Collision Avoidance and Resolution Multiple Access: First-Success Protocols

Size: px
Start display at page:

Download "Collision Avoidance and Resolution Multiple Access: First-Success Protocols"

Transcription

1 Collision Avoidance and Resoltion Mltiple Access: First-Sccess Protocols Rodrigo Garcés and J.J. Garcia-Lna-Aceves askin Center for Compter Engineering and Information Sciences University of California at Santa Crz Santa Crz, CA 9564, USA Abstract Collision avoidance and resoltion mltiple access (CARMA) protocols establish a three-way handshake between sender and receiver to attempt to avoid collisions, and resolve those collisions that occr. This paper describes and analyzes CARMA protocols that resolve collisions p to the first sccess obtained by rnning a tree-splitting algorithm for collision resoltion. An pper bond is derived for the average costs of resolving collisions of floor reqests sing the tree-splitting algorithm is obtained and applied to the comptation of the average channel tilization in a flly connected network with a large nmber of stations. Or analysis indicates that, becase CARMA protocols garantee a sccessfl transmission for every bsy period of the channel, it achieves higher throghpt than other contention-based MAC protocols based on collision-avoidance handshakes. I. INTRODUCTION Several medim access control (MAC) protocols have been proposed over the past few years that are based on three- or for-way handshake procedres meant to redce the nmber of collisions among data packets, thereby providing better performance than the basic ALOHA or CSMA protocols [2], [3], [4], [5], [6], [9], [], [2]. The concept of floor acqisition was first introdced by Fllmer and Garcia-Lna-Aceves [5] for MAC protocols based on three- or for-way handshake procedres. In a single-channel network, floor acqisition entails allowing one and only one station at a time to send data packets withot collisions. Protocols that provide correct floor acqisition have been called floor acqisition mltiple access (FAMA) protocols. A FAMA protocol reqires a station who wishes to send one or more packets to acqire the right to se the channel exclsively (called the floor) before transmitting the data packets. In FAMA-NTR [5], before transmitting a data packet, a station senses the state of the channel to see if it is idle or not. If the channel is bsy, the station backs off and tries to acqire the channel at a later time; on the other hand, if the channel is sensed to be free, the station sends an. In short, stations follow a non-persistent CSMA strategy for the transmission of s. The sender listens to the channel for one maximm rond-trip time pls the time needed for the destination to send a CTS. If the CTS is not corrpted and is received within the time limit, the transmission of data packets from the sender proceeds. The CTS is sent by the destination station to let other stations in the system know that the floor of the channel has been acqired. Accordingly, when a station receives a correct CTS, it backs off ntil the channel is released by the sender. Althogh each station transmits an only when it determines that the channel is free, a collision with other transmissions may still occr de to propagation delays. s are vlnerable to collisions for time periods eqal to the propagation delays between senders of s. Dring these periods, mltiple stations may sense the channel free and also send s, ths casing collisions. FAMA protocols solve collisions by backing off and reschedling transmissions [5], [6]. As with CSMA protocols, this procedre yields good reslts if the traffic is low; however, the probability of collisions increases as the rate of transmissions increases, with a corresponding decrease of system throghpt. Eventally, as the This work was spported in part by DARPA nder Grants DAA7-95-C-D57 and DAAH transmission rate increases, the constant collisions case the channel to collapse, bringing the flow of data packets to a halt. To remedy this problem, we present CARMA (collision avoidance and resoltion mltiple access) protocols that resolve the collisions of s by allowing one to scceed in every rond of contention sing a tree-splitting algorithm. In high-speed wireless networks sing s mch smaller than data packets, these protocols improve over the performance of FAMA protocols, and other prior MAC protocols based on collision-avoidance handshakes, becase every new rond of sbmissions to the channel reslts in a sccessfl transmission of data packets, and the average time needed to obtain a sccess in a rond of contention is very small compared to the dration of data packets. Sections II and III describe a specific protocol, which we call CARMA-FS (for first sccess), and which ses non-persistent carrier sensing for the transmission of s and a tree-splitting algorithm to resolve collisions of s p to the first sccess. Section IV comptes an pper bond on the average costs of resolving collisions, i.e., the times associated with the evental sccessfl transmission of all data packets involved in a collision-resoltion tree; the importance of these bonds is that they are independent of the nmber of stations in the network. Section V ses them to compte a lower bond of average throghpt achieved by CARMA-FS when a very large poplation of nodes is assmed. We show that the throghpt achieved by CARMA-FS is always better than the throghpt of FAMA protocols. Section VI offers or conclding remarks. II. CARMA-FS CARMA-FS ses carrier sensing for the transmission of s and a tree-splitting algorithm to obtain the first sccess among a set of colliding s. more sophisticated collision-resoltion algorithms [] can be sed to obtain the first sccess in a rond of contention. Each station mst know the maximm nmber of stations allowed in the system and the maximm propagation delay in the network. For the slotted version of CARMA-FS, a time slot is assmed to last as long as the maximm propagation delay. Each station is assigned a niqe identifier, a stack and two variables ). is initially the lowest ID nmber that is ( and allowed to send an, while is the highest ID nmber that is allowed to send an. Together they constitte the allowable ID interval that can send s, i.e., attempt to acqire the floor. If the ID of a station is not within this interval, it cannot send its. As we describe sbseqently, the stack is simply a storage mechanism for ID intervals that are waiting to get permission to send an. A station can be in one of five different states in CARMA-FS, namely: PASSIVE: The station has no local packets pending and no transmissions are detected in the channel. : The station is trying to acqire the floor and has sent an. XMIT: The station has the floor and is sending data packets. REMOTE: The station is receiving transmissions from other stations, and started to detect channel activity before it had any local packet to send.

2 ' ' ACKOFF: The station has local packets pending and had to reschedle its reqest for the floor. When a passive station has one or mltiple packets to send, it first listens to the channel. If the channel is bsy (i.e., carrier is detected), the station backs off and reschedles its at some time into the ftre. Alternatively, if the channel is clear (i.e., no carrier is detected) for one maximm rond-trip time, the station transmits an. The sender then waits and listens to the channel for one maximm rond-trip time pls the time needed for the destination to send a CTS. When the originator receives the CTS from the destination, it acqires the floor and begins transmitting its data packet brst. The sender is limited to a maximm nmber of data packets, after which it mst release the channel and mst compete for the floor at a later time if it still has data packets to send. If the sender of an does not receive a CTS within a time limit, the sender as well as all other stations in the system know that a collision has occrred. As soon as the first collision takes place, every station divides the ID interval into two ID intervals. The! first ID interval, "$#%& which we will call the backoff ID interval, is (*),+, while the second ID interval, the allowed ID interval, is -&"$#% (.. Each station in the system pdates the stack by execting a PUSH stack command, the key being pshed is the backoff ID interval. After this is done, the station pdates and with the vales from the allowed ID interval. This procedre is repeated each time a collision is detected, ntil a sccessfl transmission is achieved. Only those stations that were in the state at the time the first collision occrred are allowed into the collision-resoltion phase of the protocol. All other stations will be in REMOTE state ntil the collisionresoltion phase ends. Collision resoltion evolves in terms of collisionresoltion intervals. In the first interval of the collision-resoltion phase all stations in the allowed ID interval that are in the state try to retransmit an. If none of the stations within this ID interval reqest the channel, the channel will be idle for a time period eqal to two times the maximm channel delay (/ ). At this point, a new pdate of the stack and of the variables and is de. Each station exectes a POP command in the stack. This new ID interval now becomes the new and. The second alternative is for mltiple stations to reqest the channel casing a collision. The stations in the allowed ID interval are once more split into two new ID intervals and the stack as well as the variables for each station are pdated. In this case, the dration of the collision-resoltion interval is eqal to the collision time pls the channel delay. The algorithm repeats these steps ntil the first sccessfl /CTS exchange is achieved. This is the case when only one station in the allowed ID interval is reqesting the channel; the originator receives the CTS from the destination and begins transmitting its data packet brst, after which the station releases the channel and transitions to the PASSIVE state. The total time for this sccessfl transmission is at most eqal to the dration of an, a CTS, the data packet brst, pls three channel delays. Notice that, as soon as the first sccess is achieved, all stations know that the collisions-resoltion phase has ended. Accordingly, once the treesplitting algorithm terminates, all stations are either in the PASSIVE state, or in the ACKOFF state if they have packets to send. A waiting period of two times the maximm channel delay dring which the channel is idle occrs pon termination of the tree-splitting algorithm. The next access to the channel is driven by the arrival of new packets to the stations and the transmission of s that have been backed off. To permit the transmission of packet brsts, CARMA-FS enforces waiting periods on receiving stations at strategic points in the operation of the protocol. A station that has received a data packet in the clear mst wait for one maximm propagation time after processing a data packet, this allows the sender to send more packets if desired. A station that has nderstood any control packet mst wait for twice the dration of the maximm propagation time; this allows correct /CTS exchanges to take place. On the other hand, if a transmitting station is in the state, the protocol enforces a waiting period of two maximm propagation times after sending its. This allows the destination to receive the and transmit the corresponding CTS. A sending station mst also wait one maximm propagation time after the last data packet of its packet train. III. EXAMPLE We illstrate CARMA-FS sing a simple example. Each station has a distinct position in the leaves of a binary tree based on its ID. If is the total nmber of stations in the system, the binary tree has /32 + nodes. The root of the tree is labeled as %4 and its right and left child as 5 and 76, respectively. For each of the other nodes, the labels are composed of the parent label, pls a 8 if it is the left child or a + if it is a right child. As an example, take a system with for stations labeled 6$6, 6 5,!5 6, and!5$5. The binary tree has a total of seven nodes with the for stations as its leaves. The root of the tree has the label %4. The left child of the root node is 5 while its right child is 76. Station 76 is the parent node of 76 5 and 76$6. Similarly, station 5 6 is the right child of node 5, while station!5$5 is its left child. We define the sbtree 9%:<;&=?>$: as the sbtree at node %:<;&=@>$:. In or example, the sbtree for node 6 5 is Assme that, at time A ", we are at node 4 and we are allowed to listen simltaneosly at all the stations of its sbtree 9%4 for a time period of seconds. Only one of the following three things can occr: Case Idle: There are no s in any of the leaves (stations) in sbtree 9%4 ; therefore, the channel is idle. This lasts an idle transmission period 9. Case 2 Sccess: There is only one in the sbtree 9 4 ; therefore, there is no collision and a station acqires the floor terminating the collision-resoltion phase. This lasts one sccessfl transmission period 9!C. Case 3 Collision: There are two or more stations (leaves) in the sbtree 9 4 sending an ; therefore, a collision occrs. This lasts one failed transmission period 9!D. Assme that, at time AE6, Case 3 occrs with station 76$6 and 76 5 each sending an in the same slot, while station 5 6 and station 5$5 do not reqest the channel. Fig. illstrates this. The first collision occrs at time A 6 ; all stations in the system notice the beginning of the resoltion F algorithm and pdate their stacks and their as well as their vales. Stations 6$6 and 6 5 are members of the backoff ID interval; therefore, they wait ntil the collisions in the allowed ID interval are resolved. They both are exclded from sending s. After a time period 9 D, Stations!5 6 and!5$5 are allowed to reqest for the channel. Since stations 5 6 and 5$5 in tree 9 5 do not wish the channel, the first case applies here. After 9 HG /I seconds, all stations notice that the channel is idle, which means that there were no collisions in tree 9!5. All the stations in the system mst pdate their intervals and the stack. They execte a POP-stack command and the new allowable interval is?j6$ ; therefore, 9 6 can proceed to solve its collisions. oth stations 6$6 and 6 5 transmit an control packet and Case 3 occrs again. Since a collision occrred, the interval is split, i.e.,, the sbtree 9 6 is split in two halves, 976$6 and Station 76 5 is within the allowable interval while the 76$6 station mst wait, its interval is the top of the stack. Since has only one station reqesting the channel, that station acqires the floor and transmits its data package. At this point, all the stations know that the collision-resoltion phase has terminated, becase a sccessfl /CTS exchanged was sensed by all stations. The stations empty their stacks and pdate the allowable ID interval allowing all stations to contend in the next rond of contention. Fig. illstrates the transmission for each of the GLK stations in the system, as well as in channel for the nslotted version of CARMA-FS. ICC 97 2 Rodrigo Garcés and J.J. Garcia-Lna-Aceves

3 s Stack before first collision Allowable Interval Station n Station n Station n Station Channel T QQQ QQQ QQQ QQQ QQQ QQQ QQQ QQQ QQQ QQQ RRR RRR RRR RRR RRR RRR RRR RRR RRR SSS SSS SSS SSS SSS SSS SSS SSS SSS TTT TTT TTT TTT TTT TTT TTT TTT nr MN MN O OP OP CTS DATA CTS DATA n n n n Idle Idle first collision Allowable Interval Idle n τ τ T second collision n n n n n n n first sccess Allowable Interval Allowable Interval Allowable Interval LowID HiID LowID HiID HiID HiID HiID LowID LowID LowID (n,n) Fig.. Transmission period and tree strctre to solve the collisions for a system with UWVX stations ot of which Y,V[Z are reqesting the floor. \^]-X_?Z&` VaZ, b ]XI_cZ&` Ved and f ]XI_?Z&`^Vgd. IV. AVERAGE COLLISION RESOLUTION COSTS For the prpose of or analysis, we assme that (a) the channel introdces no errors, so packet collisions are the only sorce of errors, and stations detect sch collisions perfectly, (b) two or more transmissions that overlap in time in the channel mst all be re-transmitted, and (c) a packet propagates to all stations in exactly seconds []. The average size of a data packet is h seconds, and and CTS packets are of size i seconds. oth h i and are assmed to be mltiples of in order to accommodate the comparison with the slotted version of the protocol. There are only three possible cases to consider for the resoltion of collisions: idle, sccess, or collision. For each of these cases, we obtained [8] three distinct average-cost recrsive eqations: jk? &ln for the idle case, op? (n) for the sccess case, and q!? τ time for the collision case. These three costs depend on the total nmber of stations in the system and the nmber l of stations with one. They represent an average nmber over all the possible permtations of l s in total stations ntil the first sccessfl /CTS exchange. In [8] we se mathematical indction to prove the pper bonds for the average idle cost j*? rl and for the average collision cost q!? rl lts. For all + and +, we find that jk?. ' 5 and q!? rl3wvxiy l 2 +. op? contribtes positively to the overall throghpt of the system. Every rond of contention is garanteed to allow one sccessfl /CTS exchange, therefore, oz? {l G +. V. THROUGHPUT ANALYSIS The analysis in this section makes the same assmptions introdced in the previos section and ses the same traffic model sed for the FAMA- NTR protocol [5]. Given that the pper bonds on average collisionresoltion costs are independent of the nmber of stations, we approximate the traffic into the channel with an infinite nmber of stations, each having at most one to send at any time, and forming a Poisson sorce sending s with an aggregate mean generation rate of s per nit time. With this model, the average nmber of arrivals in a time interval of length 9 is }9 l, i.e., G }9. All data blocks have a dration of h seconds. The average channel throghpt is given by ~z H ƒ () is the average tilization time of the channel, dring which the channel is being sed to transmit data packets; is the expected dration of a bsy period, dring which the channel is bsy with sccessfl or nsccessfl transmissions; and is the average idle period, i.e., the average interval between two consective bsy periods. A. A sccessfl transmission consists of an with one propagation delay to the intended recipient, a CTS with a propagation delay to the sender, and a data packet followed by a propagation delay. Therefore, the average dration period for a sccessfl transmission is I %Hˆ?! zš{ J zœ (2) For an to be sccessfl, it mst be the only packet in the channel dring its transmission. Its probability of sccess eqals the probability that no arrivals occr in seconds, becase there is a delay across the channel of seconds before all the other stations in the network detect the carrier signal. After this vlnerability period of seconds, all stations defer their transmissions. Therefore, given that arrivals of s to the channel are Poisson with parameter, we obtain I %H 7Ž No arrivals in seconds H $ (3) The nmber of stations that participate in the collision-resoltion phase is l G 7. Within the tree, the three cases of the collision resoltion discssed in the previos sections are present. Each one of them has an average pper bond cost that is independent of the nmber of stations ( ), bt is a fnction of the nmber of stations reqesting the channel ( l ). In the case of a colliding transmission ( l s + ), the time period consists of one package followed by one or more s transmitted by other stations within time, 8, pls one propagation delay. Accordingly, the average dration of a failed transmission period is l bonded by 9 D i 2 / [5]. In the case of an idle transmission ( G 8 ), the time period has a dration eqals to two propagation delays. Accordingly, the average dration of an idle transmission period is 9 G /I. A bsy period is composed of both the sccessfl and the tree transmission periods. A waiting period of /I seconds is reqired for both transmission periods. The dration of an average bsy period eqals the sm of the percentage of sccessfl transmission periods times their dration, 9!C, pls the percentage of the tree periods times their dration. The tree periods are composed of three parts, corresponding to sccess, idle, and collision periods, each with a distinct cost and dration. According to the pper bonds derived in [8], the average bsy period can be bonded as follows: š œ Ÿž? ž- I ˆ?ª ž žž ˆ$ $ &? ž c Š{ c { ž! zˆ$ $ &? ž c I zš?! z«{ J pœ (4) The channel carries ser data for h seconds dring each transmission period; therefore, G h. The average idle period is eqal to the average interarrival time pls the average waiting period enforced. ƒ zˆ{ zˆ{ ž zˆ{ (5) Sbstitting the vales for, and obtained above into Eq. (), we obtain the following lower bond for the average throghpt of CARMA- FS: ~ Œ z (6) ICC 97 3 Rodrigo Garcés and J.J. Garcia-Lna-Aceves

4 ž pˆ c ž $ zš ž zˆ c? ž $ Š z Œ size of s and CTSs is /Ã8 bytes. We normalize the throghpt reslt by setting G + and defining the following variables Ä Œ (normalized data packets) ÅÆ (normalized control packets) Ç (normalized offered load) (). In this section, we se the same assmptions sed for nslotted CARMA-FS. The channel is slotted and each slot lasts a maximm propagation delay. With slotting, stations are restricted to start transmissions only on slot bondaries. As it was the case in nslotted CARMA-FS, the average dration period for a sccessfl transmission is given by Eq. (2). The probability that an is sccessfl is H 7Ž$± ² arrival in a slot³ some arrivals in a slot (7) ĺ s In the case of a colliding transmission ( + ), the time period consists of one followed by a propagation delay. All colliding s are sent at the beginning of the same slot; accordingly, we have 9 D G i 23. As it was done for nslotted CARMA-FS, can be bonded according to Eq (4). Sbstitting the vales for µ C, 9 D, 9!C, 9 l and, we obtain I I 7 ž<? ž- ¹ ˆ º ª ž I c ž< c ž c zš@! z»$ 7 zœ ž Ÿ ž F ˆ? ž c ž ž< ˆ ˆ Š@»$ Œ$ ž- The average idle period is ƒ zˆ{ I ^ zˆ{ ž I $ zˆ{ (9) The average tilization is simply h. Sbstitting this vale and Eqs. (8) and (9) into Eq. (), we obtain the following lower bond on the average throghpt of slotted CARMA-FS: ~z Œ ž Ÿ Ÿ z () ž! c ^ ˆ m? ž $ p % zˆ ˆ pš?! z¼{ J zœ ž< c ž $ Š? z Œ C. Nmerical Reslts We compare CARMA-FS with FAMA-NTR for the cases of a lowspeed network (½I¾8I8 b/s) and high-speed network ( + Mb/s) in which either small data packets ( À bytes) or large data packets (K 88 bytes) are transmitted. We assme the distance between stations to be the same and define the diameter of the network to be + mile. Assming these parameters, the propagation delay of the channel is Á K s. In order to accommodate the se of IP addresses for destination and sorce, the minimm (8) Sbstitting the new normalized variables from Eq. () into Eq. (6), we obtain ~ Ä 7È Ç z (2) È ž Å zˆ@ m? ž<ç^ I zå zš È ž Å zˆ@ &? ž<ç7 Š@Å F 7 Ä for nslotted CARMA-FS. The throghpt of nslotted FAMA-NTR in [5] normalize with the variables in Eq. () is For slotted CARMA-FS we obtain ~ Ä Ä Ä Ä zå ž<ˆ Ç Ç z Ç ž<é zåe (3) ~ Ä ž Ç È Ç z È (4) È ž<å zå Ç H Ç7 ž Ç7 ž<å ÇH zˆ@çf pš?å Ä z¼? È ž Å} ž Ç7 ž<š?å Ä while the throghpt of slotted FAMA-NTR in [5] normalize with the variables in Eq. () is ~ Ä Ä Ä Ç^ Ç ž Ä zå Ç Ç ž Š} zå Êž- Ç (5) Table I smmarizes the protocol parameters sed in or comparison. Network Speed Packet Size Œ Ä Œ Å7 96 bps 424 bits Ë s bps 32 bits Ë s Mbps 424 bits 424 Ë s Mbps 32 bits 32 Ë s TALE I PROTOCOL VARIALES FOR LOW-SPEED NETWORKS (ÌrÍ&Î&Î PS) AND HIGH-SPEED NETWORKS ( d MPS) WITH TWO TYPES OF DATA PACKETS, SMALL (XZ X ITS) OR LARGE (ÏZ&ÎrÎ ITS). THE CHANNEL DELAY ÐzVÑÃÒ XÓ S, WHILE THE CONTROL PACKETS ARE dmí&î ITS LONG. Figs. 2 and 3 show the average throghpt (S) verss the offered load (G) for CARMA-FS and FAMA-NTR. It is clear that slotting does not provide mch performance improvement in CARMA-FS, and that to achieve high throghpt the size of the control packets need to be small compared to the length of the data packets or packet trains. CARMA-FS behaves like FAMA-NTR when the offered load is small. As the offered Ç ICC 97 4 Rodrigo Garcés and J.J. Garcia-Lna-Aceves

5 FAMA-NTR verss CARMA-FS: Low Speed, Small Packets FAMA-NTR verss CARMA-FS: Low Speed, Large Packets e Fig. 2. Throghpt of FAMA-NTR and CARMA-FS for low-speed network..8 FAMA-NTR verss CARMA-FS: High Speed, Small Packets.8 FAMA-NTR verss CARMA-FS: High Speed, Large Packets Simlation CARMA-FS e Fig. 3. Throghpt of FAMA-NTR and CARMA-FS for high-speed network. load increases, the throghpt of FAMA-NTR decreases rapidly, while CARMA-FS decreases logarithmically at a mch slower rate. To verify that the vale of Ô approximated sing an infinite poplation and the pper bonds on average costs for collision resoltion times provides a good lower bond for any traffic load, we simlated slotted CARMA-FS sing 65 stations that generate s according to a Poisson probability distribtion l fnction. The simlations were done ten times for each given G vale to insre convergence. The reslts of the simlation are shown in Fig. 3 only for the case of long data packets in a high-speed network, and indicate that or analysis provides a very good approximation of the average throghpt. VI. CONCLUSIONS CARMA-FS implements a three-way handshake based on small control packets between sender and receiver, pls a limited collision resoltion algorithm ensring that there is always a sccessfl dring each bsy period. Or analysis shows that this limited collision resoltion improves the performance of FAMA protocols considerably; or simlation validates the simplifying assmptions made to obtain a lower bond of average throghpt as a fnction of channel load. The importance of exploring limited collision resoltion lies on its potential application to wireless networks with dynamic topologies, in which the nodes engaged in collision resoltion may move, therefore changing the constitency of the tree. A protocol aimed at resolving the first sccess is attractive in a dynamic setting, becase resolving the first sccess can be done faster than resolving an entire tree [7]. Or work contines to explore the performance of limited resoltion algorithms when the members of the tree have inconsistent information abot the allowable ID interval. REFERENCES [] D. ertsekas and R. Gallager, Data Networks, Second Edition, Prentice-Hall, 992. [2] V. harghavan, A. Demers, S. Shenker, and L. Zhang, MACAW: A Media Access Protocol for Wireless LAN s, in Proc. of ACM SIGCOMM 94, pp , ACM, 994. [3] K. iba, A Hybrid Wireless MAC Protocol Spporting Asynchronos and Synchronos MSDU Delivery Services, Tech. Rep. Paper 82./9-92, IEEE 82. Working Grop, 992. [4] R. L. rewster and A. M. Glass, Throghpt Analysis of Non-Persistent and Slotted Non-Persistent CSMA/CA Protocols, in Proc. 4th International Conference on Land Mobile Radio, pp. 23 6, Instittion of Electronic and Radio Engineers, 987. [5] C. Fllmer and J.J. Garcia-Lna-Aceves, Flooracqisition mltiple access forpacket-radionetworks, Proc. ACM SIGCOMM 95, Cambridge, MA, Agst 3-September, 995. [6] C. Fllmer and J.J. Garcia-Lna-Aceves, FAMA-PJ: A Channel Access Protocol for Wireless LANs, Proc. ACM Mobile Compting and Networking 95, erkeley, CA, Nov. 4-5, 995. [7] R. Garcés and J.J. Garcia-Lna-Aceves, Floor Acqisition Mltiple Access with Collision Resoltion, Proc. ACM Mobile Compting and Networking 96, Rye, NY, Nov. -2, 996. [8] R. Garcés and J.J. Garcia-Lna-Aceves, Collision avoidanceand resoltion mltiple access with transmission grops, Proc. IEEE INFOCOM 97, Kobe, Japan, April 7-, 997. [9] P. Karn, MACA - a new channel access method for packet radio, in ARRL/CRRL Amater Radio 9th Compter Networking Conference, pp. 34 4, ARRL, 99. [] L. Kleinrock and F. A. Tobagi, Packet switching in radio channels: Part I - carrier sense mltipleaccess modes and their throghpt-delay characteristics, IEEE Trans. Commn., vol. COM-23, no. 2, pp. 4 46, 975. [] W. F. Lo and H. T. Moftah, Carrier Sense Mltiple Access with Collision Detection for Radio Channels, in IEEE 3th International Commnications and Energy Conference, pp , IEEE, 984. [2] G. S. Sidh, R. F. Andrews, and A.. Oppenheimer, Inside AppleTalk, Second Edition. Addison-Wesley Pblishing Company, Inc., 99. ICC 97 5 Rodrigo Garcés and J.J. Garcia-Lna-Aceves

Collision Avoidance and Resolution Multiple Access: First-Success Protocols

Collision Avoidance and Resolution Multiple Access: First-Success Protocols Collision Avoidance and Resolution Multiple Access: First-uccess Protocols Rodrigo Garcés and J.J. Garcia-Luna-Aceves Baskin Center for Computer Engineering and Information ciences University of California

More information

The Disciplined Flood Protocol in Sensor Networks

The Disciplined Flood Protocol in Sensor Networks The Disciplined Flood Protocol in Sensor Networks Yong-ri Choi and Mohamed G. Goda Department of Compter Sciences The University of Texas at Astin, U.S.A. fyrchoi, godag@cs.texas.ed Hssein M. Abdel-Wahab

More information

An Adaptive Strategy for Maximizing Throughput in MAC layer Wireless Multicast

An Adaptive Strategy for Maximizing Throughput in MAC layer Wireless Multicast University of Pennsylvania ScholarlyCommons Departmental Papers (ESE) Department of Electrical & Systems Engineering May 24 An Adaptive Strategy for Maximizing Throghpt in MAC layer Wireless Mlticast Prasanna

More information

Cautionary Aspects of Cross Layer Design: Context, Architecture and Interactions

Cautionary Aspects of Cross Layer Design: Context, Architecture and Interactions Cationary Aspects of Cross Layer Design: Context, Architectre and Interactions Vikas Kawadia and P. R. Kmar Dept. of Electrical and Compter Engineering, and Coordinated Science Lab University of Illinois,

More information

IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 6, NO. 5, MAY On the Analysis of the Bluetooth Time Division Duplex Mechanism

IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 6, NO. 5, MAY On the Analysis of the Bluetooth Time Division Duplex Mechanism IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 6, NO. 5, MAY 2007 1 On the Analysis of the Bletooth Time Division Dplex Mechanism Gil Zssman Member, IEEE, Adrian Segall Fellow, IEEE, and Uri Yechiali

More information

Collision Avoidance and Resolution Multiple Access for Multichannel Wireless Networks

Collision Avoidance and Resolution Multiple Access for Multichannel Wireless Networks 1 Collision Avoidance and Resolution Multiple Access for Multichannel Wireless Networks RODRIGO GARCÉS rgarces@metricom.com Metricom Inc. 980 University Avenue Los Gatos, CA 95032 J.J. GARCIA-LUNA-ACEVES

More information

The MAC layer in wireless networks

The MAC layer in wireless networks The MAC layer in wireless networks The wireless MAC layer roles Access control to shared channel(s) Natural broadcast of wireless transmission Collision of signal: a /space problem Who transmits when?

More information

/99/$10.00 (c) 1999 IEEE

/99/$10.00 (c) 1999 IEEE COLLISION-FREE MEDIUM ACCESS CONTROL SCHEME FOR AD-HOC NETWORKS Zygmunt J. Haas and Jing Deng School of Electrical Engineering Cornell University Ithaca, NY 14853 haas@ee.cornell.edu Siamak Tabrizi US

More information

Performance of Floor Acquisition Multiple Access in Ad-Hoc Networks

Performance of Floor Acquisition Multiple Access in Ad-Hoc Networks Performance of Floor Acquisition Multiple Access in Ad-Hoc Networks J.J. Garcia-Luna-Aceves and Chane L. Fullmer Abstract The performance of the FAMA-NCS protocol in ad-hoc networks is analyzed. FAMA-NCS

More information

On the Computational Complexity and Effectiveness of N-hub Shortest-Path Routing

On the Computational Complexity and Effectiveness of N-hub Shortest-Path Routing 1 On the Comptational Complexity and Effectiveness of N-hb Shortest-Path Roting Reven Cohen Gabi Nakibli Dept. of Compter Sciences Technion Israel Abstract In this paper we stdy the comptational complexity

More information

(2, 4) Tree Example (2, 4) Tree: Insertion

(2, 4) Tree Example (2, 4) Tree: Insertion Presentation for se with the textbook, Algorithm Design and Applications, by M. T. Goodrich and R. Tamassia, Wiley, 2015 B-Trees and External Memory (2, 4) Trees Each internal node has 2 to 4 children:

More information

The MAC layer in wireless networks

The MAC layer in wireless networks The MAC layer in wireless networks The wireless MAC layer roles Access control to shared channel(s) Natural broadcast of wireless transmission Collision of signal: a time/space problem Who transmits when?

More information

Multiple-Choice Test Chapter Golden Section Search Method Optimization COMPLETE SOLUTION SET

Multiple-Choice Test Chapter Golden Section Search Method Optimization COMPLETE SOLUTION SET Mltiple-Choice Test Chapter 09.0 Golden Section Search Method Optimization COMPLETE SOLUTION SET. Which o the ollowing statements is incorrect regarding the Eqal Interval Search and Golden Section Search

More information

Pipelined van Emde Boas Tree: Algorithms, Analysis, and Applications

Pipelined van Emde Boas Tree: Algorithms, Analysis, and Applications This fll text paper was peer reviewed at the direction of IEEE Commnications Society sbject matter experts for pblication in the IEEE INFOCOM 007 proceedings Pipelined van Emde Boas Tree: Algorithms, Analysis,

More information

REPLICATION IN BANDWIDTH-SYMMETRIC BITTORRENT NETWORKS. M. Meulpolder, D.H.J. Epema, H.J. Sips

REPLICATION IN BANDWIDTH-SYMMETRIC BITTORRENT NETWORKS. M. Meulpolder, D.H.J. Epema, H.J. Sips REPLICATION IN BANDWIDTH-SYMMETRIC BITTORRENT NETWORKS M. Melpolder, D.H.J. Epema, H.J. Sips Parallel and Distribted Systems Grop Department of Compter Science, Delft University of Technology, the Netherlands

More information

5 Performance Evaluation

5 Performance Evaluation 5 Performance Evalation his chapter evalates the performance of the compared to the MIP, and FMIP individal performances. We stdy the packet loss and the latency to restore the downstream and pstream of

More information

A Wireless MAC Protocol comparison.

A Wireless MAC Protocol comparison. Doc: IEEE P82.1192S1 IEEE 82.11 Wireless Access Method and Physical Layer Specifications Title: Presented by: A Wireless MAC Protocol comparison. Wim Diepstraten NCR SEUtrecht NCRAT&T Network Prodct Grop

More information

A sufficient condition for spiral cone beam long object imaging via backprojection

A sufficient condition for spiral cone beam long object imaging via backprojection A sfficient condition for spiral cone beam long object imaging via backprojection K. C. Tam Siemens Corporate Research, Inc., Princeton, NJ, USA Abstract The response of a point object in cone beam spiral

More information

/$10.00 (c) 1998 IEEE

/$10.00 (c) 1998 IEEE Dual Busy Tone Multiple Access (DBTMA) - Performance Results Zygmunt J. Haas and Jing Deng School of Electrical Engineering Frank Rhodes Hall Cornell University Ithaca, NY 85 E-mail: haas, jing@ee.cornell.edu

More information

Cost Based Local Forwarding Transmission Schemes for Two-hop Cellular Networks

Cost Based Local Forwarding Transmission Schemes for Two-hop Cellular Networks Cost Based Local Forwarding Transmission Schemes for Two-hop Celllar Networks Zhenggang Zhao, Xming Fang, Yan Long, Xiaopeng H, Ye Zhao Key Lab of Information Coding & Transmission Sothwest Jiaotong University,

More information

POWER-OF-2 BOUNDARIES

POWER-OF-2 BOUNDARIES Warren.3.fm Page 5 Monday, Jne 17, 5:6 PM CHAPTER 3 POWER-OF- BOUNDARIES 3 1 Ronding Up/Down to a Mltiple of a Known Power of Ronding an nsigned integer down to, for eample, the net smaller mltiple of

More information

Maximum Weight Independent Sets in an Infinite Plane

Maximum Weight Independent Sets in an Infinite Plane Maximm Weight Independent Sets in an Infinite Plane Jarno Nosiainen, Jorma Virtamo, Pasi Lassila jarno.nosiainen@tkk.fi, jorma.virtamo@tkk.fi, pasi.lassila@tkk.fi Department of Commnications and Networking

More information

Channel-Hopping Multiple Access

Channel-Hopping Multiple Access Channel-Hopping Multiple Access Asimakis Tzamaloukas and J.J. Garcia-Luna-Aceves Computer Engineering Department Baskin School of Engineering University of California, Santa Cruz, California 9564 jamal,

More information

Research Article Designing a Channel Access Mechanism for Wireless Sensor Network

Research Article Designing a Channel Access Mechanism for Wireless Sensor Network Hindawi Wireless Commnications and Mobile Compting Volme 217, Article ID 7493269, 31 pages https://doi.org/1.1155/217/7493269 Research Article Designing a Channel Access Mechanism for Wireless Sensor Network

More information

The final datapath. M u x. Add. 4 Add. Shift left 2. PCSrc. RegWrite. MemToR. MemWrite. Read data 1 I [25-21] Instruction. Read. register 1 Read.

The final datapath. M u x. Add. 4 Add. Shift left 2. PCSrc. RegWrite. MemToR. MemWrite. Read data 1 I [25-21] Instruction. Read. register 1 Read. The final path PC 4 Add Reg Shift left 2 Add PCSrc Instrction [3-] Instrction I [25-2] I [2-6] I [5 - ] register register 2 register 2 Registers ALU Zero Reslt ALUOp em Data emtor RegDst ALUSrc em I [5

More information

Congestion-adaptive Data Collection with Accuracy Guarantee in Cyber-Physical Systems

Congestion-adaptive Data Collection with Accuracy Guarantee in Cyber-Physical Systems Congestion-adaptive Data Collection with Accracy Garantee in Cyber-Physical Systems Nematollah Iri, Lei Y, Haiying Shen, Gregori Calfield Department of Electrical and Compter Engineering, Clemson University,

More information

Minimal Edge Addition for Network Controllability

Minimal Edge Addition for Network Controllability This article has been accepted for pblication in a ftre isse of this jornal, bt has not been flly edited. Content may change prior to final pblication. Citation information: DOI 10.1109/TCNS.2018.2814841,

More information

The extra single-cycle adders

The extra single-cycle adders lticycle Datapath As an added bons, we can eliminate some of the etra hardware from the single-cycle path. We will restrict orselves to sing each fnctional nit once per cycle, jst like before. Bt since

More information

Fault Tolerance in Hypercubes

Fault Tolerance in Hypercubes Falt Tolerance in Hypercbes Shobana Balakrishnan, Füsn Özgüner, and Baback A. Izadi Department of Electrical Engineering, The Ohio State University, Colmbs, OH 40, USA Abstract: This paper describes different

More information

Evaluating Influence Diagrams

Evaluating Influence Diagrams Evalating Inflence Diagrams Where we ve been and where we re going Mark Crowley Department of Compter Science University of British Colmbia crowley@cs.bc.ca Agst 31, 2004 Abstract In this paper we will

More information

Reversing the Collision-Avoidance Handshake in Wireless Networks

Reversing the Collision-Avoidance Handshake in Wireless Networks Reversing the Collision-Avoidance Handshake in Wireless Networks J.J. Garcia-Luna-Aceves and Asimakis Tzamaloukas * Computer Engineering Department Baskin School of Engineering University of California,

More information

This chapter is based on the following sources, which are all recommended reading:

This chapter is based on the following sources, which are all recommended reading: Bioinformatics I, WS 09-10, D. Hson, December 7, 2009 105 6 Fast String Matching This chapter is based on the following sorces, which are all recommended reading: 1. An earlier version of this chapter

More information

Lecture 12 December 04, Wireless Access. Graduate course in Communications Engineering. University of Rome La Sapienza. Rome, Italy

Lecture 12 December 04, Wireless Access. Graduate course in Communications Engineering. University of Rome La Sapienza. Rome, Italy Lecture 12 December 04, 2017 Wireless Access Graduate course in Communications Engineering University of Rome La Sapienza Rome, Italy 2017-2018 Random Medium Access Control Part II - CSMA and Collision

More information

Millimeter-Wave Multi-Hop Wireless Backhauling for 5G Cellular Networks

Millimeter-Wave Multi-Hop Wireless Backhauling for 5G Cellular Networks 2017 IEEE 85th Vehiclar Technology Conference (VTC-Spring) Millimeter-Wave Mlti-Hop Wireless Backhaling for 5G Celllar Networks B. P. S. Sahoo, Chn-Han Yao, and Hng-Y Wei Gradate Institte of Electrical

More information

Collision Avoidance and Resolution Multiple Access for Multichannel Wireless Networks

Collision Avoidance and Resolution Multiple Access for Multichannel Wireless Networks 1 Collision Avoidance and Resolution Multiple Access for Multichannel Wireless Networks RODRIGO GARCÉS rgarces@metricom.com Metricom Inc. 980 University Avenue Los Gatos, CA 95032 J.J. GARCIA-LUNA-ACEVES

More information

Lecture 17: Wireless Networking

Lecture 17: Wireless Networking Lectre 17: 802.11 Wireless Networking CSE 222A: Compter Commnication Networks Alex C. Snoeren Thanks: Lili Qi, Nitin Vaidya Lectre 17 Overview Project discssion Intro to 802.11 WiFi Jigsaw discssion CSE

More information

The single-cycle design from last time

The single-cycle design from last time lticycle path Last time we saw a single-cycle path and control nit for or simple IPS-based instrction set. A mlticycle processor fies some shortcomings in the single-cycle CPU. Faster instrctions are not

More information

Efficient Scheduling for Periodic Aggregation Queries in Multihop Sensor Networks

Efficient Scheduling for Periodic Aggregation Queries in Multihop Sensor Networks 1 Efficient Schedling for Periodic Aggregation Qeries in Mltihop Sensor Networks XiaoHa X, Shaojie Tang, Member, IEEE, XiangYang Li, Senior Member, IEEE Abstract In this work, we stdy periodic qery schedling

More information

Networks An introduction to microcomputer networking concepts

Networks An introduction to microcomputer networking concepts Behavior Research Methods& Instrmentation 1978, Vol 10 (4),522-526 Networks An introdction to microcompter networking concepts RALPH WALLACE and RICHARD N. JOHNSON GA TX, Chicago, Illinois60648 and JAMES

More information

Isilon InsightIQ. Version 2.5. User Guide

Isilon InsightIQ. Version 2.5. User Guide Isilon InsightIQ Version 2.5 User Gide Pblished March, 2014 Copyright 2010-2014 EMC Corporation. All rights reserved. EMC believes the information in this pblication is accrate as of its pblication date.

More information

Dynamic Maintenance of Majority Information in Constant Time per Update? Gudmund S. Frandsen and Sven Skyum BRICS 1 Department of Computer Science, Un

Dynamic Maintenance of Majority Information in Constant Time per Update? Gudmund S. Frandsen and Sven Skyum BRICS 1 Department of Computer Science, Un Dynamic Maintenance of Majority Information in Constant Time per Update? Gdmnd S. Frandsen and Sven Skym BRICS 1 Department of Compter Science, University of arhs, Ny Mnkegade, DK-8000 arhs C, Denmark

More information

Statistical Methods in functional MRI. Standard Analysis. Data Processing Pipeline. Multiple Comparisons Problem. Multiple Comparisons Problem

Statistical Methods in functional MRI. Standard Analysis. Data Processing Pipeline. Multiple Comparisons Problem. Multiple Comparisons Problem Statistical Methods in fnctional MRI Lectre 7: Mltiple Comparisons 04/3/13 Martin Lindqist Department of Biostatistics Johns Hopkins University Data Processing Pipeline Standard Analysis Data Acqisition

More information

Channel-Hopping Multiple Access

Channel-Hopping Multiple Access Channel-Hopping Multiple Access Asimakis Tzamaloukas and J.J. Garcia-Luna-Aceves Computer Engineering Department Baskin School of Engineering University of California, Santa Cruz, California 9564 fjamal,

More information

The Impact of Avatar Mobility on Distributed Server Assignment for Delivering Mobile Immersive Communication Environment

The Impact of Avatar Mobility on Distributed Server Assignment for Delivering Mobile Immersive Communication Environment This fll text paper was peer reviewed at the direction of IEEE Commnications Society sbject matter experts for pblication in the ICC 27 proceedings. The Impact of Avatar Mobility on Distribted Server Assignment

More information

Alliances and Bisection Width for Planar Graphs

Alliances and Bisection Width for Planar Graphs Alliances and Bisection Width for Planar Graphs Martin Olsen 1 and Morten Revsbæk 1 AU Herning Aarhs University, Denmark. martino@hih.a.dk MADAGO, Department of Compter Science Aarhs University, Denmark.

More information

Broadcasting XORs: On the Application of Network Coding in Access Point-to-Multipoint Networks

Broadcasting XORs: On the Application of Network Coding in Access Point-to-Multipoint Networks Broadcasting XORs: On the Application of Network Coding in Access Point-to-Mltipoint Networks The MIT Faclty has made this article openly available Please share how this access benefits yo Yor story matters

More information

Chapter 12 Multiple Access 12.1

Chapter 12 Multiple Access 12.1 Chapter 12 Multiple Access 12.1 Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. 12.2 Figure 12.1 Data link layer divided into two functionality-oriented sublayers

More information

Real-time mean-shift based tracker for thermal vision systems

Real-time mean-shift based tracker for thermal vision systems 9 th International Conference on Qantitative InfraRed Thermography Jly -5, 008, Krakow - Poland Real-time mean-shift based tracker for thermal vision systems G. Bieszczad* T. Sosnowski** * Military University

More information

High Level View. EE 122: Ethernet and Random Access protocols. Medium Access Protocols

High Level View. EE 122: Ethernet and Random Access protocols. Medium Access Protocols High Level View EE 122: Ethernet and 802.11 Ion Stoica September 18, 2002 Goal: share a communication medium among multiple hosts connected to it Problem: arbitrate between connected hosts Solution goals:

More information

COMPOSITION OF STABLE SET POLYHEDRA

COMPOSITION OF STABLE SET POLYHEDRA COMPOSITION OF STABLE SET POLYHEDRA Benjamin McClosky and Illya V. Hicks Department of Comptational and Applied Mathematics Rice University November 30, 2007 Abstract Barahona and Mahjob fond a defining

More information

Wireless Medium Access Control Protocols

Wireless Medium Access Control Protocols Wireless Medium Access Control Protocols Telecomunicazioni Undergraduate course in Electrical Engineering University of Rome La Sapienza Rome, Italy 2007-2008 Classification of wireless MAC protocols Wireless

More information

Hardware-Accelerated Free-Form Deformation

Hardware-Accelerated Free-Form Deformation Hardware-Accelerated Free-Form Deformation Clint Cha and Ulrich Nemann Compter Science Department Integrated Media Systems Center University of Sothern California Abstract Hardware-acceleration for geometric

More information

Constructing and Comparing User Mobility Profiles for Location-based Services

Constructing and Comparing User Mobility Profiles for Location-based Services Constrcting and Comparing User Mobility Profiles for Location-based Services Xihi Chen Interdisciplinary Centre for Secrity, Reliability and Trst, University of Lxemborg Jn Pang Compter Science and Commnications,

More information

IP Multicast Fault Recovery in PIM over OSPF

IP Multicast Fault Recovery in PIM over OSPF 1 IP Mlticast Falt Recovery in PIM over OSPF Abstract Relatively little attention has been given to nderstanding the falt recovery characteristics and performance tning of native IP mlticast networks.

More information

ECEN 5032 Data Networks Medium Access Control Sublayer

ECEN 5032 Data Networks Medium Access Control Sublayer ECEN 5032 Data Networks Medium Access Control Sublayer Peter Mathys mathys@colorado.edu University of Colorado, Boulder c 1996 2005, P. Mathys p.1/35 Overview (Sub)networks can be divided into two categories:

More information

Illumina LIMS. Software Guide. For Research Use Only. Not for use in diagnostic procedures. Document # June 2017 ILLUMINA PROPRIETARY

Illumina LIMS. Software Guide. For Research Use Only. Not for use in diagnostic procedures. Document # June 2017 ILLUMINA PROPRIETARY Illmina LIMS Software Gide Jne 2017 ILLUMINA PROPRIETARY This docment and its contents are proprietary to Illmina, Inc. and its affiliates ("Illmina"), and are intended solely for the contractal se of

More information

Energy-Efficient Mobile-Edge Computation Offloading for Applications with Shared Data

Energy-Efficient Mobile-Edge Computation Offloading for Applications with Shared Data Energy-Efficient Mobile-Edge Comptation Offloading for Applications with Shared Data Xiangy He, Hong Xing, Ye Chen, Armgam Nallanathan School of Electronic Engineering and Compter Science Qeen Mary University

More information

Tdb: A Source-level Debugger for Dynamically Translated Programs

Tdb: A Source-level Debugger for Dynamically Translated Programs Tdb: A Sorce-level Debgger for Dynamically Translated Programs Naveen Kmar, Brce R. Childers, and Mary Lo Soffa Department of Compter Science University of Pittsbrgh Pittsbrgh, Pennsylvania 15260 {naveen,

More information

Lecture 13: Traffic Engineering

Lecture 13: Traffic Engineering Lectre 13: Traffic Engineering CSE 222A: Compter Commnication Networks Alex C. Snoeren Thanks: Mike Freedman, Nick Feamster, and Ming Zhang Lectre 13 Overview Dealing with mltiple paths Mltihoming Entact

More information

EE 122: Ethernet and

EE 122: Ethernet and EE 122: Ethernet and 802.11 Ion Stoica September 18, 2002 (* this talk is based in part on the on-line slides of J. Kurose & K. Rose) High Level View Goal: share a communication medium among multiple hosts

More information

Prof. Kozyrakis. 1. (10 points) Consider the following fragment of Java code:

Prof. Kozyrakis. 1. (10 points) Consider the following fragment of Java code: EE8 Winter 25 Homework #2 Soltions De Thrsday, Feb 2, 5 P. ( points) Consider the following fragment of Java code: for (i=; i

More information

Resolving Linkage Anomalies in Extracted Software System Models

Resolving Linkage Anomalies in Extracted Software System Models Resolving Linkage Anomalies in Extracted Software System Models Jingwei W and Richard C. Holt School of Compter Science University of Waterloo Waterloo, Canada j25w, holt @plg.waterloo.ca Abstract Program

More information

A Performance Analysis of IEEE Networks in the Presence of Hidden Stations

A Performance Analysis of IEEE Networks in the Presence of Hidden Stations A Performance Analysis of IEEE 802.11 Networks in the Presence of Hidden Stations Marek Natkaniec, Andrzej R. Pach University of Mining and Metallurgy, Department of Telecommunications, Cracow, Poland

More information

StaCo: Stackelberg-based Coverage Approach in Robotic Swarms

StaCo: Stackelberg-based Coverage Approach in Robotic Swarms Maastricht University Department of Knowledge Engineering Technical Report No.:... : Stackelberg-based Coverage Approach in Robotic Swarms Kateřina Staňková, Bijan Ranjbar-Sahraei, Gerhard Weiss, Karl

More information

Media Access Control in Ad Hoc Networks

Media Access Control in Ad Hoc Networks Media Access Control in Ad Hoc Networks The Wireless Medium is a scarce precious resource. Furthermore, the access medium is broadcast in nature. It is necessary to share this resource efficiently and

More information

CHAPTER 7 MAC LAYER PROTOCOLS. Dr. Bhargavi Goswami Associate Professor & Head Department of Computer Science Garden City College

CHAPTER 7 MAC LAYER PROTOCOLS. Dr. Bhargavi Goswami Associate Professor & Head Department of Computer Science Garden City College CHAPTER 7 MAC LAYER PROTOCOLS Dr. Bhargavi Goswami Associate Professor & Head Department of Computer Science Garden City College MEDIUM ACCESS CONTROL - MAC PROTOCOLS When the two stations transmit data

More information

ECE453 Introduction to Computer Networks. Broadcast vs. PPP. Delay. Lecture 7 Multiple Access Control (I)

ECE453 Introduction to Computer Networks. Broadcast vs. PPP. Delay. Lecture 7 Multiple Access Control (I) ECE453 Introduction to Computer Networks Lecture 7 Multiple Access Control (I) 1 Broadcast vs. PPP Broadcast channel = multiaccess channel = random access channel Broadcast LAN Satellite network PPP WAN

More information

AN ANALYSIS OF THE MODIFIED BACKOFF MECHANISM FOR IEEE NETWORKS

AN ANALYSIS OF THE MODIFIED BACKOFF MECHANISM FOR IEEE NETWORKS AN ANALYSIS OF THE MODIFIED BACKOFF MECHANISM FOR IEEE 802.11 NETWORKS Marek Natkaniec, Andrzej R. Pach Department of Telecommunications University of Mining and Metallurgy al. Mickiewicza 30, 30-059 Cracow

More information

CMPE 257: Wireless and Mobile Networking

CMPE 257: Wireless and Mobile Networking CMPE 257: Wireless and Mobile Networking Katia Obraczka Computer Engineering UCSC Baskin Engineering Lecture 4 1 Announcements Project proposals. Due April 17 th. Submit by e-mail to katia@soe.ucsc.edu.

More information

Pavlin and Daniel D. Corkill. Department of Computer and Information Science University of Massachusetts Amherst, Massachusetts 01003

Pavlin and Daniel D. Corkill. Department of Computer and Information Science University of Massachusetts Amherst, Massachusetts 01003 From: AAAI-84 Proceedings. Copyright 1984, AAAI (www.aaai.org). All rights reserved. SELECTIVE ABSTRACTION OF AI SYSTEM ACTIVITY Jasmina Pavlin and Daniel D. Corkill Department of Compter and Information

More information

A Jamming-Based MAC Protocol for Wireless Multihop Ad Hoc Networks

A Jamming-Based MAC Protocol for Wireless Multihop Ad Hoc Networks A Jamming-Based MAC Protocol for Wireless Multihop Ad Hoc Networks Shiang-Rung Ye, You-Chiun Wang, and Yu-Chee Tseng Department of Computer Science and Information Engineering National Chiao Tung University

More information

EEC 483 Computer Organization. Branch (Control) Hazards

EEC 483 Computer Organization. Branch (Control) Hazards EEC 483 Compter Organization Section 4.8 Branch Hazards Section 4.9 Exceptions Chans Y Branch (Control) Hazards While execting a previos branch, next instrction address might not yet be known. s n i o

More information

Discrete Cost Multicommodity Network Optimization Problems and Exact Solution Methods

Discrete Cost Multicommodity Network Optimization Problems and Exact Solution Methods Annals of Operations Research 106, 19 46, 2001 2002 Klwer Academic Pblishers. Manfactred in The Netherlands. Discrete Cost Mlticommodity Network Optimization Problems and Exact Soltion Methods MICHEL MINOUX

More information

MAC Research Highlight

MAC Research Highlight MAC Research Highlight Y.C. Tseng Outline: 3 Main Research Issues Analysis: G. Bianchi, Performance Analysis of the IEEE 802.11 Distributed Coordination Function, IEEE J-SAC, 2000. K. Kanodia et al., Ordered

More information

A Jamming-Based MAC Protocol to Improve the. Performance of Wireless Multihop Ad Hoc. Networks

A Jamming-Based MAC Protocol to Improve the. Performance of Wireless Multihop Ad Hoc. Networks A Jamming-Based MAC Protocol to Improve the Performance of Wireless Multihop Ad Hoc Networks Shiang-Rung Ye, You-Chiun Wang, and Yu-Chee Tseng Department of Computer Science and Information Engineering

More information

CS 153 Design of Operating Systems Spring 18

CS 153 Design of Operating Systems Spring 18 CS 153 Design of Operating Systems Spring 18 Lectre 12: Deadlock Instrctor: Chengy Song Slide contribtions from Nael Ab-Ghazaleh, Harsha Madhyvasta and Zhiyn Qian Deadlock the deadly embrace! Synchronization

More information

CAPL Scripting Quickstart

CAPL Scripting Quickstart CAPL Scripting Qickstart CAPL (Commnication Access Programming Langage) For CANalyzer and CANoe V1.01 2015-12-03 Agenda Important information before getting started 3 Visal Seqencer (GUI based programming

More information

Topic Continuity for Web Document Categorization and Ranking

Topic Continuity for Web Document Categorization and Ranking Topic Continity for Web ocment Categorization and Ranking B. L. Narayan, C. A. Mrthy and Sankar. Pal Machine Intelligence Unit, Indian Statistical Institte, 03, B. T. Road, olkata - 70008, India. E-mail:

More information

Bias of Higher Order Predictive Interpolation for Sub-pixel Registration

Bias of Higher Order Predictive Interpolation for Sub-pixel Registration Bias of Higher Order Predictive Interpolation for Sb-pixel Registration Donald G Bailey Institte of Information Sciences and Technology Massey University Palmerston North, New Zealand D.G.Bailey@massey.ac.nz

More information

EXAMINATIONS 2010 END OF YEAR NWEN 242 COMPUTER ORGANIZATION

EXAMINATIONS 2010 END OF YEAR NWEN 242 COMPUTER ORGANIZATION EXAINATIONS 2010 END OF YEAR COPUTER ORGANIZATION Time Allowed: 3 Hors (180 mintes) Instrctions: Answer all qestions. ake sre yor answers are clear and to the point. Calclators and paper foreign langage

More information

Multiple Access. Data Communications and Networking

Multiple Access. Data Communications and Networking Multiple Access In the previous part we discussed data link control, a mechanism which provides a link with reliable communication. In the protocols we described, we assumed that there is an available

More information

Tarek Sheltami. CCSE COE 3/8/2008 1

Tarek Sheltami. CCSE COE  3/8/2008 1 Mobile Ad hoc Networks COE 549 Random Access I Tarek Sheltami KFUPM CCSE COE http://faculty.kfupm.edu.sa/coe/tarek/coe549.htm 3/8/2008 1 Outline Medium Access Control Protocols ALOHA BTMA CSMA Some simulation

More information

The Medium Access Control Scheme (MAC Layer) Reference: Andrew S. Tanenbaum, Computer Networks, 3rd Edition, Prentice Hall, 1996.

The Medium Access Control Scheme (MAC Layer) Reference: Andrew S. Tanenbaum, Computer Networks, 3rd Edition, Prentice Hall, 1996. The Medium Access Control Scheme (MAC Layer) Reference: Andrew S. Tanenbaum, Computer Networks, 3rd Edition, Prentice Hall, 1996. 1 Table of Contents Introduction ALOHA Carrier Sense Multiple Sense (CSMA)

More information

A Hybrid Weight-Based Clustering Algorithm for Wireless Sensor Networks

A Hybrid Weight-Based Clustering Algorithm for Wireless Sensor Networks Open Access Library Jornal A Hybrid Weight-Based Clstering Algorithm for Wireless Sensor Networks Cheikh Sidy Mohamed Cisse, Cheikh Sarr * Faclty of Science and Technology, University of Thies, Thies,

More information

Aloha and slotted aloha

Aloha and slotted aloha CSMA 2/13/06 Aloha and slotted aloha Slotted aloha: transmissions are synchronized and only start at the beginning of a time slot. Aloha sender A sender B collision sender C t Slotted Aloha collision sender

More information

Local Run Manager Generate FASTQ Analysis Module

Local Run Manager Generate FASTQ Analysis Module Local Rn Manager Generate FASTQ Analysis Modle Workflow Gide For Research Use Only. Not for se in diagnostic procedres. Overview 3 Set Parameters 3 Analysis Methods 5 View Analysis Reslts 5 Analysis Report

More information

A Recovery Algorithm for Reliable Multicasting in Reliable Networks

A Recovery Algorithm for Reliable Multicasting in Reliable Networks A Recovery Algorithm for Reliable Mlticasting in Reliable Networks Danyang Zhang Sibabrata Ray Dept. of Compter Science University of Alabama Tscaloosa, AL 35487 {dzhang, sib}@cs.a.ed Ragopal Kannan S.

More information

Chapter 6: Pipelining

Chapter 6: Pipelining CSE 322 COPUTER ARCHITECTURE II Chapter 6: Pipelining Chapter 6: Pipelining Febrary 10, 2000 1 Clothes Washing CSE 322 COPUTER ARCHITECTURE II The Assembly Line Accmlate dirty clothes in hamper Place in

More information

CMPE 257: Wireless and Mobile Networking

CMPE 257: Wireless and Mobile Networking CMPE 257: Wireless and Mobile Networking Katia Obraczka Computer Engineering UCSC Baskin Engineering Lecture 3 CMPE 257 Winter'11 1 Announcements Accessing secure part of the class Web page: User id: cmpe257.

More information

Local Run Manager. Software Reference Guide for MiSeqDx

Local Run Manager. Software Reference Guide for MiSeqDx Local Rn Manager Software Reference Gide for MiSeqDx Local Rn Manager Overview 3 Dashboard Overview 4 Administrative Settings and Tasks 7 Workflow Overview 12 Technical Assistance 17 Docment # 1000000011880

More information

TDT4255 Friday the 21st of October. Real world examples of pipelining? How does pipelining influence instruction

TDT4255 Friday the 21st of October. Real world examples of pipelining? How does pipelining influence instruction Review Friday the 2st of October Real world eamples of pipelining? How does pipelining pp inflence instrction latency? How does pipelining inflence instrction throghpt? What are the three types of hazard

More information

Efficient and Accurate Delaunay Triangulation Protocols under Churn

Efficient and Accurate Delaunay Triangulation Protocols under Churn Efficient and Accrate Delanay Trianglation Protocols nder Chrn Dong-Yong Lee and Simon S. Lam Department of Compter Sciences The University of Texas at Astin {dylee, lam}@cs.texas.ed November 9, 2007 Technical

More information

Discretized Approximations for POMDP with Average Cost

Discretized Approximations for POMDP with Average Cost Discretized Approximations for POMDP with Average Cost Hizhen Y Lab for Information and Decisions EECS Dept., MIT Cambridge, MA 0239 Dimitri P. Bertsekas Lab for Information and Decisions EECS Dept., MIT

More information

Curves and Surfaces. CS 537 Interactive Computer Graphics Prof. David E. Breen Department of Computer Science

Curves and Surfaces. CS 537 Interactive Computer Graphics Prof. David E. Breen Department of Computer Science Crves and Srfaces CS 57 Interactive Compter Graphics Prof. David E. Breen Department of Compter Science E. Angel and D. Shreiner: Interactive Compter Graphics 6E Addison-Wesley 22 Objectives Introdce types

More information

EMC ViPR. User Guide. Version

EMC ViPR. User Guide. Version EMC ViPR Version 1.1.0 User Gide 302-000-481 01 Copyright 2013-2014 EMC Corporation. All rights reserved. Pblished in USA. Pblished Febrary, 2014 EMC believes the information in this pblication is accrate

More information

CS 153 Design of Operating Systems Spring 18

CS 153 Design of Operating Systems Spring 18 CS 153 Design of Operating Systems Spring 18 Lectre 11: Semaphores Instrctor: Chengy Song Slide contribtions from Nael Ab-Ghazaleh, Harsha Madhyvasta and Zhiyn Qian Last time Worked throgh software implementation

More information

IMPLEMENTATION OF A PACKET PRIORITY AND FIFO QUEUING MODEL IN PACKET RADIO SYSTEM

IMPLEMENTATION OF A PACKET PRIORITY AND FIFO QUEUING MODEL IN PACKET RADIO SYSTEM IMPLEMENTATION OF A PACKET PRIORITY AND FIFO QUEUING MODEL IN PACKET RADIO SYSTEM H. Lami 1, A. Affandi 2 1, 2 Department of Electrical Engineering, Faculty of Industrial Technology, Institut Teknologi

More information

Empirical Study of Mobility effect on IEEE MAC protocol for Mobile Ad- Hoc Networks

Empirical Study of Mobility effect on IEEE MAC protocol for Mobile Ad- Hoc Networks Empirical Study of Mobility effect on IEEE 802.11 MAC protocol for Mobile Ad- Hoc Networks Mojtaba Razfar and Jane Dong mrazfar, jdong2@calstatela.edu Department of Electrical and computer Engineering

More information

CSE 461: Wireless Networks

CSE 461: Wireless Networks CSE 461: Wireless Networks Wireless IEEE 802.11 A physical and multiple access layer standard for wireless local area networks (WLAN) Ad Hoc Network: no servers or access points Infrastructure Network

More information

CS 153 Design of Operating Systems

CS 153 Design of Operating Systems CS 153 Design of Operating Systems Spring 18 Lectre 3: OS model and Architectral Spport Instrctor: Chengy Song Slide contribtions from Nael Ab-Ghazaleh, Harsha Madhyvasta and Zhiyn Qian Last time/today

More information