Re-routing Instability in IEEE Multi-hop Ad-hoc Networks *

Size: px
Start display at page:

Download "Re-routing Instability in IEEE Multi-hop Ad-hoc Networks *"

Transcription

1 Re-routng Instablty n IEEE Mult-hop Ad-hoc Networks * Png Chung Ng and Soung Chang Lew Department of Informaton Engneerng The Chnese Unversty of Hong Kong {pcng3, soung}@e.cuhk.edu.hk Abstract TCP throughput nstablty s a well-known phenomenon n IEEE mult-hop ad-hoc networks. However, we fnd that ths problem s not restrcted to TCP traffc only, but also occurs n UDP traffc. The assocated throughput oscllatons are not acceptable for real-tme applcatons such as vdeo conferencng and voce over IP. Ths paper re-defnes ths throughput fluctuaton as a re-routng nstablty problem snce t s caused by the trggerng of the re-routng functon. In partcular, we show that the throughput nstablty s manly nduced by re-routng, not the bnary exponental back-off of the IEEE MAC protocol. Turnng off the re-routng functon, for example, elmnates the problem. We beleve that ths s the frst paper n the lterature to study ths phenomenon n the context of reroutng nstablty. We propose to modfy the ad-hoc routng protocols wth a don t-break-before-you-canmake strategy. The scheme does not requre modfcatons of the IEEE standard, makng t readly deployable usng exstng commercal Wreless LAN (WLAN) products. Smulatons show that the proposed scheme can sgnfcantly reduce the throughput varaton n a traffc flow by 50-70% and mprove the average throughput by up to 11%. 1. Introducton The performance of wreless ad-hoc networks based on IEEE has been extensvely studed. Much of the prevous work attempts to solve the one-hop performance problems [1][2]. In the mult-hop scenaro, most of nvestgatons focused on TCP performance [3][4]. Besdes tradtonal TCP applcatons lke fle transfer and e-mal, the demands for real-tme applcatons lke mult-meda streamng and voce servces are also ncreasng. These real-tme servces are usually transported on UDP rather than TCP. In ths paper, we nvestgate a common phenomenon that leads to throughput degradatons and oscllatons for both TCP * Ths work was sponsored by the Areas of Excellence scheme establshed under the Unversty Grant Commttee of the Hong Kong Specal Admnstratve Regon, Chna (Project Number AoE/E-01/99). and UDP traffc n mult-hop networks: the re-routng nstablty problem. Prevous studes [5][6][7] showed that the so-called TCP nstablty problem exsts n a mult-hop flow. References [5][6] provded a soluton to solve TCP nstablty by lmtng the traffc at the transport layer. The soluton assumes TCP Vegas and lmts the TCP wndow sze to at most 4. Ths lmt bounds the number of packets n the path to prevent ndvdual nodes from capturng the channel for a sustaned perod of tme. Two observatons are as follows. Frst, t s not clear that the soluton s effectve when there are multple TCP flows along the same path, or when TCP flows on adjacent paths may nterfere wth the flow. Second, perhaps more mportantly, the nstablty problem s caused by false declaraton of lnk falures whch s rooted at the lnk layer. In other words, ths problem s not a phenomenon for TCP traffc only, but also for other types of traffc. The declaraton of lnk falures n turn trggers the reroutng functon, whch exacerbates the stuaton. We beleve that the problem should be properly defned as a re-routng nstablty problem, and a more general approach should be used to solve the problem by elmnatng ts root cause drectly. Reference [7] reconfrmed the TCP throughput nstablty and proposed a modfcaton of the IEEE back-off algorthm such that only two back-off wndow szes could be used. The man dea s to adopt the larger wndow for the next packet after a successful transmsson. Ths allows other nodes usng the smaller wndow to transmt wth less chance of collsons. However, the decson for the choce of the value of these two back-off wndow szes s based on the assumpton that the packet payload s fxed at 1460bytes. We beleve ths assumpton s not vald n real wreless LAN networks. When packets could be of dfferent sze, ths scheme may fal to work properly. The rest of ths paper s organzed as follows. Secton 2 gves detals of the smulaton set-up n ths paper. In Secton 3, we revew the throughput nstablty problem. Secton 4 ntroduces the exstng ad-hoc routng protocols and descrbes how they handle lnk-layer falures. In Secton 5, we suggest a soluton to deal wth re-routng nstablty and show how our soluton can be appled to the AODV routng protocol to elmnate nstablty.

2 Secton 6 provdes smulaton results quantfyng the mprovements that can be obtaned by our proposed scheme. Secton 7 analyzes factors that cause the trggerng of re-routng. Fnally, n Secton 8, we nvestgate the lnk-layer penalty n a scenaro wth multple flows nterferng wth each other. When one of the later nodes fals to transmt a packet after a number of retres, t declares the lnk as beng broken. The routng agent s then nvoked to look for a new route. Before a new route s dscovered, no packet can be transmtted, and ths causes the throughput to drop drastcally. 2. Smulaton Set-up The smulatons n ths paper were conducted usng NS2 [8]. All nodes communcate usng dentcal, halfduplex wreless rado based on the IEEE Dstrbuted Coordnaton Functon (DCF), wth data and basc rates set at 11Mbps. The RTS/CTS mechansm s turned off. Nodes are statonary. The transmsson range s 250m, the carrer-sensng range s 550m, and the capture threshold, CPThreshold, s set to 10dB. Each node has a drop-tal FIFO queue whch holds up to 500 packets. Ths large lnk-layer buffer sze elmnates the chance of throughput oscllatons caused by packet losses due to buffer overflow. The Ad-hoc On-Demand Dstance Vector (AODV) routng protocol and the tworay propagaton model are used. Unless otherwse ndcated, all traffc streams use fxed packet sze of 1460bytes. The TCP Reno algorthm s used snce t s the most wdely deployed TCP verson. The advertsed wndow (wndow_) of TCP s set to a large value to prevent the TCP traffc from beng lmted by the recever. The throughputs plotted n ths paper are obtaned by averagng over one-second ntervals. 3. Re-routng Instablty In ths secton, we use a 7-node strng mult-hop network as an example to llustrate the re-routng nstablty problem. In Fg. 1, node 1 sends a UDP or TCP traffc stream to node 7. For UDP, the traffc s generated at node 1 n a saturated manner, n whch as soon as a packet s transmtted to node 2, another s watng n lne. The traffc at later nodes all orgnates from node 1 and the later nodes are not saturated. For TCP, the traffc njected nto the network by node 1 s restrcted by the congeston control algorthm of the TCP Reno. Fgure 2. UDP end-to-end throughput n a 7-node flow usng the routng agent n the orgnal AODV In ths strng network topology, there s only one route from node 1 to node 7, so the routng agent wll eventually re-dscover the same route agan. The breakng and redscovery of the path results n the drastc throughput oscllatons observed. For a general network wth multple possble paths from source to destnaton, the same throughput oscllatons wll stll be expected. Ths s because the declaraton of the lnk falure s caused by self-nterference of traffc of the same flow. 3.1 Hdden-Termnal Problem The hdden-termnal problem can ncrease the chance of lnk-falure declaratons sgnfcantly. Consder the llustraton n Fg. 3. When node 6 sends a packet to node 7, node 4 senses the channel to be busy whle node 3 senses the channel to be dle, snce node 6 s nsde the carrer-sensng range of node 4 but outsde that of node 3. Once node 3 senses the channel as dle, t may count down ts back-off contenton wndow untl zero and transmt a packet to node 4. Fgure 1. UDP/TCP traffc flow wth node 1 as the source and node 7 as the destnaton n a 7-node multhop network Fgure 2 shows that the UDP throughput tends to oscllate wdely over tme. The throughput oscllatons are caused by trggerng of the re-routng functon. In the mult-hop path, nodes 1 and 2 sense fewer nterferng statons than later nodes. As a result, they pump more traffc nto the network than can be supported. Ths results n hgh contenton rates at later nodes. Fgure 3. Node 6 as a hdden termnal to node 3 If the transmsson from node 6 s stll n progress, node 4 wll contnue to sense the channel as busy, and t wll not receve the packet from node 3. As a result, node 4 wll not return an ACK to node 3. Node 3 may then tme out and double the contenton wndow sze for retransmsson later.

3 Meanwhle, node 6 transmts the packet successfully and s not aware of the nterference at node 4. When transmttng the next packet, node 6 wll use the mnmum contenton wndow sze. The hdden-termnal scenaro favors node 6, and the chance of collson at node 4 can not be reduced even though node 3 backs off for a duraton of tme before the next retry. The hddentermnal problem ncreases the chance of multple retres by node 3. Note that the negatve effect of a hdden termnal s much more than that of a contendng termnal wthn the carrer-sensng range. Ths s because the carrer-sensng capablty n the CSMA protocol s lost whenever there s a hdden termnal. The lack of carrer sensng wth respect to the hdden-termnal causes the MAC protocol to behave much lke an Aloha protocol. 3.2 Ineffectveness of Solvng Hdden-Termnal Problem wth RTS/CTS The RTS/CTS mechansm n IEEE s desgned to solve the hdden termnal problem. However, usng RTS/CTS n mult-hop networks does not elmnate the hdden termnal problem. The effectveness of the RTS/CTS mechansm s based on the assumpton that transmssons by mutually hdden termnals are to a common recever, and ths common recever may forewarn the other termnals whle the transmsson of a hdden termnal s n progress. Ths assumpton may not hold n a mult-hop network. Consder the scenaro n Fg. 3 agan. The RTS transmtted by node 6 wll cause a CTS to be returned by node 7. However, ths CTS cannot be receved by node 3. Therefore, node 3 may stll transmt a packet to node 4 whle the transmsson of node 6 s n progress. The hdden-termnal effect as descrbed n the prevous subsecton cannot be elmnated. For more detals, the nterested reader s referred to [9], n whch t was argued that when the carrer-sensng range s larger than two tmes of the transmsson range, RTS/CTS s no longer needed. In ths paper, we assume the use of the basc access mode wthout RTS/CTS. 4. Ad-hoc routng protocols Strctly speakng, n the scenaro n Secton 3, the lnk has not faled, although t s congested and the attempt to look for a new path s defntely warranted. However, before a new route can be dscovered, one should contnue to use the old route. That s, a don t-breakbefore-you-can- make strategy should be adopted. Numerous ad-hoc routng protocols have been proposed n the lterature. They can be categorzed nto two approaches: 1) proactve / table-drven; or 2) reactve / on-demand-drven [10]. The proactve approach protocols (e.g., Destnaton Sequenced Dstance Vector (DSDV)), attempt to preserve consstent and up-to-date routng nformaton from each node to every other node n the entre network. Each node mantans ts own routng table and propagates route updates throughout the network to notfy other nodes of changes n the network topology. In reactve approach protocols (e.g. Ad-hoc On-demand Dstance Vector (AODV) and Dynamc Source Routng (DSR)), route dscoveres are ntated only when desred by the source nodes. A node keeps usng the created route untl that route becomes naccessble or the route s no longer needed. Fgure 4. UDP end-to-end throughput n a 7-node flow usng DSR and DSDV The re-routng nstablty problem s a common performance problem suffered by varous ad-hoc routng protocols. Fgures 2 and 4 show that AODV, DSR (reactve) and DSDV (proactve) all experence throughput oscllatons. Although the severty of the oscllatons may vary, they are caused by the same reason, the trggerng of the re-routng functon. These routng protocols treat the lnk-falure notfcaton as an ndcaton of the loss of the lnk to next hop. In IEEE , ths lnk-falure notfcaton can be nduced by the hdden-termnal problem as well as the real-break case. Obvously, smply dscardng the route after recevng a lnk-falure notfcaton s not approprate for IEEE mult-hop networks. 5. Proposed scheme A possble soluton s to modfy the routng algorthm so that the routng agent contnues to use the prevous route for transmssons before a new route can be found. In practce, ths means computers equpped wth wreless LAN devces only need to nstall slghtly modfed routng agent software. In ths paper, we choose the AODV routng protocol for mplementaton of ths strategy, manly because detals of AODV have been publshed n an IETF RFC [11]. There s no reason why ths approach can not be appled n other ad-hoc routng protocols. 5.1 Orgnal AODV We quote the followng excerpt from the IETF RCF 3561 on AODV [11]: Any sutable lnk layer notfcaton, such as those provded by IEEE , can be used to determne connectvty, each tme a packet s transmtted to an actve next hop. For example, absence of a lnk layer ACK or falure to get a CTS after sendng RTS, even after the maxmum number of retransmsson attempts, ndcates loss of the lnk to ths actve next hop.

4 correspondng routes form ther routng tables. After that, a newly arrval packet targeted for these unreachable destnatons wll trgger the route dscovery process, and the transmssons of packets to that destnaton wll be resumed after the new route s generated. Fgure 5. Procedures n handlng lnk-falure n orgnal AODV and our proposed scheme (AODV_DM) Fgure 6. TCP end-to-end throughput n a 7-node flow usng orgnal AODV Fgure 5a shows the procedures for handlng lnkfalure n the orgnal AODV. When a node fals to receve the lnk-layer ACK from the next hop after the retransmsson lmt, ts lnk layer reports the lnk falure to the routng agent. The AODV protocol then generates a lst of unreachable destnatons that use the unreachable neghbor as the next hop. It drops all packets destned to that hop and nvaldates the correspondng routes n ts routng table. Then the node wth the broken lnk propagates the route error (RERR) message to ts upstream neghbors untl the source node s reached. When the source and ntermedate nodes receve the RERR message, they also drop all packets that utlze the broken route for forwardng and are destned to the nodes n the unreachable destnaton lst attached wth the RERR message. The nodes then remove the 5.2 AODV wth Proposed Scheme In our proposed soluton as shown n Fg. 5b, the lnk layer notfes the routng agent of the lnk falure after the maxmum retransmsson attempts. The AODV routng agent then broadcasts a route request (RREQ) message mmedately. Unlke the orgnal AODV, our routng agent does not drop packets and nvaldate the correspondng routes. However, t contnues to propagate the RERR message to ts upstream neghbors. When an ntermedate node receves the RERR message, t broadcasts another RREQ message and forwards the RERR message to upstream nodes untl the source node s reached. Durng ths process, no packets wll be dropped and all nodes contnue to use the prevous routes. After sendng RREQ messages, the nodes wat for the route reply (RREP) message returned by the destnaton node or an ntermedate node wth an up-to-date route (.e., the destnaton sequence number stored n the node s routng table s greater than that n the RREQ message [11]). After a new route s created, all nodes dscard the prevous route and swtch to the new one for transmssons. In the followng sectons, we wll show smulaton results of AODV modfed wth don t-break-before-youcan- make strategy (AODV_DM) n two scenaros: 1) a sngle flow n a sngle chan of nodes; and 2) a real-break case A Sngle Flow n a Sngle Chan of Nodes Fgures 2 and 6 show the exstence of re-routng nstablty of UDP and TCP traffc n a 7-node chan usng the orgnal AODV. As shown n Fg. 7, the AODV_DM scheme elmnates these oscllatons. Wth the AODV_DM scheme, no packets are dropped and nodes contnue to use the old route, whle the new route dscovery process s ongong. For our scenaro of a sngle-chan network, when the node wth the broken lnk receves the responded RREP message or the Hello message broadcasted perodcally by the next hop, t notces that the next hop s stll actve and the routng agent wll re-dscover the same route for transmssons Real-break Case Fgure 8 shows a scenaro wth two alternatve routes from node 1 to node 7. Both of them are accessble n the frst 70 seconds. At the 70 th second, node 4 s swtched off and ths breaks the upper route. Fgures 9 and 10 show the smulaton results. In the frst 70 seconds, both the orgnal AODV and AODV_DM choose the upper route snce ths path requres fewer number of hops. After the 70 th second, they swtch to the lower route for

5 transmssons. Snce the number of hops n the lower route s more than that of the upper route, the average throughputs are slghtly reduced. Our proposed scheme keeps the route dscovery property of orgnal AODV and swtch to a new route f the exstng one s broken. At the same tme, AODV_DM elmnates the re-routng nstablty problem experenced by the orgnal AODV. Fgure 8. Two alternatve routes for UDP/TCP traffc flow wth node 1 as the source and node 7 as the destnaton n a mult-hop network Fgure 7. UDP and TCP endto-end throughput n a 7-node flow usng AODV_DM Fgure 9. UDP and TCP endto-end throughput n a real-break case usng orgnal AODV Fgure 10. UDP and TCP endto-end throughput n a real-break case usng AODV_DM conferencng or voce over IP (VoIP), ths may not be acceptable. Compared wth the orgnal AODV, our proposed soluton reduces the throughput varatons by 70% for UDP and 50% for TCP as shown n Fg. 11. Also, from Table II, the mnmum throughputs of the orgnal AODV are near zero when there are more than fve nodes n the UDP flow; and when there are more than three nodes n the TCP flow. Usng AODV_DM, the mnmum throughputs are only slghtly less than the average values. As shown n Fg. 12, another mprovement of our proposed scheme s to boost the average throughput up to 11% for both TCP and UDP n a long chan of nodes (.e., more than 12 nodes). Fgure 11. Normalzed standard devaton of UDP and TCP end-to-end throughput versus the number of nodes n a strng mult-hop network 6. Improvements Smulatons show that whenever re-routng occurs, the throughput drops severely for the duraton of 1 to 3 seconds. For real-tme applcatons lke vdeo Fgure 12. UDP and TCP end-to-end throughput versus number of nodes n a strng topology

6 Table II. UDP and TCP throughput result (Mbps) wth varous number of nodes n a strng mult-hop network usng AODV and AODV_DM n a 500-second smulaton run Num. of Mean Nodes AODV Max Mn Mean AODV_DM Max Mn Num. of Nodes AODV AODV_DM Mean Max Mn Mean Max Mn Impacts of Data Transmsson Rate and Payload Sze Ths secton shows the effects of the data transmsson rate and payload sze on the re-routng nstablty problem. We frst show the condton for the occurrence of hdden-termnal collsons. Then we ntroduce a quanttatve approach to analyze the mpact of varous data transmsson rates and payload szes. 7.1 Sgnal Capture Consder Fg. 3 agan, both nodes 3 and 6 have a packet to transmt. Ths may cause the aforementoned hdden-termnal collson. However, the sgnal capturng property may stll allow a packet from node 3 to be receved successfully, provded t transmts before node 6. More specfcally, suppose that node 3 transmts frst and the sgnal power of the transmsson receved at node 4 s P 3. Node 6 then transmts a packet wth power P 6 receved at node 4. If P 3 > P 6 + CPThreshold, where CPThreshold s the capture threshold, then no collson occurs, and node 4 can stll receve the packet from node 3 successfully. On the other hand, f node 6 transmts frst, node 4 senses the sgnal from node 6 and declares the channel to be busy. In that case, a newly arrvng packet from node 3 can not be receved even f P 3 > P 6 + CPThreshold. Effectvely, the packet from node 3 to node 4 experences a collson. In our smulaton, CPThreshold s set to be 10dB. Let d be the fxed dstance between nodes. In ths scenaro, node 3 and node 6 are separated by a dstance larger than the carrer sensng range. Thus, node 3 and node 6 can send packets at the same tme. From [12], n a two ray propagaton model, the sgnal-to-nose rato at node 4 s 4 4 SNR = P3 / P6 = (2d / d) = 2 = 16 > CPThreshold (1) Ths means that the power level of the packet transmtted by node 3 and receved at node 4 s always more than CPThreshold hgher than the power level of the receved sgnal from node Vulnerable regon In the analyss of the effect of the hdden-termnal problem, the key s to dentfy the vulnerable regon durng whch f the node transmts, t may collde wth the transmsson of a hdden node. Ths s llustrated n Fg. 13. Note that a hdden-node collson only occurs f the transmssons of nodes 3 and 6 overlap and that the transmsson of node 6 precedes that of node 3. Let PACKET be the tme to transmt packet. PACKET = PHY + ( MAC + Payload ) / TxRate (2) where PHY s the tme to transmt the physcal header, MAC s the sze of the MAC header, Payload s the sze of the packet payload, and TxRate s the data transmsson rate. Let T be the tme of the transmsson cycle of packet at node 6. As llustrated n Fg. 16, T ncludes the back-off perod, the packet transmsson tme, the dle perod, I,when node 6 does not have a packet to transmt, and the busy perods used by other nodes wthn ts carrer sensng range for ther transmssons, B. We have T = I + DIFS + W + PACKET + SIFS + ACK + B (3) avg Let ρ be the fracton of the tme correspondng to the vulnerable regon nduced by node 6. We have ρ K = 1 = lm K K PACKET where ACK s the transmsson tme for an acknowledgement, SIFS s the tme duraton of short = 1 T (4)

7 nterframe space, DIFS s the tme duraton of dstrbuted nterframe space, and W avg s the average contenton wndow sze. Thus, ρ vares wth dfferent data transmsson rates and payload szes. Wth lower data transmsson rate or larger payload sze, the fracton of the tme that belongs to vulnerable regon n each transmsson cycle becomes larger. As a result, a hgher chance of hdden-termnal collsons s expected. In other words, the lnk-falure re-routng occurs more frequently whch further deterorates the nstablty problem. As shown n Fg. 14 and 15, usng lower data transmsson rate or larger payload sze ncreases the number of severe drops of throughputs. Fgure 13. Collson occurs when the transmsson of node 3 begns nsde the vulnerable perod Fgure 14. UDP end-to-end throughput n a 7-node flow usng orgnal AODV wth varous data transmsson rates Fgure 15. UDP end-to-end throughput n a 7-node flow usng orgnal AODV wth varous payload szes 8. Performance Enhancements n Multple Flows In prevous sectons, we have focused on the performance degradatons nduced by self nterference of the traffc of a sngle-flow n a sngle chan of nodes. In ths secton, we consder the nterferences between multple flows. We show that our proposed scheme can suffcently ncrease the average throughput of a flow sufferng from the hdden termnal problem. Fgure 16. Two 1-hop saturated UDP flows Fgure 16 shows a scenaro wth fve nodes and two 1-hop saturated UDP traffc flows. As mentoned n Secton 3.1, the transmssons of flow 1 may collde wth the transmssons of flow 2 at node 2 due to the hddentermnal problem. Ths severely deterorates the throughput of flow 1, whle flow 2 contnues to acheve a much hgher throughput as demonstrated n Fg. 17a. In addton, the throughput of flow 1 drops to zero from 70 th to 110 th second due to the successve collsons of RREQ sent out by node 1 wth the transmssons of flow 2. Node 4 does not notce that node 2 s sufferng from hddentermnal collsons and attempts to transmt at the maxmum sustanable rate. Once the lnk at node 1 s declared as falure, node 1 sends out RREQ and wats for RREP. However, ths RREQ message easly colldes wth the aggressve transmssons of flow 2. In ths way, no RREP s responded by node 2, and node 1 tmes out and retransmt another RREQ. No packet can be transmtted for a long perod of tme after a number of faled RREQ transmssons. Prevous work n the lterature [13] also reported that the throughput can degrade severely n smlar scenaros. They attrbute ths degradaton to the bnary exponental back-off for retransmssons caused by hdden nodes. However, we beleve t s only part of the cause. Once a node fals to receve the lnk-layer ACK after the retry

8 lmt, t trggers the re-routng functon of the routng agent. Before a new route or the prevous route s dscovered, no packets can be transmtted. Ths reroutng nstablty problem and the bnary exponental back-off should be treated and solved separately. Our proposed scheme addresses the frst ssue. The average throughput of flow 1 s doubled as show n Fg. 17b. The bnary exponental back-off does degrade the throughput, resultng n average throughput of flow 1 slghtly less than that of flow 2. However, ts nfluence s much smaller than that of re-routng nstablty problem. To lmt the scope of ths paper, we refer nterested readers to [13], n whch MAC layer solutons were proposed to address the degradatons caused bnary exponental back-off. Fgure 17. UDP throughputs of two 1-hop flows usng orgnal AODV and AODV_DM 9. Concluson Ths paper s an attempt to solve a throughput nstablty problem n IEEE mult-hop ad-hoc networks. Exstng ad-hoc routng protocols smply nhert the method for lnk-falure handlng from the routng protocols used n wred networks, and treat the lnk-falure notfcaton as an ndcaton of the loss of the lnk to the next hop. Ths s not approprate for wreless networks wth hdden-termnal problems such as IEEE The trggerng of the re-routng functon may be nduced by consecutve hdden-termnal collsons rather than real lnk falures. Ths paper has four major contrbutons. Frst, we have argued that the throughput nstablty problem should properly be re-defned as a re-routng nstablty problem, snce t s caused by the trggerng of the reroutng functon and s not specfc to TCP traffc alone. Second, we have proposed to adopt a don t-breakbefore-you-can-make modfcaton to the exstng adhoc routng protocols. In ths strategy, the old route wll contnue to be used untl a new one can be establshed. We have mplemented ths scheme wth AODV as an example, and have shown that the nstablty problem can be elmnated. The modfed routng agent can stll swtch to a new route successfully n a real-break case. Thrd, we have analyzed the hdden-termnal problem by consderng the vulnerable regons: the tme wndows durng whch transmssons may collde wth transmsson of hdden node. We have establshed the mpact of data transmsson rate and payload sze on the severty of hdden-node collsons. In partcular, we have shown that lower data transmsson rates and/or larger payload szes wll ncur more frequent throughput oscllatons. Fnally, ths paper has also nvestgated a multpleflow scenaro. The throughput degradaton nduced by re-routng nstablty s much larger than that nduced by bnary exponental back-off, as has been demonstrated by the restoraton of UDP throughput when our don t-break- before-you-can-make ad-hoc routng protocol s used. We beleve that ths s the frst paper n the lterature to report ths phenomenon. References [1] B. Bensaou, Y. Wang, C. C. Ko, Far meda access n based wreless ad-hoc networks, ACM MobHoc 00, pp , [2] K. Brown, S. Sngh, M-TCP: TCP for moble cellular networks, ACM Computer Communcaton Revew, 27(5), Oct [3] G. Holland, N. Vadya, Analyss of TCP Performance over Moble Ad Hoc Networks, ACM MobCom 02, pp , Seatle, USA, 2002 [4] R. Jang, V. Gupta, C. V. Ravshankar, Interactons between TCP and the IEEE MAC protocol, IEEE DISCEX 03, Vol. 1, pp , Aprl [5] S. Xu, T. Saadaw, On TCP over Wreless Mult-hop Networks, IEEE MILCOM 01, Vol.1, pp , Oct [6] S. Xu, T. Saadaw, Revealng and solvng the TCP nstablty problem n based mult-hop moble ad hoc networks, IEEE VTC 01 Fall, Vol. 1, pp , 2001 [7] Kanth K., Ansar S., Melkr M.H., Performance enhancement of TCP on multhop ad hoc wreless networks, IEEE ICPWC 02, pp.90-94, Dec [8] The Network Smulator ns2, [9] K. Xu, M. Gerla, S. Bae, How Effectve s the IEEE RTS/CTS Handshake n Ad Hoc Networks?, IEEE GLOBECOM '02, Vol. 1, pp.17-21, Nov [10] C. K. Toh, Ad hoc moble wreless networks: protocols and systems, Prentce Hall, New Jersey, [11] IETF RFC 3561 AODV Routng, [12] T. Rappaport, Wreless Communcatons: Prncples and Practce, Prentce Hall, New Jersey, [13] X. Huang, B. Bensaou, On Max-mn Farness and Schedulng n Wreless Ad-Hoc Networks: Analytcal Framework and Implementaton, ACM MobHoc 02, Long Beach, USA, Oct

Simulation Based Analysis of FAST TCP using OMNET++

Simulation Based Analysis of FAST TCP using OMNET++ Smulaton Based Analyss of FAST TCP usng OMNET++ Umar ul Hassan 04030038@lums.edu.pk Md Term Report CS678 Topcs n Internet Research Sprng, 2006 Introducton Internet traffc s doublng roughly every 3 months

More information

Analysis of Collaborative Distributed Admission Control in x Networks

Analysis of Collaborative Distributed Admission Control in x Networks 1 Analyss of Collaboratve Dstrbuted Admsson Control n 82.11x Networks Thnh Nguyen, Member, IEEE, Ken Nguyen, Member, IEEE, Lnha He, Member, IEEE, Abstract Wth the recent surge of wreless home networks,

More information

Interclass Collision Protection for IEEE e Wireless LANs

Interclass Collision Protection for IEEE e Wireless LANs Interclass Collson Protecton for IEEE 82.e Wreless LANs Woon Sun Cho, Chae Y. Lee Dstrbuted Coordnaton Functon (DCF) n IEEE 82. and Enhanced Dstrbuted Channel Access (EDCA) n IEEE 82.e are contenton-based

More information

RAP. Speed/RAP/CODA. Real-time Systems. Modeling the sensor networks. Real-time Systems. Modeling the sensor networks. Real-time systems:

RAP. Speed/RAP/CODA. Real-time Systems. Modeling the sensor networks. Real-time Systems. Modeling the sensor networks. Real-time systems: Speed/RAP/CODA Presented by Octav Chpara Real-tme Systems Many wreless sensor network applcatons requre real-tme support Survellance and trackng Border patrol Fre fghtng Real-tme systems: Hard real-tme:

More information

Efficient Distributed File System (EDFS)

Efficient Distributed File System (EDFS) Effcent Dstrbuted Fle System (EDFS) (Sem-Centralzed) Debessay(Debsh) Fesehaye, Rahul Malk & Klara Naherstedt Unversty of Illnos-Urbana Champagn Contents Problem Statement, Related Work, EDFS Desgn Rate

More information

DEAR: A DEVICE AND ENERGY AWARE ROUTING PROTOCOL FOR MOBILE AD HOC NETWORKS

DEAR: A DEVICE AND ENERGY AWARE ROUTING PROTOCOL FOR MOBILE AD HOC NETWORKS DEAR: A DEVICE AND ENERGY AWARE ROUTING PROTOCOL FOR MOBILE AD HOC NETWORKS Arun Avudanayagam Yuguang Fang Wenjng Lou Department of Electrcal and Computer Engneerng Unversty of Florda Ganesvlle, FL 3261

More information

Efficient Backoff Algorithm in Wireless Multihop Ad Hoc Networks

Efficient Backoff Algorithm in Wireless Multihop Ad Hoc Networks 1 Chen-Mn Wu, 2 Hu-Ka Su, 3 Wang-Has Yang *1,Correspondng Author Nanhua Unversty, cmwu@mal.nhu.edu.tw 2 Natonal Formosa Unversty, hksu@nfu.edu.tw 3 Hsupng Insttute of Technology, yangwh@mal.ht.edu.tw do:10.4156/jact.vol3.

More information

EFT: a high throughput routing metric for IEEE s wireless mesh networks

EFT: a high throughput routing metric for IEEE s wireless mesh networks Ann. Telecommun. (2010) 65:247 262 DOI 10.1007/s12243-009-0130-1 EFT: a hgh throughput routng metrc for IEEE 802.11s wreless mesh networks Md. Sharful Islam Muhammad Mahbub Alam Md. Abdul Hamd Choong Seon

More information

MobileGrid: Capacity-aware Topology Control in Mobile Ad Hoc Networks

MobileGrid: Capacity-aware Topology Control in Mobile Ad Hoc Networks MobleGrd: Capacty-aware Topology Control n Moble Ad Hoc Networks Jle Lu, Baochun L Department of Electrcal and Computer Engneerng Unversty of Toronto {jenne,bl}@eecg.toronto.edu Abstract Snce wreless moble

More information

Voice capacity of IEEE b WLANs

Voice capacity of IEEE b WLANs Voce capacty of IEEE 82.b WLANs D. S. Amanatads, V. Vtsas, A. Mantsars 2, I. Mavrds 2, P. Chatzmsos and A.C. Boucouvalas 3 Abstract-There s a tremendous growth n the deployment and usage of Wreless Local

More information

QoS Bandwidth Estimation Scheme for Delay Sensitive Applications in MANETs

QoS Bandwidth Estimation Scheme for Delay Sensitive Applications in MANETs Communcatons and Network, 2013, 5, 1-8 http://dx.do.org/10.4236/cn.2013.51001 Publshed Onlne February 2013 (http://www.scrp.org/journal/cn) QoS Bandwdth Estmaton Scheme for Delay Senstve Applcatons n MANETs

More information

IEEE E: QOS PROVISIONING AT THE MAC LAYER YANG XIAO, THE UNIVERSITY OF MEMPHIS

IEEE E: QOS PROVISIONING AT THE MAC LAYER YANG XIAO, THE UNIVERSITY OF MEMPHIS ACCEPTED FROM O PEN C ALL IEEE 802.11E: QOS PROVISIONING AT THE MAC LAYER YANG XIAO, THE UNIVERSITY OF MEMPHIS ess AIFS[j] AIFS[] PIFS SIFS AIFS[] Content 0 to CW Bac Slot Select s The emergng IEEE 802.11e

More information

Compiler Design. Spring Register Allocation. Sample Exercises and Solutions. Prof. Pedro C. Diniz

Compiler Design. Spring Register Allocation. Sample Exercises and Solutions. Prof. Pedro C. Diniz Compler Desgn Sprng 2014 Regster Allocaton Sample Exercses and Solutons Prof. Pedro C. Dnz USC / Informaton Scences Insttute 4676 Admralty Way, Sute 1001 Marna del Rey, Calforna 90292 pedro@s.edu Regster

More information

CS 268: Lecture 8 Router Support for Congestion Control

CS 268: Lecture 8 Router Support for Congestion Control CS 268: Lecture 8 Router Support for Congeston Control Ion Stoca Computer Scence Dvson Department of Electrcal Engneerng and Computer Scences Unversty of Calforna, Berkeley Berkeley, CA 9472-1776 Router

More information

UBICC Publishers 2008 Ubiquitous Computing and Communication Journal

UBICC Publishers 2008 Ubiquitous Computing and Communication Journal UBICC Journal Ubqutous Computng and Communcaton Journal 008 Volume 3. 008-04-30. ISSN 99-844 Specal Issue on Moble Adhoc Networks UBICC ublshers 008 Ubqutous Computng and Communcaton Journal Edted by Usman

More information

DESIGNING TRANSMISSION SCHEDULES FOR WIRELESS AD HOC NETWORKS TO MAXIMIZE NETWORK THROUGHPUT

DESIGNING TRANSMISSION SCHEDULES FOR WIRELESS AD HOC NETWORKS TO MAXIMIZE NETWORK THROUGHPUT DESIGNING TRANSMISSION SCHEDULES FOR WIRELESS AD HOC NETWORKS TO MAXIMIZE NETWORK THROUGHPUT Bran J. Wolf, Joseph L. Hammond, and Harlan B. Russell Dept. of Electrcal and Computer Engneerng, Clemson Unversty,

More information

Real-Time Guarantees. Traffic Characteristics. Flow Control

Real-Time Guarantees. Traffic Characteristics. Flow Control Real-Tme Guarantees Requrements on RT communcaton protocols: delay (response s) small jtter small throughput hgh error detecton at recever (and sender) small error detecton latency no thrashng under peak

More information

6.854 Advanced Algorithms Petar Maymounkov Problem Set 11 (November 23, 2005) With: Benjamin Rossman, Oren Weimann, and Pouya Kheradpour

6.854 Advanced Algorithms Petar Maymounkov Problem Set 11 (November 23, 2005) With: Benjamin Rossman, Oren Weimann, and Pouya Kheradpour 6.854 Advanced Algorthms Petar Maymounkov Problem Set 11 (November 23, 2005) Wth: Benjamn Rossman, Oren Wemann, and Pouya Kheradpour Problem 1. We reduce vertex cover to MAX-SAT wth weghts, such that the

More information

Virtual Memory. Background. No. 10. Virtual Memory: concept. Logical Memory Space (review) Demand Paging(1) Virtual Memory

Virtual Memory. Background. No. 10. Virtual Memory: concept. Logical Memory Space (review) Demand Paging(1) Virtual Memory Background EECS. Operatng System Fundamentals No. Vrtual Memory Prof. Hu Jang Department of Electrcal Engneerng and Computer Scence, York Unversty Memory-management methods normally requres the entre process

More information

A Binarization Algorithm specialized on Document Images and Photos

A Binarization Algorithm specialized on Document Images and Photos A Bnarzaton Algorthm specalzed on Document mages and Photos Ergna Kavalleratou Dept. of nformaton and Communcaton Systems Engneerng Unversty of the Aegean kavalleratou@aegean.gr Abstract n ths paper, a

More information

Real-time interactive applications

Real-time interactive applications Real-tme nteractve applcatons PC-2-PC phone PC-2-phone Dalpad Net2phone vdeoconference Webcams Now we look at a PC-2-PC Internet phone example n detal Internet phone over best-effort (1) Best effort packet

More information

Transmit Power Control Algorithms in IEEE h Based Networks

Transmit Power Control Algorithms in IEEE h Based Networks Transmt Power Control Algorthms n IEEE 82.h Based Networks Andreas J. Könsgen, Zakr Hossan, Carmelta Görg Department of Communcaton Networks Center for Informaton and Communcaton Technology (IKOM) Unversty

More information

Performance analysis of distributed cluster-based MAC protocol for multiuser MIMO wireless networks

Performance analysis of distributed cluster-based MAC protocol for multiuser MIMO wireless networks RESEARCH Open Access Performance analyss of dstrbuted cluster-based MAC protocol for multuser MIMO wreless networks Azadeh Ettefagh *, Marc Kuhn, Celal Eşl and Armn Wttneben Abstract It s known that multuser

More information

Performance Analysis of Markov Modulated 1-Persistent CSMA/CA Protocols with Exponential Backoff Scheduling

Performance Analysis of Markov Modulated 1-Persistent CSMA/CA Protocols with Exponential Backoff Scheduling Performance Analyss of Markov Modulated -Persstent CSMA/CA Protocols wth ponental Backoff Schedulng Pu ng Wong, Dongje Yn, and Tony T. Lee, Abstract. Ths paper proposes a Markovan model of -persstent CSMA/CA

More information

Mobility Based Routing Protocol with MAC Collision Improvement in Vehicular Ad Hoc Networks

Mobility Based Routing Protocol with MAC Collision Improvement in Vehicular Ad Hoc Networks Moblty Based Routng Protocol wth MAC Collson Improvement n Vehcular Ad Hoc Networks Zhhao Dng, Pny Ren, Qnghe Du Shaanx Smart Networks and Ubqutous Access Rearch Center School of Electronc and Informaton

More information

PERFORMANCE ANALYSIS OF ROUTING ALGORITHMS OF RD-C/TDMA PACKET RADIO NETWORKS UNDER DYNAMIC RANDOM TOPOLOGY1

PERFORMANCE ANALYSIS OF ROUTING ALGORITHMS OF RD-C/TDMA PACKET RADIO NETWORKS UNDER DYNAMIC RANDOM TOPOLOGY1 PERFORMANCE ANALYSIS OF ROUTING ALGORITHMS OF 1- RD-C/TDMA PACKET RADIO NETWORKS UNDER DYNAMIC RANDOM TOPOLOGY1 A Thess Presented to The Faculty of the College of Engneerng and Technology Oho Unversty

More information

Video Proxy System for a Large-scale VOD System (DINA)

Video Proxy System for a Large-scale VOD System (DINA) Vdeo Proxy System for a Large-scale VOD System (DINA) KWUN-CHUNG CHAN #, KWOK-WAI CHEUNG *# #Department of Informaton Engneerng *Centre of Innovaton and Technology The Chnese Unversty of Hong Kong SHATIN,

More information

Load Balancing for Hex-Cell Interconnection Network

Load Balancing for Hex-Cell Interconnection Network Int. J. Communcatons, Network and System Scences,,, - Publshed Onlne Aprl n ScRes. http://www.scrp.org/journal/jcns http://dx.do.org/./jcns.. Load Balancng for Hex-Cell Interconnecton Network Saher Manaseer,

More information

Parallelism for Nested Loops with Non-uniform and Flow Dependences

Parallelism for Nested Loops with Non-uniform and Flow Dependences Parallelsm for Nested Loops wth Non-unform and Flow Dependences Sam-Jn Jeong Dept. of Informaton & Communcaton Engneerng, Cheonan Unversty, 5, Anseo-dong, Cheonan, Chungnam, 330-80, Korea. seong@cheonan.ac.kr

More information

An Optimal Algorithm for Prufer Codes *

An Optimal Algorithm for Prufer Codes * J. Software Engneerng & Applcatons, 2009, 2: 111-115 do:10.4236/jsea.2009.22016 Publshed Onlne July 2009 (www.scrp.org/journal/jsea) An Optmal Algorthm for Prufer Codes * Xaodong Wang 1, 2, Le Wang 3,

More information

IJCTA Nov-Dec 2016 Available

IJCTA Nov-Dec 2016 Available Dr K Santh et al, Internatonal Journal of Computer Technology & Applcatons,Vol 7(6),773-779 Optmzed Route Technque for DSR Routng Protocol n MANET Dr.K.Santh, Assocate Professor, Dept. of Computer Scence,

More information

Evaluation of an Enhanced Scheme for High-level Nested Network Mobility

Evaluation of an Enhanced Scheme for High-level Nested Network Mobility IJCSNS Internatonal Journal of Computer Scence and Network Securty, VOL.15 No.10, October 2015 1 Evaluaton of an Enhanced Scheme for Hgh-level Nested Network Moblty Mohammed Babker Al Mohammed, Asha Hassan.

More information

ENERGY EFFICIENT ROUTING PROTOCOLS FOR WIRELESS AD HOC NETWORKS A SURVEY

ENERGY EFFICIENT ROUTING PROTOCOLS FOR WIRELESS AD HOC NETWORKS A SURVEY K SANKAR: ENERGY EFFICIENT ROUTING PROTOCOLS FOR WIRELESS AD HOC NETWORKS A SURVEY ENERGY EFFICIENT ROUTING PROTOCOLS FOR WIRELESS AD HOC NETWORKS A SURVEY K. Sankar Department of Computer Scence and Engneerng,

More information

Adaptive Network Resource Management in IEEE Wireless Random Access MAC

Adaptive Network Resource Management in IEEE Wireless Random Access MAC Adaptve Network Resource Management n IEEE 802.11 Wreless Random Access MAC Hao Wang, Changcheng Huang, James Yan Department of Systems and Computer Engneerng Carleton Unversty, Ottawa, ON, Canada Abstract

More information

ABRC: An End-to-End Rate Adaptation Scheme for Multimedia Streaming over Wireless LAN*

ABRC: An End-to-End Rate Adaptation Scheme for Multimedia Streaming over Wireless LAN* ARC: An End-to-End Rate Adaptaton Scheme for Multmeda Streamng over Wreless LAN We Wang Soung C Lew Jack Y Lee Department of Informaton Engneerng he Chnese Unversty of Hong Kong Shatn N Hong Kong {wwang2

More information

Comparisons of Packet Scheduling Algorithms for Fair Service among Connections on the Internet

Comparisons of Packet Scheduling Algorithms for Fair Service among Connections on the Internet Comparsons of Packet Schedulng Algorthms for Far Servce among Connectons on the Internet Go Hasegawa, Takahro Matsuo, Masayuk Murata and Hdeo Myahara Department of Infomatcs and Mathematcal Scence Graduate

More information

Avoiding congestion through dynamic load control

Avoiding congestion through dynamic load control Avodng congeston through dynamc load control Vasl Hnatyshn, Adarshpal S. Seth Department of Computer and Informaton Scences, Unversty of Delaware, Newark, DE 976 ABSTRACT The current best effort approach

More information

Fast Retransmission of Real-Time Traffic in HIPERLAN/2 Systems

Fast Retransmission of Real-Time Traffic in HIPERLAN/2 Systems Fast Retransmsson of Real-Tme Traffc n HIPERLAN/ Systems José A Afonso and Joaqum E Neves Department of Industral Electroncs Unversty of Mnho, Campus de Azurém 4800-058 Gumarães, Portugal {joseafonso,

More information

Routing in Degree-constrained FSO Mesh Networks

Routing in Degree-constrained FSO Mesh Networks Internatonal Journal of Hybrd Informaton Technology Vol., No., Aprl, 009 Routng n Degree-constraned FSO Mesh Networks Zpng Hu, Pramode Verma, and James Sluss Jr. School of Electrcal & Computer Engneerng

More information

kccvoip.com basic voip training NAT/PAT extract 2008

kccvoip.com basic voip training NAT/PAT extract 2008 kccvop.com basc vop tranng NAT/PAT extract 28 As we have seen n the prevous sldes, SIP and H2 both use addressng nsde ther packets to rely nformaton. Thnk of an envelope where we place the addresses of

More information

Efficient Content Distribution in Wireless P2P Networks

Efficient Content Distribution in Wireless P2P Networks Effcent Content Dstrbuton n Wreless P2P Networs Qong Sun, Vctor O. K. L, and Ka-Cheong Leung Department of Electrcal and Electronc Engneerng The Unversty of Hong Kong Pofulam Road, Hong Kong, Chna {oansun,

More information

Performance Improvement of Direct Diffusion Algorithm in Sensor Networks

Performance Improvement of Direct Diffusion Algorithm in Sensor Networks Mddle-East Journal of Scentfc Research 2 (): 566-574, 202 ISSN 990-9233 IDOSI Publcatons, 202 DOI: 0.5829/dos.mejsr.202.2..43 Performance Improvement of Drect Dffuson Algorthm n Sensor Networks Akbar Bemana

More information

Ant Colony Based Node Disjoint Hybrid Multi-path Routing for Mobile Ad Hoc Network

Ant Colony Based Node Disjoint Hybrid Multi-path Routing for Mobile Ad Hoc Network Journal of Computer Scence 4 (2): 80-86, 2008 ISSN 1549-3636 2008 Scence Publcatons Ant Colony Based Node Dsjont Hybrd Mult-path Routng for Moble Ad Hoc Network 1 B. Kalaavath, 2 K. Duraswamy 1 Department

More information

A Fair MAC Algorithm with Dynamic Priority for e WLANs

A Fair MAC Algorithm with Dynamic Priority for e WLANs 29 Internatonal Conference on Communcaton Software and Networks A Far MAC Algorthm wth Dynamc Prorty for 82.e WLANs Rong He, Xumng Fang Provncal Key Lab of Informaton Codng & Transmsson, Southwest Jaotong

More information

FAHP and Modified GRA Based Network Selection in Heterogeneous Wireless Networks

FAHP and Modified GRA Based Network Selection in Heterogeneous Wireless Networks 2017 2nd Internatonal Semnar on Appled Physcs, Optoelectroncs and Photoncs (APOP 2017) ISBN: 978-1-60595-522-3 FAHP and Modfed GRA Based Network Selecton n Heterogeneous Wreless Networks Xaohan DU, Zhqng

More information

The Impact of Delayed Acknowledgement on E-TCP Performance In Wireless networks

The Impact of Delayed Acknowledgement on E-TCP Performance In Wireless networks The mpact of Delayed Acknoledgement on E-TCP Performance n Wreless netorks Deddy Chandra and Rchard J. Harrs School of Electrcal and Computer System Engneerng Royal Melbourne nsttute of Technology Melbourne,

More information

OPTIMAL CONFIGURATION FOR NODES IN MIXED CELLULAR AND MOBILE AD HOC NETWORK FOR INET

OPTIMAL CONFIGURATION FOR NODES IN MIXED CELLULAR AND MOBILE AD HOC NETWORK FOR INET OPTIMAL CONFIGURATION FOR NODE IN MIED CELLULAR AND MOBILE AD HOC NETWORK FOR INET Olusola Babalola D.E. Department of Electrcal and Computer Engneerng Morgan tate Unversty Dr. Rchard Dean Faculty Advsor

More information

THE IEEE standard for wireless local area networks

THE IEEE standard for wireless local area networks IEEE RANSACIONS ON VEHICULAR ECHNOLOGY, VOL. 58, NO. 2, FEBRUARY 2009 855 Determnstc Prorty Channel Access Scheme for QoS Support n IEEE 802.11e Wreless LANs Sunmyeng Km, Rongsheng Huang, Student Member,

More information

A Low-Overhead Routing Protocol for Ad Hoc Networks with selfish nodes

A Low-Overhead Routing Protocol for Ad Hoc Networks with selfish nodes A Low-Oerhead Routng Protocol for Ad Hoc Networks wth selfsh nodes Dongbn Wang 1, Xaofeng Wang 2, Xangzhan Yu 3, Kacheng Q 1, Zhbn Xa 1 1 School of Software Engneerng, Bejng Unersty of Posts and Telecommuncatons,100876,

More information

Load-Balanced Anycast Routing

Load-Balanced Anycast Routing Load-Balanced Anycast Routng Chng-Yu Ln, Jung-Hua Lo, and Sy-Yen Kuo Department of Electrcal Engneerng atonal Tawan Unversty, Tape, Tawan sykuo@cc.ee.ntu.edu.tw Abstract For fault-tolerance and load-balance

More information

Achievable Bandwidth Estimation for Stations in Multi-Rate IEEE WLAN Cells

Achievable Bandwidth Estimation for Stations in Multi-Rate IEEE WLAN Cells Achevable Bandwdth Estmaton for Statons n Mult-Rate IEEE 802. WLAN Cells Eduard Garca, Davd Vamonte, Rafael Vdal and Josep Paradells Wreless Networks Group - echncal Unversty of Catalona (UPC) {eduardg,

More information

WIRELESS communication technology has gained widespread

WIRELESS communication technology has gained widespread 616 IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. 4, NO. 6, NOVEMBER/DECEMBER 2005 Dstrbuted Far Schedulng n a Wreless LAN Ntn Vadya, Senor Member, IEEE, Anurag Dugar, Seema Gupta, and Paramvr Bahl, Senor

More information

AUTONOMOUS ROUTING ALGORITHMS FOR NETWORKS WITH WIDE-SPREAD FAILURES

AUTONOMOUS ROUTING ALGORITHMS FOR NETWORKS WITH WIDE-SPREAD FAILURES AUTONOMOUS ROUTNG ALGORTHMS FOR NETWORKS WTH WDE-SPREAD FALURES Wajahat Khan, Long Bao Le and Eytan Modano Communcatons and Networkng Research Group Massachusetts nsttute of Technology Cambrdge, MA, USA

More information

Aggregated traffic flow weight controlled hierarchical MAC protocol for wireless sensor networks

Aggregated traffic flow weight controlled hierarchical MAC protocol for wireless sensor networks Ann. Telecommun. (29) 64:75 721 DOI.7/s12243-9-95- Aggregated traffc flow weght controlled herarchcal MAC protocol for wreless sensor networks M. Abdur Razzaque M. Mamun-Or-Rashd Muhammad Mahbub Alam Choong

More information

with `ook-ahead for Broadcast WDM Networks TR May 14, 1996 Abstract

with `ook-ahead for Broadcast WDM Networks TR May 14, 1996 Abstract HPeR-`: A Hgh Performance Reservaton Protocol wth `ook-ahead for Broadcast WDM Networks Vjay Svaraman George N. Rouskas TR-96-06 May 14, 1996 Abstract We consder the problem of coordnatng access to the

More information

WITH rapid improvements of wireless technologies,

WITH rapid improvements of wireless technologies, JOURNAL OF SYSTEMS ARCHITECTURE, SPECIAL ISSUE: HIGHLY-RELIABLE CPS, VOL. 00, NO. 0, MONTH 013 1 Adaptve GTS Allocaton n IEEE 80.15.4 for Real-Tme Wreless Sensor Networks Feng Xa, Ruonan Hao, Je L, Naxue

More information

Efficient QoS Provisioning at the MAC Layer in Heterogeneous Wireless Sensor Networks

Efficient QoS Provisioning at the MAC Layer in Heterogeneous Wireless Sensor Networks Effcent QoS Provsonng at the MAC Layer n Heterogeneous Wreless Sensor Networks M.Soul a,, A.Bouabdallah a, A.E.Kamal b a UMR CNRS 7253 HeuDaSyC, Unversté de Technologe de Compègne, Compègne Cedex F-625,

More information

IP Camera Configuration Software Instruction Manual

IP Camera Configuration Software Instruction Manual IP Camera 9483 - Confguraton Software Instructon Manual VBD 612-4 (10.14) Dear Customer, Wth your purchase of ths IP Camera, you have chosen a qualty product manufactured by RADEMACHER. Thank you for the

More information

Overview. Basic Setup [9] Motivation and Tasks. Modularization 2008/2/20 IMPROVED COVERAGE CONTROL USING ONLY LOCAL INFORMATION

Overview. Basic Setup [9] Motivation and Tasks. Modularization 2008/2/20 IMPROVED COVERAGE CONTROL USING ONLY LOCAL INFORMATION Overvew 2 IMPROVED COVERAGE CONTROL USING ONLY LOCAL INFORMATION Introducton Mult- Smulator MASIM Theoretcal Work and Smulaton Results Concluson Jay Wagenpfel, Adran Trachte Motvaton and Tasks Basc Setup

More information

Gateway Algorithm for Fair Bandwidth Sharing

Gateway Algorithm for Fair Bandwidth Sharing Algorm for Far Bandwd Sharng We Y, Rupnder Makkar, Ioanns Lambadars Department of System and Computer Engneerng Carleton Unversty 5 Colonel By Dr., Ottawa, ON KS 5B6, Canada {wy, rup, oanns}@sce.carleton.ca

More information

A Fair Access Mechanism Based on TXOP in IEEE e Wireless Networks

A Fair Access Mechanism Based on TXOP in IEEE e Wireless Networks 11 Internatonal Journal of Communcaton Networks and Informaton Securty (IJCNIS) Vol. 8, No. 1, Aprl 16 A Far Access Mechansm Based on TXOP n IEEE 8.11e Wreless Networks Marjan Yazdan 1, Maryam Kamal, Neda

More information

Connection-information-based connection rerouting for connection-oriented mobile communication networks

Connection-information-based connection rerouting for connection-oriented mobile communication networks Dstrb. Syst. Engng 5 (1998) 47 65. Prnted n the UK PII: S0967-1846(98)90513-7 Connecton-nformaton-based connecton reroutng for connecton-orented moble communcaton networks Mnho Song, Yanghee Cho and Chongsang

More information

Quantifying Performance Models

Quantifying Performance Models Quantfyng Performance Models Prof. Danel A. Menascé Department of Computer Scence George Mason Unversty www.cs.gmu.edu/faculty/menasce.html 1 Copyrght Notce Most of the fgures n ths set of sldes come from

More information

Online Policies for Opportunistic Virtual MISO Routing in Wireless Ad Hoc Networks

Online Policies for Opportunistic Virtual MISO Routing in Wireless Ad Hoc Networks 12 IEEE Wreless Communcatons and Networkng Conference: Moble and Wreless Networks Onlne Polces for Opportunstc Vrtual MISO Routng n Wreless Ad Hoc Networks Crstano Tapparello, Stefano Tomasn and Mchele

More information

Network-Driven Layered Multicast with IPv6

Network-Driven Layered Multicast with IPv6 Network-Drven Layered Multcast wth IPv6 Ho-pong Sze and Soung C. Lew Department of Informaton Engneerng, The Chnese Unversty of Hong Kong, Shatn, N.T., Hong Kong {hpsze8, soung}@e.cuhk.edu.hk Abstract.

More information

Positive Semi-definite Programming Localization in Wireless Sensor Networks

Positive Semi-definite Programming Localization in Wireless Sensor Networks Postve Sem-defnte Programmng Localzaton n Wreless Sensor etworks Shengdong Xe 1,, Jn Wang, Aqun Hu 1, Yunl Gu, Jang Xu, 1 School of Informaton Scence and Engneerng, Southeast Unversty, 10096, anjng Computer

More information

Delay Variation Optimized Traffic Allocation Based on Network Calculus for Multi-path Routing in Wireless Mesh Networks

Delay Variation Optimized Traffic Allocation Based on Network Calculus for Multi-path Routing in Wireless Mesh Networks Appl. Math. Inf. Sc. 7, No. 2L, 467-474 2013) 467 Appled Mathematcs & Informaton Scences An Internatonal Journal http://dx.do.org/10.12785/ams/072l13 Delay Varaton Optmzed Traffc Allocaton Based on Network

More information

Combined SINR Based Vertical Handoff Algorithm for Next Generation Heterogeneous Wireless Networks

Combined SINR Based Vertical Handoff Algorithm for Next Generation Heterogeneous Wireless Networks Combned SINR Based Vertcal Handoff Algorthm for Next Generaton Heterogeneous Wreless Networks Kemeng Yang, Iqbal Gondal, Bn Qu and Laurence S. Dooley Faculty of Informaton Technology Monash Unversty Melbourne,

More information

A mathematical programming approach to the analysis, design and scheduling of offshore oilfields

A mathematical programming approach to the analysis, design and scheduling of offshore oilfields 17 th European Symposum on Computer Aded Process Engneerng ESCAPE17 V. Plesu and P.S. Agach (Edtors) 2007 Elsever B.V. All rghts reserved. 1 A mathematcal programmng approach to the analyss, desgn and

More information

SPEED: A Stateless Protocol for Real-Time Communication in Sensor Networks

SPEED: A Stateless Protocol for Real-Time Communication in Sensor Networks Internatonal Conference on Dstrbuted Computng Systems ICDCS 2003 : A Stateless Protocol for Real-Tme Communcaton n Sensor Networks Tan He a John A Stankovc a Chenyang Lu b Tarek Abdelzaher a a Department

More information

Virtual Machine Migration based on Trust Measurement of Computer Node

Virtual Machine Migration based on Trust Measurement of Computer Node Appled Mechancs and Materals Onlne: 2014-04-04 ISSN: 1662-7482, Vols. 536-537, pp 678-682 do:10.4028/www.scentfc.net/amm.536-537.678 2014 Trans Tech Publcatons, Swtzerland Vrtual Machne Mgraton based on

More information

A General Model of Wireless Interference

A General Model of Wireless Interference A General Model of Wreless Interference Ll Qu Yn Zhang Feng Wang M Kyung Han Ratul Mahajan Unversty of Texas at Austn Mcrosoft Research Austn, TX 7872, USA Redmond, WA 9852, USA {ll,yzhang,wangf,hanm2}@cs.utexas.edu

More information

An Analytical Model for IEEE Point-to-Point Link

An Analytical Model for IEEE Point-to-Point Link An Analytcal Model for IEEE 82. Pont-to-Pont Lnk Yong Yan, Xaowen hu Department of omputer cence, Hong Kong Baptst Unversty Emal: {yyan, chxw}@comp.hkbu.edu.hk Abstract - Wreless mesh networks have attracted

More information

Helsinki University Of Technology, Systems Analysis Laboratory Mat Independent research projects in applied mathematics (3 cr)

Helsinki University Of Technology, Systems Analysis Laboratory Mat Independent research projects in applied mathematics (3 cr) Helsnk Unversty Of Technology, Systems Analyss Laboratory Mat-2.08 Independent research projects n appled mathematcs (3 cr) "! #$&% Antt Laukkanen 506 R ajlaukka@cc.hut.f 2 Introducton...3 2 Multattrbute

More information

A Novel Scheme to Reduce Control Overhead and Increase Link Duration in Highly Mobile Ad Hoc Networks

A Novel Scheme to Reduce Control Overhead and Increase Link Duration in Highly Mobile Ad Hoc Networks Ths full text paper was peer revewed at the drecton of IEEE Communcatons Socety subect matter experts for publcaton n the WCNC 2007 proceedngs. A Novel Scheme to Reduce Control Overhead and Increase Lnk

More information

A Semi-Distributed Load Balancing Architecture and Algorithm for Heterogeneous Wireless Networks

A Semi-Distributed Load Balancing Architecture and Algorithm for Heterogeneous Wireless Networks A Sem-Dstrbuted oad Balancng Archtecture and Algorthm for Heterogeneous reless Networks Md. Golam Rabul Ala Choong Seon Hong * Kyung Hee Unversty, Korea rob@networkng.khu.ac.kr, cshong@khu.ac.kr Abstract

More information

Instantaneous Fairness of TCP in Heterogeneous Traffic Wireless LAN Environments

Instantaneous Fairness of TCP in Heterogeneous Traffic Wireless LAN Environments KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS VOL. 10, NO. 8, Aug. 2016 3753 Copyrght c2016 KSII Instantaneous Farness of TCP n Heterogeneous Traffc Wreless LAN Envronments Young-Jn Jung 1 and

More information

TIME-DRIVEN ACCESS AND FORWARDING IN IEEE MESH NETWORKS

TIME-DRIVEN ACCESS AND FORWARDING IN IEEE MESH NETWORKS 1 TIME-DRIVE ACCESS AD FORWARDI I IEEE 8011 MESH ETWORKS Maro Bald and Rccardo acomell Abstract Varous solutons based on both prortzaton and resource allocaton have been proposed n the lterature and standard

More information

A fair buffer allocation scheme

A fair buffer allocation scheme A far buffer allocaton scheme Juha Henanen and Kalev Klkk Telecom Fnland P.O. Box 228, SF-330 Tampere, Fnland E-mal: juha.henanen@tele.f Abstract An approprate servce for data traffc n ATM networks requres

More information

Performance Analysis of the IEEE MAC Protocol over a WLAN with Capture Effect

Performance Analysis of the IEEE MAC Protocol over a WLAN with Capture Effect Vol. IPSJ Dgtal Courer Nov. 25 Regular Paper Performance Analyss of the IEEE 82. MAC Protocol over a WLAN wth Capture Effect Xaolong L, and Qng-An Zeng, In ths paper, we use a dscrete Markov chan model

More information

A Novel Fuzzy Stochastic Routing Protocol For Mobile AdHoc Network

A Novel Fuzzy Stochastic Routing Protocol For Mobile AdHoc Network Avalable Onlne at www.jcsmc.com Internatonal Journal of Computer Scence and Moble Computng A Monthly Journal of Computer Scence and Informaton Technology IJCSMC, Vol. 2, Issue. 0, October 203, pg.98 06

More information

Detection of masquerade attacks on Wireless Sensor Networks

Detection of masquerade attacks on Wireless Sensor Networks Detecton of masquerade attacks on Wreless Sensor Networks Vjay Bhuse,, Ajay Gupta and Ala Al-Fuqaha Department of Computer Scence, Western Mchgan Unversty, alamazoo, MI 49008 Insttute of Securty Technology

More information

Goals and Approach Type of Resources Allocation Models Shared Non-shared Not in this Lecture In this Lecture

Goals and Approach Type of Resources Allocation Models Shared Non-shared Not in this Lecture In this Lecture Goals and Approach CS 194: Dstrbuted Systems Resource Allocaton Goal: acheve predcable performances Three steps: 1) Estmate applcaton s resource needs (not n ths lecture) 2) Admsson control 3) Resource

More information

Department of Electrical and Computer Systems Engineering

Department of Electrical and Computer Systems Engineering Department of Electrcal and Computer Systems Engneerng Techncal Report MECSE-5-2004 A Survey of IEEE 802.11 MAC Mechansms for Qualty of Servce (QoS) n Wreless Local Area Networks (WLANs) D. Pham, A. Sekercoglu

More information

Traffic Priority Based Adaptive and Responsive Congestion and Rate Control for Wireless Mesh Networks

Traffic Priority Based Adaptive and Responsive Congestion and Rate Control for Wireless Mesh Networks Computer and Informaton Scence; Vol. 7, No. 2; 2014 ISSN 1913-8989 E-ISSN 1913-8997 Publshed by Canadan Center of Scence and Educaton Traffc Prorty Based Adaptve and Responsve Congeston and Rate Control

More information

A Distributed Three-hop Routing Protocol to Increase the Capacity of Hybrid Wireless Networks

A Distributed Three-hop Routing Protocol to Increase the Capacity of Hybrid Wireless Networks Ths artcle has been accepted for publcaton n a future ssue of ths journal, but has not been fully edted. Content may change pror to fnal publcaton. Ctaton nformaton: DOI.9/TMC.25.2388476, IEEE Transactons

More information

Long Lifetime Routing in Unreliable Wireless Sensor Networks

Long Lifetime Routing in Unreliable Wireless Sensor Networks 211 Internatonal Conference on Networkng, Sensng and Control Delft, the Netherlands, 11-13 Aprl 211 Long Lfetme Routng n Unrelable Wreless Sensor Networks Hamed Yousef, Mohammad Hossen Yeganeh, Al Movaghar

More information

High Performance DiffServ Mechanism for Routers and Switches: Packet Arrival Rate Based Queue Management for Class Based Scheduling

High Performance DiffServ Mechanism for Routers and Switches: Packet Arrival Rate Based Queue Management for Class Based Scheduling Hgh Performance DffServ Mechansm for Routers and Swtches: Packet Arrval Rate Based Queue Management for Class Based Schedulng Bartek Wydrowsk and Moshe Zukerman ARC Specal Research Centre for Ultra-Broadband

More information

Wishing you all a Total Quality New Year!

Wishing you all a Total Quality New Year! Total Qualty Management and Sx Sgma Post Graduate Program 214-15 Sesson 4 Vnay Kumar Kalakband Assstant Professor Operatons & Systems Area 1 Wshng you all a Total Qualty New Year! Hope you acheve Sx sgma

More information

Reducing Frame Rate for Object Tracking

Reducing Frame Rate for Object Tracking Reducng Frame Rate for Object Trackng Pavel Korshunov 1 and We Tsang Oo 2 1 Natonal Unversty of Sngapore, Sngapore 11977, pavelkor@comp.nus.edu.sg 2 Natonal Unversty of Sngapore, Sngapore 11977, oowt@comp.nus.edu.sg

More information

Buffer-aided link selection with network coding in multihop networks

Buffer-aided link selection with network coding in multihop networks Loughborough Unversty Insttutonal Repostory Buffer-aded lnk selecton wth network codng n multhop networks Ths tem was submtted to Loughborough Unversty's Insttutonal Repostory by the/an author. Ctaton:

More information

ARTICLE IN PRESS. Signal Processing: Image Communication

ARTICLE IN PRESS. Signal Processing: Image Communication Sgnal Processng: Image Communcaton 23 (2008) 754 768 Contents lsts avalable at ScenceDrect Sgnal Processng: Image Communcaton journal homepage: www.elsever.com/locate/mage Dstrbuted meda rate allocaton

More information

Synchronous Distributed Wireless Network Emulator for High-Speed Mobility: Implementation and Evaluation

Synchronous Distributed Wireless Network Emulator for High-Speed Mobility: Implementation and Evaluation Synchronous Dstrbuted Wreless Network Emulator for Hgh-Speed Moblty: Implementaton and Evaluaton Mnoru Kozum, Tomoch Ebata Yokohama Research Laboratory, Htach, Ltd., 292 Yoshda-cho, Totsuka-ku, Yokohama,

More information

A New Feedback Control Mechanism for Error Correction in Packet-Switched Networks

A New Feedback Control Mechanism for Error Correction in Packet-Switched Networks Proceedngs of the th IEEE Conference on Decson and Control, and the European Control Conference 005 Sevlle, Span, December -15, 005 MoA1. A New Control Mechansm for Error Correcton n Packet-Swtched Networks

More information

Mathematics 256 a course in differential equations for engineering students

Mathematics 256 a course in differential equations for engineering students Mathematcs 56 a course n dfferental equatons for engneerng students Chapter 5. More effcent methods of numercal soluton Euler s method s qute neffcent. Because the error s essentally proportonal to the

More information

Applications and Challenges of the e EDCA Mechanism: An Experimental Study

Applications and Challenges of the e EDCA Mechanism: An Experimental Study Applcatons and Challenges of the 80.e EDCA Mechansm: An Expermental Study Albert Banchs, Arturo Azcorra, Carlos García, and Rubén Cuevas, Unversty Carlos III of Madrd Abstract In ths artcle we conduct

More information

A Spatiotemporal Communication Protocol for Wireless Sensor Networks

A Spatiotemporal Communication Protocol for Wireless Sensor Networks IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, TPDS-0195-1003.R2 1 A Spatotemporal Communcaton Protocol for Wreless Sensor Networks Tan He, Member, IEEE, John A. Stankovc, Fellow, IEEE, Chenyang

More information

Distributed Topology Control for Power Efficient Operation in Multihop Wireless Ad Hoc Networks

Distributed Topology Control for Power Efficient Operation in Multihop Wireless Ad Hoc Networks Dstrbuted Topology Control for Power Effcent Operaton n Multhop Wreless Ad Hoc Networks Roger Wattenhofer L L Paramvr Bahl Y-Mn Wang Mcrosoft Research CS Dept. Cornell Unversty Mcrosoft Research Mcrosoft

More information

High Utility Video Surveillance System on Public Transport using WiMAX technology

High Utility Video Surveillance System on Public Transport using WiMAX technology Edth Cowan Unversty Research Onlne ECU Publcatons Pre. 2011 2010 Hgh Utlty Vdeo Survellance System on Publc Transport usng WMAX technology Iftekhar Ahmad Edth Cowan Unversty Daryoush Habb Edth Cowan Unversty

More information

On the Exact Analysis of Bluetooth Scheduling Algorithms

On the Exact Analysis of Bluetooth Scheduling Algorithms On the Exact Analyss of Bluetooth Schedulng Algorth Gl Zussman Dept. of Electrcal Engneerng Technon IIT Hafa 3000, Israel glz@tx.technon.ac.l Ur Yechal Dept. of Statstcs and Operatons Research School of

More information