ECEN 621, Prof. Xi Zhang ECEN 621-600 “ Mobile Wireless Networking” Course Materials: Papers, Reference Texts: Bertsekas/Gallager, Stuber, Stallings, etc.

Slides:



Advertisements
Similar presentations
Channel Allocation Protocols. Dynamic Channel Allocation Parameters Station Model. –N independent stations, each acting as a Poisson Process for the purpose.
Advertisements

The ALOHA Protocol “Free for all”: whenever station has a frame to send, it does so. –Station listens for maximum RTT for an ACK. –If no ACK after a specified.
EECC694 - Shaaban #1 lec #5 Spring Data Link In Broadcast Networks: The Media Access Sublayer Broadcast networks with multi-access (or random.
Ethernet – CSMA/CD Review
Fundamentals of Computer Networks ECE 478/578
12.1 Chapter 12 Multiple Access Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Communication Networks Lecture 5 NETW 501-L5: NETW 501-L5: Medium Access Control Dr.-Ing. Khaled Shawky Hassan Room: C3-222, ext: 1204,
LANs Local Area Networks via the Media Access Control (MAC) Sub Layer LANs Local Area Networks via the Media Access Control (MAC) Sub Layer Advanced Advanced.
ECEN “Mobile Wireless Networking”
1 ELEN602 Lecture 10 Review of last lecture –M/G/1 and M/D/1 Results Multi-access Networks Medium Access Control –ALOHA –Slotted ALOHA.
1 Pertemuan 13 Teknik Akses Jaringan - Random Matakuliah: H0174/Jaringan Komputer Tahun: 2006 Versi: 1/0.
MAC Protocols Media Access Control (who gets the use the channel) zContention-based yALOHA and Slotted ALOHA. yCSMA. yCSMA/CD. TDM and FDM are inefficient.
CS 5253 Workshop 1 MAC Protocol and Traffic Model.
CMPE 150- Introduction to Computer Networks 1 CMPE 150 Fall 2005 Lecture 17 Introduction to Computer Networks.
Copyright © 2003, Dr. Dharma P. Agrawal and Dr. Qing-An Zeng. All rights reserved. 1 Chapter 6 Multiple Radio Access.
1 University of Freiburg Computer Networks and Telematics Prof. Christian Schindelhauer Wireless Sensor Networks 7th Lecture Christian Schindelhauer.
CMPE 150- Introduction to Computer Networks 1 CMPE 150 Fall 2005 Lecture 16 Introduction to Computer Networks.
Studying Local Area Networks Via Media Access Control (MAC) SubLayer
T. S. Eugene Ngeugeneng at cs.rice.edu Rice University1 COMP/ELEC 429 Introduction to Computer Networks Broadcast network access control Some slides used.
Networks: Local Area Networks1 LANs Studying Local Area Networks Via Media Access Control (MAC) SubLayer.
Computer Networks: Local Area Networks 1 LANs Studying Local Area Networks via the Media Access Control (MAC) SubLayer.
Shashank Srivastava Motilal Nehru National Institute Of Technology, Allahabad Medium Access Control.
Medium Access Control Protocols, Local Area Networks, and Wireless Local Area Networks Lecture Note 8.
Opersating Mode DCF: distributed coordination function
ECEN 621, Prof. Xi Zhang ECEN “ Mobile Wireless Networking ” Course Materials: Papers, Reference Texts: Bertsekas/Gallager, Stuber, Stallings,
1 Computer Communication & Networks Lecture 12 Datalink Layer: Multiple Access Waleed Ejaz
McGraw-Hill © The McGraw-Hill Companies, Inc., 2004 Chapter 12 Multiple Access Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction.
IEEE High Rate WPAN - MAC functionalities & Power Save Mode Mobile Network Lab. 정상수, 한정애.
جلسه دهم شبکه های کامپیوتری به نــــــــــــام خدا.
ECEN 621, Prof. Xi Zhang ECEN “ Mobile Wireless Networking ” Course Materials: Papers, Reference Texts: Bertsekas/Gallager, Stuber, Stallings,
Medium Access Control NWEN302 Computer Network Design.
ECEN “Internet Protocols and Modeling” Course Materials: Papers, Reference Texts: Bertsekas/Gallager, Stuber, Stallings, etc Grading (Tentative):
1 Poisson Random Process. 2 Mean and Variance Results You have to memorize these! You should be able to derive any of the above Exponential: Poisson:
Cyclic Redundancy Check (CRC).  An error detection mechanism in which a special number is appended to a block of data in order to detect any changes.
جلسه یازدهم شبکه های کامپیوتری به نــــــــــــام خدا.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2000 Unit-II Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Medium Access Control Sub Layer
Chapter 6 Multiple Radio Access
Medium Access Control Protocols, Local Area Networks, and Wireless Local Area Networks Lecture Note 9.
Giuseppe Bianchi Random Access Performance the case of Aloha.
CS3502: Data and Computer Networks Local Area Networks - 1 introduction and early broadcast protocols.
LANs Local Area Networks via the Media Access Control (MAC) Sub Layer LANs Local Area Networks via the Media Access Control (MAC) Sub Layer Advanced Computer.
Ch 12. Multiple Access. Multiple Access for Shared Link Dedicated link – Point-to-point connection is sufficient Shared link – Link is not dedicated –
Background of Ad hoc Wireless Networks Student Presentations Wireless Communication Technology and Research Ad hoc Routing and Mobile IP and Mobility Wireless.
ECEN 621, Prof. Xi Zhang ECEN “ Mobile Wireless Networking ” Course Materials: Papers, Reference Texts: Bertsekas/Gallager, Stuber, Stallings,
ECEN 621, Prof. Xi Zhang ECEN “ Mobile Wireless Networking ” Course Materials: Papers, Reference Texts: Bertsekas/Gallager, Stuber, Stallings,
CS3502: Data and Computer Networks Local Area Networks - 1 introduction and early broadcast protocols.
實驗三 媒體存取協定模擬 教師: 助教: 1998/10/19 High Speed Network Lab. Department of Computer Information Science, NCTU.
1 Ethernet CSE 3213 Fall February Introduction Rapid changes in technology designs Broader use of LANs New schemes for high-speed LANs High-speed.
Advanced Computer Networks C13
ECEN “Internet Protocols and Modeling” Course Materials: Papers, Reference Texts: Bertsekas/Gallager, Stuber, Stallings, etc Lecture notes and.
Tel Hai Academic College Department of Computer Science Prof. Reuven Aviv Markov Models for Access Control in Computer Networks Resource: Fayez Gebali,
ECEN 621, Prof. Xi Zhang ECEN “ Mobile Wireless Networking” Course Materials: Papers, Reference Texts: Bertsekas/Gallager, Stuber, Stallings, etc.
Chapter 4 The Medum Access Sublayer. MA Sublayer Additional Reference –Local and Metropolitan Area Networks, William Stallings, Prentice Hall, 2000, 6th.
Medium Access Control Protocols, Local Area Networks, and Wireless Local Area Networks Lecture Note 10.
COMPUTER NETWORKS Data-link Layer (The Medium Access Control Sublayer) MAC Sublayer.
Multiple Access By, B. R. Chandavarkar, CSE Dept., NITK, Surathkal Ref: B. A. Forouzan, 5 th Edition.
ECEN “Mobile Wireless Networking”
MEDIUM ACCESS CONTROL PROTOCOL
ECEN “Mobile Wireless Networking”
Services of DLL Framing Link access Reliable delivery
ECEN “Internet Protocols and Modeling”
ECEN 619 “Internet Protocols and Modeling”
ECEN “Internet Protocols and Modeling”
The Medium Access Control Sublayer
ECEN “Mobile Wireless Networking”
Communication Networks NETW 501
ECEN “Internet Protocols and Modeling”, Spring 2013
CSE 313 Data Communication
Chapter 6 Multiple Radio Access.
Presentation transcript:

ECEN 621, Prof. Xi Zhang ECEN “ Mobile Wireless Networking” Course Materials: Papers, Reference Texts: Bertsekas/Gallager, Stuber, Stallings, etc Grading (Tentative): HW: 20%, Projects: 40%, Exam-1:20%, Exam-II:20% Lecture notes and Paper Reading Lists: available on-line Class Website: Research Interests and Projects: URL: Instructor: Professor Xi Zhang Office: WERC 331

ECEN 621, Prof. Xi Zhang Medium Access Control Protocols, Local Area Networks, and Wireless Local Area Networks Part I: Medium Access Control Part II: Local Area Networks Part III: Wireless Local Area Networks

ECEN 621, Prof. Xi Zhang Medium Access Control Protocols, Local Area Networks, and Wireless Local Area Networks Medium Access Control Protocol Delay Performance Modeling and Analysis

ECEN 621, Prof. Xi Zhang Medium Access Control Protocols, Local Area Networks, and Wireless Local Area Networks Medium Access Control Protocol Throughput Performance Modeling and Analysis

Prof. Xi Zhang MAC Delay Performance  Frame transfer delay  From first bit of frame arrives at source MAC  To last bit of frame delivered at destination MAC  Throughput  Actual transfer rate through the shared medium  Measured in frames/sec or bits/sec  Parameters R bits/sec & L bits/frame X=L/R seconds/frame frames/second average arrival rate Load  = X = X/(1/ ), rate at which “ work ” arrives Maximum throughput efficiency): R/L fr/sec

Prof. Xi Zhang Load Transfer delay E[T]/X   max 1 1 Normalized Delay versus Load E[T] = average frame transfer delay X = average frame transmission time  At low arrival rate, only frame transmission time  At high arrival rates, increasingly longer waits to access channel  Max efficiency typically less than 100%

Prof. Xi Zhang Dependence on Rt prop /L Transfer Delay Load E[T]/X   max 1 1 a a a > a

Prof. Xi Zhang ALOHA  Wireless link to provide data transfer between main campus & remote campuses of University of Hawaii  Simplest solution: just do it  A station transmits whenever it has data to transmit  If more than one frames are transmitted, they interfere with each other (collide) and are lost  If ACK not received within timeout, then a station picks random backoff time (to avoid repeated collision)  Station retransmits frame after backoff time t t0t0 t 0 -X t 0 +X t 0 +X+2t prop t 0 +X+2t prop  + B Vulnerable period Time-out Backoff period B First transmission Retransmission

Prof. Xi Zhang ALOHA Model  Definitions and assumptions  X frame transmission time (assume constant)  S: throughput (average # successful frame transmissions per X seconds)  G: load (average # transmission attempts per X sec.)  P success : probability a frame transmission is successful X X frame transmission Prior interval  Any transmission that begins during vulnerable period leads to collision  Success if no arrivals during 2X seconds

Prof. Xi Zhang Abramson ’ s Assumption  What is probability of no arrivals in vulnerable period?  Abramson assumption: Effect of backoff algorithm is that frame arrivals are equally likely to occur at any time interval  G is avg. # arrivals per X seconds  Divide X into n intervals of duration  =X/n  p = probability of arrival in  interval, then G = n p since there are n intervals in X seconds

Prof. Xi Zhang Throughput of Pure ALOHA  Collisions are means for coordinating access  Max throughput is  max =  1/2e (18.4%)  Bimodal behavior: Small G, S≈G Large G, S ↓ 0  Collisions can snowball and drop throughput to zero 0.5e -1 = 0.184

Prof. Xi Zhang Slotted ALOHA  Time is slotted in X seconds slots  Stations synchronized to frame times  Stations transmit frames in first slot after frame arrival  Backoff intervals in multiples of slots t (k+1)X kX t 0 +X+2t prop + B Vulnerable period Time-out Backoff period B t 0 +X+2t prop Only frames that arrive during prior X seconds collide