A RLC/MAC PROTOCOL ARCHITECTURE FOR A WIRELESS IP NETWORK

Size: px
Start display at page:

Download "A RLC/MAC PROTOCOL ARCHITECTURE FOR A WIRELESS IP NETWORK"

Transcription

1 A RLC/MAC PROTOCOL ARCHITECTURE FOR A WIRELESS IP NETWORK Jamil Y. Khan School of Electrical Engineering & Computer Science, University of Newcastle, Callaghan, NSW 238, Australia, jkhan@ec .newcastle.edu.au Abstract - This paper proposes a RLC/MAC (Radio Link Control/Multiple Access Control) protocol architecture suitable for a wireless IP network. The RLC and MAC protocols have been designed to support packet transmission on an air interface. The MAC protocol uses a reservation technique to increase the multiplexing efficiency by minimising collisions. The RLC protocol is based on selective repeat technique; optimises its efficiency by using the efficient architecture of the MAC protocol. Simulation results are presented to evaluate the performance of the combined protocol. Keywords RLC, MAC, Wireless, IP, Air interface. I. INTRODUCTION Success of second generation mobile telephone systems, phenomenal growth of mobile and internet users and flexibility of IP based multimedia applications are the major issues driving the growth of next generation wireless networks []. Significant number of third generation and most likely all fourth generation wireless networks will use packet switched communication architecture to transmit multimedia information. Gradual shift towards All IP (Internet Protocol) communication architecture will require advanced packet based air interfaces capable of supporting end-to-end packet communication. Transporting IP packets on an air interface could be an option to support end-to-end packet based services. However, there are several reasons why the above option is not always suitable. Two of the main reasons are the reduced spectral efficiency due to large IP headers and high packet error rate due to transmission channel conditions. Packet header in an IP based multimedia network contains either TCP/IP headers for non-realtime traffic or UDP/RTP/IP headers for realtime services such as voice over IP (VoIP). The size of the combined UDP/RTP/IP headers is at least 4 bytes for IPv4 and at least 6 bytes for IPv6, while voice payload will be very small compared to this header size. For example a ms speech block coded with an 8kbs speech coder and a half rate convolutional coder will generate a payload of 2 bytes. Hence transmitting a packet with full IP header will greatly diminish the spectrum efficiency of any air interface. To reduce the size of an IP packet header, it is possible to use header compression and decompression techniques [2]. Header sizes can be reduced by removing redundancy in the original header and/or removing field information and thereby losing functionality. The header compression algorithms maintain a context, which is essentially the uncompressed version of the last transmitted header at each end of the transmission channel over which compression occurs. The compressed header solely carries information about changes to the context. In case of a lost compressed header the context on the downstream cannot be updated properly. The IETF (Internet Engineering Task Force) proposed compression algorithm CRTP (Compressed RTP), which compresses UDP/RTP/IP header from 4 bytes to 2 bytes, is vulnerable to transmission channel errors. Alternate compression scheme known as ROCCO (RObust Checksum-based header Compression) has been developed for cellular mobile telephony usage, which shows a lower packet loss due to channel error [2]. However at -3 BER (Bit Error Rate) about.7% - % of packets could be lost when the ROCCO compression technique is used [2], [3]. A packet based system could inherently lose packets during access phase as well as due to blocking [4]. Any additional packet loss due to the header compression can further reduce the Quality of Service (QoS). On the other hand for TCP/IP data packet transmission it is possible to transmit longer packets using a high payload to header ratio. However long packets are subject to longer retransmission delay on a wireless channel [5]. To avoid above problems it is possible to transmit users information packets on an air interface using IP compatible packets to the base station (BS). The base station can generate an IP packet by encapsulating several MAC packets with the appropriate UDP/RTP/IP or TCP/IP headers before transmitting IP packets on the radio access network (RAN). Similarly header could be stripped off and an IP packet can be defragmented at the BS before transmitting MAC packets on the air interface to the mobile users on the downlink. If the encapsulated IP packet is destined for a fixed network terminal then the complete IP packet can be delivered to the addressed terminal. The structure of the paper is as follows. Section II describes the RLC/MAC protocol structure used for IP packet transmission. Section III describes the IP packet transmission technique using the proposed RLC/MAC protocol architecture. Section IV presents simulation results and brief discussion is presented in section V. II. RLC/MAC PROTOCOL ARCHITECTURE This section describes the joint design of RLC/MAC protocol. The RLC protocol is based on a window ARQ /2/$7. 22 IEEE PIMRC 22

2 (Automatic Repeat request) technique and the MAC protocol is based on a block reservation technique known as the BRTDMA (Block Reservation Time Division Multiple Access) protocol. The main advantage of the combined protocol is minimum signalling requirements for the RLC layer and deterministic packet transmission delay for multiservice traffic while retaining high multiplexing efficiency. A. MAC Protocol The MAC protocol known as BRTDMA is based on the PRMA++/TDMA architecture use reservation and multipriority slot allocation technique to support different quality of service (QoS) requirements. The multiplexing architecture of the BRTDMA protocol is shown in figure. The R slot is used to transmit reservation requests by the mobile stations using the S-ALOHA protocol and I slots are used to transmit information in reserved modes. A slots on the downlink are used for signalling and I slots are used for downlink information packet transmission. FP and FP ak are the paired fast signalling channels. to transmit data traffic. The reservation length is kept constant irrespective of data burst length. Block reservation has the advantage of reduced contention and predictable data packet or data burst transmission delay. This reservation technique will be further discussed in the RLC protocol description. The multipriority slot allocation algorithm uses an allocation queue with two segments, which is kept at the base station. The allocation queue is divided into two segments; the head of the queue of length L packets is used as the slot allocation sub-queue and the rest of the queue is used as the storage as shown in figure 2. Successful traffic slot request packets are filed in the storage sub-queue as soon as a new request packet arrives. Requests are then sorted and transferred to the head of the queue for allocation. Incoming requests R R I I R I I FP ak UP Link I I A A I FP I DOWN Link Figure : BRTDMA protocol frame and slot structure The BRTDMA protocol has been developed to cater for multiservice traffic. It offers reservation to both realtime and non-realtime traffic. For speech traffic the reservation is offered for every talkspurt and for a non-realtime traffic reservation offered for a block of slots [6]. Base station allocates reserved information slot (I) based on priority and the priority is altered with the changing traffic situation. Multipriority slot allocation technique has been used to minimize packet losses from realtime sources [6]. The multipriority slot allocation technique replaces the FIFO (First In First Out) algorithm generally used at the Base Stations to allocate information slots. Above two features i.e. block reservation and multipriority slot allocation techniques of the MAC protocols are used to increase the multiplexing efficiency as well as the RLC protocol use these features to minimize signalling and retransmission delay. B. Block Reservation Technique The MAC protocol use block reservation for non-realtime sources such as data traffic sources [6]. A requesting data terminal obtains a number of reserved slots (one slot/frame) Storage segment Allocation segment Figure 2: Multipriority queue for allocating traffic slots. The sorting cycle is synchronized with the request arrival process. Request packets can only arrive at the base station using R slots on the UP link. The sorting algorithm updates the allocation segment of the queue after every transmission frame instead of every new request packet arrival. Traffic slots are allocated using the FIFO technique after the slot requests are placed in the allocation queue. During the sorting cycle both the entries in the storage sub-queue and the allocation sub-queue are sorted. In each sorting cycle slot requests are sorted according to the service priority P service, retransmission number RT, arrival time T arr and the reposition count RC. Slot request packets arrive at a base station with two attributes, those are service priority P service and the retransmission number RT. Also at the arrival of a request packet a BS notes the arrival time, which is used for queue sorting. The service priority is attached to a terminal by the call admission procedure. In case of initial access a terminal uses a default value of P service, which is based on the type of service the terminal requires from a network. The value of RC(station) is used by the sorting algorithm to reposition slot requests in the queue. Initial value of RC(init) is a system parameter that is related to the range of services. The value of RC(station) is decremented by the sorting algorithm. When the RC(station) value reaches its minimum the slot allocation priority becomes highest. The value of RC is decremented using the equation. K is the sensitivity factor that is used to control the number of time a slot request could be repositioned.

3 RC( station) = RC( init) Pservice * K RT () The value of K is controlled by a timer, which calculates the length of time a request packet has waited in the allocation and/or storage queue. Value of K is could be changed to promote the position of a request in the allocation subqueue. The value of K could also be biased based on the service types. To sort slot request packets; BS place request packets based on the value of RC. Slot requests may change their groups and positions after every sorting cycle. C. RLC Protocol The RLC protocol used here is a window based selective repeat ARQ (Automatic Repeat request) technique. The RLC layer utilise the block reservation technique and the multipriority slot allocation technique to minimize signalling and retransmission delay. The ARQ algorithm uses a selective retransmission scheme using a fixed window size as shown in figure 3. A data terminal receives a reservation of M slots to transmit a data burst or a segment of a data burst in M consecutive transmission frames using one slot per frame. The RLC layer use receives an acknowledgment after transmitting the whole block of data i.e. M data packets. The acknowledgement (ACK) packet is sent by the BS using an A slot on the downlink. The ACK packet contains a number of flag bits to indicate whether a particular packet transmission was successful or unsuccessful. Unsuccessful packets are retransmitted by appending those packets with the next data block as shown in the figure 3. The acknowledgement packet format is discussed in section III. When retransmission packets are appended with a data burst then the service priority (P service ) of that particular station is modified to reduce the slot allocation delay. UP LINK Retransmission packet ACK Packet DOWN LINK Figure 3: Block reservation technique. A retransmission timer is used to compensate a lost ACK packet. Retransmission timer value is selected based on the expected ACK packet arrival time that is given in equation 2. Parameter T L is the tolerance limit. Due to congestion on the down link signalling channel it may not be possible to transmit an ACK packet in time. In highly loaded situation a terminal can use longer T L value. Should an ACK packet is lost; a transmitting terminal will initiate retransmission of all packets in that reserved block after the expiry of the timer. acktimer ( f + t p ) + TL t f T = M t * (2) where t f represent frame length and t p propagation delay respectively. III. IP PACKET TRANSMISSION As discussed before that transmitting an IP packet over an air interface could reduce spectral efficiency as well as quality of service (QoS) due to channel errors. Instead of transmitting an IP packet on the air interface IP packets could be generated at a BS using an IP compatible air interface. An IP packet will be generated at the BS by accumulating M number of MAC packets received via the air interface. In this case the IP packet encapsulation time will be determined by the transmission frame length, propagation delay and number of MAC packets used to create an IP packet. In this work it is assumed that an IP packet will be generated after receiving M packets (length of the block reservation). To facilitate the IP packet encapsulation at the BS a mobile terminal will send following information during the connection request using a R slot on the UP link. Information transmitted on the UP link during connection request: Terminal/ Source ID and Destination ID. This information could be directly inserted in the IP header. Connection type and QoS information. This information could be translated into Type of Service and Time to Live fields in an IPv4 header or into Traffic Class and Flow label information in IPv6 header. Payload Length/Data Segment Size. This information will be used by the BS to calculate the expected number of IP packets from different active sources and may be used for resource allocation activities. Payload status. With this information MS will notify the BS whether the current data block contain any retransmitted packet(s) or not. If a retransmitted packet(s) is included within this burst then the BS will modify the P service value for shorter access time. On receiving a connection request packet, a BS will file the request in the slot allocation queue and allocate an available traffic slot using the A slot on the downlink. When a slot is allocated to a user the BS will generate a logical connection ID that is used by the mobile users to transmit MAC packets to the BS. At the BS the logical connection number is used to map the MAC packets to an appropriate

4 IP packet at a BS. On the downlink the BS transmit following information when a slot is allocated. Reserved slot number. Reservation length i.e. how many slots will be available to transmit the current burst. In case of a speech terminal it will be open i.e. the reservation will be relinquished by the MS and for data transmission the BS will indicate the length. A logical connection ID, which will be included in the header of the MAC packets. New P service value in response to the payload status information. The BS is also responsible for transmitting an ACK packet for data terminals transmitting data packets using a block reservation. An ACK packet is transmitted on completion of block transmission containing following information. Logical connection number. Logical connection number can be used for subsequent reservations. Status of each transmitted packets in a block indicated by a separate status bit. IV. SIMULATION RESULTS Performances of the MAC and the RLC protocols were evaluated using a simulation model. Figure 4 shows the speech packet loss pattern for different values of data block reservation length (M) and input traffic. In this simulation the number of speech terminal is kept constant to 45 and number of data terminal is varied. Data terminals were modelled using a negative exponential distribution with different interarrival time and variable burst sizes between Kbs to kbs. Results show that both longer (M=25) and shorter (M=) reservation block sizes introduce higher packet losses. Shorter block length introduces higher packet losses because of higher contention during the access period whereas a longer reservation length introduces higher blocking resulting speech packet losses. In this simulation speech terminals were given higher priority by using a shorter retransmission time, higher value of RT and P service. Simulation results were also obtained for variable data block sizes. In this case the reservation block length (M) is increased if the total traffic load is less than 7% of the system capacity. Load is sampled after every adaptation period. In this simulation adaptation period of 75 ms is used to adapt the value of M. Variable data block length utilises unused channel capacity to transmit larger data blocks thus reducing end-to-end data block transmission delay. For lower network traffic load, variable data block size allows formation of large IP packets at a BS without penalising speech terminals Next we obtain the data block transmission delay. IP packet encapsulation delay is consists of data block transmission delay and the corresponding packetisation delay. Figure 5 shows the normalised data block transmission delay for different values of M. Assuming negligible packetisation delay at the BS, IP packet encapsulation delay at the BS will be same as the data block transmission delay. Normalised block delay is derived by dividing the total block transmission delay by the corresponding data block size. Figure 5 shows that the shortest block size (M=) introduces higher delay particularly at higher load whereas a longer block size (M=25) introduces shorter delay. For multiservice traffic the value of M need to be optimised. Results also shows that variable data block size can offer optimum performance for both speech and data terminals. In this simulation packet length of 222 bits are used where 6 bits are used as a guard band to support cell size of km and 6 bits are used an overhead indicating the logical connection number and CRC bits. Each data packet carrying a payload of 2 bits, an IP packet of 32 bits or 4 bytes can be generated within 2 ms using a data block length of 6. At lower traffic load longer block size can be used without increasing any speech packet loss. % of speech packet loss Figure 4: Speech packet loss for different data block reservation length. Number of voice terminals is kept fixed to 45. Normalised block delay (ms) No. of data terminals 5 M=6 M=25 M= M=variable No. of data terminals M=6 M=25 M= M=variable Figure 5: Normalised data block transmission delay.

5 To evaluate the performance of the retransmission scheme of the RLC protocol, IP packet encapsulation delay was measured for frame error rates of % and 2%. In this case it is assumed that a single retransmission is required to successfully transmit a corrupted packet. Figure 6 shows the IP packet encapsulation delay for different frame error rate (FER). For M =6, FER of % means 2 packets require retransmission. This delay includes the original data block transmission delay, packet retransmission delay(s) and additional access delay. The normalised delay is derived by dividing the total delay by the corresponding block size. Different delay components of the IP packet encapsulation delay are shown in equation 3, where T bd is the original block transmission delay, T PR is retransmitted packet transmission delay, T access is subsequent data block access delay, k is the number of retransmitted packets and n is the number of retransmission required to successfully transmit all corrupted packets. Simulation results showed in case of a retransmission the access delay becomes the dominant component of the end-to-end delay at high traffic load. If a received data block contains several packets with error then the BS will wait until the corrupted packets are retransmitted and received. Retransmitted packets are included in a new block where retransmitted packets are placed in the head of the new block. T Normalised delay (ms) encap = T bd + k i= n ( T ) + ( T ) PR i j= access No. of Data Terminals 25, % 25, 2% 25, % 6, % 6, 2% 6, % j (3) RLC protocol requires minimum signaling. The proposed protocol architecture is an alternative solution to the end-toend IP packet transmission. Simulation results presented in the reference [5] shows that for better spectral efficiency and minimum end-to-end delay it is necessary to fragments large IP packets in to smaller fragments before transmission of the air interface. Large packets on a wireless link introduce higher probability of packet error wasting significant transmission capacity. The proposed technique can be used both in the TDMA and CDMA based systems. Also the proposed technique can easily be configured to support a number of different priority traffic rather than only two priorities presented in this paper. The proposed algorithm can be further improved by combining link adaptation procedure and hierarchical forward error correction techniques. REFERENCES [] M. Frodigh, et.al, Future Generation Wireless Networks, IEEE Personal Communications, vol:8, no:5, pp.-7, October 2. [2] K. Svanbro, J Wiorek and B Olin, Voice over IP over Wireless, Proceedings of the IEEE PIMRC2, London, UK, vol. I, pp , September 2. [3] A. Cellatoglu, S. Fabri, S. Worrall, A. Sadka and A. Kondoz, Robust Header Compression for Real-Time Services in Cellular Networks, Proceedings of 2nd Int.Conference on 3G Mobile Communication Technologies, London, UK, pp , March 2. [4] J. Dunlop, P. Cosimini, D. Maclean, D. Robertson and D. Aitken, A reservation based access mechanism for 3 rd Generation Cellular Systems, IEE Electronics & Communication Journal, vol:5, no:3, pp. 8-86, June 993. [5] A. P. Prasad, Optimisation of Hybrid ARQ for IP Packet Transmission, Wireless Personal Communications, vol:6, no:3, pp , March 2. [6] J. Y. Khan, Performance of a Multipriority Resource Allocation Technique for a Packet Switched Wireless Network, Proceedings of PIMRC2, London, UK, vol 2:, pp , September 2. Figure 6: IP packet encapsulation delay. V. DISCUSSIONS A simple RLC/MAC protocol is presented in this paper. The MAC protocol is based on reservation based packet transmission technique incorporating an advanced queuing technique that can alter priority to different types of traffic based on its QoS requirements. The combined protocol has two main advantages, those are a) Predictable transmission delay for all type of traffic sources (i.e. voice, data), b) the

MPEG4 VIDEO OVER PACKET SWITCHED CONNECTION OF THE WCDMA AIR INTERFACE

MPEG4 VIDEO OVER PACKET SWITCHED CONNECTION OF THE WCDMA AIR INTERFACE MPEG4 VIDEO OVER PACKET SWITCHED CONNECTION OF THE WCDMA AIR INTERFACE Jamil Y. Khan 1, Pratik Das 2 School of Electrical Engineering and Computer Science, University of Newcastle, Callaghan, NSW 238,

More information

Distributed Queue Dual Bus

Distributed Queue Dual Bus Distributed Queue Dual Bus IEEE 802.3 to 802.5 protocols are only suited for small LANs. They cannot be used for very large but non-wide area networks. IEEE 802.6 DQDB is designed for MANs It can cover

More information

ECS 152A Computer Networks Instructor: Liu. Name: Student ID #: Final Exam: March 17, 2005

ECS 152A Computer Networks Instructor: Liu. Name: Student ID #: Final Exam: March 17, 2005 ECS 152A Computer Networks Instructor: Liu Name: Student ID #: Final Exam: March 17, 2005 Duration: 120 Minutes 1. The exam is closed book. However, you may refer to one sheet of A4 paper (double sided)

More information

RECENTLY, the information exchange using wired and

RECENTLY, the information exchange using wired and Fast Dedicated Retransmission Scheme for Reliable Services in OFDMA Systems Howon Lee and Dong-Ho Cho Department of Electrical Engineering and Computer Science Korea Advanced Institute of Science and Technology

More information

Data Link Control Protocols

Data Link Control Protocols Protocols : Introduction to Data Communications Sirindhorn International Institute of Technology Thammasat University Prepared by Steven Gordon on 23 May 2012 Y12S1L07, Steve/Courses/2012/s1/its323/lectures/datalink.tex,

More information

I. INTRODUCTION. each station (i.e., computer, telephone, etc.) directly connected to all other stations

I. INTRODUCTION. each station (i.e., computer, telephone, etc.) directly connected to all other stations I. INTRODUCTION (a) Network Topologies (i) point-to-point communication each station (i.e., computer, telephone, etc.) directly connected to all other stations (ii) switched networks (1) circuit switched

More information

Configuring RTP Header Compression

Configuring RTP Header Compression Header compression is a mechanism that compresses the IP header in a packet before the packet is transmitted. Header compression reduces network overhead and speeds up the transmission of either Real-Time

More information

On the Importance of Using Appropriate Link-to-System Level Interfaces for the Study of Link Adaptation

On the Importance of Using Appropriate Link-to-System Level Interfaces for the Study of Link Adaptation On the Importance of Using Appropriate Link-to-System Level Interfaces for the Study of Link Adaptation Javier Gozalvez and John Dunlop Department of Electronic and Electrical Engineering, University of

More information

FAIR DELAY OPTIMIZATION-BASED RESOURCE ALLOCATION ALGORITHM FOR VIDEO TRAFFIC OVER WIRELESS MULTIMEDIA SYSTEM

FAIR DELAY OPTIMIZATION-BASED RESOURCE ALLOCATION ALGORITHM FOR VIDEO TRAFFIC OVER WIRELESS MULTIMEDIA SYSTEM FAIR DELAY OPTIMIZATION-BASED RESOURCE ALLOCATION ALGORITHM FOR VIDEO TRAFFIC OVER WIRELESS MULTIMEDIA SYSTEM 1 M. R. M. Rizk, Senior Member, IEEE, 2 M. I. Dessouky, 3 Sami A. El-Dolil, and 4 Mohammed

More information

Configuring RTP Header Compression

Configuring RTP Header Compression Configuring RTP Header Compression First Published: January 30, 2006 Last Updated: July 23, 2010 Header compression is a mechanism that compresses the IP header in a packet before the packet is transmitted.

More information

Module 7 Internet And Internet Protocol Suite

Module 7 Internet And Internet Protocol Suite Module 7 Internet And Internet Protocol Suite Lesson 21 Internet and IPv4 LESSON OBJECTIVE General The lesson will discuss a popular network layer protocol, i.e. the Internet Protocol Specific The focus

More information

ENGI 4557 Digital Communications Practice Problems 2017 (Part 2)

ENGI 4557 Digital Communications Practice Problems 2017 (Part 2) ENGI 4557 Digital Communications Practice Problems 207 (Part 2) H = n p i log 2 ( ) p i C = W log 2 ( + S N ) SNR = 6m + 0 log 0 ( 3σ2 x V ) 2 SNR = 6m 0 ( ) n n! = k k!(n k)! x = σ 2 = + + x p(x)dx (x

More information

CC-SCTP: Chunk Checksum of SCTP for Enhancement of Throughput in Wireless Network Environments

CC-SCTP: Chunk Checksum of SCTP for Enhancement of Throughput in Wireless Network Environments CC-SCTP: Chunk Checksum of SCTP for Enhancement of Throughput in Wireless Network Environments Stream Control Transmission Protocol (SCTP) uses the 32-bit checksum in the common header, by which a corrupted

More information

Performance of UMTS Radio Link Control

Performance of UMTS Radio Link Control Performance of UMTS Radio Link Control Qinqing Zhang, Hsuan-Jung Su Bell Laboratories, Lucent Technologies Holmdel, NJ 77 Abstract- The Radio Link Control (RLC) protocol in Universal Mobile Telecommunication

More information

ECSE 414 Fall 2014 Final Exam Solutions

ECSE 414 Fall 2014 Final Exam Solutions ECSE 414 Fall 2014 Final Exam Solutions Question 1 a. The five main layers of the internet protocol stack, along with the service provided by each, and the place where each is implemented are as follows:

More information

Simulation and Analysis of Impact of Buffering of Voice Calls in Integrated Voice and Data Communication System

Simulation and Analysis of Impact of Buffering of Voice Calls in Integrated Voice and Data Communication System Simulation and Analysis of Impact of Buffering of Voice Calls in Integrated Voice and Data Communication System VM Chavan 1, MM Kuber 2 & RJ Mukhedkar 3 1&2 Department of Computer Engineering, Defence

More information

Quality of Service (QoS)

Quality of Service (QoS) Quality of Service (QoS) The Internet was originally designed for best-effort service without guarantee of predictable performance. Best-effort service is often sufficient for a traffic that is not sensitive

More information

Performance Analysis of Cell Switching Management Scheme in Wireless Packet Communications

Performance Analysis of Cell Switching Management Scheme in Wireless Packet Communications Performance Analysis of Cell Switching Management Scheme in Wireless Packet Communications Jongho Bang Sirin Tekinay Nirwan Ansari New Jersey Center for Wireless Telecommunications Department of Electrical

More information

Module 6 STILL IMAGE COMPRESSION STANDARDS

Module 6 STILL IMAGE COMPRESSION STANDARDS Module 6 STILL IMAGE COMPRESSION STANDARDS Lesson 19 JPEG-2000 Error Resiliency Instructional Objectives At the end of this lesson, the students should be able to: 1. Name two different types of lossy

More information

Chapter 5 OSI Network Layer

Chapter 5 OSI Network Layer Chapter 5 OSI Network Layer The protocols of the OSI model Network layer specify addressing and processes that enable Transport layer data to be packaged and transported. The Network layer encapsulation

More information

Module objectives. Integrated services. Support for real-time applications. Real-time flows and the current Internet protocols

Module objectives. Integrated services. Support for real-time applications. Real-time flows and the current Internet protocols Integrated services Reading: S. Keshav, An Engineering Approach to Computer Networking, chapters 6, 9 and 4 Module objectives Learn and understand about: Support for real-time applications: network-layer

More information

Key Performance Aspects of an LTE FDD based Smart Grid Communications Network

Key Performance Aspects of an LTE FDD based Smart Grid Communications Network Key Performance Aspects of an LTE FDD based Smart Grid Communications Network Presented by: Ran Zhang Supervisors: Prof. Sherman(Xuemin) Shen, Prof. Liang-liang Xie Main Reference Jason Brown, and Jamil

More information

Performance and Configuration of Link Adaptation Algorithms with Mobile Speed

Performance and Configuration of Link Adaptation Algorithms with Mobile Speed Performance and Configuration of Link Adaptation Algorithms with Mobile Speed Javier Gozalvez* and John Dunlop** *Now with the Signal Theory and Communications Division at the University Miguel Hernández

More information

IEEE P Wireless Access Method and Physical Layer Specification. April 30, 1991 REVISED: May 2, 1991

IEEE P Wireless Access Method and Physical Layer Specification. April 30, 1991 REVISED: May 2, 1991 IEEE P802.11 Wireless Access Method and Physical Layer Specification DATE: April 30, 1991 REVISED: May 2, 1991 TITLE: ACCESS PROTOCOL METHODS FOR FIXED AND ADAPTIVE WIDTH TIME SLOTS AUTHOR: Chandos A.

More information

Scheduling of real-time traffic in IEEE networks

Scheduling of real-time traffic in IEEE networks Scheduling of real-time traffic in IEEE 802.11 networks Afonso, José A. Neves, Joaquim E. Universidade do Minho, Departamento de Electrónica Industrial Campus de Azurém, 4800-058 Guimarães, ortugal jose.afonso@dei.uminho.pt

More information

HN/HX System Bandwidth Efficiency

HN/HX System Bandwidth Efficiency HN/HX System Bandwidth Efficiency It is well understood by satellite network operators that bandwidth efficiency for a VSAT system is a critical element in achieving profitability, as higher efficiency

More information

COMPUTER NETWORK Model Test Paper

COMPUTER NETWORK Model Test Paper Model Test Paper Question no. 1 is compulsory. Attempt all parts. Q1. Each question carries equal marks. (5*5 marks) A) Difference between Transmission Control Protocol (TCP) and User Datagram Protocol.

More information

original standard a transmission at 5 GHz bit rate 54 Mbit/s b support for 5.5 and 11 Mbit/s e QoS

original standard a transmission at 5 GHz bit rate 54 Mbit/s b support for 5.5 and 11 Mbit/s e QoS IEEE 802.11 The standard defines a wireless physical interface and the MAC layer while LLC layer is defined in 802.2. The standardization process, started in 1990, is still going on; some versions are:

More information

Data Link Technology. Suguru Yamaguchi Nara Institute of Science and Technology Department of Information Science

Data Link Technology. Suguru Yamaguchi Nara Institute of Science and Technology Department of Information Science Data Link Technology Suguru Yamaguchi Nara Institute of Science and Technology Department of Information Science Agenda Functions of the data link layer Technologies concept and design error control flow

More information

Multiple Access Links and Protocols

Multiple Access Links and Protocols Multiple Access Links and Protocols Two types of links : point-to-point PPP for dial-up access point-to-point link between Ethernet switch and host broadcast (shared wire or medium) old-fashioned Ethernet

More information

fair-queue aggregate-limit

fair-queue aggregate-limit Quality of Service Commands aggregate-limit aggregate-limit To set the maximum number of packets in all queues combined for VIP-distributed weighted fair queueing (DWFQ), use the aggregate-limit interface

More information

Wireless Communications

Wireless Communications 4. Medium Access Control Sublayer DIN/CTC/UEM 2018 Why do we need MAC for? Medium Access Control (MAC) Shared medium instead of point-to-point link MAC sublayer controls access to shared medium Examples:

More information

STEVEN R. BAGLEY PACKETS

STEVEN R. BAGLEY PACKETS STEVEN R. BAGLEY PACKETS INTRODUCTION Talked about how data is split into packets Allows it to be multiplexed onto the network with data from other machines But exactly how is it split into packets and

More information

Chapter - 1 INTRODUCTION

Chapter - 1 INTRODUCTION Chapter - 1 INTRODUCTION Worldwide Interoperability for Microwave Access (WiMAX) is based on IEEE 802.16 standard. This standard specifies the air interface of fixed Broadband Wireless Access (BWA) system

More information

ETSN01 Exam Solutions

ETSN01 Exam Solutions ETSN01 Exam Solutions March 014 Question 1 (a) See p17 of the cellular systems slides for a diagram and the full procedure. The main points here were that the HLR needs to be queried to determine the location

More information

Topics. Link Layer Services (more) Link Layer Services LECTURE 5 MULTIPLE ACCESS AND LOCAL AREA NETWORKS. flow control: error detection:

Topics. Link Layer Services (more) Link Layer Services LECTURE 5 MULTIPLE ACCESS AND LOCAL AREA NETWORKS. flow control: error detection: 1 Topics 2 LECTURE 5 MULTIPLE ACCESS AND LOCAL AREA NETWORKS Multiple access: CSMA/CD, CSMA/CA, token passing, channelization LAN: characteristics, i basic principles i Protocol architecture Topologies

More information

Robust Header Compression (ROHC)

Robust Header Compression (ROHC) Robust Header Compression (ROHC) A step towards all-ip wireless networks Carsten Bormann TZI ISSLOW: Integrated Services over slow links Background: RTP is replacing TDM ISSLOW: 1996 initiative for packet

More information

CS 421: COMPUTER NETWORKS SPRING FINAL May 16, minutes

CS 421: COMPUTER NETWORKS SPRING FINAL May 16, minutes CS 4: COMPUTER NETWORKS SPRING 03 FINAL May 6, 03 50 minutes Name: Student No: Show all your work very clearly. Partial credits will only be given if you carefully state your answer with a reasonable justification.

More information

ECE/CSC 570 Section 001. Final test. December 11, 2006

ECE/CSC 570 Section 001. Final test. December 11, 2006 ECE/CSC 570 Section 001 Final test December 11, 2006 Questions 1 10 each carry 2 marks. Answer only by placing a check mark to indicate whether the statement is true of false in the appropriate box, and

More information

FINAL May 21, minutes

FINAL May 21, minutes CS 421: COMPUTER NETWORKS SPRING 2004 FINAL May 21, 2004 160 minutes Name: Student No: 1) a) Consider a 1 Mbits/sec channel with a 20 msec one-way propagation delay, i.e., 40 msec roundtrip delay. We want

More information

Lecture 7: Flow & Media Access Control"

Lecture 7: Flow & Media Access Control Lecture 7: Flow & Media Access Control" CSE 123: Computer Networks Alex C. Snoeren HW 2 due next Wednesday! Lecture 7 Overview" Flow control Go-back-N Sliding window Methods to share physical media: multiple

More information

Multimedia Networking

Multimedia Networking CMPT765/408 08-1 Multimedia Networking 1 Overview Multimedia Networking The note is mainly based on Chapter 7, Computer Networking, A Top-Down Approach Featuring the Internet (4th edition), by J.F. Kurose

More information

Department of Electrical and Computer Systems Engineering

Department of Electrical and Computer Systems Engineering Department of Electrical and Computer Systems Engineering Technical Report MECSE-6-2006 Medium Access Control (MAC) Schemes for Quality of Service (QoS) provision of Voice over Internet Protocol (VoIP)

More information

RSVP Support for RTP Header Compression, Phase 1

RSVP Support for RTP Header Compression, Phase 1 RSVP Support for RTP Header Compression, Phase 1 The Resource Reservation Protocol (RSVP) Support for Real-Time Transport Protocol (RTP) Header Compression, Phase 1 feature provides a method for decreasing

More information

Medium Access Control

Medium Access Control TC 3TCA NET Département Télécommunications Services & Usages Intervenant Razvan Stanica razvan.stanica@insa-lyon.fr. Ingénieur Télécom-Réseaux ENSEEIHT, promo 2008. Thèse sur le Contrôle de Congestion

More information

Affects of Queuing Mechanisms on RTP Traffic Comparative Analysis of Jitter, End-to- End Delay and Packet Loss

Affects of Queuing Mechanisms on RTP Traffic Comparative Analysis of Jitter, End-to- End Delay and Packet Loss Comparative Analysis of Jitter, End-to- End Delay and Packet Loss Gregory Epiphaniou 1 Carsten Maple 1 Paul Sant 1 Matthew Reeves 2 1 Institute for Research in Applicable Computing University of Bedfordshire

More information

ELEC 691X/498X Broadcast Signal Transmission Winter 2018

ELEC 691X/498X Broadcast Signal Transmission Winter 2018 ELEC 691X/498X Broadcast Signal Transmission Winter 2018 Instructor: DR. Reza Soleymani, Office: EV 5.125, Telephone: 848 2424 ext.: 4103. Office Hours: Wednesday, Thursday, 14:00 15:00 Slide 1 In this

More information

Ferre, PL., Doufexi, A., Chung How, J. T. H., Nix, AR., & Bull, D. (2003). Link adaptation for video transmission over COFDM based WLANs.

Ferre, PL., Doufexi, A., Chung How, J. T. H., Nix, AR., & Bull, D. (2003). Link adaptation for video transmission over COFDM based WLANs. Ferre, PL., Doufexi, A., Chung How, J. T. H., Nix, AR., & Bull, D. (2003). Link adaptation for video transmission over COFDM based WLANs. Peer reviewed version Link to publication record in Explore Bristol

More information

MAC layer: structure and QoS support. PhD student: Le Minh Duong

MAC layer: structure and QoS support. PhD student: Le Minh Duong 802.16 MAC layer: structure and QoS support PhD student: Le Minh Duong Content 1. Introduction 2. 802.16 MAC layer 2.1. MAC Service-Specific Convergence Sublayer 2.2. Common Part Sublayer 3. QoS support

More information

Efficient Transmission of H.264 Video over WLANs

Efficient Transmission of H.264 Video over WLANs Efficient Transmission of H.264 Video over WLANs Yaser P. Fallah March 2007 UBC 1 Multimedia Communications Multimedia applications are becoming increasingly popular Video on mobile devices (cell phones,

More information

CHAPTER 5 PROPAGATION DELAY

CHAPTER 5 PROPAGATION DELAY 98 CHAPTER 5 PROPAGATION DELAY Underwater wireless sensor networks deployed of sensor nodes with sensing, forwarding and processing abilities that operate in underwater. In this environment brought challenges,

More information

GPRS System Architecture

GPRS System Architecture 1 LECTURE 6 GPRS What is GPRS? 2 General Packet Radio Service is an overlay on top of GSM physical layer and network entities It extends data capabilities of GSM and provides connection to external packet

More information

Introduction to Networked Multimedia An Introduction to RTP p. 3 A Brief History of Audio/Video Networking p. 4 Early Packet Voice and Video

Introduction to Networked Multimedia An Introduction to RTP p. 3 A Brief History of Audio/Video Networking p. 4 Early Packet Voice and Video Preface p. xi Acknowledgments p. xvii Introduction to Networked Multimedia An Introduction to RTP p. 3 A Brief History of Audio/Video Networking p. 4 Early Packet Voice and Video Experiments p. 4 Audio

More information

Adaptive Resource Allocation Mechanisms for Support of Data Traffic over ATM Satellite Networks Introduction The Dynamic Flow Control Scheme

Adaptive Resource Allocation Mechanisms for Support of Data Traffic over ATM Satellite Networks Introduction The Dynamic Flow Control Scheme Adaptive Resource Allocation Mechanisms for Support of Traffic over ATM Satellite Networks Tanja Lang and Nirmala Shenoy, Co-operative Research Centre for Satellite Systems, Institute for Telecommunications

More information

Cross Layer QoS Provisioning in Home Networks

Cross Layer QoS Provisioning in Home Networks Cross Layer QoS Provisioning in Home Networks Jiayuan Wang, Lukasz Brewka, Sarah Ruepp, Lars Dittmann Technical University of Denmark E-mail: jwan@fotonik.dtu.dk Abstract This paper introduces an innovative

More information

SRI RAMAKRISHNA INSTITUTE OF TECHNOLOGY DEPARTMENT OF INFORMATION TECHNOLOGY COMPUTER NETWORKS UNIT - II DATA LINK LAYER

SRI RAMAKRISHNA INSTITUTE OF TECHNOLOGY DEPARTMENT OF INFORMATION TECHNOLOGY COMPUTER NETWORKS UNIT - II DATA LINK LAYER SRI RAMAKRISHNA INSTITUTE OF TECHNOLOGY DEPARTMENT OF INFORMATION TECHNOLOGY COMPUTER NETWORKS UNIT - II DATA LINK LAYER 1. What are the responsibilities of data link layer? Specific responsibilities of

More information

Comparison of RRC and MAC based methods of dynamic scheduling between users on the uplink

Comparison of RRC and MAC based methods of dynamic scheduling between users on the uplink ETSI SMG2 UMTS L2/3 Tdoc TSGR2#2(99) 127 Stockholm 8-11 March 1999 Agenda item: 6.2 Source: Motorola Comparison of RRC and MAC based methods of dynamic scheduling between users on the uplink 1 Introduction

More information

GPRS and UMTS T

GPRS and UMTS T GPRS and UMTS T-110.2100 Global Packet Radio Service GPRS uses the time slots not used for circuit switched services Data rate depends on the availability of free time slots GPRS uses the multislot technique,

More information

Mobile Communications Chapter 3 : Media Access

Mobile Communications Chapter 3 : Media Access Mobile Communications Chapter 3 : Media Access 2. Motivation 3. SDMA, FDMA, TDMA 1. Aloha and contention based schemes 4. Reservation schemes 5. Collision avoidance, MACA 6. Polling CDMA (Lecture 6) Prof.

More information

Chapter 12 Multiple Access 12.1

Chapter 12 Multiple Access 12.1 Chapter 12 Multiple Access 12.1 Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. 12.2 Figure 12.1 Data link layer divided into two functionality-oriented sublayers

More information

An Efficient Scheduling Scheme for High Speed IEEE WLANs

An Efficient Scheduling Scheme for High Speed IEEE WLANs An Efficient Scheduling Scheme for High Speed IEEE 802.11 WLANs Juki Wirawan Tantra, Chuan Heng Foh, and Bu Sung Lee Centre of Muldia and Network Technology School of Computer Engineering Nanyang Technological

More information

CMSC 417. Computer Networks Prof. Ashok K Agrawala Ashok Agrawala. October 30, 2018

CMSC 417. Computer Networks Prof. Ashok K Agrawala Ashok Agrawala. October 30, 2018 CMSC 417 Computer Networks Prof. Ashok K Agrawala 2018 Ashok Agrawala October 30, 2018 Message, Segment, Packet, and Frame host host HTTP HTTP message HTTP TCP TCP segment TCP router router IP IP packet

More information

Goals and topics. Verkkomedian perusteet Fundamentals of Network Media T Circuit switching networks. Topics. Packet-switching networks

Goals and topics. Verkkomedian perusteet Fundamentals of Network Media T Circuit switching networks. Topics. Packet-switching networks Verkkomedian perusteet Fundamentals of Media T-110.250 19.2.2002 Antti Ylä-Jääski 19.2.2002 / AYJ lide 1 Goals and topics protocols Discuss how packet-switching networks differ from circuit switching networks.

More information

Frame Relay show Command and debug Command Enhancements

Frame Relay show Command and debug Command Enhancements Frame Relay show Command and debug Command Enhancements First Published: September 12, 2005 Last Updated: June 19, 2006 The feature provides the ability to filter the output of certain Frame Relay show

More information

CS 4453 Computer Networks Winter

CS 4453 Computer Networks Winter CS 4453 Computer Networks Chapter 2 OSI Network Model 2015 Winter OSI model defines 7 layers Figure 1: OSI model Computer Networks R. Wei 2 The seven layers are as follows: Application Presentation Session

More information

Link Layer: Retransmissions

Link Layer: Retransmissions Link Layer: Retransmissions Context on Reliability Where in the stack should we place reliability functions? Application Transport Network Link Physical CSE 461 University of Washington 2 Context on Reliability

More information

2.1 CHANNEL ALLOCATION 2.2 MULTIPLE ACCESS PROTOCOLS Collision Free Protocols 2.3 FDDI 2.4 DATA LINK LAYER DESIGN ISSUES 2.5 FRAMING & STUFFING

2.1 CHANNEL ALLOCATION 2.2 MULTIPLE ACCESS PROTOCOLS Collision Free Protocols 2.3 FDDI 2.4 DATA LINK LAYER DESIGN ISSUES 2.5 FRAMING & STUFFING UNIT-2 2.1 CHANNEL ALLOCATION 2.2 MULTIPLE ACCESS PROTOCOLS 2.2.1 Pure ALOHA 2.2.2 Slotted ALOHA 2.2.3 Carrier Sense Multiple Access 2.2.4 CSMA with Collision Detection 2.2.5 Collision Free Protocols 2.2.5.1

More information

Quality of Service in the Internet

Quality of Service in the Internet Quality of Service in the Internet Problem today: IP is packet switched, therefore no guarantees on a transmission is given (throughput, transmission delay, ): the Internet transmits data Best Effort But:

More information

Lecture overview. Modifications and derivatives of GSM Data transmission in GSM: HSCSD GPRS part one EDGE

Lecture overview. Modifications and derivatives of GSM Data transmission in GSM: HSCSD GPRS part one EDGE Lecture overview Modifications and derivatives of GSM Data transmission in GSM: HSCSD GPRS part one EDGE Modifications and derivatives of GSM Introduction of half-rate speech coding (BR 6.5 kb/s) Two users

More information

EITF25 Internet Techniques and Applications L7: Internet. Stefan Höst

EITF25 Internet Techniques and Applications L7: Internet. Stefan Höst EITF25 Internet Techniques and Applications L7: Internet Stefan Höst What is Internet? Internet consists of a number of networks that exchange data according to traffic agreements. All networks in Internet

More information

Packet Switching - Asynchronous Transfer Mode. Introduction. Areas for Discussion. 3.3 Cell Switching (ATM) ATM - Introduction

Packet Switching - Asynchronous Transfer Mode. Introduction. Areas for Discussion. 3.3 Cell Switching (ATM) ATM - Introduction Areas for Discussion Packet Switching - Asynchronous Transfer Mode 3.3 Cell Switching (ATM) Introduction Cells Joseph Spring School of Computer Science BSc - Computer Network Protocols & Arch s Based on

More information

Robust Header Compression for Multimedia Services

Robust Header Compression for Multimedia Services Robust Header Compression for Multimedia Services Frank Fitzek Arizona State University 06/03/2002 Content Motivation, Introduction, Problems Related Work Robust Header Compression Wireless JSQ Testbed

More information

Introduction to TCP/IP networking

Introduction to TCP/IP networking Introduction to TCP/IP networking TCP/IP protocol family IP : Internet Protocol UDP : User Datagram Protocol RTP, traceroute TCP : Transmission Control Protocol HTTP, FTP, ssh What is an internet? A set

More information

Lecture 4: Wireless MAC Overview. Hung-Yu Wei National Taiwan University

Lecture 4: Wireless MAC Overview. Hung-Yu Wei National Taiwan University Lecture 4: Wireless MAC Overview Hung-Yu Wei National Taiwan University Medium Access Control Topology 3 Simplex and Duplex 4 FDMA TDMA CDMA DSSS FHSS Multiple Access Methods Notice: CDMA and spread spectrum

More information

This tutorial will help you in understanding IPv4 and its associated terminologies along with appropriate references and examples.

This tutorial will help you in understanding IPv4 and its associated terminologies along with appropriate references and examples. About the Tutorial Internet Protocol version 4 (IPv4) is the fourth version in the development of the Internet Protocol (IP) and the first version of the protocol to be widely deployed. IPv4 is described

More information

Da t e: August 2 0 th a t 9: :00 SOLUTIONS

Da t e: August 2 0 th a t 9: :00 SOLUTIONS Interne t working, Examina tion 2G1 3 0 5 Da t e: August 2 0 th 2 0 0 3 a t 9: 0 0 1 3:00 SOLUTIONS 1. General (5p) a) Place each of the following protocols in the correct TCP/IP layer (Application, Transport,

More information

Link Layer and LANs 안상현서울시립대학교컴퓨터 통계학과.

Link Layer and LANs 안상현서울시립대학교컴퓨터 통계학과. Link Layer and LANs 안상현서울시립대학교컴퓨터 통계학과 ahn@venus.uos.ac.kr Data Link Layer Goals: understand principles behind data link layer services: error detection, correction sharing a broadcast channel: multiple

More information

Your favorite blog :www.vijay-jotani.weebly.com (popularly known as VIJAY JOTANI S BLOG..now in facebook.join ON FB VIJAY

Your favorite blog :www.vijay-jotani.weebly.com (popularly known as VIJAY JOTANI S BLOG..now in facebook.join ON FB VIJAY VISIT: Course Code : MCS-042 Course Title : Data Communication and Computer Network Assignment Number : MCA (4)/042/Assign/2014-15 Maximum Marks : 100 Weightage : 25% Last Dates for Submission : 15 th

More information

Overview of Networks

Overview of Networks CMPT765/408 08-1 Overview of Networks Qianping Gu 1 Overview of Networks This note is mainly based on Chapters 1-2 of High Performance of Communication Networks by J. Walrand and P. Pravin, 2nd ed, and

More information

ETSF10 Internet Protocols Transport Layer Protocols

ETSF10 Internet Protocols Transport Layer Protocols ETSF10 Internet Protocols Transport Layer Protocols 2012, Part 2, Lecture 2.2 Kaan Bür, Jens Andersson Transport Layer Protocols Special Topic: Quality of Service (QoS) [ed.4 ch.24.1+5-6] [ed.5 ch.30.1-2]

More information

Multiple Access Protocols

Multiple Access Protocols Multiple Access Protocols Computer Networks Lecture 2 http://goo.gl/pze5o8 Multiple Access to a Shared Channel The medium (or its sub-channel) may be shared by multiple stations (dynamic allocation) just

More information

Audio/Video Transport Working Group. Document: draft-miyazaki-avt-rtp-selret-01.txt. RTP Payload Format to Enable Multiple Selective Retransmissions

Audio/Video Transport Working Group. Document: draft-miyazaki-avt-rtp-selret-01.txt. RTP Payload Format to Enable Multiple Selective Retransmissions Audio/Video Transport Working Group Internet Draft Document: draft-miyazaki-avt-rtp-selret-01.txt July 14, 2000 Expires: January 14, 2001 Akihiro Miyazaki Hideaki Fukushima Thomas Wiebke Rolf Hakenberg

More information

Congestion Control in Communication Networks

Congestion Control in Communication Networks Congestion Control in Communication Networks Introduction Congestion occurs when number of packets transmitted approaches network capacity Objective of congestion control: keep number of packets below

More information

Performance analysis of aodv, dsdv and aomdv using wimax in NS-2

Performance analysis of aodv, dsdv and aomdv using wimax in NS-2 Performance analysis of aodv, dsdv and aomdv using wimax in NS-2 Madhusrhee B Department Computer Science, L.J Institute of Technology, Ahmedabad, India Abstract WiMAX (IEEE 802.16) technology empowers

More information

Admission Control in Time-Slotted Multihop Mobile Networks

Admission Control in Time-Slotted Multihop Mobile Networks dmission ontrol in Time-Slotted Multihop Mobile Networks Shagun Dusad and nshul Khandelwal Information Networks Laboratory Department of Electrical Engineering Indian Institute of Technology - ombay Mumbai

More information

UNIT IV -- TRANSPORT LAYER

UNIT IV -- TRANSPORT LAYER UNIT IV -- TRANSPORT LAYER TABLE OF CONTENTS 4.1. Transport layer. 02 4.2. Reliable delivery service. 03 4.3. Congestion control. 05 4.4. Connection establishment.. 07 4.5. Flow control 09 4.6. Transmission

More information

Enhancing Packet Data Access in WCDMA

Enhancing Packet Data Access in WCDMA Enhancing Packet Data Access in WCDMA Janne Peisa a, Stefan Parkvall b, Erik Dahlman b, Pål Frenger b, Per Beming b a Ericsson Research, FIN-02420 Jorvas, Finland b Ericsson Research, 164 80 Stockholm,

More information

Impact of IEEE MAC Packet Size on Performance of Wireless Sensor Networks

Impact of IEEE MAC Packet Size on Performance of Wireless Sensor Networks IOSR Journal of Electronics and Communication Engineering (IOSR-JECE) e-issn: 2278-2834,p- ISSN: 2278-8735.Volume 10, Issue 3, Ver. IV (May - Jun.2015), PP 06-11 www.iosrjournals.org Impact of IEEE 802.11

More information

EECS 563 Fall Review Test 2. Review Test 2

EECS 563 Fall Review Test 2. Review Test 2 EECS 563 Fall 2013 1 Network traffic Request for resources Rate of requests= λ Average resource hold time = T h Common Assumptions Time between arrivals ~ exponentially Holding time ~ exponentially Voice

More information

Medium Access Control in Wireless Sensor Networks

Medium Access Control in Wireless Sensor Networks Medium Access Control in Wireless Sensor Networks Davide Quaglia, Damiano Carra LIVELLO DATALINK 2 1 Goals Reliable and efficient communication between two nodes on the same physical medium Cable (Wired)

More information

EL Wireless and Mobile Networking Spring 2002 Mid-Term Exam Solution - March 6, 2002

EL Wireless and Mobile Networking Spring 2002 Mid-Term Exam Solution - March 6, 2002 Instructions: EL 604 - Wireless and Mobile Networking Spring 2002 Mid-Term Exam Solution - March 6, 2002 Be sure to write your name on your submission. This is an open book test. Use your class notes,

More information

ETSF10 Internet Protocols Transport Layer Protocols

ETSF10 Internet Protocols Transport Layer Protocols ETSF10 Internet Protocols Transport Layer Protocols 2012, Part 2, Lecture 2.1 Kaan Bür, Jens Andersson Transport Layer Protocols Process-to-process delivery [ed.4 ch.23.1] [ed.5 ch.24.1] Transmission Control

More information

Internetworking Part 1

Internetworking Part 1 CMPE 344 Computer Networks Spring 2012 Internetworking Part 1 Reading: Peterson and Davie, 3.1 22/03/2012 1 Not all networks are directly connected Limit to how many hosts can be attached Point-to-point:

More information

Medium Access Control Sublayer

Medium Access Control Sublayer Wireless (WLAN) Medium Access Control Sublayer Mahalingam Mississippi State University, MS October 20, 2014 Outline Medium Access Protocols Wireless (WLAN) 1 Medium Access Protocols ALOHA Slotted ALOHA

More information

OSI Layer OSI Name Units Implementation Description 7 Application Data PCs Network services such as file, print,

OSI Layer OSI Name Units Implementation Description 7 Application Data PCs Network services such as file, print, ANNEX B - Communications Protocol Overheads The OSI Model is a conceptual model that standardizes the functions of a telecommunication or computing system without regard of their underlying internal structure

More information

Implementation of a WAP model to evaluate Capacity in 3G radio access networks. Henrik Fållby

Implementation of a WAP model to evaluate Capacity in 3G radio access networks. Henrik Fållby Implementation of a WAP model to evaluate Capacity in 3G radio access networks Henrik Fållby Outline Scoop of this thesis Packet switched vs. circuit switched networks Packet Data in GSM radio networks

More information

Homework 1. Question 1 - Layering. CSCI 1680 Computer Networks Fonseca

Homework 1. Question 1 - Layering. CSCI 1680 Computer Networks Fonseca CSCI 1680 Computer Networks Fonseca Homework 1 Due: 27 September 2012, 4pm Question 1 - Layering a. Why are networked systems layered? What are the advantages of layering? Are there any disadvantages?

More information

Abstract of the Book

Abstract of the Book Book Keywords IEEE 802.16, IEEE 802.16m, mobile WiMAX, 4G, IMT-Advanced, 3GPP LTE, 3GPP LTE-Advanced, Broadband Wireless, Wireless Communications, Cellular Systems, Network Architecture Abstract of the

More information

Chapter 10: Wireless Networking. School of information science and Engineering, SDU

Chapter 10: Wireless Networking. School of information science and Engineering, SDU Chapter 10: Wireless Networking School of information science and Engineering, SDU 10.1 Introduction to Wireless Networks Requirement to the networks: Provides ubiquitous personal communications; Accommodate

More information

The MAC layer in wireless networks

The MAC layer in wireless networks The MAC layer in wireless networks The wireless MAC layer roles Access control to shared channel(s) Natural broadcast of wireless transmission Collision of signal: a /space problem Who transmits when?

More information