A Free-Collision MAC Proposal for Networks

Size: px
Start display at page:

Download "A Free-Collision MAC Proposal for Networks"

Transcription

1 12th Brazlan Workshop on Real-Tme and Embedded Systems 89 A Free-Collson MAC Proposal for Networks Omar Alment 1,2, Gullermo Fredrch 1, Gullermo Reggan 1 1 SITIC Group Unversdad Tecnológca Naconal FRBB Bahía Blanca Argentna 2 IIIE - Unversdad Naconal del Sur DIEC Bahía Blanca Argentna ealmen@crba.edu.ar, {gfred,ghreggan}@frbb.utn.edu.ar Abstract. Wreless technologes are a good choce for work n ndustral envronments, where t s necessary to nterconnect moble systems or t wants to avod sensors and controllers wrng n plant. However, these technologes present relablty and tmng problems nherent n the rado channels, mechansms for medum access, etc. The standard e provdes two alternatves for medum access (EDCA and HCCA) by dfferentatng traffc nto four Access Categores (ACs). Ths paper proposes a mechansm for controllng the medum access, so-called WRTMAC, developed from the EDCA scheme of standard e. The handlng of the arbtraton nter frame spaces (AIFS) has been modfed n order to make determnstc the medum access, even n terms of hgh traffc next to the saturaton of the system. 1. Introducton Wreless technologes have become a very attractve opton for ndustral and factory envronments. We can appont the reducton of tme and cost of nstallaton and the mantenance of cablng ndustral and ther changes. The damage on the wrngs and connectors due to the aggressve envronments of certan types of ndustres s another reason. The applcatons of ndustral control that nvolve some knd of moble systems, n whch data communcatons must meet requrements of real tme and relablty, can beneft from the wreless nterconnecton [Wllg A., Matheus K. and Wolsz A., 2005]. However, t s necessary to consder features of the wreless medum, such as the typcal weaknesses of a rado frequency channel (RF), the moblty of some statons, the uncertanty n the tme of physcal medum access of some protocols, etc. Despte other types of exstng wreless nterconnectons, we are nterested on wreless local area networks (WLAN) based on IEEE standard. The Medum Access Control protocol (MAC) s decsve n the performance of the network [Vanhatupa T., 2008]. The MAC mechansm can operate n two ways: Pont Coordnaton Functon (PCF) and Dstrbuted Coordnaton Functon (DCF). PCF, also called free of contenton, uses an Access Pont (AP) as a network coordnator. In DCF, wthout centralzed control, the nodes compete for the access to the physcal medum. In spte of the dfferences, both modes use the Carrer Sense Multple Access wth Collson-Avodance (CSMA/CA) mechansm to obtan the access to the medum and transmt. One of the weaknesses of the MAC protocol s that t not support dfferentated qualty of servce (QoS) for dfferent types of traffc. For that reason,

2 90 Proceedngs e [IEEE Std e; Part 11, 2005] was developed to support two QoS mechansms: Enhanced Dstrbuted Coordnaton Access (EDCA) and Hybrd Coordnaton Functon Controlled Channel (HCCA). The EDCA scheme extends DCF, as t s known n the orgnal standard [IEEE Std ; Part 11, 2007], dfferentatng four prortzed Access Categores (AC) [Vttoro S. and Lo Bello L., 2007]. In spte of EDCA mproves the throughput and the response tme wth regard to DCF, the reduced amount of AC lmts the dfferentaton of traffc wth temporary restrctons [Ferré P., Doufex A., Nx A. and Bull D., 2004]. Ths paper proposes changes at the MAC level, based on the standard e, n order to adequate the EDCA mechansm for real-tme ndustral applcatons, generatng a number of ACs as devces and/or messages are there n the network [Perera da Slva M. and Becker Westphall C., 2005], makng determnstc the tme to access the medum. Ths mechansm has been called WRTMAC: Wreless Real- Tme Medum Access Control. 2. DCF and EDCA A wreless local area network (WLAN) type s a broadcast network, characterzed by the uncertanty n the medum access tme. DCF s a dstrbuted medum access control scheme, based on the CSMA/CA mechansm. A staton must sense the medum before startng a transmsson; f the medum remans dle durng a random tme, the staton transmts, otherwse ts transmsson must be postponed untl the end of the current one. DCF dstngushes two technques: the smplest, the staton transmts the frame when t s obtaned the access to the medum, and wats the acknowledge (ACK) from the recever; the other uses an exchange of RTS/CTS frames between sender and recever, pror to the dspatch of the data, n order to avod collsons due to the hdden nodes [Bensaou B., Wang Yu and Ch Chung Ko, 2000]. Ths work s based on the frst one. A collson s dffcult to detect n a wreless medum, so a gven amount of tme named nter-frame space (IFS) s used to control the access to the channel. When sensng ndcates that the medum s free, a staton must wat a tme named dstrbuted nter-frame space (DIFS) after the end of the prevous transmsson (Fgure 1). Then there s a watng tme, named backoff wndow (BW), whose duraton s a random quantty of slots tme (ST), between a mnmum of 0 and a maxmum equal to CW 1. CW s the value of the contenton wndow, whch begns wth a mnmum value CW mn, and doubles ths value after each collson up to a maxmum CW max. When the BW tmer reaches zero and f the medum remans free, the staton begns ts transmsson. If the medum becomes busy before BW expres, ths tmer s frozen untl the channel remans dle durng a DIFS tme. If BW expres n two or more statons at the same tme, there wll be a collson. After a frame was receved satsfactory, the recever staton must wat a tme short nter-frame space (SIFS) to send an ACK (Fgure 1). If the transmtter staton ddn t receve the ACK after a SIFS tme from the end of ts message, nterprets that a collson has occurred and wll be necessary retransmt. The collsons possblty of ths mechansm causes uncertanty about the tme needed to realze a transmsson.

3 12th Brazlan Workshop on Real-Tme and Embedded Systems 91 Fgure DCF Tmng The e standard ntroduces the EDCA mode (Fgure 2), whch proposed a dfferentated mechansm of QoS wth four ACs: AC_BK (Background) for the lowest prorty level (1-2), AC_BE (Best Effort) for the followng levels (0-3), AC_VI (Vdeo) for the prortes 4 and 5 and AC_VO (Voce) for the hghest (6-7). Accordng to ts prorty, a frame wll be located n one of those four categores. Each AC uses specfc values of arbtraton IFS (AIFS), CWmín and CWmáx [Wllg A., (2008)]. The dfference between DCF and EDCA s that, the frst does not dstngush types of traffc and, when the medum s free, all statons must wat for the same DIFS before startng ts BW tmer to contend for the medum access, usng all the same CW. However, each type of traffc n EDCA, parameterzed for ts AC, wll start ts BW tmer after sensng the medum dle for a whle AIFS. The AIFS value depends on the AC of the message; therefore an AC of hgher prorty wll have a lower value, havng more probablty to access the channel. Due to frames wth the same AC can coexst n several nodes, collsons can occur and they are resolved n a smlar way to DCF Fgure 2. EDCA Tmng The goal of WRTMAC s to develop a collson free MAC method that guarantee the response tme, defned as the tme measured from transmsson request untl the ACK recepton. The basc proposal establshes one AC for each type of message, assgnng a gven AIFS to each one. The watng tme pror to a transmsson s equal to DIFS plus the AIFS accordng to the type of message. 3. WRTMAC: a Real Tme varant to WLAN Basc scheme The objectve that has been establshed for WRTMAC s a real tme determnstc behavor. So, the maxmum latency to transmt a frame must be ensured and must be necessary to remove those probablstc elements own of DCF and EDCA. EDCA has been the startng pont for defnng WRTMAC, ntroducng varants to acheve the target. In that sense, have been establshed the followng patterns of operaton:

4 92 Proceedngs Each type of frame has assgned a certan prorty, dfferent from any other, n a smlar way to the bus CAN [Bosch Robert GmbH, 1991]. The prorty s ndcated by a numercal value from zero (maxmum prorty) and a certan postve number N for the mnmum. The total amount of prortes should be establshed by the amount of types of messages that should be handled n the context of a partcular applcaton. If two or more smultaneous requrements arse, always the frame of the hghest prorty must be transmtted. The logc for controllng the access to the channel has been desgned to avod the occurrence of collsons. However, collsons can occur after ntervals of prolonged nactvty, due to the drft between the local clocks of the nodes. The resoluton of these collsons should be done n a bounded and predctable tme. Also, t has been desgned a smple strategy to allow a free-collson operaton. Fgure 3 presents the bascs of WRTMAC. When a staton has a frame to send, t must wat untl the medum becomes dle. After a whle called Real-Tme Inter-Frame Space (RIFS), f the medum s stll free, the transmsson starts. If durng the wat, the channel becomes busy, the process wll be stopped and should be restarted when the medum becomes free. In WRTMAC each message has ts exclusve RIFS value. Its duraton s nversely proportonal to the prorty t represents. RIFS s called the watng tme (backoff) for the prorty message. Fgure 3. WRTMAC: Basc scheme WRTMAC determnsm s based on that, each message uses a RIFS arbtraton tme, fxed and dfferent from others. Ths tends to avod the occurrence of collsons, whle ensurng that, n case of contenton, the wnner wll be the hgher prorty message. Fgure 4 shows the order of three frames, wth prortes 2, 3 and 4, contendng for the medum access. The three nodes begn the wat, but as RIFS 2 s the shortest, Frame 3 and Frame 4 attempts must be aborted. They are restarted after the end of Frame 2 cycle. RIFS duraton s calculated based on the values of DIFS and ST. They are establshed by the selected physcal layer (PHY) of the standard, accordng to (1): RIFS = DIFS + ST (1) Table 1 shows the values of SIFS, DIFS and ST for dfferent varants of physcal layer (PHY):

5 12th Brazlan Workshop on Real-Tme and Embedded Systems 93 Fgure 4. Transmsson order accordng to prorty of messages Table : PHY varants PHY Frec. (GHz) Rate (Mbps) SIFS (µs) DIFS (µs) ST (µs) b g a The transmsson cycle of prorty, composed by RIFS, the transmsson tme of the frame (t FRAME ), SIFS and the transmsson tme of the ACK frame (T ACK ), s called C (2): C = RIFS + t + SIFS + t (2) FRAME The ACK nstructs the MAC entty of the transmtter that the frame sent, reached ts destnaton. In general, f ACK s not receved a retransmsson s not performed, but notfes the upper layers that the transfer has faled (or at least that there s no certanty that has been successful). The decson regardng what actons must be taken s left to the uppers layers; they know the logc and tmng constrants of the applcaton. WRTMAC s only responsble for provdng determnstc communcaton servce on the maxmum latency. Only t would be performed a unque retransmsson n case of collson, wthout affectng the determnstc behavor, as explaned n 3.4. One can see that WRTMAC allows mplement a Real-Tme scheme of Rate Monotoncs (RMS) type [Lu and Layland, 1973], assgnng prortes to messages n reverse order of ther perods. Knowng t FRAME for all messages of a certan real-tme system, and assumng that they are perodc, one can set the mnmum possble perod between transmsson requrements (T ) for a gven message m, n terms of all other messages m j of hgher prorty than m (where j<). Adaptng the classc formula used to analyze the schedulablty of a set of real-tme perodc tasks on a processor [Lehoczky J., L. Sha, and Y. Dng, 1989], the mnmum perod possble for a message of prorty, s (3): T T C j + C j< T j Where: T, T j, C, C j : Perod and transmsson cycle of prorty messages and j. Fgure 4 shows messages wth perods T 2 T 3 T 4. (3) s vald when the network s workng wth hgh traffc,.e. when there s always at least one transfer request pendng, awatng the end of the current transmsson. However, dependng on ACK (3)

6 94 Proceedngs the total amount of messages and ther perods, there may be long ntervals of slence. Ths requres a specal analyss, because the completon of a transfer s the event that reset the counter on each node and allows mantanng synchronsm. Exceedng the tme correspondng to RIFS longer wthout havng made any transmsson, all nodes must restart ther counters. Each node must mantan the tmng of actvty n the medum, even when there s no requrement, because even a moment pror to the expraton of ts RIFS s able to receve a request and transmt t n the current cycle Operaton on non-saturaton condtons When the network has extended moments of slence, all nodes must proceed as follows: wat a whle correspondng to the duraton of the message of the lowest prorty plus a ST, and then restart ther counters. In fact, as one takes nto account the tme ST elapsed after RIFS N, the counters RIFS are not restarted from zero, but wth an ntal value ST (equvalent to consder that the tmers are reset at the expry of RIFS N ). Fgure 5. WRTMAC: counters n non-saturaton condtons Fgure 5 shows the transmsson of a frame after cycles of nactvty. In real operatng condtons could succeed longer ntervals of slence, mantanng the same concept to restart the counters after each RIFSN perod of nactvty n the medum. In case of more extended nactvty, the drft between the locals clocks of each node can lead to a collson condton, as s dscussed n 3.4. Another stuaton to consder s prorty nverson, dscussed n 3.3. Both, the collson and the prorty nverson ntroduce delays, whch must be added to (3) to generalze ts expresson Prorty Inverson Prorty nverson s called the stuaton that occurs when the transmsson of a frame must wat untl the completon of a lower prorty. Fgure 6 shows the almost smultaneous transmsson request from Frame 2 and Frame 3, however, as the requrement of Frame 2 released an nstant after the end RIFS 2, ts transmsson must wat for the next cycle.

7 12th Brazlan Workshop on Real-Tme and Embedded Systems 95 Fgure 6. Prorty nverson: Frame 3 s transmtted before Frame 2 As the requrement Frame 3 came before the expry of RIFS3, t s transmtted and completes ts cycle C 3. Thus Frame 2 was blocked for a whle B 2, whose maxmum value s B 2 = C 3 RIFS 2. If all frames are consdered of lower prorty than 2, the maxmum block tme of Frame 2 s: B = máx C j ) RIFS j 2 (4) 2 ( 2 > In general, for any frame of prorty, tme blockng by prorty nverson s: B = máx( C ) RIFS j (5) j > Another deadlock occurs when a frame must wat untl the next cycle to be transmtted, because ts request arrved a moment after the expraton of ts RIFS, havng requrements that cause a prorty nverson (Fgure 7). Fgure 7. Deadlock of a frame of prorty 2 to the end of RIFS N In ths case, the deadlock tme s B 2 = RIFS N RIFS 2. As s lower than the prorty nverson blockng, remans vald (5). Based on these consderatons, (3) s extended as follows (6): T T C j + C + j< Tj In (6), t sn t takng nto account the occurrence of collsons, whch s dscussed n 3.4. B (6)

8 96 Proceedngs 3.4 Collson by drft of local clocks When takes place an dle nterval of duraton greater than or equal to RIFS N, all the nodes must restart ther RIFS tmers wth a perodcty RIFS N. In case of almost smultaneous requests of consecutve prortes, due to the asynchrony that could exst between clocks of dfferent nodes, t could have cancelled (or reduced almost totally) the dfference of one ST between adjacent prorty levels, gvng rse to a collson (Fgure 8). Fgure 8. Collson by drft of local clocks The way n whch each node detects a collson depends on the tme gap between the ends of the collded transmssons. Nevertheless, after detected a collson and resynchronzed the RIFS tmers, each node that has been nvolved n the collson, restarts the process to try a new transmsson. Ths s the unque stuaton for whch a retransmsson s allowed,.e., after a collson followng a slence longer than RIFS N. Fgure 9. Collsons Type 1 (left) and Type 2 (rght) Fgure 9 shows both types of collsons. In Type 1, Frame B fnalzes an amount of tme after Frame A, enough to enable node A to sense carrer durng the SIFS after ts transmsson. Node A restarts ts RIFS tmer wth the end of transmsson of B. However, B detects the collson by the lack of ACK, and therefore t assumes that the new begnnng of ts RIFS tmer s the end of ts own transmsson. The remanng nodes that have not been nvolved wth the collson, restart ther tmers when the medum becomes dle,. e. after the end of Frame B. In ths case, the end of transmsson of Frame B s the event that allows the clock synchronzaton between all the nodes. In Type 2, the nvolved frames fnalze wth a tny dfference of tme, whch not allows the detecton of the later endng frame by the other node. Then, all the nodes synchronze wth the last end of transmsson (Frame A n the example), wth the excepton of the node that ends n frst place ts collded transmsson (Frame B n the

9 12th Brazlan Workshop on Real-Tme and Embedded Systems 97 example). But ths gap s smaller than that t s needed to cause a new collson, because t dd not allow the sensng of the later end-of-frame by the frst fnshng node. After collson detecton and clock synchronzaton, the pendng transmssons wll be dspatched accordng to ther RIFS, followng the rules of WRTMAC. 3.5 Worst-case delay due to a collson Fgure 10 shows that, after a long dle perod a request arrves for the sendng of Frame, but t comes mmedately after the expraton of RIFS. Then, the node must wat untl the next cycle to try agan. Snce there are no pendng requests of prortes lower than, all the RIFS the tmers wll be restarted after the expraton of RIFS N. Untl that moment, the delay accumulated by Frame s: D = RIFS N RIFS (7) Durng the next cycle starts the transmsson of Frame, but a collson occurs. Fgure 10 shows the worst-case collson delay for Frame, because s nvolved the longest frame (the effect would be the same f Frame s the longest one). Fgure 10. Worst-case delay due to a collson After the collson, a new cycle starts. If Frame contnues beng the hghest prorty among those that are awatng transmsson, the delay due to the collson s: Col = D + RIFS + max(t FRAME ) (8) Replacng D from (7), and as the resultng delay does not depend on frame prorty, t s desgnated genercally as Col: Col = RIFS N + max(t FRAME ) (9) Now t should be modfed the formula (6) to nclude the delay due to a collson. However, the prorty nverson blockng, B, and the delay due to a collson, Col, are mutually exclusve. It could happen one or the other but not both. Thus, the mnmum possble perod between requests of the th-message s: T T C j + C + j< Tj max( B, Col) The formula (10) allows the schedulablty analyss for a partcular system, based on the amount of messages, ther duraton and perodcty. (10)

10 98 Proceedngs Although the Rate Monotonc schedulng requres that prortes must be assgned n nverted order wth respect to the request perods, f some (or eventually all) messages have the same perod, t must be assgned dfferent RIFS to each one, to allow the medum access arbtraton Collson-Free operaton Gven that dle ntervals greater than RIFS N can lead to the occurrence of collsons, one way to avod them could be to avod the occurrence of such long ntervals wthout transmssons. A smple strategy could be that, the node desgnated for the transmsson of the lowest prorty frames, always should perform a transmsson. Therefore, f at RIFS N tmer expraton t does not have a pendng request for the transmsson of a message, t must send a dummy frame, whose sole purpose s to occupy the medum, allowng the synchronzaton of all nodes wth the end of ths transmsson. Usng ths smple strategy, becomes vald the formula (6) to establsh the mnmum possble perod for a gven message. 4. Performance evaluaton Gven the ntal motvaton that led to the development of WRTMAC, ts applcaton n ndustral control systems, usually based on small perodcal messages, they was evaluated the maxmum number of messages that could be drven by a network of ths type and / or the shortest feasble perod for each one. Also, the utlzaton factor was calculated, defned t as the fracton of the total tme that the medum s used to transport data. It has been consdered that the network s used for the transmsson of a gven set of messages of equal sze and perod. It has been selected the b physcal layer at 11 Mbps, wth long preamble (192 mcroseconds); message payload of 50, 100 and 1500 bytes (plus 36 bytes of header), and 14 bytes of ACK. Also, t has been evaluated two optons: one of ths based on Formula (10) wth collsons and the other based on Formula (6) collson-free. The utlzaton factor has been calculated for the freecollson mode. The results are showed n Table 2. It s observable that there are no sgnfcant dfference between payloads of 50 and 100 bytes (typcal szes for supervsory and control systems). Also, there s a small mprovement by applyng the free-collson model. Hence, t could be smplfed the MAC mechansm, elmnatng the handlng of collsons and ts assocated retransmssons. Moreover, t can be seen that for long messages (1500 bytes) the mnmum perod does not ncrease proportonately (eg. 77 ms for 64 messages of 100 bytes each; 143 ms for 64 messages of 1500 bytes each). It s allowed to estmate that ths network could be used wth a mxng of short messages (montorng and control) and long messages (data, mages, etc.), wth a small mpact on the real-tme performance.

11 12th Brazlan Workshop on Real-Tme and Embedded Systems 99 Table 2. Mnmum perod and utlzaton factor, based on quantty and sze of messages Payload (bytes) N of messages Mnmum Perod (ms) Utlzaton Factor (%) Wth collsons Collson-free % % % % % % % % % % % % % % % As can be expected, the utlzaton factor ncreases wth the payload sze, because the nfluence of the overhead due to headers, ACK, etc. s reduced. However, the utlzaton factor decreases sgnfcantly as the total number of messages ncreases. Ths s due to the growng overhead assocated wth the dfferent RIFSs needed to arbtrate the medum access. Based on ths stuaton, a way to mprove the network performance could be to group several messages, sharng the same RIFS. However, as RIFS s used to arbtrate the medum access, the RIFS sharng could be possble only when there are more messages than nodes. In these cases, as t s not possble a collson between messages orgnated n the same node, t could be possble that several messages share the same RIFS value. Ths wll be analyzed n a future work. 5. Conclusons WRTMAC (Wreless Real Tme Medum Access Control) s a proposal that mplements a MAC based on EDCA concepts of the standard e, n order to acheve a mechansm for dstrbuted wreless medum access, allowng predctable access tme to the medum of the devces n the network. Changes are proposed to make sutable the EDCA mechansm, n order to generate as Categores Access (AC) as devces and/or messages are n the network. Ths wll be determnstc the access tme to the medum. Ths proposal could brng the EDCA mechansm for real-tme ndustral applcatons. It was shown that WRTMAC allows the mplementaton of a Rate Monotonc Schedulng (RMS) scheme, snce t s possble to know the mnmum feasble perod of a message, accordng to all messages. The proposal also shows that, despte collsons can occur, the collded frames wll be retransmtted, and the collson wll be solved n a bounded tme. Moreover, WRTMAC can operate n a free-collson mode.

12 100 Proceedngs Furthermore, when evaluatng the performance of WRTMAC over traffc patterns typcal of ndustral applcaton networkng, t was noted that ths mechansm provdes an adequate performance wthout tmes uncertantes. In addton t was shown that the network could be used by combnng short and long messages (for montorng, control and general data, mages, etc.), wthout greatly real-tme performance degradaton. As t was analyzed, the ncrease n the number of RIFS dmnshes the utlzaton factor of the network, due to the RIFS overhead. Hence, future works wll be orented to share the same RIFS between several messages orgnated n the same node. The goal wll be to develop a methodology to establsh the mnmum number of RIFS needed for a gven set of messages. References Wllg A., Matheus K. and Wolsz A. (2005), Wreless Technology n Industral Networks, Proceedngs of the IEEE, Vol. 93, No. 6 (June), pp Vanhatupa T. (2008), Desgn of a Performance Management Model for Wreless Local Area Networks, PhD Thess. IEEE Std e; Part 11 (2005): Wreless LAN Medum Access Control (MAC) and Physcal Layer (PHY) Specfcatons and Amendment 8: Medum Access Control (MAC) Qualty of Servce Enhancements. IEEE Std ; Part 11 (2007): Wreless LAN Medum Access Control (MAC) and Physcal Layer (PHY) Specfcatons. Vttoro S. and Lo Bello L. (2007), An Approach to Enhance the QoS Support to Real- Tme Traffc on IEEE e Networks, 6 th Intl Workshop On Real Tme (RTN07) Psa Italy. Ferré P., Doufex A., Nx A. and Bull D. (2004), Throughput Analyss of IEEE and IEEE e MAC, WCNC, IEEE Communcatons Socety. Perera da Slva M. and Becker Westphall C. (2005), Performance Analyss and Servce Dfferentaton n the MAC SubLayer of IEEE e Ad Hoc Networks, Proceedngs of the Advanced Industral Conference on Telecommuncatons, IEEE. Bensaou B., Wang Yu and Ch Chung Ko (2000), Far Medum Access n based Wreless Ad-Hoc Networks, IEEE/ACM The frst Annual Workshop on Mobl Ad hoc Networkng e Computng (MobHoc 00), Boston, EUA. Wllg A.(2008), Recent and Emergng Topcs n Wreless Industral Communcatons: A Selecton, IEEE Transactons On Industral Informatcs, V4 Nº 2. Robert Bosch GmbH (1991), CAN Specfcaton Lu and Layland (1973), Schedulng algorthms for multprogrammng n a hard realtme envronment, Journal of the ACM, Vol.20 Nº 1, pp Lehoczky J., L. Sha, and Y. Dng (1989), The rate monotonc schedulng algorthm: Exact characterzaton and average case behavor. Proc. IEEE Real-Tme Systems Symposum, pp

Interclass Collision Protection for IEEE e Wireless LANs

Interclass Collision Protection for IEEE e Wireless LANs Interclass Collson Protecton for IEEE 82.e Wreless LANs Woon Sun Cho, Chae Y. Lee Dstrbuted Coordnaton Functon (DCF) n IEEE 82. and Enhanced Dstrbuted Channel Access (EDCA) n IEEE 82.e are contenton-based

More information

RAP. Speed/RAP/CODA. Real-time Systems. Modeling the sensor networks. Real-time Systems. Modeling the sensor networks. Real-time systems:

RAP. Speed/RAP/CODA. Real-time Systems. Modeling the sensor networks. Real-time Systems. Modeling the sensor networks. Real-time systems: Speed/RAP/CODA Presented by Octav Chpara Real-tme Systems Many wreless sensor network applcatons requre real-tme support Survellance and trackng Border patrol Fre fghtng Real-tme systems: Hard real-tme:

More information

A Fair Access Mechanism Based on TXOP in IEEE e Wireless Networks

A Fair Access Mechanism Based on TXOP in IEEE e Wireless Networks 11 Internatonal Journal of Communcaton Networks and Informaton Securty (IJCNIS) Vol. 8, No. 1, Aprl 16 A Far Access Mechansm Based on TXOP n IEEE 8.11e Wreless Networks Marjan Yazdan 1, Maryam Kamal, Neda

More information

USER CLASS BASED QoS DIFFERENTIATION IN e WLAN

USER CLASS BASED QoS DIFFERENTIATION IN e WLAN USER CLASS BASED QoS DIFFERENTIATION IN 802.11e WLAN Amt Kejrwal, Ratan Guha School of Computer Scence Unversty of Central Florda Orlando, FL-32816 USA E-mal: {kejrwal, guha}@cs.ucf.edu Manak Chatterjee

More information

Simulation Based Analysis of FAST TCP using OMNET++

Simulation Based Analysis of FAST TCP using OMNET++ Smulaton Based Analyss of FAST TCP usng OMNET++ Umar ul Hassan 04030038@lums.edu.pk Md Term Report CS678 Topcs n Internet Research Sprng, 2006 Introducton Internet traffc s doublng roughly every 3 months

More information

IEEE E: QOS PROVISIONING AT THE MAC LAYER YANG XIAO, THE UNIVERSITY OF MEMPHIS

IEEE E: QOS PROVISIONING AT THE MAC LAYER YANG XIAO, THE UNIVERSITY OF MEMPHIS ACCEPTED FROM O PEN C ALL IEEE 802.11E: QOS PROVISIONING AT THE MAC LAYER YANG XIAO, THE UNIVERSITY OF MEMPHIS ess AIFS[j] AIFS[] PIFS SIFS AIFS[] Content 0 to CW Bac Slot Select s The emergng IEEE 802.11e

More information

Voice capacity of IEEE b WLANs

Voice capacity of IEEE b WLANs Voce capacty of IEEE 82.b WLANs D. S. Amanatads, V. Vtsas, A. Mantsars 2, I. Mavrds 2, P. Chatzmsos and A.C. Boucouvalas 3 Abstract-There s a tremendous growth n the deployment and usage of Wreless Local

More information

Analysis of Collaborative Distributed Admission Control in x Networks

Analysis of Collaborative Distributed Admission Control in x Networks 1 Analyss of Collaboratve Dstrbuted Admsson Control n 82.11x Networks Thnh Nguyen, Member, IEEE, Ken Nguyen, Member, IEEE, Lnha He, Member, IEEE, Abstract Wth the recent surge of wreless home networks,

More information

AADL : about scheduling analysis

AADL : about scheduling analysis AADL : about schedulng analyss Schedulng analyss, what s t? Embedded real-tme crtcal systems have temporal constrants to meet (e.g. deadlne). Many systems are bult wth operatng systems provdng multtaskng

More information

Virtual Memory. Background. No. 10. Virtual Memory: concept. Logical Memory Space (review) Demand Paging(1) Virtual Memory

Virtual Memory. Background. No. 10. Virtual Memory: concept. Logical Memory Space (review) Demand Paging(1) Virtual Memory Background EECS. Operatng System Fundamentals No. Vrtual Memory Prof. Hu Jang Department of Electrcal Engneerng and Computer Scence, York Unversty Memory-management methods normally requres the entre process

More information

Department of Electrical and Computer Systems Engineering

Department of Electrical and Computer Systems Engineering Department of Electrcal and Computer Systems Engneerng Techncal Report MECSE-5-2004 A Survey of IEEE 802.11 MAC Mechansms for Qualty of Servce (QoS) n Wreless Local Area Networks (WLANs) D. Pham, A. Sekercoglu

More information

Efficient Backoff Algorithm in Wireless Multihop Ad Hoc Networks

Efficient Backoff Algorithm in Wireless Multihop Ad Hoc Networks 1 Chen-Mn Wu, 2 Hu-Ka Su, 3 Wang-Has Yang *1,Correspondng Author Nanhua Unversty, cmwu@mal.nhu.edu.tw 2 Natonal Formosa Unversty, hksu@nfu.edu.tw 3 Hsupng Insttute of Technology, yangwh@mal.ht.edu.tw do:10.4156/jact.vol3.

More information

THE IEEE standard for wireless local area networks

THE IEEE standard for wireless local area networks IEEE RANSACIONS ON VEHICULAR ECHNOLOGY, VOL. 58, NO. 2, FEBRUARY 2009 855 Determnstc Prorty Channel Access Scheme for QoS Support n IEEE 802.11e Wreless LANs Sunmyeng Km, Rongsheng Huang, Student Member,

More information

Performance analysis of distributed cluster-based MAC protocol for multiuser MIMO wireless networks

Performance analysis of distributed cluster-based MAC protocol for multiuser MIMO wireless networks RESEARCH Open Access Performance analyss of dstrbuted cluster-based MAC protocol for multuser MIMO wreless networks Azadeh Ettefagh *, Marc Kuhn, Celal Eşl and Armn Wttneben Abstract It s known that multuser

More information

Real-Time Guarantees. Traffic Characteristics. Flow Control

Real-Time Guarantees. Traffic Characteristics. Flow Control Real-Tme Guarantees Requrements on RT communcaton protocols: delay (response s) small jtter small throughput hgh error detecton at recever (and sender) small error detecton latency no thrashng under peak

More information

Fast Retransmission of Real-Time Traffic in HIPERLAN/2 Systems

Fast Retransmission of Real-Time Traffic in HIPERLAN/2 Systems Fast Retransmsson of Real-Tme Traffc n HIPERLAN/ Systems José A Afonso and Joaqum E Neves Department of Industral Electroncs Unversty of Mnho, Campus de Azurém 4800-058 Gumarães, Portugal {joseafonso,

More information

DESIGNING TRANSMISSION SCHEDULES FOR WIRELESS AD HOC NETWORKS TO MAXIMIZE NETWORK THROUGHPUT

DESIGNING TRANSMISSION SCHEDULES FOR WIRELESS AD HOC NETWORKS TO MAXIMIZE NETWORK THROUGHPUT DESIGNING TRANSMISSION SCHEDULES FOR WIRELESS AD HOC NETWORKS TO MAXIMIZE NETWORK THROUGHPUT Bran J. Wolf, Joseph L. Hammond, and Harlan B. Russell Dept. of Electrcal and Computer Engneerng, Clemson Unversty,

More information

Lecture 7 Real Time Task Scheduling. Forrest Brewer

Lecture 7 Real Time Task Scheduling. Forrest Brewer Lecture 7 Real Tme Task Schedulng Forrest Brewer Real Tme ANSI defnes real tme as A Real tme process s a process whch delvers the results of processng n a gven tme span A data may requre processng at a

More information

Achievable Bandwidth Estimation for Stations in Multi-Rate IEEE WLAN Cells

Achievable Bandwidth Estimation for Stations in Multi-Rate IEEE WLAN Cells Achevable Bandwdth Estmaton for Statons n Mult-Rate IEEE 802. WLAN Cells Eduard Garca, Davd Vamonte, Rafael Vdal and Josep Paradells Wreless Networks Group - echncal Unversty of Catalona (UPC) {eduardg,

More information

UBICC Publishers 2008 Ubiquitous Computing and Communication Journal

UBICC Publishers 2008 Ubiquitous Computing and Communication Journal UBICC Journal Ubqutous Computng and Communcaton Journal 008 Volume 3. 008-04-30. ISSN 99-844 Specal Issue on Moble Adhoc Networks UBICC ublshers 008 Ubqutous Computng and Communcaton Journal Edted by Usman

More information

Real-time Scheduling

Real-time Scheduling Real-tme Schedulng COE718: Embedded System Desgn http://www.ee.ryerson.ca/~courses/coe718/ Dr. Gul N. Khan http://www.ee.ryerson.ca/~gnkhan Electrcal and Computer Engneerng Ryerson Unversty Overvew RTX

More information

Efficient QoS Provisioning at the MAC Layer in Heterogeneous Wireless Sensor Networks

Efficient QoS Provisioning at the MAC Layer in Heterogeneous Wireless Sensor Networks Effcent QoS Provsonng at the MAC Layer n Heterogeneous Wreless Sensor Networks M.Soul a,, A.Bouabdallah a, A.E.Kamal b a UMR CNRS 7253 HeuDaSyC, Unversté de Technologe de Compègne, Compègne Cedex F-625,

More information

Analysis of QoS in WLAN

Analysis of QoS in WLAN Analyss of QoS n WLAN PAAL E. ENGELSTAD AND OLAV N. ØSTERBØ Paal E. Engelstad s Research Scentst n Telenor R&D An analytcal model s proposed to descrbe the prorty schemes of the EDCA mechansm of the IEEE

More information

Technical Report. i-game: An Implicit GTS Allocation Mechanism in IEEE for Time- Sensitive Wireless Sensor Networks

Technical Report. i-game: An Implicit GTS Allocation Mechanism in IEEE for Time- Sensitive Wireless Sensor Networks www.hurray.sep.pp.pt Techncal Report -GAME: An Implct GTS Allocaton Mechansm n IEEE 802.15.4 for Tme- Senstve Wreless Sensor etworks Ans Koubaa Máro Alves Eduardo Tovar TR-060706 Verson: 1.0 Date: Jul

More information

WIRELESS communication technology has gained widespread

WIRELESS communication technology has gained widespread 616 IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. 4, NO. 6, NOVEMBER/DECEMBER 2005 Dstrbuted Far Schedulng n a Wreless LAN Ntn Vadya, Senor Member, IEEE, Anurag Dugar, Seema Gupta, and Paramvr Bahl, Senor

More information

A Fair MAC Algorithm with Dynamic Priority for e WLANs

A Fair MAC Algorithm with Dynamic Priority for e WLANs 29 Internatonal Conference on Communcaton Software and Networks A Far MAC Algorthm wth Dynamc Prorty for 82.e WLANs Rong He, Xumng Fang Provncal Key Lab of Informaton Codng & Transmsson, Southwest Jaotong

More information

Re-routing Instability in IEEE Multi-hop Ad-hoc Networks *

Re-routing Instability in IEEE Multi-hop Ad-hoc Networks * Re-routng Instablty n IEEE 802.11 Mult-hop Ad-hoc Networks * Png Chung Ng and Soung Chang Lew Department of Informaton Engneerng The Chnese Unversty of Hong Kong {pcng3, soung}@e.cuhk.edu.hk Abstract TCP

More information

136 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 6, NO. 1, JANUARY Ching-Ling Huang and Wanjiun Liao, Senior Member, IEEE

136 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 6, NO. 1, JANUARY Ching-Ling Huang and Wanjiun Liao, Senior Member, IEEE 136 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 6, NO. 1, JANUARY 2007 Throughput and Delay Performance of IEEE 802.11e Enhanced Dstrbuted Channel Access (EDCA) Under Saturaton Condton Chng-Lng

More information

Efficient Distributed File System (EDFS)

Efficient Distributed File System (EDFS) Effcent Dstrbuted Fle System (EDFS) (Sem-Centralzed) Debessay(Debsh) Fesehaye, Rahul Malk & Klara Naherstedt Unversty of Illnos-Urbana Champagn Contents Problem Statement, Related Work, EDFS Desgn Rate

More information

WITH rapid improvements of wireless technologies,

WITH rapid improvements of wireless technologies, JOURNAL OF SYSTEMS ARCHITECTURE, SPECIAL ISSUE: HIGHLY-RELIABLE CPS, VOL. 00, NO. 0, MONTH 013 1 Adaptve GTS Allocaton n IEEE 80.15.4 for Real-Tme Wreless Sensor Networks Feng Xa, Ruonan Hao, Je L, Naxue

More information

A Game Theory based Contention Window Adjustment for IEEE under Heavy Load

A Game Theory based Contention Window Adjustment for IEEE under Heavy Load 93 Internatonal Journal of Communcaton Networks and Informaton Securty (IJCNIS) Vol. 5, No. 2, August 203 A Game Theory based Contenton Wndow Adjustment for IEEE 802. under Heavy Load Mahdeh Ghazvn, Naser

More information

Performance Analysis of Markov Modulated 1-Persistent CSMA/CA Protocols with Exponential Backoff Scheduling

Performance Analysis of Markov Modulated 1-Persistent CSMA/CA Protocols with Exponential Backoff Scheduling Performance Analyss of Markov Modulated -Persstent CSMA/CA Protocols wth ponental Backoff Schedulng Pu ng Wong, Dongje Yn, and Tony T. Lee, Abstract. Ths paper proposes a Markovan model of -persstent CSMA/CA

More information

Adaptive Network Resource Management in IEEE Wireless Random Access MAC

Adaptive Network Resource Management in IEEE Wireless Random Access MAC Adaptve Network Resource Management n IEEE 802.11 Wreless Random Access MAC Hao Wang, Changcheng Huang, James Yan Department of Systems and Computer Engneerng Carleton Unversty, Ottawa, ON, Canada Abstract

More information

Wireless Communication

Wireless Communication Wreless Communcaton Dr. Ganluca Franchno Scuola Superore Sant Anna Psa, Italy Emal: g.franchno@sssup.t ReTS Lab Real-Tme Systems Laboratory Outlne Graduate Course on Embedded Control Systems: Theory and

More information

Priority-Based Scheduling Algorithm for Downlink Traffics in IEEE Networks

Priority-Based Scheduling Algorithm for Downlink Traffics in IEEE Networks Prorty-Based Schedulng Algorthm for Downlnk Traffcs n IEEE 80.6 Networks Ja-Mng Lang, Jen-Jee Chen, You-Chun Wang, Yu-Chee Tseng, and Bao-Shuh P. Ln Department of Computer Scence Natonal Chao-Tung Unversty,

More information

Maintaining temporal validity of real-time data on non-continuously executing resources

Maintaining temporal validity of real-time data on non-continuously executing resources Mantanng temporal valdty of real-tme data on non-contnuously executng resources Tan Ba, Hong Lu and Juan Yang Hunan Insttute of Scence and Technology, College of Computer Scence, 44, Yueyang, Chna Wuhan

More information

Fibre-Optic AWG-based Real-Time Networks

Fibre-Optic AWG-based Real-Time Networks Fbre-Optc AWG-based Real-Tme Networks Krstna Kunert, Annette Böhm, Magnus Jonsson, School of Informaton Scence, Computer and Electrcal Engneerng, Halmstad Unversty {Magnus.Jonsson, Krstna.Kunert}@de.hh.se

More information

Verification by testing

Verification by testing Real-Tme Systems Specfcaton Implementaton System models Executon-tme analyss Verfcaton Verfcaton by testng Dad? How do they know how much weght a brdge can handle? They drve bgger and bgger trucks over

More information

Multitasking and Real-time Scheduling

Multitasking and Real-time Scheduling Multtaskng and Real-tme Schedulng EE8205: Embedded Computer Systems http://www.ee.ryerson.ca/~courses/ee8205/ Dr. Gul N. Khan http://www.ee.ryerson.ca/~gnkhan Electrcal and Computer Engneerng Ryerson Unversty

More information

QoS-aware routing for heterogeneous layered unicast transmissions in wireless mesh networks with cooperative network coding

QoS-aware routing for heterogeneous layered unicast transmissions in wireless mesh networks with cooperative network coding Tarno et al. EURASIP Journal on Wreless Communcatons and Networkng 214, 214:81 http://wcn.euraspournals.com/content/214/1/81 RESEARCH Open Access QoS-aware routng for heterogeneous layered uncast transmssons

More information

Impact of the Parameterization of IEEE Medium Access Layer on the Consumption of ZigBee Sensor Motes

Impact of the Parameterization of IEEE Medium Access Layer on the Consumption of ZigBee Sensor Motes UBICOMM 21 : The Fourth Internatonal Conference on Moble Ubqutous Computng, Systems, Servces and Technologes Impact of the Parameterzaton of IEEE 82.15.4 Medum Access Layer on the Consumpton of ZgBee Sensor

More information

An Optimal Algorithm for Prufer Codes *

An Optimal Algorithm for Prufer Codes * J. Software Engneerng & Applcatons, 2009, 2: 111-115 do:10.4236/jsea.2009.22016 Publshed Onlne July 2009 (www.scrp.org/journal/jsea) An Optmal Algorthm for Prufer Codes * Xaodong Wang 1, 2, Le Wang 3,

More information

Dynamic Bandwidth Provisioning with Fairness and Revenue Considerations for Broadband Wireless Communication

Dynamic Bandwidth Provisioning with Fairness and Revenue Considerations for Broadband Wireless Communication Ths full text paper was peer revewed at the drecton of IEEE Communcatons Socety subject matter experts for publcaton n the ICC 008 proceedngs. Dynamc Bandwdth Provsonng wth Farness and Revenue Consderatons

More information

A mathematical programming approach to the analysis, design and scheduling of offshore oilfields

A mathematical programming approach to the analysis, design and scheduling of offshore oilfields 17 th European Symposum on Computer Aded Process Engneerng ESCAPE17 V. Plesu and P.S. Agach (Edtors) 2007 Elsever B.V. All rghts reserved. 1 A mathematcal programmng approach to the analyss, desgn and

More information

Virtual Machine Migration based on Trust Measurement of Computer Node

Virtual Machine Migration based on Trust Measurement of Computer Node Appled Mechancs and Materals Onlne: 2014-04-04 ISSN: 1662-7482, Vols. 536-537, pp 678-682 do:10.4028/www.scentfc.net/amm.536-537.678 2014 Trans Tech Publcatons, Swtzerland Vrtual Machne Mgraton based on

More information

Parallelism for Nested Loops with Non-uniform and Flow Dependences

Parallelism for Nested Loops with Non-uniform and Flow Dependences Parallelsm for Nested Loops wth Non-unform and Flow Dependences Sam-Jn Jeong Dept. of Informaton & Communcaton Engneerng, Cheonan Unversty, 5, Anseo-dong, Cheonan, Chungnam, 330-80, Korea. seong@cheonan.ac.kr

More information

Video Proxy System for a Large-scale VOD System (DINA)

Video Proxy System for a Large-scale VOD System (DINA) Vdeo Proxy System for a Large-scale VOD System (DINA) KWUN-CHUNG CHAN #, KWOK-WAI CHEUNG *# #Department of Informaton Engneerng *Centre of Innovaton and Technology The Chnese Unversty of Hong Kong SHATIN,

More information

Solutions for Real-Time Communication over Best-Effort Networks

Solutions for Real-Time Communication over Best-Effort Networks Solutons for Real-Tme Communcaton over Best-Effort Networks Anca Hangan, Ramona Marfevc, Gheorghe Sebestyen Techncal Unversty of Cluj-Napoca, Computer Scence Department {Anca.Hangan, Ramona.Marfevc, Gheorghe.Sebestyen}@cs.utcluj.ro

More information

3. CR parameters and Multi-Objective Fitness Function

3. CR parameters and Multi-Objective Fitness Function 3 CR parameters and Mult-objectve Ftness Functon 41 3. CR parameters and Mult-Objectve Ftness Functon 3.1. Introducton Cogntve rados dynamcally confgure the wreless communcaton system, whch takes beneft

More information

The Greedy Method. Outline and Reading. Change Money Problem. Greedy Algorithms. Applications of the Greedy Strategy. The Greedy Method Technique

The Greedy Method. Outline and Reading. Change Money Problem. Greedy Algorithms. Applications of the Greedy Strategy. The Greedy Method Technique //00 :0 AM Outlne and Readng The Greedy Method The Greedy Method Technque (secton.) Fractonal Knapsack Problem (secton..) Task Schedulng (secton..) Mnmum Spannng Trees (secton.) Change Money Problem Greedy

More information

Mobility Based Routing Protocol with MAC Collision Improvement in Vehicular Ad Hoc Networks

Mobility Based Routing Protocol with MAC Collision Improvement in Vehicular Ad Hoc Networks Moblty Based Routng Protocol wth MAC Collson Improvement n Vehcular Ad Hoc Networks Zhhao Dng, Pny Ren, Qnghe Du Shaanx Smart Networks and Ubqutous Access Rearch Center School of Electronc and Informaton

More information

Transmit Power Control Algorithms in IEEE h Based Networks

Transmit Power Control Algorithms in IEEE h Based Networks Transmt Power Control Algorthms n IEEE 82.h Based Networks Andreas J. Könsgen, Zakr Hossan, Carmelta Görg Department of Communcaton Networks Center for Informaton and Communcaton Technology (IKOM) Unversty

More information

Applications and Challenges of the e EDCA Mechanism: An Experimental Study

Applications and Challenges of the e EDCA Mechanism: An Experimental Study Applcatons and Challenges of the 80.e EDCA Mechansm: An Expermental Study Albert Banchs, Arturo Azcorra, Carlos García, and Rubén Cuevas, Unversty Carlos III of Madrd Abstract In ths artcle we conduct

More information

A Wireless MAC Protocol with Efficient Packet Recovery

A Wireless MAC Protocol with Efficient Packet Recovery A Wreless MAC Protocol wth Effcent Packet Recovery Muhammad Naveed Aman and Bplab Skdar Department of Electcal, Computer and Systems Engneeng, Rensselaer Polytechnc Insttute, Troy NY 8 USA Abstract Exstng

More information

VRT012 User s guide V0.1. Address: Žirmūnų g. 27, Vilnius LT-09105, Phone: (370-5) , Fax: (370-5) ,

VRT012 User s guide V0.1. Address: Žirmūnų g. 27, Vilnius LT-09105, Phone: (370-5) , Fax: (370-5) , VRT012 User s gude V0.1 Thank you for purchasng our product. We hope ths user-frendly devce wll be helpful n realsng your deas and brngng comfort to your lfe. Please take few mnutes to read ths manual

More information

The Impact of Delayed Acknowledgement on E-TCP Performance In Wireless networks

The Impact of Delayed Acknowledgement on E-TCP Performance In Wireless networks The mpact of Delayed Acknoledgement on E-TCP Performance n Wreless netorks Deddy Chandra and Rchard J. Harrs School of Electrcal and Computer System Engneerng Royal Melbourne nsttute of Technology Melbourne,

More information

Channel-Quality Dependent Earliest Deadline Due Fair Scheduling Schemes for Wireless Multimedia Networks

Channel-Quality Dependent Earliest Deadline Due Fair Scheduling Schemes for Wireless Multimedia Networks Channel-Qualty Dependent Earlest Deadlne Due Far Schedulng Schemes for Wreless Multmeda Networks Ahmed K. F. Khattab Khaled M. F. Elsayed ahmedkhattab@eng.cu.edu.eg khaled@eee.org Department of Electroncs

More information

Mathematics 256 a course in differential equations for engineering students

Mathematics 256 a course in differential equations for engineering students Mathematcs 56 a course n dfferental equatons for engneerng students Chapter 5. More effcent methods of numercal soluton Euler s method s qute neffcent. Because the error s essentally proportonal to the

More information

Network-Driven Layered Multicast with IPv6

Network-Driven Layered Multicast with IPv6 Network-Drven Layered Multcast wth IPv6 Ho-pong Sze and Soung C. Lew Department of Informaton Engneerng, The Chnese Unversty of Hong Kong, Shatn, N.T., Hong Kong {hpsze8, soung}@e.cuhk.edu.hk Abstract.

More information

Aggregated traffic flow weight controlled hierarchical MAC protocol for wireless sensor networks

Aggregated traffic flow weight controlled hierarchical MAC protocol for wireless sensor networks Ann. Telecommun. (29) 64:75 721 DOI.7/s12243-9-95- Aggregated traffc flow weght controlled herarchcal MAC protocol for wreless sensor networks M. Abdur Razzaque M. Mamun-Or-Rashd Muhammad Mahbub Alam Choong

More information

NUMERICAL SOLVING OPTIMAL CONTROL PROBLEMS BY THE METHOD OF VARIATIONS

NUMERICAL SOLVING OPTIMAL CONTROL PROBLEMS BY THE METHOD OF VARIATIONS ARPN Journal of Engneerng and Appled Scences 006-017 Asan Research Publshng Network (ARPN). All rghts reserved. NUMERICAL SOLVING OPTIMAL CONTROL PROBLEMS BY THE METHOD OF VARIATIONS Igor Grgoryev, Svetlana

More information

A Binarization Algorithm specialized on Document Images and Photos

A Binarization Algorithm specialized on Document Images and Photos A Bnarzaton Algorthm specalzed on Document mages and Photos Ergna Kavalleratou Dept. of nformaton and Communcaton Systems Engneerng Unversty of the Aegean kavalleratou@aegean.gr Abstract n ths paper, a

More information

A QoS-aware Scheduling Scheme for Software-Defined Storage Oriented iscsi Target

A QoS-aware Scheduling Scheme for Software-Defined Storage Oriented iscsi Target A QoS-aware Schedulng Scheme for Software-Defned Storage Orented SCSI Target Xanghu Meng 1,2, Xuewen Zeng 1, Xao Chen 1, Xaozhou Ye 1,* 1 Natonal Network New Meda Engneerng Research Center, Insttute of

More information

Extension and Comparison of QoS-Enabled Wi-Fi Models in the Presence of Errors

Extension and Comparison of QoS-Enabled Wi-Fi Models in the Presence of Errors Extenson and Comparson of QoS-Enabled W-F Models n the Presence of Errors Ioanns Papapanagotou, Georgos S. Paschos*, Stavros A. Kotsopoulos** and Mchael Devetskots Electrcal and Computer Engneerng, North

More information

Dynamic Bandwidth Allocation Schemes in Hybrid TDM/WDM Passive Optical Networks

Dynamic Bandwidth Allocation Schemes in Hybrid TDM/WDM Passive Optical Networks Dynamc Bandwdth Allocaton Schemes n Hybrd TDM/WDM Passve Optcal Networks Ahmad R. Dhan, Chad M. Ass, and Abdallah Sham Concorda Insttue for Informaton Systems Engneerng Concorda Unversty, Montreal, Quebec,

More information

Cluster Analysis of Electrical Behavior

Cluster Analysis of Electrical Behavior Journal of Computer and Communcatons, 205, 3, 88-93 Publshed Onlne May 205 n ScRes. http://www.scrp.org/ournal/cc http://dx.do.org/0.4236/cc.205.350 Cluster Analyss of Electrcal Behavor Ln Lu Ln Lu, School

More information

Research Article A Comparison Performance Analysis of QoS WLANs: Approaches with Enhanced Features

Research Article A Comparison Performance Analysis of QoS WLANs: Approaches with Enhanced Features Hndaw Publshng Corporaton Advances n Multmeda Volume 007, Artcle ID 387, 3 pages do:055/007/387 Research Artcle A Comparson Performance Analyss of QoS WLANs: Approaches wth Enhanced Features Ioanns Papapanagotou,

More information

Performance Evaluation of IEEE e based on ON-OFF Traffic Model I. Papapanagiotou PhD. Student

Performance Evaluation of IEEE e based on ON-OFF Traffic Model I. Papapanagiotou PhD. Student erformance Evaluaton of IEEE 82.e based on ON-OFF Traffc Model I. apapanagotou hd. Student Wreless Telecommuncaton Laboratory Unversty of atras 265 4 atras Greece papapanag@upnet.gr J.S. Vardakas hd. Student

More information

S1 Note. Basis functions.

S1 Note. Basis functions. S1 Note. Bass functons. Contents Types of bass functons...1 The Fourer bass...2 B-splne bass...3 Power and type I error rates wth dfferent numbers of bass functons...4 Table S1. Smulaton results of type

More information

Improving Low Density Parity Check Codes Over the Erasure Channel. The Nelder Mead Downhill Simplex Method. Scott Stransky

Improving Low Density Parity Check Codes Over the Erasure Channel. The Nelder Mead Downhill Simplex Method. Scott Stransky Improvng Low Densty Party Check Codes Over the Erasure Channel The Nelder Mead Downhll Smplex Method Scott Stransky Programmng n conjuncton wth: Bors Cukalovc 18.413 Fnal Project Sprng 2004 Page 1 Abstract

More information

Synchronous Distributed Wireless Network Emulator for High-Speed Mobility: Implementation and Evaluation

Synchronous Distributed Wireless Network Emulator for High-Speed Mobility: Implementation and Evaluation Synchronous Dstrbuted Wreless Network Emulator for Hgh-Speed Moblty: Implementaton and Evaluaton Mnoru Kozum, Tomoch Ebata Yokohama Research Laboratory, Htach, Ltd., 292 Yoshda-cho, Totsuka-ku, Yokohama,

More information

A New Transaction Processing Model Based on Optimistic Concurrency Control

A New Transaction Processing Model Based on Optimistic Concurrency Control A New Transacton Processng Model Based on Optmstc Concurrency Control Wang Pedong,Duan Xpng,Jr. Abstract-- In ths paper, to support moblty and dsconnecton of moble clents effectvely n moble computng envronment,

More information

CS 268: Lecture 8 Router Support for Congestion Control

CS 268: Lecture 8 Router Support for Congestion Control CS 268: Lecture 8 Router Support for Congeston Control Ion Stoca Computer Scence Dvson Department of Electrcal Engneerng and Computer Scences Unversty of Calforna, Berkeley Berkeley, CA 9472-1776 Router

More information

A General Model of Wireless Interference

A General Model of Wireless Interference A General Model of Wreless Interference Ll Qu Yn Zhang Feng Wang M Kyung Han Ratul Mahajan Unversty of Texas at Austn Mcrosoft Research Austn, TX 7872, USA Redmond, WA 9852, USA {ll,yzhang,wangf,hanm2}@cs.utexas.edu

More information

Real-time interactive applications

Real-time interactive applications Real-tme nteractve applcatons PC-2-PC phone PC-2-phone Dalpad Net2phone vdeoconference Webcams Now we look at a PC-2-PC Internet phone example n detal Internet phone over best-effort (1) Best effort packet

More information

TECHNIQUE OF FORMATION HOMOGENEOUS SAMPLE SAME OBJECTS. Muradaliyev A.Z.

TECHNIQUE OF FORMATION HOMOGENEOUS SAMPLE SAME OBJECTS. Muradaliyev A.Z. TECHNIQUE OF FORMATION HOMOGENEOUS SAMPLE SAME OBJECTS Muradalyev AZ Azerbajan Scentfc-Research and Desgn-Prospectng Insttute of Energetc AZ1012, Ave HZardab-94 E-mal:aydn_murad@yahoocom Importance of

More information

A Frame Packing Mechanism Using PDO Communication Service within CANopen

A Frame Packing Mechanism Using PDO Communication Service within CANopen 28 A Frame Packng Mechansm Usng PDO Communcaton Servce wthn CANopen Mnkoo Kang and Kejn Park Dvson of Industral & Informaton Systems Engneerng, Ajou Unversty, Suwon, Gyeongg-do, South Korea Summary The

More information

A New Token Allocation Algorithm for TCP Traffic in Diffserv Network

A New Token Allocation Algorithm for TCP Traffic in Diffserv Network A New Token Allocaton Algorthm for TCP Traffc n Dffserv Network A New Token Allocaton Algorthm for TCP Traffc n Dffserv Network S. Sudha and N. Ammasagounden Natonal Insttute of Technology, Truchrappall,

More information

Avoiding congestion through dynamic load control

Avoiding congestion through dynamic load control Avodng congeston through dynamc load control Vasl Hnatyshn, Adarshpal S. Seth Department of Computer and Informaton Scences, Unversty of Delaware, Newark, DE 976 ABSTRACT The current best effort approach

More information

Efficient Content Distribution in Wireless P2P Networks

Efficient Content Distribution in Wireless P2P Networks Effcent Content Dstrbuton n Wreless P2P Networs Qong Sun, Vctor O. K. L, and Ka-Cheong Leung Department of Electrcal and Electronc Engneerng The Unversty of Hong Kong Pofulam Road, Hong Kong, Chna {oansun,

More information

High Utility Video Surveillance System on Public Transport using WiMAX technology

High Utility Video Surveillance System on Public Transport using WiMAX technology Edth Cowan Unversty Research Onlne ECU Publcatons Pre. 2011 2010 Hgh Utlty Vdeo Survellance System on Publc Transport usng WMAX technology Iftekhar Ahmad Edth Cowan Unversty Daryoush Habb Edth Cowan Unversty

More information

A protocol for mixed-criticality management in switched Ethernet networks

A protocol for mixed-criticality management in switched Ethernet networks A protocol for mxed-crtcalty management n swtched Ethernet networks Olver CROS, Laurent GEORGE Unversté Pars-Est, LIGM / ESIEE, France cros@ece.fr,lgeorge@eee.org Xaotng LI ECE Pars / LACSC, France xaotng.l@ece.fr

More information

Clock Skew Compensator for Wireless Wearable. Computer Systems

Clock Skew Compensator for Wireless Wearable. Computer Systems Contemporary Engneerng Scences, Vol. 7, 2014, no. 15, 767 772 HIKRI Ltd, www.m-hkar.com http://dx.do.org/10.12988/ces.2014.4688 Clock Skew Compensator for Wreless Wearable Computer Systems Kyeong Hur Dept.

More information

Design and Analysis of Algorithms

Design and Analysis of Algorithms Desgn and Analyss of Algorthms Heaps and Heapsort Reference: CLRS Chapter 6 Topcs: Heaps Heapsort Prorty queue Huo Hongwe Recap and overvew The story so far... Inserton sort runnng tme of Θ(n 2 ); sorts

More information

EFT: a high throughput routing metric for IEEE s wireless mesh networks

EFT: a high throughput routing metric for IEEE s wireless mesh networks Ann. Telecommun. (2010) 65:247 262 DOI 10.1007/s12243-009-0130-1 EFT: a hgh throughput routng metrc for IEEE 802.11s wreless mesh networks Md. Sharful Islam Muhammad Mahbub Alam Md. Abdul Hamd Choong Seon

More information

Performance Analysis of Beacon-Less IEEE Multi-Hop Networks

Performance Analysis of Beacon-Less IEEE Multi-Hop Networks Performance Analyss of Beacon-Less IEEE 2..4 Mult-Hop Networks Racht Srvastava Deptt. of Electrcal Communcaton Engneerng Indan Insttute of Scence Bangalore, Inda 62 rachtsr@gmal.com Anurag Kumar Deptt.

More information

An Investigation into Server Parameter Selection for Hierarchical Fixed Priority Pre-emptive Systems

An Investigation into Server Parameter Selection for Hierarchical Fixed Priority Pre-emptive Systems An Investgaton nto Server Parameter Selecton for Herarchcal Fxed Prorty Pre-emptve Systems R.I. Davs and A. Burns Real-Tme Systems Research Group, Department of omputer Scence, Unversty of York, YO10 5DD,

More information

Helsinki University Of Technology, Systems Analysis Laboratory Mat Independent research projects in applied mathematics (3 cr)

Helsinki University Of Technology, Systems Analysis Laboratory Mat Independent research projects in applied mathematics (3 cr) Helsnk Unversty Of Technology, Systems Analyss Laboratory Mat-2.08 Independent research projects n appled mathematcs (3 cr) "! #$&% Antt Laukkanen 506 R ajlaukka@cc.hut.f 2 Introducton...3 2 Multattrbute

More information

Solution Brief: Creating a Secure Base in a Virtual World

Solution Brief: Creating a Secure Base in a Virtual World Soluton Bref: Creatng a Secure Base n a Vrtual World Soluton Bref: Creatng a Secure Base n a Vrtual World Abstract The adopton rate of Vrtual Machnes has exploded at most organzatons, drven by the mproved

More information

Internet Traffic Managers

Internet Traffic Managers Internet Traffc Managers Ibrahm Matta matta@cs.bu.edu www.cs.bu.edu/faculty/matta Computer Scence Department Boston Unversty Boston, MA 225 Jont work wth members of the WING group: Azer Bestavros, John

More information

Compiler Design. Spring Register Allocation. Sample Exercises and Solutions. Prof. Pedro C. Diniz

Compiler Design. Spring Register Allocation. Sample Exercises and Solutions. Prof. Pedro C. Diniz Compler Desgn Sprng 2014 Regster Allocaton Sample Exercses and Solutons Prof. Pedro C. Dnz USC / Informaton Scences Insttute 4676 Admralty Way, Sute 1001 Marna del Rey, Calforna 90292 pedro@s.edu Regster

More information

Design of a prioritized error control scheme based on load differentiation for time sensitive traffic on the wireless LAN

Design of a prioritized error control scheme based on load differentiation for time sensitive traffic on the wireless LAN JOURNAL O NETWORKS, VOL. 1, NO. 2, JUNE 2006 45 Desgn of a prortzed error control scheme based on load dfferentaton for tme senstve traffc on the wreless LAN Mkyung Kang, Junghoon Lee*, Yongmoon Jn, Gyung-Leen

More information

Network Coding as a Dynamical System

Network Coding as a Dynamical System Network Codng as a Dynamcal System Narayan B. Mandayam IEEE Dstngushed Lecture (jont work wth Dan Zhang and a Su) Department of Electrcal and Computer Engneerng Rutgers Unversty Outlne. Introducton 2.

More information

Experimental Tuning of the AIFSN Parameter to Prioritize Voice Over Data Transmission in E WLAN Networks

Experimental Tuning of the AIFSN Parameter to Prioritize Voice Over Data Transmission in E WLAN Networks Dubln Insttute of Technology AOW@DIT Conference papers Communcatons Network esearch Insttute 27-8-1 Expermental Tunng of the AIFSN Parameter to Prortze Voce Over Data Transmsson n 82.11E WLAN Networks

More information

ABRC: An End-to-End Rate Adaptation Scheme for Multimedia Streaming over Wireless LAN*

ABRC: An End-to-End Rate Adaptation Scheme for Multimedia Streaming over Wireless LAN* ARC: An End-to-End Rate Adaptaton Scheme for Multmeda Streamng over Wreless LAN We Wang Soung C Lew Jack Y Lee Department of Informaton Engneerng he Chnese Unversty of Hong Kong Shatn N Hong Kong {wwang2

More information

Enhanced Signaling Scheme with Admission Control in the Hybrid Optical Wireless (HOW) Networks

Enhanced Signaling Scheme with Admission Control in the Hybrid Optical Wireless (HOW) Networks Enhanced Sgnalng Scheme wth Admsson Control n the Hybrd Optcal Wreless (HOW) Networks Yng Yan, Hao Yu, Henrk Wessng, and Lars Dttmann Department of Photoncs Techncal Unversty of Denmark Lyngby, Denmark

More information

Backing out of Linear Backoff in Wireless Networks

Backing out of Linear Backoff in Wireless Networks Backng out of Lnear Backoff n Wreless Networks Mahanth Gowda Nrupam Roy Romt Roy Choudhury Srhar Nelakudt Unversty of Illnos (UIUC) Unversty of South Carolna {gowda2,nroy8,croy}@llnos.edu srhar@cse.sc.edu

More information

Goals and Approach Type of Resources Allocation Models Shared Non-shared Not in this Lecture In this Lecture

Goals and Approach Type of Resources Allocation Models Shared Non-shared Not in this Lecture In this Lecture Goals and Approach CS 194: Dstrbuted Systems Resource Allocaton Goal: acheve predcable performances Three steps: 1) Estmate applcaton s resource needs (not n ths lecture) 2) Admsson control 3) Resource

More information

Wishing you all a Total Quality New Year!

Wishing you all a Total Quality New Year! Total Qualty Management and Sx Sgma Post Graduate Program 214-15 Sesson 4 Vnay Kumar Kalakband Assstant Professor Operatons & Systems Area 1 Wshng you all a Total Qualty New Year! Hope you acheve Sx sgma

More information

Load-Balanced Anycast Routing

Load-Balanced Anycast Routing Load-Balanced Anycast Routng Chng-Yu Ln, Jung-Hua Lo, and Sy-Yen Kuo Department of Electrcal Engneerng atonal Tawan Unversty, Tape, Tawan sykuo@cc.ee.ntu.edu.tw Abstract For fault-tolerance and load-balance

More information