ECE 358: Computer Networks. Homework #3. Chapter 5 and 6 Review Questions 1



Similar documents
CSMA/CA. Information Networks p. 1

Wiereless LAN

... neither PCF nor CA used in practice

standard. Acknowledgement: Slides borrowed from Richard Y. Yale

Medium Access Control (MAC) Protocols for Ad hoc Wireless Networks - III

LAN Switching Computer Networking. Switched Network Advantages. Hubs (more) Hubs. Bridges/Switches, , PPP. Interconnecting LANs

Wireless LAN Protocol CS 571 Fall Kenneth L. Calvert All rights reserved

Attenuation (amplitude of the wave loses strength thereby the signal power) Refraction Reflection Shadowing Scattering Diffraction

ECE 428 Computer Networks and Security

VoIP in Mika Nupponen. S Postgraduate Course in Radio Communications 06/04/2004 1

IEEE Technical Tutorial. Introduction. IEEE Architecture

A Technical Tutorial on the IEEE Protocol

An Overview of Wireless LAN Standards IEEE and IEEE e

CS6956: Wireless and Mobile Networks Lecture Notes: 2/11/2015. IEEE Wireless Local Area Networks (WLANs)

RTT 60.5 msec receiver window size: 32 KB

Note! The problem set consists of two parts: Part I: The problem specifications pages Part II: The answer pages

LANs. Local Area Networks. via the Media Access Control (MAC) SubLayer. Networks: Local Area Networks

WiFi. Is for Wireless Fidelity Or IEEE Standard By Greg Goldman. WiFi 1

Ethernet. Ethernet Frame Structure. Ethernet Frame Structure (more) Ethernet: uses CSMA/CD

Markku Renfors. Partly based on student presentation by: Lukasz Kondrad Tomasz Augustynowicz Jaroslaw Lacki Jakub Jakubiak

Collision of wireless signals. The MAC layer in wireless networks. Wireless MAC protocols classification. Evolutionary perspective of distributed MAC

Chapter 7 Low-Speed Wireless Local Area Networks

Based on Computer Networking, 4 th Edition by Kurose and Ross

Final for ECE374 05/06/13 Solution!!

Basic processes in IEEE networks

EXAMPLES AND PROBLEMS. Competence Based Education Internet Protocols

Adaptive DCF of MAC for VoIP services using IEEE networks

TCP in Wireless Networks

Enhanced TXOP scheme for efficiency improvement of WLAN IEEE e

CS 5480/6480: Computer Networks Spring 2012 Homework 4 Solutions Due by 1:25 PM on April 11 th 2012

An Experimental Study of Throughput for UDP and VoIP Traffic in IEEE b Networks

Philippe Klein. avb-phkl qos-overview

Mobile Communications Exercise: Satellite Systems and Wireless LANs. Georg von Zengen, IBR, TU Braunschweig,

ISSN: ISO 9001:2008 Certified International Journal of Engineering Science and Innovative Technology (IJESIT) Volume 2, Issue 5, September

First Midterm for ECE374 03/09/12 Solution!!

WAN Data Link Protocols

Video Transmission over Wireless LAN. Hang Liu

Networks. Master of Science (Computer Science and Engineering), December 2004, 45 pp.,

Midterm Exam CMPSCI 453: Computer Networks Fall 2011 Prof. Jim Kurose

Performance Analysis of the IEEE Wireless LAN Standard 1

A TCP-like Adaptive Contention Window Scheme for WLAN

IEEE Wireless LAN Standard. Updated: 5/10/2011

Improving Throughput Performance of the IEEE MAC Layer Using Congestion Control Methods

Random Access Protocols

Final Exam. Route Computation: One reason why link state routing is preferable to distance vector style routing.

IEEE e WLANs / WMM. S.Rajesh (rajeshsweb@gmail.com) AU-KBC Research Centre, BroVis Wireless Networks, smartbridges Pte Ltd.

Railway Freight Dispatching Telephone System Based on VoIP in Wireless Networks

11/22/

CSE331: Introduction to Networks and Security. Lecture 6 Fall 2006

Internet of Things. Exam June 24

Can I add a VoIP call?

Express Forwarding : A Distributed QoS MAC Protocol for Wireless Mesh

A Short Look on Power Saving Mechanisms in the Wireless LAN Standard Draft IEEE

Computer Networks Homework 1

2. What is the maximum value of each octet in an IP address? A. 128 B. 255 C. 256 D. None of the above

DATA COMMUNICATIONS AND NETWORKING. Solved Examples

Performance Comparison of Dual Queue and EDCA for VoIP over IEEE WLAN

Algorithms for Interference Sensing in Optical CDMA Networks

EECS 122: Introduction to Computer Networks Multiaccess Protocols. ISO OSI Reference Model for Layers

IEEE 802 Protocol Layers. IEEE Wireless LAN Standard. Protocol Architecture. Protocol Architecture. Separation of LLC and MAC.

Controlled Random Access Methods

CSE3214 Computer Network Protocols and Applications. Chapter 1 Examples and Homework Problems

LAN Performance Measurements Lab

TCOM 370 NOTES LOCAL AREA NETWORKS AND THE ALOHA PROTOCOL

MAC Algorithms in Wireless Networks

Lab Exercise Objective. Requirements. Step 1: Fetch a Trace

Local Area Networks transmission system private speedy and secure kilometres shared transmission medium hardware & software

Written examination in Computer Networks

How To Determine The Capacity Of An B Network

First Semester Examinations 2011/12 INTERNET PRINCIPLES

Module 5. Broadcast Communication Networks. Version 2 CSE IIT, Kharagpur

CH.1. Lecture # 2. Computer Networks and the Internet. Eng. Wafaa Audah. Islamic University of Gaza. Faculty of Engineering

How To Configure the WLAN with QoS

Computer Network. Interconnected collection of autonomous computers that are able to exchange information

Using Industrial Ethernet Networks for PROFInet

Frame Burst Adjusting for Transmitting Video Conference in Gigabit Ethernet

Welcome to the Introduction to Controller Area Network web seminar My name is William Stuart, and I am a Applications Engineer for the Automotive

IEEE WLAN (802.11) ...Copyright. Renato Lo Cigno

Direct Link Networks. Introduction. Physical Properties. Lecture - Ethernet 1. Areas for Discussion. Ethernet (Section 2.6)

IEEE Ad Hoc Networks: Performance Measurements

Supporting VoIP in IEEE Distributed WLANs

CS263: Wireless Communications and Sensor Networks

Lecture 7 Multiple Access Protocols and Wireless

Data Link Protocols. Link Layer Services. Framing, Addressing, link access: Error Detection:

CSE 123A Computer Networks

Wireless LAN advantages. Wireless LAN. Wireless LAN disadvantages. Wireless LAN disadvantages WLAN:

Ethernet. Ethernet. Network Devices

CSE 123: Computer Networks Fall Quarter, 2014 MIDTERM EXAM

How To Make A Multi-User Communication Efficient

Internet Control Protocols Reading: Chapter 3

Admission Control for VoIP Traffic in IEEE Networks

Virtual PCF: Improving VoIP over WLAN performance with legacy clients

CCNA R&S: Introduction to Networks. Chapter 5: Ethernet

Fast Retransmission Mechanism for VoIP in IEEE e wireless LANs

CONTROL MICROSYSTEMS DNP3. User and Reference Manual

Modeling and Simulation of Quality of Service in VoIP Wireless LAN

Transcription:

ECE 358: Computer Networks Homework #3 Chapter 5 and 6 Review Questions 1 Chapter 5: The Link Layer P26. Let's consider the operation of a learning switch in the context of a network in which 6 nodes labeled A through F are star connected into an Ethernet switch. Suppose that (i) B sends a frame to E, (ii) E replies with a frame to B, (iii) A sends a frame to B, (iv) B replies with a frame to A. The switch table is initially empty. Show the state of the switch table before and after each of these events. For each of these events, identify the link(s) on which the transmitted frame will be forwarded, and briefly justify your answers. : Action Switch Table State Link(s) packet is forwarded to Explanation B sends a frame to E Switch learns interface MAC address of B A, C, D, E, and F Since switch table is empty, so switch does not know the interface MAC address of E E replies with a frame to B Switch learns interface MAC address of E B Since switch already knows interface MAC address of B A sends a frame to B Switch learns the interface MAC address of A B Since switch already knows the interface MAC address of B B replies with a frame to A Switch table state remains the same as before A Since switch already knows the interface MAC address of A 1 From the textbook (Computer Networking: A Top- Down Approach, 6 Th edition) Pages 508, 579 & 581

P27. In this problem, we explore the use of small packets for Voice-over IP applications. One of the drawbacks of a small packet size is that a large fraction of link bandwidth is consumed by overhead bytes. To this end, suppose that the packet consists of L bytes and 5 bytes of header. a. Consider sending a digitally encoded voice source directly. Suppose the source is encoded at a constant rate of 128 kbps. Assume each packet is entirely filled before the source sends the packet into the network. The time required to fill a packet is the packetization delay. In terms of L, determine the packetization delay in milliseconds. b. Packetization delays greater than 20 msec. can cause a noticeable and unpleasant echo. Determine the packetization delay for L = 1,500 bytes (roughly corresponding to a maximumsized Ethernet packet) and for L = 50 (corresponding to an ATM packet). c. Calculate the store-and-forward delay at a single switch for a link rate of R = 622 Mbps for L=1,500 bytes, and for L = 50 bytes. d. Comment on the advantages of using a small packet size. a) The time required to fill L 8 bits is L 8 128 10 L sec = 16 3 m sec. b) For L = 1,500, the packetization delay is 1500 m sec = 93.75msec. 16 For L = 50, the packetization delay is 50 m sec = 3.125msec. 16 c) Store-and-forward delay For L = 1, 500, the delay is 1500 8 + 40 sec 19.4µ sec 6 622 10 L 8 + 40 = R

For L = 50, store-and-forward delay < 1µ sec. d) Store-and-forward delay is small for both cases for typical link speeds. However, packetization delay for L = 1500 is too large for real-time voice applications. Chapter 6: Wireless Networks R6. True or false: Before an 802.11 station transmits a data frame; it must first send an RTS frame and receive a corresponding CTS frame. False R10. Suppose the IEEE 802.11 RTS and CTS frames were as long as the standard DATA and ACK frames. Would there be any advantage to using the CTS and RTS frames? Why or why not? No, there wouldn t be any advantage. Suppose there are two stations that want to transmit at the same time, and they both use RTS/CTS. If the RTS frame is as long as a DATA frames, the channel would be wasted for as long as it would have been wasted for two colliding DATA frames. Thus, the RTS/CTS exchange is only useful when the RTS/CTS frames are significantly smaller than the DATA frames. P7. Suppose an 802.11b station is configured to always reserve the channel with the RTS/CTS sequence. Suppose this station suddenly wants to transmit 1,000 bytes of data, and all other stations are idle at this time. As a function of SIFS and DIFS, and ignoring propagation delay and assuming no bit errors, calculate the time required to transmit the frame and receive the acknowledgment.

A frame without data is 32 bytes long. Assuming a transmission rate of 11 Mbps, the time to transmit a control frame (such as an RTS frame, a CTS frame, or an ACK frame) is (256 bits)/(11 Mbps) = 23 usec. The time required to transmit the data frame is (8256 bits)/(11 Mbps) = 751 DIFS + RTS + SIFS + CTS + SIFS + FRAME + SIFS + ACK = DIFS + 3SIFS + (3*23 + 751) usec = DIFS + 3SIFS + 820 usec Selected questions from previous midterms 1. In this part of the question, all stations use the IEEE 802.11 MAC protocol, DIFS = 130 µs and aslot = 50 µs. Assume that, while in the DCF mode of operation, station A generates a random value 12 for its BTC (Back-off Time Counter) at time instant t1. The carrier sensing mechanism of station A detects the medium to be busy/free as follows: - Busy for 400 µs from instant t1. - Free for 300 µs after the previous busy period. - Busy for 1000 µs after the previous free period. - Free for long enough for BTC to expire at some time instant t2. Compute the actual time gap between t2 and t1. Only the last period X (free for long enough until BTC=0) is unknown. Δ= t 2 -t 1 = (400+300+1000+X)µs DIFS: Distributed InterFrame Spaces; the medium needs to be idle for this period of time, before station can start transmitting. BTC: once medium is sensed to be idle for DIFS, BTC is decreased by one, then the medium is sensed again after an aslot period. Every time, i.e. after an aslot period, the medium is sensed to be idle, the counter is decremented. Station starts transmitting once medium is idle and BTC=0 t2- t1 = 1700 + DIFS + 9*aSlot = 2280

300µs 400µs DIFS 1000µs DIFS t1 BTC=12 12 11 10 9 9 8 7 6 5 4 3 2 1 0 2. Three important time intervals in the operation of the IEEE 802.11 MAC protocol are DIFS, SIFS, and PIFS. - State the desired relationship among the three intervals, and explain where and why those intervals are used. - Explain the consequence(s) of a faulty protocol implementation where PIFS > DIFS. Relation: SIFS<PIFS<DIFS SIFS (Short Inter Frame Spacing): Is the smallest interval; gives the highest priority to on-going communications. Separates RTS, CTS, DATA, ACK. The ACK or RTS are sent after SIFS and before PIFS. PIFS (Point Inter Frame Spacing): The second priority goes to Access Point. It gives the Access Point (working in PCF mode) a chance to grab the control of the channel. Access Point can either starts transmitting to the desired station or gives the permission to desired stations to communicate. PIFS>SIFS, to detect an on-going transmission. DIFS (Distributed Inter Frame Spacing): Third (lowest) priority. After this interval all the stations, in DCF mode, start competing for the channel. DIFS>SIFS, to detect an on-going transmission. DIFS>PIFS, to give the priority to Access Point (see part 2). If PIFS>DIFS, stations in DCF mode have higher priority than Access Point. The Access Point can only grab the channel when no other station wants to transmit anything. It may take a long time before Access Point is being able to grab the control of the channel.

3. In the IEEE 802.11 standard, explain the function and operation of the Network Allocation Vector (Be sure to use a diagram to help in your explanation). In DCF mode, A sender obtains permission from the intended receiver before transmitting a packet by sending a Request to Send (RTS) packet The receiver granting permission by transmitting a Clear To Send (CTS) packet Stations other than the two communicating hearing either RTS or CTS will lock themselves out of the channel for a period of time this is the Network Allocation Vector NAV this process is also called virtual carrier sense The objective is to provide collision avoidance or reduce the number of collisions (but preventing other stations from transmitting) It is important to note that stations may be within range of only one of the two communicating parties so they respond differently to the RTS and CTS messages.