Where Are We? Basics: Network Classification Network Architecture Reliable Data Transfer Delay Models Implementation: Protocol Design

Similar documents
Protocols for Multiaccess Networks

Multiple Access (1) Required reading: Garcia 6.1, 6.2.1, CSE 3213, Fall 2010 Instructor: N. Vlajic

Multiple Access Communications. EEE 538, WEEK 11 Dr. Nail Akar Bilkent University Electrical and Electronics Engineering Department

Power Laws in ALOHA Systems

Packet multiple access and the Aloha protocol

Computer Network Fundamentals Spring Week 3 MAC Layer Andreas Terzis

Chapter 6 Medium Access Control Protocols and Local Area Networks

Wireless Medium Access Control Protocols

Multimedia Communication Services Traffic Modeling and Streaming

COMP/ELEC 429/556 Introduction to Computer Networks

Simulated SA Throughput vs. p

ECE 4450:427/527 - Computer Networks Spring 2017

EITF25 Internet Techniques and Applications L4: Network Access. Stefan Höst

Random Access. 1. Aloha. 2. Slotted Aloha 3. CSMA 4. CSMA/CD

TSIN01 Information Networks Lecture 8

COMPUTER NETWORKS - Local area networks

Local area networks. Copyright

Markov Chains and Multiaccess Protocols: An. Introduction

ECE 158A: Lecture 13. Fall 2015

Splitting Algorithms

EP2210 FEP3210 Performance analysis of Communication networks. Topic 2 Medium access control (or multiple access protocols)

CS 43: Computer Networks. 27: Media Access Contd. December 3, 2018

CS 716: Introduction to communication networks. - 9 th class; 19 th Aug Instructor: Sridhar Iyer IIT Bombay

CSE/EE 461 Section 2

Multiple Access Protocols

TSIN01 Information Networks Lecture 3

CS 3640: Introduction to Networks and Their Applications

CS 123: Lecture 12, LANs, and Ethernet. George Varghese. October 24, 2006

RMIT University. Data Communication and Net-Centric Computing COSC 1111/2061/1110. Lecture 8. Medium Access Control Methods & LAN

LANs. Local Area Networks. via the Media Access Control (MAC) SubLayer. Networks: Local Area Networks

CS 43: Computer Networks Media Access. Kevin Webb Swarthmore College November 30, 2017

ECEN 5032 Data Networks Medium Access Control Sublayer

Redes de Computadores. Medium Access Control

Medium Access Control. IEEE , Token Rings. CSMA/CD in WLANs? Ethernet MAC Algorithm. MACA Solution for Hidden Terminal Problem

Lecture 12 December 04, Wireless Access. Graduate course in Communications Engineering. University of Rome La Sapienza. Rome, Italy

IEEE , Token Rings. 10/11/06 CS/ECE UIUC, Fall

Slotted Aloha UHFHLYHU. Recall assumptions:

LANs Local Area Networks LANs provide an efficient network solution : To support a large number of stations Over moderately high speed

Lecture 6. Data Link Layer (cont d) Data Link Layer 1-1

ETSN01 Exam Solutions

The Link Layer and LANs. Chapter 6: Link layer and LANs

Link Layer and Ethernet

Outline. Application examples

Computer Networks. Medium Access Sublayer (Part I)

Final Review Fall 2017 Profs Peter Steenkiste & Justine Sherry

COMP476 Networked Computer Systems. Polling. Sharing the Wire. LAN Technologies. COMP476 Networked Computer Systems 1

CPSC 441 Tutorial-19. Department of Computer Science University of Calgary

ECSE-4670: Computer Communication Networks (CCN) Informal Quiz 3

Access Technologies! Fabio Martignon

Multiple Access Links and Protocols

Com S 611 Spring Semester 2007 Discrete Algorithms for Mobile and Wireless Networks. Lecture 3: Tuesday, 23rd January 2007

B. Bellalta Mobile Communication Networks

Link Layer and LANs 안상현서울시립대학교컴퓨터 통계학과.

Physical Layer. Medium Access Links and Protocols. Point-to-Point protocols. Modems: Signaling. Modems Signaling. Srinidhi Varadarajan

CSE/EE 461 Wireless and Contention-Free Protocols

Local Area Networks (LANs) SMU CSE 5344 /

Link Layer and Ethernet

MAC Protocols and Packet Switching

Ethernet. Network Fundamentals Chapter Cisco Systems, Inc. All rights reserved. Cisco Public 1

ECE453 Introduction to Computer Networks. Broadcast vs. PPP. Delay. Lecture 7 Multiple Access Control (I)

CMPE 150/L : Introduction to Computer Networks. Chen Qian Computer Engineering UCSC Baskin Engineering Lecture 16

Networks Homework # 2

Direct Link Networks (II)

Chapter 06 IP Address

The Medium Access Control Scheme (MAC Layer) Reference: Andrew S. Tanenbaum, Computer Networks, 3rd Edition, Prentice Hall, 1996.

Frames, Packets and Topologies

Homework 1. Question 1 - Layering. CSCI 1680 Computer Networks Fonseca

Chapter 5 part 1 LINK LAYER

LAN PROTOCOLS. Beulah A AP/CSE

Data Link Layer, Part 5. Medium Access Control

Physical and Link Layers. CS144 Review Session 6 November 6 th, 2008 Roger Liao Based on slides by Ben Nham

Lecture 19. Principles behind data link layer services Framing Multiple access protocols

Module 15: Network Structures

Can Multiple Subchannels Improve the Delay Performance of RTS/CTS-based MAC Schemes?

Wireless Communications

Unavoidable Constraints and Collision Avoidance Techniques in Performance Evaluation of Asynchronous Transmission WDMA Protocols

CSE 461: Multiple Access. Homework: Chapter 2, problems 1, 8, 12, 18, 23, 24, 35, 43, 46, and 58

CS 3516: Computer Networks

Adaptors Communicating. Link Layer: Introduction. Parity Checking. Error Detection. Multiple Access Links and Protocols

Cover sheet for Assignment 3

CSE 461 Multiple Access. David Wetherall

Local Area Networks. Aloha Slotted Aloha CSMA (non-persistent, 1-persistent, p-persistent) CSMA/CD Ethernet Token Ring

Module 15: Network Structures

Outline. Introduction to Networked Embedded Systems - Embedded systems Networked embedded systems Embedded Internet - Network properties

CCM 4300 Lecture 5 Computer Networks, Wireless and Mobile Communications. Dr Shahedur Rahman. Room: T115

From: The History of the Telephone Herbert N. Casson 1910

Cooperative Mobile Internet Access with Opportunistic Scheduling

Multiple Access. Data Communications and Networking

Data Link Layer, Part 3 Medium Access Control. Preface

FINAL May 21, minutes

Data Link Layer -2- Network Access

Chapter 1 Basic concepts of wireless data networks (cont d)

Written Exam in Information Networks TSIN01

Medium Access Control Protocols With Memory Jaeok Park, Member, IEEE, and Mihaela van der Schaar, Fellow, IEEE

Lecture 6 The Data Link Layer. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it

Internetwork Basic. Possible causes of LAN traffic congestion are

Reminder: Datalink Functions Computer Networking. Datalink Architectures

Introduction to LAN Protocols

MULTIPLE ACCESS PROTOCOLS 2. 1

MODELING OF SMART GRID TRAFFICS USING NON- PREEMPTIVE PRIORITY QUEUES

Transcription:

Where Are We? Basics: Network Classification Network Architecture Reliable Data Transfer Delay Models Implementation: Protocol Design

Layered Architecture

Layered Architecture

Data Link Layer Functionality Reliable Delivery of Frames Flow Control Error Detection Error Correction

Multiaccess Media

Multiaccess Media

Multiaccess Media Rules Don t interrupt when someone else is speaking Raise your hand if you have a question Give everyone a chance to speak

Multiaccess Media Rules Don t interrupt when someone else is speaking Raise your hand if you have a question Give everyone a chance to speak

Multiaccess Media Rules Don t interrupt when someone else is speaking Raise your hand if you have a question Give everyone a chance to speak

Multiaccess Media Rules Don t interrupt when someone else is speaking Raise your hand if you have a question Give everyone a chance to speak

Multiaccess Protocols Channel Partitioning (Cellular Wireless Networks) Random Access (Ethernet, WiFi) Taking Turns (Token Ring)

Multiaccess Protocols Channel Partitioning (Cellular Wireless Networks) Random Access (Ethernet, WiFi) Taking Turns (Token Ring)

Multiaccess Protocols Channel Partitioning (Cellular Wireless Networks) Random Access (Ethernet, WiFi) Taking Turns (Token Ring)

Multiaccess Protocols Channel Partitioning (Cellular Wireless Networks) Random Access (Ethernet, WiFi) Taking Turns (Token Ring)

Protocols for Multiaccess Networks Hosts broadcast packets When a collision occurs, all transmitted packets are lost Lost packets have to be retransmitted

Protocols for Multiaccess Networks Hosts broadcast packets When a collision occurs, all transmitted packets are lost Lost packets have to be retransmitted

Protocols for Multiaccess Networks Hosts broadcast packets When a collision occurs, all transmitted packets are lost Lost packets have to be retransmitted

Protocols for Multiaccess Networks Hosts broadcast packets When a collision occurs, all transmitted packets are lost Lost packets have to be retransmitted

Protocols for Multiaccess Networks Hosts broadcast packets When a collision occurs, all transmitted packets are lost Lost packets have to be retransmitted => Need Multiaccess Protocol

Protocols for Multiaccess Networks Goal: Understand Multiaccess Protocols Understand Ethernet and IEEE 802.11 Protocol Issues: How to deal with collisions? Maximal traffic load? ( > Protocol design) ( > Protocol performance)

Protocols for Multiaccess Networks Goal: Understand Multiaccess Protocols Understand Ethernet and IEEE 802.11 Protocol Issues: How to deal with collisions? Maximal traffic load? ( > Protocol design) ( > Protocol performance)

Protocols for Multiaccess Networks Goal: Understand Multiaccess Protocols Understand Ethernet and IEEE 802.11 Protocol Issues: How to deal with collisions? Maximal traffic load? ( > Protocol design) ( > Protocol performance)

Protocols for Multiaccess Networks Goal: Understand Multiaccess Protocols Understand Ethernet and IEEE 802.11 Protocol Issues: How to deal with collisions? Maximal traffic load? ( > Protocol design) ( > Protocol performance)

Protocols for Multiaccess Networks Goal: Understand Multiaccess Protocols Understand Ethernet and IEEE 802.11 Protocol Issues: How to deal with collisions? Maximal traffic load? ( > Protocol design) ( > Protocol performance)

Time is divided into slots: unit time = L C seconds Packet arrival rate (over all hosts) of λ packets/time unit Collision or Perfect Reception Immediate Feedback: 0, 1, e (Re-)transmission Probability: q r Infinite number of hosts (i.e. each node has at most one packet to transmit)

Time is divided into slots: unit time = L C seconds Packet arrival rate (over all hosts) of λ packets/time unit Collision or Perfect Reception Immediate Feedback: 0, 1, e (Re-)transmission Probability: q r Infinite number of hosts (i.e. each node has at most one packet to transmit)

Time is divided into slots: unit time = L C seconds Packet arrival rate (over all hosts) of λ packets/time unit Collision or Perfect Reception Immediate Feedback: 0, 1, e (Re-)transmission Probability: q r Infinite number of hosts (i.e. each node has at most one packet to transmit)

Time is divided into slots: unit time = L C seconds Packet arrival rate (over all hosts) of λ packets/time unit Collision or Perfect Reception Immediate Feedback: 0, 1, e (Re-)transmission Probability: q r Infinite number of hosts (i.e. each node has at most one packet to transmit)

Time is divided into slots: unit time = L C seconds Packet arrival rate (over all hosts) of λ packets/time unit Collision or Perfect Reception Immediate Feedback: 0, 1, e (Re-)transmission Probability: q r Infinite number of hosts (i.e. each node has at most one packet to transmit)

Questions Throughput? How to choose q r? Would q r = 1 work? Probability for (re-)transmission after k 1 slots: Average time until (re-)transmission:

Questions Throughput? How to choose q r? Would q r = 1 work? Probability for (re-)transmission after k 1 slots: Average time until (re-)transmission:

Questions Throughput? How to choose q r? Would q r = 1 work? Probability for (re-)transmission after k 1 slots: Average time until (re-)transmission:

Questions Throughput? How to choose q r? Would q r = 1 work? Probability for (re-)transmission after k 1 slots: Average time until (re-)transmission:

Questions Throughput? How to choose q r? Would q r = 1 work? Probability for (re-)transmission after k 1 slots: Average time until (re-)transmission:

Questions Throughput? How to choose q r? Would q r = 1 work? Probability for (re-)transmission after k 1 slots: Average time until (re-)transmission:

Notation λ: aggregated arrival rate n: number of backlogged packets G(n) = nq r : average number of transmissions per time slot Want to compute P succ : probability of successful transmission in a time slot (as a function of G(n)) Throughput = Psucc 1

Notation λ: aggregated arrival rate n: number of backlogged packets G(n) = nq r : average number of transmissions per time slot Want to compute P succ : probability of successful transmission in a time slot (as a function of G(n)) Throughput = Psucc 1

Notation λ: aggregated arrival rate n: number of backlogged packets G(n) = nq r : average number of transmissions per time slot Want to compute P succ : probability of successful transmission in a time slot (as a function of G(n)) Throughput = Psucc 1

Notation λ: aggregated arrival rate n: number of backlogged packets G(n) = nq r : average number of transmissions per time slot Want to compute P succ : probability of successful transmission in a time slot (as a function of G(n)) Throughput = Psucc 1

Notation λ: aggregated arrival rate n: number of backlogged packets G(n) = nq r : average number of transmissions per time slot Want to compute P succ : probability of successful transmission in a time slot (as a function of G(n)) Throughput = Psucc 1

Notation λ: aggregated arrival rate n: number of backlogged packets G(n) = nq r : average number of transmissions per time slot Want to compute P succ : probability of successful transmission in a time slot (as a function of G(n)) Throughput = Psucc 1

P succ = nq r ( 1 q r ) n 1 = nq r 1 q r ( 1 q r ) n

P succ = nq r ( 1 q r ) n 1 = nq r 1 q r ( 1 q r ) n For q r small, we have ( 1 q r ) n e nq r and nq r 1 q r nq r,

P succ = nq r ( 1 q r ) n 1 = nq r 1 q r ( 1 q r ) n For q r small, we have ( 1 q r ) n e nq r and nq r 1 q r nq r, and we obtain P succ nq r e nqr = G(n)e G(n) where G(n) = nq r

Throughput: G(n)e G(n) where G(n) = nq r

Throughput: G(n)e G(n) where G(n) = nq r Note: Arrivals according to a Poisson distribution with rate G: p k = Gk k! e G

If G(n)e G(n) > λ: If G(n)e G(n) < λ: Optimal G(n) = nq r = 1, or q r = 1 n

If G(n)e G(n) > λ: If G(n)e G(n) < λ: Optimal G(n) = nq r = 1, or q r = 1 n

If G(n)e G(n) > λ: If G(n)e G(n) < λ: Optimal G(n) = nq r = 1, or q r = 1 n

If G(n)e G(n) > λ: If G(n)e G(n) < λ: Optimal G(n) = nq r = 1, or q r = 1 n

What did we learn? λ max = e 1 0.368 q r should dynamically change Binary Exponential Backoff q r = 2 k

What did we learn? λ max = e 1 0.368 q r should dynamically change Binary Exponential Backoff q r = 2 k

What did we learn? λ max = e 1 0.368 q r should dynamically change Binary Exponential Backoff q r = 2 k

What did we learn? λ max = e 1 0.368 q r should dynamically change Binary Exponential Backoff q r = 2 k