Professional Documents
Culture Documents
Objectives
&. 'ontrast the inefficiency of a brute-force techni#ue (full broadcast) with more efficient techni#ues( node-directed broadcast ) channel-directed broadcast. *. +emonstrate use of the !broadcast uni#ue" feature and dynamic receiver groups.
Model Overview
The network model consists of base-station nodes and mobile nodes. Because we are primarily considering uplink transmissions the mobile acts as a traffic source and the base station acts as a sink. The base station has ten receiver channels. ,nly the first channel is eligible to receive transmissions from the mobile. Three scenarios are studied in this lab( !-ull Broadcast"( The network is set up so that all receiver channels (both mobile and base) process packets. !Broadcast .ni#ue"( /n this scenario only the receiver channels at the base process packets. !+ynamic 01group"( /n this scenario the packet is processed only by the first channel at the base that can successfully demodulate and decode it.
The !full broadcast" scenario is used as a baseline%it has already been set up and is ready to run. -or the ne1t two scenarios the code will be modified to enable the two efficiency techni#ues.
CONFIDENTIAL INFORMATION: DO NOT DISCLOSE, FORWARD, DISTRIBUTE, SHARE, OR MAKE COPIES OF THIS DOCUMENT IN WHOLE OR IN PART. Copyrigh !""# OPNET T$%h&o'ogi$(, I&%.
P)g$ * o+ !,
Simulate the Performance of Full Broadcast &. Start ,234T 5odeler if not already running. ,pen the pro6ect OPNK_1530. The pro6ect ,2378&9:;8ref is available if you want to !follow along" without actually carrying out the lab procedure.
CONFIDENTIAL INFORMATION: DO NOT DISCLOSE, FORWARD, DISTRIBUTE, SHARE, OR MAKE COPIES OF THIS DOCUMENT IN WHOLE OR IN PART. Copyrigh !""# OPNET T$%h&o'ogi$(, I&%.
P)g$ ! o+ !,
:. :. Select statistics for collection( a. -rom the menu bar choose DES > Choose Individual Statistics. b. Select the !Traffic 0eceived (packets<sec) statistic under Global !"a##ic Sin$% c. 'lick ,7.
=. 0un the simulation using the key se#uence Ct"l&Shi#t&' ,0 click on the Con#i(u"e 'un Disc"ete Event Si)ulation button and click 'un%
CONFIDENTIAL INFORMATION: DO NOT DISCLOSE, FORWARD, DISTRIBUTE, SHARE, OR MAKE COPIES OF THIS DOCUMENT IN WHOLE OR IN PART. Copyrigh !""# OPNET T$%h&o'ogi$(, I&%.
P)g$ - o+ !,
9. When the simulation is complete note the number of events and time taken before closing the window.
CONFIDENTIAL INFORMATION: DO NOT DISCLOSE, FORWARD, DISTRIBUTE, SHARE, OR MAKE COPIES OF THIS DOCUMENT IN WHOLE OR IN PART. Copyrigh !""# OPNET T$%h&o'ogi$(, I&%.
P)g$ # o+ !,
3umber of events simulated( 88888888888888 Time taken( 8888888888888 >. 3ote the number of packets received by the base station( a. 'lick on the *ide Sho+ G"a,h Panels button to open an empty template.
b. 0ight-click on the empty panel and choose -oad Data Into !e),late from the pop-up menu. c. ?ppro1imately @; packets<sec are received on an average.
Simulate the Performance of Node-Directed Broadcast /n the previous scenario all receivers in the network%the base station and all mobiles%received a transmission from the transmitting mobile. The packets were filtered out only after all the pipeline stages were e1ecuted. /n this ne1t approach we use the !broadcast uni#ue" property of a packet to limit the eligible receiver channels so that only the base station channels receive the packet. &. +uplicate the current scenario( a. .se Ct"l&Shi#t&D or choose Scena"io > Du,licate Scena"io from the menu bar. b. 3ame the new scenario !bcast8uni#ue".
CONFIDENTIAL INFORMATION: DO NOT DISCLOSE, FORWARD, DISTRIBUTE, SHARE, OR MAKE COPIES OF THIS DOCUMENT IN WHOLE OR IN PART. Copyrigh !""# OPNET T$%h&o'ogi$(, I&%.
P)g$ . o+ !,
*. 5ake code modifications to enable the efficiency approaches( a. +ouble-click on any mobile node. b. +ouble-click on the channel access module to open the underlying process model(
c. Study the code in the e1it e1ecutives of the !Send 0?'A" state (double-click on the bottom half of the state). d. .ncomment the code between lines 9 and :; by deleting the #if 0 and #endif statements. :. 'ode review( a. 3otice that the state variable !SB8+0C" is used to decide whether dynamic receiver groups must be used or the broadcast uni#ue property of the packet must be set. b. 3otice that the dynamic receiver groups are set by a call to opnk_drg_set() (we will look at this function in the ne1t part of the lab). c. The state variable !SB8+0C" gets its value from a simulation attribute called !4fficiency 5ode". (Where is this doneD) d. Save the changes and close the editor ('trl-S) ,0 choose .ile > Save% e. 'ompile the modified code by clicking the 'ompile button in the 2rocess 4ditor.
CONFIDENTIAL INFORMATION: DO NOT DISCLOSE, FORWARD, DISTRIBUTE, SHARE, OR MAKE COPIES OF THIS DOCUMENT IN WHOLE OR IN PART. Copyrigh !""# OPNET T$%h&o'ogi$(, I&%.
P)g$ / o+ !,
=. 'onfigure and run the simulation. a. 'lose the 2rocess 4ditor and 3ode 4ditor windows. b. /n the 2ro6ect 4ditor use either Ct"l&' ,0 click on the Con#i(u"e 'un Disc"ete Event Si)ulation button. c. 41pand In,uts in the tree view window and select Global /tt"ibutes. d. Berify that !4fficiency 5ode" is set to !3ode Specific". e. 'lick on !4fficiency 5ode" to select it then click on Details to see the meaning of each mode.
f. 'lick 'un to run the simulation. 9. 3ote the number of events and the time taken before closing the window(
CONFIDENTIAL INFORMATION: DO NOT DISCLOSE, FORWARD, DISTRIBUTE, SHARE, OR MAKE COPIES OF THIS DOCUMENT IN WHOLE OR IN PART. Copyrigh !""# OPNET T$%h&o'ogi$(, I&%.
P)g$ 0 o+ !,
3umber of events simulated( 88888888888888 Time taken( 8888888888888 >. ,bserve the number of packets received in this scenario( a. 'lick on the *ide Sho+ G"a,h Panels button to bring up the previous result. b. 0ight-click on the panel and choose 0a$e G"a,h !e),late% c. 0ight-click on the panel again and choose -oad Data Into !e),late% d. ?ppro1imately @; packets<sec are received on an average.
CONFIDENTIAL INFORMATION: DO NOT DISCLOSE, FORWARD, DISTRIBUTE, SHARE, OR MAKE COPIES OF THIS DOCUMENT IN WHOLE OR IN PART. Copyrigh !""# OPNET T$%h&o'ogi$(, I&%.
P)g$ , o+ !,
Simulate the Performance of Channel-Directed Broadcast /n the previous scenario all the channels at the base station received each transmission. This might be a valid model for some systems where the mobiles do not know which channel at the base is available. Eou will ne1t model a scenario in which only one channel at the base station is the intended receiver for the transmission. /n such a scenario the receiver group must be limited to e1actly one channel. .se the dynamic receiver groups feature to implement this model. &. +uplicate the scenario( a. .se (Ct"l&Shi#t&D) ,0 choose Scena"io > Du,licate Scena"io% b. 3ame the new scenario !dynamic8r1group".
*. 'ode review( a. ?s noted earlier the dynamic receiver groups are set through a function opnk_drg_set(). b. ,pen e1ternal source file opnk8&9:;8phy8sup.e1.c.
CONFIDENTIAL INFORMATION: DO NOT DISCLOSE, FORWARD, DISTRIBUTE, SHARE, OR MAKE COPIES OF THIS DOCUMENT IN WHOLE OR IN PART. Copyrigh !""# OPNET T$%h&o'ogi$(, I&%.
P)g$ 1 o+ !,
c. 'hoose .ile > O,en% d. Select E1te"nal Sou"ce 2C Code3 from the pull-down menu. e. Select opnk8&9:;8phy8sup.e1.c and click OK%
g. The receiver group comprises only one channel from the base station%all other channels at the base station will not receive the transmission. h. 'lose the editor window.
CONFIDENTIAL INFORMATION: DO NOT DISCLOSE, FORWARD, DISTRIBUTE, SHARE, OR MAKE COPIES OF THIS DOCUMENT IN WHOLE OR IN PART. Copyrigh !""# OPNET T$%h&o'ogi$(, I&%.
P)g$ *" o+ !,
:. 'onfigure and run the simulation. a. /n the 2ro6ect 4ditor use either Ct"l&' ,0 click on the Con#i(u"e 'un Disc"ete Event Si)ulation button. b. 41pand In,uts in the tree view window and select Global /tt"ibutes. c. Set the !4fficiency 5ode" attribute to !'hannel Specific". d. 0un the simulation by clicking on 'un%
=. When the simulation is complete note the number of events and time taken before closing the window(
CONFIDENTIAL INFORMATION: DO NOT DISCLOSE, FORWARD, DISTRIBUTE, SHARE, OR MAKE COPIES OF THIS DOCUMENT IN WHOLE OR IN PART. Copyrigh !""# OPNET T$%h&o'ogi$(, I&%.
P)g$ ** o+ !,
3umber of events simulated( 88888888888888 Time taken( 8888888888888 9. 'ompare results from all three scenarios( a. 0ight-click in the workspace and choose 4ie+ 'esults. b. Select Global Statistics !"a##ic Sin$ !"a##ic 'eceived. c. Select Ove"laid Statistics5 ave"a(e and /ll Scena"ios from the corresponding pull-down menus. d. 'lick Sho+.
CONFIDENTIAL INFORMATION: DO NOT DISCLOSE, FORWARD, DISTRIBUTE, SHARE, OR MAKE COPIES OF THIS DOCUMENT IN WHOLE OR IN PART. Copyrigh !""# OPNET T$%h&o'ogi$(, I&%.
P)g$ *! o+ !,
e. ,bserve that the number of packets received successfully is the same in each case. f. 'ompare the number of events simulated and the time taken in each case.
CONFIDENTIAL INFORMATION: DO NOT DISCLOSE, FORWARD, DISTRIBUTE, SHARE, OR MAKE COPIES OF THIS DOCUMENT IN WHOLE OR IN PART. Copyrigh !""# OPNET T$%h&o'ogi$(, I&%.
P)g$ *- o+ !,
Conclusions
The number of events is large when a copy of a transmitted packet is received by all eligible channels. (The simulation time is also correspondingly high.) .se of a packetGs broadcast uni#ue property or dynamic receiver groups should be based on the number of channels at the receiving node. +ynamic receiver groups is the most efficient method to limit the amount of processing that occurs at a receiver. Aowever the transmission does not result in any interference to other receivers in the last case. Therefore there is a trade-off between efficiency and level-of-detail in the model.
END OF LA 1
CONFIDENTIAL INFORMATION: DO NOT DISCLOSE, FORWARD, DISTRIBUTE, SHARE, OR MAKE COPIES OF THIS DOCUMENT IN WHOLE OR IN PART. Copyrigh !""# OPNET T$%h&o'ogi$(, I&%.
P)g$ *# o+ !,
Objective
&. +evise a simple techni#ue to store the highest level of interference e1perienced during reception of a packet. *. :. /llustrate the use of custom T+?s. Show how output statistics can be written from pipeline stages.
Model Overview
The inoise pipeline stage is invoked each time a new interfering packet starts reception at the receiver. 'ompare the interference level computed at each invocation to a ma1imum value stored in a T+?. /f the interference level calculated upon invocation is higher update the ma1imum value stored. Aowever you must ensure that the value of the custom T+? is initialiHed correctly. The power stage can be modified for this initialiHation. ?t the end of packet reception write the value of the custom T+? to the !5a1 /nterference" statistic. -or this purpose use the ecc stage. Radio Receiver Configuration at the Base Station &. Switch to scenario !ma18int8power". a. 'hoose Scena"io > S+itch !o Scena"io. b. Select ma18int8power.
CONFIDENTIAL INFORMATION: DO NOT DISCLOSE, FORWARD, DISTRIBUTE, SHARE, OR MAKE COPIES OF THIS DOCUMENT IN WHOLE OR IN PART. Copyrigh !""# OPNET T$%h&o'ogi$(, I&%.
P)g$ *. o+ !,
*. ,pen the node model for the base station. a. +ouble-click on the Base Station node.
:. $ook at the receiver attributes power model inoise model and ecc model. a. 0ight-click on the receiver module rr_0 and choose Edit /tt"ibutes. b. 41amine the power model inoise model and ecc model attributes. c. 'lick Cancel when done.
CONFIDENTIAL INFORMATION: DO NOT DISCLOSE, FORWARD, DISTRIBUTE, SHARE, OR MAKE COPIES OF THIS DOCUMENT IN WHOLE OR IN PART. Copyrigh !""# OPNET T$%h&o'ogi$(, I&%.
P)g$ */ o+ !,
=. 2ower pipeline stage code review and compilation( a. .sing the 2ipeline Stage 4ditor open the power stage. b. 'hoose .ile > O,en. c. Select Pi,eline Sta(e 2C code3% d. Select opnk8dra8power. e. ,bserve the block of code starting at line =I. f. The code is used to initialiHe the custom T+? ,237'8T+?85?J8/3,/S4. This T+? is defined as ,2'8T+?80?85?J8/3+4J K & on line &>. g. .ncomment the code as directed.
CONFIDENTIAL INFORMATION: DO NOT DISCLOSE, FORWARD, DISTRIBUTE, SHARE, OR MAKE COPIES OF THIS DOCUMENT IN WHOLE OR IN PART. Copyrigh !""# OPNET T$%h&o'ogi$(, I&%.
P)g$ *0 o+ !,
h. Save and compile the file. 9. /noise pipeline stage code review and compilation( a. .sing the 2ipeline Stage 4ditor open the inoise stage. b. 'hoose .ile > O,en. c. Select Pi,eline Sta(e 2C code3% d. Select opnk8dra8inoise. e. ,bserve the blocks of code at lines >9 and @I. f. This code compares the value of the current interference level to the ma1imum observed level and stores a new ma1imum value if necessary.
CONFIDENTIAL INFORMATION: DO NOT DISCLOSE, FORWARD, DISTRIBUTE, SHARE, OR MAKE COPIES OF THIS DOCUMENT IN WHOLE OR IN PART. Copyrigh !""# OPNET T$%h&o'ogi$(, I&%.
P)g$ *, o+ !,
g. .ncomment the code as directed. h. Save and compile the file. >. .sing the 2ipeline Stage 4ditor open the ecc stage a. 'hoose .ile > O,en. b. Select Pi,eline Sta(e 2C code3% c. Select opnk8dra8ecc. d. Study the code starting at line :I.
CONFIDENTIAL INFORMATION: DO NOT DISCLOSE, FORWARD, DISTRIBUTE, SHARE, OR MAKE COPIES OF THIS DOCUMENT IN WHOLE OR IN PART. Copyrigh !""# OPNET T$%h&o'ogi$(, I&%.
P)g$ *1 o+ !,
e. This code retrieves and records the ma1imum interference level as a statistic. f. .ncomment the code as directed (lines :9 and =9). g. Save and compile the file. I. 0eview code that initialiHes the statistic. a. 0eopen the e1ternal code opnk8&9:;8phy8sup.e1.c. b. $ook at functions opnk_bs_chan_info_init() opnk_intf_stat_write() and opnk_max_intf_stat_write().
CONFIDENTIAL INFORMATION: DO NOT DISCLOSE, FORWARD, DISTRIBUTE, SHARE, OR MAKE COPIES OF THIS DOCUMENT IN WHOLE OR IN PART. Copyrigh !""# OPNET T$%h&o'ogi$(, I&%.
P)g$ !" o+ !,
Configure and Run Simulation; Observe Results &. 'hange the modulation on all but one mobile. a. 0ight-click on a mobile station (5S) and choose Select Si)ila" Nodes% b. Aold down the control key and click on node8; (to unselect it). c. 0ight-click on one of the other 5S nodes and select Edit /tt"ibutes. d. Select /,,l6 chan(es to selected ob7ects in the ?ttributes dialog bo1.
e. Set the modulation to !msk" and click OK% ? message !F ob6ects changed" appears on the status bar. Because of this change all nodes e1cept node8; will generate interference packets (marked as !3,/S4") because the base station e1pects !bpsk" modulation. *. 0un the simulation. a. .se Ct"l&Shi#t&' or click on the Con#i(u"e 'un Disc"ete Event Si)ulation button and press Ente".
CONFIDENTIAL INFORMATION: DO NOT DISCLOSE, FORWARD, DISTRIBUTE, SHARE, OR MAKE COPIES OF THIS DOCUMENT IN WHOLE OR IN PART. Copyrigh !""# OPNET T$%h&o'ogi$(, I&%.
P)g$ !* o+ !,
b. 'lose the window after the simulation is done. :. ,bserve the ma1imum interference statistic. a. 'lick on the *ide Sho+ G"a,h Panels button to open a template. b. 0ight-click on the panel and choose -oad data into te),late%
Conclusions
'ustom T+?s can be used to store special values of interest. !State" information associated with a packet can be stored using T+?s to pass intermediate values from on-going calculations between pipeline stages. 41isting pipeline stages can be enhanced with minor modifications to generate useful link statistics using the following steps( +efine statistic handles as static variables in an e1ternal file. 'all a statistic registration function from a process model that declares the statistic. 'all statistic-recording functions from pipeline stages to write the statistic.
!
END OF LA
CONFIDENTIAL INFORMATION: DO NOT DISCLOSE, FORWARD, DISTRIBUTE, SHARE, OR MAKE COPIES OF THIS DOCUMENT IN WHOLE OR IN PART. Copyrigh !""# OPNET T$%h&o'ogi$(, I&%.
P)g$ !! o+ !,
Objective
'ompare two methods of monitoring pilot channels( Schedule regular interrupts to make measurements. 0eceive notification from kernel when measurement is necessary.
Model Overview
Set up a module with a process that performs a signal strength calculation when interrupted. This module must reside on the mobile node permitting periodic evaluation of distance from the base station. The calculation can be initiated either by self-interrupts or by a remote interrupt from the kernel. .se a simulation attribute to decide which method is used run simulations for both cases and compare performance. Model Configuration and Code Revie &. Switch to scenario !pilot8ch8timed8reg". a. 'hoose Scena"io > S+itch !o Scena"io. b. Select !pilot8ch8timed8reg". *. +rill down to the module in which the process model that monitors the pilot resides( a. +ouble-click on any mobile station node. (The 3ode 4ditor opens.) b. +ouble-click on the module !2ilot 5on". (The 2rocess 4ditor opens.) :. ,bserve the code in the following e1ecutives( a. /nit 4nter 41ecs (to open double-click on the top-half of the /nit state). b. $oc .pdate 4nter 41ecs (to open double-click on the top-half of the $oc .pdate state). c. $oc .pdate 41it 41ecs (to open double-click on the bottom-half of the $oc .pdate state).
CONFIDENTIAL INFORMATION: DO NOT DISCLOSE, FORWARD, DISTRIBUTE, SHARE, OR MAKE COPIES OF THIS DOCUMENT IN WHOLE OR IN PART. Copyrigh !""# OPNET T$%h&o'ogi$(, I&%.
P)g$ !- o+ !,
Configure and Run Simulations for ! o Scenarios &. 'onfigure the simulation for the !self-interrupt" method( a. /n the 2ro6ect 4ditor use either Ct"l&' ,0 click on the Con#i(u"e 'un Disc"ete Event Si)ulation button. b. 41pand In,uts in the tree view window and select Global /tt"ibutes. c. Berify that !$ocation .pdate 5ethod" is set to !Timed 0egular". d. 'lick Cancel%
CONFIDENTIAL INFORMATION: DO NOT DISCLOSE, FORWARD, DISTRIBUTE, SHARE, OR MAKE COPIES OF THIS DOCUMENT IN WHOLE OR IN PART. Copyrigh !""# OPNET T$%h&o'ogi$(, I&%.
P)g$ !# o+ !,
*. +uplicate the current scenario. a. 'hoose Scena"io > Du,licate Scena"io. b. 3ame the new scenario !pilot8ch8kernel8notif". :. 'onfigure the simulation for the !7ernel notification" method. a. /n the 2ro6ect 4ditor either press Ct"l&' ,0 click on the Con#i(u"e 'un Disc"ete Event Si)ulation button. b. 41pand In,uts in the tree view window and select Global /tt"ibutes. c. Set !$ocation .pdate 5ethod" to !7ernel 3otification". d. 'lick /,,l6 followed by Cancel%
CONFIDENTIAL INFORMATION: DO NOT DISCLOSE, FORWARD, DISTRIBUTE, SHARE, OR MAKE COPIES OF THIS DOCUMENT IN WHOLE OR IN PART. Copyrigh !""# OPNET T$%h&o'ogi$(, I&%.
P)g$ !. o+ !,
=. 0un two scenarios in se#uence. a. 'hoose Scena"ios > 0ana(e scena"ios% b. Select Lcollect resultsM for the two scenarios of interest%pilot8ch8timed8reg and pilot8ch8kernel8notif . c. 'lick OK%
CONFIDENTIAL INFORMATION: DO NOT DISCLOSE, FORWARD, DISTRIBUTE, SHARE, OR MAKE COPIES OF THIS DOCUMENT IN WHOLE OR IN PART. Copyrigh !""# OPNET T$%h&o'ogi$(, I&%.
P)g$ !/ o+ !,
CONFIDENTIAL INFORMATION: DO NOT DISCLOSE, FORWARD, DISTRIBUTE, SHARE, OR MAKE COPIES OF THIS DOCUMENT IN WHOLE OR IN PART. Copyrigh !""# OPNET T$%h&o'ogi$(, I&%.
P)g$ !0 o+ !,
*. 'lick on the *ide Sho+ G"a,h Panels button to open a template. :. 0ight-click on the panel and choose -oad Data Into !e),late%
=. 3otice how when interrupts are timed regularly the pilot channel power is tracked closely. Aowever the pilot channel power is only !sampled" when needed when the !kernel notification" mode is used.
Conclusions
The mobility callbacks can be used when certain location-related calculations need to be performed only when there is an event of interest. The efficiency increase by use of such callbacks depends on the amount of processing that is performed at each 6uncture.
$
END OF LA
CONFIDENTIAL INFORMATION: DO NOT DISCLOSE, FORWARD, DISTRIBUTE, SHARE, OR MAKE COPIES OF THIS DOCUMENT IN WHOLE OR IN PART. Copyrigh !""# OPNET T$%h&o'ogi$(, I&%.
P)g$ !, o+ !,