A SIMULATION MODEL FOR STREAMING APPLICATIONS OVER A POWER-MANAGEABLE WIRELESS LINK
|
|
- Alfred Hunt
- 5 years ago
- Views:
Transcription
1 A SIMULATION MODEL FOR STREAMING APPLICATIONS OVER A POWER-MANAGEABLE WIRELESS LINK Andrea Acquaviva Emanuele Lattanzi Alessandro Bogliolo ISTI - University of Urbino Piazza della Repubblica Urbino, Italy acquaviva,lattanzi,bogliolo sti.uniurb.it Luca Benini DEIS - University of Bologna Viale Risorgimento 2 Bologna, 4136, Italy lbenini deis.unibo.it KEYWORDS Multimedia, Event-Oriented, Resource Management, Real- Time, Simulators. ABSTRACT In this work we introduce a hardware-validated simulation model for the exploration of real-time multimedia systems, where system components are modeled as interacting generalized semi-markov processes (GSMPs). We apply the simulation model to explore the design space of a mobile client accessing streaming data through a wireless network. The model has been characterized and validated against power and performance measurements performed on an instrumented HP s ipaq with wireless LAN running a MPEG4 video application. We analyze the impact of tuning parameters for the real-time multimedia system (buffer sizes, channel bandwidth, power management policy) on the trade off between power consumption and QoS. INTRODUCTION One of the most critical challenges in designing wireless multimedia systems is to provide adequate quality of service (QoS) with optimal energy efficiency. In many cases, there are obvious trade offs between quality of service (e.g., bandwidth, latency) and power consumption. To avoid poorly controlled QoS degradation, multimedia systems are often designed and managed in a conservative fashion, with little consideration for energy efficiency. QoS modeling of wireless networked systems (Cali et al., 1998; Eshghi & Ekhakeem, 1998) is a mature and highly active discipline (refer to (MSWIM, 22) for an up-to-date overview of the topic), and various approaches have been explored to enhance QoS-oriented models with power consumption models (Raghunathan et al., 22; Sinha & Chandrakasan, 21; Marculescu et al., 21; Krashinski & Balakrishnan, 22; Zorzi & Chockalingam, 1998). Most of the approaches explored in the past adopted a stochastic discrete event model (Lee & Sangiovanni-Vincentelli, 1998), where the system evolves in an enumerable set of time instants and transitions are randomized. Our work moves from this widely adopted modeling framework and pushes it one step closer to practice. We present two original contributions. First, we developed, consistently with previous work, a detailed stochastic discrete-event model of a complex multimedia system. Our model includes all hardware and software components involved in communication of multimedia data over a wireless channel: application software, transport and network stack, operating system drivers, power management software, network interface card hardware, wireless channel, base station hardware and software. Many of the model components are parameterized, in an effort to represent a large design space of different hardware and software configurations. Second, we have fully characterized the power and performance metrics in the model with experimental measurements on fully operational real-life hardware and software. As a result, our model is detailed enough to represent a number of complex effects that impact power and quality of service in real-life multimedia systems, while at the same time our characterization flow is precise enough to obtain power and performance estimates that closely match the measured data. Our results demonstrate that the performance and energy consumption of a multimedia system are deeply influenced by a number of interacting hardware and software components, and that focusing only on a part of the system (e.g., the wireless channel or the operating system), could lead to serious design pitfalls. MODELING POWER-MANAGEABLE REAL-TIME MULTI- MEDIA SYSTEMS At the high level of abstraction, electronic systems exhibit different operating modes and make transitions among them at discrete points in time. Hence, they can be suitably represented as Discrete event systems (DES) (Cassandras, 1993). We model real-time power-manageable systems as DES composed of interacting state machines. Each component has a state structure that represents its operating modes and the transitions among them. State transitions are triggered by events
2 that can be either generated within the component according to some distribution (internal events) or received in input (external events). The number of states of the model of each component may be finite, discrete, or continuous. Infinity states are modeled by means of a finite number of parameterized states. The evolution of the system is described by specifying next-event and next-state functions for each component. Next-event function determines the next triggering event generated by the component, while next-state function determines the destination state of next transition. We model each component as a generalized semi Markov process (GSMP) with non-deterministic next-event and next-state functions based on conditional residual-time distributions and on conditional next-state probabilities (Glynn, 1989). Any GSMP component is composed of a state structure and a clock structure. The state structure component is a Stateflow model that takes in input both internal events (generated by the local clock structure) and external events (coming from an input port) and generates a timeout value corresponding to the residual time of the next triggering event. The clock structure takes in input a timeout and a reset signal and generates an event when the timeout has elapsed. The interface of the component is specified by means of input/output ports, used to exchange both events and parameter values. The interaction among multiple GSMP components is simply obtained by connecting their input/output ports, as shown in Figure 1. Additional output signals can be used to observe the system behavior, to evaluate cost/performance metrics and to exchange data among modules. Figure 2. State diagram of the powermanageable NIC. STREAMING VIDEO OVER AN IEEE 82.11b LINK The video server runs on a notebook computer directly connected to an access point (AP) through a dedicated wired link. The AP acts as a bridge to the wireless network interface card (NIC) installed on a HP s IPAQ palmtop. The palmtop runs the client MPEG4 decoder that reads, buffers, elaborates and plays-back at a constant rate (consumer rate) the video information read from the network. In order to match real-time video constraints, the client application buffer should be never empty when the decoder looks for a frame to decode. If this happens, a deadline miss occurs. Without any power control, the shape of the traffic on the wireless channel reflects the server transmission rate. If the 82.11b MAC-level protocol power management (LAN/MAN Standards Committee of the IEEE Computer Society, 1999) is enabled, the AP performs traffic reshaping by bufferizing incoming packets to allow the NIC to sleep for a determined period of time. In this period, energy can be saved by the wireless interface. After the expiration of the sleeping period, the card wakes up and asks to the AP if there are packets accumulated to be received. If this is the case, the AP sends the back-log to the card. The traffic reshaping function performed by AP imposes bufferization both at producer and consumer sides. Model The block diagram of the Simulink model of the system is shown in Figure 1. Producer. The producer generates output events (representing network packets) according either to a given distribution of inter-arrival times, or to a trace of time-stamped packet information. For each packet, three properties are either randomly generated or read from the trace: the size (in bytes), the frame it belongs to, and the total number of packets representing the same frame. Packets belonging to the same frame are generated as a burst, while packets belonging to different frames are generated at a rate depending on the application. Packet information is made available at the output ports, together with the event that represents the generation of a new packet. Base station buffer. Packet events generated by the producer become input events for the buffer of the base station, which is explicitly represented in the model as a limited FIFO queue with a customizable size. The content of the queue is saved in memory as an array of packets each with the corresponding information (size, frame number, packet per frame). If the producer tries to send a packet and the queue is full, a lost event is generated and the corresponding packet is discarded. Base station. The base station (AP) gets the packets from the queue and send them to the wireless channel. If the input buffer is empty or the receiver in not ready, the AP goes to a waiting state. If the receiver is sleeping because of DPM, the AP goes to an idle state, causing incoming packets to accumulate in the input buffer. Wireless Channel. The wireless channel is represented by a block that receives input events representing incoming packets and generates, with a given latency, output events representing packet delivery. The wireless channel is bidirectional and it has a user-defined packet-loss probability. Lost packets are not delivered to the receiver. Notice that we use a simple channel model since we are interested in modeling the entire wireless system, rather than the wireless channel by itself. Channel latency, loss probability and bandwidth (implicitly modeled by the receiver) are sufficient to perform realistic system-level simulations. Nevertheless, any channel model (Chong, 23) can be easily embedded in this block to take into account complex error statistics. Wireless Network Card. This is the most critical block of the system, since its power consumption is critical for the battery lifetime of the palm-top. The state diagram is reported in Figure 2. It consists of 5 states: idle, waking up, waiting,
3 Figure 1. Simulink model of the streaming application over a wireless channel. stant rate. Rather, the consumer decides how many packets to read within a frame period based on the information associated with the incoming packets. Frames that either arrive late with respect to the deadline or are incomplete because of a packet loss are discarded by the consumer. EXPERIMENTAL RESULTS To perform our characterization experiments, we used a HP s IPAQ palmtop computer. With the IPAQ, we used two different wireless network interface cards for our experiments, CISCO Aironet 35 Series (Cisco System, Cisco Aironet 35 Series Wireless LAN Adapters, 23) and COMPAQ WL11 (HP WL11, 23), hereafter denoted by CISCO and COMPAQ, respectively. The power consumption of the NICs was Idle - PM ON Receiving - PM ON Receiving - PM OFF 2 CISCO COMPAQ receiving, acknowledge. The card is normally waiting. When an incoming packet is detected, the card goes into the receiving state and generates a busy output event to indicate that it cannot receive more packets until the actual one has been processed. The card remains in the receiving state for a time interval that is dynamically computed as the ratio between the size of the packet (including the payload and the protocol overhead) and the bandwidth of the channel. After each packet has been completely received, the NIC takes some time to process the packet at the MAC level and then sends an acknowledge back to the AP through the wireless channel. After the acknowledge packet has been sent, the NIC goes back to the waiting state until the next packet arrives. The timing diagram of the wireless channel is shown in Figure 4. When the power management is enabled, the card can go from the waiting state to a low-power idle state. In our model, this transition is triggered by an input event generated by an external power manager, described later in this section. Wake-up from idle is triggered by the power manager when a determined sleep time has elapsed. Wake up transitions may take a non-negligible amount of time and power, modeled by a separate state. Power Manager. The power manager does not represent a hardware unit, but the model of the actual implementation of the power management protocol of the 82.11b standard (LAN/MAN Standards Committee of the IEEE Computer Society, 1999). Based on external settings (that can be decided by the user), the power manager generates output events (ShutDown and WakeUp) to notify the beginning and ending of sleeping periods. After the card has been woken-up, it starts to receive packets accumulated by the AP. After each received packet, the power manager resets a timeout counter. If the timeout expires before the reception of a new packet, the card is put again in the idle state by means of a ShutDown event. Output Buffer. This block represents the bufferization performed by the consumer. It can be used to model either the protocol stack buffer or the application buffer (if present). More levels of buffering can be added. In our case we decided to represent only the UDP protocol buffer, since the application buffer is usually larger and less critical. Consumer. The consumer simulates a streaming application that reads packets from the output buffer at a given rate. Since real-time constraints impose a constant frame rate, but each frame may be encoded using a different number of packets, packet requests from the consumer do not arrive at a con Figure 3. Current profiles obtained under different workload and DPM conditions. measured using a Sycard Card Extender that allowed us to monitor the time behavior of the supply current drawn by the cards. Characterization We performed three sets of experiments to characterize: i) the power states of each NIC, ii) the effective bandwidth of the wireless channel and iii) the buffer size of the base station. Power States. The power states of the NIC were characterized in terms of power consumption and transition time by looking at the power profiles under different workload conditions and DPM settings. Typical results are shown in Fig-
4 Wait Rx Tx Sleep WakeUp CISCO COMPAQ Table 1. Power consumption of the NICs in mw ure 3. The power consumption of CISCO is higher than that of COMPAQ in all states (sleep, idle, receiving, transmitting) but during wake up. Moreover, differently from COMPAQ, CISCO has a non-negligible wake-up time. As for performance, COMPAQ has a slower reaction to incoming packets, as shown in the right-most graphs of Figure 3 obtained while receiving the same burst of packets. Both cards stay idle for a very short time among packets, reception takes most of the time, while higher peaks correspond to the acknowledge transmitted upon reception and processing of each packet. The acknowledge peaks produced by COMPAQ look delayed and wider with respect to those produced by CISCO, actually reducing the number of packets received in a time unit (e.g., in the 2ms time window shown in Figure 3, COMPAQ receives 14 packets while CISCO 15). The measured average power consumption is reported in Table for all power states of the two NICs. The wake-up time of CISCO is 12ms, while that of COMPAQ is neglected. overhead latency payload overall packet time AckTime APtime latency Figure 4. Timing diagram of the wireless channel Transmission time (ms) 1 5 CISCO (measured) COMPAQ (measured) Fitting model packet overhead t of the Ethernet packets transferred from the laptop to the base station. The actual transmission time can be expressed as:!#"%$'&(*),+ -/. 1 (1) where 1 is the number of protocol bytes per packet, L is the channel latency, AckTime is the overall reaction time of the NIC. Notice that both the AckTime and the channel Latency are due to the acknowledge needed after each packet, as shown in Figure 4. Using Equation 1 as a fitting model for the experimental results we can obtain indirect measures of the fitting parameters Bw and L. Fitting curves are plotted in Figure 5. Finally, the channel latency depends on the distance between the base station and the NIC. For our experiments we used a fixed distance of 5cm, providing an ideal channel quality, in order to evaluate the frame loss due to DPM only. Buffer size. While the size of the UDP and application buffers on the palmtop can be set by the user, the size of buffer used by the base station is constant. We characterized the behavior of the internal buffer by sending bursts of packets across the wireless channel and measuring the packet loss as a function of the packet size and number. For a given packet size, we call limiting burst size the maximum number of packets in a burst delivered without any loss. Interestingly, the limiting burst size grows with the packet size: a few packets are lost if more than 1 packets of size 1bytes are sent across the wireless channel, while up to 5 packets of size 1bytes can be sent without packet loss. The reason for this counter-intuitive behavior is two-fold. First, the internal buffer of the base station is organized in packets, so that it can contain a given number of packets regardless of their size. Second, according to the results outlined in the previous section, the larger the packets the larger the effective bandwidth provided by the wireless channel. Since the internal buffer of the base station saturates because input data (provided by the laptop) are faster than output data (sent across the wireless link), the higher the output bit rate the longer the time required to saturate the buffer. Experimental results indicate that the base station can bufferize up to 1 packets frame size (bytes) Figure 5. Transmission time as a function of the frame size. Channel bandwidth. The effective bandwidth provided by the wireless link depend on traffic fragmentation in packets. In fact, each packet has a two-fold overhead: the headers and tails introduced by the protocol stack, and the acknowledge time. To characterize the effective bandwidth by taking packet overheads into account we measured the total time required to send 5 UDP frames of a given size from the laptop to the palmtop PC. The number of frames transferred was chosen small enough to avoid the saturation of the AP buffer. Figure 5 shows the transmission time per frame as a function of the frame size. Steps occurring every 15 bytes are due to fragmentation. In fact, 15 bytes is the maximum payload Model validation We validated our model by comparing simulation results and measurements obtained by running two MPEG4 benchmarks: conference and fireworks. The first one has a frame rate of 15 frames/sec and is composed of 899 frames. The second has a frame rate of 3 frames/sec and is composed of 522 frames. Each benchmark was ran and simulated using both NICs, with all available DPM configurations, namely, COMPAQ PM OFF, COMPAQ PM ON 2ms, COMPAQ PM ON 1ms, CISCO PM OFF, CISCO PM ON 2ms. In order to make simulation results directly comparable with measurements we implemented a trace-based producer generating packets according to a time-stamped trace collected while running the streaming application on the laptop. Experimental results reported in Table show that the average power consumption provided by the simulation model was always within 4% from measurements.
5 CONFERENCE FIREWORKS meas sim meas sim COMPAQ PM OFF , PM ON 2ms PM ON 1ms CISCO PM OFF PM ON 2ms Table 2. Power consumption of the NICs in mw period latency avg pw AP buf fr. lost units (ms) (ms) (mw) (pac) (perc.) PM OFF % PM ON % % % % % % % % % % % % % % Table 3. Exploration for different PM configuration and latency values Design space exploration The simulation model was used to evaluate the impact of DPM settings not yet supported by the real NICs. In particular we performed experiments on the conference benchmark for different durations of the sleeping periods and for different values of the consumer latency. Results are reported in Table. For a determined sleeping period, we repeated the experiments by changing the initial latency of the consumer. By increasing the sleeping period, the average power consumption decreases at a cost of higher frame loss. However, the frame loss probability can be reduced by increasing the initial latency, allowing the consumer to bufferize more packets before starting playback. Since the frame consumption rate is constant, the initial bufferization allows the consumer to compensate for the long inter arrival times imposed by the power management policy. In fact, as shown in the table, for a determined sleep duration, the frame loss decreases as a function of the latency. In particular, the packet loss is null whenever the initial latency is greater or equal than the sleep period, since in this case the application buffer is never fully depleted because of DPM. In practice, client-side buffering provides the opportunity for saving power without impairing quality of service, at a cost of an initial latency. The limiting sleep time (and latency) depends on the size of the application buffer. For our case study, power consumption could be reduced to 42.83mW without violating real-time constraints, with a sleep period and a latency of 1sec and a maximum occupancy of the application buffer of 17 packets. This is a 22% improvement over the power savings provided by the longest sleep period supported by the real NIC. References Cali, F., Conti, M. & Gregori, E. (1998) Ieee wireless lan: capacity analysis and protocol enhancement. INFO- COM,, Cassandras, C. G. (1993) Discrete event systems: modeling and performance analysis. Aksen,. Chong, C. C. (23) A new statistical wideband spatiotemporal channel model for 5-ghz band wlan systems. IEEE Transactions on Selected Areas in Communications, 21 (2), Cisco System, Cisco Aironet 35 Series Wireless LAN Adapters (23). airo 35/35cards/index.htm. Eshghi, F. & Ekhakeem, A. (1998) Performance analysis of ad hoc wireless lans for real-time traffic. IEEE Journal on Selected areas in Communications, 21 (2). Glynn, P. W. (1989) A gsmp formalism for discrete event systems. IEEE Proceedings, 77 (1), HP WL11 (23). wireless/wlan/wl11.html. Krashinski, R. & Balakrishnan, H. (22) Minimizing energy for wireless web access with bounded slowdown. Procedings of MOBICOM,. LAN/MAN Standards Committee of the IEEE Computer Society (1999). Part 11: Wireless LAN MAC and PHY Specifications: Higher-Speed Physical Layer Extension in the 2.4 GHz Band. Lee, E. A. & Sangiovanni-Vincentelli, A. (1998) A framework for comparing models of computation. IEEE Transactions on CAD ICAS, 17 (12), Marculescu, R., Nandi, A., Lavagno, L. & Sangiovanni- Vincentelli, A. (21) System-level power/performance analysis of portable multimedia systems communicating over wireless channel. Procedings of ICCAD,, MSWIM (22) ACM International Workshop on Modeling Analysis and Simulation of Wireless and Mobile Systems. Raghunathan, V., Schurgers, C., Park, S. & Srivastava, M. (22) Energy-aware wireless microsensor networks. IEEE Signal Processing Magazine, 19 (2), 4 5. Sinha, A. & Chandrakasan, A. (21) Dynamic power management in wireless sensor networks. IEEE Design and Test of Computers, 18 (2), Zorzi, M. & Chockalingam, A. (1998) Energy efficiency of media access protocols for mobile data networks,. IEEE Transactions on Communications, 46 (11),
Network Swapping. Outline Motivations HW and SW support for swapping under Linux OS
Network Swapping Emanuele Lattanzi, Andrea Acquaviva and Alessandro Bogliolo STI University of Urbino, ITALY Outline Motivations HW and SW support for swapping under Linux OS Local devices (CF, µhd) Network
More informationImplementation of a Wake-up Radio Cross-Layer Protocol in OMNeT++ / MiXiM
Implementation of a Wake-up Radio Cross-Layer Protocol in OMNeT++ / MiXiM Jean Lebreton and Nour Murad University of La Reunion, LE2P 40 Avenue de Soweto, 97410 Saint-Pierre Email: jean.lebreton@univ-reunion.fr
More informationInvestigating MAC-layer Schemes to Promote Doze Mode in based WLANs
Investigating MAC-layer Schemes to Promote Doze Mode in 802.11-based WLANs V. Baiamonte and C.-F. Chiasserini CERCOM - Dipartimento di Elettronica Politecnico di Torino Torino, Italy Email: baiamonte,chiasserini
More informationPrioritization scheme for QoS in IEEE e WLAN
Prioritization scheme for QoS in IEEE 802.11e WLAN Yakubu Suleiman Baguda a, Norsheila Fisal b a,b Department of Telematics & Communication Engineering, Faculty of Electrical Engineering Universiti Teknologi
More informationEnhanced Power Saving Scheme for IEEE DCF Based Wireless Networks
Enhanced Power Saving Scheme for IEEE 802.11 DCF Based Wireless Networks Jong-Mu Choi, Young-Bae Ko, and Jai-Hoon Kim Graduate School of Information and Communication Ajou University, Republic of Korea
More informationImproving IEEE Power Saving Mechanism
1 Improving IEEE 82.11 Power Saving Mechanism Eun-Sun Jung 1 and Nitin H. Vaidya 2 1 Dept. of Computer Science, Texas A&M University, College Station, TX 77843, USA Email: esjung@cs.tamu.edu 2 Dept. of
More informationApplication Characterization for Wireless Network Power Management
Application Characterization for Wireless Network Power Management Andreas Weissel, Matthias Faerber and Frank Bellosa University of Erlangen, Department of Computer Science 4 {weissel,faerber,bellosa}@cs.fau.de
More informationImpact of IEEE MAC Packet Size on Performance of Wireless Sensor Networks
IOSR Journal of Electronics and Communication Engineering (IOSR-JECE) e-issn: 2278-2834,p- ISSN: 2278-8735.Volume 10, Issue 3, Ver. IV (May - Jun.2015), PP 06-11 www.iosrjournals.org Impact of IEEE 802.11
More informationChapter 4: network layer. Network service model. Two key network-layer functions. Network layer. Input port functions. Router architecture overview
Chapter 4: chapter goals: understand principles behind services service models forwarding versus routing how a router works generalized forwarding instantiation, implementation in the Internet 4- Network
More informationRealMedia Streaming Performance on an IEEE b Wireless LAN
RealMedia Streaming Performance on an IEEE 802.11b Wireless LAN T. Huang and C. Williamson Proceedings of IASTED Wireless and Optical Communications (WOC) Conference Banff, AB, Canada, July 2002 Presented
More informationMohammad Hossein Manshaei 1393
Mohammad Hossein Manshaei manshaei@gmail.com 1393 1 An Analytical Approach: Bianchi Model 2 Real Experimentations HoE on IEEE 802.11b Analytical Models Bianchi s Model Simulations ns-2 3 N links with the
More informationCSMA based Medium Access Control for Wireless Sensor Network
CSMA based Medium Access Control for Wireless Sensor Network H. Hoang, Halmstad University Abstract Wireless sensor networks bring many challenges on implementation of Medium Access Control protocols because
More informationVoIP over wireless networks: a packet scheduling approach to provide QoS using Linux
VoIP over 82.11 wireless networks: a packet scheduling approach to provide QoS using Linux Terrence van Valkenhoef and Mishar Mahboob December 13, 25 Abstract In this work, we propose a layer three scheduler
More informationReal-Time Protocol (RTP)
Real-Time Protocol (RTP) Provides standard packet format for real-time application Typically runs over UDP Specifies header fields below Payload Type: 7 bits, providing 128 possible different types of
More informationIntroduction to Real-Time Communications. Real-Time and Embedded Systems (M) Lecture 15
Introduction to Real-Time Communications Real-Time and Embedded Systems (M) Lecture 15 Lecture Outline Modelling real-time communications Traffic and network models Properties of networks Throughput, delay
More informationAssessing the Impact of Dynamic Power Management on the Functionality and the Performance of Battery-Powered Appliances
Assessing the Impact of Dynamic Power Management on the Functionality and the Performance of Battery-Powered Appliances A. Acquaviva, A. Aldini, M. Bernardo, A. Bogliolo, E. Bontà, E. Lattanzi Università
More informationUsing Low-power Modes for Energy Conservation in Ethernet LANs
Using Low-power Modes for Energy Conservation in Ethernet LANs Maruti Gupta Department of Computer Science Portland State University Portland, OR 9727 Email: mgupta@cs.pdx.edu Suresh Singh Department of
More informationAn evaluation tool for Wireless Digital Audio applications
An evaluation tool for Wireless Digital Audio applications Nicolas-Alexander Tatlas 1, Andreas Floros 2, and John Mourjopoulos 3 1 Audiogroup, Electrical Engineering and Computer Technology Department,
More informationDynamic Deferred Acknowledgment Mechanism for Improving the Performance of TCP in Multi-Hop Wireless Networks
Dynamic Deferred Acknowledgment Mechanism for Improving the Performance of TCP in Multi-Hop Wireless Networks Dodda Sunitha Dr.A.Nagaraju Dr. G.Narsimha Assistant Professor of IT Dept. Central University
More informationImplementation of an Adaptive MAC Protocol in WSN using Network Simulator-2
Implementation of an Adaptive MAC Protocol in WSN using Network Simulator-2 1 Suresh, 2 C.B.Vinutha, 3 Dr.M.Z Kurian 1 4 th Sem, M.Tech (Digital Electronics), SSIT, Tumkur 2 Lecturer, Dept.of E&C, SSIT,
More informationA Backoff Algorithm for Improving Saturation Throughput in IEEE DCF
A Backoff Algorithm for Improving Saturation Throughput in IEEE 80.11 DCF Kiyoshi Takahashi and Toshinori Tsuboi School of Computer Science, Tokyo University of Technology, 1404-1 Katakura, Hachioji, Tokyo,
More informationEnhancements and Performance Evaluation of Wireless Local Area Networks
Enhancements and Performance Evaluation of Wireless Local Area Networks Jiaqing Song and Ljiljana Trajkovic Communication Networks Laboratory Simon Fraser University Burnaby, BC, Canada E-mail: {jsong,
More informationOPSM - Opportunistic Power Save Mode for Infrastructure IEEE WLAN
OPSM - Opportunistic Power Save Mode for Infrastructure IEEE 82.11 WLAN Pranav Agrawal, Anurag Kumar,JoyKuri, Manoj K. Panda, Vishnu Navda, Ramachandran Ramjee Centre for Electronics Design and Technology
More informationA More Realistic Energy Dissipation Model for Sensor Nodes
A More Realistic Energy Dissipation Model for Sensor Nodes Raquel A.F. Mini 2, Antonio A.F. Loureiro, Badri Nath 3 Department of Computer Science Federal University of Minas Gerais Belo Horizonte, MG,
More informationEtiquette protocol for Ultra Low Power Operation in Sensor Networks
Etiquette protocol for Ultra Low Power Operation in Sensor Networks Samir Goel and Tomasz Imielinski {gsamir, imielins}@cs.rutgers.edu DataMan Lab, Department of Computer Science Acknowledgement: Prof.
More informationTransport Protocol Optimization For Energy Efficient Wireless Embedded Systems
Transport Protocol Optimization For Energy Efficient Wireless Embedded Systems Davide Bertozzi, Anand Raghunathan, Luca Benini and Srivaths Ravi University of Bologna, DEIS, Viale Risorgimento,2 Bologna
More informationAn Efficient Scheduling Scheme for High Speed IEEE WLANs
An Efficient Scheduling Scheme for High Speed IEEE 802.11 WLANs Juki Wirawan Tantra, Chuan Heng Foh, and Bu Sung Lee Centre of Muldia and Network Technology School of Computer Engineering Nanyang Technological
More informationPerformance Evaluation of Scheduling Mechanisms for Broadband Networks
Performance Evaluation of Scheduling Mechanisms for Broadband Networks Gayathri Chandrasekaran Master s Thesis Defense The University of Kansas 07.31.2003 Committee: Dr. David W. Petr (Chair) Dr. Joseph
More informationDepartment of Electrical and Computer Systems Engineering
Department of Electrical and Computer Systems Engineering Technical Report MECSE-6-2006 Medium Access Control (MAC) Schemes for Quality of Service (QoS) provision of Voice over Internet Protocol (VoIP)
More informationHow YouTube Performance is Improved in the T-Mobile Network. Jie Hui, Kevin Lau, Ankur Jain, Andreas Terzis, Jeff Smith T Mobile, Google
How YouTube Performance is Improved in the T-Mobile Network Jie Hui, Kevin Lau, Ankur Jain, Andreas Terzis, Jeff Smith T Mobile, Google Speakers Jie Hui Kevin Lau Ankur Jain Andreas Terzis Jeff Smith Executive
More informationPerformance Anomaly of b
Performance Anomaly of 8.11b Martin Heusse, Franck Rousseau, Gilles Berger-Sabbatel, Andrzej Duda LSR-IMAG Laboratory Grenoble, France email: {heusse, rousseau, gberger, duda}@imag.fr Abstract We analyze
More informationRealising WACNet Through a Zigbee-based Architecture
University of Wollongong Research Online Faculty of Informatics - Papers (Archive) Faculty of Engineering and Information Sciences 2007 Realising WACNet Through a Zigbee-based Architecture A. Desmet University
More informationMinimizing Energy for Wireless Web Access with Bounded Slowdown
Wireless Networks 11, 135 148, 2005 2005 Springer Science + Business Media, Inc. Manufactured in The Netherlands. Minimizing Energy for Wireless Web Access with Bounded Slowdown RONNY KRASHINSKY and HARI
More informationROUTING ALGORITHMS Part 2: Data centric and hierarchical protocols
ROUTING ALGORITHMS Part 2: Data centric and hierarchical protocols 1 Negative Reinforcement Time out Explicitly degrade the path by re-sending interest with lower data rate. Source Gradient New Data Path
More informationA Routing Protocol and Energy Efficient Techniques in Bluetooth Scatternets
A Routing Protocol and Energy Efficient Techniques in Bluetooth Scatternets Balakrishna J. Prabhu and A. Chockalingam Department of Electrical Communication Engineering Indian Institute of Science, Bangalore
More informationDistributed Queue Dual Bus
Distributed Queue Dual Bus IEEE 802.3 to 802.5 protocols are only suited for small LANs. They cannot be used for very large but non-wide area networks. IEEE 802.6 DQDB is designed for MANs It can cover
More informationRadio Resource Management for Broadcast Services in OFDMA-Based Networks
Radio Resource Management for Broadcast Services in OFDMA-Based Networks Patrick Hosein and Thawatt Gopal Huawei Technologies Co., Ltd. 10180 Telesis Court, Suite 365, San Diego, CA 92121, USA Tel: 858.882.0332,
More informationExperimental Framework and Simulator for the MAC of Power-Line Communications
Experimental Framework and Simulator for the MAC of Power-Line Communications Technical Report Christina Vlachou EPFL, Switzerland christinavlachou@epflch Julien Herzen EPFL, Switzerland julienherzen@epflch
More informationAADECA 2004 XIX Congreso Argentino de Control Automático. Ethernet delay evaluation by an embedded real time Simulink model PC in asynchronous mode
Ethernet delay evaluation by an embedded real time Simulink model PC in asynchronous mode Mario R. Modesti, Luis R. Canali, Jorge C. Vaschetti Grupo de Investigaciones en Informática para Ingeniería, Universidad
More informationDesign and Analysis of Fragmentation Threshold and Buffer Size of Wireless LAN using OPNET Modeler
Design and Analysis of Fragmentation Threshold and Buffer Size of Wireless LAN using OPNET Modeler Rakesh Kumar 1, Dr. Vishnu Shrivastava 2 1 P.hD. Scholar ECE Department, Vivekanand Global University,
More informationAn Industrial Employee Development Application Protocol Using Wireless Sensor Networks
RESEARCH ARTICLE An Industrial Employee Development Application Protocol Using Wireless Sensor Networks 1 N.Roja Ramani, 2 A.Stenila 1,2 Asst.professor, Dept.of.Computer Application, Annai Vailankanni
More informationCHAPTER 3 EFFECTIVE ADMISSION CONTROL MECHANISM IN WIRELESS MESH NETWORKS
28 CHAPTER 3 EFFECTIVE ADMISSION CONTROL MECHANISM IN WIRELESS MESH NETWORKS Introduction Measurement-based scheme, that constantly monitors the network, will incorporate the current network state in the
More informationApplications and Performance Analysis of Bridging with Layer-3 Forwarding on Wireless LANs
Applications and Performance Analysis of Bridging with Layer-3 Forwarding on Wireless LANs James T. Yu and Chibiao Liu School of Computer Science, Telecommunications, and Information Systems DePaul University,
More informationAn energy-efficient MAC protocol for infrastructure WLAN based on modified PCF/ DCF access schemes using a bidirectional data packet exchange
An energy-efficient MAC protocol for infrastructure WLAN based on modified PCF/ DCF access schemes using a bidirectional data packet exchange Raúl Palacios, Fabrizio Granelli University of Trento Trento,
More informationDeveloping deterministic networking technology for railway applications using TTEthernet software-based end systems
Developing deterministic networking technology for railway applications using TTEthernet software-based end systems Project n 100021 Astrit Ademaj, TTTech Computertechnik AG Outline GENESYS requirements
More informationChapter -5 QUALITY OF SERVICE (QOS) PLATFORM DESIGN FOR REAL TIME MULTIMEDIA APPLICATIONS
Chapter -5 QUALITY OF SERVICE (QOS) PLATFORM DESIGN FOR REAL TIME MULTIMEDIA APPLICATIONS Chapter 5 QUALITY OF SERVICE (QOS) PLATFORM DESIGN FOR REAL TIME MULTIMEDIA APPLICATIONS 5.1 Introduction For successful
More informationChapter -6 IMPROVED CONGESTION CONTROL MECHANISM FOR REAL TIME DATA TRANSMISSION
Chapter -6 IMPROVED CONGESTION CONTROL MECHANISM FOR REAL TIME DATA TRANSMISSION Chapter 6 IMPROVED CONGESTION CONTROL MECHANISM FOR REAL TIME DATA TRANSMISSION 6.1 Introduction Supporting Quality of Service
More informationDesign and Performance Evaluation of a New Spatial Reuse FireWire Protocol. Master s thesis defense by Vijay Chandramohan
Design and Performance Evaluation of a New Spatial Reuse FireWire Protocol Master s thesis defense by Vijay Chandramohan Committee Members: Dr. Christensen (Major Professor) Dr. Labrador Dr. Ranganathan
More informationSENSOR-MAC CASE STUDY
SENSOR-MAC CASE STUDY Periodic Listen and Sleep Operations One of the S-MAC design objectives is to reduce energy consumption by avoiding idle listening. This is achieved by establishing low-duty-cycle
More informationAn Enhanced IEEE Retransmission Scheme
An Enhanced IEEE 802.11 Retransmission Scheme Hao-Li Wang, Jinghao Miao, J. Morris Chang Dept. of Electrical and Computer Engineering Iowa State University haoli, jhmiao, morris@iastate.edu Abstract In
More informationWireless LANs. ITS 413 Internet Technologies and Applications
Wireless LANs ITS 413 Internet Technologies and Applications Aim: Aim and Contents Understand how IEEE 802.11 wireless LANs work Understand what influences the performance of wireless LANs Contents: IEEE
More informationDelay Analysis of ML-MAC Algorithm For Wireless Sensor Networks
Delay Analysis of ML-MAC Algorithm For Wireless Sensor Networks Madhusmita Nandi School of Electronics Engineering, KIIT University Bhubaneswar-751024, Odisha, India ABSTRACT The present work is to evaluate
More informationWeek 7: Traffic Models and QoS
Week 7: Traffic Models and QoS Acknowledgement: Some slides are adapted from Computer Networking: A Top Down Approach Featuring the Internet, 2 nd edition, J.F Kurose and K.W. Ross All Rights Reserved,
More informationEvent-Driven Power Management
840 IEEE TRANSACTIONS ON COMPUTER AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, VOL. 20, NO. 7, JULY 2001 Event-Driven Power Management Tajana Šimunić, Luca Benini, Member, IEEE, Peter Glynn, and Giovanni
More informationScheduling of real-time traffic in IEEE networks
Scheduling of real-time traffic in IEEE 802.11 networks Afonso, José A. Neves, Joaquim E. Universidade do Minho, Departamento de Electrónica Industrial Campus de Azurém, 4800-058 Guimarães, ortugal jose.afonso@dei.uminho.pt
More informationLesson 2-3: The IEEE x MAC Layer
Module 2: Establishing Wireless Connectivity Lesson 2-3: The IEEE 802.11x MAC Layer Lesson Overview This lesson describes basic IEEE 802.11x MAC operation, beginning with an explanation of contention schemes
More informationUsing the NCTUns 2.0 Network Simulator/Emulator to Facilitate Network Researches
Using the NCTUns 2.0 Network Simulator/Emulator to Facilitate Network Researches Prof. Shie-Yuan Wang Department of Computer Science National Chiao Tung University Network and System Laboratory Introduction
More informationDynamic Power Management (DPM)
Dynamic Power Management (DPM) 1 What is DPM? A design methodology aiming at controlling performance and power levels of digital circuits and systems with the goal of extending the autonomous operation
More informationAnalysis of Throughput and Energy Efficiency in the IEEE Wireless Local Area Networks using Constant backoff Window Algorithm
International Journal of Computer Applications (975 8887) Volume 6 No.8, July Analysis of Throughput and Energy Efficiency in the IEEE 8. Wireless Local Area Networks using Constant backoff Window Algorithm
More informationInterference avoidance in wireless multi-hop networks 1
Interference avoidance in wireless multi-hop networks 1 Youwei Zhang EE228A Project Report, Spring 2006 1 Motivation Wireless networks share the same unlicensed parts of the radio spectrum with devices
More informationAnalysis of Power Management for Energy and Delay Trade-off in a WLAN
Analysis of Power Management for Energy and Delay Trade-off in a WLAN Mahasweta Sarkar and Rene.L Cruz Department of Electrical and Computer Engineering University of California at San Diego La Jolla,
More informationApplications and Performance Analysis of Bridging with L3 Forwarding on Wireless LANs
Applications and Performance Analysis of Bridging with L3 Forwarding on Wireless LANs Chibiao Liu and James Yu DePaul University School of CTI Chicago, IL {cliu1, jyu}@cs.depaul.edu Abstract This paper
More informationRandom Asynchronous Wakeup Protocol for Sensor Networks
Random Asynchronous Wakeup Protocol for Sensor Networks Vamsi Paruchuri, Shivakumar Basavaraju, Arjan Durresi, Rajgopal Kannan and S.S. Iyengar Louisiana State University Department of Computer Science
More informationModule 10 MULTIMEDIA SYNCHRONIZATION
Module 10 MULTIMEDIA SYNCHRONIZATION Lesson 36 Packet architectures and audio-video interleaving Instructional objectives At the end of this lesson, the students should be able to: 1. Show the packet architecture
More informationarxiv: v1 [cs.ni] 8 Aug 2013
Evolution of IEEE 8. compatible standards and impact on Energy Consumption arxiv:8.96v [cs.ni] 8 Aug ABSTRACT Stratos Keranidis, Giannis Kazdaridis, Nikos Makris, Thanasis Korakis, Iordanis Koutsopoulos
More informationGFP Considerations for RPR
GFP Considerations for RPR Angela T. Faber afaber@telcordia.com IEEE 802.17 RPRWG 1 Agenda GFP Background Why GFP? GFP Core Header GFP Payload Area GFP Options Signal Adaptation (Transparent GFP and Frame-mapped
More informationAn Improvement of TCP Downstream Between Heterogeneous Terminals in an Infrastructure Network
An Improvement of TCP Downstream Between Heterogeneous Terminals in an Infrastructure Network Yong-Hyun Kim, Ji-Hong Kim, Youn-Sik Hong, and Ki-Young Lee University of Incheon, 177 Dowha-dong Nam-gu, 402-749,
More informationAn Experimental Analysis on Iterative Block Ciphers and Their Effects on VoIP under Different Coding Schemes
An Experimental Analysis on Iterative Block Ciphers and Their Effects on VoIP under Different Coding Schemes Gregory Epiphaniou 1 Carsten Maple 1 Paul Sant 1 Matthew Reeves 2 1 Institute for Research in
More informationDelay Constrained ARQ Mechanism for MPEG Media Transport Protocol Based Video Streaming over Internet
Delay Constrained ARQ Mechanism for MPEG Media Transport Protocol Based Video Streaming over Internet Hong-rae Lee, Tae-jun Jung, Kwang-deok Seo Division of Computer and Telecommunications Engineering
More informationGuide to Wireless Communications, Third Edition. Objectives
Guide to Wireless Communications, Third Edition Chapter 7 Low-Speed Wireless Local Area Networks Objectives Describe how WLANs are used List the components and modes of a WLAN Describe how an RF WLAN works
More informationEnergy-Aware Routing in Wireless Ad-hoc Networks
Energy-Aware Routing in Wireless Ad-hoc Networks Panagiotis C. Kokkinos Christos A. Papageorgiou Emmanouel A. Varvarigos Abstract In this work we study energy efficient routing strategies for wireless
More informationAd Hoc Networks. WA-MAC: A weather adaptive MAC protocol in survivability-heterogeneous wireless sensor networks
Ad Hoc Networks 67 (2017) 40 52 Contents lists available at ScienceDirect Ad Hoc Networks journal homepage: www.elsevier.com/locate/adhoc WA-MAC: A weather adaptive MAC protocol in survivability-heterogeneous
More informationII. Principles of Computer Communications Network and Transport Layer
II. Principles of Computer Communications Network and Transport Layer A. Internet Protocol (IP) IPv4 Header An IP datagram consists of a header part and a text part. The header has a 20-byte fixed part
More informationTable of Contents 1 WLAN Service Configuration 1-1
Table of Contents 1 WLAN Service Configuration 1-1 WLAN Service Overview 1-1 Terminology 1-1 Wireless Client Access 1-2 802.11 Overview 1-4 WLAN Topologies 1-5 Single BSS 1-5 Multi-ESS 1-5 Single ESS Multiple
More informationPerformance Analysis of the Intertwined Effects between Network Layers for g Transmissions
Performance Analysis of the Intertwined Effects between Network Layers for 802.11g Transmissions Jon Gretarsson, Feng Li, Mingzhe Li, Ashish Samant, Huahui Wu, Mark Claypool and Robert Kinicki WPI Computer
More informationData Link Control Protocols
Protocols : Introduction to Data Communications Sirindhorn International Institute of Technology Thammasat University Prepared by Steven Gordon on 23 May 2012 Y12S1L07, Steve/Courses/2012/s1/its323/lectures/datalink.tex,
More informationCHAPTER 5 PROPAGATION DELAY
98 CHAPTER 5 PROPAGATION DELAY Underwater wireless sensor networks deployed of sensor nodes with sensing, forwarding and processing abilities that operate in underwater. In this environment brought challenges,
More informationAn Energy Consumption Analytic Model for A Wireless Sensor MAC Protocol
An Energy Consumption Analytic Model for A Wireless Sensor MAC Protocol Hung-Wei Tseng, Shih-Hsien Yang, Po-Yu Chuang,Eric Hsiao-Kuang Wu, and Gen-Huey Chen Dept. of Computer Science and Information Engineering,
More informationCollision Probability in Saturated IEEE Networks
in Saturated IEEE 80.11 Networks Hai L. Vu Centre for Advanced Internet Architectures (CAIA) ICT Faculty, Swinburne University of Technology Hawthorn, VIC 31, Australia h.vu@ieee.org Taka Sakurai ARC Special
More informationLow Energy Priority Oriented Adaptive Control with QoS Guarantee for Wireless Networks
12th Annual Symposium of the IEEE/CVT, Nov. 3, 2005, Enschede, the Netherlands 1 Low Energy Priority Oriented Adaptive Control with QoS Guarantee for Wireless Networks T. D. Lagkas, G. I. Papadimitriou,
More informationPerformance of UMTS Radio Link Control
Performance of UMTS Radio Link Control Qinqing Zhang, Hsuan-Jung Su Bell Laboratories, Lucent Technologies Holmdel, NJ 77 Abstract- The Radio Link Control (RLC) protocol in Universal Mobile Telecommunication
More informationQuality of Service (QoS)
Quality of Service (QoS) The Internet was originally designed for best-effort service without guarantee of predictable performance. Best-effort service is often sufficient for a traffic that is not sensitive
More informationComputer Networking. Queue Management and Quality of Service (QOS)
Computer Networking Queue Management and Quality of Service (QOS) Outline Previously:TCP flow control Congestion sources and collapse Congestion control basics - Routers 2 Internet Pipes? How should you
More informationConfiguring QoS. Finding Feature Information. Prerequisites for QoS
Finding Feature Information, page 1 Prerequisites for QoS, page 1 Restrictions for QoS, page 3 Information About QoS, page 4 How to Configure QoS, page 28 Monitoring Standard QoS, page 80 Configuration
More informationImplementation of a leaky bucket module for simulations in NS-3
Implementation of a leaky bucket module for simulations in NS-3 P. Baltzis 2, C. Bouras 1,2, K. Stamos 1,2,3, G. Zaoudis 1,2 1 Computer Technology Institute and Press Diophantus Patra, Greece 2 Computer
More informationEnergy Efficiency in IEEE standard WLAN through MWTPP
IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661, p- ISSN: 2278-8727Volume 16, Issue 1, Ver. I (Jan. 2014), PP 42-46 Efficiency in IEEE 802.11 standard WLAN through MWTPP Anupam Das, Prof.
More informationAdaptive Channel Occupation for Wireless Video Delivery
Adaptive Channel Occupation for Wireless Video Delivery Ismail Djama and Toufik Ahmed CNRS-LaBRI Lab, University of Bordeaux-1. 351 Cours de la Libération, F-3345 Talence - France Tel: +33 5 4 35 47, Fax:
More informationKing Fahd University of Petroleum and Minerals College of Computer Sciences and Engineering Department of Computer Engineering
Student Name: Section #: King Fahd University of Petroleum and Minerals College of Computer Sciences and Engineering Department of Computer Engineering COE 344 Computer Networks (T072) Final Exam Date
More informationOn the Interdependence of Congestion and Contention in Wireless Sensor Networks
On the Interdependence of Congestion and Contention in Wireless Sensor Networks Mehmet C. Vuran Vehbi C. Gungor School of Electrical & Computer Engineering Georgia Institute of Technology, Atlanta, GA
More informationAN4696 Application note
Application note SPWF01Sx power management options Introduction The purpose of this application note is to describe the power management options available on the SPWF01Sx Wi-Fi module [1]. It introduces
More informationMultiple Access Protocols
Multiple Access Protocols Computer Networks Lecture 2 http://goo.gl/pze5o8 Multiple Access to a Shared Channel The medium (or its sub-channel) may be shared by multiple stations (dynamic allocation) just
More informationAmeliorate Threshold Distributed Energy Efficient Clustering Algorithm for Heterogeneous Wireless Sensor Networks
Vol. 5, No. 5, 214 Ameliorate Threshold Distributed Energy Efficient Clustering Algorithm for Heterogeneous Wireless Sensor Networks MOSTAFA BAGHOURI SAAD CHAKKOR ABDERRAHMANE HAJRAOUI Abstract Ameliorating
More informationPriority Traffic CSCD 433/533. Advanced Networks Spring Lecture 21 Congestion Control and Queuing Strategies
CSCD 433/533 Priority Traffic Advanced Networks Spring 2016 Lecture 21 Congestion Control and Queuing Strategies 1 Topics Congestion Control and Resource Allocation Flows Types of Mechanisms Evaluation
More informationFuzzy Duty Cycle Adaption Algorithm for IEEE Star Topology Networks
Computer Systems Department, Technical Institute / Qurna, Basra, Iraq email: hayderaam@gmail.com Received: 4/1 /212 Accepted: 22/7 /213 Abstract IEEE 82.15.4 is a standard designed for low data rate, low
More informatione-pg Pathshala Quadrant 1 e-text
e-pg Pathshala Subject : Computer Science Module: Bluetooth Paper: Computer Networks Module No: CS/CN/37 Quadrant 1 e-text In our journey on networks, we are now exploring wireless networks. We looked
More informationImpact of End-to-end QoS Connectivity on the Performance of Remote Wireless Local Networks
Impact of End-to-end QoS Connectivity on the Performance of Remote Wireless Local Networks Veselin Rakocevic School of Engineering and Mathematical Sciences City University London EC1V HB, UK V.Rakocevic@city.ac.uk
More informationModulation-Aware Energy Balancing in Hierarchical Wireless Sensor Networks 1
Modulation-Aware Energy Balancing in Hierarchical Wireless Sensor Networks 1 Maryam Soltan, Inkwon Hwang, Massoud Pedram Dept. of Electrical Engineering University of Southern California Los Angeles, CA
More informationReal-time and Reliable Video Transport Protocol (RRVTP) for Visual Wireless Sensor Networks (VSNs)
Real-time and Reliable Video Transport Protocol (RRVTP) for Visual Wireless Sensor Networks (VSNs) Dr. Mohammed Ahmed Abdala, Mustafa Hussein Jabbar College of Information Engineering, Al-Nahrain University,
More informationWireless Networks (CSC-7602) Lecture 8 (15 Oct. 2007)
Wireless Networks (CSC-7602) Lecture 8 (15 Oct. 2007) Seung-Jong Park (Jay) http://www.csc.lsu.edu/~sjpark 1 Today Wireline Fair Schedulling Why? Ideal algorithm Practical algorithms Wireless Fair Scheduling
More informationComparison of pre-backoff and post-backoff procedures for IEEE distributed coordination function
Comparison of pre-backoff and post-backoff procedures for IEEE 802.11 distributed coordination function Ping Zhong, Xuemin Hong, Xiaofang Wu, Jianghong Shi a), and Huihuang Chen School of Information Science
More information