程序代写代做代考 interpreter matlab ECE 475: Computer Networks

ECE 475: Computer Networks

Homework # 2. The Distributed Coordination Function (DCF) of 802.11

Due Oct. 7, 11:59 pm

1 Preliminaries

• Read the description. When you are finished reading it, read it again.

• Due date: Oct 7, 2016 11:59 pm.

• You are free to use a programming language of your choice. You are also welcomed to use existing
discrete-time event network simulators such as NS-3 (https://www.nsnam.org/). Several wireless
modules are readily available.

2 Description

You are to study the performance of multiple access protocols in a wireless setting. Consider the network
shown in Figure 1. The circles denote the communication range R of each station. We are interested in
the following two scenarios:

A. Concurrent Communications: Stations A,B,C, and D of Figure 1(a) are within the same
collision domain (any transmission is received by all). Communication takes place between pairs A→ B
and C → D. Traffic is generated at A and C according to a Poisson distribution with parameters λA and
λC , respectively.

B. Hidden Terminals: stations A,B,C, and D of Figure 1(b), belong to separate collision domains.
Communication takes place between pairs A→ B and C → D. Traffic is generated at A and C according
to a Poisson distribution with parameters λA and λC , respectively.

For each scenario, compute relevant performance metrics for the following multiple access protocols.
A time-slotted system is assumed.

1. CSMA with Collision Avoidance (CSMA/CA) according to the 802.11 DCF function.

(a) A station Tx ready to transmit (when a frame has arrived for transmission from the upper
layers of the network stack), senses the channel for an initial period of DIFS time.

(b) If the channel is busy, Tx (and every other station with a frame for transmission) monitors
the channel until it becomes idle. When the channel becomes idle for DIFS time, Tx selects a
random backoff value in [0, CW − 1]. Tx decrements his counter by one with every idle slot. If
the channel becomes busy, Tx freezes its backoff counter.When the counter reaches zero, Tx
transmits its frame.

1

A B

C D

A B C D

R

(a) (b)

Figure 1: (a) Topology for parallel transmissions within the same collision domain, (b) topology for
parallel transmissions when A and C are hidden terminals.

(c) If the frame is successfully received (no collision) by Rx, the station Rx replies with an ACK
frame after SIFS time. This completes the transmission round and the protocol repeats for
the next transmission. For successive transmissions, the station has to sense for DIFS time
before starting the countdown.

(d) If a collision occurs, the stations that collided double their contention window CW and repeat
the backoff process by selecting a backoff value in [0, CW − 1]. The CW value cannot exceed
threshold CWmax.

2. CSMA/CA with virtual carrier sensing enabled: RTS and CTS frames are exchanged before the
transmission of a frame. If RTS transmissions collide, stations invoke the exponential backoff
mechanism outlined in 1(c). Otherwise, stations that overhear an RTS/CTS message defer from
transmission for the time indicated in the NAV vector.

3 Simulation parameters

Parameter Value Parameter Value

Data frame size 1,500 bytes ACK, RTS, CTS size 30 bytes
Slot duration 20 µs DIFS duration 40 µs
SIFS duration 10 µs Transmission rate 6 Mbps

CW0 4 slots CWmax 1024 slots
λ {50, 100, 200, 300, 400, 500} frames/sec Simulation time 10 sec

4 Performance Metrics

Evaluate the protocol performance with respect to the following metrics:

Throughput T : The individual station’s throughput as a function of λ.
Collisions N : The number of collisions (data and RTS/CTS) as a function of λ.
Delay D: The average frame delay as a function λ.
Fairness Index FI: The fraction of time that the channel is occupied by pair A→ B over the fraction

of time that the channel is occupied by pair C → D as a function of λ.
Your experiments must be repeated for two different scenarios: (a) λA = λC = λ and (b) λA =

2λ, λC = λ. Assume no losses due to the imperfections of the wireless medium.

2

5 Report

Include with your report:

• A brief introduction describing the Homework
• A description on how you developed your simulations.

• Graphs for each of the simulated scenarios.

1. Throughput T

(a) Node A: Throughput T (Kbps) vs. rate λ (frames/sec) for scenarios A and B, and CSMA
implementations 1 and 2 (four lines in total).

(b) Node C: Throughput T (Kbps) vs. rate λ (frames/sec) for scenarios A and B, and CSMA
implementations 1 and 2 (four lines in total).

(c) Node A: Throughput T (Kbps) vs. rate λ (frames/sec) for scenarios A and B, and CSMA
implementations 1 and 2, when λA = 2λC (four lines in total).

(d) Node C: Throughput T (Kbps) vs. rate λ (frames/sec) for scenarios A and B, and CSMA
implementations 1 and 2, when λA = 2λC (four lines in total).

2. Collisions N

(a) Node A: Number of collisions N vs. rate λ (frames/sec) for scenarios A and B, and
CSMA implementations 1 and 2 (four lines in total).

(b) Node C: Number of collisions N vs. rate λ (frames/sec) for scenarios A and B, and
CSMA implementations 1 and 2 (four lines in total).

(c) Node A: Number of collisions N vs. rate λ (frames/sec) for scenarios A and B, and
CSMA implementations 1 and 2, when λA = 2λC (four lines in total).

(d) Node C: Number of collisions N vs. rate λ (frames/sec) for scenarios A and B, and
CSMA implementations 1 and 2, when λA = 2λC (four lines in total).

3. Delay D

(a) Node A: Average delay D vs. rate λ (frames/sec) for scenarios A and B, and CSMA
implementations 1 and 2 (four lines in total).

(b) Node C: Average delay D vs. rate λ (frames/sec) for scenarios A and B, and CSMA
implementations 1 and 2 (four lines in total).

(c) Node A: Average delay D vs. rate λ (frames/sec) for scenarios A and B, and CSMA
implementations 1 and 2, when λA = 2λC (four lines in total).

(d) Node C: Average delay D vs. rate λ (frames/sec) for scenarios A and B, and CSMA
implementations 1 and 2, when λA = 2λC (four lines in total).

4. Fairness Index FI

(a) Fairness Index FI vs. rate λ (frames/sec) for scenarios A and B, and CSMA implemen-
tations 1 and 2 (four lines in total).

(b) Fairness Index FI vs. rate λ (frames/sec) for scenarios A and B, and CSMA implemen-
tations 1 and 2, when λA = 2λC (four lines in total).

• Justification for the results shown in your graphs.

3

Appendix

Generating Poisson-distributed traffic: To generate Poisson-distributed traffic, it is sufficient to
generate a series of exponentially-distributed inter-arrival times. Such times can be generated using the
inverse CDF transformation method.

Step 1: Generate a series of uniformly distributed numbers U = {u1, u2, . . . , un} with ui ∈ (0, 1), ∀i.
Step 2: Compute series X = {x1, x2, . . . , xn} of exponentially distributed numbers with λ, as

X = −
1

λ
ln(1− U) (1)

Using X, you can determine the time of each frame arrival at each station. For instance, frame 1
arrives at time x1, frame 2 arrives at time x1 + x2, etc. The inter-arrival time generation process has to
be repeated for each transmitting station.

Plotting tips:

1. Label your axes and use appropriate units

2. Make sure the scales on both axes are appropriate. If you are to use the same variable on multiple
plots (e.g. throughput) use the same scale on all plots so they can be compared

3. Do not superimpose more than 4-5 plot lines on the same plot.

4. If more than one plot lines are present in the same plot make sure to individually label each one

5. For individual plot lines use different marker shapes so they can be distinguishable.

6. Keep in mind that colors do not show on a black and white printout. So if you color code your
lines, use some other discernable labeling such as dashed lines to differentiate between plot lines.

MATLAB code for generating good figures

close all; % closes all open figure windows

set(0,’defaulttextinterpreter’,’latex’); % allows you to use latex math
set(0,’defaultlinelinewidth’,2); % line width is set to 2
set(0,’DefaultLineMarkerSize’,10); % marker size is set to 10
set(0,’DefaultTextFontSize’, 16); % Font size is set to 16
set(0,’DefaultAxesFontSize’,16); % font size for the axes is set to 16

figure(1)
plot(X, Y1, ’-bo’, X, Y2, ’–rs’, X); % plotting three curves Y1, Y2 for the same X
grid on; % grid lines on the plot
legend(’CSMA’, ’CSMA w. virtual Sensing’);
ylabel(’$T$ (Kbps)’);
xlabel(’$λ$’ (frames/sec));

4

Student Name:

GRADE
CSMA/CA

1 Throughput /6
2 Number of Collisions /6
3 Delay /6
4 Fairness Index /5

Virtual Carrier Sensing
5 Throughput /6
6 Number of Collisions /6
7 Delay /6
8 Fairness Index /5

CSMA/CA
9 Throughput /6
10 Delay /6
11 Number of Collisions /6
12 Fairness Index /5

Virtual Carrier Sensing
13 Throughput /6
14 Delay /6
15 Number of Collisions /6
16 Fairness Index /5

Presentation /8
/100

Implementation of CSMA

Total

Implementation of virtual carrier sensing

Grading rubric
Scenario A – One Collision Domain Topology

Implementation of CSMA

Scenario B – Hidden Terminal Topology

Implementation of virtual carrier sensing

project1_2012hwrk1
rubric

Leave a Reply

Your email address will not be published. Required fields are marked *