ECE 333: Introduction to Communication Networks Fall 2002



Similar documents
LANs. Local Area Networks. via the Media Access Control (MAC) SubLayer. Networks: Local Area Networks

TCOM 370 NOTES LOCAL AREA NETWORKS AND THE ALOHA PROTOCOL

CS263: Wireless Communications and Sensor Networks

Collision of wireless signals. The MAC layer in wireless networks. Wireless MAC protocols classification. Evolutionary perspective of distributed MAC

EECS 122: Introduction to Computer Networks Multiaccess Protocols. ISO OSI Reference Model for Layers

a. CSMA/CD is a random-access protocol. b. Polling is a controlled-access protocol. c. TDMA is a channelization protocol.

Local Area Networks transmission system private speedy and secure kilometres shared transmission medium hardware & software

Chapter 4. Medium Access Control. IN2P3 Octobre 2002 Jean-Pierre Thomesse

How To Make A Multi-User Communication Efficient

EXAMPLES AND PROBLEMS. Competence Based Education Internet Protocols

Network Protocol Design and Evaluation

Random access protocols for channel access. Markov chains and their stability. Laurent Massoulié.

Random Access Protocols

Controlled Random Access Methods

RESOURCE ALLOCATION FOR INTERACTIVE TRAFFIC CLASS OVER GPRS

CS6956: Wireless and Mobile Networks Lecture Notes: 2/11/2015. IEEE Wireless Local Area Networks (WLANs)

MAC Algorithms in Wireless Networks

Figure 1: cellular system architecture

TABLE OF CONTENTS. Dedication. Table of Contents. Preface. Overview of Wireless Networks. vii xvii

2.0 System Description

Adaptive DCF of MAC for VoIP services using IEEE networks

1. The subnet must prevent additional packets from entering the congested region until those already present can be processed.

How To Solve A Network Problem In An Ipa (Ipa 2) (Ipam) (Networking) (For Acedo) (Ipta) (Powerline) (Network) (Nem

Answer: that dprop equals dtrans. seconds. a) d prop. b) d trans

Attenuation (amplitude of the wave loses strength thereby the signal power) Refraction Reflection Shadowing Scattering Diffraction

Lecture 2.1 : The Distributed Bellman-Ford Algorithm. Lecture 2.2 : The Destination Sequenced Distance Vector (DSDV) protocol

ECE 428 Computer Networks and Security

First Midterm for ECE374 02/25/15 Solution!!

15-441: Computer Networks Homework 2 Solution

CHAPTER - 4 CHANNEL ALLOCATION BASED WIMAX TOPOLOGY

Real-Time (Paradigms) (51)

28 Networks and Communication Protocols

CSMA/CA. Information Networks p. 1

TCP in Wireless Networks

Packet Queueing Delay in Wireless Networks with Multiple Base Stations and Cellular Frequency Reuse

CSE 123A Computer Networks

Dynamic Load Balance Algorithm (DLBA) for IEEE Wireless LAN

IEEE Broadband Wireless Access Working Group. ATM Based MAC Layer Proposal for the Air Interface Specification

Chapter 6: Conclusion

RTT 60.5 msec receiver window size: 32 KB

Wiereless LAN

Enhanced Power Saving for IEEE WLAN with Dynamic Slot Allocation

Note! The problem set consists of two parts: Part I: The problem specifications pages Part II: The answer pages

THE development of media access control (MAC) protocols

Data Link Layer(1) Principal service: Transferring data from the network layer of the source machine to the one of the destination machine

Ethernet. Ethernet Frame Structure. Ethernet Frame Structure (more) Ethernet: uses CSMA/CD

CSE331: Introduction to Networks and Security. Lecture 9 Fall 2006

AN ANALYSIS OF DELAY OF SMALL IP PACKETS IN CELLULAR DATA NETWORKS

Performance Evaluation of Wired and Wireless Local Area Networks

Medium Access Control with Dynamic Frame Length in Wireless Sensor Networks

Multiple Access Protocols

First Semester Examinations 2011/12 INTERNET PRINCIPLES

A research perspective on the adaptive protocols' architectures and system infrastructures to support QoS in wireless communication systems

FURTHER READING: As a preview for further reading, the following reference has been provided from the pages of the book below:

Wireless LAN Protocol CS 571 Fall Kenneth L. Calvert All rights reserved

Overview of Network Hardware and Software. CS158a Chris Pollett Jan 29, 2007.

Performance Analysis of the IEEE Wireless LAN Standard 1

Applying Active Queue Management to Link Layer Buffers for Real-time Traffic over Third Generation Wireless Networks

EETS 8316 Wireless Networks Fall 2013

LLC: Frame Construction. Layer 2: Division into two Parts. Error-detecting and -correcting Codes. Error-correcting Codes

Data Link Layer. Flow Control. Flow Control

CSE 123: Computer Networks Fall Quarter, 2014 MIDTERM EXAM

Ethernet, VLAN, Ethernet Carrier Grade

On the Traffic Capacity of Cellular Data Networks. 1 Introduction. T. Bonald 1,2, A. Proutière 1,2

ADV-MAC: Advertisement-based MAC Protocol for Wireless Sensor Networks

CSE331: Introduction to Networks and Security. Lecture 6 Fall 2006

EKSAMEN / EXAM TTM

Stop And Wait. ACK received; transmit frame 2 CS 455 3

Ring Local Area Network. Ring LANs

CS 5480/6480: Computer Networks Spring 2012 Homework 4 Solutions Due by 1:25 PM on April 11 th 2012

Wireless LAN Concepts

QoS issues in Voice over IP

Markku Renfors. Partly based on student presentation by: Lukasz Kondrad Tomasz Augustynowicz Jaroslaw Lacki Jakub Jakubiak

ECE 358: Computer Networks. Homework #3. Chapter 5 and 6 Review Questions 1

Lab Exercise Objective. Requirements. Step 1: Fetch a Trace

ESSENTIALS. Understanding Ethernet Switches and Routers. April 2011 VOLUME 3 ISSUE 1 A TECHNICAL SUPPLEMENT TO CONTROL NETWORK

NOVEL PRIORITISED EGPRS MEDIUM ACCESS REGIME FOR REDUCED FILE TRANSFER DELAY DURING CONGESTED PERIODS

Chapter 6: Medium Access Control Layer

LTE OPTIMIZATION AND MOBILE NETWORK

Adaptive Medium Access Control (MAC) for Heterogeneous Mobile Wireless Sensor Networks (WSNs).

DATA COMMUNICATIONS AND NETWORKING. Solved Examples

Selfish MAC Layer Misbehavior in Wireless Networks

TCP Westwood for Wireless

Computer Networks. Chapter 5 Transport Protocols

How To Understand The Power Of A Network On A Microsoft Ipa 2.5 (Ipa) (Ipam) (Networking) 2 (Ipom) 2(2

Operating System Concepts. Operating System 資 訊 工 程 學 系 袁 賢 銘 老 師

Per-Flow Queuing Allot's Approach to Bandwidth Management

Referring to the above question, the end-to-end delay (transmission delay plus propagation delay) is

TCP over Multi-hop Wireless Networks * Overview of Transmission Control Protocol / Internet Protocol (TCP/IP) Internet Protocol (IP)

An Efficient QoS Routing Protocol for Mobile Ad-Hoc Networks *

VHICLE-TO-VEHICLE (V2V) communication can promote

Low-rate TCP-targeted Denial of Service Attack Defense

Transcription:

ECE 333: Introduction to Communication Networks Fall 2002 Lecture 14: Medium Access Control II Dynamic Channel Allocation Pure Aloha In the last lecture we began discussing medium access control protocols for allocating a shared broadcast channel. We classified these protocols as either static or dynamic, and considered some basic types of static allocations (these are referred to as channelization approaches in Leon-Garcia's book, see Section 6.5). Such approaches are suitable for fixed rate traffic, but provide poor performance for highly variable traffic. In this lecture, we begin considering dynamic approaches for channel allocation.

Dynamic Channel Allocation: Many different dynamic allocation strategies have been developed. They can be broadly classified as: Contention resolution approaches - users transmit a packet when they have data to send- if multiple users transmit at the same time a collision occurs and the packets must be retransmitted according to some rule. Perfectly scheduled approaches - Users transmit contention free according to a schedule that is dynamically formed based on which users have data to send, e.g. polling, reservations. Various combinations of these approaches also exist. We will look at several specific examples in the next few lectures, beginning with a basic contention resolution approach today. As we look at different approaches keep in mind the following two performance criteria: 1. The delay at low load. 2. The throughput (channel efficiency) at high load. Multiaccess model We will consider a (simplified) multiaccess model with the following key assumptions: 1) User Model: There are N users or stations. Frames randomly arrive at each station to be transmitted. The arrivals at each station are independent of each other. 2) Channel model: All communication is over a single channel and there is no other means of communicating between users. 3) Transmission model: Whenever frames overlap in time the frame is garbled and can't be received. If no other frames overlap with a frame it is successfully received, i.e. the only errors are due to collisions. 4) Feedback model: All stations are able to detect collisions (or successes) after sending a full frame. There are several ways collisions can be detected. For example, in a system with a central repeater (e.g., a satellite), a station can listen for the return of its message. (In many cases this feedback may be delayed, but we ignore this for now.) (We will look at variations of these assumptions later.)

Aloha Protocols Suppose when a user has data to send, the user simply transmits the frame. In our model, if no other user happened to have a frame to transmit then this frame would be successfully received. What if a collision occurs? The user could simply retransmit, but this would not help, because the other user involved in the collision would also retransmit, resulting in another collision. One way to avoid the problem is to wait a random amount of time before retransmitting. The above idea is the basis for the Aloha MAC protocol. The Aloha protocol was developed at the University of Hawaii in the 1970 s by Norman Abramson. This protocol has served as the basis for many other contentionbased protocols. (Pure) Aloha: Users transmit whenever they have data. Senders wait to see if a collision occurred (after whole message has been sent). If collision occurs, each station involved waits a random amount of time then tries again. Questions: Is this a good protocol (i.e. what is the performance)? How should the random time for waiting be chosen?

Aloha Performance Intuitively, one would expect performance to depend on the system load. As more and more users try to send information, more collisions occur and more of the bandwidth of the channel will be wasted on collisions. A common way to describe the performance of a dynamic allocation scheme is to look at how much average throughput is achieved as a function of the average offered load on the system. At low offered load, the probability of a collision will be small; so, most messages get through without a collision. However, the throughput is also low, since there isn t much traffic. In this case, the throughput will be approximately the same as in a static allocation (e.g. TDMA), but the delay will be much smaller, since users can transmit immediately when a frame arrives. At very high offered load, almost every message will experience a collision, and once again, the throughput will be low. In this case the throughput will be lower than in a static allocation, due to the collisions. What happens in between these points? Aloha Throughput To analyze the throughput of Aloha, we consider a model with an infinite number of users that generate fixed length frames. We assume that each new frame belongs to a new user, and that the overall arrival of frames is a Poisson process with rate frames/sec. Let T indicate the time to transmit one frame. It will be convenient to normalize time by T. Let S be arrival rate of frames in "frame times" of T seconds, i.e. S T A transmission will be attempted at any time if either a new frame arrives or a frame is retransmitted. Assume that the start of transmissions at any time is also modeled as a Poisson process with rate G attempts per frame time. (This assumption can be shown to be a reasonable approximation for some common retransmission strategies.) Thus the number of transmission attempts in a frame time will be a Poisson random variable, with mean G (attempts/frame time). Note that S G, with equality only if there are no collisions. Assuming the system is stable then the average rate of successful transmission must equal the average arrival rate. Thus, denoting the probability of a successful transmission by P0, we have S GP 0.

Probability of Success If a transmission starts at some time t, there is an interval of time around t during which if another transmission starts, it will result in a collision. The length of this contention interval is twice the frame time, as shown below. t t + T t - T Thus the probability a frame is successfully transmitted, P0, is the probability no other frames begin transmission during the contention window. This is the probability of 0 arrivals from a Poisson process with rate S, during 2 frame times. From the properties of the Poisson process (cf. Lec. 12), the number of arrivals in 2 frame times is a Poisson random variable with mean 2S. Thus 0 ( ) e 0 e P 0!. Aloha Throughput From the above we have S GP 0 Ge This is plotted as a function of G below. S.18 Ge -.5 1 The maximum of this curve represents the maximum throughput for a stable system. To find the maximum we set the derivative of S(G) equal to zero as follows: ds d Ge dg dg Solving we find that G * 0. 5 S max 1/(2e) 0.18. e e 0, and thus the maximum throughput is G 10

To summarize, we have considered a simplified analysis of a pure Aloha, and found that the maximum throughput is limited to be at most 1/(2e). Note we have not taken into account how the offered load changes with time, or specified the details of how the retransmission time is adjusted. Despite these shortcomings, this analysis does correctly predict the maximum throughput of a pure Aloha system. In the next lecture, we will look at an improvement on this system, and then return to address some of the above issues. 11