How To Solve A Network Problem In An Ipa 2.2.1 (Ipa 2) (Ipam) (Networking) (For Acedo) (Ipta) (Powerline) (Network) (Nem



Similar documents
TCP in Wireless Networks

CS6956: Wireless and Mobile Networks Lecture Notes: 2/11/2015. IEEE Wireless Local Area Networks (WLANs)

Attenuation (amplitude of the wave loses strength thereby the signal power) Refraction Reflection Shadowing Scattering Diffraction

Modeling and Simulation of Quality of Service in VoIP Wireless LAN

Mobile Communications Exercise: Satellite Systems and Wireless LANs. Georg von Zengen, IBR, TU Braunschweig,

MAC Algorithms in Wireless Networks

Wireless LAN Services for Hot-Spot

Medium Access Control (MAC) Protocols for Ad hoc Wireless Networks - III

Lecture 17: Wireless Networking"

ECE 333: Introduction to Communication Networks Fall 2002

Philippe Klein. avb-phkl qos-overview

IEEE e WLANs / WMM. S.Rajesh (rajeshsweb@gmail.com) AU-KBC Research Centre, BroVis Wireless Networks, smartbridges Pte Ltd.

Markku Renfors. Partly based on student presentation by: Lukasz Kondrad Tomasz Augustynowicz Jaroslaw Lacki Jakub Jakubiak

Collision of wireless signals. The MAC layer in wireless networks. Wireless MAC protocols classification. Evolutionary perspective of distributed MAC

Fibonacci Backoff Algorithm for Mobile Ad Hoc Networks

How To Make A Multi-User Communication Efficient

MAC Sublayer. Abusayeed Saifullah. CS 5600 Computer Networks. These slides are adapted from Kurose and Ross

A Software Architecture for Simulating IEEE e HCCA

IEEE Broadband Wireless Access Working Group. ATM Based MAC Layer Proposal for the Air Interface Specification

CS 5480/6480: Computer Networks Spring 2012 Homework 4 Solutions Due by 1:25 PM on April 11 th 2012

Express Forwarding : A Distributed QoS MAC Protocol for Wireless Mesh

Adaptive DCF of MAC for VoIP services using IEEE networks

Video Transmission over Wireless LAN. Hang Liu

EETS 8316 Wireless Networks Fall 2013

Enhanced TXOP scheme for efficiency improvement of WLAN IEEE e

Controlled Random Access Methods

A Short Look on Power Saving Mechanisms in the Wireless LAN Standard Draft IEEE

CSE331: Introduction to Networks and Security. Lecture 6 Fall 2006

Prediction of DDoS Attack Scheme

Optimization of VoIP over e EDCA based on synchronized time

Chapter 6: Medium Access Control Layer

Figure 1: cellular system architecture

CSE 123A Computer Networks

Local Area Networks transmission system private speedy and secure kilometres shared transmission medium hardware & software

Performance evaluation of QoS in wireless networks using IEEE e

Wireless Network Measurement: VoIP and e

CSMA/CA. Information Networks p. 1

Selfish MAC Layer Misbehavior in Wireless Networks

How To Understand Wireless Network Quality Of Service (Qos) In E

Lecture 7 Multiple Access Protocols and Wireless

ECE 428 Computer Networks and Security

TABLE OF CONTENTS. Dedication. Table of Contents. Preface. Overview of Wireless Networks. vii xvii

Voice Service Support over Cognitive Radio Networks

Department of Computer Science Columbia University

EKSAMEN / EXAM TTM

CS263: Wireless Communications and Sensor Networks

Virtual PCF: Improving VoIP over WLAN performance with legacy clients

VoIP in Mika Nupponen. S Postgraduate Course in Radio Communications 06/04/2004 1

... neither PCF nor CA used in practice

standard. Acknowledgement: Slides borrowed from Richard Y. Yale

ADV-MAC: Advertisement-based MAC Protocol for Wireless Sensor Networks

EECS 122: Introduction to Computer Networks Multiaccess Protocols. ISO OSI Reference Model for Layers

TCOM 370 NOTES LOCAL AREA NETWORKS AND THE ALOHA PROTOCOL

Chapter 4. Medium Access Control. IN2P3 Octobre 2002 Jean-Pierre Thomesse

How To Determine The Capacity Of An B Network

QoS issues in Voice over IP

Internet Access and QoS in Ad Hoc Networks

An Overview of Wireless LAN Standards IEEE and IEEE e

Random Access Protocols

ECE/CS 372 introduction to computer networks. Lecture 13

Wi-Fi CERTIFIED for WMM - Support for Multimedia Applications with Quality of Service in Wi-Fi Networks Wi-Fi Alliance September 1, 2004

Enhanced Power Saving for IEEE WLAN with Dynamic Slot Allocation

A Slow-sTart Exponential and Linear Algorithm for Energy Saving in Wireless Networks

IEEE E ENHANCEMENT FOR VOICE SERVICE

EXAMPLES AND PROBLEMS. Competence Based Education Internet Protocols

A Multiple Access Protocol for Multimedia Transmission over Wireless Networks

ROUTING IN MIXED WIRED AND WIRELESS NETWORKS

Voice over WLAN (VoWLAN) A wireless voice alternative?

A research perspective on the adaptive protocols' architectures and system infrastructures to support QoS in wireless communication systems

Wireless Networks. Reading: Sec5on 2.8. COS 461: Computer Networks Spring Mike Freedman

A TCP-like Adaptive Contention Window Scheme for WLAN

Admission Control for VoIP Traffic in IEEE Networks

MEDIUM ACCESS CONTROL PROTOCOLS FOR AD-HOC WIRELESS NETWORKS: A SURVEY

QOS PROTECTION FOR IEEE E IN WLAN WITH SHARED EDCA AND DCF ACCESS

Medium Access Control (MAC) and Wireless LANs

Denial of Service Attacks at the MAC Layer in Wireless Ad Hoc Networks

Adaptive MAC Protocol for Emergency Data Transmission in Wireless Body Sensor Networks

EPL 657 Wireless Networks

Frame Burst Adjusting for Transmitting Video Conference in Gigabit Ethernet

Wiereless LAN

Efficient MAC Protocol for Heterogeneous Cellular Networks (HC-MAC)

Arbitration. White Paper. September 2009 Version Author: Marcus Burton, CWNE #78 CWNP, Inc.

Enhancing WLAN MAC Protocol performance using Differentiated VOIP and Data Services Strategy

FORTH-ICS / TR-375 March Experimental Evaluation of QoS Features in WiFi Multimedia (WMM)

Secure SCTP against DoS Attacks in Wireless Internet

Performance Comparison of Dual Queue and EDCA for VoIP over IEEE WLAN

White paper. Cisco Compatible Extensions: Client Benefits on a Cisco WLAN

ECE 358: Computer Networks. Homework #3. Chapter 5 and 6 Review Questions 1

Performance Evaluation of Priority based Contention- MAC in Mobile Ad-Hoc Networks

PROVIDING STATISTICAL QOS GUARANTEE FOR VOICE OVER IP IN THE IEEE WIRELESS LANS

ISSN: ISO 9001:2008 Certified International Journal of Engineering Science and Innovative Technology (IJESIT) Volume 2, Issue 5, September

II. IEEE802.11e EDCA OVERVIEW

A Survey of QoS Enhancements for IEEE Wireless LAN

NOVEL PRIORITISED EGPRS MEDIUM ACCESS REGIME FOR REDUCED FILE TRANSFER DELAY DURING CONGESTED PERIODS

Wireless LAN Concepts

Transcription:

Lund University ETSN01 Advanced Telecommunication Tutorial 7 : Link layer part I Author: Antonio Franco Course Teacher: Emma Fitzgerald February 12, 2015

Contents I Before you start 3 II Exercises 3 1 Link layer 3 1.1..................................... 3 1.2..................................... 3 1.3..................................... 3 III Solutions 4 2 Link layer 4 2.1..................................... 4 2.2..................................... 4 2.3..................................... 5

Part I Before you start This tutorial is given to prepare you to the exam. Since time is limited, it is highly advised that you first try to solve the exercises (Part II) at home, then have a look at the solutions (Part III), and, finally, ask questions during the exercises sessions. Part II Exercises 1 Link layer 1.1 The IEEE 802.11 standard has listed the following three functions since the first incarnation: 1. Point Coordination Function 2. Enhanced Distributed Coordination Function 3. HCF Controlled Channel Access Explain which problem each function addresses, how the function operates and compare/contrast the approaches. 1.2 Describe what is meant by the following two terms and draw an illustrative example of each: 1. The hidden node problem 2. The exposed node problem A mechanism called MACA has been designed to alleviate the problems associated with hidden nodes, how does this operate and how does this address the problem? 1.3 (a) Explain the steps of the Reservation ALOHA algorithm and draw a diagram of its operation. (b) What are the advantages and disadvantages of using this algorithm over slotted ALOHA? 3

(c) Consider a Reservation ALOHA system with N nodes. Assume a Poissonian packet generation process for each node with parameter λ. The round length is T s seconds that is, every T s seconds contains a reservation phase and a data transmission phase. Each data transmission phase contains k timeslots. What is the probability that a given node will have at least one packet to send in the second round? You can assume that all nodes begin the first round with no packets queued to send. (d) What is the expected number of nodes with at least one packet to send in the second round? (e) Each node that wishes to transmit selects a slot to reserve at random (with a uniform distribution), and each node may only send one packet per round, even if it has more packets queued to send. For N = 3, what is the probability of a collision in the reservation phase of the second round? Part III Solutions 2 Link layer 2.1 2.2 1. The PCF is a centralised polling mechanism controlled by the AP whereby the AP hands out a transmission opportunity according to a polling list. This enables resource assignment but no traffic separation. 2. The EDCF is a distributed probabilistic function in which the STAs alter some parameters to achieve different probabilities in successfully accessing the channel at contention. The parameters are CWMIN/CWMAX, AIFSN and TXOPLimit. Traffic is divided into 4 access categories and given different treatment (priority) based on their classification. 3. HCCA is akin to PCF contention free but extended to provide traffic separation whereby the AP hands out a TxOP with different sizes to different flows using Traffic specifications. The scheme still suffers from the overheads associated with the PCF. Example illustrations of the hidden end exposed node problems are given in the lecture slides. MACA introduces the RTS and CTS frames for notifying all nodes within transmission range of the sender and receiver of the intent to transmit. If a node overhears either message it should refrain from transmitting for a set 4

period. Examples were given in the slides of situations where the RTS/CTS frames produced overhead but little or no benefit (both internal and external HN scenarios were given). The problems named were the probability of lost RTS/CTS frames due to collisions and the symmetry properties of traffic. 2.3 (a) In Reservation ALOHA, there are two phases: a reservation phase, followed by a transmission phase. In the reservation phase, stations reserve slots for the transmission phase using ALOHA. If the transmission phase has k slots, then the reservation phase is divided into k mini-slots (of much shorter duration than the transmission slots), so that a transmission in mini-slot i reserves transmission slot i. These two phases are then repeated. See the MAC slides, pp12-13, for a diagram. (b) Advantage: efficiency can be significantly increased (up to 80% from only 36% for slotted ALOHA), as no collisions are possible in the transmission phase. Disadvantage: delay increases due to waiting for the reserved timeslot, especially if a collision occurs during the reservation, and synchronisation is required between all stations to keep the reservation list consistent. (c) P(at least one packet to send) = 1 - P(no packets to send). (d) N (1 e λts ) (e) 1 P = 1 e λts (λt s ) 0 0! = 1 e λts [ (1 e λt s ) 3 k 1 k 2 k k + 3 ( 1 e λts) 2 e λt s k 1 k + 3 ( 1 e λts) ( e λts) 2 + ( ] e λts) 3 that is, the opposite event of the sum of the probability of all three transmitting and choosing different slots, plus the probability of two of them transmitting and choosing different slots, plus the probability of only one of them tranmsitting plus the probability of no one transmitting. 5