Topology, Capacity and Flow Assignment Computer Communication - - PowerPoint PPT Presentation

topology capacity and flow assignment
SMART_READER_LITE
LIVE PREVIEW

Topology, Capacity and Flow Assignment Computer Communication - - PowerPoint PPT Presentation

Topology, Capacity and Flow Assignment Computer Communication Networks: Analysis and Design (Klei. Vol. 2, Chap. 5) Original Material Prepared by: Professor James S. Meditch Lecturer:Prof. Massimo Tornatore Typesetter: Dr. Anpeng Huang 1 A.


slide-1
SLIDE 1

Topology, Capacity and Flow Assignment

Computer Communication Networks: Analysis and Design (Klei. Vol. 2, Chap. 5)

Original Material Prepared by: Professor James S. Meditch Lecturer:Prof. Massimo Tornatore Typesetter: Dr. Anpeng Huang

1

slide-2
SLIDE 2
  • A. Evolution of network structures

A.a. Private/most expensive (star network)

2

slide-3
SLIDE 3

A.b. Least cost/slowest (minimal spanning tree) Multidrop lines – polling or contention

3

slide-4
SLIDE 4

A.c. Compromise/multiplexing or concentrating (statistical multiplexer)

4

slide-5
SLIDE 5

A.d. Large network – combinations of (c)

5

slide-6
SLIDE 6
  • B. Network modeling

M channels, N nodes Message or packet switching Assumptions: (i) Links and nodes perfectly reliable (combinatorial in nature) (ii) Nodal processing time negligible (for reading, error checking) (iii) Nodal storage infinite (iv) Fixed (or random) routing

6

slide-7
SLIDE 7

B.1. Arriving traffic

  • Poisson with avg. rate [msg/sec]
  • =

total average flow entering in the system

jk



 

N j N k jk 1 1

 

k j 

7

B.2. Messages

  • Message lengths exponentially distributed with

mean bits  1

slide-8
SLIDE 8

B.3. Channel model

M/M/1 queue Channel I ,

  • = channel capacity in bits/sec (bps)
  • = avg. channel flow in msg/sec
  • Note(1): Total average flow inside

the network (≠ !)

  • Note(2): propagation time Pi

i

C

i

i

i

C

8

M i i 1

 

slide-9
SLIDE 9

B.4. Channel cost (in $)

  • d is a generic cost function

9

M i i i C

d D

1

) (

slide-10
SLIDE 10

B.5. Average message delay

  • T = E [message delay]
  • E [message delay for message from j to k]

fraction of traffic over j–k node pair

jk

Z

 

   

 

N j N k jk jk N j N k jk jk

Z Z T

1 1 1 1

1    

10

slide-11
SLIDE 11
  • C. Network design problems

C.1. Given: node locations, , traffic matrix {jk} C.2. Objective function T C.3. Parameters: Ci , i, topology τ C.4 Constraint 4 optimization problems can be defined that differ

  • nly in the set of permissible design variables ->

 1

11

D C d

M i i i

1

) (

slide-12
SLIDE 12

C.3. The 4 problems are:

Problem Given Minimize w.r.t. s.t. CA i, τ T Ci D FA Ci, τ T i CFA

τ

T Ci, I D TCFA

  • T

Ci, I, τ D

i i

C    

Increasing complexity

C.4. Dual problems

Swap D with T No dual for FA

12

slide-13
SLIDE 13
  • D. Delay analysis

D.1. Model for T Little’s result applied: : one-way or two-way message flow

First take-away: global T can be expressed as sum of local Ti

 

M i i iT

T N

1

 

M i i iT

T

1

1  

i

13

slide-14
SLIDE 14

D.2. Independence assumption (a) and channel model (b)

D.2.a. Message lengths at nodes are independent at each node, and have exponentially distributed length b with p.d.f.

  • avg. message length = bits
  • In fact, message lengths are not independent at each node since a message

enters the network with a given length and retains that length from source to

  • destination. This independence assumption is based on (i) large numbers of

messages passing through each node and (ii) the moderate connectivity of the network, which support the assumption that packet lengths can be approximated as independent, exponentially-distributed message lengths.

b

e b p

   ) (

 b

 1

14

slide-15
SLIDE 15

D.2.b. M/M/1 channel model and T

Poisson arrivals: messages/sec. Exponential service: sec/message

i

T

i

C

i

i i

C x  1 

i i i i i i i i i i i

C C C x x x T                1 1 1 1 1

15

 

sec : message C nb

i 

slide-16
SLIDE 16

It follows that Other results (easily obtainable):

 

M i i i i

C T

1

1    

i i i i i i

C T N       

i i qi

N     1

2

i i i i i

C C W      

16

i i i

C    

Cont’d:

slide-17
SLIDE 17

D.2.c. Other effects

Note: so far we neglected: 1. control traffic, 2.propagation and nodal processing delay D.2.c.1. Average data message delay when control traffic is present = avg. flow of data messages = avg. length of data message = avg. flow of all traffic = avg. length of all messages = avg. data message delay = avg. service time for data messages = avg. waiting time for all messages

i

 1

' i

'

1 

i

T

i

x

i

W

17

nb: all traffic = data + control

slide-18
SLIDE 18

i i i

x W T  

' ' ' ' i i i i i

C C W      

i i

C x  1 

i i i i i i

C C C T      1

' ' ' '

  

               

 i i i i i M i i

C C C T        1

' ' ' ' 1

18

The avg. system time (with control traffic) can be now easily calculated as

slide-19
SLIDE 19

D.2.c.2. Propagation delay and nodal processing delay

Pi = propagation delay [sec/msg]

Depends upon the medium and the length of the link, e.g., ground station to geosynchronous

satellite is on the order of 120 to 135 msec.

K = avg. nodal processing time [sec/msg]

                 

K P C C C K T

i i i i i i M i i

       1

' ' ' ' 1

19

slide-20
SLIDE 20

A simple example

20

slide-21
SLIDE 21

Question: How should be split in

  • rder to minimize T?

Routing: all of via 1 of via and 5 of via all of via msg/sec msg/sec msec

12

1

C

23

13

3

C

2

C

1

C

13

3

C

4

1 

 2

2 

 5

3 

10

23 13 12

       

              

5 9 5 2 6 2 4 12 4 10 1 1

3 1 i i i i

C T    

225  T

13

21

slide-22
SLIDE 22

D.2.d. Delay-throughput characteristics

Fixed or random routing D.2.d.1. Decrease such that for all i So, no queuing in the network, all delay is due to service time (i.e., transmission delay)

 

M i i i i

C T

1

1    

i i

C   

M i i i

C T

1

1   

M i i i

C T

1

1   

22

slide-23
SLIDE 23

D.2.d.2. Increase until some channel saturates, i.e., .

For that channel , and, therefore so does . Let be the corresponding value

  • f .

i i

C   

 

i

T

T

*

23

slide-24
SLIDE 24

D.2.e. Avg. path length

= avg. path length

  • no. of links through which a message passes in

proceeding from its source to its destination averaged

  • ver all source-destination node pairs

n

24

slide-25
SLIDE 25

But Hence, where

14 13 12

      

    3 . 2 . 1 .

14 13 12

   n

      

14 14 13 14 13 12

) ( ) (      

14 13 12 1

      

14 13 2

    

14 3

  

   

3 1 3 2 1

1

i i

n      

   n

3 1 i i

 

25

slide-26
SLIDE 26

In general, “path” from j to k

  • no. of links in

jk

jk

n



 

N j N k jk jkn

n

1 1

 

k j 

jk

26

slide-27
SLIDE 27

But, Since msg/sec will traverse links in passing through the network Hence, where Using this result, we get for the delay throughput characteristic.

 

  

 

N j N k jk jk M i i

n

1 1 1

  

jk

jk

n

   n

M i i 1

 

M i i i

C n T

1

  

27

See formula at pp. 22

slide-28
SLIDE 28

Example: Same network as in delay analysis example above

; , , So, Also, using either expression for , we have msec This is the avg. msg. delay when the network is very lightly loaded.

10  

4

1 

2

2 

5

3 

1 . 1 10 11   n

T

2 . 122

0 

T

28

slide-29
SLIDE 29
  • E. Capacity Assignment (CA) Problem

Given: node locations, , , , ; min w.r.t. s.t. Note: the actual problem requires selection of Ci from a finite set, e.g., Ci {300, 900, 1.2k, 1.8k, 3.6k, 4.8k, 9.6k, 19.2kbit/s}, but, to find closed form solution, we consider relax this requirement

jk

 1 

 

i

T

 

i

C

 

D C d

M i i i

1

29

slide-30
SLIDE 30

E.1. Linear costs

and it can solve using the Lagrangian:

M , 1,2,...... ) (   i C d C d

i i i i

D C d C T

M i i i M i i i i

  

 

  1 1

s.t. 1 min    

        

 M i i i

D C d T J

1

          

 

  M i i i M i i i i

D C d C

1 1

1      M 1,2,...     j C J

j

) (

2

      

j j j j j

d C C J      

30

Let us assume: Then the opt. problem can be written as

slide-31
SLIDE 31

 

j i j j

d C      

2

j j j j

d C     1  

  

  

  

M i i i M i i i M i i i

d d C d D

1 1 1

1    

  

  

  

M i i i e M i i i M i i i

d D d d D

1 1 1

1     

31

Solving the Lagrange’s equations: We can then find 𝜸 by «forming the constraint»:

«Excess dollars»

slide-32
SLIDE 32

j = 1, 2,……, M (*) {min. required capacity to satisfy flow reqmnt.} + {sq. root allocation of normalized excess capacity} If we substitute Cj in the o.f. Note: from (*)

 

M i i i j j j e j j

d d d D C

1

   

j

C

 

M i i i i

C T

1

1    

 

M j j j i i i e i i

d d d D C

1

    

32

Cont’d:

slide-33
SLIDE 33

 

 

M i M j j j i i i e i

d d d D T

1 1 min

1     

              

 

  M j j j M i i i e

d d D

1 1

1    

33

Cont’d:

2 1 2 1

1                

 

  M i i i e M i i i e

d D d D        

2 1 min

        

 M i i i e

d D n T   

Note: De must be greater than 0!

slide-34
SLIDE 34

Special case: for all i Hence, is the constraint Using the definition

  • f De at pp. 31

1 

i

d

C C D

M i i 

 

1

34

Cont’d:

    1 1

1

   

C C D

M i i e

 

M i i j e j j

D C

1

   

2 1 min

1       

 M i i e

D T   

slide-35
SLIDE 35

Example:

3

10 11 1       C De

11 1 1 2 3 2 2

6 1

      

 i i

bps C

j j j

11 10 11 1000

3

    

kbps) (in

j j j

C     

kbps C C C 6

4 2 1

  

kbps C 12

3 

kbps C C 2

6 5

 

 

 

2 3 2 6 1 min

11 16 10 11 1 1000 1 1                 

 i i e

D T   

sec 5 . 687 sec 16 11 m  

4

4 2 1

      9

3 

1

6 5

   

16  

kbps C 34  

23  

35

FLOWS

CAPACITIES

slide-36
SLIDE 36

E.2. Other cost functions

Approximation of actual cost structures

a. Logarithmic cost (quantity discount) CA is proportional

  • b. Power low (ARPANET study - 1970)

Lagrange multiplier (iterative solution required)

M i i i

C d D

1

log

i i i i

a b C       

M i i iC

d D

1 

1  

44 .  

 

2 1

  



 

i i i i

C g C

2 1

        

i i i

d g  

 

36

slide-37
SLIDE 37

E.3. Other forms of capacity assignment

  • Heuristic approaches based on the notion of the network

being “balanced” in some physically meaningful way E.3.a. All links in the network have the same avg. utilization Fix “a” by specifying the desired avg. utilization, e.g., Proportional CA

a Ci

i i

    

1   a

6 . 

i

 i

i

a C 1 

) 1 ( a Ma T   

37

 

M i i i i

C T

1

1    

slide-38
SLIDE 38

E.3.b. All links in the network have the same link delay

Fix “ ” by specifying the desired avg. delay for each link, e.g., Ti msec

     

i i i

C T 1

   1  

i i

C

 n T 

38

slide-39
SLIDE 39

Example:

Require all to be the same and that msec

3

12 

6

13 

1

23 

bits 200 1  

4

1 

2

2 

5

3 

i

T

110  T

1 . 1     n

sec 1 . sec 100    m n T 

2000 1  

kbps bps C 8 . 2 2800

1

 

kbps bps C 4 . 2 2400

2

 

kbps bps C . 3 3000

3

 

39

[msg/sec] [msg/sec]

slide-40
SLIDE 40
  • F. Flow Assignment (FA) problem

F.1. Given τ and {Ci}, minimize T with respect to {i} subject to capacity constraints, 0 i Ci, external traffic requirements {jk}, and flow conservation

 

M i i i i

C T

1

1   

40

slide-41
SLIDE 41

F.2. FA properties

1. Multicommodity-flow non-linear optimization problem 2. Closed-form solution not possible 3. Use iterative computational algorithm 4. Solution shall give both the amount of flows {i} and the corresponding

  • ptimal (minimum delay) routing for all commodities

5. T=T(1,2 …. M) is a convex function of the i’s 6. Capacity constraints, 0 i Ci, are convex 7. Fundamental theorem

1. Any minimum of a convex function over a convex set is the global minimum

8. Best known and most effective algorithm for solving this problem is the Flow Deviation (FD) algorithm 9. FD algorithm based on two basic notions:

  • a. “Shortest path” flows
  • b. Flow deviation which reduces minimization of T=T(1,2 …. M)
  • ver all the i simultaneously to minimization of T(a) where a is a scalar,

0 a1

41

slide-42
SLIDE 42

F.3. Shortest path flow part of FD

F.3.1. Link “length” , F.3.2. Problem statement subject to capacity, total flow, and commodity flow constraints (a) Linear programming problem (b) Many efficient algorithms available

i

l

i

C

i

 

2 

    

i i i i i

C C T l   

 M i i i

l

i

1

min 

i

l

42

slide-43
SLIDE 43

F.4. FD Algorithm

F.4.1. FD algorithm n=iteration index f(n)=(1

n,2 n …. M n) = flow vector on nth iteration

f(0)=initial feasible flow (see Kleinrock vol. II, pp. 344-345) a. Set n=0 b. Solve shortest-path flow problem with weigths li and let c. Set and find such that is minimized

c. Any search method is ok, e.g, Fibonacci search

  • d. If where is the accuracy

threshold, stop. Otherwise, set and return to Step 2.

       

 

n M n n n

    ,..., ,

2 1

 

 

   

n n n

a f a f    

1

1

1   a

 

 

1  n

f T

 

 

 

 

  

1 n n

f T f T

 

1   n n

43

slide-44
SLIDE 44

F.4.2. FD algorithm flow chart

Test ( accuracy threshold) (A) (B)

 

 

   

  

1 n n

f T f T

 

    

 

1 n n

f T f T

44

slide-45
SLIDE 45

F.5. FA Problem

F.5.1. Plausibility of FD algorithm Assume given and let Then, and Therefore, to minimize to within first

  • rder in a, it is necessary to choose the

such that is minimized.

 

n

f

 

 

n n n

a f a f    

1

1

 

 

 

 

     

 

n i n i M i n i n n

f f f T f T f T     

  

1 1 1

 

 

 

 

     

 

n i n i M i n i n n

f l a f T f T   

 

1 1

 

 

1  n

f T

 

n i

   

 M i n i n i

l

1

45

slide-46
SLIDE 46

F.5.2. Problem set-up example

Conservation of total avg. flow: If there were linearly independent, then the problem would be over.

     

 

4 1

1

i n i i n i n

C T   

13 12

    

13 12 2 1

      

12 4 3 1

      

13 4 3 2

      

13 12 2 1

      

12 4 3 1

      

46

slide-47
SLIDE 47
  • a. Shortest path flow subproblem

where subject to ( refers to ) and where for example

  • b. FD algorithm gives the and ,but not the

routing

 4 1

min

i i i

l

i

 

2 i i i i

C C l    

i

i

13 12 2 1

      

12 4 3 1

      

i i

C    

99 .  

i

min

T

47

slide-48
SLIDE 48
  • c. Extension to include commodity flow

Link 1: , Link 2: , Link 3: Link 4: Conservation of commodity flow: 6 eqns. of which 4 are linearly independent

12 12

u

13 12

u

12 13

u

12 32

u

13 23

u

13 13

u

13 12 12 12 1

u u   

13 13 12 13 2

u u   

13 23 3

u  

12 32 4

u  

12 12 13 12 12

  u u

13 13 23 13 13

  u u

13 13 13 13 12

  u u

12 12 32 12 12

  u u

13 23 13 12

u u 

12 13 12 32

u u 

48

slide-49
SLIDE 49
  • c. Extension to include commodity flow (cont.)

Shortest path flow subproblem where Subject to and FD algorithm gives , ,

13 12 12 12 1

u u   

13 13 12 13 2

u u   

13 23 3

u  

12 32 4

u  

12 12 13 12 12

  u u

13 13 23 13 13

  u u

13 13 13 13 12

  u u

12 12 32 12 12

  u u

 4 1

min

i i i

l

i

 

2 i i i i

C C l    

i i

C    

i

min

T

jk ab

u

49

slide-50
SLIDE 50
  • G. CFA Problem

G.1. Given τ, minimize T with respect to {Ci} and {i} subject to and 0 i Ci

where

Note: When we combine CA and FA, we are no longer able to give globally optimal solutions, but rather describe procedures that find local minima for T

M i i i

D C d

1

 

M i i i i

C T

1

1   

50

slide-51
SLIDE 51

G.2. Approach

  • a. Combine CA and FA algorithms
  • b. Since {Ci}’s have to be assigned, it can be

shown that fixed routing is optimal.

– This implies setting a=1 in the FD algorithm

  • c. It can also be shown that shortest path routing

gives only local minima for T.

51

– This means that several initial feasible flows f(0) must be tried

slide-52
SLIDE 52

G.3.Flow chart of CFA algorithm

52

slide-53
SLIDE 53
  • G. 4. Algorithm properties

a. Converges for each f(0) since the number of possible shortest-path flows is finite b. Since li≥0, there are no negative loops in the shortest- path flow algorithm c. The form of li that results from the “CA part” of algorithm is such that

– See Kleinrock’s Vol. 2, Eq. 5.45

– It implies that once i and Ci become zero, they remain there

d. Since only local minima are possible, one has to be clever in the f(0) that are used

 

 i

l

i

lim

53

) / ( ) / (

2 / 1 1 2 / 1 1

                         

 

  M j i i e i i i e M j i i i

d D d d D n T l       

slide-54
SLIDE 54
  • H. TCFA Problem (Dual Form)

H.1. Given node locations and {jk}, minimize

with respect to τ, {Ci} and {i} subject to and connectivity constraints.

Note: M = no. of links = variable! Note(2): in the slides µ is not reported (..normalized)

 

M i i i C

d D

1 MAX M i i i i

T C T    

1

1   

1)

  • N(N

M 1,2,...M      i Ci

i

54

slide-55
SLIDE 55

H.2. Approach

a. Real design requires selection of discrete capacities b. Heuristic solution procedure via iterative use of CFA and choices of τ c. Only local minima possible d. di(Ci)= termination cost + (line cost) x (length of line) expressed in $/month

 

 i i i i i

C d a C d  

55

slide-56
SLIDE 56

H.3. TCFA2 Problem

CBE (Concave Branch Elimination) Algorithm a. Select τ(0), e.g., fully-connected b. For each channel, assume a power-law approximation and choose di and αi in c. Execute the CFA2 (minimize D subject to constraint T=TMAX). At each iteration in CFA2, use a linearized value for capacity about the current value of flow. If at any step in CFA2, the connectivity constraint is violated, proceed to Step (d) with the previous step CFA2 results; otherwise, let CFA2 run to completion d. Discretize the {Ci } to the nearest actual line capacities available such that i<Ci and T≤TMAX

M i i i

i

C d D

56

slide-57
SLIDE 57

CBE Algorithm (continued)

  • e. Refine the flow assignment using the dual form of the FD

algorithm where and adjust the {Ci } accordingly so that i<Ci and T≤TMAX

  • f. Repeat Steps 3-5 for various feasible f(0)
  • g. Repeat Steps 1-6 for a number of different τ(0)

                

 i i MAX M j j j i i i

d T d d D l    

1

1

57

slide-58
SLIDE 58

ARPANET CBE Study

a. jk 1kbps over all possible jk pairs gives =650kbps

  • b. TMAX=200 msec
  • c. Connectivity = 2

d.

 

M i i i i

i

C d c D

1 

58

slide-59
SLIDE 59
  • e. Channel capacities and costs

59

slide-60
SLIDE 60
  • f. Results

1) 30 initial topologies studied 2) CBE algorithm required 1 to 2 seconds CPU time on 360/91 per topology 3) 0.8≤αi ≤ 1.0 provided good fit to capacity costs and CBE worked well for these values 4) Two best solutions on next slides

60

slide-61
SLIDE 61

Best Solution of ARPANET CBE

61

slide-62
SLIDE 62

a. Distribution of capacities vs. link lengths b. τ(0) was a fully-connected topology c. Solution has 61 channels d. Cost = $89,580/month

62

Best Solution of ARPANET CBE

slide-63
SLIDE 63

Second Best Solution of ARPANET CBE

63

slide-64
SLIDE 64
  • a. τ(0) was a low-connected topology
  • b. Both initial and final topologies had 29

channels

  • c. Uses higher speed lines (50 and 100kbps)

for medium and long distances; 230kbps for short distances

  • d. Cost = $ 94,288/month

Second Best Solution of ARPANET CBE (cont.)

64

slide-65
SLIDE 65

Convex Sets

  • A set S is said to be a convex set if, for any two

points in the set, the line joining those two points is also in the set

  • Mathematically, S is a convex set if for any two

vectors x(1) and x(2) in S, the vector

is also in S for any number between 0 and 1

Examples: Figures A.1 and A.2 represent convex sets, while Figure A.3 is not a convex set.

   

2 1

) 1 ( x x x     

65

slide-66
SLIDE 66

Theorem 1 The set of all feasible solutions to a linear programming problem is a convex set Theorem 2 The intersection of convex sets is a convex set (Figure A.4) Theorem 3 The union of convex sets is not necessarily a convex set (Figure A.4) Theorem 4 A hyperplane is a convex set Theorem 5 A half-space is a convex set

66

Theorems

slide-67
SLIDE 67
  • A convex combination of vectors x(1), x(2),…, x(k) is

a vector x such that

  • An “extreme point” or “vertex” of a convex set is a

point in the set that cannot be expressed as the midpoint of any two points in the set. For example, consider the convex set . This set has four extreme points given by (0,0), (0,2), (2,0), and (2,2)

     

k kx

x x x        

2 2 1 1

1

2 1

   

k

    for 

i

k i , , 2 , 1  

 

 

2 , 2 ,

2 2 1

     x x x x S

i

67

Vertex

slide-68
SLIDE 68
  • A hyperplane is the set of all points x satisfying

cx=z for a given vector c≠0 and a scalar z

– The vector c is called the normal to the hyperplane. – For example, is a hyperplane.

  • A half-space is the set of all points x satisfying

cxz or cx≥z for a given vector c≠0 and a scalar z  

 

5 3 2 , ,

3 2 1 3 2 1

    x x x x x x H

68

Hyperplane & Half Space

slide-69
SLIDE 69

Convex Function

A function of n variables f(x) defined on a convex set D is said to be a convex function if and only if for any two points x(1) and x(2) D and 0 i 1,

 

   

 

 

  

 

 

2 1 2 1

1 1 x f x f x x f         

The figure illustrates the definition of a convex function of a single variable.

69

slide-70
SLIDE 70

Properties of Convex Functions

a. The chord joining any two points on the curve always falls entirely on or above the curve between those two points b. The slope or first derivative of f(x) is increasing or at least non-decreasing as x increases c. The second derivative of f(x) is always non-negative for all x in the interval d. The linear approximation of f(x) at any point in the interval always underestimates the true function value e. For a convex function, a local minimum is always a global minimum

70

slide-71
SLIDE 71

Figure A.6 illustrates property 4

71

slide-72
SLIDE 72

Figure A.6 illustrates property 4

The linear approximation of f(x) at the point x0, denoted by , is obtained by ignoring the second and other higher

  • rder terms in the Taylor’s series expansion

For a convex function, property 4 implies that for all x The gradient of a function f(x1,…xn) is given by The Hessian matrix of a function f(x1,…xn) is an nxn symmetric matrix given by

 

; ~ x x f

      

; ~ x x x f x f x x f    

 

    

x x x f x f x f    

 

       

n n

x f x f x f x x f       ,..., , ,...,

2 1 1

 

f x x f x x H

j i n f 2 2 1,...,

             

72

slide-73
SLIDE 73

Backup slides

73

slide-74
SLIDE 74

Example:

Require all Ti to be the same and that msec

3

12 

6

13 

1

23 

bits 200 1  

4

1 

2

2 

5

3 

110  T

74

[msg/sec] [msg/sec]

1 . 1     n

sec 1 . sec 100    m n T 

2000 1  

kbps bps C 8 . 2 2800

1

 

kbps bps C 4 . 2 2400

2

 

kbps bps C . 3 3000

3

 

slide-75
SLIDE 75

FA Problem Example:

Ground network and satellite system Determination of T includes 0.5 sec. Assumed propagation delay for each of the three satellite links.

3

42 

C

2

34 

C

2

32 

C

3

24 

C

5 . 2

13 

C

3

12 

C

51 . 1

12 

 17 .

42 

 66 .

34 

 83 .

32 

 51 . 1

24 

 49 .

13 

51 . 1  T

75