A New Approach for Accurate Modelling of Medium Access Control(MAC)Protocols

A New Approach for Accurate Modelling of Medium access Control (Mac) protocols Presenter: moshe zukerman ARC Centre for ultra broadband information networks EEE Dept The University of melbourne Presented at EE Dept, City University of Hong Kong, 11 April, 2002 Credit: Chuan Foh (eee, melbourne) C UBIN THE UNIVERSITY OF MELBOURNE
A New Approach for Accurate Modelling of Medium Access Control (MAC) Protocols Presenter: Moshe Zukerman ARC Centre for Ultra Broadband Information Networks EEE Dept., The University of Melbourne Presented at EE Dept., City University of Hong Kong, 11 April, 2002 Credit: Chuan Foh (EEE, Melbourne)

OUTLINE The big picture 2. Classical performance models 3. Ethernet 4.IEEE802.3 5. How can we get performance statistics for a complicated protocol 6. Breaking the problem into two: saturation and SSQ fed by correlated SRD Markovian trafic 7. Numerical results
1. The big picture 2. Classical performance models 3. Ethernet 4. IEEE 802.3 5. How can we get performance statistics for a complicated protocol 6. Breaking the problem into two: Saturation and SSQ fed by correlated SRD Markovian traffic 7. Numerical results OUTLINE

The Big Picture
The Big Picture

Link and Network Design and dimensioning Traffic Performance Traffic Modelling Evaluation Prediction Traffic Queueing Simulations and Measurements Theory Fast Simulations Formulae in Numerical Closed Form Solutions
Traffic Modelling Queueing Theory Performance Evaluation Simulations and Fast Simulations Numerical Solutions Formulae in Closed Form Traffic Measurements Link and Network Design and Dimensioning Traffic Prediction

Research in performance evaluation 1. Exact analytical results(models) 2. Exact numerical results(models) approximations 4. Simulations(slow and fast 5. Experiments 6. Testbeds 7. deployment and measurements 8.Typically, 4-7 validate 1-3
Research in Performance Evaluation 1.Exact analytical results (models) 2.Exact numerical results (models) 3. Approximations 4. Simulations (slow and fast) 5.Experiments 6.Testbeds 7. Deployment and measurements 8.Typically, 4-7 validate 1-3

Classical Performance models Poisson traffic model Many simplified assumptions on System/protocol operation Inaccurate results
Classical Performance Models Poisson Traffic Model Many simplified assumptions on System/protocol operation Inaccurate results

We want Realistic Traffic Model No simplified assumptions on System/protocol operation accurate results
We want Realistic Traffic Model No simplified assumptions on System/protocol operation Accurate results

Example 1: Ethernet The ethernet mac protocol (1) Carrier Sensed Multiple Access with Collision Detection(CSMA/CD) (2 The Binary Exponential Backoff (BEB) Algorithm
Example 1: Ethernet The Ethernet MAC protocol: (1) Carrier Sensed Multiple Access with Collision Detection (CSMA/CD) (2) The Binary Exponential Backoff (BEB) Algorithm

Ethernet C E G time C D E FG The big bang ofe. f g D time E F G
Ethernet D time F G The Big Bang of E, F & G E C D E F G C D E F G time

Detailed Analysis LAN traffic Served CSMA/CD packets BEB collided packets Ethernet or IEEE 802.3
Detailed Analysis CSMA/CD BEB collided packets LAN traffic Served packets Ethernet -or - IEEE 802.3
按次数下载不扣除下载券;
注册用户24小时内重复下载只扣除一次;
顺序:VIP每日次数-->可用次数-->下载券;
- 西安电子科技大学:人工神经网络(PPT讲稿)Artificial Neural Networks(Introduction).ppt
- 《数据结构和编程设计》课程教学资源(PPT课件讲稿)Chapter 1 Programming Principles.ppt
- 《微机原理》课程教学资源(PPT课件讲稿)第三章 寻址方式与指令系统.ppt
- 《数据结构》课程教学资源(PPT课件讲稿)第九章 排序 Sort.ppt
- 中国科学技术大学:《数据结构》课程教学资源(PPT课件)第八章 查找表.pps
- 丽水职业技术学院:《电子商务实训》课程教学资源(PPT课件讲稿)电子商务交易模式之“B2C”.ppt
- 河南中医药大学(河南中医学院):《计算机文化》课程教学资源(PPT课件讲稿)第八章 数字多媒体.ppt
- 《计算机网络》课程教学资源(PPT课件讲稿)第7章 运输层.ppt
- 《自然语言处理》课程教学资源(PPT课件讲稿)语言模型.ppt
- 中国科学技术大学:《计算机文化基础》课程教学资源(PPT课件讲稿,共四章,李金龙).ppt
- 清华大学:《计算机导论》课程电子教案(PPT教学课件)第5章 程序设计知识.ppt
- 北京建筑大学:《计算机图形学》课程教学资源(PPT课件讲稿)第一章 绪论(吕书强).ppt
- 理论计算机科学(PPT专题讲稿)Topics in Theoretical Computer Science(Linear Programming).pptx
- 《C语言程序设计》课程电子教案(PPT课件讲稿)第9章 文件操作.ppt
- 香港科技大学:Recent Development of Heterogeneous Information Networks - From Meta-paths to Meta-graphs.pptx
- 西安培华学院:《计算机应用基础》课程教学资源(PPT课件讲稿)第1章 信息技术与计算机基础知识.ppt
- 同济大学:FWA for Noisy Optimization Problems(张军旗).pptx
- 南京大学:《编译原理》课程教学资源(PPT课件讲稿)第三章 词法分析.ppt
- 电子科技大学:《计算机操作系统》课程教学资源(PPT课件)第一章 操作系统引论.ppt
- 电子工业出版社:《计算机网络》课程教学资源(第五版,PPT课件讲稿)第五章 运输层.ppt
- 贵州师范学院:《高级语言程序设计 Advanced Programming》课程教学资源(PPT课件讲稿)第9章 结构体.ppt
- 《大型机高级系统管理技术》课程教学资源(PPT课件讲稿)第3章 作业控制语言.ppt
- 厦门大学:《大数据技术原理与应用》课程教学资源(PPT课件讲稿)第九章 图计算.ppt
- 《微机原理笔记》课程教学资源(PPT课件讲稿)第6章 输入输出和中断技术.ppt
- 香港科技大学:Introduction to Software Defined Network(SDN).pptx
- 《高级语言程序设计 Advanced Programming》课程教学资源(PPT课件讲稿)第5章 循环结构程序设计.ppt
- 中国科学技术大学:《计算机科学导论》课程教学资源(PPT课件讲稿)第五讲 经典计算的计算模型(主讲:陈意云).pptx
- 华中师范大学:智能与分布计算(PPT课件讲稿)语义网与本体 Semantic Web & Ontology(Introduction).ppt
- 西安电子科技大学:《现代密码学》课程教学资源(PPT课件讲稿)第六章 数字签名算法.pptx
- 《Computer Networking:A Top Down Approach》英文教材教学资源(PPT课件讲稿,6th edition)Chapter 8 网络安全 Network Security.ppt
- 武昌理工学院:《操作系统原理》课程教学资源(PPT课件)第一章 操作系统概述(主讲:温静).pptx
- Data Mining and Model Choice in Supervised Learning.ppt
- 上海交通大学:《软件工程导论》课程教学资源(PPT课件讲稿)第十三讲 软件项目中的人员管理.ppt
- 航空航天(PPT课件讲稿)Mechanics——Particle Motion.ppt
- 《网络编程实用教程》教学资源(PPT课件讲稿)第4章 MFC编程.ppt
- 东南大学:《数据结构》课程教学资源(PPT课件讲稿)贪心算法.pptx
- 《计算机算法基础》课程教学资源(PPT课件讲稿)分枝-限界法.ppt
- 《计算机系统和系统结构》课程教学资源(PPT课件讲稿)第四章 流水线技术.ppt
- 四川大学:《计算机操作系统 Operating System Principles》课程教学资源(PPT课件讲稿)第6章 存储器管理.ppt
- 山东大学:《微机原理及单片机接口技术》课程教学资源(PPT课件讲稿)第二章 微型计算机基础知识.ppt