Delay-Constrained Optimized Packet Aggregation in High-Speed Wireless Networks

Size: px
Start display at page:

Download "Delay-Constrained Optimized Packet Aggregation in High-Speed Wireless Networks"

Transcription

1 Teymoori P, Yazdani N. Delay-constrained optimized packet aggregation in high-speed wireless networks. JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY 28(3): May DOI /s Delay-Constrained Optimized Packet Aggregation in High-Speed Wireless Networks Peyman Teymoori 1 and Nasser Yazdani 1,2 1 School of Electrical and Computer Engineering, University College of Engineering, University of Tehran, Tehran, Iran 2 School of Computer Science, Institute for Research in Fundamental Sciences, Tehran, Iran {p.teymoori, yazdani}@ut.ac.ir Received July 31, 2012; revised January 23, Abstract High-speed wireless networks such as IEEE n have been introduced based on IEEE to meet the growing demand for high-throughput and multimedia applications. It is known that the medium access control (MAC) efficiency of IEEE decreases with increasing the physical rate. To improve efficiency, few solutions have been proposed such as Aggregation to concatenate a number of packets into a larger frame and send it at once to reduce the protocol overhead. Since transmitting larger frames eventuates to dramatic delay and jitter increase in other nodes, bounding the maximum aggregated frame size is important to satisfy delay requirements of especially multimedia applications. In this paper, we propose a scheme called Optimized Packet Aggregation (OPA) which models the network by constrained convex optimization to obtain the optimal aggregation size of each node regarding to delay constraints of other nodes. OPA attains proportionally fair sharing of the channel while satisfying delay constrains. Furthermore, reaching the optimal point is guaranteed in OPA with low complexity. Simulation results show that OPA can successfully bound delay and meet the requirements of nodes with only an insignificant throughput penalty due to limiting the aggregation size even in dynamic conditions. Keywords high-speed wireless network, delay requirement, aggregation, convex optimization 1 Introduction Recently, an ever-growing interest in wireless technologies and their applications has been aroused. To support rich multimedia applications such as highdefinition television (HDTV) and DVD, the trend is to provide higher bandwidths in the network [1]. Consequently, the recently approved standard, IEEE n, supports physical rates of up to 600 Mbps [2]. IEEE [3], as a de facto WLAN technology, introduces Distributed Coordination Function (DCF) which is a distributed channel access mechanism based on Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA). Unfortunately, higher physical rates reduce the MAC layer efficiency of IEEE protocol [4-5]. However, throughput at the MAC layer can be improved by aggregating several frames before transmission which is the main enhancement in IEEE n. Frame aggregation not only reduces the transmission time for preamble and headers, but also reduces the waiting time during random backoff period for successive frame transmissions [2]. One of the main requirements of high-speed WLANs is supporting real-time and delay-sensitive applications [6]. For real-time applications and delaysensitive traffic, bounding delay and preserving predictable delay are of significant importance in WLANs [7]. Delay-sensitive applications over WLANs require that the network transmits packet in a timely manner. If packets do not arrive on time at destinations and some of them experience delay, network quality of service degrades [8]. Although frame aggregation can increase throughput at the MAC layer under ideal channel conditions, a larger aggregated frame will cause each station to wait longer before any channel access [9]. Thus, throughput increase is achieved at the expense of total delay increase at the MAC layer. The problem is intensified in error-prone channels since larger frames are more prone to corruption and may take even more time to be transmitted, leading to longer delay [9]. Moreover, delay might be even longer if nodes are saturated. Researches have only focused on proposing effecting aggregation schemes, e.g., [1-2, 4-5, 10] and the effect of aggregation on delay and bounding such delay are paid no attention. To the best of our knowledge, this is the first work on analyzing and bounding delay caused by aggregation for WLANs. Regular Paper 2013 Springer Science + Business Media, LLC & Science Press, China

2 526 J. Comput. Sci. & Technol., May 2013, Vol.28, No.3 To achieve high efficiency at the MAC layer in highspeed WLANs and get the best out of aggregation while bounding delay, we propose an analytical optimization model for aggregation called Optimized Packet Aggregation (OPA). As stated above, the main approach of increasing throughput is to aggregate more packets. Since increasing the aggregation size results in longer transmission time and therefore, increasing delay at nodes, the trade-off between throughput and delay is calculated using an accurate analytical model. This model maximizes throughput while preventing delay to increase. In other words, OPA finds the maximum aggregation size that nodes can use such that delay requirements of nodes are not violated. We analytically evaluate OPA in terms of fairness, convergence, and complexity. We show that OPA can attain weighted proportional fairness among nodes while satisfying delay requirements of nodes. Convergence and uniqueness of the optimal solution are also guaranteed by OPA. Besides, OPA does not impose any important complexity on nodes. We implement our model in NS-2 and compare it with the method proposed in [1]. Simulation results show that OPA dramatically decreases average delay while maximizing throughput especially in saturated situations in the presence of a large number of nodes transmitting high-rate traffic. Furthermore, OPA is even successful under dynamic conditions and for various traffic types. The rest of the paper is organized as follows. Section 2 reviews related work. We introduce the analytical model of OPA in Section 3, and discuss its implementation issues in Section 4. Section 5 evaluates algorithmic issues of our model while Section 6 presents detailed simulation results. Finally we summarize our conclusions in Section 7. 2 Related Work Efficiency of high-speed wireless networks can be improved by incorporating features such as aggregation which is the main contribution of methods like burst acknowledgement (Burst ACK) [10], and block acknowledgement (Block ACK), e.g., [1, 5, 11]. Burst ACK transmits a bulk of data frames and receives their corresponding ACK frames by performing only one backoff process. Block ACK enhances Burst ACK by transmitting only a single ACK frame for a series of data frames instead of separate ACK frames, and consequently, results in more overhead reduction. Concatenation (CM) and piggyback (CM) methods [5] further enhance efficiency. CM concatenates multiple frames into a single frame while through PM, the receiver is allowed to piggyback a data frame to the sender if it has data destined for the sender. To improve efficiency more, the AFR scheme [1] introduces a new delimitation mechanism with less overhead compared with [5] which is achieved by a fragmentation technique. A similar enhancement in IEEE e [12] is transmission opportunity (TXOP). Having been obtained through a successful contention, TXOP defines a period of time for a station to transmit multiple data frames without entering the backoff procedure. It reduces the overhead due to eliminating contention and backoff. To respond to the increasing demand for realtime and multimedia applications over wireless, IEEE n was standardized [11]. This standard defines two types of frame aggregation: aggregate MAC service data unit (A-MSDU) and aggregate MAC protocol data unit (A-MPDU) with the maximum size of 64 KB. Although simulation results of [13] demonstrate the effectiveness of the IEEE n MAC layer, the standard does not specify exactly how many packets should be aggregated and how delay requirements are treated. Along with the above proposed schemes, some analytical models were proposed to evaluate performance of aggregation. In [14], a theoretical model is presented to evaluate the saturation throughput for the burst transmission and acknowledgment (BTA) scheme under error channel conditions in the ad hoc mode. Through simulation, the authors tried to find the optimal block size leading to the best performance. Authors in [9] proposed an analytical model to study the performance of IEEE n under uni-directional and bi-directional data transfer. They also numerically proposed an optimal frame size adaptation algorithm with A-MSDU under error-prone channels. Only few researches have targeted limiting the aggregation size to solve problems of wireless networks. The authors of [15] tried to solve the performance anomaly of IEEE multi-rate wireless networks. They introduced a variable transmission time which is similar to TXOP. It is worth mentioning that a similar technique called Data Aggregation [16] is employed in wireless sensor networks with the aim of reducing the size of data transmitted along the aggregation tree towards the sink to save more energy. Size reduction can be performed by methods such as digesting data or compression, and the content of the aggregated packet is not necessarily the concatenation of the received packets forming the aggregated packet. Moreover, nodes may hold packets Network simulator (NS). July 2012.

3 Peyman Teymoori et al.: Delay-Constrained Optimized Packet Aggregation 527 before transmission as long as it is possible to increase aggregation. Studies such as [17] present an analytical method on how long an aggregation packet can be held to increase energy-saving with regard to message delayconstraints. However, our focus in this paper is optimizing Packet Aggregation where packets are only concatenated, not held, and there is no aggregation tree. The above-mentioned researches only focus on how to concatenate packets into a larger frame to reduce the protocol overhead. Although throughput increases due to the elimination of some protocol headers and interframe spaces, the optimal concatenated frame length has not been investigated by these researches. In addition, the length is not exactly calculated based on requirements of nodes such as delay. These two considerations are the bases of our optimization model. 3 Optimized Packet Aggregation 3.1 Network Model We assume that there are n nodes in a single-hop network which are contending for the wireless channel. As the worst case, all nodes are assumed to be saturated. The set of nodes is denoted by N = {1,..., n}. r i denotes the physical data rate of node i. The goal is to maximize the channel throughput by increasing aggregation sizes of nodes without violating their delay constraints. Upon accessing channel, node i aggregates packets up to x i bytes where x i [0, max x ] and max x denotes the maximum aggregation size which depends on the protocol capabilities. This assumption is not related to a particular aggregation method and therefore, any of these methods can be utilized as the underlying aggregation mechanism. Any aggregation method has an overhead caused by headers and frame checksums. In addition, there is an extra overhead imposed by the MAC and physical layers to transmit a packet. Overheads stem from the channel time during which no data is transmitted such as frame headers, checksums, inter-frame spaces such as SIFS and DIFS, control frames such as RTS and CTS, and physical layer preambles [4]. Due to generality, we only consider the total protocol overhead denoted by P OH, in second. Now, we can define the utility function of nodes. In the network context, the more a node accesses the channel, the more profitable this situation is. The term profitable indicates the transmission time of a node. Therefore, the number of packets a node aggregates specifies its duration of accessing the channel and also its profit. Throughput of a node has a direct relation with its number of aggregated packets [1]. In other words, the utility function of node i is an increasing function of its aggregation size, x i. We use a logarithmic function which is strictly increasing as the utility function increases. Behavior of a logarithmic function to its input is similar to a real throughput function of x i and simulation results of [1] approve this. For node i, it is defined as U i (x i ) = ω i log x i, (1) where ω i is the weight of node i. We assume that nodes can be assigned different weights according to their channel access requirements and the level of quality of service determined by the upper layers. Our goal is to maximize the network utility. We define the network utility as U(x) = n i=1 U i(x i ), (2) which is the summation of the utilities of all nodes and x denotes a vector whose elements are x i, i N. We define delay constraints of nodes as the maximum duration that nodes can wait to access the channel. The length of this duration is usually specified by the traffic profile of nodes, and we denote it by d i for node i. Since access to the channel of a wireless network is stochastic, nodes may access to the channel differently but we assume that the channel access mechanism is fair and the expected values of the number of accesses of nodes to the channel are the same. This is the case we have in long term in IEEE Analytically, for each node i we should have B i (x) d i, where B i (x) = (n 1)P OH + j i x j/r j, (3) that determines the time required for the other nodes to transmit their aggregated frames of size x j, and this time should be shorter than or equal to d i. This duration includes protocol overheads of the other n 1 nodes as well. In order to have an upper bound on the sum of aggregation sizes of nodes, as another constraint, we assume: n i=1 x i max aggr, where max aggr denotes the maximum aggregation size of all nodes. We use this constraint mainly for attaining fairness among nodes which will be discussed in detail later. 3.2 Optimization Problem Convex optimization and constraint programming [18] have been used in many engineering applications to reach an optimum situation. They are promising approaches that can maximize a utility function in the

4 528 J. Comput. Sci. & Technol., May 2013, Vol.28, No.3 presence of some constraints. Here, we formulate our problem by convex optimization. Through the Primal Problem, we present the network optimization problem which is centralized and needs all network information. Then, in order to have a distributed version of this optimization problem which is suitable for WLANs, we present its Dual Problem and show how nodes can follow a distributed iterative method to solve the optimization problem Primal Problem We model the optimized packet aggregation problem as following. max U(x), x (4) s.t. B i (x) d i, n i N, (5) x i max aggr, i=1 (6) x : a vector of positive integers. (7) This means that we try to find a vector x which specifies the aggregation size of each node in order to achieve the maximum utility in the network. This is performed by considering (5) as restriction on the aggregation size to meet delay requirements of nodes. Constraint (6) is the upper bound defined on the sum of aggregation sizes. In this subsection, we assume that max aggr is large enough so that the feasible set of constraint shown by (5) is a subset of that of (6). Hence, we neglect this constraint in the following formulation but we will get back to this in the next subsection. Moreover, since the above problem involves integer programming and makes computing the solution complex, we relax it by removing constraint (7). Then, we round the solution to have integer outputs. Simulation results will show that this approximation still gives good results Dual Problem Although problem (4) can be separated among nodes, there are dependencies among constraints over the network. The dependent nature of the problem obligates using a centralized method which imposes extra overhead. In order to have a distributed solution and for the sake of simplicity in designing the channel access protocol, we solve the problem through its dual problem. First, by defining the Lagrangian problem, we take the constraints into account which yields L(x, λ) = U(x) + n i=1 λ i(b i (x) d i ), (8) where λ i is the Lagrange multiplier associated with the i-th inequality constraint and vector λ is called dual variables of problem (4) where λ = (λ i N). Then, the Lagrangian dual function is defined as g(λ) = inf L(x, λ), (9) x which is the maximum value of the Lagrangian over x. The dual function yields lower bounds on the optimal value of the problem (4) (5) [18]. To solve (9), we should find x i such that L(x, λ) x i = 0. (10) Taking the partial derivative of (8) with respect to x i and finding its solution yields x i = ω ir i j i λ j Substituting (11) in (9) obtains ω 1 r 1 g(λ) = ω 1 log (λ 2 + λ λ n ) ω 2 r 2 ω 2 log (λ 1 + λ λ n ) ω n r n ω n log (λ 1 + λ λ n 1 ) + λ 1 (n 1)P OH. (11) λ 1 d 1 + λ 2 (n 1)P OH λ 2 d λ n (n 1)P OH ω 2 λ 1 λ n d n + (λ 1 + λ λ n ) + ω 3 λ 1 (λ 1 + λ 2 + λ λ n ) ω n λ 1 (λ 1 + λ λ n 1 ) + ω 1 λ 2 (λ 2 + λ λ n ) + ω 3 λ 2 (λ 1 + λ 2 + λ λ n ) + + ω n λ 2 (λ 1 + λ λ n 1 ) + ω 1 λ n (λ 2 + λ λ n ) + ω 2 λ n (λ 1 + λ λ n ) + + ω n 1 λ n (λ λ n 2 + λ n ). (12) The Lagrangian dual problem gives an upper bound on the optimal value of the optimization problem. This problem is defined as max g(λ), λ (13) s.t. λ 0. (14)

5 Peyman Teymoori et al.: Delay-Constrained Optimized Packet Aggregation 529 The Lagrangian dual problem (13) (14) is a convex optimization problem, since the objective to be maximized is concave and the constraint is convex. The above problem can be solved by differentiating g(λ) of λ which yields g λ i = (n 1)P OH d i + j i ω j k j λ k As an example, (15) for i = 1 is written as: g λ 1 = (n 1)P OH d 1 +. (15) ω 2 (λ 1 + λ λ n ) + ω 3 (λ 1 + λ 2 + λ λ n ) + + ω n (λ 1 + λ λ n 1 ). (16) Solving g λ i = 0 yields the optimum value which is denoted by λ i, but due to the complexity of (15), we cannot represent a closed-form solution. Then, the optimum point is calculated iteratively. To obtain a distributed solution with low complexity, we solve the dual problem using the gradient projection method [19]. In an unconstrained minimization problem, the gradient projection method iteratively steps toward the opposite direction of the gradient of the objective function. Using the following iterative equation, λ i is calculated for each node i. Therefore, for the dual problem (13) (14), we get [ λ (k+1) i = λ (k) i + γ g ]+, (17) λ (k) i where λ (k) i denotes the value of λ i at iteration k and [z] + = max(z, 0). This means that in each iteration k, the values of λ i are updated and improved. γ denotes the step length. Equation (17) is the decent method which produces a maximizing sequence to solve an optimization problem [18]. By this equation we mean an algorithm that computes a sequence of points λ (0) i, λ (1) i,... dom (g) with g(λ (k) i ) p as k + where dom(g) means the domain of g and p denotes the optimum point of g. The algorithm terminates when p g(λ (k) i ) ɛ, and ɛ > 0 is some specified tolerance. At each iteration, one of the λ i is updated and its new value is used in calculation of the other λ values. This process continues until we reach the ɛ- neighborhood of the optimal λ i. 3.3 Fairness Fairness is one of the fundamental properties of resource sharing systems [19]. Since one of the main applications of high-speed wireless networks is multimedia [20-21], attaining some kind of fairness among nodes is significantly important. In wireless networks based on CSMA/CA, the amount of service each node receives can be differentiated through a variety of parameters such as contention window size and inter-frame space [22]. It is noteworthy that in this paper, we assume that regardless of the service nodes demand, they have delay requirements that should be satisfied as well. There exist different methods for providing service differentiation, and it is of significant importance to consider delay requirements carefully while using any of these methods. Aggregation size determines the duration in which a node can access the channel and it can be also used as one of the service differentiation parameters. Since our approach targets aggregation size to satisfy delay constraints, it can also maintain some form of service differentiation among nodes. We use weight vector ω in utility function (2) as indices of how much resource a user or a class of users is granted. Although each user can have his/her own weight in our model, we consider four priority classes with different weights and assign users to these classes. Moreover, each class has its own delay requirement that determines d i of node i. Clearly, users of the same class have the same weight and delay requirement and they are expected to receive the same channel share. We will discuss more about this in the simulation section. Here, we evaluate fairness properties of OPA under different conditions. First, we present some conditions which will be used later during the discussion on fairness of our approach: C1: ω i = ω j for all nodes i and j. C2: the feasible set of constraint (6) is a subset of the feasible set of constraint (5). C3: the feasible set of constraint (5) is a subset of the feasible set of constraint (6). C4: r i = r j for all i and j. Through the following definitions and lemmas, we establish the necessary background to examine the fairness of OPA. Definition 1 (Weighted Proportional Fairness [23] (WPF)). An allocation vector x is proportionally fair if and only if, for any other feasible allocation y, we have n ω y i x i i 0. (18) i=1 x i Lemma 1 (Optimality Condition [19] ). If x is the solution of maxf(x), where f( ) is continuously differentiable, then (x x ) f(x ) 0.

6 530 J. Comput. Sci. & Technol., May 2013, Vol.28, No.3 Lemma 2. Utility function (2) satisfies (18). Proof. From Lemma 1 we have ( )) n (x x ) U i(x i 0. (19) i=1 x Applying on the utility function yields (x x ) n i=1 U i (x i ) x 0. (20) x i After taking derivative of each U i, finding the value at point x, and some modifications we have n i=1 ω i y i x i x i 0, (21) which shows that (2) satisfies (18). Now, through the following theorem, we can show how OPA maintains fairness under C2. Theorem 1. Under condition C2, OPA attains weighted proportional fairness among nodes. Proof. From Lemma 2 we can see that the utility function of OPA satisfies WPF condition (18). Since C2 holds, we can neglect constraint (5), and only constraint (6) remains. By solving the optimization problem we get x i = ω i max aggr n ω, (22) j j=1 meaning that each node is assigned an aggregation size proportional to its weight. Therefore, under condition C2, our approach attains weighted proportional fairness. Theorem 2. Under conditions C1 and C2, OPA attains proportional fairness. Proof. As a direct result of Theorem 1 we can observe that assuming condition C1 changes (18) to the required condition of proportional fairness and as a result, (18) changes to proportional aggregation size assignment. Therefore, we have x i = x j = 1 n max aggr for all i and j. Theorems 1 and 2 indicate that when nodes do not have strict delay requirements or there is no constraint, OPA attains WPF among nodes. Hence, nodes can be easily differentiated based on the service they receive. In the rest of this subsection, we will discuss about delay-constrained networks and how OPA operates under this condition. First, we start by presenting a definition. Definition 2 (Delay-Constrained WPF). An aggregation size allocation vector x is delay-constrained weighted proportionally fair if and only if it satisfies both WPF condition (18) and constraint (5). The attained fairness is called Delay-Constrained WPF (DCWPF). It can be observed that a DCWPF allocation vector x satisfies (18) as the result of WPF. The only difference is that (22) is not necessarily valid for elements x i. In other words, DCWPF does not necessarily allocate aggregation sizes exactly proportional to weights of nodes; instead, it tries to proportionally increase allocated sizes of more weighted nodes as long as delay constraints of the other nodes are not violated. Now, let us see how OPA attains fairness under the new condition. Theorem 3. Under condition C3, OPA attains DCWPF. Proof. According to Lemma 2, it can be verified that utility function (4) satisfies (18). Since C3 holds, the solution of OPA, denoted by x, does satisfy constraint (5). Therefore, according to the definition of DCWPF, x is delay-constrained weighted proportionally fair and as a result, OPA attains DCWPF under C3. As stated before, one of the results of condition C3 is that x i /x j is not exactly proportional to ω i /ω j. On the other hand, d i and d j have a direct impact on the proportion of x i /x j. In the next propositions, we discuss a number of possible situations and their fairness properties according to the OPA implementation which will be presented later. Proposition 1. Let (x i, i N) be the primal optimal aggregation size allocation vector. For any two nodes i and j under condition C4, 1) if they have the same delay requirements and weights, i.e., d i = d j and ω i = ω j, then x i = x j ; 2) if d i d j and ω i = ω j, then x i x j ; 3) if d i = d j and ω i ω j, then x i x j. Proof. 1) According to the complementary slackness, as one of the Karush-Kuhn-Tucker (KKT) [18] conditions, we have λ i (B i (x ) d i ) = 0 for all i. Since the problem is symmetric (condition C4), both λ i and λ j are either zero or greater than zero. In the first case and according to (11), we have x i = x j. In the second case, we have B i (x ) d i = B j (x ) d j. (23) Since d i = d j and ω i = ω j, after some manipulation (23) yields x i = x j. 2) Similar to the above argument and according to (23), if d j increases to values larger than d i, B j should be increased to hold the equality. There is only one term in B j that is different from those in B i, and this term is x i. Therefore, we should have x i x j for equality (23) to hold. This proves the claim. 3) Similarly, if ω i increases in (23) and in order to

7 Peyman Teymoori et al.: Delay-Constrained Optimized Packet Aggregation 531 hold the equality, we should have ω j k j λ k = ω i k i λ k. (24) Therefore, we have λ i λ j. Applying this inequality and ω i ω j on (11) yields x i x j. Remark 1. If condition C4 does not hold, some changes in the values of x i may happen. Since x i has a direct relationship with r i, increasing it to r i where r i = αr i results in aggregation size x i = αx i. Therefore, considering this relationship between x i and r i can extend Proposition 1 for situations where C4 does not hold. In addition to the situations discussed in the previous proposition, some others may happen in the network, for example, how long delay less-constrained or more-weighted nodes experience using OPA. Proposition 2. 1) Less-constrained nodes may experience shorter delay than their maximum tolerable amount determined by d i. 2) More-weighted nodes may experience shorter delay than their maximum tolerable amount. Proof. 1) According to the duality theory, Lagrangian multipliers of the constraints that are not completely satisfied are zero. The duality gap of less constrained nodes are only zero where B i (x) = d i. Since the equality is only achievable if the other nodes can increase their aggregation sizes and this cannot be done due to violating the constraints of more constrained nodes, the duality gap occurs which as a result yields B i (x) < d i. This means that nodes except i cannot occupy the channel as long as d i and node i experiences shorter delay than d i. 2) Let x i denote the aggregation size vector of nodes except node i. According to Proposition 1, increasing the weight of node i results in larger values of x i and smaller values of x i to meet delay requirements. Since B i (x) only depends on x i and we can denote it by B i (x i ), it decreases consequently meaning that it may become smaller than d i. So far, we examined what happens to the optimal allocation vector as the consequence of changing weights. Since DCWPF does not necessarily share the channel exactly proportional to weights, in some situations we might need to know if we can assign weights to a number of delay-constrained nodes such that a desired proportion (allocation vector) is attained. In other words, given an allocation size vector, we might aim to obtain its associated weight vector. To show that if this is possible under OPA, first, through the following definitions we establish the necessary terminology. Then, we prove a theorem that shows it is possible to find such a weight vector. Definition 3 (Feasible Vector). An aggregation size allocation vector is feasible if it satisfies constraints (5) and (6). Definition 4 (Attainable Vector). An aggregation size allocation vector x is attainable if x is primal optimal for problem (4) (6). Definition 5 (Completely Satisfied Constraint). A constraint B i is completely satisfied if B i (x i ) = d i. Therefore, no element x j in x i can be increased without violating the constraint. Theorem 4. Any feasible aggregation size allocation vector x is attainable through an appropriate weight vector ω provided that each x i participates in at least one completely satisfied constraint. Proof. The condition on completely satisfied constraints guarantees that no increase can be done in all x i because we need to maximize utility function (4) and the iterative equation (17) should converge to the maximum point. In order to prove the theorem, we need to show that an appropriate vector ω exists for any x. Since our utility function and constraints are convex, if we can find λ and ω such that the KKT sufficient conditions hold, then x is attainable (globally maximum). To hold the complementary slackness, we should have λ i (B i(x) d i ) = 0 for each constraint i. For the constraints that are not completely satisfied, we have λ i = 0. Using (11) we have n relations among ω i and λ i variables where all x i are known. Now, we should find the answer of these relations for ωi and λ i where λ i is not greater than zero for constraints that are not completely satisfied. The obtained ω from the answer of the above relations makes x attainable. The above theorem shows that we can design the OPA protocol such that it converges to any arbitrary aggregation size allocation vector that guarantees satisfaction of delay constraints. Further, since we differentiate service based on the aggregation size (the time a node captures the channel), any service allocation strategy would be available (attainable) for nodes. 4 Implementation Using OPA, nodes should follow a distributed approach to compute their optimal aggregation sizes. In this case, each node only knows its delay requirement (d i ), physical rate (r i ), protocol overhead (P OH ), and weight (ω i ). As (15) shows, each node also requires λ, the number of nodes (n), and ω in order to solve the iterative (17). Nodes can guess the number of nodes contending for the channel by listening to transmissions in the channel

8 532 J. Comput. Sci. & Technol., May 2013, Vol.28, No.3 and extracting their IDs (node identifiers). In addition, nodes need some information about the others. For this reason, two particular fields are considered in the MAC header of the protocol. A 4-byte field, called LM (Lagrange Multiplier), is considered to carry λ i. Moreover, a 1-byte field called W (weight) is added to the header to carry ω i. Each node i calculates the latest value of its λ i right before transmission and sets the fields of LM and W by their corresponding values. The receiving node and the other listening nodes extract the values of these fields and update their local information regarding the transmitting node. As another useful feature for dynamic environments, we assume that nodes determine whether they have more backlogged packets in their MAC queues through a particular field. Protocols such as IEEE n support this feature. Therefore, nodes can only consider Active nodes (nodes with backlogged packets) in their future calculations. We call this field A (active). This field can be also used to ignore inactive nodes such as those in the sleep mode. Each node i considers λ j in (11) if node j is active. If node j wins the contention and transmits a data frame after a while, the other nodes can consider λ j in their calculations from now on. It is worth noting that we assume that nodes are saturated most of the time and the period during which they are idle or active is not short (e.g., less than 1 second). In this case, nodes have enough time to converge to the new condition. We will discuss more about how our approach operates in dynamic environments in Section 6. We also consider the case where a node is suddenly disconnected from the network due to any reasons while it still has backlogged packets. This can happen due to the mobility of the user as well. Since the node cannot set its active field to 0, the other nodes may consider its information in their calculations which results in delay deviation from desired delay constraints. Although this problem might be rare, to cope with this, we assume that nodes periodically set the active column of a node to 0 if they do not hear any frames from it for a duration longer than an inactive threshold (e.g., 1 2 seconds depending on the number of nodes and the physical rate). The threshold is determined long enough such that at least one transmission from a node in that duration is guaranteed in order not to ignore an active node, and short enough to detect inactive nodes as fast as possible. Each node maintains the aforementioned information about the other nodes as a four-column list called NI List. Columns are ID, LM, W, and A (indicating if the node is active), respectively. As the communication proceeds and data frames are transmitted, each node extracts the information and updates its NI List. This process continues until all nodes reach the optimal value of λ, and as a results of (11), the optimal aggregation sizes. Regardless of the weight and activeness of nodes, the only value that should be transmitted is λ. This value implicitly consists of all information required to find an optimal solution like node physical rate, delay requirements, and the current state of nodes. Therefore, transmitting the entire parameters of nodes is not required. Algorithm 1 shows pseudo-code of this process for each node. Algorithm 1. OPA Algorithm for Node i 1: procedure Initialize 2: λ i 1 3: ω i Initial Weight 4: NI List Null 5: end procedure 6: procedure Listen/Receive(p: DataFrame) 7: if p.type = DATA FRAME then 8: Update NI List(p.ID, p.lm, p.w, p.a) 9: end if 10: ProcessReception(p) Rest of processing 11: end procedure 12: procedure Send(p: DataFrame) 13: if p.type = DATA FRAME then [ ] + 14: λ (k+1) i λ (k) i + γ g 15: x i ω i r i j i,a j =1 λ j λ (k) i 16: x i round(min(max(x i, x min), x max)) 17: p.lm λ (k+1) i 18: p.w ω i 19: if MAC.queue Null then 20: p.a 1 21: else 22: p.a 0 23: end if 24: Aggregate(p, x i) Put at most x i bytes in p 25: k k : end if 27: ActualSend(p) 28: end procedure Since due to physical layer limitations, arbitrary large frame sizes in wireless channel are not possible [1], we use a boundary guard for x i in Algorithm 1. That is, if x i is out of the supported range of the frame size, we assign the lower or upper bound to x i. In Algorithm 1, we denote these two parameters by x min and x max. As shown by the algorithm, nodes initialize their local variables at first. Upon receiving any data frame,

9 Peyman Teymoori et al.: Delay-Constrained Optimized Packet Aggregation 533 they extract its LM, W, and A fields and update their local lists. When a node is about to transmit a data frame, it calculates λ i based on the latest λ values it has received. Now, x i can be obtained by only considering λ values of active nodes in its calculation. Then, values of the LM, W, and A fields are set and, finally, the aggregated frame is transmitted. 5 Evaluation In this section, we evaluate complexity and convergence of OPA. Since OPA is a distributed approach, it should be efficient in terms of time and message complexity. Further, nodes need to keep transmitting for a while to reach the optimal point. Therefore, we will examine its convergence as well. 5.1 Algorithm Complexity According to the OPA algorithm, time complexity of OPA is O(n 2 ). Each node i should compute the value of (17) in order to update λ i. The only time-consuming part of this formula is calculating g λ i. Equation (15) can be used to find this value for node i. For instance, (16) shows this calculation for node 1. From this, it is obvious that there are n 1 fractions and each of them adds n 1 values. Therefore, the time complexity of OPA is O(n 2 ). OPA does not impose any extra messaging overhead because each node informs the other nodes of its local information (mainly its λ i ) only through the LM field in the MAC header of a data frame. Then, no other specific frame is required. The only overhead is four bytes in the MAC header and since the aggregated frame length is large (up to 64 KB in IEEE n [11] ), a very small fraction of the packet is used for this matter. Furthermore, we use one byte for weight which is insignificant as well. Since time complexity of OPA is not high because the number of nodes is usually small and OPA does not impose any message complexity, the overhead of OPA is insignificant. This means that nodes need not to worry about energy consumption. 5.2 Convergence An important issue regarding OPA is its convergence to the optimal point, i.e., the aggregation size leading to maximum throughput while taking delay constraints into account. In the context of optimization, behavior of the target function is important especially when the function has multiple local maxima. If a function is strictly concave/convex, it definitely has a unique maximum/minimum point. The next theorem investigates the primal problem for this condition. Theorem 5. The primal problem (4) (5) is strictly concave and admits a unique maximization. Proof. To establish the concavity condition, first we prove that the utility function expressed as (1) is concave. Taking the second derivative of U i (x i ) proves that U i (x i ) is concave if and only if 2 U i (x i ) x i 2 < 0. Taking the second derivative of U i (x i ) yields 1 x i 2 < 0, which proves that every utility function is concave. According to (2), the network utility, U(x), is a nonnegative and non-zero weighted sum of strictly concave functions, and consequently, it is strictly concave. Constraint (5) is an affine function, and therefore, it is convex. Since the feasible set of the optimization problem (4) and (5) is compact and its objective is strictly concave, the optimal solution exists and it is unique as a consequence of concavity. Further, there is no local maximum but the global one. In the next theorem, we examine why the primal problem results in the optimum condition while satisfying delay constraints. Theorem 6. The problem (4) approximates the network throughput but constraint (5) exactly specifies the aggregation size. Proof. Assume that there are two nodes one of which sends packet and the other receives them. According to the throughput relation presented by [2], for high physical rates, we have T cx i where T, c, and x i denote the throughput, a constant, and the number of aggregated packets, respectively. This means that throughput has approximately a linear relationship with x i. This yields cx i > x i > log x i = U(x i ). For a number of n nodes, we have n i=1 cx i > n i=1 x i > n i=1 log x i = U(x). This means that problem (4) finds a lower bound for throughput. Since constraints (5)exactly specify how much nodes can tolerate delay in terms of the aggregation size of the other nodes and the optimization process finds the maximum value of x which satisfies these constraints, the result is the accurate possible value for x. Step length is one of the parameters of the dual problem (13) that has a significant importance in its convergence to the optimal point. We proved that this

10 534 J. Comput. Sci. & Technol., May 2013, Vol.28, No.3 problem has a unique optimal point. Now, through the following theorem we show a sufficient condition on the step length under which the OPA algorithm convergences to the optimal point. Theorem 7. Assume that step length γ is chosen such that 0 < γ 2 Ω where Ω = max n 1 j n i=1 k i,j ω k ( l k λ l) 2, then starting from any initial point, the generated sequence (λ (k) ) is dual optimal leading to the primal optimal solution of problem (4) (6). Proof. According to the decent lemma for the gradient-based optimization of a function g(λ) with constant step length, if g(λ) holds the Lipschitz Continuity property, i.e., there exists M such that for any two arbitrary vectors λ and λ in the domain we have g(λ ) g(λ ) M λ λ 2, then the sequence (λ (k) ) obtained from λ (k+1) = λ (k) + γ g(λ) converges to the optimal point provided that ɛ γ 2 ɛ M for some ɛ > 0. To prove the theorem, we need to find M such that the Lipschitz Continuity property holds for g(λ), and it is sufficient to show that the Hessian of g(λ) is upper bounded in l 2 -norm. The Hessian of g(λ) is defined as H = [h ij ] n n where h ij = 2 g(λ) λ i λ j. Taking derivative of (12) with respect to λ i and λ j yields h ij = k i,j ω k ( l k λ l) 2. According to the fact that in linear algebra we have H 2 2 H 1 H, we can find the upper bound of Hessian. Hence, we have H 1 = max 1 j n = max n i=1 h ij n 1 j n i=1 k i,j ω k ( l k λ l) 2 and since H is symmetric, H 1 = H and consequently H 2 H 1. Therefore, for sufficiently small ɛ we have 0 < γ max 2 n 1 j n i=1 k i,j which proves the theorem. ω k ( l k λ l) 2 6 Simulation Results In this section, we examine the performance of OPA through simulation. The main goal of OPA is constraining delay while maximizing throughput in static and even dynamic environments with variable number of nodes. The service differentiation capability of OPA is evaluated as well. We use the AFR implementation which was performed in NS as the base aggregation method and enhance it by our approach. Our implementation is performed in NS-2 as well. The simulated network topology is a single-hop network of homogeneous nodes where node i sends packets to node i + 1. Simulation results are the average of 10 different runs with unique random seeds and confidence level of 95%. Confidence intervals of throughput, peak delay, and average delay are no more that 1 Mbps, 0.04 second, and second, respectively. The simulation time is 10 seconds which is long enough for nodes to reach a stable behavior. In all simulation scenarios, AFR uses the maximum aggregation size, i.e., 64 KB, which leads to the maximum achievable throughput. On the contrary, OPA optimizes its aggregation size based on network parameters such as delay requirements. In additions, the two approaches are examined for two different types of traffic, CBR and HDTV, which are requirements of high-speed WLANs [6]. The network performance is evaluated by calculating the following metrics: throughput : the rate at which the network can transmit packet at the MAC layer. In particular, the value of this metric represents the total number of bits of data transmitted in the wireless channel over the transmission time. average delay : the average delay a packet experiences when it is in the head-of-line aggregated frame in the MAC queue until the nodes can access the channel. peak delay : the maximum delay a packet experiences is measured for each node, and this metric is equal to the average of peak delay of nodes. power : the ratio of the achieved throughput over the average delay. 6.1 CBR Traffic One type of traffic which is used to examine OPA is CBR. It generates UDP packets with size B at a constant rate equal to the physical rate. The packet generation rate is high enough to saturate nodes. It is noteworthy that this is the worst condition under which OPA can operate because CBR rate is very li/afr.html, July Network simulator (NS). July 2012.

11 Peyman Teymoori et al.: Delay-Constrained Optimized Packet Aggregation 535 high and nodes may be heavily backlogged and only very large aggregation sizes can help transmit the backlogged packets faster. Two different scenarios utilizing CBR are implemented. In the first one, different number of nodes with d i = second use CBR traffic to send packets to their destinations. The number of stations varies from 10 to 30. Results of this scenario are shown in Figs These figures show throughput, peak delay, average delay, and power, respectively, for a number of physical rates which are shown in the figures by AFR- X of OPA-X where X denotes the rate in Mbps. Larger aggregation sizes increase throughput more. On the other hand, average delay increases as well due to the longer access time to the media. Referring to Fig.1, since OPA limits the aggregation size, its throughput decreases but the amount of decrease is insignificant for lower physical rates. In the presence of 30 nodes at rate 300 Mbps, OPA requires to constrain nodes more to satisfy their delay requirements. This, as a result, decreases the network throughput at most 25 Mbps. On the contrary, results of Fig.2 show that OPA is successful is satisfying delay requirements of second. No matter how many nodes in the network are or what the physical rate is, the average delays of nodes meet their requirements. As can be seen, AFR averages much higher delays than OPA especially for lower rates and its value is sensitive to the number of nodes and the physical rate. Fig.3 shows peak delay results of the above scenario. Peak delay heavily depends on the aggregation size because larger sizes introduce larger variations in delay. Referring to the figure, OPA limits the peak delay for any number of nodes and physical rates. However, using AFR, nodes face serious problems since peak delay increases dramatically. As one of the main problems of protocols based on IEEE , short-term unfairness intensifies delay variance because nodes tend to recapture the channel more after a successful access due to resetting their contention window size. Therefore, larger aggregation sizes lengthen the time that takes a node to access the channel. As shown by the figure, 30 nodes using AFR with rate 50 Mbps may experience delay close to 0.9 second which is not tolerable by most of applications [6]. Increasing the physical rate can mitigate the problem of AFR but peak delay is still sensitive to the number of nodes. As shown in the figure, OPA can successfully bound peak delay as the result of bounding average delay. Fig.1. Network throughput of OPA and AFR for various number of nodes. Fig.2. nodes. Average delay of OPA and AFR for various number of Fig.3. Peak delay of OPA and AFR for various number of nodes. Since limiting the aggregation size decreases throughput, a question arises that whether the whole result is beneficial. To answer this, we measure the power of the above scenario and its results are illustrated in Fig.4. Referring to this figure, power of AFR decreases as fast as the number of node increases in the network. OPA, in comparison with AFR, achieves much higher power. Besides, its power decreases more slowly as more nodes are added to the network. It means that the amount of delay decrease is much larger than throughput decrease in OPA, and therefore, OPA is more beneficial in general. In addition, if we use peak delay instead of the average delay in calculating

12 536 J. Comput. Sci. & Technol., May 2013, Vol.28, No.3 power, OPA can achieve even more power than AFR for various parameters. Fig.7. Average delay of OPA and AFR for various physical rates. Fig.4. Power of OPA and AFR for various number of nodes. To examine the effects of high physical rates on OPA, in the second scenario, the number of nodes is fixed to 20 and 40, and the physical rate varies from 100 Mbps to 600 Mbps. Nodes have delay requirements of second. Performance results of this scenario are presented in Figs Fig.5. Throughput of OPA and AFR for various physical rates. Fig.6. Peak delay of OPA and AFR for various physical rates. The main means to reduce the protocol overhead for higher physical rates is using larger aggregation sizes [4]. Referring to Fig.5, AFR can reach throughput values of 438 Mbps and 345 Mbps for 20 and 40 nodes, respectively, using the maximum aggregation size for the maximum physical rate, i.e., 600 Mbps. As OPA needs to limit the aggregation size to bound delay, its throughput values are 425 Mbps and 304 Mbps, respectively, for rate 600 Mbps as the worst case. It means that OPA can meet delay requirements at the cost of at most 1 Mbps throughput decrease per node. However, as illustrated by Figs. 6 and 7, it can at least halve the values of peak and average delay for this physical rate. Moreover, referring to these figures, lower rates introduce longer delays that can be bounded by OPA while throughput decrease of OPA for lower rates is much lower than that of higher rates. It is worth noting that in this scenario, nodes generate CBR traffic at their physical rate as the worst case, i.e., one node can saturate the network. As it will be shown, OPA achieves closer throughput to those of AFR where nodes generate traffic with rates lower than their physical rate such as the case in HDTV traffic. 6.2 HDTV Traffic Supporting HDTV traffic is one of the requirements of high-speed wireless LAN protocols such as IEEE n [11]. It has a rate of Mbps of constantsize packets and a 200 ms peak delay requirement. In the next scenario, we investigate the performance of OPA and AFR for HDTV traffic. The number of nodes varies from 10 to 30 with physical rates 100 Mbps and 250 Mbps. Each node has one HDTV flow, and due to the importance of peak delay for HDTV, we set nodes delay requirements such that their peak delay is at most 200 ms. Fig.8 shows throughput of the two schemes. In comparison to the CBR traffic, throughput decrease of OPA in this case is much lower than that of OPA in CBR traffic because in this case nodes only send HDTV traffic of rate 19.2 Mbps. However, in the CBR scenario, nodes are sending traffic at their physical rate and the network is fully saturated. As it can be observed from

13 Peyman Teymoori et al.: Delay-Constrained Optimized Packet Aggregation 537 the figure, throughput decrease of OPA is insignificant even for a large number of nodes. Fig.8. Throughput of HDTV traffic over OPA and AFR for various number of nodes. impossible. Therefore, fast convergence to the optimum size is very important. To investigate OPA in a dynamic network, we test it with a number of nodes sending the CBR traffic at rate of 250 Mbps with d i = second. Then, nodes start transmission at time zero and keep sending. In Fig.10, we measure the average aggregation size of nodes at every 0.1 second. The optimal aggregation size of each number of nodes is drawn in the figure. It can be observed that the 10-node topology converges fast to its optimum size. As the number of node increases, the convergence process takes longer time, but it is noted that after 0.6 second, the difference between the optimal and the actual aggregation sizes decreases to less than 2 KB for all topologies. The main advantage of OPA in this scenario is bounding peak delay of the HDTV flows. Referring to Fig.9, OPA averages 200 ms peak delay for any number of nodes with rates of 100 Mbps and 250 Mbps meaning that with an insignificant decrease in throughput, many HDTV flows can be transmitted in the network. On the contrary, almost all peak delay values of AFR are larger than those of OPA implying that no more than 10 HDTV flows can be transmitted simultaneously by AFR with rates lower than 250 Mbps. Fig.10. Aggregation size convergence of OPA at the network start time. In the next scenario, we assume that the network of the previous scenario is operating under a stable condition, i.e., nodes have reached the optimum aggregation size, and then, some nodes leave the network. Results of this scenario are illustrated in Fig.11 which shows the average aggregation size of nodes from second 5 to second 6. At second 5, five nodes leave the network and consequently, the optimum aggregation size changes Fig.9. Peak delay of HDTV traffic over OPA and AFR for various number of nodes. 6.3 Dynamic Networks One of the main challenges of the protocols like OPA is their behavior in dynamic environments. The OPA algorithm needs a number of iterations to reach the optimum aggregation size. If the convergence process takes a long time, delay requirements of nodes cannot be satisfied. In addition, in a very dynamic network, nodes may join or leave the network, start transmission or stop it after a while, and become idle. In these cases, convergence to the optimum aggregation size might be Fig.11. Aggregation size change of OPA at second 5.

14 538 J. Comput. Sci. & Technol., May 2013, Vol.28, No.3 from 46 KB to 64 KB, 22 KB to 36 KB, and 14 KB to 21 KB, for 10-node, 20-node, and 30-node topologies, respectively. Referring to the figure, the aggregation size of each topology converges to the new optimum size fast after the change happens. In this case, after approximately 0.4 second the difference between the optimal and the actual aggregation sizes decreases to less than 2 KB. 6.4 Service Differentiation Here, we investigate the capability of OPA in performing service differentiation among nodes. In the first scenario, there are a number of nodes with delay requirements of second and the physical rate of 250 Mbps. Nodes are categorized into four priority classes: Class 0, Class 1, Class 2, and Class 3, with weights of 8, 4, 2, and 1, respectively. Weights of nodes of the same class are equal. In Fig.12, throughput of each class is shown for various number of nodes. In the 8-node topology, the optimum aggregation sizes of the classes are 97 KB, 53 KB, 29 KB, and 16 KB, respectively. Since a 97 KB size is bounded by 64 KB in the OPA algorithm, throughputs of Class 0 and Class 1 are approximately the same. As the number of nodes increases, nodes of each class reach totally different aggregation sizes which are approximately proportional to their weights while meeting the delay requirement. In the 12-node topology, the optimum aggregation sizes are 56 KB, 29 KB, 15 KB, and 8 KB, respectively and their throughputs are approximately proportional to the weights. The throughput curves in the figure decrease for a larger number of nodes since collision increases, but OPA still keeps the desired proportions among classes. Fig.12. Per-class throughput of OPA for 4 weighted classes. In the next scenario, each priority class has a different delay requirement shown in Fig.13, in second. The same as before, in the 8-node topology the optimum aggregation sizes are larger than 64 KB, and therefore, they are bounded by 64 KB. Hence, the perclass throughput values of the classes are the same. In the 12-node topology, the optimum sizes are 53 KB, 42 KB, 38 KB, and 38 KB, respectively. Sizes of classes Class 2 and Class 3 are the same according to Proposition 2 because the aggregation size of Class 3 can be increased without affecting constraints, and this situation remains for the other topologies. We also observe throughput decrease for topologies with more nodes. Fig.13. Per-class throughput of OPA for 4 classes with different delay requirements. 7 Conclusions One of the recent requirements of wireless networks is providing high-speed data transmission and supporting multimedia traffic. There are some approaches that increase the efficiency of the MAC layer through aggregating packets and reducing the protocol overhead. However, the main drawback is that aggregation increases delay (jitter and peak delay) dramatically which is intolerable by multimedia applications. In this paper, in order to achieve high efficiency at the MAC layer of these networks while solving the delay increase problem, we proposed an analytical model of the wireless medium access, Optimized Packet Aggregation (OPA), which suggests the optimized aggregation size for nodes. This model, as the main parameter of optimizing, considers delay requirements of nodes and permits nodes to transmit only a particular amount of aggregated data such that delay constraints of nodes are satisfied. To evaluate the proposed model, we extended the AFR implementation in NS-2. Simulation results indicate that OPA dramatically decreases the network average delay while maximizing throughput especially in saturated situations in the presence of a large number of nodes and high physical rates. OPA bounds delay with a very small cost of decreasing throughput since it limits the aggregation size to constrain delay. Moreover, OPA can successfully share the channel proportional

15 Peyman Teymoori et al.: Delay-Constrained Optimized Packet Aggregation 539 to weights while meeting delay requirements. We call this new kind of fairness Delay-Constrained Weighted Proportional Fairness (DCWPF). We also proved the convergence condition of OPA and show that its complexity in terms of time and message is very low. Results also show that under dynamic environments, OPA can reach the new optimal condition fast. As future work, we will try to extend the analytical model to consider different aspects like the channel error rate and traffic patterns of nodes. Moreover, experimental evaluation of the protocol on real IEEE n testbeds is of our interest. References [1] Li T, Ni Q, Malone D, Leith D, Xiao Y, Turletti T. Aggregation with fragment retransmission for very high-speed WLANs. Trans. Networking, 2009, 17(2): [2] Xiao Y. IEEE n: Enhancements for higher throughput in wireless LANs. IEEE Wireless Communications, 2005, 12(6): [3] IEEE WG. Part 11: Wireless LAN medium access control (MAC) and physical layer (PHY) specification. Standard, IEEE, Aug [4] Xiao Y, Rosdahl J. Performance analysis and enhancement for the current and future IEEE MAC protocols. ACM SIGMOBILE Mobile Computing and Communications Review, 2003, 7(2): [5] Xiao Y. IEEE performance enhancement via concatenation and piggyback mechanisms. IEEE Transactions on Wireless Communications, 2005, 4(5): [6] Stephens A P, Bjerke B, Jechoux B et al. IEEE P Wireless LANs: Usage models, IEEE /802r23, May [7] Raptis P, Vitsas V, Paparrizos K. Packet delay metrics for IEEE distributed coordination function. Mobile Networks and Applications, 2008, 14(6): [8] Carvalho M M, Garcia-Luna-Aceves J J. Delay analysis of IEEE in single-hop networks. In Proc. the 11th IEEE International Conference on Network Protocols, Nov. 2003, pp [9] Lin Y, Wong VWS. Frame aggregation and optimal frame size adaptation for IEEE n WLANs. In Proc. IEEE Global Telecommunications Conf., Nov. 27-Dec. 1, 2006, pp.1-6. [10] Vitsas V, Chatzimisios P, Boucouvalas A C et al. Enhancing performance of the IEEE distributed coordination function via packet bursting. In Proc. IEEE Global Telecommunications Conference Workshops, Nov. 29-Dec. 3, 2004, pp [11] IEEE. IEEE n-2009: Amendment 5: Enhancements for higher throughput. Standard, IEEE, ieee.org/findstals/standard/802.11n-2009.html [12] IEEE. IEEE e-2005-IEEE standard for information technology Local and metropolitan area networks Specific requirement Part 11: Wireless LAN medium access control (MAC) and physical layer (PHY) specifications Amendment: Medium access control (MAC) quality of service enhancements. Standard, IEEE, 2005, html. [13] Wang C Y, Wei H Y. IEEE n MAC enhancement and performance evaluation. Mobile Networks and Applications, 2009, 14(6): [14] Li T, Ni Q, Xiao Y. Investigation of the block ACK scheme in wireless ad hoc networks. Wireless Communications and Mobile Computing, 2006, 6(6): [15] Razafindralambo T, Lassous I G, Iannone L, Fdida S. Dynamic packet aggregation to solve performance anomaly in wireless networks. In Proc. the 9th MSWiM, Oct. 2006, pp [16] Fasolo E, Rossi M, Widmer J, Zorzi M. In-network aggregation techniques for wireless sensor networks: A survey. IEEE Wireless Communications, 2007, 14(2): [17] Wu K, Liu C, Xiao Y, Liu J. Delay-constrained optimal data aggregation in hierarchical wireless sensor networks. Mobile Networks and Applications, 2009, 14(5): [18] Boyd S P, Vandenberghe L. Convex Optimization. Cambridge University Press, [19] Levy H, Avi-Itzhak B, Raz D. Principles of fairness quantification in queuing systems. In Lecture Notes in Computer Sciences 5233, Kouvatsos D (ed.), Springer-Verlag, 2011, pp [20] Singh M, Edwards B, Al E. System description and operating principles for high throughput enhancements to IEEE /0870r, [21] Mujtaba S A. IEEE P wireless LANS: TGn sync proposal technical specification. IEEE /8890r0, August [22] Kumar S, Raghavan V, Deng J. Medium access control protocols for ad hoc wireless networks: A survey. Ad Hoc Networks, 2006, 4(3): [23] Le Boudec J Y. Rate Adaptation, Congestion Control and Fairness: A Tutorial. Ecole Polytechnique Federale de Lausanne (EPFL), Dec Peyman Teymoori received the B.S. and M.S. degrees in computer engineering from Ferdowsi University of Mashhad and Amirkabir University of Technology, Iran, in 2001 and 2004, respectively. He is currently working toward the Ph.D. degree in computer engineering in the School of Electrical and Computer Engineering at University of Tehran from His current research interests include computer networks, algorithmic aspects of wireless ad hoc networks, protocol design, and evaluation of protocols for wireless networks. Nasser Yazdani got his B.S. degree in computer engineering from Sharif University of Technology, Tehran, Iran. He worked in Iran Telecommunication Research Center as a researcher and developer for a few years. To pursue his education, he entered to Case Western Reserve University, USA, and graduated with a Ph.D. degree in computer science and engineering. Then, he worked in different companies and research institutes in USA. He joined the School of Electrical and Computer Engineering of University of Tehran, in September 2000 and now he is a full professor. His research interest includes networking, packet switching, access methods, operating systems and database.

Impact of IEEE MAC Packet Size on Performance of Wireless Sensor Networks

Impact of IEEE MAC Packet Size on Performance of Wireless Sensor Networks IOSR Journal of Electronics and Communication Engineering (IOSR-JECE) e-issn: 2278-2834,p- ISSN: 2278-8735.Volume 10, Issue 3, Ver. IV (May - Jun.2015), PP 06-11 www.iosrjournals.org Impact of IEEE 802.11

More information

SENSOR-MAC CASE STUDY

SENSOR-MAC CASE STUDY SENSOR-MAC CASE STUDY Periodic Listen and Sleep Operations One of the S-MAC design objectives is to reduce energy consumption by avoiding idle listening. This is achieved by establishing low-duty-cycle

More information

Investigating MAC-layer Schemes to Promote Doze Mode in based WLANs

Investigating MAC-layer Schemes to Promote Doze Mode in based WLANs Investigating MAC-layer Schemes to Promote Doze Mode in 802.11-based WLANs V. Baiamonte and C.-F. Chiasserini CERCOM - Dipartimento di Elettronica Politecnico di Torino Torino, Italy Email: baiamonte,chiasserini

More information

CHAPTER 5 PROPAGATION DELAY

CHAPTER 5 PROPAGATION DELAY 98 CHAPTER 5 PROPAGATION DELAY Underwater wireless sensor networks deployed of sensor nodes with sensing, forwarding and processing abilities that operate in underwater. In this environment brought challenges,

More information

An Efficient Scheduling Scheme for High Speed IEEE WLANs

An Efficient Scheduling Scheme for High Speed IEEE WLANs An Efficient Scheduling Scheme for High Speed IEEE 802.11 WLANs Juki Wirawan Tantra, Chuan Heng Foh, and Bu Sung Lee Centre of Muldia and Network Technology School of Computer Engineering Nanyang Technological

More information

Expanding the use of CTS-to-Self mechanism to improving broadcasting on IEEE networks

Expanding the use of CTS-to-Self mechanism to improving broadcasting on IEEE networks Expanding the use of CTS-to-Self mechanism to improving broadcasting on IEEE 802.11 networks Christos Chousidis, Rajagopal Nilavalan School of Engineering and Design Brunel University London, UK {christos.chousidis,

More information

Delay-minimal Transmission for Energy Constrained Wireless Communications

Delay-minimal Transmission for Energy Constrained Wireless Communications Delay-minimal Transmission for Energy Constrained Wireless Communications Jing Yang Sennur Ulukus Department of Electrical and Computer Engineering University of Maryland, College Park, M0742 yangjing@umd.edu

More information

IEEE Medium Access Control. Medium Access Control

IEEE Medium Access Control. Medium Access Control IEEE 802.11 Medium Access Control EECS3214 3 April 2018 Medium Access Control reliable data delivery access control MAC layer covers three functional areas: security 2 1 MAC Requirements To avoid interference

More information

A Backoff Algorithm for Improving Saturation Throughput in IEEE DCF

A Backoff Algorithm for Improving Saturation Throughput in IEEE DCF A Backoff Algorithm for Improving Saturation Throughput in IEEE 80.11 DCF Kiyoshi Takahashi and Toshinori Tsuboi School of Computer Science, Tokyo University of Technology, 1404-1 Katakura, Hachioji, Tokyo,

More information

PRIMAL-DUAL INTERIOR POINT METHOD FOR LINEAR PROGRAMMING. 1. Introduction

PRIMAL-DUAL INTERIOR POINT METHOD FOR LINEAR PROGRAMMING. 1. Introduction PRIMAL-DUAL INTERIOR POINT METHOD FOR LINEAR PROGRAMMING KELLER VANDEBOGERT AND CHARLES LANNING 1. Introduction Interior point methods are, put simply, a technique of optimization where, given a problem

More information

1. Lecture notes on bipartite matching February 4th,

1. Lecture notes on bipartite matching February 4th, 1. Lecture notes on bipartite matching February 4th, 2015 6 1.1.1 Hall s Theorem Hall s theorem gives a necessary and sufficient condition for a bipartite graph to have a matching which saturates (or matches)

More information

Medium Access Control Protocols With Memory Jaeok Park, Member, IEEE, and Mihaela van der Schaar, Fellow, IEEE

Medium Access Control Protocols With Memory Jaeok Park, Member, IEEE, and Mihaela van der Schaar, Fellow, IEEE IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 18, NO. 6, DECEMBER 2010 1921 Medium Access Control Protocols With Memory Jaeok Park, Member, IEEE, and Mihaela van der Schaar, Fellow, IEEE Abstract Many existing

More information

Applied Lagrange Duality for Constrained Optimization

Applied Lagrange Duality for Constrained Optimization Applied Lagrange Duality for Constrained Optimization Robert M. Freund February 10, 2004 c 2004 Massachusetts Institute of Technology. 1 1 Overview The Practical Importance of Duality Review of Convexity

More information

Multi-Channel MAC for Ad Hoc Networks: Handling Multi-Channel Hidden Terminals Using A Single Transceiver

Multi-Channel MAC for Ad Hoc Networks: Handling Multi-Channel Hidden Terminals Using A Single Transceiver Multi-Channel MAC for Ad Hoc Networks: Handling Multi-Channel Hidden Terminals Using A Single Transceiver Jungmin So Dept. of Computer Science, and Coordinated Science Laboratory University of Illinois

More information

Shiqian Ma, MAT-258A: Numerical Optimization 1. Chapter 2. Convex Optimization

Shiqian Ma, MAT-258A: Numerical Optimization 1. Chapter 2. Convex Optimization Shiqian Ma, MAT-258A: Numerical Optimization 1 Chapter 2 Convex Optimization Shiqian Ma, MAT-258A: Numerical Optimization 2 2.1. Convex Optimization General optimization problem: min f 0 (x) s.t., f i

More information

IEEE , Token Rings. 10/11/06 CS/ECE UIUC, Fall

IEEE , Token Rings. 10/11/06 CS/ECE UIUC, Fall IEEE 802.11, Token Rings 10/11/06 CS/ECE 438 - UIUC, Fall 2006 1 Medium Access Control Wireless channel is a shared medium Need access control mechanism to avoid interference Why not CSMA/CD? 10/11/06

More information

ACENTRAL question in the study of multihop networks

ACENTRAL question in the study of multihop networks 1118 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL 17, NO 4, AUGUST 2009 The Achievable Rate Region of 80211-Scheduled Multihop Networks Apoorva Jindal, Member, IEEE, and Konstantinos Psounis, Senior Member,

More information

Collision Probability in Saturated IEEE Networks

Collision Probability in Saturated IEEE Networks in Saturated IEEE 80.11 Networks Hai L. Vu Centre for Advanced Internet Architectures (CAIA) ICT Faculty, Swinburne University of Technology Hawthorn, VIC 31, Australia h.vu@ieee.org Taka Sakurai ARC Special

More information

Mohammad Hossein Manshaei 1393

Mohammad Hossein Manshaei 1393 Mohammad Hossein Manshaei manshaei@gmail.com 1393 1 An Analytical Approach: Bianchi Model 2 Real Experimentations HoE on IEEE 802.11b Analytical Models Bianchi s Model Simulations ns-2 3 N links with the

More information

Adaptive Packetization for Error-Prone Transmission over WLANs with Hidden Terminals

Adaptive Packetization for Error-Prone Transmission over WLANs with Hidden Terminals Adaptive Packetization for Error-Prone Transmission over 8.11 WLANs with Hidden Terminals Wei Song, Michael N. Krishnan, and Avideh Zakhor Video and Image Processing (VIP) Lab Department of Electrical

More information

Analysis of Throughput and Energy Efficiency in the IEEE Wireless Local Area Networks using Constant backoff Window Algorithm

Analysis of Throughput and Energy Efficiency in the IEEE Wireless Local Area Networks using Constant backoff Window Algorithm International Journal of Computer Applications (975 8887) Volume 6 No.8, July Analysis of Throughput and Energy Efficiency in the IEEE 8. Wireless Local Area Networks using Constant backoff Window Algorithm

More information

Worst-case Ethernet Network Latency for Shaped Sources

Worst-case Ethernet Network Latency for Shaped Sources Worst-case Ethernet Network Latency for Shaped Sources Max Azarov, SMSC 7th October 2005 Contents For 802.3 ResE study group 1 Worst-case latency theorem 1 1.1 Assumptions.............................

More information

An Efficient Bandwidth Estimation Schemes used in Wireless Mesh Networks

An Efficient Bandwidth Estimation Schemes used in Wireless Mesh Networks An Efficient Bandwidth Estimation Schemes used in Wireless Mesh Networks First Author A.Sandeep Kumar Narasaraopeta Engineering College, Andhra Pradesh, India. Second Author Dr S.N.Tirumala Rao (Ph.d)

More information

CHAPTER 4 CALL ADMISSION CONTROL BASED ON BANDWIDTH ALLOCATION (CACBA)

CHAPTER 4 CALL ADMISSION CONTROL BASED ON BANDWIDTH ALLOCATION (CACBA) 92 CHAPTER 4 CALL ADMISSION CONTROL BASED ON BANDWIDTH ALLOCATION (CACBA) 4.1 INTRODUCTION In our previous work, we have presented a cross-layer based routing protocol with a power saving technique (CBRP-PS)

More information

Distributed Optimal Contention Window Control for Elastic Traffic in Wireless LANs

Distributed Optimal Contention Window Control for Elastic Traffic in Wireless LANs Distributed Optimal Contention Window Control for Elastic Traffic in Wireless LANs Yaling Yang Department of Computer Science University of Illinois at Urbana-Champaign Email: yyang8@uiuc.edu Robin Kravets

More information

Topics for Today. More on Ethernet. Wireless LANs Readings. Topology and Wiring Switched Ethernet Fast Ethernet Gigabit Ethernet. 4.3 to 4.

Topics for Today. More on Ethernet. Wireless LANs Readings. Topology and Wiring Switched Ethernet Fast Ethernet Gigabit Ethernet. 4.3 to 4. Topics for Today More on Ethernet Topology and Wiring Switched Ethernet Fast Ethernet Gigabit Ethernet Wireless LANs Readings 4.3 to 4.4 1 Original Ethernet Wiring Heavy coaxial cable, called thicknet,

More information

Data and Computer Communications. Chapter 13 Wireless LANs

Data and Computer Communications. Chapter 13 Wireless LANs Data and Computer Communications Chapter 13 Wireless LANs Wireless LAN Topology Infrastructure LAN Connect to stations on wired LAN and in other cells May do automatic handoff Ad hoc LAN No hub Peer-to-peer

More information

Lagrangian Relaxation: An overview

Lagrangian Relaxation: An overview Discrete Math for Bioinformatics WS 11/12:, by A. Bockmayr/K. Reinert, 22. Januar 2013, 13:27 4001 Lagrangian Relaxation: An overview Sources for this lecture: D. Bertsimas and J. Tsitsiklis: Introduction

More information

04/11/2011. Wireless LANs. CSE 3213 Fall November Overview

04/11/2011. Wireless LANs. CSE 3213 Fall November Overview Wireless LANs CSE 3213 Fall 2011 4 November 2011 Overview 2 1 Infrastructure Wireless LAN 3 Applications of Wireless LANs Key application areas: LAN extension cross-building interconnect nomadic access

More information

original standard a transmission at 5 GHz bit rate 54 Mbit/s b support for 5.5 and 11 Mbit/s e QoS

original standard a transmission at 5 GHz bit rate 54 Mbit/s b support for 5.5 and 11 Mbit/s e QoS IEEE 802.11 The standard defines a wireless physical interface and the MAC layer while LLC layer is defined in 802.2. The standardization process, started in 1990, is still going on; some versions are:

More information

Impact of End-to-end QoS Connectivity on the Performance of Remote Wireless Local Networks

Impact of End-to-end QoS Connectivity on the Performance of Remote Wireless Local Networks Impact of End-to-end QoS Connectivity on the Performance of Remote Wireless Local Networks Veselin Rakocevic School of Engineering and Mathematical Sciences City University London EC1V HB, UK V.Rakocevic@city.ac.uk

More information

Review on IEEE n Operation Base on MANET Routing Protocols

Review on IEEE n Operation Base on MANET Routing Protocols Review on IEEE 802.11n Operation Base on MANET Routing Protocols Mehdi Effatparvar and Babak Golaminia Abstract An ad hoc network is a dynamically reconfigurable wireless network with no fixed wired infrastructure.

More information

AGOOD medium access control (MAC) protocol for wireless

AGOOD medium access control (MAC) protocol for wireless IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 3, NO. 3, MAY 2004 793 Design of MAC Protocols With Fast Collision Resolution for Wireless Local Area Networks Younggoo Kwon, Yuguang Fang, Senior Member,

More information

Medium Access Control. IEEE , Token Rings. CSMA/CD in WLANs? Ethernet MAC Algorithm. MACA Solution for Hidden Terminal Problem

Medium Access Control. IEEE , Token Rings. CSMA/CD in WLANs? Ethernet MAC Algorithm. MACA Solution for Hidden Terminal Problem Medium Access Control IEEE 802.11, Token Rings Wireless channel is a shared medium Need access control mechanism to avoid interference Why not CSMA/CD? 9/15/06 CS/ECE 438 - UIUC, Fall 2006 1 9/15/06 CS/ECE

More information

Comparison of pre-backoff and post-backoff procedures for IEEE distributed coordination function

Comparison of pre-backoff and post-backoff procedures for IEEE distributed coordination function Comparison of pre-backoff and post-backoff procedures for IEEE 802.11 distributed coordination function Ping Zhong, Xuemin Hong, Xiaofang Wu, Jianghong Shi a), and Huihuang Chen School of Information Science

More information

Medium Access Control. MAC protocols: design goals, challenges, contention-based and contention-free protocols

Medium Access Control. MAC protocols: design goals, challenges, contention-based and contention-free protocols Medium Access Control MAC protocols: design goals, challenges, contention-based and contention-free protocols 1 Why do we need MAC protocols? Wireless medium is shared Many nodes may need to access the

More information

Programming, numerics and optimization

Programming, numerics and optimization Programming, numerics and optimization Lecture C-4: Constrained optimization Łukasz Jankowski ljank@ippt.pan.pl Institute of Fundamental Technological Research Room 4.32, Phone +22.8261281 ext. 428 June

More information

Unconstrained Optimization Principles of Unconstrained Optimization Search Methods

Unconstrained Optimization Principles of Unconstrained Optimization Search Methods 1 Nonlinear Programming Types of Nonlinear Programs (NLP) Convexity and Convex Programs NLP Solutions Unconstrained Optimization Principles of Unconstrained Optimization Search Methods Constrained Optimization

More information

Solutions to Performance Problems in VoIP Over a Wireless LAN

Solutions to Performance Problems in VoIP Over a Wireless LAN Solutions to Performance Problems in VoIP Over a 802.11 Wireless LAN Wei Wang, Soung C. Liew, and VOK Li, Solutions to Performance Problems in VoIP over a 802.11 Wireless LAN, IEEE Transactions On Vehicular

More information

The Impact of Transmission Overheads on IEEE Throughput: Analysis and Simulation

The Impact of Transmission Overheads on IEEE Throughput: Analysis and Simulation Cyber Journals: Multidisciplinary Journals in Science and Technology, Journal of Selected Areas in Telecommunications (JSAT), March Edition, 2011 The Impact of Transmission Overheads on IEEE 802.11 Throughput:

More information

Fairness in the IEEE network. Shun Y. Cheung

Fairness in the IEEE network. Shun Y. Cheung Fairness in the IEEE 802.11 network Shun Y. Cheung Simple FIFO queueing High data rate flow Output queue (infinite size) Low data rate flow Packets from low data rate flow experience excessive queueing

More information

Lesson 2-3: The IEEE x MAC Layer

Lesson 2-3: The IEEE x MAC Layer Module 2: Establishing Wireless Connectivity Lesson 2-3: The IEEE 802.11x MAC Layer Lesson Overview This lesson describes basic IEEE 802.11x MAC operation, beginning with an explanation of contention schemes

More information

B. Bellalta Mobile Communication Networks

B. Bellalta Mobile Communication Networks IEEE 802.11e : EDCA B. Bellalta Mobile Communication Networks Scenario STA AP STA Server Server Fixed Network STA Server Upwnlink TCP flows Downlink TCP flows STA AP STA What is the WLAN cell performance

More information

November 1998 doc.: IEEE /378 IEEE P Wireless LANs Extension of Bluetooth and Direct Sequence Interference Model.

November 1998 doc.: IEEE /378 IEEE P Wireless LANs Extension of Bluetooth and Direct Sequence Interference Model. IEEE P802.11 Wireless LANs Extension of Bluetooth and 802.11 Direct Sequence Interference Model Date: November 11, 1998 Author: Jim Zyren Harris Semiconductor Melbourne, FL, USA Phone: (407)729-4177 Fax:

More information

An Energy Consumption Analytic Model for A Wireless Sensor MAC Protocol

An Energy Consumption Analytic Model for A Wireless Sensor MAC Protocol An Energy Consumption Analytic Model for A Wireless Sensor MAC Protocol Hung-Wei Tseng, Shih-Hsien Yang, Po-Yu Chuang,Eric Hsiao-Kuang Wu, and Gen-Huey Chen Dept. of Computer Science and Information Engineering,

More information

Lecture 16: QoS and "

Lecture 16: QoS and Lecture 16: QoS and 802.11" CSE 123: Computer Networks Alex C. Snoeren HW 4 due now! Lecture 16 Overview" Network-wide QoS IntServ DifServ 802.11 Wireless CSMA/CA Hidden Terminals RTS/CTS CSE 123 Lecture

More information

Experimental Framework and Simulator for the MAC of Power-Line Communications

Experimental Framework and Simulator for the MAC of Power-Line Communications Experimental Framework and Simulator for the MAC of Power-Line Communications Technical Report Christina Vlachou EPFL, Switzerland christinavlachou@epflch Julien Herzen EPFL, Switzerland julienherzen@epflch

More information

A Hybrid Distributed Coordination Function for Scalability and Inter-operability in Large-scale WLANs

A Hybrid Distributed Coordination Function for Scalability and Inter-operability in Large-scale WLANs A Hybrid Distributed Coordination Function for Scalability and Inter-operability in Large-scale WLANs Nakjung Choi, Seongil Han, Yongho Seok, Yanghee Choi and Taekyoung Kwon School of Computer Science

More information

UAMAC: Unidirectional-Link Aware MAC Protocol for Heterogeneous Ad Hoc Networks

UAMAC: Unidirectional-Link Aware MAC Protocol for Heterogeneous Ad Hoc Networks UAMAC: Unidirectional-Link Aware MAC Protocol for Heterogeneous Ad Hoc Networks Sung-Hee Lee, Jong-Mu Choi, and Young-Bae Ko College of Information and Communication, Ajou University, South Korea shlee@dmc.ajou.ac.kr,

More information

Department of Electrical and Computer Systems Engineering

Department of Electrical and Computer Systems Engineering Department of Electrical and Computer Systems Engineering Technical Report MECSE-6-2006 Medium Access Control (MAC) Schemes for Quality of Service (QoS) provision of Voice over Internet Protocol (VoIP)

More information

The Encoding Complexity of Network Coding

The Encoding Complexity of Network Coding The Encoding Complexity of Network Coding Michael Langberg Alexander Sprintson Jehoshua Bruck California Institute of Technology Email: mikel,spalex,bruck @caltech.edu Abstract In the multicast network

More information

Performance analysis of Internet applications over an adaptive IEEE MAC architecture

Performance analysis of Internet applications over an adaptive IEEE MAC architecture Journal of the Franklin Institute 343 (2006) 352 360 www.elsevier.com/locate/jfranklin Performance analysis of Internet applications over an adaptive IEEE 802.11 MAC architecture Uthman Baroudi, Mohammed

More information

Lecture 2 September 3

Lecture 2 September 3 EE 381V: Large Scale Optimization Fall 2012 Lecture 2 September 3 Lecturer: Caramanis & Sanghavi Scribe: Hongbo Si, Qiaoyang Ye 2.1 Overview of the last Lecture The focus of the last lecture was to give

More information

Achieving MAC Fairness in Wireless Ad-hoc Networks using Adaptive Transmission Control

Achieving MAC Fairness in Wireless Ad-hoc Networks using Adaptive Transmission Control Achieving MAC Fairness in Wireless Ad-hoc Networks using Adaptive Transmission Control Zhifei Li School of Computer Engineering Nanyang Technological University Singapore, 639798 Sukumar Nandi Dept. of

More information

CSE 461: Wireless Networks

CSE 461: Wireless Networks CSE 461: Wireless Networks Wireless IEEE 802.11 A physical and multiple access layer standard for wireless local area networks (WLAN) Ad Hoc Network: no servers or access points Infrastructure Network

More information

R-MAC: An Energy-Efficient MAC Protocol for Underwater Sensor Networks

R-MAC: An Energy-Efficient MAC Protocol for Underwater Sensor Networks R-MAC: An Energy-Efficient MAC Protocol for Underwater Sensor Networks Peng Xie and Jun-Hong Cui UCONN CSE Technical Report: UbiNet-TR06-06 Last Update: June 2007 Abstract Underwater sensor networks are

More information

A Novel Framework for Radio Resource Management in IEEE Wireless LANs

A Novel Framework for Radio Resource Management in IEEE Wireless LANs Dublin Institute of Technology ARROW@DIT Conference papers Communications Network Research Institute 2005-01-01 A Novel Framework for Radio Resource Management in IEEE 802.11 Wireless LANs Mark Davis Dublin

More information

Bandwidth Allocation for DiffServ based Quality of Service over

Bandwidth Allocation for DiffServ based Quality of Service over Bandwidth Allocation for DiffServ based Quality of Service over 82.11 Martin Heusse, Paul Starzetz, Franck Rousseau, Gilles Berger-Sabbatel, Andrzej Duda LSR-IMAG Laboratory Grenoble, France email: {heusse,

More information

Duck-Yong Yang, Tae-Jin Lee, Member, IEEE, Kyunghun Jang, Jin-Bong Chang and Sunghyun Choi, Member, IEEE. Abstract

Duck-Yong Yang, Tae-Jin Lee, Member, IEEE, Kyunghun Jang, Jin-Bong Chang and Sunghyun Choi, Member, IEEE. Abstract Performance Enhancement of Multi-Rate IEEE 802. WLANs with Geographically-Scattered Stations Duck-Yong Yang, Tae-Jin Lee, Member, IEEE, Kyunghun Jang, Jin-Bong Chang and Sunghyun Choi, Member, IEEE Abstract

More information

DOMINO: A System to Detect Greedy Behavior in IEEE Hotspots

DOMINO: A System to Detect Greedy Behavior in IEEE Hotspots DOMINO: A System to Detect Greedy Behavior in IEEE 802.11 Hotspots By Maxim Raya, Jean-Pierre Hubaux, Imad Aad Laboratory for computer Communications and Applications(LCA) School of Computer and Communication

More information

Wireless Network Security Spring 2013

Wireless Network Security Spring 2013 Wireless Network Security 14-814 Spring 2013 Patrick Tague Class #10 MAC Layer Misbehavior MAC Misbehavior Agenda Analysis of the 802.11 MAC protocol Selfish / greedy 802.11 MAC misbehavior Malicious 802.11

More information

Mathematical and Algorithmic Foundations Linear Programming and Matchings

Mathematical and Algorithmic Foundations Linear Programming and Matchings Adavnced Algorithms Lectures Mathematical and Algorithmic Foundations Linear Programming and Matchings Paul G. Spirakis Department of Computer Science University of Patras and Liverpool Paul G. Spirakis

More information

FUTURE communication networks are expected to support

FUTURE communication networks are expected to support 1146 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL 13, NO 5, OCTOBER 2005 A Scalable Approach to the Partition of QoS Requirements in Unicast and Multicast Ariel Orda, Senior Member, IEEE, and Alexander Sprintson,

More information

AN ANALYSIS OF THE MODIFIED BACKOFF MECHANISM FOR IEEE NETWORKS

AN ANALYSIS OF THE MODIFIED BACKOFF MECHANISM FOR IEEE NETWORKS AN ANALYSIS OF THE MODIFIED BACKOFF MECHANISM FOR IEEE 802.11 NETWORKS Marek Natkaniec, Andrzej R. Pach Department of Telecommunications University of Mining and Metallurgy al. Mickiewicza 30, 30-059 Cracow

More information

On the Performance Enhancement of Wireless LAN - A Multi-polling Mechanism with Hidden Terminal Solution

On the Performance Enhancement of Wireless LAN - A Multi-polling Mechanism with Hidden Terminal Solution MITSUBISHI ELECTRIC RESEARCH LABORATORIES http://www.merl.com On the Performance Enhancement of Wireless LAN - A Multi-polling Mechanism with Hidden Terminal Solution Yue Fang, Daqing Gu, A. Bruce McDonald,

More information

Wireless Networked Systems

Wireless Networked Systems Wireless Networked Systems CS 795/895 - Spring 2013 Lec #6: Medium Access Control QoS and Service Differentiation, and Power Management Tamer Nadeem Dept. of Computer Science Quality of Service (802.11e)

More information

Local Area Networks NETW 901

Local Area Networks NETW 901 Local Area Networks NETW 901 Lecture 4 Wireless LAN Course Instructor: Dr.-Ing. Maggie Mashaly maggie.ezzat@guc.edu.eg C3.220 1 Contents What is a Wireless LAN? Applications and Requirements Transmission

More information

P B 1-P B ARRIVE ATTEMPT RETRY 2 1-(1-P RF ) 2 1-(1-P RF ) 3 1-(1-P RF ) 4. Figure 1: The state transition diagram for FBR.

P B 1-P B ARRIVE ATTEMPT RETRY 2 1-(1-P RF ) 2 1-(1-P RF ) 3 1-(1-P RF ) 4. Figure 1: The state transition diagram for FBR. 1 Analytical Model In this section, we will propose an analytical model to investigate the MAC delay of FBR. For simplicity, a frame length is normalized as a time unit (slot). 1.1 State Transition of

More information

Improving IEEE Power Saving Mechanism

Improving IEEE Power Saving Mechanism 1 Improving IEEE 82.11 Power Saving Mechanism Eun-Sun Jung 1 and Nitin H. Vaidya 2 1 Dept. of Computer Science, Texas A&M University, College Station, TX 77843, USA Email: esjung@cs.tamu.edu 2 Dept. of

More information

Wireless Networks (MAC)

Wireless Networks (MAC) 802.11 Wireless Networks (MAC) Kate Ching-Ju Lin ( 林靖茹 ) Academia Sinica 2016.03.18 CSIE, NTU Reference 1. A Technical Tutorial on the IEEE 802.11 Protocol By Pablo Brenner online: http://www.sss-mag.com/pdf/802_11tut.pdf

More information

Lecture 10: SVM Lecture Overview Support Vector Machines The binary classification problem

Lecture 10: SVM Lecture Overview Support Vector Machines The binary classification problem Computational Learning Theory Fall Semester, 2012/13 Lecture 10: SVM Lecturer: Yishay Mansour Scribe: Gitit Kehat, Yogev Vaknin and Ezra Levin 1 10.1 Lecture Overview In this lecture we present in detail

More information

IEEE P Wireless LANs Impact of Bluetooth on Direct Sequence. Abstract

IEEE P Wireless LANs Impact of Bluetooth on Direct Sequence. Abstract IEEE P802.11 Wireless LANs Impact of Bluetooth on 802.11 Direct Sequence Date: September 15, 1998 Author: Greg Ennis Ennis Associates 16331 Englewood Ave. Los Gatos CA 95032 USA Phone: (408) 358-5544 Fax:

More information

Project Report: QoS Enhancement for Real-Time Traffic in IEEE WLAN

Project Report: QoS Enhancement for Real-Time Traffic in IEEE WLAN Project Report: QoS Enhancement for Real-Time Traffic in IEEE802.11 WLAN Abstract A key issue in IEEE802.11 WLAN MAC is how to provide QoS support, especially for time-bounded traffic. Although much work

More information

MAC LAYER. Murat Demirbas SUNY Buffalo

MAC LAYER. Murat Demirbas SUNY Buffalo MAC LAYER Murat Demirbas SUNY Buffalo MAC categories Fixed assignment TDMA (Time Division), CDMA (Code division), FDMA (Frequency division) Unsuitable for dynamic, bursty traffic in wireless networks Random

More information

Figure.2. Hidden & Exposed node problem

Figure.2. Hidden & Exposed node problem Efficient Throughput MAC Protocol in Ad-hoc Network s Rahul Mukherjee, HOD and Assistant Professor, Electronics & Communication Department, St. Aloysius Institute of Technology (SAIT), Jabalpur, Rajiv

More information

Lec 11 Rate-Distortion Optimization (RDO) in Video Coding-I

Lec 11 Rate-Distortion Optimization (RDO) in Video Coding-I CS/EE 5590 / ENG 401 Special Topics (17804, 17815, 17803) Lec 11 Rate-Distortion Optimization (RDO) in Video Coding-I Zhu Li Course Web: http://l.web.umkc.edu/lizhu/teaching/2016sp.video-communication/main.html

More information

Remarks On Per-flow Differentiation In IEEE

Remarks On Per-flow Differentiation In IEEE Remarks On Per-flow Differentiation In IEEE 82.11 Imad Aad and Claude Castelluccia PLANETE project, INRIA Rhône-Alpes ZIRST - 655, Avenue de l Europe - Montbonnot. 38334 Saint Ismier Cedex - France [imad.aad,

More information

Improving the Data Scheduling Efficiency of the IEEE (d) Mesh Network

Improving the Data Scheduling Efficiency of the IEEE (d) Mesh Network Improving the Data Scheduling Efficiency of the IEEE 802.16(d) Mesh Network Shie-Yuan Wang Email: shieyuan@csie.nctu.edu.tw Chih-Che Lin Email: jclin@csie.nctu.edu.tw Ku-Han Fang Email: khfang@csie.nctu.edu.tw

More information

Lixia Zhang M. I. T. Laboratory for Computer Science December 1985

Lixia Zhang M. I. T. Laboratory for Computer Science December 1985 Network Working Group Request for Comments: 969 David D. Clark Mark L. Lambert Lixia Zhang M. I. T. Laboratory for Computer Science December 1985 1. STATUS OF THIS MEMO This RFC suggests a proposed protocol

More information

ICE 1332/0715 Mobile Computing (Summer, 2008)

ICE 1332/0715 Mobile Computing (Summer, 2008) ICE 1332/0715 Mobile Computing (Summer, 2008) IEEE 802.11 Prof. Chansu Yu http://academic.csuohio.edu/yuc/ Contents Overview of IEEE 802.11 Frame formats MAC frame PHY frame IEEE 802.11 IEEE 802.11b IEEE

More information

Utility-Based Rate Control in the Internet for Elastic Traffic

Utility-Based Rate Control in the Internet for Elastic Traffic 272 IEEE TRANSACTIONS ON NETWORKING, VOL. 10, NO. 2, APRIL 2002 Utility-Based Rate Control in the Internet for Elastic Traffic Richard J. La and Venkat Anantharam, Fellow, IEEE Abstract In a communication

More information

Performance Anomaly of b

Performance Anomaly of b Performance Anomaly of 8.11b Martin Heusse, Franck Rousseau, Gilles Berger-Sabbatel, Andrzej Duda LSR-IMAG Laboratory Grenoble, France email: {heusse, rousseau, gberger, duda}@imag.fr Abstract We analyze

More information

Local and Global Minimum

Local and Global Minimum Local and Global Minimum Stationary Point. From elementary calculus, a single variable function has a stationary point at if the derivative vanishes at, i.e., 0. Graphically, the slope of the function

More information

Fault-Aware Flow Control and Multi-path Routing in Wireless Sensor Networks

Fault-Aware Flow Control and Multi-path Routing in Wireless Sensor Networks Fault-Aware Flow Control and Multi-path Routing in Wireless Sensor Networks X. Zhang, X. Dong Shanghai Jiaotong University J. Wu, X. Li Temple University, University of North Carolina N. Xiong Colorado

More information

Wireless MACs: MACAW/802.11

Wireless MACs: MACAW/802.11 Wireless MACs: MACAW/802.11 Mark Handley UCL Computer Science CS 3035/GZ01 Fundamentals: Spectrum and Capacity A particular radio transmits over some range of frequencies; its bandwidth, in the physical

More information

Wireless Network Security Spring 2012

Wireless Network Security Spring 2012 Wireless Network Security 14-814 Spring 2012 Patrick Tague Class #10 MAC Layer Misbehavior Announcements I'll be in Pittsburgh Feb 28-29 If you or your project team would like to meet, email me to schedule

More information

Some Advanced Topics in Linear Programming

Some Advanced Topics in Linear Programming Some Advanced Topics in Linear Programming Matthew J. Saltzman July 2, 995 Connections with Algebra and Geometry In this section, we will explore how some of the ideas in linear programming, duality theory,

More information

. 14 Byte for Acks. Due to this fact, the overhead is more relevant if the data contained in packets is sent to high rates:

. 14 Byte for Acks. Due to this fact, the overhead is more relevant if the data contained in packets is sent to high rates: QoS in IEEE 802.11 Issues Some issues are important for quality of service: the first one mentioned is the difference of performances expired by nodes based on their position in the network. Indeed, considering

More information

Constrained optimization

Constrained optimization Constrained optimization A general constrained optimization problem has the form where The Lagrangian function is given by Primal and dual optimization problems Primal: Dual: Weak duality: Strong duality:

More information

PROPOSAL OF MULTI-HOP WIRELESS LAN SYSTEM FOR QOS GUARANTEED TRANSMISSION

PROPOSAL OF MULTI-HOP WIRELESS LAN SYSTEM FOR QOS GUARANTEED TRANSMISSION PROPOSAL OF MULTI-HOP WIRELESS LAN SYSTEM FOR QOS GUARANTEED TRANSMISSION Phuc Khanh KIEU, Shinichi MIYAMOTO Graduate School of Engineering, Osaka University 2-1 Yamada-oka, Suita, Osaka, 565-871 JAPAN

More information

IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 17, NO. 2, APRIL

IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 17, NO. 2, APRIL IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 17, NO. 2, APRIL 2009 591 Aggregation With Fragment Retransmission for Very High-Speed WLANs Tianji Li, Member, IEEE, Qiang Ni, Senior Member, IEEE, David Malone,

More information

Performance anomaly of b

Performance anomaly of b Laboratoire LSR Logiciels Systèmes Réseaux Software, Systems, Networks Performance anomaly of 802.11b Andrzej Duda LSR-IMAG Andrzej.Duda@imag.fr Joint work with Martin Heusse, Franck Rousseau, Gilles Berger-Sabbatel

More information

Introduction to Constrained Optimization

Introduction to Constrained Optimization Introduction to Constrained Optimization Duality and KKT Conditions Pratik Shah {pratik.shah [at] lnmiit.ac.in} The LNM Institute of Information Technology www.lnmiit.ac.in February 13, 2013 LNMIIT MLPR

More information

A Short SVM (Support Vector Machine) Tutorial

A Short SVM (Support Vector Machine) Tutorial A Short SVM (Support Vector Machine) Tutorial j.p.lewis CGIT Lab / IMSC U. Southern California version 0.zz dec 004 This tutorial assumes you are familiar with linear algebra and equality-constrained optimization/lagrange

More information

20xx IEEE. Personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes

20xx IEEE. Personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes 2xx IEEE. Personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution

More information

1. Lecture notes on bipartite matching

1. Lecture notes on bipartite matching Massachusetts Institute of Technology 18.453: Combinatorial Optimization Michel X. Goemans February 5, 2017 1. Lecture notes on bipartite matching Matching problems are among the fundamental problems in

More information

Evaluation of the backoff procedure of Homeplug MAC vs. DCF

Evaluation of the backoff procedure of Homeplug MAC vs. DCF Evaluation of the backoff procedure of Homeplug MAC vs. DCF Cristina Cano and David Malone Hamilton Institute National University of Ireland, Maynooth Co. Kildare, Ireland Email: {cristina.cano,david.malone}@nuim.ie

More information

CSMA based Medium Access Control for Wireless Sensor Network

CSMA based Medium Access Control for Wireless Sensor Network CSMA based Medium Access Control for Wireless Sensor Network H. Hoang, Halmstad University Abstract Wireless sensor networks bring many challenges on implementation of Medium Access Control protocols because

More information

Mohamed Khedr.

Mohamed Khedr. Mohamed Khedr http://webmail.aast.edu/~khedr Tentatively Week 1 Week 2 Week 3 Week 4 Week 5 Week 6 Week 7 Week 8 Week 9 Week 10 Week 11 Week 12 Week 13 Week 14 Week 15 Overview Packet Switching IP addressing

More information

5 Day 5: Maxima and minima for n variables.

5 Day 5: Maxima and minima for n variables. UNIVERSITAT POMPEU FABRA INTERNATIONAL BUSINESS ECONOMICS MATHEMATICS III. Pelegrí Viader. 2012-201 Updated May 14, 201 5 Day 5: Maxima and minima for n variables. The same kind of first-order and second-order

More information