Model and tools. Traffic Model Poisson law – Napoléon worries about the statistics of horse accidents of his generals – Poisson confirms these are unfrequent.

Slides:



Advertisements
Similar presentations
Nick Feamster CS 4251 Computer Networking II Spring 2008
Advertisements

Channel Allocation Protocols. Dynamic Channel Allocation Parameters Station Model. –N independent stations, each acting as a Poisson Process for the purpose.
EECC694 - Shaaban #1 lec #5 Spring Data Link In Broadcast Networks: The Media Access Sublayer Broadcast networks with multi-access (or random.
Ethernet – CSMA/CD Review
Fundamentals of Computer Networks ECE 478/578
1 An Approach to Real-Time Support in Ad Hoc Wireless Networks Mark Gleeson Distributed Systems Group Dept.
Delay and Throughput in Random Access Wireless Mesh Networks Nabhendra Bisnik, Alhussein Abouzeid ECSE Department Rensselaer Polytechnic Institute (RPI)
Comp 361, Spring 20056:Basic Wireless 1 Chapter 6: Basic Wireless (last updated 02/05/05) r A quick intro to CDMA r Basic
Communication Networks Lecture 5 NETW 501-L5: NETW 501-L5: Medium Access Control Dr.-Ing. Khaled Shawky Hassan Room: C3-222, ext: 1204,
1 K. Salah Module 4.2: Media Access Control The Media Access Control (MAC) sublayer –Random Access (CSMA), IEEE –Token Passing, IEEE Ch 13-
1 Cooperative Communications in Networks: Random coding for wireless multicast Brooke Shrader and Anthony Ephremides University of Maryland October, 2008.
Wireless & Mobile Networking: Multiple Radio Access Azizol Bin Abdullah (A2.04) Rujukan: Text Book Chapter 6.
MAC Protocols Media Access Control (who gets the use the channel) zContention-based yALOHA and Slotted ALOHA. yCSMA. yCSMA/CD. TDM and FDM are inefficient.
CS 5253 Workshop 1 MAC Protocol and Traffic Model.
Copyright © 2003, Dr. Dharma P. Agrawal and Dr. Qing-An Zeng. All rights reserved. 1 Chapter 6 Multiple Radio Access.
20 – Collision Avoidance, : Wireless and Mobile Networks6-1.
7/3/2015© 2007 Raymond P. Jefferis III1 Queuing Systems.
CS 5253 Workshop 1 MAC Protocol and Traffic Model.
Semester EEE449 Computer Networks The Data Link Layer Part 2: Media Access Control En. Mohd Nazri Mahmud MPhil (Cambridge, UK) BEng (Essex,
Cs/ee 143 Communication Networks Chapter 3 Ethernet Text: Walrand & Parakh, 2010 Steven Low CMS, EE, Caltech.
Wireless networks Philippe Jacquet. Link layer: protocols in local area networks MAC/link address: –6 octets Starts with 1: unicast Starts with 0: multicast.
Chap 4 Multiaccess Communication (Part 1)
1 ECE453 – Introduction to Computer Networks Lecture 7 – Multiple Access Control (I)
Delay Analysis of IEEE in Single-Hop Networks Marcel M. Carvalho, J.J.Garcia-Luna-Aceves.
9/11/2015 5:55 AM1 Ethernet and CSMA/CD CSE 6590 Fall 2010.
Multiple Access Protocols Chapter 6 of Hiroshi Harada Book
Ethernet. Ethernet Goals Simplicity Low Cost Compatibility Address flexibility Fairness –All nodes have equal access to the network High speed Stability.
Opersating Mode DCF: distributed coordination function
1 SenMetrics’05, San Diego, 07/21/2005 SOSBRA: A MAC-Layer Retransmission Algorithm Designed for the Physical-Layer Characteristics of Clustered Sensor.
2014 YU-ANTL Lab Seminar Performance Analysis of the IEEE Distributed Coordination Function Giuseppe Bianchi April 12, 2014 Yashashree.
Analysis of Ethernet-like protocols Andrey Lukyanenko University of Kuopio.
LECTURE9 NET301. DYNAMIC MAC PROTOCOL: CONTENTION PROTOCOL Carrier Sense Multiple Access (CSMA): A protocol in which a node verifies the absence of other.
© Janice Regan, CMPT 128, CMPT 371 Data Communications and Networking LANs 2: MAC protocols.
جلسه دهم شبکه های کامپیوتری به نــــــــــــام خدا.
Medium Access Control NWEN302 Computer Network Design.
Layer 2 Technologies At layer 2 we create and transmit frames over communications channels Format of frames and layer 2 transmission protocols are dependent.
A QoS MAC Protocol for Differentiated Service in Mobile Ad Hoc Networks Chi-Hsiang Yeh, Tiantong You Queen’s University ICPP 2003’
R ANDOM A CCESS N ETWORKS CSMA F AMILIES 1. References Chapter 9 of the book. Throughput Analysis for Persistent CSMA Systems, HIDEAKI TAKAGI AND LEONARD.
Medium Access Control Sub Layer
7-1 Introduction to Queueing Theory l Components of a queueing system n probability density function (pdf) of interarrival times n pdf of service times.
Data Communications, Kwangwoon University12-1 Chapter 12. Multiple Access 1.Random Access 2.Controlled Access 3.Channelization.
Chapter 6 Multiple Radio Access
1 Kyung Hee University Chapter 12 Multiple Access.
Performance Analysis of IEEE Distributed Coordination Function (DCF) Author : Giuseppe Bianchi Presented by: 李政修 December 23, 2003.
Introduction to Wireless Networks Dina Katabi & Sam Madden MIT – – Spring 2014.
CS3502: Data and Computer Networks Local Area Networks - 1 introduction and early broadcast protocols.
5: DataLink Layer 5a-1 Multiple Access protocol. 5: DataLink Layer 5a-2 Multiple Access Links and Protocols Three types of “links”: r point-to-point (single.
Ch 12. Multiple Access. Multiple Access for Shared Link Dedicated link – Point-to-point connection is sufficient Shared link – Link is not dedicated –
Background of Ad hoc Wireless Networks Student Presentations Wireless Communication Technology and Research Ad hoc Routing and Mobile IP and Mobility Wireless.
Planning and Analyzing Wireless LAN
CSE 461: Multiple Access Networks. This Lecture  Key Focus: How do multiple parties share a wire?  This is the Medium Access Control (MAC) portion of.
CS3502: Data and Computer Networks Local Area Networks - 1 introduction and early broadcast protocols.
LECTURE9 NET301 11/5/2015Lect 9 NET DYNAMIC MAC PROTOCOL: CONTENTION PROTOCOL Carrier Sense Multiple Access (CSMA): A protocol in which a node verifies.
Medium Access Control in Wireless networks
MAC Layer Protocols for Wireless Networks. What is MAC? MAC stands for Media Access Control. A MAC layer protocol is the protocol that controls access.
1 Ethernet CSE 3213 Fall February Introduction Rapid changes in technology designs Broader use of LANs New schemes for high-speed LANs High-speed.
Distributed-Queue Access for Wireless Ad Hoc Networks Authors: V. Baiamonte, C. Casetti, C.-F. Chiasserini Dipartimento di Elettronica, Politecnico di.
Tel Hai Academic College Department of Computer Science Prof. Reuven Aviv Markov Models for Access Control in Computer Networks Resource: Fayez Gebali,
Medium Access Control Protocols, Local Area Networks, and Wireless Local Area Networks Lecture Note 10.
MEDIUM ACCESS CONTROL PROTOCOL
Introduction to Queueing Theory
Medium Access Control Protocols
High Speed LANs – Ethernet and Token Ring
Net301 lecture9 11/5/2015 Lect 9 NET301.
Chapter 12 Multiple Access
King Fahd University of Petroleum & Minerals Computer Engineering Dept
Chapter 6 Multiple Radio Access.
Multiple Access Control (MAC) Protocols
Satellite Packet Communications A UNIT -V Satellite Packet Communications.
Presentation transcript:

Model and tools

Traffic Model Poisson law – Napoléon worries about the statistics of horse accidents of his generals – Poisson confirms these are unfrequent independent events

Poisson law Intensity λ – Independence, memoriless property are independent if – Poisson law – conditionnally uniform If then the k events are uniformly distributed over A AB time

Exponential inter-arrival Inter-arrival I are independent and exponential – Density: – Memoriless property:

Super-position of Poisson processes Two flows 1 and 2 – The union is a Poisson flow of intensity 1 + 2

Test Random sequence Discrepant sequence.

Convergence Small independent processes – N unfrequent events each with proba Bernoulli law. When N→∞

Time varying intensity Generalization:

Probability generating functions Let X be a non negative integer random variable Probability generating function for z complex

P.g.f. property Moment generating function

P.g.f. property P.g.f. knowledge gives the distribution X with pgf f(z), Y with pgf g(z) – X and Y independent – X+Y pgf is f(z).g(z)

p.g.f of Poisson

Composition of random variables X and Y integer random variables of p.g.f f(z) and g(z) – Sum of X independent copies of Y: p.g.f.

Multiple access protocols In wireless networks, medium channel is unique and must be shared – One or several of frequencies

Wireless Communication Architecture Access point architecture – Wifi infrastructure mode – GSM, UMTS – Wimax Ad hoc architecture – Mesh networks – Mobile ad hoc – Sensor networks

Multiple access protocols Frequency Division Multiple Access – Frequency set is split between users Time Division Multiple Access (TDMA) time frequencies time

Wireless Access Protocols Periodic TDMA – Time slot periodically allocated to terminal in round robin. – Examples: GSM, bluetooth. time slot

Wireless Access Protocols Random access protocols – More than two transmitters over one slot→ collision Collision detection (no d’ACK) Collision resolution algorithm. time slot

Collision resolution algorithm Wireless Network standards – Minimal SNR (Wifi ≈10 db or more) – Collision: none goes through – Capture due to near far effect A goes through unfrequent A B

Collision Resolution Algorithm Access point configuration (D=0) Aloha – Random Backoff Uniform over (0, W max ) (retransmission window) Repeat after each collision Binary Exponential Backoff (BEB) retransmission window doubles after each collision (for the same packet) Limited number of retransmissions.

Terminal network interface model Packets internally generated Network interface buffer Network interface Server (one packet max)

Average delay analysis for periodic TDMA Poisson model traffic per slot for node i – Average delay in network interface – Must add delay in buffer – Maximum throughput: packet per slot – Non uniform traffic : packet per slot

Average delay analysis for periodic TDMA Between two periodic slots – N slots – Poisson rate per slot Buffer queue size X – P.g.f q(z)

Average delay analysis for periodic TDMA Resolution of p.g.f – From q(1)=1 – Quantity q(0) is average idle slot – Average queue size

Average delay analysis for periodic TDMA – The average number customers queued at time of a random arrival Is also the average number of full periods in buffer Average time in buffer Average packet waiting delay

Random TDMA Performance Packet generation over all nodes – Poisson process, cumulated rate packet per slot No packet retransmission :

Random TDMA Performance Packet generation over all nodes – Poisson process, cumulated rate packet per slot ALOHA Packet transmission attempt process: Two model cases: – infinite population: nodes transmits only one packet and die; – Finite population nodes are permanent and manage a queue of packets – Poisson process, cumulated rate  packet per slot

Aloha and infinite population Is unstable for all λ>0 – Take B large number of waiting packets: – System diverges: B(t) at time t – Also true for binary exponential backoff

Aloha and finite population N nodes – In this case max{B(t)}=N – System is stable when B=N and – When And max throughput

Stack collision resolution in infinite population Stack algorithm local procedure C←0; While packet to transmit{ if (C=0) then { transmit; if collision then C←rand(0,1)} else { if listen=collision then C←C+1; else C←C-1 }

Stack algorithm stability condition ABCAB- ABC C CBC CC

Ternary Stack collision resolution Ternary Stack algorithm local procedure C←0; While packet to transmit{ if (C=0) then { transmit; if collision then C←rand(0,1,2)} else { if listen=collision then C←C+1; else C←C-1 }

Upper bound on colision resolution algorithms stability

Aloha under small load Infinite population with Transmission and retransmission is a Poisson process – cumulated rate  packet per slot – Equilibrium equation:

Stable point unstable point Takes exponential time

Random Access Performance Maximum throughput Average Delay in interface BEB

Random Access performance Geometric ALOHA – Packet (re)transmitted on current slot with proba – Average backoff – For a packet – Delay B in interface has p.g.f.

Random Access performance Workload W of interface of node i

Random Access performance Workload is greater than packet delay It satisfies With p.g.f – We know how to solve…

Random Access performance Interface idle probability – System is stable as long as When – Average waiting time in buffer is as long as

Summary periodic TDMA random TDMA Periodic TDMA – Throughput up to – Interface delays in – Queueing delays in Random TDMA – Throughput up to – Interface delays in – Queueing delays in

Protocol CSMA (Wifi) Mini-slots

Performances of CSMA Poisson model: – ρ: per mini-slot load – L: packet length (in mini-slots) Net throughput

L=100

L Max throughput

RTS-CTS emitter Intended receiver packet ack Vorbidden period RTS CTS

CSMA/CA performances Net throughput with RTS-CTS

L RTS-CTS with R=10 CSMA Max throughput