Collision Avoidance and Resolution Multiple Access: First-Success Protocols
|
|
- Victor Johnston
- 6 years ago
- Views:
Transcription
1 Collision Avoidance and Resoltion Mltiple Access: First-Sccess Protocols Rodrigo Garcés and J.J. Garcia-Lna-Aceves askin Center for Compter Engineering and Information Sciences University of California at Santa Crz Santa Crz, CA 9564, USA Abstract Collision avoidance and resoltion mltiple access (CARMA) protocols establish a three-way handshake between sender and receiver to attempt to avoid collisions, and resolve those collisions that occr. This paper describes and analyzes CARMA protocols that resolve collisions p to the first sccess obtained by rnning a tree-splitting algorithm for collision resoltion. An pper bond is derived for the average costs of resolving collisions of floor reqests sing the tree-splitting algorithm is obtained and applied to the comptation of the average channel tilization in a flly connected network with a large nmber of stations. Or analysis indicates that, becase CARMA protocols garantee a sccessfl transmission for every bsy period of the channel, it achieves higher throghpt than other contention-based MAC protocols based on collision-avoidance handshakes. I. INTRODUCTION Several medim access control (MAC) protocols have been proposed over the past few years that are based on three- or for-way handshake procedres meant to redce the nmber of collisions among data packets, thereby providing better performance than the basic ALOHA or CSMA protocols [2], [3], [4], [5], [6], [9], [], [2]. The concept of floor acqisition was first introdced by Fllmer and Garcia-Lna-Aceves [5] for MAC protocols based on three- or for-way handshake procedres. In a single-channel network, floor acqisition entails allowing one and only one station at a time to send data packets withot collisions. Protocols that provide correct floor acqisition have been called floor acqisition mltiple access (FAMA) protocols. A FAMA protocol reqires a station who wishes to send one or more packets to acqire the right to se the channel exclsively (called the floor) before transmitting the data packets. In FAMA-NTR [5], before transmitting a data packet, a station senses the state of the channel to see if it is idle or not. If the channel is bsy, the station backs off and tries to acqire the channel at a later time; on the other hand, if the channel is sensed to be free, the station sends an. In short, stations follow a non-persistent CSMA strategy for the transmission of s. The sender listens to the channel for one maximm rond-trip time pls the time needed for the destination to send a CTS. If the CTS is not corrpted and is received within the time limit, the transmission of data packets from the sender proceeds. The CTS is sent by the destination station to let other stations in the system know that the floor of the channel has been acqired. Accordingly, when a station receives a correct CTS, it backs off ntil the channel is released by the sender. Althogh each station transmits an only when it determines that the channel is free, a collision with other transmissions may still occr de to propagation delays. s are vlnerable to collisions for time periods eqal to the propagation delays between senders of s. Dring these periods, mltiple stations may sense the channel free and also send s, ths casing collisions. FAMA protocols solve collisions by backing off and reschedling transmissions [5], [6]. As with CSMA protocols, this procedre yields good reslts if the traffic is low; however, the probability of collisions increases as the rate of transmissions increases, with a corresponding decrease of system throghpt. Eventally, as the This work was spported in part by DARPA nder Grants DAA7-95-C-D57 and DAAH transmission rate increases, the constant collisions case the channel to collapse, bringing the flow of data packets to a halt. To remedy this problem, we present CARMA (collision avoidance and resoltion mltiple access) protocols that resolve the collisions of s by allowing one to scceed in every rond of contention sing a tree-splitting algorithm. In high-speed wireless networks sing s mch smaller than data packets, these protocols improve over the performance of FAMA protocols, and other prior MAC protocols based on collision-avoidance handshakes, becase every new rond of sbmissions to the channel reslts in a sccessfl transmission of data packets, and the average time needed to obtain a sccess in a rond of contention is very small compared to the dration of data packets. Sections II and III describe a specific protocol, which we call CARMA-FS (for first sccess), and which ses non-persistent carrier sensing for the transmission of s and a tree-splitting algorithm to resolve collisions of s p to the first sccess. Section IV comptes an pper bond on the average costs of resolving collisions, i.e., the times associated with the evental sccessfl transmission of all data packets involved in a collision-resoltion tree; the importance of these bonds is that they are independent of the nmber of stations in the network. Section V ses them to compte a lower bond of average throghpt achieved by CARMA-FS when a very large poplation of nodes is assmed. We show that the throghpt achieved by CARMA-FS is always better than the throghpt of FAMA protocols. Section VI offers or conclding remarks. II. CARMA-FS CARMA-FS ses carrier sensing for the transmission of s and a tree-splitting algorithm to obtain the first sccess among a set of colliding s. more sophisticated collision-resoltion algorithms [] can be sed to obtain the first sccess in a rond of contention. Each station mst know the maximm nmber of stations allowed in the system and the maximm propagation delay in the network. For the slotted version of CARMA-FS, a time slot is assmed to last as long as the maximm propagation delay. Each station is assigned a niqe identifier, a stack and two variables ). is initially the lowest ID nmber that is ( and allowed to send an, while is the highest ID nmber that is allowed to send an. Together they constitte the allowable ID interval that can send s, i.e., attempt to acqire the floor. If the ID of a station is not within this interval, it cannot send its. As we describe sbseqently, the stack is simply a storage mechanism for ID intervals that are waiting to get permission to send an. A station can be in one of five different states in CARMA-FS, namely: PASSIVE: The station has no local packets pending and no transmissions are detected in the channel. : The station is trying to acqire the floor and has sent an. XMIT: The station has the floor and is sending data packets. REMOTE: The station is receiving transmissions from other stations, and started to detect channel activity before it had any local packet to send.
2 ' ' ACKOFF: The station has local packets pending and had to reschedle its reqest for the floor. When a passive station has one or mltiple packets to send, it first listens to the channel. If the channel is bsy (i.e., carrier is detected), the station backs off and reschedles its at some time into the ftre. Alternatively, if the channel is clear (i.e., no carrier is detected) for one maximm rond-trip time, the station transmits an. The sender then waits and listens to the channel for one maximm rond-trip time pls the time needed for the destination to send a CTS. When the originator receives the CTS from the destination, it acqires the floor and begins transmitting its data packet brst. The sender is limited to a maximm nmber of data packets, after which it mst release the channel and mst compete for the floor at a later time if it still has data packets to send. If the sender of an does not receive a CTS within a time limit, the sender as well as all other stations in the system know that a collision has occrred. As soon as the first collision takes place, every station divides the ID interval into two ID intervals. The! first ID interval, "$#%& which we will call the backoff ID interval, is (*),+, while the second ID interval, the allowed ID interval, is -&"$#% (.. Each station in the system pdates the stack by execting a PUSH stack command, the key being pshed is the backoff ID interval. After this is done, the station pdates and with the vales from the allowed ID interval. This procedre is repeated each time a collision is detected, ntil a sccessfl transmission is achieved. Only those stations that were in the state at the time the first collision occrred are allowed into the collision-resoltion phase of the protocol. All other stations will be in REMOTE state ntil the collisionresoltion phase ends. Collision resoltion evolves in terms of collisionresoltion intervals. In the first interval of the collision-resoltion phase all stations in the allowed ID interval that are in the state try to retransmit an. If none of the stations within this ID interval reqest the channel, the channel will be idle for a time period eqal to two times the maximm channel delay (/ ). At this point, a new pdate of the stack and of the variables and is de. Each station exectes a POP command in the stack. This new ID interval now becomes the new and. The second alternative is for mltiple stations to reqest the channel casing a collision. The stations in the allowed ID interval are once more split into two new ID intervals and the stack as well as the variables for each station are pdated. In this case, the dration of the collision-resoltion interval is eqal to the collision time pls the channel delay. The algorithm repeats these steps ntil the first sccessfl /CTS exchange is achieved. This is the case when only one station in the allowed ID interval is reqesting the channel; the originator receives the CTS from the destination and begins transmitting its data packet brst, after which the station releases the channel and transitions to the PASSIVE state. The total time for this sccessfl transmission is at most eqal to the dration of an, a CTS, the data packet brst, pls three channel delays. Notice that, as soon as the first sccess is achieved, all stations know that the collisions-resoltion phase has ended. Accordingly, once the treesplitting algorithm terminates, all stations are either in the PASSIVE state, or in the ACKOFF state if they have packets to send. A waiting period of two times the maximm channel delay dring which the channel is idle occrs pon termination of the tree-splitting algorithm. The next access to the channel is driven by the arrival of new packets to the stations and the transmission of s that have been backed off. To permit the transmission of packet brsts, CARMA-FS enforces waiting periods on receiving stations at strategic points in the operation of the protocol. A station that has received a data packet in the clear mst wait for one maximm propagation time after processing a data packet, this allows the sender to send more packets if desired. A station that has nderstood any control packet mst wait for twice the dration of the maximm propagation time; this allows correct /CTS exchanges to take place. On the other hand, if a transmitting station is in the state, the protocol enforces a waiting period of two maximm propagation times after sending its. This allows the destination to receive the and transmit the corresponding CTS. A sending station mst also wait one maximm propagation time after the last data packet of its packet train. III. EXAMPLE We illstrate CARMA-FS sing a simple example. Each station has a distinct position in the leaves of a binary tree based on its ID. If is the total nmber of stations in the system, the binary tree has /32 + nodes. The root of the tree is labeled as %4 and its right and left child as 5 and 76, respectively. For each of the other nodes, the labels are composed of the parent label, pls a 8 if it is the left child or a + if it is a right child. As an example, take a system with for stations labeled 6$6, 6 5,!5 6, and!5$5. The binary tree has a total of seven nodes with the for stations as its leaves. The root of the tree has the label %4. The left child of the root node is 5 while its right child is 76. Station 76 is the parent node of 76 5 and 76$6. Similarly, station 5 6 is the right child of node 5, while station!5$5 is its left child. We define the sbtree 9%:<;&=?>$: as the sbtree at node %:<;&=@>$:. In or example, the sbtree for node 6 5 is Assme that, at time A ", we are at node 4 and we are allowed to listen simltaneosly at all the stations of its sbtree 9%4 for a time period of seconds. Only one of the following three things can occr: Case Idle: There are no s in any of the leaves (stations) in sbtree 9%4 ; therefore, the channel is idle. This lasts an idle transmission period 9. Case 2 Sccess: There is only one in the sbtree 9 4 ; therefore, there is no collision and a station acqires the floor terminating the collision-resoltion phase. This lasts one sccessfl transmission period 9!C. Case 3 Collision: There are two or more stations (leaves) in the sbtree 9 4 sending an ; therefore, a collision occrs. This lasts one failed transmission period 9!D. Assme that, at time AE6, Case 3 occrs with station 76$6 and 76 5 each sending an in the same slot, while station 5 6 and station 5$5 do not reqest the channel. Fig. illstrates this. The first collision occrs at time A 6 ; all stations in the system notice the beginning of the resoltion F algorithm and pdate their stacks and their as well as their vales. Stations 6$6 and 6 5 are members of the backoff ID interval; therefore, they wait ntil the collisions in the allowed ID interval are resolved. They both are exclded from sending s. After a time period 9 D, Stations!5 6 and!5$5 are allowed to reqest for the channel. Since stations 5 6 and 5$5 in tree 9 5 do not wish the channel, the first case applies here. After 9 HG /I seconds, all stations notice that the channel is idle, which means that there were no collisions in tree 9!5. All the stations in the system mst pdate their intervals and the stack. They execte a POP-stack command and the new allowable interval is?j6$ ; therefore, 9 6 can proceed to solve its collisions. oth stations 6$6 and 6 5 transmit an control packet and Case 3 occrs again. Since a collision occrred, the interval is split, i.e.,, the sbtree 9 6 is split in two halves, 976$6 and Station 76 5 is within the allowable interval while the 76$6 station mst wait, its interval is the top of the stack. Since has only one station reqesting the channel, that station acqires the floor and transmits its data package. At this point, all the stations know that the collision-resoltion phase has terminated, becase a sccessfl /CTS exchanged was sensed by all stations. The stations empty their stacks and pdate the allowable ID interval allowing all stations to contend in the next rond of contention. Fig. illstrates the transmission for each of the GLK stations in the system, as well as in channel for the nslotted version of CARMA-FS. ICC 97 2 Rodrigo Garcés and J.J. Garcia-Lna-Aceves
3 s Stack before first collision Allowable Interval Station n Station n Station n Station Channel T QQQ QQQ QQQ QQQ QQQ QQQ QQQ QQQ QQQ QQQ RRR RRR RRR RRR RRR RRR RRR RRR RRR SSS SSS SSS SSS SSS SSS SSS SSS SSS TTT TTT TTT TTT TTT TTT TTT TTT nr MN MN O OP OP CTS DATA CTS DATA n n n n Idle Idle first collision Allowable Interval Idle n τ τ T second collision n n n n n n n first sccess Allowable Interval Allowable Interval Allowable Interval LowID HiID LowID HiID HiID HiID HiID LowID LowID LowID (n,n) Fig.. Transmission period and tree strctre to solve the collisions for a system with UWVX stations ot of which Y,V[Z are reqesting the floor. \^]-X_?Z&` VaZ, b ]XI_cZ&` Ved and f ]XI_?Z&`^Vgd. IV. AVERAGE COLLISION RESOLUTION COSTS For the prpose of or analysis, we assme that (a) the channel introdces no errors, so packet collisions are the only sorce of errors, and stations detect sch collisions perfectly, (b) two or more transmissions that overlap in time in the channel mst all be re-transmitted, and (c) a packet propagates to all stations in exactly seconds []. The average size of a data packet is h seconds, and and CTS packets are of size i seconds. oth h i and are assmed to be mltiples of in order to accommodate the comparison with the slotted version of the protocol. There are only three possible cases to consider for the resoltion of collisions: idle, sccess, or collision. For each of these cases, we obtained [8] three distinct average-cost recrsive eqations: jk? &ln for the idle case, op? (n) for the sccess case, and q!? τ time for the collision case. These three costs depend on the total nmber of stations in the system and the nmber l of stations with one. They represent an average nmber over all the possible permtations of l s in total stations ntil the first sccessfl /CTS exchange. In [8] we se mathematical indction to prove the pper bonds for the average idle cost j*? rl and for the average collision cost q!? rl lts. For all + and +, we find that jk?. ' 5 and q!? rl3wvxiy l 2 +. op? contribtes positively to the overall throghpt of the system. Every rond of contention is garanteed to allow one sccessfl /CTS exchange, therefore, oz? {l G +. V. THROUGHPUT ANALYSIS The analysis in this section makes the same assmptions introdced in the previos section and ses the same traffic model sed for the FAMA- NTR protocol [5]. Given that the pper bonds on average collisionresoltion costs are independent of the nmber of stations, we approximate the traffic into the channel with an infinite nmber of stations, each having at most one to send at any time, and forming a Poisson sorce sending s with an aggregate mean generation rate of s per nit time. With this model, the average nmber of arrivals in a time interval of length 9 is }9 l, i.e., G }9. All data blocks have a dration of h seconds. The average channel throghpt is given by ~z H ƒ () is the average tilization time of the channel, dring which the channel is being sed to transmit data packets; is the expected dration of a bsy period, dring which the channel is bsy with sccessfl or nsccessfl transmissions; and is the average idle period, i.e., the average interval between two consective bsy periods. A. A sccessfl transmission consists of an with one propagation delay to the intended recipient, a CTS with a propagation delay to the sender, and a data packet followed by a propagation delay. Therefore, the average dration period for a sccessfl transmission is I %Hˆ?! zš{ J zœ (2) For an to be sccessfl, it mst be the only packet in the channel dring its transmission. Its probability of sccess eqals the probability that no arrivals occr in seconds, becase there is a delay across the channel of seconds before all the other stations in the network detect the carrier signal. After this vlnerability period of seconds, all stations defer their transmissions. Therefore, given that arrivals of s to the channel are Poisson with parameter, we obtain I %H 7Ž No arrivals in seconds H $ (3) The nmber of stations that participate in the collision-resoltion phase is l G 7. Within the tree, the three cases of the collision resoltion discssed in the previos sections are present. Each one of them has an average pper bond cost that is independent of the nmber of stations ( ), bt is a fnction of the nmber of stations reqesting the channel ( l ). In the case of a colliding transmission ( l s + ), the time period consists of one package followed by one or more s transmitted by other stations within time, 8, pls one propagation delay. Accordingly, the average dration of a failed transmission period is l bonded by 9 D i 2 / [5]. In the case of an idle transmission ( G 8 ), the time period has a dration eqals to two propagation delays. Accordingly, the average dration of an idle transmission period is 9 G /I. A bsy period is composed of both the sccessfl and the tree transmission periods. A waiting period of /I seconds is reqired for both transmission periods. The dration of an average bsy period eqals the sm of the percentage of sccessfl transmission periods times their dration, 9!C, pls the percentage of the tree periods times their dration. The tree periods are composed of three parts, corresponding to sccess, idle, and collision periods, each with a distinct cost and dration. According to the pper bonds derived in [8], the average bsy period can be bonded as follows: š œ Ÿž? ž- I ˆ?ª ž žž ˆ$ $ &? ž c Š{ c { ž! zˆ$ $ &? ž c I zš?! z«{ J pœ (4) The channel carries ser data for h seconds dring each transmission period; therefore, G h. The average idle period is eqal to the average interarrival time pls the average waiting period enforced. ƒ zˆ{ zˆ{ ž zˆ{ (5) Sbstitting the vales for, and obtained above into Eq. (), we obtain the following lower bond for the average throghpt of CARMA- FS: ~ Œ z (6) ICC 97 3 Rodrigo Garcés and J.J. Garcia-Lna-Aceves
4 ž pˆ c ž $ zš ž zˆ c? ž $ Š z Œ size of s and CTSs is /Ã8 bytes. We normalize the throghpt reslt by setting G + and defining the following variables Ä Œ (normalized data packets) ÅÆ (normalized control packets) Ç (normalized offered load) (). In this section, we se the same assmptions sed for nslotted CARMA-FS. The channel is slotted and each slot lasts a maximm propagation delay. With slotting, stations are restricted to start transmissions only on slot bondaries. As it was the case in nslotted CARMA-FS, the average dration period for a sccessfl transmission is given by Eq. (2). The probability that an is sccessfl is H 7Ž$± ² arrival in a slot³ some arrivals in a slot (7) ĺ s In the case of a colliding transmission ( + ), the time period consists of one followed by a propagation delay. All colliding s are sent at the beginning of the same slot; accordingly, we have 9 D G i 23. As it was done for nslotted CARMA-FS, can be bonded according to Eq (4). Sbstitting the vales for µ C, 9 D, 9!C, 9 l and, we obtain I I 7 ž<? ž- ¹ ˆ º ª ž I c ž< c ž c zš@! z»$ 7 zœ ž Ÿ ž F ˆ? ž c ž ž< ˆ ˆ Š@»$ Œ$ ž- The average idle period is ƒ zˆ{ I ^ zˆ{ ž I $ zˆ{ (9) The average tilization is simply h. Sbstitting this vale and Eqs. (8) and (9) into Eq. (), we obtain the following lower bond on the average throghpt of slotted CARMA-FS: ~z Œ ž Ÿ Ÿ z () ž! c ^ ˆ m? ž $ p % zˆ ˆ pš?! z¼{ J zœ ž< c ž $ Š? z Œ C. Nmerical Reslts We compare CARMA-FS with FAMA-NTR for the cases of a lowspeed network (½I¾8I8 b/s) and high-speed network ( + Mb/s) in which either small data packets ( À bytes) or large data packets (K 88 bytes) are transmitted. We assme the distance between stations to be the same and define the diameter of the network to be + mile. Assming these parameters, the propagation delay of the channel is Á K s. In order to accommodate the se of IP addresses for destination and sorce, the minimm (8) Sbstitting the new normalized variables from Eq. () into Eq. (6), we obtain ~ Ä 7È Ç z (2) È ž Å zˆ@ m? ž<ç^ I zå zš È ž Å zˆ@ &? ž<ç7 Š@Å F 7 Ä for nslotted CARMA-FS. The throghpt of nslotted FAMA-NTR in [5] normalize with the variables in Eq. () is For slotted CARMA-FS we obtain ~ Ä Ä Ä Ä zå ž<ˆ Ç Ç z Ç ž<é zåe (3) ~ Ä ž Ç È Ç z È (4) È ž<å zå Ç H Ç7 ž Ç7 ž<å ÇH zˆ@çf pš?å Ä z¼? È ž Å} ž Ç7 ž<š?å Ä while the throghpt of slotted FAMA-NTR in [5] normalize with the variables in Eq. () is ~ Ä Ä Ä Ç^ Ç ž Ä zå Ç Ç ž Š} zå Êž- Ç (5) Table I smmarizes the protocol parameters sed in or comparison. Network Speed Packet Size Œ Ä Œ Å7 96 bps 424 bits Ë s bps 32 bits Ë s Mbps 424 bits 424 Ë s Mbps 32 bits 32 Ë s TALE I PROTOCOL VARIALES FOR LOW-SPEED NETWORKS (ÌrÍ&Î&Î PS) AND HIGH-SPEED NETWORKS ( d MPS) WITH TWO TYPES OF DATA PACKETS, SMALL (XZ X ITS) OR LARGE (ÏZ&ÎrÎ ITS). THE CHANNEL DELAY ÐzVÑÃÒ XÓ S, WHILE THE CONTROL PACKETS ARE dmí&î ITS LONG. Figs. 2 and 3 show the average throghpt (S) verss the offered load (G) for CARMA-FS and FAMA-NTR. It is clear that slotting does not provide mch performance improvement in CARMA-FS, and that to achieve high throghpt the size of the control packets need to be small compared to the length of the data packets or packet trains. CARMA-FS behaves like FAMA-NTR when the offered load is small. As the offered Ç ICC 97 4 Rodrigo Garcés and J.J. Garcia-Lna-Aceves
5 FAMA-NTR verss CARMA-FS: Low Speed, Small Packets FAMA-NTR verss CARMA-FS: Low Speed, Large Packets e Fig. 2. Throghpt of FAMA-NTR and CARMA-FS for low-speed network..8 FAMA-NTR verss CARMA-FS: High Speed, Small Packets.8 FAMA-NTR verss CARMA-FS: High Speed, Large Packets Simlation CARMA-FS e Fig. 3. Throghpt of FAMA-NTR and CARMA-FS for high-speed network. load increases, the throghpt of FAMA-NTR decreases rapidly, while CARMA-FS decreases logarithmically at a mch slower rate. To verify that the vale of Ô approximated sing an infinite poplation and the pper bonds on average costs for collision resoltion times provides a good lower bond for any traffic load, we simlated slotted CARMA-FS sing 65 stations that generate s according to a Poisson probability distribtion l fnction. The simlations were done ten times for each given G vale to insre convergence. The reslts of the simlation are shown in Fig. 3 only for the case of long data packets in a high-speed network, and indicate that or analysis provides a very good approximation of the average throghpt. VI. CONCLUSIONS CARMA-FS implements a three-way handshake based on small control packets between sender and receiver, pls a limited collision resoltion algorithm ensring that there is always a sccessfl dring each bsy period. Or analysis shows that this limited collision resoltion improves the performance of FAMA protocols considerably; or simlation validates the simplifying assmptions made to obtain a lower bond of average throghpt as a fnction of channel load. The importance of exploring limited collision resoltion lies on its potential application to wireless networks with dynamic topologies, in which the nodes engaged in collision resoltion may move, therefore changing the constitency of the tree. A protocol aimed at resolving the first sccess is attractive in a dynamic setting, becase resolving the first sccess can be done faster than resolving an entire tree [7]. Or work contines to explore the performance of limited resoltion algorithms when the members of the tree have inconsistent information abot the allowable ID interval. REFERENCES [] D. ertsekas and R. Gallager, Data Networks, Second Edition, Prentice-Hall, 992. [2] V. harghavan, A. Demers, S. Shenker, and L. Zhang, MACAW: A Media Access Protocol for Wireless LAN s, in Proc. of ACM SIGCOMM 94, pp , ACM, 994. [3] K. iba, A Hybrid Wireless MAC Protocol Spporting Asynchronos and Synchronos MSDU Delivery Services, Tech. Rep. Paper 82./9-92, IEEE 82. Working Grop, 992. [4] R. L. rewster and A. M. Glass, Throghpt Analysis of Non-Persistent and Slotted Non-Persistent CSMA/CA Protocols, in Proc. 4th International Conference on Land Mobile Radio, pp. 23 6, Instittion of Electronic and Radio Engineers, 987. [5] C. Fllmer and J.J. Garcia-Lna-Aceves, Flooracqisition mltiple access forpacket-radionetworks, Proc. ACM SIGCOMM 95, Cambridge, MA, Agst 3-September, 995. [6] C. Fllmer and J.J. Garcia-Lna-Aceves, FAMA-PJ: A Channel Access Protocol for Wireless LANs, Proc. ACM Mobile Compting and Networking 95, erkeley, CA, Nov. 4-5, 995. [7] R. Garcés and J.J. Garcia-Lna-Aceves, Floor Acqisition Mltiple Access with Collision Resoltion, Proc. ACM Mobile Compting and Networking 96, Rye, NY, Nov. -2, 996. [8] R. Garcés and J.J. Garcia-Lna-Aceves, Collision avoidanceand resoltion mltiple access with transmission grops, Proc. IEEE INFOCOM 97, Kobe, Japan, April 7-, 997. [9] P. Karn, MACA - a new channel access method for packet radio, in ARRL/CRRL Amater Radio 9th Compter Networking Conference, pp. 34 4, ARRL, 99. [] L. Kleinrock and F. A. Tobagi, Packet switching in radio channels: Part I - carrier sense mltipleaccess modes and their throghpt-delay characteristics, IEEE Trans. Commn., vol. COM-23, no. 2, pp. 4 46, 975. [] W. F. Lo and H. T. Moftah, Carrier Sense Mltiple Access with Collision Detection for Radio Channels, in IEEE 3th International Commnications and Energy Conference, pp , IEEE, 984. [2] G. S. Sidh, R. F. Andrews, and A.. Oppenheimer, Inside AppleTalk, Second Edition. Addison-Wesley Pblishing Company, Inc., 99. ICC 97 5 Rodrigo Garcés and J.J. Garcia-Lna-Aceves
Collision Avoidance and Resolution Multiple Access: First-Success Protocols
Collision Avoidance and Resolution Multiple Access: First-uccess Protocols Rodrigo Garcés and J.J. Garcia-Luna-Aceves Baskin Center for Computer Engineering and Information ciences University of California
More informationThe Disciplined Flood Protocol in Sensor Networks
The Disciplined Flood Protocol in Sensor Networks Yong-ri Choi and Mohamed G. Goda Department of Compter Sciences The University of Texas at Astin, U.S.A. fyrchoi, godag@cs.texas.ed Hssein M. Abdel-Wahab
More informationAn Adaptive Strategy for Maximizing Throughput in MAC layer Wireless Multicast
University of Pennsylvania ScholarlyCommons Departmental Papers (ESE) Department of Electrical & Systems Engineering May 24 An Adaptive Strategy for Maximizing Throghpt in MAC layer Wireless Mlticast Prasanna
More informationCautionary Aspects of Cross Layer Design: Context, Architecture and Interactions
Cationary Aspects of Cross Layer Design: Context, Architectre and Interactions Vikas Kawadia and P. R. Kmar Dept. of Electrical and Compter Engineering, and Coordinated Science Lab University of Illinois,
More informationIEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 6, NO. 5, MAY On the Analysis of the Bluetooth Time Division Duplex Mechanism
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 6, NO. 5, MAY 2007 1 On the Analysis of the Bletooth Time Division Dplex Mechanism Gil Zssman Member, IEEE, Adrian Segall Fellow, IEEE, and Uri Yechiali
More informationCollision Avoidance and Resolution Multiple Access for Multichannel Wireless Networks
1 Collision Avoidance and Resolution Multiple Access for Multichannel Wireless Networks RODRIGO GARCÉS rgarces@metricom.com Metricom Inc. 980 University Avenue Los Gatos, CA 95032 J.J. GARCIA-LUNA-ACEVES
More informationThe MAC layer in wireless networks
The MAC layer in wireless networks The wireless MAC layer roles Access control to shared channel(s) Natural broadcast of wireless transmission Collision of signal: a /space problem Who transmits when?
More information/99/$10.00 (c) 1999 IEEE
COLLISION-FREE MEDIUM ACCESS CONTROL SCHEME FOR AD-HOC NETWORKS Zygmunt J. Haas and Jing Deng School of Electrical Engineering Cornell University Ithaca, NY 14853 haas@ee.cornell.edu Siamak Tabrizi US
More informationPerformance of Floor Acquisition Multiple Access in Ad-Hoc Networks
Performance of Floor Acquisition Multiple Access in Ad-Hoc Networks J.J. Garcia-Luna-Aceves and Chane L. Fullmer Abstract The performance of the FAMA-NCS protocol in ad-hoc networks is analyzed. FAMA-NCS
More informationOn the Computational Complexity and Effectiveness of N-hub Shortest-Path Routing
1 On the Comptational Complexity and Effectiveness of N-hb Shortest-Path Roting Reven Cohen Gabi Nakibli Dept. of Compter Sciences Technion Israel Abstract In this paper we stdy the comptational complexity
More information(2, 4) Tree Example (2, 4) Tree: Insertion
Presentation for se with the textbook, Algorithm Design and Applications, by M. T. Goodrich and R. Tamassia, Wiley, 2015 B-Trees and External Memory (2, 4) Trees Each internal node has 2 to 4 children:
More informationThe MAC layer in wireless networks
The MAC layer in wireless networks The wireless MAC layer roles Access control to shared channel(s) Natural broadcast of wireless transmission Collision of signal: a time/space problem Who transmits when?
More informationMultiple-Choice Test Chapter Golden Section Search Method Optimization COMPLETE SOLUTION SET
Mltiple-Choice Test Chapter 09.0 Golden Section Search Method Optimization COMPLETE SOLUTION SET. Which o the ollowing statements is incorrect regarding the Eqal Interval Search and Golden Section Search
More informationPipelined van Emde Boas Tree: Algorithms, Analysis, and Applications
This fll text paper was peer reviewed at the direction of IEEE Commnications Society sbject matter experts for pblication in the IEEE INFOCOM 007 proceedings Pipelined van Emde Boas Tree: Algorithms, Analysis,
More informationREPLICATION IN BANDWIDTH-SYMMETRIC BITTORRENT NETWORKS. M. Meulpolder, D.H.J. Epema, H.J. Sips
REPLICATION IN BANDWIDTH-SYMMETRIC BITTORRENT NETWORKS M. Melpolder, D.H.J. Epema, H.J. Sips Parallel and Distribted Systems Grop Department of Compter Science, Delft University of Technology, the Netherlands
More information5 Performance Evaluation
5 Performance Evalation his chapter evalates the performance of the compared to the MIP, and FMIP individal performances. We stdy the packet loss and the latency to restore the downstream and pstream of
More informationA Wireless MAC Protocol comparison.
Doc: IEEE P82.1192S1 IEEE 82.11 Wireless Access Method and Physical Layer Specifications Title: Presented by: A Wireless MAC Protocol comparison. Wim Diepstraten NCR SEUtrecht NCRAT&T Network Prodct Grop
More informationA sufficient condition for spiral cone beam long object imaging via backprojection
A sfficient condition for spiral cone beam long object imaging via backprojection K. C. Tam Siemens Corporate Research, Inc., Princeton, NJ, USA Abstract The response of a point object in cone beam spiral
More information/$10.00 (c) 1998 IEEE
Dual Busy Tone Multiple Access (DBTMA) - Performance Results Zygmunt J. Haas and Jing Deng School of Electrical Engineering Frank Rhodes Hall Cornell University Ithaca, NY 85 E-mail: haas, jing@ee.cornell.edu
More informationCost Based Local Forwarding Transmission Schemes for Two-hop Cellular Networks
Cost Based Local Forwarding Transmission Schemes for Two-hop Celllar Networks Zhenggang Zhao, Xming Fang, Yan Long, Xiaopeng H, Ye Zhao Key Lab of Information Coding & Transmission Sothwest Jiaotong University,
More informationPOWER-OF-2 BOUNDARIES
Warren.3.fm Page 5 Monday, Jne 17, 5:6 PM CHAPTER 3 POWER-OF- BOUNDARIES 3 1 Ronding Up/Down to a Mltiple of a Known Power of Ronding an nsigned integer down to, for eample, the net smaller mltiple of
More informationMaximum Weight Independent Sets in an Infinite Plane
Maximm Weight Independent Sets in an Infinite Plane Jarno Nosiainen, Jorma Virtamo, Pasi Lassila jarno.nosiainen@tkk.fi, jorma.virtamo@tkk.fi, pasi.lassila@tkk.fi Department of Commnications and Networking
More informationChannel-Hopping Multiple Access
Channel-Hopping Multiple Access Asimakis Tzamaloukas and J.J. Garcia-Luna-Aceves Computer Engineering Department Baskin School of Engineering University of California, Santa Cruz, California 9564 jamal,
More informationResearch Article Designing a Channel Access Mechanism for Wireless Sensor Network
Hindawi Wireless Commnications and Mobile Compting Volme 217, Article ID 7493269, 31 pages https://doi.org/1.1155/217/7493269 Research Article Designing a Channel Access Mechanism for Wireless Sensor Network
More informationThe final datapath. M u x. Add. 4 Add. Shift left 2. PCSrc. RegWrite. MemToR. MemWrite. Read data 1 I [25-21] Instruction. Read. register 1 Read.
The final path PC 4 Add Reg Shift left 2 Add PCSrc Instrction [3-] Instrction I [25-2] I [2-6] I [5 - ] register register 2 register 2 Registers ALU Zero Reslt ALUOp em Data emtor RegDst ALUSrc em I [5
More informationCongestion-adaptive Data Collection with Accuracy Guarantee in Cyber-Physical Systems
Congestion-adaptive Data Collection with Accracy Garantee in Cyber-Physical Systems Nematollah Iri, Lei Y, Haiying Shen, Gregori Calfield Department of Electrical and Compter Engineering, Clemson University,
More informationMinimal Edge Addition for Network Controllability
This article has been accepted for pblication in a ftre isse of this jornal, bt has not been flly edited. Content may change prior to final pblication. Citation information: DOI 10.1109/TCNS.2018.2814841,
More informationThe extra single-cycle adders
lticycle Datapath As an added bons, we can eliminate some of the etra hardware from the single-cycle path. We will restrict orselves to sing each fnctional nit once per cycle, jst like before. Bt since
More informationFault Tolerance in Hypercubes
Falt Tolerance in Hypercbes Shobana Balakrishnan, Füsn Özgüner, and Baback A. Izadi Department of Electrical Engineering, The Ohio State University, Colmbs, OH 40, USA Abstract: This paper describes different
More informationEvaluating Influence Diagrams
Evalating Inflence Diagrams Where we ve been and where we re going Mark Crowley Department of Compter Science University of British Colmbia crowley@cs.bc.ca Agst 31, 2004 Abstract In this paper we will
More informationReversing the Collision-Avoidance Handshake in Wireless Networks
Reversing the Collision-Avoidance Handshake in Wireless Networks J.J. Garcia-Luna-Aceves and Asimakis Tzamaloukas * Computer Engineering Department Baskin School of Engineering University of California,
More informationThis chapter is based on the following sources, which are all recommended reading:
Bioinformatics I, WS 09-10, D. Hson, December 7, 2009 105 6 Fast String Matching This chapter is based on the following sorces, which are all recommended reading: 1. An earlier version of this chapter
More informationLecture 12 December 04, Wireless Access. Graduate course in Communications Engineering. University of Rome La Sapienza. Rome, Italy
Lecture 12 December 04, 2017 Wireless Access Graduate course in Communications Engineering University of Rome La Sapienza Rome, Italy 2017-2018 Random Medium Access Control Part II - CSMA and Collision
More informationMillimeter-Wave Multi-Hop Wireless Backhauling for 5G Cellular Networks
2017 IEEE 85th Vehiclar Technology Conference (VTC-Spring) Millimeter-Wave Mlti-Hop Wireless Backhaling for 5G Celllar Networks B. P. S. Sahoo, Chn-Han Yao, and Hng-Y Wei Gradate Institte of Electrical
More informationCollision Avoidance and Resolution Multiple Access for Multichannel Wireless Networks
1 Collision Avoidance and Resolution Multiple Access for Multichannel Wireless Networks RODRIGO GARCÉS rgarces@metricom.com Metricom Inc. 980 University Avenue Los Gatos, CA 95032 J.J. GARCIA-LUNA-ACEVES
More informationLecture 17: Wireless Networking
Lectre 17: 802.11 Wireless Networking CSE 222A: Compter Commnication Networks Alex C. Snoeren Thanks: Lili Qi, Nitin Vaidya Lectre 17 Overview Project discssion Intro to 802.11 WiFi Jigsaw discssion CSE
More informationThe single-cycle design from last time
lticycle path Last time we saw a single-cycle path and control nit for or simple IPS-based instrction set. A mlticycle processor fies some shortcomings in the single-cycle CPU. Faster instrctions are not
More informationEfficient Scheduling for Periodic Aggregation Queries in Multihop Sensor Networks
1 Efficient Schedling for Periodic Aggregation Qeries in Mltihop Sensor Networks XiaoHa X, Shaojie Tang, Member, IEEE, XiangYang Li, Senior Member, IEEE Abstract In this work, we stdy periodic qery schedling
More informationNetworks An introduction to microcomputer networking concepts
Behavior Research Methods& Instrmentation 1978, Vol 10 (4),522-526 Networks An introdction to microcompter networking concepts RALPH WALLACE and RICHARD N. JOHNSON GA TX, Chicago, Illinois60648 and JAMES
More informationIsilon InsightIQ. Version 2.5. User Guide
Isilon InsightIQ Version 2.5 User Gide Pblished March, 2014 Copyright 2010-2014 EMC Corporation. All rights reserved. EMC believes the information in this pblication is accrate as of its pblication date.
More informationDynamic Maintenance of Majority Information in Constant Time per Update? Gudmund S. Frandsen and Sven Skyum BRICS 1 Department of Computer Science, Un
Dynamic Maintenance of Majority Information in Constant Time per Update? Gdmnd S. Frandsen and Sven Skym BRICS 1 Department of Compter Science, University of arhs, Ny Mnkegade, DK-8000 arhs C, Denmark
More informationStatistical Methods in functional MRI. Standard Analysis. Data Processing Pipeline. Multiple Comparisons Problem. Multiple Comparisons Problem
Statistical Methods in fnctional MRI Lectre 7: Mltiple Comparisons 04/3/13 Martin Lindqist Department of Biostatistics Johns Hopkins University Data Processing Pipeline Standard Analysis Data Acqisition
More informationChannel-Hopping Multiple Access
Channel-Hopping Multiple Access Asimakis Tzamaloukas and J.J. Garcia-Luna-Aceves Computer Engineering Department Baskin School of Engineering University of California, Santa Cruz, California 9564 fjamal,
More informationThe Impact of Avatar Mobility on Distributed Server Assignment for Delivering Mobile Immersive Communication Environment
This fll text paper was peer reviewed at the direction of IEEE Commnications Society sbject matter experts for pblication in the ICC 27 proceedings. The Impact of Avatar Mobility on Distribted Server Assignment
More informationAlliances and Bisection Width for Planar Graphs
Alliances and Bisection Width for Planar Graphs Martin Olsen 1 and Morten Revsbæk 1 AU Herning Aarhs University, Denmark. martino@hih.a.dk MADAGO, Department of Compter Science Aarhs University, Denmark.
More informationBroadcasting XORs: On the Application of Network Coding in Access Point-to-Multipoint Networks
Broadcasting XORs: On the Application of Network Coding in Access Point-to-Mltipoint Networks The MIT Faclty has made this article openly available Please share how this access benefits yo Yor story matters
More informationChapter 12 Multiple Access 12.1
Chapter 12 Multiple Access 12.1 Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. 12.2 Figure 12.1 Data link layer divided into two functionality-oriented sublayers
More informationReal-time mean-shift based tracker for thermal vision systems
9 th International Conference on Qantitative InfraRed Thermography Jly -5, 008, Krakow - Poland Real-time mean-shift based tracker for thermal vision systems G. Bieszczad* T. Sosnowski** * Military University
More informationHigh Level View. EE 122: Ethernet and Random Access protocols. Medium Access Protocols
High Level View EE 122: Ethernet and 802.11 Ion Stoica September 18, 2002 Goal: share a communication medium among multiple hosts connected to it Problem: arbitrate between connected hosts Solution goals:
More informationCOMPOSITION OF STABLE SET POLYHEDRA
COMPOSITION OF STABLE SET POLYHEDRA Benjamin McClosky and Illya V. Hicks Department of Comptational and Applied Mathematics Rice University November 30, 2007 Abstract Barahona and Mahjob fond a defining
More informationWireless Medium Access Control Protocols
Wireless Medium Access Control Protocols Telecomunicazioni Undergraduate course in Electrical Engineering University of Rome La Sapienza Rome, Italy 2007-2008 Classification of wireless MAC protocols Wireless
More informationHardware-Accelerated Free-Form Deformation
Hardware-Accelerated Free-Form Deformation Clint Cha and Ulrich Nemann Compter Science Department Integrated Media Systems Center University of Sothern California Abstract Hardware-acceleration for geometric
More informationConstructing and Comparing User Mobility Profiles for Location-based Services
Constrcting and Comparing User Mobility Profiles for Location-based Services Xihi Chen Interdisciplinary Centre for Secrity, Reliability and Trst, University of Lxemborg Jn Pang Compter Science and Commnications,
More informationIP Multicast Fault Recovery in PIM over OSPF
1 IP Mlticast Falt Recovery in PIM over OSPF Abstract Relatively little attention has been given to nderstanding the falt recovery characteristics and performance tning of native IP mlticast networks.
More informationECEN 5032 Data Networks Medium Access Control Sublayer
ECEN 5032 Data Networks Medium Access Control Sublayer Peter Mathys mathys@colorado.edu University of Colorado, Boulder c 1996 2005, P. Mathys p.1/35 Overview (Sub)networks can be divided into two categories:
More informationIllumina LIMS. Software Guide. For Research Use Only. Not for use in diagnostic procedures. Document # June 2017 ILLUMINA PROPRIETARY
Illmina LIMS Software Gide Jne 2017 ILLUMINA PROPRIETARY This docment and its contents are proprietary to Illmina, Inc. and its affiliates ("Illmina"), and are intended solely for the contractal se of
More informationEnergy-Efficient Mobile-Edge Computation Offloading for Applications with Shared Data
Energy-Efficient Mobile-Edge Comptation Offloading for Applications with Shared Data Xiangy He, Hong Xing, Ye Chen, Armgam Nallanathan School of Electronic Engineering and Compter Science Qeen Mary University
More informationTdb: A Source-level Debugger for Dynamically Translated Programs
Tdb: A Sorce-level Debgger for Dynamically Translated Programs Naveen Kmar, Brce R. Childers, and Mary Lo Soffa Department of Compter Science University of Pittsbrgh Pittsbrgh, Pennsylvania 15260 {naveen,
More informationLecture 13: Traffic Engineering
Lectre 13: Traffic Engineering CSE 222A: Compter Commnication Networks Alex C. Snoeren Thanks: Mike Freedman, Nick Feamster, and Ming Zhang Lectre 13 Overview Dealing with mltiple paths Mltihoming Entact
More informationEE 122: Ethernet and
EE 122: Ethernet and 802.11 Ion Stoica September 18, 2002 (* this talk is based in part on the on-line slides of J. Kurose & K. Rose) High Level View Goal: share a communication medium among multiple hosts
More informationProf. Kozyrakis. 1. (10 points) Consider the following fragment of Java code:
EE8 Winter 25 Homework #2 Soltions De Thrsday, Feb 2, 5 P. ( points) Consider the following fragment of Java code: for (i=; i
More informationResolving Linkage Anomalies in Extracted Software System Models
Resolving Linkage Anomalies in Extracted Software System Models Jingwei W and Richard C. Holt School of Compter Science University of Waterloo Waterloo, Canada j25w, holt @plg.waterloo.ca Abstract Program
More informationA Performance Analysis of IEEE Networks in the Presence of Hidden Stations
A Performance Analysis of IEEE 802.11 Networks in the Presence of Hidden Stations Marek Natkaniec, Andrzej R. Pach University of Mining and Metallurgy, Department of Telecommunications, Cracow, Poland
More informationStaCo: Stackelberg-based Coverage Approach in Robotic Swarms
Maastricht University Department of Knowledge Engineering Technical Report No.:... : Stackelberg-based Coverage Approach in Robotic Swarms Kateřina Staňková, Bijan Ranjbar-Sahraei, Gerhard Weiss, Karl
More informationMedia Access Control in Ad Hoc Networks
Media Access Control in Ad Hoc Networks The Wireless Medium is a scarce precious resource. Furthermore, the access medium is broadcast in nature. It is necessary to share this resource efficiently and
More informationCHAPTER 7 MAC LAYER PROTOCOLS. Dr. Bhargavi Goswami Associate Professor & Head Department of Computer Science Garden City College
CHAPTER 7 MAC LAYER PROTOCOLS Dr. Bhargavi Goswami Associate Professor & Head Department of Computer Science Garden City College MEDIUM ACCESS CONTROL - MAC PROTOCOLS When the two stations transmit data
More informationECE453 Introduction to Computer Networks. Broadcast vs. PPP. Delay. Lecture 7 Multiple Access Control (I)
ECE453 Introduction to Computer Networks Lecture 7 Multiple Access Control (I) 1 Broadcast vs. PPP Broadcast channel = multiaccess channel = random access channel Broadcast LAN Satellite network PPP WAN
More informationAN ANALYSIS OF THE MODIFIED BACKOFF MECHANISM FOR IEEE NETWORKS
AN ANALYSIS OF THE MODIFIED BACKOFF MECHANISM FOR IEEE 802.11 NETWORKS Marek Natkaniec, Andrzej R. Pach Department of Telecommunications University of Mining and Metallurgy al. Mickiewicza 30, 30-059 Cracow
More informationCMPE 257: Wireless and Mobile Networking
CMPE 257: Wireless and Mobile Networking Katia Obraczka Computer Engineering UCSC Baskin Engineering Lecture 4 1 Announcements Project proposals. Due April 17 th. Submit by e-mail to katia@soe.ucsc.edu.
More informationPavlin and Daniel D. Corkill. Department of Computer and Information Science University of Massachusetts Amherst, Massachusetts 01003
From: AAAI-84 Proceedings. Copyright 1984, AAAI (www.aaai.org). All rights reserved. SELECTIVE ABSTRACTION OF AI SYSTEM ACTIVITY Jasmina Pavlin and Daniel D. Corkill Department of Compter and Information
More informationA Jamming-Based MAC Protocol for Wireless Multihop Ad Hoc Networks
A Jamming-Based MAC Protocol for Wireless Multihop Ad Hoc Networks Shiang-Rung Ye, You-Chiun Wang, and Yu-Chee Tseng Department of Computer Science and Information Engineering National Chiao Tung University
More informationEEC 483 Computer Organization. Branch (Control) Hazards
EEC 483 Compter Organization Section 4.8 Branch Hazards Section 4.9 Exceptions Chans Y Branch (Control) Hazards While execting a previos branch, next instrction address might not yet be known. s n i o
More informationDiscrete Cost Multicommodity Network Optimization Problems and Exact Solution Methods
Annals of Operations Research 106, 19 46, 2001 2002 Klwer Academic Pblishers. Manfactred in The Netherlands. Discrete Cost Mlticommodity Network Optimization Problems and Exact Soltion Methods MICHEL MINOUX
More informationMAC Research Highlight
MAC Research Highlight Y.C. Tseng Outline: 3 Main Research Issues Analysis: G. Bianchi, Performance Analysis of the IEEE 802.11 Distributed Coordination Function, IEEE J-SAC, 2000. K. Kanodia et al., Ordered
More informationA Jamming-Based MAC Protocol to Improve the. Performance of Wireless Multihop Ad Hoc. Networks
A Jamming-Based MAC Protocol to Improve the Performance of Wireless Multihop Ad Hoc Networks Shiang-Rung Ye, You-Chiun Wang, and Yu-Chee Tseng Department of Computer Science and Information Engineering
More informationCS 153 Design of Operating Systems Spring 18
CS 153 Design of Operating Systems Spring 18 Lectre 12: Deadlock Instrctor: Chengy Song Slide contribtions from Nael Ab-Ghazaleh, Harsha Madhyvasta and Zhiyn Qian Deadlock the deadly embrace! Synchronization
More informationCAPL Scripting Quickstart
CAPL Scripting Qickstart CAPL (Commnication Access Programming Langage) For CANalyzer and CANoe V1.01 2015-12-03 Agenda Important information before getting started 3 Visal Seqencer (GUI based programming
More informationTopic Continuity for Web Document Categorization and Ranking
Topic Continity for Web ocment Categorization and Ranking B. L. Narayan, C. A. Mrthy and Sankar. Pal Machine Intelligence Unit, Indian Statistical Institte, 03, B. T. Road, olkata - 70008, India. E-mail:
More informationBias of Higher Order Predictive Interpolation for Sub-pixel Registration
Bias of Higher Order Predictive Interpolation for Sb-pixel Registration Donald G Bailey Institte of Information Sciences and Technology Massey University Palmerston North, New Zealand D.G.Bailey@massey.ac.nz
More informationEXAMINATIONS 2010 END OF YEAR NWEN 242 COMPUTER ORGANIZATION
EXAINATIONS 2010 END OF YEAR COPUTER ORGANIZATION Time Allowed: 3 Hors (180 mintes) Instrctions: Answer all qestions. ake sre yor answers are clear and to the point. Calclators and paper foreign langage
More informationMultiple Access. Data Communications and Networking
Multiple Access In the previous part we discussed data link control, a mechanism which provides a link with reliable communication. In the protocols we described, we assumed that there is an available
More informationTarek Sheltami. CCSE COE 3/8/2008 1
Mobile Ad hoc Networks COE 549 Random Access I Tarek Sheltami KFUPM CCSE COE http://faculty.kfupm.edu.sa/coe/tarek/coe549.htm 3/8/2008 1 Outline Medium Access Control Protocols ALOHA BTMA CSMA Some simulation
More informationThe Medium Access Control Scheme (MAC Layer) Reference: Andrew S. Tanenbaum, Computer Networks, 3rd Edition, Prentice Hall, 1996.
The Medium Access Control Scheme (MAC Layer) Reference: Andrew S. Tanenbaum, Computer Networks, 3rd Edition, Prentice Hall, 1996. 1 Table of Contents Introduction ALOHA Carrier Sense Multiple Sense (CSMA)
More informationA Hybrid Weight-Based Clustering Algorithm for Wireless Sensor Networks
Open Access Library Jornal A Hybrid Weight-Based Clstering Algorithm for Wireless Sensor Networks Cheikh Sidy Mohamed Cisse, Cheikh Sarr * Faclty of Science and Technology, University of Thies, Thies,
More informationAloha and slotted aloha
CSMA 2/13/06 Aloha and slotted aloha Slotted aloha: transmissions are synchronized and only start at the beginning of a time slot. Aloha sender A sender B collision sender C t Slotted Aloha collision sender
More informationLocal Run Manager Generate FASTQ Analysis Module
Local Rn Manager Generate FASTQ Analysis Modle Workflow Gide For Research Use Only. Not for se in diagnostic procedres. Overview 3 Set Parameters 3 Analysis Methods 5 View Analysis Reslts 5 Analysis Report
More informationA Recovery Algorithm for Reliable Multicasting in Reliable Networks
A Recovery Algorithm for Reliable Mlticasting in Reliable Networks Danyang Zhang Sibabrata Ray Dept. of Compter Science University of Alabama Tscaloosa, AL 35487 {dzhang, sib}@cs.a.ed Ragopal Kannan S.
More informationChapter 6: Pipelining
CSE 322 COPUTER ARCHITECTURE II Chapter 6: Pipelining Chapter 6: Pipelining Febrary 10, 2000 1 Clothes Washing CSE 322 COPUTER ARCHITECTURE II The Assembly Line Accmlate dirty clothes in hamper Place in
More informationCMPE 257: Wireless and Mobile Networking
CMPE 257: Wireless and Mobile Networking Katia Obraczka Computer Engineering UCSC Baskin Engineering Lecture 3 CMPE 257 Winter'11 1 Announcements Accessing secure part of the class Web page: User id: cmpe257.
More informationLocal Run Manager. Software Reference Guide for MiSeqDx
Local Rn Manager Software Reference Gide for MiSeqDx Local Rn Manager Overview 3 Dashboard Overview 4 Administrative Settings and Tasks 7 Workflow Overview 12 Technical Assistance 17 Docment # 1000000011880
More informationTDT4255 Friday the 21st of October. Real world examples of pipelining? How does pipelining influence instruction
Review Friday the 2st of October Real world eamples of pipelining? How does pipelining pp inflence instrction latency? How does pipelining inflence instrction throghpt? What are the three types of hazard
More informationEfficient and Accurate Delaunay Triangulation Protocols under Churn
Efficient and Accrate Delanay Trianglation Protocols nder Chrn Dong-Yong Lee and Simon S. Lam Department of Compter Sciences The University of Texas at Astin {dylee, lam}@cs.texas.ed November 9, 2007 Technical
More informationDiscretized Approximations for POMDP with Average Cost
Discretized Approximations for POMDP with Average Cost Hizhen Y Lab for Information and Decisions EECS Dept., MIT Cambridge, MA 0239 Dimitri P. Bertsekas Lab for Information and Decisions EECS Dept., MIT
More informationCurves and Surfaces. CS 537 Interactive Computer Graphics Prof. David E. Breen Department of Computer Science
Crves and Srfaces CS 57 Interactive Compter Graphics Prof. David E. Breen Department of Compter Science E. Angel and D. Shreiner: Interactive Compter Graphics 6E Addison-Wesley 22 Objectives Introdce types
More informationEMC ViPR. User Guide. Version
EMC ViPR Version 1.1.0 User Gide 302-000-481 01 Copyright 2013-2014 EMC Corporation. All rights reserved. Pblished in USA. Pblished Febrary, 2014 EMC believes the information in this pblication is accrate
More informationCS 153 Design of Operating Systems Spring 18
CS 153 Design of Operating Systems Spring 18 Lectre 11: Semaphores Instrctor: Chengy Song Slide contribtions from Nael Ab-Ghazaleh, Harsha Madhyvasta and Zhiyn Qian Last time Worked throgh software implementation
More informationIMPLEMENTATION OF A PACKET PRIORITY AND FIFO QUEUING MODEL IN PACKET RADIO SYSTEM
IMPLEMENTATION OF A PACKET PRIORITY AND FIFO QUEUING MODEL IN PACKET RADIO SYSTEM H. Lami 1, A. Affandi 2 1, 2 Department of Electrical Engineering, Faculty of Industrial Technology, Institut Teknologi
More informationEmpirical Study of Mobility effect on IEEE MAC protocol for Mobile Ad- Hoc Networks
Empirical Study of Mobility effect on IEEE 802.11 MAC protocol for Mobile Ad- Hoc Networks Mojtaba Razfar and Jane Dong mrazfar, jdong2@calstatela.edu Department of Electrical and computer Engineering
More informationCSE 461: Wireless Networks
CSE 461: Wireless Networks Wireless IEEE 802.11 A physical and multiple access layer standard for wireless local area networks (WLAN) Ad Hoc Network: no servers or access points Infrastructure Network
More informationCS 153 Design of Operating Systems
CS 153 Design of Operating Systems Spring 18 Lectre 3: OS model and Architectral Spport Instrctor: Chengy Song Slide contribtions from Nael Ab-Ghazaleh, Harsha Madhyvasta and Zhiyn Qian Last time/today
More information