Achieving Fairness in Wireless LANs by Enhanced IEEE DCF *

Size: px
Start display at page:

Download "Achieving Fairness in Wireless LANs by Enhanced IEEE DCF *"

Transcription

1 Achievig Fairess i Wireless LANs by Ehaced IEEE DCF * Nagesh S. P. Nadiraju, Hrishikesh Gossai, Dave Cavalcati, Kaushik R. Chowdhury, Dharma P. Agrawal Ceter for Distributed ad Mobile Computig, Dept. of ECECS, Uiversity of Ciciati - Ciciati,OH (adirs, cavalcdt, kaushir, dpa)@ececs.uc.edu Mesh Research ad Developmet Group Motorola, Ic., Maitlad, Florida Hrishikesh.Gossai@motorola.com Abstract Over the past few years, Wireless Local Area Networks (WLANs) have gaied a icreased attetio ad a large umber of WLANs are beig deployed i uiversities, compaies, airports etc. Majority of the IEEE based WLANs employ Distributed Coordiatio Fuctio (DCF) i Wireless Access Poits (AP) to arbitrate the wireless chael amog Wireless Statios (STAs). However, DCF poses serious ufairess problem betwee uplik ad dowlik flows. To overcome this ufairess problem, we propose a simple ehacemet to the IEEE DCF which provides priority to the AP ad thus eables it to acquire a larger share of the chael whe required. We have demostrated the ufairess problem through systematic measuremets i a experimetal test bed of WLAN usig the legacy DCF. We also developed aalytical models to calculate the throughput of AP ad the STAs ad verify these results through thorough simulatios i s-2. We observe that our simulatio results fid i good agreemet with our aalytical models. Results show that our proposed ehacemet achieves a fair distributio of badwidth ad improves the throughput (by early 300%) for the dowlik flows as compared to the DCF, without severely affectig the performace of uplik flows. Keywords: Fairess, MAC protocols, Performace Evaluatio, Test beds, WLANs. 1. INTRODUCTION I the last decade, Wireless LANs experieced a proliferatig growth due to their flexibility ad ubiquitous ature. I particular, WLAN hotspots are typically foud i uiversities, compaies, airports, shoppig malls, etc. With the icreasig iterest i the itegratio of various wireless etworks (4G etworks), WLANs are gaiig more popularity tha ever. The capacity of WLANs has rapidly icreased from 2Mbps to 54Mbps ad proposals (IEEE ) to achieve early 100Mbps are also uderway. May efforts are also beig made to make QoS provisios for real time traffic (IEEE e). Most of the curret WLAN implemetatios are based o the IEEE [1] stadard, which supports two basic mechaisms for chael arbitratio: Distributed Coordiatio Fuctio (DCF) ad Poit Coordiatio Fuctio (PCF). The implemetatio of DCF i IEEE compliat devices is madatory while provisio of PCF is optioal. DCF is based o the traditioal CSMA/CA paradigm ad provides equal chael access privileges to all participatig Wireless Statios (STAs). I cotrast, PCF is a cetralized schedulig algorithm. It requires a poit coordiator (PC) at the AP to cotrol the chael access. The default schedulig algorithm of IEEE PCF is a roud robi scheme ad may ot always be ideal. Due to the iheret complexity ivolved with the deploymet of PCF [2], most of the curret implemetatios of IEEE , eve i hot spot scearios, use DCF access mechaism. However, DCF poses serious ufairess problem betwee uplik ad dowlik flows. With DCF, the chael share of the AP would be a fractio of total umber of trasmittig STAs i its service area. All STAs, icludig the AP, have the same chael access privileges. As a result, the share of the chael obtaied by the AP is early equal to the share of ay other STA uder its coverage. This results i ufair sharig of the badwidth amog uplik ad dowlik flows. All the dowlik flows (flows that are destied for wireless statios) have to utilize the AP s chael share while the uplik flows origiatig from differet STAs ejoy a larger share. With the icrease i the umber of STAs uder the AP s coverage, the dowlik flows would suffer from relatively low share of the available badwidth. STA 1 STA 2 W1 S AP Primergy STA 5 Primergy STA 6 STA10 STA 9 Figure 1: IEEE DCF based WLAN Access Sceario I order to overcome this ufairess problem, we propose a simple MAC layer ehacemet to IEEE DCF, called Bidirectioal-DCF (BDCF). We specifically address the uplik/dowlik ufairess by providig the AP with more cotetio free trasmissio opportuities whe high *This work was supported by the Ohio Board of Regets Doctoral Ehacemet Fuds /06/$ IEEE

2 load is experieced. I particular, if a AP s MAC receives a DATA packet, istead of trasmittig a regular MAC layer ACK, it checks the buffer for a outstadig packet to ay of the STAs i its Basic Service Set (BSS). If a packet is foud, the it will sed the DATA with a piggybacked ACK after SIFS time, thus elimiatig the eed for a fresh chael cotetio to trasmit this packet. I this way, the AP gets a preferetial treatmet resultig i a relatively higher badwidth share as compared to its STAs. Clearly, this kid of preferetial treatmet for the AP is desirable i hot spots scearios. This is because most of the users accessig iteret i these hotspots use applicatios (e.g. , web browsig, Iteret radio, etc.) that typically geerate large volume of dowlik traffic for a sigle uplik request. It is worthwhile to ote that if the AP does ot have traffic to sed i dowlik directio, BDCF works exactly as DCF. Our specific cotributios through this paper are: Experimetal demostratio of the ufairess problem i a IEEE b based test-bed. A simple ehacemet to DCF for overcomig the ufairess problem i AP based etworks. A aalytical model to evaluate the throughputs of AP ad STAs complemeted by extesive simulatio study. Our aalytical ad simulatio results show that BDCF has a better throughput ad delay performace for dowlik flows ad also has a fair chael sharig i both directios as compared to DCF. I additio, we compare BDCF with DCF+ [5], which uses a similar idea to reduce MAC layer overhead ad icrease the throughput, while it does ot give ay priority to the AP. The outlie for the rest of this paper is as follows. I sectio 2, we experimetally demostrate the ufairess problem caused by DCF i WLAN hot spot scearios. We describe our proposed BDCF mechaism i sectio 3. Next, we develop a aalytical model for the uplik ad dowlik throughputs with BDCF i sectio 4. Sectio 5 provides comprehesive simulatio results, comparig BDCF with DCF ad DCF+. I sectio 6, we discuss the related work, ad fially, we coclude the paper i Sectio 7, highlightig some ope problems ad future research directios. 2. THE DCF UNFARINESS PROBLEM IN WLAN HOT SPOTS I this sectio we illustrate the ufairess amog dowlik/uplik flows whe DCF is employed i a WLAN. We have set up a experimetal test bed to model the typical WLAN hot spot sceario as show i Figure 1. We cofigured a ifrastructure based IEEE b etwork with a data rate of 11Mbps ad coected the AP to a desktop PC (with a Itel Petium 4 processor). We start the server S i the same machie, so that the coectio betwee the AP ad the server is ot a bottleeck. Furthermore, the AP uses the hostap driver package [12], ad the STAs use IEEE b USB adapters, Netgear WG311 or Atheros wireless cards. We have systematically examied the TCP ad UDP throughput performace with a symmetric ad a asymmetric traffic cofiguratio. TCP ad UDP traffic is geerated by Iperf v1.7 [13] which rus i both the cliet ad server modes. We first cosider a asymmetric traffic sceario where 3 UDP flows origiatig at the differet wireless odes destied to the server (called uplik flows) ad 7 UDP flows from the server towards the wireless odes (called dowlik flows). Each flow geerates traffic at a rate of 3Mbps, which is eough to saturate the wireless lik. We have coducted 10 differet rus for each traffic sceario ad measured the throughputs of idividual flows. The throughputs of flows i the same directio do ot have much variatio. Thus, for the sake of brevity, we oly show the aggregate throughputs of uplik ad dowlik flows for all the four scearios i Figure 2. As ca be see from the plot (i Figure 2 (a)), i the case of asymmetric UDP traffic, the three uplik flows obtai a throughput of Kbps (749.6 Kbps per flow o a average) while the 7 dowlik flows obtai a throughput of oly Kbps ( Kbps per flow o a average). It ca be observed that the throughput of a idividual dowlik flow is early 1/3 of the throughput achieved by ay uplik flow. Clearly the MAC level fairess achieved by DCF leads to a udesirable situatio. For example, cosider a typical WLAN hotspot sceario where a couple of studets (who are a part of peer-to-peer file sharig etwork) are uploadig sogs/movies through the wireless etwork. Their applicatios (are uplik) cosume fairly large share of the wireless chael ad thus limit the badwidth for the dowlik traffic. Thus other users who are checkig their e- mail or usig other predomiatly dowlik traffic based applicatios experiece larger dowload delays ad icreasig frustratio. These results motivate the eed for a preferetial treatmet to the AP i order to allot a fair share of badwidth for the dowlik flows. We propose a simple ehacemet to DCF i the ext sectio, which prioritizes the AP without the requiremet of ay additioal iformatio ad achieves the required fairess amog the uplik ad dowlik flows. 3. BIDIRECTIONAL DISTRIBUTED CO- ORDINATION FUNCTION (BDCF) I order to hadle the ufair badwidth availability to the dowlik traffic i WLAN hot spot scearios, we propose a Bidirectioal DCF (BDCF), which provides preferetial treatmet to the dowlik flows at the AP. For implemetig BDCF, we modified IEEE DCF to support piggybackig of ACK packets i the DATA trasmissio from the AP. Similar to IEEE DCF, BDCF supports both basic (DATA-ACK) ad 4-way hadshake (RTS-CTS- DATA-ACK) chael access mechaisms. I the remaider of this sectio we describe the details of BDCF

3 Throughput (kbps) 4000 Up Lik 3500 Dow Lik Asymmetric (3Up-7D) Symmetric (5Up-5D) Throughput (kbps) Asymmetric (3Up-7D) Up Lik Dow Lik Symmetric (5Up-5D) STA(i) DIFS SIFS RTS DATA 1 AP SIFS SIFS CTS DATA AP NAV(RTS) NAV(DATA 1) STA(j) Other (Source Rage) (Destiatio Rage) SIFS ACK NAV(RTS) NAV(DATA 1) DIFS NAV(CTS) Defer Access Cotetio Widow Backoff Starts Figure 2 (a) UDP Traffic Figure 2 (b) TCP Traffic Figure 3. Timig diagram of BDCF with RTS- CTS hadshake 3.1 BDCF with RTS-CTS hadshake We first start by describig the operatio of BDCF whe RTS-CTS hadshake is eabled. Figure 3 shows the timig diagram of the BDCF operatio. Iitially all STAs ad the AP coted for the chael with equal privilege. Durig the cotetio resolutio period, if the AP gets the access to the chael, BDCF works exactly like DCF. The differece comes whe a STA wis the chael cotetio. Figure 3 illustrates this case i detail. STA(i) iitially seds a RTS to the AP i order to reserve the chael for its DATA trasmissio. The AP respods this request of STA(i) by sedig a CTS. Upo receptio of the CTS packet, STA(i) seds its DATA packet (DATA i ) to the AP. After receivig DATA i, the AP checks its MAC buffer for ay packet to trasmit. If o packet is foud, the AP simply seds the correspodig ACK to STA(i). However, if the AP has a outstadig packet for ay of its servig STA(j) (where j may be same as i), it trasmits that DATA packet (idicated by DATA AP i Figure 3) with a piggybacked ACK, after a SIFS time period. If STA(i) seses trasmissio from the AP after a SIFS period, it will implicitly recogize the ACK set by the AP. As log as the STAs are withi the coverage regio of the AP, they are able detect the piggybacked ACK (STA(i) was waitig for a ACK for DATA i from AP). Sice all the STAs i the servig BSS should be withi the coverage of AP our assumptio is valid. After a successful receptio of the DATA AP, the destiatio STA(j) will sed back a ACK to the AP i the usual way. However, if the AP does ot receive the iitial data frame (DATA i ) correctly, it does ot sed ay DATA AP or ACK, thus STA(i) becomes aware of its usuccessful trasmissio ad schedules a retrasmissio. It is importat to ote that BDCF allows piggybackig of DATA packets oly at the AP, thus avoidig the chace of formig ay cycles (pheomeo where AP ad ay oe of STAs repeatedly access ad capture the chael). Furthermore, whe the AP trasmits the DATA packet with piggybacked ACK (DATA AP ), it freezes its backoff timer, such that the trasmissio of DATA AP is totally trasparet to the regular chael cotetio at the AP. The chages made at the MAC layer for implemetig BDCF does ot require ay chages to the upper layers ad thus totally trasparet to the upper layers. As we will show i the ext sectio, by usig this simple ehacemet, BDCF ca provide fair access to the wireless chael i both the directios, irrespective of the type of trasport layer (UDP or TCP) uder cosideratio. It should also be oted that with BDCF, we avoid sedig ACK, RTS, ad CTS packets while seakig a DATA AP packet from the AP, thus reducig MAC layer cotrol overhead as compared to DCF. Moreover we also reduce the time wasted i ay chael cotetio ad backoff mechaism. I order to avoid ay egative effect of BDCF o the uplik flows whe there are fewer dowlik flows tha uplik flows, we adopt a dyamic piggybackig strategy. With this strategy the AP records the umber of STAs trasmittig the uplik flows ad the umber of STAs receivig dowlik flows over a time widow. The AP piggybacks a DATA packet oly with a probability equal to the ratio of dowlik ad uplik flows. This way, we esure that the dowlik flows do ot get ay udue advatage ad ifluece fairess of the system. The workig priciple of BDCF i the basic access mechaism (without RTS-CTS hadshake) is similar to its operatio whe RTS-CTS hadshake is eabled. 4. ANALYTICAL EVALUATION OF BDCF As poited out i sectio 3, BDCF esures that the dowlik flows gets a fair share of the system badwidth. We validate this claim by derivig aalytical expressios for the throughput of the AP (dowlik) ad the remaiig STAs (uplik) whe BDCF is used with the RTS-CTS hadshake mechaism. We assume fixed STAs ad oe AP, each of them havig a packet to trasmit at all times (saturatio traffic coditios with equal umber of uplik ad dowlik flows). We also assume perfect chael coditios ad o hidde termials. We defie the throughput by the followig equatio E[payload iformatio trasmitted i a slot time] S = E[legthof slot time] We first study various evets that ca occur i ay arbitrary slot, the time duratios for the idividual evets, ad fially the total trasmissio time. It is assumed that each statio icludig the AP trasmits i a radomly chose slot time with probability ad collisios occur with a costat probability p, irrespective of the umber of previous collisios before a successful trasmissio. We cosider the (1)

4 slot time to be of legthσ. Let E p, H ad deote the average packet payload size, the packet header size (calculated as PHY hdr + MAC hdr ) ad the propagatio delay, respectively. E p ad H are measured i time uits. For simplicity we defie, W = CW mi ad m as the maximum backoff slots so that, CW max = 2 m * CW mi.the probability of trasmissio () i a give time slot as derived i [14] is 2(1 2 p)(1 p) τ = m (1 2 p)( W + 1) + p( W (1 2 p ( ) ) I what follows, we idetify the various evets that ca occur i a arbitrary time slot uder BDFC operatio ad calculate their probabilities of occurrece. Recall from sectio 3 that i BDCF, the AP trasmits a data packet uder two coditios: by cotetio or by piggybackig. I. Whe AP coteds for the chael tr1(ap) Oce the AP wis the chael, the time spet for a successful trasmissio of the DATA packet by the AP is calculated as: T s1(ap) = O rts + {H + E p + + SIFS + ACK + + DIFS}, (4) Where, O rts = {RTS ++ SIFS + CTS+ + SIFS} is the time required for RTS/CTS exchage. I case of a collisio, whe RTS/CTS scheme is used, the collisio time is give by T c1(ap) = RTS + + SIFS + CTS+ + DIFS (5) II. Whe the AP Piggybacks Wheever the AP receives a DATA packet from a STA, it will have the optio of sedig a DATA packet with the piggybacked ACK after SIFS time period. We deote this trasmissio as tr2. With the assumptio of saturatio traffic coditios, the AP always has a DATA packet to sed to ay oe of the STAs. As the chael is reserved for the ACK trasmissio from the AP, this trasmissio (DATA with piggybacked ACK) is guarateed (assumig o hidde termials) ad there is o eed for cotetio. Thus the collisio probability i this case is 0. The trasmissio probability for the AP (P tr2(ap) ) i this case is the same as the probability of successful trasmissio by ay STA i the prior data trasfer stage, which is give by P tr2(ap) = ) = τ I this case, the AP coteds for the chael afresh with all the other odes (this evet is deoted by tr1). I this sceario, BDCF works similar to DCF ad collisios ca occur whe two or more RTS packets are trasmitted simultaeously. The probability of a trasmissio by the AP i ay arbitrary slot is give by: P tr1(ap) = (2) This trasmissio is successful oly if oe of the other STAs trasmit i the same slot. Thus, the probability of success give that the trasmissio has occurred is: τ ) P s1(ap) = = ) (3) P -1 τ ) τ (1- ). (6) P s2(ap) = 1. (7) The time for which the chael is busy (we have to cosider the time spet by the STAs as well) is give by: T s2 (AP) = O rts + {H + E p + + SIFS + H + E p + + SIFS + ACK + + DIFS} (8) We ow proceed with the calculatios for the STAs. STAs ca oly trasmit by cotedig ad wiig the chael; ad the probability that at least oe STA trasmits is give as P tr ( STA) Each time a STA udergoes a successful trasmissio, the AP piggybacks aother packet immediately ad hece the total time for successful trasmissio accouts for both the packet duratios ad is the same as T s2(ap) T s(sta) = T s2(ap). (11) + c1(ap) For the AP, the time spet i useful trasmissio cosiderig both the cases i which trasmissios occur is give by: T (E ) = P tr1(ap) P s1( AP) E p + P tr2(ap) P s2(ap) E p τ. (14) Similarly, evaluatig the useful trasmissio time for the remaiig STAs we have, T (E ) = τ. (15) P tr (STA) = [1- ) ] (9) The probability of successful trasmissio give that there is trasmissio from a STA is the probability that the AP did ot trasmit ad oly oe STA trasmitted, -1 ) τ ) τ ) P s (STA) = = (10) 1 ) Similarly, the time spet i a collisio i this case is same as the case 1 whe the AP coteds for the chael. T c(sta) = T c1(ap). (12) The time duratio i which the system is active is give by: + 1 T total = ) σ + τ ) T + s1(ap) τ ) Ts(STA) + 1 [ 1 (1 τ ) ( + 1) τ ) ] T (13) AP p = [ τ ) + τ ) ] Ep = [ ) ( + 1)] Ep P STAs p tr(sta) P s(sta) E p -1 = ) E p We fially calculate the AP s throughput usig (1), (13) ad (14) as: [ τ ) ( + 1)] Ep SAP =. (16) T Total

5 (a) Throughput compariso of AP ad STAs with IEEE DCF (b) Throughput compariso of AP with BDCF (c) Throughput compariso of STAs with BDCF Figure 5. Aalytical ad Simulatio throughput comparisos of BDCF T s = T s1(ap) ad T c = T c1(ap) (18) Let P tr deote the probability of at least oe trasmissio i a cosidered slot time ad P s deote a successful trasmissio. As the AP ad the STAs coted for the chael with equal privileges, the share of the AP i the system throughput is S /( + 1) while that of the remaiig STAs is S [ /( + 1) ] where S is the system throughput as derived by Biachi [14]: tr s p S = (19) From (1), (13) ad (15) the throughput of the STAs is give by: -1 τ ) Ep Sode = (17) TTotal We ext evaluate the throughput for the STA ad AP for DCF based o the model preseted i [21]. The time, T s, for which chael will be busy due to a successful trasmissio is same as T s1(ap). Also the collisio time remais costat i both BDCF ad DCF. Thus, (1- P ) + P P T + (1 P )P T tr P P E tr s s Figure 5(a-c) shows the umerical results of the throughput as a fuctio of umber of statios ad validate our aalysis through simulatios. We cosider 1 Mbps chael ad other parameters are same as described i ext sectio. Figure 5(a) shows the obtaied throughput by AP ad STAs with DCF. Clearly, we ca observe a substatial ufairess betwee the throughputs of AP (dowlik flows) ad STAs (uplik flows). This is because of the CSMA/CA mechaism, which provides equal access privileges to the AP ad STAs. Thus the AP oly gets 1/(+1) of the total available badwidth (with STAs ad a AP), while the STAs obtai a higher share (/(+1)). O the other had, with the preferetial treatmet for AP i BDCF the AP achieves fair share of the badwidth (almost equal to that obtaied by the STAs). 5. SIMULATION RESULTS I this sectio, we compare the performace of BDCF with DCF ad DCF+ [5]. We have implemeted BDCF ad DCF+ i the s-2 simulator (versio 2.26) [6]. For our simulatios, we have used the sceario described i Figure 1, s tr c where a AP is servig 10 statioary STAs. We placed the STAs such that all were i the trasmissio rage of each other, thus avoidig ay hidde termial problem. The badwidth of the wireless chael is set to 2 Mbps ad the AP is coected to a server through a wired lik with badwidth of 100 Mbps ad 2ms of propagatio delay. We have cosidered both symmetric ad asymmetric traffic patters: For symmetric traffic we cosidered 5 uplik ad 5 dowlik flows, deoted by 5Up-5D ad for asymmetric traffic we agai cosider: 3 uplik flows ad 7 dowlik flows, deoted by 3Up-7D. We assume that o two flows start/ed at the same ode. We have doe a comparative aalysis of the aggregate throughput, ad per stream fairess of IEEE DCF, BDCF ad DCF+ for the aforemetioed traffic patters. All results preseted here are averaged over 10 simulatio rus with differet seed values. 5.1 Aalysis of UDP traffic Aggregate Throughput We first compare the performace of the aggregate uplik/dowlik throughputs achieved by the three schemes (BDCF, DCF ad DCF+). We vary the DATA rate of the CBR traffic ruig over UDP from 100Kbps to 800Kbps ad measure the aggregate throughput achieved by the flows i either directios (uplik ad dowlik). Cosiderig the two differet traffic patters metioed above, Figures 6(a-b) ad 6(c-d) show the aggregate uplik ad dowlik throughputs respectively. We observe a huge differece betwee the uplik ad dowlik throughputs whe DCF/DCF+ is employed. As show i Figure 6(a-b), at low loads all the three protocols have similar performace. This is because the chael is relatively free ad all odes ca trasmit their packets without much cotetio. With DCF/DCF+, as we icrease the traffic load, the aggregate uplik throughput rapidly icreases ad dowlik flows starve. Eve for margial icrease i the traffic load, with IEEE DCF or DCF+, the uplik flows obtai a very high throughput ad completely domiate the access to the chael

6 Throughput (Kbps) 900 Uplik 800 Dowlik BDCF DCF DCF+ 6(a) 3Up-7D 6(b) 5Up-5D 7(a) Asymmetric traffic (U3-D7) 800 Uplik 700 Dowlik Throughput (Kbps) BDCF DCF DCF+ 6(c) 3Up-7D 6(d) 5Up-5D 7(b) Symmetric traffic (U5-D5) Figure 7. TCP Aggregate Figure 6. Aggregate Throughput for UDP Traffic Throughput Dowlik flows experiece severe cogestio resultig i drastic reductio of the aggregate dowlik throughput. Oe importat thig to ote from Figure 6(d) is that, till 200Kbps load, the throughput of dowlik traffic icreases as there is sufficiet badwidth to accommodate all uplik ad dowlik flows. O the other had, with BDCF the available badwidth is fairly distributed amog uplik ad dowlik traffic. The dowlik flows achieve a fair share of the total badwidth, without affectig the performace of uplik flows. This ca be attributed to the preferetial treatmet for the AP. AP obtais substatial chael share to accommodate all the dowlik flows ad thus limitig the uplik traffic from the odes. I DCF, the throughput of idividual uplik flows is early 4 times the throughput of idividual dowlik flows. However whe BDCF is employed, this sharp differece does ot occur. The throughput of idividual uplik flows is almost equal to ay of the idividual dowlik flows. The aggregate dowlik throughput is improved by early 300% whe compared with DCF/DCF+. Hece, by providig preferetial access to the AP, BDCF esures fair sharig of badwidth amog uplik ad dowlik flows. We also aalyzed the performace of TCP traffic both the traffic patters. Oce agai with DCF/DCF+ we observe similar ufairess amog the uplik/dowlik flows. Figure 7 shows the throughput performace of TCP traffic. From figures 7(a-b), we ca observe the disgraceful performace of the dowlik TCP traffic flows whe legacy DCF is employed. I cotrast, whe BDCF is employed, we observe fair sharig of the available badwidth amog uplik ad dowlik flows for all traffic patters. For istace, with BDCF i the asymmetric traffic (3Up-7D) sceario, the dowlik flows achieve Kbps (120 Kbps per flow); while the uplik flows obtai aroud 389 Kbps (129 Kbps per flow). However, with DCF ad asymmetric traffic (3Up- 7D), the dowlik flows get oly a meager 610 Kbps (aroud 87 Kbps per flow), while the aggregate uplik throughput (Figure 7(b)) is as high as 470 Kbps (aroud 157 Kbps per flow). The poor performace of TCP with DCF ca be explaied as follows. TCP geerates bi-directioal traffic. TCP ACKs of the uplik flows ad TCP DATA packets of the dowlik flows compete for the limited chael share of the AP. This icreased dowlik traffic load at the AP leads to overflowig of the lik layer queues at the AP ad resultig i excessive packet drops. TCP cogestio cotrol algorithm further worses the situatio by reducig the cogestio widow of a flow whe it detects a packet drop. If a TCP DATA packet of a dowlik flow is dropped at the AP, timeout occurs at the source ad hece the cogestio widow is decreased, leadig to a lower throughput. However, if a TCP ACK of a uplik flow is dropped, due to the cumulative ature of TCP ACKs, evetually aother ACK with a higher sequece umber will reach the uplik flow source ad the TCP cogestio widow will ot be reduced. Thus the dowlik traffic experieces severe

7 8(a) UDP Traffic (3Up-7D) Figure 8. Fairess Idex 8(b) UDP Traffic(5Up-5D) cogestio cotrol while the uplik traffic is ot affected at the same rate. Cosequetly the uplik flows ejoy higher et throughputs whe compared to dowlik flows. I summary, dowlik flows are ot oly affected by the limited chael availability for the AP, but also due to TCP-DATA packet drops at the AP. We carefully observed the cogestio widow growth of all flows ad otice that the cogestio widow of dowlik flows experiece frequet cut dow due to packet drops at the AP (ad thereby leadig to timeouts). I cotrast, the cogestio widow for all the uplik flows grows cotiuously. Similar observatio is also reported by the authors i [4]. Oce agai BDCF overcomes this problem by givig a preferetial treatmet to the AP. Wheever a packet from the STAs is received by the AP; it ca immediately trasmit a packet (recall from sectio 3) from its buffer without ay eed for chael cotetio. I this way, at high traffic loads, the AP ca avoid large queues ad overflows by immediately trasmittig either the TCP- ACKs/TCP-DATA packets. As more ad more dowstream DATA packets are trasmitted the dowlik flows achieve acceptable throughputs without affectig the uplik flows Fairess Idex I this sectio we compare the fairess amog all the flows. We have used the Jai s fairess idex (f) [8] to measure the fairess amog the flows. It is give by: f = * x i i = 1 i = 1 x 2 2 i 1 i, Where, there are flows i the etwork ad x i is the throughput achieved by flow i. The fairess idex is always positive ad whe it approaches oe, it implies that all the flows are gettig equal share of the available badwidth. Whe the fairess idex drops or has egative slope, the it idicates that the available badwidth is ot fairly shared amog the flows. The fairess idexes for asymmetric (3Up-7D) ad symmetric traffic (5Up-5D) cofiguratios are show i Figure 8(a) ad 8(b), respectively. The fairess idex is ear costat ad is close to oe with BDCF i both traffic cofiguratios. This is because all the flows obtai a fair share of the available badwidth. However, this is ot the case whe legacy DCF ad DCF+ are employed, as the dowstream flows achieve very low throughputs whe compared to the throughputs of uplik flows. 6. RELATED WORK Fairess provisioig i wireless etworks has bee a attractive area of research ad has bee explored at various layers. Most of the research addresses the problem of ufairess observed i the upper layers. The ufairess problem betwee uplik ad dowlik TCP flows i a AP based WLAN was iitially reported by Ramjee et al. [2].They studied the iteractio betwee TCP ad IEEE MAC protocol ad idetified the buffer size at the AP as the cause for ufairess, the they proposed receiver widow size maipulatio i the TCP ACK to gover the access of wireless lik. Bottigliego et al. [3] studied the ufairess due to chael uavailability. They aalyzed the chael coditios betwee the STA ad the AP, choosig the STA with best chael coditio for trasmissio ad compesatig the other STAs later with a burst trasmissio. The cocept of reverse chael reservatio i WLANs has bee first itroduced i the DCF+ scheme [5]. The goal of DCF+ is to improve the performace of TCP i WLANs (usig DCF) by a implicit reservatio of the chael. However, as our simulatio results have idicated, DCF+ also has the ufairess problem because the implicit reservatio is used by ay STA. Recetly, attempts to improve performace of TCP i multi-hop ad hoc etworks by similar techiques were proposed i [10] ad [11]. I [10], the authors try to reduce itra ad iter flow cotetio. Itra flow cotetio is ecoutered betwee TCP-DATA ad TCP-ACK packets of a sigle TCP flow while Iter-flow cotetio is experieced betwee TCP-DATA packets of differet TCP flows. They propose two schemes Quick exchage, i which the seder

8 reserves the reverse chael for the TCP-ACK packets ad Fast-forward, i which the seder allows the receiver to forward the curretly received packet towards the destiatio. Kuag et al. [11] proposed a multi-chael MAC ad reverse chael reservatio for mitigatig the DATA-DATA ad DATA-ACK cotetios. However they have ot addressed the fairess problem for the ifrastructure based etworks. Moreover, it should also be oted that the above schemes are desiged for MANETs. Furthermore, this ability to seak a packet is eabled for ay receivig STA that has a packet to trasmit. Hece, whe applied to AP based WLANs, these schemes ca ot distiguish betwee a AP ad other STAs ad will ot be able provide a preferetial treatmet to AP packets oly. Kim et al [7] propose a utilizatio based uplik/dowlik fairess mechaism. The AP couts the umber of STAs based o the uique MAC addresses ad calculates the utilizatio of uplik ad dowlik traffic. If the dowlik traffic is less i a specific time widow the the AP starts trasmittig the DATA frames after deferrig for PIFS time duratio followig the ACK from a STA. Thus the regular chael access policy of deferrig for DIFS duratio ad exchagig the RTS-CTS is avoided. However i their scheme some dowlik DATA frames may still suffer higher delays as it takes some time to detect the ufairess. I cotrast with our scheme the AP seaks DATA frames wheever a uplik trasmissio is sesed thus achievig higher dowlik throughputs. 7. CONCLUSION We experimetally demostrate the existig ufairess problem i typical WLAN hotpots ad proposed a simple ehacemet to DCF for overcomig the ufairess problem. We developed aalytical models to evaluate the throughputs of AP ad STAs ad verify these models through extesive simulatio study. Our proposed BDCF protocol eables the AP to access the chael more frequetly by gratig a preferetial treatmet. I additio to this, our protocol also reduces the time wasted i chael cotetio ad backoff mechaism at the MAC layer. We otice that the aalytical results fid i good agreemet with the simulatio results. Comprehesive simulatios are also coducted o various traffic patters for both TCP ad UDP traffic. It has bee demostrated that BDCF successfully solves the ufairess problem alog with substatial improvemets i the throughputs ad reductio i the ed-to-ed delays of the dowward traffic (aroud 300%). REFERENCES [1] IEEE Std IEEE Stadard for Wireless LAN Medium Access Cotrol (MAC) ad Physical Layer (PHY) Specificatio, ISO/IEC :1999 (E), Aug., [2] S. Pilosof, R. Ramjee, D. Raz, Y. Shavitt, ad P. Siha, Uderstadig TCP Fairess over Wireless LAN, IEEE INFOCOM, [3] M. Bottigliego, C. Casetti, C. F. Chiasserii ad M. Meo, Short-term Fairess for TCP Flows i b WLANs, IEEE INFOCOM [4] I. Aad ad C. Casette, Differetiatig mechaisms i IEEE , IEEE INFOCOM [5] H. Wu, Y. Peg, K. Log, S. Cheg, ad J. Ma, Performace of Reliable Trasport Protocol over IEEE Wireless LAN: Aalysis ad Ehacemet, IEEE INFOCOM [6] UCB/LBNL/VINT Network Simulator (s-2), Available at [7] S. W. Kim, B.S.Kim, Y. Fag, Dowlik ad uplik resource allocatio i IEEE wireless LANs, IEEE Tras. o Vehicular Techology, Ja [8] R. Jai, The Art of Computer Systems Performace Aalysis, Joh Wiley ad Sos, [9] H. Balakrisha ad V. Padmaabha, How Network Asymmetry affects TCP performace, IEEE commuicatio magazie, 60-67, April [10] D. Berger et al., TCP-Friedly Medium Access Cotrol for Ad-Hoc Wireless Networks: Alleviatig Self-Cotetio, MASS 04, Oct 24-27, [11] T. Kuag ad C. Williamso, A bidirectioal multichael MAC protocol for improvig TCP performace o multihop wireless ad hoc etworks, Proc. of ACM/IEEE MSWiM, October [12] J. Malie, Host AP Driver package for Liux, Available at [13] NLANR/DAST Iperf, Available at [14] G. Biachi, Performace aalysis of the IEEE distributed coordiatio fuctio, IEEE J. Select. Areas Commuicatio, Mar

Achieving Fairness in Wireless LANs by Enhanced DCF *

Achieving Fairness in Wireless LANs by Enhanced DCF * U.C. ECECS Techical Report 2005-03 August 2005 Achievig Fairess i Wireless LANs by Ehaced 802. DCF * by Nagesh S. Nadiraju, Hrishikesh Gossai, Dave Cavalcati, Kaushik R. Chowdhury, Dharma P. Agrawal Ceter

More information

Introduction to Wireless & Mobile Systems. Chapter 6. Multiple Radio Access Cengage Learning Engineering. All Rights Reserved.

Introduction to Wireless & Mobile Systems. Chapter 6. Multiple Radio Access Cengage Learning Engineering. All Rights Reserved. Itroductio to Wireless & Mobile Systems Chapter 6 Multiple Radio Access 1 Outlie Itroductio Multiple Radio Access Protocols Cotetio-based Protocols Pure ALOHA Slotted ALOHA CSMA (Carrier Sese Multiple

More information

Lecture 28: Data Link Layer

Lecture 28: Data Link Layer Automatic Repeat Request (ARQ) 2. Go ack N ARQ Although the Stop ad Wait ARQ is very simple, you ca easily show that it has very the low efficiecy. The low efficiecy comes from the fact that the trasmittig

More information

Announcements. Reading. Project #4 is on the web. Homework #1. Midterm #2. Chapter 4 ( ) Note policy about project #3 missing components

Announcements. Reading. Project #4 is on the web. Homework #1. Midterm #2. Chapter 4 ( ) Note policy about project #3 missing components Aoucemets Readig Chapter 4 (4.1-4.2) Project #4 is o the web ote policy about project #3 missig compoets Homework #1 Due 11/6/01 Chapter 6: 4, 12, 24, 37 Midterm #2 11/8/01 i class 1 Project #4 otes IPv6Iit,

More information

A New per-class Flow Fixed Proportional Differentiated Service for Multi-service Wireless LAN*

A New per-class Flow Fixed Proportional Differentiated Service for Multi-service Wireless LAN* A New per-class Flow Fixed Proportioal Differetiated Service for Multi-service Wireless LAN* Meg Chag Che, Li-Pig Tug 2, Yeali S. Su 3, ad Wei-Kua Shih 2 Istitute of Iformatio Sciece, Academia Siica, Taipei,

More information

Reliable Transmission. Spring 2018 CS 438 Staff - University of Illinois 1

Reliable Transmission. Spring 2018 CS 438 Staff - University of Illinois 1 Reliable Trasmissio Sprig 2018 CS 438 Staff - Uiversity of Illiois 1 Reliable Trasmissio Hello! My computer s ame is Alice. Alice Bob Hello! Alice. Sprig 2018 CS 438 Staff - Uiversity of Illiois 2 Reliable

More information

MAC Throughput Improvement Using Adaptive Contention Window

MAC Throughput Improvement Using Adaptive Contention Window Joural of Computer ad Commuicatios, 2015, 3, 1 14 Published Olie Jauary 2015 i SciRes. http://www.scirp.org/joural/jcc http://dx.doi.org/10.4236/jcc.2015.31001 MAC Throughput Improvemet Usig Adaptive Cotetio

More information

History Based Probabilistic Backoff Algorithm

History Based Probabilistic Backoff Algorithm America Joural of Egieerig ad Applied Scieces, 2012, 5 (3), 230-236 ISSN: 1941-7020 2014 Rajagopala ad Mala, This ope access article is distributed uder a Creative Commos Attributio (CC-BY) 3.0 licese

More information

Table 2 GSM, UMTS and LTE Coverage Levels

Table 2 GSM, UMTS and LTE Coverage Levels 6 INDICATORS OF QUALITY OF SERVICE This sectio defies quality idicators that characterize the performace of services supported o mobile commuicatio systems i their various phases of access ad use 6. 6.1

More information

performance to the performance they can experience when they use the services from a xed location.

performance to the performance they can experience when they use the services from a xed location. I the Proceedigs of The First Aual Iteratioal Coferece o Mobile Computig ad Networkig (MobiCom 9) November -, 99, Berkeley, Califoria USA Performace Compariso of Mobile Support Strategies Rieko Kadobayashi

More information

Prevention of Black Hole Attack in Mobile Ad-hoc Networks using MN-ID Broadcasting

Prevention of Black Hole Attack in Mobile Ad-hoc Networks using MN-ID Broadcasting Vol.2, Issue.3, May-Jue 2012 pp-1017-1021 ISSN: 2249-6645 Prevetio of Black Hole Attack i Mobile Ad-hoc Networks usig MN-ID Broadcastig Atoy Devassy 1, K. Jayathi 2 *(PG scholar, ME commuicatio Systems,

More information

Quality of Service. Spring 2018 CS 438 Staff - University of Illinois 1

Quality of Service. Spring 2018 CS 438 Staff - University of Illinois 1 Quality of Service Sprig 2018 CS 438 Staff - Uiversity of Illiois 1 Quality of Service How good are late data ad lowthroughput chaels? It depeds o the applicatio. Do you care if... Your e-mail takes 1/2

More information

Session Initiated Protocol (SIP) and Message-based Load Balancing (MBLB)

Session Initiated Protocol (SIP) and Message-based Load Balancing (MBLB) F5 White Paper Sessio Iitiated Protocol (SIP) ad Message-based Load Balacig (MBLB) The ability to provide ew ad creative methods of commuicatios has esured a SIP presece i almost every orgaizatio. The

More information

Evaluation scheme for Tracking in AMI

Evaluation scheme for Tracking in AMI A M I C o m m u i c a t i o A U G M E N T E D M U L T I - P A R T Y I N T E R A C T I O N http://www.amiproject.org/ Evaluatio scheme for Trackig i AMI S. Schreiber a D. Gatica-Perez b AMI WP4 Trackig:

More information

Admission control issues in sensor clusters

Admission control issues in sensor clusters Admissio cotrol issues i 802.15.4 sesor clusters Jelea Mišić, Shairmia Shafi, ad Vojislav B. Mišić Departmet of Computer Sciece, Uiversity of Maitoba Wiipeg, Maitoba, Caada PACS umbers: Valid PACS appear

More information

One advantage that SONAR has over any other music-sequencing product I ve worked

One advantage that SONAR has over any other music-sequencing product I ve worked *gajedra* D:/Thomso_Learig_Projects/Garrigus_163132/z_productio/z_3B2_3D_files/Garrigus_163132_ch17.3d, 14/11/08/16:26:39, 16:26, page: 647 17 CAL 101 Oe advatage that SONAR has over ay other music-sequecig

More information

The Penta-S: A Scalable Crossbar Network for Distributed Shared Memory Multiprocessor Systems

The Penta-S: A Scalable Crossbar Network for Distributed Shared Memory Multiprocessor Systems The Peta-S: A Scalable Crossbar Network for Distributed Shared Memory Multiprocessor Systems Abdulkarim Ayyad Departmet of Computer Egieerig, Al-Quds Uiversity, Jerusalem, P.O. Box 20002 Tel: 02-2797024,

More information

A QoS Provisioning mechanism of Real-time Wireless USB Transfers for Smart HDTV Multimedia Services

A QoS Provisioning mechanism of Real-time Wireless USB Transfers for Smart HDTV Multimedia Services A QoS Provisioig mechaism of Real-time Wireless USB Trasfers for Smart HDTV Multimedia Services Ji-Woo im 1, yeog Hur 2, Jog-Geu Jeog 3, Dog Hoo Lee 4, Moo Sog Yeu 5, Yeowoo Lee 6 ad Seog Ro Lee 7 1 Istitute

More information

Data diverse software fault tolerance techniques

Data diverse software fault tolerance techniques Data diverse software fault tolerace techiques Complemets desig diversity by compesatig for desig diversity s s limitatios Ivolves obtaiig a related set of poits i the program data space, executig the

More information

Morgan Kaufmann Publishers 26 February, COMPUTER ORGANIZATION AND DESIGN The Hardware/Software Interface. Chapter 5

Morgan Kaufmann Publishers 26 February, COMPUTER ORGANIZATION AND DESIGN The Hardware/Software Interface. Chapter 5 Morga Kaufma Publishers 26 February, 28 COMPUTER ORGANIZATION AND DESIGN The Hardware/Software Iterface 5 th Editio Chapter 5 Set-Associative Cache Architecture Performace Summary Whe CPU performace icreases:

More information

APPLICATION NOTE PACE1750AE BUILT-IN FUNCTIONS

APPLICATION NOTE PACE1750AE BUILT-IN FUNCTIONS APPLICATION NOTE PACE175AE BUILT-IN UNCTIONS About This Note This applicatio brief is iteded to explai ad demostrate the use of the special fuctios that are built ito the PACE175AE processor. These powerful

More information

Acknowledgement-Aware MPR MAC Protocol for Distributed WLANs: Design and Analysis

Acknowledgement-Aware MPR MAC Protocol for Distributed WLANs: Design and Analysis Globecom 2012 - Wireless Commuicatios Symposium Ackowledgemet-Aware MPR MAC Protocol for Distributed WLANs: Desig ad Aalysis Arpa Mukhopadhyay, Neelesh B. Mehta, Seior Member, IEEE, Vikram Sriivasa, Member,

More information

An Improved Shuffled Frog-Leaping Algorithm for Knapsack Problem

An Improved Shuffled Frog-Leaping Algorithm for Knapsack Problem A Improved Shuffled Frog-Leapig Algorithm for Kapsack Problem Zhoufag Li, Ya Zhou, ad Peg Cheg School of Iformatio Sciece ad Egieerig Hea Uiversity of Techology ZhegZhou, Chia lzhf1978@126.com Abstract.

More information

3D Model Retrieval Method Based on Sample Prediction

3D Model Retrieval Method Based on Sample Prediction 20 Iteratioal Coferece o Computer Commuicatio ad Maagemet Proc.of CSIT vol.5 (20) (20) IACSIT Press, Sigapore 3D Model Retrieval Method Based o Sample Predictio Qigche Zhag, Ya Tag* School of Computer

More information

Switch Construction CS

Switch Construction CS Switch Costructio CS 00 Workstatio-Based Aggregate badwidth /2 of the I/O bus badwidth capacity shared amog all hosts coected to switch example: Gbps bus ca support 5 x 00Mbps ports (i theory) I/O bus

More information

. Written in factored form it is easy to see that the roots are 2, 2, i,

. Written in factored form it is easy to see that the roots are 2, 2, i, CMPS A Itroductio to Programmig Programmig Assigmet 4 I this assigmet you will write a java program that determies the real roots of a polyomial that lie withi a specified rage. Recall that the roots (or

More information

Switching Hardware. Spring 2018 CS 438 Staff, University of Illinois 1

Switching Hardware. Spring 2018 CS 438 Staff, University of Illinois 1 Switchig Hardware Sprig 208 CS 438 Staff, Uiversity of Illiois Where are we? Uderstad Differet ways to move through a etwork (forwardig) Read sigs at each switch (datagram) Follow a kow path (virtual circuit)

More information

Elementary Educational Computer

Elementary Educational Computer Chapter 5 Elemetary Educatioal Computer. Geeral structure of the Elemetary Educatioal Computer (EEC) The EEC coforms to the 5 uits structure defied by vo Neuma's model (.) All uits are preseted i a simplified

More information

Interference Aware Channel Assignment Scheme in Multichannel Wireless Mesh Networks

Interference Aware Channel Assignment Scheme in Multichannel Wireless Mesh Networks Iterferece Aware Chael Assigmet Scheme i Multichael Wireless Mesh Networks Sumyeg Kim Departmet of Computer Software Egieerig Kumoh Natioal Istitute of Techology Gum South Korea Abstract Wireless mesh

More information

Media Access Protocols. Spring 2018 CS 438 Staff, University of Illinois 1

Media Access Protocols. Spring 2018 CS 438 Staff, University of Illinois 1 Media Access Protocols Sprig 2018 CS 438 Staff, Uiversity of Illiois 1 Where are We? you are here 00010001 11001001 00011101 A midterm is here Sprig 2018 CS 438 Staff, Uiversity of Illiois 2 Multiple Access

More information

Bayesian approach to reliability modelling for a probability of failure on demand parameter

Bayesian approach to reliability modelling for a probability of failure on demand parameter Bayesia approach to reliability modellig for a probability of failure o demad parameter BÖRCSÖK J., SCHAEFER S. Departmet of Computer Architecture ad System Programmig Uiversity Kassel, Wilhelmshöher Allee

More information

On Nonblocking Folded-Clos Networks in Computer Communication Environments

On Nonblocking Folded-Clos Networks in Computer Communication Environments O Noblockig Folded-Clos Networks i Computer Commuicatio Eviromets Xi Yua Departmet of Computer Sciece, Florida State Uiversity, Tallahassee, FL 3306 xyua@cs.fsu.edu Abstract Folded-Clos etworks, also referred

More information

Adaptive Graph Partitioning Wireless Protocol S. L. Ng 1, P. M. Geethakumari 1, S. Zhou 2, and W. J. Dewar 1 1

Adaptive Graph Partitioning Wireless Protocol S. L. Ng 1, P. M. Geethakumari 1, S. Zhou 2, and W. J. Dewar 1 1 Adaptive Graph Partitioig Wireless Protocol S. L. Ng 1, P. M. Geethakumari 1, S. Zhou 2, ad W. J. Dewar 1 1 School of Electrical Egieerig Uiversity of New South Wales, Australia 2 Divisio of Radiophysics

More information

On Multicast Scheduling and Routing in Multistage Clos Networks

On Multicast Scheduling and Routing in Multistage Clos Networks O Multicast Schedulig ad Routig i Multistage Clos Networks Bi Tag Departmet of Computer Sciece Stoy Brook Uiversity Stoy Brook, NY 794 bitag@cs.suysb.edu Abstract Multicast commuicatio, which ivolves trasmittig

More information

Markov Chain Model of HomePlug CSMA MAC for Determining Optimal Fixed Contention Window Size

Markov Chain Model of HomePlug CSMA MAC for Determining Optimal Fixed Contention Window Size Markov Chai Model of HomePlug CSMA MAC for Determiig Optimal Fixed Cotetio Widow Size Eva Krimiger * ad Haiph Latchma Dept. of Electrical ad Computer Egieerig, Uiversity of Florida, Gaiesville, FL, USA

More information

IS-IS in Detail. ISP Workshops

IS-IS in Detail. ISP Workshops IS-IS i Detail ISP Workshops These materials are licesed uder the Creative Commos Attributio-NoCommercial 4.0 Iteratioal licese (http://creativecommos.org/liceses/by-c/4.0/) Last updated 27 th November

More information

Improvement of the Orthogonal Code Convolution Capabilities Using FPGA Implementation

Improvement of the Orthogonal Code Convolution Capabilities Using FPGA Implementation Improvemet of the Orthogoal Code Covolutio Capabilities Usig FPGA Implemetatio Naima Kaabouch, Member, IEEE, Apara Dhirde, Member, IEEE, Saleh Faruque, Member, IEEE Departmet of Electrical Egieerig, Uiversity

More information

1&1 Next Level Hosting

1&1 Next Level Hosting 1&1 Next Level Hostig Performace Level: Performace that grows with your requiremets Copyright 1&1 Iteret SE 2017 1ad1.com 2 1&1 NEXT LEVEL HOSTING 3 Fast page loadig ad short respose times play importat

More information

S. Mehta and K.S. Kwak. UWB Wireless Communications Research Center, Inha University Incheon, , Korea

S. Mehta and K.S. Kwak. UWB Wireless Communications Research Center, Inha University Incheon, , Korea S. Mehta ad K.S. Kwak UWB Wireless Commuicatios Research Ceter, Iha Uiversity Icheo, 402-75, Korea suryaad.m@gmail.com ABSTRACT I this paper, we propose a hybrid medium access cotrol protocol (H-MAC) for

More information

Guaranteeing Hard Real Time End-to-End Communications Deadlines

Guaranteeing Hard Real Time End-to-End Communications Deadlines Guarateeig Hard Real Time Ed-to-Ed Commuicatios Deadlies K. W. Tidell A. Burs A. J. Welligs Real Time Systems Research Group Departmet of Computer Sciece Uiversity of York e-mail: ke@mister.york.ac.uk

More information

Improving Template Based Spike Detection

Improving Template Based Spike Detection Improvig Template Based Spike Detectio Kirk Smith, Member - IEEE Portlad State Uiversity petra@ee.pdx.edu Abstract Template matchig algorithms like SSE, Covolutio ad Maximum Likelihood are well kow for

More information

On Signaling Efficiency for Call Setup in all-ip Wireless Networks

On Signaling Efficiency for Call Setup in all-ip Wireless Networks O Sigalig Efficiecy for Call Setup i all-ip Wireless Networks Miguel Melyk ad Admela Juka Uiversity of Illiois at Urbaa Champaig {mmelyk2, juka}@uiuc.edu Abstract This paper aalyzes the sigalig efficiecy

More information

Avid Interplay Bundle

Avid Interplay Bundle Avid Iterplay Budle Versio 2.5 Cofigurator ReadMe Overview This documet provides a overview of Iterplay Budle v2.5 ad describes how to ru the Iterplay Budle cofiguratio tool. Iterplay Budle v2.5 refers

More information

1. SWITCHING FUNDAMENTALS

1. SWITCHING FUNDAMENTALS . SWITCING FUNDMENTLS Switchig is the provisio of a o-demad coectio betwee two ed poits. Two distict switchig techiques are employed i commuicatio etwors-- circuit switchig ad pacet switchig. Circuit switchig

More information

Traditional queuing behaviour in routers. Scheduling and queue management. Questions. Scheduling mechanisms. Scheduling [1] Scheduling [2]

Traditional queuing behaviour in routers. Scheduling and queue management. Questions. Scheduling mechanisms. Scheduling [1] Scheduling [2] Traditioal queuig behaviour i routers Schedulig ad queue maagemet Data trasfer: datagrams: idividual packets o recogitio of flows coectioless: o sigallig Forwardig: based o per-datagram, forwardig table

More information

Multi-Threading. Hyper-, Multi-, and Simultaneous Thread Execution

Multi-Threading. Hyper-, Multi-, and Simultaneous Thread Execution Multi-Threadig Hyper-, Multi-, ad Simultaeous Thread Executio 1 Performace To Date Icreasig processor performace Pipeliig. Brach predictio. Super-scalar executio. Out-of-order executio. Caches. Hyper-Threadig

More information

ADVANCES in information and communication technologies

ADVANCES in information and communication technologies IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, VOL. XXX, NO. XX, XXXXXXX 200 Use of Aalytical Performace Models for System Sizig ad Resource Allocatio i Iteractive Video-o-Demad Systems Employig

More information

IMP: Superposer Integrated Morphometrics Package Superposition Tool

IMP: Superposer Integrated Morphometrics Package Superposition Tool IMP: Superposer Itegrated Morphometrics Package Superpositio Tool Programmig by: David Lieber ( 03) Caisius College 200 Mai St. Buffalo, NY 4208 Cocept by: H. David Sheets, Dept. of Physics, Caisius College

More information

A Study on the Performance of Cholesky-Factorization using MPI

A Study on the Performance of Cholesky-Factorization using MPI A Study o the Performace of Cholesky-Factorizatio usig MPI Ha S. Kim Scott B. Bade Departmet of Computer Sciece ad Egieerig Uiversity of Califoria Sa Diego {hskim, bade}@cs.ucsd.edu Abstract Cholesky-factorizatio

More information

27 Refraction, Dispersion, Internal Reflection

27 Refraction, Dispersion, Internal Reflection Chapter 7 Refractio, Dispersio, Iteral Reflectio 7 Refractio, Dispersio, Iteral Reflectio Whe we talked about thi film iterferece, we said that whe light ecouters a smooth iterface betwee two trasparet

More information

GTS Scheduling Scheme for Real-Time Communication in IEEE Industrial Wireless Sensor Networks

GTS Scheduling Scheme for Real-Time Communication in IEEE Industrial Wireless Sensor Networks Idia Joural of Sciece ad Techology, Vol 9(7), DOI:.7485/ijst/6/v9i7/87734, February 6 ISSN (Prit) : 974-6846 ISSN (Olie) : 974-5645 GTS Schedulig Scheme for Real-Time Commuicatio i IEEE8.5.4 Idustrial

More information

Random Network Coding in Wireless Sensor Networks: Energy Efficiency via Cross-Layer Approach

Random Network Coding in Wireless Sensor Networks: Energy Efficiency via Cross-Layer Approach Radom Network Codig i Wireless Sesor Networks: Eergy Efficiecy via Cross-Layer Approach Daiel Platz, Dereje H. Woldegebreal, ad Holger Karl Uiversity of Paderbor, Paderbor, Germay {platz, dereje.hmr, holger.karl}@upb.de

More information

Introduction to Network Technologies & Layered Architecture BUPT/QMUL

Introduction to Network Technologies & Layered Architecture BUPT/QMUL Itroductio to Network Techologies & Layered Architecture BUPT/QMUL 2018-3-12 Review What is the Iteret? How does it work? Whe & how did it come about? Who cotrols it? Where is it goig? 2 Ageda Basic Network

More information

Price-based Congestion-Control in Wi-Fi Hot Spots

Price-based Congestion-Control in Wi-Fi Hot Spots Price-based Cogestio-Cotrol i Wi-Fi Hot Spots Roberto Battiti, Marco Coti, Erico Gregori, Mikalai Sabel To cite this versio: Roberto Battiti, Marco Coti, Erico Gregori, Mikalai Sabel. Price-based Cogestio-Cotrol

More information

NON-LINEAR MODELLING OF A GEOTHERMAL STEAM PIPE

NON-LINEAR MODELLING OF A GEOTHERMAL STEAM PIPE 14thNew Zealad Workshop 1992 NON-LNEAR MODELLNG OF A GEOTHERMAL STEAM PPE Y. Huag ad D. H. Freesto Geothermal stitute, Uiversity of Aucklad SUMMARY Recet work o developig a o-liear model for a geothermal

More information

MOTIF XF Extension Owner s Manual

MOTIF XF Extension Owner s Manual MOTIF XF Extesio Ower s Maual Table of Cotets About MOTIF XF Extesio...2 What Extesio ca do...2 Auto settig of Audio Driver... 2 Auto settigs of Remote Device... 2 Project templates with Iput/ Output Bus

More information

The Value of Peering

The Value of Peering The Value of Peerig ISP/IXP Workshops These materials are licesed uder the Creative Commos Attributio-NoCommercial 4.0 Iteratioal licese (http://creativecommos.org/liceses/by-c/4.0/) Last updated 25 th

More information

Adaptive and Lazy Segmentation Based Proxy Caching for Streaming Media Delivery

Adaptive and Lazy Segmentation Based Proxy Caching for Streaming Media Delivery Adaptive ad Based Proxy Cachig for Streamig Media Delivery Sogqig Che Dept. of Computer Sciece College of William ad Mary Williamsburg, VA 23187 sqche@cs.wm.edu Susie Wee Mobile ad Media System Lab Hewlett-Packard

More information

The Magma Database file formats

The Magma Database file formats The Magma Database file formats Adrew Gaylard, Bret Pikey, ad Mart-Mari Breedt Johaesburg, South Africa 15th May 2006 1 Summary Magma is a ope-source object database created by Chris Muller, of Kasas City,

More information

9.1. Sequences and Series. Sequences. What you should learn. Why you should learn it. Definition of Sequence

9.1. Sequences and Series. Sequences. What you should learn. Why you should learn it. Definition of Sequence _9.qxd // : AM Page Chapter 9 Sequeces, Series, ad Probability 9. Sequeces ad Series What you should lear Use sequece otatio to write the terms of sequeces. Use factorial otatio. Use summatio otatio to

More information

Performance Analysis of Multiclass FIFO: Motivation, Difficulty and a Network Calculus Approach

Performance Analysis of Multiclass FIFO: Motivation, Difficulty and a Network Calculus Approach Performace Aalysis of Multiclass FIFO: Motivatio, Difficulty ad a Network alculus Approach Yumig Jiag Norwegia Uiversity of Sciece ad Techology (NTNU) 1 19 March 2014, 2d Workshop o Network alculus, Bamberg,

More information

Realistic Storage of Pending Requests in Content-Centric Network Routers

Realistic Storage of Pending Requests in Content-Centric Network Routers Realistic Storage of Pedig Requests i Cotet-Cetric Network Routers Wei You, Bertrad Mathieu, Patrick Truog, Jea-Fraçois Peltier Orage Labs Laio, Frace {wei.you, bertrad2.mathieu, patrick.truog, jeafracois.peltier}@orage.com

More information

Selfish Attacks in IEEE aa Networks with Intra-AC Prioritization

Selfish Attacks in IEEE aa Networks with Intra-AC Prioritization Selfish Attacks i IEEE 8.11aa Networks with Itra-AC Prioritizatio Lukasz Prasal AGH Uiversity of Sciece ad Techology Krakow, Polad Email: prasal@kt.agh.edu.pl Szymo Szott AGH Uiversity of Sciece ad Techology

More information

UNIVERSITY OF MORATUWA

UNIVERSITY OF MORATUWA UNIVERSITY OF MORATUWA FACULTY OF ENGINEERING DEPARTMENT OF COMPUTER SCIENCE & ENGINEERING B.Sc. Egieerig 2014 Itake Semester 2 Examiatio CS2052 COMPUTER ARCHITECTURE Time allowed: 2 Hours Jauary 2016

More information

Secure Software Upload in an Intelligent Vehicle via Wireless Communication Links

Secure Software Upload in an Intelligent Vehicle via Wireless Communication Links Secure Software Upload i a Itelliget Vehicle via Wireless Commuicatio Liks Syed Masud Mahmud, Member, IEEE, Shobhit Shaker, Studet Member, IEEE Iria Hossai, Studet Member, IEEE Abstract The demad for drive-by-wire,

More information

End Semester Examination CSE, III Yr. (I Sem), 30002: Computer Organization

End Semester Examination CSE, III Yr. (I Sem), 30002: Computer Organization Ed Semester Examiatio 2013-14 CSE, III Yr. (I Sem), 30002: Computer Orgaizatio Istructios: GROUP -A 1. Write the questio paper group (A, B, C, D), o frot page top of aswer book, as per what is metioed

More information

Python Programming: An Introduction to Computer Science

Python Programming: An Introduction to Computer Science Pytho Programmig: A Itroductio to Computer Sciece Chapter 6 Defiig Fuctios Pytho Programmig, 2/e 1 Objectives To uderstad why programmers divide programs up ito sets of cooperatig fuctios. To be able to

More information

Τεχνολογία Λογισμικού

Τεχνολογία Λογισμικού ΕΘΝΙΚΟ ΜΕΤΣΟΒΙΟ ΠΟΛΥΤΕΧΝΕΙΟ Σχολή Ηλεκτρολόγων Μηχανικών και Μηχανικών Υπολογιστών Τεχνολογία Λογισμικού, 7ο/9ο εξάμηνο 2018-2019 Τεχνολογία Λογισμικού Ν.Παπασπύρου, Αν.Καθ. ΣΗΜΜΥ, ickie@softlab.tua,gr

More information

n Based on unrealistic growth forecast n Overcapacity: Fiber 5x100 in three years n Wireless: Expensive spectrum licenses n Fibers

n Based on unrealistic growth forecast n Overcapacity: Fiber 5x100 in three years n Wireless: Expensive spectrum licenses n Fibers EECS228a Research Topics Jea Walrad www.eecs.berkeley.edu/~wlr of Networks Walrad 52 of Networks Pricig of Services Competitio of Users Competitio of Providers Suggested Readigs: http://www.bgsu.edu/departmets/tcom/aota.htm

More information

Transitioning to BGP

Transitioning to BGP Trasitioig to BGP ISP Workshops These materials are licesed uder the Creative Commos Attributio-NoCommercial 4.0 Iteratioal licese (http://creativecommos.org/liceses/by-c/4.0/) Last updated 24 th April

More information

VMbuddies: Coordinating Live Migration of Multi-Tier Applications in Cloud Environments

VMbuddies: Coordinating Live Migration of Multi-Tier Applications in Cloud Environments IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, TPDS-23-2-67 VMbuddies: Coordiatig Live Migratio of Multi-Tier Applicatios i Cloud Eviromets Haiku Liu, ad Bigsheg He Abstract Eabled by virtualizatio

More information

Load balanced Parallel Prime Number Generator with Sieve of Eratosthenes on Cluster Computers *

Load balanced Parallel Prime Number Generator with Sieve of Eratosthenes on Cluster Computers * Load balaced Parallel Prime umber Geerator with Sieve of Eratosthees o luster omputers * Soowook Hwag*, Kyusik hug**, ad Dogseug Kim* *Departmet of Electrical Egieerig Korea Uiversity Seoul, -, Rep. of

More information

CapNet: A Real-Time Wireless Management Network for Data Center Power Capping

CapNet: A Real-Time Wireless Management Network for Data Center Power Capping 24 IEEE Real-Time Systems Symposium CapNet: A Real-Time Wireless Maagemet Network for Data Ceter Power Cappig Abusayeed Saifullah, Sriram Sakar, Jie Liu, Cheyag Lu, Raveer Chadra, ad Bodhi Priyatha Washigto

More information

Analysis Metrics. Intro to Algorithm Analysis. Slides. 12. Alg Analysis. 12. Alg Analysis

Analysis Metrics. Intro to Algorithm Analysis. Slides. 12. Alg Analysis. 12. Alg Analysis Itro to Algorithm Aalysis Aalysis Metrics Slides. Table of Cotets. Aalysis Metrics 3. Exact Aalysis Rules 4. Simple Summatio 5. Summatio Formulas 6. Order of Magitude 7. Big-O otatio 8. Big-O Theorems

More information

Security of Bluetooth: An overview of Bluetooth Security

Security of Bluetooth: An overview of Bluetooth Security Versio 2 Security of Bluetooth: A overview of Bluetooth Security Marjaaa Träskbäck Departmet of Electrical ad Commuicatios Egieerig mtraskba@cc.hut.fi 52655H ABSTRACT The purpose of this paper is to give

More information

n Explore virtualization concepts n Become familiar with cloud concepts

n Explore virtualization concepts n Become familiar with cloud concepts Chapter Objectives Explore virtualizatio cocepts Become familiar with cloud cocepts Chapter #15: Architecture ad Desig 2 Hypervisor Virtualizatio ad cloud services are becomig commo eterprise tools to

More information

Descriptive Statistics Summary Lists

Descriptive Statistics Summary Lists Chapter 209 Descriptive Statistics Summary Lists Itroductio This procedure is used to summarize cotiuous data. Large volumes of such data may be easily summarized i statistical lists of meas, couts, stadard

More information

A Generalized Markov Chain Model for Effective Analysis of Slotted IEEE

A Generalized Markov Chain Model for Effective Analysis of Slotted IEEE A Geeralized Markov Chai Model for Effective Aalysis of Slotted IEEE 8..4 Pagu Park, Piergiuseppe Di Marco, Pablo Soldati, Carlo Fischioe, Karl Herik Johasso Abstract A geeralized aalysis of the IEEE 8..4

More information

Lecture 7 7 Refraction and Snell s Law Reading Assignment: Read Kipnis Chapter 4 Refraction of Light, Section III, IV

Lecture 7 7 Refraction and Snell s Law Reading Assignment: Read Kipnis Chapter 4 Refraction of Light, Section III, IV Lecture 7 7 Refractio ad Sell s Law Readig Assigmet: Read Kipis Chapter 4 Refractio of Light, Sectio III, IV 7. History I Eglish-speakig coutries, the law of refractio is kow as Sell s Law, after the Dutch

More information

Security and Communication. Ultimate. Because Intercom doesn t stop at the hardware level. Software Intercom Server for virtualised IT platforms

Security and Communication. Ultimate. Because Intercom doesn t stop at the hardware level. Software Intercom Server for virtualised IT platforms Because Itercom does t stop at the hardware level by Commed Software Itercom Server for virtualised IT platforms Ready for VMware Ready for Hyper-V VoIP Ultimate availability Itercom Server as a app The

More information

NVP-903 Series. Multi-Stream Network Video Encoder REFERENCE GUIDE

NVP-903 Series. Multi-Stream Network Video Encoder REFERENCE GUIDE NVP-903 Series Multi-Stream Network Video Ecoder REFERENCE GUIDE NVP-903 Series User Maual Table of Cotets 1 Itroductio... 4 1.1 Product Overview... 4 1.2 Product Features... 4 2 Pael Desig... 5 2.1 Frot

More information

Fast Fourier Transform (FFT) Algorithms

Fast Fourier Transform (FFT) Algorithms Fast Fourier Trasform FFT Algorithms Relatio to the z-trasform elsewhere, ozero, z x z X x [ ] 2 ~ elsewhere,, ~ e j x X x x π j e z z X X π 2 ~ The DFS X represets evely spaced samples of the z- trasform

More information

Structuring Redundancy for Fault Tolerance. CSE 598D: Fault Tolerant Software

Structuring Redundancy for Fault Tolerance. CSE 598D: Fault Tolerant Software Structurig Redudacy for Fault Tolerace CSE 598D: Fault Tolerat Software What do we wat to achieve? Versios Damage Assessmet Versio 1 Error Detectio Iputs Versio 2 Voter Outputs State Restoratio Cotiued

More information

An upper bound model for TCP and UDP throughput in IPv4 and IPv6

An upper bound model for TCP and UDP throughput in IPv4 and IPv6 ARTICLE IN PRESS Joural of Network ad Computer Applicatios 31 (2008) 585 602 www.elsevier.com/locate/jca A upper boud model for TCP ad UDP throughput i IPv4 ad IPv6 Eric Gamess, Ria Suro s Cetral Uiversity

More information

Web OS Switch Software

Web OS Switch Software Web OS Switch Software BBI Quick Guide Nortel Networks Part Number: 213164, Revisio A, July 2000 50 Great Oaks Boulevard Sa Jose, Califoria 95119 408-360-5500 Mai 408-360-5501 Fax www.orteletworks.com

More information

ECE4050 Data Structures and Algorithms. Lecture 6: Searching

ECE4050 Data Structures and Algorithms. Lecture 6: Searching ECE4050 Data Structures ad Algorithms Lecture 6: Searchig 1 Search Give: Distict keys k 1, k 2,, k ad collectio L of records of the form (k 1, I 1 ), (k 2, I 2 ),, (k, I ) where I j is the iformatio associated

More information

Analysis of Server Resource Consumption of Meteorological Satellite Application System Based on Contour Curve

Analysis of Server Resource Consumption of Meteorological Satellite Application System Based on Contour Curve Advaces i Computer, Sigals ad Systems (2018) 2: 19-25 Clausius Scietific Press, Caada Aalysis of Server Resource Cosumptio of Meteorological Satellite Applicatio System Based o Cotour Curve Xiagag Zhao

More information

% Sun Logo for. X3T10/95-229, Revision 0. April 18, 1998

% Sun Logo for. X3T10/95-229, Revision 0. April 18, 1998 Su Microsystems, Ic. 2550 Garcia Aveue Moutai View, CA 94045 415 960-1300 X3T10/95-229, Revisio 0 April 18, 1998 % Su Logo for Joh Lohmeyer Chairperso, X3T10 Symbios Logic Ic. 1635 Aeroplaza Drive Colorado

More information

A Key Distribution method for Reducing Storage and Supporting High Level Security in the Large-scale WSN

A Key Distribution method for Reducing Storage and Supporting High Level Security in the Large-scale WSN Iteratioal Joural of Digital Cotet Techology ad its Applicatios Vol. 2 No 1, March 2008 A Key Distributio method for Reducig Storage ad Supportig High Level Security i the Large-scale WSN Yoo-Su Jeog *1,

More information

Accuracy Improvement in Camera Calibration

Accuracy Improvement in Camera Calibration Accuracy Improvemet i Camera Calibratio FaJie L Qi Zag ad Reihard Klette CITR, Computer Sciece Departmet The Uiversity of Aucklad Tamaki Campus, Aucklad, New Zealad fli006, qza001@ec.aucklad.ac.z r.klette@aucklad.ac.z

More information

6.854J / J Advanced Algorithms Fall 2008

6.854J / J Advanced Algorithms Fall 2008 MIT OpeCourseWare http://ocw.mit.edu 6.854J / 18.415J Advaced Algorithms Fall 2008 For iformatio about citig these materials or our Terms of Use, visit: http://ocw.mit.edu/terms. 18.415/6.854 Advaced Algorithms

More information

BE Software Upgrades to ITALYCS 5. It s in the. Software

BE Software Upgrades to ITALYCS 5. It s in the. Software BE Software Upgrades to ITALYCS 5 It s i the Software UPGRADES WE OFFER Brampto Egieerig is offerig customers with ITALYCS 2 ad ITALYCS 4 systems the opportuity to upgrade their existig systems to the

More information

Throughput-Delay Scaling in Wireless Networks with Constant-Size Packets

Throughput-Delay Scaling in Wireless Networks with Constant-Size Packets Throughput-Delay Scalig i Wireless Networks with Costat-Size Packets Abbas El Gamal, James Mamme, Balaji Prabhakar, Devavrat Shah Departmets of EE ad CS Staford Uiversity, CA 94305 Email: {abbas, jmamme,

More information

A PREDICTION MODEL FOR USER S SHARE ANALYSIS IN DUAL- SIM ENVIRONMENT

A PREDICTION MODEL FOR USER S SHARE ANALYSIS IN DUAL- SIM ENVIRONMENT GSJ: Computer Sciece ad Telecommuicatios 03 No.3(39) ISSN 5-3 A PRDICTION MODL FOR USR S SHAR ANALYSIS IN DUAL- SIM NVIRONMNT Thakur Sajay, Jai Parag Orietal Uiversity, Idore, Idia sajaymca00@yahoo.com

More information

Appendix D. Controller Implementation

Appendix D. Controller Implementation COMPUTER ORGANIZATION AND DESIGN The Hardware/Software Iterface 5 th Editio Appedix D Cotroller Implemetatio Cotroller Implemetatios Combiatioal logic (sigle-cycle); Fiite state machie (multi-cycle, pipelied);

More information

Chapter 3 Classification of FFT Processor Algorithms

Chapter 3 Classification of FFT Processor Algorithms Chapter Classificatio of FFT Processor Algorithms The computatioal complexity of the Discrete Fourier trasform (DFT) is very high. It requires () 2 complex multiplicatios ad () complex additios [5]. As

More information

QoS Management: A Model-Based Approach

QoS Management: A Model-Based Approach Copyright ad Referece Iformatio: This material (preprit, accepted mauscript, or other author-distributable versio) is provided to esure timely dissemiatio of scholarly work. Copyright ad all rights therei

More information

Global Optimization of File Availability Through Replication for Efficient File Sharing in MANETs

Global Optimization of File Availability Through Replication for Efficient File Sharing in MANETs Global Optimizatio of File Availability Through Replicatio for Efficiet File Sharig i MANETs Kag Che ad Haiyig She Departmet of Electrical ad Computer Egieerig Clemso Uiversity Clemso, South Carolia 29631

More information

Copyright 2016 Ramez Elmasri and Shamkant B. Navathe

Copyright 2016 Ramez Elmasri and Shamkant B. Navathe Copyright 2016 Ramez Elmasri ad Shamkat B. Navathe CHAPTER 18 Strategies for Query Processig Copyright 2016 Ramez Elmasri ad Shamkat B. Navathe Itroductio DBMS techiques to process a query Scaer idetifies

More information

On the Throughput Capacity of Information-Centric Networks

On the Throughput Capacity of Information-Centric Networks O the Throughput Capacity of Iformatio-Cetric Networks Bita Azimdoost, Cedric estphal, ad Hamid R. Sadjadpour Departmet of Electrical Egieerig ad Computer Egieerig Uiversity of Califoria Sata Cruz, Sata

More information