Energy-Conserving Access Protocols for Transmitting Data in Unicast and Broadcast Mode

Size: px
Start display at page:

Download "Energy-Conserving Access Protocols for Transmitting Data in Unicast and Broadcast Mode"

Transcription

1 Energy-Conserving Access Protocols for ransmitting Data in Unicast and Broadcast Mode I. Papadimitriou and M. Paterakis Laboratories of elecommunication and Information and Computer etworks Department of Electronics and Computer Engineering echnical University of Crete Chania, GREECE ABSRAC In the recent years many applications have emerged, where the demand for communicating with a very large number of small-size and low-cost nodes becomes a necessity. Such applications involve for example, Radio Frequency IDentification (RFI and smart card networks, or even mobile computing devices, in general. A critical energy constraint is imposed on the communication (access) protocols used in these systems, so that the total time a node needs to be active for transmitting or receiving information should be minimized. Another area with great interest is that of I. IRODUCIO Radio Frequency Identification (RFI and smart card networks are the most characteristic examples of Automatic Identification and Data Capture (AIDC) applications, where the energy saving is a critical system parameter. he object of any RFID system is to carry data in suitable transponders, generally known as tags, and to retrieve data, by machine-readable means, at a suitable time and place to satisfy particular application needs. Data within a tag may provide identification for an item in manufacture, goods in transit, a location, the identity of a vehicle, an animal or individual. A typical IDentification Ework (IDE) is composed of a number of interconnected base stations, communicating over a shared wireless channel to a large number of small low-cost wireless nodes or tags. hese tags usually contain some sort of microprocessor power source in the form of a battery, capacitor, or solar cell, as well as a radio frequency receiver, possibly a transmitter, and some support logic. Unlike previous work on energy-conserving protocols for unicast data transfer only [-, we consider that most of the packets are addressed to all tags, so the base station broadcasts each of these packets. In [, it is pointed out that the classical multiple access protocols, such as those described in [3, do not satisfy the dual requirement of low energy and acceptable delays. herefore, a new protocol, named pseudo-random, is proposed and it is shown that it performs well for various broadcast-based information systems which, compared to traditional unicast data transfer, can be much more efficient for disseminating information to a large number of nodes in applications where there is a high degree of commonality among node interests. Unlike previous work on energy-conserving protocols with unicast data transfer, we propose and evaluate broadcast-based communication protocols with energy constraint, in which the number of time slots during which nodes need to be in the active state is minimized, while the access delays are kept low. loads and its behavior is slightly affected by the use of heterogeneous destination distributions. his protocol combines the fairness of random access protocols with the low energy requirements of classical DMA. In [, apart from the pseudo-random protocol, two other protocols, the Grouped-ag DMA and the Directory protocol, are proposed. All three protocols perform well for various loads, and any performance differences among them depend on the traffic load and the destination distributions. For typical RFID applications, the pseudo-random protocol is proposed as being capable of providing a simple and effective access method, which includes energy constraint. In this paper we adopt many characteristics of the pseudo-random protocol and focus on the design and implementation of communication scheduling algorithms, so as to reduce the average delay of the packets that the base station has to transmit to the tags. he allowable delay is an application-dependent constraint. Using RFID tags designed to require a minimum of energy to operate is the solution to the constraint for low energy consumption. In order to conserve battery life, the tag can enter a sleep state, where its CPU is in a low power mode and radio reception is disabled. he communication with the base station is achieved when the tag enters the awake state, in which the CPU operates at full energy. We examine two scenarios: the first is the case of broadcast packet transmissions to the tags, where each packet is addressed to all tags and the second is the case

2 where most of the packets are broadcast and the rest are unicast packets. Each of the latter packets is addressed to only one destination (selected using a uniform distribution). We first describe the network model and the pseudo-random protocol. Section III presents a detailed description of the algorithms proposed for both cases. Section IV presents the results of our experimental study together with performance comparisons of the examined algorithms. he paper is concluded in section V. II. EWORK MODEL AD PROOCOL DESCRIPIO We consider a single-cell wireless communication system where a base station communicates with tags through a radio channel of bandwidth B. he communication is packet-oriented. We assume that the time is slotted and that the base station s transmissions are synchronized to the beginning of the slots. he packet length, c, is constant and exactly one packet can be transmitted during each slot. In our system model, we do not explicitly treat transmission errors. We view the access protocol as consisting of two components: the transmission scheduling strategy at the base station, which in each slot selects a packet for transmission from the arrival queue, and the wake-up schedule at each tag, which determines the slots in which the particular tag is awake. For the latter, we adopt the wake-up schedule of the pseudo-random protocol [-, where all tags run the same pseudo-random number generator and determine their state (awake or asleep) at each slot based on a probability p and the stored state of the random number generator. In order to avoid a complete overlap of the wake-up schedules, the pseudorandom generator of each tag is initialized with a unique seed, which is known at the base station. herefore, by using the same pseudo-random number generator, it is possible for the base station to determine the schedules of the tags it wants to transmit to. Our main contribution is the design and implementation of certain transmission scheduling algorithms, aiming to reduce the average packet delay and the variability of the packet delays. III. DESCRIPIO OF RASMISSIO SCHEDULIG ALGORIHMS A. Broadcasting Case In this case each packet is addressed to all tags, so the base station broadcasts each packet. We consider the transmission of a broadcast packet complete when all tags have received the packet. hen the packet is deleted from the base station s queue. A.FCFS (First Come First Served) his is the worst performing algorithm for our model. he base station stores all arriving packets in a buffer and examines them according to their age, using the oldest packet criterion. his results to many wasted slots, as for example if the packet currently at the head of the queue must be delivered to the last two destinations (assume it has already been transmitted to the remaining - tags), but these last two destinations are not awake during the current slot. So the latter is wasted. We examine this algorithm because its performance provides a lower bound to the performance of any workconserving algorithm that can be employed by the base station. Furthermore, we can provide an analytical performance evaluation for this algorithm, which is not presented here, as it is similar to the one presented in section B. for the second examined case. A.FCFS-ES(First Come First Served-o Empty Slots) his algorithm improves FCFS in that it does not leave any slot go unused as long as there is work to be done. he base station examines the packets according to their age, using the oldest packet criterion, however, when the destinations left for the currently examined packet are not awake during the current slot, the base station checks the next packet in its queue. At the beginning of the next time slot the examination of packets starts again from the oldest packet in queue. A3.MDF m (Most Destinations First) m he base station checks some of the oldest packets from its waiting queue (e.g. the 3 oldest) and transmits the one that can reach the most destinations. he number of packets checked is determined by the algorithmic parameter m. his algorithm is a modification of the MRF (Most Requests First) algorithm [5. A4.(DxW) m (Destinations times Wait) m his algorithm is a modification of the RxW algorithm [6, it combines the benefit offered by MDF with the fairness of FCFS. DxW broadcasts a packet either because it can be transmitted to many tags or because it has been waiting for long in the queue. he base station again checks the m oldest packets, computes for each of them the product D*W (where D is the number of tags the packet can be sent and W the age of the packet, in slots) and transmits the packet with the largest value of D*W. A5.P-MDF m and P-(DxW) m (Preemptive MDF m and Preemptive (DxW) m ) hese algorithms correspond to modified versions of the MDF m and (DxW) m algorithms, respectively. he only difference is that, while the base station examines the m oldest packets, if a packet is found that can be transmitted during the current slot to all tags that have not received it yet, then this packet is selected, no matter if the value of D or D*W for another packet maybe larger. he improvement introduced is due to the fact that no additional delay is imposed on a packet for which all tags that have not received it yet are awake during the current slot, so this packet can be transmitted and removed from the base station queue. hese two algorithms take advantage of the properties of the Shortest Job First algorithm [7 and of the preemptive broadcasting [8, that is, interrupting a job

3 (e.g., a long one) in favor of another (e.g., a shorter one), to be resumed later from where it was interrupted. B. Mixed Unicasting and Broadcasting Case In this case it is assumed that most of the packets are addressed to all tags (broadcasted by the base station) and the rest are unicast packets. At this point we make an assumption, which we believe is close to reality. We assume that it is necessary for the unicast packets to have priority against broadcast packets. A real situation could be the following: a tag enters a controlled access area. hen, there should be an instantaneous point-to-point communication with the base station, so that the latter identifies the agid. his communication must have higher priority against the broadcasting of packets to tags, already identified and placed somewhere in the area. B.FCFS (First Come First Served) his is the same algorithm, as described earlier. he base station stores all arriving packets (both unicast and broadcast) in a common buffer and examines them according to their age, using the oldest packet criterion. Again, this algorithm is examined because it provides a performance lower bound. Furthermore, we can provide the following analysis for it. Analysis of FCFS algorithm We first make the following definitions: b Random variable denoting the number of slots needed for a broadcast packet to be transmitted to all tags (i.e., the broadcast packet service time at the base station queue) ) Average packet service time u ) Average unicast packet service time b ) Average broadcast packet service time Average total packet delay X Fraction of unicast packets We assume that the packets arrive at the base station according to a Poisson process with arrival rate λ (expressed in packets per slot). In [4 it has been shown that the packet arrival stream at the base station from Poisson to self-similar traffic does not have a substantial effect on the energy vs. delay characteristics of the pseudo-random and other energy-conserving protocols. he probability that b is equal to is P ( ) p () equal or smaller than P ( ) [ ( p) () and retroactively, we have that P ( b k ) [ ( k p ) (3) he average broadcast packet service time, b ), is given by ) k * P( k ) P( k ) k k [ P( b < k ) k he average number of slots needed for a unicast packet to be transmitted to its destination, u ), is /p and for the average packet service time ), we have )X* u ) + (-X)* b ) (5) k { [ ( p) k } (4) In order for our system to be stable [3, the mean arrival rate of packets must be smaller than the maximum packet service rate, that is λ < λ max (6) ) k X *(/ p) + ( X)* { [ ( p) } hus far, we have derived an expression, which gives the maximum arrival rate of packets that can be supported, given the system parameters p, and X. λ max converges to a positive value, since for large values of k, the terms added to the series k { [ ( p ) } converge to zero. k ext, observing that our system is an M/G/ queue, we use the Pollaczek and Khinchin formula [3 to derive the following expression for the average total packet delay λ * ) ) + *[ λ * ) (7) where ) is given from (5) and ) is the second moment of the packet service time, given by ) X * (8) u ) + ( X )* ) b ) is the second moment of service time for broadcast packets only and is given by ) k As for u ), it is given by u k ) k * P( k) k k *{[ ( p) k k * P( u k [ ( p) k) k k *[ P( k) P( k ) (9) (0) B.FCFS-ES(First Come First Served-o Empty Slots) his algorithm improves FCFS for the mixed case of unicast/broadcast packets. he base station again examines the packets according to their age, using the oldest packet criterion, but when the tag to which a unicast packet is addressed to, or the destinations left for a broadcast packet are not awake during the current slot, we don t let the slot go unused and the base station checks the next packet in its queue. At the beginning of the next time slot the examination of packets starts again from the oldest packet in queue. B3.L-(FCFS-ES) (wo Lists - First Come First Served-o Empty Slots) he base station stores unicast and broadcast packets in two different buffers (lists), with the list of unicast packets having higher priority, so as to meet the requirement for minimizing unicast packet delays. he examination of packets starts from the unicast list, where the FCFS-ES algorithm is applied and only if no packet is found for which its destination is awake, then the broadcast list is checked and the same algorithm is applied. B4.L-[P-(DxW) m (wo Lists - Preemptive (DxW) m ) he only difference of this algorithm from the previous one, is that the P-(DxW) m and not the FCFS-ES algorithm is applied to the list of broadcast packets. he k } k k *[( p) k * p

4 reason we chose the particular algorithm will be explained in section IV. IV. EXPERIMEAL RESULS For all simulations we considered a system of 500 tags, so as to compare the performance of the scheduling algorithms. he value of probability p was kept small (below 0.5), to meet the energy constraints. he arrival rates, λ, started at 0.0 packets/slot till the value λ max that can be supported by the system, depending on the algorithm applied. We simulated the reception of packets for each algorithm. We note that the experimental results presented for the FCFS algorithm in both cases are almost identical with the corresponding analytical results. Figs. -3 concern the first case, of Broadcasting only. Figs. and present the average total packet delay (in slots) as a function of the load λ (in packets/slot), for 500 tags and p0.3. From the analysis of the FCFS algorithm in this case we find the value of λ max for the particular values of p and, to be λ max Clearly, for all values of λ in Fig. the FCFS-ES algorithm gives the smallest average total packet delay. his is due to the fact that the values of λ in this graph are quite small (smaller than λ max ) and there is rarely a large number of packets in base station s queue, so as to take advantage of the improvements offered by the other algorithms. he latter can be observed in Fig., where P-(DxW) outperforms all other algorithms. he fact that each algorithm gives unacceptable high delays after a certain value of λ gives an indication about the throughput of each of them, that is the maximum arrival rate of packets that can be supported, depending on the algorithm applied.fig. 3 presents the quotient of standard deviation to average total packet delay, defined as σd E{[ D } () as a function of λ, for 500 tags and p0.3. Again, it is seen that FCFS-ES algorithm gives the smallest σ D / for small λ s, till λ is about 0.05, followed by P-(DxW) for larger values of λ. At this point, we would like to summarize our observations about the parameter m, which determines the maximum number of packets examined by the base station, to select the one to transmit. One could claim that m should be set equal to, that is the base station should check all packets in queue. We found though, that for each value of λ there is an optimum value of m, which gives the minimum average total packet delay, compared with larger values of m. his is due to the fact that, when the base station has to select among many packets the one with the most destinations awake for example, it will postpone the transmission of an older packet, in favor of a packet, which has arrived later. So, the careful selection of m for all algorithms that use this parameter, offers an extra benefit. Due to lack of space we do not present graphs for different values of p and. It was found however, as Avg. otal Delay per Packet (slots) FCFS FCFS-ES MDF Fig.. Broadcasting, 500, p0.3, λ [0.0, 0.04 Avg. otal Delay per Packet (slots) FCFS FCFS-ES MDF Fig.. Broadcasting, 500, p0.3, λ [0.045, Standard Deviation / Avg. otal Delay per Packet FCFS FCFS-ES MDF Fig. 3. Broadcasting, 500, p0.3, λ [0.0, expected, that larger values of p incur lower average packet delays and σ D / values and increase the throughput of the algorithms. Exactly the opposite was observed when we increased the number of tags,. Figs. 4-7 concern the second case of mixed Unicasting and Broadcasting. Fig. 4 presents the average total delay for unicast packets only, D u ), (in slots) as a function of λ (in packets/slot), for 500, p0.5 and X0.3. From the analysis of the FCFS algorithm in this case, the value of λ max for the particular values of p, and X, is λ max 04. It can be seen that L-(FCFS-ES) and L-(P-DxW) perform very similarly, outperforming the other two algorithms, because of the higher priority they give to the unicast packets. In Fig. 5 the average total delay for broadcast packets, D b ), is presented for the same values of p, and X. For values of λ greater than λ max the improvement achieved with the algorithm L-(P- DxW) is obvious. his is explained by the results of Fig., where the algorithm P-DxW performed the best for λ s greater than λ max, in the case of broadcast packets

5 only. he fact that the scheduling algorithms perform almost the same for values of λ smaller than λ max is due to the small number of unicast packets and the negligible average service time of a unicast packet compared to that of a broadcast one. herefore, the algorithms, which give priority to unicast packets, do not add significantly to average total delay for broadcast packets. In Fig. 6 the quotient of standard deviation to the average total delay for unicast packets, defined as σ () Du Du) E{[ Du Du) } Du) is presented. he fact that the algorithms L-(FCFS- ES) and L-(P-DxW) give low and almost constant delay (Fig. 4) explains the almost constant σ Du /D u ) they also offer. In Fig. 7 we have the corresponding graph for broadcast packets. All algorithms, except FCFS, perform very similarly till λ0.06, and for larger λ s the L-(P-DxW) outperforms all. We recall the conclusions obtained from Fig. 3, where the algorithm P-DxW performed the best for large λ s, in case of broadcast packets only. We again make the same observations for the parameter m of the algorithm L-[P-(DxW) m. V. COCLUSIOS In this paper, we addressed the problem of energy conserving wireless access protocols, together with the demand for broadcasting information to a large number of nodes. We adopted many characteristics of the pseudo-random protocol, which minimizes the energy required, and focused on the design and implementation of algorithms to meet the application delay constraints. We examined two scenarios, one for broadcast only packet transmissions to the tags and the other for the mixed case of unicast/broadcast packet transmissions. he performance evaluation of the algorithms was obtained via simulations. REFERECES [ Imrich Chlamtac, Chiara Petrioli and Jason Redi, An Energy-Conserving Access Protocol for Wireless Communication, he IEEE Intl. Conf. on Comm., ICC'97, Montreal, Quebec, Canada, June 997. [ Imrich Chlamtac, Chiara Petrioli and Jason Redi, Energy-Conserving Access Protocols for Identification etworks, IEEE/ACM ransactions On etworking, Vol.7, o, Feb [3 Bertsekas, D. and Gallager, R., Data etworks, Prentice Hall, 99. [4 Jason Redi and Dimiter Avresky, Performance of Energy-Conserving Access Protocols Under Self-Similar raffic, he IEEE Wireless Commun. and etworking Conf., WCC 99, ew Orleans, LA, Sep.999 [5 H.D. Dykeman, M. Ammar and J.W. Wong, Scheduling Algorithms for Videotex Systems Under Broadcast Delivery, IEEE Intl. Conf. on Comm., ICC 86, oronto, Canada 986. Avg. otal Delay per Unicast Packet (slots) (logarithmic scale) Fig. 4. Unicasting/Broadcasting, 500, p0.5, X0.3 Avg. otal Delay per Broadcast Packet (slots) (logarithmic scale) FCFS FCFS-ES L-(FCFS-ES) L-(P-DxW) Fig. 5. Unicasting/Broadcasting, 500, p0.5, X0.3 Standard Deviation / Avg. otal Delay per Unicast Packet FCFS FCFS-ES L-(FCFS-ES) L-(P-DxW) Fig. 6. Unicasting/Broadcasting, 500, p0.5, X0.3 Standard Deviation / Avg. otal Delay per Broadcast Packet FCFS FCFS-ES L-(FCFS-ES) L-(P-DxW) FCFS FCFS-ES L-(FCFS-ES) L-(P-DxW) Fig. 7. Unicasting/Broadcasting, 500, p0.5, X0.3 [6 Demet Aksoy and Michael Franklin, Scheduling for Large-Scale On-Demand Data Broadcasting, IEEE IFOCOM Conf., 998. [7 E. Gelenbe and I. Mitrani, Analysis and Synthesis of Computer Systems, Academic Press, 980. [8 Swarup Acharya and S. Muthukrishnan, Scheduling On-Demand Broadcasts: ew Metrics and Algorithms, Proc. of ACM/IEEE MobiCom, Dallas, Oct. 998.

Volume 3, Issue 9, September 2013 International Journal of Advanced Research in Computer Science and Software Engineering

Volume 3, Issue 9, September 2013 International Journal of Advanced Research in Computer Science and Software Engineering Volume 3, Issue 9, September 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Optimal Round

More information

Stretch-Optimal Scheduling for On-Demand Data Broadcasts

Stretch-Optimal Scheduling for On-Demand Data Broadcasts Stretch-Optimal Scheduling for On-Demand Data roadcasts Yiqiong Wu and Guohong Cao Department of Computer Science & Engineering The Pennsylvania State University, University Park, PA 6 E-mail: fywu,gcaog@cse.psu.edu

More information

End-To-End Delay Optimization in Wireless Sensor Network (WSN)

End-To-End Delay Optimization in Wireless Sensor Network (WSN) Shweta K. Kanhere 1, Mahesh Goudar 2, Vijay M. Wadhai 3 1,2 Dept. of Electronics Engineering Maharashtra Academy of Engineering, Alandi (D), Pune, India 3 MITCOE Pune, India E-mail: shweta.kanhere@gmail.com,

More information

Performance of Multihop Communications Using Logical Topologies on Optical Torus Networks

Performance of Multihop Communications Using Logical Topologies on Optical Torus Networks Performance of Multihop Communications Using Logical Topologies on Optical Torus Networks X. Yuan, R. Melhem and R. Gupta Department of Computer Science University of Pittsburgh Pittsburgh, PA 156 fxyuan,

More information

Performance Study of Routing Algorithms for LEO Satellite Constellations

Performance Study of Routing Algorithms for LEO Satellite Constellations Performance Study of Routing Algorithms for LEO Satellite Constellations Ioannis Gragopoulos, Evangelos Papapetrou, Fotini-Niovi Pavlidou Aristotle University of Thessaloniki, School of Engineering Dept.

More information

Pull vs Push: A Quantitative Comparison for Data Broadcast

Pull vs Push: A Quantitative Comparison for Data Broadcast Pull vs Push: A Quantitative Comparison for Data Broadcast Demet Aksoy Mason Sin-Fai Leung Computer Science Department University of California, Davis (aksoy,leungm)@cs.ucdavis.edu Abstract Advances in

More information

Scheduling On-Demand Broadcast Items

Scheduling On-Demand Broadcast Items Scheduling On-Demand Broadcast Items Miao Wang mwang@inf.fu-berlin.de Advisor: Ilias Michalarias Freie Universität Berlin, Institute for Computer Science Abstract. The demand for various information delivery

More information

Chapter -5 QUALITY OF SERVICE (QOS) PLATFORM DESIGN FOR REAL TIME MULTIMEDIA APPLICATIONS

Chapter -5 QUALITY OF SERVICE (QOS) PLATFORM DESIGN FOR REAL TIME MULTIMEDIA APPLICATIONS Chapter -5 QUALITY OF SERVICE (QOS) PLATFORM DESIGN FOR REAL TIME MULTIMEDIA APPLICATIONS Chapter 5 QUALITY OF SERVICE (QOS) PLATFORM DESIGN FOR REAL TIME MULTIMEDIA APPLICATIONS 5.1 Introduction For successful

More information

Enhanced Power Saving Scheme for IEEE DCF Based Wireless Networks

Enhanced Power Saving Scheme for IEEE DCF Based Wireless Networks Enhanced Power Saving Scheme for IEEE 802.11 DCF Based Wireless Networks Jong-Mu Choi, Young-Bae Ko, and Jai-Hoon Kim Graduate School of Information and Communication Ajou University, Republic of Korea

More information

Wireless Networks (CSC-7602) Lecture 8 (15 Oct. 2007)

Wireless Networks (CSC-7602) Lecture 8 (15 Oct. 2007) Wireless Networks (CSC-7602) Lecture 8 (15 Oct. 2007) Seung-Jong Park (Jay) http://www.csc.lsu.edu/~sjpark 1 Today Wireline Fair Schedulling Why? Ideal algorithm Practical algorithms Wireless Fair Scheduling

More information

Class-based Packet Scheduling Policies for Bluetooth

Class-based Packet Scheduling Policies for Bluetooth Class-based Packet Scheduling Policies for Bluetooth Vishwanath Sinha, D. Raveendra Babu Department of Electrical Engineering Indian Institute of Technology, Kanpur - 08 06, INDIA vsinha@iitk.ernet.in,

More information

Performance Analysis of Cell Switching Management Scheme in Wireless Packet Communications

Performance Analysis of Cell Switching Management Scheme in Wireless Packet Communications Performance Analysis of Cell Switching Management Scheme in Wireless Packet Communications Jongho Bang Sirin Tekinay Nirwan Ansari New Jersey Center for Wireless Telecommunications Department of Electrical

More information

Introduction to Real-Time Communications. Real-Time and Embedded Systems (M) Lecture 15

Introduction to Real-Time Communications. Real-Time and Embedded Systems (M) Lecture 15 Introduction to Real-Time Communications Real-Time and Embedded Systems (M) Lecture 15 Lecture Outline Modelling real-time communications Traffic and network models Properties of networks Throughput, delay

More information

Synchronous Stream Optical Burst Switching

Synchronous Stream Optical Burst Switching Synchronous Stream Optical Burst Switching Oliver Yu, Ming Liao, and Yuan Cao Department of ECE, University of Illinois at Chicago 851 S. Morgan Street, Chicago, Illinois 60607 oyu@ece.uic.edu Abstract

More information

Performance Evaluation of High Speed Data Networks with Different Transmission Modes

Performance Evaluation of High Speed Data Networks with Different Transmission Modes Performance Evaluation of High Speed ata etwors with ifferent ransmission Modes Anu Chaudhary Associate Professor (I ept.) Ajay umar Garg Engineering College Ghaziabad (U.P) India ABSRAC In this paper,

More information

Energy-Aware Routing in Wireless Ad-hoc Networks

Energy-Aware Routing in Wireless Ad-hoc Networks Energy-Aware Routing in Wireless Ad-hoc Networks Panagiotis C. Kokkinos Christos A. Papageorgiou Emmanouel A. Varvarigos Abstract In this work we study energy efficient routing strategies for wireless

More information

Simulation Studies of the Basic Packet Routing Problem

Simulation Studies of the Basic Packet Routing Problem Simulation Studies of the Basic Packet Routing Problem Author: Elena Sirén 48314u Supervisor: Pasi Lassila February 6, 2001 1 Abstract In this paper the simulation of a basic packet routing problem using

More information

Delay Analysis of ML-MAC Algorithm For Wireless Sensor Networks

Delay Analysis of ML-MAC Algorithm For Wireless Sensor Networks Delay Analysis of ML-MAC Algorithm For Wireless Sensor Networks Madhusmita Nandi School of Electronics Engineering, KIIT University Bhubaneswar-751024, Odisha, India ABSTRACT The present work is to evaluate

More information

Competitive Analysis of On-line Algorithms for On-demand Data Broadcast Scheduling

Competitive Analysis of On-line Algorithms for On-demand Data Broadcast Scheduling Competitive Analysis of On-line Algorithms for On-demand Data Broadcast Scheduling Weizhen Mao Department of Computer Science The College of William and Mary Williamsburg, VA 23187-8795 USA wm@cs.wm.edu

More information

Enhanced Broadcasting and Code Assignment in Mobile Ad Hoc Networks

Enhanced Broadcasting and Code Assignment in Mobile Ad Hoc Networks Enhanced Broadcasting and Code Assignment in Mobile Ad Hoc Networks Jinfang Zhang, Zbigniew Dziong, Francois Gagnon and Michel Kadoch Department of Electrical Engineering, Ecole de Technologie Superieure

More information

Dynamic Broadcast Scheduling in DDBMS

Dynamic Broadcast Scheduling in DDBMS Dynamic Broadcast Scheduling in DDBMS Babu Santhalingam #1, C.Gunasekar #2, K.Jayakumar #3 #1 Asst. Professor, Computer Science and Applications Department, SCSVMV University, Kanchipuram, India, #2 Research

More information

Improving IEEE Power Saving Mechanism

Improving IEEE Power Saving Mechanism 1 Improving IEEE 82.11 Power Saving Mechanism Eun-Sun Jung 1 and Nitin H. Vaidya 2 1 Dept. of Computer Science, Texas A&M University, College Station, TX 77843, USA Email: esjung@cs.tamu.edu 2 Dept. of

More information

A Path Decomposition Approach for Computing Blocking Probabilities in Wavelength-Routing Networks

A Path Decomposition Approach for Computing Blocking Probabilities in Wavelength-Routing Networks IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 8, NO. 6, DECEMBER 2000 747 A Path Decomposition Approach for Computing Blocking Probabilities in Wavelength-Routing Networks Yuhong Zhu, George N. Rouskas, Member,

More information

CHAPTER 5 PROPAGATION DELAY

CHAPTER 5 PROPAGATION DELAY 98 CHAPTER 5 PROPAGATION DELAY Underwater wireless sensor networks deployed of sensor nodes with sensing, forwarding and processing abilities that operate in underwater. In this environment brought challenges,

More information

ADAPTIVE LINK WEIGHT ASSIGNMENT AND RANDOM EARLY BLOCKING ALGORITHM FOR DYNAMIC ROUTING IN WDM NETWORKS

ADAPTIVE LINK WEIGHT ASSIGNMENT AND RANDOM EARLY BLOCKING ALGORITHM FOR DYNAMIC ROUTING IN WDM NETWORKS ADAPTIVE LINK WEIGHT ASSIGNMENT AND RANDOM EARLY BLOCKING ALGORITHM FOR DYNAMIC ROUTING IN WDM NETWORKS Ching-Lung Chang, Yan-Ying, Lee, and Steven S. W. Lee* Department of Electronic Engineering, National

More information

Stretch-Optimal Scheduling for On-Demand Data Broadcasts

Stretch-Optimal Scheduling for On-Demand Data Broadcasts COMBINATORIAL OPTIMIZATION IN COMMUNICATION NETWORKS Maggie Cheng, Yingshu Li and Ding-Zhu Du (Eds.) pp. 622-637 c 2005 Springer Science + Business Media Stretch-Optimal Scheduling for On-Demand Data Broadcasts

More information

Scheduling of Multiple Applications in Wireless Sensor Networks Using Knowledge of Applications and Network

Scheduling of Multiple Applications in Wireless Sensor Networks Using Knowledge of Applications and Network International Journal of Information and Computer Science (IJICS) Volume 5, 2016 doi: 10.14355/ijics.2016.05.002 www.iji-cs.org Scheduling of Multiple Applications in Wireless Sensor Networks Using Knowledge

More information

DiffServ Architecture: Impact of scheduling on QoS

DiffServ Architecture: Impact of scheduling on QoS DiffServ Architecture: Impact of scheduling on QoS Abstract: Scheduling is one of the most important components in providing a differentiated service at the routers. Due to the varying traffic characteristics

More information

Delay-minimal Transmission for Energy Constrained Wireless Communications

Delay-minimal Transmission for Energy Constrained Wireless Communications Delay-minimal Transmission for Energy Constrained Wireless Communications Jing Yang Sennur Ulukus Department of Electrical and Computer Engineering University of Maryland, College Park, M0742 yangjing@umd.edu

More information

This formula shows that partitioning the network decreases the total traffic if 1 N R (1 + p) < N R p < 1, i.e., if not all the packets have to go

This formula shows that partitioning the network decreases the total traffic if 1 N R (1 + p) < N R p < 1, i.e., if not all the packets have to go Chapter 3 Problem 2 In Figure 3.43 of the text every node transmits R bps, and we assume that both network partitions consist of 1 N nodes. So the total traffic generated by the nodes 2 of each Ethernet

More information

IN distributed random multiple access, nodes transmit

IN distributed random multiple access, nodes transmit 414 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 52, NO. 2, FEBRUARY 2006 Power Levels and Packet Lengths in Random Multiple Access With Multiple-Packet Reception Capability Jie Luo, Member, IEEE, and

More information

Reservation Packet Medium Access Control for Wireless Sensor Networks

Reservation Packet Medium Access Control for Wireless Sensor Networks Reservation Packet Medium Access Control for Wireless Sensor Networks Hengguang Li and Paul D Mitchell Abstract - This paper introduces the Reservation Packet Medium Access Control (RP-MAC) protocol for

More information

FIRM: A Class of Distributed Scheduling Algorithms for High-speed ATM Switches with Multiple Input Queues

FIRM: A Class of Distributed Scheduling Algorithms for High-speed ATM Switches with Multiple Input Queues FIRM: A Class of Distributed Scheduling Algorithms for High-speed ATM Switches with Multiple Input Queues D.N. Serpanos and P.I. Antoniadis Department of Computer Science University of Crete Knossos Avenue

More information

Unavoidable Constraints and Collision Avoidance Techniques in Performance Evaluation of Asynchronous Transmission WDMA Protocols

Unavoidable Constraints and Collision Avoidance Techniques in Performance Evaluation of Asynchronous Transmission WDMA Protocols 1th WEA International Conference on COMMUICATIO, Heraklion, reece, July 3-5, 8 Unavoidable Constraints and Collision Avoidance Techniques in Performance Evaluation of Asynchronous Transmission WDMA Protocols

More information

13 Sensor networks Gathering in an adversarial environment

13 Sensor networks Gathering in an adversarial environment 13 Sensor networks Wireless sensor systems have a broad range of civil and military applications such as controlling inventory in a warehouse or office complex, monitoring and disseminating traffic conditions,

More information

R-MAC: An Energy-Efficient MAC Protocol for Underwater Sensor Networks

R-MAC: An Energy-Efficient MAC Protocol for Underwater Sensor Networks R-MAC: An Energy-Efficient MAC Protocol for Underwater Sensor Networks Peng Xie and Jun-Hong Cui UCONN CSE Technical Report: UbiNet-TR06-06 Last Update: June 2007 Abstract Underwater sensor networks are

More information

Traffic Analysis and Modeling of Real World Video Encoders

Traffic Analysis and Modeling of Real World Video Encoders Traffic Analysis and Modeling of Real World Video Encoders KLIMIS NTALIANIS, NIKOLAOS DOULAMIS, ANASTASIOS DOULAMIS AND STEFANOS KOLLIAS Department of Electrical and Computer Engineering National Technical

More information

Lecture 12 December 04, Wireless Access. Graduate course in Communications Engineering. University of Rome La Sapienza. Rome, Italy

Lecture 12 December 04, Wireless Access. Graduate course in Communications Engineering. University of Rome La Sapienza. Rome, Italy Lecture 12 December 04, 2017 Wireless Access Graduate course in Communications Engineering University of Rome La Sapienza Rome, Italy 2017-2018 Random Medium Access Control Part II - CSMA and Collision

More information

PERFORMANCE OF A PACKET SWITCH WITH SHARED BUFFER AND INPUT QUEUEING

PERFORMANCE OF A PACKET SWITCH WITH SHARED BUFFER AND INPUT QUEUEING TELERAFFIC AD DATA RAFFIC in a Period of Change, ITC-3 A. Jensen and V.B. Iversen (Editors) Elsevier Science Publishers B.V. (orth-holland) lac, 99 9 PERFORMACE OF A PACKET SWITCH WITH SHARED BUFFER AD

More information

Performance Study of Adaptive Routing Algorithms for LEO Satellite Constellations under Self-Similar and Poisson Traffic

Performance Study of Adaptive Routing Algorithms for LEO Satellite Constellations under Self-Similar and Poisson Traffic Performance Study of Adaptive Routing Algorithms for LEO Satellite Constellations under Self-Similar and Poisson Traffic Ioannis Gragopoulos, Evangelos Papapetrou, Fotini-Niovi Pavlidou Aristotle University

More information

A Comparative Analysis of Energy Preservation Performance Metric for ERAODV, RAODV, AODV and DSDV Routing Protocols in MANET

A Comparative Analysis of Energy Preservation Performance Metric for ERAODV, RAODV, AODV and DSDV Routing Protocols in MANET A Comparative Analysis of Energy Preservation Performance Metric for ERAODV, RAODV, AODV and DSDV Routing Protocols in MANET Bhabani Sankar Gouda Department of Computer Science & Engineering National Institute

More information

CSMA based Medium Access Control for Wireless Sensor Network

CSMA based Medium Access Control for Wireless Sensor Network CSMA based Medium Access Control for Wireless Sensor Network H. Hoang, Halmstad University Abstract Wireless sensor networks bring many challenges on implementation of Medium Access Control protocols because

More information

Onroad Vehicular Broadcast

Onroad Vehicular Broadcast Onroad Vehicular Broadcast Jesus Arango, Alon Efrat Computer Science Department University of Arizona Srinivasan Ramasubramanian, Marwan Krunz Electrical and Computer Engineering University of Arizona

More information

A Backoff Algorithm for Improving Saturation Throughput in IEEE DCF

A Backoff Algorithm for Improving Saturation Throughput in IEEE DCF A Backoff Algorithm for Improving Saturation Throughput in IEEE 80.11 DCF Kiyoshi Takahashi and Toshinori Tsuboi School of Computer Science, Tokyo University of Technology, 1404-1 Katakura, Hachioji, Tokyo,

More information

Stop-and-Go Service Using Hierarchical Round Robin

Stop-and-Go Service Using Hierarchical Round Robin Stop-and-Go Service Using Hierarchical Round Robin S. Keshav AT&T Bell Laboratories 600 Mountain Avenue, Murray Hill, NJ 07974, USA keshav@research.att.com Abstract The Stop-and-Go service discipline allows

More information

Intra and Inter Cluster Synchronization Scheme for Cluster Based Sensor Network

Intra and Inter Cluster Synchronization Scheme for Cluster Based Sensor Network Intra and Inter Cluster Synchronization Scheme for Cluster Based Sensor Network V. Shunmuga Sundari 1, N. Mymoon Zuviria 2 1 Student, 2 Asisstant Professor, Computer Science and Engineering, National College

More information

An Algorithm for Traffic Grooming in WDM Mesh Networks with Dynamically Changing Light-Trees

An Algorithm for Traffic Grooming in WDM Mesh Networks with Dynamically Changing Light-Trees An Algorithm for raffic rooming in WDM Mesh Networks with Dynamically Changing Light-rees Xiaodong Huang, Farid Farahmand, and Jason P. Jue Department of Computer Science Department of Electrical Engineering

More information

A Study on Dynamic Multilevel Priority Packet Scheduling Scheme for WSNs

A Study on Dynamic Multilevel Priority Packet Scheduling Scheme for WSNs A Study on Dynamic Multilevel Priority Packet Scheduling Scheme for WSNs Shantveer and Dr Jagadish S Kallimani Department of Computer Science and Engineering, M S Ramaiah Institute of Technology, Bangalore,

More information

An Efficient Scheduling Scheme for High Speed IEEE WLANs

An Efficient Scheduling Scheme for High Speed IEEE WLANs An Efficient Scheduling Scheme for High Speed IEEE 802.11 WLANs Juki Wirawan Tantra, Chuan Heng Foh, and Bu Sung Lee Centre of Muldia and Network Technology School of Computer Engineering Nanyang Technological

More information

AODV-PA: AODV with Path Accumulation

AODV-PA: AODV with Path Accumulation -PA: with Path Accumulation Sumit Gwalani Elizabeth M. Belding-Royer Department of Computer Science University of California, Santa Barbara fsumitg, ebeldingg@cs.ucsb.edu Charles E. Perkins Communications

More information

Scalable Schedulers for High-Performance Switches

Scalable Schedulers for High-Performance Switches Scalable Schedulers for High-Performance Switches Chuanjun Li and S Q Zheng Mei Yang Department of Computer Science Department of Computer Science University of Texas at Dallas Columbus State University

More information

A Routing Protocol and Energy Efficient Techniques in Bluetooth Scatternets

A Routing Protocol and Energy Efficient Techniques in Bluetooth Scatternets A Routing Protocol and Energy Efficient Techniques in Bluetooth Scatternets Balakrishna J. Prabhu and A. Chockalingam Department of Electrical Communication Engineering Indian Institute of Science, Bangalore

More information

Mobile Sink to Track Multiple Targets in Wireless Visual Sensor Networks

Mobile Sink to Track Multiple Targets in Wireless Visual Sensor Networks Mobile Sink to Track Multiple Targets in Wireless Visual Sensor Networks William Shaw 1, Yifeng He 1, and Ivan Lee 1,2 1 Department of Electrical and Computer Engineering, Ryerson University, Toronto,

More information

Using Hybrid Algorithm in Wireless Ad-Hoc Networks: Reducing the Number of Transmissions

Using Hybrid Algorithm in Wireless Ad-Hoc Networks: Reducing the Number of Transmissions Using Hybrid Algorithm in Wireless Ad-Hoc Networks: Reducing the Number of Transmissions R.Thamaraiselvan 1, S.Gopikrishnan 2, V.Pavithra Devi 3 PG Student, Computer Science & Engineering, Paavai College

More information

CS 268: Computer Networking. Taking Advantage of Broadcast

CS 268: Computer Networking. Taking Advantage of Broadcast CS 268: Computer Networking L-12 Wireless Broadcast Taking Advantage of Broadcast Opportunistic forwarding Network coding Assigned reading XORs In The Air: Practical Wireless Network Coding ExOR: Opportunistic

More information

Some Optimization Trade-offs in Wireless Network Coding

Some Optimization Trade-offs in Wireless Network Coding Some Optimization Trade-offs in Wireless Network Coding Yalin Evren Sagduyu and Anthony Ephremides Electrical and Computer Engineering Department and Institute for Systems Research University of Maryland,

More information

Cover sheet for Assignment 3

Cover sheet for Assignment 3 Faculty of Arts and Science University of Toronto CSC 358 - Introduction to Computer Networks, Winter 2018, LEC0101 Cover sheet for Assignment 3 Due Monday March 5, 10:00am. Complete this page and attach

More information

A New Congestion Control Scheme: Slow Start and Search (Tri-S)

A New Congestion Control Scheme: Slow Start and Search (Tri-S) A New Congestion Control Scheme: Slow Start and Search (ri-s) Zheng Wang Jon Crowcroft Department of Computer Science, University College London Gower Street, London WC1E 6B, United Kingdom zwang@cs.ucl.ac.uk,

More information

A Queue-Based Energy Saving Scheme for Mobile Embedded Systems with Multiple Radio Interfaces

A Queue-Based Energy Saving Scheme for Mobile Embedded Systems with Multiple Radio Interfaces A Queue-Based Energy Saving Scheme for Mobile Embedded Systems with Multiple Radio Interfaces Su Min Kim, Sukhyun Seo, and Junsu Kim 1 Department of Electronics Engineering, Korea Polytechnic University,

More information

Evaluation of a Broadcast Scheduling Algorithm

Evaluation of a Broadcast Scheduling Algorithm Evaluation of a Broadcast Scheduling Algorithm Murat Karakaya 1 and Özgür Ulusoy2 1 Department of Technical Sciences Turkish Land Forces Academy, Ankara 06100, Turkey 2 Department of Computer Engineering

More information

Worst-case Ethernet Network Latency for Shaped Sources

Worst-case Ethernet Network Latency for Shaped Sources Worst-case Ethernet Network Latency for Shaped Sources Max Azarov, SMSC 7th October 2005 Contents For 802.3 ResE study group 1 Worst-case latency theorem 1 1.1 Assumptions.............................

More information

Achieving Distributed Buffering in Multi-path Routing using Fair Allocation

Achieving Distributed Buffering in Multi-path Routing using Fair Allocation Achieving Distributed Buffering in Multi-path Routing using Fair Allocation Ali Al-Dhaher, Tricha Anjali Department of Electrical and Computer Engineering Illinois Institute of Technology Chicago, Illinois

More information

Scheduling. Scheduling algorithms. Scheduling. Output buffered architecture. QoS scheduling algorithms. QoS-capable router

Scheduling. Scheduling algorithms. Scheduling. Output buffered architecture. QoS scheduling algorithms. QoS-capable router Scheduling algorithms Scheduling Andrea Bianco Telecommunication Network Group firstname.lastname@polito.it http://www.telematica.polito.it/ Scheduling: choose a packet to transmit over a link among all

More information

IV. PACKET SWITCH ARCHITECTURES

IV. PACKET SWITCH ARCHITECTURES IV. PACKET SWITCH ARCHITECTURES (a) General Concept - as packet arrives at switch, destination (and possibly source) field in packet header is used as index into routing tables specifying next switch in

More information

An Outband Paging Protocol for Energy-Efficient Mobile Communications

An Outband Paging Protocol for Energy-Efficient Mobile Communications 246 IEEE TRANSACTIONS ON BROADCASTING, VOL. 48, NO. 3, SEPTEMBER 2002 An Outband Paging Protocol for Energy-Efficient Mobile Communications Apostolis K. Salkintzis, Member, IEEE and Chistodoulos Chamzas,

More information

Power Laws in ALOHA Systems

Power Laws in ALOHA Systems Power Laws in ALOHA Systems E6083: lecture 7 Prof. Predrag R. Jelenković Dept. of Electrical Engineering Columbia University, NY 10027, USA predrag@ee.columbia.edu February 28, 2007 Jelenković (Columbia

More information

Low Energy Priority Oriented Adaptive Control with QoS Guarantee for Wireless Networks

Low Energy Priority Oriented Adaptive Control with QoS Guarantee for Wireless Networks 12th Annual Symposium of the IEEE/CVT, Nov. 3, 2005, Enschede, the Netherlands 1 Low Energy Priority Oriented Adaptive Control with QoS Guarantee for Wireless Networks T. D. Lagkas, G. I. Papadimitriou,

More information

WEB OBJECT SIZE SATISFYING MEAN WAITING TIME IN MULTIPLE ACCESS ENVIRONMENT

WEB OBJECT SIZE SATISFYING MEAN WAITING TIME IN MULTIPLE ACCESS ENVIRONMENT International Journal of Computer Networks & Communications (IJCNC) Vol.6, No.4, July 014 WEB OBJECT SIZE SATISFYING MEAN WAITING TIME IN MULTIPLE ACCESS ENVIRONMENT Y. J. Lee Department of Technology

More information

A Novel Scheduling and Queue Management Scheme for Multi-band Mobile Routers

A Novel Scheduling and Queue Management Scheme for Multi-band Mobile Routers A Novel Scheduling and Queue Management Scheme for Multi-band Mobile Routers Md Shohrab Hossain, Husnu S Narman and Mohammed Atiquzzaman School of Computer Science, University of Oklahoma, Norman, OK 739

More information

This Lecture. BUS Computer Facilities Network Management. Switching Network. Simple Switching Network

This Lecture. BUS Computer Facilities Network Management. Switching Network. Simple Switching Network This Lecture BUS0 - Computer Facilities Network Management Switching networks Circuit switching Packet switching gram approach Virtual circuit approach Routing in switching networks Faculty of Information

More information

Periodic Scheduling in On-Demand Broadcast System

Periodic Scheduling in On-Demand Broadcast System Periodic Scheduling in On-Demand Broadcast System Nitin Prabhu, Vijay Kumar SCE, Computer Networking University of Missouri-Kansas City Kansas City, MO 64110 npp21c (kumarv)@umkc.edu Indrakshi Ray Computer

More information

Hardware Assisted Recursive Packet Classification Module for IPv6 etworks ABSTRACT

Hardware Assisted Recursive Packet Classification Module for IPv6 etworks ABSTRACT Hardware Assisted Recursive Packet Classification Module for IPv6 etworks Shivvasangari Subramani [shivva1@umbc.edu] Department of Computer Science and Electrical Engineering University of Maryland Baltimore

More information

Doctoral Written Exam in Networking, Fall 2008

Doctoral Written Exam in Networking, Fall 2008 Doctoral Written Exam in Networking, Fall 2008 December 5, 2008 Answer all parts of all questions. There are four multi-part questions, each of equal weight. Turn in your answers by Thursday, December

More information

A Token Based Distributed Algorithm for Medium Access in an Optical Ring Network

A Token Based Distributed Algorithm for Medium Access in an Optical Ring Network A Token Based Distributed Algorithm for Medium Access in an Optical Ring Network A. K. Turuk, R. Kumar, and R. Badrinath Department of Computer Science and Engineering Indian Institute of Technology Kharagpur

More information

Maximizing the Number of Users in an Interactive Video-on-Demand System

Maximizing the Number of Users in an Interactive Video-on-Demand System IEEE TRANSACTIONS ON BROADCASTING, VOL. 48, NO. 4, DECEMBER 2002 281 Maximizing the Number of Users in an Interactive Video-on-Demand System Spiridon Bakiras, Member, IEEE and Victor O. K. Li, Fellow,

More information

Design of a Real-Time Trader for Mobile Objects in Open Distributed Environments

Design of a Real-Time Trader for Mobile Objects in Open Distributed Environments Design of a Real-Time for Mobile Objects in Open Distributed Environments Song-yi Yi, Heonshik Shin Department of Computer Engineering Seoul National University Seoul 151-742, Korea fyis, shinhsg@ce2.snu.ac.kr

More information

Lecture 14: M/G/1 Queueing System with Priority

Lecture 14: M/G/1 Queueing System with Priority Lecture 14: M/G/1 Queueing System with Priority Dr. Mohammed Hawa Electrical Engineering Department University of Jordan EE723: Telephony. Priority Queueing Systems Until the moment, we assumed identical

More information

A Timer-based Session Setup Procedure in Cellular-WLAN Integrated Systems

A Timer-based Session Setup Procedure in Cellular-WLAN Integrated Systems his paper was presented as part of the Mobility Management in the Networks of the Future World (MobiWorld) Workshop at A -based Session Setup Procedure in Cellular-WLAN Integrated Systems Gwangwoo Park,

More information

Scheduling. Scheduling. Scheduling. Scheduling Criteria. Priorities. Scheduling

Scheduling. Scheduling. Scheduling. Scheduling Criteria. Priorities. Scheduling scheduling: share CPU among processes scheduling should: be fair all processes must be similarly affected no indefinite postponement aging as a possible solution adjust priorities based on waiting time

More information

A MAC Protocol with Little Idle Listening for Wireless Sensor Networks

A MAC Protocol with Little Idle Listening for Wireless Sensor Networks A MAC Protocol with Little Idle Listening for Wireless Sensor Networks Chaoguang Men 1,, Yongqian Lu 1, Dongsheng Wang 1, 1 Research and Development Center of High Dependability Computing Technology, Harbin

More information

Fig. 1. Superframe structure in IEEE

Fig. 1. Superframe structure in IEEE Analyzing the Performance of GTS Allocation Using Markov Model in IEEE 802.15.4 Alladi Ramesh 1,Dr.P.Sumithabhashini 2 1 Dept.of CSE, PETW, Hyderabad 2 Dept.of ECE, PETW, Hyderabad Abstract-In this paper,

More information

1.1 CPU I/O Burst Cycle

1.1 CPU I/O Burst Cycle PROCESS SCHEDULING ALGORITHMS As discussed earlier, in multiprogramming systems, there are many processes in the memory simultaneously. In these systems there may be one or more processors (CPUs) but the

More information

The Impact of More Accurate Requested Runtimes on Production Job Scheduling Performance

The Impact of More Accurate Requested Runtimes on Production Job Scheduling Performance The Impact of More Accurate Requested Runtimes on Production Job Scheduling Performance Su-Hui Chiang, Andrea Arpaci-Dusseau, and Mary K. Vernon Computer Sciences Department University of Wisconsin 11

More information

Improving the Data Scheduling Efficiency of the IEEE (d) Mesh Network

Improving the Data Scheduling Efficiency of the IEEE (d) Mesh Network Improving the Data Scheduling Efficiency of the IEEE 802.16(d) Mesh Network Shie-Yuan Wang Email: shieyuan@csie.nctu.edu.tw Chih-Che Lin Email: jclin@csie.nctu.edu.tw Ku-Han Fang Email: khfang@csie.nctu.edu.tw

More information

Fairness Example: high priority for nearby stations Optimality Efficiency overhead

Fairness Example: high priority for nearby stations Optimality Efficiency overhead Routing Requirements: Correctness Simplicity Robustness Under localized failures and overloads Stability React too slow or too fast Fairness Example: high priority for nearby stations Optimality Efficiency

More information

JOURNAL OF LIGHTWAVE TECHNOLOGY, VOL. 24, NO. 12, DECEMBER

JOURNAL OF LIGHTWAVE TECHNOLOGY, VOL. 24, NO. 12, DECEMBER JOURNAL OF LIGHTWAVE TECHNOLOGY, VOL. 24, NO. 12, DECEMBER 2006 4811 A High-Throughput Scheduling Technique, With Idle Timeslot Elimination Mechanism Panagiotis G. Sarigiannidis, Student Member, IEEE,

More information

Power-efficient Communication Protocol for Social Networking Tags for Visually Impaired

Power-efficient Communication Protocol for Social Networking Tags for Visually Impaired Power-efficient Communication Protocol for Social Networking Tags for Visually Impaired Problem Social Networking Tags System for Visually Impaired is an project aims to utilize electronic id technology

More information

Wireless Medium Access Control Protocols

Wireless Medium Access Control Protocols Wireless Medium Access Control Protocols Telecomunicazioni Undergraduate course in Electrical Engineering University of Rome La Sapienza Rome, Italy 2007-2008 Classification of wireless MAC protocols Wireless

More information

Switching Using Parallel Input Output Queued Switches With No Speedup

Switching Using Parallel Input Output Queued Switches With No Speedup IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 10, NO. 5, OCTOBER 2002 653 Switching Using Parallel Input Output Queued Switches With No Speedup Saad Mneimneh, Vishal Sharma, Senior Member, IEEE, and Kai-Yeung

More information

RECEIVER CONTROLLED MEDIUM ACCESS IN MULTIHOP AD HOC NETWORKS WITH MULTIPACKET RECEPTION

RECEIVER CONTROLLED MEDIUM ACCESS IN MULTIHOP AD HOC NETWORKS WITH MULTIPACKET RECEPTION RECEIVER CONTROLLED MEDIUM ACCESS IN MULTIHOP AD HOC NETWORKS WITH MULTIPACKET RECEPTION Gökhan Mergen and Lang Tong School of Electrical and Computer Engineering Cornell University, Ithaca, NY 14853 {mergen,ltong}@eecornelledu

More information

CMPSCI 377: Operating Systems Exam 1: Processes, Threads, CPU Scheduling and Synchronization. October 9, 2002

CMPSCI 377: Operating Systems Exam 1: Processes, Threads, CPU Scheduling and Synchronization. October 9, 2002 Name: Student Id: General instructions: CMPSCI 377: Operating Systems Exam 1: Processes, Threads, CPU Scheduling and Synchronization October 9, 2002 This examination booklet has 10 pages. Do not forget

More information

Impact of Source Counter on Routing Performance in Resource Constrained DTNs

Impact of Source Counter on Routing Performance in Resource Constrained DTNs Impact of Source Counter on Routing Performance in Resource Constrained DTNs Xiaolan Zhang a,, Honggang Zhang b, Yu Gu c a Dept. of Computer and Information Sciences, Fordham University b Dept. of Mathematics

More information

Spatial Clustering in Slotted ALOHA Two-Hop Random Access for Machine Type Communication

Spatial Clustering in Slotted ALOHA Two-Hop Random Access for Machine Type Communication Spatial Clustering in Slotted ALOHA Two-Hop Random Access for Machine Type Communication Ziwen Zhao, Sebastian S. Szyszkowicz, Tamer Beitelmal, Halim Yanikomeroglu Carleton University Ottawa, Canada Contents

More information

Cooperative-Diversity Slotted ALOHA

Cooperative-Diversity Slotted ALOHA Wireless Networks manuscript No. (will be inserted by the editor) Cooperative-Diversity Slotted ALOHA John M. Shea, Tan F. Wong, and Wing-Hin Wong Wireless Information Networking Group, University of Florida,

More information

Routing Metric. ARPANET Routing Algorithms. Problem with D-SPF. Advanced Computer Networks

Routing Metric. ARPANET Routing Algorithms. Problem with D-SPF. Advanced Computer Networks Advanced Computer Networks Khanna and Zinky, The Revised ARPANET Routing Metric, Proc. of ACM SIGCOMM '89, 19(4):45 46, Sep. 1989 Routing Metric Distributed route computation is a function of link cost

More information

Comparison of pre-backoff and post-backoff procedures for IEEE distributed coordination function

Comparison of pre-backoff and post-backoff procedures for IEEE distributed coordination function Comparison of pre-backoff and post-backoff procedures for IEEE 802.11 distributed coordination function Ping Zhong, Xuemin Hong, Xiaofang Wu, Jianghong Shi a), and Huihuang Chen School of Information Science

More information

Markov Chains and Multiaccess Protocols: An. Introduction

Markov Chains and Multiaccess Protocols: An. Introduction Markov Chains and Multiaccess Protocols: An Introduction Laila Daniel and Krishnan Narayanan April 8, 2012 Outline of the talk Introduction to Markov Chain applications in Communication and Computer Science

More information

Outline. MAC (Medium Access Control) General MAC Requirements. Typical MAC protocols. Typical MAC protocols

Outline. MAC (Medium Access Control) General MAC Requirements. Typical MAC protocols. Typical MAC protocols Outline Medium ccess ontrol With oordinated daptive Sleeping for Wireless Sensor Networks Presented by: rik rooks Introduction to M S-M Overview S-M Evaluation ritique omparison to MW Washington University

More information

Preview. Process Scheduler. Process Scheduling Algorithms for Batch System. Process Scheduling Algorithms for Interactive System

Preview. Process Scheduler. Process Scheduling Algorithms for Batch System. Process Scheduling Algorithms for Interactive System Preview Process Scheduler Short Term Scheduler Long Term Scheduler Process Scheduling Algorithms for Batch System First Come First Serve Shortest Job First Shortest Remaining Job First Process Scheduling

More information

Delivery Network on the Internet

Delivery Network on the Internet Optimal erver Placement for treaming Content Delivery Network on the Internet Xiaojun Hei and Danny H.K. Tsang Department of Electronic and Computer Engineering Hong Kong University of cience and Technology

More information