Utilization and Delay Performance Analysis of Carrier Sense CDMA Protocol

Size: px
Start display at page:

Download "Utilization and Delay Performance Analysis of Carrier Sense CDMA Protocol"

Transcription

1 -- Tsuzuki & Yamada ISPLC 2000 Utilization and Delay Performance Analysis of Carrier Sense CDMA Protocol Shinji TSUZUKI Yoshio YAMADA Department of Electrical and Electronic Engineering, Ehime University, Matsuyama, , Japan Phone Fax ABSTRACT Ethernet is based on camer sense multiple access with collision detection (CSMNCD) protocol. Although this protocol is widely used in local area networks (LANs), it has a problem. The throughput and packet-delay performances degrade rapidly when the offered loads of packets become high. As a solution to the problem, we have proposed camer sense spread spectrum with overload detection (CSSSIOD) protocol, which is a DS - CDMA (direct sequence - code division multiple access) based protocol with a carrier sensing function and changes the spreading factor adaptively depending on network loads to improve the conventional Ethernet's performance. In this paper, we show its optimized performances of the channel utilization and the delay time. key words: multiple-access techniques, spread spectrum techniques, local area network (LAN), carrier sense multiple access (CSMA), CDMA, multi-carrier modulation 1. Introduction, The growing success of digital services related to new directions in entertainment, high-speed Internet access, combined with trends in home automation, control, and security is leading to a new focus on digital home networks. Considering Japanese houses, the additional-wiring-free media, such as power-line carrier and RF, could be the promising candidates for the network media. As the suitable modulation technique for those media, spread spectrum (SS) and multi-carrier, such as Orthogonal Frequency Division Multiplexing (OFDM) and Discrete Multi Tone (DMT), have been studied. However, the multiple-access protocol suitable for these modulation techniques has not yet studied sufficiently. In this paper, the multiple-access protocol using SS modulation is introduced and its utilization and delay performance is analyzed. The carrier sense multiple access (CSMA) is often used in local area networks (LANs) and power line communication (PLC). For example, Ethernet is based on CSMA with collision detection (CSMNCD) protocol, and the Japanese regulation of PLC requires to support the CSMA function. Although this CSMA is widely used, it has a problem. The throughput and packet-delay performances degrade rapidly when the offered loads of packets become high. As a solution to the problem, we have proposed a protocol referred to as carrier-sense spread-spectrum with overload detection (CSSS/OD)[l], which is a direct sequence - code division multiple based

2 Yamada ISPLC 2000 protocol with a carrier sensing function and can work complementarily to the CSMNCD protocol [2]. The CSSS/OD protocol is exactly like the CSMNCD, except for the allowable number of simultaneous packet transmissions. In the protocol, one or more packets (up to a certain pre-selected maximum K,) can be transmitted by means of code division techniques. When an overload occurs, i.e., the simultaneous packet transmission of more than K,, the transmission is aborted and the affected packets are rescheduled just like in the CSMAICD protocol. At high offered loads, the CSSSIOD protocol achieves better channel utilization than that of the CSMNCD protocol. At low offered loads, the delay in the CSSSIOD protocol is, however, larger than that in the CSMAICD protocol due to the spread packet-length. Then the optimization is done by changing the allowed number of simultaneous packets, K,, by means of changing the spreading factor N,., adaptively depending on the loads to improve the CSMNCD protocol's performance. We show the optimized performances on an IEEE BASE2 network adopted as the physical layer's assumption, and find the load threshold values when the allowed number Kc, should be changed. The obtained performances are also compared to that of time-division multiple access (TDMA). The results can be applied to OFDM or DMT systems by changing the number of sub-carriers, instead of changing the spreading factor, adaptively depending on network loads. 2. Network Model and CSSSIOD Protocol Consider a slotted network that consists of a finite population of M, terminals, and the maximum signal propagation delay-time between terminals is a unit slot time. All packets are assumed to be of the same length, I slots. A transmission is received with equal power by all terminals. A terminal is said to be in the thinking state when it is in the process of generating a new packet. A thinking terminal changes to be a backlogged one after sensing the channel to be busy or just after it starts transmitting its packet. The backlogged terminals change to be in the thinking state only after the completion of a successful transmission, i.e., at the end of the transmission periods' slot.. Taking that Kc,, (Kc, I M,), is the maximum number of allowable simultaneous packet transmissions, when r (1 5 r I Kcs ) terminals start to transmit simultaneously, their transmission is considered to be successll. Otherwise, if r idle $0 (nonpersistent) Continue the trans. C r, Figure 1: Network access procedure for the slotted NP-CSSSIOD protocol. more than K, terminals simultaneously transmit, an overload is said to have occurred and hence that the

3 Tsuzuki & Yamada ISPLC 2000 particular transmission is said to be unsuccessful. All the affected packets are aborted and retransmitted at a later random time. In this slotted non-persistent (NP) CSSSIOD scheme, a terminal with a packet ready for transmission senses the channel and proceeds as follow; (a) If the channel is sensed idle, the transmission of the packet is initiated at the beginning of the next slot. (b) If the channel is sensed busy (i.e., the presence of a transmission(s)), the packet is rescheduled for transmission to some later random time and repeats procedures (a) and (b). (c) If the overload condition is sensed during a transmission, an overload is declared. The terminal aborts the transmission immediately and initiates an overload-consensus-reenforcement procedure which is similar to the collision consensus reenforcement in the conventional CSMNCD protocols[4]. It then schedules the retransmission of the packet to some later random time. (d) At the time the backlogged packet is to be retransmitted, it senses the channel and repeats the above described algorithm. These procedures are also shown in Fig.1. Note that when we change the word 'overload' to 'collision', the above procedures are the same as those of the CSMNCD protocol. o, in the figure is the probability of a thinking state terminal starting a transmission, (0 l CF, terminal starting a retransmission, (0 I v l 1). 3. Analysis of Utiliition and Delay Performance 5 1). V denotes the probability of a backlogged Figure 2 shows the idle and transmission periods in the slotted NP-CSSSIOD protocol. The summation of these slqt.dua... overload Transmission I ltransmissionl Idle (successful) - t ' Idle -@nsuccessfu I I+ a cycle a cycle I Figure 2: Idle and transmission periods of the NP-CSSSIOD protocol. two periods forms a cycle period. The packet length I equals Tpk2 or Yph, ( Tpkt 2 Ypkt 2 2 1, when the transmission is successful or unsuccessful, respectively. We first define S,, (0 I S, < K,), as the expected number of successfully and simultaneously transmitted packets per unit slot, where the packets are I, spread in time domain (not in f;equency domain), CSMA/C~) as shown in Fig.3, under a restriction of keeping - csm~ the same signaling bandwidth, in other words, keeping the same chip rate irrespective of its spreading factor. If the packet length for the Gss= N.x K S~Z CSMAtCD protocol is denoted by T,,,, T,,, Figure 3: Packet length.

4 ISPLC 2000 is identical to the information data length. However, the packet length for CSSSJCD, T,, is N$ times longer than the information data length. We note that when Nsf =1, CSSSIOD is equivalent to CSMAICD so that K, =l. The average packet delay normalized by Tcsma, denoted by Dp,, is then given as, Dp, = N$ XN~I IS pr 7 (1) where Nbl is the mean number of backlogs. The channel utilization P,,(0 I Pcu < I), 1.e ',, the actual total information (unspread) data rate transmitted successfully (which is normalized by the maximum channel capacity), can be given as since the data rate per packet is l/nq compared to the chip rate of spread packets. The detail derivation of Spr and Nbl is shown in [2]. The offered load g is given as Next, the utilization and delay performances of TDMA are given as follows. In the contention systems, e.g., CSMA, multiple users share a common channel in a way, that can lead to collisions. On the other hand, controlled systems such as TDMA are well controlled not to occur the collisions. Users in TDMA systems transmit sequentially in fixed assigned order. Figure 4 shows the transmission procedure of TDMA. The transmission order is prearranged, then individual terminal of M, transmits a packet using a correspondiing slot according to the given order. A slot length is set to be equal to the packet length of TMa. The average packet delay Dp, normalized by Tcsma is given as, I The first term is a transmission time for a packet of the terminal. The second term indicates the average waiting time till the next transmission order comes, and is constant regardless of the offered load g. The utilization increases in proportion to g, that is, Bcu = glmt. (5) frame Note that, it is assumed that the offered load 1 -- g',(0 5 g'l 1),of each slot is the same, i.e., g = M,g'. 4. Numerical Results and Discussion 3 terminal frame Figure 4: Controlled access method by TDMA. The utilization and delay performances of the CSSSIOD protocol were calculated under the assumption of the IEEE BASE2 network with M, = 30 as an example. The slot time is 2.15~ sec from the lobase2 standard if all terminals are connected to the same segment. Because an unsuccessful transmission period which

5 Tsuzuki & Yamada g ( offered load ) g ( offered load ) (a) Effect of the probability of retransmission. ( N$ (b) Effect of the spreading factor. (v is fixed to is fixed to 1) 0.75) Figure 5: Effect of v and NXf to the delay performance. ' s,o b 2h 2k 3h i5 g ( offered load ) g ( offered load ) (a) Switching points for the optimization (b) Optimized performances of CSMAICD, CSSSIOD and TDMA Figure 6: Delay performance. includes a procedure for a collision detection and a transmission of the jam signal is standardized to be 110 bits time, yp, is set to 5 slot-time [3]. T, was fixed to 100 slot, as an example, which is equivalent to a data-time of about 269 Byte, where the preamble and the protocol header were not included. Here, when the simultaneous transmission is successful, it is assumed that a given spreading code is different from each other and the destination terminal is not duplicated. Since the spreading code for CDMA was assumed to be perfectly orthogonal in this paper, the maximum allowable simultaneous transmission packet number K, was assumed to equal with the spreading factor N$, i.e., K, = Nq, to obtain the upper bounds' performances. In order to study an influence on the delay performance by the re-transmission probability v, the average packet delay D,, for a given offered load was calculated, where Nsf is fixed to 1, i.e., CSMAICD. The selected results to achieve the best delay performance at a certain g when v is given as 0.05, 0.01, 0.15, 0.2, 0.3,

6 ISPLC 0.4, 0.5, 0.6, 0.7, 0.8, 0.9, are shown in Fig.S(a). g of Eq.(3) is given by letting v be fixed and o, change. Because a terminal does not transmit a packet again immediately even if the packet collides under the condition of a low offered load and a small value of v, the average packet delay D,, is large. Accordingly, the value of v must be large in low offered loads in order to optimize the delay performance. Conversely when the offered load increases, the value of v needs to be reduced. In order to study an effect of the spreading factor N$, the retransmission probability v was fixed to and the spreading factor was changed as Nsf =I, 4, 8,16,32. The obtained results of D,, are shown in Fig.S@). Since the packet length becomes longer g ( offerd load ) (a) CSMAICD when the spreading factor becomes larger, the delay i I 1 D,, also becomes longer in low offered loads when compared to that with the smaller spreading factor. However in high offered loads, the delay performance is improved by making Ng large because the maximum number of allowable simultaneous packet transmissions K, becomes large and the occurrence probability of overload decreases. Next, the average packet delay performances were calculated with all combinations of the parameters g ( offerd load ) Ng =4,8,16,32 and v = 0.5, 0.6,0.75, And the (b) CSSSIOD ( Nsf 14 ) selected results which achieve the best delay performance for a given offered load are shown in Fig.6(a). In the figure, the line of Ng =I is the 0.8 n.- Ei optimized performance of Fig.S(a). By changing Ng and V at switch points shown in the figure to draw an 0.4 envelope curve with increase of the offered load, the delay performance can be optimized. That is to say is, in this example, with increase of offered loads, the parameters are changed as (Nsf,V)= (4, 0.75) + (8, g ( offered laad ) 42 ( c) CSMAICD, CSSSIOD, and TDMA 0.75) + (8, 0.6) + (1 6, 0.999) + (1 6, 0.75) -+ Figure 7: Utilization performance.

7 Tsuzuki & Yamada ISPLC 2000 (32, 0.999) to optimize the delay performance. And if a strict control is not needed, V can be 0.75 or when Nsf I 16 or Ng = 32, respectively. Notice that, plots of (N$, V ) = (16,0.75) and (32,0.999) are interrupted at g = 22.5 and 30, respectively. Since our analysis was based on the finite population of M, terminals, offered loads reached the upper limit values of 22.5 and 30 given by Eq.(3) when the traffic is congested to become N,, M,. As for the plot of ( N,/,V ) = (32,0.999), the delay time becomes suddenly small atg% 30. Since the maximum allowable simultaneous transmission packet number was set to 32 although the total transmitter number was 30, all terminals are finally allowed the simultaneous transmission without wait time, so that Nb,/Sp, becomes nearly equal to 1 and Dp, G Nd (= 32). Figure 6(b) shows the delay optimized performances of the CSMAICD and CSSSIOD protocol, and TDMA. The performance of CSSStOD protocol could be brought close to that of TDMA compared to that of CSMAICD. Note that the performance of CSSSIOD is better than that of TDMA when the offered load is relatively low, that is, g is less than 7.5 in this example. Next, optimization of the utilization performance is examined. In order to study an influence to the utilization performance by the retransmission probability V, the utilization performance P, for V = 0.05,0.01, 0.15,0.2,0.3,0.4,0.5,0.6,0.7,0.8,0.9 was calculated when the spreading factor was 1, that is CSMAICD. The selected results which achieved the best performance depending on the offered loads are shown in Fig.7(a). When the value of V is small at low offered loads, the utilization shows good performances, since the number of simultaneous retransmission packets decreases so that the collision is avoided. That is to say, to optimize the utilization performance the value of V must be small in low offered loads, and the value of V needs to be big in high offered loads. The reason why some plots are intempted in the figure is the same as that of Fig.6(a). Similarly, the utilization performances of CSSSIOD for the offered load g with all combinations of Nsf =4,8,16,32 and V = 0.2,0.3,0.4,0.5,0.75,0.999 were calculated. The selected results which achieved the best performance are shown in Fig.7(b). It is shown that the values of offered loads at which the utilization becomes maximum shift to higher values successively when the spreading factor increases so that the maximum allowable simultaneous transmission packet number is also made large. Therefore the optimum performance shown in Fig.7(c) can be obtained by changing the spreading factor and V to draw an envelope curve in the same way as Fig.6(b). In this example, with increase of offered loads the values of spreading factor and retransmission probability are made changed such as (Nsf,V) = (4, 0.2) + (4, 0.3) + (8, 0.3) + (8, 0.4) + (8, 0.5) + (1 6, 0.75) + (32, 0.999). Note that, the interruptions of plot and the rapid increase at g = 30 are because of the same reason mentioned above. Figure 7(c) shows the optimized utilization performances of the CSMAICD and CSSSIOD protocol, and I

8 ISPLC TDMA. This figure shows that the CSSSIOD protocol provides the better performance for high offered loads compared to that of CSMAICD. Moreover, the CSSS/OD protocol performs better than TDMA in a wide area of g=22.5 or less. However, since both of the utilization and delay performances cannot be optimized simultaneously at the same offered load, the switching points of N,/ and v must be differentiated according to the situation, that is, whether the application needs the delay or utilization performance. 5. Conclusions In this paper, a method to obtain the optimized utilization and delay performances of CSSSIOD is discussed under the condition that the total number of terminals is 30 and the maximum allowable simultaneous transmission packet number and the spreading factor are the same. The result shows that the proposed protocol achieves the better performance than that of CSMAICD by switching the spreading factor and the retransmission probability adaptively depending on network loads. By permitting the simultaneous transmission of the optimized number, the proposed method could be a compromising protocol between the conventional contention-protocol such as CSMA and the transmission-bandwidth allocation protocol using CDMA. Although the proposed switching method of the spreading factor was based on the stationary value of offered loads in the analysis, the measurement method of an instantaneous value of offered load must be studied in practical use. Moreover, the spreading-code assignment was assumed to be done ideally in this paper, but the degree of performance deterioration by duplication needs to be studied. Acknowledgment: The authors wish to thank Dr. F.N.Mumba and Mr. S.Ohtsuka for their help of the calculation. The authors would like to be appreciate the support by The Ministry of Education, Science, Sports and Culture, Grant-in-Aid for Scientific Research.

9 References [I] F.Mumba, S.Tsuzuki, Y.Yamada, and S.Tazaki, "Throughput Analysis of Slotted Nonpersistent and One-Persistent CSSSIOD (Carrier Sense Spread Spectrum with Overload Detection) Protocols," IEICE Trans. Fundamentals, vol.e78-a, no.9, pp , Sept [2] S.Tsuzuki, S.Ohtsuka, F.N.Mumba, Y.Yamada, and S-Tazaki, "A Carrier Sensing CDMA Protocol Coexistable with a CSMAICD Protocol, " IEEE Malaysia International Conference on Communication, Kuala Lumpur, pp.s , Nov [3] S.Tsuzuki, Y.Yamada, and S.Tazaki, "A Study of CSMAICD -- CSSSIOD Switching Protocol's Implementation, " Proc IEICE General Conference, A-5-13, p. 197, Mar (In Japanese) [4] F.A.Tobagi and V.B.Hunt, "Performance Analysis of Carrier Sense Multiple Access with Collision Detection, " Computer Networks, 4, pp ,oct.--nov

ECE 4450:427/527 - Computer Networks Spring 2017

ECE 4450:427/527 - Computer Networks Spring 2017 ECE 4450:427/527 - Computer Networks Spring 2017 Dr. Nghi Tran Department of Electrical & Computer Engineering Lecture 5.4: Multiple Access Protocols Dr. Nghi Tran (ECE-University of Akron) ECE 4450:427/527

More information

CHAPTER 7 MAC LAYER PROTOCOLS. Dr. Bhargavi Goswami Associate Professor & Head Department of Computer Science Garden City College

CHAPTER 7 MAC LAYER PROTOCOLS. Dr. Bhargavi Goswami Associate Professor & Head Department of Computer Science Garden City College CHAPTER 7 MAC LAYER PROTOCOLS Dr. Bhargavi Goswami Associate Professor & Head Department of Computer Science Garden City College MEDIUM ACCESS CONTROL - MAC PROTOCOLS When the two stations transmit data

More information

Random Assignment Protocols

Random Assignment Protocols Random Assignment Protocols Random assignment strategies attempt to reduce problem occur in fixed assignment strategy by eliminating pre allocation of bandwidth to communicating nodes. Random assignment

More information

Chapter 12 Multiple Access 12.1

Chapter 12 Multiple Access 12.1 Chapter 12 Multiple Access 12.1 Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. 12.2 Figure 12.1 Data link layer divided into two functionality-oriented sublayers

More information

Link Layer and LANs 안상현서울시립대학교컴퓨터 통계학과.

Link Layer and LANs 안상현서울시립대학교컴퓨터 통계학과. Link Layer and LANs 안상현서울시립대학교컴퓨터 통계학과 ahn@venus.uos.ac.kr Data Link Layer Goals: understand principles behind data link layer services: error detection, correction sharing a broadcast channel: multiple

More information

Medium Access Control

Medium Access Control Medium Access Control Fundamental Problem N nodes in vicinity want to transmit (to, say, N other nodes). How to do this interference free? Interference free means SINR Otherwise, we say that packets collide.

More information

1-1. Switching Networks (Fall 2010) EE 586 Communication and. November 8, Lecture 30

1-1. Switching Networks (Fall 2010) EE 586 Communication and. November 8, Lecture 30 EE 586 Communication and Switching Networks (Fall 2010) Lecture 30 November 8, 2010 1-1 Announcements Quiz on Wednesday Next Monday hands-on training on Contiki OS Bring your laptop 4-2 Multiple Access

More information

Data Link Layer: Multi Access Protocols

Data Link Layer: Multi Access Protocols Digital Communication in the Modern World Data Link Layer: Multi Access Protocols http://www.cs.huji.ac.il/~com1 com1@cs.huji.ac.il Some of the slides have been borrowed from: Computer Networking: A Top

More information

The Link Layer and LANs. Chapter 6: Link layer and LANs

The Link Layer and LANs. Chapter 6: Link layer and LANs The Link Layer and LANs EECS3214 2018-03-14 4-1 Chapter 6: Link layer and LANs our goals: understand principles behind link layer services: error detection, correction sharing a broadcast channel: multiple

More information

Chapter 6 Medium Access Control Protocols and Local Area Networks

Chapter 6 Medium Access Control Protocols and Local Area Networks Chapter 6 Medium Access Control Protocols and Local Area Networks Part I: Medium Access Control Part II: Local Area Networks CSE 3213, Winter 2010 Instructor: Foroohar Foroozan Chapter Overview Broadcast

More information

Random Access. 1. Aloha. 2. Slotted Aloha 3. CSMA 4. CSMA/CD

Random Access. 1. Aloha. 2. Slotted Aloha 3. CSMA 4. CSMA/CD Random Access 1. Aloha 2. Slotted Aloha 3. CSMA 4. CSMA/CD Background Communication medium B No Collision collision A C Modern Local Area Networks (LANs) operate as follows Users are connected to communication

More information

Multiple Access Protocols

Multiple Access Protocols Multiple Access Protocols Computer Networks Lecture 2 http://goo.gl/pze5o8 Multiple Access to a Shared Channel The medium (or its sub-channel) may be shared by multiple stations (dynamic allocation) just

More information

Data Link Layer: Collisions

Data Link Layer: Collisions Data Link Layer: Collisions 1 Multiple Access Data Link layer divided into two sublayers. The upper sublayer is responsible for datalink control, The lower sublayer is responsible for resolving access

More information

Outline. Introduction to Networked Embedded Systems - Embedded systems Networked embedded systems Embedded Internet - Network properties

Outline. Introduction to Networked Embedded Systems - Embedded systems Networked embedded systems Embedded Internet - Network properties Outline Introduction to Networked Embedded Systems - Embedded systems Networked embedded systems Embedded Internet - Network properties Layered Network Architectures - OSI framework descriptions of layers

More information

Physical Layer. Medium Access Links and Protocols. Point-to-Point protocols. Modems: Signaling. Modems Signaling. Srinidhi Varadarajan

Physical Layer. Medium Access Links and Protocols. Point-to-Point protocols. Modems: Signaling. Modems Signaling. Srinidhi Varadarajan P Physical Layer Srinidhi Varadarajan Medium Access Links and Protocols Three types of links : point-to-point (single wire, e.g. PPP, SLIP) broadcast (shared wire or medium; e.g, Ethernet, Wavelan, etc.)

More information

Topics. Link Layer Services (more) Link Layer Services LECTURE 5 MULTIPLE ACCESS AND LOCAL AREA NETWORKS. flow control: error detection:

Topics. Link Layer Services (more) Link Layer Services LECTURE 5 MULTIPLE ACCESS AND LOCAL AREA NETWORKS. flow control: error detection: 1 Topics 2 LECTURE 5 MULTIPLE ACCESS AND LOCAL AREA NETWORKS Multiple access: CSMA/CD, CSMA/CA, token passing, channelization LAN: characteristics, i basic principles i Protocol architecture Topologies

More information

ECEN 5032 Data Networks Medium Access Control Sublayer

ECEN 5032 Data Networks Medium Access Control Sublayer ECEN 5032 Data Networks Medium Access Control Sublayer Peter Mathys mathys@colorado.edu University of Colorado, Boulder c 1996 2005, P. Mathys p.1/35 Overview (Sub)networks can be divided into two categories:

More information

CS 455/555 Intro to Networks and Communications. Link Layer

CS 455/555 Intro to Networks and Communications. Link Layer CS 455/555 Intro to Networks and Communications Link Layer Dr. Michele Weigle Department of Computer Science Old Dominion University mweigle@cs.odu.edu http://www.cs.odu.edu/~mweigle/cs455-s13 1 Link Layer

More information

Ethernet. Introduction. CSE 3213 Fall 2011

Ethernet. Introduction. CSE 3213 Fall 2011 Ethernet CSE 3213 Fall 2011 19 October 2011 1 Introduction Rapid changes in technology designs Broader use of LANs New schemes for high-speed LANs High-speed LAN technologies: Fast and gigabit Ethernet

More information

COS 140: Foundations of Computer Science

COS 140: Foundations of Computer Science COS 140: Foundations of Computer Science ALOHA Network Protocol Family Fall 2017 Homework 2 Introduction 3 Network Protocols.......................................................... 3 Problem.................................................................

More information

CS 43: Computer Networks Media Access. Kevin Webb Swarthmore College November 30, 2017

CS 43: Computer Networks Media Access. Kevin Webb Swarthmore College November 30, 2017 CS 43: Computer Networks Media Access Kevin Webb Swarthmore College November 30, 2017 Multiple Access Links & Protocols Two classes of links : point-to-point dial-up access link between Ethernet switch,

More information

CS 43: Computer Networks. 27: Media Access Contd. December 3, 2018

CS 43: Computer Networks. 27: Media Access Contd. December 3, 2018 CS 43: Computer Networks 27: Media Access Contd. December 3, 2018 Last Class The link layer provides lots of functionality: addressing, framing, media access, error checking could be used independently

More information

COS 140: Foundations of Computer Science

COS 140: Foundations of Computer Science COS 140: Foundations of C S Network Protocol Family Fall 2017 Copyright c 2002 2017 UMaine School of Computing and Information S 1 / 25 Homework Homework Slides, book Chapter 24 on line Homework: All exercises

More information

Redes de Computadores. Medium Access Control

Redes de Computadores. Medium Access Control Redes de Computadores Medium Access Control Manuel P. Ricardo Faculdade de Engenharia da Universidade do Porto 1 » How to control the access of computers to a communication medium?» What is the ideal Medium

More information

CMPE 150/L : Introduction to Computer Networks. Chen Qian Computer Engineering UCSC Baskin Engineering Lecture 16

CMPE 150/L : Introduction to Computer Networks. Chen Qian Computer Engineering UCSC Baskin Engineering Lecture 16 CMPE 150/L : Introduction to Computer Networks Chen Qian Computer Engineering UCSC Baskin Engineering Lecture 16 1 Final project demo Please do the demo next week to the TAs. So basically you may need

More information

Multiple Access (1) Required reading: Garcia 6.1, 6.2.1, CSE 3213, Fall 2010 Instructor: N. Vlajic

Multiple Access (1) Required reading: Garcia 6.1, 6.2.1, CSE 3213, Fall 2010 Instructor: N. Vlajic 1 Multiple Access (1) Required reading: Garcia 6.1, 6.2.1, 6.2.2 CSE 3213, Fall 2010 Instructor: N. Vlajic Multiple Access Communications 2 Broadcast Networks aka multiple access networks multiple sending

More information

Lecture 8 The Data Link Layer part I. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it

Lecture 8 The Data Link Layer part I. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it Lecture 8 The Data Link Layer part I Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it Link Layer: setting the context two physically connected devices: host-router, router-router,

More information

ECE453 Introduction to Computer Networks. Broadcast vs. PPP. Delay. Lecture 7 Multiple Access Control (I)

ECE453 Introduction to Computer Networks. Broadcast vs. PPP. Delay. Lecture 7 Multiple Access Control (I) ECE453 Introduction to Computer Networks Lecture 7 Multiple Access Control (I) 1 Broadcast vs. PPP Broadcast channel = multiaccess channel = random access channel Broadcast LAN Satellite network PPP WAN

More information

Computer Networks Medium Access Control. Mostafa Salehi Fall 2008

Computer Networks Medium Access Control. Mostafa Salehi Fall 2008 Computer Networks Medium Access Control Mostafa Salehi Fall 2008 2008 1 Outline Issues ALOHA Network Ethernet Token Ring Wireless 2 Main Issues Local Area Network (LAN) : Three or more machines are physically

More information

Chapter 5: Link layer

Chapter 5: Link layer Chapter 5: Link layer our goals: v understand principles behind link layer services: error detection, correction sharing a broadcast channel: multiple access link layer addressing local area networks:

More information

Chapter 5 Link Layer and LANs

Chapter 5 Link Layer and LANs Chapter 5 Link Layer and LANs Computer Networking: A Top Down Approach 4 th edition. Jim Kurose, Keith Ross Addison-Wesley, July 2007. All material copyright 1996-2007 J.F Kurose and K.W. Ross, All Rights

More information

Lecture 4: Wireless MAC Overview. Hung-Yu Wei National Taiwan University

Lecture 4: Wireless MAC Overview. Hung-Yu Wei National Taiwan University Lecture 4: Wireless MAC Overview Hung-Yu Wei National Taiwan University Medium Access Control Topology 3 Simplex and Duplex 4 FDMA TDMA CDMA DSSS FHSS Multiple Access Methods Notice: CDMA and spread spectrum

More information

CS 123: Lecture 12, LANs, and Ethernet. George Varghese. October 24, 2006

CS 123: Lecture 12, LANs, and Ethernet. George Varghese. October 24, 2006 CS 123: Lecture 12, LANs, and Ethernet George Varghese October 24, 2006 Selective Reject Modulus failure Example w = 2, Max = 3 0 0 1 3 0 A(1) A(2) 1 0 retransmit A(1) A(2) buffer Case 1 Case 2 reject

More information

CHAPTER 5 PROPAGATION DELAY

CHAPTER 5 PROPAGATION DELAY 98 CHAPTER 5 PROPAGATION DELAY Underwater wireless sensor networks deployed of sensor nodes with sensing, forwarding and processing abilities that operate in underwater. In this environment brought challenges,

More information

COMMUNICATION NETWORKS NETW 501

COMMUNICATION NETWORKS NETW 501 COMMUNICATION NETWORKS NETW 501 TUTORIAL 6 Presented by: Eng. Hana Hesham Eng. Mohamed Atef Data Link Layer Data Link Layer is split into 2 sublayers which are the Logical Link Control (LLC) and the Medium

More information

AN ANALYSIS OF THE MODIFIED BACKOFF MECHANISM FOR IEEE NETWORKS

AN ANALYSIS OF THE MODIFIED BACKOFF MECHANISM FOR IEEE NETWORKS AN ANALYSIS OF THE MODIFIED BACKOFF MECHANISM FOR IEEE 802.11 NETWORKS Marek Natkaniec, Andrzej R. Pach Department of Telecommunications University of Mining and Metallurgy al. Mickiewicza 30, 30-059 Cracow

More information

Data and Computer Communications

Data and Computer Communications Data and Computer Communications Chapter 16 High Speed LANs Eighth Edition by William Stallings Why High Speed LANs? speed and power of PCs has risen graphics-intensive applications and GUIs see LANs as

More information

Packet multiple access and the Aloha protocol

Packet multiple access and the Aloha protocol Packet multiple access and the Aloha protocol Massachusetts Institute of Technology Department of Aeronautics and Astronautics Slide 1 Packet Multiple Access PMA SHARED UPLINK TERMINAL TERMINAL APPL TRANS

More information

Lecture 05 Chapter 16 High Speed LANs

Lecture 05 Chapter 16 High Speed LANs NET 456 High Speed Networks Lecture 05 Chapter 16 High Speed LANs Dr. Anis Koubaa Reformatted slides from textbook Data and Computer Communications, Ninth Edition by William Stallings, 1 (c) Pearson Education

More information

Jaringan Komputer. Broadcast Network. Outline. MAC (Medium Access Control) Channel Allocation Problem. Dynamic Channel Allocation

Jaringan Komputer. Broadcast Network. Outline. MAC (Medium Access Control) Channel Allocation Problem. Dynamic Channel Allocation Broadcast Network Jaringan Komputer Medium Access Control Sublayer 2 network categories: point-to-point connections broadcast channels Key issue in broadcast network: how to determine who gets to use the

More information

Lesson 2-3: The IEEE x MAC Layer

Lesson 2-3: The IEEE x MAC Layer Module 2: Establishing Wireless Connectivity Lesson 2-3: The IEEE 802.11x MAC Layer Lesson Overview This lesson describes basic IEEE 802.11x MAC operation, beginning with an explanation of contention schemes

More information

Introduction to CDMA ALOHA. 3. Access Control Techniques for CDMA ALOHA

Introduction to CDMA ALOHA. 3. Access Control Techniques for CDMA ALOHA Introduction to CDMA ALOHA 3. Access Control Techniques for CDMA ALOHA Takaya Yamazato Center for Information Media Studies, Nagoya University Nagoya 464-01, Japan yamazato@nuee.nagoya-u.ac.jp CDMA ALOHA

More information

Media Access Control in Ad Hoc Networks

Media Access Control in Ad Hoc Networks Media Access Control in Ad Hoc Networks The Wireless Medium is a scarce precious resource. Furthermore, the access medium is broadcast in nature. It is necessary to share this resource efficiently and

More information

Announcements / Wireless Networks and Applications Lecture 9: Wireless LANs Wireless. Regular Ethernet CSMA/CD.

Announcements / Wireless Networks and Applications Lecture 9: Wireless LANs Wireless. Regular Ethernet CSMA/CD. Announcements 18-452/18-750 Wireless Networks and Applications Lecture 9: Wireless LANs 802.11 Wireless Peter Steenkiste Homework 1 should be out by tomorrow Project 1 by Friday Schedule:» Thursday lecture

More information

Medium Access Control Sublayer

Medium Access Control Sublayer Wireless (WLAN) Medium Access Control Sublayer Mahalingam Mississippi State University, MS October 20, 2014 Outline Medium Access Protocols Wireless (WLAN) 1 Medium Access Protocols ALOHA Slotted ALOHA

More information

Networks Homework # 2

Networks Homework # 2 ISLAMIC UNIVERSITY OF GAZA COMPUTER ENGINEERING DEPARTMENT Networks Homework # 2 INSTRUCTIONS: 1. Show your work (i.e., how you derived your answer or the reason behind your thinking) in addition to your

More information

A Novel Contention Window Control Scheme Based on a Markov Chain Model in Dense WLAN Environment

A Novel Contention Window Control Scheme Based on a Markov Chain Model in Dense WLAN Environment 05 Third International Conference on Artificial Intelligence, Modelling and Simulation A Novel Contention Window Control Scheme Based on a Markov Chain Model in Dense WLAN Environment Yoshiaki Morino,

More information

CSC 4900 Computer Networks: The Link Layer

CSC 4900 Computer Networks: The Link Layer CSC 4900 Computer Networks: The Link Layer Professor Henry Carter Fall 2017 Last Time We talked about intra-as routing protocols: Which routing algorithm is used in RIP? OSPF? What techniques allow OSPF

More information

Mobile Communications Chapter 3 : Media Access

Mobile Communications Chapter 3 : Media Access Mobile Communications Chapter 3 : Media Access 2. Motivation 3. SDMA, FDMA, TDMA 1. Aloha and contention based schemes 4. Reservation schemes 5. Collision avoidance, MACA 6. Polling CDMA (Lecture 6) Prof.

More information

Multiple Access Links and Protocols

Multiple Access Links and Protocols Multiple Access Links and Protocols Two types of links : point-to-point PPP for dial-up access point-to-point link between Ethernet switch and host broadcast (shared wire or medium) old-fashioned Ethernet

More information

CMPE 257: Wireless and Mobile Networking

CMPE 257: Wireless and Mobile Networking CMPE 257: Wireless and Mobile Networking Katia Obraczka Computer Engineering UCSC Baskin Engineering Lecture 3 CMPE 257 Winter'11 1 Announcements Accessing secure part of the class Web page: User id: cmpe257.

More information

Power Laws in ALOHA Systems

Power Laws in ALOHA Systems Power Laws in ALOHA Systems E6083: lecture 7 Prof. Predrag R. Jelenković Dept. of Electrical Engineering Columbia University, NY 10027, USA predrag@ee.columbia.edu February 28, 2007 Jelenković (Columbia

More information

Protocols for Multiaccess Networks

Protocols for Multiaccess Networks Protocols for Multiaccess Networks Hosts broadcast packets When a collision occurs, all transmitted packets are lost Lost packets have to be retransmitted => Need Multiaccess Protocol Model - Slotted Aloha

More information

ECE 358 MAC Examples. Xuemin (Sherman) Shen Office: EIT 4155 Phone: x

ECE 358 MAC Examples. Xuemin (Sherman) Shen Office: EIT 4155 Phone: x ECE 358 MAC Examples Xuemin (Sherman) Shen Office: EIT 4155 Phone: x 32691 Email: xshen@bbcr.uwaterloo.ca Problem 1. Consider the following Aloha systems. (a) A group of N users share a 56 kbps pure Aloha

More information

original standard a transmission at 5 GHz bit rate 54 Mbit/s b support for 5.5 and 11 Mbit/s e QoS

original standard a transmission at 5 GHz bit rate 54 Mbit/s b support for 5.5 and 11 Mbit/s e QoS IEEE 802.11 The standard defines a wireless physical interface and the MAC layer while LLC layer is defined in 802.2. The standardization process, started in 1990, is still going on; some versions are:

More information

Lecture 6. Data Link Layer (cont d) Data Link Layer 1-1

Lecture 6. Data Link Layer (cont d) Data Link Layer 1-1 Lecture 6 Data Link Layer (cont d) Data Link Layer 1-1 Agenda Continue the Data Link Layer Multiple Access Links and Protocols Addressing Data Link Layer 1-2 Multiple Access Links and Protocols Two types

More information

Intelligent Transportation Systems. Medium Access Control. Prof. Dr. Thomas Strang

Intelligent Transportation Systems. Medium Access Control. Prof. Dr. Thomas Strang Intelligent Transportation Systems Medium Access Control Prof. Dr. Thomas Strang Recap: Wireless Interconnections Networking types + Scalability + Range Delay Individuality Broadcast o Scalability o Range

More information

Lecture 12 December 04, Wireless Access. Graduate course in Communications Engineering. University of Rome La Sapienza. Rome, Italy

Lecture 12 December 04, Wireless Access. Graduate course in Communications Engineering. University of Rome La Sapienza. Rome, Italy Lecture 12 December 04, 2017 Wireless Access Graduate course in Communications Engineering University of Rome La Sapienza Rome, Italy 2017-2018 Random Medium Access Control Part II - CSMA and Collision

More information

High Level View. EE 122: Ethernet and Random Access protocols. Medium Access Protocols

High Level View. EE 122: Ethernet and Random Access protocols. Medium Access Protocols High Level View EE 122: Ethernet and 802.11 Ion Stoica September 18, 2002 Goal: share a communication medium among multiple hosts connected to it Problem: arbitrate between connected hosts Solution goals:

More information

Lecture 19. Principles behind data link layer services Framing Multiple access protocols

Lecture 19. Principles behind data link layer services Framing Multiple access protocols Link Layer Lecture 19 Principles behind data link layer services Framing Multiple access protocols ALOHA *The slides are adapted from ppt slides (in substantially unaltered form) available from Computer

More information

Lecture 6 The Data Link Layer. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it

Lecture 6 The Data Link Layer. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it Lecture 6 The Data Link Layer Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it Link Layer: setting the context two physically connected devices: host-router, router-router, host-host,

More information

A new MAC protocol for reducing effect of needless transmission deferment induced by missed RTS/CTS handshake

A new MAC protocol for reducing effect of needless transmission deferment induced by missed RTS/CTS handshake Mobile Information Systems 5 (009) 3 DOI 0.333/MIS-009-0070 IOS Press A new MAC protocol for reducing effect of needless transmission deferment induced by missed / handshake Tetsuya Shigeyasu a, Daishi

More information

Data and Computer Communications. Chapter 11 Local Area Network

Data and Computer Communications. Chapter 11 Local Area Network Data and Computer Communications Chapter 11 Local Area Network LAN Topologies Refers to the way in which the stations attached to the network are interconnected Bus Topology Used with multipoint medium

More information

An Efficient Scheduling Scheme for High Speed IEEE WLANs

An Efficient Scheduling Scheme for High Speed IEEE WLANs An Efficient Scheduling Scheme for High Speed IEEE 802.11 WLANs Juki Wirawan Tantra, Chuan Heng Foh, and Bu Sung Lee Centre of Muldia and Network Technology School of Computer Engineering Nanyang Technological

More information

Markov Chains and Multiaccess Protocols: An. Introduction

Markov Chains and Multiaccess Protocols: An. Introduction Markov Chains and Multiaccess Protocols: An Introduction Laila Daniel and Krishnan Narayanan April 8, 2012 Outline of the talk Introduction to Markov Chain applications in Communication and Computer Science

More information

Link Layer: Retransmissions

Link Layer: Retransmissions Link Layer: Retransmissions Context on Reliability Where in the stack should we place reliability functions? Application Transport Network Link Physical CSE 461 University of Washington 2 Context on Reliability

More information

Computer Network Fundamentals Spring Week 3 MAC Layer Andreas Terzis

Computer Network Fundamentals Spring Week 3 MAC Layer Andreas Terzis Computer Network Fundamentals Spring 2008 Week 3 MAC Layer Andreas Terzis Outline MAC Protocols MAC Protocol Examples Channel Partitioning TDMA/FDMA Token Ring Random Access Protocols Aloha and Slotted

More information

Wireless Medium Access Control Protocols

Wireless Medium Access Control Protocols Wireless Medium Access Control Protocols Telecomunicazioni Undergraduate course in Electrical Engineering University of Rome La Sapienza Rome, Italy 2007-2008 Classification of wireless MAC protocols Wireless

More information

EE 122: Ethernet and

EE 122: Ethernet and EE 122: Ethernet and 802.11 Ion Stoica September 18, 2002 (* this talk is based in part on the on-line slides of J. Kurose & K. Rose) High Level View Goal: share a communication medium among multiple hosts

More information

A New Polling-Based Dynamic Slot Assignment Scheme for Broadband Wireless Access Systems

A New Polling-Based Dynamic Slot Assignment Scheme for Broadband Wireless Access Systems NUNO IEICE TRANS. and MATSUMOTO COMMUN., : VOL. A NEW E82-B, POLLING-BASED NO. 12 DECEMBER DYNAMIC 1999 SLOT ASSIGNMENT SCHEME 2031 PAPER Special Issue on Multimedia Mobile Communication Systems A New

More information

MSIT 413: Wireless Technologies Week 8

MSIT 413: Wireless Technologies Week 8 MSIT 413: Wireless Technologies Week 8 Michael L. Honig Department of EECS Northwestern University November 2017 The Multiple Access Problem How can multiple mobiles access (communicate with) the same

More information

Links Reading: Chapter 2. Goals of Todayʼs Lecture. Message, Segment, Packet, and Frame

Links Reading: Chapter 2. Goals of Todayʼs Lecture. Message, Segment, Packet, and Frame Links Reading: Chapter 2 CS 375: Computer Networks Thomas Bressoud 1 Goals of Todayʼs Lecture Link-layer services Encoding, framing, and error detection Error correction and flow control Sharing a shared

More information

CSC 401 Data and Computer Communications Networks

CSC 401 Data and Computer Communications Networks CSC 401 Data and Computer Communications Networks Link Layer: Intro, Errors, Multiple Access Sec 6.1, 6.2, 6.3 Prof. Lina Battestilli Fall 2017 Chapter 6: Link layer Goals: understand principles behind

More information

A Directional MAC Protocol with the DATA-frame Fragmentation and Short Busy Advertisement Signal for Mitigating the Directional Hidden Node Problem

A Directional MAC Protocol with the DATA-frame Fragmentation and Short Busy Advertisement Signal for Mitigating the Directional Hidden Node Problem 2012 IEEE 23rd International Symposium on Personal, Indoor and Mobile Radio Communications - (PIMRC) A Directional MAC Protocol with the DATA-frame Fragmentation and Short Busy Advertisement Signal for

More information

Random Access Suitable Protocols

Random Access Suitable Protocols Random Access Many terminals communicate to a single base station Fixed multiple access methods (TDMA, FDMA, CDMA) become inefficient when the traffic is bursty. Random Access works better for many users,

More information

Multiple Access Communications. EEE 538, WEEK 11 Dr. Nail Akar Bilkent University Electrical and Electronics Engineering Department

Multiple Access Communications. EEE 538, WEEK 11 Dr. Nail Akar Bilkent University Electrical and Electronics Engineering Department Multiple Access Communications EEE 538, WEEK 11 Dr. Nail Akar Bilkent University Electrical and Electronics Engineering Department 1 Multiple Access Satellite systems, radio networks (WLAN), ethernet segment

More information

The Link Layer II: Ethernet

The Link Layer II: Ethernet Monday Recap The Link Layer II: Ethernet q Link layer services q Principles for multiple access protocols q Categories of multiple access protocols CSC 249 March 24, 2017 1 2 Recap: Random Access Protocols

More information

Goals. Fundamentals of Network Media. More topics. Topics. Multiple access communication. Multiple access solutions

Goals. Fundamentals of Network Media. More topics. Topics. Multiple access communication. Multiple access solutions Fundamentals of Network Media Local Area Networks Ursula Holmström Goals Learn the basic concepts related to LAN technologies, for example use of shared media medium access control topologies Know the

More information

A Medium Access Control Protocol with Retransmission using NACK and Directional Antennas for Broadcasting in Wireless Ad-Hoc Networks

A Medium Access Control Protocol with Retransmission using NACK and Directional Antennas for Broadcasting in Wireless Ad-Hoc Networks A Medium Access Control Protocol with Retransmission using NACK and Directional Antennas for Broadcasting in Wireless Ad-Hoc Networks Yoriko Utsunomiya, Michito Takahashi, Masaki Bandai, and Iwao Sasase

More information

IEEE 1901 HD-PLC (High Definition Power Line Communication) Abstract

IEEE 1901 HD-PLC (High Definition Power Line Communication) Abstract IEEE 1901 HD-PLC (High Definition Power Line Communication) Abstract The growing penetration of the internet throughout the society has also brought advantages to SOHOs and home networks. As networks develop,

More information

Wireless Communications

Wireless Communications 4. Medium Access Control Sublayer DIN/CTC/UEM 2018 Why do we need MAC for? Medium Access Control (MAC) Shared medium instead of point-to-point link MAC sublayer controls access to shared medium Examples:

More information

Experimental Framework and Simulator for the MAC of Power-Line Communications

Experimental Framework and Simulator for the MAC of Power-Line Communications Experimental Framework and Simulator for the MAC of Power-Line Communications Technical Report Christina Vlachou EPFL, Switzerland christinavlachou@epflch Julien Herzen EPFL, Switzerland julienherzen@epflch

More information

CHAPTER TWO LITERATURE REVIEW

CHAPTER TWO LITERATURE REVIEW CHAPTER TWO LITERATURE REVIEW 2.1 Introduction. This chapter provides in detail about the multiple access technologies and the OCDMA system. It starts with a discussion on various existing multiple-access

More information

TSIN01 Information Networks Lecture 3

TSIN01 Information Networks Lecture 3 TSIN01 Information Networks Lecture 3 Danyo Danev Division of Communication Systems Department of Electrical Engineering Linköping University, Sweden September 10 th, 2018 Danyo Danev TSIN01 Information

More information

LANs. Local Area Networks. via the Media Access Control (MAC) SubLayer. Networks: Local Area Networks

LANs. Local Area Networks. via the Media Access Control (MAC) SubLayer. Networks: Local Area Networks LANs Local Area Networks via the Media Access Control (MAC) SubLayer 1 Local Area Networks Aloha Slotted Aloha CSMA (non-persistent, 1-persistent, p-persistent) CSMA/CD Ethernet Token Ring 2 Network Layer

More information

Lecture 5 The Data Link Layer. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it

Lecture 5 The Data Link Layer. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it Lecture 5 The Data Link Layer Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it Link Layer: setting the context two physically connected devices: host-router, router-router, host-host,

More information

Aloha and slotted aloha

Aloha and slotted aloha CSMA 2/13/06 Aloha and slotted aloha Slotted aloha: transmissions are synchronized and only start at the beginning of a time slot. Aloha sender A sender B collision sender C t Slotted Aloha collision sender

More information

Contention Protocols and Networks

Contention Protocols and Networks 4/13/2005 314 Lecture Contention Protocols and Networks 1 Contention Protocols and Networks Contention Protocols CSMA/CD Network Topologies Ethernet 4/13/2005 314 Lecture Contention Protocols and Networks

More information

Real-Time (Paradigms) (47)

Real-Time (Paradigms) (47) Real-Time (Paradigms) (47) Memory: Memory Access Protocols Tasks competing for exclusive memory access (critical sections, semaphores) become interdependent, a common phenomenon especially in distributed

More information

Wireless MACs: MACAW/802.11

Wireless MACs: MACAW/802.11 Wireless MACs: MACAW/802.11 Mark Handley UCL Computer Science CS 3035/GZ01 Fundamentals: Spectrum and Capacity A particular radio transmits over some range of frequencies; its bandwidth, in the physical

More information

Data Link Layer Technologies

Data Link Layer Technologies Chapter 2.2 La 2 Data Link La Technologies 1 Content Introduction La 2: Frames Error Handling 2 Media Access Control General approaches and terms Aloha Principles CSMA, CSMA/CD, CSMA / CA Master-Slave

More information

RECENTLY, the information exchange using wired and

RECENTLY, the information exchange using wired and Fast Dedicated Retransmission Scheme for Reliable Services in OFDMA Systems Howon Lee and Dong-Ho Cho Department of Electrical Engineering and Computer Science Korea Advanced Institute of Science and Technology

More information

Multiple-access protocols

Multiple-access protocols Multiple Access Multiple-access protocols Random Access MA CSMA CSMA/CD CSMA/CA RANDOM ACCESS In a random access method, each station has the right to the medium without being controlled by any other station.

More information

ISSN: (Online) Volume 2, Issue 6, June 2014 International Journal of Advance Research in Computer Science and Management Studies

ISSN: (Online) Volume 2, Issue 6, June 2014 International Journal of Advance Research in Computer Science and Management Studies ISSN: 2321-7782 (Online) Volume 2, Issue 6, June 2014 International Journal of Advance Research in Computer Science and Management Studies Research Article / Survey Paper / Case Study Available online

More information

IEEE C802.16h-07/017. IEEE Broadband Wireless Access Working Group <

IEEE C802.16h-07/017. IEEE Broadband Wireless Access Working Group < Project Title Date Submitted IEEE 82.16 Broadband Wireless Access Working Group Simulation of IEEE 82.16h and IEEE Coexistence (Preliminary Report) 7-1-12 Source(s) John Sydor, Amir

More information

Interface The exit interface a packet will take when destined for a specific network.

Interface The exit interface a packet will take when destined for a specific network. The Network Layer The Network layer (also called layer 3) manages device addressing, tracks the location of devices on the network, and determines the best way to move data, which means that the Network

More information

Problem Set Name the 7 OSI layers and give the corresponding functionalities for each layer.

Problem Set Name the 7 OSI layers and give the corresponding functionalities for each layer. Problem Set 1 1. Why do we use layering in computer networks? 2. Name the 7 OSI layers and give the corresponding functionalities for each layer. 3. Compare the network performance of the 3 Multiple Access

More information

Review. Error Detection: CRC Multiple access protocols. LAN addresses and ARP Ethernet. Slotted ALOHA CSMA/CD

Review. Error Detection: CRC Multiple access protocols. LAN addresses and ARP Ethernet. Slotted ALOHA CSMA/CD Review Error Detection: CRC Multiple access protocols Slotted ALOHA CSMA/CD LAN addresses and ARP Ethernet Some slides are in courtesy of J. Kurose and K. Ross Overview Ethernet Hubs, bridges, and switches

More information

Chapter 1 Basic concepts of wireless data networks (cont d)

Chapter 1 Basic concepts of wireless data networks (cont d) Chapter 1 Basic concepts of wireless data networks (cont d) Part 2: Medium access methods for mobile data networks Sept 15 2004 1 Fixed assignment access schemes in voice-oriented networks Frequency division

More information

CSE 461 Multiple Access. David Wetherall

CSE 461 Multiple Access. David Wetherall CSE 461 Multiple Access David Wetherall djw@cs.washington.edu How to share a link Multiplexing = networking term for sharing a resource among multiple users (e.g., link, protocol instance) Topics: Multiplexing

More information