINGS, NATIONAL INSTRUMENTS September 2017 1 WHAT
More informationCOMP/ELEC 429/556 Introduction to Computer Networks
COMP/ELEC 429/556 Introduction to Computer Networks Broadcast network access control Some slides used with permissions from Edward W. Knightly, T. S. Eugene Ng, Ion Stoica, Hui Zhang T. S. Eugene Ng eugeneng
More informationFDDI by default supports Early Token Release. Below is the operation of FDDI ring.
Lecture 9 Fault Tolerance FDDI is also built for fault tolerance. It is actually two networks, one going counter-clockwise and the other clockwise (as usually drawn). Normally only the primary links, i.e.
More informationFACULTY OF COMPUTING AND INFORMATICS
namibia UniVERSITY OF SCIEnCE AnD TECHnOLOGY FACULTY OF COMPUTING AND INFORMATICS DEPARTMENT OF COMPUTER SCIENCE QUALIFICATION: Bachelor of Computer Science {Honours) QUALIFICATION CODE: 08BCSH LEVEL:
More informationAnalysis of Broadcast Authentication Mechanism in Selected Network Topologies
RADIOENGINEERING, VOL. 20, NO. 1, APRIL 2011 167 Analysis of Broadcast Authentication Mechanism in Selected Network Topologies Tomas VANEK, Matej ROHLIK Dept. of Telecommunication Engineering, Czech Technical
More informationCSE 473 Introduction to Computer Networks. Final Exam. Your name here: 12/17/2012
CSE 473 Introduction to Computer Networks Jon Turner Final Exam Your name here: 12/17/2012 1. (8 points). The figure below shows a network path connecting a server to a client. 200 km 2000 km 2 km X Y
More informationIEEE P Working Group for Wireless Personal Area Networks TM
IEEE P802.15 Working Group for Wireless Personal Area Networks TM SCORT - An Alternative to the Bluetooth SCO Link for Voice Operation in an Interference Environment Slide 1 Bluetooth SCO Link The Bluetooth
More informationRTP/RTCP protocols. Introduction: What are RTP and RTCP?
RTP/RTCP protocols Introduction: What are RTP and RTCP? The spread of computers, added to the availability of cheap audio/video computer hardware, and the availability of higher connection speeds have
More informationPerformance Evaluation of Scheduling Mechanisms for Broadband Networks
Performance Evaluation of Scheduling Mechanisms for Broadband Networks Gayathri Chandrasekaran Master s Thesis Defense The University of Kansas 07.31.2003 Committee: Dr. David W. Petr (Chair) Dr. Joseph
More informationRandom Access. 1. Aloha. 2. Slotted Aloha 3. CSMA 4. CSMA/CD
Random Access 1. Aloha 2. Slotted Aloha 3. CSMA 4. CSMA/CD Background Communication medium B No Collision collision A C Modern Local Area Networks (LANs) operate as follows Users are connected to communication
More informationAccess Technologies! Fabio Martignon
Access Technologies! Fabio Martignon 1 LAN Ethernet - IEEE 802.3 Broadcast Bus Capacity=10 Mb/s Xerox-Intel-Digital inventors Standardized at the beginning of the 80s as IEEE 802.3 Big Success and Several
More informationCHAPTER 7 MAC LAYER PROTOCOLS. Dr. Bhargavi Goswami Associate Professor & Head Department of Computer Science Garden City College
CHAPTER 7 MAC LAYER PROTOCOLS Dr. Bhargavi Goswami Associate Professor & Head Department of Computer Science Garden City College MEDIUM ACCESS CONTROL - MAC PROTOCOLS When the two stations transmit data
More informationLANs. Local Area Networks. via the Media Access Control (MAC) SubLayer. Networks: Local Area Networks
LANs Local Area Networks via the Media Access Control (MAC) SubLayer 1 Local Area Networks Aloha Slotted Aloha CSMA (non-persistent, 1-persistent, p-persistent) CSMA/CD Ethernet Token Ring 2 Network Layer
More informationJaringan Komputer. Broadcast Network. Outline. MAC (Medium Access Control) Channel Allocation Problem. Dynamic Channel Allocation
Broadcast Network Jaringan Komputer Medium Access Control Sublayer 2 network categories: point-to-point connections broadcast channels Key issue in broadcast network: how to determine who gets to use the
More informationA Backoff Algorithm for Improving Saturation Throughput in IEEE DCF
A Backoff Algorithm for Improving Saturation Throughput in IEEE 80.11 DCF Kiyoshi Takahashi and Toshinori Tsuboi School of Computer Science, Tokyo University of Technology, 1404-1 Katakura, Hachioji, Tokyo,
More informationA DiffServ IntServ Integrated QoS Provision Approach in BRAHMS Satellite System
A DiffServ IntServ Integrated QoS Provision Approach in BRAHMS Satellite System Guido Fraietta 1, Tiziano Inzerilli 2, Valerio Morsella 3, Dario Pompili 4 University of Rome La Sapienza, Dipartimento di
More information2. Traffic. Contents. Offered vs. carried traffic. Characterisation of carried traffic
Contents characterisation Telephone traffic modelling Data traffic modelling at packet level Data traffic modelling at flow level lect.ppt S-8.5 - Introduction to Teletraffic Theory Spring 6 Offered vs.
More informationPerformance Comparison of Mobility Generator C4R and MOVE using Optimized Link State Routing (OLSR)
IOSR Journal of Engineering (IOSRJEN) ISSN (e): 2250-3021, ISSN (p): 2278-8719 Vol. 06, Issue 11 (November. 2016), V1 PP 25-29 www.iosrjen.org Performance Comparison of Mobility Generator and MOVE using
More informationWEB OBJECT SIZE SATISFYING MEAN WAITING TIME IN MULTIPLE ACCESS ENVIRONMENT
International Journal of Computer Networks & Communications (IJCNC) Vol.6, No.4, July 014 WEB OBJECT SIZE SATISFYING MEAN WAITING TIME IN MULTIPLE ACCESS ENVIRONMENT Y. J. Lee Department of Technology
More informationAnalysis of Variation in IEEE802.11k Channel Load Measurements for Neighbouring WLAN Systems
Analysis of Variation in IEEE802.11k Channel Load Measurements for Neighbouring WLAN Systems Christina THORPE 1, Sean MURPHY, Liam MURPHY School of Computer Science and Informatics, University College
More informationCOST/FIT Seminar in Micronova, Otaniemi, Spectroscopy of the uplink Um interface of GPRS/GSM
COST/FIT Seminar in Micronova, Otaniemi, 10.2.2004. 1 Spectroscopy of the uplink Um interface of GPRS/GSM Jorma Kilpi P.O.Box 1202, 02044 VTT, FINLAND Email: Jorma.Kilpi@vtt.fi 20th February 2004 COST/FIT
More informationObjective To examine the throughput of a TCP connection as the flow control window size is varied.
Lab 7 TCP Throughput Overview TCP uses a sliding window mechanism to provide flow control. The destination advertises how much space it has available in its buffers, and the source restricts its transmissions
More information2. Traffic lect02.ppt S Introduction to Teletraffic Theory Spring
lect02.ppt S-38.145 - Introduction to Teletraffic Theory Spring 2005 1 Contents Traffic characterisation Telephone traffic modelling Data traffic modelling at packet level Data traffic modelling at flow
More informationDISTRIBUTED REAL-TIME SYSTEMS
Distributed Systems Fö 11/12-1 Distributed Systems Fö 11/12-2 DISTRIBUTED REAL-TIME SYSTEMS What is a Real-Time System? 1. What is a Real-Time System? 2. Distributed Real Time Systems 3. Predictability
More informationComputer Networks. Wenzhong Li. Nanjing University
Computer Networks Wenzhong Li Nanjing University 1 Chapter 2. Direct Link Networks Link Service and Framing Error Detection and Reliable Transmission HDLC, PPP, and SONET Token Ring Ethernet Bridges and
More informationJune 20th, École Polytechnique, Paris, France. A mean-field model for WLANs. Florent Cadoux. IEEE single-cell WLANs
Initial Markov under Bianchi s École Polytechnique, Paris, France June 20th, 2005 Outline Initial Markov under Bianchi s 1 2 Initial Markov under Bianchi s 3 Outline Initial Markov under Bianchi s 1 2
More informationImplementation of a Wake-up Radio Cross-Layer Protocol in OMNeT++ / MiXiM
Implementation of a Wake-up Radio Cross-Layer Protocol in OMNeT++ / MiXiM Jean Lebreton and Nour Murad University of La Reunion, LE2P 40 Avenue de Soweto, 97410 Saint-Pierre Email: jean.lebreton@univ-reunion.fr
More informationThe Effect of Code-Multiplexing on the High Speed Downlink Packet Access (HSDPA) in a WCDMA Network
The Effect of Code-Multiplexing on the High Speed Downlink Packet Access (HSDPA) in a WCDMA Network Raymond Kwan, Peter H. J. Chong 2, Eeva Poutiainen, Mika Rinne Nokia Research Center, P.O. Box 47, FIN-45
More informationPERFORMANCE ANALISIS OF THE LEMR-MULTICHANNEL PROTOCOL
PERFORMANCE ANALISIS OF THE LEMR-MULTICHANNEL PROTOCOL Albeiro Cortés Cabezas Department of Electronic Engineering, Surcolombiana University Grupo de Tratamiento de Señales y Telecommunications - GTST
More informationGeneration of Realistic Interferences in the Omnet++ INET Framework Based on Real Traffic Measurements
Generation of Realistic 802.11 Interferences in the Omnet++ INET Framework Based on Real Traffic Measurements Juan-Carlos Maureira 1 and Diego Dujovne 2 and Olivier Dalle 1 1 INRIA, I3S, CNRS, Univ. Nice
More informationCS 43: Computer Networks Media Access. Kevin Webb Swarthmore College November 30, 2017
CS 43: Computer Networks Media Access Kevin Webb Swarthmore College November 30, 2017 Multiple Access Links & Protocols Two classes of links : point-to-point dial-up access link between Ethernet switch,
More informationETSI Project BRAN Hiperlan Type 2 for IEEE 1394 Applications System Overview
ETSI Project BRAN Hiperlan Type 2 for IEEE 1394 Applications System Overview Source : Jamshid Khun Jush (Ericsson) (THOMSON multimedia) 1 HIPERLAN/2 Standard A new standard developed by the ETSI Project
More informationFinal Implemented QoS architecture for the IST Project VIRTUOUS Demonstrator
Final Implemented QoS architecture for the IST Project VIRTUOUS Demonstrator Filomena Del Sorbo, Giuseppe Lombardi, Fabio Ventrone Computer Science Department University of Rome La Sapienza, Via F. Buonarroti,
More informationHigh Level View. EE 122: Ethernet and Random Access protocols. Medium Access Protocols
High Level View EE 122: Ethernet and 802.11 Ion Stoica September 18, 2002 Goal: share a communication medium among multiple hosts connected to it Problem: arbitrate between connected hosts Solution goals:
More informationThe Medium Access Control Sublayer
The Medium Access Control Sublayer Chapter 4 Channel Allocation Problem Static channel allocation Assumptions for dynamic Assumptions for Dynamic Channel Allocation 1. Independent traffic 2. Single channel
More information$ " Capacity of Ad Hoc Networks. Physical Layer Issues. Layer 1 Capacity. Path Loss Model. Path Loss Model. Bandwidth of 802.
Capacity of Ad Hoc Networks Quality of Wireless links Physical Layer Issues The Channel Capacity Path Loss Model and Signal Degradation 802.11 MAC for Ad-hoc Networks DCF (Distributed Coordination Function)
More informationECSE-4670: Computer Communication Networks (CCN) Informal Quiz 3
ECSE-4670: Computer Communication Networks (CCN) Informal Quiz 3 : shivkuma@ecse.rpi.edu Biplab Sikdar: sikdab@rpi.edu 1 T F Slotted ALOHA has improved utilization since the window of vulnerability is
More informationScheduling of real-time traffic in IEEE networks
Scheduling of real-time traffic in IEEE 802.11 networks Afonso, José A. Neves, Joaquim E. Universidade do Minho, Departamento de Electrónica Industrial Campus de Azurém, 4800-058 Guimarães, ortugal jose.afonso@dei.uminho.pt
More informationOn the Maximum Throughput of A Single Chain Wireless Multi-Hop Path
On the Maximum Throughput of A Single Chain Wireless Multi-Hop Path Guoqiang Mao, Lixiang Xiong, and Xiaoyuan Ta School of Electrical and Information Engineering The University of Sydney NSW 2006, Australia
More informationEthernet. Introduction. CSE 3213 Fall 2011
Ethernet CSE 3213 Fall 2011 19 October 2011 1 Introduction Rapid changes in technology designs Broader use of LANs New schemes for high-speed LANs High-speed LAN technologies: Fast and gigabit Ethernet
More informationOPS An Opportunistic Networking Protocol Simulator for OMNeT++
OPS An Opportunistic Networking Protocol Simulator for OMNeT++ Asanga Udugama, Anna Förster, Jens Dede, Vishnupriya Kuppusamy and Anas bin Muslim University of Bremen, Germany OMNeT++ Community Summit
More information