Introduction to CDMA ALOHA. 3. Access Control Techniques for CDMA ALOHA
|
|
- Elaine O’Connor’
- 6 years ago
- Views:
Transcription
1 Introduction to CDMA ALOHA 3. Access Control Techniques for CDMA ALOHA Takaya Yamazato Center for Information Media Studies, Nagoya University Nagoya , Japan
2 CDMA ALOHA CDMA ALOHA Soft Capacity High spectral efficiency Simultaneous transmission Robustness against interference and distortion Flexibility for multimedia CDMA ALOHA Preserving good features of CDMA and ALOHA + High throughput Fundamental protocol Random access Simplicity Random access Simultaneous packet transmission High throughput performance Flexible transmission of multimedia signal
3 Why Access Control? Control Signal Hubstation Normalized throughput S/N CDMA U-ALOHA Pure ALOHA N= Eb/No= [db] L=500 [bits] CDMA ALOHA Packet transmission accoding to the information broadcasted from the hubstation Normalized offered load G/N Improvement of maximum throughput No degradation of throughput in high offered traffic load
4 Channel load Control Signal t Power spectral density Hubstation How? f X Difficulty of carrier sensing by each user due to the low peak power transmission. X Fluctuation of channel load during a packet transmission CDMA ALOHA Low peak power transmission of CDMA signal D A little throughput improvement by slotted system
5 Access Control for CDMA ALOHA Channel load Control Signal CDMA ALOHA t Hubstation Fluctuation of channel load 1 Access control protocol should be based on the channel load status observed by hub-station 2 Packet access should be accomplished in accordance with control signal broadcast from hub-station 3 CDMA Unslotted ALOHA (CDMA U-ALOHA) is an appropriate candidate
6 Access Timing Delay Control Signal Satellite CDMA ALOHA Time difference between channel load sensing and associated packet access timing Channel load Hub sensing station User station Control signal Packet transmission Propagation Propagation delay delay Process delay Remarkable in satellite communication system GEO : 0.50 [sec] LEO : 0.02 [sec]
7 Access Control for CDMA ALOHA Transmission access control protocol 1. Channel load sensing protocol (CLSP) 2. Modified CLSP Retransmission control protocol 3. Packet retransmission control (PRC) Transmission and retransmission control protocol 4. Optimum access control protocol (OACP) CDMA Unslotted ALOHA systems with buffers
8 System Model X X X Contol signal PN PN 1 1 CDMA ALOHA PN 1 X CDMA ALOHA PN 1 Hubstation CDMA ALOHA + AWGN Centralized single-hop network DS/SS modulated packet Poisson generation of packet Equal power reception G : Offered load L : Fixed packet length [bit] BER -- see (2.1)
9 Transmission Control Protocol Control Signal CDMA ALOHA Hubstation Packet transmission accoding to the information broadcasted from the hubstation Packet transmission is controlled by Hubstation 1. Channel load sensing protocol (CLSP) 2. Modified CLSP
10 Channel Load Sensing Protocol (CLSP) Channel load CDMA ALOHA Permission or Rejection CDMA ALOHA CDMA ALOHA CDMA ALOHA Fluctuation of channel load threshold a t Hubstation Hub-station observes the channel load, actual number of on-going packets According to the channel load, the information of permission or prohibition is broadcasted. Users transmit according to such information. Channel load is always kept less than or equal to the threshold, a.
11 Throughput of CDMA ALOHA with CLSP Throughput S without CLSP N=60 L=500 [bits] Eb/No=10 [db] Offered load G with CLSP a = Significant improvement in throughput No degradation in high offered load Throughput depends on threshold, a
12 Access Timing Delay Packet Transmission Packet Transmission Hub Station User Station Propagation Delay Process Delay Propagation Delay Process Delay Access Timing Delay Time difference between channel load sensing and associated packet access timing t D : Access timing delay normalized by packet duration GEO : t D = 9.20 LEO : t D = 0.26 L=500 [bit] R=9,600 [bps]
13 Throughput Degradation of CLSP Throughput S N=60 L=500 [bits] Eb/No=10 [db] a=9 td=0 without CLSP (no access timing delay) td =0.1 td =0.26 (LEO) Severe degradation in the presence of access timing delay 2 1 td =9.2 (GEO) td= Offered load G
14 Throughput S N=60 L=500 [bits] Eb/No=10 [db] a=9 Throughput Degradation of CLSP Packet Transmission td=9.2 (GEO) td=0 without CLSP Offered load G Propagation Delay Process Delay Propagation Delay Process Delay Packet Transmission Hub Station User Station (no access timing delay) td=1 Access Timing Delay td=0.1 td=0.26 (LEO) In the presence of access timing delay, since the packet access control is done by the past information, the throughput would degrade Access control based not on instantaneous channel load but on average channel load
15 Estimation of G Channel load CDMA ALOHA Ptr CDMA ALOHA CDMA ALOHA CDMA ALOHA Fluctuation of channel load Calculation of Ptr Hubstation User transmit his packet with Ptr, or stops transmitting its packet with 1-Ptr Modified CLSP t Broadcast Ptr Hub-station estimate the offered traffic load, G. According to the estimated G, the hub-station broadcast the probability, Ptr. Ptr is obtained so that actual offered load is set to the value which gains the maximum throughput. User transmits his packets according to Ptr
16 Throughput of CDMA ALOHA with MCLSP Throughput S N=60 L=500 [bits] Eb/No=10 [db] Analysis Simulation td =0.26 (LEO) td =9.2 (GEO) ts =10 ts =1 No access control Maximum throughput is the same as one without access control. Robustness against access timing delay Gmax Offered load G
17 Retransmission Control Protocol Transmission Hub station User station X X Packet error Packet transmission Hubstation Control signal Delay Retransmission control signal Delay Retransmission Packet retransmission If packet error occurs, a user schedules the packet at a later time according to a delay distribution This distribution is calculated and broadcast by a hub-station 3. Packet retransmission control (PRC)
18 Packet Retransmission Control (PRC) G 0 originating mode success fail success fail retransmission mode Transition of users between the originating mode and retransmission mode Transmission X Hubstation Control signal Delay G r Retransmission Appropriate distribution of delay is calculated and broadcast The distribution is obtained by a observation of channel load PRC is equivalent to a control of retransmission offered load, Gr time
19 Throughput of CDMA ALOHA with PRC Throughput S Gr=25 Gr=Go N=60 L=500 [bits] Eb/No=10 [db] Offered load of new packet Go Gr=15 PRC Gr=5 Maximum throughput is the same as one without access control. Throughput is almost same as MCLSP Robustness against access timing delay
20 What is the optimum access control? Channel Load Sensing Protocol (CLSP) Higher throughput Weakness to access timing delay Modified CLSP (MCLSP) Robustness against access timing delay No gain in maximum throughput Packet Retransmission Control (PRC) Robustness against access timing delay No gain in maximum throughput?
21 Transmission control signal Optimal Access Control Protocol (OACP) Transmission OACP CLSP+PRC Hubstation If packet error occurred Retransmission control signal Retransmission CLSP : O Improvement in maximum throughput X Weakness against access timing delay PRC : O Robust against access timing delay X No improvement in maximum throughput CLSP + PRC = Optimum
22 Optimal Access Control Protocol (OACP) New Packets Offered Load Go Is the channel load less than a? Yes CDMA Unslotted ALOHA Channel Retransmitted Packets Transmitted with Pre Retransmission Control Successful Packets No Tramsmission Control Random Retransmission Delay Unsuccessful Packets Hub-station estimate the offered traffic load, G. If the channel load is below a, then packet transmission is allowed. Otherwise, the users move into retransmission mode (CLSP). Backlogged packet is controlled according to the retransmission probability broadcast from the hubstation (PRC).
23 Throughput of CDMA ALOHA with PRC Throughput S N=60 L=500 [bits] Eb/No=10 [db] OACP CLSP w/o Access Control td =0.1 td =0.26 (LEO) td= Offered load of new packet Go Maximum throughput is the same as CLSP if access timing delay is negligible Robustness against access timing delay
24 Delay performance of CDMA ALOHA with OACP 160 Delay D N=60 L=500 [bits] Eb/No=10 [db] K=1000 OACP td=0 =0.1 =0.26 =1 = Offered load of new packet Go
25 CDMA Unslotted ALOHA with Buffers Each user is equipped with a certain size of queueing.... CDMA ALOHA with Buffer CDMA ALOHA Channel Hubstation buffers. Retransmission packet can be managed by each of users. Autonomous control of packet transmission may be possible.
26 CDMA Unslotted ALOHA with Buffers Each user is equipped with a finite buffer l Full buffer? Yes Rejection No Yes Busy mode Busy? No Idle mode p Transmission to the channel capacity of B packets. Packet arriving at an idle status is transmitted Correct reception Incorrect reception immediately. Removal Retransmission p Packets are served in a first-in-first-out (FIFO) Schematic of packet flow at each user station discipline. Busy user attempt to transmit packet with rate p.
27 Throughput of CDMA U-ALOHA with Buffers 6 The larger buffer 5 size a user has, the more rapidly Throughput S line:analysis dot:simulation B= N=60 Eb/No=10dB K=100 L=500 p=0.1 the throughput is increasing. Throughput is almost same as MCLSP or PRC Offered load G
28 Rejection probability Q R line:analysis dot:simulation Rejection Probability B= N=60 Eb/No=10dB K=100 L=500 p= Offered load of new packet Go X If a packet arrives at a user with a full buffer, this packet is rejected The larger buffer size a user has, the less rejection probability is
29 Delay Performance Average delay D N=60 Eb/No=10dB K=100 L=500 p=0.1 line:analysis dot:simulation B=5 B=4 B=3 B=2 B= Offered load of new packet Go The number of busy user increases by increasing the buffer size. Average delay increases in compensation for reduction of the rejection of packet transmission.
30 CDMA ALOHA for Multimedia signals voice data + voice data Hubstation voice data control signal signal data + voice User-Station Different media which have different characteristics are handled simultaneously CDMA is suitable for handling multimedia signal Multi-rate CDMA Multi-code CDMA Access control for multimedia signals 1 Integrated voice and data system 2 High and low bit rate data transmission
31 1. Integrated Voice and Data System Voice : Real time delivery Circuit switch mode (Reservation mode) Voice users have to reserve the channel before they transmit their signals by sending a reservation packet. Once they get the reservation, they continue to transmit their signal until voice call ends. If the number of simultaneous established users reaches to a certain threshold, voice users cannot access to get the reservation. Data : Some tolerance to transmission delay Packet switch mode Data users transmit thier packets on the CDMA Unslotted ALOHA.
32 Integrated CDMA Voice Signal & CDMA Data Packet (CDMA unslotted ALOHA)... Number of server = a time The channels reserved for voice users The channels ocupied by data pakets The available channels for additional voice and data users Channel load status seen at hubstation Interference from both media Priority of voice medium (continuous voice call until call ends) Necessity of traffic control
33 System Model user 1 (voice) user 2 (data) user.. (data) PN sequence 2 user.. (voice) user K (voice) Random signature CLSP Control Signal Hub Station Data packet : CDMA Unslotted ALOHA Voice signal : Circuit Switch Total bandwidth W = 20MHz Band expansion factor N = 312 (=W/R) Voice signal : Poisson generation Bit rate : R = 32k [bps] Exponential signal length Length 60.0 [sec] Silence period 1.7 [sec] Talk spurt 1.0 [sec] Data packet : Poisson generation Bit rate : R = 32k [bps] Fixed packet length L = 500 [bit] (0.01 [sec])
34 Traffic Control for Voice and Data Media The number of simultaneous voice and data signals, k a : Threshold for data packet b : Threshold of voice signal b a voice user can access to the channel Data packet users can access to the channel 0 Why b> a? The required signal quality of voice < that of data packet The signal quality must be guaranteed for voice signals
35 Mean Number of Voice Call The mean number of voice calls Threshold b =98 (Pb(b)<10-3 ) N =312 Eb/N0= V.A rate = 0.4 No data packet Gd=0 without V.A with V.A Voice activity (V.A) improves the number of simultaneous call. Access control by counting the number of talk spurt of voice signal Voice Offered Load, Gv
36 Data Throughput Throughput for Data Gv=20 Gv=10 with V.A no V.A N =312 Eb/N0= V.A rate = Data Offered Load, Gd Without access control Data throughput S Consideration of V.A No consideration of V.A N =312 Eb/N0= V.A rate = 0.4 Erlang capacity for voice Er = 40 (= Maxinum Gv) Data offered load Gd With access control
37 2. High and Low Bit Rate Data Transmission Class I : High-bit-rate packet Class II: Low-bit-rate packet Class I Control Signal Hubstation Multi-rate CDMA system O Multi-code Multi-processing gain Multi-modulation Class II Multi-code CDMA + CDMA ALOHA Low bit rate High bit rate MC-CDMA ALOHA
38 System Model High bit rate Source M.R b Low bit rate Transmitter of Class I Sub-stream (Sub-packet) L [bits] M Sub-packets transmitted in one sub-packet duration M Transmitter of Class II: Conventional CDMA Slotted ALOHA Transmitter b Class I : Poisson generation Bit rate MRb [bit/sec] Fixed packet length MLb [bits] Class II: Poisson generation Bit rate Rb [bit/sec] Fixed packet length Lb [bits] Class I has priority over Class II
39 Channel Status at Hubstation 1 2 M One sub-packet One packet from class II (CDMA) 1 2 M One packet from class I (MC-CDMA) Slot Slot Slot Time
40 Throughput performances I Throughput, S I S I When M=1 (Single bit rate) When M=8 Eb/N0 = N=128 L b =500 bits G 2 =10 S I When M=16 S I Total throughput, S tot = S 1 + S S tot When M=1 (SIngle bit rate ) Eb/N0 = N=128 L b =500 bits G 2 =10 S tot When M=8 with MCLSP S tot When M=8 (without MCLSP) Offered load of class I, G1 MC-CDMA Slotted ALOHA (Only class I user) Total offered load, G tot = G 1 + G 2 MC-CDMA Slotted ALOHA with MCLSP (class I and II)
41 Conclusions Fundamentals of CDMA ALOHA Throughput analysis of CDMA ALOHA CDMA ALOHA v.s. Narrow Band ALOHA Access control techniques for CDMA ALOHA CLSP, MCLSP, PRC, OACP CDMA ALOHA with Buffers Multimedia signal transmission using CDMA ALOHA Integrated voice and data system Multi-rate transmission using MC-CDMA
Multiple Access Communications. EEE 538, WEEK 11 Dr. Nail Akar Bilkent University Electrical and Electronics Engineering Department
Multiple Access Communications EEE 538, WEEK 11 Dr. Nail Akar Bilkent University Electrical and Electronics Engineering Department 1 Multiple Access Satellite systems, radio networks (WLAN), ethernet segment
More informationPacket multiple access and the Aloha protocol
Packet multiple access and the Aloha protocol Massachusetts Institute of Technology Department of Aeronautics and Astronautics Slide 1 Packet Multiple Access PMA SHARED UPLINK TERMINAL TERMINAL APPL TRANS
More informationPower Laws in ALOHA Systems
Power Laws in ALOHA Systems E6083: lecture 7 Prof. Predrag R. Jelenković Dept. of Electrical Engineering Columbia University, NY 10027, USA predrag@ee.columbia.edu February 28, 2007 Jelenković (Columbia
More informationRandom Assignment Protocols
Random Assignment Protocols Random assignment strategies attempt to reduce problem occur in fixed assignment strategy by eliminating pre allocation of bandwidth to communicating nodes. Random assignment
More informationTSIN01 Information Networks Lecture 3
TSIN01 Information Networks Lecture 3 Danyo Danev Division of Communication Systems Department of Electrical Engineering Linköping University, Sweden September 10 th, 2018 Danyo Danev TSIN01 Information
More informationPerformance Analysis of DS/SSMA Unslotted ALOHA System With Variable Length Data Traffic
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 19, NO. 11, NOVEMBER 2001 2215 Performance Analysis of DS/SSMA Unslotted ALOHA System With Variable Length Data Traffic Jae-Woo So, Student Member,
More informationCOMPUTER NETWORK Model Test Paper
Model Test Paper Question no. 1 is compulsory. Attempt all parts. Q1. Each question carries equal marks. (5*5 marks) A) Difference between Transmission Control Protocol (TCP) and User Datagram Protocol.
More informationRandom Access. 1. Aloha. 2. Slotted Aloha 3. CSMA 4. CSMA/CD
Random Access 1. Aloha 2. Slotted Aloha 3. CSMA 4. CSMA/CD Background Communication medium B No Collision collision A C Modern Local Area Networks (LANs) operate as follows Users are connected to communication
More informationCHAPTER 5 PROPAGATION DELAY
98 CHAPTER 5 PROPAGATION DELAY Underwater wireless sensor networks deployed of sensor nodes with sensing, forwarding and processing abilities that operate in underwater. In this environment brought challenges,
More informationSimulated SA Throughput vs. p
Problem 1. Simulation of Slotted Aloha network (A) There are n stations in the network that are trying to transmit messages to an access point. (B) All the stations are synchronized and they are using
More informationON PERFORMANCE ANALYSIS OF CDMA UNSLOTTED ALOHA SYSTEM WITH BURST RESERVATION
ON PERFORMANCE ANALYSIS OF CDMA UNSLOTTED ALOHA SYSTEM WITH BURST RESERVATION Jae-Woo So, I1 Han, Byung-Cheol Shin, and Dong-Ho Cho Department of Electrical Engineering Korea Advanced Institute of Science
More informationChapter 1 Basic concepts of wireless data networks (cont d)
Chapter 1 Basic concepts of wireless data networks (cont d) Part 2: Medium access methods for mobile data networks Sept 15 2004 1 Fixed assignment access schemes in voice-oriented networks Frequency division
More informationMarkov Chains and Multiaccess Protocols: An. Introduction
Markov Chains and Multiaccess Protocols: An Introduction Laila Daniel and Krishnan Narayanan April 8, 2012 Outline of the talk Introduction to Markov Chain applications in Communication and Computer Science
More informationMultiple Access Protocols
Multiple Access Protocols Computer Networks Lecture 2 http://goo.gl/pze5o8 Multiple Access to a Shared Channel The medium (or its sub-channel) may be shared by multiple stations (dynamic allocation) just
More informationMultiple Access (1) Required reading: Garcia 6.1, 6.2.1, CSE 3213, Fall 2010 Instructor: N. Vlajic
1 Multiple Access (1) Required reading: Garcia 6.1, 6.2.1, 6.2.2 CSE 3213, Fall 2010 Instructor: N. Vlajic Multiple Access Communications 2 Broadcast Networks aka multiple access networks multiple sending
More informationCHAPTER 3 EFFECTIVE ADMISSION CONTROL MECHANISM IN WIRELESS MESH NETWORKS
28 CHAPTER 3 EFFECTIVE ADMISSION CONTROL MECHANISM IN WIRELESS MESH NETWORKS Introduction Measurement-based scheme, that constantly monitors the network, will incorporate the current network state in the
More informationECE 4450:427/527 - Computer Networks Spring 2017
ECE 4450:427/527 - Computer Networks Spring 2017 Dr. Nghi Tran Department of Electrical & Computer Engineering Lecture 5.4: Multiple Access Protocols Dr. Nghi Tran (ECE-University of Akron) ECE 4450:427/527
More informationMobile Communications Chapter 3 : Media Access
Mobile Communications Chapter 3 : Media Access 2. Motivation 3. SDMA, FDMA, TDMA 1. Aloha and contention based schemes 4. Reservation schemes 5. Collision avoidance, MACA 6. Polling CDMA (Lecture 6) Prof.
More informationLecture 19. Principles behind data link layer services Framing Multiple access protocols
Link Layer Lecture 19 Principles behind data link layer services Framing Multiple access protocols ALOHA *The slides are adapted from ppt slides (in substantially unaltered form) available from Computer
More informationUnavoidable Constraints and Collision Avoidance Techniques in Performance Evaluation of Asynchronous Transmission WDMA Protocols
1th WEA International Conference on COMMUICATIO, Heraklion, reece, July 3-5, 8 Unavoidable Constraints and Collision Avoidance Techniques in Performance Evaluation of Asynchronous Transmission WDMA Protocols
More informationChapter 6 Medium Access Control Protocols and Local Area Networks
Chapter 6 Medium Access Control Protocols and Local Area Networks Part I: Medium Access Control Part II: Local Area Networks CSE 3213, Winter 2010 Instructor: Foroohar Foroozan Chapter Overview Broadcast
More informationIntelligent Transportation Systems. Medium Access Control. Prof. Dr. Thomas Strang
Intelligent Transportation Systems Medium Access Control Prof. Dr. Thomas Strang Recap: Wireless Interconnections Networking types + Scalability + Range Delay Individuality Broadcast o Scalability o Range
More informationNMA Radio Networks Network Level: Medium Access Control Roberto Verdone
NMA Radio Networks Network Level: Medium Access Control Roberto Verdone Outline 1. Introduction 2. Fundamentals of Random MAC Aloha in Compact Networks Slotted Aloha in Compact Networks CSMA in Compact
More informationData Link Layer: Collisions
Data Link Layer: Collisions 1 Multiple Access Data Link layer divided into two sublayers. The upper sublayer is responsible for datalink control, The lower sublayer is responsible for resolving access
More informationMultimedia Communication Services Traffic Modeling and Streaming
Multimedia Communication Services Traffic Modeling and Streaming Medium Access Control algorithms Introduction and details on Aloha networks with infinite nodes Università degli Studi di Brescia A.A. 2014/2015
More informationMultiple Access Links and Protocols
Multiple Access Links and Protocols Two types of links : point-to-point PPP for dial-up access point-to-point link between Ethernet switch and host broadcast (shared wire or medium) old-fashioned Ethernet
More informationHigh Level View. EE 122: Ethernet and Random Access protocols. Medium Access Protocols
High Level View EE 122: Ethernet and 802.11 Ion Stoica September 18, 2002 Goal: share a communication medium among multiple hosts connected to it Problem: arbitrate between connected hosts Solution goals:
More informationECEN 5032 Data Networks Medium Access Control Sublayer
ECEN 5032 Data Networks Medium Access Control Sublayer Peter Mathys mathys@colorado.edu University of Colorado, Boulder c 1996 2005, P. Mathys p.1/35 Overview (Sub)networks can be divided into two categories:
More informationBridging Link Power Asymmetry in Mobile Whitespace Networks Sanjib Sur and Xinyu Zhang
Bridging Link Power Asymmetry in Mobile Whitespace Networks Sanjib Sur and Xinyu Zhang University of Wisconsin - Madison 1 Wireless Access in Vehicles Wireless network in public vehicles use existing infrastructure
More informationECSE-4670: Computer Communication Networks (CCN) Informal Quiz 3
ECSE-4670: Computer Communication Networks (CCN) Informal Quiz 3 : shivkuma@ecse.rpi.edu Biplab Sikdar: sikdab@rpi.edu 1 T F Slotted ALOHA has improved utilization since the window of vulnerability is
More informationCoverage & Capacity in Hybrid Wideband Ad-hoc/cellular Access System. Results & Scenarios. by Pietro Lungaro
Coverage & Capacity in Hybrid Wideband Ad-hoc/cellular Access System Results & Scenarios by Pietro Lungaro Agenda Problem Statement System Assumptions Results Threats Problem Statement Design a possible
More informationIntroduction. The fundamental purpose of data communications is to exchange information between user's computers, terminals and applications programs.
Introduction The fundamental purpose of data communications is to exchange information between user's computers, terminals and applications programs. Simplified Communications System Block Diagram Intro-1
More informationNetwork Media and Layer 1 Functionality
Network Media and Layer 1 Functionality BSAD 146 Dave Novak Dean, Chapter 3, pp 93-124 Objectives Introduction to transmission media Basic cabling Coaxial Twisted pair Optical fiber Basic wireless (NIC)
More informationWireless Medium Access Control Protocols
Wireless Medium Access Control Protocols Telecomunicazioni Undergraduate course in Electrical Engineering University of Rome La Sapienza Rome, Italy 2007-2008 Classification of wireless MAC protocols Wireless
More informationCS 43: Computer Networks. 27: Media Access Contd. December 3, 2018
CS 43: Computer Networks 27: Media Access Contd. December 3, 2018 Last Class The link layer provides lots of functionality: addressing, framing, media access, error checking could be used independently
More informationPhysical Layer. Medium Access Links and Protocols. Point-to-Point protocols. Modems: Signaling. Modems Signaling. Srinidhi Varadarajan
P Physical Layer Srinidhi Varadarajan Medium Access Links and Protocols Three types of links : point-to-point (single wire, e.g. PPP, SLIP) broadcast (shared wire or medium; e.g, Ethernet, Wavelan, etc.)
More informationRandom Access Suitable Protocols
Random Access Many terminals communicate to a single base station Fixed multiple access methods (TDMA, FDMA, CDMA) become inefficient when the traffic is bursty. Random Access works better for many users,
More information1-1. Switching Networks (Fall 2010) EE 586 Communication and. November 8, Lecture 30
EE 586 Communication and Switching Networks (Fall 2010) Lecture 30 November 8, 2010 1-1 Announcements Quiz on Wednesday Next Monday hands-on training on Contiki OS Bring your laptop 4-2 Multiple Access
More information2 Network Basics. types of communication service. how communication services are implemented. network performance measures. switching.
2 Network Basics types of communication service how communication services are implemented switching multiplexing network performance measures 1 2.1 Types of service in a layered network architecture connection-oriented:
More informationECE453 Introduction to Computer Networks. Broadcast vs. PPP. Delay. Lecture 7 Multiple Access Control (I)
ECE453 Introduction to Computer Networks Lecture 7 Multiple Access Control (I) 1 Broadcast vs. PPP Broadcast channel = multiaccess channel = random access channel Broadcast LAN Satellite network PPP WAN
More informationData Networks. Lecture 1: Introduction. September 4, 2008
Data Networks Lecture 1: Introduction September 4, 2008 Slide 1 Learning Objectives Fundamental aspects of network Design and Analysis: Architecture: layering, topology design, switching mechanisms Protocols:
More informationLink Layer and LANs 안상현서울시립대학교컴퓨터 통계학과.
Link Layer and LANs 안상현서울시립대학교컴퓨터 통계학과 ahn@venus.uos.ac.kr Data Link Layer Goals: understand principles behind data link layer services: error detection, correction sharing a broadcast channel: multiple
More informationCommunication and Networks. Problems
Electrical and Information Technology Communication and Networks Problems Link Layer 2016 Problems 1. Consider a network applying a slotted Aloha access system. The assumption for this is that all nodes
More informationPerformance of UMTS Radio Link Control
Performance of UMTS Radio Link Control Qinqing Zhang, Hsuan-Jung Su Bell Laboratories, Lucent Technologies Holmdel, NJ 77 Abstract- The Radio Link Control (RLC) protocol in Universal Mobile Telecommunication
More informationData Communications. Automatic Repeat Request Medium Access Control
Data Communications Automatic Repeat Request Medium Access Control Handling Error Cases Automatic Repeat request(arq), also known as Automatic Repeat Query, is an error-control method ARQ uses acknowledgements
More informationTopics. Link Layer Services (more) Link Layer Services LECTURE 5 MULTIPLE ACCESS AND LOCAL AREA NETWORKS. flow control: error detection:
1 Topics 2 LECTURE 5 MULTIPLE ACCESS AND LOCAL AREA NETWORKS Multiple access: CSMA/CD, CSMA/CA, token passing, channelization LAN: characteristics, i basic principles i Protocol architecture Topologies
More informationCOMP/ELEC 429/556 Introduction to Computer Networks
COMP/ELEC 429/556 Introduction to Computer Networks Broadcast network access control Some slides used with permissions from Edward W. Knightly, T. S. Eugene Ng, Ion Stoica, Hui Zhang T. S. Eugene Ng eugeneng
More informationWireless Communications
4. Medium Access Control Sublayer DIN/CTC/UEM 2018 Why do we need MAC for? Medium Access Control (MAC) Shared medium instead of point-to-point link MAC sublayer controls access to shared medium Examples:
More informationCOS 140: Foundations of Computer Science
COS 140: Foundations of Computer Science ALOHA Network Protocol Family Fall 2017 Homework 2 Introduction 3 Network Protocols.......................................................... 3 Problem.................................................................
More informationMedium Access Control
Medium Access Control Fundamental Problem N nodes in vicinity want to transmit (to, say, N other nodes). How to do this interference free? Interference free means SINR Otherwise, we say that packets collide.
More informationPerformance Analysis of a DS/SSMA Unslotted ALOHA System With Two User Classes
1628 IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, VOL. 51, NO. 6, NOVEMBER 2002 Performance Analysis of a DS/SSMA Unslotted ALOHA System With Two User Classes Jae-Woo So, Student Member, IEEE, and Dong-Ho
More informationCHAPTER TWO LITERATURE REVIEW
CHAPTER TWO LITERATURE REVIEW 2.1 Introduction. This chapter provides in detail about the multiple access technologies and the OCDMA system. It starts with a discussion on various existing multiple-access
More informationLANs Local Area Networks LANs provide an efficient network solution : To support a large number of stations Over moderately high speed
Local Area Networks LANs provide an efficient network solution : To support a large number of stations Over moderately high speed With relatively small bit errors Multiaccess Protocols Communication among
More informationEE 122: Ethernet and
EE 122: Ethernet and 802.11 Ion Stoica September 18, 2002 (* this talk is based in part on the on-line slides of J. Kurose & K. Rose) High Level View Goal: share a communication medium among multiple hosts
More informationData Link Layer: Multi Access Protocols
Digital Communication in the Modern World Data Link Layer: Multi Access Protocols http://www.cs.huji.ac.il/~com1 com1@cs.huji.ac.il Some of the slides have been borrowed from: Computer Networking: A Top
More informationG 364: Mobile and Wireless Networking. CLASS 2, Wed. Jan Stefano Basagni Spring 2004 M-W, 11:40am-1:20pm, 109 Rob
G 364: Mobile and Wireless Networking CLASS 2, Wed. Jan 7 2004 Stefano Basagni Spring 2004 M-W, 11:40am-1:20pm, 109 Rob Wireless Issues Architecture, communication model and duplexing define the framework
More informationPROPOSAL OF MULTI-HOP WIRELESS LAN SYSTEM FOR QOS GUARANTEED TRANSMISSION
PROPOSAL OF MULTI-HOP WIRELESS LAN SYSTEM FOR QOS GUARANTEED TRANSMISSION Phuc Khanh KIEU, Shinichi MIYAMOTO Graduate School of Engineering, Osaka University 2-1 Yamada-oka, Suita, Osaka, 565-871 JAPAN
More information616 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 7, NO. 5, OCTOBER This technique seems to be less known compared to the other two.
616 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 7, NO. 5, OCTOBER 1999 An Uplink CDMA System Architecture with Diverse QoS Guarantees for Heterogeneous Traffic Sunghyun Choi, Student Member, IEEE, and Kang
More informationLecture 12 December 04, Wireless Access. Graduate course in Communications Engineering. University of Rome La Sapienza. Rome, Italy
Lecture 12 December 04, 2017 Wireless Access Graduate course in Communications Engineering University of Rome La Sapienza Rome, Italy 2017-2018 Random Medium Access Control Part II - CSMA and Collision
More informationCHAPTER 5. QoS RPOVISIONING THROUGH EFFECTIVE RESOURCE ALLOCATION
CHAPTER 5 QoS RPOVISIONING THROUGH EFFECTIVE RESOURCE ALLOCATION 5.1 PRINCIPLE OF RRM The success of mobile communication systems and the need for better QoS, has led to the development of 3G mobile systems
More informationSubject: Adhoc Networks
ISSUES IN AD HOC WIRELESS NETWORKS The major issues that affect the design, deployment, & performance of an ad hoc wireless network system are: Medium Access Scheme. Transport Layer Protocol. Routing.
More informationThe MAC layer in wireless networks
The MAC layer in wireless networks The wireless MAC layer roles Access control to shared channel(s) Natural broadcast of wireless transmission Collision of signal: a /space problem Who transmits when?
More informationWireless MACs: MACAW/802.11
Wireless MACs: MACAW/802.11 Mark Handley UCL Computer Science CS 3035/GZ01 Fundamentals: Spectrum and Capacity A particular radio transmits over some range of frequencies; its bandwidth, in the physical
More informationRTT TECHNOLOGY TOPIC October 1998 WCDMA
RTT TECHNOLOGY TOPIC October 1998 WCDMA In our last hot topic, we reviewed the future positioning of TD-CDMA including the rationale of taking the existing DECT time multiplexing structure to front end
More informationRedes de Computadores. Medium Access Control
Redes de Computadores Medium Access Control Manuel P. Ricardo Faculdade de Engenharia da Universidade do Porto 1 » How to control the access of computers to a communication medium?» What is the ideal Medium
More informationToward a Reliable Data Transport Architecture for Optical Burst-Switched Networks
Toward a Reliable Data Transport Architecture for Optical Burst-Switched Networks Dr. Vinod Vokkarane Assistant Professor, Computer and Information Science Co-Director, Advanced Computer Networks Lab University
More informationOutline. Introduction to Networked Embedded Systems - Embedded systems Networked embedded systems Embedded Internet - Network properties
Outline Introduction to Networked Embedded Systems - Embedded systems Networked embedded systems Embedded Internet - Network properties Layered Network Architectures - OSI framework descriptions of layers
More informationIMPLEMENTATION OF A PACKET PRIORITY AND FIFO QUEUING MODEL IN PACKET RADIO SYSTEM
IMPLEMENTATION OF A PACKET PRIORITY AND FIFO QUEUING MODEL IN PACKET RADIO SYSTEM H. Lami 1, A. Affandi 2 1, 2 Department of Electrical Engineering, Faculty of Industrial Technology, Institut Teknologi
More informationECE 358 MAC Examples. Xuemin (Sherman) Shen Office: EIT 4155 Phone: x
ECE 358 MAC Examples Xuemin (Sherman) Shen Office: EIT 4155 Phone: x 32691 Email: xshen@bbcr.uwaterloo.ca Problem 1. Consider the following Aloha systems. (a) A group of N users share a 56 kbps pure Aloha
More informationProtocols for Multiaccess Networks
Protocols for Multiaccess Networks Hosts broadcast packets When a collision occurs, all transmitted packets are lost Lost packets have to be retransmitted => Need Multiaccess Protocol Model - Slotted Aloha
More informationComputer Communication III
Computer Communication III Wireless Media Access IEEE 802.11 Wireless LAN Advantages of Wireless LANs Using the license free ISM band at 2.4 GHz no complicated or expensive licenses necessary very cost
More informationData Link Layer Technologies
Chapter 2.2 La 2 Data Link La Technologies 1 Content Introduction La 2: Frames Error Handling 2 Media Access Control General approaches and terms Aloha Principles CSMA, CSMA/CD, CSMA / CA Master-Slave
More informationCHAPTER 15 LOCAL AREA NETWORKS ANSWERS TO QUESTIONS
CHAPTER 15 LOCAL AREA NETWORKS ANSWERS TO QUESTIONS 15.1 Computer room networks require very high data rates and usually are concerned with transfer of large blocks of data. 15.2 Backend LAN: Backend networks
More informationA MOBILE CONTROLLED ALGORITHM FOR IMPROVING THE THROUGHPUT IN A S-ALOHA DS-CDMA SYSTEM
A MOBILE CONTROLLED ALORITHM FOR IMPROVIN THE THROUHPUT IN A S-ALOHA DS-CDMA SYSTEM Oriol Sallent, Ramon Agusti Departament de Teoria del Senyal i Comunicacions Universitat Politiknica de Catalunya C/
More informationAnnouncements / Wireless Networks and Applications Lecture 9: Wireless LANs Wireless. Regular Ethernet CSMA/CD.
Announcements 18-452/18-750 Wireless Networks and Applications Lecture 9: Wireless LANs 802.11 Wireless Peter Steenkiste Homework 1 should be out by tomorrow Project 1 by Friday Schedule:» Thursday lecture
More informationAnalyzing Multi-Channel Medium Access Control Schemes With ALOHA Reservation
Analyzing Multi-Channel Medium Access Control Schemes With ALOHA Reservation Yunghsiang S. Han, Jing Deng and Zygmunt J. Haas Graduate Institute of Communication Engineering National Taipei University,
More informationoriginal standard a transmission at 5 GHz bit rate 54 Mbit/s b support for 5.5 and 11 Mbit/s e QoS
IEEE 802.11 The standard defines a wireless physical interface and the MAC layer while LLC layer is defined in 802.2. The standardization process, started in 1990, is still going on; some versions are:
More informationWhere Are We? Basics: Network Classification Network Architecture Reliable Data Transfer Delay Models Implementation: Protocol Design
Where Are We? Basics: Network Classification Network Architecture Reliable Data Transfer Delay Models Implementation: Protocol Design Layered Architecture Layered Architecture Data Link Layer Functionality
More informationLecture 5 The Data Link Layer. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it
Lecture 5 The Data Link Layer Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it Link Layer: setting the context two physically connected devices: host-router, router-router, host-host,
More informationQuality of Service in the Internet
Quality of Service in the Internet Problem today: IP is packet switched, therefore no guarantees on a transmission is given (throughput, transmission delay, ): the Internet transmits data Best Effort But:
More information2. Modelling of telecommunication systems (part 1)
2. Modelling of telecommunication systems (part ) lect02.ppt S-38.45 - Introduction to Teletraffic Theory - Fall 999 2. Modelling of telecommunication systems (part ) Contents Telecommunication networks
More informationThe MAC layer in wireless networks
The MAC layer in wireless networks The wireless MAC layer roles Access control to shared channel(s) Natural broadcast of wireless transmission Collision of signal: a time/space problem Who transmits when?
More informationECE 653: Computer Networks Mid Term Exam all
ECE 6: Computer Networks Mid Term Exam 16 November 004. Answer all questions. Always be sure to answer each question concisely but precisely! All questions have points each. 1. What are the different layers
More informationEFFICIENT SUPPORT OF CIRCUIT-MODE AND PACKET-MODE SERVICES IN MICRO-VSAT NETWORKS
EFFICIENT SUPPORT OF CIRCUIT-MODE AND PACKET-MODE SERVICES IN MICRO-VSAT NETWORKS M. Alvarez-Campana, E. Vázquez, A. Azcorra, R. de Gaudenzi and V. García* DIT-UPM, Spain ESA-ESTEC, The Netherlands * University
More informationLecture 9 November 12, Wireless Access. Graduate course in Communications Engineering. University of Rome La Sapienza. Rome, Italy
Lecture 9 November 12, 2018 Wireless Access Graduate course in Communications Engineering University of Rome La Sapienza Rome, Italy 2018-2019 Medium Access Control Scheduled access Classification of wireless
More informationCSE 461: Multiple Access. Homework: Chapter 2, problems 1, 8, 12, 18, 23, 24, 35, 43, 46, and 58
CSE 461: Multiple Access Homework: Chapter 2, problems 1, 8, 12, 18, 23, 24, 35, 43, 46, and 58 Next Topic Key Focus: How do multiple parties share a wire? This is the Medium Access Control (MAC) portion
More informationCOMPUTER NETWORKS - Local area networks
Local area networks Telecommunication Networks Group firstname.lastname@polito.it http://www.telematica.polito.it/ COMPUTER NETWORKS LANs - 1 Copyright Quest opera è protetta dalla licenza Creative Commons
More informationLocal area networks. Copyright
Local area networks Telecommunication Networks Group firstname.lastname@polito.it http://www.telematica.polito.it/ COMPUTER NETWORKS LANs - 1 Copyright Quest opera è protetta dalla licenza Creative Commons
More informationCS 43: Computer Networks Media Access. Kevin Webb Swarthmore College November 30, 2017
CS 43: Computer Networks Media Access Kevin Webb Swarthmore College November 30, 2017 Multiple Access Links & Protocols Two classes of links : point-to-point dial-up access link between Ethernet switch,
More informationCPSC 441 Tutorial-19. Department of Computer Science University of Calgary
CPSC 441 Tutorial-19 Department of Computer Science University of Calgary Problem-1 Consider n nodes that use the slotted CSMA/ CD with binary exponential back-off to access a shared broadcast channel.
More informationData Link Layer, Part 5. Medium Access Control
CS 455 Medium Access Control, Page 1 Data Link Layer, Part 5 Medium Access Control These slides are created by Dr. Yih Huang of George Mason University. Students registered in Dr. Huang s courses at GMU
More informationData Link Layer. Goals of This Lecture. Engineering Questions. Outline of the Class
Data Link Layer Kuang Chiu Huang TCM NCKU Goals of This Lecture Through the lecture and in-class discussion, students are enabled to describe role and functions of the link layer, and compare different
More informationSIMON FRASER UNIVERSITY SCHOOL OF ENGINEERING SCIENCE. Spring 2013 ENSC 427: COMMUNICATION NETWORKS. Midterm No. 2(b) Monday, March 18, 2013
SIMON FRASER UNIVERSITY SCHOOL OF ENGINEERING SCIENCE Spring 2013 ENSC 427: COMMUNICATION NETWORKS Midterm No. 2(b) Monday, March 18, 2013 Duration: 50 minutes. Attempt all problems. Questions may not
More informationComputer Networks. Wenzhong Li. Nanjing University
Computer Networks Wenzhong Li Nanjing University 1 Chapter 2. Direct Link Networks Link Service and Framing Error Detection and Reliable Transmission HDLC, PPP, and SONET Token Ring Ethernet Bridges and
More informationRECENTLY, the information exchange using wired and
Fast Dedicated Retransmission Scheme for Reliable Services in OFDMA Systems Howon Lee and Dong-Ho Cho Department of Electrical Engineering and Computer Science Korea Advanced Institute of Science and Technology
More informationMULTIPLE ACCESS PROTOCOLS 2. 1
MULTIPLE ACCESS PROTOCOLS AND WIFI 1 MULTIPLE ACCESS PROTOCOLS 2. 1 MULTIPLE ACCESS LINKS, PROTOCOLS Two types of links : point-to-point broadcast (shared wire or medium) POINT-TO-POINT PPP for dial-up
More informationReminder: Datalink Functions Computer Networking. Datalink Architectures
Reminder: Datalink Functions 15-441 15 441 15-641 Computer Networking Lecture 5 Media Access Control Peter Steenkiste Fall 2015 www.cs.cmu.edu/~prs/15-441-f15 Framing: encapsulating a network layer datagram
More informationChapter 4. The Medium Access Control Sublayer. Points and Questions to Consider. Multiple Access Protocols. The Channel Allocation Problem.
Dynamic Channel Allocation in LANs and MANs Chapter 4 The Medium Access Control Sublayer 1. Station Model. 2. Single Channel Assumption. 3. Collision Assumption. 4. (a) Continuous Time. (b) Slotted Time.
More informationLocal Area Networks (LANs) SMU CSE 5344 /
Local Area Networks (LANs) SMU CSE 5344 / 7344 1 LAN/MAN Technology Factors Topology Transmission Medium Medium Access Control Techniques SMU CSE 5344 / 7344 2 Topologies Topology: the shape of a communication
More informationA RLC/MAC PROTOCOL ARCHITECTURE FOR A WIRELESS IP NETWORK
A RLC/MAC PROTOCOL ARCHITECTURE FOR A WIRELESS IP NETWORK Jamil Y. Khan School of Electrical Engineering & Computer Science, University of Newcastle, Callaghan, NSW 238, Australia, jkhan@ecemail.newcastle.edu.au
More information