Beruflich Dokumente
Kultur Dokumente
Tx
Communications Link
Tx
Rx
Information field
(c) Prof. Izhak Rubin
EDC field
ARQ confirmations
ARQ: Features
Advantages
Lower cost
Positive confirmation to sender
Typically low throughput decrease implication
Fast EDC (line speed) operation
Disadvantages
TH (bps) = No. of bits accepted by the destination / total time to accept these
bits
1 P (1 p)
P 1 (1 p) K
Example
For p <<<1, P Kp
ARQ: Retransmissions
E{N (t )} jP j 1 (1 P)
j 1
P( N ( R) j ) P (1 P)
j
E ( N ( R))
j 0
0<P<1
1
1 P
P
jP (1 P)
1 P
j
0<P<1
N(T) = 1+N(R)
E(N(T)) = 1 +E(N(R))
Example: P=0.5; E(N(T)) = 2, E(N(R)) = 1.
(c) Prof. Izhak Rubin
10
Stop and Wait ARQ has been frequently used across half duplex links
Protocol:
1.
2.
3.
4.
11
Space
F(i-1)
F(i-1)
A(i-1)
A(i-1)
F (i)
F (i)
T(T0)
T(T0)
A(i)
F(i)
F(i)
A(i)
A(i)
Time
Time
(c) Prof. Izhak Rubin
12
K/R
t(p)
t(ta)
Message
Tx turns
around
n(a)/R
t(p)
t(ta)
Message
ACK
Rx turns
around
t(T0)
t(IM)
Next Frame
Tx initiated
Time
t(TO)= T(T0)
13
T(T0)
M1
M1
T(T0)
M1
M2
K n( h)
K n( h)
E{t (c)}
t ( IM ) /(1 P)
[ K n(h)](1 P) R
TH
K n(a) 2 R[t ( p) t (ta )]
14
Given: n(h) = n(a) = 48 bits; t(p)= 10 ms, t(ta) = 100 ms, R = 4800 bps
t(T0) = [N(a)/R] + 2 [t(p)+t(ta)]=230ms
TH = (K-48) / (E(N(T) [(K/R)+0.23]
Assume K = 4800 bits
BER = p = 0.0001; P = 1-(1-p)K = 0.381
E (N(T)) = 1/(1-P) = 1.616
TH = 2390 bps
Assume now that BER = 0.00001
Using the same equations as above, we get
TH = 3682 bps
15
16
Go Back N ARQ
FDX
Communications Link
Rx
Tx
Protocol
When frame is transmitted an ACK Timer of timeout duration t(T0)
is initiated
Up to N subsequent frames can be transmitted until outstanding
frame is PACKed
If no PACK is received by the expiration of the timer, the frame is
retransmitted. In addition, all subsequently transmitted frames are
also retransmitted
Upon receipt of a PACK, the sliding window quota is refreshed
(c) Prof. Izhak Rubin
17
GO BACK N ARQ:
ILLUSTRATIVE EXAMPLE
Space
F1
F2
A1
Error
F3
t(T0)
F2
F3
Time
(c) Prof. Izhak Rubin
18
K/R
K/R
NTH = [K-n(h)]/K
Note: NTH = Normalized Throughput = Throughput / Max TH;
whereby across the link under consideration, we assume that
Max_TH = Tx Rate.
19
NK/R
1
NK/R
N
K n( h )
K n( h)
TH
TH
[ K n(h)](1 P) R
K [1 ( N 1) P]
(c) Prof. Izhak Rubin
21
GBN Selection of N
T
N
2
K / R
(c) Prof. Izhak Rubin
22
23
Tx
Protocol:
When a frame is transmitted an ACK timer of
transmitter duration t(T0) is initiated
Subsequent frames are continuously transmitted
If no PACK is received by the expiration of the timer,
the unACKED frame is retransmitted
24
Selective-Repeat ARQ:
Illustrative Example
Space
F1
A1
F2
F3
Error
t(T0)
F2
A3
F4
Time
(c) Prof. Izhak Rubin
25
T(T0)
M1
E
M1
M1
C
E {N(T)} = 1/(1-P)
K n( h)
K n ( h)
TH
E[ N (T )]K / R ( K / R) /(1 P)
[ K n(h)](1 P) R
TH
K
(c) Prof. Izhak Rubin
26
27
FLOW CONTROL
Sink
Source
Flow
Control
Network
Flow
Control
Flow control is the regulation of flow at the edges (I/O) of the network
It achieves:
Protection of Network Resources
Protection of User Resources
Fairness Control
Congestion Control
Key Methods:
End to end sliding window closed loop flow control
Open Loop input rate flow control
28
Source
Flow
Control
Network
Feedback Data (authorization)
Protocol:
A window size of W segments is negotiated between a source and a
sink
The source is permitted to have no more than W outstanding elements
Upon receipt of an authorization from the sink, the source refreshes its
window quota
29
Parameters:
Window Size
Latency across the network
Feedback timeliness
Window refresh
time
30
Sink
UNI
Flow
Control
Network
Flow
Control
31
32
If the count exceeds the threshold the packet is nonconforming and the
count is not incremented (or if already incremented, the increment is
removed)
ATM systems use dual leaky buckets policing mechanisms at the UNI
33
Routing
34
35
36
A,2
C,5
E,7
B,3
D,4
37
Distributed Implementation
Each node periodically notifies its neighbors about the shortest
path estimates
Each node uses its local link states as well as the received
estimates to calculate the shortest path from itself to other nodes
Bellman-Ford Algorithm
3
Complexity: N for highly connected graphs, lower for less
connected topologies
Issues: Stability and speed of adaptation to varying network
conditions
Example: RIP, original ARPANET
38
w(i,v1)
Node i
Node j
w(i,v2)
Node v2
39
Node u1
w(u1,v)
Node j= Node v
Node i= Node s
w(u2,v)
Node u2
Ps(s,u2) = length of shortest path from s to u2
40
Bellmans Equation
h hops
41
Distributed Bellman-Ford
Algorithm
42
Distributed Asynchronous
Bellman-Ford Algorithm
43
44
Dijkstras Algorithm
Algorithm Dijkstra:
begin
T=V
d(s) = 0 and pred(s) = 0
for u T \ {s} do d(u) =
od
and pred(u) = -1
While loop executes O(|V|) times
45
Example
{current min distance, predecessor}
S 0,S
0,S
0,S
0,S
0,S
0,S
A inf,nil
2,S
2,S
2,S
2,S
2,S
B inf,nil
5,S
3,A
3,A
3,A
3,A
inf,nil
5,A
5,A
5,A
5,A
D inf,nil
inf,nil
inf,nil
4,B
4,B
4,B
5
B
C inf,nil
A,2
3
D
C,5
E inf,nil
inf,nil
inf,nil
inf,nil
7,D
E,7
7,D
(c) Prof. Izhak Rubin
B,3
D,4
46
QoS Routing
47