Introduction to Wireless & Mobile Systems. Chapter 6. Multiple Radio Access Cengage Learning Engineering. All Rights Reserved.
|
|
- Marshall Flowers
- 5 years ago
- Views:
Transcription
1 Itroductio to Wireless & Mobile Systems Chapter 6 Multiple Radio Access 1
2 Outlie Itroductio Multiple Radio Access Protocols Cotetio-based Protocols Pure ALOHA Slotted ALOHA CSMA (Carrier Sese Multiple Access) CSMA/CD (CSMA with Collisio Detectio) CSMA/CA (CSMA with Collisio Avoidace) Summary 2
3 Itroductio Multiple access cotrol chaels Each Mobile Statio (MS) is attached to a trasmitter or receiver which commuicates via a chael shared by other odes Trasmissio from ay MS is received by other MSs MS 3 MS 2 Shared Multiple Access Medium MS 4 MS 1 M 3
4 Itroductio (Cot d) Multiple access issues If more tha oe MS trasmit at a time o the cotrol chael to BS, a collisio occurs How to determie which MS ca trasmit to BS? Multiple access protocols Solvig multiple access issues Differet types: Cotetio protocols resolve a collisio after it occurs. These protocols execute a collisio resolutio protocol after each collisio Collisio-free protocols (e.g., a bit-map protocol ad biary coutdow) esure that a collisio ca ever occur 4
5 Chael Sharig Techiques Static Chaelizatio Medium - Sharig Techiques Schedulig Dyamic Medium Access Cotrol Radom Access 5
6 Classificatio of Multiple Access Protocols Multiple-access protocols Cotetio-based Coflict-free Radom access Collisio resolutio ALOHA, CSMA, BTMA, ISMA, etc. TREE, WINDOW, etc. BTMA: Busy Toe Multiple Access ISMA: Iteret Streamig Media Alliace FDMA, TDMA, CDMA, Toke Bus, DQDB, etc. DQDB: Distributed Queue Dual Bus 6
7 Cotetio-based Protocols ALOHA Developed i the 1970s for a packet radio etwork by Hawaii Uiversity Wheever a termial (MS) has data, it trasmits. Seder fids out whether trasmissio was successful or experieced a collisio by listeig to the broadcast from the destiatio statio. If there is a collisio, seder retrasmits after some radom time Slotted ALOHA Improvemet: Time is slotted ad a packet ca oly be trasmitted at the begiig of oe slot. Thus, it ca reduce the collisio duratio 7
8 Slotted ALOHA Node 1 Packet No trasmissio Nodes 2 & 3 Packets Retrasmissio Retrasmissio 3 Time Slot Collisio Collisio mechaism i slotted ALOHA 8
9 Throughput of Slotted ALOHA The probability of successful trasmissio P s is the probability o other packet is scheduled i a iterval of legth T P e s S th gte gt The throughput S th of pure Aloha as: where g is the packet rate of the traffic gt Defiig G gt to ormalize offered load, we have Differetiatig S th with respect to G ad equatig to zero gives ds dg th Ge S th Ge G G + e G 0 The Maximum throughput of ALOHA is 1 Smax e 9
10 Pure ALOHA Node 1 Packet Node 2 Packet Waitig a radom time Retrasmissio Retrasmissio Collisio 3 2 Time Node 3 Packet Collisio mechaism i ALOHA 10
11 Throughput of Pure ALOHA The probability of successful trasmissio P s is the probability o other packet is scheduled i a iterval of legth 2T Node 1 P P( o _ collisio) Packet s e 2gT The throughput S th of pure Aloha as: 1 S th gte S th Ge where g is the packet rate of the traffic 2G 2gT Defiig G gt to ormalize offered load, we have Differetiatig S th with respect to G ad equatig to zero gives ds dg th 2Ge 2G + e 2G The Maximum throughput of ALOHA is 1 Smax e 0 Node 2 Packet 2 Time 11
12 Throughput Throughput S Aloha Slotted Aloha G (gt)
13 Cotetio Protocols (Cot d) CSMA (Carrier Sese Multiple Access) Improvemet: Start trasmissio oly if o trasmissio is ogoig CSMA/CD (CSMA with Collisio Detectio) Improvemet: Stop ogoig trasmissio if a collisio is detected CSMA/CA (CSMA with Collisio Avoidace) Improvemet: Wait a radom time ad try agai whe carrier is quiet. If still quiet, the trasmit CSMA/CA with ACK CSMA/CA with RTS/CTS 13
14 CSMA (Carrier Sese Multiple Access) Max throughput achievable by slotted ALOHA is CSMA gives improved throughput compared to Aloha protocols Listes to the chael before trasmittig a packet (avoid avoidable collisios) 14
15 Collisio Mechaism i CSMA MS 1 Packet MS 2 Packet MS 3 Packet MS 5 sese Delay for MS Delay for MS Collisio Time MS 4 seses 15
16 Kids of CSMA CSMA Nopersistet CSMA (o wait) Persistet CSMA (wait) Uslotted Nopersistet CSMA Slotted Nopersistet CSMA Uslotted persistet CSMA Slotted persistet CSMA 1-persistet CSMA p-persistet CSMA 16
17 p-persistet CSMA Protocols p-persistet CSMA Protocol: Step 1: If the medium is idle, trasmit with probability p, ad delay for worst case propagatio delay by oe packet with probability (1-p) Special case of p0 ad p1 Step 2: If the medium is busy, cotiue to liste util medium becomes idle, the go to Step 1 Step 3: If trasmissio is delayed by oe time slot, cotiue with Step 1 p0: opersistet ad p1: 1-persistet CSMA A good tradeoff betwee opersistet ad 1-persistet CSMA 17
18 Throughput 1.0 p0.01: persistet CSMA p0: Nopersistet CSMA Always wait for T uits Throughput S Aloha p0.1: persistet CSMA p0.5: persistet CSMA p1: persistet CSMA No wait Slotted Aloha Traffic Load G 18
19 Nopersistet/p-persistet CSMA Protocols Nopersistet CSMA Protocol: Step 1: If the medium is idle, trasmit immediately (same as p1) Step 2: If the medium is busy, wait a radom amout of time ad repeat Step 1 Radom backoff reduces probability of collisios Waste idle time if the backoff time is too log For uslotted opersistet CSMA, the throughput is give by: 2αT Ge propagatio delay Sth where α τ αg G(1 + 2α ) + e T packet trasmissio time For slotted opersistet CSMA, the throughput is give by: S th αge (1 e αg 2αT + α) 19
20 1-persistet CSMA Protocols 1-persistet CSMA Protocol: Step 1: If the medium is idle, trasmit immediately Step 2: If the medium is busy, cotiue to liste util medium becomes idle, ad the trasmit immediately There will always be a collisio if two odes wat to retrasmit (usually you stop trasmissio attempts after few tries) For uslotted 1-persistet CSMA, the throughput is give by S th [ 1+ G + αg(1 + G + αg / 2) ] G G(1 + G(1+ 2α ) αg G(1+ α ) 2α ) (1 e ) e + (1 + αg) e For slotted 1-persistet CSMA, the throughput is give by αg G(1+ α ) G(1 + α e ) e Sth αg G(1+ α ) (1 + α)(1 e ) + αe 20
21 How to Select Probability p? Assume that N odes have a packet to sed ad the medium is busy The, Np is the expected umber of odes that will attempt to trasmit oce the medium becomes idle If Np > 1, the a collisio is expected to occur Therefore, etwork must make sure that to avoid collisio, where N is the maximum umber of odes that ca be active at a time 21
22 Itroductio to Wireless & Mobile Systems, 4 th Editio p-persistet CSMA Protocol If N termials have packets to sed, Np termials will attempt to trasmit oce the medium becomes idle. If Np>1, the collisio is expected. Therefore, Np 1. Throughput S as: [ ] ' ] 1 ) (1 ' )[ (1 ) (1 ) (1 ),, ( απ α π α π α π π α α α t t e P P e p G S G s s G th where G is offered traffic rate ατ/t propagatio delay/packet trasmissio time where are give by the followig equatios: 0 ' ',,, π ad t t P P s s 0 1 ' 1 ' 0 1 ' 1 ' 1 1 ) ( ) ( π π π π π π s s s s t t t t P P P P 22
23 Itroductio to Wireless & Mobile Systems, 4 th Editio p-persistet CSMA Protocol Where:. Kroecker the is, ] ) (1 [1 } Pr{ )! ( ) ( } Pr{ } Pr{ 1, )!(1 } Pr{ ) (1 1 ) (1 ) ( 0,,! ] ) [(1,, 1 0 ' 1 ) (1 delta ad l p k t e l kg l L where k t t e e g l L p p lp P e G j i l kg l k k g g l l s G l δ δ π α π α + >
24 CSMA/CD (CSMA with Collisio Detectio) I CSMA, if 2 termials begi sedig packet at the same time, each will trasmit its complete packet (although collisio is takig place) Wastig medium for a etire packet time CSMA/CD: Step 1: If the medium is idle, trasmit Step 2: If the medium is busy, cotiue to liste util the chael is idle the trasmit Step 3: If a collisio is detected durig trasmissio, cease trasmittig (detectio ot possible by wireless devices) Step 4: Wait a radom amout of time ad repeats the same algorithm 24
25 CSMA/CD i Etheret (Cot d) T 0 A begis trasmissio A (τ is the propagatio time) B T 0 +τ-ε B begis trasmissio A ε B T 0 +τ+τ cd B detects collisio A B T 0 +2τ+τ cd +τ cr -ε Time A detects collisio just before ed of trasmissio A B 25
26 Throughput of Slotted Nopersistet CSMA/CD α τ /Τ 0 Throughput S α 1 α 0.1 α Traffic load G 26
27 CSMA/CA (CSMA with Collisio Avoidace) All termials liste to the same medium as CSMA/CD Termial ready to trasmit seses the medium If medium is busy it waits util the ed of curret trasmissio It agai waits for a additioal predetermied time period DIFS (Distributed iter frame Space) The picks up a radom umber of slots (the iitial value of backoff couter) withi a cotetio widow to wait before trasmittig its frame If there are trasmissios by other MSs durig this time period (backoff time), the MS freezes its couter It resumes cout dow after other MSs fiish trasmissio plus DIFS. The MS ca start its trasmissio whe the couter reaches to zero 27
28 CSMA/CA (Cot d) MS A s frame Delay: B MS B s frame Delay: C MS C s frame Time MSs B & C sese the medium MSs B reseses the medium ad trasmits its frame MSs C starts trasmittig MSs C reseses the medium but defers to MS B 28
29 CSMA/CA Explaied DIFS Cotetio widow DIFS Cotetio widow Medium Busy Next Fame Time Defer access Slot Backoff after defer DIFS Distributed Iter Frame Spacig 29
30 Radom Delay helps CSMA/CA MS A 25 wait MS A 5 data MS B 20 CW 31, data wait Aother request MS B 15 MS B 10 MS A ad MS B are backoff itervals at odes A ad B MS A ad MS B are the backoff itervals of MS A ad MS B We assume for this example that CW 31 MS A ad MS B have chose a backoff iterval of 25 ad 20, respectively MS B will reach zero before five uits of time earlier tha MS A Whe this happes, MS A will otice that the medium became busy ad freezes its backoff iterval curretly at 5 As soo as the medium becomes idle agai, MS A resumes its backoff coutdow ad trasmits its data oce the backoff iterval reaches zero 30
31 CSMA/CA with ACK for ad hoc etworks Immediate Ackowledgemets from receiver upo receptio of data frame without ay eed for sesig the medium ACK frame trasmitted after time iterval SIFS (Short Iter-Frame Space) (SIFS < DIFS) Receiver trasmits ACK without sesig the medium If ACK is lost, retrasmissio doe 31
32 CSMA/CA/ACK Source MS DIFS delay Data Time SIFS ACK DIFS Cotetio widow Other MSs Next Frame Defer access Backoff after defer SIFS Short Iter Frame Spacig 32
33 Hidde Termial Problem Radio trasmissio rage R R R A B C Nodes A ad C are hidde with respect to each other 33
34 CSMA/CA with RTS/CTS Trasmitter seds a RTS (request to sed) after medium has bee idle for time iterval more tha DIFS Receiver respods with CTS (clear to sed) after medium has bee idle for SIFS The Data is exchaged RTS/CTS is used for reservig chael for data trasmissio so that the collisio ca oly occur i cotrol message 34
35 CSMA/CA with RTS/CTS DIFS RTS SIFS Data Time Source MS SIFS SIFS Destiatio MS CTS ACK DIFS Cotetio widow Other MSs Next Frame Defer access Backoff 35
36 RTS/CTS MS A MS B Propagatio delay This helps avoid hidde termial problem i Ad hoc etworks 36
37 Exposed Termial Problem Radio Trasmissio rage R R R A B C D R Trasmissio at Node A forces Node C (Exposed) to stop trasmissio to Node D 37
Announcements. Reading. Project #4 is on the web. Homework #1. Midterm #2. Chapter 4 ( ) Note policy about project #3 missing components
Aoucemets Readig Chapter 4 (4.1-4.2) Project #4 is o the web ote policy about project #3 missig compoets Homework #1 Due 11/6/01 Chapter 6: 4, 12, 24, 37 Midterm #2 11/8/01 i class 1 Project #4 otes IPv6Iit,
More informationMedia Access Protocols. Spring 2018 CS 438 Staff, University of Illinois 1
Media Access Protocols Sprig 2018 CS 438 Staff, Uiversity of Illiois 1 Where are We? you are here 00010001 11001001 00011101 A midterm is here Sprig 2018 CS 438 Staff, Uiversity of Illiois 2 Multiple Access
More informationLecture 10 Collision resolution. Collision resolution
Lecture 10 Collisio resolutio Collisio resolutio May applicatios ivolve a iquiry over a shared chael, which ca be ivoked for: discovery of eighborig devices i ad hoc etworks, coutig the umber of RFID tags
More informationLecture 28: Data Link Layer
Automatic Repeat Request (ARQ) 2. Go ack N ARQ Although the Stop ad Wait ARQ is very simple, you ca easily show that it has very the low efficiecy. The low efficiecy comes from the fact that the trasmittig
More informationCopyright 2010, Elsevier Inc. All rights Reserved
Computer Networks: A Systems Approach, 5e Larry L. Peterso ad Bruce S. Davie (Subset of topics) Gettig Coected Framig Error Detectio. Reliable Trasmissio Sharig: Etheret ad Multiple Access Networks, Wireless
More informationHistory Based Probabilistic Backoff Algorithm
America Joural of Egieerig ad Applied Scieces, 2012, 5 (3), 230-236 ISSN: 1941-7020 2014 Rajagopala ad Mala, This ope access article is distributed uder a Creative Commos Attributio (CC-BY) 3.0 licese
More informationSwitching Hardware. Spring 2018 CS 438 Staff, University of Illinois 1
Switchig Hardware Sprig 208 CS 438 Staff, Uiversity of Illiois Where are we? Uderstad Differet ways to move through a etwork (forwardig) Read sigs at each switch (datagram) Follow a kow path (virtual circuit)
More informationMAC Throughput Improvement Using Adaptive Contention Window
Joural of Computer ad Commuicatios, 2015, 3, 1 14 Published Olie Jauary 2015 i SciRes. http://www.scirp.org/joural/jcc http://dx.doi.org/10.4236/jcc.2015.31001 MAC Throughput Improvemet Usig Adaptive Cotetio
More informationQuality of Service. Spring 2018 CS 438 Staff - University of Illinois 1
Quality of Service Sprig 2018 CS 438 Staff - Uiversity of Illiois 1 Quality of Service How good are late data ad lowthroughput chaels? It depeds o the applicatio. Do you care if... Your e-mail takes 1/2
More informationReliable Transmission. Spring 2018 CS 438 Staff - University of Illinois 1
Reliable Trasmissio Sprig 2018 CS 438 Staff - Uiversity of Illiois 1 Reliable Trasmissio Hello! My computer s ame is Alice. Alice Bob Hello! Alice. Sprig 2018 CS 438 Staff - Uiversity of Illiois 2 Reliable
More informationA New per-class Flow Fixed Proportional Differentiated Service for Multi-service Wireless LAN*
A New per-class Flow Fixed Proportioal Differetiated Service for Multi-service Wireless LAN* Meg Chag Che, Li-Pig Tug 2, Yeali S. Su 3, ad Wei-Kua Shih 2 Istitute of Iformatio Sciece, Academia Siica, Taipei,
More informationTraditional queuing behaviour in routers. Scheduling and queue management. Questions. Scheduling mechanisms. Scheduling [1] Scheduling [2]
Traditioal queuig behaviour i routers Schedulig ad queue maagemet Data trasfer: datagrams: idividual packets o recogitio of flows coectioless: o sigallig Forwardig: based o per-datagram, forwardig table
More informationUnit 7 Media Access Control (MAC)
Unit 7 Media Access Control (MAC) 1 Internet Model 2 Sublayers of Data Link Layer Logical link control (LLC) Flow control Error control Media access control (MAC) access control 3 Categorization of MAC
More informationAcknowledgement-Aware MPR MAC Protocol for Distributed WLANs: Design and Analysis
Globecom 2012 - Wireless Commuicatios Symposium Ackowledgemet-Aware MPR MAC Protocol for Distributed WLANs: Desig ad Aalysis Arpa Mukhopadhyay, Neelesh B. Mehta, Seior Member, IEEE, Vikram Sriivasa, Member,
More informationAchieving Fairness in Wireless LANs by Enhanced IEEE DCF *
Achievig Fairess i Wireless LANs by Ehaced IEEE 802.11 DCF * Nagesh S. P. Nadiraju, Hrishikesh Gossai, Dave Cavalcati, Kaushik R. Chowdhury, Dharma P. Agrawal Ceter for Distributed ad Mobile Computig,
More informationAchieving Fairness in Wireless LANs by Enhanced DCF *
U.C. ECECS Techical Report 2005-03 August 2005 Achievig Fairess i Wireless LANs by Ehaced 802. DCF * by Nagesh S. Nadiraju, Hrishikesh Gossai, Dave Cavalcati, Kaushik R. Chowdhury, Dharma P. Agrawal Ceter
More informationMarkov Chain Model of HomePlug CSMA MAC for Determining Optimal Fixed Contention Window Size
Markov Chai Model of HomePlug CSMA MAC for Determiig Optimal Fixed Cotetio Widow Size Eva Krimiger * ad Haiph Latchma Dept. of Electrical ad Computer Egieerig, Uiversity of Florida, Gaiesville, FL, USA
More informationOne advantage that SONAR has over any other music-sequencing product I ve worked
*gajedra* D:/Thomso_Learig_Projects/Garrigus_163132/z_productio/z_3B2_3D_files/Garrigus_163132_ch17.3d, 14/11/08/16:26:39, 16:26, page: 647 17 CAL 101 Oe advatage that SONAR has over ay other music-sequecig
More informationBluetooth Basics. Bluetooth Overview
Bluetooth Basics Bluetooth Overview Wireless techology for short-rage voice ad data commuicatio Low-cost ad low-power Provides a commuicatio platform betwee a wide rage of smart devices Not limited to
More informationOverview Queueing Disciplines TCP Congestion Control Congestion Avoidance Mechanisms Quality of Service
Cogestio Cotrol Overview Queueig Disciplies TCP Cogestio Cotrol Cogestio Avoidace Mechaisms Quality of Service Sprig 2018 CS 438 Staff - Uiversity of Illiois 1 Today s Topic: Vacatios Sa Fracisco Moterey
More informationGuaranteeing Hard Real Time End-to-End Communications Deadlines
Guarateeig Hard Real Time Ed-to-Ed Commuicatios Deadlies K. W. Tidell A. Burs A. J. Welligs Real Time Systems Research Group Departmet of Computer Sciece Uiversity of York e-mail: ke@mister.york.ac.uk
More informationImprovement of the Orthogonal Code Convolution Capabilities Using FPGA Implementation
Improvemet of the Orthogoal Code Covolutio Capabilities Usig FPGA Implemetatio Naima Kaabouch, Member, IEEE, Apara Dhirde, Member, IEEE, Saleh Faruque, Member, IEEE Departmet of Electrical Egieerig, Uiversity
More information% Sun Logo for. X3T10/95-229, Revision 0. April 18, 1998
Su Microsystems, Ic. 2550 Garcia Aveue Moutai View, CA 94045 415 960-1300 X3T10/95-229, Revisio 0 April 18, 1998 % Su Logo for Joh Lohmeyer Chairperso, X3T10 Symbios Logic Ic. 1635 Aeroplaza Drive Colorado
More informationK-NET bus. When several turrets are connected to the K-Bus, the structure of the system is as showns
K-NET bus The K-Net bus is based o the SPI bus but it allows to addressig may differet turrets like the I 2 C bus. The K-Net is 6 a wires bus (4 for SPI wires ad 2 additioal wires for request ad ackowledge
More informationMultiple Access Links and Protocols
Multiple Access Links and Protocols Two types of links : point-to-point PPP for dial-up access point-to-point link between Ethernet switch and host broadcast (shared wire or medium) old-fashioned Ethernet
More informationIntroduction to Network Technologies & Layered Architecture BUPT/QMUL
Itroductio to Network Techologies & Layered Architecture BUPT/QMUL 2018-3-12 Review What is the Iteret? How does it work? Whe & how did it come about? Who cotrols it? Where is it goig? 2 Ageda Basic Network
More informationPrice-based Congestion-Control in Wi-Fi Hot Spots
Price-based Cogestio-Cotrol i Wi-Fi Hot Spots Roberto Battiti, Marco Coti, Erico Gregori, Mikalai Sabel To cite this versio: Roberto Battiti, Marco Coti, Erico Gregori, Mikalai Sabel. Price-based Cogestio-Cotrol
More informationECE4050 Data Structures and Algorithms. Lecture 6: Searching
ECE4050 Data Structures ad Algorithms Lecture 6: Searchig 1 Search Give: Distict keys k 1, k 2,, k ad collectio L of records of the form (k 1, I 1 ), (k 2, I 2 ),, (k, I ) where I j is the iformatio associated
More informationMedium Access Control. MAC protocols: design goals, challenges, contention-based and contention-free protocols
Medium Access Control MAC protocols: design goals, challenges, contention-based and contention-free protocols 1 Why do we need MAC protocols? Wireless medium is shared Many nodes may need to access the
More informationAloha and slotted aloha
CSMA 2/13/06 Aloha and slotted aloha Slotted aloha: transmissions are synchronized and only start at the beginning of a time slot. Aloha sender A sender B collision sender C t Slotted Aloha collision sender
More informationCOMPUTER ORGANIZATION AND DESIGN The Hardware/Software Interface. Chapter 4. The Processor. Part A Datapath Design
COMPUTER ORGANIZATION AND DESIGN The Hardware/Software Iterface 5 th Editio Chapter The Processor Part A path Desig Itroductio CPU performace factors Istructio cout Determied by ISA ad compiler. CPI ad
More informationTable 2 GSM, UMTS and LTE Coverage Levels
6 INDICATORS OF QUALITY OF SERVICE This sectio defies quality idicators that characterize the performace of services supported o mobile commuicatio systems i their various phases of access ad use 6. 6.1
More informationLecture 4: Wireless MAC Overview. Hung-Yu Wei National Taiwan University
Lecture 4: Wireless MAC Overview Hung-Yu Wei National Taiwan University Medium Access Control Topology 3 Simplex and Duplex 4 FDMA TDMA CDMA DSSS FHSS Multiple Access Methods Notice: CDMA and spread spectrum
More informationLogical Link Control (LLC) Medium Access Control (MAC)
Overview of IEEE 802.11 Data Link layer Application Presentation Session Transport LLC: On transmission, assemble data into a frame with address and CRC fields. On reception, disassemble frame, perform
More informationAdaptive Graph Partitioning Wireless Protocol S. L. Ng 1, P. M. Geethakumari 1, S. Zhou 2, and W. J. Dewar 1 1
Adaptive Graph Partitioig Wireless Protocol S. L. Ng 1, P. M. Geethakumari 1, S. Zhou 2, ad W. J. Dewar 1 1 School of Electrical Egieerig Uiversity of New South Wales, Australia 2 Divisio of Radiophysics
More informationChapter 12 Multiple Access 12.1
Chapter 12 Multiple Access 12.1 Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. 12.2 Figure 12.1 Data link layer divided into two functionality-oriented sublayers
More informationS. Mehta and K.S. Kwak. UWB Wireless Communications Research Center, Inha University Incheon, , Korea
S. Mehta ad K.S. Kwak UWB Wireless Commuicatios Research Ceter, Iha Uiversity Icheo, 402-75, Korea suryaad.m@gmail.com ABSTRACT I this paper, we propose a hybrid medium access cotrol protocol (H-MAC) for
More informationA Generalized Markov Chain Model for Effective Analysis of Slotted IEEE
A Geeralized Markov Chai Model for Effective Aalysis of Slotted IEEE 8..4 Pagu Park, Piergiuseppe Di Marco, Pablo Soldati, Carlo Fischioe, Karl Herik Johasso Abstract A geeralized aalysis of the IEEE 8..4
More informationResearch Article Delay Analysis of GTS Bridging between IEEE and IEEE Networks for Healthcare Applications
Hidawi Publishig Corporatio Iteratioal Joural of Telemedicie ad Applicatios Volume 29, Article ID 98746, 13 pages doi:1.1155/29/98746 Research Article Delay Aalysis of GTS Bridgig betwee IEEE 82.15.4 ad
More information% Sun Logo for Frame. X3T10/95-229, Revision 2. September 28, 1995
Su Microsystems, Ic. 2550 Garcia Aveue Moutai View, CA 94045 415 960-1300 X3T10/95-229, Revisio 2 September 28, 1995 % Su Logo for Frame Joh Lohmeyer Chairperso, X3T10 Symbios Logic Ic. 1635 Aeroplaza
More informationSecure Software Upload in an Intelligent Vehicle via Wireless Communication Links
Secure Software Upload i a Itelliget Vehicle via Wireless Commuicatio Liks Syed Masud Mahmud, Member, IEEE, Shobhit Shaker, Studet Member, IEEE Iria Hossai, Studet Member, IEEE Abstract The demad for drive-by-wire,
More informationCMPE 257: Wireless and Mobile Networking
CMPE 257: Wireless and Mobile Networking Katia Obraczka Computer Engineering UCSC Baskin Engineering Lecture 3 CMPE 257 Spring'15 1 Next week Announcements April 14: ICN (Spencer Sevilla) April 16: DTN
More informationBasic allocator mechanisms The course that gives CMU its Zip! Memory Management II: Dynamic Storage Allocation Mar 6, 2000.
5-23 The course that gives CM its Zip Memory Maagemet II: Dyamic Storage Allocatio Mar 6, 2000 Topics Segregated lists Buddy system Garbage collectio Mark ad Sweep Copyig eferece coutig Basic allocator
More informationRahman 1. Application
Data Link layer Overview of IEEE 802.11 Application Presentation Session Transport LLC: On transmission, assemble data into a frame with address and CRC fields. On reception, disassemble frame, perform
More informationIntelligent Transportation Systems. Medium Access Control. Prof. Dr. Thomas Strang
Intelligent Transportation Systems Medium Access Control Prof. Dr. Thomas Strang Recap: Wireless Interconnections Networking types + Scalability + Range Delay Individuality Broadcast o Scalability o Range
More informationChapter 1 Basic concepts of wireless data networks (cont d)
Chapter 1 Basic concepts of wireless data networks (cont d) Part 2: Medium access methods for mobile data networks Sept 15 2004 1 Fixed assignment access schemes in voice-oriented networks Frequency division
More informationRandom Access. 1. Aloha. 2. Slotted Aloha 3. CSMA 4. CSMA/CD
Random Access 1. Aloha 2. Slotted Aloha 3. CSMA 4. CSMA/CD Background Communication medium B No Collision collision A C Modern Local Area Networks (LANs) operate as follows Users are connected to communication
More informationECE453 Introduction to Computer Networks. Broadcast vs. PPP. Delay. Lecture 7 Multiple Access Control (I)
ECE453 Introduction to Computer Networks Lecture 7 Multiple Access Control (I) 1 Broadcast vs. PPP Broadcast channel = multiaccess channel = random access channel Broadcast LAN Satellite network PPP WAN
More informationThreads and Concurrency in Java: Part 1
Cocurrecy Threads ad Cocurrecy i Java: Part 1 What every computer egieer eeds to kow about cocurrecy: Cocurrecy is to utraied programmers as matches are to small childre. It is all too easy to get bured.
More informationThreads and Concurrency in Java: Part 1
Threads ad Cocurrecy i Java: Part 1 1 Cocurrecy What every computer egieer eeds to kow about cocurrecy: Cocurrecy is to utraied programmers as matches are to small childre. It is all too easy to get bured.
More informationICE 1332/0715 Mobile Computing (Summer, 2008)
ICE 1332/0715 Mobile Computing (Summer, 2008) Medium Access Control Prof. Chansu Yu http://academic.csuohio.edu/yuc/ Simplified Reference Model Application layer Transport layer Network layer Data link
More informationMAC LAYER. Murat Demirbas SUNY Buffalo
MAC LAYER Murat Demirbas SUNY Buffalo MAC categories Fixed assignment TDMA (Time Division), CDMA (Code division), FDMA (Frequency division) Unsuitable for dynamic, bursty traffic in wireless networks Random
More informationSwitch Construction CS
Switch Costructio CS 00 Workstatio-Based Aggregate badwidth /2 of the I/O bus badwidth capacity shared amog all hosts coected to switch example: Gbps bus ca support 5 x 00Mbps ports (i theory) I/O bus
More informationPython Programming: An Introduction to Computer Science
Pytho Programmig: A Itroductio to Computer Sciece Chapter 6 Defiig Fuctios Pytho Programmig, 2/e 1 Objectives To uderstad why programmers divide programs up ito sets of cooperatig fuctios. To be able to
More information27 Refraction, Dispersion, Internal Reflection
Chapter 7 Refractio, Dispersio, Iteral Reflectio 7 Refractio, Dispersio, Iteral Reflectio Whe we talked about thi film iterferece, we said that whe light ecouters a smooth iterface betwee two trasparet
More informationChapter 4. The Medium Access Control Sublayer. Points and Questions to Consider. Multiple Access Protocols. The Channel Allocation Problem.
Dynamic Channel Allocation in LANs and MANs Chapter 4 The Medium Access Control Sublayer 1. Station Model. 2. Single Channel Assumption. 3. Collision Assumption. 4. (a) Continuous Time. (b) Slotted Time.
More informationCSE 6811 Ashikur Rahman
Data Link layer Application Overview of IEEE 802.11 LLC: On transmission, assemble data into a frame with address and CRC fields. On reception, disassemble frame, perform address recognition and CRC validation.
More informationCopyright 2016 Ramez Elmasri and Shamkant B. Navathe
Copyright 2016 Ramez Elmasri ad Shamkat B. Navathe CHAPTER 22 Database Recovery Techiques Copyright 2016 Ramez Elmasri ad Shamkat B. Navathe Itroductio Recovery algorithms Recovery cocepts Write-ahead
More information1. SWITCHING FUNDAMENTALS
. SWITCING FUNDMENTLS Switchig is the provisio of a o-demad coectio betwee two ed poits. Two distict switchig techiques are employed i commuicatio etwors-- circuit switchig ad pacet switchig. Circuit switchig
More informationCSE 461: Wireless Networks
CSE 461: Wireless Networks Wireless IEEE 802.11 A physical and multiple access layer standard for wireless local area networks (WLAN) Ad Hoc Network: no servers or access points Infrastructure Network
More informationMessage Integrity and Hash Functions. TELE3119: Week4
Message Itegrity ad Hash Fuctios TELE3119: Week4 Outlie Message Itegrity Hash fuctios ad applicatios Hash Structure Popular Hash fuctios 4-2 Message Itegrity Goal: itegrity (ot secrecy) Allows commuicatig
More information. Written in factored form it is easy to see that the roots are 2, 2, i,
CMPS A Itroductio to Programmig Programmig Assigmet 4 I this assigmet you will write a java program that determies the real roots of a polyomial that lie withi a specified rage. Recall that the roots (or
More informationChapter 2: Non-hierarchical Coloured Petri Nets. 1`(1,"COL")++ 1`(2,"OUR")++ 1`(3,"ED ")++ 1`(4,"PET")++ 1`(5,"RI ")++ 1`(6,"NET") (n,d) AllPackets
Modellig ad Validatio of ocurret Systems hapter 2: No-hierarchical Kurt Jese & Lars Michael Kristese {jese,lmristese} @cs.au.d lls s To Sed Sed NextSed 6 `(,"OL")++ `(2,"OUR")++ `(3,"E ")++ `(4,"PET")++
More informationCSE 461: Multiple Access Networks. This Lecture
CSE 461: Multiple Access Networks This Lecture Key Focus: How do multiple parties share a wire? This is the Medium Access Control (MAC) portion of the Link Layer Randomized access protocols: 1. Aloha 2.
More informationThreads and Concurrency in Java: Part 2
Threads ad Cocurrecy i Java: Part 2 1 Waitig Sychroized methods itroduce oe kid of coordiatio betwee threads. Sometimes we eed a thread to wait util a specific coditio has arise. 2003--09 T. S. Norvell
More informationWireless Networks (CSC-7602) Lecture 6 (08 Oct. 2007) Seung-Jong Park (Jay) Wireless MAC
Wireless Networks (CSC-7602) Lecture 6 (08 Oct. 2007) Seung-Jong Park (Jay) http://www.csc.lsu.edu/~sjpark 1 Wireless MAC 2 1 Wireless MAC CSMA as wireless MAC? Hidden and exposed terminal problems make
More informationData diverse software fault tolerance techniques
Data diverse software fault tolerace techiques Complemets desig diversity by compesatig for desig diversity s s limitatios Ivolves obtaiig a related set of poits i the program data space, executig the
More informationCHAPTER 7 MAC LAYER PROTOCOLS. Dr. Bhargavi Goswami Associate Professor & Head Department of Computer Science Garden City College
CHAPTER 7 MAC LAYER PROTOCOLS Dr. Bhargavi Goswami Associate Professor & Head Department of Computer Science Garden City College MEDIUM ACCESS CONTROL - MAC PROTOCOLS When the two stations transmit data
More informationLecture 12 December 04, Wireless Access. Graduate course in Communications Engineering. University of Rome La Sapienza. Rome, Italy
Lecture 12 December 04, 2017 Wireless Access Graduate course in Communications Engineering University of Rome La Sapienza Rome, Italy 2017-2018 Random Medium Access Control Part II - CSMA and Collision
More informationCMPE 257: Wireless and Mobile Networking
CMPE 257: Wireless and Mobile Networking Katia Obraczka Computer Engineering UCSC Baskin Engineering Lecture 3 CMPE 257 Winter'11 1 Announcements Accessing secure part of the class Web page: User id: cmpe257.
More informationPython Programming: An Introduction to Computer Science
Pytho Programmig: A Itroductio to Computer Sciece Chapter 1 Computers ad Programs 1 Objectives To uderstad the respective roles of hardware ad software i a computig system. To lear what computer scietists
More informationCS 43: Computer Networks Media Access. Kevin Webb Swarthmore College November 30, 2017
CS 43: Computer Networks Media Access Kevin Webb Swarthmore College November 30, 2017 Multiple Access Links & Protocols Two classes of links : point-to-point dial-up access link between Ethernet switch,
More informationThe MAC layer in wireless networks
The MAC layer in wireless networks The wireless MAC layer roles Access control to shared channel(s) Natural broadcast of wireless transmission Collision of signal: a /space problem Who transmits when?
More informationLower Bounds for Sorting
Liear Sortig Topics Covered: Lower Bouds for Sortig Coutig Sort Radix Sort Bucket Sort Lower Bouds for Sortig Compariso vs. o-compariso sortig Decisio tree model Worst case lower boud Compariso Sortig
More informationLecture 13: Validation
Lecture 3: Validatio Resampli methods Holdout Cross Validatio Radom Subsampli -Fold Cross-Validatio Leave-oe-out The Bootstrap Bias ad variace estimatio Three-way data partitioi Itroductio to Patter Recoitio
More informationExact Minimum Lower Bound Algorithm for Traveling Salesman Problem
Exact Miimum Lower Boud Algorithm for Travelig Salesma Problem Mohamed Eleiche GeoTiba Systems mohamed.eleiche@gmail.com Abstract The miimum-travel-cost algorithm is a dyamic programmig algorithm to compute
More informationUsing VTR Emulation on Avid Systems
Usig VTR Emulatio o Avid Systems VTR emulatio allows you to cotrol a sequece loaded i the Record moitor from a edit cotroller for playback i the edit room alog with other sources. I this sceario the edit
More informationThroughput-Delay Scaling in Wireless Networks with Constant-Size Packets
Throughput-Delay Scalig i Wireless Networks with Costat-Size Packets Abbas El Gamal, James Mamme, Balaji Prabhakar, Devavrat Shah Departmets of EE ad CS Staford Uiversity, CA 94305 Email: {abbas, jmamme,
More informationWireless Medium Access Control Protocols
Wireless Medium Access Control Protocols Telecomunicazioni Undergraduate course in Electrical Engineering University of Rome La Sapienza Rome, Italy 2007-2008 Classification of wireless MAC protocols Wireless
More informationSecurity of Bluetooth: An overview of Bluetooth Security
Versio 2 Security of Bluetooth: A overview of Bluetooth Security Marjaaa Träskbäck Departmet of Electrical ad Commuicatios Egieerig mtraskba@cc.hut.fi 52655H ABSTRACT The purpose of this paper is to give
More informationCopyright 2016 Ramez Elmasri and Shamkant B. Navathe
Copyright 2016 Ramez Elmasri ad Shamkat B. Navathe CHAPTER 21 Cocurrecy Cotrol Techiques Copyright 2016 Ramez Elmasri ad Shamkat B. Navathe Itroductio Cocurrecy cotrol protocols Set of rules to guaratee
More informationPerformance Analysis of Multiclass FIFO: Motivation, Difficulty and a Network Calculus Approach
Performace Aalysis of Multiclass FIFO: Motivatio, Difficulty ad a Network alculus Approach Yumig Jiag Norwegia Uiversity of Sciece ad Techology (NTNU) 1 19 March 2014, 2d Workshop o Network alculus, Bamberg,
More informationECE 358 MAC Examples. Xuemin (Sherman) Shen Office: EIT 4155 Phone: x
ECE 358 MAC Examples Xuemin (Sherman) Shen Office: EIT 4155 Phone: x 32691 Email: xshen@bbcr.uwaterloo.ca Problem 1. Consider the following Aloha systems. (a) A group of N users share a 56 kbps pure Aloha
More informationLecture 7 7 Refraction and Snell s Law Reading Assignment: Read Kipnis Chapter 4 Refraction of Light, Section III, IV
Lecture 7 7 Refractio ad Sell s Law Readig Assigmet: Read Kipis Chapter 4 Refractio of Light, Sectio III, IV 7. History I Eglish-speakig coutries, the law of refractio is kow as Sell s Law, after the Dutch
More informationCOMPUTER ORGANIZATION AND DESIGN The Hardware/Software Interface. Chapter 4. The Processor. Single-Cycle Disadvantages & Advantages
COMPUTER ORGANIZATION AND DESIGN The Hardware/Software Iterface 5 th Editio Chapter 4 The Processor Pipeliig Sigle-Cycle Disadvatages & Advatages Clk Uses the clock cycle iefficietly the clock cycle must
More informationThe MAC layer in wireless networks
The MAC layer in wireless networks The wireless MAC layer roles Access control to shared channel(s) Natural broadcast of wireless transmission Collision of signal: a time/space problem Who transmits when?
More informationCSE/EE 461 Wireless and Contention-Free Protocols
CSE/EE 461 Wireless and Contention-Free Protocols Last Time The multi-access problem Medium Access Control (MAC) sublayer Random access protocols: Aloha CSMA variants Classic Ethernet (CSMA/CD) Application
More information1.2 Binomial Coefficients and Subsets
1.2. BINOMIAL COEFFICIENTS AND SUBSETS 13 1.2 Biomial Coefficiets ad Subsets 1.2-1 The loop below is part of a program to determie the umber of triagles formed by poits i the plae. for i =1 to for j =
More informationTraffic Models and QoS
Traffic Models ad QoS TELE4642: Week9 Ackowledgemet: Some slides are adapted from Computer Networkig: A Top Dow Approach Featurig the Iteret, 2 d editio, J.F Kurose ad K.W. Ross All Rights Reserved, copyright
More informationThe CCITT Communication Protocol for Videophone Teleconferencing Equipment
The CCITT Commuicatio Protocol for Videophoe Telecoferecig Equipmet Ralf Hiz Daimler-Bez AG Istitut ffir Iformatiostechik Tcl. 0731 / 505-21 32 Fax. 0731 / 505-41 04 Wilhelm-R.uge-Str. 11 7900 Ulm Abstract
More information1&1 Next Level Hosting
1&1 Next Level Hostig Performace Level: Performace that grows with your requiremets Copyright 1&1 Iteret SE 2017 1ad1.com 2 1&1 NEXT LEVEL HOSTING 3 Fast page loadig ad short respose times play importat
More informationWeston Anniversary Fund
Westo Olie Applicatio Guide 2018 1 This guide is desiged to help charities applyig to the Westo to use our olie applicatio form. The Westo is ope to applicatios from 5th Jauary 2018 ad closes o 30th Jue
More informationLECTURE PLAN. Script. Introduction about MAC Types o ALOHA o CSMA o CSMA/CD o CSMA/CA
Course- B.Sc. Applied Physical Science (Computer Science) Year- IIIrd, Sem- Vth Subject Computer Science Paper- XVIIth, Computer Networks Lecture -11 Lecture Title- Medium Access Layer Script Today in
More informationRandom Network Coding in Wireless Sensor Networks: Energy Efficiency via Cross-Layer Approach
Radom Network Codig i Wireless Sesor Networks: Eergy Efficiecy via Cross-Layer Approach Daiel Platz, Dereje H. Woldegebreal, ad Holger Karl Uiversity of Paderbor, Paderbor, Germay {platz, dereje.hmr, holger.karl}@upb.de
More informationCS 43: Computer Networks. 27: Media Access Contd. December 3, 2018
CS 43: Computer Networks 27: Media Access Contd. December 3, 2018 Last Class The link layer provides lots of functionality: addressing, framing, media access, error checking could be used independently
More informationCourse Site: Copyright 2012, Elsevier Inc. All rights reserved.
Course Site: http://cc.sjtu.edu.c/g2s/site/aca.html 1 Computer Architecture A Quatitative Approach, Fifth Editio Chapter 2 Memory Hierarchy Desig 2 Outlie Memory Hierarchy Cache Desig Basic Cache Optimizatios
More informationTCP Internals. Spring 2018 CS 438 Staff, University of Illinois 1
TCP Iterals Sprig 2018 CS 438 Staff, Uiversity of Illiois 1 TCP Usage Model Coectio setup 3-way hadshake Data trasport Seder writes data TCP Breaks data ito segmets Seds each segmet over IP Retrasmits,
More informationAdmission control issues in sensor clusters
Admissio cotrol issues i 802.15.4 sesor clusters Jelea Mišić, Shairmia Shafi, ad Vojislav B. Mišić Departmet of Computer Sciece, Uiversity of Maitoba Wiipeg, Maitoba, Caada PACS umbers: Valid PACS appear
More informationRecursive Procedures. How can you model the relationship between consecutive terms of a sequence?
6. Recursive Procedures I Sectio 6.1, you used fuctio otatio to write a explicit formula to determie the value of ay term i a Sometimes it is easier to calculate oe term i a sequece usig the previous terms.
More informationCS200: Hash Tables. Prichard Ch CS200 - Hash Tables 1
CS200: Hash Tables Prichard Ch. 13.2 CS200 - Hash Tables 1 Table Implemetatios: average cases Search Add Remove Sorted array-based Usorted array-based Balaced Search Trees O(log ) O() O() O() O(1) O()
More information