Stochastic Delay Analysis for Protocols with Self-similar Traffic
|
|
- Winfred Holmes
- 5 years ago
- Views:
Transcription
1 22 7th International ICST Conference on Communications and Networking in China (CHINACOM) Stochastic Delay Analysis for 82 Protocols with Self-similar Traffic Jie Zhang, Li Yu, Lie Jiang, Jingjing Luo Department of Electronics and Information Engineering, Huazhong University of Science and Technology, PRC Wuhan National Laboratory for Optoelectronics, Wuhan, Hubei, PRC Abstract IEEE 82 wireless local area network (WLAN) is one of the most deployed wireless technologies all over the world An accurate and comprehensive performance evaluation is crucial for the quality of service (QoS) guarantee in 82 networks In this paper, we use the method of stochastic network calculus to obtain the stochastic delay bounds of 82 protocols In particular, we take the self-similar property of wireless traffic into consideration and fractional Brownian motion (fbm) traffic model is adopted to describe the arrival traffic We derive the stochastic arrival curve of fbm traffic and the stochastic service curve of existing model of 82, then obtain the stochastic delay and backlog bounds Finally, we use matlab to calculate theoretical results and ns-2 for simulations The results show that the delay of the 82 wireless node increases with the increasing of Hurst parameter H and the number of competition stations n And the results also indicate that the theoretical results well bound simulation results I INTRODUCTION Wireless networking is one of the exciting developments in the world of networking technology IEEE 82 protocols have been proposed as the standard protocols for wireless local area networks In order to provide QoS guarantees, it is necessary to characterize the delay and other performance metrics in 82 networks Traditional method for performance analysis of 82 protocols is the method of queuing theory In [], Zhai et al assumed Poisson traffic arrival and proposed an M/G/ queueing model of 82 In [2], [3], Tickoo modeled each node as a discrete time G/G/ queue and derived the service time distribution while accounting for a number of factors However, recent researches [4], [5] show that the wireless LAN traffic processes have the property of long-range independence (LRD) and statistical self-similarity, which means that the traditional traffic model such as Poisson arrival model and CBR arrival model can not fulfill these properties FBm [6], [7], [8] is a traffic model which captures self-similarity FBm is characterized by the Hurst parameter H WhenH ( 2, ), fbm is LRD Due to the complexity and the burst property of self-similar traffic, queuing theory is not suitable for the performance analysis of wireless network In this paper, we adopt the method of stochastic network calculus to analyze this problem Network calculus which is proposed in [9], [], [] is a recently developed approach to take a deep insight into flow problems encountered in networking, especially on QoS guarantee analysis Due to the stochastic property of arrival and service process, network calculus has developed from deterministic to stochastic in [2], [3], [4] The stochastic network calculus is more suitable for the networks which only provide stochastic guarantees Unlike queuing theory, network calculus provides a more general way to describe the arrival and service process It is convenient to use network calculus to get the delay and backlog bounds of network Though in [5], the author derived the backlog and delay bounds of an 82 wireless node based on an existing model of 82, however, the traffic model adopted was Poisson arrival model and Constants Bit Rate (CBR) arrival model, and it still did not consider the property of long-range dependence and selfsimilarity of the traffic In light of such need, we develop a stochastic network calculus model for performance analysis of 82 protocols We derive the stochastic delay bound of an 82 wireless node using stochastic network calculus and take the property of long-range dependence and self-similarity of the traffic into consideration, where fbm model is chosen as the traffic model In this paper, we first derive the form of stochastic arrival curve of fbm model and the stochastic service curve of an 82 wireless node Secondly, based on the theory of stochastic network calculus, we get the stochastic delay and backlog bounds of an 82 wireless node Through the results, we can analyze how the parameters of both fbm traffic andthe setting of 82 protocols impact the delay and backlog of an 82 wireless node Then, we use matlab to calculate the theoretical stochastic delay bounds and ns-2 for simulations The resulting delay and backlog distribution own practical significance to guide the parameters configuration of network applications, eg, the impact of the number of competition nodes can help design the network topology and the theoretical stochastic delay and backlog can help design 82 systems The rest of this paper is organized as follows In Section II, we give a brief introduction of the definitions and theory about stochastic network calculus In Section III, the corresponding stochastic arrival curve and service curve are derived, and we obtain the stochastic delay and backlog bounds conducted by stochastic network calculus In Section IV, we analyze the derived bounds and compare the bounds with simulation results Conclusions are drawn in Section V /2/$3 22 IEEE
2 A Network Model II SYSTEM MODEL In 82 networks, the situation that several stations compete for the same access point always occurs We consider how to derive stochastic delay and backlog bounds of an 82 wireless node under this condition Fig shows the situation where several stations compete for the same access point And by F the set of non-negative wide-sense decreasing function, or F = {f( ) : x y, f(y) f(x)} (2) The following operator under the (min, +) algebra will be used frequently in the following sections The (min, +) convolution of function f and g is (f g)(x) [f(y)+g(x y)] (3) y x For service guarantee analysis of a system, we are interested in two quantities: backlog and delay, which are defined in [6], [7], [8]: The backlog B(t) in the system at time t is The delay D(t) at time t is B(t) =A(t) A (t) (4) D(t) {d :A(t) A (t + d)} (5) Fig The network model For simplicity, our analysis is based on the following assumptions: (i) There are n stations transmitting to an access point; (ii) There are no hidden terminals and capture in the channel condition, which is ideal; (iii) The saturation condition is fulfilled Each station always has a packet available for transmission In other words, the transmission queue of each station is assumed to be nonempty; (iv) Each node is fed with fbm flow Based on the assumptions above, the stochastic arrival curve and stochastic service curve are derived in the following analysis B Stochastic Network Calculus Basics We first introduce the fundamental notations of stochastic network calculus We consider a lossless communication system which is modeled by various processes A process is defined by a function of time t, (t=,, 2) It could count cumulative amount of traffic arriving at some network element, the cumulative amount of traffic departing from the network element, the amount of service provided by the network element In this case, we name the process as arrival process, departure process and service process, and denoted them by A(t), A (t), and S(t) respectively In this paper, we assume all process are defined on t and by convention, have zero value at t= For any s (,t), we denote A(s, t) =A(t) A(s), A (s, t) =A (t) A (s), S(s, t) =S(t) S(s) We denote the set of non-negative wide-sense increasing functions by F F = {f( ) : x y, f(x) f(y)} () For traffic model, the virtual-backlog-centric (vbc) stochastic arrival curve is mainly used in this paper The vbc stochastic traffic model explores the virtual backlog property of the deterministic arrival curve, which is that the queue length of a virtual single-server queue fed with the same flow with a deterministic arrival curve is upper-bounded [4] The definition of the vbc stochastic arrival curve is defined as follow: Definition A flow is said to have a virtual-backlog-centric (vbc) stochastic arrival curve α F with bounding function f F, denoted by A vb <f,α>,ifforallt and x, there holds P { sup [A(s, t) α(t s)] >x} f(x) (6) Definition 2 AServerS is said to prove a stochastic service curve β F with bounding function g F, denoted by S sc <g,β>,ifforallt and x, there holds P { sup [A β(s) A (s)] >x} g(x) (7) Theorem Consider a server fed with flow A Iftheserver provides stochastic service curve to the flow and the flow has a vbc stochastic arrival curve, then, (i) The backlog B(t) of the flow in the server at time t satisfies: for all t and x, P {B(t) >x} f g(x +inf[β(s) α(s)]) (8) s (ii) The delay D(t) of the flow in the server at time t satisfies: for all t and x, P {D(t) >x} f g(inf[β(s) α(s x)]) (9) s III PERFORMANCE ANALYSIS In this section, we obtain the stochastic arrival curve and stochastic service curve based on the system model and derive the stochastic delay and backlog bounds conducted by stochastic network calculus 25
3 A Stochastic Service Curve of 82 Node In the 82 protocols, distributed coordination function (DCF) is the fundamental mechanism to access the medium This random access scheme is based on the carrier sense multiple access with collision avoidance (CSMA/CA) protocol, and an exponential backoff scheme is adopted The backoff time is uniformly chosen in the range (, w-) The contention window w is set equal to the value of minimum contention window CW min After each unsuccessful transmission, w is doubled, up to the maximum value CW max = 2 m CW min we assume the channel conditions are ideal, which means there are no hidden terminals and capture And we operate in saturation conditions, which means the transmission queue of each station is assumed to be always nonempty The saturated throughput of the channel is denoted by R Then, we have R = C τ ( γ) () where C is the capacity of the link, τ is the stationary probability that the station transmits a packet in a generic (ie, randomly chosen) slot time, and γ is the conditional collision probability, meaning that this is the probability of a collision seen by a packet being transmitted on the channel The value of τ and γ is determined by the following equations [9] τ = 2( 2γ) ( 2γ)(CW min +)+γcw min [ (2γ) m ], () n= Eq() Eq(2) γ = ( τ) n (2) n= Fig 2 n=3 n=4 The Plots of Eq() and Eq(2) Fig 2 shows the curves of Eq() and Eq(2) when n =, 2, 3, 4 and 5 For different n, the points of intersection are the solution of τ and γ Whenn increases, γ increases and τ decreases According to Definition 2, we have the service curve S sc <g,β>,whereβ(t) =Rt and g(t) = n=5 B Stochastic Arrival Curve of fbm Traffic Fractional Brownian motion (fbm) is a widely accepted model for self-similar traffic [6], [7], [8] FBm is characterized by the Hurst parameter H Depending on its Hurst parameter H, it can be short-range dependent or long-range dependent When H ( 2, ), fbm is LRD, which is the traffic model we consider Definition 3 An arrival process is said to be fraction Brownian motion arrival if it satisfies A(t) =λt + aλz H (t),t, (3) where λ > is the mean rate of fbm traffic and a is variation coefficient Z H (t) is standard fraction Brownian motion process Z H (t) has the following basic properties: (i) Z H (t) has stationary Gaussian increment; (ii) For all t, Z H (t)=, and E[Z H (t)]=; (iii) For all t, E[Z 2 H (t)] = t 2H ; (iv) Z H (t) is continuous and its finite dimension distribution is Gaussian process Since α(t) =rt is the basic form of α(t), we can get the bounding function f F of the virtual-backlog-centric (vbc) stochastic arrival curve with α(t) =rt: P {A(s, t) α(t s) >x} P {A(s, t) α(s, t) >x} sup P {A(s, t) r(t s) >x} P {A(t) A(s) r(t s) >x} P {A(t) A(s) >r(t s)+x} P {λt + aλz H (t) λs aλz H (s) >r(t s)+x} P {Z H (t) Z H (s) > (r λ)s+(r λ)t+x aλ } P {N(, t 2H s 2H ) > (r λ)s+(r λ)t+b+x aλ )} exp( (4) Thus, according to Definition, we have the stochastic arrival curve A vb <f,α>,where { α(t) =rt f(x) =exp( C Performance Bounds From the above analysis, we can get that the arrival process A vb <f,α>,where { α(t) =rt f(x) =exp( The service S fulfills S sc <g,β>,where: { β(t) =C τ ( γ) t g(t) = Substituting the above results obtained in Theorem, the Stochastic backlog and delay bounds are derived In order to simplify the calculation, r = R is adopted 26
4 For backlog B(t): P {B(t) >x} f g(x +inf(β(s) α(s))) s = f g(x) For delay D(t): y x y x (f(y)) = f(x) (f(y)+g(x y)) =exp( 2aλ ( R λ P {D(t) >x} f g(inf(β(s) α(s x))) s = f g(rx) y x (f(ry)) y x = f(rx) =exp( (f(ry)+g(rx Ry)) 2aλ ( R λ H )2H ( Rx (5) (6) Through the above inequality, we can analyze the impact of the self-similar Hurst parameter H to the backlogand delay of the network, and the impact of the number of stations which are transmitting to the same access point to the network delay and the backlog IV PERFORMANCE EVALUATION In this section, numerically simulation is conducted by matlab to analyze the relationship between self-similar Hurst parameter H, the number of stations which contents the same channel n and stochastic delay bound And we use ns-2 to verify our delay bound for a certain scenario A Theoretical Calculation In each simulation, the value of minimum contention window is 32 (w=32), the mean rate of fbm traffic is 4kb/s (λ=4kb/s) and the variation is 2kb/s The following simulation is conducted by matlab and based on the analytical result of (6) ) Impact of Hurst Parameter H: In this simulation, we set three stations transmitting to the same access point (n=3), the backoff index is five (m=5) We set the value of H 6, 65, 7, 75, 8 and 85 to see the impact of Hurst parameter on stochastic delay of the node Fig3 shows the results Fig3 shows that, as H increases, the violation probability of the same delay increases, so does the delay of the same violation probability Which is to say, as Hurst parameter increases, the delay of the 82 wireless node increases This is because the larger the value of H, the stronger the burst of fbm flow, which leads to the increasing of the delay of the node 2) Impact of the Number of Stations n: In this simulation, we set Hurst parameter H=75, the backoff index m=5 We change the number of stations which transmit to the same access point from one to five to see how it impacts stochastic delay of the node Fig4 shows the results Fig4 shows that, the violation probability of the same delay increases with the number of competing stations, so does the H=6 H=65 H=7 H=75 H=8 H= Dealy(ms) Fig 3 Impact of Hurst parameter H n= n=2 n=3 n=4 n= Delay(ms) Fig 4 Impact of competition station number n delay of the same violation probability Which is to say, as the number of competing station increases, the delay of node generally increase The reason is that the more the competing stations, the less the service each station gets, which leads to the increase of backlog, and the increase of delay B Comparison between Simulation Results and Numerical Results We adopt ns-2 to verify the theoretical results Firstly, an approximate fbm generation method known as the random midpoint displacement (RMD) algorithm [2] is adopted to generate fbm traffic The parameters of fbm traffic areset as follows: the mean rate of fbm traffic is 4kb/s (λ=4kb/s), the variation is 2kb/s We show in Fig5 fbm trace with input H=75 We set three stations transmitting to the same access point (n=3) The value of minimum contention window is 32 (w=32), and the backoff index is five (m=5) The statistical data of traffic delay is obtained from the trace file of ns-2 simulation The comparison between simulation results and analytical results is shown in Fig6 The blue bar represents the analytical results of (6) and the red bar represents the simulation results from ns-2 Fig6 shows that theoretical results are well upper- 27
5 Generated Traffic (kb) Fig Time(s) x Fig 6 FBM trace based on the RMD algorithm (H=75) Analytical Simulation Delay(ms) Compare simulation results with analytical results bounded and quite close to the results of simulations It indicates that our analysis about the stochastic delay of 82 protocols with self-similar traffic input is precise Thus it can be a practical reference when analyzing the QoS of 82 protocols and helping the design of 82 systems V CONCLUSIONS In this paper, we firstly take the self-similar property of WLAN traffic into consideration to analysis the delay performance of 82 protocols With the method of stochastic network calculus, we have derived the stochastic arrival curve and stochastic service curve of an 82 wireless node Based on derivation above, the delay and backlog bounds of the node have been obtained Matlab is used to calculate the theoretical bounds and predict the impact of the Hurst parameter of fbm traffic and the number of competition nodes on the performance of an 82 wireless node The delay of the 82 wireless node increases with the increasing of Hurst parameter H and the number of competition stations n Finally, we carried out simulations to verify these bounds We believe that these results will shed light on deeper understanding of 82 protocols, the impact of the property of self-similarity of wireless traffic and the design of 82 networks ACKNOWLEDGMENT This work was supported in part by National Natural Science Fundation of China (No 69726), Funds of Distinguished Young Scientists (No 29CDA5), China-Finish cooperation Project (No 2DFB57) REFERENCES [] Zhai, and Y Fang, Performance of Wireless LANs Based on IEEE 82 MAC Protocols, Procs, IEEE PIMRC, vol 3, pp , 23 [2] O Tickoo, and B Sikdar, Queuing Analysis and Delay Mitigation in IEEE 82 random access MAC based Wireless networks, Procs, IEEE INFOCOM, vol 2, pp 44-43, 24 [3] O Tickoo, and B Sikdar, A queueing model for finite load IEEE 82 random access MAC, Procs, IEEE ICC, vol, pp 75-79, 24 [4] C Oliveira, J B Kim, and T Suda, Long-range dependence in IEEE 82b wireless LAN traffic: An empirical study, Proceedings of IEEE 8th Annual Workshop on Computer Communications, pp 7-23, 23 [5] Y Qin, M Yuming, W Taijun, and W Fan, Hurst parameter estimation and characteristics analysis of aggregate wireless LAN traffic, Prcos, IEEE ICCCAS, vol, pp , 25 [6] W Leland, M Taqqu, W Willinger, and D Wilson, On the self-similar nature of Ethernet traffic (extended version), IEEE/ACM Trans Netw, 2(), pp -5, Feb 994 [7] I Norros, A storage model with self-similar input, Queueing Systems, 6(3), pp , Sep 994 [8] I Norros, On the use of fractional Brownian motion in the theory of connectionless networks, IEEE J Sel Areas Commun, 3(6), pp , Aug 995 [9] R L Cruz, A Calculus for Network Delay, Part I: Network Elements in Isolation, IEEE Trans Information Theory, 37(), pp 4-3, Jan 99 [] R L Cruz, A Calculus for Network Delay, Part II: Network Analysis, IEEE Trans Information Theory, 37(), pp 32-4, Jan 99 [] J-Y Le Boudec, and P Thiran, Network Calculus: A Theory of Deterministic Queueing Systems for the Internet, (Springer-Verlag), 2 [2] Y Jiang, and P J Emstad, Analysis of Stochastic Service Guarantees in Communication Networks: A Server Model, Procs IEEE IWQoS, 25 [3] Y Jiang, A Basic Stochastic Network Calculus, Procs SIGCOMM, 36(4), pp 23-34, Oct 26 [4] Y Jiang, and Y Liu, Stochastic Network Calculus, Springer, 28 [5] Y Wang, T Wang, Applying Stochastic Network Calculus to 82 Backlog and Delay Analysis, Quality of Service (IWQoS), San Jose, CA, Jun 2 [6] R L Cruz, Quality of service guarantees in virtual circuit switched networks, IEEE JSAC, 3(6), pp 48-56, Aug 995 [7] C-S Chang, Performance Guarantees in Communication Networks, Springer-Verlag, 2 [8] J-Y Le Boudec and P Thiran, Network Calculus: A Theory of Deterministic Queueing Systems for the Internet, Springer-Verlag, 2 [9] G Bianchi, Performance analysis of the IEEE 82 distributed coordination function, IEEE J Sel Areas Commun, vol 8, pp , Mar 2 [2] Lau, Wing-Cheong et al, Self-similar traffic generation: the random midpoint displacement algorithm and its properties, Procs, IEEE ICC, vol, pp ,
Performance Analysis of WLANs Under Sporadic Traffic
Performance Analysis of 802.11 WLANs Under Sporadic Traffic M. Garetto and C.-F. Chiasserini Dipartimento di Elettronica, Politecnico di Torino, Italy Abstract. We analyze the performance of 802.11 WLANs
More informationComparison of pre-backoff and post-backoff procedures for IEEE distributed coordination function
Comparison of pre-backoff and post-backoff procedures for IEEE 802.11 distributed coordination function Ping Zhong, Xuemin Hong, Xiaofang Wu, Jianghong Shi a), and Huihuang Chen School of Information Science
More informationA Backoff Algorithm for Improving Saturation Throughput in IEEE DCF
A Backoff Algorithm for Improving Saturation Throughput in IEEE 80.11 DCF Kiyoshi Takahashi and Toshinori Tsuboi School of Computer Science, Tokyo University of Technology, 1404-1 Katakura, Hachioji, Tokyo,
More informationAnalysis of Throughput and Energy Efficiency in the IEEE Wireless Local Area Networks using Constant backoff Window Algorithm
International Journal of Computer Applications (975 8887) Volume 6 No.8, July Analysis of Throughput and Energy Efficiency in the IEEE 8. Wireless Local Area Networks using Constant backoff Window Algorithm
More informationAn Efficient Scheduling Scheme for High Speed IEEE WLANs
An Efficient Scheduling Scheme for High Speed IEEE 802.11 WLANs Juki Wirawan Tantra, Chuan Heng Foh, and Bu Sung Lee Centre of Muldia and Network Technology School of Computer Engineering Nanyang Technological
More informationTitle. Author(s)Nguyen, Thi Xuan My; Saivichit, Chaiyachet; Miyanaga. Issue Date Doc URL. Type. Note. File Information
Title Performance Analysis for Total Delay and Total Packe Author(s)Nguyen, Thi Xuan My; Saivichit, Chaiyachet; Miyanaga Proceedings : APSIPA ASC 2009 : Asia-Pacific Signal Citationand Conference: 791-796
More informationA Comparative Analysis on Backoff Algorithms to Optimize Mobile Network
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 7, July 2014, pg.771
More informationA Novel Contention Window Control Scheme Based on a Markov Chain Model in Dense WLAN Environment
05 Third International Conference on Artificial Intelligence, Modelling and Simulation A Novel Contention Window Control Scheme Based on a Markov Chain Model in Dense WLAN Environment Yoshiaki Morino,
More informationMohammad Hossein Manshaei 1393
Mohammad Hossein Manshaei manshaei@gmail.com 1393 1 An Analytical Approach: Bianchi Model 2 Real Experimentations HoE on IEEE 802.11b Analytical Models Bianchi s Model Simulations ns-2 3 N links with the
More informationIP Traffic Prediction and Equivalent Bandwidth for DAMA TDMA Protocols
IP Traffic and Equivalent Bandwidth for DAMA TDMA Protocols J. Aracil, D. Morato, E. Magaña, M. Izal Universidad Pública de Navarra, 316 Pamplona, SPAIN email:javier.aracil@unavarra.es Abstract The use
More informationAn Efficient Bandwidth Estimation Schemes used in Wireless Mesh Networks
An Efficient Bandwidth Estimation Schemes used in Wireless Mesh Networks First Author A.Sandeep Kumar Narasaraopeta Engineering College, Andhra Pradesh, India. Second Author Dr S.N.Tirumala Rao (Ph.d)
More information878 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 16, NO. 4, AUGUST 2008
878 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 16, NO. 4, AUGUST 2008 Modeling Queueing and Channel Access Delay in Unsaturated IEEE 802.11 Random Access MAC Based Wireless Networks Omesh Tickoo and Biplab
More informationExploiting Multi-User Diversity in Wireless LANs with Channel-Aware CSMA/CA
Exploiting Multi-User Diversity in Wireless LANs with Channel-Aware CSMA/CA Xiaowei Wang, Mahsa Derakhshani, Tho Le-Ngoc Department of Electrical & Computer Engineering, McGill University, Montreal, QC,
More informationProviding Throughput Guarantees in IEEE e Wireless LANs
Providing Throughput Guarantees in IEEE 802.11e Wireless LANs Albert Banchs a, Xavier Pérez-Costa a, Daji Qiao b a Network Laboratories, NEC Europe Ltd., Heidelberg, Germany b Real-Time Computing Laboratory,
More informationDistributed Call Admission Control for Ad Hoc Networks
Distributed Call Admission Control for Ad Hoc Networks Shahrokh Valaee and Baochun Li Abstract This paper introduces a distributed call admission controller for ad hod networks. The call admission controller
More informationAnalysis of Broadcast Non-Saturation Throughput as a Performance Measure in VANETs
Analysis of Broadcast Non-Saturation Throughput as a Performance Measure in VANETs Gayathri Narayanan Department of Electronics and Communication Engineering Amrita School of Engineering, Amritapuri Campus,
More informationThroughput and Energy Consumption Analysis of IEEE Slotted CSMA/CA. T.R. Park, T.H. Kim, J.Y. Choi, S. Choi, and W.H.
Throughput and Energy Consumption Analysis of IEEE 802.15.4 Slotted CSMA/CA T.R. Park, T.H. Kim, J.Y. Choi, S. Choi, and W.H. Kwon We propose a new analytic model of the IEEE 802.15.4 slotted CSMA/CA from
More informationCollision Probability in Saturated IEEE Networks
in Saturated IEEE 80.11 Networks Hai L. Vu Centre for Advanced Internet Architectures (CAIA) ICT Faculty, Swinburne University of Technology Hawthorn, VIC 31, Australia h.vu@ieee.org Taka Sakurai ARC Special
More informationA Boosting-Based Framework for Self-Similar and Non-linear Internet Traffic Prediction
A Boosting-Based Framework for Self-Similar and Non-linear Internet Traffic Prediction Hanghang Tong 1, Chongrong Li 2, and Jingrui He 1 1 Department of Automation, Tsinghua University, Beijing 100084,
More informationSIMULATING CDPD NETWORKS USING OPNET
Michael Jiang Stephen Hardy Ljiljana Trajkovic SIMULATING CDPD NETWORKS USING OPNET TM Communication Networks Laboratory School of Engineering Science Simon Fraser University Road Map Introduction Simulation
More informationInternational Conference on Advances in Mechanical Engineering and Industrial Informatics (AMEII 2015)
International Conference on Advances in Mechanical Engineering and Industrial Informatics (AMEII 2015) A Cross Traffic Estimate Model for Optical Burst Switching Networks Yujue WANG 1, Dawei NIU 2, b,
More informationNumerical Analysis of IEEE Broadcast Scheme in Multihop Wireless Ad Hoc Networks
Numerical Analysis of IEEE 802.11 Broadcast Scheme in Multihop Wireless Ad Hoc Networks Jong-Mu Choi 1, Jungmin So 2, and Young-Bae Ko 1 1 School of Information and Computer Engineering Ajou University,
More informationPerspectives on Network Calculus No Free Lunch but Still Good Value
ACM Sigcomm 2012 Perspectives on Network Calculus No Free Lunch but Still Good Value Florin Ciucu T-Labs / TU Berlin Jens Schmitt TU Kaiserslautern Outline Network Calculus (NC): A Theory for System Performance
More informationWIRELESS local area networks (WLANs) have been
1648 IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, VOL. 55, NO. 5, SEPTEMBER 2006 Performance Analysis of IEEE 802.11 DCF in Imperfect Channels Yu Zheng, Kejie Lu, Member, IEEE, Dapeng Wu, Senior Member,
More informationEmpirical Study of Mobility effect on IEEE MAC protocol for Mobile Ad- Hoc Networks
Empirical Study of Mobility effect on IEEE 802.11 MAC protocol for Mobile Ad- Hoc Networks Mojtaba Razfar and Jane Dong mrazfar, jdong2@calstatela.edu Department of Electrical and computer Engineering
More informationTHE TCP specification that specifies the first original
1 Median Filtering Simulation of Bursty Traffic Auc Fai Chan, John Leis Faculty of Engineering and Surveying University of Southern Queensland Toowoomba Queensland 4350 Abstract The estimation of Retransmission
More informationImpact of IEEE MAC Packet Size on Performance of Wireless Sensor Networks
IOSR Journal of Electronics and Communication Engineering (IOSR-JECE) e-issn: 2278-2834,p- ISSN: 2278-8735.Volume 10, Issue 3, Ver. IV (May - Jun.2015), PP 06-11 www.iosrjournals.org Impact of IEEE 802.11
More informationThroughput Analysis of CSMA Wireless Networks with Finite Offered-load
1 Throughput Analysis of CSMA Wireless Networks with Finite Offered-load Caihong Kai and Shengli Zhang School of Computer and Information, Hefei University of Technology, Hefei, China Department of Communication
More informationProject Report: QoS Enhancement for Real-Time Traffic in IEEE WLAN
Project Report: QoS Enhancement for Real-Time Traffic in IEEE802.11 WLAN Abstract A key issue in IEEE802.11 WLAN MAC is how to provide QoS support, especially for time-bounded traffic. Although much work
More information136 Proceedings of the rd International Teletraffic Congress (ITC 2011)
Gaussian Approximation of CDN Call Level Traffic Andrzej Bak and Piotr Gajowniczek Institute of Telecommunications Warsaw University of Technology Nowowiejska 5/9, -665 Warsaw, Poland Email: bak@tele.pw.edu.pl
More informationENHANCING THE PERFORMANCE OF MANET THROUGH MAC LAYER DESIGN
I J I T E ISSN: 2229-7367 3(1-2), 2012, pp. 19-24 ENHANCING THE PERFORMANCE OF MANET THROUGH MAC LAYER DESIGN 1 R. MANIKANDAN, 2 K. ARULMANI AND 3 K. SELVAKUMAR Department of Computer Science and Engineering,
More informationPerformance analysis of Internet applications over an adaptive IEEE MAC architecture
Journal of the Franklin Institute 343 (2006) 352 360 www.elsevier.com/locate/jfranklin Performance analysis of Internet applications over an adaptive IEEE 802.11 MAC architecture Uthman Baroudi, Mohammed
More informationICE 1332/0715 Mobile Computing (Summer, 2008)
ICE 1332/0715 Mobile Computing (Summer, 2008) Medium Access Control Prof. Chansu Yu http://academic.csuohio.edu/yuc/ Simplified Reference Model Application layer Transport layer Network layer Data link
More informationApplication of Network Calculus to the TSN Problem Space
Application of Network Calculus to the TSN Problem Space Jean Yves Le Boudec 1,2,3 EPFL IEEE 802.1 Interim Meeting 22 27 January 2018 1 https://people.epfl.ch/105633/research 2 http://smartgrid.epfl.ch
More informationCross Clock-Domain TDM Virtual Circuits for Networks on Chips
Cross Clock-Domain TDM Virtual Circuits for Networks on Chips Zhonghai Lu Dept. of Electronic Systems School for Information and Communication Technology KTH - Royal Institute of Technology, Stockholm
More informationPerformance Analysis of IEEE DCF in Imperfect Channels
Performance Analysis of IEEE 82. DCF in Imperfect Channels Yu Zheng, Kejie Lu, Dapeng Wu, and Yuguang Fang Abstract IEEE 82. is the most important standard for wireless local area networks (WLANs). In
More informationMarkov Chains and Multiaccess Protocols: An. Introduction
Markov Chains and Multiaccess Protocols: An Introduction Laila Daniel and Krishnan Narayanan April 8, 2012 Outline of the talk Introduction to Markov Chain applications in Communication and Computer Science
More informationResearch Article Performance Analysis of IEEE DCF under Nonsaturation Condition
Mathematical Problems in Engineering Volume 2008, Article ID 574197, 17 pages doi:10.1155/2008/574197 Research Article Performance Analysis of IEEE 802.11 DCF under Nonsaturation Condition Yutae Lee, 1
More informationStream Sessions: Stochastic Analysis
Stream Sessions: Stochastic Analysis Hongwei Zhang http://www.cs.wayne.edu/~hzhang Acknowledgement: this lecture is partially based on the slides of Dr. D. Manjunath and Dr. Kumar Outline Loose bounds
More informationMultichannel Outage-aware MAC Protocols for Wireless Networks
Submitted - the 4th IEEE Conference on Industrial Electronics and Applications (ICIEA 29) Multichannel Outage-aware MAC Protocols for Wireless Networks Hyukjin Lee and Cheng-Chew Lim School of Electrical
More informationAnalytical Model for an IEEE WLAN using DCF with Two Types of VoIP Calls
Analytical Model for an IEEE 802.11 WLAN using DCF with Two Types of VoIP Calls Sri Harsha Anurag Kumar Vinod Sharma Department of Electrical Communication Engineering Indian Institute of Science Bangalore
More informationPerformance Analysis of IEEE MAC Protocol with Different ACK Polices
Performance Analysis of IEEE 82.15.3 MAC Protocol with Different Polices S. Mehta and K.S. Kwak Wireless Communications Research Center, Inha University, Korea suryanand.m@gmail.com Abstract. he wireless
More informationMedium Access Control Protocols With Memory Jaeok Park, Member, IEEE, and Mihaela van der Schaar, Fellow, IEEE
IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 18, NO. 6, DECEMBER 2010 1921 Medium Access Control Protocols With Memory Jaeok Park, Member, IEEE, and Mihaela van der Schaar, Fellow, IEEE Abstract Many existing
More informationQueueing Analysis of IEEE MAC Protocol in Wireless LAN
Queueing Analysis of IEEE 80211 MAC Protocol in Wireless LAN Chul Geun Park and Ho Suk Jung Department of Information and Comm Eng Sunmoon University Chung Nam, 336-708, Korea cgpark@sunmoonackr Dong Hwan
More informationMassive Random Access: Fundamental Limits, Optimal Design, and Applications to M2M Communications
Massive Random Access: Fundamental Limits, Optimal Design, and Applications to M2M Communications Lin Dai Department of Electronic Engineering City University of Hong Kong lindai@cityu.edu.hk March, 2018
More informationPerformance Analysis of Cell Switching Management Scheme in Wireless Packet Communications
Performance Analysis of Cell Switching Management Scheme in Wireless Packet Communications Jongho Bang Sirin Tekinay Nirwan Ansari New Jersey Center for Wireless Telecommunications Department of Electrical
More informationSaturation Throughput of IEEE e EDCA Based on Mean Value Analysis
Saturation Throughput of IEEE 80.11e EDCA Based on Mean Value Analysis Yuxia Lin and Vincent W.S. Wong Department of Electrical and Computer Engineering The University of British Columbia 33 Main Mall,
More informationAnalysis of Random Access Protocol under Bursty Traffic
Analysis of Random Access Protocol under Bursty Traffic Jianbo Gao and Izhak Rubin Electrical Engineering Department, University of California, Los Angeles, CA 90095 {jbgao, rubin}@ee.ucla.edu Abstract.
More informationA simple mathematical model that considers the performance of an intermediate node having wavelength conversion capability
A Simple Performance Analysis of a Core Node in an Optical Burst Switched Network Mohamed H. S. Morsy, student member, Mohamad Y. S. Sowailem, student member, and Hossam M. H. Shalaby, Senior member, IEEE
More informationAdvanced Internet Technologies
Advanced Internet Technologies Chapter 3 Performance Modeling Dr.-Ing. Falko Dressler Chair for Computer Networks & Internet Wilhelm-Schickard-Institute for Computer Science University of Tübingen http://net.informatik.uni-tuebingen.de/
More informationPerformance Comparison of IEEE e EDCA and b DCF Under Non- Saturation Condition using Network Simulator
Research Journal of Applied Sciences, Engineering and Technology 4(22): 4748-4754, 212 ISSN: 24-7467 Maxwell Scientific Organization, 212 Submitted: April 3, 212 Accepted: April 23, 212 Published: November
More informationINTEGRATION of data communications services into wireless
208 IEEE TRANSACTIONS ON COMMUNICATIONS, VOL 54, NO 2, FEBRUARY 2006 Service Differentiation in Multirate Wireless Networks With Weighted Round-Robin Scheduling and ARQ-Based Error Control Long B Le, Student
More informationP B 1-P B ARRIVE ATTEMPT RETRY 2 1-(1-P RF ) 2 1-(1-P RF ) 3 1-(1-P RF ) 4. Figure 1: The state transition diagram for FBR.
1 Analytical Model In this section, we will propose an analytical model to investigate the MAC delay of FBR. For simplicity, a frame length is normalized as a time unit (slot). 1.1 State Transition of
More informationAn Analytical Model for IEEE with Sleep Mode Based on Time-varying Queue
This full text paper was peer reviewed at the direction of IEEE Communications Society subject matter experts for publication in the IEEE ICC 2 proceedings An Analytical Model for IEEE 82.5.4 with Sleep
More informationA Survey on Congestion Control and Maximization of Throughput in Wireless Networks
A Survey on Congestion Control and Maximization of Throughput in Wireless Networks K.Ravindra Babu Post graduate student V.R.Siddhartha Engineering College ravindra.bec2008@gmail.com J.Ranga Rao Assistant
More informationA hierarchical network model for network topology design using genetic algorithm
A hierarchical network model for network topology design using genetic algorithm Chunlin Wang 1, Ning Huang 1,a, Shuo Zhang 2, Yue Zhang 1 and Weiqiang Wu 1 1 School of Reliability and Systems Engineering,
More informationA PRACTICAL APPROACH FOR MULTIMEDIA TRAFFIC MODELING
A PRACTICAL APPROACH FOR MULTIMEDIA TRAFFIC MODELING Timothy D. Neame,l Moshe Zukerman 1 and Ronald G. Addie2 1 Department of Electrical and 2 Department of Mathematics Electronic Engineering, and Computer
More information2. Modelling of telecommunication systems (part 1)
2. Modelling of telecommunication systems (part ) lect02.ppt S-38.45 - Introduction to Teletraffic Theory - Fall 999 2. Modelling of telecommunication systems (part ) Contents Telecommunication networks
More informationB. Bellalta Mobile Communication Networks
IEEE 802.11e : EDCA B. Bellalta Mobile Communication Networks Scenario STA AP STA Server Server Fixed Network STA Server Upwnlink TCP flows Downlink TCP flows STA AP STA What is the WLAN cell performance
More informationEP2210 Scheduling. Lecture material:
EP2210 Scheduling Lecture material: Bertsekas, Gallager, 6.1.2. MIT OpenCourseWare, 6.829 A. Parekh, R. Gallager, A generalized Processor Sharing Approach to Flow Control - The Single Node Case, IEEE Infocom
More informationAdaptive EDCF: Enhanced Service Differentiation for IEEE Wireless Ad-Hoc Networks
Adaptive : Enhanced Service Differentiation for IEEE 82.11 Wireless Ad-Hoc Networks Lamia Romdhani, Qiang Ni, and Thierry Turletti INRIA Sophia Antipolis, 24 Route des Lucioles, BP-93, 692 Sophia Antipolis,
More informationPerformance of A Burst-Frame-Based. CSMA/CA Protocol for High Data Rate Ad. Hoc Networks: Unsaturated Throughput. Analysis
Performance of A Burst-Frame-Based CSMA/CA Protocol for High Data Rate Ad Hoc Networks: Unsaturated Throughput Analysis Kejie Lu, Jianfeng Wang, Dapeng Wu, and Yuguang Fang Abstract In high data rate wireless
More informationIEEE Throughput and Delay Analysis for mixed real time and normal data traffic
IEEE 802.11 Throughput and Delay Analysis for mixed real time and normal data traffic Matias Arenas P. and Walter Grote H. Department of Electronic Engineering, Federico Santa Maria Technical U. Avenida
More informationActive Queue Management for Self-Similar Network Traffic
Active Queue Management for Self-Similar Network Traffic Farnaz Amin*, Kiarash Mizanain**, and Ghasem Mirjalily*** * Electrical Engineering and computer science Department, Yazd University, farnaz.amin@stu.yazduni.ac.ir
More informationEVALUATION OF EDCF MECHANISM FOR QoS IN IEEE WIRELESS NETWORKS
MERL A MITSUBISHI ELECTRIC RESEARCH LABORATORY http://www.merl.com EVALUATION OF EDCF MECHANISM FOR QoS IN IEEE802.11 WIRELESS NETWORKS Daqing Gu and Jinyun Zhang TR-2003-51 May 2003 Abstract In this paper,
More informationWIRELESS Wireless local area networks (WLANs)
, March 16-18, 216, Hong Kong A Novel MAC Protocol for Improving the Throughput in Multi-Hop Wireless Networks Takumi Sanada, Xuejun Tian, Takashi Okuda, and Shi Xiao, Abstract WLANs have become increasingly
More informationImproving Fairness in Multi-Hop Mesh Networks Using e
Improving Fairness in Multi-Hop Mesh Networks Using 80.e K. Duffy, D.J. Leith, T. Li and D. Malone Hamilton Institute, NUI Maynooth Abstract In this paper we introduce a tractable analytic model of throughput
More informationSupporting Deadline Monotonic Policy over Average Service Time Analysis
Supporting Deadline Monotonic Policy over 802. Average Service Time Analysis Inès El Korbi Ecole Nationale des Sciences de l Informatique Laboratoire Cristal Université de la Manouba, 200 Tunisia ines.korbi@gmail.com
More informationCall Admission Control for IEEE Contention Access Mechanism
Call Admission Control for IEEE 82.11 Contention Access Mechanism Dennis Pong and Tim Moors School of Electrical Engineering and Telecommunications, The University of New South Wales, Australia Email:
More informationBuffer Management for Self-Similar Network Traffic
Buffer Management for Self-Similar Network Traffic Faranz Amin Electrical Engineering and computer science Department Yazd University Yazd, Iran farnaz.amin@stu.yazd.ac.ir Kiarash Mizanian Electrical Engineering
More informationAdaptive Packetization for Error-Prone Transmission over WLANs with Hidden Terminals
Adaptive Packetization for Error-Prone Transmission over 8.11 WLANs with Hidden Terminals Wei Song, Michael N. Krishnan, and Avideh Zakhor Video and Image Processing (VIP) Lab Department of Electrical
More informationMaximum Traffic Scheduling and Capacity Analysis for IEEE High Data Rate MAC Protocol
Maximum Traffic Scheduling and Capacity Analysis for IEEE 80..3 High Data Rate MAC Protocol Yi-Hsien Tseng, Eric Hsiao-kuang Wu and Gen-Huey Chen Department of Computer Science and Information Engineering,
More informationSaturated Throughput Analysis of IEEE e EDCA
Saturated Throughput Analysis of IEEE 80.e EDCA Lixiang Xiong, Guoqiang Mao School of Electrical and Information Engineering The University of Sydney, Sydney, NW 006, Australia Abstract IEEE 80.e standard
More informationFairness Enhancement Scheme for Multimedia Applications in IEEE e Wireless LANs
Fairness Enhancement Scheme for Multimedia Applications in IEEE 802.11e Wireless LANs Young-Woo Nam, Sunmyeng Kim, and Si-Gwan Kim Department of Computer Software Engineering Kumoh National Institute of
More informationEvaluation of the backoff procedure of Homeplug MAC vs. DCF
Evaluation of the backoff procedure of Homeplug MAC vs. DCF Cristina Cano and David Malone Hamilton Institute National University of Ireland, Maynooth Co. Kildare, Ireland Email: {cristina.cano,david.malone}@nuim.ie
More informationFine-Tuning the Femtocell Performance in Unlicensed Bands: Case of WiFi Co-existence
Fine-Tuning the Femtocell Performance in Unlicensed Bands: Case of WiFi Co-existence Sima Hajmohammad Université du Québec à Montréal Montreal, Canada haj mohammad.sima@courrier.uqam.ca Halima Elbiaze
More informationAnalysis of the Distribution of the Backoff Delay in DCF: A Step Towards End-to-end Delay Guarantees in WLANs
Analysis of the Distribution of the Backoff Delay in 802.11 DCF: A Step Towards End-to-end Delay Guarantees in WLANs Albert Banchs Universidad Carlos III de Madrid banchs@it.uc3m.es Outline I. The Daidalos
More informationMultimedia Communication Services Traffic Modeling and Streaming
Multimedia Communication Services Traffic Modeling and Streaming Medium Access Control algorithms Introduction and details on Aloha networks with infinite nodes Università degli Studi di Brescia A.A. 2014/2015
More informationSIMULATING CDPD NETWORKS USING OPNET
SIMULATING CDPD NETWORKS USING OPNET Michael Jiang, Stephen Hardy, and Ljiljana Trajkovic * School of Engineering Science Simon Fraser University Vancouver, British Columbia Canada V5A 1S6 {zjiang, steve,
More informationThroughput prediction in wireless networks using statistical learning
Throughput prediction in wireless networks using statistical learning Claudina Rattaro, Pablo Belzarena To cite this version: Claudina Rattaro, Pablo Belzarena. Throughput prediction in wireless networks
More informationPrioritization scheme for QoS in IEEE e WLAN
Prioritization scheme for QoS in IEEE 802.11e WLAN Yakubu Suleiman Baguda a, Norsheila Fisal b a,b Department of Telematics & Communication Engineering, Faculty of Electrical Engineering Universiti Teknologi
More informationAnalysis of the Stability and Performance of Exponential Backoff
Analysis of the Stability and Performance of Exponential Backoff Byung-Jae Kwak bjkwak@antd.nist.gov Nah-Oak Song nsong@antd.nist.gov Leonard E. Miller lmiller@antd.nist.gov Abstract New analytical results
More informationA Comprehensive Simulation Study of Slotted CSMA/CA for IEEE Wireless Sensor Networks
A Comprehensive Simulation Study of Slotted CSMA/CA for IEEE 802.15.4 Wireless Sensor Networks Anis KOUBAA, Mário ALVES, Eduardo TOVAR IPP-HURRAY! Research Group, Polytechnic Institute of Porto Rua Dr.
More informationA New Full Duplex MAC Protocol to Solve the Asymmetric Transmission Time
A New Full Duplex MAC Protocol to Solve the Asymmetric Transmission Time Jin-Ki Kim, Won-Kyung Kim and Jae-Hyun Kim Department of Electrical and Computer Engineering Ajou University Suwon, Korea E-mail
More informationAnalysis of CSMA/CA Systems under Carrier Sensing Error: Throughput, Delay and Sensitivity
Analysis of CSMA/CA Systems under Carrier Sensing Error: Throughput, Delay and Sensitivity Jo oon Chong, Youngchul Sung, and Dan Keun Sung School of EECS, KAIST 373- Guseong-dong, Yuseong-gu, Daejeon 35-7,
More informationEnhancements and Performance Evaluation of Wireless Local Area Networks
Enhancements and Performance Evaluation of Wireless Local Area Networks Jiaqing Song and Ljiljana Trajkovic Communication Networks Laboratory Simon Fraser University Burnaby, BC, Canada E-mail: {jsong,
More information2 Related Work. 1 Introduction. 3 Background
Modeling the Performance of A Wireless Node in Multihop Ad-Hoc Networks Ping Ding, JoAnne Holliday, Aslihan Celik {pding, jholliday, acelik}@scu.edu Santa Clara University Abstract: In this paper, we model
More informationCSMA based Medium Access Control for Wireless Sensor Network
CSMA based Medium Access Control for Wireless Sensor Network H. Hoang, Halmstad University Abstract Wireless sensor networks bring many challenges on implementation of Medium Access Control protocols because
More informationAn Efficient Backoff Algorithm for QoS Guaranteeing in Wireless Networks
An Efficient Backoff Algorithm for QoS Guaranteeing in Wireless Networks Xinhua Liu, Guojun Ma, HaiLan Kuang, Fangmin Li School of Information Engineering, Wuhan University of Technology, Wuhan, 430070
More informationE-BEB Algorithm to Improve Quality of Service on Wireless Ad-Hoc Networks
Research Journal of Applied Sciences, Engineering and Technology 4(7): 807-812, 2012 ISSN: 2040-7467 Maxwell Scientific Organization, 2012 Submitted: vember 10, 2011 Accepted: December 09, 2011 Published:
More informationCharacterizing Internet Load as a Non-regular Multiplex of TCP Streams
Characterizing Internet Load as a Non-regular Multiplex of TCP Streams J. Aracil, D. Morató Dpto. Automática y Computación Universidad Pública de Navarra {javier.aracil,daniel.morato}@unavarra.es http://www.tlm.unavarra.es
More informationAVALANCHE: A NETWORK CODING ANALYSIS
COMMUNICATIONS IN INFORMATION AND SYSTEMS c 2007 International Press Vol. 7, No. 4, pp. 353-358, 2007 003 AVALANCHE: A NETWORK CODING ANALYSIS RAYMOND W. YEUNG Abstract. In this paper, we study the application
More informationIN distributed random multiple access, nodes transmit
414 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 52, NO. 2, FEBRUARY 2006 Power Levels and Packet Lengths in Random Multiple Access With Multiple-Packet Reception Capability Jie Luo, Member, IEEE, and
More informationCharacterising the Behaviour of IEEE Broadcast Transmissions in Ad Hoc Wireless LANs
University of Wollongong Research Online Faculty of Informatics - Papers (Archive) Faculty of Engineering and Information Sciences 2009 Characterising the Behaviour of IEEE 802.11 Broadcast Transmissions
More informationWLAN Performance Aspects
Mobile Networks Module C- Part 1 WLAN Performance Aspects Mohammad Hossein Manshaei Jean-Pierre Hubaux http://mobnet.epfl.ch 1 Performance Evaluation of IEEE 802.11(DCF) Real Experimentations HoE on IEEE
More informationSome Optimization Trade-offs in Wireless Network Coding
Some Optimization Trade-offs in Wireless Network Coding Yalin Evren Sagduyu and Anthony Ephremides Electrical and Computer Engineering Department and Institute for Systems Research University of Maryland,
More informationReal-Time Medical Data over WLANs
2015 International Conference on Computational Science and Computational Intelligence Real-Time Medical Data over WLANs Constantine Coutras Department of Computer Science Montclair State University Montclair,
More informationStudy on The Effects of Self-Similar Traffic on The IEEE Wireless Sensor Networks
Study on The Effects of Self-Similar Traffic on The IEEE 8.. Wireless Sensor Networks Chi-Ming Wong Department of Electronic Engineering Jinwen University of Science and Technology Taipei, Taiwan gordon9@gmail.com
More informationHeterogeneity Increases Multicast Capacity in Clustered Network
Heterogeneity Increases Multicast Capacity in Clustered Network Qiuyu Peng Xinbing Wang Huan Tang Department of Electronic Engineering Shanghai Jiao Tong University April 15, 2010 Infocom 2011 1 / 32 Outline
More informationPacket multiple access and the Aloha protocol
Packet multiple access and the Aloha protocol Massachusetts Institute of Technology Department of Aeronautics and Astronautics Slide 1 Packet Multiple Access PMA SHARED UPLINK TERMINAL TERMINAL APPL TRANS
More information