Bridge Channel Access Algorithms for Integrated Services Ethernets
|
|
- Sheena Carpenter
- 6 years ago
- Views:
Transcription
1 Bridge Channel Access Algorithms for Integrated Services Ethernets Jim M. Ng, Edward Chan Dept. of Computer Science City Polytechnic of Hong Kong Tat Chee Ave., Kowloon Hong Kong Abstract: To provide integrated data/voice services on an inter-connected CSMA/CD type network, a proper channel access algorithm must be used by the bridge in order to minimize theend-to-end delay. T wo algorithms, a static aggressive mechanism and a load adaptive dynamic mechanism, are presented and compared with the algorithm specified in the IEEE standard. The performance of each algorithm is analyzed, and its suitability for the integrated service environment is evaluated. 1. INTRODUCTION Ethernet, a CSMA/CD based local area network (LAN), has been widely used in many offices because of its simplicity in structure, its expandability, and its ease of installation. In order to adapt the need of the modern office and to enhance the performance of the network, it is advisable to have a subnetwork for each department and interconnect the subnetworks together using bridges. Bridges are intelligent devices that can filter off local traffic and only pass on the inter-network messages. This can not only reduce the overall network load, but also provide some security to each subnetwork. Although Ethernet has been used for carrying data information for most of its installations, itsfeasibility in carrying voice messages has been proven [1],[10]. However, most studies werebased on having voice messages on a single LAN segment, and the performance of a bridged network has not been studied extensively. As Ethernets increase in popularity and complexity, the performance of the integrated services bridged-ethernets becomes an issue of considerable practical importance. 2. THE BRIDGED CSMA/CD NETWORK Ethernet, which is based on IEEE standard [2], uses the CSMA/CD access mechanism where stations contend for the transmission medium. Any one station transmitting will have its message broadcasted on its own network. When the bridge receives a message, it will forward the message if its destination is in the neighboring network. The message is buffered at the bridge until the bridge captures the transmission channel in the destination network. Hence, the bridge performs filtering of messages for the two networks. The bridge contains two large buffers, one for each side of the network as shown in Figure 1. Each buffer uses First In First Out (FIFO) scheduling mechanism.
2 To study the performance of bridged network, two main issues will be investigated. First of all, when a voice station or the bridge has successfully captured the channel, there is the question of whether sending only one packet (non-exhaustive service) or sending all packets in the queue (exhaustive service) has a better performance. Secondly, as voice messages cannot tolerate long delay, it is critical to send the packets out within a tight time constraint. Since the bridge is responsible for transferring all cross network traffic to the other network, it generates a relatively high traffic load compared to normal network stations. Thus a more aggressive approach to capture the channel is desirable. We will look at two channel access mechanisms, a static and a dynamic adaptive algorithm, and compare their relative merits. Simulation will be used in our study of the integrated service bridge network. 3. SIMULATION MODEL Shoch[3] has shown that the data load on most local networks occupies less than 10% of the network capacity. However, his measurements are more than a decade old and most LANs are populated with machines much faster than those used in his experiment. Hence, in our simulation, 20 data stations are used to generate a background loading of 3 Mbit/sec (i.e. 30% of the channel capacity) on each network. The data messages have a bi-modal distributation, with 70% small messages of 100 bytes (excluding headers/trailers) each and 30% long messages of 1200 bytes each. This should be closer to traffic pattern observed in many LANs than the fixed 40 byte message size used in Shoch s original work. Data packets arrivals at each station are modeled by a Poisson process. In order to ensure that the data stations need no changes in its communication software and hardware, the data stations will follow the IEEE standard. Voice input is sampled at a rate of 8K samples per second, and each analogue sample is digitized into an 8- bit code. Hence, the resulting digitized voice signal data rate is 64K bit/sec. Since each conversation is composed of silent intervals and talkspurts[4], we assume that the durations of talkspurts and silent intervals to be exponentially distributed with means 0.17s and 0.41s respectively. Furthermore, as noise may appear on the channel, any talkspurts which are less than 0.015s will be ignored; also,any silent intervals less than 0.2s will be treated as part of a talkspurt as they may probably be minor breaks in continuous speech. The packetizing interval is 20ms, so a 160-byte voice message (excluding header/trailer) will be formed during this period. Since voice messages can tolerate certain amount of packet loss, the network performance can be enhanced by reducing the number of retransmissions for the voice stations. Some studies [7,8] suggested that with maximum number of transmission attempts set to eight, an acceptable packetloss rate can still be maintained. However, for the data stations and the bridge, a maximum of 16 attempts will remain. As the buffer size required by the bridge is not known, we will assume the bridge to have two infinite size buffers. Statistics will be captured for the buffer queue length in order to help determine the appropriate buffer size. In our model, a 10 Mbit/s channel is used and each network is assumed to be 1 km long. For simplicity, only two Ethernets are used. For each network, there are 20 data stations and 120 voice stations, and a bridge is used to interconnect the two networks. Since station clustering has only slight effects on the system performance during normal operation [5,6], our model has all the stations uniformly distributed on each network. The simulation attempts to follow IEEE exactly. To simulate the 9.6 µs interframe gap, 12 bytes are added to each frame in addition to the 26 bytes of header/trailer. Whenever there is a collision, the channel is jammed for 3.2 µs.
3 4. BRIDGE CHANNEL ACCESS METHODS The standard backoff mechanism defined in IEEE specifies that a station which experiences a collision needs to back off for r slot time, where r is a random number between 0 and 2 k, k = min(n,10) and n is the number of attempt for transmission. In order tohandle the packets sent to the bridge efficiently and reduce their transmission delay, a more aggressive approach to capture the channel is necessary for the bridge. A simple approach to increase its aggressiveness is by reducing its backoff time. Two algorithms will be studied and compared with the standard algorithm: The "Static" Algorithm. In this aggressive algorithm, the bridge will backoff for 0 or 1 slot time before attempting for retransmission again; after the first ten attempts for transmission, the delay window will be doubled for each further collision. Hence, k = 0 when n <= 10 k = n - 10 when n > 10. The "Dynamic" Algorithm. This is a load sensitive approach where the backoff window will grow or shrink dynamically as it takes into account the bridge queue length as well as the number of retransmission; i.e. the aggressiveness of the bridge will change dynamically in response to the bridge and remote network loading condition. Similar to the standard algorithm, after each collision, the station will backoff for r slot time, with r being between 0 and 2 k ; however, in this algorithm k = min(n,10,t). Again, n is the number of attempt, and T = max(1,int[c / Q(t)]), where c is a constant and Q(t) is the bridge queue length at time t, and T is an integer with minimum value of one. When the queue in the bridge gets longer, T will have a smaller value, and hence reduce the backoff time. The constant c is used to control the aggressiveness of the algorithm. If c is chosen to be very large, the algorithm should behave like the standard algorithm; witha smaller c, the algorithm increases its aggressiveness even with a short queue. 5. EXHAUSTIVE AND NON-EXHAUSTIVE SERVICES When the bridge or a voice station has successfully captured the channel, it can use the exhaustive service to transmit all the packets in its buffer queue. On the other hand, it has been suggested that when a voice station has captured the channel, transmitting only the first packet in the buffer (non-exhaustive service) may give a small variance in delay [9]. However, if non-exhaustive service is used by the bridge, internetwork packets may experience a longer queuing delay. Both the bridge and the voice stations will be studied for both exhaustive and non-exhaustive services, resulting in four different combination; i.e., 1. Both the bridge and voice stations using exhaustive service; 2. The bridge uses exhaustive service while the voice stations use non-exhaustive service; 3. The bridge uses non-exhaustive service while the voice stations use exhaustive service; 4. Both the bridge and the voice stations use non-exhaustive service. The performance measurement of interest is the delay experienced by each voice packet. This delay includes the queuing delay, the channel access delay, the transmission delay and the propagation delay. For those packets that need to cross the bridge to go from network A to B, delay incurred from both networks A and B will be measured.
4 6. PERFORMANCE ANALYSIS OF BRIDGE CHANNEL ACCESS METHOD Figures 2 to 13 show the performance measures of the integrated services bridged network. The characters besides each curve indicate the algorithm used by the bridge. "Std" is for the standard backoff algorithm specified in IEEE 802.3, "S" is for the static algorithm, and"d(c)" is for the dynamic algorithm, where c = 10, 15, 20 and 40 are used. Also, for figures 2 to 6, the number next to the curve indicates the service type (exhaustive or non-exhaustive) used by the bridge and voice stations as described in the previous section. Intuitively, when the bridge uses exhaustive service, inter-network voice packets will experience a shorter delay. On the other hand it may have a negative impact on the intra-network traffic of the remote (i.e. destination) network. Similarly, when all voice stations use the exhaustive service, the bridge will experience a longer delay. However, this impact on the bridge can be balanced out to a certain extent if the bridge employs one of the aggressive channel access strategies outlines in an earlier section. Figures 2 to 6 show the network performance when different combinations of service types are used. Figures 2 and 3 show the cross bridge voice packets delay, and figures 4 and 5 show the average queue length in the bridge. The dynamic algorithm with c = 20 is used in this comparative study. As shown from the figures, when the standard truncated binary exponential backoff mechanism is used by the bridge, the bridge queue length increases rapidly with the increase of inter-network load and the inter-network packets will experience a much higher delay, as compared with the other two aggressive approaches. Using the standard backoff mechanism by the bridge hence cannot providea satisfactory service to the inter-network traffic. Exhaustive service can increase the aggressiveness of the station implicitly as all the packets in the stations can be transmitted once the channel has been captured. As a result, packets in the station will have a shorter average queuing time. As shown in figure 3 and 5, when exhaustive service is used by the bridge, the inter-network packets experience a much shorter delay, and the bridge has a shorter queue, regardless of the type of service (exhaustive or non-exhaustive) used by the voice stations. This result agrees with our expectation. Figure 6 shows the interesting fact that when the bridge uses an aggressive channel access algorithm, regardless of which service types are used by the bridge and the voice stations, the intra-network voice delay is similar. This means that although using exhaustive service by the bridge can implicitly increase its aggressiveness in channel access, modifying the channel access algorithm can produce a much greater increase in aggressiveness. This increase in aggressivenessby the bridge is so dominant that the choice of service types by the voice stations has comparatively little impact. The key observation so far is that the choice of either exhaustive or non-exhaustive service by the bridge and the voice stations has no significant impact on the intra-network traffic, and using the exhaustive service by the bridge can reduce the inter-network delay time. This observation is true for the aggressive algorithms and not the standard algorithm, but as noted earlier, the standard algorithm does not meet the required performance requirements and will be used as a basis for comparison and not as a viable option. Hence exhaustive service will be used for both the bridge andthe voice stations for the rest of this study. The merit of the different aggressive channel access schemes will be studied in the next section. 7. PERFORMANCE OF THE AGGRESSIVE CHANNEL ACCESS METHODS We will now compare the suitability of different channel access methods used by the bridge. Again, figures 7, 8 and 9 show that the standard backoff algorithm is clearly not suitable for the bridge. When the standard algorithm is used, the cross network traffic experiences highdelay, high delay variance, and rapid increase in queue length. On the other hand, when the aggressive static algorithm is used, the system favors the bridge.
5 The dynamic load adaptive algorithm is meant to balance the above two algorithms, i.e. the bridge will increase/decrease its aggressiveness dynamically. We can hence expect that the cross network voice delay will be between that of the standard and static algorithms. Our predictions are confirmed by figures 7 and 8. It is clear that when using the dynamic algorithm, the crossnetwork traffic will experience a higher delay and delay variance than the static algorithm; however, the delay and delay variance are still well within the tight constraint set for voice messages. Furthermore, as shown in figure 9 the mean bridge queue length is less than 1.5 packets. The major advantage of the dynamic algorithm is that it results in a lower delay for intra-network traffic. This is shown in figures 10 and 11. While the dynamic algorithm is expected tooutperform the standard algorithm, it is interesting to note that the dynamic algorithm performs better than even the static algorithm. The reason behind this may properly be due to the fact that by regulating the aggressiveness of the bridge, the local traffic can made use of the channel more effectively. As mentioned in the previous section, the value of c in the dynamic algorithm can be used to control the aggressiveness of the channel access mechanism. Obviously, with a large c value, the inter-network traffic will experience a longer delay; however, note that different c values produce similar performance for intranetwork traffic (figures 7 and 10). The intra-network delay is not affected much by different c values because the two opposing factors of accessing the channel less frequently and using the channel for a longer time once the channel has been captured (exhaustive service) tendto balance out. So far, the impact of the various channel access mechanisms on inter-network traffic and intra-network delay has been studied separately. In reality, the two types of delay should be considered together in order to arrive at some sort of balance between the two. We define the fairness index to be the ratio between the delay experienced by a packet after joining the bridge untilits successfully transmission and the delay experienced by the intra-network voice traffic. For a fair algorithm, it should not bias to either the bridge or the local stations. The fairness index can be used to tune the value of c in the dynamic algorithm: c should be chosen such that the fairness index will have a value close to 1. This is an additional advantage of using the dynamic algorithm. Figure 13 shows that using the standard or static algorithms result in either a fairness index that is either too large or too small, meaning that either intra-network or inter-network traffic is favored. On the other hand, the dynamic algorithm with c appropriately chosen (e.g. c=10) results in a much "fairer" service to both the bridge and the local stations. Figure 12 illustrates the fact that, for both the static and dynamic algorithms, packet loss in the local network traffic increases as cross network traffic increases. Although most systems can only tolerate packet loss of less than 3%, over 60 cross network conversations can still be supported simultaneously when each network is carrying 30% data traffic and another 120 intra-network calls. For a system with this packet loss rate, a dynamic algorithm with c = 10 will be a good choice, since it results in a index close to 1.
6 8. CONCLUSION Under normal loading condition for data traffic, the choice for the bridge channel access mechanism may not be crucial; however, in order to support voice traffic, the choice of channel access mechanismcan seriously affect the performance. We have looked at two main groups of access mechanisms, namely the static and dynamic algorithms. Although the static algorithm can provide a satisfactory service for the cross network traffic, it has adverse effects on the intra-network traffic. On the other hand the dynamic algorithm, by controlling the aggressiveness of the access mechanism, can alleviate this impact. Furthermore, by tuning the control variable c properly, we can provide a fair service to both the bridge and the local traffic. Regarding the choice of service to be used by the bridge and the voice stations, choosing exhaustive service for the bridge helps to increase the its aggressiveness and attain slightly better overall performance. On the other hand, the choice of service for the voice stations has littleimpact on overall performance. The system that we have looked at can support approximately 60 cross network conversation, an additional 120 intra-network active voice stations, and some data traffic. However, with rapid advance in communication technology, voice messages can be reconstructed from system with lower bit rate, and have greater tolerance to higher loss rate. As a result, it will be possible to set up a network which can support a greater number of voice conversations in the near future. Figure 1. Model of the bridge
7 REFERENCES 1. Dunlop, J "Techniques for the integration of packet voice and data on IEEE LANs," Comp. Comm., Vol 12, No 5, Oct 1989, pp IEEE Comp. Soc., Local Area Networks Standard CSMA/CD, Shoch, J F and Hupp, J A "Measured Performance of an Ethernet Local Network," CACM,V ol 23, No 12, Dec 1980, pp Brady, P T "A Model for Generating On-Off Speech Patterns in Two-Way Conversation," Bell Sys. Tech. Jour., Sept 1969, pp Gonsalves, T A and Tobagi, F A "On the Performance Effects of Station Locations and Access Protocol Parameters in Ethernet Networks," IEEE Trans. Comm., COM-36, No 4, April 1988, pp Chan, E and Ng, J M "Effect of Clustering in a Bridged Ethernet Environment," Proc. Intern. AMSE Conference on Signals & Systems, Brighton, U.K., July 1989, pp Chamtac, I and Eisenger, M "Voice/Data Integration on Ethernet - Backoff and Priority Considerations," Comp. Comm., Vol 6, No 5, Oct 1983, pp Ng, J M and Chan, E "Integrating Voice Service on a Large CSMA/CD Network," Proc. SEARCC Conference Suda, T and Bradley, T T "Packetized-Voice/Data Integrated Transmission on a Token Passing Ring Local Area Network," Proc. IEEE Infocom 87, pp Swinehart, D C "Telephone Management in the Etherphone System." Proc. IEEE Globecomm 87 pp
An Efficient Scheduling Scheme for High Speed IEEE WLANs
An Efficient Scheduling Scheme for High Speed IEEE 802.11 WLANs Juki Wirawan Tantra, Chuan Heng Foh, and Bu Sung Lee Centre of Muldia and Network Technology School of Computer Engineering Nanyang Technological
More informationModelling a Video-on-Demand Service over an Interconnected LAN and ATM Networks
Modelling a Video-on-Demand Service over an Interconnected LAN and ATM Networks Kok Soon Thia and Chen Khong Tham Dept of Electrical Engineering National University of Singapore Tel: (65) 874-5095 Fax:
More informationCSCI Spring Final Exam Solution
CSCI 4211 16Spring Final Exam Solution 1. When an IP packet arrives a router, how the router decides what is the next router (output link) this packet to be forwarded to? What are the routing table and
More informationMultiple Access Protocols
Multiple Access Protocols Computer Networks Lecture 2 http://goo.gl/pze5o8 Multiple Access to a Shared Channel The medium (or its sub-channel) may be shared by multiple stations (dynamic allocation) just
More informationDepartment of Electrical and Computer Systems Engineering
Department of Electrical and Computer Systems Engineering Technical Report MECSE-6-2006 Medium Access Control (MAC) Schemes for Quality of Service (QoS) provision of Voice over Internet Protocol (VoIP)
More informationComparison of pre-backoff and post-backoff procedures for IEEE distributed coordination function
Comparison of pre-backoff and post-backoff procedures for IEEE 802.11 distributed coordination function Ping Zhong, Xuemin Hong, Xiaofang Wu, Jianghong Shi a), and Huihuang Chen School of Information Science
More informationThe MAC layer in wireless networks
The MAC layer in wireless networks The wireless MAC layer roles Access control to shared channel(s) Natural broadcast of wireless transmission Collision of signal: a /space problem Who transmits when?
More informationAccess Technologies! Fabio Martignon
Access Technologies! Fabio Martignon 1 LAN Ethernet - IEEE 802.3 Broadcast Bus Capacity=10 Mb/s Xerox-Intel-Digital inventors Standardized at the beginning of the 80s as IEEE 802.3 Big Success and Several
More informationCHAPTER 7 MAC LAYER PROTOCOLS. Dr. Bhargavi Goswami Associate Professor & Head Department of Computer Science Garden City College
CHAPTER 7 MAC LAYER PROTOCOLS Dr. Bhargavi Goswami Associate Professor & Head Department of Computer Science Garden City College MEDIUM ACCESS CONTROL - MAC PROTOCOLS When the two stations transmit data
More informationECE 4450:427/527 - Computer Networks Spring 2017
ECE 4450:427/527 - Computer Networks Spring 2017 Dr. Nghi Tran Department of Electrical & Computer Engineering Lecture 5.5: Ethernet Dr. Nghi Tran (ECE-University of Akron) ECE 4450:427/527 Computer Networks
More informationData Link Layer, Part 5. Medium Access Control
CS 455 Medium Access Control, Page 1 Data Link Layer, Part 5 Medium Access Control These slides are created by Dr. Yih Huang of George Mason University. Students registered in Dr. Huang s courses at GMU
More informationAGOOD medium access control (MAC) protocol for wireless
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 3, NO. 3, MAY 2004 793 Design of MAC Protocols With Fast Collision Resolution for Wireless Local Area Networks Younggoo Kwon, Yuguang Fang, Senior Member,
More informationA Backoff Algorithm for Improving Saturation Throughput in IEEE DCF
A Backoff Algorithm for Improving Saturation Throughput in IEEE 80.11 DCF Kiyoshi Takahashi and Toshinori Tsuboi School of Computer Science, Tokyo University of Technology, 1404-1 Katakura, Hachioji, Tokyo,
More informationMedium Access Control. IEEE , Token Rings. CSMA/CD in WLANs? Ethernet MAC Algorithm. MACA Solution for Hidden Terminal Problem
Medium Access Control IEEE 802.11, Token Rings Wireless channel is a shared medium Need access control mechanism to avoid interference Why not CSMA/CD? 9/15/06 CS/ECE 438 - UIUC, Fall 2006 1 9/15/06 CS/ECE
More informationNovember 1998 doc.: IEEE /378 IEEE P Wireless LANs Extension of Bluetooth and Direct Sequence Interference Model.
IEEE P802.11 Wireless LANs Extension of Bluetooth and 802.11 Direct Sequence Interference Model Date: November 11, 1998 Author: Jim Zyren Harris Semiconductor Melbourne, FL, USA Phone: (407)729-4177 Fax:
More informationMedia Access Control in Ad Hoc Networks
Media Access Control in Ad Hoc Networks The Wireless Medium is a scarce precious resource. Furthermore, the access medium is broadcast in nature. It is necessary to share this resource efficiently and
More informationProtocols for Multiaccess Networks
Protocols for Multiaccess Networks Hosts broadcast packets When a collision occurs, all transmitted packets are lost Lost packets have to be retransmitted => Need Multiaccess Protocol Model - Slotted Aloha
More informationCS 421: COMPUTER NETWORKS SPRING FINAL May 16, minutes
CS 4: COMPUTER NETWORKS SPRING 03 FINAL May 6, 03 50 minutes Name: Student No: Show all your work very clearly. Partial credits will only be given if you carefully state your answer with a reasonable justification.
More informationFairness in the IEEE network. Shun Y. Cheung
Fairness in the IEEE 802.11 network Shun Y. Cheung Simple FIFO queueing High data rate flow Output queue (infinite size) Low data rate flow Packets from low data rate flow experience excessive queueing
More informationP B 1-P B ARRIVE ATTEMPT RETRY 2 1-(1-P RF ) 2 1-(1-P RF ) 3 1-(1-P RF ) 4. Figure 1: The state transition diagram for FBR.
1 Analytical Model In this section, we will propose an analytical model to investigate the MAC delay of FBR. For simplicity, a frame length is normalized as a time unit (slot). 1.1 State Transition of
More informationIEEE , Token Rings. 10/11/06 CS/ECE UIUC, Fall
IEEE 802.11, Token Rings 10/11/06 CS/ECE 438 - UIUC, Fall 2006 1 Medium Access Control Wireless channel is a shared medium Need access control mechanism to avoid interference Why not CSMA/CD? 10/11/06
More informationBridging and Switching Basics
CHAPTER 4 Bridging and Switching Basics This chapter introduces the technologies employed in devices loosely referred to as bridges and switches. Topics summarized here include general link-layer device
More informationLocal Area Networks (LANs) SMU CSE 5344 /
Local Area Networks (LANs) SMU CSE 5344 / 7344 1 LAN/MAN Technology Factors Topology Transmission Medium Medium Access Control Techniques SMU CSE 5344 / 7344 2 Topologies Topology: the shape of a communication
More informationLocal Area Networks. Aloha Slotted Aloha CSMA (non-persistent, 1-persistent, p-persistent) CSMA/CD Ethernet Token Ring
Local Area Networks Aloha Slotted Aloha CSMA (non-persistent, 1-persistent, p-persistent) CSMA/CD Ethernet Token Ring Networks: Local Area Networks 1 Network Layer Network Layer LLC 802.2 Logical Link
More informationCHAPTER 5 PROPAGATION DELAY
98 CHAPTER 5 PROPAGATION DELAY Underwater wireless sensor networks deployed of sensor nodes with sensing, forwarding and processing abilities that operate in underwater. In this environment brought challenges,
More informationLocal Area Networks. Ethernet LAN
Local Area Networks Ethernet 802.3 LAN -7-1 Local Area Networks (Lokale Netze) Wide Area Network LAN -7-2 Local Area Networks What is a LAN? Multiple systems attached to an often shared medium high total
More informationAN ANALYSIS OF THE MODIFIED BACKOFF MECHANISM FOR IEEE NETWORKS
AN ANALYSIS OF THE MODIFIED BACKOFF MECHANISM FOR IEEE 802.11 NETWORKS Marek Natkaniec, Andrzej R. Pach Department of Telecommunications University of Mining and Metallurgy al. Mickiewicza 30, 30-059 Cracow
More informationSolutions to Performance Problems in VoIP Over a Wireless LAN
Solutions to Performance Problems in VoIP Over a 802.11 Wireless LAN Wei Wang, Soung C. Liew, and VOK Li, Solutions to Performance Problems in VoIP over a 802.11 Wireless LAN, IEEE Transactions On Vehicular
More informationIntroduction to LAN Protocols
CHAPTER 2 Introduction to LAN Protocols This chapter introduces the various media-access methods, transmission methods, topologies, and devices used in a local area network (LAN). Topics addressed focus
More informationContention Protocols and Networks
4/13/2005 314 Lecture Contention Protocols and Networks 1 Contention Protocols and Networks Contention Protocols CSMA/CD Network Topologies Ethernet 4/13/2005 314 Lecture Contention Protocols and Networks
More informationComputer Network Fundamentals Spring Week 3 MAC Layer Andreas Terzis
Computer Network Fundamentals Spring 2008 Week 3 MAC Layer Andreas Terzis Outline MAC Protocols MAC Protocol Examples Channel Partitioning TDMA/FDMA Token Ring Random Access Protocols Aloha and Slotted
More informationCSE 461: Multiple Access Networks. This Lecture
CSE 461: Multiple Access Networks This Lecture Key Focus: How do multiple parties share a wire? This is the Medium Access Control (MAC) portion of the Link Layer Randomized access protocols: 1. Aloha 2.
More informationPerformance Analysis of WLANs Under Sporadic Traffic
Performance Analysis of 802.11 WLANs Under Sporadic Traffic M. Garetto and C.-F. Chiasserini Dipartimento di Elettronica, Politecnico di Torino, Italy Abstract. We analyze the performance of 802.11 WLANs
More informationThe MAC layer in wireless networks
The MAC layer in wireless networks The wireless MAC layer roles Access control to shared channel(s) Natural broadcast of wireless transmission Collision of signal: a time/space problem Who transmits when?
More informationAODV-PA: AODV with Path Accumulation
-PA: with Path Accumulation Sumit Gwalani Elizabeth M. Belding-Royer Department of Computer Science University of California, Santa Barbara fsumitg, ebeldingg@cs.ucsb.edu Charles E. Perkins Communications
More informationCCM 4300 Lecture 5 Computer Networks, Wireless and Mobile Communications. Dr Shahedur Rahman. Room: T115
CCM 4300 Lecture 5 Computer Networks, Wireless and Mobile Communications Dr Shahedur Rahman s.rahman@mdx.ac.uk Room: T115 1 Recap of Last Session Described the physical layer Analogue and Digital signal
More informationDistributed Queue Dual Bus
Distributed Queue Dual Bus IEEE 802.3 to 802.5 protocols are only suited for small LANs. They cannot be used for very large but non-wide area networks. IEEE 802.6 DQDB is designed for MANs It can cover
More informationOn Achieving Fairness and Efficiency in High-Speed Shared Medium Access
IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 11, NO. 1, FEBRUARY 2003 111 On Achieving Fairness and Efficiency in High-Speed Shared Medium Access R. Srinivasan, Member, IEEE, and Arun K. Somani, Fellow, IEEE
More informationChapter 6 Medium Access Control Protocols and Local Area Networks
Chapter 6 Medium Access Control Protocols and Local Area Networks Part I: Medium Access Control Part II: Local Area Networks CSE 3213, Winter 2010 Instructor: Foroohar Foroozan Chapter Overview Broadcast
More informationECE 333: Introduction to Communication Networks Fall Lecture 19: Medium Access Control VII
ECE : Introduction to Communication Networks Fall 2002 Lecture 9: Medium Access Control VII More on token ring networks LAN bridges and switches. More on token rings In the last lecture we began discussing
More informationData Link Layer, Part 3 Medium Access Control. Preface
Data Link Layer, Part 3 Medium Access Control These slides are created by Dr. Yih Huang of George Mason University. Students registered in Dr. Huang's courses at GMU can make a single machine-readable
More informationEITF25 Internet Techniques and Applications L4: Network Access. Stefan Höst
EITF25 Internet Techniques and Applications L4: Network Access Stefan Höst Repetition The link layer protocol should make sure that the data is correctly transmitted over the physical link using error
More informationImpact of IEEE n Operation on IEEE Operation
2009 International Conference on Advanced Information Networking and Applications Workshops Impact of IEEE 802.11n Operation on IEEE 802.15.4 Operation B Polepalli, W Xie, D Thangaraja, M Goyal, H Hosseini
More informationPerformance of Multihop Communications Using Logical Topologies on Optical Torus Networks
Performance of Multihop Communications Using Logical Topologies on Optical Torus Networks X. Yuan, R. Melhem and R. Gupta Department of Computer Science University of Pittsburgh Pittsburgh, PA 156 fxyuan,
More informationCommunication Networks
Communication Networks Chapter 3 Multiplexing Frequency Division Multiplexing (FDM) Useful bandwidth of medium exceeds required bandwidth of channel Each signal is modulated to a different carrier frequency
More informationProgramming Project. Remember the Titans
Programming Project Remember the Titans Due: Data and reports due 12/10 & 12/11 (code due 12/7) In the paper Measured Capacity of an Ethernet: Myths and Reality, David Boggs, Jeff Mogul and Chris Kent
More informationChapter 3: Industrial Ethernet
3.1 Introduction Previous versions of this handbook have dealt extensively with Ethernet so it is not our intention to revisit all the basics. However, because Smart Grid protocols are increasingly reliant
More informationCS244a: An Introduction to Computer Networks
Do not write in this box MCQ 9: /10 10: /10 11: /20 12: /20 13: /20 14: /20 Total: Name: Student ID #: CS244a Winter 2003 Professor McKeown Campus/SITN-Local/SITN-Remote? CS244a: An Introduction to Computer
More informationIntroduction to LAN Protocols
CHAPTER 2 Chapter Goals Learn about different LAN protocols. Understand the different methods used to deal with media contention. Learn about different LAN topologies. This chapter introduces the various
More informationLecture 4b. Local Area Networks and Bridges
Lecture 4b Local Area Networks and Bridges Ethernet Invented by Boggs and Metcalf in the 1970 s at Xerox Local area networks were needed to connect computers, share files, etc. Thick or Thin Ethernet Cable
More informationThe Medium Access Control Scheme (MAC Layer) Reference: Andrew S. Tanenbaum, Computer Networks, 3rd Edition, Prentice Hall, 1996.
The Medium Access Control Scheme (MAC Layer) Reference: Andrew S. Tanenbaum, Computer Networks, 3rd Edition, Prentice Hall, 1996. 1 Table of Contents Introduction ALOHA Carrier Sense Multiple Sense (CSMA)
More informationLatency on a Switched Ethernet Network
Page 1 of 6 1 Introduction This document serves to explain the sources of latency on a switched Ethernet network and describe how to calculate cumulative latency as well as provide some real world examples.
More informationAdaptive Real-time Monitoring Mechanism for Replicated Distributed Video Player Systems
Adaptive Real-time Monitoring Mechanism for Replicated Distributed Player Systems Chris C.H. Ngan, Kam-Yiu Lam and Edward Chan Department of Computer Science City University of Hong Kong 83 Tat Chee Avenue,
More informationData Link Layer -2- Network Access
EITF25 Internet: Technology and Applications Data Link Layer -2- Network Access 2015, Lecture 03 Kaan Bür Previously on EITF25 Logical Link Control Sublayer Flow control Send data Wait for ACK Error control
More informationMONITORING AND ANALYZING COMMUNICATION LATENCY IN DISTRIBUTED REAL-TIME SYSTEMS
MONITORING AND ANALYZING COMMUNICATION LATENCY IN DISTRIBUTED REAL-TIME SYSTEMS A thesis presented to the faculty of the Fritz J. and Dolores H. Russ College of Engineering and Technology of Ohio University
More informationCOMPUTER NETWORKS - Local area networks
Local area networks Telecommunication Networks Group firstname.lastname@polito.it http://www.telematica.polito.it/ COMPUTER NETWORKS LANs - 1 Copyright Quest opera è protetta dalla licenza Creative Commons
More informationLocal area networks. Copyright
Local area networks Telecommunication Networks Group firstname.lastname@polito.it http://www.telematica.polito.it/ COMPUTER NETWORKS LANs - 1 Copyright Quest opera è protetta dalla licenza Creative Commons
More informationWireless Communications
4. Medium Access Control Sublayer DIN/CTC/UEM 2018 Why do we need MAC for? Medium Access Control (MAC) Shared medium instead of point-to-point link MAC sublayer controls access to shared medium Examples:
More informationGrowth. Individual departments in a university buy LANs for their own machines and eventually want to interconnect with other campus LANs.
Internetworking Multiple networks are a fact of life: Growth. Individual departments in a university buy LANs for their own machines and eventually want to interconnect with other campus LANs. Fault isolation,
More informationComputer Networks Medium Access Control. Mostafa Salehi Fall 2008
Computer Networks Medium Access Control Mostafa Salehi Fall 2008 2008 1 Outline Issues ALOHA Network Ethernet Token Ring Wireless 2 Main Issues Local Area Network (LAN) : Three or more machines are physically
More informationCommunication (III) Kai Huang
Communication (III) Kai Huang Ethernet Turns 40 12/17/2013 Kai.Huang@tum 2 Outline Bus basics Multiple Master Bus Network-on-Chip Examples o SPI o CAN o FlexRay o Ethernet Basic OSI model Real-Time Ethernet
More informationObjectives. Hexadecimal Numbering and Addressing. Ethernet / IEEE LAN Technology. Ethernet
2007 Cisco Systems, Inc. All rights reserved. Cisco Public Objectives Ethernet Network Fundamentals Chapter 9 ITE PC v4.0 Chapter 1 1 Introduce Hexadecimal number system Describe the features of various
More informationNetworking Technologies and Applications
Networking Technologies and Applications Rolland Vida BME TMIT September 23, 2016 Aloha Advantages: Different size packets No need for synchronization Simple operation If low upstream traffic, the solution
More informationAn Approach for Enhanced Performance of Packet Transmission over Packet Switched Network
ISSN (e): 2250 3005 Volume, 06 Issue, 04 April 2016 International Journal of Computational Engineering Research (IJCER) An Approach for Enhanced Performance of Packet Transmission over Packet Switched
More informationPart3. Local Area Networks (LAN)
Part3 Local Area Networks (LAN) LAN Characteristics Small geographical area Relatively high data rate Single management Topologies Bus, star, ring Specifications at physical and data link layer mostly
More informationECE 358 MAC Examples. Xuemin (Sherman) Shen Office: EIT 4155 Phone: x
ECE 358 MAC Examples Xuemin (Sherman) Shen Office: EIT 4155 Phone: x 32691 Email: xshen@bbcr.uwaterloo.ca Problem 1. Consider the following Aloha systems. (a) A group of N users share a 56 kbps pure Aloha
More informationAn Enhanced IEEE Retransmission Scheme
An Enhanced IEEE 802.11 Retransmission Scheme Hao-Li Wang, Jinghao Miao, J. Morris Chang Dept. of Electrical and Computer Engineering Iowa State University haoli, jhmiao, morris@iastate.edu Abstract In
More informationA SCHEME FOR IMPROVED DELAY AND FRAME DROP PROBABILITIES IN e NETWORKS
A SCHEME FOR IMPROVED DELAY AND FRAME DROP PROBABILITIES IN 82.11e NETWORKS Daniel Fokum and Cory Beard School of Computing and Engineering, University of Missouri Kansas City 534 Robert H. Flarsheim Hall
More informationCS 421: COMPUTER NETWORKS SPRING FINAL May 21, minutes
CS 421: COMPUTER NETWORKS SPRING 2015 FINAL May 21, 2015 150 minutes Name: Student No: Show all your work very clearly. Partial credits will only be given if you carefully state your answer with a reasonable
More informationData Link Layer -2- Network Access
EITF25 Internet: Technology and Applications Data Link Layer -2- Network Access 2013, Lecture 03 Kaan Bür, Stefan Höst Previously on EITF25 Logical Link Control Sublayer Flow control Send data Wait for
More informationIntegrating Information Systems: Technology, Strategy, and Organizational Factors
MASSACHUSETTS INSTITUTE OF TECHNOLOGY SLOAN SCHOOL OF MANAGEMENT 15.565 Integrating Information Systems: Technology, Strategy, and Organizational Factors 15.578 Global Information Systems: Communications
More informationMarkov Chains and Multiaccess Protocols: An. Introduction
Markov Chains and Multiaccess Protocols: An Introduction Laila Daniel and Krishnan Narayanan April 8, 2012 Outline of the talk Introduction to Markov Chain applications in Communication and Computer Science
More informationCollege of Computer and Information Sciences Department of Computer Engineering CEN444 Computer Networks Midterm 2 Exam Second Semester 1434/1435
College of Computer and Information Sciences Department of Computer Engineering CEN444 Computer Networks Midterm 2 Exam Second Semester 1434/1435 Student Name ID Time Allowed: 2.0 Hours. Closed Book, Closed
More informationCongestion Avoidance
COMP 631: NETWORKED & DISTRIBUTED SYSTEMS Congestion Avoidance Jasleen Kaur Fall 2016 1 Avoiding Congestion: Strategies TCP s strategy: congestion control Ø Control congestion once it occurs Repeatedly
More informationMixed-Media Bridging. Chapter Goals. Background. Translation Challenges CHAPTER
24 CHAPTER Chapter Goals Understand bridging in a mixed Ethernet and Token Ring environment. Describe the differences between source-route transparent and translational bridging. List some of the challenges
More informationThis formula shows that partitioning the network decreases the total traffic if 1 N R (1 + p) < N R p < 1, i.e., if not all the packets have to go
Chapter 3 Problem 2 In Figure 3.43 of the text every node transmits R bps, and we assume that both network partitions consist of 1 N nodes. So the total traffic generated by the nodes 2 of each Ethernet
More informationReminder: Datalink Functions Computer Networking. Datalink Architectures
Reminder: Datalink Functions 15-441 15 441 15-641 Computer Networking Lecture 5 Media Access Control Peter Steenkiste Fall 2015 www.cs.cmu.edu/~prs/15-441-f15 Framing: encapsulating a network layer datagram
More informationECEN 5032 Data Networks Medium Access Control Sublayer
ECEN 5032 Data Networks Medium Access Control Sublayer Peter Mathys mathys@colorado.edu University of Colorado, Boulder c 1996 2005, P. Mathys p.1/35 Overview (Sub)networks can be divided into two categories:
More informationEthernet. Introduction. CSE 3213 Fall 2011
Ethernet CSE 3213 Fall 2011 19 October 2011 1 Introduction Rapid changes in technology designs Broader use of LANs New schemes for high-speed LANs High-speed LAN technologies: Fast and gigabit Ethernet
More informationRMIT University. Data Communication and Net-Centric Computing COSC 1111/2061/1110. Lecture 8. Medium Access Control Methods & LAN
RMIT University Data Communication and Net-Centric Computing COSC 1111/2061/1110 Medium Access Control Methods & LAN Technology Slide 1 Lecture Overview During this lecture, we will Look at several Multiple
More informationCH : 15 LOCAL AREA NETWORK OVERVIEW
CH : 15 LOCAL AREA NETWORK OVERVIEW P. 447 LAN (Local Area Network) A LAN consists of a shared transmission medium and a set of hardware and software for interfacing devices to the medium and regulating
More informationSENSOR-MAC CASE STUDY
SENSOR-MAC CASE STUDY Periodic Listen and Sleep Operations One of the S-MAC design objectives is to reduce energy consumption by avoiding idle listening. This is achieved by establishing low-duty-cycle
More informationEfficient and Accurate Ethernet Simulation
Efficient and Accurate Ethernet Simulation Jia Wang and Srinivasan Keshav Cornell Network Research Group (C/NRG) Department of Computer Science, Cornell University Ithaca, NY 4853-75 {jiawang, skeshav}@cs.cornell.edu
More informationChapter 12 Multiple Access 12.1
Chapter 12 Multiple Access 12.1 Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. 12.2 Figure 12.1 Data link layer divided into two functionality-oriented sublayers
More informationInvestigating MAC-layer Schemes to Promote Doze Mode in based WLANs
Investigating MAC-layer Schemes to Promote Doze Mode in 802.11-based WLANs V. Baiamonte and C.-F. Chiasserini CERCOM - Dipartimento di Elettronica Politecnico di Torino Torino, Italy Email: baiamonte,chiasserini
More informationRemarks On Per-flow Differentiation In IEEE
Remarks On Per-flow Differentiation In IEEE 82.11 Imad Aad and Claude Castelluccia PLANETE project, INRIA Rhône-Alpes ZIRST - 655, Avenue de l Europe - Montbonnot. 38334 Saint Ismier Cedex - France [imad.aad,
More informationChapter 4 NETWORK HARDWARE
Chapter 4 NETWORK HARDWARE 1 Network Devices As Organizations grow, so do their networks Growth in number of users Geographical Growth Network Devices : Are products used to expand or connect networks.
More informationMesh Networks
Institute of Computer Science Department of Distributed Systems Prof. Dr.-Ing. P. Tran-Gia Decentralized Bandwidth Management in IEEE 802.16 Mesh Networks www3.informatik.uni-wuerzburg.de Motivation IEEE
More informationIntroduction to Real-Time Communications. Real-Time and Embedded Systems (M) Lecture 15
Introduction to Real-Time Communications Real-Time and Embedded Systems (M) Lecture 15 Lecture Outline Modelling real-time communications Traffic and network models Properties of networks Throughput, delay
More informationA NOVEL DECENTRALIZED ETHERNET-BASED PASSIVE OPTICAL NETWORK ARCHITECTURE
A NOVEL DECENTRALIZED ETHERNET-BASED PASSIVE OPTICAL NETWORK ARCHITECTURE A. Hadjiantonis, S. Sherif, A. Khalil, T. Rahman, G. Ellinas, M. F. Arend, and M. A. Ali, Department of Electrical Engineering,
More informationQuality Control Scheme for ATM Switching Network
UDC 621.395.345: 621.395.74 Quality Control Scheme for ATM Switching Network VMasafumi Katoh VTakeshi Kawasaki VSatoshi Kakuma (Manuscript received June 5,1997) In an ATM network, there are many kinds
More informationCan Multiple Subchannels Improve the Delay Performance of RTS/CTS-based MAC Schemes?
Can Multiple Subchannels Improve the Delay Performance of RTS/CTS-based MAC Schemes? By: Jing Deng, Yunghsiang S. Han, and Sanjeev R. Kulkarni. J. Deng, Y. S. Han, and S. R. Kulkarni, "Can Multiple Subchannels
More informationInterface The exit interface a packet will take when destined for a specific network.
The Network Layer The Network layer (also called layer 3) manages device addressing, tracks the location of devices on the network, and determines the best way to move data, which means that the Network
More informationQuality of Service (QoS)
Quality of Service (QoS) The Internet was originally designed for best-effort service without guarantee of predictable performance. Best-effort service is often sufficient for a traffic that is not sensitive
More informationPerformance Evaluation of Scheduling Mechanisms for Broadband Networks
Performance Evaluation of Scheduling Mechanisms for Broadband Networks Gayathri Chandrasekaran Master s Thesis Defense The University of Kansas 07.31.2003 Committee: Dr. David W. Petr (Chair) Dr. Joseph
More informationInternetworking Wireless Nodes to A Control Area Network
Internetworking Wireless Nodes to A Control Area Network A. Kutlu, H. Ekiz, M.D. Baba, E.T. Powner School of Engineering University of Sussex Brighton U.K. ABSTRACT This paper discusses the design and
More informationChapter 4. The Medium Access Control Sublayer. Points and Questions to Consider. Multiple Access Protocols. The Channel Allocation Problem.
Dynamic Channel Allocation in LANs and MANs Chapter 4 The Medium Access Control Sublayer 1. Station Model. 2. Single Channel Assumption. 3. Collision Assumption. 4. (a) Continuous Time. (b) Slotted Time.
More informationGoals. Fundamentals of Network Media. More topics. Topics. Multiple access communication. Multiple access solutions
Fundamentals of Network Media Local Area Networks Ursula Holmström Goals Learn the basic concepts related to LAN technologies, for example use of shared media medium access control topologies Know the
More informationCN [Network Devices]
Q`.1 Explain Repeater. A repeater is a device that operates only at the PHYSICAL layer. A repeater can be used to increase the length of the network by put the effect on the signal. It connects two segments
More informationMixed-Media Bridging
CHAPTER 31 Mixed-Media Bridging Background Transparent bridges are found predominantly in Ethernet networks, and source-route bridges (SRBs) are found almost exclusively in Ring networks. For more information
More information