Introduction Network Quality Assurance (and Simulation!) Read Chapters 1, 2, 3.

Slides:



Advertisements
Similar presentations
Data and Computer Communications
Advertisements

Channel Allocation Protocols. Dynamic Channel Allocation Parameters Station Model. –N independent stations, each acting as a Poisson Process for the purpose.
EECC694 - Shaaban #1 lec #5 Spring Data Link In Broadcast Networks: The Media Access Sublayer Broadcast networks with multi-access (or random.
Fundamentals of Computer Networks ECE 478/578
LECTURE 11 CT1303 LAN. DYNAMIC MAC PROTOCOL No fixed assignment for transmission media or any network resources.. It allows transmission when needed.
1 實驗五:媒介存取協定模擬 教師: 助教:. 2 Outline  Background  Transmission Protocols  ALOHA  CSMA/CD  CSMA/CA  Network Devices  Hub  Switch  Access Point (AP)
Analyzing Multi-channel MAC Protocols for Underwater Sensor Networks Presenter: Zhong Zhou.
Björn Landfeldt School of Information Technologies Investigating a theoretical model Bjorn Landfeldt University of Sydney.
MAC Protocols Media Access Control (who gets the use the channel) zContention-based yALOHA and Slotted ALOHA. yCSMA. yCSMA/CD. TDM and FDM are inefficient.
CS 5253 Workshop 1 MAC Protocol and Traffic Model.
Copyright © 2003, Dr. Dharma P. Agrawal and Dr. Qing-An Zeng. All rights reserved. 1 Chapter 6 Multiple Radio Access.
1 6/27/ :02 Chapter 15LAN Performance1 Rivier College CS575: Advanced LANs Chapter 15: LAN Performance.
CMPE 150- Introduction to Computer Networks 1 CMPE 150 Fall 2005 Lecture 16 Introduction to Computer Networks.
Studying Local Area Networks Via Media Access Control (MAC) SubLayer
CS 5253 Workshop 1 MAC Protocol and Traffic Model.
Networks: Local Area Networks1 LANs Studying Local Area Networks Via Media Access Control (MAC) SubLayer.
Computer Networks: Local Area Networks 1 LANs Studying Local Area Networks via the Media Access Control (MAC) SubLayer.
Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011 The Medium Access Control Sublayer Chapter.
1 Chapter 5 The Medium Access Sublayer. 2 Chapter 5 The Medium Access Layer 5.1 The Channel Allocation problem - Static and dynamic channel allocation.
1 ECE453 – Introduction to Computer Networks Lecture 7 – Multiple Access Control (I)
Multiple Access Protocols Chapter 6 of Hiroshi Harada Book
IEEE Journal on Selected Areas in Communications
CIS 725 Media Access Layer. Medium Access Control Sublayer MAC sublayer resides between physical and data link layer Broadcast/multiacess channels N independent.
1 Computer Communication & Networks Lecture 12 Datalink Layer: Multiple Access Waleed Ejaz
: Data Communication and Computer Networks
Chi-Cheng Lin, Winona State University CS412 Introduction to Computer Networking & Telecommunication Medium Access Control Sublayer.
Computer Networks NYUS FCSIT Spring 2008 Igor TRAJKOVSKI, Ph.D. Associate Professor
Chapter 4: Medium Access Control (MAC) Sublayer
جلسه دهم شبکه های کامپیوتری به نــــــــــــام خدا.
Modeling and Performance Evaluation of Network and Computer Systems Introduction (Chapters 1 and 2) 10/4/2015H.Malekinezhad1.
Layer 2 Technologies At layer 2 we create and transmit frames over communications channels Format of frames and layer 2 transmission protocols are dependent.
The Medium Access Control Sublayer Chapter 4. The Channel Allocation Problem Static Channel Allocation Dynamic Channel Allocation  Delay for the divided.
Data and Computer Communications Ninth Edition by William Stallings Data and Computer Communications, Ninth Edition by William Stallings, (c) Pearson Education.
November 4, 2003APOC 2003 Wuhan, China 1/14 Demand Based Bandwidth Assignment MAC Protocol for Wireless LANs Presented by Ruibiao Qiu Department of Computer.
Chi-Cheng Lin, Winona State University CS 313 Introduction to Computer Networking & Telecommunication Medium Access Control Sublayer.
1 Modeling and Performance Evaluation of DRED (Dynamic Random Early Detection) using Fluid-Flow Approximation Hideyuki Yamamoto, Hiroyuki Ohsaki Graduate.
RANSim: Simulating a DS-CDMA Fading Channel with Traffic that Arrives in Bursts Colette Consani Heidi Proske.
Medium Access Control Sub Layer
Multiple Access.
Data Communications, Kwangwoon University12-1 Chapter 12. Multiple Access 1.Random Access 2.Controlled Access 3.Channelization.
Chapter 6 Multiple Radio Access
X. Li, W. LiuICC May 11, 2003A Joint Layer Design Smart Contention Resolution Random Access Wireless Networks With Unknown Multiple Users: A Joint.
Medium Access Control Protocols, Local Area Networks, and Wireless Local Area Networks Lecture Note 9.
Giuseppe Bianchi Random Access Performance the case of Aloha.
STUMP: Exploiting Position Diversity in the Staggered TDMA Underwater MAC Protocol Kurtis Kredo II, Petar Djukic, Prasant Mohapatra IEEE INFOCOM 2009.
CS3502: Data and Computer Networks Local Area Networks - 1 introduction and early broadcast protocols.
CS3502: Data and Computer Networks Local Area Networks - 1 introduction and early broadcast protocols.
1 He Says vs. She Says Model Validation and Calibration Kevin Chang HNTB Corporation
LECTURE9 NET301 11/5/2015Lect 9 NET DYNAMIC MAC PROTOCOL: CONTENTION PROTOCOL Carrier Sense Multiple Access (CSMA): A protocol in which a node verifies.
Quality of Service Schemes for IEEE Wireless LANs-An Evaluation 主講人 : 黃政偉.
實驗三 媒體存取協定模擬 教師: 助教: 1998/10/19 High Speed Network Lab. Department of Computer Information Science, NCTU.
Fair and Efficient multihop Scheduling Algorithm for IEEE BWA Systems Daehyon Kim and Aura Ganz International Conference on Broadband Networks 2005.
1 Ethernet CSE 3213 Fall February Introduction Rapid changes in technology designs Broader use of LANs New schemes for high-speed LANs High-speed.
Exploring Random Access and Handshaking Techniques in Large- Scale Underwater Wireless Acoustic Sensor Networks Peng Xie and Jun-Hong Cui Computer Science.
Medium Access Control Protocols, Local Area Networks, and Wireless Local Area Networks Lecture Note 10.
Exercises on Data Link Layer.
UNIT 3 MULTIPLE ACCESS Adapted from lecture slides by Behrouz A. Forouzan © The McGraw-Hill Companies, Inc. All rights reserved.
COMPUTER NETWORKS Data-link Layer (The Medium Access Control Sublayer) MAC Sublayer.
CS 5253 Workshop 1 MAC Protocol and Traffic Model.
CT301 LECTURE 8.
Chapter 12 Multiple Access
Net301 lecture9 11/5/2015 Lect 9 NET301.
The Medium Access Control Sublayer
Communication Networks NETW 501
Chapter 12 Multiple Access
Chapter 12 Multiple Access
The Medium Access Control Sublayer
Multiple Accesses When nodes or stations are connected and use a common link, called a multipoint or broadcast link, we need a multiple-access protocol.
Chapter-5 Traffic Engineering.
Chapter 6 Multiple Radio Access.
Presentation transcript:

Introduction Network Quality Assurance (and Simulation!) Read Chapters 1, 2, 3

Quality Assurance A planned and systematic set of activities to ensure that variances in system performance are clearly identified, assessed, and evaluated to fulfill (or not) some requirements.(After a SixSigma definition related to software engineering). In this class, a system will be a computer network, a networking protocol, a network element (switch, interconnection network)..

Techniques for Quality Assurance Formal modeling and analysis –Queueing models –Probability models Experimentation/measurements –Measure some keys metrics Simulation –Encode a behavior/system (write code that mimicks the system) –Measure key metrics

Examples Consider the evaluation of medium access control protocols: Aloha, slotted Aloha, CSMA/CD… –Formal analysis yields bounds on maximum medium utilization (during design phase), but often requires some simplifications –Experimentation/measurements could yield similar results (no guarantees!), but requires that system exists –Simulation could yield similar results (no guarantees!), does not require that system exists

Examples (2) Quality assurance may require a mix of formal analysis, simulation, and experimentation. Why a mix? Consider the Aloha protocol

Pure Aloha Designed by Abramson (wireless) A station emits whenever it has something to send If other station emits, a collision happens If collision, frame must be resent Best possible utilization at high load 18%

Example: Aloha Protocol Input (workload) Output (Metrics)

Example: Aloha Protocol Input (Packet generated per unit time) Output (Medium utilisation/ throughput)

Simplifications for Formal Analysis Stations have always one packet to send Packets have the same size Generated traffic is a Poisson process Propagation time negligible.

Tools for the 3 Techniques Networking knowledge Probability Statistiques

Mixing the Techniques Formal analysis provide some approximation of the expected performance Simulation may validate the formal analysis and will allow the evaluation of the model when simplifications are removed (“real workload” with packets of different sizes, real world traffic…) Experimentation/measurements may validate the formal analysis and the simulation.

Read Chapter 1, 2, 3