An Outband Paging Protocol for Energy-Efficient Mobile Communications

Size: px
Start display at page:

Download "An Outband Paging Protocol for Energy-Efficient Mobile Communications"

Transcription

1 246 IEEE TRANSACTIONS ON BROADCASTING, VOL. 48, NO. 3, SEPTEMBER 2002 An Outband Paging Protocol for Energy-Efficient Mobile Communications Apostolis K. Salkintzis, Member, IEEE and Chistodoulos Chamzas, Senior Member, IEEE Abstract In this paper a new protocol is proposed for reducing the power consumption of the battery-powered terminals in a mobile computing environment. We exploit the fact that, in a mobile data network mobile terminals do not continuously receive data and therefore they need not continuously operate their receivers. Nevertheless, they need to periodically check their traffic condition, that is, whether there are pending data for them or not. The proposed energy-efficient protocol is based on a paging procedure wherein a dedicated channel is used to alert (page) the terminals with pending traffic. Each terminal may check its traffic condition whenever it decides to by monitoring the paging channel. The protocol is evaluated through an approximated theoretical model and through computer simulation. We focus on deriving approximate formulas for the mean message delay, the message delay variance and the power consumption. It is shown that the proposed protocol can achieve considerable power saving at a cost of increased message delivery delay. Index Terms Energy-conserving protocol, energy consumption, energy saving, mobile data networks, power saving, protocol analysis, wireless communications. I. INTRODUCTION THE DEVELOPMENT of mobile data technology has exposed new opportunities to mobile computing. The emerging new services combined with the ramping up network performance and with the new wireless data transmission standards are quickly establishing an advanced framework, ready to serve the increasing mobility demand [1]. However, as mobile computing moves forward, mobile users are becoming increasingly demanding; they need service everywhere, at anytime. Therefore, the limited power resources of battery-operated mobile terminals is progressively becoming an annoying problem and network operators are forced to employ some kind of energy-efficient protocol as a means of extending the battery life of mobile terminals. In order to reduce battery-consumption, many mobile data networks and wireless LANs, such as MOBITEX [2], ARDIS [3], CDPD [4], IEEE [5] and HIPERLAN [6] apply some power-efficient protocols. Some details of these protocols can also be found in [7], [8]. The common idea behind all these protocols is the intermittent operation of receivers, which means Manuscript received May 13, 2002; revised August 7, This work was supported in part by the General Secretariat of Research and Technology, Greece, under the Project PENED 407. A. K. Salkintzis is with Motorola, GR-15125, Athens, Greece ( a.k.salkintzis@ieee.org). C. Chamzas is with the Department of Electrical and Computer Engineering, Democritus University of Thrace, Xanthi, Greece ( chamzas@ee.duth.gr). Publisher Item Identifier /TBC that the mobile stations conserve power by operating discontinuously their receive units. The discontinuous reception can be proved very efficient in terms of power saving because as Stemm et al. showed for typical usage scenarios, by far the most power (about 90 percent) is drawn by listening to the radio channel [9]. Packet transmission and reception contributes only a few percent to the energy balance. Obviously, in a packet data network, intermittent reception raises considerable problems since mobile stations are not always capable to receive data. The usual approach to cope with these problems is by managing the wake-up/sleep scheduling of the mobile stations, that is, by controlling the wake-up periods wherein the mobile stations should be awake. In such cases, all mobile stations are synchronized and wake up at the same time intervals and, for this reason, the power-saving protocols that implement such wake-up synchronization are called synchronous power-saving protocols. In principal, all the powersaving protocols used today in mobile computing environments feature such synchronization attributes. However, there are various problems associated with the synchronous power-saving protocols. In case of MOBITEX, for example, mobile stations are forced to wake-up at every wake-up period and this may not be the most appropriate scheme for the users [7]. This is because users with low traffic (or no traffic at all) are forced to wake-up frequently if there is buffered traffic for other users. Hence, the power consumption of one mobile station depends on the activity of the other mobile stations, therefore, an efficient power management is not possible. On the other hand, in case of CDPD and IEEE , receivers are not forced to wake-up at every wake-up period but, rather, they may choose to remain asleep during some wake-up periods if the battery resources are reduced. In this case, a new problem arises from the fact that the base station does not explicitly know when a mobile station is ready to receive data (i.e., it is awake). To overcome this problem, stations that get ready to receive data, transmit a special link-control frame (called here Receiver-Ready Notification, RRN) to notify the network of their reception capability. However, such transmissions may have quite detrimental effects on power-saving characteristics, in particular, when the synchronous wake-up process is considered: Since receivers tend to wake-up at the same time, they also tend to transmit their RRN messages at the same time. These RRN transmissions compete simultaneously for uplink resources and have high probability to collide with each other. Therefore, retransmission of RRNs is likely to happen and extra power may be unnecessarily consumed. To overcome the problems associated with the synchronous power-saving protocols, other alternatives have been proposed, /02$ IEEE

2 SALKINTZIS AND CHAMZAS: AN OUTBAND PAGING PROTOCOL FOR ENERGY-EFFICIENT MOBILE COMMUNICATIONS 247 usually referred to as asynchronous power-saving protocols [13]. For example, a pseudo-random class of energy-conserving protocols is proposed in [10], [11], where the terminals wake-up pseudo-randomly and thus asynchronously to each other. The main advantage of this approach is that the base station can predict when every terminal will wake-up and therefore there is no need for RRN transmissions. In [12], [13] another protocol is proposed, namely, the in-band energy saving protocol, where the terminals wake-up completely randomly. In this scheme, the downlink resources are statistically multiplexed to transmit page and data messages. The base station continuously pages the terminals having buffered traffic until it receives one or more RRN messages. In this case, data transmission takes place and subsequently the paging process is resumed provided there is still buffered traffic. The theoretical treatment of this energy-saving protocol can be found in [14]. Further information about additional means that have been proposed in the technical literature for reducing the power consumption in wireless communications, can be found in [15] [18]. This paper proposes and studies another asynchronous power-saving protocol, namely, the outband protocol, which has been introduced in [19]. This protocol is based on the fundamental principles of the in-band energy saving protocol, however, it realizes the paging process by completely different means. In Section II, the protocol details are presented along with some assumptions that simplify the protocol modeling. In Section III, the protocol is approximately studied with the aid of a cascade queuing model, while, in Section IV, the performance of the protocol is evaluated under various service disciplines. In this context, we focus on the mean delay of message delivery and on the message delay variance. Additionally, we demonstrate the power-saving characteristics of the protocol. Finally, in Section V, we conclude with some notable implementation notes and we describe the major applications where this protocol can be applied. II. PROTOCOL DESCRIPTION In our mobile computing environment a number of battery-operated terminals, connected to suitable radio modems, communicate with a single base station using the outband power-saving protocol, therefore, their receivers are not always in operation. The protocol itself may be implemented either in the radio modems firmware or in the communication drivers of the terminal unit. Whatever the case, the radio modem should be capable of powering on and off the radio receiver and of supporting the appropriate power management functions. The downlink channel (from base to terminals) is further divided into two distinct channels: the paging and the data channel. The traffic for terminals with unknown reception state is buffered in the base station and the paging channel is used to continuously broadcast the addresses of these terminals. Every terminal may check its traffic condition (whether it has buffered data or not) by powering on its receiver and getting a page message. Should this page message identify that buffered traffic for this terminal exist, the terminal transits onto the data channel and sends a Receiver-Ready Notification (RRN) Fig. 1. The queuing model for the outband protocol. message to notify the base station that it awaits for its buffered data. As soon as it receives its pending traffic, the terminal switches back to sleep mode and the whole process starts over again. It is important note that, in contrast to the synchronous power-saving protocols, every terminal may check its traffic condition whenever it wants. In general, the outband protocol allows the utilization of varying-length page messages, e.g., depending on the number of terminals with pending downlink traffic. However, if a fixed-length encoding scheme is implemented, 1 then it is possible to apply a slotted configuration in the paging channel, where each page message is transmitted within a slot period. Such configuration will be beneficial from a power-saving point of view, because terminals may arrange to wake-up only during a slot duration and no power-up time will be wasted. This is accomplished at an expense of firmware complexity, by making the sleep period of the terminals a multiple of the slot duration. In the following, we adopt this slotted configuration for the paging channel. The configuration of the uplink channel (from the mobile terminals to the base station) and mainly the multiple access scheme, may affect rigidly the characteristics of the protocol, since RRN transmissions are carried on this channel. In a general case, a terminal may need to send more than one RRNs to successfully declare its reception availability, since wireless channel impairments as well as collisions may corrupt RRNs. However, as explained before, the asynchronous wake-up scheduling provides a robust mechanism against RRN collisions that results in reduced power consumption and reduced average message delay. Other advantages of the outband protocol, as compared to the synchronous power-saving schemes, include the easy adaptation of power consumption to the current battery conditions and the lack of wake-up synchronization overhead. 1 A fixed-length bitmap encoding is practically possible. If a single page message cannot encode all the necessary terminals, then successive page messages may be used.

3 248 IEEE TRANSACTIONS ON BROADCASTING, VOL. 48, NO. 3, SEPTEMBER 2002 Fig. 2. Message arrival/departure timing in the paging queue. III. PROTOCOL MODELING AND ANALYSIS The model for the analysis of the outband energy-efficient protocol is based on the relatively simple cascade queuing system illustrated in Fig. 1. The base station maintains two queues, a paging queue and a service queue. Every data message that arrives to the base station enters into the paging queue, where it remains until the mobile terminal that the message is addressed to sends a RRN. Hence, the paging queue keeps all the messages that are addressed to mobile terminals, which are not in receive mode yet. After a mobile terminal responds to a page and sends a RRN, all its buffered messages are transferred from the paging queue into the service queue, where they wait to be transmitted on the data channel. The service discipline module at the bottom of the service queue (see Fig. 1) represents a function that selects messages for transmission with a particular discipline. System performance under various service disciplines is evaluated in Section IV. We are mainly interested in finding approximate formulas for the average length of the paging and service queues, as well as for the average message delivery delay. Below we summarize the assumptions used in our theoretical analysis: 1) The system consists of statistically identical mobile users serviced by one base station. These users are free to monitor the paging channel whenever they want to check if there is buffered traffic for them. 2) The sequence of message arrivals is assumed to be a Poisson process with total mean rate, therefore, the average traffic per user is. 3) The transmission time of a data message is exponentially distributed with an average value 1/. 4) For the purposes of our theoretical analysis, we assume that every RRN encounters no transmission delays and no corruption. This assumption will yield the best-case performance of the protocol and it will make our study independent of the peculiarities of the uplink channel. 5) Mobile terminals select a slot to wake-up at random, i.e., in each slot a terminal wakes-up with probability, which is constant and the same for all mobile terminals. This random scheduling have also been considered in other similar works, e.g., [10] [14]. 6) The paging channel is considered slotted with a slot duration. During a paging slot the base station transmits a page message unless there is no buffered traffic. 7) The traffic per mobile terminal,, is considered small. Otherwise, there is no point to implement discontinuous reception. 8) The base station has large buffer capabilities and we may neglect the probability of a queue overflow. A. Message Delay Queue Length We now proceed by finding the average length of the queues maintained by the base station and the average time that a message remains in these queues. These values will help a system designer to estimate the required buffer capacity of the base station and the total average delay that a message experiences in the downlink channel. 1) The Paging Queue: As already mentioned, every message that arrives at the base station enters into the paging queue where it remains until the base station receives a RRN from the mobile terminal that the message is addressed to. Fig. 2 shows a typical time diagram for this queue. In this figure, arrows over the time axis represent messages arriving to the queue and arrows below the time axis represent messages departing from the queue. As we can see, message M1 arrives during slot 2 and immediately enters into the paging queue. So, starting from slot 3, the base station also pages the mobile terminal, say T1, that this message is addressed to. According to Fig. 2, message M1 leaves the paging queue at the end of slot 4, which implies that the base station has received a RRN from terminal T1 at the end of this slot. As also indicated in Fig. 2, at the end of a paging slot many messages may leave the paging queue since many RRNs may arrive simultaneously (e.g., see the departures of messages M2, M3). Let denote the time a data message remains in the paging queue. Note that, will be zero if the message is addressed to a mobile terminal that has already sent a RRN and it is already in receive mode. However, when the traffic per user is small (as assumed) the probability to be zero is very small and we can assume that every arriving message always faces a delay in the paging queue. Under these conditions, the paging delay can always be written as: where is the interval from the message arrival till the beginning of the next paging slot and is the number of pages transmitted before the mobile terminal sends a RRN. Since all mobile terminals perform the same random wake-up scheduling (assumption 5), has a geometrical distribution with average value 1/ and the average time a message remains in the paging queue,, is: (1) (2)

4 SALKINTZIS AND CHAMZAS: AN OUTBAND PAGING PROTOCOL FOR ENERGY-EFFICIENT MOBILE COMMUNICATIONS 249 where represents the average value. As proved in Appendix, the probability to find data messages in the paging queue under steady-state conditions is a simple Poisson distribution with parameter (15), thus, the expected number of messages in the paging queue under equilibrium is (3) Since is known, it is straightforward to evaluate the number of data messages that leave the paging queue at the end of an arbitrary slot: messages leave at the end of a slot (4) 2) The Service Queue: As indicated by Fig. 1, messages that exit from the paging queue immediately enter into the service queue, where they wait to be transmitted on the data channel. Since messages exit from the paging queue only at slot edges and since a group of messages (i.e., a bulk) may exit simultaneously, we deduce that the service queue receives bulk message arrivals at discrete time instants. This input process differs from the usual case where a queue receives single messages at any time instant (like the notorious continuous-time M/M/1 queue [20]). In the Appendix, we derive the approximate expressions for both the average number of data messages in the service queue and the variance of this queue. For the specific case of exponentially distributed message lengths, we have: Note that, as compared to the continuous-time M/M/1 queue, the service queue in our case exhibits larger average length, as long as the page transmission time,, is greater than zero. When, the same result as with the M/M/1 queue is derived. In Fig. 3 we plot the variance of the service queue length for three values of slot duration. The case where corresponds to a system where the receivers are always in operation and, consequently, no paging is performed (this system is modeled as a continuous-time M/M/1 queue). We can observe that, the variance of the service queue length is considerably increased compared to the continuous-time M/M/1 case. In fact, the larger the slot duration, the larger the variance. This means that, in practice, we must make the capacity of the system queue larger than usual if we want to keep the same message drop (or queue overflow) probability. Finally, using (5) and Little s result [20], [22] we calculate the total average message delay in the downlink channel,, and the total average length of the paging and service queue as (5) (6) Fig. 3. s. The variance of the service queue length for three values of slot duration B. Energy Consumption The energy consumed 2 by a mobile terminal in any sufficiently large time interval of duration, can be easily decomposed into three parts: The energy consumed due to sporadic checking of its traffic condition, the energy consumed due to data reception (i.e., when a RRN has been sent and the receiver remains in operation to accept the forthcoming data), and the energy consumed due to the transmission of RRNs. If, in the time period, data messages arrive for a particular terminal, then (assuming again that is small) the terminal will send RRNs and will transit times to receive mode in that interval. Therefore, the terminal will be in receive mode for an average duration and the rest of the time,, will perform power-up/power-down oscillations. Since the average value of is, where is the mean message arrival rate per terminal, the average energy consumption in interval will be where is the power consumption during receiver operation and is the energy consumed by an RRN transmission. Denoting the transmission-to-reception power ratio by and the RRN transmission duration by (thus, ), the average power consumption of the terminal can be written as The ratio of the average power consumed (in order to sustain communication on the downlink channel) by a mobile terminal implementing the outband energy-efficient protocol, to the same 2 We refer to the energy consumed by a mobile terminal in order to receive messages. (7) (8) (9)

5 250 IEEE TRANSACTIONS ON BROADCASTING, VOL. 48, NO. 3, SEPTEMBER 2002 As can be identified from Fig. 4, the optimum data channel capacity depends linearly on the total downlink message rate. Therefore, unless the data channel capacity is dynamically adapted to the total downlink traffic rate, the system can not work continuously at the optimum point. This is another price we have to pay for conserving energy. Fig. 4. Message delay versus data channel capacity for various (D; p) pairs. Mean message length is 200 bits and total message arrival rate is 4 messages per second. power consumed by a terminal that continuously operates its receiver, is defined as the normalized downlink power consumption (NDPC). From (9) the NDPC is expressed as: (10) It is important to note that (10) is valid only when the traffic per user is small, as we have assumed. C. Downlink Partitioning As already mentioned, the proposed outband protocol devotes a portion of the available downlink capacity to the paging process. A problem that naturally arises from this dedicated assignment is how to make the overall downlink partitioning. Let s denote by the capacity (measured in bits/sec) of the paging channel and by the capacity of the data channel. Note that is constant. We need to find the proper, pair that minimizes the total downlink message delay given by (6). We can express as a function of by substituting to (6) the following values for the paging slot duration and the maximum message transmission rate : (11) where (bits) is the length of a page message and 1/ (bits) is the average length of a data message. In Fig. 4 we plot versus the data channel capacity for a typical system with kb/s overall downlink capacity. The mean message length is 200 bits and the total message arrival rate is 4 messages per second. The various curves shown in this Fig. 4 correspond to various ( ) pairs. Observe that, for every pair there is a single data channel capacity that minimized the average message delay. It is also interesting to see, that the lowest curve, corresponding to and, exhibits a wide flat range where the delay is almost equal to minimum. This shows that, as and (i.e., we approach the continuous-reception case), the average message delay gets less sensitive on capacity partitioning. IV. PERFORMANCE EVALUATION In this section we present the performance of the outband energy-efficient protocol by means of the theoretical results derived in the previous section and the results of computer simulation. 3 We mainly consider the average message delay (in the downlink direction), the message delay variance and the power consumption characteristics of the protocol. Additionally, we display the expected number of messages queued at the base station, since this is an important parameter that affects the storage allocation at the base station. In Fig. 5 we plot the expected number of messages queued at the base station versus the total normalized downlink traffic intensity. Note that corresponds to an average arrival rate equal to the maximum rate that messages may be transmitted in the overall downlink channel. Curves 1 3 correspond to the outband energy-efficient protocol, each one for a different value of the data channel capacity. The parameter shown in the diagram represents the length of a page relatively to the average message length. Both theoretical [derived from (7)] and simulation results are displayed and it is interesting to see that they are almost identical. This justifies that our analysis gives satisfactory results as far as queued messages are concerned. As we can observe from Fig. 5, when the total downlink traffic is expected to be small, it is better to allocate a small data channel capacity in order to reduce the number of queued messages and the message delay. However, as downlink traffic increases, it is better to increase the capacity of the data channel in order to accommodate the increased traffic demand. In Fig. 5 we also plot the expected queued messages when no paging takes place and when all receivers continuously operate (curve 4). It is easy to observe that, for conserving power at the mobile terminals, the base station needs to maintain greater buffer resources than usually. We now consider the system performance under three service disciplines, namely, First Come First Served (FCFS), exhaustive service, and nonpreemptive priority service. 1) FCFS Service Discipline: In FCFS service discipline, the first message coming into the service queue is the first one to be served. To resolve the ambiguity caused by the bulk arrivals (regarding which message comes first), we assume that whenever a bulk contains more than one message, these messages are placed randomly at the tail of the service queue. Generally, when a FCFS discipline is implemented a mobile terminal receives one data message at a time despite the fact that there may be more messages for it in the service queue. 4 3 For this simulation, we wrote a specific C program, which was generating Poisson traffic, was buffering the traffic and was forwarding the traffic to the data channel only after the recipient responded to paging. 4 A mobile terminal may go to the sleep mode only after it has no more messages in the service queue. For this purpose, every received message indicates if there are more pending messages in the base station or not.

6 SALKINTZIS AND CHAMZAS: AN OUTBAND PAGING PROTOCOL FOR ENERGY-EFFICIENT MOBILE COMMUNICATIONS 251 Fig. 5. Number of messages queued at the base station versus total normalized traffic intensity. Solid curves represent theoretical results (7), while dashed curves represent simulation results. Fig. 6. Average message delay versus normalized downlink traffic demand in case where a = 0:1. This policy causes mobile terminals to remain for long periods in receive mode but also assures that communication resources are fairly shared between users, i.e., users with high downlink traffic do not monopolize the data channel. In Fig. 6 we demonstrate the expected message delay versus the normalized downlink traffic intensity for three values of data channel capacity. It is noted that the expected message delay is considered normalized with respect to the mean message transmission time. For each case, both theoretical (solid lines) and simulation (dashed lines) results are plotted. Again, the expected message delay of the common continuous-reception case is included for comparison. The difference between simulation and theoretical curves comes from the assumption that every arriving data message stays in the paging queue. However, since Fig. 7. Average message delay versus normalized downlink traffic demand in case where a =0:5. this is primarily true when the traffic is small, we note that the difference between theoretical and simulation curves increases as increases. In Fig. 7 we plot again the expected message delay but for larger page messages. In fact, the length of a page message has been increased by 5. An interesting observation is that, when is large, message delay tends to remain relative constant over the entire usable traffic range. This is expected because, when is large, the dominant delay is introduced by the paging process, which is independent of the downlink traffic. Moreover, we note that as the length of page messages is reduced, the curves tend to join at low traffic conditions. Indeed, in Fig. 6, for small values of, the message delay is increased by 45% when increases from 0.4 to 0.8, whereas, in Fig. 7, the message delay is

7 252 IEEE TRANSACTIONS ON BROADCASTING, VOL. 48, NO. 3, SEPTEMBER 2002 Fig. 8. Average message delay variance for different values of data channel capacity. increased by 130% when goes again from 0.4 to 0.8. This indicates that, if we can make the length of pages small, then we can choose a large data channel capacity without major performance degradation at low traffic conditions. Fig. 8 illustrates the message delay variance derived from simulation versus the normalized downlink traffic intensity. The variance of the message delay develops considerable increase when compared to the continuous-reception case and this is caused by the extra randomness, which is introduced by the paging process. At low traffic rates, the variance is increased by 7 times, relative to the continuous-reception, when the data channel is 0.4, and by 25 times when the data channel is 0.8. In other words, a 100% increment of the data channel capacity causes a 257% increment of the variance. Consequently, if we slow down the paging process the variance of the message delay grows up rapidly. Fig. 9 focuses on the normalized downlink power consumption (NDPC), defined in Section III. The curves show the NDPC versus normalized downlink traffic demand for a network with 50 users and for a network with 100 users. In our simulation and theoretical models, for a constant downlink traffic, the traffic per user reduces as the population increases, hence the consumption for appears to be smaller than for. The solid lines represent the theoretical results derived from (10), which, once more, are more pessimistic than simulation results for the same reason explained earlier. We note that the NDPC increases almost linearly with the downlink traffic demand up to a point where the channel starts to saturate. In this case, the curves quickly converge to 1 because every terminal is forced to continuously operate in receive mode in order to accept its large buffered traffic. However, it is apparent that the protocol exhibits considerable power-saving features mainly where the traffic per user is small. An extremely important parameter concerning power consumption is the transmit to receive power ratio. This parameter, together with (the duration of RRNs), must be kept as small as possible in order to limit the power consumption caused Fig. 9. Normalized downlink power consumption versus total downlink traffic for a system with 50 users and a system with 100 users. by the transmission of RRNs. Otherwise, the power-saving characteristics of the protocol may become negative. However, our simulation results have shown that the NDPC remains smaller than 1 under all common values of, which range from 5 to 60 [13]. 5 2) Exhaustive Service Discipline: In exhaustive service discipline, all pending messages in the service queue addressed to the same terminal are grouped and transmitted together. In this way, a terminal receives all its buffered traffic in a short burst and, thus, the average time the terminal remains in receive mode is reduced. Consequently, the average power consumption may be expected to reduce and this is our main motivation toward the exhaustive service discipline. However, as we explain below, this is not always true. In Fig. 10 we plot the percentage of time that a terminal remains in receive mode in order to accept its buffered traffic versus the overall normalized downlink traffic. For example, when, a terminal spends approximately 12% of its time in receive mode. The solid line corresponds to FCFS discipline while the dashed line corresponds to exhaustive discipline. As we may observe, in the case of exhaustive service, the average time a station remains in receive mode is indeed reduced, thus, an extra power-saving gain can be obtained. Nevertheless, in the case of exhaustive service, the average number of RRNs per time unit (see Fig. 10) is also increased 6 and extra power is consumed by the additional transmissions. Therefore, the power-saving gain achieved by the reduced time in receive mode may be counterbalanced by the extra power cost of RRN transmissions. In fact, if the transmit to receive power ratio is large, the exhaustive service may exhibit increased power consumption. On the other hand, when is small, the power con- 5 Even when g is very large, a real time implementation could estimate the NDPC value and switch to continuous reception mode when this value is found larger than 1. 6 The main reason for this, is that the probability an arriving message for terminal T1 to find other messages in the service queue also for terminal T1 is reduced.

8 SALKINTZIS AND CHAMZAS: AN OUTBAND PAGING PROTOCOL FOR ENERGY-EFFICIENT MOBILE COMMUNICATIONS 253 Fig. 10. Number of RRNs per time unit and percentage of time that a terminal remains in receive mode versus downlink traffic. The plot compares exhaustive and FCFS disciplines. sumption is slightly reduced. Therefore, we conclude that the exhaustive service is beneficial in cases where the transmit-toreceive power ratio is small, e.g., in wireless LANs. We note that an exhaustive service discipline is always accompanied by a slight increase in message delay variance. 3) Non-Preemptive Priority Discipline: Now consider the case where every mobile terminal is assigned a unique priorityclass ( ) number. The terminal with the smallest pc number has the highest service priority, that is, messages for it are transmitted before the other messages in the service queue. In practice, this priority assignment is useful and easily implemented. For example, the base station may assign a priorityclass number to every new terminal that registers with it based on a battery-condition indication. In this way, terminals with low battery indication may be assigned a small number (in order to operate with reduced power consumption), while terminals with high battery indication may be assigned a higher number. In Fig. 11 we demonstrate how the priority scheme affects the average message delay in the outband energy-efficient protocol. The graph corresponds to a system with 50 users, each one operating with a wake-up probability. The data channel capacity is equal to 0.4. The cautious reader will observe that although some curves exceed the maximum traffic point (i.e., ), they are unrealistic beyond that point because the system overflows. As we can see, about the half of the users experience larger message delay when compared with the FCFS case. The message delay of the highest priority user (i.e., with ) exhibits a completely flat response, while the message delay of the lowest priority user presents a sharp ramp up. Similar observations can be made for the normalized downlink power consumption that is presented in Fig. 12. In this priority situation, high priority users remain for short periods in receive mode but, in general, they are forced to transmit RRNs Fig. 11. Average message delay for a system with 50 prioritized users. The FCFS curve represents the average message delay when no priority is applied. more frequently. On the other hand, low priority users transmit less RRNs but remain for longer period in receive mode. According to Fig. 12, most users, even the ones with low priority, experience reduced power consumption as compared to FCFS. This is caused by the radical reduction of RRN transmissions. V. CONCLUSION We have shown that the proposed outband protocol exhibits power-saving characteristics at a cost of increased mean message delay and message delay variance. The attainable power-

9 254 IEEE TRANSACTIONS ON BROADCASTING, VOL. 48, NO. 3, SEPTEMBER 2002 independent power management facilities, which are of considerable importance in a mobile computing environment. With this protocol, every mobile terminal may retain a dynamically tunable wake-up sleep cycle, proportional to its current battery status and apply a distinct network-independent algorithm to manage its own power resources. APPENDIX In this Appendix, we present the theoretical analysis of the queuing model shown in Fig. 1. The queues shown in the model are studied separately; first we study the paging queue and then the service queue. This separation is possible because of the assumption that the traffic per user is small. Fig. 12. Normalized downlink power consumption for a system with 50 prioritized users. The FCFS curve represents the normalized downlink consumption when no priority is applied. saving depends on the wake-up sleep scheduling, on the average downlink traffic per user, on the page message length and on the capacity of the data channel. In general, when the traffic per user is small, 90% power saving can be exhibited, while the expected message delay is increased by 4. It is clear that, for a number of delay-tolerant applications (e.g., transfer), the protocol may provide an ideal energy-efficient solution, because it allows individual terminals to implement a network-independent power management. The most profound benefits of the protocol are established under low traffic conditions, where the mean traffic per user is small. At these traffic rates both the mean message delay and the message delay variance exhibit low degradation and considerable power saving can be achieved. Therefore, patch-type applications like two-way messaging, small file transfer and exchange, are likely the most suitable application to be supported. Since a low transmit-to-receive power ratio is desired for mitigating the effects of RRN transmissions to the power consumption characteristics, networks employing pico and microcellular arrangements like digital cordless systems and wireless LANs are considered as the most favorable networks for implementation, since is really small in such networks. There are also other reasons that render these systems suitable for the outband energy-efficient protocol. For example, they feature extremely small round trip delay, thus, they provide for a fast returning channel, which is critical to the RRN transmissions. Additionally, the negligible corruption probability assumed for the RRNs is realized more easily in these networks, because they usually operate on high capacity channels with small bit error rate. Along with further enhancements the proposed protocol can be envisaged as an optional power-saving feature, where terminals that run out of energy switch to power saving mode after notifying the base station. In contrast to the synchronous powersaving protocols, the proposed protocol provides the means for A. Paging Queue Assuming we start with an empty paging subsystem at slot 1 (Fig. 2), we find, the probability to have buffered data messages in the paging queue right after the slot,. If a data message arrives during slot,, and is uniformly distributed in the interval [1, ], the probability that this message will have been served by the end of slot is service will have end by service will have end by arrival occurs during slot (12) where, denotes the time that the data message remains in the paging queue. The probability can be found if we condition on the number of arrivals in the interval (0, ) and then we drop the condition: where messages after messages arrive in Since we have assumed Poisson arrivals: (13) (14)

10 SALKINTZIS AND CHAMZAS: AN OUTBAND PAGING PROTOCOL FOR ENERGY-EFFICIENT MOBILE COMMUNICATIONS 255 Fig. 13. Service queue timing. For the equilibrium distribution end up to and from (14) we (15) B. Service Queue We find now the average number of messages in the service queue, as well as the variance of the number of messages in that queue. We note that the service queue is similar to the usual continuous-time M/M/1 queue, except that arrivals occur only at discrete time instants and every arrival may be composed of many messages. We refer to the typical timing diagram shown in Fig. 13. Again, arrows over the time axis represent messages coming into the service queue and arrows below the time axis represent messages going out of the service queue. With we represent the th data message that leaves the service queue and with we represent the service period of the data message. Let be the number of messages left in the queue just after the nth message departure (see Fig. 13). The sequence is the number of messages in the service queue at selected time instants and it forms an imbedded Markov chain. Solving for the probability generating function of when [denoted as ] in a similar way as in [21, pp. 181], we find: duration. However, an interval includes either or arrival points (slot edges), where denotes the integer part of the real number. Also the probability of the event includes arrival points is, since the beginning of the service time is uniformly distributed in a slot interval. So, we can write and from (17), (18), where and is the probability generating function of (4), (18) (19) (20) We can evaluate (19) by cutting the integral into intervals of size : (16) where and is a random variable representing the number of messages that arrive during a service period. may be found as follows: (21) Equation (21) is valid for every and it can be used to find a solution for any message length distribution. For exponentially distributed lengths where, we find arrivals occur during a service interval (22) or (17) where is the pdf of the service time and is the probability messages to arrive during a service period with Equation (22) gives the probability generating function of the number of data messages that arrive during a message service period. It is significant to observe that, when then, which is the result for the typical M/M/1 queue. The expected number of arrivals during a service interval is obtained by taking the first derivative of (22) at the limit : (23)

11 256 IEEE TRANSACTIONS ON BROADCASTING, VOL. 48, NO. 3, SEPTEMBER 2002 Using (16), (22) and (23) we calculate the average number of data messages in the service queue: [22] H. Kobayashi and A. G. Konheim, Queueing models for computer communications system analysis, IEEE Trans. Commun., vol. COM-25, pp. 2 28, (24) Finally, the variance of the queue length,, can be calculate from the following equation (25) where and represent the first and the second derivatives of. REFERENCES [1] J. E. Padgett, C. G. Guenther, and T. Hattori, Overview of wireless personal communications, IEEE Commun. Mag., vol. 33, no. 1, pp , Jan [2] Mobitex Interface Specification, RAM Mobile Data, 10 Woodbridge Center Drive, Woodbridge, NJ , [3] K. Pahlaval and A. H. Levesque, Wireless data communications, Proc. IEEE, vol. 82, no. 9, pp , Sept [4] CDPD forum, CDPD Interface Specification 1.1,, Jan [5] IEEE, Wireless Medium Access Control (MAC) and Physical Layer (PHY) Specifications,, Draft Standard D3.1, Apr [6] ETSI, High Performance Radio Local Area Network (HIPERLAN),, Draft Standard ETS , Mar [7] A. K. Salkintzis and C. Chamzas, Mobile packet data technology: An insight into MOBITEX architecture, IEEE Personal Commun., vol. 4, no. 1, pp , Feb [8] H. Woesner et al., Power-saving mechanisms in emerging standards for wireless LANs: The MAC lever perspective, IEEE Personal Commun., vol. 5, no. 3, pp , June [9] M. Stemm et al., Measuring and reducing energy consumption of network interfaces in hand-held devices, in Proc. MoMuC-3, Princeton, NJ, Sept [10] I. Chlamtac, C. Petrioli, and J. Redi, An energy-conserving access protocol for wireless communication, in ICC 97, Montréal, Québec, Canada, June 8 12, 1997, pp [11], Extensions to the pseudo-random class of energy-conserving access protocols, in IEEE Intl. Workshop on Factory Commun. Systems, Oct. 1997, pp [12] A. K. Salkintzis, C. Chamzas, and C. Koukourlis, An energy saving protocol for mobile data networks, in Intl. Conf. Advances in Communication and Control (COMCON 5), June 26 30, [13] A. K. Salkintzis and C. Chamzas, An in-band energy saving protocol for mobile data networks, IEEE Trans. Commun., vol. 46, no. 9, pp , Sept [14], Performance analysis of a downlink MAC protocol with powersaving support, IEEE Trans. Veh. Tech., to be published. [15] J. R. Lorch and A. J. Smith, Software strategies for portable computer energy management, IEEE Personal Commun., vol. 5, no. 3, pp , June [16] L. E. Larson, Radio frequency integrated circuit technology for lowpower wireless communications, IEEE Personal Commun., vol. 5, no. 3, pp , June [17] T. H. Meng et al., Low-power signal processing system design for wireless applications, IEEE Personal Commun., vol. 5, no. 3, pp , June [18] N. Bambos, Toward power-sensitive network architectures in wireless communications: Concepts, issues, and design aspects, IEEE Personal Commun., vol. 5, no. 3, pp , June [19] A. K. Salkintzis, S. Chatzis, and C. Chamzas, An energy-efficient protocol for mobile computing environments, in Int. Workshop on Mobile Communications, Thessaloniki, Greece, Sept , [20] L. Kleinrock, Queueing Systems Vol. I: Theory. New York: Wiley-Interscience, [21], Queueing Systems Vol. II: Computer Applications. New York: Wiley-Interscience, Apostolis K. Salkintzis (M 98) received his Diploma in 1991 and his Ph.D. degree in 1997, both from the Department of Electrical and Computer Engineering, Democritus University of Thrace, Xanthi, Greece. From 1992 to 1997 he was a Research Engineer at the Democritus University, studying mobile data networks and working on research projects dealing with the design and implementation of wireless data networks and protocols. In 1999 he was a Sessional Lecturer at the Department of Electrical and Computer Engineering, The University of British Columbia, Canada, and from October 1998 to December 1999 he was also Post Doctoral Fellow in the same department. During 1999 he was also a Visiting Fellow of Advanced Systems Institute of British Columbia, Canada, and during 2000 he was with the Institute of Space Applications and Remote Sensing (ISARS) of the National Observatory of Athens, Greece, where he conducted research on digital satellite communication systems. Since September 1999 he has been with Motorola Inc., working on the design and standardization of modern telecommunication networks, such as GPRS and UMTS. Dr. Salkintzis has served as principal guest editor in a number of special issues, including The Evolution of Mobile Data Networking for IEEE Personal Communications, Multimedia Communications over Satellites, for IEEE Personal Communications, IP Multimedia in Next Generation Mobile Networks: Services Protocols and Technologies, for IEEE Wireless Communications. He has served as referee for numerous IEEE journals and international conferences, including Globecom99, Globecom00, ICC2000, VTC99, VTC00, Globecom01, ICC01. He has organized several technical sessions in many of these conferences and has chaired most of them. His primary research activities lie in the area of wireless digital communication systems and networks, and particularly in mobile channel modeling, diversity techniques in multipath fading channels, error-correction coding, adaptive channel equalization, radio modem design with DSPs, and multiple access and data link protocols. Currently, he is most active in the design and standardization of GPRS and UMTS networks and he is an active participant and contributor in 3GPP standardization body. Dr. Salkintzis is a Member of the IEEE and a member of the Technical Chamber of Greece. Christodoulos Chamzas was born in Komotini, Greece. He received the Diploma degree in electrical and mechanical engineering from the National Technical University of Athens, Athens, Greece, in 1974 and the M.S. and Ph.D. degrees in electrical engineering in 1975 and 1979 from the Polytechnic Institute of New York, Farmingdale. From 1979 to 1982 Dr. Chamzas was an Assistant Professor with the Department of Electrical Engineering at Polytechnic Institute of New York. In September 1982 he joined AT&T Bell Laboratories, Holmdel, NJ, where he was a member of the Visual Communications Research Department until 1990, where he worked on adaptive systems, mobile communications, multimedia image databases and image coding. Since September 1990, he is a member of the Faculty of the Electrical and Computer Engineering Department, Democritus University of Thrace, where he is Director of the Electric Circuits Analysis Lab. of the Image Processing and Multimedia Unit, and Director of the Cultural and Educational Technologies Institute. He has been a major player in the definition, design, and implementation of the CCITT/ISO (JBIG, JPEG, etc.), standards for coding, storage, and retrieval of images (color and bilevel) an area where he holds six international patents. In , he was a visiting professor with the Department of Computer Science at the University of Crete, Iraklion, Greece. Since 1994, he is a member of the Telematics for Knowledge Working Party of EE. He has held summer positions in Greece, England, Portugal, as well as at Bell Laboratories. His primary interests are in digital signal processing, image coding, multimedia, and communications systems. He is currently interested in the implementation of multimedia image data base algorithms either with fast software or with VLSI design. Dr. Chamzas is a member of the Technical Chamber of Greece, Sigma Xi, and was an Editor in the IEEE TRANSACTIONS ON COMMUNICATIONS.

Investigating MAC-layer Schemes to Promote Doze Mode in based WLANs

Investigating MAC-layer Schemes to Promote Doze Mode in based WLANs Investigating MAC-layer Schemes to Promote Doze Mode in 802.11-based WLANs V. Baiamonte and C.-F. Chiasserini CERCOM - Dipartimento di Elettronica Politecnico di Torino Torino, Italy Email: baiamonte,chiasserini

More information

Improving IEEE Power Saving Mechanism

Improving IEEE Power Saving Mechanism 1 Improving IEEE 82.11 Power Saving Mechanism Eun-Sun Jung 1 and Nitin H. Vaidya 2 1 Dept. of Computer Science, Texas A&M University, College Station, TX 77843, USA Email: esjung@cs.tamu.edu 2 Dept. of

More information

Comparison of pre-backoff and post-backoff procedures for IEEE distributed coordination function

Comparison of pre-backoff and post-backoff procedures for IEEE distributed coordination function Comparison of pre-backoff and post-backoff procedures for IEEE 802.11 distributed coordination function Ping Zhong, Xuemin Hong, Xiaofang Wu, Jianghong Shi a), and Huihuang Chen School of Information Science

More information

A simple mathematical model that considers the performance of an intermediate node having wavelength conversion capability

A simple mathematical model that considers the performance of an intermediate node having wavelength conversion capability A Simple Performance Analysis of a Core Node in an Optical Burst Switched Network Mohamed H. S. Morsy, student member, Mohamad Y. S. Sowailem, student member, and Hossam M. H. Shalaby, Senior member, IEEE

More information

Enhanced Broadcasting and Code Assignment in Mobile Ad Hoc Networks

Enhanced Broadcasting and Code Assignment in Mobile Ad Hoc Networks Enhanced Broadcasting and Code Assignment in Mobile Ad Hoc Networks Jinfang Zhang, Zbigniew Dziong, Francois Gagnon and Michel Kadoch Department of Electrical Engineering, Ecole de Technologie Superieure

More information

CHAPTER 5 PROPAGATION DELAY

CHAPTER 5 PROPAGATION DELAY 98 CHAPTER 5 PROPAGATION DELAY Underwater wireless sensor networks deployed of sensor nodes with sensing, forwarding and processing abilities that operate in underwater. In this environment brought challenges,

More information

Performance Analysis of WLANs Under Sporadic Traffic

Performance Analysis of WLANs Under Sporadic Traffic Performance Analysis of 802.11 WLANs Under Sporadic Traffic M. Garetto and C.-F. Chiasserini Dipartimento di Elettronica, Politecnico di Torino, Italy Abstract. We analyze the performance of 802.11 WLANs

More information

AN ANALYSIS OF THE MODIFIED BACKOFF MECHANISM FOR IEEE NETWORKS

AN ANALYSIS OF THE MODIFIED BACKOFF MECHANISM FOR IEEE NETWORKS AN ANALYSIS OF THE MODIFIED BACKOFF MECHANISM FOR IEEE 802.11 NETWORKS Marek Natkaniec, Andrzej R. Pach Department of Telecommunications University of Mining and Metallurgy al. Mickiewicza 30, 30-059 Cracow

More information

Performance of Multihop Communications Using Logical Topologies on Optical Torus Networks

Performance of Multihop Communications Using Logical Topologies on Optical Torus Networks Performance of Multihop Communications Using Logical Topologies on Optical Torus Networks X. Yuan, R. Melhem and R. Gupta Department of Computer Science University of Pittsburgh Pittsburgh, PA 156 fxyuan,

More information

PDQRAP - Prioritized Distributed Queueing Random Access Protocol. DQRAP Research Group Report 93-2

PDQRAP - Prioritized Distributed Queueing Random Access Protocol. DQRAP Research Group Report 93-2 PDQRAP - Prioritized Distributed Queueing Random Access Protocol Harn-Jier Lin Graham Campbell Computer Science Dept. Illinois Institute of Technology Chicago IL, 60616 DQRAP Research Group Report 93-2

More information

Markov Chains and Multiaccess Protocols: An. Introduction

Markov Chains and Multiaccess Protocols: An. Introduction Markov Chains and Multiaccess Protocols: An Introduction Laila Daniel and Krishnan Narayanan April 8, 2012 Outline of the talk Introduction to Markov Chain applications in Communication and Computer Science

More information

Buffered Fixed Routing: A Routing Protocol for Real-Time Transport in Grid Networks

Buffered Fixed Routing: A Routing Protocol for Real-Time Transport in Grid Networks JOURNAL OF LIGHTWAVE TECHNOLOGY, VOL. 18, NO. 6, JUNE 2000 757 Buffered Fixed Routing: A Routing Protocol for Real-Time Transport in Grid Networks Jinhan Song and Saewoong Bahk Abstract In this paper we

More information

Energy Management Issue in Ad Hoc Networks

Energy Management Issue in Ad Hoc Networks Wireless Ad Hoc and Sensor Networks - Energy Management Outline Energy Management Issue in ad hoc networks WS 2010/2011 Main Reasons for Energy Management in ad hoc networks Classification of Energy Management

More information

Performance Study of Interweave Spectrum Sharing Method in Cognitive Radio

Performance Study of Interweave Spectrum Sharing Method in Cognitive Radio Performance Study of Interweave Spectrum Sharing Method in Cognitive Radio Abstract Spectrum scarcity is one of the most critical recent problems in the field of wireless communication One of the promising

More information

Performance of UMTS Radio Link Control

Performance of UMTS Radio Link Control Performance of UMTS Radio Link Control Qinqing Zhang, Hsuan-Jung Su Bell Laboratories, Lucent Technologies Holmdel, NJ 77 Abstract- The Radio Link Control (RLC) protocol in Universal Mobile Telecommunication

More information

Two-Tier WBAN/WLAN Healthcare Networks; Priority Considerations

Two-Tier WBAN/WLAN Healthcare Networks; Priority Considerations Two-Tier WBAN/WLAN Healthcare Networks; Priority Considerations Saeed Rashwand Department of Computer Science University of Manitoba Jelena Mišić Department of Computer Science Ryerson University Abstract

More information

IN distributed random multiple access, nodes transmit

IN distributed random multiple access, nodes transmit 414 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 52, NO. 2, FEBRUARY 2006 Power Levels and Packet Lengths in Random Multiple Access With Multiple-Packet Reception Capability Jie Luo, Member, IEEE, and

More information

Energy Management Issue in Ad Hoc Networks

Energy Management Issue in Ad Hoc Networks Wireless Ad Hoc and Sensor Networks (Energy Management) Outline Energy Management Issue in ad hoc networks WS 2009/2010 Main Reasons for Energy Management in ad hoc networks Classification of Energy Management

More information

An Efficient Scheduling Scheme for High Speed IEEE WLANs

An Efficient Scheduling Scheme for High Speed IEEE WLANs An Efficient Scheduling Scheme for High Speed IEEE 802.11 WLANs Juki Wirawan Tantra, Chuan Heng Foh, and Bu Sung Lee Centre of Muldia and Network Technology School of Computer Engineering Nanyang Technological

More information

MPEG4 VIDEO OVER PACKET SWITCHED CONNECTION OF THE WCDMA AIR INTERFACE

MPEG4 VIDEO OVER PACKET SWITCHED CONNECTION OF THE WCDMA AIR INTERFACE MPEG4 VIDEO OVER PACKET SWITCHED CONNECTION OF THE WCDMA AIR INTERFACE Jamil Y. Khan 1, Pratik Das 2 School of Electrical Engineering and Computer Science, University of Newcastle, Callaghan, NSW 238,

More information

Reservation Packet Medium Access Control for Wireless Sensor Networks

Reservation Packet Medium Access Control for Wireless Sensor Networks Reservation Packet Medium Access Control for Wireless Sensor Networks Hengguang Li and Paul D Mitchell Abstract - This paper introduces the Reservation Packet Medium Access Control (RP-MAC) protocol for

More information

Efficient Power Management in Wireless Communication

Efficient Power Management in Wireless Communication Efficient Power Management in Wireless Communication R.Saranya 1, Mrs.J.Meena 2 M.E student,, Department of ECE, P.S.R.College of Engineering, sivakasi, Tamilnadu, India 1 Assistant professor, Department

More information

Packet multiple access and the Aloha protocol

Packet multiple access and the Aloha protocol Packet multiple access and the Aloha protocol Massachusetts Institute of Technology Department of Aeronautics and Astronautics Slide 1 Packet Multiple Access PMA SHARED UPLINK TERMINAL TERMINAL APPL TRANS

More information

Performance Analysis of Cell Switching Management Scheme in Wireless Packet Communications

Performance Analysis of Cell Switching Management Scheme in Wireless Packet Communications Performance Analysis of Cell Switching Management Scheme in Wireless Packet Communications Jongho Bang Sirin Tekinay Nirwan Ansari New Jersey Center for Wireless Telecommunications Department of Electrical

More information

A QUANTITATIVE ANALYSIS OF HANDOVER TIME AT MAC LAYER FOR WIRELESS MOBILE NETWORKS

A QUANTITATIVE ANALYSIS OF HANDOVER TIME AT MAC LAYER FOR WIRELESS MOBILE NETWORKS A QUANTITATIVE ANALYSIS OF HANDOVER TIME AT MAC LAYER FOR WIRELESS MOBILE NETWORKS Syed S. Rizvi 1, Aasia Riasat 2, and Khaled M. Elleithy 3 1 Computer Science and Engineering Department, University of

More information

Multichannel Outage-aware MAC Protocols for Wireless Networks

Multichannel Outage-aware MAC Protocols for Wireless Networks Submitted - the 4th IEEE Conference on Industrial Electronics and Applications (ICIEA 29) Multichannel Outage-aware MAC Protocols for Wireless Networks Hyukjin Lee and Cheng-Chew Lim School of Electrical

More information

ETSN01 Exam Solutions

ETSN01 Exam Solutions ETSN01 Exam Solutions March 014 Question 1 (a) See p17 of the cellular systems slides for a diagram and the full procedure. The main points here were that the HLR needs to be queried to determine the location

More information

Impact of IEEE MAC Packet Size on Performance of Wireless Sensor Networks

Impact of IEEE MAC Packet Size on Performance of Wireless Sensor Networks IOSR Journal of Electronics and Communication Engineering (IOSR-JECE) e-issn: 2278-2834,p- ISSN: 2278-8735.Volume 10, Issue 3, Ver. IV (May - Jun.2015), PP 06-11 www.iosrjournals.org Impact of IEEE 802.11

More information

TSIN01 Information Networks Lecture 3

TSIN01 Information Networks Lecture 3 TSIN01 Information Networks Lecture 3 Danyo Danev Division of Communication Systems Department of Electrical Engineering Linköping University, Sweden September 10 th, 2018 Danyo Danev TSIN01 Information

More information

SENSOR-MAC CASE STUDY

SENSOR-MAC CASE STUDY SENSOR-MAC CASE STUDY Periodic Listen and Sleep Operations One of the S-MAC design objectives is to reduce energy consumption by avoiding idle listening. This is achieved by establishing low-duty-cycle

More information

Chapter 6 Medium Access Control Protocols and Local Area Networks

Chapter 6 Medium Access Control Protocols and Local Area Networks Chapter 6 Medium Access Control Protocols and Local Area Networks Part I: Medium Access Control Part II: Local Area Networks CSE 3213, Winter 2010 Instructor: Foroohar Foroozan Chapter Overview Broadcast

More information

Mobility Management in Heterogeneous Mobile Communication Networks through an Always Best Connected Integrated Architecture

Mobility Management in Heterogeneous Mobile Communication Networks through an Always Best Connected Integrated Architecture Mobility Management in Heterogeneous Mobile Communication Networks through an Always Best Connected Integrated Architecture Dionysia Triantafyllopoulou *, National and Kapodistrian University of Athens

More information

Diminishing Signaling Traffic for Authentication in Mobile Communication System

Diminishing Signaling Traffic for Authentication in Mobile Communication System Diminishing Signaling Traffic for Authentication in Mobile Communication System Chi-Chun Lo and Kuen-Liang Sue Institute of Information Management National Chiao Tung University Hsinchu, Taiwan cclo@cc.nctu.edu.tw,

More information

Expanding the use of CTS-to-Self mechanism to improving broadcasting on IEEE networks

Expanding the use of CTS-to-Self mechanism to improving broadcasting on IEEE networks Expanding the use of CTS-to-Self mechanism to improving broadcasting on IEEE 802.11 networks Christos Chousidis, Rajagopal Nilavalan School of Engineering and Design Brunel University London, UK {christos.chousidis,

More information

Automatic Rate Adaptation and Energy-Saving Mechanisms Based on Cross-Layer Information for Packet-Switched Data Networks

Automatic Rate Adaptation and Energy-Saving Mechanisms Based on Cross-Layer Information for Packet-Switched Data Networks Automatic Rate Adaptation and Energy-Saving Mechanisms Based on Cross-Layer Information for Packet-Switched Data Networks LUIS ALONSO AND RAMON AGUSTI POLYTECHNIC UNIVERSITY OF CATALONIA (UPC) Abstract

More information

Unavoidable Constraints and Collision Avoidance Techniques in Performance Evaluation of Asynchronous Transmission WDMA Protocols

Unavoidable Constraints and Collision Avoidance Techniques in Performance Evaluation of Asynchronous Transmission WDMA Protocols 1th WEA International Conference on COMMUICATIO, Heraklion, reece, July 3-5, 8 Unavoidable Constraints and Collision Avoidance Techniques in Performance Evaluation of Asynchronous Transmission WDMA Protocols

More information

Power-efficient Communication Protocol for Social Networking Tags for Visually Impaired

Power-efficient Communication Protocol for Social Networking Tags for Visually Impaired Power-efficient Communication Protocol for Social Networking Tags for Visually Impaired Problem Social Networking Tags System for Visually Impaired is an project aims to utilize electronic id technology

More information

RED behavior with different packet sizes

RED behavior with different packet sizes RED behavior with different packet sizes Stefaan De Cnodder, Omar Elloumi *, Kenny Pauwels Traffic and Routing Technologies project Alcatel Corporate Research Center, Francis Wellesplein, 1-18 Antwerp,

More information

Error Control System for Parallel Multichannel Using Selective Repeat ARQ

Error Control System for Parallel Multichannel Using Selective Repeat ARQ Error Control System for Parallel Multichannel Using Selective Repeat ARQ M.Amal Rajan 1, M.Maria Alex 2 1 Assistant Prof in CSE-Dept, Jayamatha Engineering College, Aralvaimozhi, India, 2 Assistant Prof

More information

Performance Evaluation of Scheduling Mechanisms for Broadband Networks

Performance Evaluation of Scheduling Mechanisms for Broadband Networks Performance Evaluation of Scheduling Mechanisms for Broadband Networks Gayathri Chandrasekaran Master s Thesis Defense The University of Kansas 07.31.2003 Committee: Dr. David W. Petr (Chair) Dr. Joseph

More information

Prioritization scheme for QoS in IEEE e WLAN

Prioritization scheme for QoS in IEEE e WLAN Prioritization scheme for QoS in IEEE 802.11e WLAN Yakubu Suleiman Baguda a, Norsheila Fisal b a,b Department of Telematics & Communication Engineering, Faculty of Electrical Engineering Universiti Teknologi

More information

Multiple Access Protocols

Multiple Access Protocols Multiple Access Protocols Computer Networks Lecture 2 http://goo.gl/pze5o8 Multiple Access to a Shared Channel The medium (or its sub-channel) may be shared by multiple stations (dynamic allocation) just

More information

Fig. 1. Superframe structure in IEEE

Fig. 1. Superframe structure in IEEE Analyzing the Performance of GTS Allocation Using Markov Model in IEEE 802.15.4 Alladi Ramesh 1,Dr.P.Sumithabhashini 2 1 Dept.of CSE, PETW, Hyderabad 2 Dept.of ECE, PETW, Hyderabad Abstract-In this paper,

More information

An Improved Priority Dynamic Quantum Time Round-Robin Scheduling Algorithm

An Improved Priority Dynamic Quantum Time Round-Robin Scheduling Algorithm An Improved Priority Dynamic Quantum Time Round-Robin Scheduling Algorithm Nirali A. Patel PG Student, Information Technology, L.D. College Of Engineering,Ahmedabad,India ABSTRACT In real-time embedded

More information

HSUPA Services Achieving Maximum Uplink Speed of 5.7 Mbit/s

HSUPA Services Achieving Maximum Uplink Speed of 5.7 Mbit/s HSUPA Services Achieving Maximum Uplink Speed of 5.7 Mbit/s Enhanced Uplink FOMA Mobile Terminals Maximum Uplink Speed of 5.7 Mbit/s HSUPA Services Achieving Maximum Uplink Speed of 5.7 Mbit/s NTT DOCOMO

More information

Comparison of RRC and MAC based methods of dynamic scheduling between users on the uplink

Comparison of RRC and MAC based methods of dynamic scheduling between users on the uplink ETSI SMG2 UMTS L2/3 Tdoc TSGR2#2(99) 127 Stockholm 8-11 March 1999 Agenda item: 6.2 Source: Motorola Comparison of RRC and MAC based methods of dynamic scheduling between users on the uplink 1 Introduction

More information

Credit Pre-Reservation Mechanism for Mobile Prepaid Service

Credit Pre-Reservation Mechanism for Mobile Prepaid Service Credit Pre-Reservation Mechanism for Mobile Prepaid Service Jyoti Bhosale Department of Computer Science Engineering VDF school of Engg,Latur,Maharashtra, India Priyanka Pawar Department of Computer Science

More information

Class-based Packet Scheduling Policies for Bluetooth

Class-based Packet Scheduling Policies for Bluetooth Class-based Packet Scheduling Policies for Bluetooth Vishwanath Sinha, D. Raveendra Babu Department of Electrical Engineering Indian Institute of Technology, Kanpur - 08 06, INDIA vsinha@iitk.ernet.in,

More information

Scheduling Algorithms to Minimize Session Delays

Scheduling Algorithms to Minimize Session Delays Scheduling Algorithms to Minimize Session Delays Nandita Dukkipati and David Gutierrez A Motivation I INTRODUCTION TCP flows constitute the majority of the traffic volume in the Internet today Most of

More information

On Achieving Fairness and Efficiency in High-Speed Shared Medium Access

On Achieving Fairness and Efficiency in High-Speed Shared Medium Access IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 11, NO. 1, FEBRUARY 2003 111 On Achieving Fairness and Efficiency in High-Speed Shared Medium Access R. Srinivasan, Member, IEEE, and Arun K. Somani, Fellow, IEEE

More information

Energy-Aware Routing in Wireless Ad-hoc Networks

Energy-Aware Routing in Wireless Ad-hoc Networks Energy-Aware Routing in Wireless Ad-hoc Networks Panagiotis C. Kokkinos Christos A. Papageorgiou Emmanouel A. Varvarigos Abstract In this work we study energy efficient routing strategies for wireless

More information

Payload Length and Rate Adaptation for Throughput Optimization in Wireless LANs

Payload Length and Rate Adaptation for Throughput Optimization in Wireless LANs Payload Length and Rate Adaptation for Throughput Optimization in Wireless LANs Sayantan Choudhury and Jerry D. Gibson Department of Electrical and Computer Engineering University of Califonia, Santa Barbara

More information

Project Report: QoS Enhancement for Real-Time Traffic in IEEE WLAN

Project Report: QoS Enhancement for Real-Time Traffic in IEEE WLAN Project Report: QoS Enhancement for Real-Time Traffic in IEEE802.11 WLAN Abstract A key issue in IEEE802.11 WLAN MAC is how to provide QoS support, especially for time-bounded traffic. Although much work

More information

Lecture 14: M/G/1 Queueing System with Priority

Lecture 14: M/G/1 Queueing System with Priority Lecture 14: M/G/1 Queueing System with Priority Dr. Mohammed Hawa Electrical Engineering Department University of Jordan EE723: Telephony. Priority Queueing Systems Until the moment, we assumed identical

More information

OVSF Code Tree Management for UMTS with Dynamic Resource Allocation and Class-Based QoS Provision

OVSF Code Tree Management for UMTS with Dynamic Resource Allocation and Class-Based QoS Provision OVSF Code Tree Management for UMTS with Dynamic Resource Allocation and Class-Based QoS Provision Huei-Wen Ferng, Jin-Hui Lin, Yuan-Cheng Lai, and Yung-Ching Chen Department of Computer Science and Information

More information

Low pass filter/over drop avoidance (LPF/ODA): an algorithm to improve the response time of RED gateways

Low pass filter/over drop avoidance (LPF/ODA): an algorithm to improve the response time of RED gateways INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS Int. J. Commun. Syst. 2002; 15:899 906 (DOI: 10.1002/dac.571) Low pass filter/over drop avoidance (LPF/ODA): an algorithm to improve the response time of

More information

Performance of DSMA/CD in CDPD Networks

Performance of DSMA/CD in CDPD Networks Performance of DSMA/CD in CDPD Networks Riikka Susitaival Networking Laboratory, Helsinki University of Technology Email: Riikka.Susitaival@hut.fi November 23, 2002 Abstract Cellular Digital Packet Data

More information

Introduction to Real-Time Communications. Real-Time and Embedded Systems (M) Lecture 15

Introduction to Real-Time Communications. Real-Time and Embedded Systems (M) Lecture 15 Introduction to Real-Time Communications Real-Time and Embedded Systems (M) Lecture 15 Lecture Outline Modelling real-time communications Traffic and network models Properties of networks Throughput, delay

More information

RECENTLY, the information exchange using wired and

RECENTLY, the information exchange using wired and Fast Dedicated Retransmission Scheme for Reliable Services in OFDMA Systems Howon Lee and Dong-Ho Cho Department of Electrical Engineering and Computer Science Korea Advanced Institute of Science and Technology

More information

Keywords T MAC protocol, reduction function, wsn, contention based mac protocols, energy efficiency; Fig 1. Listen and sleep cycle in S MAC protocol

Keywords T MAC protocol, reduction function, wsn, contention based mac protocols, energy efficiency; Fig 1. Listen and sleep cycle in S MAC protocol Volume 3, Issue 6, June 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Introduction to

More information

Analysis of a Multiple Content Variant Extension of the Multimedia Broadcast/Multicast Service

Analysis of a Multiple Content Variant Extension of the Multimedia Broadcast/Multicast Service PUBLISHED IN: PROCEEDINGS OF THE EUROPEAN WIRELESS 2006 CONFERENCE 1 Analysis of a Multiple Content Variant Extension of the Multimedia Broadcast/Multicast Service George Xylomenos, Konstantinos Katsaros

More information

Low Energy Priority Oriented Adaptive Control with QoS Guarantee for Wireless Networks

Low Energy Priority Oriented Adaptive Control with QoS Guarantee for Wireless Networks 12th Annual Symposium of the IEEE/CVT, Nov. 3, 2005, Enschede, the Netherlands 1 Low Energy Priority Oriented Adaptive Control with QoS Guarantee for Wireless Networks T. D. Lagkas, G. I. Papadimitriou,

More information

IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 14, NO. 10, OCTOBER Aimin Tang and Xudong Wang, Senior Member, IEEE

IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 14, NO. 10, OCTOBER Aimin Tang and Xudong Wang, Senior Member, IEEE IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 14, NO. 10, OCTOBER 2015 5871 A-Duplex: Medium Access Control for Efficient Coexistence Between Full-Duplex and Half-Duplex Communications Aimin Tang

More information

A More Realistic Energy Dissipation Model for Sensor Nodes

A More Realistic Energy Dissipation Model for Sensor Nodes A More Realistic Energy Dissipation Model for Sensor Nodes Raquel A.F. Mini 2, Antonio A.F. Loureiro, Badri Nath 3 Department of Computer Science Federal University of Minas Gerais Belo Horizonte, MG,

More information

Wireless Networked Systems

Wireless Networked Systems Wireless Networked Systems CS 795/895 - Spring 2013 Lec #6: Medium Access Control QoS and Service Differentiation, and Power Management Tamer Nadeem Dept. of Computer Science Quality of Service (802.11e)

More information

AODV-PA: AODV with Path Accumulation

AODV-PA: AODV with Path Accumulation -PA: with Path Accumulation Sumit Gwalani Elizabeth M. Belding-Royer Department of Computer Science University of California, Santa Barbara fsumitg, ebeldingg@cs.ucsb.edu Charles E. Perkins Communications

More information

End-To-End Delay Optimization in Wireless Sensor Network (WSN)

End-To-End Delay Optimization in Wireless Sensor Network (WSN) Shweta K. Kanhere 1, Mahesh Goudar 2, Vijay M. Wadhai 3 1,2 Dept. of Electronics Engineering Maharashtra Academy of Engineering, Alandi (D), Pune, India 3 MITCOE Pune, India E-mail: shweta.kanhere@gmail.com,

More information

Quality Control Scheme for ATM Switching Network

Quality Control Scheme for ATM Switching Network UDC 621.395.345: 621.395.74 Quality Control Scheme for ATM Switching Network VMasafumi Katoh VTakeshi Kawasaki VSatoshi Kakuma (Manuscript received June 5,1997) In an ATM network, there are many kinds

More information

ACLASS of users that has drawn much attention over the

ACLASS of users that has drawn much attention over the 296 IEEE TRANSACTIONS ON BROADCASTING, VOL. 56, NO. 3, SEPTEMBER 2010 Statistical Multiplexing of Upstream Transmissions in DOCSIS Cable Networks César Heyaime-Duvergé and Vasant K. Prabhu, Life Fellow,

More information

/99/$10.00 (c) 1999 IEEE

/99/$10.00 (c) 1999 IEEE COLLISION-FREE MEDIUM ACCESS CONTROL SCHEME FOR AD-HOC NETWORKS Zygmunt J. Haas and Jing Deng School of Electrical Engineering Cornell University Ithaca, NY 14853 haas@ee.cornell.edu Siamak Tabrizi US

More information

AN EFFICIENT MAC PROTOCOL BASED ON HYBRID SUPERFRAME FOR WIRELESS SENSOR NETWORKS

AN EFFICIENT MAC PROTOCOL BASED ON HYBRID SUPERFRAME FOR WIRELESS SENSOR NETWORKS AN EFFICIENT MAC PROTOCOL BASED ON HYBRID SUPERFRAME FOR WIRELESS SENSOR NETWORKS Ge Ma and Dongyu Qiu Department of Electrical and Computer Engineering Concordia University, Montreal, QC, Canada tina0702@gmail.com,

More information

Department of Electrical and Computer Systems Engineering

Department of Electrical and Computer Systems Engineering Department of Electrical and Computer Systems Engineering Technical Report MECSE-6-2006 Medium Access Control (MAC) Schemes for Quality of Service (QoS) provision of Voice over Internet Protocol (VoIP)

More information

Performance Analysis of DS/SSMA Unslotted ALOHA System With Variable Length Data Traffic

Performance Analysis of DS/SSMA Unslotted ALOHA System With Variable Length Data Traffic IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 19, NO. 11, NOVEMBER 2001 2215 Performance Analysis of DS/SSMA Unslotted ALOHA System With Variable Length Data Traffic Jae-Woo So, Student Member,

More information

A new MAC protocol for reducing effect of needless transmission deferment induced by missed RTS/CTS handshake

A new MAC protocol for reducing effect of needless transmission deferment induced by missed RTS/CTS handshake Mobile Information Systems 5 (009) 3 DOI 0.333/MIS-009-0070 IOS Press A new MAC protocol for reducing effect of needless transmission deferment induced by missed / handshake Tetsuya Shigeyasu a, Daishi

More information

A Backoff Algorithm for Improving Saturation Throughput in IEEE DCF

A Backoff Algorithm for Improving Saturation Throughput in IEEE DCF A Backoff Algorithm for Improving Saturation Throughput in IEEE 80.11 DCF Kiyoshi Takahashi and Toshinori Tsuboi School of Computer Science, Tokyo University of Technology, 1404-1 Katakura, Hachioji, Tokyo,

More information

R-MAC: An Energy-Efficient MAC Protocol for Underwater Sensor Networks

R-MAC: An Energy-Efficient MAC Protocol for Underwater Sensor Networks R-MAC: An Energy-Efficient MAC Protocol for Underwater Sensor Networks Peng Xie and Jun-Hong Cui UCONN CSE Technical Report: UbiNet-TR06-06 Last Update: June 2007 Abstract Underwater sensor networks are

More information

IEEE P Wireless LANs Impact of Bluetooth on Direct Sequence. Abstract

IEEE P Wireless LANs Impact of Bluetooth on Direct Sequence. Abstract IEEE P802.11 Wireless LANs Impact of Bluetooth on 802.11 Direct Sequence Date: September 15, 1998 Author: Greg Ennis Ennis Associates 16331 Englewood Ave. Los Gatos CA 95032 USA Phone: (408) 358-5544 Fax:

More information

Maximizing the Number of Users in an Interactive Video-on-Demand System

Maximizing the Number of Users in an Interactive Video-on-Demand System IEEE TRANSACTIONS ON BROADCASTING, VOL. 48, NO. 4, DECEMBER 2002 281 Maximizing the Number of Users in an Interactive Video-on-Demand System Spiridon Bakiras, Member, IEEE and Victor O. K. Li, Fellow,

More information

DiffServ Architecture: Impact of scheduling on QoS

DiffServ Architecture: Impact of scheduling on QoS DiffServ Architecture: Impact of scheduling on QoS Abstract: Scheduling is one of the most important components in providing a differentiated service at the routers. Due to the varying traffic characteristics

More information

Dynamic Power Control MAC Protocol in Mobile Adhoc Networks

Dynamic Power Control MAC Protocol in Mobile Adhoc Networks Dynamic Power Control MAC Protocol in Mobile Adhoc Networks Anita Yadav Y N Singh, SMIEEE R R Singh Computer Science and Engineering Electrical Engineering Computer Science and Engineering Department Department

More information

Energy-Efficient Mobile Cache Invalidation

Energy-Efficient Mobile Cache Invalidation Distributed and Parallel Databases 6, 351 372 (1998) c 1998 Kluwer Academic Publishers. Manufactured in The Netherlands. Energy-Efficient Mobile Cache Invalidation KUN-LUNG WU, PHILIP S. YU AND MING-SYAN

More information

IEEE C802.16h-07/017. IEEE Broadband Wireless Access Working Group <

IEEE C802.16h-07/017. IEEE Broadband Wireless Access Working Group < Project Title Date Submitted IEEE 82.16 Broadband Wireless Access Working Group Simulation of IEEE 82.16h and IEEE Coexistence (Preliminary Report) 7-1-12 Source(s) John Sydor, Amir

More information

Scheduling of Multiple Applications in Wireless Sensor Networks Using Knowledge of Applications and Network

Scheduling of Multiple Applications in Wireless Sensor Networks Using Knowledge of Applications and Network International Journal of Information and Computer Science (IJICS) Volume 5, 2016 doi: 10.14355/ijics.2016.05.002 www.iji-cs.org Scheduling of Multiple Applications in Wireless Sensor Networks Using Knowledge

More information

A Path Decomposition Approach for Computing Blocking Probabilities in Wavelength-Routing Networks

A Path Decomposition Approach for Computing Blocking Probabilities in Wavelength-Routing Networks IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 8, NO. 6, DECEMBER 2000 747 A Path Decomposition Approach for Computing Blocking Probabilities in Wavelength-Routing Networks Yuhong Zhu, George N. Rouskas, Member,

More information

Delayed reservation decision in optical burst switching networks with optical buffers

Delayed reservation decision in optical burst switching networks with optical buffers Delayed reservation decision in optical burst switching networks with optical buffers G.M. Li *, Victor O.K. Li + *School of Information Engineering SHANDONG University at WEIHAI, China + Department of

More information

Implementation of a Wake-up Radio Cross-Layer Protocol in OMNeT++ / MiXiM

Implementation of a Wake-up Radio Cross-Layer Protocol in OMNeT++ / MiXiM Implementation of a Wake-up Radio Cross-Layer Protocol in OMNeT++ / MiXiM Jean Lebreton and Nour Murad University of La Reunion, LE2P 40 Avenue de Soweto, 97410 Saint-Pierre Email: jean.lebreton@univ-reunion.fr

More information

Adaptive Mechanism for Aggregation with fragments retransmission in high-speed wireless networks

Adaptive Mechanism for Aggregation with fragments retransmission in high-speed wireless networks Int. J. Open Problems Compt. Math., Vol. 4, No. 3, September 2011 ISSN 1998-6262; Copyright ICSRS Publication, 2011 www.i-csrs.org Adaptive Mechanism for Aggregation with fragments retransmission in high-speed

More information

Media Access Control in Ad Hoc Networks

Media Access Control in Ad Hoc Networks Media Access Control in Ad Hoc Networks The Wireless Medium is a scarce precious resource. Furthermore, the access medium is broadcast in nature. It is necessary to share this resource efficiently and

More information

Implementation and modeling of two-phase locking concurrency control a performance study

Implementation and modeling of two-phase locking concurrency control a performance study INFSOF 4047 Information and Software Technology 42 (2000) 257 273 www.elsevier.nl/locate/infsof Implementation and modeling of two-phase locking concurrency control a performance study N.B. Al-Jumah a,

More information

ADAPTIVE AND DYNAMIC LOAD BALANCING METHODOLOGIES FOR DISTRIBUTED ENVIRONMENT

ADAPTIVE AND DYNAMIC LOAD BALANCING METHODOLOGIES FOR DISTRIBUTED ENVIRONMENT ADAPTIVE AND DYNAMIC LOAD BALANCING METHODOLOGIES FOR DISTRIBUTED ENVIRONMENT PhD Summary DOCTORATE OF PHILOSOPHY IN COMPUTER SCIENCE & ENGINEERING By Sandip Kumar Goyal (09-PhD-052) Under the Supervision

More information

CS 344/444 Computer Network Fundamentals Final Exam Solutions Spring 2007

CS 344/444 Computer Network Fundamentals Final Exam Solutions Spring 2007 CS 344/444 Computer Network Fundamentals Final Exam Solutions Spring 2007 Question 344 Points 444 Points Score 1 10 10 2 10 10 3 20 20 4 20 10 5 20 20 6 20 10 7-20 Total: 100 100 Instructions: 1. Question

More information

THE IEEE standard was created in 2003, and its

THE IEEE standard was created in 2003, and its ADVANCES IN ELECTRONICS AND TELECOMMUNICATIONS, VOL. 1, NO. 2, NOVEMBER 2010 7 Simulation Study of the IEEE 802.15.4 Standard Low Rate Wireless Personal Area Networks Dariusz Kościelnik and Jacek Stępień

More information

McGill University - Faculty of Engineering Department of Electrical and Computer Engineering

McGill University - Faculty of Engineering Department of Electrical and Computer Engineering McGill University - Faculty of Engineering Department of Electrical and Computer Engineering ECSE 494 Telecommunication Networks Lab Prof. M. Coates Winter 2003 Experiment 5: LAN Operation, Multiple Access

More information

CPU THREAD PRIORITIZATION USING A DYNAMIC QUANTUM TIME ROUND-ROBIN ALGORITHM

CPU THREAD PRIORITIZATION USING A DYNAMIC QUANTUM TIME ROUND-ROBIN ALGORITHM CPU THREAD PRIORITIZATION USING A DYNAMIC QUANTUM TIME ROUND-ROBIN ALGORITHM Maysoon A. Mohammed 1, 2, Mazlina Abdul Majid 1, Balsam A. Mustafa 1 and Rana Fareed Ghani 3 1 Faculty of Computer System &

More information

MANY multi-media network services have been introduced

MANY multi-media network services have been introduced IEEE TRANSACTIONS ON BROADCASTING, VOL. 52, NO. 1, MARCH 2006 21 DOCSIS Performance Analysis Under High Traffic Conditions in the HFC Networks Wei-Tsong Lee, Kun-Chen Chung, Kuo-Chih Chu, and Jen-Yi Pan

More information

A Performance Investigation of the Modified PCF with Priority Scheme

A Performance Investigation of the Modified PCF with Priority Scheme 2 ECTI TRANSACTIONS ON ELECTRICAL ENG., ELECTRONICS, AND COMMUNICATIONS VOL.3, NO.1 FEBRUARY 2005 A Performance Investigation of the Modified with Priority Scheme Apichan Kanjanavapastit 1 and Bjorn Landfeldt

More information

Improved MAC protocol for urgent data transmission in wireless healthcare monitoring sensor networks

Improved MAC protocol for urgent data transmission in wireless healthcare monitoring sensor networks , pp.282-286 http://dx.doi.org/10.14257/astl.2015.116.57 Improved MAC protocol for urgent data transmission in wireless healthcare monitoring sensor networks Rae Hyeon Kim, Jeong Gon Kim 1 Department of

More information

Reduction of Periodic Broadcast Resource Requirements with Proxy Caching

Reduction of Periodic Broadcast Resource Requirements with Proxy Caching Reduction of Periodic Broadcast Resource Requirements with Proxy Caching Ewa Kusmierek and David H.C. Du Digital Technology Center and Department of Computer Science and Engineering University of Minnesota

More information

Multiple Access (1) Required reading: Garcia 6.1, 6.2.1, CSE 3213, Fall 2010 Instructor: N. Vlajic

Multiple Access (1) Required reading: Garcia 6.1, 6.2.1, CSE 3213, Fall 2010 Instructor: N. Vlajic 1 Multiple Access (1) Required reading: Garcia 6.1, 6.2.1, 6.2.2 CSE 3213, Fall 2010 Instructor: N. Vlajic Multiple Access Communications 2 Broadcast Networks aka multiple access networks multiple sending

More information

Toward a Reliable Data Transport Architecture for Optical Burst-Switched Networks

Toward a Reliable Data Transport Architecture for Optical Burst-Switched Networks Toward a Reliable Data Transport Architecture for Optical Burst-Switched Networks Dr. Vinod Vokkarane Assistant Professor, Computer and Information Science Co-Director, Advanced Computer Networks Lab University

More information