1 Presenter: Ching-Lung Tseng Adviser: Ho-Ting Wu Date: 2004/07/26 Department of Computer Science and Information Engineering, National Taipei University.

Slides:



Advertisements
Similar presentations
1 IK1500 Communication Systems IK1330 Lecture 3: Networking Anders Västberg
Advertisements

Winter 2004 UCSC CMPE252B1 CMPE 257: Wireless and Mobile Networking SET 3f: Medium Access Control Protocols.
Synchronous Links/Networks Modems are asynchronous - penalized by start bits and stop bits on each character (and dead time) Synchronous Networks recover.
Packet Switching COM1337/3501 Textbook: Computer Networks: A Systems Approach, L. Peterson, B. Davie, Morgan Kaufmann Chapter 3.
24-1 Chapter 24. Congestion Control and Quality of Service (part 1) 23.1 Data Traffic 23.2 Congestion 23.3 Congestion Control 23.4 Two Examples.
Fundamentals of Computer Networks ECE 478/578 Lecture #9: Collision Resolution and Collision Free Protocols Instructor: Loukas Lazos Dept of Electrical.
LECTURE 11 CT1303 LAN. DYNAMIC MAC PROTOCOL No fixed assignment for transmission media or any network resources.. It allows transmission when needed.
Dynamic Bandwidth Scheduling for QoS Enhancement over IEEE WLAN Sangwook Kang, Sungkwan Kim, Mingan Wang, Sunshin An Korea University European Wireless.
Speaker : 尹培華 Pei-Hwa Yin 指導教授:吳和庭老師 EPON Introduction 1.
1 Version 3.0 Module 6 Ethernet Fundamentals. 2 Version 3.0 Why is Ethernet so Successful? In 1973, it could carry data at 3 Mbps Now, it can carry data.
Department of Computer Engineering University of California at Santa Cruz Networking Systems (1) Hai Tao.
On the Multicast Scheduling Mechanism for Interconnected WDM Optical Networks Student : Tse Hsien Lin Teacher : Ho-Ting Wu Date :
Spatial Reuse Ring Networks Chun-Hung Chen Department of Computer Science and Information Engineering National Taipei University of Technology
Copyright © 2003, Dr. Dharma P. Agrawal and Dr. Qing-An Zeng. All rights reserved. 1 Chapter 6 Multiple Radio Access.
A WDM Passive Optical Network Architecture for Multicasting Services Student : Tse-Hsien Lin Teacher : Ho-Ting Wu Date :
1 6/27/ :02 Chapter 15LAN Performance1 Rivier College CS575: Advanced LANs Chapter 15: LAN Performance.
A combinational media access protocol for multicast traffic in single-hop WDM lans Student : T.H Lin Teacher : H.T Wu Date : 7.28.
1 Algorithms for Bandwidth Efficient Multicast Routing in Multi-channel Multi-radio Wireless Mesh Networks Hoang Lan Nguyen and Uyen Trang Nguyen Presenter:
Lecture 16 Random Access protocols r A node transmits at random at full channel data rate R. r If two or more nodes “collide”, they retransmit at random.
Pipelined Two Step Iterative Matching Algorithms for CIOQ Crossbar Switches Deng Pan and Yuanyuan Yang State University of New York, Stony Brook.
Distributed Quality-of-Service Routing of Best Constrained Shortest Paths. Abdelhamid MELLOUK, Said HOCEINI, Farid BAGUENINE, Mustapha CHEURFA Computers.
CIS 725 Media Access Layer. Medium Access Control Sublayer MAC sublayer resides between physical and data link layer Broadcast/multiacess channels N independent.
1 Computer Communication & Networks Lecture 4 Circuit Switching, Packet Switching, Delays Waleed.
FiWi Integrated Fiber-Wireless Access Networks
Brierley 1 Module 4 Module 4 Introduction to LAN Switching.
Ch. 16 High-Speed LANs The Emergence of High- Speed LANs Trends –Computing power of PCs has continued to grow. –MIS organizations recognize the.
CHAPTER 4: THE MEDIUM ACCESS SUBLAYER 4.1: The Channel Allocation Problem 4.2: Multiple Access Protocols.
جلسه دهم شبکه های کامپیوتری به نــــــــــــام خدا.
CONGESTION CONTROL and RESOURCE ALLOCATION. Definition Resource Allocation : Process by which network elements try to meet the competing demands that.
Improving Capacity and Flexibility of Wireless Mesh Networks by Interface Switching Yunxia Feng, Minglu Li and Min-You Wu Presented by: Yunxia Feng Dept.
The Medium Access Control Sublayer Chapter 4. The Channel Allocation Problem Static Channel Allocation Dynamic Channel Allocation  Delay for the divided.
Sami Al-wakeel 1 Data Transmission and Computer Networks The Switching Networks.
Computer Networks with Internet Technology William Stallings
A High Performance Channel Sorting Scheduling Algorithm Based On Largest Packet P.G.Sarigiannidis, G.I.Papadimitriou, and A.S.Pomportsis Department of.
November 4, 2003APOC 2003 Wuhan, China 1/14 Demand Based Bandwidth Assignment MAC Protocol for Wireless LANs Presented by Ruibiao Qiu Department of Computer.
Demand Based Bandwidth Assignment MAC Protocol for Wireless LANs K.Murugan, B.Dushyanth, E.Gunasekaran S.Arivuthokai, RS.Bhuvaneswaran, S.Shanmugavel.
Chi-Cheng Lin, Winona State University CS 313 Introduction to Computer Networking & Telecommunication Medium Access Control Sublayer.
Multimedia Wireless Networks: Technologies, Standards, and QoS Chapter 3. QoS Mechanisms TTM8100 Slides edited by Steinar Andresen.
1 © 2003, Cisco Systems, Inc. All rights reserved. CCNA 3 v3.0 Module 4 Switching Concepts.
Cisco 3 - Switching Perrine. J Page 16/4/2016 Chapter 4 Switches The performance of shared-medium Ethernet is affected by several factors: data frame broadcast.
Chapter 6 Multiple Radio Access
Multi-channel Wireless Sensor Network MAC protocol based on dynamic route.
Multi-Power-Level Energy Saving Management for Passive Optical Networks Speaker: Chia-Chih Chien Advisor: Dr. Ho-Ting Wu Date: 2015/03/25 1.
An Energy Efficient MAC Protocol for Wireless LANs, E.-S. Jung and N.H. Vaidya, INFOCOM 2002, June 2002 吳豐州.
Bandwidth Balancing in Multi- Channel IEEE Wireless Mesh networks Claudio Cicconetti, Ian F. Akyildiz School of Electrical and Computer Engineering.
LECTURE9 NET301 11/5/2015Lect 9 NET DYNAMIC MAC PROTOCOL: CONTENTION PROTOCOL Carrier Sense Multiple Access (CSMA): A protocol in which a node verifies.
CS440 Computer Networks 1 Packet Switching Neil Tang 10/6/2008.
MAC Sublayer MAC layer tasks: – Control medium access – Roaming, authentication, power conservation Traffic services – DCF (Distributed Coordination.
DQDB Network Security.
CCNA3 Module 4 Brierley Module 4. CCNA3 Module 4 Brierley Topics LAN congestion and its effect on network performance Advantages of LAN segmentation in.
Fair and Efficient multihop Scheduling Algorithm for IEEE BWA Systems Daehyon Kim and Aura Ganz International Conference on Broadband Networks 2005.
DR-MPCP: Delayed REPORT message for MultiPoint Control Protocol in EPON Speaker: Chia-Chih Chien Advisor: Dr. Ho-Ting Wu Date: 2015/11/26 1.
Mitigating Congestion in Wireless Sensor Networks Bret Hull, Kyle Jamieson, Hari Balakrishnan MIT Computer Science and Artificial Intelligence Laborartory.
Broadcast-and-select networks. Each node is usually attached to two fibers: one to transmit, one to receive W WDM channels are available Tx and Rx operate.
A New MAC Protocol for Wi-Fi Mesh Networks Tzu-Jane Tsai, Hsueh-Wen Tseng, and Ai-Chun Pang IEEE AINA’06.
Mobile Networks and Applications (January 2007) Presented by J.H. Su ( 蘇至浩 ) 2016/3/21 OPLab, IM, NTU 1 Joint Design of Routing and Medium Access Control.
Chapter 10 Congestion Control in Data Networks and Internets 1 Chapter 10 Congestion Control in Data Networks and Internets.
Performance Evaluation of Scheduling in IEEE based Wireless Mesh Networks Bo Han, Weijia Jia,and Lidong Lin Computer Communications, 2007 Mei-zhen.
MAC Protocols for Sensor Networks
Bidirectional Optical Ring Network Having Enhanced Load Balancing and Protection Dzmitry Kliazovich, Fabrizio Granelli, University of Trento, Italy Copenhagen,
2. Data Link Layer: Medium Access Control. Scheduling.
MAC Protocols for Sensor Networks
CT301 LECTURE 8.
Net301 lecture9 11/5/2015 Lect 9 NET301.
Communication Networks NETW 501
Analysis and Evaluation of a New MAC Protocol
Outline 1. INTRODUCTION 2. PRELIMINARIES 3.THE PROPOSED PROTOCOL
Javad Ghaderi, Tianxiong Ji and R. Srikant
Chapter 6 Multiple Radio Access.
Presentation transcript:

1 Presenter: Ching-Lung Tseng Adviser: Ho-Ting Wu Date: 2004/07/26 Department of Computer Science and Information Engineering, National Taipei University of Technology The Design of QoS Provisioning Mechanisms in WDM Ring Networks

2 Outlines  WDM Slotted Ring Network Architecture  Two Types of Inherited Fairness Problems  Intra-channel / Global fairness problem  Inter-channel / Local fairness problem  Proposed QoS provisioning mechanism - MI-FECCA to support synchronous and asynchronous traffics  Proposed RGC algorithm to resolve receiver collision problem  Conclusions

3 WDM Slotted Ring Networks Architecture WDM Slotted Ring Networks Architecture

4 Slotted Ring headerpayload λ1λ1 λ2λ2 slotted ring

5 FT-TR WDM Ring Network ( 1 )  Each node consists of a fixed transmitter and a tunable receiver which allow them to transmit on a unique specific wavelength and receive data on any wavelength.  Each node has one FIFO buffer which can store up packets.

6 Tunable receiver Fixed transmitter λ2λ2 λ2λ2 λ1λ1 λ 1, λ 2 node 1 node 3 node 2node 4 λ1λ1 headerpayload Bi-direction for transfer λ1λ1 λ2λ2 FT-TR WDM Ring Network ( 2 ) λ 1 channel on Ring A λ 1 channel on Ring B FT-TR full-duplex time-slotted WDM metro ring

7 Two Types of Inherited Fairness Problems Fairness Problems

8 Global Fairness Problem λ1λ1 Nod e0 Nod e2 Nod e6 Nod e4 Nod e1 Nod e5 Nod e7 Nod e3 Unfairness for transmission of FT-TR WDM metro ring node 0 uses λ 1 channel to transmit to node 7 node 2 uses λ 1 channel to transmit to node 7

9 Local Fairness Problem node 0 uses λ 1 channel to transmit to node 7 Nod e0 Nod e2 Nod e6 Nod e4 Nod e1 Nod e5 Nod e7 Nod e3 node 1 uses λ 2 channel to transmit to node 7 Receive collision problem for transmission of FT-TR WDM metro ring Receive collision on node 7

10 Global Fairness Algorithm  Cycle-based Control Scheme  Each node is allowed to transmit a maximal number of packets within each cycle.  The duration of a cycle is dependent on different algorithms.

11 M-ATMR Algorithm  Multi Asynchronous Transfer Mode Ring( M-ATMR).  A cycle-based control scheme.  The forward ring A is used for control purpose (assume data transmission is also on Ring A).  Each node is allowed to transmit a maximal number of packets within each fairness cycle.  This maximal number is called Wins.  A special busy address field is inserted in the header of each slot.

12 ATMR Control Mechanism (1)  The M-ATMR access algorithm is independently applied to each wavelength of both rings.  Each node has two states:  An active node.  Has not uses up its transmission quota.  Has packets stored in the queue.  An inactive node.  Used up its transmission quota or has no packets stored in the queue.

13 ATMR Control Mechanism (2)  Access algorithm:  Active node.  Waits for an idle slot to transmit.  Overwrites its own address into the busy address field of every incoming slot.  When a node completely transmit the value of Wins packets or has no packets to transmit, it becomes an inactive node.  Inactive node.  Stops writing its own address in the busy address field.  When an inactive node finds its own address in the busy address field of an incoming slot, it knows that all nodes have completed their packet transmissions.  It then issues a “Reset” signal to start a new fairness cycle.  The Reset signal circulates around the ring network to notify other nodes that a new fairness cycle is established.

14 ATMR Control Mechanism (3) A reset cycle watched by an AU

15 M-FECCA Algorithm  Multi Fair and Efficient Cyclic Control Algorithm(M-FECCA).  An extension version of M-ATMR.  A cycle-based control scheme.  Used different directions to transmit data and control message.  When data are transmitted on Ring A the control message are transmitted on Ring B.  A busy address field is included in the header of each time slot.

16 FECCA Control Mechanism  The M-FECCA access algorithm is independently applied to each wavelength of both rings.  Each node has two states:  An active node.  Defined as in ATMR.  An inactive node.  Defined as in ATMR.  Each upstream node (on Ring A) can observe the on-going activity status of its downstream node (on Ring A).  An inactive upstream node may still allowed to transmit extra packets.

17 λ 1, λ 2 Nod e0 Nod e2 Nod e6 Nod e4 Nod e1 Nod e5 Nod e7 Nod e3 λ 1 data channel on Ring A λ 1 control channel on Ring B M-FECCA access control (an inactive node is denoted by the gray color)

18 Proposed QoS Provisioning Mechanism - MI-FECCA

19 MI-FECCA Algorithm ( 1 )  Multi Integrated Fair and Efficient Cyclic Control Algorithm(MI-FECCA).  Integration of synchronous and asynchronous traffics.  Base upon M-FECCA algorithm.  A frame approach is employed:  The duration of a single frame is fixed.  A fixed number of contiguous time slots.  Consists of a “synchronous subframe” followed by an “asynchronous subframe”.

20 Synchronous subframe Asynchronous subframe A single frame λ1 λ1 …… frame MI-FECCA Algorithm ( 2 )  A master station can be used to generate periodically frame. The frame architecture watched by a node.

21 Slot Format One Slot HeaderInformation Field B D BA B (1 bit): Busy Bit 1 indicates a full slot. 0 indicates an empty slot. D (1 bit): Data type bit 1 indicates for asynchronous subframe. 0 indicates for synchronous subframe. BA (Several bits): Busy Address, this field indicates the active node address.

22 Synchronous subframe Access Protocol ( 1 )  Each node can prescribe a quota ( Qs ) of synchronous data which it is allowed to transmit in each frame.  At the start of each frame, each node starts to transmit its synchronous packets upon to its prescribed quota.  Each node has two states:  Synchronous-mode active.  Has not uses up its synchronous transmission quota.  Has synchronous packets stored in the queue.  Synchronous-mode inactive.  Used up its synchronous transmission quota or has no synchronous packets stored in the queue.

23 Synchronous subframe Access Protocol ( 2 )  Access algorithm:  Synchronous-mode active.  Waits for an idle slot to transmit synchronous packets.  Performs the synchronous overwriting procedure.  Overwrite its own address into the busy address field.  Sets D=0.  When a node completely transmit the synchronous quota or has no synchronous packets to transmit, it becomes an synchronous-mode inactive node.  Synchronous-mode inactive.  Stops its synchronous overwriting procedure.  At this time, it is ready to transmit its asynchronous data(if any) during the remainder of the current frame(no synchronous overwriting procedure will be performed by this node).

24 Synchronous subframe Access Protocol ( 3 )  When a synchronous-mode inactive node finds its own address in the busy address field of an incoming slot:  All the node have finished their permissible synchronous packet transmissions.  The “synchronous subframe” of the network within the current frame is terminated, and the ” asynchronous subframe” of current frame is initiated.  It starts performing its asynchronous overwriting procedure:  Overwrite its own address into the busy address field.  Sets D=1.

25 Asynchronous subframe Access Protocol ( 1 )  Each node is allowed to transmit at least its predefined quota ( Qa ) of asynchronous data in each asynchronous “cycle”.  The duration of each asynchronous cycle is dynamically determined and is usually much longer than a single frame duration.  Each node has two states:  Asynchronous-mode active.  Defined as in FECCA.  Asynchronous-mode inactive.  Defined as in FECCA.

26 Asynchronous subframe Access Protocol ( 2 )  Access algorithm:  Asynchronous-mode active:  Waits for an idle slot to transmit asynchronous packets.  Performs the asynchronous overwriting procedure:  Overwrite its own address into the busy address field.  Sets D=1.  When a node completely transmit the asynchronous quota or has no asynchronous packets to transmit, it becomes an asynchronous-mode inactive node.  Asynchronous-mode inactive:  Stops its asynchronous overwriting procedure.  At this time, it is ready to transmit its asynchronous data(if any) during the remainder of the current frame(no asynchronous overwriting procedure will be performed by this node.

27 Asynchronous cycle reset scheme The same as FECCA reset scheme.

28 Comparison the performance results  MI-ATMR Algorithm:  Each node transmit data across Ring A.  Overwrite their own address into the busy address fields across Ring A.  Node can not transmit extra data after they transmitted their Wins.  MI-FECCA Algorithm:  Each node overwrite their own address into busy address fields across Ring B.  Nodes may utilize the extra available slots to transmit data.

29 Network Performance (1) Topology : bidirectional ring Number of stations : 208 Slot per wavelength : 416 ( slots ) Frame size : 1664 ( slots ) Transmission bandwidth : 10Gps Packet length : 1500 bytes ( fixed length ) Ring length : 100Km Propagation delay : 5 Station are equally spaced Every station always has something to send μs/km

30 Network Performance (2)

31 Network Performance (3) Qs Fairness MI-FECCANetwork Throughput Asynchronous Throughput MI-ATMRNetwork Throughput Asynchronous Throughput Network throughput and asynchronous throughput versus various synchronous quota ( average case ).

32 Network Performance (4) Qs Fairness MI-FECCANetwork Throughput Asynchronous Throughput MI-ATMRNetwork Throughput Asynchronous Throughput Network throughput and asynchronous throughput versus various synchronous quota ( worst case ).

33 Proposed RGC algorithm Proposed RGC algorithm to resolve receiver collision problem problem

34 Local Fairness Problem Packets destine to node 7 node 0 used λ 1 channel to transmit to node 7 Nod e0 Nod e2 Nod e6 Nod e4 Nod e1 Nod e5 Nod e7 Nod e3 node 1 used λ 2 channel to transmit to node 7 Packets destine to node 7 Local fairness problem for transmission of FT-TR WDM metro ring Receive collision on node 7

35 RGC Algorithm ( 1 )  Request and Grant Control Algorithm(RGC).  A cycle-based control scheme.  Each node has a non-FIFO buffer which can store up packets.  Control Messages:  REQ:  Request.  Sent when the node is starved.  Set up a congestion path.  GNT:  Grant.  Terminate the congestion path.  SAT:  Satisfied.  Like a Token.

36 RGC Algorithm ( 2 )  Two basic modes :  Non-limited Mode :  can transmit at any time as long as the protocol permits it.  Free Access ( FA ) state.  Limited Mode :  can transmit only a predefined quota of data unit for the heavy-sink node.  triggered only when starvation occurs.

37 RGC Algorithm ( 3 )  Each node has two states in the l imited-mode:  limited-mode active.  Has not uses up its transmission quota for the heavy- sink node.  Has packets for the heavy-sink node stored in the queue.  limited-mode inactive.  Used up its transmission quota for the heavy-sink node or has no packets for the heavy-sink node stored in the queue.

38 Slot Format One Slot HeaderInformation Field BBA CA B (1 bit): Busy Bit 1 indicates a full slot. 0 indicates an empty slot. BA (Several bits): Busy Address, this field indicates the active node address. CA (Several bits): Collision Address, this field indicates the node address that receiver collision has occurred (Control Message + destination address).

39 RGC Control Mechanism (1)  At the time of initialization, all nodes are in the free access ( FA ) state.  Each node is allowed to tolerate contiguous transmission delay quota Q d.  Transmission delay time C >= Q d  Write the REQ and collision destination node address into collision address field (CA).  Set C = 0.  Entering the tail ( T ) state.

40 Packets destine to node 6 λ1λ1 H B Nod e6 Nod e4 Nod e5 T Packets destine to node 6 B λ 4 control channel on Ring B B REQ RGC algorithm(for forwarding control message REQ).

41 RGC Control Mechanism (2)  Access algorithm:  limited-mode active.  Transmitted the packet for the heavy-sink node.  When a node completely transmit the value of quota for the heavy-sink node or has no packets to transmit for the heavy-sink node, it becomes an limited-mode inactive node.  limited-mode inactive.  Transmitted the packet for the any node except the heavy-sink node.

42 Packets destine to node 6 λ1λ1 Nod e6 Nod e4 Nod e5 Packets destine to node 6 λ 4 control channel on Ring B T B B B H SAT RGC algorithm(for forwarding control message SAT).

43 Packets destine to node 6 λ1λ1 Nod e6 Nod e4 Nod e5 Packets destine to node 6 λ 4 control channel on Ring B GNT B B B T H RGC algorithm(for forwarding control message GNT).

44 Performance Results  Combine the M-FECCA with RGC algorithm:  Each node on transmission channel is controlled by the M-FECCA global fairness algorithm.  Each node on different transmission channel is controlled by the RGC Local Fairness algorithm, if necessary possible.  M-FECCA with RRC algorithm:  Each node on transmission channel is controlled by the M-FECCA global fairness algorithm.  Each node on different transmission channel is controlled by the RRC Local Fairness algorithm, if necessary possible.

45 Simulation of node throughput versus relative node position of light traffic nodes on drop channel with window size = 256 in each cycle in FT-TR WDM ring network. In RGC algorithm, Qd = 8. (Assume asymmetric loading, nodes 8~11 are full loaded, 50% data destined for node 24, others uniform destination distribution; nodes 32~35 are fully loaded, 50% data destined for node 48, others uniform destination distribution; each of other nodes has input = 0.05 packets/slot, uniform destination distribution, 64 nodes on the ring and 256 slots on each channel). (a) M-FECCA with RGC. (b) M-FECCA with RRC. (a) (b) Per Node Throughput

46 Simulation of mean delay versus relative node position of light traffic nodes on drop channel with window size = 256 in each cycle in FT-TR WDM ring network. In RGC algorithm, Qd = 8. (Assume asymmetric loading, nodes 8~11 are fully loaded, 50% data are destined for node 24, others uniform destination distribution; nodes 32~35 are fully loaded, 50% data destined for node 48, others uniform destination distribution; each of other nodes has input = 0.05 packets/slot, uniform destination distribution, 64 nodes on the ring and 256 slots on each channel). (a) M-FECCA with RGC. (b) M-FECCA with RRC. (a) (b) Per Node Transmission Delay

47 Conclusions  The QoS access protocol, MI-FECCA:  Maintaining a guaranteed synchronous data bandwidth- reserve.  Yield high asynchronous data throughput.  Local fairness access protocol, RGC:  Yield local fairness.  Decreasing the propagation delay time of data transmission.