CPSC 441 Tutorial-19. Department of Computer Science University of Calgary

Similar documents
CSMA/CD (Collision Detection)

Chapter 6 Medium Access Control Protocols and Local Area Networks

High Level View. EE 122: Ethernet and Random Access protocols. Medium Access Protocols

CS 716: Introduction to communication networks. - 9 th class; 19 th Aug Instructor: Sridhar Iyer IIT Bombay

EE 122: Ethernet and

Data Link Layer, Part 5. Medium Access Control

Ethernet. Introduction. CSE 3213 Fall 2011

Data Link Layer, Part 3 Medium Access Control. Preface

Topics. Link Layer Services (more) Link Layer Services LECTURE 5 MULTIPLE ACCESS AND LOCAL AREA NETWORKS. flow control: error detection:

Multiple Access (1) Required reading: Garcia 6.1, 6.2.1, CSE 3213, Fall 2010 Instructor: N. Vlajic

LANs. Local Area Networks. via the Media Access Control (MAC) SubLayer. Networks: Local Area Networks

EITF25 Internet Techniques and Applications L4: Network Access. Stefan Höst

Multiple Access Protocols

Data and Computer Communications. Chapter 11 Local Area Network

1-1. Switching Networks (Fall 2010) EE 586 Communication and. November 8, Lecture 30

ECE 4450:427/527 - Computer Networks Spring 2017

CPSC 441 Tutorial-1. Department of Computer Science University of Calgary

Random Access. 1. Aloha. 2. Slotted Aloha 3. CSMA 4. CSMA/CD

Redes de Computadores. Medium Access Control

College of Computer and Information Sciences Department of Computer Engineering CEN444 Computer Networks Midterm 2 Exam Second Semester 1434/1435

Aloha and slotted aloha

Protocols for Multiaccess Networks

CHAPTER 7 MAC LAYER PROTOCOLS. Dr. Bhargavi Goswami Associate Professor & Head Department of Computer Science Garden City College

EECS Introduction to Computer Networking. Local Area Networks / Ethernet. Hub

Multiple Access Links and Protocols

Link Layer and Ethernet

Multiple Access. Data Communications and Networking

Access Technologies! Fabio Martignon

Computer Networks Medium Access Control. Mostafa Salehi Fall 2008

CS 43: Computer Networks Media Access. Kevin Webb Swarthmore College November 30, 2017

Link Layer and LANs 안상현서울시립대학교컴퓨터 통계학과.

Local Area Networks (LANs) SMU CSE 5344 /

Lecture 8 The Data Link Layer part I. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it

CS 455/555 Intro to Networks and Communications. Link Layer

Problem Set Name the 7 OSI layers and give the corresponding functionalities for each layer.

ECEN 5032 Data Networks Medium Access Control Sublayer

LAN PROTOCOLS. Beulah A AP/CSE

Direct Link Networks (II)

Link Layer and Ethernet

Chapter 5: Link layer

CS 43: Computer Networks. 27: Media Access Contd. December 3, 2018

Data Link Layer: Collisions

Media Access Control (MAC) Sub-layer and Ethernet

Medium Access Control

Computer Network Fundamentals Spring Week 3 MAC Layer Andreas Terzis

The Link Layer and LANs. Chapter 6: Link layer and LANs

Data Link Layer -2- Network Access

Mobile Communications Chapter 3 : Media Access

Midterm Review EECS 122. University of California Berkeley

Medium Access Control Sublayer

Lecture 19. Principles behind data link layer services Framing Multiple access protocols

COMMUNICATION NETWORKS NETW 501

Physical Layer. Medium Access Links and Protocols. Point-to-Point protocols. Modems: Signaling. Modems Signaling. Srinidhi Varadarajan

Lecture 12 December 04, Wireless Access. Graduate course in Communications Engineering. University of Rome La Sapienza. Rome, Italy

LECTURE PLAN. Script. Introduction about MAC Types o ALOHA o CSMA o CSMA/CD o CSMA/CA

CMPE 150/L : Introduction to Computer Networks. Chen Qian Computer Engineering UCSC Baskin Engineering Lecture 16

Data Link Layer -2- Network Access

FINAL May 21, minutes

Chapter 4. The Medium Access Control Sublayer. Points and Questions to Consider. Multiple Access Protocols. The Channel Allocation Problem.

COMP/ELEC 429/556 Introduction to Computer Networks

Chapter 5 Link Layer and LANs

Data and Computer Communications

Chapter 12 Multiple Access 12.1

Links Reading: Chapter 2. Goals of Todayʼs Lecture. Message, Segment, Packet, and Frame

COMP476 Networked Computer Systems. Polling. Sharing the Wire. LAN Technologies. COMP476 Networked Computer Systems 1

Wireless Medium Access Control Protocols

Local Area Networks. Aloha Slotted Aloha CSMA (non-persistent, 1-persistent, p-persistent) CSMA/CD Ethernet Token Ring

CS 421: COMPUTER NETWORKS SPRING FINAL May 24, minutes. Name: Student No: TOT

ENGI 4557 Digital Communications Practice Problems 2017 (Part 2)

King Fahd University of Petroleum and Minerals College of Computer Sciences and Engineering Department of Computer Engineering

LANs Local Area Networks LANs provide an efficient network solution : To support a large number of stations Over moderately high speed

Lecture 6. Data Link Layer (cont d) Data Link Layer 1-1

Outline. Introduction to Networked Embedded Systems - Embedded systems Networked embedded systems Embedded Internet - Network properties

RMIT University. Data Communication and Net-Centric Computing COSC 1111/2061/1110. Lecture 8. Medium Access Control Methods & LAN

The Medium Access Control Scheme (MAC Layer) Reference: Andrew S. Tanenbaum, Computer Networks, 3rd Edition, Prentice Hall, 1996.

The MAC layer in wireless networks

COMPUTER NETWORKS - Local area networks

Local area networks. Copyright

12.2. Figure 12.1 Data link layer divided into two functionality-oriented sublayers

Data Link Layer: Multi Access Protocols

CS 421: COMPUTER NETWORKS SPRING FINAL May 21, minutes

Ethernet. Networks: Ethernet 1

CPE 548 Exam #1 (50 pts) February 17, 2016

ECE 4450:427/527 - Computer Networks Spring 2017

CMPE 257: Wireless and Mobile Networking

CS 421: COMPUTER NETWORKS SPRING FINAL May 16, minutes

CSE 461: Multiple Access Networks. This Lecture

ICE 1332/0715 Mobile Computing (Summer, 2008)

COS 140: Foundations of Computer Science

CARRIER SENSE MULTIPLE ACCESS (CSMA):

Media Access Control. Networked Systems (H) Lecture 5

cs/ee 143 Fall

Computer Networks. Wenzhong Li. Nanjing University

Random Assignment Protocols

Lecture 5 The Data Link Layer. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it

CSC 4900 Computer Networks: The Link Layer

Computer Networks. Medium Access Sublayer (Part I)

Lecture 6 The Data Link Layer. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it

Data Link Layer: Overview, operations

Applied Networks & Security

Transcription:

CPSC 441 Tutorial-19 Department of Computer Science University of Calgary

Problem-1 Consider n nodes that use the slotted CSMA/ CD with binary exponential back-off to access a shared broadcast channel. Assume that each node has a data frame to transmit. Using CS-MA/CD, all nodes listen to the channel and decide to transmit their frames as they all sense the channel idle. Clearly, this results in a collision and hence they have to retransmit in the following time slots. What is the probability that one of the nodes successfully retransmits its frame in the next time slot? 2

Solution-1 Each node will choose a random wait time from the set {0, 1}. The probability that a given node transmits successfully is given by Success = Pr{node choose 0 and other node choose 1} = Pr{node choose 0} * Pr{one node choose 1}^n-1 Each node uniformly chooses from the set {0,1}, thus the probability of choosing 0 is ½ and the probability of choosing 1 is ½ 3

Solution cont Success = ½ * (½ )^n-1 There is a successful transmission if any node is successful. Therefore, Prob. Success Tx = n * Success = n/(2^n) 4

Problem-2(a) Consider a broadcast channel with N nodes and a transmission rate of R bps. The broadcast channel uses polling (with an additional polling node) for multiple access. The amount of time from when a node completes transmission until the subsequent node is permitted to transmit (that is, the polling delay) is D. Assume that within a polling round, a given node is allowed to transmit at most Q bits. What is the maximum throughput of the broadcast channel? 5

Solution-2(a) Throughput is given by = Data Transmitted in one round/ Time to complete one round = N * Q/(N * (D + Q/R)) = Q/(D + Q/R) 6

Problem-2(b) Same as 2(a), except that only one node is transmitting the data. Find the effective throughput for this node. 7

Solution-2(b) Throughput is given by = Data Transmitted in one round/ Time to complete one round = Q/(N * D + Q/R) 8

Problem-3 This question is concerned with the minimum frame size required for link layer collision detection on a shared broadcast channel such as Ethernet protocol with shared bus topology. For example, 10Base Ethernet imposes a minimum frame size of 64 bytes. Suppose that two nodes A and B are connected together using a broadcast channel such that distance between A and B is d meters signals propagate in the channel at the speed of c meters per second, transmission speed of the channel is R bits per second. Suppose that node A begins transmitting a frame, and before it finishes, node B begins transmitting a frame. If the frame size is too small then A may finish transmitting before it detects that B has transmitted. Derive a formula to find the minimum size needed for a link layer frame in this network in order to correctly detect collisions. 9

Solution-3 (long) We need to make sure that one end of the Ethernet is able to detect the collision before it completes its transmission of a frame. Thus, a minimum frame size is required. Consider the worst case for Ethernet s collision detection: 1. At t = 0: A starts transmitting a frame of length X bits 2. At time t = 1/R + d/c: the first bit of A s frame arrives at B 3. Right before receiving A s first bit, B starts transmitting a frame of its own. This happens a moment before time t = 1/R+d/c, before B can sense A s first bit 4. The first bit of B s frame arrives at A at time t = 2 * (1/R + d/c) If A finishes its transmission of its last bit just before first bit of B s frame arrives at A, then A won t be able to detect a collision befor e finishing its transmission of the frame. Thus, in order for A to de tect collision before finishing transmission, the minimum required frame size should be X 2R * (1/R + d/c) bits 2R * d/c bits 10

Solution-3 (Short) Transmission time of the frame should be longer than the round-trip propagation delay of the channel. Therefore, X/R 2 * d/c X 2R * d/c 11

Problem-4 Consider nodes A and B that are using the slotted ALOHA protocol to access a shared channel. Suppose A has more data to transmit than B. Let pa and pb denote A and B s respective retransmission probabilities, and assume that pa > pb. Answer the following questions: Give an expression for node A s average throughput What is the total efficiency of the protocol with these two nodes? 12

Solution-4 Let R denote the channel rate. If the efficiency is X then the average throughput is given by X*R. For simplicity, let assume the channel capacity is R = 1, and pa and pb are the probability of transmission at any given time slot. a) A s average throughput is given by pa(1-pb) b) Total efficiency is pa(1-pb) + pb(1-pa) 13

Problem-5 Consider N wireless nodes that are using the slotted ALOHA protocol to access a shared channel. One of the nodes, referred to as node A, has more data to transmit than any other node. Node A has retransmission probability pa, and every other node has retransmission probability p (0 < p < 1). Find pa so that the average throughput of node A is twice as large as that of any other node. 14

Solution-5 Assume pa and p as the probability of transmission at any given time slot. A s throughput is pa(1-p)^n-1, and any other node has throughput [p(1-p)^n-2] * (1-pA). Thus, pa (1-p) ^ N-1 = 2 *p(1-pa)[(1-p)^n-2] pa pa * p = 2p 2p * pa pa = 2p/(1 + p) 15