A SIMULATION MODEL FOR STREAMING APPLICATIONS OVER A POWER-MANAGEABLE WIRELESS LINK

Size: px
Start display at page:

Download "A SIMULATION MODEL FOR STREAMING APPLICATIONS OVER A POWER-MANAGEABLE WIRELESS LINK"

Transcription

1 A SIMULATION MODEL FOR STREAMING APPLICATIONS OVER A POWER-MANAGEABLE WIRELESS LINK Andrea Acquaviva Emanuele Lattanzi Alessandro Bogliolo ISTI - University of Urbino Piazza della Repubblica Urbino, Italy acquaviva,lattanzi,bogliolo sti.uniurb.it Luca Benini DEIS - University of Bologna Viale Risorgimento 2 Bologna, 4136, Italy lbenini deis.unibo.it KEYWORDS Multimedia, Event-Oriented, Resource Management, Real- Time, Simulators. ABSTRACT In this work we introduce a hardware-validated simulation model for the exploration of real-time multimedia systems, where system components are modeled as interacting generalized semi-markov processes (GSMPs). We apply the simulation model to explore the design space of a mobile client accessing streaming data through a wireless network. The model has been characterized and validated against power and performance measurements performed on an instrumented HP s ipaq with wireless LAN running a MPEG4 video application. We analyze the impact of tuning parameters for the real-time multimedia system (buffer sizes, channel bandwidth, power management policy) on the trade off between power consumption and QoS. INTRODUCTION One of the most critical challenges in designing wireless multimedia systems is to provide adequate quality of service (QoS) with optimal energy efficiency. In many cases, there are obvious trade offs between quality of service (e.g., bandwidth, latency) and power consumption. To avoid poorly controlled QoS degradation, multimedia systems are often designed and managed in a conservative fashion, with little consideration for energy efficiency. QoS modeling of wireless networked systems (Cali et al., 1998; Eshghi & Ekhakeem, 1998) is a mature and highly active discipline (refer to (MSWIM, 22) for an up-to-date overview of the topic), and various approaches have been explored to enhance QoS-oriented models with power consumption models (Raghunathan et al., 22; Sinha & Chandrakasan, 21; Marculescu et al., 21; Krashinski & Balakrishnan, 22; Zorzi & Chockalingam, 1998). Most of the approaches explored in the past adopted a stochastic discrete event model (Lee & Sangiovanni-Vincentelli, 1998), where the system evolves in an enumerable set of time instants and transitions are randomized. Our work moves from this widely adopted modeling framework and pushes it one step closer to practice. We present two original contributions. First, we developed, consistently with previous work, a detailed stochastic discrete-event model of a complex multimedia system. Our model includes all hardware and software components involved in communication of multimedia data over a wireless channel: application software, transport and network stack, operating system drivers, power management software, network interface card hardware, wireless channel, base station hardware and software. Many of the model components are parameterized, in an effort to represent a large design space of different hardware and software configurations. Second, we have fully characterized the power and performance metrics in the model with experimental measurements on fully operational real-life hardware and software. As a result, our model is detailed enough to represent a number of complex effects that impact power and quality of service in real-life multimedia systems, while at the same time our characterization flow is precise enough to obtain power and performance estimates that closely match the measured data. Our results demonstrate that the performance and energy consumption of a multimedia system are deeply influenced by a number of interacting hardware and software components, and that focusing only on a part of the system (e.g., the wireless channel or the operating system), could lead to serious design pitfalls. MODELING POWER-MANAGEABLE REAL-TIME MULTI- MEDIA SYSTEMS At the high level of abstraction, electronic systems exhibit different operating modes and make transitions among them at discrete points in time. Hence, they can be suitably represented as Discrete event systems (DES) (Cassandras, 1993). We model real-time power-manageable systems as DES composed of interacting state machines. Each component has a state structure that represents its operating modes and the transitions among them. State transitions are triggered by events

2 that can be either generated within the component according to some distribution (internal events) or received in input (external events). The number of states of the model of each component may be finite, discrete, or continuous. Infinity states are modeled by means of a finite number of parameterized states. The evolution of the system is described by specifying next-event and next-state functions for each component. Next-event function determines the next triggering event generated by the component, while next-state function determines the destination state of next transition. We model each component as a generalized semi Markov process (GSMP) with non-deterministic next-event and next-state functions based on conditional residual-time distributions and on conditional next-state probabilities (Glynn, 1989). Any GSMP component is composed of a state structure and a clock structure. The state structure component is a Stateflow model that takes in input both internal events (generated by the local clock structure) and external events (coming from an input port) and generates a timeout value corresponding to the residual time of the next triggering event. The clock structure takes in input a timeout and a reset signal and generates an event when the timeout has elapsed. The interface of the component is specified by means of input/output ports, used to exchange both events and parameter values. The interaction among multiple GSMP components is simply obtained by connecting their input/output ports, as shown in Figure 1. Additional output signals can be used to observe the system behavior, to evaluate cost/performance metrics and to exchange data among modules. Figure 2. State diagram of the powermanageable NIC. STREAMING VIDEO OVER AN IEEE 82.11b LINK The video server runs on a notebook computer directly connected to an access point (AP) through a dedicated wired link. The AP acts as a bridge to the wireless network interface card (NIC) installed on a HP s IPAQ palmtop. The palmtop runs the client MPEG4 decoder that reads, buffers, elaborates and plays-back at a constant rate (consumer rate) the video information read from the network. In order to match real-time video constraints, the client application buffer should be never empty when the decoder looks for a frame to decode. If this happens, a deadline miss occurs. Without any power control, the shape of the traffic on the wireless channel reflects the server transmission rate. If the 82.11b MAC-level protocol power management (LAN/MAN Standards Committee of the IEEE Computer Society, 1999) is enabled, the AP performs traffic reshaping by bufferizing incoming packets to allow the NIC to sleep for a determined period of time. In this period, energy can be saved by the wireless interface. After the expiration of the sleeping period, the card wakes up and asks to the AP if there are packets accumulated to be received. If this is the case, the AP sends the back-log to the card. The traffic reshaping function performed by AP imposes bufferization both at producer and consumer sides. Model The block diagram of the Simulink model of the system is shown in Figure 1. Producer. The producer generates output events (representing network packets) according either to a given distribution of inter-arrival times, or to a trace of time-stamped packet information. For each packet, three properties are either randomly generated or read from the trace: the size (in bytes), the frame it belongs to, and the total number of packets representing the same frame. Packets belonging to the same frame are generated as a burst, while packets belonging to different frames are generated at a rate depending on the application. Packet information is made available at the output ports, together with the event that represents the generation of a new packet. Base station buffer. Packet events generated by the producer become input events for the buffer of the base station, which is explicitly represented in the model as a limited FIFO queue with a customizable size. The content of the queue is saved in memory as an array of packets each with the corresponding information (size, frame number, packet per frame). If the producer tries to send a packet and the queue is full, a lost event is generated and the corresponding packet is discarded. Base station. The base station (AP) gets the packets from the queue and send them to the wireless channel. If the input buffer is empty or the receiver in not ready, the AP goes to a waiting state. If the receiver is sleeping because of DPM, the AP goes to an idle state, causing incoming packets to accumulate in the input buffer. Wireless Channel. The wireless channel is represented by a block that receives input events representing incoming packets and generates, with a given latency, output events representing packet delivery. The wireless channel is bidirectional and it has a user-defined packet-loss probability. Lost packets are not delivered to the receiver. Notice that we use a simple channel model since we are interested in modeling the entire wireless system, rather than the wireless channel by itself. Channel latency, loss probability and bandwidth (implicitly modeled by the receiver) are sufficient to perform realistic system-level simulations. Nevertheless, any channel model (Chong, 23) can be easily embedded in this block to take into account complex error statistics. Wireless Network Card. This is the most critical block of the system, since its power consumption is critical for the battery lifetime of the palm-top. The state diagram is reported in Figure 2. It consists of 5 states: idle, waking up, waiting,

3 Figure 1. Simulink model of the streaming application over a wireless channel. stant rate. Rather, the consumer decides how many packets to read within a frame period based on the information associated with the incoming packets. Frames that either arrive late with respect to the deadline or are incomplete because of a packet loss are discarded by the consumer. EXPERIMENTAL RESULTS To perform our characterization experiments, we used a HP s IPAQ palmtop computer. With the IPAQ, we used two different wireless network interface cards for our experiments, CISCO Aironet 35 Series (Cisco System, Cisco Aironet 35 Series Wireless LAN Adapters, 23) and COMPAQ WL11 (HP WL11, 23), hereafter denoted by CISCO and COMPAQ, respectively. The power consumption of the NICs was Idle - PM ON Receiving - PM ON Receiving - PM OFF 2 CISCO COMPAQ receiving, acknowledge. The card is normally waiting. When an incoming packet is detected, the card goes into the receiving state and generates a busy output event to indicate that it cannot receive more packets until the actual one has been processed. The card remains in the receiving state for a time interval that is dynamically computed as the ratio between the size of the packet (including the payload and the protocol overhead) and the bandwidth of the channel. After each packet has been completely received, the NIC takes some time to process the packet at the MAC level and then sends an acknowledge back to the AP through the wireless channel. After the acknowledge packet has been sent, the NIC goes back to the waiting state until the next packet arrives. The timing diagram of the wireless channel is shown in Figure 4. When the power management is enabled, the card can go from the waiting state to a low-power idle state. In our model, this transition is triggered by an input event generated by an external power manager, described later in this section. Wake-up from idle is triggered by the power manager when a determined sleep time has elapsed. Wake up transitions may take a non-negligible amount of time and power, modeled by a separate state. Power Manager. The power manager does not represent a hardware unit, but the model of the actual implementation of the power management protocol of the 82.11b standard (LAN/MAN Standards Committee of the IEEE Computer Society, 1999). Based on external settings (that can be decided by the user), the power manager generates output events (ShutDown and WakeUp) to notify the beginning and ending of sleeping periods. After the card has been woken-up, it starts to receive packets accumulated by the AP. After each received packet, the power manager resets a timeout counter. If the timeout expires before the reception of a new packet, the card is put again in the idle state by means of a ShutDown event. Output Buffer. This block represents the bufferization performed by the consumer. It can be used to model either the protocol stack buffer or the application buffer (if present). More levels of buffering can be added. In our case we decided to represent only the UDP protocol buffer, since the application buffer is usually larger and less critical. Consumer. The consumer simulates a streaming application that reads packets from the output buffer at a given rate. Since real-time constraints impose a constant frame rate, but each frame may be encoded using a different number of packets, packet requests from the consumer do not arrive at a con Figure 3. Current profiles obtained under different workload and DPM conditions. measured using a Sycard Card Extender that allowed us to monitor the time behavior of the supply current drawn by the cards. Characterization We performed three sets of experiments to characterize: i) the power states of each NIC, ii) the effective bandwidth of the wireless channel and iii) the buffer size of the base station. Power States. The power states of the NIC were characterized in terms of power consumption and transition time by looking at the power profiles under different workload conditions and DPM settings. Typical results are shown in Fig-

4 Wait Rx Tx Sleep WakeUp CISCO COMPAQ Table 1. Power consumption of the NICs in mw ure 3. The power consumption of CISCO is higher than that of COMPAQ in all states (sleep, idle, receiving, transmitting) but during wake up. Moreover, differently from COMPAQ, CISCO has a non-negligible wake-up time. As for performance, COMPAQ has a slower reaction to incoming packets, as shown in the right-most graphs of Figure 3 obtained while receiving the same burst of packets. Both cards stay idle for a very short time among packets, reception takes most of the time, while higher peaks correspond to the acknowledge transmitted upon reception and processing of each packet. The acknowledge peaks produced by COMPAQ look delayed and wider with respect to those produced by CISCO, actually reducing the number of packets received in a time unit (e.g., in the 2ms time window shown in Figure 3, COMPAQ receives 14 packets while CISCO 15). The measured average power consumption is reported in Table for all power states of the two NICs. The wake-up time of CISCO is 12ms, while that of COMPAQ is neglected. overhead latency payload overall packet time AckTime APtime latency Figure 4. Timing diagram of the wireless channel Transmission time (ms) 1 5 CISCO (measured) COMPAQ (measured) Fitting model packet overhead t of the Ethernet packets transferred from the laptop to the base station. The actual transmission time can be expressed as:!#"%$'&(*),+ -/. 1 (1) where 1 is the number of protocol bytes per packet, L is the channel latency, AckTime is the overall reaction time of the NIC. Notice that both the AckTime and the channel Latency are due to the acknowledge needed after each packet, as shown in Figure 4. Using Equation 1 as a fitting model for the experimental results we can obtain indirect measures of the fitting parameters Bw and L. Fitting curves are plotted in Figure 5. Finally, the channel latency depends on the distance between the base station and the NIC. For our experiments we used a fixed distance of 5cm, providing an ideal channel quality, in order to evaluate the frame loss due to DPM only. Buffer size. While the size of the UDP and application buffers on the palmtop can be set by the user, the size of buffer used by the base station is constant. We characterized the behavior of the internal buffer by sending bursts of packets across the wireless channel and measuring the packet loss as a function of the packet size and number. For a given packet size, we call limiting burst size the maximum number of packets in a burst delivered without any loss. Interestingly, the limiting burst size grows with the packet size: a few packets are lost if more than 1 packets of size 1bytes are sent across the wireless channel, while up to 5 packets of size 1bytes can be sent without packet loss. The reason for this counter-intuitive behavior is two-fold. First, the internal buffer of the base station is organized in packets, so that it can contain a given number of packets regardless of their size. Second, according to the results outlined in the previous section, the larger the packets the larger the effective bandwidth provided by the wireless channel. Since the internal buffer of the base station saturates because input data (provided by the laptop) are faster than output data (sent across the wireless link), the higher the output bit rate the longer the time required to saturate the buffer. Experimental results indicate that the base station can bufferize up to 1 packets frame size (bytes) Figure 5. Transmission time as a function of the frame size. Channel bandwidth. The effective bandwidth provided by the wireless link depend on traffic fragmentation in packets. In fact, each packet has a two-fold overhead: the headers and tails introduced by the protocol stack, and the acknowledge time. To characterize the effective bandwidth by taking packet overheads into account we measured the total time required to send 5 UDP frames of a given size from the laptop to the palmtop PC. The number of frames transferred was chosen small enough to avoid the saturation of the AP buffer. Figure 5 shows the transmission time per frame as a function of the frame size. Steps occurring every 15 bytes are due to fragmentation. In fact, 15 bytes is the maximum payload Model validation We validated our model by comparing simulation results and measurements obtained by running two MPEG4 benchmarks: conference and fireworks. The first one has a frame rate of 15 frames/sec and is composed of 899 frames. The second has a frame rate of 3 frames/sec and is composed of 522 frames. Each benchmark was ran and simulated using both NICs, with all available DPM configurations, namely, COMPAQ PM OFF, COMPAQ PM ON 2ms, COMPAQ PM ON 1ms, CISCO PM OFF, CISCO PM ON 2ms. In order to make simulation results directly comparable with measurements we implemented a trace-based producer generating packets according to a time-stamped trace collected while running the streaming application on the laptop. Experimental results reported in Table show that the average power consumption provided by the simulation model was always within 4% from measurements.

5 CONFERENCE FIREWORKS meas sim meas sim COMPAQ PM OFF , PM ON 2ms PM ON 1ms CISCO PM OFF PM ON 2ms Table 2. Power consumption of the NICs in mw period latency avg pw AP buf fr. lost units (ms) (ms) (mw) (pac) (perc.) PM OFF % PM ON % % % % % % % % % % % % % % Table 3. Exploration for different PM configuration and latency values Design space exploration The simulation model was used to evaluate the impact of DPM settings not yet supported by the real NICs. In particular we performed experiments on the conference benchmark for different durations of the sleeping periods and for different values of the consumer latency. Results are reported in Table. For a determined sleeping period, we repeated the experiments by changing the initial latency of the consumer. By increasing the sleeping period, the average power consumption decreases at a cost of higher frame loss. However, the frame loss probability can be reduced by increasing the initial latency, allowing the consumer to bufferize more packets before starting playback. Since the frame consumption rate is constant, the initial bufferization allows the consumer to compensate for the long inter arrival times imposed by the power management policy. In fact, as shown in the table, for a determined sleep duration, the frame loss decreases as a function of the latency. In particular, the packet loss is null whenever the initial latency is greater or equal than the sleep period, since in this case the application buffer is never fully depleted because of DPM. In practice, client-side buffering provides the opportunity for saving power without impairing quality of service, at a cost of an initial latency. The limiting sleep time (and latency) depends on the size of the application buffer. For our case study, power consumption could be reduced to 42.83mW without violating real-time constraints, with a sleep period and a latency of 1sec and a maximum occupancy of the application buffer of 17 packets. This is a 22% improvement over the power savings provided by the longest sleep period supported by the real NIC. References Cali, F., Conti, M. & Gregori, E. (1998) Ieee wireless lan: capacity analysis and protocol enhancement. INFO- COM,, Cassandras, C. G. (1993) Discrete event systems: modeling and performance analysis. Aksen,. Chong, C. C. (23) A new statistical wideband spatiotemporal channel model for 5-ghz band wlan systems. IEEE Transactions on Selected Areas in Communications, 21 (2), Cisco System, Cisco Aironet 35 Series Wireless LAN Adapters (23). airo 35/35cards/index.htm. Eshghi, F. & Ekhakeem, A. (1998) Performance analysis of ad hoc wireless lans for real-time traffic. IEEE Journal on Selected areas in Communications, 21 (2). Glynn, P. W. (1989) A gsmp formalism for discrete event systems. IEEE Proceedings, 77 (1), HP WL11 (23). wireless/wlan/wl11.html. Krashinski, R. & Balakrishnan, H. (22) Minimizing energy for wireless web access with bounded slowdown. Procedings of MOBICOM,. LAN/MAN Standards Committee of the IEEE Computer Society (1999). Part 11: Wireless LAN MAC and PHY Specifications: Higher-Speed Physical Layer Extension in the 2.4 GHz Band. Lee, E. A. & Sangiovanni-Vincentelli, A. (1998) A framework for comparing models of computation. IEEE Transactions on CAD ICAS, 17 (12), Marculescu, R., Nandi, A., Lavagno, L. & Sangiovanni- Vincentelli, A. (21) System-level power/performance analysis of portable multimedia systems communicating over wireless channel. Procedings of ICCAD,, MSWIM (22) ACM International Workshop on Modeling Analysis and Simulation of Wireless and Mobile Systems. Raghunathan, V., Schurgers, C., Park, S. & Srivastava, M. (22) Energy-aware wireless microsensor networks. IEEE Signal Processing Magazine, 19 (2), 4 5. Sinha, A. & Chandrakasan, A. (21) Dynamic power management in wireless sensor networks. IEEE Design and Test of Computers, 18 (2), Zorzi, M. & Chockalingam, A. (1998) Energy efficiency of media access protocols for mobile data networks,. IEEE Transactions on Communications, 46 (11),

Network Swapping. Outline Motivations HW and SW support for swapping under Linux OS

Network Swapping. Outline Motivations HW and SW support for swapping under Linux OS Network Swapping Emanuele Lattanzi, Andrea Acquaviva and Alessandro Bogliolo STI University of Urbino, ITALY Outline Motivations HW and SW support for swapping under Linux OS Local devices (CF, µhd) Network

More information

Implementation of a Wake-up Radio Cross-Layer Protocol in OMNeT++ / MiXiM

Implementation of a Wake-up Radio Cross-Layer Protocol in OMNeT++ / MiXiM Implementation of a Wake-up Radio Cross-Layer Protocol in OMNeT++ / MiXiM Jean Lebreton and Nour Murad University of La Reunion, LE2P 40 Avenue de Soweto, 97410 Saint-Pierre Email: jean.lebreton@univ-reunion.fr

More information

Investigating MAC-layer Schemes to Promote Doze Mode in based WLANs

Investigating MAC-layer Schemes to Promote Doze Mode in based WLANs Investigating MAC-layer Schemes to Promote Doze Mode in 802.11-based WLANs V. Baiamonte and C.-F. Chiasserini CERCOM - Dipartimento di Elettronica Politecnico di Torino Torino, Italy Email: baiamonte,chiasserini

More information

Prioritization scheme for QoS in IEEE e WLAN

Prioritization scheme for QoS in IEEE e WLAN Prioritization scheme for QoS in IEEE 802.11e WLAN Yakubu Suleiman Baguda a, Norsheila Fisal b a,b Department of Telematics & Communication Engineering, Faculty of Electrical Engineering Universiti Teknologi

More information

Enhanced Power Saving Scheme for IEEE DCF Based Wireless Networks

Enhanced Power Saving Scheme for IEEE DCF Based Wireless Networks Enhanced Power Saving Scheme for IEEE 802.11 DCF Based Wireless Networks Jong-Mu Choi, Young-Bae Ko, and Jai-Hoon Kim Graduate School of Information and Communication Ajou University, Republic of Korea

More information

Improving IEEE Power Saving Mechanism

Improving IEEE Power Saving Mechanism 1 Improving IEEE 82.11 Power Saving Mechanism Eun-Sun Jung 1 and Nitin H. Vaidya 2 1 Dept. of Computer Science, Texas A&M University, College Station, TX 77843, USA Email: esjung@cs.tamu.edu 2 Dept. of

More information

Application Characterization for Wireless Network Power Management

Application Characterization for Wireless Network Power Management Application Characterization for Wireless Network Power Management Andreas Weissel, Matthias Faerber and Frank Bellosa University of Erlangen, Department of Computer Science 4 {weissel,faerber,bellosa}@cs.fau.de

More information

Impact of IEEE MAC Packet Size on Performance of Wireless Sensor Networks

Impact of IEEE MAC Packet Size on Performance of Wireless Sensor Networks IOSR Journal of Electronics and Communication Engineering (IOSR-JECE) e-issn: 2278-2834,p- ISSN: 2278-8735.Volume 10, Issue 3, Ver. IV (May - Jun.2015), PP 06-11 www.iosrjournals.org Impact of IEEE 802.11

More information

Chapter 4: network layer. Network service model. Two key network-layer functions. Network layer. Input port functions. Router architecture overview

Chapter 4: network layer. Network service model. Two key network-layer functions. Network layer. Input port functions. Router architecture overview Chapter 4: chapter goals: understand principles behind services service models forwarding versus routing how a router works generalized forwarding instantiation, implementation in the Internet 4- Network

More information

RealMedia Streaming Performance on an IEEE b Wireless LAN

RealMedia Streaming Performance on an IEEE b Wireless LAN RealMedia Streaming Performance on an IEEE 802.11b Wireless LAN T. Huang and C. Williamson Proceedings of IASTED Wireless and Optical Communications (WOC) Conference Banff, AB, Canada, July 2002 Presented

More information

Mohammad Hossein Manshaei 1393

Mohammad Hossein Manshaei 1393 Mohammad Hossein Manshaei manshaei@gmail.com 1393 1 An Analytical Approach: Bianchi Model 2 Real Experimentations HoE on IEEE 802.11b Analytical Models Bianchi s Model Simulations ns-2 3 N links with the

More information

CSMA based Medium Access Control for Wireless Sensor Network

CSMA based Medium Access Control for Wireless Sensor Network CSMA based Medium Access Control for Wireless Sensor Network H. Hoang, Halmstad University Abstract Wireless sensor networks bring many challenges on implementation of Medium Access Control protocols because

More information

VoIP over wireless networks: a packet scheduling approach to provide QoS using Linux

VoIP over wireless networks: a packet scheduling approach to provide QoS using Linux VoIP over 82.11 wireless networks: a packet scheduling approach to provide QoS using Linux Terrence van Valkenhoef and Mishar Mahboob December 13, 25 Abstract In this work, we propose a layer three scheduler

More information

Real-Time Protocol (RTP)

Real-Time Protocol (RTP) Real-Time Protocol (RTP) Provides standard packet format for real-time application Typically runs over UDP Specifies header fields below Payload Type: 7 bits, providing 128 possible different types of

More information

Introduction to Real-Time Communications. Real-Time and Embedded Systems (M) Lecture 15

Introduction to Real-Time Communications. Real-Time and Embedded Systems (M) Lecture 15 Introduction to Real-Time Communications Real-Time and Embedded Systems (M) Lecture 15 Lecture Outline Modelling real-time communications Traffic and network models Properties of networks Throughput, delay

More information

Assessing the Impact of Dynamic Power Management on the Functionality and the Performance of Battery-Powered Appliances

Assessing the Impact of Dynamic Power Management on the Functionality and the Performance of Battery-Powered Appliances Assessing the Impact of Dynamic Power Management on the Functionality and the Performance of Battery-Powered Appliances A. Acquaviva, A. Aldini, M. Bernardo, A. Bogliolo, E. Bontà, E. Lattanzi Università

More information

Using Low-power Modes for Energy Conservation in Ethernet LANs

Using Low-power Modes for Energy Conservation in Ethernet LANs Using Low-power Modes for Energy Conservation in Ethernet LANs Maruti Gupta Department of Computer Science Portland State University Portland, OR 9727 Email: mgupta@cs.pdx.edu Suresh Singh Department of

More information

An evaluation tool for Wireless Digital Audio applications

An evaluation tool for Wireless Digital Audio applications An evaluation tool for Wireless Digital Audio applications Nicolas-Alexander Tatlas 1, Andreas Floros 2, and John Mourjopoulos 3 1 Audiogroup, Electrical Engineering and Computer Technology Department,

More information

Dynamic Deferred Acknowledgment Mechanism for Improving the Performance of TCP in Multi-Hop Wireless Networks

Dynamic Deferred Acknowledgment Mechanism for Improving the Performance of TCP in Multi-Hop Wireless Networks Dynamic Deferred Acknowledgment Mechanism for Improving the Performance of TCP in Multi-Hop Wireless Networks Dodda Sunitha Dr.A.Nagaraju Dr. G.Narsimha Assistant Professor of IT Dept. Central University

More information

Implementation of an Adaptive MAC Protocol in WSN using Network Simulator-2

Implementation of an Adaptive MAC Protocol in WSN using Network Simulator-2 Implementation of an Adaptive MAC Protocol in WSN using Network Simulator-2 1 Suresh, 2 C.B.Vinutha, 3 Dr.M.Z Kurian 1 4 th Sem, M.Tech (Digital Electronics), SSIT, Tumkur 2 Lecturer, Dept.of E&C, SSIT,

More information

A Backoff Algorithm for Improving Saturation Throughput in IEEE DCF

A Backoff Algorithm for Improving Saturation Throughput in IEEE DCF A Backoff Algorithm for Improving Saturation Throughput in IEEE 80.11 DCF Kiyoshi Takahashi and Toshinori Tsuboi School of Computer Science, Tokyo University of Technology, 1404-1 Katakura, Hachioji, Tokyo,

More information

Enhancements and Performance Evaluation of Wireless Local Area Networks

Enhancements and Performance Evaluation of Wireless Local Area Networks Enhancements and Performance Evaluation of Wireless Local Area Networks Jiaqing Song and Ljiljana Trajkovic Communication Networks Laboratory Simon Fraser University Burnaby, BC, Canada E-mail: {jsong,

More information

OPSM - Opportunistic Power Save Mode for Infrastructure IEEE WLAN

OPSM - Opportunistic Power Save Mode for Infrastructure IEEE WLAN OPSM - Opportunistic Power Save Mode for Infrastructure IEEE 82.11 WLAN Pranav Agrawal, Anurag Kumar,JoyKuri, Manoj K. Panda, Vishnu Navda, Ramachandran Ramjee Centre for Electronics Design and Technology

More information

A More Realistic Energy Dissipation Model for Sensor Nodes

A More Realistic Energy Dissipation Model for Sensor Nodes A More Realistic Energy Dissipation Model for Sensor Nodes Raquel A.F. Mini 2, Antonio A.F. Loureiro, Badri Nath 3 Department of Computer Science Federal University of Minas Gerais Belo Horizonte, MG,

More information

Etiquette protocol for Ultra Low Power Operation in Sensor Networks

Etiquette protocol for Ultra Low Power Operation in Sensor Networks Etiquette protocol for Ultra Low Power Operation in Sensor Networks Samir Goel and Tomasz Imielinski {gsamir, imielins}@cs.rutgers.edu DataMan Lab, Department of Computer Science Acknowledgement: Prof.

More information

Transport Protocol Optimization For Energy Efficient Wireless Embedded Systems

Transport Protocol Optimization For Energy Efficient Wireless Embedded Systems Transport Protocol Optimization For Energy Efficient Wireless Embedded Systems Davide Bertozzi, Anand Raghunathan, Luca Benini and Srivaths Ravi University of Bologna, DEIS, Viale Risorgimento,2 Bologna

More information

An Efficient Scheduling Scheme for High Speed IEEE WLANs

An Efficient Scheduling Scheme for High Speed IEEE WLANs An Efficient Scheduling Scheme for High Speed IEEE 802.11 WLANs Juki Wirawan Tantra, Chuan Heng Foh, and Bu Sung Lee Centre of Muldia and Network Technology School of Computer Engineering Nanyang Technological

More information

Performance Evaluation of Scheduling Mechanisms for Broadband Networks

Performance Evaluation of Scheduling Mechanisms for Broadband Networks Performance Evaluation of Scheduling Mechanisms for Broadband Networks Gayathri Chandrasekaran Master s Thesis Defense The University of Kansas 07.31.2003 Committee: Dr. David W. Petr (Chair) Dr. Joseph

More information

Department of Electrical and Computer Systems Engineering

Department of Electrical and Computer Systems Engineering Department of Electrical and Computer Systems Engineering Technical Report MECSE-6-2006 Medium Access Control (MAC) Schemes for Quality of Service (QoS) provision of Voice over Internet Protocol (VoIP)

More information

How YouTube Performance is Improved in the T-Mobile Network. Jie Hui, Kevin Lau, Ankur Jain, Andreas Terzis, Jeff Smith T Mobile, Google

How YouTube Performance is Improved in the T-Mobile Network. Jie Hui, Kevin Lau, Ankur Jain, Andreas Terzis, Jeff Smith T Mobile, Google How YouTube Performance is Improved in the T-Mobile Network Jie Hui, Kevin Lau, Ankur Jain, Andreas Terzis, Jeff Smith T Mobile, Google Speakers Jie Hui Kevin Lau Ankur Jain Andreas Terzis Jeff Smith Executive

More information

Performance Anomaly of b

Performance Anomaly of b Performance Anomaly of 8.11b Martin Heusse, Franck Rousseau, Gilles Berger-Sabbatel, Andrzej Duda LSR-IMAG Laboratory Grenoble, France email: {heusse, rousseau, gberger, duda}@imag.fr Abstract We analyze

More information

Realising WACNet Through a Zigbee-based Architecture

Realising WACNet Through a Zigbee-based Architecture University of Wollongong Research Online Faculty of Informatics - Papers (Archive) Faculty of Engineering and Information Sciences 2007 Realising WACNet Through a Zigbee-based Architecture A. Desmet University

More information

Minimizing Energy for Wireless Web Access with Bounded Slowdown

Minimizing Energy for Wireless Web Access with Bounded Slowdown Wireless Networks 11, 135 148, 2005 2005 Springer Science + Business Media, Inc. Manufactured in The Netherlands. Minimizing Energy for Wireless Web Access with Bounded Slowdown RONNY KRASHINSKY and HARI

More information

ROUTING ALGORITHMS Part 2: Data centric and hierarchical protocols

ROUTING ALGORITHMS Part 2: Data centric and hierarchical protocols ROUTING ALGORITHMS Part 2: Data centric and hierarchical protocols 1 Negative Reinforcement Time out Explicitly degrade the path by re-sending interest with lower data rate. Source Gradient New Data Path

More information

A Routing Protocol and Energy Efficient Techniques in Bluetooth Scatternets

A Routing Protocol and Energy Efficient Techniques in Bluetooth Scatternets A Routing Protocol and Energy Efficient Techniques in Bluetooth Scatternets Balakrishna J. Prabhu and A. Chockalingam Department of Electrical Communication Engineering Indian Institute of Science, Bangalore

More information

Distributed Queue Dual Bus

Distributed Queue Dual Bus Distributed Queue Dual Bus IEEE 802.3 to 802.5 protocols are only suited for small LANs. They cannot be used for very large but non-wide area networks. IEEE 802.6 DQDB is designed for MANs It can cover

More information

Radio Resource Management for Broadcast Services in OFDMA-Based Networks

Radio Resource Management for Broadcast Services in OFDMA-Based Networks Radio Resource Management for Broadcast Services in OFDMA-Based Networks Patrick Hosein and Thawatt Gopal Huawei Technologies Co., Ltd. 10180 Telesis Court, Suite 365, San Diego, CA 92121, USA Tel: 858.882.0332,

More information

Experimental Framework and Simulator for the MAC of Power-Line Communications

Experimental Framework and Simulator for the MAC of Power-Line Communications Experimental Framework and Simulator for the MAC of Power-Line Communications Technical Report Christina Vlachou EPFL, Switzerland christinavlachou@epflch Julien Herzen EPFL, Switzerland julienherzen@epflch

More information

AADECA 2004 XIX Congreso Argentino de Control Automático. Ethernet delay evaluation by an embedded real time Simulink model PC in asynchronous mode

AADECA 2004 XIX Congreso Argentino de Control Automático. Ethernet delay evaluation by an embedded real time Simulink model PC in asynchronous mode Ethernet delay evaluation by an embedded real time Simulink model PC in asynchronous mode Mario R. Modesti, Luis R. Canali, Jorge C. Vaschetti Grupo de Investigaciones en Informática para Ingeniería, Universidad

More information

Design and Analysis of Fragmentation Threshold and Buffer Size of Wireless LAN using OPNET Modeler

Design and Analysis of Fragmentation Threshold and Buffer Size of Wireless LAN using OPNET Modeler Design and Analysis of Fragmentation Threshold and Buffer Size of Wireless LAN using OPNET Modeler Rakesh Kumar 1, Dr. Vishnu Shrivastava 2 1 P.hD. Scholar ECE Department, Vivekanand Global University,

More information

An Industrial Employee Development Application Protocol Using Wireless Sensor Networks

An Industrial Employee Development Application Protocol Using Wireless Sensor Networks RESEARCH ARTICLE An Industrial Employee Development Application Protocol Using Wireless Sensor Networks 1 N.Roja Ramani, 2 A.Stenila 1,2 Asst.professor, Dept.of.Computer Application, Annai Vailankanni

More information

CHAPTER 3 EFFECTIVE ADMISSION CONTROL MECHANISM IN WIRELESS MESH NETWORKS

CHAPTER 3 EFFECTIVE ADMISSION CONTROL MECHANISM IN WIRELESS MESH NETWORKS 28 CHAPTER 3 EFFECTIVE ADMISSION CONTROL MECHANISM IN WIRELESS MESH NETWORKS Introduction Measurement-based scheme, that constantly monitors the network, will incorporate the current network state in the

More information

Applications and Performance Analysis of Bridging with Layer-3 Forwarding on Wireless LANs

Applications and Performance Analysis of Bridging with Layer-3 Forwarding on Wireless LANs Applications and Performance Analysis of Bridging with Layer-3 Forwarding on Wireless LANs James T. Yu and Chibiao Liu School of Computer Science, Telecommunications, and Information Systems DePaul University,

More information

An energy-efficient MAC protocol for infrastructure WLAN based on modified PCF/ DCF access schemes using a bidirectional data packet exchange

An energy-efficient MAC protocol for infrastructure WLAN based on modified PCF/ DCF access schemes using a bidirectional data packet exchange An energy-efficient MAC protocol for infrastructure WLAN based on modified PCF/ DCF access schemes using a bidirectional data packet exchange Raúl Palacios, Fabrizio Granelli University of Trento Trento,

More information

Developing deterministic networking technology for railway applications using TTEthernet software-based end systems

Developing deterministic networking technology for railway applications using TTEthernet software-based end systems Developing deterministic networking technology for railway applications using TTEthernet software-based end systems Project n 100021 Astrit Ademaj, TTTech Computertechnik AG Outline GENESYS requirements

More information

Chapter -5 QUALITY OF SERVICE (QOS) PLATFORM DESIGN FOR REAL TIME MULTIMEDIA APPLICATIONS

Chapter -5 QUALITY OF SERVICE (QOS) PLATFORM DESIGN FOR REAL TIME MULTIMEDIA APPLICATIONS Chapter -5 QUALITY OF SERVICE (QOS) PLATFORM DESIGN FOR REAL TIME MULTIMEDIA APPLICATIONS Chapter 5 QUALITY OF SERVICE (QOS) PLATFORM DESIGN FOR REAL TIME MULTIMEDIA APPLICATIONS 5.1 Introduction For successful

More information

Chapter -6 IMPROVED CONGESTION CONTROL MECHANISM FOR REAL TIME DATA TRANSMISSION

Chapter -6 IMPROVED CONGESTION CONTROL MECHANISM FOR REAL TIME DATA TRANSMISSION Chapter -6 IMPROVED CONGESTION CONTROL MECHANISM FOR REAL TIME DATA TRANSMISSION Chapter 6 IMPROVED CONGESTION CONTROL MECHANISM FOR REAL TIME DATA TRANSMISSION 6.1 Introduction Supporting Quality of Service

More information

Design and Performance Evaluation of a New Spatial Reuse FireWire Protocol. Master s thesis defense by Vijay Chandramohan

Design and Performance Evaluation of a New Spatial Reuse FireWire Protocol. Master s thesis defense by Vijay Chandramohan Design and Performance Evaluation of a New Spatial Reuse FireWire Protocol Master s thesis defense by Vijay Chandramohan Committee Members: Dr. Christensen (Major Professor) Dr. Labrador Dr. Ranganathan

More information

SENSOR-MAC CASE STUDY

SENSOR-MAC CASE STUDY SENSOR-MAC CASE STUDY Periodic Listen and Sleep Operations One of the S-MAC design objectives is to reduce energy consumption by avoiding idle listening. This is achieved by establishing low-duty-cycle

More information

An Enhanced IEEE Retransmission Scheme

An Enhanced IEEE Retransmission Scheme An Enhanced IEEE 802.11 Retransmission Scheme Hao-Li Wang, Jinghao Miao, J. Morris Chang Dept. of Electrical and Computer Engineering Iowa State University haoli, jhmiao, morris@iastate.edu Abstract In

More information

Wireless LANs. ITS 413 Internet Technologies and Applications

Wireless LANs. ITS 413 Internet Technologies and Applications Wireless LANs ITS 413 Internet Technologies and Applications Aim: Aim and Contents Understand how IEEE 802.11 wireless LANs work Understand what influences the performance of wireless LANs Contents: IEEE

More information

Delay Analysis of ML-MAC Algorithm For Wireless Sensor Networks

Delay Analysis of ML-MAC Algorithm For Wireless Sensor Networks Delay Analysis of ML-MAC Algorithm For Wireless Sensor Networks Madhusmita Nandi School of Electronics Engineering, KIIT University Bhubaneswar-751024, Odisha, India ABSTRACT The present work is to evaluate

More information

Week 7: Traffic Models and QoS

Week 7: Traffic Models and QoS Week 7: Traffic Models and QoS Acknowledgement: Some slides are adapted from Computer Networking: A Top Down Approach Featuring the Internet, 2 nd edition, J.F Kurose and K.W. Ross All Rights Reserved,

More information

Event-Driven Power Management

Event-Driven Power Management 840 IEEE TRANSACTIONS ON COMPUTER AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, VOL. 20, NO. 7, JULY 2001 Event-Driven Power Management Tajana Šimunić, Luca Benini, Member, IEEE, Peter Glynn, and Giovanni

More information

Scheduling of real-time traffic in IEEE networks

Scheduling of real-time traffic in IEEE networks Scheduling of real-time traffic in IEEE 802.11 networks Afonso, José A. Neves, Joaquim E. Universidade do Minho, Departamento de Electrónica Industrial Campus de Azurém, 4800-058 Guimarães, ortugal jose.afonso@dei.uminho.pt

More information

Lesson 2-3: The IEEE x MAC Layer

Lesson 2-3: The IEEE x MAC Layer Module 2: Establishing Wireless Connectivity Lesson 2-3: The IEEE 802.11x MAC Layer Lesson Overview This lesson describes basic IEEE 802.11x MAC operation, beginning with an explanation of contention schemes

More information

Using the NCTUns 2.0 Network Simulator/Emulator to Facilitate Network Researches

Using the NCTUns 2.0 Network Simulator/Emulator to Facilitate Network Researches Using the NCTUns 2.0 Network Simulator/Emulator to Facilitate Network Researches Prof. Shie-Yuan Wang Department of Computer Science National Chiao Tung University Network and System Laboratory Introduction

More information

Dynamic Power Management (DPM)

Dynamic Power Management (DPM) Dynamic Power Management (DPM) 1 What is DPM? A design methodology aiming at controlling performance and power levels of digital circuits and systems with the goal of extending the autonomous operation

More information

Analysis of Throughput and Energy Efficiency in the IEEE Wireless Local Area Networks using Constant backoff Window Algorithm

Analysis of Throughput and Energy Efficiency in the IEEE Wireless Local Area Networks using Constant backoff Window Algorithm International Journal of Computer Applications (975 8887) Volume 6 No.8, July Analysis of Throughput and Energy Efficiency in the IEEE 8. Wireless Local Area Networks using Constant backoff Window Algorithm

More information

Interference avoidance in wireless multi-hop networks 1

Interference avoidance in wireless multi-hop networks 1 Interference avoidance in wireless multi-hop networks 1 Youwei Zhang EE228A Project Report, Spring 2006 1 Motivation Wireless networks share the same unlicensed parts of the radio spectrum with devices

More information

Analysis of Power Management for Energy and Delay Trade-off in a WLAN

Analysis of Power Management for Energy and Delay Trade-off in a WLAN Analysis of Power Management for Energy and Delay Trade-off in a WLAN Mahasweta Sarkar and Rene.L Cruz Department of Electrical and Computer Engineering University of California at San Diego La Jolla,

More information

Applications and Performance Analysis of Bridging with L3 Forwarding on Wireless LANs

Applications and Performance Analysis of Bridging with L3 Forwarding on Wireless LANs Applications and Performance Analysis of Bridging with L3 Forwarding on Wireless LANs Chibiao Liu and James Yu DePaul University School of CTI Chicago, IL {cliu1, jyu}@cs.depaul.edu Abstract This paper

More information

Random Asynchronous Wakeup Protocol for Sensor Networks

Random Asynchronous Wakeup Protocol for Sensor Networks Random Asynchronous Wakeup Protocol for Sensor Networks Vamsi Paruchuri, Shivakumar Basavaraju, Arjan Durresi, Rajgopal Kannan and S.S. Iyengar Louisiana State University Department of Computer Science

More information

Module 10 MULTIMEDIA SYNCHRONIZATION

Module 10 MULTIMEDIA SYNCHRONIZATION Module 10 MULTIMEDIA SYNCHRONIZATION Lesson 36 Packet architectures and audio-video interleaving Instructional objectives At the end of this lesson, the students should be able to: 1. Show the packet architecture

More information

arxiv: v1 [cs.ni] 8 Aug 2013

arxiv: v1 [cs.ni] 8 Aug 2013 Evolution of IEEE 8. compatible standards and impact on Energy Consumption arxiv:8.96v [cs.ni] 8 Aug ABSTRACT Stratos Keranidis, Giannis Kazdaridis, Nikos Makris, Thanasis Korakis, Iordanis Koutsopoulos

More information

GFP Considerations for RPR

GFP Considerations for RPR GFP Considerations for RPR Angela T. Faber afaber@telcordia.com IEEE 802.17 RPRWG 1 Agenda GFP Background Why GFP? GFP Core Header GFP Payload Area GFP Options Signal Adaptation (Transparent GFP and Frame-mapped

More information

An Improvement of TCP Downstream Between Heterogeneous Terminals in an Infrastructure Network

An Improvement of TCP Downstream Between Heterogeneous Terminals in an Infrastructure Network An Improvement of TCP Downstream Between Heterogeneous Terminals in an Infrastructure Network Yong-Hyun Kim, Ji-Hong Kim, Youn-Sik Hong, and Ki-Young Lee University of Incheon, 177 Dowha-dong Nam-gu, 402-749,

More information

An Experimental Analysis on Iterative Block Ciphers and Their Effects on VoIP under Different Coding Schemes

An Experimental Analysis on Iterative Block Ciphers and Their Effects on VoIP under Different Coding Schemes An Experimental Analysis on Iterative Block Ciphers and Their Effects on VoIP under Different Coding Schemes Gregory Epiphaniou 1 Carsten Maple 1 Paul Sant 1 Matthew Reeves 2 1 Institute for Research in

More information

Delay Constrained ARQ Mechanism for MPEG Media Transport Protocol Based Video Streaming over Internet

Delay Constrained ARQ Mechanism for MPEG Media Transport Protocol Based Video Streaming over Internet Delay Constrained ARQ Mechanism for MPEG Media Transport Protocol Based Video Streaming over Internet Hong-rae Lee, Tae-jun Jung, Kwang-deok Seo Division of Computer and Telecommunications Engineering

More information

Guide to Wireless Communications, Third Edition. Objectives

Guide to Wireless Communications, Third Edition. Objectives Guide to Wireless Communications, Third Edition Chapter 7 Low-Speed Wireless Local Area Networks Objectives Describe how WLANs are used List the components and modes of a WLAN Describe how an RF WLAN works

More information

Energy-Aware Routing in Wireless Ad-hoc Networks

Energy-Aware Routing in Wireless Ad-hoc Networks Energy-Aware Routing in Wireless Ad-hoc Networks Panagiotis C. Kokkinos Christos A. Papageorgiou Emmanouel A. Varvarigos Abstract In this work we study energy efficient routing strategies for wireless

More information

Ad Hoc Networks. WA-MAC: A weather adaptive MAC protocol in survivability-heterogeneous wireless sensor networks

Ad Hoc Networks. WA-MAC: A weather adaptive MAC protocol in survivability-heterogeneous wireless sensor networks Ad Hoc Networks 67 (2017) 40 52 Contents lists available at ScienceDirect Ad Hoc Networks journal homepage: www.elsevier.com/locate/adhoc WA-MAC: A weather adaptive MAC protocol in survivability-heterogeneous

More information

II. Principles of Computer Communications Network and Transport Layer

II. Principles of Computer Communications Network and Transport Layer II. Principles of Computer Communications Network and Transport Layer A. Internet Protocol (IP) IPv4 Header An IP datagram consists of a header part and a text part. The header has a 20-byte fixed part

More information

Table of Contents 1 WLAN Service Configuration 1-1

Table of Contents 1 WLAN Service Configuration 1-1 Table of Contents 1 WLAN Service Configuration 1-1 WLAN Service Overview 1-1 Terminology 1-1 Wireless Client Access 1-2 802.11 Overview 1-4 WLAN Topologies 1-5 Single BSS 1-5 Multi-ESS 1-5 Single ESS Multiple

More information

Performance Analysis of the Intertwined Effects between Network Layers for g Transmissions

Performance Analysis of the Intertwined Effects between Network Layers for g Transmissions Performance Analysis of the Intertwined Effects between Network Layers for 802.11g Transmissions Jon Gretarsson, Feng Li, Mingzhe Li, Ashish Samant, Huahui Wu, Mark Claypool and Robert Kinicki WPI Computer

More information

Data Link Control Protocols

Data Link Control Protocols Protocols : Introduction to Data Communications Sirindhorn International Institute of Technology Thammasat University Prepared by Steven Gordon on 23 May 2012 Y12S1L07, Steve/Courses/2012/s1/its323/lectures/datalink.tex,

More information

CHAPTER 5 PROPAGATION DELAY

CHAPTER 5 PROPAGATION DELAY 98 CHAPTER 5 PROPAGATION DELAY Underwater wireless sensor networks deployed of sensor nodes with sensing, forwarding and processing abilities that operate in underwater. In this environment brought challenges,

More information

An Energy Consumption Analytic Model for A Wireless Sensor MAC Protocol

An Energy Consumption Analytic Model for A Wireless Sensor MAC Protocol An Energy Consumption Analytic Model for A Wireless Sensor MAC Protocol Hung-Wei Tseng, Shih-Hsien Yang, Po-Yu Chuang,Eric Hsiao-Kuang Wu, and Gen-Huey Chen Dept. of Computer Science and Information Engineering,

More information

Collision Probability in Saturated IEEE Networks

Collision Probability in Saturated IEEE Networks in Saturated IEEE 80.11 Networks Hai L. Vu Centre for Advanced Internet Architectures (CAIA) ICT Faculty, Swinburne University of Technology Hawthorn, VIC 31, Australia h.vu@ieee.org Taka Sakurai ARC Special

More information

Low Energy Priority Oriented Adaptive Control with QoS Guarantee for Wireless Networks

Low Energy Priority Oriented Adaptive Control with QoS Guarantee for Wireless Networks 12th Annual Symposium of the IEEE/CVT, Nov. 3, 2005, Enschede, the Netherlands 1 Low Energy Priority Oriented Adaptive Control with QoS Guarantee for Wireless Networks T. D. Lagkas, G. I. Papadimitriou,

More information

Performance of UMTS Radio Link Control

Performance of UMTS Radio Link Control Performance of UMTS Radio Link Control Qinqing Zhang, Hsuan-Jung Su Bell Laboratories, Lucent Technologies Holmdel, NJ 77 Abstract- The Radio Link Control (RLC) protocol in Universal Mobile Telecommunication

More information

Quality of Service (QoS)

Quality of Service (QoS) Quality of Service (QoS) The Internet was originally designed for best-effort service without guarantee of predictable performance. Best-effort service is often sufficient for a traffic that is not sensitive

More information

Computer Networking. Queue Management and Quality of Service (QOS)

Computer Networking. Queue Management and Quality of Service (QOS) Computer Networking Queue Management and Quality of Service (QOS) Outline Previously:TCP flow control Congestion sources and collapse Congestion control basics - Routers 2 Internet Pipes? How should you

More information

Configuring QoS. Finding Feature Information. Prerequisites for QoS

Configuring QoS. Finding Feature Information. Prerequisites for QoS Finding Feature Information, page 1 Prerequisites for QoS, page 1 Restrictions for QoS, page 3 Information About QoS, page 4 How to Configure QoS, page 28 Monitoring Standard QoS, page 80 Configuration

More information

Implementation of a leaky bucket module for simulations in NS-3

Implementation of a leaky bucket module for simulations in NS-3 Implementation of a leaky bucket module for simulations in NS-3 P. Baltzis 2, C. Bouras 1,2, K. Stamos 1,2,3, G. Zaoudis 1,2 1 Computer Technology Institute and Press Diophantus Patra, Greece 2 Computer

More information

Energy Efficiency in IEEE standard WLAN through MWTPP

Energy Efficiency in IEEE standard WLAN through MWTPP IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661, p- ISSN: 2278-8727Volume 16, Issue 1, Ver. I (Jan. 2014), PP 42-46 Efficiency in IEEE 802.11 standard WLAN through MWTPP Anupam Das, Prof.

More information

Adaptive Channel Occupation for Wireless Video Delivery

Adaptive Channel Occupation for Wireless Video Delivery Adaptive Channel Occupation for Wireless Video Delivery Ismail Djama and Toufik Ahmed CNRS-LaBRI Lab, University of Bordeaux-1. 351 Cours de la Libération, F-3345 Talence - France Tel: +33 5 4 35 47, Fax:

More information

King Fahd University of Petroleum and Minerals College of Computer Sciences and Engineering Department of Computer Engineering

King Fahd University of Petroleum and Minerals College of Computer Sciences and Engineering Department of Computer Engineering Student Name: Section #: King Fahd University of Petroleum and Minerals College of Computer Sciences and Engineering Department of Computer Engineering COE 344 Computer Networks (T072) Final Exam Date

More information

On the Interdependence of Congestion and Contention in Wireless Sensor Networks

On the Interdependence of Congestion and Contention in Wireless Sensor Networks On the Interdependence of Congestion and Contention in Wireless Sensor Networks Mehmet C. Vuran Vehbi C. Gungor School of Electrical & Computer Engineering Georgia Institute of Technology, Atlanta, GA

More information

AN4696 Application note

AN4696 Application note Application note SPWF01Sx power management options Introduction The purpose of this application note is to describe the power management options available on the SPWF01Sx Wi-Fi module [1]. It introduces

More information

Multiple Access Protocols

Multiple Access Protocols Multiple Access Protocols Computer Networks Lecture 2 http://goo.gl/pze5o8 Multiple Access to a Shared Channel The medium (or its sub-channel) may be shared by multiple stations (dynamic allocation) just

More information

Ameliorate Threshold Distributed Energy Efficient Clustering Algorithm for Heterogeneous Wireless Sensor Networks

Ameliorate Threshold Distributed Energy Efficient Clustering Algorithm for Heterogeneous Wireless Sensor Networks Vol. 5, No. 5, 214 Ameliorate Threshold Distributed Energy Efficient Clustering Algorithm for Heterogeneous Wireless Sensor Networks MOSTAFA BAGHOURI SAAD CHAKKOR ABDERRAHMANE HAJRAOUI Abstract Ameliorating

More information

Priority Traffic CSCD 433/533. Advanced Networks Spring Lecture 21 Congestion Control and Queuing Strategies

Priority Traffic CSCD 433/533. Advanced Networks Spring Lecture 21 Congestion Control and Queuing Strategies CSCD 433/533 Priority Traffic Advanced Networks Spring 2016 Lecture 21 Congestion Control and Queuing Strategies 1 Topics Congestion Control and Resource Allocation Flows Types of Mechanisms Evaluation

More information

Fuzzy Duty Cycle Adaption Algorithm for IEEE Star Topology Networks

Fuzzy Duty Cycle Adaption Algorithm for IEEE Star Topology Networks Computer Systems Department, Technical Institute / Qurna, Basra, Iraq email: hayderaam@gmail.com Received: 4/1 /212 Accepted: 22/7 /213 Abstract IEEE 82.15.4 is a standard designed for low data rate, low

More information

e-pg Pathshala Quadrant 1 e-text

e-pg Pathshala Quadrant 1 e-text e-pg Pathshala Subject : Computer Science Module: Bluetooth Paper: Computer Networks Module No: CS/CN/37 Quadrant 1 e-text In our journey on networks, we are now exploring wireless networks. We looked

More information

Impact of End-to-end QoS Connectivity on the Performance of Remote Wireless Local Networks

Impact of End-to-end QoS Connectivity on the Performance of Remote Wireless Local Networks Impact of End-to-end QoS Connectivity on the Performance of Remote Wireless Local Networks Veselin Rakocevic School of Engineering and Mathematical Sciences City University London EC1V HB, UK V.Rakocevic@city.ac.uk

More information

Modulation-Aware Energy Balancing in Hierarchical Wireless Sensor Networks 1

Modulation-Aware Energy Balancing in Hierarchical Wireless Sensor Networks 1 Modulation-Aware Energy Balancing in Hierarchical Wireless Sensor Networks 1 Maryam Soltan, Inkwon Hwang, Massoud Pedram Dept. of Electrical Engineering University of Southern California Los Angeles, CA

More information

Real-time and Reliable Video Transport Protocol (RRVTP) for Visual Wireless Sensor Networks (VSNs)

Real-time and Reliable Video Transport Protocol (RRVTP) for Visual Wireless Sensor Networks (VSNs) Real-time and Reliable Video Transport Protocol (RRVTP) for Visual Wireless Sensor Networks (VSNs) Dr. Mohammed Ahmed Abdala, Mustafa Hussein Jabbar College of Information Engineering, Al-Nahrain University,

More information

Wireless Networks (CSC-7602) Lecture 8 (15 Oct. 2007)

Wireless Networks (CSC-7602) Lecture 8 (15 Oct. 2007) Wireless Networks (CSC-7602) Lecture 8 (15 Oct. 2007) Seung-Jong Park (Jay) http://www.csc.lsu.edu/~sjpark 1 Today Wireline Fair Schedulling Why? Ideal algorithm Practical algorithms Wireless Fair Scheduling

More information

Comparison of pre-backoff and post-backoff procedures for IEEE distributed coordination function

Comparison of pre-backoff and post-backoff procedures for IEEE distributed coordination function Comparison of pre-backoff and post-backoff procedures for IEEE 802.11 distributed coordination function Ping Zhong, Xuemin Hong, Xiaofang Wu, Jianghong Shi a), and Huihuang Chen School of Information Science

More information