Performance Analysis of Markov Modulated 1-Persistent CSMA/CA Protocols with Exponential Backoff Scheduling

Size: px
Start display at page:

Download "Performance Analysis of Markov Modulated 1-Persistent CSMA/CA Protocols with Exponential Backoff Scheduling"

Transcription

1 Performance Analyss of Markov Modulated -Persstent CSMA/CA Protocols wth ponental Backoff Schedulng Pu ng Wong, Dongje Yn, and Tony T. Lee, Abstract. Ths paper proposes a Markovan model of -persstent CSMA/CA protocols wth -ponental Backoff schedulng algorthms. The nput buffer of each access node s modeled as a Geo/G/ queue, and the servce tme dstrbuton of each ndvdual head-of-lne packet s derved from the Markov chan of the underlyng schedulng algorthm. From the queung model, we derve the characterstc equaton of network throughput and obtan the stable throughput and bounded delay regons wth respect to the retransmsson factor. Our results show that the stable throughput regon of the exponental backoff scheme exsts even for an nfnte populaton. Moreover, we fnd that the bounded delay regon of exponental backoff s only a sub-set of ts stable throughput regon due to the large varance of the servce tme of nput packets caused by the capture effect. All analytcal results presented n ths paper are verfed by smulatons. eywords: queung analyss, performance analyss, -persstent CSMA, ponental Backoff. Introducton Carrer Sense Multple Access (CSMA) s a standardzed Meda Access Control (MAC) protocol for the transmsson of network statons over a commonly shared medum, such as 80. wreless LANs or Ethernet networks. It s a set of rules for resolvng collsons when two or more nodes attempt to use a transmsson channel smultaneously. The network statons governed by CSMA wth collson avodance (CSMA/CA) check the busy/dle status of the transmsson channel before attemptng to transmt. If the channel s detected busy, the packets nvolved n the collson attempt to retransmt after a random tme nterval. Wth exponental backoff schedulng, ths random watng tme nterval for retransmsson geometrcally ncreases wth the number of collsons encountered by the packet. The p-persstent CSMA protocols try to maxmze the channel utlzaton by contnuously montorng the transmsson medum. An actve node wth a packet ready to transmt constantly checks the channel status. If the channel s sensed dle, the node transmts the packet wth a probablty p. Otherwse, the node wll persstently montor the channel untl t becomes dle, and then transmts agan wth the same probablty p. Ths process repeats untl the packet s dspatched. Collsons may stll occur when two or more packets are smultaneously transmtted. The -Persstent Carrer-Sense Multple Access (P-CSMA) protocol s a specal case of the p-persstent CSMA protocol wth p =.. Dept. of Informaton Engneerng, The Chnese Unversty of Hong ong, Hong ong (emal: {wpk007, ydj008, ttlee}@e.cuhk.edu.hk). Dept. of Electroncs Engneerng, Shangha Jao Tong Unversty, Shangha, Chna.

2 The complete analyss of a buffered random-access network has long been consdered to be a challengng problem even for the smplest case. The throughput analyss of slotted -persstent CSMA for a network wth an nfnte populaton of statons was frst nvestgated n [] by lenrock and Tobag. Many follow-up researches were proposed to analyze the performance of -persstent CSMA protocol. For example, a fnte populaton system wth the slotted -persstent CSMA, whch can also be extended to nfnte populaton cases, was analyzed n []. The characterstc equaton for network throughput was re-derved n [3] by usng a state-transton dagram of the transmsson channel. However, these results are lmted to the maxmum throughput analyss of a saturated network n whch the schedulng of collded packets was not consdered. The -ponental Backoff algorthm s a wdely used collson resoluton scheme n most MAC protocols such as the 80. [4]-[8]. A packet encountered collsons tmes s scheduled for retransmsson wth probablty q, for =,,. The parameter q s called the retransmsson factor wth 0 < q < and s the cut-off phase. Many publshed works [9]-[3] studed the performance of MAC protocols n conjuncton wth the exponental backoff algorthm under a saturaton traffc condton. A two-dmensonal Markov chan that descrbed the exponental backoff algorthm was proposed by Banch n [9] to obtan the network throughput of the 80. Dstrbuted Coordnaton Functon (DCF) protocol. Authors n [0]-[3] appled the two-dmensonal Markov chan to analyze the performance of network throughput of the 80. DCF under dfferent scenaros. Although these works, together wth the prevous results n []-[3], have revealed the connecton between the maxmum throughput and the underlyng backoff algorthm, ssues on throughput stablty and bounded delay reman open under the saturaton assumpton. Some non-saturated analyses of 80. protocols under a smplfed buffer-less assumpton were reported n [4]-[6], n whch the queung behavors of nput buffers were completely gnored. The am of ths paper s to provde a complete performance analyss of the P-CSMA protocol under a non-unsaturated traffc envronment. Our approach s an extenson of the Markov model for non-persstent CSMA networks proposed n [7], whch ncludes both the stable throughput regon and the correspondng delay analyss of NP-CSMA. The throughput of a buffered random-access network s determned by the actvtes of Head-Of-Lne (HOL) packets n the entre network. In ths paper, we assume that the nput to each node s a Bernoull process wth rate λ packet/tmeslot and each nput buffer s modeled as a Geo/G/ queue. The servce tme of HOL packets s descrbed by a Markov chan that represents the backoff schedulng algorthm from whch the steady-state network throughput can be expressed as a functon of the aggregate attempt rate G of HOL packets. Usng an extenson of the methodology developed n [7], the complete queung analyss enables us to specfy the stable regons of both throughput and bounded mean delay for P-CSMA. Specfcally, we characterze the stable throughput regon of retransmsson factor q from the frst moment of

3 packet servce tme wth a gven aggregate nput rate ˆ = nλ packet/tmeslot, where n s the number of nodes n the system. Furthermore, the Pollaczek-hnchn (P-) formula of Geo/G/ queue reveals that a bounded mean delay requres a bounded second moment of servce tme, whch also depends on the retransmsson schedulng algorthm employed n P-CSMA protocols. The exponental backoff schedulng algorthm wth nfnte cutoff phase ( = ) s of specal nterest n practcal operatons of P-CSMA protocols. Our result on the throughput of exponental backoff scheme agrees wth that reported n [4] that the network can have non-zero throughput even f the number of nodes n. Moreover, the bounded delay regon determned by our queung model s only a subset of the stable throughput regon. For any retransmsson factor q nsde the stable throughput regon but not wthn the bounded delay regon, we show that a stable throughput of the entre network can be acheved wth a large delay varance due to the capture effect descrbed n [8] and [9]. Thus, the maxmum throughput of the network wthn the bounded delay regon s slghtly smaller than that achevable n the stable throughput regon. The rest of ths paper s organzed as follows. The channel model and nput buffer model that characterze the network throughput of P-CSMA protocols are presented n secton and secton 3, respectvely. Secton 4 descrbes the general requrements of stable condtons. Based on these condtons, the stable throughput and bounded delay regons of the P-CSMA protocol wth exponental backoff scheme are specfed n secton 5. Secton 6 provdes a concluson. Markov chan of Slotted P-CSMA In a slotted P-CSMA network, the tme axs s slotted and the network s synchronzed. Packets can be sent only at the begnnng of a tmeslot, and each packet s dentcal and takes one slot tme for transmsson. Suppose the rato of propagaton delay to packet transmsson tme s a, then the tmeslot can be further dvded nto mn-slots of slot sze a. Accordng to the channel status dsplayed n Fg., the busy perod s a seres of transmsson perods each wth + a tmeslots, and pure dle perod s the tme n whch the channel s dle and no packet presents awatng transmsson. Then the tme axs can be consdered as a sequence of alternatng busy perods and pure dle perods. There are two types of transmssons wth dfferent probabltes of success. The leadng transmsson perod n each busy perod s called the Type I transmsson perod, n whch the packet s sent successfully f, and only f, no one s scheduled to access the channel n the prevous mn-slot. All subsequent transmsson perods are defned as Type II transmssons. Due to the persstence property of P-CSMA, packets scheduled to access the channel n any transmsson 3

4 perod accumulate at the end of the prevous transmsson perod; hence, the second type of transmsson s successful f, and only f, no one attempts to access the channel durng the prevous transmsson perod. In each transmsson perod, a packet s ether successfully transmtted or collded. Therefore, the channel has three fundamental states: pure dle (Idle), successful transmsson (Suc), and collson (Col). For the P-CSMA, the successful transmsson state should be dvded nto two sub-states Suc and Suc correspondng to the Type I and Type II transmsson perods, respectvely. The state transtons of the channel can be descrbed by the Markov chan shown n Fg.. The lmtng probabltes Idle, Suc and Col of the Markov chan satsfy the followng set of equatons: P P P P P Idle, Idle Idle Suc, Idle Suc Suc, Idle Suc Col, Idle Col Suc Idle, Suc Idle P P P Suc, Suc Suc Suc, Suc Suc Col, Suc Col PCol, Col Col PIdle, Col Idle PSuc, Col Suc PSuc, Col Suc. () Snce packets attempt to access the channel only when the channel s detected as dle, the attempt rate n any busy perod s zero. Durng a pure dle perod, the aggregate attempts generated by all fresh and re-scheduled HOL packets form a Posson stream wth rate G; therefore, the probablty that no attempt s generated n a mn-slot s e -ag. From a system pont of vew, the Type I transmsson s successful only f there s exactly one attemptng packet n a mn-slot wth the probablty age -ag. All packets scheduled to access the channel n any transmsson perod are accumulated at the end of the prevous perod, and then attempt to access the channel at the same tme. Thus, the transton probablty from transmsson perod to dle perod s equvalent to that when there s no scheduled packets wthn (+a) slot tmes,.e., e -(+a)g. Smlarly, the probablty of havng a successful Type II transmsson s (+a)ge -(+a)g. Hence, the transton probabltes of the Markov chan are gven as follows: P Idle, Idle ag PIdle, Suc age ag P e age Idle, Col e ag ag P P P e Suc, Idle Suc, Idle Col, Idle Suc, Suc Suc, Suc Col, Suc Suc, Col Suc, Col Col, Col ag P P P a Ge ag ag ag P P P e a Ge. () We obtan the followng lmtng probabltes from () and () n a straghtforward manner: 4

5 Idle ag e ag ag e e ag ag age e e e ag ag age e e e ag e age Ge e ag ag e e Suc ag ag Suc ag ag Col ag ag ag. (3) The tme-average probabltes of each state can be easly obtaned from sojourn tmes of the Idle, Suc, and Col states tidle a, and t t t a, respectvely. Of partcular mportance, the probablty that the channel s ether n Suc Suc Col Suc or Suc states s gven by asucsuc ag ag a Ge a e ag Suc Suc ag a Suc Suc Col a Idle a e ae. (4) Snce the successful transmsson of a packet only takes / (+a) of the tme n a transmsson perod, the followng network throughput s defned by the fracton of the tme that the channel s productve: ˆ Suc Suc ag ag Ge a e ag a a e ae ag, (5) whch s consstent wth lenrock and Tobag s result n []. Although the network throughput can be obtaned from the above model, but t s by no means a comprehensve performance analyss of the system because the re-schedulng of collded HOL packets s not consdered n the channel model. The next secton descrbes a more detaled queung model of the nput buffer n whch the servce tme dstrbuton s derved n the context of the underlyng backoff schedulng algorthm. 3 Queung Model of Input Buffer The nput buffer of each node s modeled as a Geo/G/ wth a Bernoull arrval process of rate λ packets/tmeslot. As we mentoned before, we consder the P-CSMA protocol wth the -ponental Backoff algorthm for contenton resolutons. The behavor of each HOL packet wth ths backoff algorthm s descrbed by a smple flow chart shown n Fg. 3. A fresh HOL packet s ntally n phase 0 and sent only when an dle channel s detected. If the channel s busy, t wats untl the channel becomes dle and then transmts the packet mmedately. If the transmsson s successful, a new fresh HOL packet starts from phase 0. Otherwse, the packet s n backoff mode n whch the random watng tme s determned by the current backoff phase. A packet s n phase, f t has encountered collson tmes. The -ponental Backoff algorthm allows an HOL packet n phase to retransmt wth probablty q, for =,,, where 0 < q < s 5

6 the retransmsson factor and s the cut-off phase. That s, the retransmsson probablty decreases exponentally wth the number of collsons, up to tmes, experenced by the backlogged HOL packets. Based on the flow chart of the P-CSMA protocol shown n Fg. 3, the correspondng state transton dagram wth the -ponental Backoff algorthm s shown n Fg. 4. An HOL packet s n one of the three fundamental states: sensng (S ), transmsson, and watng (W ), 0,...,, at any tme. Note the transmsson state s splt nto two sub-states: F and F', correspondng to the two types of transmssons, respectvely. If channel dle s detected n the sensng state S, an HOL packet s sent and moved to state F wth probablty q. Otherwse, the correspondng node contnually montors the channel actvty untl an dle channel s sensed. Ths persstent sensng acton s represented by the watng state W. When the channel turns dle, the packet moves to the Type II transmsson state F' wth probablty q. If the packet s successfully sent, a fresh HOL packet starts wth the ntal sensng state S 0 ; otherwse, the collded packet moves to phase + and repeats the above process startng from the sensng state S +. Moreover, for the sake of smplcty, we assume that a new packet at an empty buffer arrves at the begnnng of the transmsson perod f the channel s busy, so that the watng tme s slot tme for any phase. The transton probabltes of the Markov chan are derved below. Let α be the probablty that the channel s n pure dle state. Then t can be calculated from the lmtng probabltes gven by (3) as follows: Idle Suc Suc Col ag a Idle ae a a a e ae ag ag. (6) It s llustrated n Fg. 4 that the Type I transmsson s successful only f all other nodes do not attempt to send n the frst mn-slot of the busy perod. Thus, the probablty of a successful Type I transmsson s p e ag. (7) Whle the success of the Type II transmsson requres that no other nodes attempt to send n the prevous transmsson perod; hence, the probablty of a successful Type II transmsson s ( ) p e ag. (8) Type I transmssons lead busy perods; therefore, the probablty that a transmsson perod s Type I s equvalent to the probablty α gven by (6) that the system s n a pure dle perod. It follows that the probablty of successful transmsson of P-CSMA s gven by 6

7 p Pr{Type transmsson} p Pr{Type transmsson} p p ( ) p a p p. a p ap (9) Substtute (7) and (8) nto (9), and the probablty of successful transmsson can be expressed by the followng functon of the attempt rate G: p G ag ag e a e ag a e ae ag. (0) It should be noted that the probablty of success gven by (0) s consstent wth (5) because p ˆ G by defnton. Let s, f, f ', and w be the respectve lmtng probabltes of states S, F, F', and W, of the Markov chan shown n Fg. 4, from whch we obtan the followng set of state equatons: p f0 f f + p f0 ' f ' f ',for 0 s q s q w p f p f ',for,..., q s q w p f f p f ' f ',for. w s, for 0,..., f q s, for 0..., f ' q w, for 0,..., It can be proven from () that f p + q >, then all states of the Markov chan are postve recurrent and aperodc. () Thus, the tme-average probabltes of those states can be determned from () wth the sojourn tme ts a, t, F t, and t of state S, F, F', and W, respectvely, for = 0,, as follows: ' F W a p, 0,,..., D q s a p, pd q p, 0,,..., D q w p, pd q, () p, 0,,..., f D p, pd p, 0,,..., f ' D p, pd 7

8 where q a q p D. p q p q p The offered load ρ of each nput queue s the probablty that the queue s non-empty. It s the basc measure for analyzng the performance of each nput buffer. The nput rate λ of the Bernoull arrval process can be nterpreted as the probablty of fndng a packet arrved at nput n any tme slot. Each nput packet wll eventually become a fresh HOL packet, and vst the transmsson states n phase 0 for one slot tme. Therefore, the nput rate λ should be equal to f, the probablty of fndng a phase 0 HOL packet n ether Type I or Type II transmsson states n any tme f ' 0 0 slot. Wth the tme-average probablty of state F0 and F'gven 0 n (), the expresson of the offered load can be obtaned as follows: a q p q. (3) f 0 f 0' p q p q p We show n the next theorem that the network throughput derved from the servce tme of HOL packets s the same as (5), whch was prevously obtaned from the channel model shown n Fg.. Although the servce tme s obvously dependent on the retransmsson factor q of the backoff schedulng algorthm, the fact that the throughput s nvarant wth respect to q mples that the stablty of the system cannot be determned by the characterstc equaton of throughput alone; t s manly related to the queung behavor of each nput buffer. Theorem. For buffered -persstent CSMA wth -ponental Backoff, the throughput n equlbrum s gven by ˆ out ˆ ln p p ag ag Ge a e ag a a e ae ag. (4) Proof: A partcular HOL packet s ready to be sent only f an dle channel s detected. The probablty of successful Type I transmsson p for a desred node s the condtonal probablty that none of the other nodes accesses the channel gven that all nodes sense the channel dle, whch s gven by p Pr{none of other n nodes access the channel channel s sensed dle} Pr{none of other n nodes access the channel}. Pr{channel s sensed dle} (5) If no one accesses the channel, t means that all the other n nodes are ether empty, or n sensng states but not accessng the channel. Thus, we have Pr{none of other n nodes access the channel} Pr{node s empty} Pr{node s n sensng but not scheduled to be sent} for large n n s 0 q n s 0 q exp. n (6) 8

9 The probablty that the node senses an dle channel s gven by Pr{channel s sensed dle}= Pr{node s empty} Pr{node s n sensng state} for large n n s 0 n s 0 exp. n (7) Substtutng (6), (9), (), and (3) nto (6) and (7), the probablty of successful transmsson p defned by (5) can be expressed as exp exp n s 0 q p expn s 0 n s q 0 an exp p p p 0 D a ˆ exp. p (8) In equlbrum, the network throughput ˆout should be equal to the aggregate nput rate ˆ. It s easy to show that the network throughput (4) n equlbrum can be obtaned from (8). Note that the throughput gven by (4) also agrees wth that obtaned by lenrock and Tobag n [] and our channel model n secton. The consstency between these approaches ndcates that t s approprate to adopt the ndependence assumpton among nput buffers. Ths s because the correlaton among n nput queues becomes weak when n s large [0]. Furthermore, let random varables S, F, F, and W be the servce completon tme of an HOL packet, startng from the states S, F, F', and W respectvely, untl t s successfully transmtted. We assume, wthout loss of generalty, that M = /a s an nteger. It s straghtforward to show from the Markov chan of Fg. 4 that the generatng functons S( z), F( z), F'( z ), and W ( z) of these servce completon tmes can be found by solvng the followng set of equatons: S S ( z) E z q zs ( z) q zf ( z) zw ( z), for 0,,..., W M M W ( z) E z q z F '( z) q z S ( z), for 0,,..., F M M E z p z p z S ( z), for 0,,..., F ( z) F ( z), for F E z pz M p z M S ( z), for 0,,..., F '( z) F '( z), for. (9) Snce the servce of each HOL packet always starts from the state S 0, the frst and second moments of servce tme can be derved from the set of generatng functons n (9) and are gven n Appendx I. Note that the mean servce tme 9

10 f f 0 ' 0 derved n Appendx I s consstent wth the expresson gven n (3). Based on the queung model of the nput buffer, we wll nvestgate varous stablty ssues of P-CSMA concernng throughput and delay n the followng sectons. 4 Stable Regons For a -persstent CSMA network wth n nodes, suppose that there are total n b n backlogged HOL packets n the mn-slot before transmsson, n whch n packets are n the sensng state of phase, for =,,. The followng HOL packets may attempt to transmt durng the mn-slot of a sensng state: An empty node may send a newly arrved packet wth probablty aλ; An HOL packet n phase 0 wll be transmtted mmedately; A backlogged HOL packet n phase wll be transmtted wth probablty q, for =,,. Hence, the attempt rate n ths mn-slot s gven by The mean number of empty nodes n the system s whle the mean number of backlogged nodes n phase s ag a E n n q E n. (0) b 0 b E n n n ; () E n s n. () s j0 j It follows from () that the attempt rate n a mn-slot defned (0) can be gven as follows: n ag a ˆ a ˆ n 0 j0 s s q j pq. (3) p pq p q pq q By solvng equaton (3), the retransmsson factor q can be expressed as a functon of the attempt rate G, denoted as q h( G). For any fnte cut-off phase, ths functon hg ( ) s on the order /n,.e., q = O(/n), whch mples that the network s ntrnscally unstable when the number of nodes n s large. Ths pont can be explaned by consderng the saturated case of Geometrc Retransmsson ( = ) when all nodes have backlogged HOL packets. In ths worst-case scenaro, the probabltes of successful transmsson for the Type I and Type II are p e anq and a nq p e. 0

11 Consequently, ether the retransmsson factor q or the probabltes of successful transmsson p and p approach zero when the number of nodes n. Ths nherently nstable property of Geometrc Retransmsson has also been prevously reported n [4] and [5]. On the other hand, ponental Backoff mtgates the contenton problem by pushng packets to deeper phases; therefore, the retransmsson factor q wth ponental Backoff ( = ) expressed n terms of hg ( ) s on the order of O(), whch suggests that the network can be stablzed even for an nfnte populaton. A detaled study of ponental Backoff s presented n secton 5. The characterstc equaton (4) of the throughput versus attempt rate G s a curve that frst ncreases and then decreases wth G as plotted n Fg. 5, n whch max ˆ denotes the maxmum throughput of equaton (4). Ths ndcates that to have optmal throughput, the attempt rate G cannot be too small or too large. For a throughput smaller than the maxmum throughput, ˆ ˆ max, the throughput equaton (4) has two roots; the smaller and larger roots are denoted as G ( ˆ S ) and G ( ˆ ) L, respectvely. Consderng the tradeoff between G and p, we know G should be bounded n the range between G ( ˆ S ) and G ( ˆ ) L to ensure a stable network throughput where ˆ out ˆ. amples n Fg. 5 llustrate ths pont. For a gven nput rate ˆ 0.3 and a = 0., the network has a stable throughput ˆ ˆ 0.3 when G s wthn the range [ 0.347,.98]. Thus, a necessary condton of stable throughput of the entre system can be stated as follows: Stable Throughput Condton (STC): For any nput rate ˆ ˆ max out, the attempt rate G should satsfy G ( ˆ ) G G ( ˆ ). (4) S In general, the attempt rate G s an mplct functon of the retransmsson factor q assocated wth the underlyng schedulng algorthm. The retransmsson factor q = h(g) can be obtaned by solvng equaton (3).Ths functonal relatonshp, together wth the nequalty (4), determnes a stable regon of q. It s easy to show that functon h(g) s monotonc ncreasng wth respect to G. Thus, the stable throughput regon R T of q correspondng to the stable throughput condton (4) can be defned as follows, L qr h( G ), h( G ). (5) T S L Furthermore, the network throughput s defned by ˆ out n f0 f0 mn{ ', ˆ } and the stable throughput condton STC ensures that ˆ out ˆ. It follows that the STC mples n f0 f0' ˆ n, whch means the offered load ρ. On the other hand, t can be shown from (3) that the offered load ρ s a monotonc ncreasng functon of the retransmsson

12 factor q f the attempt rate s bounded n the range G S G G L, or equvalently q R h( G ), h( G ). In partcular, T S L the attempt rate G wll reach G L when the offered load ρ =. Therefore, f the retransmsson factor q s chosen from S L q h( G ), h( G ), the offered load ρ of Geo/G/ queue of each nput buffer s strctly less than, whch s smply the stable condton of any queung system, that the arrval rate should be strctly less than the servce rate. As we mentoned before, the stable throughput condton (4) s not suffcent to guarantee a bounded mean delay of packets queued n each nput buffer. Let X be the servce tme of HOL packet, the mean delay s determned by the frst and second moments, E[X] and E[X ], of the servce tme. To complete the analyss of stable regons, we deduce the followng addtonal constrant from our queung model of the nput buffer. Bounded Delay Condton (BDC): The Pollaczek-hnchn formula for mean queueng delay E[T] of Geo/G/ queue [] E X E[ T ] E[ X ] ( EX [ ]) [ ] E[ X ] (6) requres bounded second moment of servce tme 0 < E[X ] <. The condton BDC s more restrctve than the condton STC. A regon of the factor q, denoted R D, that guarantees bounded mean delay can be determned by the second moment of servce tme E[X ]. In general, the bounded delay regon s a subset of the stable throughput regon, RD RT. Detaled dscussons on these stable regons wth the exponental backoff schedulng algorthm are provded below. 5 Analyss of ponental Backoff The exponental backoff scheme has been studed n many prevous papers [4]-[8]. In ths secton, we dscuss the stablty and delay performance of ths schedulng algorthm based on the condtons specfed n secton 4. The analytc results are verfed by the smulatons wrtten n MATLAB. 5. Stable Throughput Condton of ponental Backoff The attempt rate G of exponental backoff can also be derved from (3) and expressed as follows: ˆ a p q ag a q n a ˆ p q p pq. (7) or, equvalently, the retransmsson factor q can be formulated as a functon of attempt rate G as

13 where ˆ 4 ˆ A p ˆ a ˆ a p n 3 A p A p a a p n q h G p, (8) A p ˆ a p a G ˆ p ap ˆ n. For retransmsson factor q n the range 0 < q <, ths functon q = h (G) s monotoncally ncreasng wth respect to the attempt rate G. It follows that the followng stable throughput regon RT of exponental backoff can be obtaned from (5) and (8): R [ h ( G ), h ( G )]. (9) T S L The area under the lower and upper bounds shown n Fg. 6.a s the stable throughput regon RT of exponental backoff wth n = 0 and a = 0., whle that n Fg. 6.b s the stable regon wth n = 50 and a = 0.. The maxmum throughput wth exponental backoff can be acheved such that ˆ ˆ max as the stable regon (9) shrnks to a sngle max pont when G ˆ ˆ S( max ) GL( max ). If we gnore hgher order terms of ˆ and p n (8), the retransmsson factor q s approxmately equal to p: q h G p, (30) whch mples that the stable regon of exponental backoff s almost ndependent of the populaton sze when n s large enough. For example, the stable throughput regons for n = 0 and 50 shown n Fg. 6 are very close to each other. Therefore, the stable throughput regon R T can be approxmately gven as follow, R [ p( G ), p( G )]. (3) T S L The equalty n (3) holds when the retransmsson factor q n (8) s equal to p as n, whch concdes wth Song s results proved n [4], [5], and [8] that network throughput can be non-zero even when the number of nodes goes to nfnty. Our stablty analyss s confrmed by the smulaton results shown n Fg. 7 wth n = 0 and a = 0., whch closely follows the protocol detals for -persstent CSMA. The 95% confdence ntervals are shown for all the smulatons ponts. For fxed aggregate nput rate ˆ 0.3, Fg. 7 dsplays that stable throughput can be acheved f the retransmsson factor q s properly chosen from the stable throughput regon R T = [0.35, 0.849]. The smulaton results match exactly wth the analytcal one when the retransmsson factor q s wthn the stable regon. Whle outsde the 3

14 stable regon, the throughput mmedately drops and the sze of the confdence ntervals ncreases due to the unstable queung behavor of nput buffers. 5. Bounded Delay Condton of ponental Backoff The second moment of servce tme of the exponental backoff scheme s derved from (37) of Appendx I as follows: j p [ ],, lm,, j q E X B p p q C p p q, (3) where B(p, p, q) and C(p, p, q) are two polynomals gven n (38) and (39) of Appendx I. It follows that the bounded p delay condton requres the convergence of the nfnte geometrc sum lm, whch mples j q j q p. (33) For bnary exponental backoff,.e., q = 0.5, the above condton (33) s consstent wth Yang s result gven n []. To acheve stable throughput, the attempt rate G should be larger than or equal to the small root G S as descrbed n (4). Combne the condton (33) wth the stable throughput regon R T (9), and the bounded delay regon s gven as follows: RD p( GS ), h ( GL ). (34) The bounded delay regon R of exponental backoff s a subset of the stable throughput regon R. As shown n Fg. D T 8, the shaded regon s a bounded delay regon; outsde ths regon,.e., R \ R T D, the system has stable throughput but cannot guarantee bounded delay. In ths undesred regon, predomnatng backlogged packets are pushed to deep phases wth very low retransmsson probabltes. If a node tres to send ts HOL packet, the successful probablty wll be very hgh. Once the backlogged HOL packet s cleared, then the channel may be captured by subsequent packets n the nput buffer, whch are all n phase 0, untl the queue s cleared. Durng ths perod, t appears that the network throughput s stll stable, but the varance of the servce tme of each ndvdual packet can be nfntely large due to ths unfarness of servces caused by the capture effect descrbed n [8] and [9]. Fg. 9 and Fg. 0 llustrate the packet-queung delay, n terms of number of packets n the system, versus the retransmsson factor q and the nput rate ˆ, respectvely. Our analyss s confrmed by smulaton as shown n both fgures. In Fg. 9, f the retransmsson factor q s chosen wthn the regon of bounded delay, then there are nearly zero backlogged packets n the system. However, f the retransmsson factor q les outsde the bounded delay regon, the number of backlogged packets n the system would become larger even though t s stll wthn the stable throughput 4

15 regon. For any retransmsson factor q outsde the stable throughput regon, the number of backlogged packets n the system mmedately becomes much larger, whch mples an unacceptable mean queung delay. Other examples of the bounded delay regon are shown n Fg. 0, whch exhbts the number of packets n the system versus nput rate ˆ for fxed retransmsson factor q = 0. and q = 0.5. It can be clearly seen that the number of packets n the system s nearly zero wthn the bounded delay regon. Ths result concdes wth [5] n whch the authors clamed that the exponental backoff scheme can be stable f the nput rate s suffcently small. Snce the bounded delay regon R D specfed by (30) s a subset of the stable throughput regon R T, the maxmum throughput max ˆ may not be achevable f q R D. As shown n Fg.8, the network throughput ncreases wth the lower bound of the bounded delay regon pg, and decreases wth the upper bound pg S L n equaton (3). Therefore, the maxmum throughput wthn the bounded delay regon RD can be acheved when the lower bound and upper bound of the retransmsson factor q gven by (30) are equal. That s, pg p G. (35) S In (35), we plot the respectve maxmum throughput wthn the throughput stable regon and bounded delay regon. For 0 < a <, the maxmum throughput max ˆ gven n Fg. s always larger than that obtaned from the bounded delay L regon. In other words, the absolute maxmum throughput max ˆ n the stable throughput regon cannot be acheved wth bounded mean delay guarantee. 6 Concluson We have analyzed the stablty condtons n terms of stable throughput and bounded delay for slotted -persstent CSMA/CA networks. The queung model of nput buffer wth the -ponental Backoff collson resoluton algorthm s proposed to conduct the throughput analyss of the entre system and the performance of each ndvdual nput buffer. Based on ths model, the exponental backoff schedulng algorthm has been used to establsh the stable throughput regon and bounded delay regon wth respect to aggregate nput rate ˆ and retransmsson factor q. It s shown that the network throughput of the exponental backoff scheme can always be stablzed wth the proper selecton of q; whle the regon shrnks remarkably subject to the bounded delay requrement. Consequently, the maxmum achevable throughput of the network wthn the bounded delay regon s slghtly smaller than the absolute maxmum throughput. The proposed methodology can also be appled to other CSMA-based networks, such as IEEE 80., n the future. 5

16 Appendx. Servce Tme Dstrbuton for P-CSMA Protocol For exponental backoff scheme as, the frst and second moments of scaled servce tme, E[X] and E[X ], can be derved from (9) and gven as follows. The frst moment: am aq M M EX [ ]. (36) p q p The second moment: where B p, p, q a M M and j p [ ],, lm,, j q E X B p p q C p p q, (37) p q p q, (38) pq p q qp p q 3 M M M q M M M M qm q M M C p, p, q a { p p q p q p q p M M qm q M M M Mp pm } E[ X ]. p p q p pq (39) References [] L. lenrock and F. A. Tobag, Packet Swtchng n Rado Channels: Part -Carrer Sense Multple-Access Modes and Ther Throughput-Delay Characterstcs, IEEE Trans. Commun., vol. COM-3, pp , 975. [] H. Takag and L. lenrock, Throughput analyss for persstent CSMA systems, IEEE Trans. Commun., vol. 33, no. 7, pp , Jul [3] R. Rom and M. Sd, Multple Access Protocols Performance and analyss, Sprnger-Verlag New York, June 990. [4] B-J wok, N-O Song, and L. E. Mller, Analyss of the stablty and performance of exponental backoff, IEEE WCNC, vol.3, pp , 003. [5] N.O. Song, B. J. wak, and L. E. Mller, On the Stablty of ponental Backoff, Journal of Research of the Natonal Insttute of Standards and Technology, vol. 08, pp , 003. [6] D. J. Aldous, Ultmate nstablty of exponental backoff- protocol for acknowledgment-based transmsson control of random access communcaton channels, IEEE Trans. Inf. Theory 33 (), pp. 9-3, 987. [7] J. Goodman, A. G. Greenberg, N. Madras, and P. March, Stablty of bnary exponental backoff, J. ACM 35 (3), pp ,

17 [8] B-J wok, N-O Song, and L. E. Mller, Performance analyss of exponental backoff, IEEE/ACM Trans. Networkng, pp , Aprl 005. [9] G. Banch, Performance Analyss of the IEEE 80. Dstrbuted Coordnaton Funton, IEEE Journal of selected areas n COMMUN., Vol. 8, No. 3, pp , 000. [0] P. Chatzmsos, V. Vtsas, and A. C. Boucouvalas, Throughput and delay analyss of IEEE 80. protocol, n Proc. 5th IEEE Workshop Networked Applances, Oct. 003, pp [] Z. Hadz-Velkov and B. Spasenovsk, Saturaton throughput: delay analyss of IEEE 80. DCF n fadng channel, n Proceedngs of IEEE ICC003, May, 003. [] H. Wu, Y. Peng,. Long, S. Cheng, and J. Ma, Performance of relable transport protocol over IEEE 80. wreless LAN: analyss and enhancement, n Proceedngs of IEEE INFOCOM00, June 00. [3] H. Wu, S. Cheng, Y. Peng,. Long, and J. Ma, IEEE 80. dstrbuted coordnaton functon (DCF): analyss and enhancement, n Proceedngs of IEEE ICC00, pp , 00. [4] M. Ergen and P. Varaya, Throughput analyss and admsson control n IEEE 80.a, Moble Networks and Applcatons, vol. 0, no. 5, pp , Oct [5]. Duffy, D. Malone, and D. J. Leth, Modelng the 80. dstrbuted coordnaton functon n non-saturated condtons, IEEE Commun. Lett., vol 9, pp. 75, 005. [6] D. Malone,. Duffy, and D. J. Leth, Modelng the 80. dstrbuted coordnaton functon n nonsaturated heterogeneous condtons, IEEE/ACM Transactons on Networkng (TON), v.5 n., p.59-7, February 007. [7] Dongje Yn, Pu ng Wong, and Tony T. Lee, Analyss of Non-Persstent CSMA Protocols wth ponental Backoff Schedulng, Networkng and Internet Archtecture, May 00. [8].. Ramakrshnan and H. Yang, The Ethernet capture effect: analyss and soluton, Proc. 9th Local Computer Networks Conf., Oct [9]. Medepall and F. A. Tobag, On optmzaton of CSMA/CA based wreless LANs: Part I mpact of ponental Backoff, Proc. IEEE Globecom, 006. [0] J. Y. Hu, Swtchng and Traffc Theory for Integrated Broadband Networks, luwer Academc Publshers, 990. [] Hdeak Takag, Queueng Analyss, A Foundaton of Performance Evaluaton, Volume 3: Dscrete-Tme Systems, NORTH-HOLLAND, 993. [] Y. Yang and T. S. P. Yum, Delay Dstrbutons of Slotted ALOHA and CSMA, IEEE Trans. Commun, vol. 5, No., pp ,

18 Lst of Fgure Fg.. Fg.. Fg. 3. Fg. 4. Fg. 5. The renewal process of P-CSMA wth two types of transmsson perods. Markov chan of P-CSMA. Flow chart of access behavors for HOL packets. Markov chan of HOL packet. Throughput versus attempt rate for P-CSMA. Fg. 6. Stable throughput regons of exponental backoff : a) n = 0 and b) n =50. Fg. 7. Fg. 8. Fg. 9. Smulaton results of throughput for exponental backoff wth fxed nput rate. Stable throughput regon and bounded delay regon of exponental backoff. Number of packets n the system versus retransmsson factor q for exponental backoff. Fg. 0. Number of packets n the system versus nput rate for exponental backoff. Fg.. Maxmum throughputs n stable throughput and bounded delay regons. 8

19 Transmsson perod wth duraton +a Busy perod Pure dle perod a Transmsson Transmsson Transmsson Transmsson a Transmsson Type I: no node s scheduled to access the channel for a mn-slot Type II: If no node attempts to access the channel durng ths +a slots, the next transmsson perod s successful Fg.. The renewal process of P-CSMA wth two types of transmsson perods. Idle p Idle, Idle p Suc, Idle p Suc, Idle p Idle, Suc p Col, Idle p Suc, Suc Suc Suc p Suc, Col p Idle Col p Suc p, Suc Suc, Col p Col, Suc, Col p Col, Col Fg.. Markov chan of the P-CSMA channel. Backoff: Random watng tme determned by current backoff phase Sensng Busy Watng: Untl the channel turns dle Idle Transmsson Backoff phase s ncreased by At least one other node sends packet No other node sends packet Return to phase 0 Collson Success Fg. 3. Flow chart of access behavors for HOL packets. 9

20 p p p F0 q S0 W0 F' 0 p p p p p p p F F p F q q q q S... S... S q q p p W W W q F' p p p q F' p p p q q q F ' p Fg. 4. Markov chan of HOL packet. ˆ 0.47 max a 0. Network Throughput ˆ out a 0.3 Stable range when a 0.3 a 0. Stable range when a 0. Stable range when a 0. GS GL.98 Attempt Rate G Fg. 5. Throughput versus attempt rate for P-CSMA. 0

21 a) n0 and a0. b) n50 and a 0. Lower bound h ( G S ) Upper bound h ( G L ) Lower bound h ( G S ) Upper bound h ( G L ) Network Throughput ˆ out ˆ max Stable throughput regon when n 0 R T Network Throughput ˆ out ˆ max Stable throughput regon when n 50 R T Retransmsson Factor q Retransmsson Factor q Fg. 6. Stable throughput regons of exponental backoff: a) n = 0 and b) n =50. ˆ 0.3, n0 and a 0. Analytcal Results Smulaton Results (95% confdence nterval) Network Throughput ˆ out Stable throughput regon when ˆ Retransmsson Factor q Fg. 7. Smulaton results of throughput for exponental backoff wth fxed nput rate.

22 ˆ max 0.47 Lower bound h ( G S ) RT \ RD :Stable throughut regon wthout guarantee bounded delay n0 and a0. Upper bound h ( G L ) Network Throughput ˆ out Lower bound of Bounded delay regon R D Bounded delay regon when ˆ 0.3 R D Stable throughput regon when ˆ Retransmsson Factor q Fg. 8. Stable throughput regon and bounded delay regon of exponental backoff. ˆ 0.3, n0 and a 0. Analytcal results Smulaton results Number of packets n the system Lower bound h G S Upper bound h ( G L ) Stable throughput regon Bounded delay regon R T R D Retransmsson Factor q Fg. 9. Number of packets n the system versus retransmsson factor q for exponental backoff.

23 q 0. n0 and a0. Analytcal results for q 0. Smulaton results for q 0. Analytcal results for q 0.5 Smulaton results for q 0.5 Number of packets n the system Wthout bounded delay guarantee when q 0.5 Wthout bounded delay guarantee when q 0. q 0.5 Stable throughput regon for q 0. Stable throughput regon for q 0.5 ˆ Input Rate Fg. 0. Number of packets n the system versus nput rate for exponental backoff. max. throughput n stable throughput regon max. throughput n bounded delay regon Maxmum Throughput max. throughput ˆ wthout bounded delay guarantee max. throughput wth bounded delay guarantee max Mn-slot Sze a Fg.. Maxmum throughputs n stable throughput and bounded delay regons. 3

Analysis of Collaborative Distributed Admission Control in x Networks

Analysis of Collaborative Distributed Admission Control in x Networks 1 Analyss of Collaboratve Dstrbuted Admsson Control n 82.11x Networks Thnh Nguyen, Member, IEEE, Ken Nguyen, Member, IEEE, Lnha He, Member, IEEE, Abstract Wth the recent surge of wreless home networks,

More information

Parallelism for Nested Loops with Non-uniform and Flow Dependences

Parallelism for Nested Loops with Non-uniform and Flow Dependences Parallelsm for Nested Loops wth Non-unform and Flow Dependences Sam-Jn Jeong Dept. of Informaton & Communcaton Engneerng, Cheonan Unversty, 5, Anseo-dong, Cheonan, Chungnam, 330-80, Korea. seong@cheonan.ac.kr

More information

AADL : about scheduling analysis

AADL : about scheduling analysis AADL : about schedulng analyss Schedulng analyss, what s t? Embedded real-tme crtcal systems have temporal constrants to meet (e.g. deadlne). Many systems are bult wth operatng systems provdng multtaskng

More information

Performance Evaluation of IEEE e based on ON-OFF Traffic Model I. Papapanagiotou PhD. Student

Performance Evaluation of IEEE e based on ON-OFF Traffic Model I. Papapanagiotou PhD. Student erformance Evaluaton of IEEE 82.e based on ON-OFF Traffc Model I. apapanagotou hd. Student Wreless Telecommuncaton Laboratory Unversty of atras 265 4 atras Greece papapanag@upnet.gr J.S. Vardakas hd. Student

More information

Interclass Collision Protection for IEEE e Wireless LANs

Interclass Collision Protection for IEEE e Wireless LANs Interclass Collson Protecton for IEEE 82.e Wreless LANs Woon Sun Cho, Chae Y. Lee Dstrbuted Coordnaton Functon (DCF) n IEEE 82. and Enhanced Dstrbuted Channel Access (EDCA) n IEEE 82.e are contenton-based

More information

Simulation Based Analysis of FAST TCP using OMNET++

Simulation Based Analysis of FAST TCP using OMNET++ Smulaton Based Analyss of FAST TCP usng OMNET++ Umar ul Hassan 04030038@lums.edu.pk Md Term Report CS678 Topcs n Internet Research Sprng, 2006 Introducton Internet traffc s doublng roughly every 3 months

More information

Performance Analysis of the IEEE MAC Protocol over a WLAN with Capture Effect

Performance Analysis of the IEEE MAC Protocol over a WLAN with Capture Effect Vol. IPSJ Dgtal Courer Nov. 25 Regular Paper Performance Analyss of the IEEE 82. MAC Protocol over a WLAN wth Capture Effect Xaolong L, and Qng-An Zeng, In ths paper, we use a dscrete Markov chan model

More information

An Approximation to the QoS Aware Throughput Region of a Tree Network under IEEE CSMA/CA with Application to Wireless Sensor Network Design

An Approximation to the QoS Aware Throughput Region of a Tree Network under IEEE CSMA/CA with Application to Wireless Sensor Network Design An Approxmaton to the QoS Aware Throughput Regon of a Tree Network under IEEE 802.15.4 CSMA/CA wth Applcaton to Wreless Sensor Network Desgn Abht Bhattacharya a, Anurag Kumar a a Dept. of Electrcal Communcaton

More information

An Optimal Algorithm for Prufer Codes *

An Optimal Algorithm for Prufer Codes * J. Software Engneerng & Applcatons, 2009, 2: 111-115 do:10.4236/jsea.2009.22016 Publshed Onlne July 2009 (www.scrp.org/journal/jsea) An Optmal Algorthm for Prufer Codes * Xaodong Wang 1, 2, Le Wang 3,

More information

Voice capacity of IEEE b WLANs

Voice capacity of IEEE b WLANs Voce capacty of IEEE 82.b WLANs D. S. Amanatads, V. Vtsas, A. Mantsars 2, I. Mavrds 2, P. Chatzmsos and A.C. Boucouvalas 3 Abstract-There s a tremendous growth n the deployment and usage of Wreless Local

More information

On the Exact Analysis of Bluetooth Scheduling Algorithms

On the Exact Analysis of Bluetooth Scheduling Algorithms On the Exact Analyss of Bluetooth Schedulng Algorth Gl Zussman Dept. of Electrcal Engneerng Technon IIT Hafa 3000, Israel glz@tx.technon.ac.l Ur Yechal Dept. of Statstcs and Operatons Research School of

More information

136 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 6, NO. 1, JANUARY Ching-Ling Huang and Wanjiun Liao, Senior Member, IEEE

136 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 6, NO. 1, JANUARY Ching-Ling Huang and Wanjiun Liao, Senior Member, IEEE 136 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 6, NO. 1, JANUARY 2007 Throughput and Delay Performance of IEEE 802.11e Enhanced Dstrbuted Channel Access (EDCA) Under Saturaton Condton Chng-Lng

More information

Performance Analysis of Beacon-Less IEEE Multi-Hop Networks

Performance Analysis of Beacon-Less IEEE Multi-Hop Networks Performance Analyss of Beacon-Less IEEE 2..4 Mult-Hop Networks Racht Srvastava Deptt. of Electrcal Communcaton Engneerng Indan Insttute of Scence Bangalore, Inda 62 rachtsr@gmal.com Anurag Kumar Deptt.

More information

Extension and Comparison of QoS-Enabled Wi-Fi Models in the Presence of Errors

Extension and Comparison of QoS-Enabled Wi-Fi Models in the Presence of Errors Extenson and Comparson of QoS-Enabled W-F Models n the Presence of Errors Ioanns Papapanagotou, Georgos S. Paschos*, Stavros A. Kotsopoulos** and Mchael Devetskots Electrcal and Computer Engneerng, North

More information

with `ook-ahead for Broadcast WDM Networks TR May 14, 1996 Abstract

with `ook-ahead for Broadcast WDM Networks TR May 14, 1996 Abstract HPeR-`: A Hgh Performance Reservaton Protocol wth `ook-ahead for Broadcast WDM Networks Vjay Svaraman George N. Rouskas TR-96-06 May 14, 1996 Abstract We consder the problem of coordnatng access to the

More information

Efficient Backoff Algorithm in Wireless Multihop Ad Hoc Networks

Efficient Backoff Algorithm in Wireless Multihop Ad Hoc Networks 1 Chen-Mn Wu, 2 Hu-Ka Su, 3 Wang-Has Yang *1,Correspondng Author Nanhua Unversty, cmwu@mal.nhu.edu.tw 2 Natonal Formosa Unversty, hksu@nfu.edu.tw 3 Hsupng Insttute of Technology, yangwh@mal.ht.edu.tw do:10.4156/jact.vol3.

More information

An Analytical Model for IEEE Point-to-Point Link

An Analytical Model for IEEE Point-to-Point Link An Analytcal Model for IEEE 82. Pont-to-Pont Lnk Yong Yan, Xaowen hu Department of omputer cence, Hong Kong Baptst Unversty Emal: {yyan, chxw}@comp.hkbu.edu.hk Abstract - Wreless mesh networks have attracted

More information

Related-Mode Attacks on CTR Encryption Mode

Related-Mode Attacks on CTR Encryption Mode Internatonal Journal of Network Securty, Vol.4, No.3, PP.282 287, May 2007 282 Related-Mode Attacks on CTR Encrypton Mode Dayn Wang, Dongda Ln, and Wenlng Wu (Correspondng author: Dayn Wang) Key Laboratory

More information

Problem Set 3 Solutions

Problem Set 3 Solutions Introducton to Algorthms October 4, 2002 Massachusetts Insttute of Technology 6046J/18410J Professors Erk Demane and Shaf Goldwasser Handout 14 Problem Set 3 Solutons (Exercses were not to be turned n,

More information

UBICC Publishers 2008 Ubiquitous Computing and Communication Journal

UBICC Publishers 2008 Ubiquitous Computing and Communication Journal UBICC Journal Ubqutous Computng and Communcaton Journal 008 Volume 3. 008-04-30. ISSN 99-844 Specal Issue on Moble Adhoc Networks UBICC ublshers 008 Ubqutous Computng and Communcaton Journal Edted by Usman

More information

6.854 Advanced Algorithms Petar Maymounkov Problem Set 11 (November 23, 2005) With: Benjamin Rossman, Oren Weimann, and Pouya Kheradpour

6.854 Advanced Algorithms Petar Maymounkov Problem Set 11 (November 23, 2005) With: Benjamin Rossman, Oren Weimann, and Pouya Kheradpour 6.854 Advanced Algorthms Petar Maymounkov Problem Set 11 (November 23, 2005) Wth: Benjamn Rossman, Oren Wemann, and Pouya Kheradpour Problem 1. We reduce vertex cover to MAX-SAT wth weghts, such that the

More information

Solving two-person zero-sum game by Matlab

Solving two-person zero-sum game by Matlab Appled Mechancs and Materals Onlne: 2011-02-02 ISSN: 1662-7482, Vols. 50-51, pp 262-265 do:10.4028/www.scentfc.net/amm.50-51.262 2011 Trans Tech Publcatons, Swtzerland Solvng two-person zero-sum game by

More information

Video Proxy System for a Large-scale VOD System (DINA)

Video Proxy System for a Large-scale VOD System (DINA) Vdeo Proxy System for a Large-scale VOD System (DINA) KWUN-CHUNG CHAN #, KWOK-WAI CHEUNG *# #Department of Informaton Engneerng *Centre of Innovaton and Technology The Chnese Unversty of Hong Kong SHATIN,

More information

Sum of Linear and Fractional Multiobjective Programming Problem under Fuzzy Rules Constraints

Sum of Linear and Fractional Multiobjective Programming Problem under Fuzzy Rules Constraints Australan Journal of Basc and Appled Scences, 2(4): 1204-1208, 2008 ISSN 1991-8178 Sum of Lnear and Fractonal Multobjectve Programmng Problem under Fuzzy Rules Constrants 1 2 Sanjay Jan and Kalash Lachhwan

More information

Network Coding as a Dynamical System

Network Coding as a Dynamical System Network Codng as a Dynamcal System Narayan B. Mandayam IEEE Dstngushed Lecture (jont work wth Dan Zhang and a Su) Department of Electrcal and Computer Engneerng Rutgers Unversty Outlne. Introducton 2.

More information

Support Vector Machines

Support Vector Machines /9/207 MIST.6060 Busness Intellgence and Data Mnng What are Support Vector Machnes? Support Vector Machnes Support Vector Machnes (SVMs) are supervsed learnng technques that analyze data and recognze patterns.

More information

Computer Communications

Computer Communications Computer Communcatons 3 (22) 3 48 Contents lsts avalable at ScVerse ScenceDrect Computer Communcatons journal homepage: www.elsever.com/locate/comcom On the queueng behavor of nter-flow asynchronous network

More information

DESIGNING TRANSMISSION SCHEDULES FOR WIRELESS AD HOC NETWORKS TO MAXIMIZE NETWORK THROUGHPUT

DESIGNING TRANSMISSION SCHEDULES FOR WIRELESS AD HOC NETWORKS TO MAXIMIZE NETWORK THROUGHPUT DESIGNING TRANSMISSION SCHEDULES FOR WIRELESS AD HOC NETWORKS TO MAXIMIZE NETWORK THROUGHPUT Bran J. Wolf, Joseph L. Hammond, and Harlan B. Russell Dept. of Electrcal and Computer Engneerng, Clemson Unversty,

More information

Virtual Memory. Background. No. 10. Virtual Memory: concept. Logical Memory Space (review) Demand Paging(1) Virtual Memory

Virtual Memory. Background. No. 10. Virtual Memory: concept. Logical Memory Space (review) Demand Paging(1) Virtual Memory Background EECS. Operatng System Fundamentals No. Vrtual Memory Prof. Hu Jang Department of Electrcal Engneerng and Computer Scence, York Unversty Memory-management methods normally requres the entre process

More information

Cluster Analysis of Electrical Behavior

Cluster Analysis of Electrical Behavior Journal of Computer and Communcatons, 205, 3, 88-93 Publshed Onlne May 205 n ScRes. http://www.scrp.org/ournal/cc http://dx.do.org/0.4236/cc.205.350 Cluster Analyss of Electrcal Behavor Ln Lu Ln Lu, School

More information

Analysis of a Polling System Modeling QoS Differentiation in WLANs

Analysis of a Polling System Modeling QoS Differentiation in WLANs Analyss of a Pollng System Modelng QoS Dfferentaton n WLANs T.J.M. Coenen Unversty of Twente Department of Appled Mathematcs Enschede, The Netherlands t.j.m.coenen@utwente.nl J.L. van den Berg TNO Informaton

More information

Real-Time Guarantees. Traffic Characteristics. Flow Control

Real-Time Guarantees. Traffic Characteristics. Flow Control Real-Tme Guarantees Requrements on RT communcaton protocols: delay (response s) small jtter small throughput hgh error detecton at recever (and sender) small error detecton latency no thrashng under peak

More information

Hermite Splines in Lie Groups as Products of Geodesics

Hermite Splines in Lie Groups as Products of Geodesics Hermte Splnes n Le Groups as Products of Geodescs Ethan Eade Updated May 28, 2017 1 Introducton 1.1 Goal Ths document defnes a curve n the Le group G parametrzed by tme and by structural parameters n the

More information

Efficient QoS Provisioning at the MAC Layer in Heterogeneous Wireless Sensor Networks

Efficient QoS Provisioning at the MAC Layer in Heterogeneous Wireless Sensor Networks Effcent QoS Provsonng at the MAC Layer n Heterogeneous Wreless Sensor Networks M.Soul a,, A.Bouabdallah a, A.E.Kamal b a UMR CNRS 7253 HeuDaSyC, Unversté de Technologe de Compègne, Compègne Cedex F-625,

More information

R s s f. m y s. SPH3UW Unit 7.3 Spherical Concave Mirrors Page 1 of 12. Notes

R s s f. m y s. SPH3UW Unit 7.3 Spherical Concave Mirrors Page 1 of 12. Notes SPH3UW Unt 7.3 Sphercal Concave Mrrors Page 1 of 1 Notes Physcs Tool box Concave Mrror If the reflectng surface takes place on the nner surface of the sphercal shape so that the centre of the mrror bulges

More information

S1 Note. Basis functions.

S1 Note. Basis functions. S1 Note. Bass functons. Contents Types of bass functons...1 The Fourer bass...2 B-splne bass...3 Power and type I error rates wth dfferent numbers of bass functons...4 Table S1. Smulaton results of type

More information

Adaptive Network Resource Management in IEEE Wireless Random Access MAC

Adaptive Network Resource Management in IEEE Wireless Random Access MAC Adaptve Network Resource Management n IEEE 802.11 Wreless Random Access MAC Hao Wang, Changcheng Huang, James Yan Department of Systems and Computer Engneerng Carleton Unversty, Ottawa, ON, Canada Abstract

More information

y and the total sum of

y and the total sum of Lnear regresson Testng for non-lnearty In analytcal chemstry, lnear regresson s commonly used n the constructon of calbraton functons requred for analytcal technques such as gas chromatography, atomc absorpton

More information

X- Chart Using ANOM Approach

X- Chart Using ANOM Approach ISSN 1684-8403 Journal of Statstcs Volume 17, 010, pp. 3-3 Abstract X- Chart Usng ANOM Approach Gullapall Chakravarth 1 and Chaluvad Venkateswara Rao Control lmts for ndvdual measurements (X) chart are

More information

Compiler Design. Spring Register Allocation. Sample Exercises and Solutions. Prof. Pedro C. Diniz

Compiler Design. Spring Register Allocation. Sample Exercises and Solutions. Prof. Pedro C. Diniz Compler Desgn Sprng 2014 Regster Allocaton Sample Exercses and Solutons Prof. Pedro C. Dnz USC / Informaton Scences Insttute 4676 Admralty Way, Sute 1001 Marna del Rey, Calforna 90292 pedro@s.edu Regster

More information

Fast Retransmission of Real-Time Traffic in HIPERLAN/2 Systems

Fast Retransmission of Real-Time Traffic in HIPERLAN/2 Systems Fast Retransmsson of Real-Tme Traffc n HIPERLAN/ Systems José A Afonso and Joaqum E Neves Department of Industral Electroncs Unversty of Mnho, Campus de Azurém 4800-058 Gumarães, Portugal {joseafonso,

More information

Load-Balanced Anycast Routing

Load-Balanced Anycast Routing Load-Balanced Anycast Routng Chng-Yu Ln, Jung-Hua Lo, and Sy-Yen Kuo Department of Electrcal Engneerng atonal Tawan Unversty, Tape, Tawan sykuo@cc.ee.ntu.edu.tw Abstract For fault-tolerance and load-balance

More information

Efficient Content Distribution in Wireless P2P Networks

Efficient Content Distribution in Wireless P2P Networks Effcent Content Dstrbuton n Wreless P2P Networs Qong Sun, Vctor O. K. L, and Ka-Cheong Leung Department of Electrcal and Electronc Engneerng The Unversty of Hong Kong Pofulam Road, Hong Kong, Chna {oansun,

More information

Performance analysis of distributed cluster-based MAC protocol for multiuser MIMO wireless networks

Performance analysis of distributed cluster-based MAC protocol for multiuser MIMO wireless networks RESEARCH Open Access Performance analyss of dstrbuted cluster-based MAC protocol for multuser MIMO wreless networks Azadeh Ettefagh *, Marc Kuhn, Celal Eşl and Armn Wttneben Abstract It s known that multuser

More information

Problem Definitions and Evaluation Criteria for Computational Expensive Optimization

Problem Definitions and Evaluation Criteria for Computational Expensive Optimization Problem efntons and Evaluaton Crtera for Computatonal Expensve Optmzaton B. Lu 1, Q. Chen and Q. Zhang 3, J. J. Lang 4, P. N. Suganthan, B. Y. Qu 6 1 epartment of Computng, Glyndwr Unversty, UK Faclty

More information

WIRELESS communication technology has gained widespread

WIRELESS communication technology has gained widespread 616 IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. 4, NO. 6, NOVEMBER/DECEMBER 2005 Dstrbuted Far Schedulng n a Wreless LAN Ntn Vadya, Senor Member, IEEE, Anurag Dugar, Seema Gupta, and Paramvr Bahl, Senor

More information

THE IEEE standard for wireless local area networks

THE IEEE standard for wireless local area networks IEEE RANSACIONS ON VEHICULAR ECHNOLOGY, VOL. 58, NO. 2, FEBRUARY 2009 855 Determnstc Prorty Channel Access Scheme for QoS Support n IEEE 802.11e Wreless LANs Sunmyeng Km, Rongsheng Huang, Student Member,

More information

Re-routing Instability in IEEE Multi-hop Ad-hoc Networks *

Re-routing Instability in IEEE Multi-hop Ad-hoc Networks * Re-routng Instablty n IEEE 802.11 Mult-hop Ad-hoc Networks * Png Chung Ng and Soung Chang Lew Department of Informaton Engneerng The Chnese Unversty of Hong Kong {pcng3, soung}@e.cuhk.edu.hk Abstract TCP

More information

WITH rapid improvements of wireless technologies,

WITH rapid improvements of wireless technologies, JOURNAL OF SYSTEMS ARCHITECTURE, SPECIAL ISSUE: HIGHLY-RELIABLE CPS, VOL. 00, NO. 0, MONTH 013 1 Adaptve GTS Allocaton n IEEE 80.15.4 for Real-Tme Wreless Sensor Networks Feng Xa, Ruonan Hao, Je L, Naxue

More information

A General Model of Wireless Interference

A General Model of Wireless Interference A General Model of Wreless Interference Ll Qu Yn Zhang Feng Wang M Kyung Han Ratul Mahajan Unversty of Texas at Austn Mcrosoft Research Austn, TX 7872, USA Redmond, WA 9852, USA {ll,yzhang,wangf,hanm2}@cs.utexas.edu

More information

A mathematical programming approach to the analysis, design and scheduling of offshore oilfields

A mathematical programming approach to the analysis, design and scheduling of offshore oilfields 17 th European Symposum on Computer Aded Process Engneerng ESCAPE17 V. Plesu and P.S. Agach (Edtors) 2007 Elsever B.V. All rghts reserved. 1 A mathematcal programmng approach to the analyss, desgn and

More information

CHAPTER 2 PROPOSED IMPROVED PARTICLE SWARM OPTIMIZATION

CHAPTER 2 PROPOSED IMPROVED PARTICLE SWARM OPTIMIZATION 24 CHAPTER 2 PROPOSED IMPROVED PARTICLE SWARM OPTIMIZATION The present chapter proposes an IPSO approach for multprocessor task schedulng problem wth two classfcatons, namely, statc ndependent tasks and

More information

NUMERICAL SOLVING OPTIMAL CONTROL PROBLEMS BY THE METHOD OF VARIATIONS

NUMERICAL SOLVING OPTIMAL CONTROL PROBLEMS BY THE METHOD OF VARIATIONS ARPN Journal of Engneerng and Appled Scences 006-017 Asan Research Publshng Network (ARPN). All rghts reserved. NUMERICAL SOLVING OPTIMAL CONTROL PROBLEMS BY THE METHOD OF VARIATIONS Igor Grgoryev, Svetlana

More information

Positive Semi-definite Programming Localization in Wireless Sensor Networks

Positive Semi-definite Programming Localization in Wireless Sensor Networks Postve Sem-defnte Programmng Localzaton n Wreless Sensor etworks Shengdong Xe 1,, Jn Wang, Aqun Hu 1, Yunl Gu, Jang Xu, 1 School of Informaton Scence and Engneerng, Southeast Unversty, 10096, anjng Computer

More information

A Five-Point Subdivision Scheme with Two Parameters and a Four-Point Shape-Preserving Scheme

A Five-Point Subdivision Scheme with Two Parameters and a Four-Point Shape-Preserving Scheme Mathematcal and Computatonal Applcatons Artcle A Fve-Pont Subdvson Scheme wth Two Parameters and a Four-Pont Shape-Preservng Scheme Jeqng Tan,2, Bo Wang, * and Jun Sh School of Mathematcs, Hefe Unversty

More information

The Greedy Method. Outline and Reading. Change Money Problem. Greedy Algorithms. Applications of the Greedy Strategy. The Greedy Method Technique

The Greedy Method. Outline and Reading. Change Money Problem. Greedy Algorithms. Applications of the Greedy Strategy. The Greedy Method Technique //00 :0 AM Outlne and Readng The Greedy Method The Greedy Method Technque (secton.) Fractonal Knapsack Problem (secton..) Task Schedulng (secton..) Mnmum Spannng Trees (secton.) Change Money Problem Greedy

More information

Equivalent Models for Queueing Analysis of Deterministic Service Time Tree Networks

Equivalent Models for Queueing Analysis of Deterministic Service Time Tree Networks IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 51, NO. 10, PP. 3576-3584, OCT. 005 1 Equvalent Models for Queueng Analyss of Determnstc Servce Tme Tree Networks Mchael J. Neely, Charles E. Rohrs, Eytan

More information

RAP. Speed/RAP/CODA. Real-time Systems. Modeling the sensor networks. Real-time Systems. Modeling the sensor networks. Real-time systems:

RAP. Speed/RAP/CODA. Real-time Systems. Modeling the sensor networks. Real-time Systems. Modeling the sensor networks. Real-time systems: Speed/RAP/CODA Presented by Octav Chpara Real-tme Systems Many wreless sensor network applcatons requre real-tme support Survellance and trackng Border patrol Fre fghtng Real-tme systems: Hard real-tme:

More information

Learning the Kernel Parameters in Kernel Minimum Distance Classifier

Learning the Kernel Parameters in Kernel Minimum Distance Classifier Learnng the Kernel Parameters n Kernel Mnmum Dstance Classfer Daoqang Zhang 1,, Songcan Chen and Zh-Hua Zhou 1* 1 Natonal Laboratory for Novel Software Technology Nanjng Unversty, Nanjng 193, Chna Department

More information

Comparisons of Packet Scheduling Algorithms for Fair Service among Connections on the Internet

Comparisons of Packet Scheduling Algorithms for Fair Service among Connections on the Internet Comparsons of Packet Schedulng Algorthms for Far Servce among Connectons on the Internet Go Hasegawa, Takahro Matsuo, Masayuk Murata and Hdeo Myahara Department of Infomatcs and Mathematcal Scence Graduate

More information

Non-Split Restrained Dominating Set of an Interval Graph Using an Algorithm

Non-Split Restrained Dominating Set of an Interval Graph Using an Algorithm Internatonal Journal of Advancements n Research & Technology, Volume, Issue, July- ISS - on-splt Restraned Domnatng Set of an Interval Graph Usng an Algorthm ABSTRACT Dr.A.Sudhakaraah *, E. Gnana Deepka,

More information

Virtual Machine Migration based on Trust Measurement of Computer Node

Virtual Machine Migration based on Trust Measurement of Computer Node Appled Mechancs and Materals Onlne: 2014-04-04 ISSN: 1662-7482, Vols. 536-537, pp 678-682 do:10.4028/www.scentfc.net/amm.536-537.678 2014 Trans Tech Publcatons, Swtzerland Vrtual Machne Mgraton based on

More information

Fibre-Optic AWG-based Real-Time Networks

Fibre-Optic AWG-based Real-Time Networks Fbre-Optc AWG-based Real-Tme Networks Krstna Kunert, Annette Böhm, Magnus Jonsson, School of Informaton Scence, Computer and Electrcal Engneerng, Halmstad Unversty {Magnus.Jonsson, Krstna.Kunert}@de.hh.se

More information

Retransmission-Based Partially Reliable Transport Service: An Analytic Model *

Retransmission-Based Partially Reliable Transport Service: An Analytic Model * Retransmsson-Based Partally Relable Transport Servce: An Analytc Model * Rahm Marasl Paul D. Amer Phllp T. Conrad Computer and nformaton Scence Department Unversty of Delaware, Newark, DE 19716 USA Emal:

More information

Adaptive Resource Allocation Control with On-Line Search for Fair QoS Level

Adaptive Resource Allocation Control with On-Line Search for Fair QoS Level Adaptve Resource Allocaton Control wth On-Lne Search for Far QoS Level Fumko Harada, Toshmtsu Usho, Graduate School of Engneerng Scence Osaka Unversty {harada@hopf, usho@}sysesosaka-uacjp Yukkazu akamoto

More information

A Free-Collision MAC Proposal for Networks

A Free-Collision MAC Proposal for Networks 12th Brazlan Workshop on Real-Tme and Embedded Systems 89 A Free-Collson MAC Proposal for 802.11 Networks Omar Alment 1,2, Gullermo Fredrch 1, Gullermo Reggan 1 1 SITIC Group Unversdad Tecnológca Naconal

More information

A Finite Queue Model Analysis of PMRC-based Wireless Sensor Networks

A Finite Queue Model Analysis of PMRC-based Wireless Sensor Networks A Fnte Queue Model Analyss of PMRC-based Wreless Sensor Networks Qaoqn L, Me Yang, Hongyan Wang, Yngtao Jang, Jazh Zeng College of Computer Scence and Technology, Unversty of Electronc Scence and Technology,

More information

The Shortest Path of Touring Lines given in the Plane

The Shortest Path of Touring Lines given in the Plane Send Orders for Reprnts to reprnts@benthamscence.ae 262 The Open Cybernetcs & Systemcs Journal, 2015, 9, 262-267 The Shortest Path of Tourng Lnes gven n the Plane Open Access Ljuan Wang 1,2, Dandan He

More information

Quantifying Performance Models

Quantifying Performance Models Quantfyng Performance Models Prof. Danel A. Menascé Department of Computer Scence George Mason Unversty www.cs.gmu.edu/faculty/menasce.html 1 Copyrght Notce Most of the fgures n ths set of sldes come from

More information

Derivation of Three Queue Nodes Discrete-Time Analytical Model Based on DRED Algorithm

Derivation of Three Queue Nodes Discrete-Time Analytical Model Based on DRED Algorithm Seventh Internatonal Conference on Informaton Technology Dervaton of Three Queue Nodes Dscrete-Tme Analytcal Model Based on DRED Algorthm Jafar Ababneh, Hussen Abdel-Jaber, 3 Fad Thabtah, 3 Wael Had, EmranBadarneh

More information

A Saturation Binary Neural Network for Crossbar Switching Problem

A Saturation Binary Neural Network for Crossbar Switching Problem A Saturaton Bnary Neural Network for Crossbar Swtchng Problem Cu Zhang 1, L-Qng Zhao 2, and Rong-Long Wang 2 1 Department of Autocontrol, Laonng Insttute of Scence and Technology, Benx, Chna bxlkyzhangcu@163.com

More information

Improving Low Density Parity Check Codes Over the Erasure Channel. The Nelder Mead Downhill Simplex Method. Scott Stransky

Improving Low Density Parity Check Codes Over the Erasure Channel. The Nelder Mead Downhill Simplex Method. Scott Stransky Improvng Low Densty Party Check Codes Over the Erasure Channel The Nelder Mead Downhll Smplex Method Scott Stransky Programmng n conjuncton wth: Bors Cukalovc 18.413 Fnal Project Sprng 2004 Page 1 Abstract

More information

Overview. Basic Setup [9] Motivation and Tasks. Modularization 2008/2/20 IMPROVED COVERAGE CONTROL USING ONLY LOCAL INFORMATION

Overview. Basic Setup [9] Motivation and Tasks. Modularization 2008/2/20 IMPROVED COVERAGE CONTROL USING ONLY LOCAL INFORMATION Overvew 2 IMPROVED COVERAGE CONTROL USING ONLY LOCAL INFORMATION Introducton Mult- Smulator MASIM Theoretcal Work and Smulaton Results Concluson Jay Wagenpfel, Adran Trachte Motvaton and Tasks Basc Setup

More information

Empirical Distributions of Parameter Estimates. in Binary Logistic Regression Using Bootstrap

Empirical Distributions of Parameter Estimates. in Binary Logistic Regression Using Bootstrap Int. Journal of Math. Analyss, Vol. 8, 4, no. 5, 7-7 HIKARI Ltd, www.m-hkar.com http://dx.do.org/.988/jma.4.494 Emprcal Dstrbutons of Parameter Estmates n Bnary Logstc Regresson Usng Bootstrap Anwar Ftranto*

More information

Research Article A Comparison Performance Analysis of QoS WLANs: Approaches with Enhanced Features

Research Article A Comparison Performance Analysis of QoS WLANs: Approaches with Enhanced Features Hndaw Publshng Corporaton Advances n Multmeda Volume 007, Artcle ID 387, 3 pages do:055/007/387 Research Artcle A Comparson Performance Analyss of QoS WLANs: Approaches wth Enhanced Features Ioanns Papapanagotou,

More information

For instance, ; the five basic number-sets are increasingly more n A B & B A A = B (1)

For instance, ; the five basic number-sets are increasingly more n A B & B A A = B (1) Secton 1.2 Subsets and the Boolean operatons on sets If every element of the set A s an element of the set B, we say that A s a subset of B, or that A s contaned n B, or that B contans A, and we wrte A

More information

New Exploration of Packet-Pair Probing for Available Bandwidth Estimation and Traffic Characterization

New Exploration of Packet-Pair Probing for Available Bandwidth Estimation and Traffic Characterization New Exploraton of Packet-Par Probng for Avalable Bandwdth Estmaton and Traffc Characterzaton Yu Cheng, Vkram Ravndran, Alberto Leon-Garca, Hsao-Hwa Chen Department of Electrcal and Computer Engneerng,

More information

An Entropy-Based Approach to Integrated Information Needs Assessment

An Entropy-Based Approach to Integrated Information Needs Assessment Dstrbuton Statement A: Approved for publc release; dstrbuton s unlmted. An Entropy-Based Approach to ntegrated nformaton Needs Assessment June 8, 2004 Wllam J. Farrell Lockheed Martn Advanced Technology

More information

Clustering Based Adaptive Power Control for Interference Mitigation in Two-Tier Femtocell Networks

Clustering Based Adaptive Power Control for Interference Mitigation in Two-Tier Femtocell Networks KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS VOL. 8, NO. 4, Apr. 2014 1424 Copyrght c 2014 KSII Clusterng Based Adaptve Power Control for Interference Mtgaton n Two-Ter Femtocell Networks Hong

More information

Private Information Retrieval (PIR)

Private Information Retrieval (PIR) 2 Levente Buttyán Problem formulaton Alce wants to obtan nformaton from a database, but she does not want the database to learn whch nformaton she wanted e.g., Alce s an nvestor queryng a stock-market

More information

Scheduling Remote Access to Scientific Instruments in Cyberinfrastructure for Education and Research

Scheduling Remote Access to Scientific Instruments in Cyberinfrastructure for Education and Research Schedulng Remote Access to Scentfc Instruments n Cybernfrastructure for Educaton and Research Je Yn 1, Junwe Cao 2,3,*, Yuexuan Wang 4, Lanchen Lu 1,3 and Cheng Wu 1,3 1 Natonal CIMS Engneerng and Research

More information

Delay Variation Optimized Traffic Allocation Based on Network Calculus for Multi-path Routing in Wireless Mesh Networks

Delay Variation Optimized Traffic Allocation Based on Network Calculus for Multi-path Routing in Wireless Mesh Networks Appl. Math. Inf. Sc. 7, No. 2L, 467-474 2013) 467 Appled Mathematcs & Informaton Scences An Internatonal Journal http://dx.do.org/10.12785/ams/072l13 Delay Varaton Optmzed Traffc Allocaton Based on Network

More information

TECHNIQUE OF FORMATION HOMOGENEOUS SAMPLE SAME OBJECTS. Muradaliyev A.Z.

TECHNIQUE OF FORMATION HOMOGENEOUS SAMPLE SAME OBJECTS. Muradaliyev A.Z. TECHNIQUE OF FORMATION HOMOGENEOUS SAMPLE SAME OBJECTS Muradalyev AZ Azerbajan Scentfc-Research and Desgn-Prospectng Insttute of Energetc AZ1012, Ave HZardab-94 E-mal:aydn_murad@yahoocom Importance of

More information

A Binarization Algorithm specialized on Document Images and Photos

A Binarization Algorithm specialized on Document Images and Photos A Bnarzaton Algorthm specalzed on Document mages and Photos Ergna Kavalleratou Dept. of nformaton and Communcaton Systems Engneerng Unversty of the Aegean kavalleratou@aegean.gr Abstract n ths paper, a

More information

Life Tables (Times) Summary. Sample StatFolio: lifetable times.sgp

Life Tables (Times) Summary. Sample StatFolio: lifetable times.sgp Lfe Tables (Tmes) Summary... 1 Data Input... 2 Analyss Summary... 3 Survval Functon... 5 Log Survval Functon... 6 Cumulatve Hazard Functon... 7 Percentles... 7 Group Comparsons... 8 Summary The Lfe Tables

More information

Priority-Based Scheduling Algorithm for Downlink Traffics in IEEE Networks

Priority-Based Scheduling Algorithm for Downlink Traffics in IEEE Networks Prorty-Based Schedulng Algorthm for Downlnk Traffcs n IEEE 80.6 Networks Ja-Mng Lang, Jen-Jee Chen, You-Chun Wang, Yu-Chee Tseng, and Bao-Shuh P. Ln Department of Computer Scence Natonal Chao-Tung Unversty,

More information

Maximum Weight Matching Dispatching Scheme in Buffered Clos-Network Packet Switches

Maximum Weight Matching Dispatching Scheme in Buffered Clos-Network Packet Switches Maxmum Weght Matchng Dspatchng Scheme n Buffered Clos-Network Packet Swtches Roberto Roas-Cessa, Member, IEEE, E Ok, Member, IEEE, and H. Jonathan Chao, Fellow, IEEE Abstract The scalablty of Clos-network

More information

Enhancing Class-Based Service Architectures with Adaptive Rate Allocation and Dropping Mechanisms

Enhancing Class-Based Service Architectures with Adaptive Rate Allocation and Dropping Mechanisms Enhancng Class-Based Servce Archtectures wth Adaptve Rate Allocaton and Droppng Mechansms Ncolas Chrstn, Member, IEEE, Jörg Lebeherr, Senor Member, IEEE, and Tarek Abdelzaher, Member, IEEE Abstract Class-based

More information

Wishing you all a Total Quality New Year!

Wishing you all a Total Quality New Year! Total Qualty Management and Sx Sgma Post Graduate Program 214-15 Sesson 4 Vnay Kumar Kalakband Assstant Professor Operatons & Systems Area 1 Wshng you all a Total Qualty New Year! Hope you acheve Sx sgma

More information

Mobility Based Routing Protocol with MAC Collision Improvement in Vehicular Ad Hoc Networks

Mobility Based Routing Protocol with MAC Collision Improvement in Vehicular Ad Hoc Networks Moblty Based Routng Protocol wth MAC Collson Improvement n Vehcular Ad Hoc Networks Zhhao Dng, Pny Ren, Qnghe Du Shaanx Smart Networks and Ubqutous Access Rearch Center School of Electronc and Informaton

More information

Subspace clustering. Clustering. Fundamental to all clustering techniques is the choice of distance measure between data points;

Subspace clustering. Clustering. Fundamental to all clustering techniques is the choice of distance measure between data points; Subspace clusterng Clusterng Fundamental to all clusterng technques s the choce of dstance measure between data ponts; D q ( ) ( ) 2 x x = x x, j k = 1 k jk Squared Eucldean dstance Assumpton: All features

More information

Course Introduction. Algorithm 8/31/2017. COSC 320 Advanced Data Structures and Algorithms. COSC 320 Advanced Data Structures and Algorithms

Course Introduction. Algorithm 8/31/2017. COSC 320 Advanced Data Structures and Algorithms. COSC 320 Advanced Data Structures and Algorithms Course Introducton Course Topcs Exams, abs, Proects A quc loo at a few algorthms 1 Advanced Data Structures and Algorthms Descrpton: We are gong to dscuss algorthm complexty analyss, algorthm desgn technques

More information

Technical Report. i-game: An Implicit GTS Allocation Mechanism in IEEE for Time- Sensitive Wireless Sensor Networks

Technical Report. i-game: An Implicit GTS Allocation Mechanism in IEEE for Time- Sensitive Wireless Sensor Networks www.hurray.sep.pp.pt Techncal Report -GAME: An Implct GTS Allocaton Mechansm n IEEE 802.15.4 for Tme- Senstve Wreless Sensor etworks Ans Koubaa Máro Alves Eduardo Tovar TR-060706 Verson: 1.0 Date: Jul

More information

Enhanced Markov Chain Model and Throughput Analysis of the Slotted CSMA/CA for IEEE Under Unsaturated Traffic Conditions

Enhanced Markov Chain Model and Throughput Analysis of the Slotted CSMA/CA for IEEE Under Unsaturated Traffic Conditions IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, VOL. 58, NO. 1, JANUARY 2009 473 Enhanced Markov Chan Model and Throughput Analyss of the Slotted CSMA/CA for IEEE 802.15.4 Under Unsaturated Traffc Condtons

More information

Utility Constrained Energy Minimization In Aloha Networks

Utility Constrained Energy Minimization In Aloha Networks Utlty Constraned Energy nmzaton In Aloha Networks Amrmahd Khodaan, Babak H. Khalaj, ohammad S. Taleb Electrcal Engneerng Department Sharf Unversty of Technology Tehran, Iran khodaan@ee.shrf.edu, khalaj@sharf.edu,

More information

Modelling a Queuing System for a Virtual Agricultural Call Center

Modelling a Queuing System for a Virtual Agricultural Call Center 25-28 July 2005, Vla Real, Portugal Modellng a Queung System for a Vrtual Agrcultural Call Center İnc Şentarlı, a, Arf Orçun Sakarya b a, Çankaya Unversty, Department of Management,06550, Balgat, Ankara,

More information

Analysis of QoS in WLAN

Analysis of QoS in WLAN Analyss of QoS n WLAN PAAL E. ENGELSTAD AND OLAV N. ØSTERBØ Paal E. Engelstad s Research Scentst n Telenor R&D An analytcal model s proposed to descrbe the prorty schemes of the EDCA mechansm of the IEEE

More information

Mathematics 256 a course in differential equations for engineering students

Mathematics 256 a course in differential equations for engineering students Mathematcs 56 a course n dfferental equatons for engneerng students Chapter 5. More effcent methods of numercal soluton Euler s method s qute neffcent. Because the error s essentally proportonal to the

More information

A New Token Allocation Algorithm for TCP Traffic in Diffserv Network

A New Token Allocation Algorithm for TCP Traffic in Diffserv Network A New Token Allocaton Algorthm for TCP Traffc n Dffserv Network A New Token Allocaton Algorthm for TCP Traffc n Dffserv Network S. Sudha and N. Ammasagounden Natonal Insttute of Technology, Truchrappall,

More information

Channel 0. Channel 1 Channel 2. Channel 3 Channel 4. Channel 5 Channel 6 Channel 7

Channel 0. Channel 1 Channel 2. Channel 3 Channel 4. Channel 5 Channel 6 Channel 7 Optmzed Regonal Cachng for On-Demand Data Delvery Derek L. Eager Mchael C. Ferrs Mary K. Vernon Unversty of Saskatchewan Unversty of Wsconsn Madson Saskatoon, SK Canada S7N 5A9 Madson, WI 5376 eager@cs.usask.ca

More information