Medium Access Control
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Reservation - Time Division Multiple Access Protocols for Wireless Personal Communications
tv '2s.\--qq T! Reservation - Time Division Multiple Access Protocols for Wireless Personal Communications Theodore V. Buot B.S.Eng (Electro&Comm), M.Eng (Telecomm) Thesis submitted for the degree of Doctor of Philosophy 1n The University of Adelaide Faculty of Engineering Department of Electrical and Electronic Engineering August 1997 Contents Abstract IY Declaration Y Acknowledgments YI List of Publications Yrt List of Abbreviations Ylu Symbols and Notations xi Preface xtv L.Introduction 1 Background, Problems and Trends in Personal Communications and description of this work 2. Literature Review t2 2.1 ALOHA and Random Access Protocols I4 2.1.1 Improvements of the ALOHA Protocol 15 2.1.2 Other RMA Algorithms t6 2.1.3 Random Access Protocols with Channel Sensing 16 2.1.4 Spread Spectrum Multiple Access I7 2.2Fixed Assignment and DAMA Protocols 18 2.3 Protocols for Future Wireless Communications I9 2.3.1 Packet Voice Communications t9 2.3.2Reservation based Protocols for Packet Switching 20 2.3.3 Voice and Data Integration in TDMA Systems 23 3. Teletraffic Source Models for R-TDMA 25 3.1 Arrival Process 26 3.2 Message Length Distribution 29 3.3 Smoothing Effect of Buffered Users 30 3.4 Speech Packet Generation 32 3.4.1 Model for Fast SAD with Hangover 35 3.4.2Bffect of Hangover to the Speech Quality 38 3.5 Video Traffic Models 40 3.5.1 Infinite State Markovian Video Source Model 41 3.5.2 AutoRegressive Video Source Model 43 3.5.3 VBR Source with Channel Load Feedback 43 3.6 Summary 46 4. -
Medium Access Control Protocols of the PRMA Type in Non-Geostationary Satellites
Medium Access Control Protocols of the PRMA Type in non-Geostationary Satellites Giovanni Giambene [email protected] Dipartimento di Ingegneria dell’Informazione Università degli Studi di Siena Via Roma, 53 53100 Siena, Italy Abstract The challenge of future mobile multimedia networks is to provide worldwide tetherless communication services. Low Earth Orbit-Mobile Satellite Systems (LEO-MSSs) will play a significant role by filling the coverage gaps of future generation terrestrial cellular networks. This lecture presents research results on demand-assignment Medium Access Control (MAC) schemes able to share efficiently LEO satellite resources among users and to support isochronous traffics and the ubiquitous access to the Internet. 1 Introduction Future generation mobile communication systems will achieve a global coverage by integrating a terrestrial cellular component and a satellite one [1],[2]. The satellite system will play a complementary role with respect to its terrestrial counterpart; typical operational environments for satellite systems are regions where the provision of the terrestrial coverage is either technically or economically unfeasible. The role of mobile satellite systems is: (i) to allow the global roaming of users; (ii) to provide Quality of Service (QoS) levels comparable with those of terrestrial systems; (iii) to permit the rapid deployment of mobile services in underdeveloped regions. The satellite component of future mobile communication systems will be based (partly or totally) on non-geostationary constellations. In particular, this study focuses on Low Earth Orbit – Mobile Satellite Systems (LEO-MSSs), since they are close to the earth and allow the use of low-power lightweight mobile terminals [3]. In what follows, an earth-fixed cell system [4] will be assumed where antenna beams are steered so as to point towards a given cell on the earth during the satellite visibility time. -
Medium Access Control Layer
Telematics Chapter 5: Medium Access Control Sublayer User Server watching with video Beispielbildvideo clip clips Application Layer Application Layer Presentation Layer Presentation Layer Session Layer Session Layer Transport Layer Transport Layer Network Layer Network Layer Network Layer Univ.-Prof. Dr.-Ing. Jochen H. Schiller Data Link Layer Data Link Layer Data Link Layer Computer Systems and Telematics (CST) Physical Layer Physical Layer Physical Layer Institute of Computer Science Freie Universität Berlin http://cst.mi.fu-berlin.de Contents ● Design Issues ● Metropolitan Area Networks ● Network Topologies (MAN) ● The Channel Allocation Problem ● Wide Area Networks (WAN) ● Multiple Access Protocols ● Frame Relay (historical) ● Ethernet ● ATM ● IEEE 802.2 – Logical Link Control ● SDH ● Token Bus (historical) ● Network Infrastructure ● Token Ring (historical) ● Virtual LANs ● Fiber Distributed Data Interface ● Structured Cabling Univ.-Prof. Dr.-Ing. Jochen H. Schiller ▪ cst.mi.fu-berlin.de ▪ Telematics ▪ Chapter 5: Medium Access Control Sublayer 5.2 Design Issues Univ.-Prof. Dr.-Ing. Jochen H. Schiller ▪ cst.mi.fu-berlin.de ▪ Telematics ▪ Chapter 5: Medium Access Control Sublayer 5.3 Design Issues ● Two kinds of connections in networks ● Point-to-point connections OSI Reference Model ● Broadcast (Multi-access channel, Application Layer Random access channel) Presentation Layer ● In a network with broadcast Session Layer connections ● Who gets the channel? Transport Layer Network Layer ● Protocols used to determine who gets next access to the channel Data Link Layer ● Medium Access Control (MAC) sublayer Physical Layer Univ.-Prof. Dr.-Ing. Jochen H. Schiller ▪ cst.mi.fu-berlin.de ▪ Telematics ▪ Chapter 5: Medium Access Control Sublayer 5.4 Network Types for the Local Range ● LLC layer: uniform interface and same frame format to upper layers ● MAC layer: defines medium access .. -
Performance Evaluation of Framed Slotted ALOHA with Reservation Packets and Succesive Interference Cancelation for M2M Networks $
Performance Evaluation of Framed Slotted ALOHA with Reservation Packets and Succesive Interference Cancelation for M2M Networks I Vicente Casares-Giner, Jorge Martinez-Bauset, Canek Portillo Instituto ITACA, Universitat Polit`ecnica de Val`encia,Spain Abstract Random access protocols like ALOHA have been considered for machine-to-machine (M2M) communication in future networks for their simplicity of operation. This paper evaluates the performance of a Frame Slotted-ALOHA protocol that uses reservation and data packets (FSA-RDP), in a scenario where a controller collects data packets transmitted by a finite number of M2M devices. In FSA-RDP, frames of variable duration are divided in two parts, the reservation and data subframes. During the reservation subframe, active devices send short reservation packets to the controller. The controller assigns reserved slots in the data subframe to those devices that succeeded with the reservation. At devices, the FIFO service discipline and two queue management schemes, tail drop and push-out, have been considered. When the queue size is of one packet, we develop a discrete-time Markov chain to evaluate the protocol performance, including the cumulative distribution function of the delay of data packets that are successfully transmitted. Analytical results are validated by extensive simulations. The simulation model is also used to evaluate the system performance when larger queues are used. In addition, we study the impact that implementing Successive Interference Cancellation (SIC) at the controller has on the system performance. We also evaluate the performance of implementing SIC at the controller together with Irregular Repetition Slotted ALOHA (IRSA) to send the reservation packets. -
Ts 138 321 V15.3.0 (2018-09)
ETSI TS 138 321 V15.3.0 (2018-09) TECHNICAL SPECIFICATION 5G; NR; Medium Access Control (MAC) protocol specification (3GPP TS 38.321 version 15.3.0 Release 15) 3GPP TS 38.321 version 15.3.0 Release 15 1 ETSI TS 138 321 V15.3.0 (2018-09) Reference RTS/TSGR-0238321vf30 Keywords 5G ETSI 650 Route des Lucioles F-06921 Sophia Antipolis Cedex - FRANCE Tel.: +33 4 92 94 42 00 Fax: +33 4 93 65 47 16 Siret N° 348 623 562 00017 - NAF 742 C Association à but non lucratif enregistrée à la Sous-Préfecture de Grasse (06) N° 7803/88 Important notice The present document can be downloaded from: http://www.etsi.org/standards-search The present document may be made available in electronic versions and/or in print. The content of any electronic and/or print versions of the present document shall not be modified without the prior written authorization of ETSI. In case of any existing or perceived difference in contents between such versions and/or in print, the only prevailing document is the print of the Portable Document Format (PDF) version kept on a specific network drive within ETSI Secretariat. Users of the present document should be aware that the document may be subject to revision or change of status. Information on the current status of this and other ETSI documents is available at https://portal.etsi.org/TB/ETSIDeliverableStatus.aspx If you find errors in the present document, please send your comment to one of the following services: https://portal.etsi.org/People/CommiteeSupportStaff.aspx Copyright Notification No part may be reproduced or utilized in any form or by any means, electronic or mechanical, including photocopying and microfilm except as authorized by written permission of ETSI. -
Goodbye, ALOHA! A
View metadata, citation and similar papers at core.ac.uk brought to you by CORE provided by UPCommons. Portal del coneixement obert de la UPC 1 Goodbye, ALOHA! A. Laya∗, C. Kalalasz, F. Vazquez-Gallegoz, L. Alonsoy and J. Alonso-Zaratez ∗KTH Royal Institute of Technology, Sweden. e-mail: [email protected] yUniversitat Politecnica` de Catalunya (UPC), Spain. e-mail: [email protected] zCentre Tecnologic` de Telecomunicacions de Catalunya (CTTC), Spain. e-mail: fckalalas, francisco.vazquez, [email protected] Abstract The vision of the Internet of Things (IoT) to interconnect and Internet-connect everyday objects and machines poses new challenges in the design of wireless communication networks. The design of Medium Access Control (MAC) protocols has been traditionally an intense area of research due to their high impact on the overall performance of wireless communications. The majority of research activities in this field deal with different variations of protocols somehow based on ALOHA, either with or without listen before talk, i.e., Carrier Sensing Multiple Access (CSMA). These protocols operate well under low traffic loads and low number of simultaneous devices. However, they suffer from congestion as the traffic load and the number of devices increase. For this reason, unless revisited, the MAC layer can become a bottleneck for the success of the IoT. In this paper, we provide an overview of the existing MAC solutions for the IoT, describing current limitations and envisioned challenges for the near future. Motivated by those, we identify a family of simple algorithms based on Distributed Queueing (DQ) which can operate for an infinite number of devices generating any traffic load and pattern. -
Chapter 6: Medium Access Control Layer
Chapter 6: Medium Access Control Layer Chapter 6: Roadmap " Overview! " Wireless MAC protocols! " Carrier Sense Multiple Access! " Multiple Access with Collision Avoidance (MACA) and MACAW! " MACA By Invitation! " IEEE 802.11! " IEEE 802.15.4 and ZigBee! " Characteristics of MAC Protocols in Sensor Networks! " Energy Efficiency! " Scalability! " Adaptability! " Low Latency and Predictability! " Reliability! " Contention-Free MAC Protocols! " Contention-Based MAC Protocols! " Hybrid MAC Protocols! Fundamentals of Wireless Sensor Networks: Theory and Practice Waltenegus Dargie and Christian Poellabauer © 2010 John Wiley & Sons Ltd. 2! Medium Access Control " In most networks, multiple nodes share a communication medium for transmitting their data packets! " The medium access control (MAC) protocol is primarily responsible for regulating access to the shared medium! " The choice of MAC protocol has a direct bearing on the reliability and efficiency of network transmissions! " due to errors and interferences in wireless communications and to other challenges! " Energy efficiency also affects the design of the MAC protocol! " trade energy efficiency for increased latency or a reduction in throughput or fairness! Fundamentals of Wireless Sensor Networks: Theory and Practice Waltenegus Dargie and Christian Poellabauer © 2010 John Wiley & Sons Ltd. 3! 1! Overview " Responsibilities of MAC layer include:! " decide when a node accesses a shared medium! " resolve any potential conflicts between competing nodes! " correct communication errors occurring at the physical layer! " perform other activities such as framing, addressing, and flow control! " Second layer of the OSI reference model (data link layer) or the IEEE 802 reference model (which divides data link layer into logical link control and medium access control layer)! Fundamentals of Wireless Sensor Networks: Theory and Practice Waltenegus Dargie and Christian Poellabauer © 2010 John Wiley & Sons Ltd. -
Medium Access Control Sublayer
Telematics Chapter 5: Medium Access Control Sublayer User Server watching with video Beispielbildvideo clip clips Application Layer Application Layer Presentation Layer Presentation Layer Session Layer Session Layer Transport Layer Transport Layer Network Layer Network Layer Network Layer Prof. Dr. Mesut Güneş Data Link Layer Data Link Layer Data Link Layer Computer Systems and Telematics (CST) Physical Layer Physical Layer Physical Layer Distributed, embedded Systems Institute of Computer Science Freie Universität Berlin http://cst.mi.fu-berlin.de Contents ● Design Issues ● Metropolitan Area Networks ● Network Topologies (()MAN) ● The Channel Allocation Problem ● Wide Area Networks (WAN) ● Multiple Access Protocols ● Frame Relay ● Ethernet ● ATM ● IEEE 802.2 – Logical Link Control ● SDH ● Token Bus ● Network Infrastructure ● Token Ring ● Virtual LANs ● Fiber Distributed Data Interface ● Structured Cabling Prof. Dr. Mesut Güneş ▪ cst.mi.fu-berlin.de ▪ Telematics ▪ Chapter 5: Medium Access Control Sublayer 5.2 Design Issues Prof. Dr. Mesut Güneş ▪ cst.mi.fu-berlin.de ▪ Telematics ▪ Chapter 5: Medium Access Control Sublayer 5.3 Design Issues ● Two kinds of connections in networks ● Point-to-point connections OSI Reference Model ● Broadcast (Multi-access channel, Application Layer Random access channel) Presentation Layer ● In a network with broadcast Session Layer connections ● Who gets the channel? Transport Layer Network Layer ● PtProtoco ls use dtdtd to determ ine w ho gets next access to the channel Data Link Layer ● Medium Access Control (()MAC) sublay er Phy sical Laye r Prof. Dr. Mesut Güneş ▪ cst.mi.fu-berlin.de ▪ Telematics ▪ Chapter 5: Medium Access Control Sublayer 5.4 Network Types for the Local Rang e ● LLC layer: uniform interface and same frame format to upper layers ● MAC layer: defines medium access - LLC IEEE 802.2 Logical Link Control .. -
515 a Access Control List , 184–187, 200, 289, 294, 404 Control Matrix
Index A B Access Bandwidth , 8, 10, 11, 13, 27, 40, 85, 133, 278, control list , 184–187, 200, 289, 294, 404 281, 327, 388, 392, 393, 398, 403, 415, control matrix , 185–186 457, 467, 474 mandatory , 189, 190, 197, 352 Base-T , 37 role-based , 185–188, 477 Base-X , 37 rule-based , 185, 188–189 Bastion , 248, 251, 262–264, 268 Activism , 115, 491, 497 Biometrics , 43, 53, 192–193, 204, 208, Advocacy , 339, 497 209, 305 Alert noti fi er , 279–280 Blue box , 112, 113 Amplitude , 8, 391 Bluetooth , 40, 400–402, 408, 419, 432, 433, Annualized loss , 159–160 438, 440–442 Anomaly , 272, 275–277, 279, 291 Bridge , 3, 13, 24, 25, 28–31, 33, 35, 141, 248, ARPANET , 68, 113 259, 293, 396 Asynchronous token , 211 Buffer over fl ow , 63, 67, 78, 110 Asynchronous transfer mode (ATM) , 23, 25, 38–40, 379, 395 Auditing , 56, 145–147, 165–167, 183, 204, C 261, 290, 352, 384 Carrier sense multiple access (CSMA) , Authentication 36, 401 anonymous , 209, 217, 220 CASPR. See Commonly Accepted Security DES , 216 Practices and Regulations (CASPR) dial-in , 215–217 CERT. See Computer Emergency Response header , 374, 375 Team (CERT) Kerberos , 214–215, 366–369 Certi fi cate authority , 213, 234, 236, 237, 239, null , 216, 405 241, 364, 366, 506, 509 policy , 218–219 Certi fi cation protocols , 214, 216, 218, 317, 366, process , 152, 164–165 382–384, 425 security , 145, 146, 164–165 remote , 209, 215–218, 383–384 Chain of custody , 302, 306, 313 Unix , 216 Challenge-response , 204, 210–212, 216, 363 Authenticator , 203, 204, 206, 207, 209, Cipher 211, 215, 216 feedback , 225 Authority registration , 240, 241 specs , 370, 371 Authorization Cladding , 12 coarse grain , 200 Coaxial cable , 11, 150, 394 fi ne grain , 200 Code Red , 68, 78, 98, 114, 329, 331, 332 granularity , 198, 199 Common criteria (CC) , 349–350 Availability , 6, 10, 85, 93, 95, 98, 109, 121, 122, Commonly Accepted Security Practices 164, 165, 201, 292, 298, 353, 392, 393, and Regulations (CASPR) , 56 422, 424, 448, 460, 467, 474–486, 504 Communicating element , 236, 237 J.M. -
Chapter 11 in Stallings 10Th Edition
Local Area Network Overview Chapter 11 in Stallings 10th Edition CS420/520 Axel Krings Page 1 Sequence 11 LAN Applications (1) • Personal computer LANs —Low cost —Limited data rate • Back end networks —Interconnecting large systems (mainframes and large storage devices) • High data rate • High speed interface • Distributed access • Limited distance • Limited number of devices CS420/520 Axel Krings Page 2 Sequence 11 1 LAN Applications (2) • Storage Area Networks — Separate network handling storage needs — Detaches storage tasks from specific servers — Shared storage facility across high-speed network — Hard disks, tape libraries, CD arrays — Improved client-server storage access — Direct storage to storage communication for backup • High speed office networks — Desktop image processing — High capacity local storage • Backbone LANs — Interconnect low speed local LANs — Reliability — Capacity — Cost CS420/520 Axel Krings Page 3 Sequence 11 Storage Area Networks CS420/520 Axel Krings Page 4 Sequence 11 2 LAN Architecture • Topologies • Transmission medium • Layout • Medium access control CS420/520 Axel Krings Page 5 Sequence 11 Bus • Multipoint medium • Transmission propagates throughout medium • Heard by all stations — Need to identify target station • Each station has unique address • Full duplex connection between station and tap — Allows for transmission and reception • Need to regulate transmission — To avoid collisions — To avoid hogging • Data in small blocks - frames • Terminator absorbs frames at end of medium CS420/520 Axel Krings -
Reservation Frame Slotted Aloha for Multi-Class Iot Networks
RESERVATION FRAME SLOTTED ALOHA FOR MULTI-CLASS IOT NETWORKS a thesis submitted to the graduate school of engineering and science of bilkent university in partial fulfillment of the requirements for the degree of master of science in electrical and electronics engineering By Mahzeb Fiaz January 2019 Reservation Frame Slotted ALOHA for Multi-Class IoT Networks By Mahzeb Fiaz January 2019 We certify that we have read this thesis and that in our opinion it is fully adequate, in scope and in quality, as a thesis for the degree of Master of Science. Nail Akar(Advisor) Ezhan Kara¸san Mehmet Akif Yazici Approved for the Graduate School of Engineering and Science: Ezhan Kara¸san Director of the Graduate School ii ABSTRACT RESERVATION FRAME SLOTTED ALOHA FOR MULTI-CLASS IOT NETWORKS Mahzeb Fiaz M.S. in Electrical and Electronics Engineering Advisor: Nail Akar January 2019 The Internet of Things (IoT) is a promising technology capable of revolutionizing our work and daily lives. ALOHA based medium access schemes are widely used in IoT applications due to their low complexity despite lower throughput figures. In this study, we aim to improve the performance of Frame Slotted Aloha (FSA) for a single hop IoT network without increasing the overall complexity. Duty cy- cling is a key concept for managing energy consumption of wireless networks with battery powered nodes having maximum duty cycle constraints. The goal of this study is to improve the performance of frame slotted Aloha by exploiting duty cycle patterns in these networks and using reservations in advance. We discuss the system model for a single class IoT network and study via simulations the performance of Reservation Frame Slotted Aloha (RFSA) as compared to FSA, as well as the performance implications of different system parameters related to traffic patterns. -
On Information Technology Issues in the Nanosatellite Era
______________________________________________________PROCEEDING OF THE 28TH CONFERENCE OF FRUCT ASSOCIATION On Information Technology Issues in the Nanosatellite Era Dmitry Namiot Manfred Sneps-Sneppe, Romass Pauliks Lomonosov Moscow State University Ventspils University of Applied Sciences, Latvia Moscow, Russia Ventspils, Latvia [email protected] [email protected], [email protected] Abstract—The paper is an interpretation of the research on 96 dipoles (Fig. 2). Because of the very low level of radio the Internet of Things in the context of scientific interests of interference, this site perfectly is suitable for the sensitive Ventspils International Radio Astronomy Center (VIRAC). A LOFAR radio telescope [3]. nanosatellite essence has been explained as well as data on nanosatellite launches with forecasts are given. Digital Video Broadcasting DVB-S2 basics and some nanosatellite (so-called CubeSat) features are given. Some emergence nanosatellite researches regarding information technologies have shown, namely, Inter-Satellite Communication, and MAC Protocol studies. In the Section on CubeSat teaching, we consider the US University Nanosat Program and the European Space Agency efforts, considering in more detail the OPS-SAT tools – a CubeSat developed as a training platform. I. INTRODUCTION Fig. 2. LOFAR – Latvia LV614 [16] The paper is an interpretation of our research on the Internet VUAS had some experience in the nanosatellites area also of Things [1] in the context of scientific interests of Ventspils (Fig. 3). Venta-1, Latvia's first artificial satellite, was built by International Radio Astronomy Center (VIRAC). What is the the University of Applied Sciences, Bremen, Germany for VIRAC about? Latvia under the contract with VUAS and VATP Latvia and the assistance of VUAS students.