Bridge Channel Access Algorithms for Integrated Services Ethernets

Size: px
Start display at page:

Download "Bridge Channel Access Algorithms for Integrated Services Ethernets"

Transcription

1 Bridge Channel Access Algorithms for Integrated Services Ethernets Jim M. Ng, Edward Chan Dept. of Computer Science City Polytechnic of Hong Kong Tat Chee Ave., Kowloon Hong Kong Abstract: To provide integrated data/voice services on an inter-connected CSMA/CD type network, a proper channel access algorithm must be used by the bridge in order to minimize theend-to-end delay. T wo algorithms, a static aggressive mechanism and a load adaptive dynamic mechanism, are presented and compared with the algorithm specified in the IEEE standard. The performance of each algorithm is analyzed, and its suitability for the integrated service environment is evaluated. 1. INTRODUCTION Ethernet, a CSMA/CD based local area network (LAN), has been widely used in many offices because of its simplicity in structure, its expandability, and its ease of installation. In order to adapt the need of the modern office and to enhance the performance of the network, it is advisable to have a subnetwork for each department and interconnect the subnetworks together using bridges. Bridges are intelligent devices that can filter off local traffic and only pass on the inter-network messages. This can not only reduce the overall network load, but also provide some security to each subnetwork. Although Ethernet has been used for carrying data information for most of its installations, itsfeasibility in carrying voice messages has been proven [1],[10]. However, most studies werebased on having voice messages on a single LAN segment, and the performance of a bridged network has not been studied extensively. As Ethernets increase in popularity and complexity, the performance of the integrated services bridged-ethernets becomes an issue of considerable practical importance. 2. THE BRIDGED CSMA/CD NETWORK Ethernet, which is based on IEEE standard [2], uses the CSMA/CD access mechanism where stations contend for the transmission medium. Any one station transmitting will have its message broadcasted on its own network. When the bridge receives a message, it will forward the message if its destination is in the neighboring network. The message is buffered at the bridge until the bridge captures the transmission channel in the destination network. Hence, the bridge performs filtering of messages for the two networks. The bridge contains two large buffers, one for each side of the network as shown in Figure 1. Each buffer uses First In First Out (FIFO) scheduling mechanism.

2 To study the performance of bridged network, two main issues will be investigated. First of all, when a voice station or the bridge has successfully captured the channel, there is the question of whether sending only one packet (non-exhaustive service) or sending all packets in the queue (exhaustive service) has a better performance. Secondly, as voice messages cannot tolerate long delay, it is critical to send the packets out within a tight time constraint. Since the bridge is responsible for transferring all cross network traffic to the other network, it generates a relatively high traffic load compared to normal network stations. Thus a more aggressive approach to capture the channel is desirable. We will look at two channel access mechanisms, a static and a dynamic adaptive algorithm, and compare their relative merits. Simulation will be used in our study of the integrated service bridge network. 3. SIMULATION MODEL Shoch[3] has shown that the data load on most local networks occupies less than 10% of the network capacity. However, his measurements are more than a decade old and most LANs are populated with machines much faster than those used in his experiment. Hence, in our simulation, 20 data stations are used to generate a background loading of 3 Mbit/sec (i.e. 30% of the channel capacity) on each network. The data messages have a bi-modal distributation, with 70% small messages of 100 bytes (excluding headers/trailers) each and 30% long messages of 1200 bytes each. This should be closer to traffic pattern observed in many LANs than the fixed 40 byte message size used in Shoch s original work. Data packets arrivals at each station are modeled by a Poisson process. In order to ensure that the data stations need no changes in its communication software and hardware, the data stations will follow the IEEE standard. Voice input is sampled at a rate of 8K samples per second, and each analogue sample is digitized into an 8- bit code. Hence, the resulting digitized voice signal data rate is 64K bit/sec. Since each conversation is composed of silent intervals and talkspurts[4], we assume that the durations of talkspurts and silent intervals to be exponentially distributed with means 0.17s and 0.41s respectively. Furthermore, as noise may appear on the channel, any talkspurts which are less than 0.015s will be ignored; also,any silent intervals less than 0.2s will be treated as part of a talkspurt as they may probably be minor breaks in continuous speech. The packetizing interval is 20ms, so a 160-byte voice message (excluding header/trailer) will be formed during this period. Since voice messages can tolerate certain amount of packet loss, the network performance can be enhanced by reducing the number of retransmissions for the voice stations. Some studies [7,8] suggested that with maximum number of transmission attempts set to eight, an acceptable packetloss rate can still be maintained. However, for the data stations and the bridge, a maximum of 16 attempts will remain. As the buffer size required by the bridge is not known, we will assume the bridge to have two infinite size buffers. Statistics will be captured for the buffer queue length in order to help determine the appropriate buffer size. In our model, a 10 Mbit/s channel is used and each network is assumed to be 1 km long. For simplicity, only two Ethernets are used. For each network, there are 20 data stations and 120 voice stations, and a bridge is used to interconnect the two networks. Since station clustering has only slight effects on the system performance during normal operation [5,6], our model has all the stations uniformly distributed on each network. The simulation attempts to follow IEEE exactly. To simulate the 9.6 µs interframe gap, 12 bytes are added to each frame in addition to the 26 bytes of header/trailer. Whenever there is a collision, the channel is jammed for 3.2 µs.

3 4. BRIDGE CHANNEL ACCESS METHODS The standard backoff mechanism defined in IEEE specifies that a station which experiences a collision needs to back off for r slot time, where r is a random number between 0 and 2 k, k = min(n,10) and n is the number of attempt for transmission. In order tohandle the packets sent to the bridge efficiently and reduce their transmission delay, a more aggressive approach to capture the channel is necessary for the bridge. A simple approach to increase its aggressiveness is by reducing its backoff time. Two algorithms will be studied and compared with the standard algorithm: The "Static" Algorithm. In this aggressive algorithm, the bridge will backoff for 0 or 1 slot time before attempting for retransmission again; after the first ten attempts for transmission, the delay window will be doubled for each further collision. Hence, k = 0 when n <= 10 k = n - 10 when n > 10. The "Dynamic" Algorithm. This is a load sensitive approach where the backoff window will grow or shrink dynamically as it takes into account the bridge queue length as well as the number of retransmission; i.e. the aggressiveness of the bridge will change dynamically in response to the bridge and remote network loading condition. Similar to the standard algorithm, after each collision, the station will backoff for r slot time, with r being between 0 and 2 k ; however, in this algorithm k = min(n,10,t). Again, n is the number of attempt, and T = max(1,int[c / Q(t)]), where c is a constant and Q(t) is the bridge queue length at time t, and T is an integer with minimum value of one. When the queue in the bridge gets longer, T will have a smaller value, and hence reduce the backoff time. The constant c is used to control the aggressiveness of the algorithm. If c is chosen to be very large, the algorithm should behave like the standard algorithm; witha smaller c, the algorithm increases its aggressiveness even with a short queue. 5. EXHAUSTIVE AND NON-EXHAUSTIVE SERVICES When the bridge or a voice station has successfully captured the channel, it can use the exhaustive service to transmit all the packets in its buffer queue. On the other hand, it has been suggested that when a voice station has captured the channel, transmitting only the first packet in the buffer (non-exhaustive service) may give a small variance in delay [9]. However, if non-exhaustive service is used by the bridge, internetwork packets may experience a longer queuing delay. Both the bridge and the voice stations will be studied for both exhaustive and non-exhaustive services, resulting in four different combination; i.e., 1. Both the bridge and voice stations using exhaustive service; 2. The bridge uses exhaustive service while the voice stations use non-exhaustive service; 3. The bridge uses non-exhaustive service while the voice stations use exhaustive service; 4. Both the bridge and the voice stations use non-exhaustive service. The performance measurement of interest is the delay experienced by each voice packet. This delay includes the queuing delay, the channel access delay, the transmission delay and the propagation delay. For those packets that need to cross the bridge to go from network A to B, delay incurred from both networks A and B will be measured.

4 6. PERFORMANCE ANALYSIS OF BRIDGE CHANNEL ACCESS METHOD Figures 2 to 13 show the performance measures of the integrated services bridged network. The characters besides each curve indicate the algorithm used by the bridge. "Std" is for the standard backoff algorithm specified in IEEE 802.3, "S" is for the static algorithm, and"d(c)" is for the dynamic algorithm, where c = 10, 15, 20 and 40 are used. Also, for figures 2 to 6, the number next to the curve indicates the service type (exhaustive or non-exhaustive) used by the bridge and voice stations as described in the previous section. Intuitively, when the bridge uses exhaustive service, inter-network voice packets will experience a shorter delay. On the other hand it may have a negative impact on the intra-network traffic of the remote (i.e. destination) network. Similarly, when all voice stations use the exhaustive service, the bridge will experience a longer delay. However, this impact on the bridge can be balanced out to a certain extent if the bridge employs one of the aggressive channel access strategies outlines in an earlier section. Figures 2 to 6 show the network performance when different combinations of service types are used. Figures 2 and 3 show the cross bridge voice packets delay, and figures 4 and 5 show the average queue length in the bridge. The dynamic algorithm with c = 20 is used in this comparative study. As shown from the figures, when the standard truncated binary exponential backoff mechanism is used by the bridge, the bridge queue length increases rapidly with the increase of inter-network load and the inter-network packets will experience a much higher delay, as compared with the other two aggressive approaches. Using the standard backoff mechanism by the bridge hence cannot providea satisfactory service to the inter-network traffic. Exhaustive service can increase the aggressiveness of the station implicitly as all the packets in the stations can be transmitted once the channel has been captured. As a result, packets in the station will have a shorter average queuing time. As shown in figure 3 and 5, when exhaustive service is used by the bridge, the inter-network packets experience a much shorter delay, and the bridge has a shorter queue, regardless of the type of service (exhaustive or non-exhaustive) used by the voice stations. This result agrees with our expectation. Figure 6 shows the interesting fact that when the bridge uses an aggressive channel access algorithm, regardless of which service types are used by the bridge and the voice stations, the intra-network voice delay is similar. This means that although using exhaustive service by the bridge can implicitly increase its aggressiveness in channel access, modifying the channel access algorithm can produce a much greater increase in aggressiveness. This increase in aggressivenessby the bridge is so dominant that the choice of service types by the voice stations has comparatively little impact. The key observation so far is that the choice of either exhaustive or non-exhaustive service by the bridge and the voice stations has no significant impact on the intra-network traffic, and using the exhaustive service by the bridge can reduce the inter-network delay time. This observation is true for the aggressive algorithms and not the standard algorithm, but as noted earlier, the standard algorithm does not meet the required performance requirements and will be used as a basis for comparison and not as a viable option. Hence exhaustive service will be used for both the bridge andthe voice stations for the rest of this study. The merit of the different aggressive channel access schemes will be studied in the next section. 7. PERFORMANCE OF THE AGGRESSIVE CHANNEL ACCESS METHODS We will now compare the suitability of different channel access methods used by the bridge. Again, figures 7, 8 and 9 show that the standard backoff algorithm is clearly not suitable for the bridge. When the standard algorithm is used, the cross network traffic experiences highdelay, high delay variance, and rapid increase in queue length. On the other hand, when the aggressive static algorithm is used, the system favors the bridge.

5 The dynamic load adaptive algorithm is meant to balance the above two algorithms, i.e. the bridge will increase/decrease its aggressiveness dynamically. We can hence expect that the cross network voice delay will be between that of the standard and static algorithms. Our predictions are confirmed by figures 7 and 8. It is clear that when using the dynamic algorithm, the crossnetwork traffic will experience a higher delay and delay variance than the static algorithm; however, the delay and delay variance are still well within the tight constraint set for voice messages. Furthermore, as shown in figure 9 the mean bridge queue length is less than 1.5 packets. The major advantage of the dynamic algorithm is that it results in a lower delay for intra-network traffic. This is shown in figures 10 and 11. While the dynamic algorithm is expected tooutperform the standard algorithm, it is interesting to note that the dynamic algorithm performs better than even the static algorithm. The reason behind this may properly be due to the fact that by regulating the aggressiveness of the bridge, the local traffic can made use of the channel more effectively. As mentioned in the previous section, the value of c in the dynamic algorithm can be used to control the aggressiveness of the channel access mechanism. Obviously, with a large c value, the inter-network traffic will experience a longer delay; however, note that different c values produce similar performance for intranetwork traffic (figures 7 and 10). The intra-network delay is not affected much by different c values because the two opposing factors of accessing the channel less frequently and using the channel for a longer time once the channel has been captured (exhaustive service) tendto balance out. So far, the impact of the various channel access mechanisms on inter-network traffic and intra-network delay has been studied separately. In reality, the two types of delay should be considered together in order to arrive at some sort of balance between the two. We define the fairness index to be the ratio between the delay experienced by a packet after joining the bridge untilits successfully transmission and the delay experienced by the intra-network voice traffic. For a fair algorithm, it should not bias to either the bridge or the local stations. The fairness index can be used to tune the value of c in the dynamic algorithm: c should be chosen such that the fairness index will have a value close to 1. This is an additional advantage of using the dynamic algorithm. Figure 13 shows that using the standard or static algorithms result in either a fairness index that is either too large or too small, meaning that either intra-network or inter-network traffic is favored. On the other hand, the dynamic algorithm with c appropriately chosen (e.g. c=10) results in a much "fairer" service to both the bridge and the local stations. Figure 12 illustrates the fact that, for both the static and dynamic algorithms, packet loss in the local network traffic increases as cross network traffic increases. Although most systems can only tolerate packet loss of less than 3%, over 60 cross network conversations can still be supported simultaneously when each network is carrying 30% data traffic and another 120 intra-network calls. For a system with this packet loss rate, a dynamic algorithm with c = 10 will be a good choice, since it results in a index close to 1.

6 8. CONCLUSION Under normal loading condition for data traffic, the choice for the bridge channel access mechanism may not be crucial; however, in order to support voice traffic, the choice of channel access mechanismcan seriously affect the performance. We have looked at two main groups of access mechanisms, namely the static and dynamic algorithms. Although the static algorithm can provide a satisfactory service for the cross network traffic, it has adverse effects on the intra-network traffic. On the other hand the dynamic algorithm, by controlling the aggressiveness of the access mechanism, can alleviate this impact. Furthermore, by tuning the control variable c properly, we can provide a fair service to both the bridge and the local traffic. Regarding the choice of service to be used by the bridge and the voice stations, choosing exhaustive service for the bridge helps to increase the its aggressiveness and attain slightly better overall performance. On the other hand, the choice of service for the voice stations has littleimpact on overall performance. The system that we have looked at can support approximately 60 cross network conversation, an additional 120 intra-network active voice stations, and some data traffic. However, with rapid advance in communication technology, voice messages can be reconstructed from system with lower bit rate, and have greater tolerance to higher loss rate. As a result, it will be possible to set up a network which can support a greater number of voice conversations in the near future. Figure 1. Model of the bridge

7 REFERENCES 1. Dunlop, J "Techniques for the integration of packet voice and data on IEEE LANs," Comp. Comm., Vol 12, No 5, Oct 1989, pp IEEE Comp. Soc., Local Area Networks Standard CSMA/CD, Shoch, J F and Hupp, J A "Measured Performance of an Ethernet Local Network," CACM,V ol 23, No 12, Dec 1980, pp Brady, P T "A Model for Generating On-Off Speech Patterns in Two-Way Conversation," Bell Sys. Tech. Jour., Sept 1969, pp Gonsalves, T A and Tobagi, F A "On the Performance Effects of Station Locations and Access Protocol Parameters in Ethernet Networks," IEEE Trans. Comm., COM-36, No 4, April 1988, pp Chan, E and Ng, J M "Effect of Clustering in a Bridged Ethernet Environment," Proc. Intern. AMSE Conference on Signals & Systems, Brighton, U.K., July 1989, pp Chamtac, I and Eisenger, M "Voice/Data Integration on Ethernet - Backoff and Priority Considerations," Comp. Comm., Vol 6, No 5, Oct 1983, pp Ng, J M and Chan, E "Integrating Voice Service on a Large CSMA/CD Network," Proc. SEARCC Conference Suda, T and Bradley, T T "Packetized-Voice/Data Integrated Transmission on a Token Passing Ring Local Area Network," Proc. IEEE Infocom 87, pp Swinehart, D C "Telephone Management in the Etherphone System." Proc. IEEE Globecomm 87 pp

An Efficient Scheduling Scheme for High Speed IEEE WLANs

An Efficient Scheduling Scheme for High Speed IEEE WLANs An Efficient Scheduling Scheme for High Speed IEEE 802.11 WLANs Juki Wirawan Tantra, Chuan Heng Foh, and Bu Sung Lee Centre of Muldia and Network Technology School of Computer Engineering Nanyang Technological

More information

Modelling a Video-on-Demand Service over an Interconnected LAN and ATM Networks

Modelling a Video-on-Demand Service over an Interconnected LAN and ATM Networks Modelling a Video-on-Demand Service over an Interconnected LAN and ATM Networks Kok Soon Thia and Chen Khong Tham Dept of Electrical Engineering National University of Singapore Tel: (65) 874-5095 Fax:

More information

CSCI Spring Final Exam Solution

CSCI Spring Final Exam Solution CSCI 4211 16Spring Final Exam Solution 1. When an IP packet arrives a router, how the router decides what is the next router (output link) this packet to be forwarded to? What are the routing table and

More information

Multiple Access Protocols

Multiple Access Protocols Multiple Access Protocols Computer Networks Lecture 2 http://goo.gl/pze5o8 Multiple Access to a Shared Channel The medium (or its sub-channel) may be shared by multiple stations (dynamic allocation) just

More information

Department of Electrical and Computer Systems Engineering

Department of Electrical and Computer Systems Engineering Department of Electrical and Computer Systems Engineering Technical Report MECSE-6-2006 Medium Access Control (MAC) Schemes for Quality of Service (QoS) provision of Voice over Internet Protocol (VoIP)

More information

Comparison of pre-backoff and post-backoff procedures for IEEE distributed coordination function

Comparison of pre-backoff and post-backoff procedures for IEEE distributed coordination function Comparison of pre-backoff and post-backoff procedures for IEEE 802.11 distributed coordination function Ping Zhong, Xuemin Hong, Xiaofang Wu, Jianghong Shi a), and Huihuang Chen School of Information Science

More information

The MAC layer in wireless networks

The MAC layer in wireless networks The MAC layer in wireless networks The wireless MAC layer roles Access control to shared channel(s) Natural broadcast of wireless transmission Collision of signal: a /space problem Who transmits when?

More information

Access Technologies! Fabio Martignon

Access Technologies! Fabio Martignon Access Technologies! Fabio Martignon 1 LAN Ethernet - IEEE 802.3 Broadcast Bus Capacity=10 Mb/s Xerox-Intel-Digital inventors Standardized at the beginning of the 80s as IEEE 802.3 Big Success and Several

More information

CHAPTER 7 MAC LAYER PROTOCOLS. Dr. Bhargavi Goswami Associate Professor & Head Department of Computer Science Garden City College

CHAPTER 7 MAC LAYER PROTOCOLS. Dr. Bhargavi Goswami Associate Professor & Head Department of Computer Science Garden City College CHAPTER 7 MAC LAYER PROTOCOLS Dr. Bhargavi Goswami Associate Professor & Head Department of Computer Science Garden City College MEDIUM ACCESS CONTROL - MAC PROTOCOLS When the two stations transmit data

More information

ECE 4450:427/527 - Computer Networks Spring 2017

ECE 4450:427/527 - Computer Networks Spring 2017 ECE 4450:427/527 - Computer Networks Spring 2017 Dr. Nghi Tran Department of Electrical & Computer Engineering Lecture 5.5: Ethernet Dr. Nghi Tran (ECE-University of Akron) ECE 4450:427/527 Computer Networks

More information

Data Link Layer, Part 5. Medium Access Control

Data Link Layer, Part 5. Medium Access Control CS 455 Medium Access Control, Page 1 Data Link Layer, Part 5 Medium Access Control These slides are created by Dr. Yih Huang of George Mason University. Students registered in Dr. Huang s courses at GMU

More information

AGOOD medium access control (MAC) protocol for wireless

AGOOD medium access control (MAC) protocol for wireless IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 3, NO. 3, MAY 2004 793 Design of MAC Protocols With Fast Collision Resolution for Wireless Local Area Networks Younggoo Kwon, Yuguang Fang, Senior Member,

More information

A Backoff Algorithm for Improving Saturation Throughput in IEEE DCF

A Backoff Algorithm for Improving Saturation Throughput in IEEE DCF A Backoff Algorithm for Improving Saturation Throughput in IEEE 80.11 DCF Kiyoshi Takahashi and Toshinori Tsuboi School of Computer Science, Tokyo University of Technology, 1404-1 Katakura, Hachioji, Tokyo,

More information

Medium Access Control. IEEE , Token Rings. CSMA/CD in WLANs? Ethernet MAC Algorithm. MACA Solution for Hidden Terminal Problem

Medium Access Control. IEEE , Token Rings. CSMA/CD in WLANs? Ethernet MAC Algorithm. MACA Solution for Hidden Terminal Problem Medium Access Control IEEE 802.11, Token Rings Wireless channel is a shared medium Need access control mechanism to avoid interference Why not CSMA/CD? 9/15/06 CS/ECE 438 - UIUC, Fall 2006 1 9/15/06 CS/ECE

More information

November 1998 doc.: IEEE /378 IEEE P Wireless LANs Extension of Bluetooth and Direct Sequence Interference Model.

November 1998 doc.: IEEE /378 IEEE P Wireless LANs Extension of Bluetooth and Direct Sequence Interference Model. IEEE P802.11 Wireless LANs Extension of Bluetooth and 802.11 Direct Sequence Interference Model Date: November 11, 1998 Author: Jim Zyren Harris Semiconductor Melbourne, FL, USA Phone: (407)729-4177 Fax:

More information

Media Access Control in Ad Hoc Networks

Media Access Control in Ad Hoc Networks Media Access Control in Ad Hoc Networks The Wireless Medium is a scarce precious resource. Furthermore, the access medium is broadcast in nature. It is necessary to share this resource efficiently and

More information

Protocols for Multiaccess Networks

Protocols for Multiaccess Networks Protocols for Multiaccess Networks Hosts broadcast packets When a collision occurs, all transmitted packets are lost Lost packets have to be retransmitted => Need Multiaccess Protocol Model - Slotted Aloha

More information

CS 421: COMPUTER NETWORKS SPRING FINAL May 16, minutes

CS 421: COMPUTER NETWORKS SPRING FINAL May 16, minutes CS 4: COMPUTER NETWORKS SPRING 03 FINAL May 6, 03 50 minutes Name: Student No: Show all your work very clearly. Partial credits will only be given if you carefully state your answer with a reasonable justification.

More information

Fairness in the IEEE network. Shun Y. Cheung

Fairness in the IEEE network. Shun Y. Cheung Fairness in the IEEE 802.11 network Shun Y. Cheung Simple FIFO queueing High data rate flow Output queue (infinite size) Low data rate flow Packets from low data rate flow experience excessive queueing

More information

P B 1-P B ARRIVE ATTEMPT RETRY 2 1-(1-P RF ) 2 1-(1-P RF ) 3 1-(1-P RF ) 4. Figure 1: The state transition diagram for FBR.

P B 1-P B ARRIVE ATTEMPT RETRY 2 1-(1-P RF ) 2 1-(1-P RF ) 3 1-(1-P RF ) 4. Figure 1: The state transition diagram for FBR. 1 Analytical Model In this section, we will propose an analytical model to investigate the MAC delay of FBR. For simplicity, a frame length is normalized as a time unit (slot). 1.1 State Transition of

More information

IEEE , Token Rings. 10/11/06 CS/ECE UIUC, Fall

IEEE , Token Rings. 10/11/06 CS/ECE UIUC, Fall IEEE 802.11, Token Rings 10/11/06 CS/ECE 438 - UIUC, Fall 2006 1 Medium Access Control Wireless channel is a shared medium Need access control mechanism to avoid interference Why not CSMA/CD? 10/11/06

More information

Bridging and Switching Basics

Bridging and Switching Basics CHAPTER 4 Bridging and Switching Basics This chapter introduces the technologies employed in devices loosely referred to as bridges and switches. Topics summarized here include general link-layer device

More information

Local Area Networks (LANs) SMU CSE 5344 /

Local Area Networks (LANs) SMU CSE 5344 / Local Area Networks (LANs) SMU CSE 5344 / 7344 1 LAN/MAN Technology Factors Topology Transmission Medium Medium Access Control Techniques SMU CSE 5344 / 7344 2 Topologies Topology: the shape of a communication

More information

Local Area Networks. Aloha Slotted Aloha CSMA (non-persistent, 1-persistent, p-persistent) CSMA/CD Ethernet Token Ring

Local Area Networks. Aloha Slotted Aloha CSMA (non-persistent, 1-persistent, p-persistent) CSMA/CD Ethernet Token Ring Local Area Networks Aloha Slotted Aloha CSMA (non-persistent, 1-persistent, p-persistent) CSMA/CD Ethernet Token Ring Networks: Local Area Networks 1 Network Layer Network Layer LLC 802.2 Logical Link

More information

CHAPTER 5 PROPAGATION DELAY

CHAPTER 5 PROPAGATION DELAY 98 CHAPTER 5 PROPAGATION DELAY Underwater wireless sensor networks deployed of sensor nodes with sensing, forwarding and processing abilities that operate in underwater. In this environment brought challenges,

More information

Local Area Networks. Ethernet LAN

Local Area Networks. Ethernet LAN Local Area Networks Ethernet 802.3 LAN -7-1 Local Area Networks (Lokale Netze) Wide Area Network LAN -7-2 Local Area Networks What is a LAN? Multiple systems attached to an often shared medium high total

More information

AN ANALYSIS OF THE MODIFIED BACKOFF MECHANISM FOR IEEE NETWORKS

AN ANALYSIS OF THE MODIFIED BACKOFF MECHANISM FOR IEEE NETWORKS AN ANALYSIS OF THE MODIFIED BACKOFF MECHANISM FOR IEEE 802.11 NETWORKS Marek Natkaniec, Andrzej R. Pach Department of Telecommunications University of Mining and Metallurgy al. Mickiewicza 30, 30-059 Cracow

More information

Solutions to Performance Problems in VoIP Over a Wireless LAN

Solutions to Performance Problems in VoIP Over a Wireless LAN Solutions to Performance Problems in VoIP Over a 802.11 Wireless LAN Wei Wang, Soung C. Liew, and VOK Li, Solutions to Performance Problems in VoIP over a 802.11 Wireless LAN, IEEE Transactions On Vehicular

More information

Introduction to LAN Protocols

Introduction to LAN Protocols CHAPTER 2 Introduction to LAN Protocols This chapter introduces the various media-access methods, transmission methods, topologies, and devices used in a local area network (LAN). Topics addressed focus

More information

Contention Protocols and Networks

Contention Protocols and Networks 4/13/2005 314 Lecture Contention Protocols and Networks 1 Contention Protocols and Networks Contention Protocols CSMA/CD Network Topologies Ethernet 4/13/2005 314 Lecture Contention Protocols and Networks

More information

Computer Network Fundamentals Spring Week 3 MAC Layer Andreas Terzis

Computer Network Fundamentals Spring Week 3 MAC Layer Andreas Terzis Computer Network Fundamentals Spring 2008 Week 3 MAC Layer Andreas Terzis Outline MAC Protocols MAC Protocol Examples Channel Partitioning TDMA/FDMA Token Ring Random Access Protocols Aloha and Slotted

More information

CSE 461: Multiple Access Networks. This Lecture

CSE 461: Multiple Access Networks. This Lecture CSE 461: Multiple Access Networks This Lecture Key Focus: How do multiple parties share a wire? This is the Medium Access Control (MAC) portion of the Link Layer Randomized access protocols: 1. Aloha 2.

More information

Performance Analysis of WLANs Under Sporadic Traffic

Performance Analysis of WLANs Under Sporadic Traffic Performance Analysis of 802.11 WLANs Under Sporadic Traffic M. Garetto and C.-F. Chiasserini Dipartimento di Elettronica, Politecnico di Torino, Italy Abstract. We analyze the performance of 802.11 WLANs

More information

The MAC layer in wireless networks

The MAC layer in wireless networks The MAC layer in wireless networks The wireless MAC layer roles Access control to shared channel(s) Natural broadcast of wireless transmission Collision of signal: a time/space problem Who transmits when?

More information

AODV-PA: AODV with Path Accumulation

AODV-PA: AODV with Path Accumulation -PA: with Path Accumulation Sumit Gwalani Elizabeth M. Belding-Royer Department of Computer Science University of California, Santa Barbara fsumitg, ebeldingg@cs.ucsb.edu Charles E. Perkins Communications

More information

CCM 4300 Lecture 5 Computer Networks, Wireless and Mobile Communications. Dr Shahedur Rahman. Room: T115

CCM 4300 Lecture 5 Computer Networks, Wireless and Mobile Communications. Dr Shahedur Rahman. Room: T115 CCM 4300 Lecture 5 Computer Networks, Wireless and Mobile Communications Dr Shahedur Rahman s.rahman@mdx.ac.uk Room: T115 1 Recap of Last Session Described the physical layer Analogue and Digital signal

More information

Distributed Queue Dual Bus

Distributed Queue Dual Bus Distributed Queue Dual Bus IEEE 802.3 to 802.5 protocols are only suited for small LANs. They cannot be used for very large but non-wide area networks. IEEE 802.6 DQDB is designed for MANs It can cover

More information

On Achieving Fairness and Efficiency in High-Speed Shared Medium Access

On Achieving Fairness and Efficiency in High-Speed Shared Medium Access IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 11, NO. 1, FEBRUARY 2003 111 On Achieving Fairness and Efficiency in High-Speed Shared Medium Access R. Srinivasan, Member, IEEE, and Arun K. Somani, Fellow, IEEE

More information

Chapter 6 Medium Access Control Protocols and Local Area Networks

Chapter 6 Medium Access Control Protocols and Local Area Networks Chapter 6 Medium Access Control Protocols and Local Area Networks Part I: Medium Access Control Part II: Local Area Networks CSE 3213, Winter 2010 Instructor: Foroohar Foroozan Chapter Overview Broadcast

More information

ECE 333: Introduction to Communication Networks Fall Lecture 19: Medium Access Control VII

ECE 333: Introduction to Communication Networks Fall Lecture 19: Medium Access Control VII ECE : Introduction to Communication Networks Fall 2002 Lecture 9: Medium Access Control VII More on token ring networks LAN bridges and switches. More on token rings In the last lecture we began discussing

More information

Data Link Layer, Part 3 Medium Access Control. Preface

Data Link Layer, Part 3 Medium Access Control. Preface Data Link Layer, Part 3 Medium Access Control These slides are created by Dr. Yih Huang of George Mason University. Students registered in Dr. Huang's courses at GMU can make a single machine-readable

More information

EITF25 Internet Techniques and Applications L4: Network Access. Stefan Höst

EITF25 Internet Techniques and Applications L4: Network Access. Stefan Höst EITF25 Internet Techniques and Applications L4: Network Access Stefan Höst Repetition The link layer protocol should make sure that the data is correctly transmitted over the physical link using error

More information

Impact of IEEE n Operation on IEEE Operation

Impact of IEEE n Operation on IEEE Operation 2009 International Conference on Advanced Information Networking and Applications Workshops Impact of IEEE 802.11n Operation on IEEE 802.15.4 Operation B Polepalli, W Xie, D Thangaraja, M Goyal, H Hosseini

More information

Performance of Multihop Communications Using Logical Topologies on Optical Torus Networks

Performance of Multihop Communications Using Logical Topologies on Optical Torus Networks Performance of Multihop Communications Using Logical Topologies on Optical Torus Networks X. Yuan, R. Melhem and R. Gupta Department of Computer Science University of Pittsburgh Pittsburgh, PA 156 fxyuan,

More information

Communication Networks

Communication Networks Communication Networks Chapter 3 Multiplexing Frequency Division Multiplexing (FDM) Useful bandwidth of medium exceeds required bandwidth of channel Each signal is modulated to a different carrier frequency

More information

Programming Project. Remember the Titans

Programming Project. Remember the Titans Programming Project Remember the Titans Due: Data and reports due 12/10 & 12/11 (code due 12/7) In the paper Measured Capacity of an Ethernet: Myths and Reality, David Boggs, Jeff Mogul and Chris Kent

More information

Chapter 3: Industrial Ethernet

Chapter 3: Industrial Ethernet 3.1 Introduction Previous versions of this handbook have dealt extensively with Ethernet so it is not our intention to revisit all the basics. However, because Smart Grid protocols are increasingly reliant

More information

CS244a: An Introduction to Computer Networks

CS244a: An Introduction to Computer Networks Do not write in this box MCQ 9: /10 10: /10 11: /20 12: /20 13: /20 14: /20 Total: Name: Student ID #: CS244a Winter 2003 Professor McKeown Campus/SITN-Local/SITN-Remote? CS244a: An Introduction to Computer

More information

Introduction to LAN Protocols

Introduction to LAN Protocols CHAPTER 2 Chapter Goals Learn about different LAN protocols. Understand the different methods used to deal with media contention. Learn about different LAN topologies. This chapter introduces the various

More information

Lecture 4b. Local Area Networks and Bridges

Lecture 4b. Local Area Networks and Bridges Lecture 4b Local Area Networks and Bridges Ethernet Invented by Boggs and Metcalf in the 1970 s at Xerox Local area networks were needed to connect computers, share files, etc. Thick or Thin Ethernet Cable

More information

The Medium Access Control Scheme (MAC Layer) Reference: Andrew S. Tanenbaum, Computer Networks, 3rd Edition, Prentice Hall, 1996.

The Medium Access Control Scheme (MAC Layer) Reference: Andrew S. Tanenbaum, Computer Networks, 3rd Edition, Prentice Hall, 1996. The Medium Access Control Scheme (MAC Layer) Reference: Andrew S. Tanenbaum, Computer Networks, 3rd Edition, Prentice Hall, 1996. 1 Table of Contents Introduction ALOHA Carrier Sense Multiple Sense (CSMA)

More information

Latency on a Switched Ethernet Network

Latency on a Switched Ethernet Network Page 1 of 6 1 Introduction This document serves to explain the sources of latency on a switched Ethernet network and describe how to calculate cumulative latency as well as provide some real world examples.

More information

Adaptive Real-time Monitoring Mechanism for Replicated Distributed Video Player Systems

Adaptive Real-time Monitoring Mechanism for Replicated Distributed Video Player Systems Adaptive Real-time Monitoring Mechanism for Replicated Distributed Player Systems Chris C.H. Ngan, Kam-Yiu Lam and Edward Chan Department of Computer Science City University of Hong Kong 83 Tat Chee Avenue,

More information

Data Link Layer -2- Network Access

Data Link Layer -2- Network Access EITF25 Internet: Technology and Applications Data Link Layer -2- Network Access 2015, Lecture 03 Kaan Bür Previously on EITF25 Logical Link Control Sublayer Flow control Send data Wait for ACK Error control

More information

MONITORING AND ANALYZING COMMUNICATION LATENCY IN DISTRIBUTED REAL-TIME SYSTEMS

MONITORING AND ANALYZING COMMUNICATION LATENCY IN DISTRIBUTED REAL-TIME SYSTEMS MONITORING AND ANALYZING COMMUNICATION LATENCY IN DISTRIBUTED REAL-TIME SYSTEMS A thesis presented to the faculty of the Fritz J. and Dolores H. Russ College of Engineering and Technology of Ohio University

More information

COMPUTER NETWORKS - Local area networks

COMPUTER NETWORKS - Local area networks Local area networks Telecommunication Networks Group firstname.lastname@polito.it http://www.telematica.polito.it/ COMPUTER NETWORKS LANs - 1 Copyright Quest opera è protetta dalla licenza Creative Commons

More information

Local area networks. Copyright

Local area networks. Copyright Local area networks Telecommunication Networks Group firstname.lastname@polito.it http://www.telematica.polito.it/ COMPUTER NETWORKS LANs - 1 Copyright Quest opera è protetta dalla licenza Creative Commons

More information

Wireless Communications

Wireless Communications 4. Medium Access Control Sublayer DIN/CTC/UEM 2018 Why do we need MAC for? Medium Access Control (MAC) Shared medium instead of point-to-point link MAC sublayer controls access to shared medium Examples:

More information

Growth. Individual departments in a university buy LANs for their own machines and eventually want to interconnect with other campus LANs.

Growth. Individual departments in a university buy LANs for their own machines and eventually want to interconnect with other campus LANs. Internetworking Multiple networks are a fact of life: Growth. Individual departments in a university buy LANs for their own machines and eventually want to interconnect with other campus LANs. Fault isolation,

More information

Computer Networks Medium Access Control. Mostafa Salehi Fall 2008

Computer Networks Medium Access Control. Mostafa Salehi Fall 2008 Computer Networks Medium Access Control Mostafa Salehi Fall 2008 2008 1 Outline Issues ALOHA Network Ethernet Token Ring Wireless 2 Main Issues Local Area Network (LAN) : Three or more machines are physically

More information

Communication (III) Kai Huang

Communication (III) Kai Huang Communication (III) Kai Huang Ethernet Turns 40 12/17/2013 Kai.Huang@tum 2 Outline Bus basics Multiple Master Bus Network-on-Chip Examples o SPI o CAN o FlexRay o Ethernet Basic OSI model Real-Time Ethernet

More information

Objectives. Hexadecimal Numbering and Addressing. Ethernet / IEEE LAN Technology. Ethernet

Objectives. Hexadecimal Numbering and Addressing. Ethernet / IEEE LAN Technology. Ethernet 2007 Cisco Systems, Inc. All rights reserved. Cisco Public Objectives Ethernet Network Fundamentals Chapter 9 ITE PC v4.0 Chapter 1 1 Introduce Hexadecimal number system Describe the features of various

More information

Networking Technologies and Applications

Networking Technologies and Applications Networking Technologies and Applications Rolland Vida BME TMIT September 23, 2016 Aloha Advantages: Different size packets No need for synchronization Simple operation If low upstream traffic, the solution

More information

An Approach for Enhanced Performance of Packet Transmission over Packet Switched Network

An Approach for Enhanced Performance of Packet Transmission over Packet Switched Network ISSN (e): 2250 3005 Volume, 06 Issue, 04 April 2016 International Journal of Computational Engineering Research (IJCER) An Approach for Enhanced Performance of Packet Transmission over Packet Switched

More information

Part3. Local Area Networks (LAN)

Part3. Local Area Networks (LAN) Part3 Local Area Networks (LAN) LAN Characteristics Small geographical area Relatively high data rate Single management Topologies Bus, star, ring Specifications at physical and data link layer mostly

More information

ECE 358 MAC Examples. Xuemin (Sherman) Shen Office: EIT 4155 Phone: x

ECE 358 MAC Examples. Xuemin (Sherman) Shen Office: EIT 4155 Phone: x ECE 358 MAC Examples Xuemin (Sherman) Shen Office: EIT 4155 Phone: x 32691 Email: xshen@bbcr.uwaterloo.ca Problem 1. Consider the following Aloha systems. (a) A group of N users share a 56 kbps pure Aloha

More information

An Enhanced IEEE Retransmission Scheme

An Enhanced IEEE Retransmission Scheme An Enhanced IEEE 802.11 Retransmission Scheme Hao-Li Wang, Jinghao Miao, J. Morris Chang Dept. of Electrical and Computer Engineering Iowa State University haoli, jhmiao, morris@iastate.edu Abstract In

More information

A SCHEME FOR IMPROVED DELAY AND FRAME DROP PROBABILITIES IN e NETWORKS

A SCHEME FOR IMPROVED DELAY AND FRAME DROP PROBABILITIES IN e NETWORKS A SCHEME FOR IMPROVED DELAY AND FRAME DROP PROBABILITIES IN 82.11e NETWORKS Daniel Fokum and Cory Beard School of Computing and Engineering, University of Missouri Kansas City 534 Robert H. Flarsheim Hall

More information

CS 421: COMPUTER NETWORKS SPRING FINAL May 21, minutes

CS 421: COMPUTER NETWORKS SPRING FINAL May 21, minutes CS 421: COMPUTER NETWORKS SPRING 2015 FINAL May 21, 2015 150 minutes Name: Student No: Show all your work very clearly. Partial credits will only be given if you carefully state your answer with a reasonable

More information

Data Link Layer -2- Network Access

Data Link Layer -2- Network Access EITF25 Internet: Technology and Applications Data Link Layer -2- Network Access 2013, Lecture 03 Kaan Bür, Stefan Höst Previously on EITF25 Logical Link Control Sublayer Flow control Send data Wait for

More information

Integrating Information Systems: Technology, Strategy, and Organizational Factors

Integrating Information Systems: Technology, Strategy, and Organizational Factors MASSACHUSETTS INSTITUTE OF TECHNOLOGY SLOAN SCHOOL OF MANAGEMENT 15.565 Integrating Information Systems: Technology, Strategy, and Organizational Factors 15.578 Global Information Systems: Communications

More information

Markov Chains and Multiaccess Protocols: An. Introduction

Markov Chains and Multiaccess Protocols: An. Introduction Markov Chains and Multiaccess Protocols: An Introduction Laila Daniel and Krishnan Narayanan April 8, 2012 Outline of the talk Introduction to Markov Chain applications in Communication and Computer Science

More information

College of Computer and Information Sciences Department of Computer Engineering CEN444 Computer Networks Midterm 2 Exam Second Semester 1434/1435

College of Computer and Information Sciences Department of Computer Engineering CEN444 Computer Networks Midterm 2 Exam Second Semester 1434/1435 College of Computer and Information Sciences Department of Computer Engineering CEN444 Computer Networks Midterm 2 Exam Second Semester 1434/1435 Student Name ID Time Allowed: 2.0 Hours. Closed Book, Closed

More information

Congestion Avoidance

Congestion Avoidance COMP 631: NETWORKED & DISTRIBUTED SYSTEMS Congestion Avoidance Jasleen Kaur Fall 2016 1 Avoiding Congestion: Strategies TCP s strategy: congestion control Ø Control congestion once it occurs Repeatedly

More information

Mixed-Media Bridging. Chapter Goals. Background. Translation Challenges CHAPTER

Mixed-Media Bridging. Chapter Goals. Background. Translation Challenges CHAPTER 24 CHAPTER Chapter Goals Understand bridging in a mixed Ethernet and Token Ring environment. Describe the differences between source-route transparent and translational bridging. List some of the challenges

More information

This formula shows that partitioning the network decreases the total traffic if 1 N R (1 + p) < N R p < 1, i.e., if not all the packets have to go

This formula shows that partitioning the network decreases the total traffic if 1 N R (1 + p) < N R p < 1, i.e., if not all the packets have to go Chapter 3 Problem 2 In Figure 3.43 of the text every node transmits R bps, and we assume that both network partitions consist of 1 N nodes. So the total traffic generated by the nodes 2 of each Ethernet

More information

Reminder: Datalink Functions Computer Networking. Datalink Architectures

Reminder: Datalink Functions Computer Networking. Datalink Architectures Reminder: Datalink Functions 15-441 15 441 15-641 Computer Networking Lecture 5 Media Access Control Peter Steenkiste Fall 2015 www.cs.cmu.edu/~prs/15-441-f15 Framing: encapsulating a network layer datagram

More information

ECEN 5032 Data Networks Medium Access Control Sublayer

ECEN 5032 Data Networks Medium Access Control Sublayer ECEN 5032 Data Networks Medium Access Control Sublayer Peter Mathys mathys@colorado.edu University of Colorado, Boulder c 1996 2005, P. Mathys p.1/35 Overview (Sub)networks can be divided into two categories:

More information

Ethernet. Introduction. CSE 3213 Fall 2011

Ethernet. Introduction. CSE 3213 Fall 2011 Ethernet CSE 3213 Fall 2011 19 October 2011 1 Introduction Rapid changes in technology designs Broader use of LANs New schemes for high-speed LANs High-speed LAN technologies: Fast and gigabit Ethernet

More information

RMIT University. Data Communication and Net-Centric Computing COSC 1111/2061/1110. Lecture 8. Medium Access Control Methods & LAN

RMIT University. Data Communication and Net-Centric Computing COSC 1111/2061/1110. Lecture 8. Medium Access Control Methods & LAN RMIT University Data Communication and Net-Centric Computing COSC 1111/2061/1110 Medium Access Control Methods & LAN Technology Slide 1 Lecture Overview During this lecture, we will Look at several Multiple

More information

CH : 15 LOCAL AREA NETWORK OVERVIEW

CH : 15 LOCAL AREA NETWORK OVERVIEW CH : 15 LOCAL AREA NETWORK OVERVIEW P. 447 LAN (Local Area Network) A LAN consists of a shared transmission medium and a set of hardware and software for interfacing devices to the medium and regulating

More information

SENSOR-MAC CASE STUDY

SENSOR-MAC CASE STUDY SENSOR-MAC CASE STUDY Periodic Listen and Sleep Operations One of the S-MAC design objectives is to reduce energy consumption by avoiding idle listening. This is achieved by establishing low-duty-cycle

More information

Efficient and Accurate Ethernet Simulation

Efficient and Accurate Ethernet Simulation Efficient and Accurate Ethernet Simulation Jia Wang and Srinivasan Keshav Cornell Network Research Group (C/NRG) Department of Computer Science, Cornell University Ithaca, NY 4853-75 {jiawang, skeshav}@cs.cornell.edu

More information

Chapter 12 Multiple Access 12.1

Chapter 12 Multiple Access 12.1 Chapter 12 Multiple Access 12.1 Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. 12.2 Figure 12.1 Data link layer divided into two functionality-oriented sublayers

More information

Investigating MAC-layer Schemes to Promote Doze Mode in based WLANs

Investigating MAC-layer Schemes to Promote Doze Mode in based WLANs Investigating MAC-layer Schemes to Promote Doze Mode in 802.11-based WLANs V. Baiamonte and C.-F. Chiasserini CERCOM - Dipartimento di Elettronica Politecnico di Torino Torino, Italy Email: baiamonte,chiasserini

More information

Remarks On Per-flow Differentiation In IEEE

Remarks On Per-flow Differentiation In IEEE Remarks On Per-flow Differentiation In IEEE 82.11 Imad Aad and Claude Castelluccia PLANETE project, INRIA Rhône-Alpes ZIRST - 655, Avenue de l Europe - Montbonnot. 38334 Saint Ismier Cedex - France [imad.aad,

More information

Chapter 4 NETWORK HARDWARE

Chapter 4 NETWORK HARDWARE Chapter 4 NETWORK HARDWARE 1 Network Devices As Organizations grow, so do their networks Growth in number of users Geographical Growth Network Devices : Are products used to expand or connect networks.

More information

Mesh Networks

Mesh Networks Institute of Computer Science Department of Distributed Systems Prof. Dr.-Ing. P. Tran-Gia Decentralized Bandwidth Management in IEEE 802.16 Mesh Networks www3.informatik.uni-wuerzburg.de Motivation IEEE

More information

Introduction to Real-Time Communications. Real-Time and Embedded Systems (M) Lecture 15

Introduction to Real-Time Communications. Real-Time and Embedded Systems (M) Lecture 15 Introduction to Real-Time Communications Real-Time and Embedded Systems (M) Lecture 15 Lecture Outline Modelling real-time communications Traffic and network models Properties of networks Throughput, delay

More information

A NOVEL DECENTRALIZED ETHERNET-BASED PASSIVE OPTICAL NETWORK ARCHITECTURE

A NOVEL DECENTRALIZED ETHERNET-BASED PASSIVE OPTICAL NETWORK ARCHITECTURE A NOVEL DECENTRALIZED ETHERNET-BASED PASSIVE OPTICAL NETWORK ARCHITECTURE A. Hadjiantonis, S. Sherif, A. Khalil, T. Rahman, G. Ellinas, M. F. Arend, and M. A. Ali, Department of Electrical Engineering,

More information

Quality Control Scheme for ATM Switching Network

Quality Control Scheme for ATM Switching Network UDC 621.395.345: 621.395.74 Quality Control Scheme for ATM Switching Network VMasafumi Katoh VTakeshi Kawasaki VSatoshi Kakuma (Manuscript received June 5,1997) In an ATM network, there are many kinds

More information

Can Multiple Subchannels Improve the Delay Performance of RTS/CTS-based MAC Schemes?

Can Multiple Subchannels Improve the Delay Performance of RTS/CTS-based MAC Schemes? Can Multiple Subchannels Improve the Delay Performance of RTS/CTS-based MAC Schemes? By: Jing Deng, Yunghsiang S. Han, and Sanjeev R. Kulkarni. J. Deng, Y. S. Han, and S. R. Kulkarni, "Can Multiple Subchannels

More information

Interface The exit interface a packet will take when destined for a specific network.

Interface The exit interface a packet will take when destined for a specific network. The Network Layer The Network layer (also called layer 3) manages device addressing, tracks the location of devices on the network, and determines the best way to move data, which means that the Network

More information

Quality of Service (QoS)

Quality of Service (QoS) Quality of Service (QoS) The Internet was originally designed for best-effort service without guarantee of predictable performance. Best-effort service is often sufficient for a traffic that is not sensitive

More information

Performance Evaluation of Scheduling Mechanisms for Broadband Networks

Performance Evaluation of Scheduling Mechanisms for Broadband Networks Performance Evaluation of Scheduling Mechanisms for Broadband Networks Gayathri Chandrasekaran Master s Thesis Defense The University of Kansas 07.31.2003 Committee: Dr. David W. Petr (Chair) Dr. Joseph

More information

Internetworking Wireless Nodes to A Control Area Network

Internetworking Wireless Nodes to A Control Area Network Internetworking Wireless Nodes to A Control Area Network A. Kutlu, H. Ekiz, M.D. Baba, E.T. Powner School of Engineering University of Sussex Brighton U.K. ABSTRACT This paper discusses the design and

More information

Chapter 4. The Medium Access Control Sublayer. Points and Questions to Consider. Multiple Access Protocols. The Channel Allocation Problem.

Chapter 4. The Medium Access Control Sublayer. Points and Questions to Consider. Multiple Access Protocols. The Channel Allocation Problem. Dynamic Channel Allocation in LANs and MANs Chapter 4 The Medium Access Control Sublayer 1. Station Model. 2. Single Channel Assumption. 3. Collision Assumption. 4. (a) Continuous Time. (b) Slotted Time.

More information

Goals. Fundamentals of Network Media. More topics. Topics. Multiple access communication. Multiple access solutions

Goals. Fundamentals of Network Media. More topics. Topics. Multiple access communication. Multiple access solutions Fundamentals of Network Media Local Area Networks Ursula Holmström Goals Learn the basic concepts related to LAN technologies, for example use of shared media medium access control topologies Know the

More information

CN [Network Devices]

CN [Network Devices] Q`.1 Explain Repeater. A repeater is a device that operates only at the PHYSICAL layer. A repeater can be used to increase the length of the network by put the effect on the signal. It connects two segments

More information

Mixed-Media Bridging

Mixed-Media Bridging CHAPTER 31 Mixed-Media Bridging Background Transparent bridges are found predominantly in Ethernet networks, and source-route bridges (SRBs) are found almost exclusively in Ring networks. For more information

More information