CS 5253 Workshop 1 MAC Protocol and Traffic Model.

Slides:



Advertisements
Similar presentations
Data and Computer Communications Eighth Edition by William Stallings Lecture slides by Lawrie Brown Chapter 16 – High Speed LANs.
Advertisements

Channel Allocation Protocols. Dynamic Channel Allocation Parameters Station Model. –N independent stations, each acting as a Poisson Process for the purpose.
The ALOHA Protocol “Free for all”: whenever station has a frame to send, it does so. –Station listens for maximum RTT for an ACK. –If no ACK after a specified.
EECC694 - Shaaban #1 lec #5 Spring Data Link In Broadcast Networks: The Media Access Sublayer Broadcast networks with multi-access (or random.
Ethernet – CSMA/CD Review
Fundamentals of Computer Networks ECE 478/578
Multiple access What if multiple machines are sharing the same link?
1 K. Salah Module 4.2: Media Access Control The Media Access Control (MAC) sublayer –Random Access (CSMA), IEEE –Token Passing, IEEE Ch 13-
1 Pertemuan 13 Teknik Akses Jaringan - Random Matakuliah: H0174/Jaringan Komputer Tahun: 2006 Versi: 1/0.
EEC-484/584 Computer Networks Lecture 7 Wenbing Zhao
MAC Protocols Media Access Control (who gets the use the channel) zContention-based yALOHA and Slotted ALOHA. yCSMA. yCSMA/CD. TDM and FDM are inefficient.
CS 5253 Workshop 1 MAC Protocol and Traffic Model.
CMPE 150- Introduction to Computer Networks 1 CMPE 150 Fall 2005 Lecture 17 Introduction to Computer Networks.
Copyright © 2003, Dr. Dharma P. Agrawal and Dr. Qing-An Zeng. All rights reserved. 1 Chapter 6 Multiple Radio Access.
Teknik Akses Jaringan Carrier Sense Pertemuan 12 Matakuliah: H0484/Jaringan Komputer Tahun: 2007.
EEC-484/584 Computer Networks Lecture 13 Wenbing Zhao
EEC-484/584 Computer Networks Lecture 7 Wenbing Zhao
CMPE 150- Introduction to Computer Networks 1 CMPE 150 Fall 2005 Lecture 16 Introduction to Computer Networks.
EEC-484/584 Computer Networks Lecture 13 Wenbing Zhao
EEC-484/584 Computer Networks Lecture 9 Wenbing Zhao (Part of the slides are based on materials supplied by Dr. Louise Moser at UCSB and.
Studying Local Area Networks Via Media Access Control (MAC) SubLayer
Networks: Local Area Networks1 LANs Studying Local Area Networks Via Media Access Control (MAC) SubLayer.
Computer Networks: Local Area Networks 1 LANs Studying Local Area Networks via the Media Access Control (MAC) SubLayer.
EEC-484/584 Computer Networks Lecture 7 Wenbing Zhao
Semester EEE449 Computer Networks The Data Link Layer Part 2: Media Access Control En. Mohd Nazri Mahmud MPhil (Cambridge, UK) BEng (Essex,
Medium Access Control Sublayer
Chap 4 Multiaccess Communication (Part 1)
1 ECE453 – Introduction to Computer Networks Lecture 7 – Multiple Access Control (I)
9/11/2015 5:55 AM1 Ethernet and CSMA/CD CSE 6590 Fall 2010.
Multiple Access Protocols Chapter 6 of Hiroshi Harada Book
CIS 725 Media Access Layer. Medium Access Control Sublayer MAC sublayer resides between physical and data link layer Broadcast/multiacess channels N independent.
Chi-Cheng Lin, Winona State University CS412 Introduction to Computer Networking & Telecommunication Medium Access Control Sublayer.
Chapter 4: Medium Access Control (MAC) Sublayer
CHAPTER 4: THE MEDIUM ACCESS SUBLAYER 4.1: The Channel Allocation Problem 4.2: Multiple Access Protocols.
LECTURE9 NET301. DYNAMIC MAC PROTOCOL: CONTENTION PROTOCOL Carrier Sense Multiple Access (CSMA): A protocol in which a node verifies the absence of other.
LOCAL AREA NETWORKS. CSMA Carrier Sense Multiple Access To minimize the chance of collision and, therefore, increase the performance, the CSMA method.
جلسه دهم شبکه های کامپیوتری به نــــــــــــام خدا.
Medium Access Control NWEN302 Computer Network Design.
Layer 2 Technologies At layer 2 we create and transmit frames over communications channels Format of frames and layer 2 transmission protocols are dependent.
Chi-Cheng Lin, Winona State University CS 313 Introduction to Computer Networking & Telecommunication Medium Access Control Sublayer.
جلسه یازدهم شبکه های کامپیوتری به نــــــــــــام خدا.
R ANDOM A CCESS N ETWORKS CSMA F AMILIES 1. References Chapter 9 of the book. Throughput Analysis for Persistent CSMA Systems, HIDEAKI TAKAGI AND LEONARD.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2000 Unit-II Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
LOCAL AREA NETWORKS. CSMA/CD Carrier Sense Multiple Access with Collision Detection The CSMA method does not specify the procedure following a collision.
Medium Access Control Sub Layer
7-1 Introduction to Queueing Theory l Components of a queueing system n probability density function (pdf) of interarrival times n pdf of service times.
Multiple Access.
CS3502: Data and Computer Networks Local Area Networks - 1 introduction and early broadcast protocols.
Ch 12. Multiple Access. Multiple Access for Shared Link Dedicated link – Point-to-point connection is sufficient Shared link – Link is not dedicated –
CS3502: Data and Computer Networks Local Area Networks - 1 introduction and early broadcast protocols.
LECTURE9 NET301 11/5/2015Lect 9 NET DYNAMIC MAC PROTOCOL: CONTENTION PROTOCOL Carrier Sense Multiple Access (CSMA): A protocol in which a node verifies.
實驗三 媒體存取協定模擬 教師: 助教: 1998/10/19 High Speed Network Lab. Department of Computer Information Science, NCTU.
Carrier Sense Multiple Access Improve ALOHA by using carrier sense –Stations listen to the carrier before transmitting –If channel is busy, the station.
1 Ethernet CSE 3213 Fall February Introduction Rapid changes in technology designs Broader use of LANs New schemes for high-speed LANs High-speed.
Tel Hai Academic College Department of Computer Science Prof. Reuven Aviv Markov Models for Access Control in Computer Networks Resource: Fayez Gebali,
Chapter 4 The Medum Access Sublayer. MA Sublayer Additional Reference –Local and Metropolitan Area Networks, William Stallings, Prentice Hall, 2000, 6th.
Medium Access Control Protocols, Local Area Networks, and Wireless Local Area Networks Lecture Note 10.
THE MEDIUM ACCESS CONTROL SUBLAYER 4.1 THE CHANNEL ALLOCATION PROBLEM 4.2 MULTIPLE ACCESS PROTOCOLS.
COMPUTER NETWORKS Data-link Layer (The Medium Access Control Sublayer) MAC Sublayer.
Multiple Access By, B. R. Chandavarkar, CSE Dept., NITK, Surathkal Ref: B. A. Forouzan, 5 th Edition.
CS 5253 Workshop 1 MAC Protocol and Traffic Model.
Week3 The Medium Access Sublayer
Introduction to Queueing Theory
Module 3 Medium Access Control.
Services of DLL Framing Link access Reliable delivery
The Medium Access Control Sublayer
Channel Allocation Problem/Multiple Access Protocols Group 3
Channel Allocation Problem/Multiple Access Protocols Group 3
Data Communication Networks
Chapter 6 Multiple Radio Access.
Presentation transcript:

CS 5253 Workshop 1 MAC Protocol and Traffic Model

Objectives Get familiar with OPNET, a tool for network simulation. Use OPNET to study CSMA/CD channel access and traffic modeling. References: 1.Joseph L. Hammond, and Petter J. P. O’Reilly, Performance Analysis of Local Computer Networks, Addison_Wesley Publishing Company, Gary N. Higginbottom, Performance Evaluation of Communication Networks, Artech House, 1998

Medium Access Control Medium Access Control (MAC): –How to share a common medium among the users? MAC layer is very important in LANs, nearly all of which use a multiaccess channel as the basis of their communication.

ALOHA Protocol ALOHA is developed in the 1970s at the University of Hawaii. The basic idea is simple: –Let users transmit whenever they have data to be sent. If two or more users send their packets at the same time, a collision occurs and the packets are destroyed.

ALOHA Protocol If there is a collision, –the sender waits a random amount of time and sends it again. The waiting time must be random. Otherwise, the same packets will collide again.

A Sketch of Frame Generation Note that all packets have the same length because the throughput of ALOHA systems is maximized by having a uniform packet size.

Throughput Throughput: –The number of packets successfully transmitted through the channel per packet time. What is the throughput of an ALOHA channel?

Assumptions Infinite population of users New frames are generated according to a Poisson distribution with mean S packets per packet time. –Probability that k packets are generated during a given packet time:

Observation on S If S > 1, packets are generated at a higher rate than the channel can handle. Therefore, we expect 0 < S < 1 If the channel can handle all the packets, then S is the throughput.

Packet Retransmission In addition to the new packets, the stations also generate retransmissions of packets that previously suffered collisions. Assume that the packet (new + retransmitted) generated is also Poisson with mean G per packet time.

Relation between G and S Clearly, At low load, few collisions: At high load, many collisions: Under all loads, where P 0 is the probability that a packet does not suffer a collision.

Vulnerable Period Under what conditions will the shaded packet arrive undamaged?

Throughput Vulnerable period: from t 0 to t 0 +2t Probability of no other packet generated during the vulnerable period is: Using S = GP 0, we get

Relation between G and S Max throughput occurs at G=0.5, with S=1/(2e)= Hence, max. channel utilization is 18.4%.

Slotted ALOHA Divide time up into discrete intervals, each corresponding to one packet. The vulnerable period is now reduced in half. Probability of no other packet generated during the vulnerable period is: Hence,

Carrier Sense In many situations, stations can tell if the channel is in use before trying to use it. If the channel is sensed as busy, no station will attempt to use it until it goes idle. This is the basic idea of the Carrier Sense Multiple Access (CSMA) protocol.

CSMA Protocols There are different variations of the CSMA protocols: –1-persistent CSMA –Nonpersistent CSMA –p-persistent CSMA We discuss only 1-persistent CSMA.

1-persistent CSMA The protocol: –Listens before transmits –If channel busy, waits until channel idle –If channel idle, transmits –If collision occurs, waits a random amount of time and starts all over again It is called 1-persistent because the station transmits with a probability of 1 whenever it finds the channel idle.

A Comparison

CSMA/CD Protocol If two stations transmits simultaneously, they will both detect the collision almost immediately. Rather than finish transmitting their packets, the stations should stop transmitting as soon as the collision is detected. This protocol is called CSMA with collision detection (CSMA/CD).

Traffic Model Constant-Bit-Rate Traffic –e.g. traditional (circuit-switched) voice On-Off Source –e.g. packetized voice Poisson Process –e.g. traditional data traffic Interrupted Poisson Process (IPP) –e.g. bursty data traffic Markov Modulated Poisson Process (MMPP) –e.g. multimedia traffic

Constant-Bit-Rate Traffic Packets are generated at a constant bit rate R. Packets

On-Off Source ONOFF Constant bit rate R Stay in ON state for a period exponentially distributed with mean 1/  Stay in OFF state for a period exponentially distributed with mean 1/ 

On-Off Source exponential with mean 1/  exponential with mean 1/  ONOFFON

On-Off Source Let R m be the mean bit rate. Then An on-off source is usually specified by the 3 parameters: R, R m and 1/  (mean burst length).

Poisson Process Poisson process with rate – Interarrival time is exponentially distributed mean 1/. interarrival time

Interrupted Poisson Process (IPP) ONOFF Poisson process with rate Stay in ON state for a period exponentially distributed with mean 1/  Stay in OFF state for a period exponentially distributed with mean 1/ 

Markov Modulated Poisson Process (MMPP) Example: 3-state MMPP Poisson process with rate Poisson process with rate 2 Poisson process with rate 3 p 12 p 21 p 13 p 31 p 23 p 32 Stay in state i for a period exponentially distributed with mean 1/  i

Guideline for Using opnet You should read the material “Introduction of opnet”, and “Small internet work” before start Aloha tutorial. Exercise 1: (Individual work, 5% percent for semester B) After trying “Small internet work”, do a further study on the following case: The company has 3 rd floor which contains another 15 computers of the same type connected with a star. Just hand in a hard copy of the figures about the delay and load.(Due week3/week4 on Monday.)