實驗三 媒體存取協定模擬 教師: 助教: 1998/10/19 High Speed Network Lab. Department of Computer Information Science, NCTU.

Slides:



Advertisements
Similar presentations
Data and Computer Communications
Advertisements

Channel Allocation Protocols. Dynamic Channel Allocation Parameters Station Model. –N independent stations, each acting as a Poisson Process for the purpose.
The ALOHA Protocol “Free for all”: whenever station has a frame to send, it does so. –Station listens for maximum RTT for an ACK. –If no ACK after a specified.
EECC694 - Shaaban #1 lec #5 Spring Data Link In Broadcast Networks: The Media Access Sublayer Broadcast networks with multi-access (or random.
Ethernet – CSMA/CD Review
Fundamentals of Computer Networks ECE 478/578
Lecture 9: Multiple Access Protocols
Communication Networks Lecture 5 NETW 501-L5: NETW 501-L5: Medium Access Control Dr.-Ing. Khaled Shawky Hassan Room: C3-222, ext: 1204,
1 K. Salah Module 4.2: Media Access Control The Media Access Control (MAC) sublayer –Random Access (CSMA), IEEE –Token Passing, IEEE Ch 13-
1 實驗五:媒介存取協定模擬 教師: 助教:. 2 Outline  Background  Transmission Protocols  ALOHA  CSMA/CD  CSMA/CA  Network Devices  Hub  Switch  Access Point (AP)
1 Pertemuan 13 Teknik Akses Jaringan - Random Matakuliah: H0174/Jaringan Komputer Tahun: 2006 Versi: 1/0.
MAC Protocols Media Access Control (who gets the use the channel) zContention-based yALOHA and Slotted ALOHA. yCSMA. yCSMA/CD. TDM and FDM are inefficient.
CS 5253 Workshop 1 MAC Protocol and Traffic Model.
CMPE 150- Introduction to Computer Networks 1 CMPE 150 Fall 2005 Lecture 17 Introduction to Computer Networks.
Copyright © 2003, Dr. Dharma P. Agrawal and Dr. Qing-An Zeng. All rights reserved. 1 Chapter 6 Multiple Radio Access.
Teknik Akses Jaringan Carrier Sense Pertemuan 12 Matakuliah: H0484/Jaringan Komputer Tahun: 2007.
CMPE 150- Introduction to Computer Networks 1 CMPE 150 Fall 2005 Lecture 16 Introduction to Computer Networks.
EEC-484/584 Computer Networks Lecture 13 Wenbing Zhao
EEC-484/584 Computer Networks Lecture 9 Wenbing Zhao (Part of the slides are based on materials supplied by Dr. Louise Moser at UCSB and.
Studying Local Area Networks Via Media Access Control (MAC) SubLayer
CS 5253 Workshop 1 MAC Protocol and Traffic Model.
Networks: Local Area Networks1 LANs Studying Local Area Networks Via Media Access Control (MAC) SubLayer.
Computer Networks: Local Area Networks 1 LANs Studying Local Area Networks via the Media Access Control (MAC) SubLayer.
Semester EEE449 Computer Networks The Data Link Layer Part 2: Media Access Control En. Mohd Nazri Mahmud MPhil (Cambridge, UK) BEng (Essex,
Chap 4 Multiaccess Communication (Part 1)
1 ECE453 – Introduction to Computer Networks Lecture 7 – Multiple Access Control (I)
9/11/2015 5:55 AM1 Ethernet and CSMA/CD CSE 6590 Fall 2010.
Multiple Access Protocols Chapter 6 of Hiroshi Harada Book
A.S.Tanenbaum, Computer networks, ch4 MAC 1 The Medium Access Control Sublayer Medium Access Control: a means of controlling access to the medium to promote.
CIS 725 Media Access Layer. Medium Access Control Sublayer MAC sublayer resides between physical and data link layer Broadcast/multiacess channels N independent.
: Data Communication and Computer Networks
Chi-Cheng Lin, Winona State University CS412 Introduction to Computer Networking & Telecommunication Medium Access Control Sublayer.
Chapter 4: Medium Access Control (MAC) Sublayer
LECTURE9 NET301. DYNAMIC MAC PROTOCOL: CONTENTION PROTOCOL Carrier Sense Multiple Access (CSMA): A protocol in which a node verifies the absence of other.
LOCAL AREA NETWORKS. CSMA Carrier Sense Multiple Access To minimize the chance of collision and, therefore, increase the performance, the CSMA method.
Medium Access Control NWEN302 Computer Network Design.
LAN technologies and network topology LANs and shared media Locality of reference Star, bus and ring topologies Medium access control protocols.
Data and Computer Communications Ninth Edition by William Stallings Data and Computer Communications, Ninth Edition by William Stallings, (c) Pearson Education.
Chi-Cheng Lin, Winona State University CS 313 Introduction to Computer Networking & Telecommunication Medium Access Control Sublayer.
جلسه یازدهم شبکه های کامپیوتری به نــــــــــــام خدا.
R ANDOM A CCESS N ETWORKS CSMA F AMILIES 1. References Chapter 9 of the book. Throughput Analysis for Persistent CSMA Systems, HIDEAKI TAKAGI AND LEONARD.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2000 Unit-II Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Medium Access Control Sub Layer
7-1 Introduction to Queueing Theory l Components of a queueing system n probability density function (pdf) of interarrival times n pdf of service times.
Multiple Access.
Data Communications, Kwangwoon University12-1 Chapter 12. Multiple Access 1.Random Access 2.Controlled Access 3.Channelization.
1 Kyung Hee University Chapter 12 Multiple Access.
Chapter 6 Multiple Radio Access
Medium Access Control Protocols, Local Area Networks, and Wireless Local Area Networks Lecture Note 9.
LANs : Aloha/CSMA , summary
Ethernet. Ethernet (802.3) 1-persistent CSMA, CD, binary exponential backoff Carrier sense: station listens to channel first. 1-persistent: If idle, station.
CS3502: Data and Computer Networks Local Area Networks - 1 introduction and early broadcast protocols.
Ch 12. Multiple Access. Multiple Access for Shared Link Dedicated link – Point-to-point connection is sufficient Shared link – Link is not dedicated –
CS3502: Data and Computer Networks Local Area Networks - 1 introduction and early broadcast protocols.
EE 122: Lecture 6 Ion Stoica September 13, 2001 (* this talk is based in part on the on-line slides of J. Kurose & K. Rose)
1 Ethernet CSE 3213 Fall February Introduction Rapid changes in technology designs Broader use of LANs New schemes for high-speed LANs High-speed.
Tel Hai Academic College Department of Computer Science Prof. Reuven Aviv Markov Models for Access Control in Computer Networks Resource: Fayez Gebali,
Chapter 4 The Medum Access Sublayer. MA Sublayer Additional Reference –Local and Metropolitan Area Networks, William Stallings, Prentice Hall, 2000, 6th.
Medium Access Control Protocols, Local Area Networks, and Wireless Local Area Networks Lecture Note 10.
UNIT 3 MULTIPLE ACCESS Adapted from lecture slides by Behrouz A. Forouzan © The McGraw-Hill Companies, Inc. All rights reserved.
COMPUTER NETWORKS Data-link Layer (The Medium Access Control Sublayer) MAC Sublayer.
Multiple Access By, B. R. Chandavarkar, CSE Dept., NITK, Surathkal Ref: B. A. Forouzan, 5 th Edition.
CS 5253 Workshop 1 MAC Protocol and Traffic Model.
Example DLL Protocols 1. High-Level Data Link Control (HDLC).
MEDIUM ACCESS CONTROL PROTOCOL
High Speed LANs – Ethernet and Token Ring
The Medium Access Control Sublayer
Communication Networks NETW 501
CARRIER SENSE MULTIPLE ACCESS (CSMA)
Chapter 6 Multiple Radio Access.
Presentation transcript:

實驗三 媒體存取協定模擬 教師: 助教: 1998/10/19 High Speed Network Lab. Department of Computer Information Science, NCTU

Outline Background Why simulation ? MAC Protocols Throughput v.s. Offered load Investigated topics Experiment steps Experiment records

Classification of MAC protocols Note : Some systems use a combination of above schemes.

ALOHA Transmit whenever it wants Listen to know if it’s a success or collision Wait a random time to retx, if collided Vulnerable period : 2 frame times S (throughput) = G P 0 = G e -2G S max = 0.5 e -1 = 18.4 % (G = 0.5) Slotted ALOHA S = G e -G S max =1 e -1 =36.8 % (G =1)

CSMA/CD channel busy ready 1-persistent: tx when channel goes idle if collision, backoff exponentially p-persistent: tx when channel goes idle with prob. p otherwise, delay one slot and repeat constant or random delaynon-persistent : tx if idle otherwise, delay and try again

Approximate Analysis of CSMA/CD Assume infinite population (i.e. very large number of stations) and Poisson arrival with rate G arrivals/slot S = G e -G S max = 1 e -1 = 1/e (i.e. one success every e slots)  max (throughput) = = where  = end-to-end propagation delay b = packet length B= bandwidth Note : Efficiency drops as B  L increases. succ  22 p

Simulation Principle Mathematics Model v.s. Simulation Model Preciseness v.s. Cost CACI COMNET III

Summary of MAC protocols ALOHA –No listen CSMA –Persistent CSMA (wait it to be idle and Tx) –Non-persistent CSMA (randomly see the channel) –P-persistent CSMA (slotted randomly see with Tx prob. p) CSMA/CD –Collision Detection –Binary exponential backoff

Two Definitions

Throughput vs. Offered-load 1/4 1/3 1/ Offered load Throughput ALOHA Slotted ALOHA

Investigated Topics Offered-load v.s. throughput throughput & delay comparison –ALOHA –CSMA –CSMA/CD same offered-load –(throughput) v.s. (# of node) (bandwidth) v.s. (max throughput)

Experiment Steps Build network topology Set traffic parameters Set link parameters Choose report format Initialize simulator and run

Step 1: Building the Topology

Step 2: Setting Traffic Parameters

Step 3: Setting Link Parameters

Example: Link Parameters

Step 4: Choose Report Format

CACI COMNET III RELEASE 1.1r Thu Oct 29 20:04: PAGE 1 test11 LINK DELAYS AND UTILIZATION REPLICATION 1 FROM 0.0 TO 60.0 SECONDS FRAMES TRANSMISSION DELAY (MS) % LINK DELIVERED RESENT AVERAGE STD DEV MAXIMUM UTIL _____________________ _________ ______ _________ _________ _________ _____ Link CACI COMNET III RELEASE 1.1r Thu Oct 29 20:04: PAGE 2

Experiment Records Throughput and Delay : CSMA/CD, CSMA, and ALOHA under 1, 1/2, 1/3, and 1/4 offered-load Throughput : different # Nodes under the same offered-load Max throughput : different bandwidth (high- bandwidth v.s. low-bandwidth)