中国高校课件下载中心 》 教学资源 》 大学文库

A New Approach for Accurate Modelling of Medium Access Control(MAC)Protocols

文档信息
资源类别:文库
文档格式:PPT
文档页数:42
文件大小:815KB
团购合买:点击进入团购
内容简介
A New Approach for Accurate Modelling of Medium Access Control(MAC)Protocols
刷新页面文档预览

A New Approach for Accurate Modelling of Medium access Control (Mac) protocols Presenter: moshe zukerman ARC Centre for ultra broadband information networks EEE Dept The University of melbourne Presented at EE Dept, City University of Hong Kong, 11 April, 2002 Credit: Chuan Foh (eee, melbourne) C UBIN THE UNIVERSITY OF MELBOURNE

A New Approach for Accurate Modelling of Medium Access Control (MAC) Protocols Presenter: Moshe Zukerman ARC Centre for Ultra Broadband Information Networks EEE Dept., The University of Melbourne Presented at EE Dept., City University of Hong Kong, 11 April, 2002 Credit: Chuan Foh (EEE, Melbourne)

OUTLINE The big picture 2. Classical performance models 3. Ethernet 4.IEEE802.3 5. How can we get performance statistics for a complicated protocol 6. Breaking the problem into two: saturation and SSQ fed by correlated SRD Markovian trafic 7. Numerical results

1. The big picture 2. Classical performance models 3. Ethernet 4. IEEE 802.3 5. How can we get performance statistics for a complicated protocol 6. Breaking the problem into two: Saturation and SSQ fed by correlated SRD Markovian traffic 7. Numerical results OUTLINE

The Big Picture

The Big Picture

Link and Network Design and dimensioning Traffic Performance Traffic Modelling Evaluation Prediction Traffic Queueing Simulations and Measurements Theory Fast Simulations Formulae in Numerical Closed Form Solutions

Traffic Modelling Queueing Theory Performance Evaluation Simulations and Fast Simulations Numerical Solutions Formulae in Closed Form Traffic Measurements Link and Network Design and Dimensioning Traffic Prediction

Research in performance evaluation 1. Exact analytical results(models) 2. Exact numerical results(models) approximations 4. Simulations(slow and fast 5. Experiments 6. Testbeds 7. deployment and measurements 8.Typically, 4-7 validate 1-3

Research in Performance Evaluation 1.Exact analytical results (models) 2.Exact numerical results (models) 3. Approximations 4. Simulations (slow and fast) 5.Experiments 6.Testbeds 7. Deployment and measurements 8.Typically, 4-7 validate 1-3

Classical Performance models Poisson traffic model Many simplified assumptions on System/protocol operation Inaccurate results

Classical Performance Models Poisson Traffic Model Many simplified assumptions on System/protocol operation Inaccurate results

We want Realistic Traffic Model No simplified assumptions on System/protocol operation accurate results

We want Realistic Traffic Model No simplified assumptions on System/protocol operation Accurate results

Example 1: Ethernet The ethernet mac protocol (1) Carrier Sensed Multiple Access with Collision Detection(CSMA/CD) (2 The Binary Exponential Backoff (BEB) Algorithm

Example 1: Ethernet The Ethernet MAC protocol: (1) Carrier Sensed Multiple Access with Collision Detection (CSMA/CD) (2) The Binary Exponential Backoff (BEB) Algorithm

Ethernet C E G time C D E FG The big bang ofe. f g D time E F G

Ethernet D time F G The Big Bang of E, F & G E C D E F G C D E F G time

Detailed Analysis LAN traffic Served CSMA/CD packets BEB collided packets Ethernet or IEEE 802.3

Detailed Analysis CSMA/CD BEB collided packets LAN traffic Served packets Ethernet -or - IEEE 802.3

刷新页面下载完整文档
VIP每日下载上限内不扣除下载券和下载次数;
按次数下载不扣除下载券;
注册用户24小时内重复下载只扣除一次;
顺序:VIP每日次数-->可用次数-->下载券;
相关文档