Stochastic Delay Analysis for Protocols with Self-similar Traffic

Size: px
Start display at page:

Download "Stochastic Delay Analysis for Protocols with Self-similar Traffic"

Transcription

1 22 7th International ICST Conference on Communications and Networking in China (CHINACOM) Stochastic Delay Analysis for 82 Protocols with Self-similar Traffic Jie Zhang, Li Yu, Lie Jiang, Jingjing Luo Department of Electronics and Information Engineering, Huazhong University of Science and Technology, PRC Wuhan National Laboratory for Optoelectronics, Wuhan, Hubei, PRC Abstract IEEE 82 wireless local area network (WLAN) is one of the most deployed wireless technologies all over the world An accurate and comprehensive performance evaluation is crucial for the quality of service (QoS) guarantee in 82 networks In this paper, we use the method of stochastic network calculus to obtain the stochastic delay bounds of 82 protocols In particular, we take the self-similar property of wireless traffic into consideration and fractional Brownian motion (fbm) traffic model is adopted to describe the arrival traffic We derive the stochastic arrival curve of fbm traffic and the stochastic service curve of existing model of 82, then obtain the stochastic delay and backlog bounds Finally, we use matlab to calculate theoretical results and ns-2 for simulations The results show that the delay of the 82 wireless node increases with the increasing of Hurst parameter H and the number of competition stations n And the results also indicate that the theoretical results well bound simulation results I INTRODUCTION Wireless networking is one of the exciting developments in the world of networking technology IEEE 82 protocols have been proposed as the standard protocols for wireless local area networks In order to provide QoS guarantees, it is necessary to characterize the delay and other performance metrics in 82 networks Traditional method for performance analysis of 82 protocols is the method of queuing theory In [], Zhai et al assumed Poisson traffic arrival and proposed an M/G/ queueing model of 82 In [2], [3], Tickoo modeled each node as a discrete time G/G/ queue and derived the service time distribution while accounting for a number of factors However, recent researches [4], [5] show that the wireless LAN traffic processes have the property of long-range independence (LRD) and statistical self-similarity, which means that the traditional traffic model such as Poisson arrival model and CBR arrival model can not fulfill these properties FBm [6], [7], [8] is a traffic model which captures self-similarity FBm is characterized by the Hurst parameter H WhenH ( 2, ), fbm is LRD Due to the complexity and the burst property of self-similar traffic, queuing theory is not suitable for the performance analysis of wireless network In this paper, we adopt the method of stochastic network calculus to analyze this problem Network calculus which is proposed in [9], [], [] is a recently developed approach to take a deep insight into flow problems encountered in networking, especially on QoS guarantee analysis Due to the stochastic property of arrival and service process, network calculus has developed from deterministic to stochastic in [2], [3], [4] The stochastic network calculus is more suitable for the networks which only provide stochastic guarantees Unlike queuing theory, network calculus provides a more general way to describe the arrival and service process It is convenient to use network calculus to get the delay and backlog bounds of network Though in [5], the author derived the backlog and delay bounds of an 82 wireless node based on an existing model of 82, however, the traffic model adopted was Poisson arrival model and Constants Bit Rate (CBR) arrival model, and it still did not consider the property of long-range dependence and selfsimilarity of the traffic In light of such need, we develop a stochastic network calculus model for performance analysis of 82 protocols We derive the stochastic delay bound of an 82 wireless node using stochastic network calculus and take the property of long-range dependence and self-similarity of the traffic into consideration, where fbm model is chosen as the traffic model In this paper, we first derive the form of stochastic arrival curve of fbm model and the stochastic service curve of an 82 wireless node Secondly, based on the theory of stochastic network calculus, we get the stochastic delay and backlog bounds of an 82 wireless node Through the results, we can analyze how the parameters of both fbm traffic andthe setting of 82 protocols impact the delay and backlog of an 82 wireless node Then, we use matlab to calculate the theoretical stochastic delay bounds and ns-2 for simulations The resulting delay and backlog distribution own practical significance to guide the parameters configuration of network applications, eg, the impact of the number of competition nodes can help design the network topology and the theoretical stochastic delay and backlog can help design 82 systems The rest of this paper is organized as follows In Section II, we give a brief introduction of the definitions and theory about stochastic network calculus In Section III, the corresponding stochastic arrival curve and service curve are derived, and we obtain the stochastic delay and backlog bounds conducted by stochastic network calculus In Section IV, we analyze the derived bounds and compare the bounds with simulation results Conclusions are drawn in Section V /2/$3 22 IEEE

2 A Network Model II SYSTEM MODEL In 82 networks, the situation that several stations compete for the same access point always occurs We consider how to derive stochastic delay and backlog bounds of an 82 wireless node under this condition Fig shows the situation where several stations compete for the same access point And by F the set of non-negative wide-sense decreasing function, or F = {f( ) : x y, f(y) f(x)} (2) The following operator under the (min, +) algebra will be used frequently in the following sections The (min, +) convolution of function f and g is (f g)(x) [f(y)+g(x y)] (3) y x For service guarantee analysis of a system, we are interested in two quantities: backlog and delay, which are defined in [6], [7], [8]: The backlog B(t) in the system at time t is The delay D(t) at time t is B(t) =A(t) A (t) (4) D(t) {d :A(t) A (t + d)} (5) Fig The network model For simplicity, our analysis is based on the following assumptions: (i) There are n stations transmitting to an access point; (ii) There are no hidden terminals and capture in the channel condition, which is ideal; (iii) The saturation condition is fulfilled Each station always has a packet available for transmission In other words, the transmission queue of each station is assumed to be nonempty; (iv) Each node is fed with fbm flow Based on the assumptions above, the stochastic arrival curve and stochastic service curve are derived in the following analysis B Stochastic Network Calculus Basics We first introduce the fundamental notations of stochastic network calculus We consider a lossless communication system which is modeled by various processes A process is defined by a function of time t, (t=,, 2) It could count cumulative amount of traffic arriving at some network element, the cumulative amount of traffic departing from the network element, the amount of service provided by the network element In this case, we name the process as arrival process, departure process and service process, and denoted them by A(t), A (t), and S(t) respectively In this paper, we assume all process are defined on t and by convention, have zero value at t= For any s (,t), we denote A(s, t) =A(t) A(s), A (s, t) =A (t) A (s), S(s, t) =S(t) S(s) We denote the set of non-negative wide-sense increasing functions by F F = {f( ) : x y, f(x) f(y)} () For traffic model, the virtual-backlog-centric (vbc) stochastic arrival curve is mainly used in this paper The vbc stochastic traffic model explores the virtual backlog property of the deterministic arrival curve, which is that the queue length of a virtual single-server queue fed with the same flow with a deterministic arrival curve is upper-bounded [4] The definition of the vbc stochastic arrival curve is defined as follow: Definition A flow is said to have a virtual-backlog-centric (vbc) stochastic arrival curve α F with bounding function f F, denoted by A vb <f,α>,ifforallt and x, there holds P { sup [A(s, t) α(t s)] >x} f(x) (6) Definition 2 AServerS is said to prove a stochastic service curve β F with bounding function g F, denoted by S sc <g,β>,ifforallt and x, there holds P { sup [A β(s) A (s)] >x} g(x) (7) Theorem Consider a server fed with flow A Iftheserver provides stochastic service curve to the flow and the flow has a vbc stochastic arrival curve, then, (i) The backlog B(t) of the flow in the server at time t satisfies: for all t and x, P {B(t) >x} f g(x +inf[β(s) α(s)]) (8) s (ii) The delay D(t) of the flow in the server at time t satisfies: for all t and x, P {D(t) >x} f g(inf[β(s) α(s x)]) (9) s III PERFORMANCE ANALYSIS In this section, we obtain the stochastic arrival curve and stochastic service curve based on the system model and derive the stochastic delay and backlog bounds conducted by stochastic network calculus 25

3 A Stochastic Service Curve of 82 Node In the 82 protocols, distributed coordination function (DCF) is the fundamental mechanism to access the medium This random access scheme is based on the carrier sense multiple access with collision avoidance (CSMA/CA) protocol, and an exponential backoff scheme is adopted The backoff time is uniformly chosen in the range (, w-) The contention window w is set equal to the value of minimum contention window CW min After each unsuccessful transmission, w is doubled, up to the maximum value CW max = 2 m CW min we assume the channel conditions are ideal, which means there are no hidden terminals and capture And we operate in saturation conditions, which means the transmission queue of each station is assumed to be always nonempty The saturated throughput of the channel is denoted by R Then, we have R = C τ ( γ) () where C is the capacity of the link, τ is the stationary probability that the station transmits a packet in a generic (ie, randomly chosen) slot time, and γ is the conditional collision probability, meaning that this is the probability of a collision seen by a packet being transmitted on the channel The value of τ and γ is determined by the following equations [9] τ = 2( 2γ) ( 2γ)(CW min +)+γcw min [ (2γ) m ], () n= Eq() Eq(2) γ = ( τ) n (2) n= Fig 2 n=3 n=4 The Plots of Eq() and Eq(2) Fig 2 shows the curves of Eq() and Eq(2) when n =, 2, 3, 4 and 5 For different n, the points of intersection are the solution of τ and γ Whenn increases, γ increases and τ decreases According to Definition 2, we have the service curve S sc <g,β>,whereβ(t) =Rt and g(t) = n=5 B Stochastic Arrival Curve of fbm Traffic Fractional Brownian motion (fbm) is a widely accepted model for self-similar traffic [6], [7], [8] FBm is characterized by the Hurst parameter H Depending on its Hurst parameter H, it can be short-range dependent or long-range dependent When H ( 2, ), fbm is LRD, which is the traffic model we consider Definition 3 An arrival process is said to be fraction Brownian motion arrival if it satisfies A(t) =λt + aλz H (t),t, (3) where λ > is the mean rate of fbm traffic and a is variation coefficient Z H (t) is standard fraction Brownian motion process Z H (t) has the following basic properties: (i) Z H (t) has stationary Gaussian increment; (ii) For all t, Z H (t)=, and E[Z H (t)]=; (iii) For all t, E[Z 2 H (t)] = t 2H ; (iv) Z H (t) is continuous and its finite dimension distribution is Gaussian process Since α(t) =rt is the basic form of α(t), we can get the bounding function f F of the virtual-backlog-centric (vbc) stochastic arrival curve with α(t) =rt: P {A(s, t) α(t s) >x} P {A(s, t) α(s, t) >x} sup P {A(s, t) r(t s) >x} P {A(t) A(s) r(t s) >x} P {A(t) A(s) >r(t s)+x} P {λt + aλz H (t) λs aλz H (s) >r(t s)+x} P {Z H (t) Z H (s) > (r λ)s+(r λ)t+x aλ } P {N(, t 2H s 2H ) > (r λ)s+(r λ)t+b+x aλ )} exp( (4) Thus, according to Definition, we have the stochastic arrival curve A vb <f,α>,where { α(t) =rt f(x) =exp( C Performance Bounds From the above analysis, we can get that the arrival process A vb <f,α>,where { α(t) =rt f(x) =exp( The service S fulfills S sc <g,β>,where: { β(t) =C τ ( γ) t g(t) = Substituting the above results obtained in Theorem, the Stochastic backlog and delay bounds are derived In order to simplify the calculation, r = R is adopted 26

4 For backlog B(t): P {B(t) >x} f g(x +inf(β(s) α(s))) s = f g(x) For delay D(t): y x y x (f(y)) = f(x) (f(y)+g(x y)) =exp( 2aλ ( R λ P {D(t) >x} f g(inf(β(s) α(s x))) s = f g(rx) y x (f(ry)) y x = f(rx) =exp( (f(ry)+g(rx Ry)) 2aλ ( R λ H )2H ( Rx (5) (6) Through the above inequality, we can analyze the impact of the self-similar Hurst parameter H to the backlogand delay of the network, and the impact of the number of stations which are transmitting to the same access point to the network delay and the backlog IV PERFORMANCE EVALUATION In this section, numerically simulation is conducted by matlab to analyze the relationship between self-similar Hurst parameter H, the number of stations which contents the same channel n and stochastic delay bound And we use ns-2 to verify our delay bound for a certain scenario A Theoretical Calculation In each simulation, the value of minimum contention window is 32 (w=32), the mean rate of fbm traffic is 4kb/s (λ=4kb/s) and the variation is 2kb/s The following simulation is conducted by matlab and based on the analytical result of (6) ) Impact of Hurst Parameter H: In this simulation, we set three stations transmitting to the same access point (n=3), the backoff index is five (m=5) We set the value of H 6, 65, 7, 75, 8 and 85 to see the impact of Hurst parameter on stochastic delay of the node Fig3 shows the results Fig3 shows that, as H increases, the violation probability of the same delay increases, so does the delay of the same violation probability Which is to say, as Hurst parameter increases, the delay of the 82 wireless node increases This is because the larger the value of H, the stronger the burst of fbm flow, which leads to the increasing of the delay of the node 2) Impact of the Number of Stations n: In this simulation, we set Hurst parameter H=75, the backoff index m=5 We change the number of stations which transmit to the same access point from one to five to see how it impacts stochastic delay of the node Fig4 shows the results Fig4 shows that, the violation probability of the same delay increases with the number of competing stations, so does the H=6 H=65 H=7 H=75 H=8 H= Dealy(ms) Fig 3 Impact of Hurst parameter H n= n=2 n=3 n=4 n= Delay(ms) Fig 4 Impact of competition station number n delay of the same violation probability Which is to say, as the number of competing station increases, the delay of node generally increase The reason is that the more the competing stations, the less the service each station gets, which leads to the increase of backlog, and the increase of delay B Comparison between Simulation Results and Numerical Results We adopt ns-2 to verify the theoretical results Firstly, an approximate fbm generation method known as the random midpoint displacement (RMD) algorithm [2] is adopted to generate fbm traffic The parameters of fbm traffic areset as follows: the mean rate of fbm traffic is 4kb/s (λ=4kb/s), the variation is 2kb/s We show in Fig5 fbm trace with input H=75 We set three stations transmitting to the same access point (n=3) The value of minimum contention window is 32 (w=32), and the backoff index is five (m=5) The statistical data of traffic delay is obtained from the trace file of ns-2 simulation The comparison between simulation results and analytical results is shown in Fig6 The blue bar represents the analytical results of (6) and the red bar represents the simulation results from ns-2 Fig6 shows that theoretical results are well upper- 27

5 Generated Traffic (kb) Fig Time(s) x Fig 6 FBM trace based on the RMD algorithm (H=75) Analytical Simulation Delay(ms) Compare simulation results with analytical results bounded and quite close to the results of simulations It indicates that our analysis about the stochastic delay of 82 protocols with self-similar traffic input is precise Thus it can be a practical reference when analyzing the QoS of 82 protocols and helping the design of 82 systems V CONCLUSIONS In this paper, we firstly take the self-similar property of WLAN traffic into consideration to analysis the delay performance of 82 protocols With the method of stochastic network calculus, we have derived the stochastic arrival curve and stochastic service curve of an 82 wireless node Based on derivation above, the delay and backlog bounds of the node have been obtained Matlab is used to calculate the theoretical bounds and predict the impact of the Hurst parameter of fbm traffic and the number of competition nodes on the performance of an 82 wireless node The delay of the 82 wireless node increases with the increasing of Hurst parameter H and the number of competition stations n Finally, we carried out simulations to verify these bounds We believe that these results will shed light on deeper understanding of 82 protocols, the impact of the property of self-similarity of wireless traffic and the design of 82 networks ACKNOWLEDGMENT This work was supported in part by National Natural Science Fundation of China (No 69726), Funds of Distinguished Young Scientists (No 29CDA5), China-Finish cooperation Project (No 2DFB57) REFERENCES [] Zhai, and Y Fang, Performance of Wireless LANs Based on IEEE 82 MAC Protocols, Procs, IEEE PIMRC, vol 3, pp , 23 [2] O Tickoo, and B Sikdar, Queuing Analysis and Delay Mitigation in IEEE 82 random access MAC based Wireless networks, Procs, IEEE INFOCOM, vol 2, pp 44-43, 24 [3] O Tickoo, and B Sikdar, A queueing model for finite load IEEE 82 random access MAC, Procs, IEEE ICC, vol, pp 75-79, 24 [4] C Oliveira, J B Kim, and T Suda, Long-range dependence in IEEE 82b wireless LAN traffic: An empirical study, Proceedings of IEEE 8th Annual Workshop on Computer Communications, pp 7-23, 23 [5] Y Qin, M Yuming, W Taijun, and W Fan, Hurst parameter estimation and characteristics analysis of aggregate wireless LAN traffic, Prcos, IEEE ICCCAS, vol, pp , 25 [6] W Leland, M Taqqu, W Willinger, and D Wilson, On the self-similar nature of Ethernet traffic (extended version), IEEE/ACM Trans Netw, 2(), pp -5, Feb 994 [7] I Norros, A storage model with self-similar input, Queueing Systems, 6(3), pp , Sep 994 [8] I Norros, On the use of fractional Brownian motion in the theory of connectionless networks, IEEE J Sel Areas Commun, 3(6), pp , Aug 995 [9] R L Cruz, A Calculus for Network Delay, Part I: Network Elements in Isolation, IEEE Trans Information Theory, 37(), pp 4-3, Jan 99 [] R L Cruz, A Calculus for Network Delay, Part II: Network Analysis, IEEE Trans Information Theory, 37(), pp 32-4, Jan 99 [] J-Y Le Boudec, and P Thiran, Network Calculus: A Theory of Deterministic Queueing Systems for the Internet, (Springer-Verlag), 2 [2] Y Jiang, and P J Emstad, Analysis of Stochastic Service Guarantees in Communication Networks: A Server Model, Procs IEEE IWQoS, 25 [3] Y Jiang, A Basic Stochastic Network Calculus, Procs SIGCOMM, 36(4), pp 23-34, Oct 26 [4] Y Jiang, and Y Liu, Stochastic Network Calculus, Springer, 28 [5] Y Wang, T Wang, Applying Stochastic Network Calculus to 82 Backlog and Delay Analysis, Quality of Service (IWQoS), San Jose, CA, Jun 2 [6] R L Cruz, Quality of service guarantees in virtual circuit switched networks, IEEE JSAC, 3(6), pp 48-56, Aug 995 [7] C-S Chang, Performance Guarantees in Communication Networks, Springer-Verlag, 2 [8] J-Y Le Boudec and P Thiran, Network Calculus: A Theory of Deterministic Queueing Systems for the Internet, Springer-Verlag, 2 [9] G Bianchi, Performance analysis of the IEEE 82 distributed coordination function, IEEE J Sel Areas Commun, vol 8, pp , Mar 2 [2] Lau, Wing-Cheong et al, Self-similar traffic generation: the random midpoint displacement algorithm and its properties, Procs, IEEE ICC, vol, pp ,

Performance Analysis of WLANs Under Sporadic Traffic

Performance Analysis of WLANs Under Sporadic Traffic Performance Analysis of 802.11 WLANs Under Sporadic Traffic M. Garetto and C.-F. Chiasserini Dipartimento di Elettronica, Politecnico di Torino, Italy Abstract. We analyze the performance of 802.11 WLANs

More information

Comparison of pre-backoff and post-backoff procedures for IEEE distributed coordination function

Comparison of pre-backoff and post-backoff procedures for IEEE distributed coordination function Comparison of pre-backoff and post-backoff procedures for IEEE 802.11 distributed coordination function Ping Zhong, Xuemin Hong, Xiaofang Wu, Jianghong Shi a), and Huihuang Chen School of Information Science

More information

A Backoff Algorithm for Improving Saturation Throughput in IEEE DCF

A Backoff Algorithm for Improving Saturation Throughput in IEEE DCF A Backoff Algorithm for Improving Saturation Throughput in IEEE 80.11 DCF Kiyoshi Takahashi and Toshinori Tsuboi School of Computer Science, Tokyo University of Technology, 1404-1 Katakura, Hachioji, Tokyo,

More information

Analysis of Throughput and Energy Efficiency in the IEEE Wireless Local Area Networks using Constant backoff Window Algorithm

Analysis of Throughput and Energy Efficiency in the IEEE Wireless Local Area Networks using Constant backoff Window Algorithm International Journal of Computer Applications (975 8887) Volume 6 No.8, July Analysis of Throughput and Energy Efficiency in the IEEE 8. Wireless Local Area Networks using Constant backoff Window Algorithm

More information

An Efficient Scheduling Scheme for High Speed IEEE WLANs

An Efficient Scheduling Scheme for High Speed IEEE WLANs An Efficient Scheduling Scheme for High Speed IEEE 802.11 WLANs Juki Wirawan Tantra, Chuan Heng Foh, and Bu Sung Lee Centre of Muldia and Network Technology School of Computer Engineering Nanyang Technological

More information

Title. Author(s)Nguyen, Thi Xuan My; Saivichit, Chaiyachet; Miyanaga. Issue Date Doc URL. Type. Note. File Information

Title. Author(s)Nguyen, Thi Xuan My; Saivichit, Chaiyachet; Miyanaga. Issue Date Doc URL. Type. Note. File Information Title Performance Analysis for Total Delay and Total Packe Author(s)Nguyen, Thi Xuan My; Saivichit, Chaiyachet; Miyanaga Proceedings : APSIPA ASC 2009 : Asia-Pacific Signal Citationand Conference: 791-796

More information

A Comparative Analysis on Backoff Algorithms to Optimize Mobile Network

A Comparative Analysis on Backoff Algorithms to Optimize Mobile Network Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 7, July 2014, pg.771

More information

A Novel Contention Window Control Scheme Based on a Markov Chain Model in Dense WLAN Environment

A Novel Contention Window Control Scheme Based on a Markov Chain Model in Dense WLAN Environment 05 Third International Conference on Artificial Intelligence, Modelling and Simulation A Novel Contention Window Control Scheme Based on a Markov Chain Model in Dense WLAN Environment Yoshiaki Morino,

More information

Mohammad Hossein Manshaei 1393

Mohammad Hossein Manshaei 1393 Mohammad Hossein Manshaei manshaei@gmail.com 1393 1 An Analytical Approach: Bianchi Model 2 Real Experimentations HoE on IEEE 802.11b Analytical Models Bianchi s Model Simulations ns-2 3 N links with the

More information

IP Traffic Prediction and Equivalent Bandwidth for DAMA TDMA Protocols

IP Traffic Prediction and Equivalent Bandwidth for DAMA TDMA Protocols IP Traffic and Equivalent Bandwidth for DAMA TDMA Protocols J. Aracil, D. Morato, E. Magaña, M. Izal Universidad Pública de Navarra, 316 Pamplona, SPAIN email:javier.aracil@unavarra.es Abstract The use

More information

An Efficient Bandwidth Estimation Schemes used in Wireless Mesh Networks

An Efficient Bandwidth Estimation Schemes used in Wireless Mesh Networks An Efficient Bandwidth Estimation Schemes used in Wireless Mesh Networks First Author A.Sandeep Kumar Narasaraopeta Engineering College, Andhra Pradesh, India. Second Author Dr S.N.Tirumala Rao (Ph.d)

More information

878 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 16, NO. 4, AUGUST 2008

878 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 16, NO. 4, AUGUST 2008 878 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 16, NO. 4, AUGUST 2008 Modeling Queueing and Channel Access Delay in Unsaturated IEEE 802.11 Random Access MAC Based Wireless Networks Omesh Tickoo and Biplab

More information

Exploiting Multi-User Diversity in Wireless LANs with Channel-Aware CSMA/CA

Exploiting Multi-User Diversity in Wireless LANs with Channel-Aware CSMA/CA Exploiting Multi-User Diversity in Wireless LANs with Channel-Aware CSMA/CA Xiaowei Wang, Mahsa Derakhshani, Tho Le-Ngoc Department of Electrical & Computer Engineering, McGill University, Montreal, QC,

More information

Providing Throughput Guarantees in IEEE e Wireless LANs

Providing Throughput Guarantees in IEEE e Wireless LANs Providing Throughput Guarantees in IEEE 802.11e Wireless LANs Albert Banchs a, Xavier Pérez-Costa a, Daji Qiao b a Network Laboratories, NEC Europe Ltd., Heidelberg, Germany b Real-Time Computing Laboratory,

More information

Distributed Call Admission Control for Ad Hoc Networks

Distributed Call Admission Control for Ad Hoc Networks Distributed Call Admission Control for Ad Hoc Networks Shahrokh Valaee and Baochun Li Abstract This paper introduces a distributed call admission controller for ad hod networks. The call admission controller

More information

Analysis of Broadcast Non-Saturation Throughput as a Performance Measure in VANETs

Analysis of Broadcast Non-Saturation Throughput as a Performance Measure in VANETs Analysis of Broadcast Non-Saturation Throughput as a Performance Measure in VANETs Gayathri Narayanan Department of Electronics and Communication Engineering Amrita School of Engineering, Amritapuri Campus,

More information

Throughput and Energy Consumption Analysis of IEEE Slotted CSMA/CA. T.R. Park, T.H. Kim, J.Y. Choi, S. Choi, and W.H.

Throughput and Energy Consumption Analysis of IEEE Slotted CSMA/CA. T.R. Park, T.H. Kim, J.Y. Choi, S. Choi, and W.H. Throughput and Energy Consumption Analysis of IEEE 802.15.4 Slotted CSMA/CA T.R. Park, T.H. Kim, J.Y. Choi, S. Choi, and W.H. Kwon We propose a new analytic model of the IEEE 802.15.4 slotted CSMA/CA from

More information

Collision Probability in Saturated IEEE Networks

Collision Probability in Saturated IEEE Networks in Saturated IEEE 80.11 Networks Hai L. Vu Centre for Advanced Internet Architectures (CAIA) ICT Faculty, Swinburne University of Technology Hawthorn, VIC 31, Australia h.vu@ieee.org Taka Sakurai ARC Special

More information

A Boosting-Based Framework for Self-Similar and Non-linear Internet Traffic Prediction

A Boosting-Based Framework for Self-Similar and Non-linear Internet Traffic Prediction A Boosting-Based Framework for Self-Similar and Non-linear Internet Traffic Prediction Hanghang Tong 1, Chongrong Li 2, and Jingrui He 1 1 Department of Automation, Tsinghua University, Beijing 100084,

More information

SIMULATING CDPD NETWORKS USING OPNET

SIMULATING CDPD NETWORKS USING OPNET Michael Jiang Stephen Hardy Ljiljana Trajkovic SIMULATING CDPD NETWORKS USING OPNET TM Communication Networks Laboratory School of Engineering Science Simon Fraser University Road Map Introduction Simulation

More information

International Conference on Advances in Mechanical Engineering and Industrial Informatics (AMEII 2015)

International Conference on Advances in Mechanical Engineering and Industrial Informatics (AMEII 2015) International Conference on Advances in Mechanical Engineering and Industrial Informatics (AMEII 2015) A Cross Traffic Estimate Model for Optical Burst Switching Networks Yujue WANG 1, Dawei NIU 2, b,

More information

Numerical Analysis of IEEE Broadcast Scheme in Multihop Wireless Ad Hoc Networks

Numerical Analysis of IEEE Broadcast Scheme in Multihop Wireless Ad Hoc Networks Numerical Analysis of IEEE 802.11 Broadcast Scheme in Multihop Wireless Ad Hoc Networks Jong-Mu Choi 1, Jungmin So 2, and Young-Bae Ko 1 1 School of Information and Computer Engineering Ajou University,

More information

Perspectives on Network Calculus No Free Lunch but Still Good Value

Perspectives on Network Calculus No Free Lunch but Still Good Value ACM Sigcomm 2012 Perspectives on Network Calculus No Free Lunch but Still Good Value Florin Ciucu T-Labs / TU Berlin Jens Schmitt TU Kaiserslautern Outline Network Calculus (NC): A Theory for System Performance

More information

WIRELESS local area networks (WLANs) have been

WIRELESS local area networks (WLANs) have been 1648 IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, VOL. 55, NO. 5, SEPTEMBER 2006 Performance Analysis of IEEE 802.11 DCF in Imperfect Channels Yu Zheng, Kejie Lu, Member, IEEE, Dapeng Wu, Senior Member,

More information

Empirical Study of Mobility effect on IEEE MAC protocol for Mobile Ad- Hoc Networks

Empirical Study of Mobility effect on IEEE MAC protocol for Mobile Ad- Hoc Networks Empirical Study of Mobility effect on IEEE 802.11 MAC protocol for Mobile Ad- Hoc Networks Mojtaba Razfar and Jane Dong mrazfar, jdong2@calstatela.edu Department of Electrical and computer Engineering

More information

THE TCP specification that specifies the first original

THE TCP specification that specifies the first original 1 Median Filtering Simulation of Bursty Traffic Auc Fai Chan, John Leis Faculty of Engineering and Surveying University of Southern Queensland Toowoomba Queensland 4350 Abstract The estimation of Retransmission

More information

Impact of IEEE MAC Packet Size on Performance of Wireless Sensor Networks

Impact of IEEE MAC Packet Size on Performance of Wireless Sensor Networks IOSR Journal of Electronics and Communication Engineering (IOSR-JECE) e-issn: 2278-2834,p- ISSN: 2278-8735.Volume 10, Issue 3, Ver. IV (May - Jun.2015), PP 06-11 www.iosrjournals.org Impact of IEEE 802.11

More information

Throughput Analysis of CSMA Wireless Networks with Finite Offered-load

Throughput Analysis of CSMA Wireless Networks with Finite Offered-load 1 Throughput Analysis of CSMA Wireless Networks with Finite Offered-load Caihong Kai and Shengli Zhang School of Computer and Information, Hefei University of Technology, Hefei, China Department of Communication

More information

Project Report: QoS Enhancement for Real-Time Traffic in IEEE WLAN

Project Report: QoS Enhancement for Real-Time Traffic in IEEE WLAN Project Report: QoS Enhancement for Real-Time Traffic in IEEE802.11 WLAN Abstract A key issue in IEEE802.11 WLAN MAC is how to provide QoS support, especially for time-bounded traffic. Although much work

More information

136 Proceedings of the rd International Teletraffic Congress (ITC 2011)

136 Proceedings of the rd International Teletraffic Congress (ITC 2011) Gaussian Approximation of CDN Call Level Traffic Andrzej Bak and Piotr Gajowniczek Institute of Telecommunications Warsaw University of Technology Nowowiejska 5/9, -665 Warsaw, Poland Email: bak@tele.pw.edu.pl

More information

ENHANCING THE PERFORMANCE OF MANET THROUGH MAC LAYER DESIGN

ENHANCING THE PERFORMANCE OF MANET THROUGH MAC LAYER DESIGN I J I T E ISSN: 2229-7367 3(1-2), 2012, pp. 19-24 ENHANCING THE PERFORMANCE OF MANET THROUGH MAC LAYER DESIGN 1 R. MANIKANDAN, 2 K. ARULMANI AND 3 K. SELVAKUMAR Department of Computer Science and Engineering,

More information

Performance analysis of Internet applications over an adaptive IEEE MAC architecture

Performance analysis of Internet applications over an adaptive IEEE MAC architecture Journal of the Franklin Institute 343 (2006) 352 360 www.elsevier.com/locate/jfranklin Performance analysis of Internet applications over an adaptive IEEE 802.11 MAC architecture Uthman Baroudi, Mohammed

More information

ICE 1332/0715 Mobile Computing (Summer, 2008)

ICE 1332/0715 Mobile Computing (Summer, 2008) ICE 1332/0715 Mobile Computing (Summer, 2008) Medium Access Control Prof. Chansu Yu http://academic.csuohio.edu/yuc/ Simplified Reference Model Application layer Transport layer Network layer Data link

More information

Application of Network Calculus to the TSN Problem Space

Application of Network Calculus to the TSN Problem Space Application of Network Calculus to the TSN Problem Space Jean Yves Le Boudec 1,2,3 EPFL IEEE 802.1 Interim Meeting 22 27 January 2018 1 https://people.epfl.ch/105633/research 2 http://smartgrid.epfl.ch

More information

Cross Clock-Domain TDM Virtual Circuits for Networks on Chips

Cross Clock-Domain TDM Virtual Circuits for Networks on Chips Cross Clock-Domain TDM Virtual Circuits for Networks on Chips Zhonghai Lu Dept. of Electronic Systems School for Information and Communication Technology KTH - Royal Institute of Technology, Stockholm

More information

Performance Analysis of IEEE DCF in Imperfect Channels

Performance Analysis of IEEE DCF in Imperfect Channels Performance Analysis of IEEE 82. DCF in Imperfect Channels Yu Zheng, Kejie Lu, Dapeng Wu, and Yuguang Fang Abstract IEEE 82. is the most important standard for wireless local area networks (WLANs). In

More information

Markov Chains and Multiaccess Protocols: An. Introduction

Markov Chains and Multiaccess Protocols: An. Introduction Markov Chains and Multiaccess Protocols: An Introduction Laila Daniel and Krishnan Narayanan April 8, 2012 Outline of the talk Introduction to Markov Chain applications in Communication and Computer Science

More information

Research Article Performance Analysis of IEEE DCF under Nonsaturation Condition

Research Article Performance Analysis of IEEE DCF under Nonsaturation Condition Mathematical Problems in Engineering Volume 2008, Article ID 574197, 17 pages doi:10.1155/2008/574197 Research Article Performance Analysis of IEEE 802.11 DCF under Nonsaturation Condition Yutae Lee, 1

More information

Stream Sessions: Stochastic Analysis

Stream Sessions: Stochastic Analysis Stream Sessions: Stochastic Analysis Hongwei Zhang http://www.cs.wayne.edu/~hzhang Acknowledgement: this lecture is partially based on the slides of Dr. D. Manjunath and Dr. Kumar Outline Loose bounds

More information

Multichannel Outage-aware MAC Protocols for Wireless Networks

Multichannel Outage-aware MAC Protocols for Wireless Networks Submitted - the 4th IEEE Conference on Industrial Electronics and Applications (ICIEA 29) Multichannel Outage-aware MAC Protocols for Wireless Networks Hyukjin Lee and Cheng-Chew Lim School of Electrical

More information

Analytical Model for an IEEE WLAN using DCF with Two Types of VoIP Calls

Analytical Model for an IEEE WLAN using DCF with Two Types of VoIP Calls Analytical Model for an IEEE 802.11 WLAN using DCF with Two Types of VoIP Calls Sri Harsha Anurag Kumar Vinod Sharma Department of Electrical Communication Engineering Indian Institute of Science Bangalore

More information

Performance Analysis of IEEE MAC Protocol with Different ACK Polices

Performance Analysis of IEEE MAC Protocol with Different ACK Polices Performance Analysis of IEEE 82.15.3 MAC Protocol with Different Polices S. Mehta and K.S. Kwak Wireless Communications Research Center, Inha University, Korea suryanand.m@gmail.com Abstract. he wireless

More information

Medium Access Control Protocols With Memory Jaeok Park, Member, IEEE, and Mihaela van der Schaar, Fellow, IEEE

Medium Access Control Protocols With Memory Jaeok Park, Member, IEEE, and Mihaela van der Schaar, Fellow, IEEE IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 18, NO. 6, DECEMBER 2010 1921 Medium Access Control Protocols With Memory Jaeok Park, Member, IEEE, and Mihaela van der Schaar, Fellow, IEEE Abstract Many existing

More information

Queueing Analysis of IEEE MAC Protocol in Wireless LAN

Queueing Analysis of IEEE MAC Protocol in Wireless LAN Queueing Analysis of IEEE 80211 MAC Protocol in Wireless LAN Chul Geun Park and Ho Suk Jung Department of Information and Comm Eng Sunmoon University Chung Nam, 336-708, Korea cgpark@sunmoonackr Dong Hwan

More information

Massive Random Access: Fundamental Limits, Optimal Design, and Applications to M2M Communications

Massive Random Access: Fundamental Limits, Optimal Design, and Applications to M2M Communications Massive Random Access: Fundamental Limits, Optimal Design, and Applications to M2M Communications Lin Dai Department of Electronic Engineering City University of Hong Kong lindai@cityu.edu.hk March, 2018

More information

Performance Analysis of Cell Switching Management Scheme in Wireless Packet Communications

Performance Analysis of Cell Switching Management Scheme in Wireless Packet Communications Performance Analysis of Cell Switching Management Scheme in Wireless Packet Communications Jongho Bang Sirin Tekinay Nirwan Ansari New Jersey Center for Wireless Telecommunications Department of Electrical

More information

Saturation Throughput of IEEE e EDCA Based on Mean Value Analysis

Saturation Throughput of IEEE e EDCA Based on Mean Value Analysis Saturation Throughput of IEEE 80.11e EDCA Based on Mean Value Analysis Yuxia Lin and Vincent W.S. Wong Department of Electrical and Computer Engineering The University of British Columbia 33 Main Mall,

More information

Analysis of Random Access Protocol under Bursty Traffic

Analysis of Random Access Protocol under Bursty Traffic Analysis of Random Access Protocol under Bursty Traffic Jianbo Gao and Izhak Rubin Electrical Engineering Department, University of California, Los Angeles, CA 90095 {jbgao, rubin}@ee.ucla.edu Abstract.

More information

A simple mathematical model that considers the performance of an intermediate node having wavelength conversion capability

A simple mathematical model that considers the performance of an intermediate node having wavelength conversion capability A Simple Performance Analysis of a Core Node in an Optical Burst Switched Network Mohamed H. S. Morsy, student member, Mohamad Y. S. Sowailem, student member, and Hossam M. H. Shalaby, Senior member, IEEE

More information

Advanced Internet Technologies

Advanced Internet Technologies Advanced Internet Technologies Chapter 3 Performance Modeling Dr.-Ing. Falko Dressler Chair for Computer Networks & Internet Wilhelm-Schickard-Institute for Computer Science University of Tübingen http://net.informatik.uni-tuebingen.de/

More information

Performance Comparison of IEEE e EDCA and b DCF Under Non- Saturation Condition using Network Simulator

Performance Comparison of IEEE e EDCA and b DCF Under Non- Saturation Condition using Network Simulator Research Journal of Applied Sciences, Engineering and Technology 4(22): 4748-4754, 212 ISSN: 24-7467 Maxwell Scientific Organization, 212 Submitted: April 3, 212 Accepted: April 23, 212 Published: November

More information

INTEGRATION of data communications services into wireless

INTEGRATION of data communications services into wireless 208 IEEE TRANSACTIONS ON COMMUNICATIONS, VOL 54, NO 2, FEBRUARY 2006 Service Differentiation in Multirate Wireless Networks With Weighted Round-Robin Scheduling and ARQ-Based Error Control Long B Le, Student

More information

P B 1-P B ARRIVE ATTEMPT RETRY 2 1-(1-P RF ) 2 1-(1-P RF ) 3 1-(1-P RF ) 4. Figure 1: The state transition diagram for FBR.

P B 1-P B ARRIVE ATTEMPT RETRY 2 1-(1-P RF ) 2 1-(1-P RF ) 3 1-(1-P RF ) 4. Figure 1: The state transition diagram for FBR. 1 Analytical Model In this section, we will propose an analytical model to investigate the MAC delay of FBR. For simplicity, a frame length is normalized as a time unit (slot). 1.1 State Transition of

More information

An Analytical Model for IEEE with Sleep Mode Based on Time-varying Queue

An Analytical Model for IEEE with Sleep Mode Based on Time-varying Queue This full text paper was peer reviewed at the direction of IEEE Communications Society subject matter experts for publication in the IEEE ICC 2 proceedings An Analytical Model for IEEE 82.5.4 with Sleep

More information

A Survey on Congestion Control and Maximization of Throughput in Wireless Networks

A Survey on Congestion Control and Maximization of Throughput in Wireless Networks A Survey on Congestion Control and Maximization of Throughput in Wireless Networks K.Ravindra Babu Post graduate student V.R.Siddhartha Engineering College ravindra.bec2008@gmail.com J.Ranga Rao Assistant

More information

A hierarchical network model for network topology design using genetic algorithm

A hierarchical network model for network topology design using genetic algorithm A hierarchical network model for network topology design using genetic algorithm Chunlin Wang 1, Ning Huang 1,a, Shuo Zhang 2, Yue Zhang 1 and Weiqiang Wu 1 1 School of Reliability and Systems Engineering,

More information

A PRACTICAL APPROACH FOR MULTIMEDIA TRAFFIC MODELING

A PRACTICAL APPROACH FOR MULTIMEDIA TRAFFIC MODELING A PRACTICAL APPROACH FOR MULTIMEDIA TRAFFIC MODELING Timothy D. Neame,l Moshe Zukerman 1 and Ronald G. Addie2 1 Department of Electrical and 2 Department of Mathematics Electronic Engineering, and Computer

More information

2. Modelling of telecommunication systems (part 1)

2. Modelling of telecommunication systems (part 1) 2. Modelling of telecommunication systems (part ) lect02.ppt S-38.45 - Introduction to Teletraffic Theory - Fall 999 2. Modelling of telecommunication systems (part ) Contents Telecommunication networks

More information

B. Bellalta Mobile Communication Networks

B. Bellalta Mobile Communication Networks IEEE 802.11e : EDCA B. Bellalta Mobile Communication Networks Scenario STA AP STA Server Server Fixed Network STA Server Upwnlink TCP flows Downlink TCP flows STA AP STA What is the WLAN cell performance

More information

EP2210 Scheduling. Lecture material:

EP2210 Scheduling. Lecture material: EP2210 Scheduling Lecture material: Bertsekas, Gallager, 6.1.2. MIT OpenCourseWare, 6.829 A. Parekh, R. Gallager, A generalized Processor Sharing Approach to Flow Control - The Single Node Case, IEEE Infocom

More information

Adaptive EDCF: Enhanced Service Differentiation for IEEE Wireless Ad-Hoc Networks

Adaptive EDCF: Enhanced Service Differentiation for IEEE Wireless Ad-Hoc Networks Adaptive : Enhanced Service Differentiation for IEEE 82.11 Wireless Ad-Hoc Networks Lamia Romdhani, Qiang Ni, and Thierry Turletti INRIA Sophia Antipolis, 24 Route des Lucioles, BP-93, 692 Sophia Antipolis,

More information

Performance of A Burst-Frame-Based. CSMA/CA Protocol for High Data Rate Ad. Hoc Networks: Unsaturated Throughput. Analysis

Performance of A Burst-Frame-Based. CSMA/CA Protocol for High Data Rate Ad. Hoc Networks: Unsaturated Throughput. Analysis Performance of A Burst-Frame-Based CSMA/CA Protocol for High Data Rate Ad Hoc Networks: Unsaturated Throughput Analysis Kejie Lu, Jianfeng Wang, Dapeng Wu, and Yuguang Fang Abstract In high data rate wireless

More information

IEEE Throughput and Delay Analysis for mixed real time and normal data traffic

IEEE Throughput and Delay Analysis for mixed real time and normal data traffic IEEE 802.11 Throughput and Delay Analysis for mixed real time and normal data traffic Matias Arenas P. and Walter Grote H. Department of Electronic Engineering, Federico Santa Maria Technical U. Avenida

More information

Active Queue Management for Self-Similar Network Traffic

Active Queue Management for Self-Similar Network Traffic Active Queue Management for Self-Similar Network Traffic Farnaz Amin*, Kiarash Mizanain**, and Ghasem Mirjalily*** * Electrical Engineering and computer science Department, Yazd University, farnaz.amin@stu.yazduni.ac.ir

More information

EVALUATION OF EDCF MECHANISM FOR QoS IN IEEE WIRELESS NETWORKS

EVALUATION OF EDCF MECHANISM FOR QoS IN IEEE WIRELESS NETWORKS MERL A MITSUBISHI ELECTRIC RESEARCH LABORATORY http://www.merl.com EVALUATION OF EDCF MECHANISM FOR QoS IN IEEE802.11 WIRELESS NETWORKS Daqing Gu and Jinyun Zhang TR-2003-51 May 2003 Abstract In this paper,

More information

WIRELESS Wireless local area networks (WLANs)

WIRELESS Wireless local area networks (WLANs) , March 16-18, 216, Hong Kong A Novel MAC Protocol for Improving the Throughput in Multi-Hop Wireless Networks Takumi Sanada, Xuejun Tian, Takashi Okuda, and Shi Xiao, Abstract WLANs have become increasingly

More information

Improving Fairness in Multi-Hop Mesh Networks Using e

Improving Fairness in Multi-Hop Mesh Networks Using e Improving Fairness in Multi-Hop Mesh Networks Using 80.e K. Duffy, D.J. Leith, T. Li and D. Malone Hamilton Institute, NUI Maynooth Abstract In this paper we introduce a tractable analytic model of throughput

More information

Supporting Deadline Monotonic Policy over Average Service Time Analysis

Supporting Deadline Monotonic Policy over Average Service Time Analysis Supporting Deadline Monotonic Policy over 802. Average Service Time Analysis Inès El Korbi Ecole Nationale des Sciences de l Informatique Laboratoire Cristal Université de la Manouba, 200 Tunisia ines.korbi@gmail.com

More information

Call Admission Control for IEEE Contention Access Mechanism

Call Admission Control for IEEE Contention Access Mechanism Call Admission Control for IEEE 82.11 Contention Access Mechanism Dennis Pong and Tim Moors School of Electrical Engineering and Telecommunications, The University of New South Wales, Australia Email:

More information

Buffer Management for Self-Similar Network Traffic

Buffer Management for Self-Similar Network Traffic Buffer Management for Self-Similar Network Traffic Faranz Amin Electrical Engineering and computer science Department Yazd University Yazd, Iran farnaz.amin@stu.yazd.ac.ir Kiarash Mizanian Electrical Engineering

More information

Adaptive Packetization for Error-Prone Transmission over WLANs with Hidden Terminals

Adaptive Packetization for Error-Prone Transmission over WLANs with Hidden Terminals Adaptive Packetization for Error-Prone Transmission over 8.11 WLANs with Hidden Terminals Wei Song, Michael N. Krishnan, and Avideh Zakhor Video and Image Processing (VIP) Lab Department of Electrical

More information

Maximum Traffic Scheduling and Capacity Analysis for IEEE High Data Rate MAC Protocol

Maximum Traffic Scheduling and Capacity Analysis for IEEE High Data Rate MAC Protocol Maximum Traffic Scheduling and Capacity Analysis for IEEE 80..3 High Data Rate MAC Protocol Yi-Hsien Tseng, Eric Hsiao-kuang Wu and Gen-Huey Chen Department of Computer Science and Information Engineering,

More information

Saturated Throughput Analysis of IEEE e EDCA

Saturated Throughput Analysis of IEEE e EDCA Saturated Throughput Analysis of IEEE 80.e EDCA Lixiang Xiong, Guoqiang Mao School of Electrical and Information Engineering The University of Sydney, Sydney, NW 006, Australia Abstract IEEE 80.e standard

More information

Fairness Enhancement Scheme for Multimedia Applications in IEEE e Wireless LANs

Fairness Enhancement Scheme for Multimedia Applications in IEEE e Wireless LANs Fairness Enhancement Scheme for Multimedia Applications in IEEE 802.11e Wireless LANs Young-Woo Nam, Sunmyeng Kim, and Si-Gwan Kim Department of Computer Software Engineering Kumoh National Institute of

More information

Evaluation of the backoff procedure of Homeplug MAC vs. DCF

Evaluation of the backoff procedure of Homeplug MAC vs. DCF Evaluation of the backoff procedure of Homeplug MAC vs. DCF Cristina Cano and David Malone Hamilton Institute National University of Ireland, Maynooth Co. Kildare, Ireland Email: {cristina.cano,david.malone}@nuim.ie

More information

Fine-Tuning the Femtocell Performance in Unlicensed Bands: Case of WiFi Co-existence

Fine-Tuning the Femtocell Performance in Unlicensed Bands: Case of WiFi Co-existence Fine-Tuning the Femtocell Performance in Unlicensed Bands: Case of WiFi Co-existence Sima Hajmohammad Université du Québec à Montréal Montreal, Canada haj mohammad.sima@courrier.uqam.ca Halima Elbiaze

More information

Analysis of the Distribution of the Backoff Delay in DCF: A Step Towards End-to-end Delay Guarantees in WLANs

Analysis of the Distribution of the Backoff Delay in DCF: A Step Towards End-to-end Delay Guarantees in WLANs Analysis of the Distribution of the Backoff Delay in 802.11 DCF: A Step Towards End-to-end Delay Guarantees in WLANs Albert Banchs Universidad Carlos III de Madrid banchs@it.uc3m.es Outline I. The Daidalos

More information

Multimedia Communication Services Traffic Modeling and Streaming

Multimedia Communication Services Traffic Modeling and Streaming Multimedia Communication Services Traffic Modeling and Streaming Medium Access Control algorithms Introduction and details on Aloha networks with infinite nodes Università degli Studi di Brescia A.A. 2014/2015

More information

SIMULATING CDPD NETWORKS USING OPNET

SIMULATING CDPD NETWORKS USING OPNET SIMULATING CDPD NETWORKS USING OPNET Michael Jiang, Stephen Hardy, and Ljiljana Trajkovic * School of Engineering Science Simon Fraser University Vancouver, British Columbia Canada V5A 1S6 {zjiang, steve,

More information

Throughput prediction in wireless networks using statistical learning

Throughput prediction in wireless networks using statistical learning Throughput prediction in wireless networks using statistical learning Claudina Rattaro, Pablo Belzarena To cite this version: Claudina Rattaro, Pablo Belzarena. Throughput prediction in wireless networks

More information

Prioritization scheme for QoS in IEEE e WLAN

Prioritization scheme for QoS in IEEE e WLAN Prioritization scheme for QoS in IEEE 802.11e WLAN Yakubu Suleiman Baguda a, Norsheila Fisal b a,b Department of Telematics & Communication Engineering, Faculty of Electrical Engineering Universiti Teknologi

More information

Analysis of the Stability and Performance of Exponential Backoff

Analysis of the Stability and Performance of Exponential Backoff Analysis of the Stability and Performance of Exponential Backoff Byung-Jae Kwak bjkwak@antd.nist.gov Nah-Oak Song nsong@antd.nist.gov Leonard E. Miller lmiller@antd.nist.gov Abstract New analytical results

More information

A Comprehensive Simulation Study of Slotted CSMA/CA for IEEE Wireless Sensor Networks

A Comprehensive Simulation Study of Slotted CSMA/CA for IEEE Wireless Sensor Networks A Comprehensive Simulation Study of Slotted CSMA/CA for IEEE 802.15.4 Wireless Sensor Networks Anis KOUBAA, Mário ALVES, Eduardo TOVAR IPP-HURRAY! Research Group, Polytechnic Institute of Porto Rua Dr.

More information

A New Full Duplex MAC Protocol to Solve the Asymmetric Transmission Time

A New Full Duplex MAC Protocol to Solve the Asymmetric Transmission Time A New Full Duplex MAC Protocol to Solve the Asymmetric Transmission Time Jin-Ki Kim, Won-Kyung Kim and Jae-Hyun Kim Department of Electrical and Computer Engineering Ajou University Suwon, Korea E-mail

More information

Analysis of CSMA/CA Systems under Carrier Sensing Error: Throughput, Delay and Sensitivity

Analysis of CSMA/CA Systems under Carrier Sensing Error: Throughput, Delay and Sensitivity Analysis of CSMA/CA Systems under Carrier Sensing Error: Throughput, Delay and Sensitivity Jo oon Chong, Youngchul Sung, and Dan Keun Sung School of EECS, KAIST 373- Guseong-dong, Yuseong-gu, Daejeon 35-7,

More information

Enhancements and Performance Evaluation of Wireless Local Area Networks

Enhancements and Performance Evaluation of Wireless Local Area Networks Enhancements and Performance Evaluation of Wireless Local Area Networks Jiaqing Song and Ljiljana Trajkovic Communication Networks Laboratory Simon Fraser University Burnaby, BC, Canada E-mail: {jsong,

More information

2 Related Work. 1 Introduction. 3 Background

2 Related Work. 1 Introduction. 3 Background Modeling the Performance of A Wireless Node in Multihop Ad-Hoc Networks Ping Ding, JoAnne Holliday, Aslihan Celik {pding, jholliday, acelik}@scu.edu Santa Clara University Abstract: In this paper, we model

More information

CSMA based Medium Access Control for Wireless Sensor Network

CSMA based Medium Access Control for Wireless Sensor Network CSMA based Medium Access Control for Wireless Sensor Network H. Hoang, Halmstad University Abstract Wireless sensor networks bring many challenges on implementation of Medium Access Control protocols because

More information

An Efficient Backoff Algorithm for QoS Guaranteeing in Wireless Networks

An Efficient Backoff Algorithm for QoS Guaranteeing in Wireless Networks An Efficient Backoff Algorithm for QoS Guaranteeing in Wireless Networks Xinhua Liu, Guojun Ma, HaiLan Kuang, Fangmin Li School of Information Engineering, Wuhan University of Technology, Wuhan, 430070

More information

E-BEB Algorithm to Improve Quality of Service on Wireless Ad-Hoc Networks

E-BEB Algorithm to Improve Quality of Service on Wireless Ad-Hoc Networks Research Journal of Applied Sciences, Engineering and Technology 4(7): 807-812, 2012 ISSN: 2040-7467 Maxwell Scientific Organization, 2012 Submitted: vember 10, 2011 Accepted: December 09, 2011 Published:

More information

Characterizing Internet Load as a Non-regular Multiplex of TCP Streams

Characterizing Internet Load as a Non-regular Multiplex of TCP Streams Characterizing Internet Load as a Non-regular Multiplex of TCP Streams J. Aracil, D. Morató Dpto. Automática y Computación Universidad Pública de Navarra {javier.aracil,daniel.morato}@unavarra.es http://www.tlm.unavarra.es

More information

AVALANCHE: A NETWORK CODING ANALYSIS

AVALANCHE: A NETWORK CODING ANALYSIS COMMUNICATIONS IN INFORMATION AND SYSTEMS c 2007 International Press Vol. 7, No. 4, pp. 353-358, 2007 003 AVALANCHE: A NETWORK CODING ANALYSIS RAYMOND W. YEUNG Abstract. In this paper, we study the application

More information

IN distributed random multiple access, nodes transmit

IN distributed random multiple access, nodes transmit 414 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 52, NO. 2, FEBRUARY 2006 Power Levels and Packet Lengths in Random Multiple Access With Multiple-Packet Reception Capability Jie Luo, Member, IEEE, and

More information

Characterising the Behaviour of IEEE Broadcast Transmissions in Ad Hoc Wireless LANs

Characterising the Behaviour of IEEE Broadcast Transmissions in Ad Hoc Wireless LANs University of Wollongong Research Online Faculty of Informatics - Papers (Archive) Faculty of Engineering and Information Sciences 2009 Characterising the Behaviour of IEEE 802.11 Broadcast Transmissions

More information

WLAN Performance Aspects

WLAN Performance Aspects Mobile Networks Module C- Part 1 WLAN Performance Aspects Mohammad Hossein Manshaei Jean-Pierre Hubaux http://mobnet.epfl.ch 1 Performance Evaluation of IEEE 802.11(DCF) Real Experimentations HoE on IEEE

More information

Some Optimization Trade-offs in Wireless Network Coding

Some Optimization Trade-offs in Wireless Network Coding Some Optimization Trade-offs in Wireless Network Coding Yalin Evren Sagduyu and Anthony Ephremides Electrical and Computer Engineering Department and Institute for Systems Research University of Maryland,

More information

Real-Time Medical Data over WLANs

Real-Time Medical Data over WLANs 2015 International Conference on Computational Science and Computational Intelligence Real-Time Medical Data over WLANs Constantine Coutras Department of Computer Science Montclair State University Montclair,

More information

Study on The Effects of Self-Similar Traffic on The IEEE Wireless Sensor Networks

Study on The Effects of Self-Similar Traffic on The IEEE Wireless Sensor Networks Study on The Effects of Self-Similar Traffic on The IEEE 8.. Wireless Sensor Networks Chi-Ming Wong Department of Electronic Engineering Jinwen University of Science and Technology Taipei, Taiwan gordon9@gmail.com

More information

Heterogeneity Increases Multicast Capacity in Clustered Network

Heterogeneity Increases Multicast Capacity in Clustered Network Heterogeneity Increases Multicast Capacity in Clustered Network Qiuyu Peng Xinbing Wang Huan Tang Department of Electronic Engineering Shanghai Jiao Tong University April 15, 2010 Infocom 2011 1 / 32 Outline

More information

Packet multiple access and the Aloha protocol

Packet multiple access and the Aloha protocol Packet multiple access and the Aloha protocol Massachusetts Institute of Technology Department of Aeronautics and Astronautics Slide 1 Packet Multiple Access PMA SHARED UPLINK TERMINAL TERMINAL APPL TRANS

More information