Introduction to CDMA ALOHA. 3. Access Control Techniques for CDMA ALOHA

Size: px
Start display at page:

Download "Introduction to CDMA ALOHA. 3. Access Control Techniques for CDMA ALOHA"

Transcription

1 Introduction to CDMA ALOHA 3. Access Control Techniques for CDMA ALOHA Takaya Yamazato Center for Information Media Studies, Nagoya University Nagoya , Japan

2 CDMA ALOHA CDMA ALOHA Soft Capacity High spectral efficiency Simultaneous transmission Robustness against interference and distortion Flexibility for multimedia CDMA ALOHA Preserving good features of CDMA and ALOHA + High throughput Fundamental protocol Random access Simplicity Random access Simultaneous packet transmission High throughput performance Flexible transmission of multimedia signal

3 Why Access Control? Control Signal Hubstation Normalized throughput S/N CDMA U-ALOHA Pure ALOHA N= Eb/No= [db] L=500 [bits] CDMA ALOHA Packet transmission accoding to the information broadcasted from the hubstation Normalized offered load G/N Improvement of maximum throughput No degradation of throughput in high offered traffic load

4 Channel load Control Signal t Power spectral density Hubstation How? f X Difficulty of carrier sensing by each user due to the low peak power transmission. X Fluctuation of channel load during a packet transmission CDMA ALOHA Low peak power transmission of CDMA signal D A little throughput improvement by slotted system

5 Access Control for CDMA ALOHA Channel load Control Signal CDMA ALOHA t Hubstation Fluctuation of channel load 1 Access control protocol should be based on the channel load status observed by hub-station 2 Packet access should be accomplished in accordance with control signal broadcast from hub-station 3 CDMA Unslotted ALOHA (CDMA U-ALOHA) is an appropriate candidate

6 Access Timing Delay Control Signal Satellite CDMA ALOHA Time difference between channel load sensing and associated packet access timing Channel load Hub sensing station User station Control signal Packet transmission Propagation Propagation delay delay Process delay Remarkable in satellite communication system GEO : 0.50 [sec] LEO : 0.02 [sec]

7 Access Control for CDMA ALOHA Transmission access control protocol 1. Channel load sensing protocol (CLSP) 2. Modified CLSP Retransmission control protocol 3. Packet retransmission control (PRC) Transmission and retransmission control protocol 4. Optimum access control protocol (OACP) CDMA Unslotted ALOHA systems with buffers

8 System Model X X X Contol signal PN PN 1 1 CDMA ALOHA PN 1 X CDMA ALOHA PN 1 Hubstation CDMA ALOHA + AWGN Centralized single-hop network DS/SS modulated packet Poisson generation of packet Equal power reception G : Offered load L : Fixed packet length [bit] BER -- see (2.1)

9 Transmission Control Protocol Control Signal CDMA ALOHA Hubstation Packet transmission accoding to the information broadcasted from the hubstation Packet transmission is controlled by Hubstation 1. Channel load sensing protocol (CLSP) 2. Modified CLSP

10 Channel Load Sensing Protocol (CLSP) Channel load CDMA ALOHA Permission or Rejection CDMA ALOHA CDMA ALOHA CDMA ALOHA Fluctuation of channel load threshold a t Hubstation Hub-station observes the channel load, actual number of on-going packets According to the channel load, the information of permission or prohibition is broadcasted. Users transmit according to such information. Channel load is always kept less than or equal to the threshold, a.

11 Throughput of CDMA ALOHA with CLSP Throughput S without CLSP N=60 L=500 [bits] Eb/No=10 [db] Offered load G with CLSP a = Significant improvement in throughput No degradation in high offered load Throughput depends on threshold, a

12 Access Timing Delay Packet Transmission Packet Transmission Hub Station User Station Propagation Delay Process Delay Propagation Delay Process Delay Access Timing Delay Time difference between channel load sensing and associated packet access timing t D : Access timing delay normalized by packet duration GEO : t D = 9.20 LEO : t D = 0.26 L=500 [bit] R=9,600 [bps]

13 Throughput Degradation of CLSP Throughput S N=60 L=500 [bits] Eb/No=10 [db] a=9 td=0 without CLSP (no access timing delay) td =0.1 td =0.26 (LEO) Severe degradation in the presence of access timing delay 2 1 td =9.2 (GEO) td= Offered load G

14 Throughput S N=60 L=500 [bits] Eb/No=10 [db] a=9 Throughput Degradation of CLSP Packet Transmission td=9.2 (GEO) td=0 without CLSP Offered load G Propagation Delay Process Delay Propagation Delay Process Delay Packet Transmission Hub Station User Station (no access timing delay) td=1 Access Timing Delay td=0.1 td=0.26 (LEO) In the presence of access timing delay, since the packet access control is done by the past information, the throughput would degrade Access control based not on instantaneous channel load but on average channel load

15 Estimation of G Channel load CDMA ALOHA Ptr CDMA ALOHA CDMA ALOHA CDMA ALOHA Fluctuation of channel load Calculation of Ptr Hubstation User transmit his packet with Ptr, or stops transmitting its packet with 1-Ptr Modified CLSP t Broadcast Ptr Hub-station estimate the offered traffic load, G. According to the estimated G, the hub-station broadcast the probability, Ptr. Ptr is obtained so that actual offered load is set to the value which gains the maximum throughput. User transmits his packets according to Ptr

16 Throughput of CDMA ALOHA with MCLSP Throughput S N=60 L=500 [bits] Eb/No=10 [db] Analysis Simulation td =0.26 (LEO) td =9.2 (GEO) ts =10 ts =1 No access control Maximum throughput is the same as one without access control. Robustness against access timing delay Gmax Offered load G

17 Retransmission Control Protocol Transmission Hub station User station X X Packet error Packet transmission Hubstation Control signal Delay Retransmission control signal Delay Retransmission Packet retransmission If packet error occurs, a user schedules the packet at a later time according to a delay distribution This distribution is calculated and broadcast by a hub-station 3. Packet retransmission control (PRC)

18 Packet Retransmission Control (PRC) G 0 originating mode success fail success fail retransmission mode Transition of users between the originating mode and retransmission mode Transmission X Hubstation Control signal Delay G r Retransmission Appropriate distribution of delay is calculated and broadcast The distribution is obtained by a observation of channel load PRC is equivalent to a control of retransmission offered load, Gr time

19 Throughput of CDMA ALOHA with PRC Throughput S Gr=25 Gr=Go N=60 L=500 [bits] Eb/No=10 [db] Offered load of new packet Go Gr=15 PRC Gr=5 Maximum throughput is the same as one without access control. Throughput is almost same as MCLSP Robustness against access timing delay

20 What is the optimum access control? Channel Load Sensing Protocol (CLSP) Higher throughput Weakness to access timing delay Modified CLSP (MCLSP) Robustness against access timing delay No gain in maximum throughput Packet Retransmission Control (PRC) Robustness against access timing delay No gain in maximum throughput?

21 Transmission control signal Optimal Access Control Protocol (OACP) Transmission OACP CLSP+PRC Hubstation If packet error occurred Retransmission control signal Retransmission CLSP : O Improvement in maximum throughput X Weakness against access timing delay PRC : O Robust against access timing delay X No improvement in maximum throughput CLSP + PRC = Optimum

22 Optimal Access Control Protocol (OACP) New Packets Offered Load Go Is the channel load less than a? Yes CDMA Unslotted ALOHA Channel Retransmitted Packets Transmitted with Pre Retransmission Control Successful Packets No Tramsmission Control Random Retransmission Delay Unsuccessful Packets Hub-station estimate the offered traffic load, G. If the channel load is below a, then packet transmission is allowed. Otherwise, the users move into retransmission mode (CLSP). Backlogged packet is controlled according to the retransmission probability broadcast from the hubstation (PRC).

23 Throughput of CDMA ALOHA with PRC Throughput S N=60 L=500 [bits] Eb/No=10 [db] OACP CLSP w/o Access Control td =0.1 td =0.26 (LEO) td= Offered load of new packet Go Maximum throughput is the same as CLSP if access timing delay is negligible Robustness against access timing delay

24 Delay performance of CDMA ALOHA with OACP 160 Delay D N=60 L=500 [bits] Eb/No=10 [db] K=1000 OACP td=0 =0.1 =0.26 =1 = Offered load of new packet Go

25 CDMA Unslotted ALOHA with Buffers Each user is equipped with a certain size of queueing.... CDMA ALOHA with Buffer CDMA ALOHA Channel Hubstation buffers. Retransmission packet can be managed by each of users. Autonomous control of packet transmission may be possible.

26 CDMA Unslotted ALOHA with Buffers Each user is equipped with a finite buffer l Full buffer? Yes Rejection No Yes Busy mode Busy? No Idle mode p Transmission to the channel capacity of B packets. Packet arriving at an idle status is transmitted Correct reception Incorrect reception immediately. Removal Retransmission p Packets are served in a first-in-first-out (FIFO) Schematic of packet flow at each user station discipline. Busy user attempt to transmit packet with rate p.

27 Throughput of CDMA U-ALOHA with Buffers 6 The larger buffer 5 size a user has, the more rapidly Throughput S line:analysis dot:simulation B= N=60 Eb/No=10dB K=100 L=500 p=0.1 the throughput is increasing. Throughput is almost same as MCLSP or PRC Offered load G

28 Rejection probability Q R line:analysis dot:simulation Rejection Probability B= N=60 Eb/No=10dB K=100 L=500 p= Offered load of new packet Go X If a packet arrives at a user with a full buffer, this packet is rejected The larger buffer size a user has, the less rejection probability is

29 Delay Performance Average delay D N=60 Eb/No=10dB K=100 L=500 p=0.1 line:analysis dot:simulation B=5 B=4 B=3 B=2 B= Offered load of new packet Go The number of busy user increases by increasing the buffer size. Average delay increases in compensation for reduction of the rejection of packet transmission.

30 CDMA ALOHA for Multimedia signals voice data + voice data Hubstation voice data control signal signal data + voice User-Station Different media which have different characteristics are handled simultaneously CDMA is suitable for handling multimedia signal Multi-rate CDMA Multi-code CDMA Access control for multimedia signals 1 Integrated voice and data system 2 High and low bit rate data transmission

31 1. Integrated Voice and Data System Voice : Real time delivery Circuit switch mode (Reservation mode) Voice users have to reserve the channel before they transmit their signals by sending a reservation packet. Once they get the reservation, they continue to transmit their signal until voice call ends. If the number of simultaneous established users reaches to a certain threshold, voice users cannot access to get the reservation. Data : Some tolerance to transmission delay Packet switch mode Data users transmit thier packets on the CDMA Unslotted ALOHA.

32 Integrated CDMA Voice Signal & CDMA Data Packet (CDMA unslotted ALOHA)... Number of server = a time The channels reserved for voice users The channels ocupied by data pakets The available channels for additional voice and data users Channel load status seen at hubstation Interference from both media Priority of voice medium (continuous voice call until call ends) Necessity of traffic control

33 System Model user 1 (voice) user 2 (data) user.. (data) PN sequence 2 user.. (voice) user K (voice) Random signature CLSP Control Signal Hub Station Data packet : CDMA Unslotted ALOHA Voice signal : Circuit Switch Total bandwidth W = 20MHz Band expansion factor N = 312 (=W/R) Voice signal : Poisson generation Bit rate : R = 32k [bps] Exponential signal length Length 60.0 [sec] Silence period 1.7 [sec] Talk spurt 1.0 [sec] Data packet : Poisson generation Bit rate : R = 32k [bps] Fixed packet length L = 500 [bit] (0.01 [sec])

34 Traffic Control for Voice and Data Media The number of simultaneous voice and data signals, k a : Threshold for data packet b : Threshold of voice signal b a voice user can access to the channel Data packet users can access to the channel 0 Why b> a? The required signal quality of voice < that of data packet The signal quality must be guaranteed for voice signals

35 Mean Number of Voice Call The mean number of voice calls Threshold b =98 (Pb(b)<10-3 ) N =312 Eb/N0= V.A rate = 0.4 No data packet Gd=0 without V.A with V.A Voice activity (V.A) improves the number of simultaneous call. Access control by counting the number of talk spurt of voice signal Voice Offered Load, Gv

36 Data Throughput Throughput for Data Gv=20 Gv=10 with V.A no V.A N =312 Eb/N0= V.A rate = Data Offered Load, Gd Without access control Data throughput S Consideration of V.A No consideration of V.A N =312 Eb/N0= V.A rate = 0.4 Erlang capacity for voice Er = 40 (= Maxinum Gv) Data offered load Gd With access control

37 2. High and Low Bit Rate Data Transmission Class I : High-bit-rate packet Class II: Low-bit-rate packet Class I Control Signal Hubstation Multi-rate CDMA system O Multi-code Multi-processing gain Multi-modulation Class II Multi-code CDMA + CDMA ALOHA Low bit rate High bit rate MC-CDMA ALOHA

38 System Model High bit rate Source M.R b Low bit rate Transmitter of Class I Sub-stream (Sub-packet) L [bits] M Sub-packets transmitted in one sub-packet duration M Transmitter of Class II: Conventional CDMA Slotted ALOHA Transmitter b Class I : Poisson generation Bit rate MRb [bit/sec] Fixed packet length MLb [bits] Class II: Poisson generation Bit rate Rb [bit/sec] Fixed packet length Lb [bits] Class I has priority over Class II

39 Channel Status at Hubstation 1 2 M One sub-packet One packet from class II (CDMA) 1 2 M One packet from class I (MC-CDMA) Slot Slot Slot Time

40 Throughput performances I Throughput, S I S I When M=1 (Single bit rate) When M=8 Eb/N0 = N=128 L b =500 bits G 2 =10 S I When M=16 S I Total throughput, S tot = S 1 + S S tot When M=1 (SIngle bit rate ) Eb/N0 = N=128 L b =500 bits G 2 =10 S tot When M=8 with MCLSP S tot When M=8 (without MCLSP) Offered load of class I, G1 MC-CDMA Slotted ALOHA (Only class I user) Total offered load, G tot = G 1 + G 2 MC-CDMA Slotted ALOHA with MCLSP (class I and II)

41 Conclusions Fundamentals of CDMA ALOHA Throughput analysis of CDMA ALOHA CDMA ALOHA v.s. Narrow Band ALOHA Access control techniques for CDMA ALOHA CLSP, MCLSP, PRC, OACP CDMA ALOHA with Buffers Multimedia signal transmission using CDMA ALOHA Integrated voice and data system Multi-rate transmission using MC-CDMA

Multiple Access Communications. EEE 538, WEEK 11 Dr. Nail Akar Bilkent University Electrical and Electronics Engineering Department

Multiple Access Communications. EEE 538, WEEK 11 Dr. Nail Akar Bilkent University Electrical and Electronics Engineering Department Multiple Access Communications EEE 538, WEEK 11 Dr. Nail Akar Bilkent University Electrical and Electronics Engineering Department 1 Multiple Access Satellite systems, radio networks (WLAN), ethernet segment

More information

Packet multiple access and the Aloha protocol

Packet multiple access and the Aloha protocol Packet multiple access and the Aloha protocol Massachusetts Institute of Technology Department of Aeronautics and Astronautics Slide 1 Packet Multiple Access PMA SHARED UPLINK TERMINAL TERMINAL APPL TRANS

More information

Power Laws in ALOHA Systems

Power Laws in ALOHA Systems Power Laws in ALOHA Systems E6083: lecture 7 Prof. Predrag R. Jelenković Dept. of Electrical Engineering Columbia University, NY 10027, USA predrag@ee.columbia.edu February 28, 2007 Jelenković (Columbia

More information

Random Assignment Protocols

Random Assignment Protocols Random Assignment Protocols Random assignment strategies attempt to reduce problem occur in fixed assignment strategy by eliminating pre allocation of bandwidth to communicating nodes. Random assignment

More information

TSIN01 Information Networks Lecture 3

TSIN01 Information Networks Lecture 3 TSIN01 Information Networks Lecture 3 Danyo Danev Division of Communication Systems Department of Electrical Engineering Linköping University, Sweden September 10 th, 2018 Danyo Danev TSIN01 Information

More information

Performance Analysis of DS/SSMA Unslotted ALOHA System With Variable Length Data Traffic

Performance Analysis of DS/SSMA Unslotted ALOHA System With Variable Length Data Traffic IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 19, NO. 11, NOVEMBER 2001 2215 Performance Analysis of DS/SSMA Unslotted ALOHA System With Variable Length Data Traffic Jae-Woo So, Student Member,

More information

COMPUTER NETWORK Model Test Paper

COMPUTER NETWORK Model Test Paper Model Test Paper Question no. 1 is compulsory. Attempt all parts. Q1. Each question carries equal marks. (5*5 marks) A) Difference between Transmission Control Protocol (TCP) and User Datagram Protocol.

More information

Random Access. 1. Aloha. 2. Slotted Aloha 3. CSMA 4. CSMA/CD

Random Access. 1. Aloha. 2. Slotted Aloha 3. CSMA 4. CSMA/CD Random Access 1. Aloha 2. Slotted Aloha 3. CSMA 4. CSMA/CD Background Communication medium B No Collision collision A C Modern Local Area Networks (LANs) operate as follows Users are connected to communication

More information

CHAPTER 5 PROPAGATION DELAY

CHAPTER 5 PROPAGATION DELAY 98 CHAPTER 5 PROPAGATION DELAY Underwater wireless sensor networks deployed of sensor nodes with sensing, forwarding and processing abilities that operate in underwater. In this environment brought challenges,

More information

Simulated SA Throughput vs. p

Simulated SA Throughput vs. p Problem 1. Simulation of Slotted Aloha network (A) There are n stations in the network that are trying to transmit messages to an access point. (B) All the stations are synchronized and they are using

More information

ON PERFORMANCE ANALYSIS OF CDMA UNSLOTTED ALOHA SYSTEM WITH BURST RESERVATION

ON PERFORMANCE ANALYSIS OF CDMA UNSLOTTED ALOHA SYSTEM WITH BURST RESERVATION ON PERFORMANCE ANALYSIS OF CDMA UNSLOTTED ALOHA SYSTEM WITH BURST RESERVATION Jae-Woo So, I1 Han, Byung-Cheol Shin, and Dong-Ho Cho Department of Electrical Engineering Korea Advanced Institute of Science

More information

Chapter 1 Basic concepts of wireless data networks (cont d)

Chapter 1 Basic concepts of wireless data networks (cont d) Chapter 1 Basic concepts of wireless data networks (cont d) Part 2: Medium access methods for mobile data networks Sept 15 2004 1 Fixed assignment access schemes in voice-oriented networks Frequency division

More information

Markov Chains and Multiaccess Protocols: An. Introduction

Markov Chains and Multiaccess Protocols: An. Introduction Markov Chains and Multiaccess Protocols: An Introduction Laila Daniel and Krishnan Narayanan April 8, 2012 Outline of the talk Introduction to Markov Chain applications in Communication and Computer Science

More information

Multiple Access Protocols

Multiple Access Protocols Multiple Access Protocols Computer Networks Lecture 2 http://goo.gl/pze5o8 Multiple Access to a Shared Channel The medium (or its sub-channel) may be shared by multiple stations (dynamic allocation) just

More information

Multiple Access (1) Required reading: Garcia 6.1, 6.2.1, CSE 3213, Fall 2010 Instructor: N. Vlajic

Multiple Access (1) Required reading: Garcia 6.1, 6.2.1, CSE 3213, Fall 2010 Instructor: N. Vlajic 1 Multiple Access (1) Required reading: Garcia 6.1, 6.2.1, 6.2.2 CSE 3213, Fall 2010 Instructor: N. Vlajic Multiple Access Communications 2 Broadcast Networks aka multiple access networks multiple sending

More information

CHAPTER 3 EFFECTIVE ADMISSION CONTROL MECHANISM IN WIRELESS MESH NETWORKS

CHAPTER 3 EFFECTIVE ADMISSION CONTROL MECHANISM IN WIRELESS MESH NETWORKS 28 CHAPTER 3 EFFECTIVE ADMISSION CONTROL MECHANISM IN WIRELESS MESH NETWORKS Introduction Measurement-based scheme, that constantly monitors the network, will incorporate the current network state in the

More information

ECE 4450:427/527 - Computer Networks Spring 2017

ECE 4450:427/527 - Computer Networks Spring 2017 ECE 4450:427/527 - Computer Networks Spring 2017 Dr. Nghi Tran Department of Electrical & Computer Engineering Lecture 5.4: Multiple Access Protocols Dr. Nghi Tran (ECE-University of Akron) ECE 4450:427/527

More information

Mobile Communications Chapter 3 : Media Access

Mobile Communications Chapter 3 : Media Access Mobile Communications Chapter 3 : Media Access 2. Motivation 3. SDMA, FDMA, TDMA 1. Aloha and contention based schemes 4. Reservation schemes 5. Collision avoidance, MACA 6. Polling CDMA (Lecture 6) Prof.

More information

Lecture 19. Principles behind data link layer services Framing Multiple access protocols

Lecture 19. Principles behind data link layer services Framing Multiple access protocols Link Layer Lecture 19 Principles behind data link layer services Framing Multiple access protocols ALOHA *The slides are adapted from ppt slides (in substantially unaltered form) available from Computer

More information

Unavoidable Constraints and Collision Avoidance Techniques in Performance Evaluation of Asynchronous Transmission WDMA Protocols

Unavoidable Constraints and Collision Avoidance Techniques in Performance Evaluation of Asynchronous Transmission WDMA Protocols 1th WEA International Conference on COMMUICATIO, Heraklion, reece, July 3-5, 8 Unavoidable Constraints and Collision Avoidance Techniques in Performance Evaluation of Asynchronous Transmission WDMA Protocols

More information

Chapter 6 Medium Access Control Protocols and Local Area Networks

Chapter 6 Medium Access Control Protocols and Local Area Networks Chapter 6 Medium Access Control Protocols and Local Area Networks Part I: Medium Access Control Part II: Local Area Networks CSE 3213, Winter 2010 Instructor: Foroohar Foroozan Chapter Overview Broadcast

More information

Intelligent Transportation Systems. Medium Access Control. Prof. Dr. Thomas Strang

Intelligent Transportation Systems. Medium Access Control. Prof. Dr. Thomas Strang Intelligent Transportation Systems Medium Access Control Prof. Dr. Thomas Strang Recap: Wireless Interconnections Networking types + Scalability + Range Delay Individuality Broadcast o Scalability o Range

More information

NMA Radio Networks Network Level: Medium Access Control Roberto Verdone

NMA Radio Networks Network Level: Medium Access Control Roberto Verdone NMA Radio Networks Network Level: Medium Access Control Roberto Verdone Outline 1. Introduction 2. Fundamentals of Random MAC Aloha in Compact Networks Slotted Aloha in Compact Networks CSMA in Compact

More information

Data Link Layer: Collisions

Data Link Layer: Collisions Data Link Layer: Collisions 1 Multiple Access Data Link layer divided into two sublayers. The upper sublayer is responsible for datalink control, The lower sublayer is responsible for resolving access

More information

Multimedia Communication Services Traffic Modeling and Streaming

Multimedia Communication Services Traffic Modeling and Streaming Multimedia Communication Services Traffic Modeling and Streaming Medium Access Control algorithms Introduction and details on Aloha networks with infinite nodes Università degli Studi di Brescia A.A. 2014/2015

More information

Multiple Access Links and Protocols

Multiple Access Links and Protocols Multiple Access Links and Protocols Two types of links : point-to-point PPP for dial-up access point-to-point link between Ethernet switch and host broadcast (shared wire or medium) old-fashioned Ethernet

More information

High Level View. EE 122: Ethernet and Random Access protocols. Medium Access Protocols

High Level View. EE 122: Ethernet and Random Access protocols. Medium Access Protocols High Level View EE 122: Ethernet and 802.11 Ion Stoica September 18, 2002 Goal: share a communication medium among multiple hosts connected to it Problem: arbitrate between connected hosts Solution goals:

More information

ECEN 5032 Data Networks Medium Access Control Sublayer

ECEN 5032 Data Networks Medium Access Control Sublayer ECEN 5032 Data Networks Medium Access Control Sublayer Peter Mathys mathys@colorado.edu University of Colorado, Boulder c 1996 2005, P. Mathys p.1/35 Overview (Sub)networks can be divided into two categories:

More information

Bridging Link Power Asymmetry in Mobile Whitespace Networks Sanjib Sur and Xinyu Zhang

Bridging Link Power Asymmetry in Mobile Whitespace Networks Sanjib Sur and Xinyu Zhang Bridging Link Power Asymmetry in Mobile Whitespace Networks Sanjib Sur and Xinyu Zhang University of Wisconsin - Madison 1 Wireless Access in Vehicles Wireless network in public vehicles use existing infrastructure

More information

ECSE-4670: Computer Communication Networks (CCN) Informal Quiz 3

ECSE-4670: Computer Communication Networks (CCN) Informal Quiz 3 ECSE-4670: Computer Communication Networks (CCN) Informal Quiz 3 : shivkuma@ecse.rpi.edu Biplab Sikdar: sikdab@rpi.edu 1 T F Slotted ALOHA has improved utilization since the window of vulnerability is

More information

Coverage & Capacity in Hybrid Wideband Ad-hoc/cellular Access System. Results & Scenarios. by Pietro Lungaro

Coverage & Capacity in Hybrid Wideband Ad-hoc/cellular Access System. Results & Scenarios. by Pietro Lungaro Coverage & Capacity in Hybrid Wideband Ad-hoc/cellular Access System Results & Scenarios by Pietro Lungaro Agenda Problem Statement System Assumptions Results Threats Problem Statement Design a possible

More information

Introduction. The fundamental purpose of data communications is to exchange information between user's computers, terminals and applications programs.

Introduction. The fundamental purpose of data communications is to exchange information between user's computers, terminals and applications programs. Introduction The fundamental purpose of data communications is to exchange information between user's computers, terminals and applications programs. Simplified Communications System Block Diagram Intro-1

More information

Network Media and Layer 1 Functionality

Network Media and Layer 1 Functionality Network Media and Layer 1 Functionality BSAD 146 Dave Novak Dean, Chapter 3, pp 93-124 Objectives Introduction to transmission media Basic cabling Coaxial Twisted pair Optical fiber Basic wireless (NIC)

More information

Wireless Medium Access Control Protocols

Wireless Medium Access Control Protocols Wireless Medium Access Control Protocols Telecomunicazioni Undergraduate course in Electrical Engineering University of Rome La Sapienza Rome, Italy 2007-2008 Classification of wireless MAC protocols Wireless

More information

CS 43: Computer Networks. 27: Media Access Contd. December 3, 2018

CS 43: Computer Networks. 27: Media Access Contd. December 3, 2018 CS 43: Computer Networks 27: Media Access Contd. December 3, 2018 Last Class The link layer provides lots of functionality: addressing, framing, media access, error checking could be used independently

More information

Physical Layer. Medium Access Links and Protocols. Point-to-Point protocols. Modems: Signaling. Modems Signaling. Srinidhi Varadarajan

Physical Layer. Medium Access Links and Protocols. Point-to-Point protocols. Modems: Signaling. Modems Signaling. Srinidhi Varadarajan P Physical Layer Srinidhi Varadarajan Medium Access Links and Protocols Three types of links : point-to-point (single wire, e.g. PPP, SLIP) broadcast (shared wire or medium; e.g, Ethernet, Wavelan, etc.)

More information

Random Access Suitable Protocols

Random Access Suitable Protocols Random Access Many terminals communicate to a single base station Fixed multiple access methods (TDMA, FDMA, CDMA) become inefficient when the traffic is bursty. Random Access works better for many users,

More information

1-1. Switching Networks (Fall 2010) EE 586 Communication and. November 8, Lecture 30

1-1. Switching Networks (Fall 2010) EE 586 Communication and. November 8, Lecture 30 EE 586 Communication and Switching Networks (Fall 2010) Lecture 30 November 8, 2010 1-1 Announcements Quiz on Wednesday Next Monday hands-on training on Contiki OS Bring your laptop 4-2 Multiple Access

More information

2 Network Basics. types of communication service. how communication services are implemented. network performance measures. switching.

2 Network Basics. types of communication service. how communication services are implemented. network performance measures. switching. 2 Network Basics types of communication service how communication services are implemented switching multiplexing network performance measures 1 2.1 Types of service in a layered network architecture connection-oriented:

More information

ECE453 Introduction to Computer Networks. Broadcast vs. PPP. Delay. Lecture 7 Multiple Access Control (I)

ECE453 Introduction to Computer Networks. Broadcast vs. PPP. Delay. Lecture 7 Multiple Access Control (I) ECE453 Introduction to Computer Networks Lecture 7 Multiple Access Control (I) 1 Broadcast vs. PPP Broadcast channel = multiaccess channel = random access channel Broadcast LAN Satellite network PPP WAN

More information

Data Networks. Lecture 1: Introduction. September 4, 2008

Data Networks. Lecture 1: Introduction. September 4, 2008 Data Networks Lecture 1: Introduction September 4, 2008 Slide 1 Learning Objectives Fundamental aspects of network Design and Analysis: Architecture: layering, topology design, switching mechanisms Protocols:

More information

Link Layer and LANs 안상현서울시립대학교컴퓨터 통계학과.

Link Layer and LANs 안상현서울시립대학교컴퓨터 통계학과. Link Layer and LANs 안상현서울시립대학교컴퓨터 통계학과 ahn@venus.uos.ac.kr Data Link Layer Goals: understand principles behind data link layer services: error detection, correction sharing a broadcast channel: multiple

More information

Communication and Networks. Problems

Communication and Networks. Problems Electrical and Information Technology Communication and Networks Problems Link Layer 2016 Problems 1. Consider a network applying a slotted Aloha access system. The assumption for this is that all nodes

More information

Performance of UMTS Radio Link Control

Performance of UMTS Radio Link Control Performance of UMTS Radio Link Control Qinqing Zhang, Hsuan-Jung Su Bell Laboratories, Lucent Technologies Holmdel, NJ 77 Abstract- The Radio Link Control (RLC) protocol in Universal Mobile Telecommunication

More information

Data Communications. Automatic Repeat Request Medium Access Control

Data Communications. Automatic Repeat Request Medium Access Control Data Communications Automatic Repeat Request Medium Access Control Handling Error Cases Automatic Repeat request(arq), also known as Automatic Repeat Query, is an error-control method ARQ uses acknowledgements

More information

Topics. Link Layer Services (more) Link Layer Services LECTURE 5 MULTIPLE ACCESS AND LOCAL AREA NETWORKS. flow control: error detection:

Topics. Link Layer Services (more) Link Layer Services LECTURE 5 MULTIPLE ACCESS AND LOCAL AREA NETWORKS. flow control: error detection: 1 Topics 2 LECTURE 5 MULTIPLE ACCESS AND LOCAL AREA NETWORKS Multiple access: CSMA/CD, CSMA/CA, token passing, channelization LAN: characteristics, i basic principles i Protocol architecture Topologies

More information

COMP/ELEC 429/556 Introduction to Computer Networks

COMP/ELEC 429/556 Introduction to Computer Networks COMP/ELEC 429/556 Introduction to Computer Networks Broadcast network access control Some slides used with permissions from Edward W. Knightly, T. S. Eugene Ng, Ion Stoica, Hui Zhang T. S. Eugene Ng eugeneng

More information

Wireless Communications

Wireless Communications 4. Medium Access Control Sublayer DIN/CTC/UEM 2018 Why do we need MAC for? Medium Access Control (MAC) Shared medium instead of point-to-point link MAC sublayer controls access to shared medium Examples:

More information

COS 140: Foundations of Computer Science

COS 140: Foundations of Computer Science COS 140: Foundations of Computer Science ALOHA Network Protocol Family Fall 2017 Homework 2 Introduction 3 Network Protocols.......................................................... 3 Problem.................................................................

More information

Medium Access Control

Medium Access Control Medium Access Control Fundamental Problem N nodes in vicinity want to transmit (to, say, N other nodes). How to do this interference free? Interference free means SINR Otherwise, we say that packets collide.

More information

Performance Analysis of a DS/SSMA Unslotted ALOHA System With Two User Classes

Performance Analysis of a DS/SSMA Unslotted ALOHA System With Two User Classes 1628 IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, VOL. 51, NO. 6, NOVEMBER 2002 Performance Analysis of a DS/SSMA Unslotted ALOHA System With Two User Classes Jae-Woo So, Student Member, IEEE, and Dong-Ho

More information

CHAPTER TWO LITERATURE REVIEW

CHAPTER TWO LITERATURE REVIEW CHAPTER TWO LITERATURE REVIEW 2.1 Introduction. This chapter provides in detail about the multiple access technologies and the OCDMA system. It starts with a discussion on various existing multiple-access

More information

LANs Local Area Networks LANs provide an efficient network solution : To support a large number of stations Over moderately high speed

LANs Local Area Networks LANs provide an efficient network solution : To support a large number of stations Over moderately high speed Local Area Networks LANs provide an efficient network solution : To support a large number of stations Over moderately high speed With relatively small bit errors Multiaccess Protocols Communication among

More information

EE 122: Ethernet and

EE 122: Ethernet and EE 122: Ethernet and 802.11 Ion Stoica September 18, 2002 (* this talk is based in part on the on-line slides of J. Kurose & K. Rose) High Level View Goal: share a communication medium among multiple hosts

More information

Data Link Layer: Multi Access Protocols

Data Link Layer: Multi Access Protocols Digital Communication in the Modern World Data Link Layer: Multi Access Protocols http://www.cs.huji.ac.il/~com1 com1@cs.huji.ac.il Some of the slides have been borrowed from: Computer Networking: A Top

More information

G 364: Mobile and Wireless Networking. CLASS 2, Wed. Jan Stefano Basagni Spring 2004 M-W, 11:40am-1:20pm, 109 Rob

G 364: Mobile and Wireless Networking. CLASS 2, Wed. Jan Stefano Basagni Spring 2004 M-W, 11:40am-1:20pm, 109 Rob G 364: Mobile and Wireless Networking CLASS 2, Wed. Jan 7 2004 Stefano Basagni Spring 2004 M-W, 11:40am-1:20pm, 109 Rob Wireless Issues Architecture, communication model and duplexing define the framework

More information

PROPOSAL OF MULTI-HOP WIRELESS LAN SYSTEM FOR QOS GUARANTEED TRANSMISSION

PROPOSAL OF MULTI-HOP WIRELESS LAN SYSTEM FOR QOS GUARANTEED TRANSMISSION PROPOSAL OF MULTI-HOP WIRELESS LAN SYSTEM FOR QOS GUARANTEED TRANSMISSION Phuc Khanh KIEU, Shinichi MIYAMOTO Graduate School of Engineering, Osaka University 2-1 Yamada-oka, Suita, Osaka, 565-871 JAPAN

More information

616 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 7, NO. 5, OCTOBER This technique seems to be less known compared to the other two.

616 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 7, NO. 5, OCTOBER This technique seems to be less known compared to the other two. 616 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 7, NO. 5, OCTOBER 1999 An Uplink CDMA System Architecture with Diverse QoS Guarantees for Heterogeneous Traffic Sunghyun Choi, Student Member, IEEE, and Kang

More information

Lecture 12 December 04, Wireless Access. Graduate course in Communications Engineering. University of Rome La Sapienza. Rome, Italy

Lecture 12 December 04, Wireless Access. Graduate course in Communications Engineering. University of Rome La Sapienza. Rome, Italy Lecture 12 December 04, 2017 Wireless Access Graduate course in Communications Engineering University of Rome La Sapienza Rome, Italy 2017-2018 Random Medium Access Control Part II - CSMA and Collision

More information

CHAPTER 5. QoS RPOVISIONING THROUGH EFFECTIVE RESOURCE ALLOCATION

CHAPTER 5. QoS RPOVISIONING THROUGH EFFECTIVE RESOURCE ALLOCATION CHAPTER 5 QoS RPOVISIONING THROUGH EFFECTIVE RESOURCE ALLOCATION 5.1 PRINCIPLE OF RRM The success of mobile communication systems and the need for better QoS, has led to the development of 3G mobile systems

More information

Subject: Adhoc Networks

Subject: Adhoc Networks ISSUES IN AD HOC WIRELESS NETWORKS The major issues that affect the design, deployment, & performance of an ad hoc wireless network system are: Medium Access Scheme. Transport Layer Protocol. Routing.

More information

The MAC layer in wireless networks

The MAC layer in wireless networks The MAC layer in wireless networks The wireless MAC layer roles Access control to shared channel(s) Natural broadcast of wireless transmission Collision of signal: a /space problem Who transmits when?

More information

Wireless MACs: MACAW/802.11

Wireless MACs: MACAW/802.11 Wireless MACs: MACAW/802.11 Mark Handley UCL Computer Science CS 3035/GZ01 Fundamentals: Spectrum and Capacity A particular radio transmits over some range of frequencies; its bandwidth, in the physical

More information

RTT TECHNOLOGY TOPIC October 1998 WCDMA

RTT TECHNOLOGY TOPIC October 1998 WCDMA RTT TECHNOLOGY TOPIC October 1998 WCDMA In our last hot topic, we reviewed the future positioning of TD-CDMA including the rationale of taking the existing DECT time multiplexing structure to front end

More information

Redes de Computadores. Medium Access Control

Redes de Computadores. Medium Access Control Redes de Computadores Medium Access Control Manuel P. Ricardo Faculdade de Engenharia da Universidade do Porto 1 » How to control the access of computers to a communication medium?» What is the ideal Medium

More information

Toward a Reliable Data Transport Architecture for Optical Burst-Switched Networks

Toward a Reliable Data Transport Architecture for Optical Burst-Switched Networks Toward a Reliable Data Transport Architecture for Optical Burst-Switched Networks Dr. Vinod Vokkarane Assistant Professor, Computer and Information Science Co-Director, Advanced Computer Networks Lab University

More information

Outline. Introduction to Networked Embedded Systems - Embedded systems Networked embedded systems Embedded Internet - Network properties

Outline. Introduction to Networked Embedded Systems - Embedded systems Networked embedded systems Embedded Internet - Network properties Outline Introduction to Networked Embedded Systems - Embedded systems Networked embedded systems Embedded Internet - Network properties Layered Network Architectures - OSI framework descriptions of layers

More information

IMPLEMENTATION OF A PACKET PRIORITY AND FIFO QUEUING MODEL IN PACKET RADIO SYSTEM

IMPLEMENTATION OF A PACKET PRIORITY AND FIFO QUEUING MODEL IN PACKET RADIO SYSTEM IMPLEMENTATION OF A PACKET PRIORITY AND FIFO QUEUING MODEL IN PACKET RADIO SYSTEM H. Lami 1, A. Affandi 2 1, 2 Department of Electrical Engineering, Faculty of Industrial Technology, Institut Teknologi

More information

ECE 358 MAC Examples. Xuemin (Sherman) Shen Office: EIT 4155 Phone: x

ECE 358 MAC Examples. Xuemin (Sherman) Shen Office: EIT 4155 Phone: x ECE 358 MAC Examples Xuemin (Sherman) Shen Office: EIT 4155 Phone: x 32691 Email: xshen@bbcr.uwaterloo.ca Problem 1. Consider the following Aloha systems. (a) A group of N users share a 56 kbps pure Aloha

More information

Protocols for Multiaccess Networks

Protocols for Multiaccess Networks Protocols for Multiaccess Networks Hosts broadcast packets When a collision occurs, all transmitted packets are lost Lost packets have to be retransmitted => Need Multiaccess Protocol Model - Slotted Aloha

More information

Computer Communication III

Computer Communication III Computer Communication III Wireless Media Access IEEE 802.11 Wireless LAN Advantages of Wireless LANs Using the license free ISM band at 2.4 GHz no complicated or expensive licenses necessary very cost

More information

Data Link Layer Technologies

Data Link Layer Technologies Chapter 2.2 La 2 Data Link La Technologies 1 Content Introduction La 2: Frames Error Handling 2 Media Access Control General approaches and terms Aloha Principles CSMA, CSMA/CD, CSMA / CA Master-Slave

More information

CHAPTER 15 LOCAL AREA NETWORKS ANSWERS TO QUESTIONS

CHAPTER 15 LOCAL AREA NETWORKS ANSWERS TO QUESTIONS CHAPTER 15 LOCAL AREA NETWORKS ANSWERS TO QUESTIONS 15.1 Computer room networks require very high data rates and usually are concerned with transfer of large blocks of data. 15.2 Backend LAN: Backend networks

More information

A MOBILE CONTROLLED ALGORITHM FOR IMPROVING THE THROUGHPUT IN A S-ALOHA DS-CDMA SYSTEM

A MOBILE CONTROLLED ALGORITHM FOR IMPROVING THE THROUGHPUT IN A S-ALOHA DS-CDMA SYSTEM A MOBILE CONTROLLED ALORITHM FOR IMPROVIN THE THROUHPUT IN A S-ALOHA DS-CDMA SYSTEM Oriol Sallent, Ramon Agusti Departament de Teoria del Senyal i Comunicacions Universitat Politiknica de Catalunya C/

More information

Announcements / Wireless Networks and Applications Lecture 9: Wireless LANs Wireless. Regular Ethernet CSMA/CD.

Announcements / Wireless Networks and Applications Lecture 9: Wireless LANs Wireless. Regular Ethernet CSMA/CD. Announcements 18-452/18-750 Wireless Networks and Applications Lecture 9: Wireless LANs 802.11 Wireless Peter Steenkiste Homework 1 should be out by tomorrow Project 1 by Friday Schedule:» Thursday lecture

More information

Analyzing Multi-Channel Medium Access Control Schemes With ALOHA Reservation

Analyzing Multi-Channel Medium Access Control Schemes With ALOHA Reservation Analyzing Multi-Channel Medium Access Control Schemes With ALOHA Reservation Yunghsiang S. Han, Jing Deng and Zygmunt J. Haas Graduate Institute of Communication Engineering National Taipei University,

More information

original standard a transmission at 5 GHz bit rate 54 Mbit/s b support for 5.5 and 11 Mbit/s e QoS

original standard a transmission at 5 GHz bit rate 54 Mbit/s b support for 5.5 and 11 Mbit/s e QoS IEEE 802.11 The standard defines a wireless physical interface and the MAC layer while LLC layer is defined in 802.2. The standardization process, started in 1990, is still going on; some versions are:

More information

Where Are We? Basics: Network Classification Network Architecture Reliable Data Transfer Delay Models Implementation: Protocol Design

Where Are We? Basics: Network Classification Network Architecture Reliable Data Transfer Delay Models Implementation: Protocol Design Where Are We? Basics: Network Classification Network Architecture Reliable Data Transfer Delay Models Implementation: Protocol Design Layered Architecture Layered Architecture Data Link Layer Functionality

More information

Lecture 5 The Data Link Layer. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it

Lecture 5 The Data Link Layer. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it Lecture 5 The Data Link Layer Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it Link Layer: setting the context two physically connected devices: host-router, router-router, host-host,

More information

Quality of Service in the Internet

Quality of Service in the Internet Quality of Service in the Internet Problem today: IP is packet switched, therefore no guarantees on a transmission is given (throughput, transmission delay, ): the Internet transmits data Best Effort But:

More information

2. Modelling of telecommunication systems (part 1)

2. Modelling of telecommunication systems (part 1) 2. Modelling of telecommunication systems (part ) lect02.ppt S-38.45 - Introduction to Teletraffic Theory - Fall 999 2. Modelling of telecommunication systems (part ) Contents Telecommunication networks

More information

The MAC layer in wireless networks

The MAC layer in wireless networks The MAC layer in wireless networks The wireless MAC layer roles Access control to shared channel(s) Natural broadcast of wireless transmission Collision of signal: a time/space problem Who transmits when?

More information

ECE 653: Computer Networks Mid Term Exam all

ECE 653: Computer Networks Mid Term Exam all ECE 6: Computer Networks Mid Term Exam 16 November 004. Answer all questions. Always be sure to answer each question concisely but precisely! All questions have points each. 1. What are the different layers

More information

EFFICIENT SUPPORT OF CIRCUIT-MODE AND PACKET-MODE SERVICES IN MICRO-VSAT NETWORKS

EFFICIENT SUPPORT OF CIRCUIT-MODE AND PACKET-MODE SERVICES IN MICRO-VSAT NETWORKS EFFICIENT SUPPORT OF CIRCUIT-MODE AND PACKET-MODE SERVICES IN MICRO-VSAT NETWORKS M. Alvarez-Campana, E. Vázquez, A. Azcorra, R. de Gaudenzi and V. García* DIT-UPM, Spain ESA-ESTEC, The Netherlands * University

More information

Lecture 9 November 12, Wireless Access. Graduate course in Communications Engineering. University of Rome La Sapienza. Rome, Italy

Lecture 9 November 12, Wireless Access. Graduate course in Communications Engineering. University of Rome La Sapienza. Rome, Italy Lecture 9 November 12, 2018 Wireless Access Graduate course in Communications Engineering University of Rome La Sapienza Rome, Italy 2018-2019 Medium Access Control Scheduled access Classification of wireless

More information

CSE 461: Multiple Access. Homework: Chapter 2, problems 1, 8, 12, 18, 23, 24, 35, 43, 46, and 58

CSE 461: Multiple Access. Homework: Chapter 2, problems 1, 8, 12, 18, 23, 24, 35, 43, 46, and 58 CSE 461: Multiple Access Homework: Chapter 2, problems 1, 8, 12, 18, 23, 24, 35, 43, 46, and 58 Next Topic Key Focus: How do multiple parties share a wire? This is the Medium Access Control (MAC) portion

More information

COMPUTER NETWORKS - Local area networks

COMPUTER NETWORKS - Local area networks Local area networks Telecommunication Networks Group firstname.lastname@polito.it http://www.telematica.polito.it/ COMPUTER NETWORKS LANs - 1 Copyright Quest opera è protetta dalla licenza Creative Commons

More information

Local area networks. Copyright

Local area networks. Copyright Local area networks Telecommunication Networks Group firstname.lastname@polito.it http://www.telematica.polito.it/ COMPUTER NETWORKS LANs - 1 Copyright Quest opera è protetta dalla licenza Creative Commons

More information

CS 43: Computer Networks Media Access. Kevin Webb Swarthmore College November 30, 2017

CS 43: Computer Networks Media Access. Kevin Webb Swarthmore College November 30, 2017 CS 43: Computer Networks Media Access Kevin Webb Swarthmore College November 30, 2017 Multiple Access Links & Protocols Two classes of links : point-to-point dial-up access link between Ethernet switch,

More information

CPSC 441 Tutorial-19. Department of Computer Science University of Calgary

CPSC 441 Tutorial-19. Department of Computer Science University of Calgary CPSC 441 Tutorial-19 Department of Computer Science University of Calgary Problem-1 Consider n nodes that use the slotted CSMA/ CD with binary exponential back-off to access a shared broadcast channel.

More information

Data Link Layer, Part 5. Medium Access Control

Data Link Layer, Part 5. Medium Access Control CS 455 Medium Access Control, Page 1 Data Link Layer, Part 5 Medium Access Control These slides are created by Dr. Yih Huang of George Mason University. Students registered in Dr. Huang s courses at GMU

More information

Data Link Layer. Goals of This Lecture. Engineering Questions. Outline of the Class

Data Link Layer. Goals of This Lecture. Engineering Questions. Outline of the Class Data Link Layer Kuang Chiu Huang TCM NCKU Goals of This Lecture Through the lecture and in-class discussion, students are enabled to describe role and functions of the link layer, and compare different

More information

SIMON FRASER UNIVERSITY SCHOOL OF ENGINEERING SCIENCE. Spring 2013 ENSC 427: COMMUNICATION NETWORKS. Midterm No. 2(b) Monday, March 18, 2013

SIMON FRASER UNIVERSITY SCHOOL OF ENGINEERING SCIENCE. Spring 2013 ENSC 427: COMMUNICATION NETWORKS. Midterm No. 2(b) Monday, March 18, 2013 SIMON FRASER UNIVERSITY SCHOOL OF ENGINEERING SCIENCE Spring 2013 ENSC 427: COMMUNICATION NETWORKS Midterm No. 2(b) Monday, March 18, 2013 Duration: 50 minutes. Attempt all problems. Questions may not

More information

Computer Networks. Wenzhong Li. Nanjing University

Computer Networks. Wenzhong Li. Nanjing University Computer Networks Wenzhong Li Nanjing University 1 Chapter 2. Direct Link Networks Link Service and Framing Error Detection and Reliable Transmission HDLC, PPP, and SONET Token Ring Ethernet Bridges and

More information

RECENTLY, the information exchange using wired and

RECENTLY, the information exchange using wired and Fast Dedicated Retransmission Scheme for Reliable Services in OFDMA Systems Howon Lee and Dong-Ho Cho Department of Electrical Engineering and Computer Science Korea Advanced Institute of Science and Technology

More information

MULTIPLE ACCESS PROTOCOLS 2. 1

MULTIPLE ACCESS PROTOCOLS 2. 1 MULTIPLE ACCESS PROTOCOLS AND WIFI 1 MULTIPLE ACCESS PROTOCOLS 2. 1 MULTIPLE ACCESS LINKS, PROTOCOLS Two types of links : point-to-point broadcast (shared wire or medium) POINT-TO-POINT PPP for dial-up

More information

Reminder: Datalink Functions Computer Networking. Datalink Architectures

Reminder: Datalink Functions Computer Networking. Datalink Architectures Reminder: Datalink Functions 15-441 15 441 15-641 Computer Networking Lecture 5 Media Access Control Peter Steenkiste Fall 2015 www.cs.cmu.edu/~prs/15-441-f15 Framing: encapsulating a network layer datagram

More information

Chapter 4. The Medium Access Control Sublayer. Points and Questions to Consider. Multiple Access Protocols. The Channel Allocation Problem.

Chapter 4. The Medium Access Control Sublayer. Points and Questions to Consider. Multiple Access Protocols. The Channel Allocation Problem. Dynamic Channel Allocation in LANs and MANs Chapter 4 The Medium Access Control Sublayer 1. Station Model. 2. Single Channel Assumption. 3. Collision Assumption. 4. (a) Continuous Time. (b) Slotted Time.

More information

Local Area Networks (LANs) SMU CSE 5344 /

Local Area Networks (LANs) SMU CSE 5344 / Local Area Networks (LANs) SMU CSE 5344 / 7344 1 LAN/MAN Technology Factors Topology Transmission Medium Medium Access Control Techniques SMU CSE 5344 / 7344 2 Topologies Topology: the shape of a communication

More information

A RLC/MAC PROTOCOL ARCHITECTURE FOR A WIRELESS IP NETWORK

A RLC/MAC PROTOCOL ARCHITECTURE FOR A WIRELESS IP NETWORK A RLC/MAC PROTOCOL ARCHITECTURE FOR A WIRELESS IP NETWORK Jamil Y. Khan School of Electrical Engineering & Computer Science, University of Newcastle, Callaghan, NSW 238, Australia, jkhan@ecemail.newcastle.edu.au

More information