Performance Comparison of Reservation MAC Protocols for Broadband Powerline Communications Networks

Size: px
Start display at page:

Download "Performance Comparison of Reservation MAC Protocols for Broadband Powerline Communications Networks"

Transcription

1 Performance Comparison of Reservation MAC Protocols for Broadband Powerline Communications Networks Halid Hrasnica *, Abdelfatteh Haidine, Ralf Lehnert Chair for Telecommunications, Dresden University of Technology D Dresden, Germany ABSTRACT We study the MAC layer of powerline communications (PLC) transmission systems applied to telecommunication access networks. PLC networks have to operate with a limited signal power which makes them more sensitive to disturbances from the electrical power supply grid and from the network environment. Well-known error handling mechanisms can be applied to the PLC systems to solve the problem of transmission errors caused by the disturbances (e.g. FEC and ARQ). However, the use of this mechanisms consumes a part of the transmission capacity and therefore decreases the already limited net data rate of the PLC systems. Because of the limited bandwidth, PLC networks have to provide a very good network utilization. Also a sufficient QoS is required, which can be reached by usage of efficient methods for the network capacity sharing MAC protocols. The impulsive noise influences very much the error-free transmission. Therefore, this investigation includes modeling of several disturbance scenarios, too. We propose the reservation MAC protocols to be applied to the PLC access networks, because they are suitable to carry hybrid traffic with variable data rates ensuring a high network utilization. The analysis of the basic reservation protocols shows that the ALOHA random protocol can not deal with frequent transmission demands but it is more robust against disturbances than the polling based access protocol. The ALOHA protocol can be improved by the piggybacking method which degrades the collision probability and accordingly, shorts access delay. The polling protocol is extended with insertion of a contention component building a hybrid access method, which makes the access delays shorter, if there is a small number of stations in the network. Generally, the problems caused by the frequent transmission requests remain in all investigated access methods. However, the ALOHA based protocols show worst behavior in this case. Keywords: Powerline communications, MAC, reservation, modeling, simulation, performance analysis, disturbances 1. INTRODUCTION This work is a continuation of the investigations presented in 1 and 2 considering the MAC layer in the Powerline Communications (PLC) access networks. In 1 we presented the simulation model for the investigations of the PLC MAC layer including the simulation results for the first two variants of the reservation protocol for PLC; an ALOHA based random access protocol and a polling based dedicated access protocol. Various solutions for the protocol optimization and their improvement are discussed in 2 and in this investigation, we analyze and compare an ALOHA based reservation protocol with piggybacking, as an extension of the basic ALOHA protocol and a hybrid polling protocol with a random component. We consider PLC access systems using the low-voltage power supply network for the connection of end-users/subscribers to a wide area network as an alternative solution for the communication last mile 3, 4. There is a number of subscribers in a low-voltage electrical power supply network who have to share the transmission capacity of a PLC access network. Therefore a high gross data rate on the medium is necessary to ensure a sufficient QoS and to make PLC systems competitive to the other access technologies (xdsl, usage of CATV, WLL,...). PLC systems applied to the telecommunication access networks use a frequency spectrum of up to 30 MHz and act as antenna producing electro-magnetic radiation, which causes disturbances to other telecommunication services working in * Corresponding author hrasnica@ifn.et.tu-dresden.de, Internet: Telephone: , Fax:

2 this frequency range. Because of that, PLC networks have to work with a limited signal power which makes PLC systems more sensitive to disturbances from the electrical power supply network and from the PLC network environment. Wellknown error handling mechanisms can be applied to the PLC systems to solve the problem of transmission errors caused by the disturbances (e.g. FEC Forward Error Correction and ARQ Automatic Repeat request mechanisms). However, the use of this mechanisms consumes a part of the transmission capacity (overhead, retransmission) and therefore decreases the already limited data rate of the PLC systems. Because of the shared transmission medium, PLC networks have to provide a very good network utilization keeping also a sufficient QoS, which can be reached by usage of efficient methods for the network capacity sharing Media Access Control (MAC) protocols. The paper is organized as follows: First, we describe briefly the investigated PLC access system as well as applied simulation and disturbance model (section 2). After that, we analyze possible solutions for the PLC MAC layer and discuss several variants of the reservation MAC protocols (section 3). Further, a comprehensive simulation based protocol performance analysis is given. We compare ALOHA access protocol and its extension with piggybacking method (section 4). In section 5, a hybrid protocol with mixed polling and random access protocol is compared with a polling method Network Structure 2. PLC SYSTEM FEATURES AND MODELING PLC access networks are connected to the backbone communication networks via a transformer station, or via any other station in the network, building a physical tree structure 3, 4, 5. Independently of the PLC network topology the communication between the users of a PLC network and a wide area network (WAN) is carried out over a base station, normally placed in the transformer unit (Figure 1). Figure 1 : Logical Bus Topology of the PLC Network A transmission signal sent by the base station in the downlink direction (from the base station to the users) is transmitted to all network subsections. Therefore, it is received by all users in the network. In the uplink direction (from the users to the base station), a signal sent by an user is transmitted not only to the base station, but also to all other users in the network. That means, the PLC access network holds a logical bus structure in spite of the fact that the low-voltage supply networks have physically a tree topology PLC Services We consider the PLC transmission system as a bearer service carrying teleservices, which make possible usage of various communication applications 6. The MAC protocol to be implemented in a PLC system has to provide features for realization of different teleservices 1, 2, 3, 4 ensuring the needed QoS. On the first place, the classical telephone service and internet based data transmission have to be provided by the PLC access systems, because of their importance and their big penetration in the communication world Transmission System We consider an OFDM (Orthogonal Frequency Division Multiplexing) based transmission system using a number of subcarriers distributed in a frequency spectrum 1, 4. Each sub-carrier has a transmission capacity and it is possible to make a groups of the sub-carriers to build up transmission channels with a higher capacity 7. We assume that a transmission channel offers a fixed data rate of 64 kbps like in the investigation presented in 1.

3 However, in any transmission technique we find a structure consisting of a number of transmission channels divided in the frequency (OFDMA or FDMA), time (TDMA) or code (CDMA) domain. So, we can conclude that the PLC transmission systems seem to have a logical channel structure independently of the used transmission technology 2, 4. The logical transmission channels have different meaning for each considered transmission method, but the investigations, done on the logical level, can be applied to any of the transmission schemes (e.g. OFDMA investigation to TDMA,...) Simulation Model The simulation model, also used in the previous investigation 1 and 4, consists of a number of bidirectional transmission channels (Figure 2) with a fixed data rates which connect the network users with a base station. There is a possibility for modeling various disturbance types which make the transmission channels unavailable according to the chosen disturbance scenarios. The disturbances can be modeled to affect both single and multiple transmission channels representing an impact of disturbances in the frequency spectrum. Base Station Figure 2 : Generic Simulation Model Each user can be modeled to provide multiple telecommunication services (e.g. telephony and Internet). The user model to includes the implementation of a considered MAC protocol. Additionally, model of the base station should include a traffic scheduling strategy which is applied in the network providing all features of a request-answer procedure. Both user and base station implementations have to realize an error handling mechanism (e.g. ARQ), case it is applied Disturbance Modeling As shown in 1 a transmission channel can be modeled by a Markov chain with two states: OFF - the channel is disturbed, no transmission is possible ON - the channel is available These two states can be modeled by two random variables which represent interarrival times of the impulses/disturbances, moving a channel into the state OFF, and the disturbance duration. Both random variables are negative exponentially distributed 8, 9. In this investigation we simulate PLC networks with the following three disturbance scenarios: Disturbance-free network Lightly disturbed network ms interarrival time of the impulses/disturbances

4 Heavily disturbed network - 40 ms interarrival time of the disturbances We set the mean duration of a disturbance impulse to 100 µs and assume that the noise impulses with duration shorter than 300 µs do not cause errors 1, 2, 4. The disturbances are modeled independently for each transmission channel. 3. ANALYSIS OF THE PLC MAC LAYER 3.1. MAC Protocols for PLC A MAC protocol specifies a resource sharing strategy access of many users to the network transmission capacity applied to a multiple access scheme 1, 4, 10. Fixed access strategies are suitable for continuous traffic, but not for bursty traffic which is typical for data transfer provided in the PLC access networks. Dynamic access schemes are adequate for data transmission and in some cases it is possible to ensure a satisfactory transmission quality for delay-critical traffic. Dynamic protocols with contention can not ensure any guarantees of QoS for time-critical services and also 100% network utilization can not be reached. Collision-free dynamic protocols can be realized using token passing, polling or reservation methods. Token passing and polling make possible realization of some QoS guarantees in the network. However, with an increasing number of network stations the time between two sending rights for a stations (round-trip time of tokens or polling messages) becomes longer, making both protocols not suitable for time-critical services 1, 4. In the case of reservation protocols, a kind of pre-reservation of the transmission capacity for a particular user is done. A transmission request is submitted by user to a central network unit (e.g. base station in PLC network) using either a fixed or a dynamic access schemes. Transmission systems with the reservation access scheme are suitable to carry hybrid traffic (mix of traffic types caused by various services) with variable transmission rate 10. Satisfaction of various QoS requirements is also possible and a good network utilization can be reached. Because of that we propose the application of the reservation protocols in the PLC access networks Analysis of Basic Reservation Protocols In 1 we investigate two different protocol solutions for the signaling channel: ALOHA - a contention protocol Polling protocol - with dedicated reservation In the first case, according to the ALOHA protocol, a network station tries to send transmission requests/demands, using socalled random request slots (Figure 3), to the base station over a signaling channel and after that waits for an answer from the base station, which includes information about medium access rights for the requested transmission. In the case of collision with a request from an other network station, the both affected stations will try to retransmit their transmission demands after a random time. Figure 3 : Basic Reservation Protocols In the second case, there is a polling procedure realized by the PLC base station which sends so-called polling messages to each network station according to the Round Robin procedure. A station receiving a polling message has the right to send a

5 transmission request and afterwards the base station answers with information about medium access rights. The collisions are not possible (Figure 3), but a request can be disturbed and it has to be retransmitted in the next request slot, which is reserved for the station. The user packets are reassembled into the smaller units - PLC segments - with 28 bytes payload length 2, 4. In both ALOHA and polling based protocols the users request a number of PLC segments to be transmitted according to the size of an arrived user packet (e.g. IP packet). A transmission demand arrives the base station if it was not disturbed by disturbance or collision (only for ALOHA principal). If the request was successful, the base station answers with the number of data slots which have to be passed by the station before it starts to send (Figure 4). The passed slots (if any) are used by other stations. The answer from the base station can be also disturbed and in this case the whole requesting procedure is repeated according to the used access method. Figure 4 : Request - Acknowledgement Procedure The results of the investigation done in 1 can be summarized as follows: The access times with ALOHA based protocols are significantly shorter than with polling access method in the case that the transmission requests occur relative seldom with accordingly few number of the collisions on the signaling channel. However, if the collision probability increases (e.g. with increasing network load or number of subscribers in the PLC network), the advantage of the ALOHA based protocol disappears. On the other hand, the ALOHA protocol shows a better robustness against disturbances because of its random mechanism and changes its behavior more seldom than the polling based protocol. To find a suitable solution for the MAC protocol of the PLC network we investigate possibilities for optimization of the both protocol solutions. The ALOHA based protocol can be improved with a reduction of the collision probability in the signaling channel. The disadvantages of the polling based protocol can be improved by inserting a contention component into the protocol making it more robust against disturbances and decreasing the access times Investigation of Advanced Reservation Protocols In the investigation 2 we analyzed the possibilities for the improvement of both ALOHA and polling based reservation protocols. To decrease the collision probability on the signaling channel with the ALOHA access principal, we propose usage of the piggybacking method. A station transmitting the last segment of a packet (e.g. IP packet) can use this segment also to request a transmission for a new packet, if there is one in its queue. In this case the signaling channel is not used for the request and the collision probability decreases. To improve the polling based protocol we add a random component making a hybrid access method 2. In this case, the signaling channel is divided into a random and dedicated part (Figure 5). There are twice fewer number of dedicated request slots than in the polling access method (see above). Firstly, the stations try to make the request in the random slot. If it is not successful, the dedicated slots are used (the slots in the signaling channel addressed particularly to a station).

6 Figure 5 : Hybrid Access Protocol To investigate protocol improvement within piggybacking ALOHA and hybrid protocols we use the simulation and disturbance models described in section 2. We study a network with a variable number of users (50-500) using data service which represents the internet traffic. Internet users transmit usually in the uplink direction only small packets representing the requests for the download of WWW pages. Because of that we assumed a lower offered traffic load per user which amounts to 25 kbps. We consider two average sizes of user packets which are transmitted in the uplink direction; 1500 and 300 bytes to be able to compare network performance in case of larger and smaller user packets. The packet sizes are negative exponential distributed as well as the interarrival time of the packets. According to the chosen offered traffic load the mean intararrival times come to 4,8 and 0,96 seconds for 1500 and 300 bytes user packets respectively and the offered traffic rate per user is the same for both cases and they can be compared Network Utilization 4. ALOHA PROTOCOL WITH PIGGYBACKING We observed network utilization as relation between used network capacity (only error-free segments are taken into account) for the data transmission and the common capacity of the PLC network. If we analyze the networks with an average packet size of 1500 bytes, there is no difference between ALOHA access method and ALOHA with piggybacking access (Figure 6). Maximum network utilization is reached within the network without disturbances (about 93%, remaining 7% reserved for signaling, like in 1 ). In the lightly disturbed network the maximum utilization amounts to 83% and in the heavily disturbed network it is about 50% Average packet length: 1500 bytes ALOHA not_disturb PB not_disturb ALOHA light_disturb PB light_disturb ALOHA heavy_disturb PB heavy_disturb Utilization Figure 6 : Average Network Utilization (ALOHA and ALOHA with Piggybacking) In the investigation 2 we conclude that the utilization in the network with smaller average packet length can be improved with the usage of the piggybacking in the ALOHA access method, which decreases the collision probability in the signaling channel (in the case of the smaller packets the transmission requests are more frequent). In the network without

7 piggybacking maximum utilization is 27% (Figure 7). The usage of the piggybacking improves the utilization up to 31%, also under heavily disturbed conditions (in the network without piggybacking it was 23%). The better utilization of the piggybacking method remains in the whole investigated network load domain (number of stations in the network), in all networks; both networks with disturbances and network without disturbances. However, the reached utilization is not sufficient Average packet length: 300 bytes ALOHA not_disturb PB not_disturb ALOHA light_disturb PB light_disturb ALOHA heavy_disturb PB heavy_disturb Utilization Figure 7 : Average Network Utilization (ALOHA and ALOHA with Piggybacking) 4.2. Access Delay We measure the access delay as time needed for realization of the requesting procedure for the transmission of an arrived packet. This procedure includes transmission of a request message to the base station and reception of its answer about the access rights. For both access methods, ALOHA with and without piggybacking, the access delays remain the same in the low network load area (Figure 8 - up). Networks under heavier disturbance conditions have a longer access delays in this load area. Shortly below the point where the networks reaches the maximum utilization (150, 250, 300 stations in heavily, lightly and not disturbed networks respectively; see Figure 6) the access delay decreases significantly in the networks with piggybacking access method. Above this point (near to saturation point), networks have the maximum utilization and the transmission time of the packets (in this case long packets, average size 1500 bytes) increases. Accordingly, there is a higher probability that a new packet arrives to the sending queue, during the transmission of an another packet. That means, the probability that the requests are sent using the piggybacking increases too, which decreases access delays in the higher network load area. In the area of higher network load (above the saturation point) we recognize an effect, that the access delays in the networks under heavier disturbance behavior are shorter, for both access methods with and without piggybacking (Figure 8 - up). If the maximum network utilization is reached, the transmission times of the packets increases as well as the data throughput decreases (see next subsection). Accordingly, the number of the requests decreases (a new request is sent after a packet is successfully transmitted). Also the number of requests using the piggybacking increases (see above), and the collision probability in the signaling channel becomes lower. Because of that, the access delays are shorter in this case. Note, the access delay include only the time needed for the requesting procedure (the transmission time of the packets is not included). In the investigation 2 we expected to decrease very critical access delays in the networks with the shorter packet length by using of the piggybacking. We see (Figure 8 - down) that the access delays decrease with the piggybacking, approximately twice (note, the y axe is logarithmic). However, the access delays are still too long above 150 stations in the network.

8 Access delay / ms Average packet length: 1500 bytes ALOHA not_disturb PB not_disturb ALOHA light_disturb PB light_disturb ALOHA heavy_disturb PB heavy_disturb 10 Access delay / ms 1e+08 1e+07 1e Average packet length: 300 bytes ALOHA not_disturb PB not_disturb ALOHA light_disturb PB light_disturb ALOHA heavy_disturb PB heavy_disturb Figure 8 : Mean Access Delay (ALOHA and ALOHA with Piggybacking) 4.3. Data Throughput Like in the investigation 1, the data throughput behavior follows the network utilization. If we consider the networks with the packet size of 1500 bytes, there is no difference between the networks with and without the piggybacking (Figure 9). On the other side, the improvement of the network utilization reached with the piggybacking in the case of the smaller packets (300 bytes) is visible.

9 1.2 1 Average packet length: 1500 bytes ALOHA not_disturb PB not_disturb ALOHA light_disturb PB light_disturb ALOHA heavy_disturb PB heavy_disturb Average packet length: 300 bytes ALOHA not_disturb PB not_disturb ALOHA light_disturb PB light_disturb ALOHA heavy_disturb PB heavy_disturb Throughput 0.8 Throughput Figure 9 : Average Relative Data Throughput (ALOHA and ALOHA with Piggybacking) 5.1. Network Utilization 5. HYBRID POLLING-ALOHA ACCESS PROTOCOL In the case of the network with the larger size of the packets, the network utilization remains the same for both used access protocols; polling and hybrid protocol. The results correspond also to the both variants of ALOHA protocols (with and without piggybacking, see Figure 6) in the case of the larger packets as well as to the investigations in 1. Utilization Average packet length: 300 bytes Poll not_disturb Hyb not_disturb Poll light_disturb Hyb light_disturb Poll heavy_disturb Hyb heavy_disturb Figure 10 : Average Network Utilization (Polling and Hybrid access protocols) If we observe the networks with the smaller average size of the packets (Figure 10), we find a lower network utilization in the case of the networks with the hybrid access protocol. This difference increases with the higher number of stations in the network. In the higher network load area, the collisions, which are possible in the contention part of the signaling channel provided by the hybrid protocol, occur more frequently. Note, that within hybrid protocol there are twice slots for the dedicated access fewer. In the case of a collision, the stations wait for the dedicated request slot and network utilization decreases. However, the utilization remains much better than in both investigated ALOHA protocols (section 4) for smaller packets.

10 5.2. Access Delay The insertion of a random component into the polling based access protocol should decrease the access delays, especially in the networks with the smaller number of stations 2. As we see (Figure 11 - up), there is a significant decrees of the access delay in this network load area in the case of the networks with larger packets. The access delays come nearer to the values measured with polling method for larger number of the stations in the network. In spite of the improvement for the access delays, they remain longer than in the networks with the both ALOHA access methods (Figure 8 - up). The effect that the heavier disturbed networks have a bit shorter access times, recognized in the networks with ALOHA access protocols, can be also seen in the networks with the hybrid protocol (Figure 11 - up) while the polling protocol does not show this feature. Access delay / ms Average packet length: 1500 bytes Poll not_disturb Hyb not_disturb Poll light_disturb Hyb light_disturb Poll heavy_disturb Hyb heavy_disturb 100 Access delay / ms Average packet length: 300 bytes Poll not_disturb Hyb not_disturb Poll light_disturb Hyb light_disturb Poll heavy_disturb Hyb heavy_disturb 100 Figure 11 : Mean Access Delay (Polling and Hybrid access protocols)

11 In the case of the networks with shorter packets (Figure 11 - down), the contention component of the hybrid protocols increases the access delays. Only for very small number of stations (50), we recognize an improvement of the access delays. A common number of the requesting slots in the hybrid protocol is divided in two groups: random and dedicated slots 2. Because of that, there are twice dedicated slots fewer than in the polling protocol and other half of the slots can be accessed randomly. The investigation in 1 and in the section 4 show unstable behavior of the random protocol if the small packets are transmitted and number of collisions as well as the access delays increase significant and the random slots are barely used for the successful request. Accordingly, the fewer number of the dedicated slots has to take over collided requests and that causes the delay increase Data Throughput The results for the data throughput follow the behavior of the network utilization (like in the investigation 1 and section 4). So, in the case of the larger packets (1500 bytes) there is no difference between polling and hybrid access protocol (see below). In the case of the smaller packets (300 bytes), hybrid protocol shows lower data throughput according to the reached lower network utilization (Figure 10). 6. CONCLUSIONS We investigate improvements of two basic solutions for the reservation MAC protocols to be applied in the broadband PLC networks. A random ALOHA reservation protocol is extended with the usage of piggybacking and a contention component is added to a dedicated polling access protocol making a hybrid access method. The protocols are simulated under different disturbance conditions; heavily and lightly disturbed and not disturbed networks. The simulation were done for longer user packets - less intensity of the transmission requests - and for shorter packets - frequent requests. The protocol extensions did not bring any changes in the networks with longer user packets, if we consider network utilization and data throughput. For shorter packets, protocol with piggybacking shows better utilization and throughput, but still much lower than in the networks with polling and hybrid access methods. The hybrid protocol decreases network utilization and data throughput compared with the polling. Piggybacking decreases access delay, especially if the network is highly loaded. That leads to recommendation of its implementation not only in the ALOHA protocol but also in polling or hybrid access method, too. The hybrid protocol decreases access delays of the polling method, particularly for smaller number of stations in the network. However, if we consider the networks with smaller user packets, this improvement exists only for a very small number of the stations. The networks with smaller user packets and accordingly, frequently transmission requests still have the long access delays. The improvement is visible with the insertion of the piggybacking and partly with usage of the hybrid random/dedicated protocols, but the access times go beyond one second, which is too long (300 bytes long packets need for the transmission 4 ms in the investigated networks). On the other side, in the networks with the short packets it is not possible to reach a full or nearly full network utilization and data throughput. In our future work we will investigate further solutions to overcome problem of very frequently transmission requests in a per-packet reservation MAC protocol for PLC. ACKNOWLEDGMENTS The authors thank to ONELINE, Barleben, Germany, for supporting our investigations. Part of this work has been done within the EU project PALAS (Powerline as an Alternative Local AcceSs). REFERENCES 1. H. Hrasnica, A. Haidine, Modeling MAC Layer for Powerline Communications Networks, Internet, Performance and Control of Network Systems, part of SPIE's symposium on Information Technologies, 5-8 November, 2000; Boston MA, USA 2. H. Hrasnica, A. Haidine, R. Lehnert, Reservation MAC Protocols for Powerline Communications, ISPLC th International Symposium on Power-Line Communications and its Applications, 4-6 April Malmö, Sweden

12 3. H. Hrasnica, R. Lehnert, Powerline Communications in Telecommunication Access Area (Powerline Communications im TK-Zugangsbereich), VDE World Microtechnologies Congress - MICRO.tec ETG-Fachtagung und -Forum: Verteilungsnetze im liberalisierten Markt - September 25-27, Expo 2000, Hannover, Germany 4. H. Hrasnica, R. Lehnert, Powerline Communications for Access Networks Performance Study of the MAC Layer, III International Conference on Telecommunications BIHTEL 2000 Telecommunication Networks - October 23-25, Sarajevo, Bosnia and Herzegovina 5. O. G. Hooijen, On the Channel Capacity of the Residential Power Circuit used as a Digital Communications Medium; IEEE Communications Letters, Vol. 2, No. 10, October ITU-T Recommendation I.210 (03/93): ISDN Service Capabilities 7. B. Walke, Mobilfunknetze und ihre Protokolle Band 1 (in German), B. G. Teubner - Stuttgart, Germany, 1998 (ISBN ) 8. M. Zimmerman. K. Dostert, The Low Voltage Power Distribution Network as Last Mile Access Network Signal Propagation and Noise Scenario in the HF-Rang, International Journal of Electronics and Communications (AEU) 54 (2000) N. 1, M. Zimmerman, K. Dostert, An Analysis of the Broadband Noise Scenario in Powerline Networks, 2000 International Symposium on Powerline Communications and its Applications April 2000 Limerick Ireland 10. I. F. Akyildiz, J. McNair, L. C. Martorell, R. Puigjaner, Y. Yesha: Medium Access Control Protocols for Multimedia Traffic in Wireless Networks. IEEE Network - July/August 1999

POWERLINE COMMUNICATIONS FOR ACCESS NETWORKS - Performance Study of the MAC Layer -

POWERLINE COMMUNICATIONS FOR ACCESS NETWORKS - Performance Study of the MAC Layer - POWERLINE COMMUNICATIONS FOR ACCESS NETWORKS - Performance Study of the MAC Layer - Halid Hrasnica and Ralf Lehnert Chair for Telecommunications, Dresden University of Technology 01062 Dresden, Germany

More information

MAC Layer in Broadband PLC Networks - State of the Art, Solutions, and Modelling -

MAC Layer in Broadband PLC Networks - State of the Art, Solutions, and Modelling - MAC Layer in Broadband PLC Networks - State of the Art, Solutions, and Modelling - Halid Hrasnica Chair for Telecommunications, Dresden University of Technology D-01062 Dresden, Germany E-mail: hrasnica@ifn.et.tu-dresden.de,

More information

Specific Systems: Broadband Powerline Communications Networks (PLCs) #16

Specific Systems: Broadband Powerline Communications Networks (PLCs) #16 Specific Systems: Broadband Powerline Communications Networks (PLCs) #16 Victor S. Frost Dan F. Servey Distinguished Professor Electrical Engineering and Computer Science University of Kansas 2335 Irving

More information

RECENTLY, the information exchange using wired and

RECENTLY, the information exchange using wired and Fast Dedicated Retransmission Scheme for Reliable Services in OFDMA Systems Howon Lee and Dong-Ho Cho Department of Electrical Engineering and Computer Science Korea Advanced Institute of Science and Technology

More information

An Hybrid Reservation-Polling MAC Protocol for Powerline Communications

An Hybrid Reservation-Polling MAC Protocol for Powerline Communications An Hybrid Reservation-Polling MAC Protocol for Powerline Communications Giuseppe Bianchi 1, Giuseppe Conigliaro 2 1 Università di Palermo, Dipartimento di Ingegneria Elettrica Viale Delle Scienze, Parco

More information

Aloha and slotted aloha

Aloha and slotted aloha CSMA 2/13/06 Aloha and slotted aloha Slotted aloha: transmissions are synchronized and only start at the beginning of a time slot. Aloha sender A sender B collision sender C t Slotted Aloha collision sender

More information

COMPUTER NETWORK Model Test Paper

COMPUTER NETWORK Model Test Paper Model Test Paper Question no. 1 is compulsory. Attempt all parts. Q1. Each question carries equal marks. (5*5 marks) A) Difference between Transmission Control Protocol (TCP) and User Datagram Protocol.

More information

Multiple Access (1) Required reading: Garcia 6.1, 6.2.1, CSE 3213, Fall 2010 Instructor: N. Vlajic

Multiple Access (1) Required reading: Garcia 6.1, 6.2.1, CSE 3213, Fall 2010 Instructor: N. Vlajic 1 Multiple Access (1) Required reading: Garcia 6.1, 6.2.1, 6.2.2 CSE 3213, Fall 2010 Instructor: N. Vlajic Multiple Access Communications 2 Broadcast Networks aka multiple access networks multiple sending

More information

Performance Evaluation and Design Improvement of Media Access Control Protocols for Broadband Wireless Local Loop

Performance Evaluation and Design Improvement of Media Access Control Protocols for Broadband Wireless Local Loop Performance Evaluation and Design Improvement of Media Access Control Protocols for Broadband Wireless Local Loop Mihir Thaker Masters Thesis Presentation Department of Electrical Engineering and Computer

More information

CHAPTER 7 MAC LAYER PROTOCOLS. Dr. Bhargavi Goswami Associate Professor & Head Department of Computer Science Garden City College

CHAPTER 7 MAC LAYER PROTOCOLS. Dr. Bhargavi Goswami Associate Professor & Head Department of Computer Science Garden City College CHAPTER 7 MAC LAYER PROTOCOLS Dr. Bhargavi Goswami Associate Professor & Head Department of Computer Science Garden City College MEDIUM ACCESS CONTROL - MAC PROTOCOLS When the two stations transmit data

More information

Mobile Communications Chapter 3 : Media Access

Mobile Communications Chapter 3 : Media Access Mobile Communications Chapter 3 : Media Access 2. Motivation 3. SDMA, FDMA, TDMA 1. Aloha and contention based schemes 4. Reservation schemes 5. Collision avoidance, MACA 6. Polling CDMA (Lecture 6) Prof.

More information

FAIR DELAY OPTIMIZATION-BASED RESOURCE ALLOCATION ALGORITHM FOR VIDEO TRAFFIC OVER WIRELESS MULTIMEDIA SYSTEM

FAIR DELAY OPTIMIZATION-BASED RESOURCE ALLOCATION ALGORITHM FOR VIDEO TRAFFIC OVER WIRELESS MULTIMEDIA SYSTEM FAIR DELAY OPTIMIZATION-BASED RESOURCE ALLOCATION ALGORITHM FOR VIDEO TRAFFIC OVER WIRELESS MULTIMEDIA SYSTEM 1 M. R. M. Rizk, Senior Member, IEEE, 2 M. I. Dessouky, 3 Sami A. El-Dolil, and 4 Mohammed

More information

Wireless Communications

Wireless Communications 4. Medium Access Control Sublayer DIN/CTC/UEM 2018 Why do we need MAC for? Medium Access Control (MAC) Shared medium instead of point-to-point link MAC sublayer controls access to shared medium Examples:

More information

Mesh Networks

Mesh Networks Institute of Computer Science Department of Distributed Systems Prof. Dr.-Ing. P. Tran-Gia Decentralized Bandwidth Management in IEEE 802.16 Mesh Networks www3.informatik.uni-wuerzburg.de Motivation IEEE

More information

A Simulation Study of the PLC-MAC Performance using Network Simulator-2

A Simulation Study of the PLC-MAC Performance using Network Simulator-2 A Simulation Study of the PLC-MAC Performance using Network Simulator-2 Min-Soo Kim, Dong-Min Son*, Young-Bae Ko and Young-Hyun Kim** Graduate School of Information & Communication, Ajou University, Korea

More information

Ethernet. Introduction. CSE 3213 Fall 2011

Ethernet. Introduction. CSE 3213 Fall 2011 Ethernet CSE 3213 Fall 2011 19 October 2011 1 Introduction Rapid changes in technology designs Broader use of LANs New schemes for high-speed LANs High-speed LAN technologies: Fast and gigabit Ethernet

More information

COMP476 Networked Computer Systems. Polling. Sharing the Wire. LAN Technologies. COMP476 Networked Computer Systems 1

COMP476 Networked Computer Systems. Polling. Sharing the Wire. LAN Technologies. COMP476 Networked Computer Systems 1 Media Access Control Sub Layer COMP476 Networked Computer Systems Sharing Common Media There are several ways to share common media. Some methods are: Frequency division multiplexing Time division multiplexing

More information

Chapter 3 MEDIA ACCESS CONTROL

Chapter 3 MEDIA ACCESS CONTROL Chapter 3 MEDIA ACCESS CONTROL Distributed Computing Group Mobile Computing Winter 2005 / 2006 Overview Motivation SDMA, FDMA, TDMA Aloha Adaptive Aloha Backoff protocols Reservation schemes Polling Distributed

More information

Medium Access Control. MAC protocols: design goals, challenges, contention-based and contention-free protocols

Medium Access Control. MAC protocols: design goals, challenges, contention-based and contention-free protocols Medium Access Control MAC protocols: design goals, challenges, contention-based and contention-free protocols 1 Why do we need MAC protocols? Wireless medium is shared Many nodes may need to access the

More information

Data Link Layer Technologies

Data Link Layer Technologies Chapter 2.2 La 2 Data Link La Technologies 1 Content Introduction La 2: Frames Error Handling 2 Media Access Control General approaches and terms Aloha Principles CSMA, CSMA/CD, CSMA / CA Master-Slave

More information

Evaluation of the backoff procedure of Homeplug MAC vs. DCF

Evaluation of the backoff procedure of Homeplug MAC vs. DCF Evaluation of the backoff procedure of Homeplug MAC vs. DCF Cristina Cano and David Malone Hamilton Institute National University of Ireland, Maynooth Co. Kildare, Ireland Email: {cristina.cano,david.malone}@nuim.ie

More information

Feasibility of using Vehicle s Power Line as a Communication Bus

Feasibility of using Vehicle s Power Line as a Communication Bus IVSS-24-ARC-5 Feasibility of using Vehicle s Power Line as a Communication Bus Praveen R. Ramteke, Aakash Arora and Syed Masud Mahmud Electrical and Computer Engineering Department, Wayne State University,

More information

Analysis of IEEE in a Power Line System

Analysis of IEEE in a Power Line System Analysis of IEEE 802.11 in a Power Line System TORSTEN LANGGUTH, MARKUS ZELLER, HELMUT STECKENBILLER, RUDI KNORR Fraunhofer Institute for Communication Systems Hansastraße 32, 80686 München, Germany Abstract:

More information

Performance of UMTS Radio Link Control

Performance of UMTS Radio Link Control Performance of UMTS Radio Link Control Qinqing Zhang, Hsuan-Jung Su Bell Laboratories, Lucent Technologies Holmdel, NJ 77 Abstract- The Radio Link Control (RLC) protocol in Universal Mobile Telecommunication

More information

Chapter 6 Medium Access Control Protocols and Local Area Networks

Chapter 6 Medium Access Control Protocols and Local Area Networks Chapter 6 Medium Access Control Protocols and Local Area Networks Part I: Medium Access Control Part II: Local Area Networks CSE 3213, Winter 2010 Instructor: Foroohar Foroozan Chapter Overview Broadcast

More information

Wireless Medium Access Control Protocols

Wireless Medium Access Control Protocols Wireless Medium Access Control Protocols Telecomunicazioni Undergraduate course in Electrical Engineering University of Rome La Sapienza Rome, Italy 2007-2008 Classification of wireless MAC protocols Wireless

More information

Packet multiple access and the Aloha protocol

Packet multiple access and the Aloha protocol Packet multiple access and the Aloha protocol Massachusetts Institute of Technology Department of Aeronautics and Astronautics Slide 1 Packet Multiple Access PMA SHARED UPLINK TERMINAL TERMINAL APPL TRANS

More information

Multiple-access protocols

Multiple-access protocols Multiple Access Multiple-access protocols Random Access MA CSMA CSMA/CD CSMA/CA RANDOM ACCESS In a random access method, each station has the right to the medium without being controlled by any other station.

More information

Data and Computer Communications

Data and Computer Communications Data and Computer Communications Chapter 16 High Speed LANs Eighth Edition by William Stallings Why High Speed LANs? speed and power of PCs has risen graphics-intensive applications and GUIs see LANs as

More information

Lecture 9 November 12, Wireless Access. Graduate course in Communications Engineering. University of Rome La Sapienza. Rome, Italy

Lecture 9 November 12, Wireless Access. Graduate course in Communications Engineering. University of Rome La Sapienza. Rome, Italy Lecture 9 November 12, 2018 Wireless Access Graduate course in Communications Engineering University of Rome La Sapienza Rome, Italy 2018-2019 Medium Access Control Scheduled access Classification of wireless

More information

Physical Layer. Medium Access Links and Protocols. Point-to-Point protocols. Modems: Signaling. Modems Signaling. Srinidhi Varadarajan

Physical Layer. Medium Access Links and Protocols. Point-to-Point protocols. Modems: Signaling. Modems Signaling. Srinidhi Varadarajan P Physical Layer Srinidhi Varadarajan Medium Access Links and Protocols Three types of links : point-to-point (single wire, e.g. PPP, SLIP) broadcast (shared wire or medium; e.g, Ethernet, Wavelan, etc.)

More information

ECE 4450:427/527 - Computer Networks Spring 2017

ECE 4450:427/527 - Computer Networks Spring 2017 ECE 4450:427/527 - Computer Networks Spring 2017 Dr. Nghi Tran Department of Electrical & Computer Engineering Lecture 5.4: Multiple Access Protocols Dr. Nghi Tran (ECE-University of Akron) ECE 4450:427/527

More information

Multiple Access Protocols

Multiple Access Protocols Multiple Access Protocols Computer Networks Lecture 2 http://goo.gl/pze5o8 Multiple Access to a Shared Channel The medium (or its sub-channel) may be shared by multiple stations (dynamic allocation) just

More information

Maximum Number of Users Which Can Be Served by TETRA Systems

Maximum Number of Users Which Can Be Served by TETRA Systems Maximum Number of Users Which Can Be Served by TETRA Systems Martin Steppler Aachen University of Technology Communication Networks Prof. Dr.-Ing. Bernhard Walke Kopernikusstr. 16 D-52074 Aachen Germany

More information

Data Link Layer: Collisions

Data Link Layer: Collisions Data Link Layer: Collisions 1 Multiple Access Data Link layer divided into two sublayers. The upper sublayer is responsible for datalink control, The lower sublayer is responsible for resolving access

More information

A RLC/MAC PROTOCOL ARCHITECTURE FOR A WIRELESS IP NETWORK

A RLC/MAC PROTOCOL ARCHITECTURE FOR A WIRELESS IP NETWORK A RLC/MAC PROTOCOL ARCHITECTURE FOR A WIRELESS IP NETWORK Jamil Y. Khan School of Electrical Engineering & Computer Science, University of Newcastle, Callaghan, NSW 238, Australia, jkhan@ecemail.newcastle.edu.au

More information

The MAC layer in wireless networks

The MAC layer in wireless networks The MAC layer in wireless networks The wireless MAC layer roles Access control to shared channel(s) Natural broadcast of wireless transmission Collision of signal: a /space problem Who transmits when?

More information

Performance Evaluation of Scheduling Mechanisms for Broadband Networks

Performance Evaluation of Scheduling Mechanisms for Broadband Networks Performance Evaluation of Scheduling Mechanisms for Broadband Networks Gayathri Chandrasekaran Master s Thesis Defense The University of Kansas 07.31.2003 Committee: Dr. David W. Petr (Chair) Dr. Joseph

More information

Lecture 4: Wireless MAC Overview. Hung-Yu Wei National Taiwan University

Lecture 4: Wireless MAC Overview. Hung-Yu Wei National Taiwan University Lecture 4: Wireless MAC Overview Hung-Yu Wei National Taiwan University Medium Access Control Topology 3 Simplex and Duplex 4 FDMA TDMA CDMA DSSS FHSS Multiple Access Methods Notice: CDMA and spread spectrum

More information

LANs Local Area Networks LANs provide an efficient network solution : To support a large number of stations Over moderately high speed

LANs Local Area Networks LANs provide an efficient network solution : To support a large number of stations Over moderately high speed Local Area Networks LANs provide an efficient network solution : To support a large number of stations Over moderately high speed With relatively small bit errors Multiaccess Protocols Communication among

More information

Multiple Access Communications. EEE 538, WEEK 11 Dr. Nail Akar Bilkent University Electrical and Electronics Engineering Department

Multiple Access Communications. EEE 538, WEEK 11 Dr. Nail Akar Bilkent University Electrical and Electronics Engineering Department Multiple Access Communications EEE 538, WEEK 11 Dr. Nail Akar Bilkent University Electrical and Electronics Engineering Department 1 Multiple Access Satellite systems, radio networks (WLAN), ethernet segment

More information

Chapter 1 Basic concepts of wireless data networks (cont d)

Chapter 1 Basic concepts of wireless data networks (cont d) Chapter 1 Basic concepts of wireless data networks (cont d) Part 2: Medium access methods for mobile data networks Sept 15 2004 1 Fixed assignment access schemes in voice-oriented networks Frequency division

More information

Topics. Link Layer Services (more) Link Layer Services LECTURE 5 MULTIPLE ACCESS AND LOCAL AREA NETWORKS. flow control: error detection:

Topics. Link Layer Services (more) Link Layer Services LECTURE 5 MULTIPLE ACCESS AND LOCAL AREA NETWORKS. flow control: error detection: 1 Topics 2 LECTURE 5 MULTIPLE ACCESS AND LOCAL AREA NETWORKS Multiple access: CSMA/CD, CSMA/CA, token passing, channelization LAN: characteristics, i basic principles i Protocol architecture Topologies

More information

ETSN01 Exam Solutions

ETSN01 Exam Solutions ETSN01 Exam Solutions March 014 Question 1 (a) See p17 of the cellular systems slides for a diagram and the full procedure. The main points here were that the HLR needs to be queried to determine the location

More information

CPSC 441 Tutorial-19. Department of Computer Science University of Calgary

CPSC 441 Tutorial-19. Department of Computer Science University of Calgary CPSC 441 Tutorial-19 Department of Computer Science University of Calgary Problem-1 Consider n nodes that use the slotted CSMA/ CD with binary exponential back-off to access a shared broadcast channel.

More information

Department of Electrical and Computer Systems Engineering

Department of Electrical and Computer Systems Engineering Department of Electrical and Computer Systems Engineering Technical Report MECSE-6-2006 Medium Access Control (MAC) Schemes for Quality of Service (QoS) provision of Voice over Internet Protocol (VoIP)

More information

Data Communications. Automatic Repeat Request Medium Access Control

Data Communications. Automatic Repeat Request Medium Access Control Data Communications Automatic Repeat Request Medium Access Control Handling Error Cases Automatic Repeat request(arq), also known as Automatic Repeat Query, is an error-control method ARQ uses acknowledgements

More information

CSMA based Medium Access Control for Wireless Sensor Network

CSMA based Medium Access Control for Wireless Sensor Network CSMA based Medium Access Control for Wireless Sensor Network H. Hoang, Halmstad University Abstract Wireless sensor networks bring many challenges on implementation of Medium Access Control protocols because

More information

Access Technologies! Fabio Martignon

Access Technologies! Fabio Martignon Access Technologies! Fabio Martignon 1 LAN Ethernet - IEEE 802.3 Broadcast Bus Capacity=10 Mb/s Xerox-Intel-Digital inventors Standardized at the beginning of the 80s as IEEE 802.3 Big Success and Several

More information

ACLASS of users that has drawn much attention over the

ACLASS of users that has drawn much attention over the 296 IEEE TRANSACTIONS ON BROADCASTING, VOL. 56, NO. 3, SEPTEMBER 2010 Statistical Multiplexing of Upstream Transmissions in DOCSIS Cable Networks César Heyaime-Duvergé and Vasant K. Prabhu, Life Fellow,

More information

COS 140: Foundations of Computer Science

COS 140: Foundations of Computer Science COS 140: Foundations of Computer Science ALOHA Network Protocol Family Fall 2017 Homework 2 Introduction 3 Network Protocols.......................................................... 3 Problem.................................................................

More information

Chapter 12 Multiple Access 12.1

Chapter 12 Multiple Access 12.1 Chapter 12 Multiple Access 12.1 Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. 12.2 Figure 12.1 Data link layer divided into two functionality-oriented sublayers

More information

CCM 4300 Lecture 5 Computer Networks, Wireless and Mobile Communications. Dr Shahedur Rahman. Room: T115

CCM 4300 Lecture 5 Computer Networks, Wireless and Mobile Communications. Dr Shahedur Rahman. Room: T115 CCM 4300 Lecture 5 Computer Networks, Wireless and Mobile Communications Dr Shahedur Rahman s.rahman@mdx.ac.uk Room: T115 1 Recap of Last Session Described the physical layer Analogue and Digital signal

More information

Broadband PLC Network Cross-Layer Simulation in Accordance with the IEEE P1901 Standard

Broadband PLC Network Cross-Layer Simulation in Accordance with the IEEE P1901 Standard http://dx.doi.org/10.5755/j01.eee.19.5.1440 ELEKTRONIKA IR ELEKTROTECHNIKA, ISSN 1392-1215, VOL. 19, NO. 5, 2013 Broadband PLC Network Cross-Layer Simulation in Accordance with the IEEE P1901 Standard

More information

Chapter 1 Introduction

Chapter 1 Introduction Emerging multimedia, high-speed data, and imaging applications are generating a demand for public networks to be able to multiplex and switch simultaneously a wide spectrum of data rates. These networks

More information

TSIN01 Information Networks Lecture 3

TSIN01 Information Networks Lecture 3 TSIN01 Information Networks Lecture 3 Danyo Danev Division of Communication Systems Department of Electrical Engineering Linköping University, Sweden September 10 th, 2018 Danyo Danev TSIN01 Information

More information

COMPUTER NETWORKS - Local area networks

COMPUTER NETWORKS - Local area networks Local area networks Telecommunication Networks Group firstname.lastname@polito.it http://www.telematica.polito.it/ COMPUTER NETWORKS LANs - 1 Copyright Quest opera è protetta dalla licenza Creative Commons

More information

Local area networks. Copyright

Local area networks. Copyright Local area networks Telecommunication Networks Group firstname.lastname@polito.it http://www.telematica.polito.it/ COMPUTER NETWORKS LANs - 1 Copyright Quest opera è protetta dalla licenza Creative Commons

More information

Expanding the use of CTS-to-Self mechanism to improving broadcasting on IEEE networks

Expanding the use of CTS-to-Self mechanism to improving broadcasting on IEEE networks Expanding the use of CTS-to-Self mechanism to improving broadcasting on IEEE 802.11 networks Christos Chousidis, Rajagopal Nilavalan School of Engineering and Design Brunel University London, UK {christos.chousidis,

More information

OPNET based Performance Evaluation of WIMAX Network with WIMAX Management using Different QoS

OPNET based Performance Evaluation of WIMAX Network with WIMAX Management using Different QoS Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 6, June 2014, pg.862

More information

Lecture 9: Bridging. CSE 123: Computer Networks Alex C. Snoeren

Lecture 9: Bridging. CSE 123: Computer Networks Alex C. Snoeren Lecture 9: Bridging CSE 123: Computer Networks Alex C. Snoeren Lecture 9 Overview Finishing up media access Ethernet Contention-free methods (rings) Moving beyond one wire Link technologies have limits

More information

Multiple Access Links and Protocols

Multiple Access Links and Protocols Multiple Access Links and Protocols Two types of links : point-to-point PPP for dial-up access point-to-point link between Ethernet switch and host broadcast (shared wire or medium) old-fashioned Ethernet

More information

MAC SIMULATOR FOR HYBRID TDMA/CDMA ACCESS NETWORKS

MAC SIMULATOR FOR HYBRID TDMA/CDMA ACCESS NETWORKS MAC SIMULATOR FOR HYBRID TDMA/CDMA ACCESS NETWORKS Danny Goderis, Rudy Hoebeke, Kristiaan Venken. Alcatel Corporate Research Center Department Access to Networks Francis Wellesplein 1, 2018 Antwerp, Belgium

More information

CABLE NETWORKS INTRODUCTION TO CABLE NETWORK TECHNOLOGIES AND PROTOCOLS

CABLE NETWORKS INTRODUCTION TO CABLE NETWORK TECHNOLOGIES AND PROTOCOLS CABLE NETWORKS INTRODUCTION TO CABLE NETWORK TECHNOLOGIES AND PROTOCOLS Peter R. Egli 1/15 Contents 1. Cable network architecture 2. Relevant cable network standards 3. DOCSIS 2/15 1. Cable Network architecture

More information

PROTOCOLS FOR HIGH-EFFICIENCY WIRELESS NETWORKS

PROTOCOLS FOR HIGH-EFFICIENCY WIRELESS NETWORKS PROTOCOLS FOR HIGH-EFFICIENCY WIRELESS NETWORKS PROTOCOLS FOR HIGH-EFFICIENCY WIRELESS NETWORKS by Alessandro Andreadis Giovanni Giambene KLUWER ACADEMIC PUBLISHERS NEW YORK, BOSTON, DORDRECHT, LONDON,

More information

IEEE 1901 HD-PLC (High Definition Power Line Communication) Abstract

IEEE 1901 HD-PLC (High Definition Power Line Communication) Abstract IEEE 1901 HD-PLC (High Definition Power Line Communication) Abstract The growing penetration of the internet throughout the society has also brought advantages to SOHOs and home networks. As networks develop,

More information

WiMAX Capacity Enhancement: Capacity Improvement of WiMAX Networks by Dynamic Allocation of Subframes

WiMAX Capacity Enhancement: Capacity Improvement of WiMAX Networks by Dynamic Allocation of Subframes WiMAX Capacity Enhancement: Capacity Improvement of WiMAX Networks by Dynamic Allocation of Subframes Syed R. Zaidi, Shahab Hussain, M. A. Ali Department of Electrical Engineering The City College of The

More information

2. Modelling of telecommunication systems (part 1)

2. Modelling of telecommunication systems (part 1) 2. Modelling of telecommunication systems (part ) lect02.ppt S-38.45 - Introduction to Teletraffic Theory - Fall 999 2. Modelling of telecommunication systems (part ) Contents Telecommunication networks

More information

CHAPTER 5 PROPAGATION DELAY

CHAPTER 5 PROPAGATION DELAY 98 CHAPTER 5 PROPAGATION DELAY Underwater wireless sensor networks deployed of sensor nodes with sensing, forwarding and processing abilities that operate in underwater. In this environment brought challenges,

More information

CS 716: Introduction to communication networks. - 8 th class; 17 th Aug Instructor: Sridhar Iyer IIT Bombay

CS 716: Introduction to communication networks. - 8 th class; 17 th Aug Instructor: Sridhar Iyer IIT Bombay CS 716: Introduction to communication networks - 8 th class; 17 th Aug 2011 Instructor: Sridhar Iyer IIT Bombay Key points to consider for MAC Types/Modes of communication: Although the medium is shared,

More information

Chapter - 1 INTRODUCTION

Chapter - 1 INTRODUCTION Chapter - 1 INTRODUCTION Worldwide Interoperability for Microwave Access (WiMAX) is based on IEEE 802.16 standard. This standard specifies the air interface of fixed Broadband Wireless Access (BWA) system

More information

University of Agder Department of Information and Communication Technology EXAM

University of Agder Department of Information and Communication Technology EXAM University of Agder Department of Information and Communication Technology EXAM Course code: IKT 444 Course title: Mobile Communication Networks Date: Tuesday, 6 th December 2016 Duration: 09:00 13:00

More information

Impact of IEEE MAC Packet Size on Performance of Wireless Sensor Networks

Impact of IEEE MAC Packet Size on Performance of Wireless Sensor Networks IOSR Journal of Electronics and Communication Engineering (IOSR-JECE) e-issn: 2278-2834,p- ISSN: 2278-8735.Volume 10, Issue 3, Ver. IV (May - Jun.2015), PP 06-11 www.iosrjournals.org Impact of IEEE 802.11

More information

ETSN01 Exam. August 22nd am 1pm. Clearly label each page you hand in with your name and the page number in the bottom right hand corner.

ETSN01 Exam. August 22nd am 1pm. Clearly label each page you hand in with your name and the page number in the bottom right hand corner. ETSN01 Exam August 22nd 2015 8am 1pm Instructions Clearly label each page you hand in with your name and the page number in the bottom right hand corner. Materials allowed: calculator, writing material.

More information

The Effect of Code-Multiplexing on the High Speed Downlink Packet Access (HSDPA) in a WCDMA Network

The Effect of Code-Multiplexing on the High Speed Downlink Packet Access (HSDPA) in a WCDMA Network The Effect of Code-Multiplexing on the High Speed Downlink Packet Access (HSDPA) in a WCDMA Network Raymond Kwan, Peter H. J. Chong 2, Eeva Poutiainen, Mika Rinne Nokia Research Center, P.O. Box 47, FIN-45

More information

Performance Challenge of 3G over Satellite Methods for Increasing Revenue & Quality of Experience. February 2018

Performance Challenge of 3G over Satellite Methods for Increasing Revenue & Quality of Experience. February 2018 Performance Challenge of 3G over Satellite Methods for Increasing Revenue & Quality of Experience February 2018 Mobile telephony has been in existence for over 40 years. The first generation (1G) developed

More information

Communication and Networks. Problems

Communication and Networks. Problems Electrical and Information Technology Communication and Networks Problems Link Layer 2016 Problems 1. Consider a network applying a slotted Aloha access system. The assumption for this is that all nodes

More information

Media Access Control (MAC) Sub-layer and Ethernet

Media Access Control (MAC) Sub-layer and Ethernet Media Access Control (MAC) Sub-layer and Ethernet Dr. Sanjay P. Ahuja, Ph.D. Fidelity National Financial Distinguished Professor of CIS School of Computing, UNF MAC Sub-layer The MAC sub-layer is a sub-layer

More information

Outline. Introduction to Networked Embedded Systems - Embedded systems Networked embedded systems Embedded Internet - Network properties

Outline. Introduction to Networked Embedded Systems - Embedded systems Networked embedded systems Embedded Internet - Network properties Outline Introduction to Networked Embedded Systems - Embedded systems Networked embedded systems Embedded Internet - Network properties Layered Network Architectures - OSI framework descriptions of layers

More information

CDMA-Based MAC Protocol for Wireless Ad Hoc Networks

CDMA-Based MAC Protocol for Wireless Ad Hoc Networks CDMA-Based MAC Protocol for Wireless Ad Hoc Networks Alaa Muqattash and Marwan Krunz Presented by: Habibullah Pagarkar for 600.647-Advanced Topics in Wireless Networks. JHU. Spring 04 Today s Presentation

More information

Strengthening Unlicensed Band Wireless Backhaul

Strengthening Unlicensed Band Wireless Backhaul be in charge Strengthening Unlicensed Band Wireless Backhaul Use TDD/TDMA Based Channel Access Mechanism WHITE PAPER Strengthening Unlicensed Band Wireless Backhaul: Use TDD/TDMA Based Channel Access Mechanism

More information

G 364: Mobile and Wireless Networking. CLASS 2, Wed. Jan Stefano Basagni Spring 2004 M-W, 11:40am-1:20pm, 109 Rob

G 364: Mobile and Wireless Networking. CLASS 2, Wed. Jan Stefano Basagni Spring 2004 M-W, 11:40am-1:20pm, 109 Rob G 364: Mobile and Wireless Networking CLASS 2, Wed. Jan 7 2004 Stefano Basagni Spring 2004 M-W, 11:40am-1:20pm, 109 Rob Wireless Issues Architecture, communication model and duplexing define the framework

More information

Fluctuation Request: A Fast Retransmission Scheme in Power Line Communication Network

Fluctuation Request: A Fast Retransmission Scheme in Power Line Communication Network 34 JOURNAL OF COMMUNICATIONS, VOL. 4, NO. 1, FEBRUARY 2009 Fluctuation Request: A Fast Retransmission Scheme in Power Line Communication Network Jianfeng Chen Corporate Research, Thomson, Beijing, CHINA

More information

Acknowledgement Technique in Communication Network

Acknowledgement Technique in Communication Network International Journal of Electronics and Communication Engineering. ISSN 0974-2166 Volume 4, Number 2 (2011), pp. 177-188 International Research Publication House http://www.irphouse.com Acknowledgement

More information

ENGI 4557 Digital Communications Practice Problems 2017 (Part 2)

ENGI 4557 Digital Communications Practice Problems 2017 (Part 2) ENGI 4557 Digital Communications Practice Problems 207 (Part 2) H = n p i log 2 ( ) p i C = W log 2 ( + S N ) SNR = 6m + 0 log 0 ( 3σ2 x V ) 2 SNR = 6m 0 ( ) n n! = k k!(n k)! x = σ 2 = + + x p(x)dx (x

More information

Lecture 12 December 04, Wireless Access. Graduate course in Communications Engineering. University of Rome La Sapienza. Rome, Italy

Lecture 12 December 04, Wireless Access. Graduate course in Communications Engineering. University of Rome La Sapienza. Rome, Italy Lecture 12 December 04, 2017 Wireless Access Graduate course in Communications Engineering University of Rome La Sapienza Rome, Italy 2017-2018 Random Medium Access Control Part II - CSMA and Collision

More information

Multimedia Systems. Networks WS 2009/2010

Multimedia Systems. Networks WS 2009/2010 Multimedia Systems WS 2009/2010 Networks Prof. Dr. Paul Müller University of Kaiserslautern, Germany Integrated Communication Systems Lab Email: pmueller@informatik.uni-kl.de 1 Outline Network basics for

More information

Transport Performance Evaluation of an ATM-based UMTS Access Network

Transport Performance Evaluation of an ATM-based UMTS Access Network Transport Performance Evaluation of an -based US Access Network Nikos H. Loukas, Christos K. Xenakis, Lazaros Merakos University of Athens, Department of Informatics, Communication Networks Laboratory

More information

The IEEE WirelessMAN Standard for Broadband Wireless Metropolitan Area Networks

The IEEE WirelessMAN Standard for Broadband Wireless Metropolitan Area Networks The IEEE WirelessMAN Standard for Broadband Wireless Metropolitan Area Networks ITU-APT Regional Seminar Busan, Republic of Korea 10 Sept 2004 Ken Stanwood CEO, Cygnus Multimedia Communications Vice-Chair,

More information

Initial PHY Layer System Proposal for Sub 11 GHz BWA

Initial PHY Layer System Proposal for Sub 11 GHz BWA Initial PHY Layer System Proposal for Sub 11 GHz BWA Document Number: 802.16.3p-00/40 Date Submitted: 2000-11-08 Source: Anader Benyamin-Seeyar Voice: (514) 822-2014 Harris Corporation Inc. Fax: (514)

More information

Link Layer and LANs 안상현서울시립대학교컴퓨터 통계학과.

Link Layer and LANs 안상현서울시립대학교컴퓨터 통계학과. Link Layer and LANs 안상현서울시립대학교컴퓨터 통계학과 ahn@venus.uos.ac.kr Data Link Layer Goals: understand principles behind data link layer services: error detection, correction sharing a broadcast channel: multiple

More information

Direct Link Communication II: Wired Media. Multi-Access Communication

Direct Link Communication II: Wired Media. Multi-Access Communication Direct Link Communication II: Wired Media Multi-Access Communication Two classes: contention-based e.g., CSMA/CD, CSMA/CA used in Ethernet, WLAN contention-free e.g., TDM, FDM, TDMA, CDMA, token ring used

More information

A QoS Architecture for IDMA-based Multi-service Wireless Networks

A QoS Architecture for IDMA-based Multi-service Wireless Networks A QoS Architecture for IDMA-based Multi-service Wireless Networks Qian Huang, Sammy Chan, King-Tim Ko, Li Ping, and Peng Wang Department of Electronic Engineering, City University of Hong Kong Kowloon,

More information

Mobile Broadband Comparison. CDMA Development Group March 2008

Mobile Broadband Comparison. CDMA Development Group March 2008 Mobile Broadband Comparison CDMA Development Group March 2008 Assumptions and Notes for the Technology Comparison This document compares the performance of existing and future mobile communications systems

More information

Long Distance Wireless Communication. Principally satellite communication:

Long Distance Wireless Communication. Principally satellite communication: Long Distance Wireless Communication Principally satellite communication: Uplink/Downlink Footprint LOS (line of sight) communication satellite base station is relay Effective for broadcast Limited bandwidth

More information

original standard a transmission at 5 GHz bit rate 54 Mbit/s b support for 5.5 and 11 Mbit/s e QoS

original standard a transmission at 5 GHz bit rate 54 Mbit/s b support for 5.5 and 11 Mbit/s e QoS IEEE 802.11 The standard defines a wireless physical interface and the MAC layer while LLC layer is defined in 802.2. The standardization process, started in 1990, is still going on; some versions are:

More information

MC-CDMA Based IEEE Wireless LAN

MC-CDMA Based IEEE Wireless LAN MC-CDMA Based IEEE 802.11 Wireless LAN Georgios Orfanos Jörg Habetha Ling Liu Aachen Univ. of Technology D-52074 Aachen, Germany Philips Research Laboratories, D-52066 Aachen, Germany Aachen Univ. of Technology

More information

Multiple Access Links and Protocols

Multiple Access Links and Protocols Multiple Access Links and Protocols Two types of links : point-to-point PPP for dial-up access point-to-point link between Ethernet switch and host broadcast (shared wire or medium) old-fashioned Ethernet

More information

ECSE-4670: Computer Communication Networks (CCN) Informal Quiz 3

ECSE-4670: Computer Communication Networks (CCN) Informal Quiz 3 ECSE-4670: Computer Communication Networks (CCN) Informal Quiz 3 : shivkuma@ecse.rpi.edu Biplab Sikdar: sikdab@rpi.edu 1 T F Slotted ALOHA has improved utilization since the window of vulnerability is

More information

Performance of DSMA/CD in CDPD Networks

Performance of DSMA/CD in CDPD Networks Performance of DSMA/CD in CDPD Networks Riikka Susitaival Networking Laboratory, Helsinki University of Technology Email: Riikka.Susitaival@hut.fi November 23, 2002 Abstract Cellular Digital Packet Data

More information