Introduction to Queueing Theory

Slides:



Advertisements
Similar presentations
Channel Allocation Protocols. Dynamic Channel Allocation Parameters Station Model. –N independent stations, each acting as a Poisson Process for the purpose.
Advertisements

The ALOHA Protocol “Free for all”: whenever station has a frame to send, it does so. –Station listens for maximum RTT for an ACK. –If no ACK after a specified.
EECC694 - Shaaban #1 lec #5 Spring Data Link In Broadcast Networks: The Media Access Sublayer Broadcast networks with multi-access (or random.
Fundamentals of Computer Networks ECE 478/578
Ethernet. Review Media Access Control – Broadcast media shared by all stations – MAC is used to determine who gets the right to send Developed protocol.
1 K. Salah Module 4.2: Media Access Control The Media Access Control (MAC) sublayer –Random Access (CSMA), IEEE –Token Passing, IEEE Ch 13-
EEC-484/584 Computer Networks Lecture 7 Wenbing Zhao
MAC Protocols Media Access Control (who gets the use the channel) zContention-based yALOHA and Slotted ALOHA. yCSMA. yCSMA/CD. TDM and FDM are inefficient.
CS 5253 Workshop 1 MAC Protocol and Traffic Model.
CMPE 150- Introduction to Computer Networks 1 CMPE 150 Fall 2005 Lecture 17 Introduction to Computer Networks.
The Data Link Layer Read Chapters 3 and 4. CSC 3352 Computer Communications Chapter 3&42 Where in the OSI Reference Model ? Session Transport Network.
Copyright © 2003, Dr. Dharma P. Agrawal and Dr. Qing-An Zeng. All rights reserved. 1 Chapter 6 Multiple Radio Access.
EEC-484/584 Computer Networks Lecture 7 Wenbing Zhao
CMPE 150- Introduction to Computer Networks 1 CMPE 150 Fall 2005 Lecture 16 Introduction to Computer Networks.
EEC-484/584 Computer Networks Lecture 13 Wenbing Zhao
EEC-484/584 Computer Networks Lecture 9 Wenbing Zhao (Part of the slides are based on materials supplied by Dr. Louise Moser at UCSB and.
Studying Local Area Networks Via Media Access Control (MAC) SubLayer
CS 5253 Workshop 1 MAC Protocol and Traffic Model.
Networks: Local Area Networks1 LANs Studying Local Area Networks Via Media Access Control (MAC) SubLayer.
Computer Networks: Local Area Networks 1 LANs Studying Local Area Networks via the Media Access Control (MAC) SubLayer.
EEC-484/584 Computer Networks Lecture 7 Wenbing Zhao
Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011 The Medium Access Control Sublayer Chapter.
1 Chapter 5 The Medium Access Sublayer. 2 Chapter 5 The Medium Access Layer 5.1 The Channel Allocation problem - Static and dynamic channel allocation.
Medium Access Control Sublayer
1 ECE453 – Introduction to Computer Networks Lecture 7 – Multiple Access Control (I)
Multiple Access Protocols Chapter 6 of Hiroshi Harada Book
CIS 725 Media Access Layer. Medium Access Control Sublayer MAC sublayer resides between physical and data link layer Broadcast/multiacess channels N independent.
Chi-Cheng Lin, Winona State University CS412 Introduction to Computer Networking & Telecommunication Medium Access Control Sublayer.
Chapter 4: Medium Access Control (MAC) Sublayer
CHAPTER 4: THE MEDIUM ACCESS SUBLAYER 4.1: The Channel Allocation Problem 4.2: Multiple Access Protocols.
جلسه دهم شبکه های کامپیوتری به نــــــــــــام خدا.
Layer 2 Technologies At layer 2 we create and transmit frames over communications channels Format of frames and layer 2 transmission protocols are dependent.
The Medium Access Control Sublayer Chapter 4. The Channel Allocation Problem Static Channel Allocation Dynamic Channel Allocation  Delay for the divided.
Chi-Cheng Lin, Winona State University CS 313 Introduction to Computer Networking & Telecommunication Medium Access Control Sublayer.
The Medium Access Control Sublayer Chapter 4. The Channel Allocation Problem Static Channel Allocation in LANs and MANs Dynamic Channel Allocation in.
جلسه یازدهم شبکه های کامپیوتری به نــــــــــــام خدا.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2000 Unit-II Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
17 - Winter 2005 ECE ECE 766 Computer Interfacing and Protocols 1 Local Area Networks Need for high performance communications for physically close devices.
Medium Access Control Sub Layer
7-1 Introduction to Queueing Theory l Components of a queueing system n probability density function (pdf) of interarrival times n pdf of service times.
Chapter 6 Multiple Radio Access
CS3502: Data and Computer Networks Local Area Networks - 1 introduction and early broadcast protocols.
5: DataLink Layer 5a-1 Multiple Access protocol. 5: DataLink Layer 5a-2 Multiple Access Links and Protocols Three types of “links”: r point-to-point (single.
CS3502: Data and Computer Networks Local Area Networks - 1 introduction and early broadcast protocols.
Carrier Sense Multiple Access Improve ALOHA by using carrier sense –Stations listen to the carrier before transmitting –If channel is busy, the station.
Tel Hai Academic College Department of Computer Science Prof. Reuven Aviv Markov Models for Access Control in Computer Networks Resource: Fayez Gebali,
Chapter 4 The Medum Access Sublayer. MA Sublayer Additional Reference –Local and Metropolitan Area Networks, William Stallings, Prentice Hall, 2000, 6th.
Medium Access Control Protocols, Local Area Networks, and Wireless Local Area Networks Lecture Note 10.
THE MEDIUM ACCESS CONTROL SUBLAYER 4.1 THE CHANNEL ALLOCATION PROBLEM 4.2 MULTIPLE ACCESS PROTOCOLS.
UNIT 2 Medium Access sub layer: Medium Access sub layer - Channel Allocations, LAN protocols - ALOHA protocols(PURE AND SLOTTED ALOHA),CSMA/CA,CSMA/CD.
COMPUTER NETWORKS Data-link Layer (The Medium Access Control Sublayer) MAC Sublayer.
Multiple Access By, B. R. Chandavarkar, CSE Dept., NITK, Surathkal Ref: B. A. Forouzan, 5 th Edition.
CS 5253 Workshop 1 MAC Protocol and Traffic Model.
Example DLL Protocols 1. High-Level Data Link Control (HDLC).
Week3 The Medium Access Sublayer
Sidevõrgud IRT 4060/ IRT 0020 vooruloeng 6 / 20. okt 2004
Module 3 Medium Access Control.
Chapter 4 MAC sublayer Dr. N Amanquah
Net301 lecture9 11/5/2015 Lect 9 NET301.
Services of DLL Framing Link access Reliable delivery
Figure 12.1 Data link layer divided into two functionality-oriented sublayers Networks can be divided into two categories: those using point-to-point.
The Medium Access Control Sublayer
The Medium Access Control (MAC) Sublayer
Overview Jaringan Komputer (3)
The Medium Access Control Sublayer
Channel Allocation Problem/Multiple Access Protocols Group 3
Channel Allocation Problem/Multiple Access Protocols Group 3
Computer Interfacing and Protocols
Chapter 6 Multiple Radio Access.
Dr. John P. Abraham Professor UTPA
Presentation transcript:

Introduction to Queueing Theory Components of a queueing system probability density function (pdf) of interarrival times pdf of service times the number of servers the queueing disciplines the amount of buffer

Intro. to Queueing Theory (cont’d) Notation M: exponential density function D: deterministic G: general e.g. M/M/1, M/M/m/m, M/D/1/K, G/G/m Little’s result: N=T. M/G/1 queues are fully solvable (P-K formula) M/M/m/m queueing models can be used to analyze the call blocking probability (Erlang B formula)

Medium Access Sublayer How to access a multiaccess/random access/ broadcast channel? Static channel allocation FDM low throughput example: M/M/1 with arrival rate l (frames per sec.) and service rate m (frames per sec.) Tshared=1/(m-l) for sharing the entire channel TFDM=1/(m/n-l/n)=n/(m-l)=n Tshared for distributing equally the traffic among n identical subchannels (same total cap.)

Medium Access Sublayer (cont’d) Dynamic channel allocation station models: N independent Poisson sources (exponential interarrival times) single channel errors & retransmissions are caused solely by collisions continuous time vs. slotted time with and without carrier sense

Medium Access Sublayer (cont’d) ALOHA protocols pure ALOHA users transmit data whenever they have data to send collisions can be detected damaged frames are retransmitted after a random delay fixed frame size (which leads to the max. throughput) Fig. 4-1, p. 247

Medium Access Sublayer (cont’d) ALOHA protocols (cont’d) pure ALOHA (cont’d) performance analysis S: normalized throughput/offered load (0  S  1) G: S + retransmissions Poisson arrival process with mean rate G (assumed) Pr{k arrivals in a time period of t}=Pk(t)=(Gt)ke-Gt/k! Fig. 4-2, p. 249

Medium Access Sublayer (cont’d) ALOHA protocols (cont’d) pure ALOHA (cont’d) Pr{a particular frame is successfully transmitted} = Pr{0 other transmission in its vulnerable period (2)} = e-2G Then, S = G e-2G. To maximize S dS/dG=e-2G-2G e-2G=(1-2G) e-2G=0. Consequently, G*=0.5 and S*=1/2e=18%.

Medium Access Sublayer (cont’d) ALOHA protocols (cont’d) slotted ALOHA the same as pure ALOHA except that data are transmitted at the beginning of a time slot the vulnerable period is 1 performance analysis Pr{a particular frame is successfully transmitted} = Pr{0 other transmission in its vulnerable period (1)} = e-G Then, S = G e-G. To maximize S, dS/dG=e-G-G e-G=(1-G) e-G=0. Consequently, G*=1 and S*=1/e=36%.

Medium Access Sublayer (cont’d) ALOHA protocols (cont’d) slotted ALOHA (cont’d) expected number of transmissions of a frame success probability = e-G failure probability = 1 - e-G Assume that the number of transmissions can be characterized by a geometric distribution Pr{k transmissions} = e-G (1- e-G)k-1. mean value = 1/ e-G = eG (delay increases exponentially with G)

Medium Access Sublayer (cont’d) Carrier sense multiple access (CSMA) protocols 1-persistent CSMA (0) Continue. (1) If the station is idle, go to (0). (2) Sense the channel. (3) If the channel is busy, go to (2) [with probability 1]. (4) Send the frame. (5) If there is no collision, go to (1). (6) Delay a random time and go to (2).

Medium Access Sublayer (cont’d) CSMA protocols (cont’d) nonpersistent CSMA (0) Continue. (1) If the station is idle, go to (0). (2) Sense the channel. (3) If the channel is busy, delay a random time and go to (2). (4) Send the frame. (5) If there is no collision, go to (1). (6) Delay a random time and go to (2). Achieves better channel throughput but incurs larger delay than 1-persistent CSMA.

Medium Access Sublayer (cont’d) CSMA protocols (cont’d) p-persistent CSMA (applied to slotted channels) (0) Continue. (1) If the station is idle, go to (0). (2) Sense the channel. (3) If the channel is busy, wait until the next time slot and go to (2). (4) Generate a uniformly distributed random variable R over interval [0,1]. (5) If p  R  1, then wait until the next time slot and sense the channel. If the channel is idle then go to (4). Else send the frame. If there is no collision, go to (1). (6) Delay a random time and go to (2).

Medium Access Sublayer (cont’d) CSMA protocols (cont’d) CSMA/CD (CSMA with collision detection) Fig. 4-5, p. 253 channel seizure time is 2t, where t is the full cable propagation time t0 t0+t- A B t0+2t-

Medium Access Sublayer (cont’d) Collision-free protocols bit-map protocol N contention (reservation) slots, one for each station, before a transmission period example Fig. 4-6, p. 254 the length of each contention period is N

Medium Access Sublayer (cont’d) Collision-free protocols (cont’d) binary countdown example Fig. 4-7, p. 256 the length of each contention period is log2N

Medium Access Sublayer (cont’d) Limited-contention protocols objectives low delay at low load (like contention protocols) high throughput at high load (like contention-free protocols) success probability analysis k stations, each transmitting with probability p Let g = Pr{someone transmits successfully} = kp(1-p)k-1. Find g* (optimal) by setting d/dp[kp(1-p)k-1] to 0. Then, p* = 1/k and g* = (1-1/k)k-1. Fig. 4-8, p. 258

Medium Access Sublayer (cont’d) Limited-contention protocols (cont’d) basic approaches divide stations into groups (trying to limit k) only members of a group are allowed to transmit at a time the adaptive tree walk protocol binary trees with depth first search upon collisions example Fig. 4-9, p. 259

Medium Access Sublayer (cont’d) Limited-contention protocols (cont’d) the adaptive tree walk protocol (cont’d) under low loads, the search should start from the top under heavy loads, the search should start from the bottom What is the optimal level to start the search? Let q be the expected number of ready stations. Label the levels from the top by 0,1,2,... For a node at level i, a fraction of 1/2i of the total stations is below it. An optimal selection of i is to let q/2i=1. Consequently, i*=log2q. ways to improve the performance: e.g. If Node 1: collision & Node 2: idle, then skip Node 3 (must be collision)