Utilization and Delay Performance Analysis of Carrier Sense CDMA Protocol
|
|
- Florence Simmons
- 6 years ago
- Views:
Transcription
1 -- Tsuzuki & Yamada ISPLC 2000 Utilization and Delay Performance Analysis of Carrier Sense CDMA Protocol Shinji TSUZUKI Yoshio YAMADA Department of Electrical and Electronic Engineering, Ehime University, Matsuyama, , Japan Phone Fax ABSTRACT Ethernet is based on camer sense multiple access with collision detection (CSMNCD) protocol. Although this protocol is widely used in local area networks (LANs), it has a problem. The throughput and packet-delay performances degrade rapidly when the offered loads of packets become high. As a solution to the problem, we have proposed camer sense spread spectrum with overload detection (CSSSIOD) protocol, which is a DS - CDMA (direct sequence - code division multiple access) based protocol with a carrier sensing function and changes the spreading factor adaptively depending on network loads to improve the conventional Ethernet's performance. In this paper, we show its optimized performances of the channel utilization and the delay time. key words: multiple-access techniques, spread spectrum techniques, local area network (LAN), carrier sense multiple access (CSMA), CDMA, multi-carrier modulation 1. Introduction, The growing success of digital services related to new directions in entertainment, high-speed Internet access, combined with trends in home automation, control, and security is leading to a new focus on digital home networks. Considering Japanese houses, the additional-wiring-free media, such as power-line carrier and RF, could be the promising candidates for the network media. As the suitable modulation technique for those media, spread spectrum (SS) and multi-carrier, such as Orthogonal Frequency Division Multiplexing (OFDM) and Discrete Multi Tone (DMT), have been studied. However, the multiple-access protocol suitable for these modulation techniques has not yet studied sufficiently. In this paper, the multiple-access protocol using SS modulation is introduced and its utilization and delay performance is analyzed. The carrier sense multiple access (CSMA) is often used in local area networks (LANs) and power line communication (PLC). For example, Ethernet is based on CSMA with collision detection (CSMNCD) protocol, and the Japanese regulation of PLC requires to support the CSMA function. Although this CSMA is widely used, it has a problem. The throughput and packet-delay performances degrade rapidly when the offered loads of packets become high. As a solution to the problem, we have proposed a protocol referred to as carrier-sense spread-spectrum with overload detection (CSSS/OD)[l], which is a direct sequence - code division multiple based
2 Yamada ISPLC 2000 protocol with a carrier sensing function and can work complementarily to the CSMNCD protocol [2]. The CSSS/OD protocol is exactly like the CSMNCD, except for the allowable number of simultaneous packet transmissions. In the protocol, one or more packets (up to a certain pre-selected maximum K,) can be transmitted by means of code division techniques. When an overload occurs, i.e., the simultaneous packet transmission of more than K,, the transmission is aborted and the affected packets are rescheduled just like in the CSMAICD protocol. At high offered loads, the CSSSIOD protocol achieves better channel utilization than that of the CSMNCD protocol. At low offered loads, the delay in the CSSSIOD protocol is, however, larger than that in the CSMAICD protocol due to the spread packet-length. Then the optimization is done by changing the allowed number of simultaneous packets, K,, by means of changing the spreading factor N,., adaptively depending on the loads to improve the CSMNCD protocol's performance. We show the optimized performances on an IEEE BASE2 network adopted as the physical layer's assumption, and find the load threshold values when the allowed number Kc, should be changed. The obtained performances are also compared to that of time-division multiple access (TDMA). The results can be applied to OFDM or DMT systems by changing the number of sub-carriers, instead of changing the spreading factor, adaptively depending on network loads. 2. Network Model and CSSSIOD Protocol Consider a slotted network that consists of a finite population of M, terminals, and the maximum signal propagation delay-time between terminals is a unit slot time. All packets are assumed to be of the same length, I slots. A transmission is received with equal power by all terminals. A terminal is said to be in the thinking state when it is in the process of generating a new packet. A thinking terminal changes to be a backlogged one after sensing the channel to be busy or just after it starts transmitting its packet. The backlogged terminals change to be in the thinking state only after the completion of a successful transmission, i.e., at the end of the transmission periods' slot.. Taking that Kc,, (Kc, I M,), is the maximum number of allowable simultaneous packet transmissions, when r (1 5 r I Kcs ) terminals start to transmit simultaneously, their transmission is considered to be successll. Otherwise, if r idle $0 (nonpersistent) Continue the trans. C r, Figure 1: Network access procedure for the slotted NP-CSSSIOD protocol. more than K, terminals simultaneously transmit, an overload is said to have occurred and hence that the
3 Tsuzuki & Yamada ISPLC 2000 particular transmission is said to be unsuccessful. All the affected packets are aborted and retransmitted at a later random time. In this slotted non-persistent (NP) CSSSIOD scheme, a terminal with a packet ready for transmission senses the channel and proceeds as follow; (a) If the channel is sensed idle, the transmission of the packet is initiated at the beginning of the next slot. (b) If the channel is sensed busy (i.e., the presence of a transmission(s)), the packet is rescheduled for transmission to some later random time and repeats procedures (a) and (b). (c) If the overload condition is sensed during a transmission, an overload is declared. The terminal aborts the transmission immediately and initiates an overload-consensus-reenforcement procedure which is similar to the collision consensus reenforcement in the conventional CSMNCD protocols[4]. It then schedules the retransmission of the packet to some later random time. (d) At the time the backlogged packet is to be retransmitted, it senses the channel and repeats the above described algorithm. These procedures are also shown in Fig.1. Note that when we change the word 'overload' to 'collision', the above procedures are the same as those of the CSMNCD protocol. o, in the figure is the probability of a thinking state terminal starting a transmission, (0 l CF, terminal starting a retransmission, (0 I v l 1). 3. Analysis of Utiliition and Delay Performance 5 1). V denotes the probability of a backlogged Figure 2 shows the idle and transmission periods in the slotted NP-CSSSIOD protocol. The summation of these slqt.dua... overload Transmission I ltransmissionl Idle (successful) - t ' Idle -@nsuccessfu I I+ a cycle a cycle I Figure 2: Idle and transmission periods of the NP-CSSSIOD protocol. two periods forms a cycle period. The packet length I equals Tpk2 or Yph, ( Tpkt 2 Ypkt 2 2 1, when the transmission is successful or unsuccessful, respectively. We first define S,, (0 I S, < K,), as the expected number of successfully and simultaneously transmitted packets per unit slot, where the packets are I, spread in time domain (not in f;equency domain), CSMA/C~) as shown in Fig.3, under a restriction of keeping - csm~ the same signaling bandwidth, in other words, keeping the same chip rate irrespective of its spreading factor. If the packet length for the Gss= N.x K S~Z CSMAtCD protocol is denoted by T,,,, T,,, Figure 3: Packet length.
4 ISPLC 2000 is identical to the information data length. However, the packet length for CSSSJCD, T,, is N$ times longer than the information data length. We note that when Nsf =1, CSSSIOD is equivalent to CSMAICD so that K, =l. The average packet delay normalized by Tcsma, denoted by Dp,, is then given as, Dp, = N$ XN~I IS pr 7 (1) where Nbl is the mean number of backlogs. The channel utilization P,,(0 I Pcu < I), 1.e ',, the actual total information (unspread) data rate transmitted successfully (which is normalized by the maximum channel capacity), can be given as since the data rate per packet is l/nq compared to the chip rate of spread packets. The detail derivation of Spr and Nbl is shown in [2]. The offered load g is given as Next, the utilization and delay performances of TDMA are given as follows. In the contention systems, e.g., CSMA, multiple users share a common channel in a way, that can lead to collisions. On the other hand, controlled systems such as TDMA are well controlled not to occur the collisions. Users in TDMA systems transmit sequentially in fixed assigned order. Figure 4 shows the transmission procedure of TDMA. The transmission order is prearranged, then individual terminal of M, transmits a packet using a correspondiing slot according to the given order. A slot length is set to be equal to the packet length of TMa. The average packet delay Dp, normalized by Tcsma is given as, I The first term is a transmission time for a packet of the terminal. The second term indicates the average waiting time till the next transmission order comes, and is constant regardless of the offered load g. The utilization increases in proportion to g, that is, Bcu = glmt. (5) frame Note that, it is assumed that the offered load 1 -- g',(0 5 g'l 1),of each slot is the same, i.e., g = M,g'. 4. Numerical Results and Discussion 3 terminal frame Figure 4: Controlled access method by TDMA. The utilization and delay performances of the CSSSIOD protocol were calculated under the assumption of the IEEE BASE2 network with M, = 30 as an example. The slot time is 2.15~ sec from the lobase2 standard if all terminals are connected to the same segment. Because an unsuccessful transmission period which
5 Tsuzuki & Yamada g ( offered load ) g ( offered load ) (a) Effect of the probability of retransmission. ( N$ (b) Effect of the spreading factor. (v is fixed to is fixed to 1) 0.75) Figure 5: Effect of v and NXf to the delay performance. ' s,o b 2h 2k 3h i5 g ( offered load ) g ( offered load ) (a) Switching points for the optimization (b) Optimized performances of CSMAICD, CSSSIOD and TDMA Figure 6: Delay performance. includes a procedure for a collision detection and a transmission of the jam signal is standardized to be 110 bits time, yp, is set to 5 slot-time [3]. T, was fixed to 100 slot, as an example, which is equivalent to a data-time of about 269 Byte, where the preamble and the protocol header were not included. Here, when the simultaneous transmission is successful, it is assumed that a given spreading code is different from each other and the destination terminal is not duplicated. Since the spreading code for CDMA was assumed to be perfectly orthogonal in this paper, the maximum allowable simultaneous transmission packet number K, was assumed to equal with the spreading factor N$, i.e., K, = Nq, to obtain the upper bounds' performances. In order to study an influence on the delay performance by the re-transmission probability v, the average packet delay D,, for a given offered load was calculated, where Nsf is fixed to 1, i.e., CSMAICD. The selected results to achieve the best delay performance at a certain g when v is given as 0.05, 0.01, 0.15, 0.2, 0.3,
6 ISPLC 0.4, 0.5, 0.6, 0.7, 0.8, 0.9, are shown in Fig.S(a). g of Eq.(3) is given by letting v be fixed and o, change. Because a terminal does not transmit a packet again immediately even if the packet collides under the condition of a low offered load and a small value of v, the average packet delay D,, is large. Accordingly, the value of v must be large in low offered loads in order to optimize the delay performance. Conversely when the offered load increases, the value of v needs to be reduced. In order to study an effect of the spreading factor N$, the retransmission probability v was fixed to and the spreading factor was changed as Nsf =I, 4, 8,16,32. The obtained results of D,, are shown in Fig.S@). Since the packet length becomes longer g ( offerd load ) (a) CSMAICD when the spreading factor becomes larger, the delay i I 1 D,, also becomes longer in low offered loads when compared to that with the smaller spreading factor. However in high offered loads, the delay performance is improved by making Ng large because the maximum number of allowable simultaneous packet transmissions K, becomes large and the occurrence probability of overload decreases. Next, the average packet delay performances were calculated with all combinations of the parameters g ( offerd load ) Ng =4,8,16,32 and v = 0.5, 0.6,0.75, And the (b) CSSSIOD ( Nsf 14 ) selected results which achieve the best delay performance for a given offered load are shown in Fig.6(a). In the figure, the line of Ng =I is the 0.8 n.- Ei optimized performance of Fig.S(a). By changing Ng and V at switch points shown in the figure to draw an 0.4 envelope curve with increase of the offered load, the delay performance can be optimized. That is to say is, in this example, with increase of offered loads, the parameters are changed as (Nsf,V)= (4, 0.75) + (8, g ( offered laad ) 42 ( c) CSMAICD, CSSSIOD, and TDMA 0.75) + (8, 0.6) + (1 6, 0.999) + (1 6, 0.75) -+ Figure 7: Utilization performance.
7 Tsuzuki & Yamada ISPLC 2000 (32, 0.999) to optimize the delay performance. And if a strict control is not needed, V can be 0.75 or when Nsf I 16 or Ng = 32, respectively. Notice that, plots of (N$, V ) = (16,0.75) and (32,0.999) are interrupted at g = 22.5 and 30, respectively. Since our analysis was based on the finite population of M, terminals, offered loads reached the upper limit values of 22.5 and 30 given by Eq.(3) when the traffic is congested to become N,, M,. As for the plot of ( N,/,V ) = (32,0.999), the delay time becomes suddenly small atg% 30. Since the maximum allowable simultaneous transmission packet number was set to 32 although the total transmitter number was 30, all terminals are finally allowed the simultaneous transmission without wait time, so that Nb,/Sp, becomes nearly equal to 1 and Dp, G Nd (= 32). Figure 6(b) shows the delay optimized performances of the CSMAICD and CSSSIOD protocol, and TDMA. The performance of CSSStOD protocol could be brought close to that of TDMA compared to that of CSMAICD. Note that the performance of CSSSIOD is better than that of TDMA when the offered load is relatively low, that is, g is less than 7.5 in this example. Next, optimization of the utilization performance is examined. In order to study an influence to the utilization performance by the retransmission probability V, the utilization performance P, for V = 0.05,0.01, 0.15,0.2,0.3,0.4,0.5,0.6,0.7,0.8,0.9 was calculated when the spreading factor was 1, that is CSMAICD. The selected results which achieved the best performance depending on the offered loads are shown in Fig.7(a). When the value of V is small at low offered loads, the utilization shows good performances, since the number of simultaneous retransmission packets decreases so that the collision is avoided. That is to say, to optimize the utilization performance the value of V must be small in low offered loads, and the value of V needs to be big in high offered loads. The reason why some plots are intempted in the figure is the same as that of Fig.6(a). Similarly, the utilization performances of CSSSIOD for the offered load g with all combinations of Nsf =4,8,16,32 and V = 0.2,0.3,0.4,0.5,0.75,0.999 were calculated. The selected results which achieved the best performance are shown in Fig.7(b). It is shown that the values of offered loads at which the utilization becomes maximum shift to higher values successively when the spreading factor increases so that the maximum allowable simultaneous transmission packet number is also made large. Therefore the optimum performance shown in Fig.7(c) can be obtained by changing the spreading factor and V to draw an envelope curve in the same way as Fig.6(b). In this example, with increase of offered loads the values of spreading factor and retransmission probability are made changed such as (Nsf,V) = (4, 0.2) + (4, 0.3) + (8, 0.3) + (8, 0.4) + (8, 0.5) + (1 6, 0.75) + (32, 0.999). Note that, the interruptions of plot and the rapid increase at g = 30 are because of the same reason mentioned above. Figure 7(c) shows the optimized utilization performances of the CSMAICD and CSSSIOD protocol, and I
8 ISPLC TDMA. This figure shows that the CSSSIOD protocol provides the better performance for high offered loads compared to that of CSMAICD. Moreover, the CSSS/OD protocol performs better than TDMA in a wide area of g=22.5 or less. However, since both of the utilization and delay performances cannot be optimized simultaneously at the same offered load, the switching points of N,/ and v must be differentiated according to the situation, that is, whether the application needs the delay or utilization performance. 5. Conclusions In this paper, a method to obtain the optimized utilization and delay performances of CSSSIOD is discussed under the condition that the total number of terminals is 30 and the maximum allowable simultaneous transmission packet number and the spreading factor are the same. The result shows that the proposed protocol achieves the better performance than that of CSMAICD by switching the spreading factor and the retransmission probability adaptively depending on network loads. By permitting the simultaneous transmission of the optimized number, the proposed method could be a compromising protocol between the conventional contention-protocol such as CSMA and the transmission-bandwidth allocation protocol using CDMA. Although the proposed switching method of the spreading factor was based on the stationary value of offered loads in the analysis, the measurement method of an instantaneous value of offered load must be studied in practical use. Moreover, the spreading-code assignment was assumed to be done ideally in this paper, but the degree of performance deterioration by duplication needs to be studied. Acknowledgment: The authors wish to thank Dr. F.N.Mumba and Mr. S.Ohtsuka for their help of the calculation. The authors would like to be appreciate the support by The Ministry of Education, Science, Sports and Culture, Grant-in-Aid for Scientific Research.
9 References [I] F.Mumba, S.Tsuzuki, Y.Yamada, and S.Tazaki, "Throughput Analysis of Slotted Nonpersistent and One-Persistent CSSSIOD (Carrier Sense Spread Spectrum with Overload Detection) Protocols," IEICE Trans. Fundamentals, vol.e78-a, no.9, pp , Sept [2] S.Tsuzuki, S.Ohtsuka, F.N.Mumba, Y.Yamada, and S-Tazaki, "A Carrier Sensing CDMA Protocol Coexistable with a CSMAICD Protocol, " IEEE Malaysia International Conference on Communication, Kuala Lumpur, pp.s , Nov [3] S.Tsuzuki, Y.Yamada, and S.Tazaki, "A Study of CSMAICD -- CSSSIOD Switching Protocol's Implementation, " Proc IEICE General Conference, A-5-13, p. 197, Mar (In Japanese) [4] F.A.Tobagi and V.B.Hunt, "Performance Analysis of Carrier Sense Multiple Access with Collision Detection, " Computer Networks, 4, pp ,oct.--nov
ECE 4450:427/527 - Computer Networks Spring 2017
ECE 4450:427/527 - Computer Networks Spring 2017 Dr. Nghi Tran Department of Electrical & Computer Engineering Lecture 5.4: Multiple Access Protocols Dr. Nghi Tran (ECE-University of Akron) ECE 4450:427/527
More informationCHAPTER 7 MAC LAYER PROTOCOLS. Dr. Bhargavi Goswami Associate Professor & Head Department of Computer Science Garden City College
CHAPTER 7 MAC LAYER PROTOCOLS Dr. Bhargavi Goswami Associate Professor & Head Department of Computer Science Garden City College MEDIUM ACCESS CONTROL - MAC PROTOCOLS When the two stations transmit data
More informationRandom Assignment Protocols
Random Assignment Protocols Random assignment strategies attempt to reduce problem occur in fixed assignment strategy by eliminating pre allocation of bandwidth to communicating nodes. Random assignment
More informationChapter 12 Multiple Access 12.1
Chapter 12 Multiple Access 12.1 Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. 12.2 Figure 12.1 Data link layer divided into two functionality-oriented sublayers
More informationLink Layer and LANs 안상현서울시립대학교컴퓨터 통계학과.
Link Layer and LANs 안상현서울시립대학교컴퓨터 통계학과 ahn@venus.uos.ac.kr Data Link Layer Goals: understand principles behind data link layer services: error detection, correction sharing a broadcast channel: multiple
More informationMedium Access Control
Medium Access Control Fundamental Problem N nodes in vicinity want to transmit (to, say, N other nodes). How to do this interference free? Interference free means SINR Otherwise, we say that packets collide.
More information1-1. Switching Networks (Fall 2010) EE 586 Communication and. November 8, Lecture 30
EE 586 Communication and Switching Networks (Fall 2010) Lecture 30 November 8, 2010 1-1 Announcements Quiz on Wednesday Next Monday hands-on training on Contiki OS Bring your laptop 4-2 Multiple Access
More informationData Link Layer: Multi Access Protocols
Digital Communication in the Modern World Data Link Layer: Multi Access Protocols http://www.cs.huji.ac.il/~com1 com1@cs.huji.ac.il Some of the slides have been borrowed from: Computer Networking: A Top
More informationThe Link Layer and LANs. Chapter 6: Link layer and LANs
The Link Layer and LANs EECS3214 2018-03-14 4-1 Chapter 6: Link layer and LANs our goals: understand principles behind link layer services: error detection, correction sharing a broadcast channel: multiple
More informationChapter 6 Medium Access Control Protocols and Local Area Networks
Chapter 6 Medium Access Control Protocols and Local Area Networks Part I: Medium Access Control Part II: Local Area Networks CSE 3213, Winter 2010 Instructor: Foroohar Foroozan Chapter Overview Broadcast
More informationRandom Access. 1. Aloha. 2. Slotted Aloha 3. CSMA 4. CSMA/CD
Random Access 1. Aloha 2. Slotted Aloha 3. CSMA 4. CSMA/CD Background Communication medium B No Collision collision A C Modern Local Area Networks (LANs) operate as follows Users are connected to communication
More informationMultiple Access Protocols
Multiple Access Protocols Computer Networks Lecture 2 http://goo.gl/pze5o8 Multiple Access to a Shared Channel The medium (or its sub-channel) may be shared by multiple stations (dynamic allocation) just
More informationData Link Layer: Collisions
Data Link Layer: Collisions 1 Multiple Access Data Link layer divided into two sublayers. The upper sublayer is responsible for datalink control, The lower sublayer is responsible for resolving access
More informationOutline. Introduction to Networked Embedded Systems - Embedded systems Networked embedded systems Embedded Internet - Network properties
Outline Introduction to Networked Embedded Systems - Embedded systems Networked embedded systems Embedded Internet - Network properties Layered Network Architectures - OSI framework descriptions of layers
More informationPhysical Layer. Medium Access Links and Protocols. Point-to-Point protocols. Modems: Signaling. Modems Signaling. Srinidhi Varadarajan
P Physical Layer Srinidhi Varadarajan Medium Access Links and Protocols Three types of links : point-to-point (single wire, e.g. PPP, SLIP) broadcast (shared wire or medium; e.g, Ethernet, Wavelan, etc.)
More informationTopics. Link Layer Services (more) Link Layer Services LECTURE 5 MULTIPLE ACCESS AND LOCAL AREA NETWORKS. flow control: error detection:
1 Topics 2 LECTURE 5 MULTIPLE ACCESS AND LOCAL AREA NETWORKS Multiple access: CSMA/CD, CSMA/CA, token passing, channelization LAN: characteristics, i basic principles i Protocol architecture Topologies
More informationECEN 5032 Data Networks Medium Access Control Sublayer
ECEN 5032 Data Networks Medium Access Control Sublayer Peter Mathys mathys@colorado.edu University of Colorado, Boulder c 1996 2005, P. Mathys p.1/35 Overview (Sub)networks can be divided into two categories:
More informationCS 455/555 Intro to Networks and Communications. Link Layer
CS 455/555 Intro to Networks and Communications Link Layer Dr. Michele Weigle Department of Computer Science Old Dominion University mweigle@cs.odu.edu http://www.cs.odu.edu/~mweigle/cs455-s13 1 Link Layer
More informationEthernet. Introduction. CSE 3213 Fall 2011
Ethernet CSE 3213 Fall 2011 19 October 2011 1 Introduction Rapid changes in technology designs Broader use of LANs New schemes for high-speed LANs High-speed LAN technologies: Fast and gigabit Ethernet
More informationCOS 140: Foundations of Computer Science
COS 140: Foundations of Computer Science ALOHA Network Protocol Family Fall 2017 Homework 2 Introduction 3 Network Protocols.......................................................... 3 Problem.................................................................
More informationCS 43: Computer Networks Media Access. Kevin Webb Swarthmore College November 30, 2017
CS 43: Computer Networks Media Access Kevin Webb Swarthmore College November 30, 2017 Multiple Access Links & Protocols Two classes of links : point-to-point dial-up access link between Ethernet switch,
More informationCS 43: Computer Networks. 27: Media Access Contd. December 3, 2018
CS 43: Computer Networks 27: Media Access Contd. December 3, 2018 Last Class The link layer provides lots of functionality: addressing, framing, media access, error checking could be used independently
More informationCOS 140: Foundations of Computer Science
COS 140: Foundations of C S Network Protocol Family Fall 2017 Copyright c 2002 2017 UMaine School of Computing and Information S 1 / 25 Homework Homework Slides, book Chapter 24 on line Homework: All exercises
More informationRedes de Computadores. Medium Access Control
Redes de Computadores Medium Access Control Manuel P. Ricardo Faculdade de Engenharia da Universidade do Porto 1 » How to control the access of computers to a communication medium?» What is the ideal Medium
More informationCMPE 150/L : Introduction to Computer Networks. Chen Qian Computer Engineering UCSC Baskin Engineering Lecture 16
CMPE 150/L : Introduction to Computer Networks Chen Qian Computer Engineering UCSC Baskin Engineering Lecture 16 1 Final project demo Please do the demo next week to the TAs. So basically you may need
More informationMultiple Access (1) Required reading: Garcia 6.1, 6.2.1, CSE 3213, Fall 2010 Instructor: N. Vlajic
1 Multiple Access (1) Required reading: Garcia 6.1, 6.2.1, 6.2.2 CSE 3213, Fall 2010 Instructor: N. Vlajic Multiple Access Communications 2 Broadcast Networks aka multiple access networks multiple sending
More informationLecture 8 The Data Link Layer part I. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it
Lecture 8 The Data Link Layer part I Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it Link Layer: setting the context two physically connected devices: host-router, router-router,
More informationECE453 Introduction to Computer Networks. Broadcast vs. PPP. Delay. Lecture 7 Multiple Access Control (I)
ECE453 Introduction to Computer Networks Lecture 7 Multiple Access Control (I) 1 Broadcast vs. PPP Broadcast channel = multiaccess channel = random access channel Broadcast LAN Satellite network PPP WAN
More informationComputer Networks Medium Access Control. Mostafa Salehi Fall 2008
Computer Networks Medium Access Control Mostafa Salehi Fall 2008 2008 1 Outline Issues ALOHA Network Ethernet Token Ring Wireless 2 Main Issues Local Area Network (LAN) : Three or more machines are physically
More informationChapter 5: Link layer
Chapter 5: Link layer our goals: v understand principles behind link layer services: error detection, correction sharing a broadcast channel: multiple access link layer addressing local area networks:
More informationChapter 5 Link Layer and LANs
Chapter 5 Link Layer and LANs Computer Networking: A Top Down Approach 4 th edition. Jim Kurose, Keith Ross Addison-Wesley, July 2007. All material copyright 1996-2007 J.F Kurose and K.W. Ross, All Rights
More informationLecture 4: Wireless MAC Overview. Hung-Yu Wei National Taiwan University
Lecture 4: Wireless MAC Overview Hung-Yu Wei National Taiwan University Medium Access Control Topology 3 Simplex and Duplex 4 FDMA TDMA CDMA DSSS FHSS Multiple Access Methods Notice: CDMA and spread spectrum
More informationCS 123: Lecture 12, LANs, and Ethernet. George Varghese. October 24, 2006
CS 123: Lecture 12, LANs, and Ethernet George Varghese October 24, 2006 Selective Reject Modulus failure Example w = 2, Max = 3 0 0 1 3 0 A(1) A(2) 1 0 retransmit A(1) A(2) buffer Case 1 Case 2 reject
More informationCHAPTER 5 PROPAGATION DELAY
98 CHAPTER 5 PROPAGATION DELAY Underwater wireless sensor networks deployed of sensor nodes with sensing, forwarding and processing abilities that operate in underwater. In this environment brought challenges,
More informationCOMMUNICATION NETWORKS NETW 501
COMMUNICATION NETWORKS NETW 501 TUTORIAL 6 Presented by: Eng. Hana Hesham Eng. Mohamed Atef Data Link Layer Data Link Layer is split into 2 sublayers which are the Logical Link Control (LLC) and the Medium
More informationAN ANALYSIS OF THE MODIFIED BACKOFF MECHANISM FOR IEEE NETWORKS
AN ANALYSIS OF THE MODIFIED BACKOFF MECHANISM FOR IEEE 802.11 NETWORKS Marek Natkaniec, Andrzej R. Pach Department of Telecommunications University of Mining and Metallurgy al. Mickiewicza 30, 30-059 Cracow
More informationData and Computer Communications
Data and Computer Communications Chapter 16 High Speed LANs Eighth Edition by William Stallings Why High Speed LANs? speed and power of PCs has risen graphics-intensive applications and GUIs see LANs as
More informationPacket multiple access and the Aloha protocol
Packet multiple access and the Aloha protocol Massachusetts Institute of Technology Department of Aeronautics and Astronautics Slide 1 Packet Multiple Access PMA SHARED UPLINK TERMINAL TERMINAL APPL TRANS
More informationLecture 05 Chapter 16 High Speed LANs
NET 456 High Speed Networks Lecture 05 Chapter 16 High Speed LANs Dr. Anis Koubaa Reformatted slides from textbook Data and Computer Communications, Ninth Edition by William Stallings, 1 (c) Pearson Education
More informationJaringan Komputer. Broadcast Network. Outline. MAC (Medium Access Control) Channel Allocation Problem. Dynamic Channel Allocation
Broadcast Network Jaringan Komputer Medium Access Control Sublayer 2 network categories: point-to-point connections broadcast channels Key issue in broadcast network: how to determine who gets to use the
More informationLesson 2-3: The IEEE x MAC Layer
Module 2: Establishing Wireless Connectivity Lesson 2-3: The IEEE 802.11x MAC Layer Lesson Overview This lesson describes basic IEEE 802.11x MAC operation, beginning with an explanation of contention schemes
More informationIntroduction to CDMA ALOHA. 3. Access Control Techniques for CDMA ALOHA
Introduction to CDMA ALOHA 3. Access Control Techniques for CDMA ALOHA Takaya Yamazato Center for Information Media Studies, Nagoya University Nagoya 464-01, Japan yamazato@nuee.nagoya-u.ac.jp CDMA ALOHA
More informationMedia Access Control in Ad Hoc Networks
Media Access Control in Ad Hoc Networks The Wireless Medium is a scarce precious resource. Furthermore, the access medium is broadcast in nature. It is necessary to share this resource efficiently and
More informationAnnouncements / Wireless Networks and Applications Lecture 9: Wireless LANs Wireless. Regular Ethernet CSMA/CD.
Announcements 18-452/18-750 Wireless Networks and Applications Lecture 9: Wireless LANs 802.11 Wireless Peter Steenkiste Homework 1 should be out by tomorrow Project 1 by Friday Schedule:» Thursday lecture
More informationMedium Access Control Sublayer
Wireless (WLAN) Medium Access Control Sublayer Mahalingam Mississippi State University, MS October 20, 2014 Outline Medium Access Protocols Wireless (WLAN) 1 Medium Access Protocols ALOHA Slotted ALOHA
More informationNetworks Homework # 2
ISLAMIC UNIVERSITY OF GAZA COMPUTER ENGINEERING DEPARTMENT Networks Homework # 2 INSTRUCTIONS: 1. Show your work (i.e., how you derived your answer or the reason behind your thinking) in addition to your
More informationA Novel Contention Window Control Scheme Based on a Markov Chain Model in Dense WLAN Environment
05 Third International Conference on Artificial Intelligence, Modelling and Simulation A Novel Contention Window Control Scheme Based on a Markov Chain Model in Dense WLAN Environment Yoshiaki Morino,
More informationCSC 4900 Computer Networks: The Link Layer
CSC 4900 Computer Networks: The Link Layer Professor Henry Carter Fall 2017 Last Time We talked about intra-as routing protocols: Which routing algorithm is used in RIP? OSPF? What techniques allow OSPF
More informationMobile Communications Chapter 3 : Media Access
Mobile Communications Chapter 3 : Media Access 2. Motivation 3. SDMA, FDMA, TDMA 1. Aloha and contention based schemes 4. Reservation schemes 5. Collision avoidance, MACA 6. Polling CDMA (Lecture 6) Prof.
More informationMultiple Access Links and Protocols
Multiple Access Links and Protocols Two types of links : point-to-point PPP for dial-up access point-to-point link between Ethernet switch and host broadcast (shared wire or medium) old-fashioned Ethernet
More informationCMPE 257: Wireless and Mobile Networking
CMPE 257: Wireless and Mobile Networking Katia Obraczka Computer Engineering UCSC Baskin Engineering Lecture 3 CMPE 257 Winter'11 1 Announcements Accessing secure part of the class Web page: User id: cmpe257.
More informationPower Laws in ALOHA Systems
Power Laws in ALOHA Systems E6083: lecture 7 Prof. Predrag R. Jelenković Dept. of Electrical Engineering Columbia University, NY 10027, USA predrag@ee.columbia.edu February 28, 2007 Jelenković (Columbia
More informationProtocols for Multiaccess Networks
Protocols for Multiaccess Networks Hosts broadcast packets When a collision occurs, all transmitted packets are lost Lost packets have to be retransmitted => Need Multiaccess Protocol Model - Slotted Aloha
More informationECE 358 MAC Examples. Xuemin (Sherman) Shen Office: EIT 4155 Phone: x
ECE 358 MAC Examples Xuemin (Sherman) Shen Office: EIT 4155 Phone: x 32691 Email: xshen@bbcr.uwaterloo.ca Problem 1. Consider the following Aloha systems. (a) A group of N users share a 56 kbps pure Aloha
More informationoriginal standard a transmission at 5 GHz bit rate 54 Mbit/s b support for 5.5 and 11 Mbit/s e QoS
IEEE 802.11 The standard defines a wireless physical interface and the MAC layer while LLC layer is defined in 802.2. The standardization process, started in 1990, is still going on; some versions are:
More informationLecture 6. Data Link Layer (cont d) Data Link Layer 1-1
Lecture 6 Data Link Layer (cont d) Data Link Layer 1-1 Agenda Continue the Data Link Layer Multiple Access Links and Protocols Addressing Data Link Layer 1-2 Multiple Access Links and Protocols Two types
More informationIntelligent Transportation Systems. Medium Access Control. Prof. Dr. Thomas Strang
Intelligent Transportation Systems Medium Access Control Prof. Dr. Thomas Strang Recap: Wireless Interconnections Networking types + Scalability + Range Delay Individuality Broadcast o Scalability o Range
More informationLecture 12 December 04, Wireless Access. Graduate course in Communications Engineering. University of Rome La Sapienza. Rome, Italy
Lecture 12 December 04, 2017 Wireless Access Graduate course in Communications Engineering University of Rome La Sapienza Rome, Italy 2017-2018 Random Medium Access Control Part II - CSMA and Collision
More informationHigh Level View. EE 122: Ethernet and Random Access protocols. Medium Access Protocols
High Level View EE 122: Ethernet and 802.11 Ion Stoica September 18, 2002 Goal: share a communication medium among multiple hosts connected to it Problem: arbitrate between connected hosts Solution goals:
More informationLecture 19. Principles behind data link layer services Framing Multiple access protocols
Link Layer Lecture 19 Principles behind data link layer services Framing Multiple access protocols ALOHA *The slides are adapted from ppt slides (in substantially unaltered form) available from Computer
More informationLecture 6 The Data Link Layer. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it
Lecture 6 The Data Link Layer Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it Link Layer: setting the context two physically connected devices: host-router, router-router, host-host,
More informationA new MAC protocol for reducing effect of needless transmission deferment induced by missed RTS/CTS handshake
Mobile Information Systems 5 (009) 3 DOI 0.333/MIS-009-0070 IOS Press A new MAC protocol for reducing effect of needless transmission deferment induced by missed / handshake Tetsuya Shigeyasu a, Daishi
More informationData and Computer Communications. Chapter 11 Local Area Network
Data and Computer Communications Chapter 11 Local Area Network LAN Topologies Refers to the way in which the stations attached to the network are interconnected Bus Topology Used with multipoint medium
More informationAn Efficient Scheduling Scheme for High Speed IEEE WLANs
An Efficient Scheduling Scheme for High Speed IEEE 802.11 WLANs Juki Wirawan Tantra, Chuan Heng Foh, and Bu Sung Lee Centre of Muldia and Network Technology School of Computer Engineering Nanyang Technological
More informationMarkov Chains and Multiaccess Protocols: An. Introduction
Markov Chains and Multiaccess Protocols: An Introduction Laila Daniel and Krishnan Narayanan April 8, 2012 Outline of the talk Introduction to Markov Chain applications in Communication and Computer Science
More informationLink Layer: Retransmissions
Link Layer: Retransmissions Context on Reliability Where in the stack should we place reliability functions? Application Transport Network Link Physical CSE 461 University of Washington 2 Context on Reliability
More informationComputer Network Fundamentals Spring Week 3 MAC Layer Andreas Terzis
Computer Network Fundamentals Spring 2008 Week 3 MAC Layer Andreas Terzis Outline MAC Protocols MAC Protocol Examples Channel Partitioning TDMA/FDMA Token Ring Random Access Protocols Aloha and Slotted
More informationWireless Medium Access Control Protocols
Wireless Medium Access Control Protocols Telecomunicazioni Undergraduate course in Electrical Engineering University of Rome La Sapienza Rome, Italy 2007-2008 Classification of wireless MAC protocols Wireless
More informationEE 122: Ethernet and
EE 122: Ethernet and 802.11 Ion Stoica September 18, 2002 (* this talk is based in part on the on-line slides of J. Kurose & K. Rose) High Level View Goal: share a communication medium among multiple hosts
More informationA New Polling-Based Dynamic Slot Assignment Scheme for Broadband Wireless Access Systems
NUNO IEICE TRANS. and MATSUMOTO COMMUN., : VOL. A NEW E82-B, POLLING-BASED NO. 12 DECEMBER DYNAMIC 1999 SLOT ASSIGNMENT SCHEME 2031 PAPER Special Issue on Multimedia Mobile Communication Systems A New
More informationMSIT 413: Wireless Technologies Week 8
MSIT 413: Wireless Technologies Week 8 Michael L. Honig Department of EECS Northwestern University November 2017 The Multiple Access Problem How can multiple mobiles access (communicate with) the same
More informationLinks Reading: Chapter 2. Goals of Todayʼs Lecture. Message, Segment, Packet, and Frame
Links Reading: Chapter 2 CS 375: Computer Networks Thomas Bressoud 1 Goals of Todayʼs Lecture Link-layer services Encoding, framing, and error detection Error correction and flow control Sharing a shared
More informationCSC 401 Data and Computer Communications Networks
CSC 401 Data and Computer Communications Networks Link Layer: Intro, Errors, Multiple Access Sec 6.1, 6.2, 6.3 Prof. Lina Battestilli Fall 2017 Chapter 6: Link layer Goals: understand principles behind
More informationA Directional MAC Protocol with the DATA-frame Fragmentation and Short Busy Advertisement Signal for Mitigating the Directional Hidden Node Problem
2012 IEEE 23rd International Symposium on Personal, Indoor and Mobile Radio Communications - (PIMRC) A Directional MAC Protocol with the DATA-frame Fragmentation and Short Busy Advertisement Signal for
More informationRandom Access Suitable Protocols
Random Access Many terminals communicate to a single base station Fixed multiple access methods (TDMA, FDMA, CDMA) become inefficient when the traffic is bursty. Random Access works better for many users,
More informationMultiple Access Communications. EEE 538, WEEK 11 Dr. Nail Akar Bilkent University Electrical and Electronics Engineering Department
Multiple Access Communications EEE 538, WEEK 11 Dr. Nail Akar Bilkent University Electrical and Electronics Engineering Department 1 Multiple Access Satellite systems, radio networks (WLAN), ethernet segment
More informationThe Link Layer II: Ethernet
Monday Recap The Link Layer II: Ethernet q Link layer services q Principles for multiple access protocols q Categories of multiple access protocols CSC 249 March 24, 2017 1 2 Recap: Random Access Protocols
More informationGoals. Fundamentals of Network Media. More topics. Topics. Multiple access communication. Multiple access solutions
Fundamentals of Network Media Local Area Networks Ursula Holmström Goals Learn the basic concepts related to LAN technologies, for example use of shared media medium access control topologies Know the
More informationA Medium Access Control Protocol with Retransmission using NACK and Directional Antennas for Broadcasting in Wireless Ad-Hoc Networks
A Medium Access Control Protocol with Retransmission using NACK and Directional Antennas for Broadcasting in Wireless Ad-Hoc Networks Yoriko Utsunomiya, Michito Takahashi, Masaki Bandai, and Iwao Sasase
More informationIEEE 1901 HD-PLC (High Definition Power Line Communication) Abstract
IEEE 1901 HD-PLC (High Definition Power Line Communication) Abstract The growing penetration of the internet throughout the society has also brought advantages to SOHOs and home networks. As networks develop,
More informationWireless Communications
4. Medium Access Control Sublayer DIN/CTC/UEM 2018 Why do we need MAC for? Medium Access Control (MAC) Shared medium instead of point-to-point link MAC sublayer controls access to shared medium Examples:
More informationExperimental Framework and Simulator for the MAC of Power-Line Communications
Experimental Framework and Simulator for the MAC of Power-Line Communications Technical Report Christina Vlachou EPFL, Switzerland christinavlachou@epflch Julien Herzen EPFL, Switzerland julienherzen@epflch
More informationCHAPTER TWO LITERATURE REVIEW
CHAPTER TWO LITERATURE REVIEW 2.1 Introduction. This chapter provides in detail about the multiple access technologies and the OCDMA system. It starts with a discussion on various existing multiple-access
More informationTSIN01 Information Networks Lecture 3
TSIN01 Information Networks Lecture 3 Danyo Danev Division of Communication Systems Department of Electrical Engineering Linköping University, Sweden September 10 th, 2018 Danyo Danev TSIN01 Information
More informationLANs. Local Area Networks. via the Media Access Control (MAC) SubLayer. Networks: Local Area Networks
LANs Local Area Networks via the Media Access Control (MAC) SubLayer 1 Local Area Networks Aloha Slotted Aloha CSMA (non-persistent, 1-persistent, p-persistent) CSMA/CD Ethernet Token Ring 2 Network Layer
More informationLecture 5 The Data Link Layer. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it
Lecture 5 The Data Link Layer Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it Link Layer: setting the context two physically connected devices: host-router, router-router, host-host,
More informationAloha and slotted aloha
CSMA 2/13/06 Aloha and slotted aloha Slotted aloha: transmissions are synchronized and only start at the beginning of a time slot. Aloha sender A sender B collision sender C t Slotted Aloha collision sender
More informationContention Protocols and Networks
4/13/2005 314 Lecture Contention Protocols and Networks 1 Contention Protocols and Networks Contention Protocols CSMA/CD Network Topologies Ethernet 4/13/2005 314 Lecture Contention Protocols and Networks
More informationReal-Time (Paradigms) (47)
Real-Time (Paradigms) (47) Memory: Memory Access Protocols Tasks competing for exclusive memory access (critical sections, semaphores) become interdependent, a common phenomenon especially in distributed
More informationWireless MACs: MACAW/802.11
Wireless MACs: MACAW/802.11 Mark Handley UCL Computer Science CS 3035/GZ01 Fundamentals: Spectrum and Capacity A particular radio transmits over some range of frequencies; its bandwidth, in the physical
More informationData Link Layer Technologies
Chapter 2.2 La 2 Data Link La Technologies 1 Content Introduction La 2: Frames Error Handling 2 Media Access Control General approaches and terms Aloha Principles CSMA, CSMA/CD, CSMA / CA Master-Slave
More informationRECENTLY, the information exchange using wired and
Fast Dedicated Retransmission Scheme for Reliable Services in OFDMA Systems Howon Lee and Dong-Ho Cho Department of Electrical Engineering and Computer Science Korea Advanced Institute of Science and Technology
More informationMultiple-access protocols
Multiple Access Multiple-access protocols Random Access MA CSMA CSMA/CD CSMA/CA RANDOM ACCESS In a random access method, each station has the right to the medium without being controlled by any other station.
More informationISSN: (Online) Volume 2, Issue 6, June 2014 International Journal of Advance Research in Computer Science and Management Studies
ISSN: 2321-7782 (Online) Volume 2, Issue 6, June 2014 International Journal of Advance Research in Computer Science and Management Studies Research Article / Survey Paper / Case Study Available online
More informationIEEE C802.16h-07/017. IEEE Broadband Wireless Access Working Group <
Project Title Date Submitted IEEE 82.16 Broadband Wireless Access Working Group Simulation of IEEE 82.16h and IEEE Coexistence (Preliminary Report) 7-1-12 Source(s) John Sydor, Amir
More informationInterface The exit interface a packet will take when destined for a specific network.
The Network Layer The Network layer (also called layer 3) manages device addressing, tracks the location of devices on the network, and determines the best way to move data, which means that the Network
More informationProblem Set Name the 7 OSI layers and give the corresponding functionalities for each layer.
Problem Set 1 1. Why do we use layering in computer networks? 2. Name the 7 OSI layers and give the corresponding functionalities for each layer. 3. Compare the network performance of the 3 Multiple Access
More informationReview. Error Detection: CRC Multiple access protocols. LAN addresses and ARP Ethernet. Slotted ALOHA CSMA/CD
Review Error Detection: CRC Multiple access protocols Slotted ALOHA CSMA/CD LAN addresses and ARP Ethernet Some slides are in courtesy of J. Kurose and K. Ross Overview Ethernet Hubs, bridges, and switches
More informationChapter 1 Basic concepts of wireless data networks (cont d)
Chapter 1 Basic concepts of wireless data networks (cont d) Part 2: Medium access methods for mobile data networks Sept 15 2004 1 Fixed assignment access schemes in voice-oriented networks Frequency division
More informationCSE 461 Multiple Access. David Wetherall
CSE 461 Multiple Access David Wetherall djw@cs.washington.edu How to share a link Multiplexing = networking term for sharing a resource among multiple users (e.g., link, protocol instance) Topics: Multiplexing
More information