Simulated SA Throughput vs. p
|
|
- Flora Stone
- 6 years ago
- Views:
Transcription
1 Problem 1. Simulation of Slotted Aloha network (A) There are n stations in the network that are trying to transmit messages to an access point. (B) All the stations are synchronized and they are using slotted aloha to access the channel. (C) A station transmits a new message in a slot with probability p. (D) The length of a message is one time slot. (E) Messages collide at the access point if two or more stations are transmitting during the same time slot. (F) If a collision takes place, the station will try to retransmit its undelivered message with probability q. (G) Once a backlogged message is delivered successfully, the station will once again start generating new messages in a slot with probability p X:.5 Y:.3664 Simulated SA Throughput vs. p 15 nodes, 1 sim. avg Throughput [packets/time] Node's Prob. of TX (p=q) [] Figure 1. Simulated throughput of Slotted Aloha network In Figure 1, the probability of an not-backlogged node transmitting, p, is equal to the probability of a backlogged node transmitting. For small values of p, the simulated network throughput is equal to the theoretical maximum of e -1 =.368.
2 1 1-1 Simulated SA Throughput vs. p simulated theory Throughput [packets/time] Node's Prob. of TX (p=q) [] Figure 2. Simulated and theoretical throughput of Slotted Aloha network, p=q The theoretical throughput and simulated throughput agree well if p <.2, which makes sense because the theoretical throughput is derived based on the assumption that p and q are small. The theory overestimates the throughput for values of p >.2, and at values of p>.6 the simulation for 1e4 time slots shows the throughput goes to packets/s. If the simulation time was extended, it is feasible that the simulation would yield a non-zero, but very small throughput for p>.6, but the simulation time becomes very long.
3 Table 1. Comparison of theoretical and simulated Slotted Aloha throughput for varied p Simulated SA Throughput over p and q Throughput [packet/s] Not-backlogged node's Prob. of TX (p) [] Backlogged node's Prob. of TX (q) [] 1 Figure 3. Simulated throughput of Slotted Aloha network for varied p and q
4 Simulated SA Throughput over p and q Throughput [packet/s] Backlogged node's Prob. of TX (q) [] Not-backlogged node's Prob. of TX (p) [] Figure 4. Simulated throughput of Slotted Aloha network for varied p and q - another viewing angle In Figure 4, the throughput of the network can be increased from the theoretical maximum of ~.36 when p=q, to ~.5 by making the probability of a not-backlogged node s transmission high (~.9) and making the probability of a backlogged node s transmission low (~.5).
5 Standard Dev. of SA Throughput over p and q Standard Dev. of Throughput [packet/s] Not-backlogged node's Prob. of TX (p) [] Backlogged node's Prob. of TX (q) [] Figure 5. Standard deviation of Slotted Aloha simulated throughput for varied p and q
6 Problem 2. Simulation of a Slotted Aloha network with SNR threshold (A) n = 1 nodes in network (B) nodes located at random locations in square area, side = 4m, AP at center (C) simulation time = t = 1e4 time slots (D) q = p (E) Use SNR model, if SNR of node is > SNR_thr, then transmission is successful. Simulated SA-SNR Model Throughput vs. p X:.9 Y: Throughput [packets/time] 1 SNR_thr =.1 SNR_thr = 1 SNR_thr = 6 X:.9 Y:.6991 X:.9 Y: Node's Prob. of TX (p=q) [] Figure 6. Simulated throughput of slotted aloha network with SNR reception model If the SNR threshold is very low, for example.1 in Figure 6, the throughput of the network gets up to 2.1packets/slot when the p=.9. Imagine that 2 nodes in the network transmit at the same time with approximately the same power, then the SNR at the receiver from each node s transmission will be ~.5, which is greater than the SNR threshold of.1. In this case, the packet from both nodes is received correctly, by the rules of the network model. A receiver that can detect packets with such low SNRs would depend on the packets being coded with orthogonal codes that minimize intersymbol interference, for example in a CDMA scheme. When the SNR threshold is 6, the throughput falls off rapidly for p >.2. This makes sense intuitively because as the p increases, the probability of many packets being transmitted at the same time increases. If the SNR requirement is large, only packets that are transmitted, and can pass the SNR requirement, for example, the packet from the closest node, can be received correctly.
7 Standard Dev. of Simulated SA-SNR Model Throughput vs. p 1.4 Standard Dev. of Throughput [packets/time] SNR_thr =.1 SNR_thr = 1 SNR_thr = Node's Prob. of TX (p=q) [] Figure 7. Standard deviation of throughput of slotted aloha network with SNR model simulation
8 Problem 3. Simulation of Pure (unslotted) Aloha network (A) For this problem consider a network that is not synchronized. (B) Each station periodically transmits messages that are one time unit long. (C) New messages arrive at a station according to a poisson arrival process with rate λ a. (D) If a message is not delivered to the access point, the station tries to retransmit the same message after a random period of time. This random waiting period is also distributed exponentially with arrival rate λ r. (E) While a station is trying to retransmit its backlogged message, no new messages arrive at the station. Once a backlogged message is delivered, the station once again generates a new message with rate λ a. (F) n = 1 nodes in the network (G) simulation time = 1e4 time slots Throughput [packets/time] Simulated Pure Aloha Throughput vs. λ r X:.645 Y:.1876 X:.3478 Y:.5983 λ a =.1 λ a =.1 λ a = Node's Re-transmission arrival rate, λ r [] Figure 8. Simulated throughput of Pure Aloha network over lambda_r for various lambda_a's When λ a =.1 and λ r ~.5 the simulated throughput is.188, which is close to the theoretical value of e -1 /2 ~.184. The arrival rate of packets for the whole network, G, changes as the backlog of the network changes. For λ a =.1, with n=1 nodes in the network, the network has, on average λ a *n =.1*1 = 1 packet per time slot arriving to the network, and the vulnerability period for unslotted Aloha is 2 time slots (given that 1 packet = 1 time slot) so the throughput for sufficiently small λ r is.184. As the λ r is
9 increased, the number of re-transmitted packets increases which causes more collisions and more re-transmissions, so the throughput drops off. When λ a =.1, the amount of traffic presented to the network is so low that collisions occur infrequently, and the re-tranmission rate, λ r, has little impact on the throughput. With such a low λ a, the network throughput remains low at.1, which is ~n*λ a = 1*.1 =.1, indicating that nodes do not become backlogged and all the traffic presented to the network transmits successfully. σ(throughput [packets/time]) Standard Dev. of Simulated Pure Aloha Throughput vs. λ r λ a =.1 λ a =.1 λ a = Node's Re-transmission arrival rate, λ r [] Figure 9. Standard deviation of throughput for simulated Pure Aloha network (n=1)
10 Appendix : Software and hardware configuration All problems are answered with Matlab scripts and functions; the version of Matlab used to develop the scripts is as follows: The code was developed on a PC with the following hardware and OS:
11 Appendix 1: Run Slotted Aloha simulation in debug mode and check algorithm works correctly. Check my algorithm in function calcsathroughput(n, p, q, t), which calculates the throutput of a slotted Aloha network with n nodes, not-backlogged nodes transmit with probability p, backlogged nodes transmit with probability q, simulated for t timeslots. Use this simplified simulation setup, just to check if algorithm is correct: This is the order of outputs: A little explanation on what the outputs mean: column 1: i = time, number of time slots elapsed column 2: trial result for each node with probability success = p column 3: trial result for each node with probability success = q column 4: state of each node, 1 = backlogged, = not backlogged column 5: 1 if node is backlogged and attempting to send, if node is backlogged and not attempting to send column 6: 1 if node is not backlogged and attempting to send, if not is not backlogged and not attempting to send column 7: how many backlogged nodes are attempting to send column 8: how many not backlogged nodes are attempting to send column 9: how many packets are successfully transmitted column 1: how many packets have failed to transmit column 11: the throughput up to that point in the simulation
12 At time=, all 4 nodes try to transmit, the backlogged mask, blogged_mask is updated to 1111 to indicate that all 4 nodes are backlogged and will thereafter attempt to transmit with probability q, until they successfully transmit, after which they will attempt again with probability p. At time=1, column 2 is meaningless because all the nodes are backlogged, so result of trial with probability p doesn t do anything. Column 3 shows that trial with probability q is so no backlogged nodes try to transmit. The state of nodes doesn t change. At time=2, column 3 shows 1 so exactly 1 backlogged node is trying to transmit, and it is successful, so the number of successful TXs is incremented to 1, and that node s entry in the blogged_mask is changed from 1 for backlogged to for not-backlogged, which is shown in column 4 = 111. At time=3, colunn 3 again has 111 so the trials of the first 3 nodes indicate an attempt to TX, but the blogged_mask in column 4 shows 111, so only the first and third nodes are relevant backlogged nodes trying to transmit. Since there are 2 backlogged nodes trying to transmit, the transmissions are failures (notice the number of failed transmissions increases from 4 to 6). Algorithm looks functionally Ok.
Multiple Access Communications. EEE 538, WEEK 11 Dr. Nail Akar Bilkent University Electrical and Electronics Engineering Department
Multiple Access Communications EEE 538, WEEK 11 Dr. Nail Akar Bilkent University Electrical and Electronics Engineering Department 1 Multiple Access Satellite systems, radio networks (WLAN), ethernet segment
More informationRandom Access. 1. Aloha. 2. Slotted Aloha 3. CSMA 4. CSMA/CD
Random Access 1. Aloha 2. Slotted Aloha 3. CSMA 4. CSMA/CD Background Communication medium B No Collision collision A C Modern Local Area Networks (LANs) operate as follows Users are connected to communication
More informationMultiple Access (1) Required reading: Garcia 6.1, 6.2.1, CSE 3213, Fall 2010 Instructor: N. Vlajic
1 Multiple Access (1) Required reading: Garcia 6.1, 6.2.1, 6.2.2 CSE 3213, Fall 2010 Instructor: N. Vlajic Multiple Access Communications 2 Broadcast Networks aka multiple access networks multiple sending
More informationWhere Are We? Basics: Network Classification Network Architecture Reliable Data Transfer Delay Models Implementation: Protocol Design
Where Are We? Basics: Network Classification Network Architecture Reliable Data Transfer Delay Models Implementation: Protocol Design Layered Architecture Layered Architecture Data Link Layer Functionality
More informationPacket multiple access and the Aloha protocol
Packet multiple access and the Aloha protocol Massachusetts Institute of Technology Department of Aeronautics and Astronautics Slide 1 Packet Multiple Access PMA SHARED UPLINK TERMINAL TERMINAL APPL TRANS
More informationChapter 6 Medium Access Control Protocols and Local Area Networks
Chapter 6 Medium Access Control Protocols and Local Area Networks Part I: Medium Access Control Part II: Local Area Networks CSE 3213, Winter 2010 Instructor: Foroohar Foroozan Chapter Overview Broadcast
More informationProtocols for Multiaccess Networks
Protocols for Multiaccess Networks Hosts broadcast packets When a collision occurs, all transmitted packets are lost Lost packets have to be retransmitted => Need Multiaccess Protocol Model - Slotted Aloha
More informationRandom Assignment Protocols
Random Assignment Protocols Random assignment strategies attempt to reduce problem occur in fixed assignment strategy by eliminating pre allocation of bandwidth to communicating nodes. Random assignment
More information1-1. Switching Networks (Fall 2010) EE 586 Communication and. November 8, Lecture 30
EE 586 Communication and Switching Networks (Fall 2010) Lecture 30 November 8, 2010 1-1 Announcements Quiz on Wednesday Next Monday hands-on training on Contiki OS Bring your laptop 4-2 Multiple Access
More informationPower Laws in ALOHA Systems
Power Laws in ALOHA Systems E6083: lecture 7 Prof. Predrag R. Jelenković Dept. of Electrical Engineering Columbia University, NY 10027, USA predrag@ee.columbia.edu February 28, 2007 Jelenković (Columbia
More informationCHAPTER 5 PROPAGATION DELAY
98 CHAPTER 5 PROPAGATION DELAY Underwater wireless sensor networks deployed of sensor nodes with sensing, forwarding and processing abilities that operate in underwater. In this environment brought challenges,
More informationData Communications. Automatic Repeat Request Medium Access Control
Data Communications Automatic Repeat Request Medium Access Control Handling Error Cases Automatic Repeat request(arq), also known as Automatic Repeat Query, is an error-control method ARQ uses acknowledgements
More informationChapter 1 Basic concepts of wireless data networks (cont d)
Chapter 1 Basic concepts of wireless data networks (cont d) Part 2: Medium access methods for mobile data networks Sept 15 2004 1 Fixed assignment access schemes in voice-oriented networks Frequency division
More informationCom S 611 Spring Semester 2007 Discrete Algorithms for Mobile and Wireless Networks. Lecture 3: Tuesday, 23rd January 2007
Com S 611 Spring Semester 2007 Discrete Algorithms for Mobile and Wireless Networks Lecture 3: Tuesday, 23rd January 2007 Instructor: Soma Chaudhuri Scribe: Abhishek Sinha 1 Introduction The lecture can
More informationECE 4450:427/527 - Computer Networks Spring 2017
ECE 4450:427/527 - Computer Networks Spring 2017 Dr. Nghi Tran Department of Electrical & Computer Engineering Lecture 5.4: Multiple Access Protocols Dr. Nghi Tran (ECE-University of Akron) ECE 4450:427/527
More informationSplitting Algorithms
Splitting Algorithms We have seen that slotted Aloha has maximal throughput 1/e Now we will look at more sophisticated collision resolution techniques which have higher achievable throughput These techniques
More informationProblem Set Name the 7 OSI layers and give the corresponding functionalities for each layer.
Problem Set 1 1. Why do we use layering in computer networks? 2. Name the 7 OSI layers and give the corresponding functionalities for each layer. 3. Compare the network performance of the 3 Multiple Access
More informationData Link Layer: Collisions
Data Link Layer: Collisions 1 Multiple Access Data Link layer divided into two sublayers. The upper sublayer is responsible for datalink control, The lower sublayer is responsible for resolving access
More informationComputer Network Fundamentals Spring Week 3 MAC Layer Andreas Terzis
Computer Network Fundamentals Spring 2008 Week 3 MAC Layer Andreas Terzis Outline MAC Protocols MAC Protocol Examples Channel Partitioning TDMA/FDMA Token Ring Random Access Protocols Aloha and Slotted
More informationWireless Sensor Networks 7th Lecture
Wireless Sensor Networks 7th Lecture 15.11.2006 Christian Schindelhauer schindel@informatik.uni-freiburg.de 1 Medium Access Control (MAC) Controlling when to send a packet and when to listen for a packet
More informationMedium Access Control
Medium Access Control Fundamental Problem N nodes in vicinity want to transmit (to, say, N other nodes). How to do this interference free? Interference free means SINR Otherwise, we say that packets collide.
More informationMarkov Chains and Multiaccess Protocols: An. Introduction
Markov Chains and Multiaccess Protocols: An Introduction Laila Daniel and Krishnan Narayanan April 8, 2012 Outline of the talk Introduction to Markov Chain applications in Communication and Computer Science
More informationMultiple Access Protocols
Multiple Access Protocols Computer Networks Lecture 2 http://goo.gl/pze5o8 Multiple Access to a Shared Channel The medium (or its sub-channel) may be shared by multiple stations (dynamic allocation) just
More informationIntroduction to CDMA ALOHA. 3. Access Control Techniques for CDMA ALOHA
Introduction to CDMA ALOHA 3. Access Control Techniques for CDMA ALOHA Takaya Yamazato Center for Information Media Studies, Nagoya University Nagoya 464-01, Japan yamazato@nuee.nagoya-u.ac.jp CDMA ALOHA
More informationTSIN01 Information Networks Lecture 3
TSIN01 Information Networks Lecture 3 Danyo Danev Division of Communication Systems Department of Electrical Engineering Linköping University, Sweden September 10 th, 2018 Danyo Danev TSIN01 Information
More informationMultiple Access Links and Protocols
Multiple Access Links and Protocols Two types of links : point-to-point PPP for dial-up access point-to-point link between Ethernet switch and host broadcast (shared wire or medium) old-fashioned Ethernet
More informationLecture 19. Principles behind data link layer services Framing Multiple access protocols
Link Layer Lecture 19 Principles behind data link layer services Framing Multiple access protocols ALOHA *The slides are adapted from ppt slides (in substantially unaltered form) available from Computer
More information12.2. Figure 12.1 Data link layer divided into two functionality-oriented sublayers
12.2 Figure 12.1 Data link layer divided into two functionality-oriented sublayers 12.3 Figure 12.2 Taxonomy of multiple-access protocols discussed in this chapter 12-1 RANDOM ACCESS 12.4 In random access
More informationECE 358 MAC Examples. Xuemin (Sherman) Shen Office: EIT 4155 Phone: x
ECE 358 MAC Examples Xuemin (Sherman) Shen Office: EIT 4155 Phone: x 32691 Email: xshen@bbcr.uwaterloo.ca Problem 1. Consider the following Aloha systems. (a) A group of N users share a 56 kbps pure Aloha
More informationMultimedia Communication Services Traffic Modeling and Streaming
Multimedia Communication Services Traffic Modeling and Streaming Medium Access Control algorithms Introduction and details on Aloha networks with infinite nodes Università degli Studi di Brescia A.A. 2014/2015
More informationLANs. Local Area Networks. via the Media Access Control (MAC) SubLayer. Networks: Local Area Networks
LANs Local Area Networks via the Media Access Control (MAC) SubLayer 1 Local Area Networks Aloha Slotted Aloha CSMA (non-persistent, 1-persistent, p-persistent) CSMA/CD Ethernet Token Ring 2 Network Layer
More informationUnavoidable Constraints and Collision Avoidance Techniques in Performance Evaluation of Asynchronous Transmission WDMA Protocols
1th WEA International Conference on COMMUICATIO, Heraklion, reece, July 3-5, 8 Unavoidable Constraints and Collision Avoidance Techniques in Performance Evaluation of Asynchronous Transmission WDMA Protocols
More informationCOMP/ELEC 429/556 Introduction to Computer Networks
COMP/ELEC 429/556 Introduction to Computer Networks Broadcast network access control Some slides used with permissions from Edward W. Knightly, T. S. Eugene Ng, Ion Stoica, Hui Zhang T. S. Eugene Ng eugeneng
More informationICE 1332/0715 Mobile Computing (Summer, 2008)
ICE 1332/0715 Mobile Computing (Summer, 2008) Medium Access Control Prof. Chansu Yu http://academic.csuohio.edu/yuc/ Simplified Reference Model Application layer Transport layer Network layer Data link
More informationRedes de Computadores. Medium Access Control
Redes de Computadores Medium Access Control Manuel P. Ricardo Faculdade de Engenharia da Universidade do Porto 1 » How to control the access of computers to a communication medium?» What is the ideal Medium
More informationLecture 8 The Data Link Layer part I. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it
Lecture 8 The Data Link Layer part I Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it Link Layer: setting the context two physically connected devices: host-router, router-router,
More informationEITF25 Internet Techniques and Applications L4: Network Access. Stefan Höst
EITF25 Internet Techniques and Applications L4: Network Access Stefan Höst Repetition The link layer protocol should make sure that the data is correctly transmitted over the physical link using error
More informationCS 3640: Introduction to Networks and Their Applications
CS 3640: Introduction to Networks and Their Applications Fall 2018, Lecture 7: The Link Layer II Medium Access Control Protocols Instructor: Rishab Nithyanand Teaching Assistant: Md. Kowsar Hossain 1 You
More informationCCM 4300 Lecture 5 Computer Networks, Wireless and Mobile Communications. Dr Shahedur Rahman. Room: T115
CCM 4300 Lecture 5 Computer Networks, Wireless and Mobile Communications Dr Shahedur Rahman s.rahman@mdx.ac.uk Room: T115 1 Recap of Last Session Described the physical layer Analogue and Digital signal
More informationLANs Local Area Networks LANs provide an efficient network solution : To support a large number of stations Over moderately high speed
Local Area Networks LANs provide an efficient network solution : To support a large number of stations Over moderately high speed With relatively small bit errors Multiaccess Protocols Communication among
More informationCS 716: Introduction to communication networks. - 9 th class; 19 th Aug Instructor: Sridhar Iyer IIT Bombay
CS 716: Introduction to communication networks - 9 th class; 19 th Aug 2011 Instructor: Sridhar Iyer IIT Bombay Contention-based MAC: ALOHA Users transmit whenever they have data to send Collisions occur,
More informationLecture 6. Data Link Layer (cont d) Data Link Layer 1-1
Lecture 6 Data Link Layer (cont d) Data Link Layer 1-1 Agenda Continue the Data Link Layer Multiple Access Links and Protocols Addressing Data Link Layer 1-2 Multiple Access Links and Protocols Two types
More informationMultiple Access. Data Communications and Networking
Multiple Access In the previous part we discussed data link control, a mechanism which provides a link with reliable communication. In the protocols we described, we assumed that there is an available
More informationWireless Medium Access Control Protocols
Wireless Medium Access Control Protocols Telecomunicazioni Undergraduate course in Electrical Engineering University of Rome La Sapienza Rome, Italy 2007-2008 Classification of wireless MAC protocols Wireless
More informationLink Layer and LANs 안상현서울시립대학교컴퓨터 통계학과.
Link Layer and LANs 안상현서울시립대학교컴퓨터 통계학과 ahn@venus.uos.ac.kr Data Link Layer Goals: understand principles behind data link layer services: error detection, correction sharing a broadcast channel: multiple
More information2. Modelling of telecommunication systems (part 1)
2. Modelling of telecommunication systems (part ) lect02.ppt S-38.45 - Introduction to Teletraffic Theory - Fall 999 2. Modelling of telecommunication systems (part ) Contents Telecommunication networks
More informationTSIN01 Information Networks Lecture 8
TSIN01 Information Networks Lecture 8 Danyo Danev Division of Communication Systems Department of Electrical Engineering Linköping University, Sweden September 24 th, 2018 Danyo Danev TSIN01 Information
More informationETSN01 Exam Solutions
ETSN01 Exam Solutions March 014 Question 1 (a) See p17 of the cellular systems slides for a diagram and the full procedure. The main points here were that the HLR needs to be queried to determine the location
More informationMULTIPLE ACCESS PROTOCOLS 2. 1
MULTIPLE ACCESS PROTOCOLS AND WIFI 1 MULTIPLE ACCESS PROTOCOLS 2. 1 MULTIPLE ACCESS LINKS, PROTOCOLS Two types of links : point-to-point broadcast (shared wire or medium) POINT-TO-POINT PPP for dial-up
More informationData Link Layer: Multi Access Protocols
Digital Communication in the Modern World Data Link Layer: Multi Access Protocols http://www.cs.huji.ac.il/~com1 com1@cs.huji.ac.il Some of the slides have been borrowed from: Computer Networking: A Top
More informationCMPE 150/L : Introduction to Computer Networks. Chen Qian Computer Engineering UCSC Baskin Engineering Lecture 16
CMPE 150/L : Introduction to Computer Networks Chen Qian Computer Engineering UCSC Baskin Engineering Lecture 16 1 Final project demo Please do the demo next week to the TAs. So basically you may need
More informationWireless Communications
4. Medium Access Control Sublayer DIN/CTC/UEM 2018 Why do we need MAC for? Medium Access Control (MAC) Shared medium instead of point-to-point link MAC sublayer controls access to shared medium Examples:
More informationLink Layer I: ALOHA, Time-, Frequency-, and Code Division. COS 463: Wireless Networks Lecture 4 Kyle Jamieson
Link Layer I: ALOHA, Time-, Frequency-, and Code Division COS 463: Wireless Networks Lecture 4 Kyle Jamieson Review: The Data Link Layer (L2) Enables exchange of atomic messages (frames) between end hosts
More informationAloha and slotted aloha
CSMA 2/13/06 Aloha and slotted aloha Slotted aloha: transmissions are synchronized and only start at the beginning of a time slot. Aloha sender A sender B collision sender C t Slotted Aloha collision sender
More informationTopics. Link Layer Services (more) Link Layer Services LECTURE 5 MULTIPLE ACCESS AND LOCAL AREA NETWORKS. flow control: error detection:
1 Topics 2 LECTURE 5 MULTIPLE ACCESS AND LOCAL AREA NETWORKS Multiple access: CSMA/CD, CSMA/CA, token passing, channelization LAN: characteristics, i basic principles i Protocol architecture Topologies
More informationCOMMUNICATION NETWORKS NETW 501
COMMUNICATION NETWORKS NETW 501 TUTORIAL 6 Presented by: Eng. Hana Hesham Eng. Mohamed Atef Data Link Layer Data Link Layer is split into 2 sublayers which are the Logical Link Control (LLC) and the Medium
More informationECE453 Introduction to Computer Networks. Broadcast vs. PPP. Delay. Lecture 7 Multiple Access Control (I)
ECE453 Introduction to Computer Networks Lecture 7 Multiple Access Control (I) 1 Broadcast vs. PPP Broadcast channel = multiaccess channel = random access channel Broadcast LAN Satellite network PPP WAN
More informationPhysical Layer. Medium Access Links and Protocols. Point-to-Point protocols. Modems: Signaling. Modems Signaling. Srinidhi Varadarajan
P Physical Layer Srinidhi Varadarajan Medium Access Links and Protocols Three types of links : point-to-point (single wire, e.g. PPP, SLIP) broadcast (shared wire or medium; e.g, Ethernet, Wavelan, etc.)
More informationLocal Area Networks (LANs) SMU CSE 5344 /
Local Area Networks (LANs) SMU CSE 5344 / 7344 1 LAN/MAN Technology Factors Topology Transmission Medium Medium Access Control Techniques SMU CSE 5344 / 7344 2 Topologies Topology: the shape of a communication
More informationWireless Sensor Networks 8th Lecture
Wireless Sensor Networks 8th Lecture 21.11.2006 Christian Schindelhauer schindel@informatik.uni-freiburg.de 1 Media Access Control (MAC) Controlling when to send a packet and when to listen for a packet
More informationChapter 5: Link layer
Chapter 5: Link layer our goals: v understand principles behind link layer services: error detection, correction sharing a broadcast channel: multiple access link layer addressing local area networks:
More informationMAC Theory. Chapter 7. Ad Hoc and Sensor Networks Roger Wattenhofer
MAC Theory Chapter 7 7/1 Seeing Through Walls! [Wilson, Patwari, U. Utah] Schoolboy s dream, now reality thank to sensor networks... 7/2 Rating Area maturity First steps Text book Practical importance
More informationThe Link Layer and LANs. Chapter 6: Link layer and LANs
The Link Layer and LANs EECS3214 2018-03-14 4-1 Chapter 6: Link layer and LANs our goals: understand principles behind link layer services: error detection, correction sharing a broadcast channel: multiple
More informationThe Medium Access Control Scheme (MAC Layer) Reference: Andrew S. Tanenbaum, Computer Networks, 3rd Edition, Prentice Hall, 1996.
The Medium Access Control Scheme (MAC Layer) Reference: Andrew S. Tanenbaum, Computer Networks, 3rd Edition, Prentice Hall, 1996. 1 Table of Contents Introduction ALOHA Carrier Sense Multiple Sense (CSMA)
More informationComputer Communication III
Computer Communication III Wireless Media Access IEEE 802.11 Wireless LAN Advantages of Wireless LANs Using the license free ISM band at 2.4 GHz no complicated or expensive licenses necessary very cost
More informationCSC 401 Data and Computer Communications Networks
CSC 401 Data and Computer Communications Networks Link Layer: Intro, Errors, Multiple Access Sec 6.1, 6.2, 6.3 Prof. Lina Battestilli Fall 2017 Chapter 6: Link layer Goals: understand principles behind
More informationCS 3640: Introduction to Networks and Their Applications
CS 3640: Introduction to Networks and Their Applications Fall 2018, Lecture 5: The Link Layer I Errors and medium access Instructor: Rishab Nithyanand Teaching Assistant: Md. Kowsar Hossain 1 You should
More informationOutline. Introduction to Networked Embedded Systems - Embedded systems Networked embedded systems Embedded Internet - Network properties
Outline Introduction to Networked Embedded Systems - Embedded systems Networked embedded systems Embedded Internet - Network properties Layered Network Architectures - OSI framework descriptions of layers
More informationCommunication and Networks. Problems
Electrical and Information Technology Communication and Networks Problems Link Layer 2016 Problems 1. Consider a network applying a slotted Aloha access system. The assumption for this is that all nodes
More informationRandom Access Suitable Protocols
Random Access Many terminals communicate to a single base station Fixed multiple access methods (TDMA, FDMA, CDMA) become inefficient when the traffic is bursty. Random Access works better for many users,
More informationEthernet. Introduction. CSE 3213 Fall 2011
Ethernet CSE 3213 Fall 2011 19 October 2011 1 Introduction Rapid changes in technology designs Broader use of LANs New schemes for high-speed LANs High-speed LAN technologies: Fast and gigabit Ethernet
More informationLecture 6 The Data Link Layer. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it
Lecture 6 The Data Link Layer Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it Link Layer: setting the context two physically connected devices: host-router, router-router, host-host,
More informationNMA Radio Networks Network Level: Medium Access Control Roberto Verdone
NMA Radio Networks Network Level: Medium Access Control Roberto Verdone Outline 1. Introduction 2. Fundamentals of Random MAC Aloha in Compact Networks Slotted Aloha in Compact Networks CSMA in Compact
More informationExperiment report. Figure 1: Deployment location
Experiment report 1. Experiment time: July 30th, 2015 2. Experiment location: receiving Node (MID3) was placed at Pocock rowing center and two source nodes (MID1, MID2) were setup in APL location. Figure
More informationMedium Access Control
Medium Access Control Mark Handley UCL Computer Science CS 3035/GZ01 Context: OSI Layer 2, S&K Link Layer email WWW phone...! SMTP HTTP RTP...! TCP UDP!! IP!! ethernet PPP! CSMA async sonet...! copper
More informationEECS 563 Fall Review Test 2. Review Test 2
EECS 563 Fall 2013 1 Network traffic Request for resources Rate of requests= λ Average resource hold time = T h Common Assumptions Time between arrivals ~ exponentially Holding time ~ exponentially Voice
More informationMAC Protocols and Packet Switching
MAC Protocols and Packet Switching 6.02 Fall 2013 Lecture 19 Today s Plan MAC Protocols: Randomized Access (Aloha) Stabilization Algorithms Packet Switching: Multi-Hop Networks Delays, Queues, and the
More informationCPSC 441 Tutorial-19. Department of Computer Science University of Calgary
CPSC 441 Tutorial-19 Department of Computer Science University of Calgary Problem-1 Consider n nodes that use the slotted CSMA/ CD with binary exponential back-off to access a shared broadcast channel.
More informationMultiple Access Channels
Multiple Access Channels Some Queuing Theory MAC: Aloha, ethernet Exponential backoff & friends LANs: Local Area Networks Goal: extend benefits of simple connection as far as possible Means: Share medium
More informationChapter 3 MEDIA ACCESS CONTROL
Chapter 3 MEDIA ACCESS CONTROL Distributed Computing Group Mobile Computing Winter 2005 / 2006 Overview Motivation SDMA, FDMA, TDMA Aloha Adaptive Aloha Backoff protocols Reservation schemes Polling Distributed
More informationCOMP476 Networked Computer Systems. Polling. Sharing the Wire. LAN Technologies. COMP476 Networked Computer Systems 1
Media Access Control Sub Layer COMP476 Networked Computer Systems Sharing Common Media There are several ways to share common media. Some methods are: Frequency division multiplexing Time division multiplexing
More informationECEN 5032 Data Networks Medium Access Control Sublayer
ECEN 5032 Data Networks Medium Access Control Sublayer Peter Mathys mathys@colorado.edu University of Colorado, Boulder c 1996 2005, P. Mathys p.1/35 Overview (Sub)networks can be divided into two categories:
More informationCan Multiple Subchannels Improve the Delay Performance of RTS/CTS-based MAC Schemes?
Can Multiple Subchannels Improve the Delay Performance of RTS/CTS-based MAC Schemes? By: Jing Deng, Yunghsiang S. Han, and Sanjeev R. Kulkarni. J. Deng, Y. S. Han, and S. R. Kulkarni, "Can Multiple Subchannels
More informationCS 123: Lecture 12, LANs, and Ethernet. George Varghese. October 24, 2006
CS 123: Lecture 12, LANs, and Ethernet George Varghese October 24, 2006 Selective Reject Modulus failure Example w = 2, Max = 3 0 0 1 3 0 A(1) A(2) 1 0 retransmit A(1) A(2) buffer Case 1 Case 2 reject
More informationClass-based Packet Scheduling Policies for Bluetooth
Class-based Packet Scheduling Policies for Bluetooth Vishwanath Sinha, D. Raveendra Babu Department of Electrical Engineering Indian Institute of Technology, Kanpur - 08 06, INDIA vsinha@iitk.ernet.in,
More informationCOS 140: Foundations of Computer Science
COS 140: Foundations of Computer Science ALOHA Network Protocol Family Fall 2017 Homework 2 Introduction 3 Network Protocols.......................................................... 3 Problem.................................................................
More informationMedium Access Control Sublayer
Wireless (WLAN) Medium Access Control Sublayer Mahalingam Mississippi State University, MS October 20, 2014 Outline Medium Access Protocols Wireless (WLAN) 1 Medium Access Protocols ALOHA Slotted ALOHA
More informationCollege of Computer and Information Sciences Department of Computer Engineering CEN444 Computer Networks Midterm 2 Exam Second Semester 1434/1435
College of Computer and Information Sciences Department of Computer Engineering CEN444 Computer Networks Midterm 2 Exam Second Semester 1434/1435 Student Name ID Time Allowed: 2.0 Hours. Closed Book, Closed
More informationLecture 5 The Data Link Layer. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it
Lecture 5 The Data Link Layer Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it Link Layer: setting the context two physically connected devices: host-router, router-router, host-host,
More informationLECTURE PLAN. Script. Introduction about MAC Types o ALOHA o CSMA o CSMA/CD o CSMA/CA
Course- B.Sc. Applied Physical Science (Computer Science) Year- IIIrd, Sem- Vth Subject Computer Science Paper- XVIIth, Computer Networks Lecture -11 Lecture Title- Medium Access Layer Script Today in
More informationChapter 5 Link Layer and LANs
Chapter 5 Link Layer and LANs Computer Networking: A Top Down Approach 4 th edition. Jim Kurose, Keith Ross Addison-Wesley, July 2007. All material copyright 1996-2007 J.F Kurose and K.W. Ross, All Rights
More informationChapter 5 part 1 LINK LAYER
Overview - today Chapter 5 part 1 LINK LAYER Computer Networks Timothy Roscoe Summer 2007 Context Link layer services Framing Error detection and correction Data Link layer protocols ultiple access protocols
More informationECSE 414 Fall 2014 Final Exam Solutions
ECSE 414 Fall 2014 Final Exam Solutions Question 1 a. The five main layers of the internet protocol stack, along with the service provided by each, and the place where each is implemented are as follows:
More informationCMPE 257: Wireless and Mobile Networking
CMPE 257: Wireless and Mobile Networking Katia Obraczka Computer Engineering UCSC Baskin Engineering Lecture 4 1 Announcements Project proposals. Due April 17 th. Submit by e-mail to katia@soe.ucsc.edu.
More information454 IEEE TRANSACTIONS ON COMMUNICATIONS, VOL. 47, NO. 3, MARCH Performance of Slotted Asynchronous CDMA Using Controlled Time of Arrival
454 IEEE TRANSACTIONS ON COMMUNICATIONS, VOL. 47, NO. 3, MARCH 1999 Performance of Slotted Asynchronous CDMA Using Controlled Time of Arrival Dong In Kim, Member, IEEE, and June Chul Roh, Member, IEEE
More informationWireless MACs: MACAW/802.11
Wireless MACs: MACAW/802.11 Mark Handley UCL Computer Science CS 3035/GZ01 Fundamentals: Spectrum and Capacity A particular radio transmits over some range of frequencies; its bandwidth, in the physical
More informationMobile Communications Chapter 3 : Media Access
Mobile Communications Chapter 3 : Media Access 2. Motivation 3. SDMA, FDMA, TDMA 1. Aloha and contention based schemes 4. Reservation schemes 5. Collision avoidance, MACA 6. Polling CDMA (Lecture 6) Prof.
More informationJaringan Komputer. Broadcast Network. Outline. MAC (Medium Access Control) Channel Allocation Problem. Dynamic Channel Allocation
Broadcast Network Jaringan Komputer Medium Access Control Sublayer 2 network categories: point-to-point connections broadcast channels Key issue in broadcast network: how to determine who gets to use the
More informationIN distributed random multiple access, nodes transmit
414 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 52, NO. 2, FEBRUARY 2006 Power Levels and Packet Lengths in Random Multiple Access With Multiple-Packet Reception Capability Jie Luo, Member, IEEE, and
More informationMedium Access Control. MAC protocols: design goals, challenges, contention-based and contention-free protocols
Medium Access Control MAC protocols: design goals, challenges, contention-based and contention-free protocols 1 Why do we need MAC protocols? Wireless medium is shared Many nodes may need to access the
More information