Tuesday, June 4, 2019

The Media Access Delay Information Technology Essay

The Media rile look into Information Technology EssayOPNET Modeller is the network development software. OPNET permits initiation and learn communication networks, devices, communications protocols, and occupation. OPNETs object-oriented modelling stylishness and graphical user interface (GUI) let easy of developing models from the real world network, hardware devices, and protocols. Modeller supports either major network forms and technologies, permitting you to design and test various situations. (Opnet)IntroductionI have delibe enumerated various Medium Access Control ( macintosh) protocols for Wireless local field of battle (WLAN) communicates. To choose the best one surrounded by the existing protocols, it is necessary to have a network model scenario and some performance metrics on the basis of which they can be assessed. In this paper, various metrics for comparing the performance of MAC protocols and a network model to carry discover guise is discussed. At the end of this chapter, results obtained from the simulation in the form of graphs will be presented.DCFEDCFMetricsPicking the correct metrics or statements in the evaluation of the QoS (Quality of Service) mechanisms is critical to the result and rationality of the evaluation. The metrics apply are Throughput, Access Delay, and End to End Delay in case of real time multimedia traffic corresponding VoIP, Video streaming (Video conferencing), response time in case of Telnet or Remote Login type applications which cannot tolerate delay and loss of info. Retransmission Attempts in case a mail does not get a chance due to internal collision. The following list below is the item of metrics usedThroughputThe Throughput for different antecedency levels shows how well the QoS schemes can provide service specialization between the various priorities. The Throughput of all stations shows the utilization of the wireless medium. Wireless bandwidth is a scarce resource, so efficient use of it is v ital.Media Access DelayWe measure access delay as the time from when the data reaches the MAC forge until it is successfully transmitted out on the wireless medium. The reason for studying average access delay is that many real-time applications have a maximum tolerable delay, after which the data will be useless. Therefore, it is important to provide low delay for real-time flows.Retransmission AttemptsTotal publication of Retransmission Attempts by all Wireless Local Area Network MACs in the network until either packet is successfully transmitted or it is discarded as a result of reaching short or abundant retry limit. For 802.11e-capable MACs, the Retransmission Attempt counts recorded under this statistic also include retry count increments due to internal collisions. This factor plays important role in carrying into action of WLAN.Data DroppedData Dropped due to unavailability of access to medium. This factor largely affects the reliability of WLAN. disguise ScenarioCreatin g a simulation scenario that is corresponding to real world scenario is the first-year step of simulation. In this simulation, the wireless topology consisted of several wireless stations and one base station in the wireless LAN. The base station was attached to a wired node ( augur 2.1) which serves as a sink for the flows from the wireless domain. All wireless stations are located such that every station is able to detect a transmission from any otherwise station, and there is no mobility in the system. This means our results will not be impacted by mobility and phenomenon such as the hidden node problem.Figure 2.1 Wi-Fi network modelsThe simulation experiments are carried out using OPNET Simulator version 9.1 on Windows XP SP3. For this simulation, a data rate of 11 Mbps is chosen. Various MAC and PHY (Physical Layer of OSI) parameter values used in our experiment are according to IEEE 802.11e default values given in Table 2.1. We have run the simulation for 5 minutes for each scenario, and so compared the results obtained from them. Figure 2.1 shows a network model for the experiment.Table 2.1 MAC and PHY parameter values used in ExperimentATTRIBUTEVALUEPhysical CharacteristicsDirect SequenceData Rate (bps)11 MbpsTransmit Power (W)0.005 devotee Size (bits)256000BSS IdentifierAuto AssignedChannel settingsAuto AssignedRoaming CapabilityDisabledAP Beacon Interval (secs)0.02Large Packet ProcessingDropSimulation MethodTo compare the performance of DCF (Distri only ifed Coordination Function) and EDCF (Enhanced Distributed Coordination Function) two scenarios were created medium access in first scenario was supported by DCF and in second, EDCF protocol was used at the MAC layer. Network environment factors which were used as a benchmark configured same for both scenarios. Detailed specifications are given in the Table 2.1 wake the MAC and PHY parameters used in experiment. The performance evaluation is done by simulating both scenarios one by one in OPNET simulator and then comparing the graphs obtained.Results afterwards choosing metrics, the simulation is done for 5 minutes for a scenario. Then results were gathered. analytic thinking of EDCFIn case of EDCF, all four traffic crime syndicatees were fed into the MAC layer from high layer, which are corresponding to AC (0), AC (1), AC (2) and AC (3) respectively to check how efficient the new protocol is to provide service differentiation required for real time application. (Note that DCF does not support service differentiation, so no provision of Access category). For this, in the application visibility of scenario (for EDCF protocol) different application was configured for different access category. Details are shown in the Table 4.1.Table 4.1 Access Category corresponding to an applicationACCESSCATEGORY screeningCONFIGUREDDESIGNATIONAC(0)HTTP (LIGHT)BACKGROUNDAC(1)REMOTE LOGIN (HEAVY)EXCELLENT EFFORTAC(2)VIDEO CONFERENCINGINTERACTIVE MULTIMEDIAAC(3)VOIPINTERACTIVE VOICEIn the p rofile configuration, a profile for clients was configured that uses all the four applications. In simulation scenario, 15 stations were configured to use these services randomly. In the simulation, we assumed that each traffic class has the equal portion of the total data traffic in ground of the average number of packets generated per unit time. The results obtained are as followsThroughput of Different Access CategoriesFigure 4.2 Throughputs of Different Access CategoriesIt is observed from figure 4.2 that the Throughput of Access category 3 is way high than the Access category 0 and 1. Throughput for Access category 2 lies in between 3 and 1. It means that Throughput for applications like Voice over IP and Video conferencing, EDCF provides maximum Throughput by providing them more priority over the other services like simple HTTP.Media Access Delay for Different Access CategoriesFigure 4.3 Wireless LAN Media Access DelayIt is observed from figure 4.3 that the Media Access Dela y for Access category 3 is at minimum among all Access categories. Media Access Delay for Access category 2 is just 3 to 4 seconds more than AC (3). It means that the medium is assigned to the application according to the priority. Thus, EDCF provides lesser Medium Access Delay for real-time applications.Comparative Analysis of DCF and EDCFNext step is to check the performance of both protocols in terms of Throughput, Media Access Delay, Retransmission Attempts and Data Dropped. These four metrics are determining factors in terms of overall performance of both the protocols.ThroughputFigure 4.4 Throughput of DCF vs. EDCFIt is observed from figure 4.4 that in the first 30 seconds of simulation, Throughput of both DCF and EDCF is high, but then after that, it subsides with time and stabilizes for both protocols. Throughput in first 30 seconds is high due to less number of Retransmission Attempts (less number of backoffs). From Graph analysis, one fact is clearly visible, that curve o f DCF is marginally higher than that of EDCF. We can conclude that DCFs overall Throughput is somewhat more than the EDCF.Retransmission AttemptsFigure 4.5 Retransmission Attempts of DCF vs. EDCFIt is observed from figure 4.5 that in the first 30 seconds of simulation, Retransmission Attempts for both DCF and EDCF are less, but then after that, it decreases with time and stabilizes for both protocols. Retransmission Attempts in first 30 seconds are less due to less number of backoffs assigned to wireless stations. There is a small noticeable difference between curves of Retransmission Attempts of DCF and EDCF protocol. That small difference implies that the overall Retransmission Attempts made in DCF protocols are a bit lesser than EDCF protocol.Media Access DelayFigure 4.6 Media Access Delay of DCF vs. EDCFIn Figure 4.6, for the first minute of simulation the Medium Access Delay for both protocols increases at equal pace, and then after that, DCF suffers somewhat lesser Access Dela y than EDCF. The increase in the Medium Access Delay for both protocols is due to increase in the number of nodes competing to gain access of medium.Data DroppedFigure 4.7 amount of Data Dropped of DCF vs. EDCFIt is observed from figure 4.7 that the first 30 seconds of simulation, DCF suffers a sudden high Data Drop, but Data Drop in EDCF increases gradually. The reason of varying Data Drop gradually in EDCF is the service differentiation which provides priority based scheme to address different kind of data. After 2.5 minutes of simulation, curves of Data Dropped of DCF and EDCF remain same for both protocols, EDCF finishes at less Data Dropped than DCF.ConclusionsConclusionThe results obtained from simulation shows that Enhanced distribution Coordination Function provides efficient mechanism for service differentiation and hence provides quality of service to the Wireless LAN. However, this improvement comes at a cost of a decrease in quality of the lower priority traffic up to the point of starvation. The acquisition of the radio channel by the higher priority traffic is untold more aggressive than for the lower priority. Higher priority traffic benefited, while lower priority traffic suffered.In terms of overall performance (under the used simulation conditions in this particular study of QoS of Wireless LAN), DCF performs marginally well than EDCF. This happens due to reason that in EDCF mechanism, each AC function acts like a virtual station for medium access, so more collision will be expected for EDCF scenario. But in terms of Quality of Service for real-time applications (like Video conferencing) EDCF outperforms DCF.EDCF has been purposed as the medium access control protocol for IEEEs upcoming standard IEEE 802.11e. Presently, all of the wireless devices use DCF as the default MAC protocol and PCF as the optional functionality.

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.