Real Time Ethernet Semester Winter 2001

Slides:



Advertisements
Similar presentations
Data and Computer Communications Eighth Edition by William Stallings Lecture slides by Lawrie Brown Chapter 16 – High Speed LANs.
Advertisements

Ethernet “dominant” LAN technology: cheap $20 for 100Mbs!
ECE358: Computer Networks Fall 2014
Channel Allocation Protocols. Dynamic Channel Allocation Parameters Station Model. –N independent stations, each acting as a Poisson Process for the purpose.
The ALOHA Protocol “Free for all”: whenever station has a frame to send, it does so. –Station listens for maximum RTT for an ACK. –If no ACK after a specified.
EECC694 - Shaaban #1 lec #5 Spring Data Link In Broadcast Networks: The Media Access Sublayer Broadcast networks with multi-access (or random.
Multiple Access Methods. When nodes or stations are connected and use a common link (cable or air), called a multipoint or broadcast link, we need a.
Simulation 1: Calculate the total bandwidth required for a VoIP call
Communication Networks Lecture 5 NETW 501-L5: NETW 501-L5: Medium Access Control Dr.-Ing. Khaled Shawky Hassan Room: C3-222, ext: 1204,
1 K. Salah Module 4.2: Media Access Control The Media Access Control (MAC) sublayer –Random Access (CSMA), IEEE –Token Passing, IEEE Ch 13-
Simulation of VoIP traffic in n networks Aya Mire Niv Tokman Oren Gur-Arie.
1 Version 3.0 Module 6 Ethernet Fundamentals. 2 Version 3.0 Why is Ethernet so Successful? In 1973, it could carry data at 3 Mbps Now, it can carry data.
EEC-484/584 Computer Networks Lecture 7 Wenbing Zhao
MAC Protocols Media Access Control (who gets the use the channel) zContention-based yALOHA and Slotted ALOHA. yCSMA. yCSMA/CD. TDM and FDM are inefficient.
802.11n MAC layer simulation Submitted by: Niv Tokman Aya Mire Oren Gur-Arie.
CMPE 150- Introduction to Computer Networks 1 CMPE 150 Fall 2005 Lecture 17 Introduction to Computer Networks.
CSC 450/550 Part 3: The Medium Access Control Sublayer.
EEC-484/584 Computer Networks Lecture 7 Wenbing Zhao
CMPE 150- Introduction to Computer Networks 1 CMPE 150 Fall 2005 Lecture 16 Introduction to Computer Networks.
EEC-484/584 Computer Networks Lecture 13 Wenbing Zhao
EEC-484/584 Computer Networks Lecture 9 Wenbing Zhao (Part of the slides are based on materials supplied by Dr. Louise Moser at UCSB and.
ECE358: Computer Networks Spring 2012
CS 5253 Workshop 1 MAC Protocol and Traffic Model.
Link-layer EE122 Discussion 10/14/2011. MAC Addresses Link-layer deals with MAC addresses – 48-bit addresses, flat name space – E.g., 88-9F-FA-F
Semester EEE449 Computer Networks The Data Link Layer Part 2: Media Access Control En. Mohd Nazri Mahmud MPhil (Cambridge, UK) BEng (Essex,
Enhanced CSMA Additional improvement  Use CSMA access  Listen while transmitting  Stop immediately if collision sensed  Called collision detection.
ICOM 6115©Manuel Rodriguez-Martinez ICOM 6115 – Computer Networks and the WWW Manuel Rodriguez-Martinez, Ph.D. Lecture 17.
1 ECE453 – Introduction to Computer Networks Lecture 7 – Multiple Access Control (I)
Chi-Cheng Lin, Winona State University CS412 Introduction to Computer Networking & Telecommunication Medium Access Control Sublayer.
CHAPTER 4: THE MEDIUM ACCESS SUBLAYER 4.1: The Channel Allocation Problem 4.2: Multiple Access Protocols.
LECTURE9 NET301. DYNAMIC MAC PROTOCOL: CONTENTION PROTOCOL Carrier Sense Multiple Access (CSMA): A protocol in which a node verifies the absence of other.
جلسه دهم شبکه های کامپیوتری به نــــــــــــام خدا.
Exercises. Problem 1 The link delay is 270ms. Each data frame is 1000 bits. Data rate is 1Mbps. What is the link efficiency of the Stop&Wait protocol?
02 – Performance Basics 1CS Computer Networks.
November 4, 2003APOC 2003 Wuhan, China 1/14 Demand Based Bandwidth Assignment MAC Protocol for Wireless LANs Presented by Ruibiao Qiu Department of Computer.
Chi-Cheng Lin, Winona State University CS 313 Introduction to Computer Networking & Telecommunication Medium Access Control Sublayer.
Multiple Access.
Data Communications, Kwangwoon University12-1 Chapter 12. Multiple Access 1.Random Access 2.Controlled Access 3.Channelization.
Medium Access Control Protocols, Local Area Networks, and Wireless Local Area Networks Lecture Note 9.
Technion –Israel Institute of Technology Computer Networks Laboratory & Digital laboratory Real Time Ethernet Semester Winter 2001 Students: Shay Auster.
Ch 12. Multiple Access. Multiple Access for Shared Link Dedicated link – Point-to-point connection is sufficient Shared link – Link is not dedicated –
What is the Speed of the Internet? Internet Computing KUT Youn-Hee Han.
A Multi-Channel Cooperative MIMO MAC Protocol for Wireless Sensor Networks(MCCMIMO) MASS 2010.
VoIP over b (Part 2). Bandwidth Usage  How do we determine the the maximum amount of bandwidth for one call?  Account for constant signals (Beacons)
LECTURE9 NET301 11/5/2015Lect 9 NET DYNAMIC MAC PROTOCOL: CONTENTION PROTOCOL Carrier Sense Multiple Access (CSMA): A protocol in which a node verifies.
Carrier Sense Multiple Access Improve ALOHA by using carrier sense –Stations listen to the carrier before transmitting –If channel is busy, the station.
CSMA/CD Simulation Carrier Sense Multiple Access (CSMA), although more efficient than ALOHA or slotted ALOHA, still has one glaring inefficiency: When.
COMMUNICATION NETWORKS NETW 501 TUTORIAL 9 Presented by: Eng. Hana Hesham Eng. Mohamed Atef.
Tel Hai Academic College Department of Computer Science Prof. Reuven Aviv Markov Models for Access Control in Computer Networks Resource: Fayez Gebali,
Medium Access Control Protocols, Local Area Networks, and Wireless Local Area Networks Lecture Note 10.
Exercises on Data Link Layer.
AN EFFICIENT TDMA SCHEME WITH DYNAMIC SLOT ASSIGNMENT IN CLUSTERED WIRELESS SENSOR NETWORKS Shafiq U. Hashmi, Jahangir H. Sarker, Hussein T. Mouftah and.
Network Communications Chapter 8 Ethernet and IEEE Networking Technology.
COMPUTER NETWORKS Data-link Layer (The Medium Access Control Sublayer) MAC Sublayer.
CS 5253 Workshop 1 MAC Protocol and Traffic Model.
Week3 The Medium Access Sublayer
Multiple Access Methods
CSMA/CD Carrier sense multiple access with collision detection (CSMA/CD) is a media access control method used most notably in early Ethernet technology.
Lab 7 – CSMA/CD (Data Link Layer Layer)
Multiple Access Mahesh Jangid Assistant Professor JVW University.
Net301 lecture9 11/5/2015 Lect 9 NET301.
Services of DLL Framing Link access Reliable delivery
Multiple Access Methods
Network Media, models and number systems
The Medium Access Control Sublayer
Opnet Simulator Project
Channel Allocation Problem/Multiple Access Protocols Group 3
Channel Allocation Problem/Multiple Access Protocols Group 3
Multiple Access Methods
CARRIER SENSE MULTIPLE ACCESS (CSMA)
Presentation transcript:

Real Time Ethernet Semester Winter 2001 Technion –Israel Institute of Technology Computer Networks Laboratory & Digital laboratory Real Time Ethernet Semester Winter 2001        Students: Shay Auster & Hagit Chen       Supervisor: Vitali Suchin

Basic Ethernet Simulation Analytic Analysis Basic Ethernet Simulation Results Real-Time Ethernet Simulation Real-Time Ethernet Simulation Results What Next ?

Purposes of Simulation Compare and evaluate new system (protocol) Actual experimentation with the system is infeasible or cost ineffective

Simulation Model time slots of 2. In each new iteration we randomly choose for each station if it transmits or not : More then one transmits – Collision. No station transmits – Net is quiet.  Simulation time is forwarded in 2. Only one station transmits – Succesful transmission.  Simulation time is forwarded in package transmission time.

The Station FSM LISTEN WAIT SEND WaitTime Over PacketsToSend Collision NetQuiet Collision PacketsToSend

The Line FSM netQuiet netCollide netBusy EndOfCollision Transmit MoreThanOne EndOfTransmit No Transmittions

Efficiency Analysis slot time = 2, hence the mean contention interval  is 2/A packet trans time = P sec Channel Efficiency = P P + 2/A F = frame length ; B = network bandwidth ; L = cabel length c = speed of signal propagation P = F/B Channel Efficiency = 1 1 + 2BLe/cF

Efficiency Analysis (Cont.) p = 1 k k = num of stations The probability that some stations acquire the channel: A = kp(1-p) k-1 if kinf.  A 1/e The probability that the contection interval has exactly j slots: A(1-A) j-1 jA(1-A) j-1 = 1 A j=0 inf.  The mean num of slot per contention:

Check for RealTime Transmition RTE Simulation START Back to START Regular Ethernet Transmition no Regular Ethernet Check for RealTime Transmition Rte Transmittion Or Collision No Rte Transmittion Or Collision

The RTE Station FSM LISTEN WAIT SEND WaitTime Over Collision or PacketsToSend SEND NetQuiet WaitTime – After a collision TimeOut – After succesful transmition

The RTE Simulation Line FSM EndOfTransmit netCollide netQuiet netBusy RTE EndOfCollision MoreThanOne Transmit RTE Transmit No Transmittions

Analytic Analysis Assumptions All RTE Stations are used for the same application RTE max packet size is 1500 Bytes TimeOut of RTE station varies according to the application

Analytic Analysis TimeOut Calculation Acctual TimeOut TimeOut(sec) = Max Packet Size Sample Rate = Bytes Bytes/Sec bits bits/Sec Acctual TimeOut 1500 Bytes * 8 = 12,000 bits 1500 Bytes Transmition Time = 12,000 bits 100 Mbits/sec = 120 Sec TimeOut = Sample Rate 120 Sec -

BandWidth Calculation Analytic Analysis BandWidth Calculation RTE transmit time transmittime Ethernet transmit time TimeOut for RTE station

BandWidth Calculation (Cont.) Analytic Analysis BandWidth Calculation (Cont.) B.W. (%)= TimeOut – [Num of RTE Stations * RTE packet Transmition Time] TimeOut B.W. (%)= [ 1500 Bytes Sample Rate 120 Sec - ] - [Num of RTE Stations * 120 Sec]

BandWidth Calculation Example Analytic Analysis BandWidth Calculation Example Sample Time = 1mSec  Sample Rate = 1000 bit/sec [ ] B.W. (%)= 1500 Bytes 12 Mbit/sec 120 Sec - [ 12 Mbits/sec ] - [1 * 120 Sec] = 86.36%

Project Status 3.1.2001 – Mid-Term Presentation: Ethernet Simulation – done Analytic Analysis for basic Ethernet – done RTE Simulation – done for one RTE station Basic Analytic Analysis for RTE - done

Next on RTE Project: Finish debug RTE simulation Expand RTE Analytic Analysis Check RTE protocol performance, using RTE simulation