Massive Random Access: Fundamental Limits, Optimal Design, and Applications to M2M Communications

Size: px
Start display at page:

Download "Massive Random Access: Fundamental Limits, Optimal Design, and Applications to M2M Communications"

Transcription

1 Massive Random Access: Fundamental Limits, Optimal Design, and Applications to M2M Communications Lin Dai Department of Electronic Engineering City University of Hong Kong March, 2018 Lin Dai (City University of Hong Kong) Massive Random Access: Fundamental Limits, Optimal Design, and March, Applications 2018 to1 M2M / 64 C

2 Multiple Access Multiple nodes transmit to a common receiver: How to share the channel? Centralized Access: A central controller performs resource allocation/optimization. Random Access: Each node determines when/how to access in a distributed manner. Lin Dai (City University of Hong Kong) Massive Random Access: Fundamental Limits, Optimal Design, and March, Applications 2018 to2 M2M / 64 C

3 Applications of Random Access WiFi networks Cellular networks Sensor networks Machine-to-machine (M2M) communications, Vehicle-to-vehicle (V2V) communications, Internet-of-things (IoT),... Lin Dai (City University of Hong Kong) Massive Random Access: Fundamental Limits, Optimal Design, and March, Applications 2018 to3 M2M / 64 C

4 Design of Random-Access Networks: Three Key Questions For each node: When to start a transmission? When to end a transmission? What if the transmission fails? Lin Dai (City University of Hong Kong) Massive Random Access: Fundamental Limits, Optimal Design, and March, Applications 2018 to4 M2M / 64 C

5 Question 1: When to Start a Transmission? Transmit if packets are awaiting in the queue. Aloha [Abramson 1970] A more polite solution: Transmit if packets are awaiting in the queue and the channel is sensed idle. Carrier Sense Multiple Access (CSMA) [Kleinrock&Tobagi 1975] Lin Dai (City University of Hong Kong) Massive Random Access: Fundamental Limits, Optimal Design, and March, Applications 2018 to5 M2M / 64 C

6 Question 2: When to End a Transmission? Stop when a packet transmission is completed. Any smarter solution? Stop when other on-going transmissions are sensed. What if nodes cannot sense the channel while transmitting? Lin Dai (City University of Hong Kong) Massive Random Access: Fundamental Limits, Optimal Design, and March, Applications 2018 to6 M2M / 64 C

7 Question 3: What if the Transmission Fails? The definition of transmission failure depends on what type of receivers is adopted. Various assumptions on the receiver have been made, which can be broadly divided into three categories. Collision: When more than one node transmit their packets simultaneously, a collision occurs and none of them can be successfully decoded. A packet transmission is successful only if there are no concurrent transmissions. Capture: Each node s packet is decoded independently by treating others as background noise. A packet can be successfully decoded as long as its received signal-to-interference-plus-noise ratio (SINR) is above a certain threshold. Joint-decoding: Multiple nodes packets are jointly decoded. Lin Dai (City University of Hong Kong) Massive Random Access: Fundamental Limits, Optimal Design, and March, Applications 2018 to7 M2M / 64 C

8 Question 3: What if the Transmission Fails? Backoff if the transmission fails. Probability-based: Retransmit with a certain probability at each time slot. Window-based: Choose a random value from a window and count down. Retransmit when the counter is zero. In general, backoff can be characterized as a sequence of transmission probabilities {q t }, where q t denotes the transmission probability of the head-of-line (HOL) packet in each node s buffer at time slot t. It is usually assumed that the transmission probability q t is adjusted according to the number of collisions that the HOL packet has experienced by time slot t, i.e., q t = Q(i), where Q(i) is an arbitrary monotonic non-increasing function of the number of collisions i. With Exponential Backoff [Metcalfe&Boggs 1976], for instance, Q(i) = 2 i. Lin Dai (City University of Hong Kong) Massive Random Access: Fundamental Limits, Optimal Design, and March, Applications 2018 to8 M2M / 64 C

9 Massive Random Access Due to uncoordination among nodes, the access performance would quickly degrade as the network size increases if backoff parameters are not properly chosen. Lin Dai (City University of Hong Kong) Massive Random Access: Fundamental Limits, Optimal Design, and March, Applications 2018 to9 M2M / 64 C

10 Massive Access of M2M Communications M2M communications is expected to become the dominant communications paradigm for a wide range of services in smart grid, transportation, health care, manufacturing and monitoring. Features of M2M communications Massive number of MTDs Infrequent transmissions Short packet payload How to efficiently facilitate the massive access from MTDs? Random access with optimized parameter setting Lin Dai (City University of Hong Kong) Massive Random Access: Fundamental Limits, Optimal Design, March, and Applications to M2M / 64 C

11 Performance Analysis of Random-Access Networks: Three Key Questions How to model a random-access network? How to evaluate the performance of a random-access network? How to optimize the performance of a random-access network? Lin Dai (City University of Hong Kong) Massive Random Access: Fundamental Limits, Optimal Design, March, and Applications to M2M / 64 C

12 Question 1: How to Model a Random-Access Network? A random-access network can be regarded as a multi-queue-single-server system. Numerous models have been proposed, which can be broadly divided into two categories: channel-centric and node-centric. Lin Dai (City University of Hong Kong) Massive Random Access: Fundamental Limits, Optimal Design, March, and Applications to M2M / 64 C

13 Question 1: How to Model a Random-Access Network? Channel-centric modeling: to characterize the aggregate traffic of all the nodes. [Abramson 1970], [Kleinrock&Tobagi 1975],...: The aggregate traffic is modeled as a Poisson random variable. The aggregate traffic is determined by the input traffic and backoff mechanism of each node, which may not always be approximated as a Poisson random variable. Difficult to analyze the queueing performance of each node. Node-centric modeling: to characterize the queueing behavior of each node. [Tsybakov 1979]: A two-node buffered Aloha network is modeled as a 2-dimensional random walk. [Rao&Ephremides 1988], [Anantharam 1991],...: Generalization to an n-node buffered Aloha network. Modeling complexity quickly increases with the number of nodes. Lin Dai (City University of Hong Kong) Massive Random Access: Fundamental Limits, Optimal Design, March, and Applications to M2M / 64 C

14 Question 1: How to Model a Random-Access Network? To establish a scalable node-centric model [Dai 12], [Dai 13]: Treat each node s queue as an independent queueing system with identically distributed service time. Characterization of the service time distribution includes two parts: State characterization of each individual head-of-line (HOL) packet; Fixed-point equations of steady-state probability of successful transmission of HOL packets. Lin Dai (City University of Hong Kong) Massive Random Access: Fundamental Limits, Optimal Design, March, and Applications to M2M / 64 C

15 Question 2: How to Evaluate the Performance of a Random-access Network? Network Throughput: the average number of successfully transmitted packets of the network per time slot. Delay 1) Queueing delay (waiting time): the time interval from the packet s arrival to the instant that it becomes the HOL packet; 2) Access delay (service time): the time interval from the instant that it becomes the HOL packet to its successful transmission. Stability 1) The network is stable if the network throughput is equal to the aggregate input rate. 2) The network is stable if the mean access/queueing delay is finite.... Network Sum Rate: the average number of successfully transmitted information bits of the network per time slot. Lin Dai (City University of Hong Kong) Massive Random Access: Fundamental Limits, Optimal Design, March, and Applications to M2M / 64 C

16 Question 2: How to Evaluate the Performance of a Random-access Network? To establish a unified theoretical framework within which effects of key system parameters on various performance metrics can be evaluated in a systematic manner: Aloha CSMA DCF M2M in LTE Network Throughput [Dai 12] [Dai 13], [Sun- Dai 16] [Dai-Sun 13], [Gao-Sun-Dai 13], [Gao-Dai 13], [Gao-Sun-Dai 14], [Sun-Dai 15], [Sun-Dai 16], [Gao- Dai-Hei 17] [Dai-Sun 13], [Sun-Dai 15], [Sun- Dai 16] Delay [Dai 12] [Dai 13], [Sun- Dai 16] Stability [Dai 12] [Dai 13] [Dai-Sun 13] [Zhan-Dai 18] Network Sum Rate [Li-Dai 16] [Sun-Dai 17] Lin Dai (City University of Hong Kong) Massive Random Access: Fundamental Limits, Optimal Design, March, and Applications to M2M / 64 C

17 Question 3: How to Optimize the Performance of a Random-access Network? Performance of random-access networks crucially depends on backoff parameters. With fixed backoff parameters, a random-access network suffers from significant performance degradation as the network size or the traffic input rates increase. For given network size and traffic input rate of each node, how to properly set the backoff parameters to optimize the network performance? Lin Dai (City University of Hong Kong) Massive Random Access: Fundamental Limits, Optimal Design, March, and Applications to M2M / 64 C

18 Question 3: How to Optimize the Performance of a Random-access Network? Network Throughput Optimization: Aloha: [Dai 12] CSMA: [Dai 13] DCF: [Dai-Sun 13] Finite Retry Limit [Sun-Dai 16] Heterogeneous [Gao-Sun-Dai 13], [Gao-Dai 13], [Gao-Sun-Dai 14] General Backoff [Sun-Dai 15] Finite Retry Limit [Sun-Dai 16] Multiple Access Points [Gao-Dai-Hei 17] M2M in LTE: [Zhan-Dai 18] Lin Dai (City University of Hong Kong) Massive Random Access: Fundamental Limits, Optimal Design, March, and Applications to M2M / 64 C

19 Question 3: How to Optimize the Performance of a Random-access Network? Delay Optimization: Aloha: [Dai 12] CSMA: [Dai 13] DCF: [Dai-Sun 13] Finite Retry Limit [Sun-Dai 16] General Backoff [Sun-Dai 15] Finite Retry Limit [Sun-Dai 16] Lin Dai (City University of Hong Kong) Massive Random Access: Fundamental Limits, Optimal Design, March, and Applications to M2M / 64 C

20 Question 3: How to Optimize the Performance of a Random-access Network? Network Sum Rate Optimization: Aloha: [Li-Dai 16] CSMA: [Sun-Dai 17] DCF: [Sun-Dai 17] Lin Dai (City University of Hong Kong) Massive Random Access: Fundamental Limits, Optimal Design, March, and Applications to M2M / 64 C

21 References L. Dai, Stability and delay analysis of buffered Aloha networks, IEEE Trans. Wireless Commun., vol. 11, no. 8, pp , Aug L. Dai, Toward a coherent theory of CSMA and Aloha, IEEE Trans. Wireless Commun., vol. 12, no. 7, pp , Jul L. Dai and X. Sun, A unified analysis of IEEE DCF networks: stability, throughput and delay, IEEE Trans. Mobile Computing, vol. 12, no. 8, pp , Aug Y. Gao, X. Sun, and L. Dai, Throughput Optimization of Heterogeneous IEEE DCF Networks, IEEE Trans. Wireless Commun., vol. 12, no. 1, pp , Jan Y. Gao and L. Dai, Optimal Downlink/Uplink Throughput Allocation for IEEE DCF Networks, IEEE Wireless Commun. Letters, vol. 2, no. 6, pp , Dec Y. Gao, X. Sun, and L. Dai, IEEE e EDCA Networks: Modeling, Differentiation and Optimization, IEEE Trans. Wireless Commun., vol. 13, no. 7, pp , July Lin Dai (City University of Hong Kong) Massive Random Access: Fundamental Limits, Optimal Design, March, and Applications to M2M / 64 C

22 References X. Sun and L. Dai, Backoff Design for IEEE DCF Networks: Fundamental Tradeoff and Design Criterion, IEEE/ACM Trans. Networking, vol. 23, no. 1, pp , Feb Y. Li and L. Dai, Maximum Sum Rate of Slotted Aloha with Capture, IEEE Trans. Commun., vol. 64, no. 2, pp , Feb X. Sun and L. Dai, Performance Optimization of CSMA Networks with A Finite Retry Limit, IEEE Trans. Wireless Commun., vol. 15, no. 9, pp , Sept X. Sun and L. Dai, Fairness-constrained Maximum Sum Rate of Multi-rate CSMA Networks, IEEE Trans. Wireless Commun., vol. 16, no. 3, pp , Mar Y. Gao, L. Dai and X. Hei, Throughput Optimization of Multi-BSS IEEE Networks With Universal Frequency Reuse, IEEE Trans. Commun., vol. 65, no. 8, pp , Aug W. Zhan and L. Dai, Massive Random Access of Machine-to-Machine Communications in LTE Networks: Modeling and Throughput Optimization, to appear in IEEE Trans. Wireless Commun. Lin Dai (City University of Hong Kong) Massive Random Access: Fundamental Limits, Optimal Design, March, and Applications to M2M / 64 C

23 A Unified Theory of Random Access Lin Dai (City University of Hong Kong) Massive Random Access: Fundamental Limits, Optimal Design, March, and Applications to M2M / 64 C

24 Node-Centric Modeling An n-node buffered random-access network can be modeled as an n-queue-single-server system. Key assumption: Each node s queue can be regarded as an independent queueing system when the number of nodes n is large. Key steps: Characterization of each head-of-line (HOL) packet s state transition and steady-state probability of successful transmission of HOL packets. Lin Dai (City University of Hong Kong) Massive Random Access: Fundamental Limits, Optimal Design, March, and Applications to M2M / 64 C

25 State Characterization of HOL Packet The state transition of each HOL packet can be modeled as a discrete-time Markov renewal process (X h,v h ) = {(Xj h,vh j ),j = 0,1,...}. The embedded Markov chain X h = {X h j } is: Without Sensing q 0 p t p t T 1-q0 p t p t p t R 1-p t 1-p 0 R t p t 1-p R t K-1 R K q 0 (1-p t ) 1-p t K: cutoff phase. The HOL packet stays at State R K if the number of transmission failures exceeds K. p t : probability of successful transmission of HOL packets at time slot t. lim t p t = p. q 0 : initial transmission probability of a fresh HOL packet. Lin Dai (City University of Hong Kong) Massive Random Access: Fundamental Limits, Optimal Design, March, and Applications to M2M / 64 C

26 State Characterization of HOL Packet The state transition of each HOL packet can be modeled as a discrete-time Markov renewal process (X h,v h ) = {(Xj h,vh j ),j = 0,1,...}. The embedded Markov chain X h = {X h j } is: With Sensing T p t p t p t p t R 0 R 1... R K-1 R K pt 1-p 1 1 t 1-p t 1-p t 1 F 0 F 1... F K-1 F K The states of {Xj h } are divided into three categories: 1) waiting to request (State R i, i = 0,...,K), 2) failure (State F i, i = 0,...,K) and 3) successful transmission (State T). p t : probability of successful transmission of HOL packets at mini-slot t given that the channel is idle at t 1. lim t p t = p. Lin Dai (City University of Hong Kong) Massive Random Access: Fundamental Limits, Optimal Design, March, and Applications to M2M / 64 C

27 State Characterization of HOL Packet The state transition of each HOL packet can be modeled as a discrete-time Markov renewal process (X h,v h ) = {(Xj h,vh j ),j = 0,1,...}. The mean holding time in each state: τ Ri : determined by the backoff scheme, i.e., transmission probability sequence {q i }. Without sensing: τ T = 1 time slot. With sensing: τ T and τ F vary under different system settings. Lin Dai (City University of Hong Kong) Massive Random Access: Fundamental Limits, Optimal Design, March, and Applications to M2M / 64 C

28 Service Rate and Service Time Distribution For each node s queue, it has a successful transmission if and only if the HOL packet is in State T. Let { π i } denote the limiting state probabilities of the Markov renewal process (X h,v h ). Service rate: π i = π i τ i j S π j τ j, i S, S is the state space of X h. The node throughput is determined by the service rate when each node s queue is saturated. Let D i denote the time spent from the beginning of State i until the service completion. Service time distribution: The probability generating function of D i, G Di (z), can be calculated based on the Markov renewal process of HOL packet. The service time of each node s queue is also the access delay of each packet. Lin Dai (City University of Hong Kong) Massive Random Access: Fundamental Limits, Optimal Design, March, and Applications to M2M / 64 C

29 Network Steady-state Points The network steady-state points are characterized based on the fixed-point equations of the limiting probability of successful transmission of HOL packets, p = lim t p t. Given that the network is in unsaturated or saturated conditions, different fixed-point equations of p can be established. The fixed-point equation of p in unsaturated conditions may have multiple roots, but not all of them are steady-state points. Lin Dai (City University of Hong Kong) Massive Random Access: Fundamental Limits, Optimal Design, March, and Applications to M2M / 64 C

30 Network Throughput The network throughput is defined as the average number of successfully transmitted packets of the network per time slot. Network Throughput ˆλ out = { aggregate input rate nλ aggregate service rate n π T unsaturated saturated. The maximum network throughput: max {qi } ˆλ out. Lin Dai (City University of Hong Kong) Massive Random Access: Fundamental Limits, Optimal Design, March, and Applications to M2M / 64 C

31 Access Delay The access delay of each packet is the service time of each node s queue. Moments of access delay can be obtained from the probability generating function of service time. The minimum mean access delay: min {qi }E[D]. Lin Dai (City University of Hong Kong) Massive Random Access: Fundamental Limits, Optimal Design, March, and Applications to M2M / 64 C

32 Sum Rate The sum rate is defined as the average number of successfully transmitted information bits of the network per time slot. Let R denote the information encoding rate of each packet. The network sum rate R s = R ˆλ out. The maximum sum rate: max R,{qi }R s. Lin Dai (City University of Hong Kong) Massive Random Access: Fundamental Limits, Optimal Design, March, and Applications to M2M / 64 C

33 Summary The key to node-centric modeling lies in proper characterization of 1) the state transition process of each HOL packet, and 2) the steady-state probability of successful transmission of HOL packets. Based on the proposed unified analytical framework, effects of key parameters on a wide range of performance metrics such as network throughput, access delay and sum rate, of various random-access networks can be evaluated in a systematic manner. The proposed analytical framework can further facilitate performance optimization to reveal the fundamental limits of random-access networks, and to show how to properly set the key system parameters to achieve the limiting performance. Lin Dai (City University of Hong Kong) Massive Random Access: Fundamental Limits, Optimal Design, March, and Applications to M2M / 64 C

34 Application to WiFi (IEEE ) Networks Lin Dai (City University of Hong Kong) Massive Random Access: Fundamental Limits, Optimal Design, March, and Applications to M2M / 64 C

35 Distributed Coordination Function (DCF) of IEEE Networks Carrier Sense Multiple Access (CSMA) with Binary Exponential Backoff (BEB). Two access mechanisms: basic access and request-to-send/clear-to-send (RTS/CTS) access. Lin Dai (City University of Hong Kong) Massive Random Access: Fundamental Limits, Optimal Design, March, and Applications to M2M / 64 C

36 Basic Access and RTS/CTS Access Basic Access: node A DIFS packet transmission SIFS ACK DIFS packet transmission DIFS node B DIFS busy channel DIFS packet transmission DIFS RTS/CTS Access: node A DIFS RTS SIFS CTS SIFS packet transmission SIFS ACK DIFS RTS DIFS node B DIFS busy channel DIFS RTS DIFS Lin Dai (City University of Hong Kong) Massive Random Access: Fundamental Limits, Optimal Design, March, and Applications to M2M / 64 C

37 Backoff Choose a random value from {0,...,W i 1}, where W i is the backoff window size after the i-th collision, i = 0,1,... Count down when the channel is idle. Binary Exponential Backoff (BEB): W i = W 2 min(i,k), where K is the cutoff phase. Lin Dai (City University of Hong Kong) Massive Random Access: Fundamental Limits, Optimal Design, March, and Applications to M2M / 64 C

38 Modeling of IEEE DCF Networks Node-Centric Modeling State characterization of Head-of-Line (HOL) packet T p t p t p t p t R 0 R 1... R K-1 R K pt 1-p 1 1 t 1-p t 1-p t 1 F 0 F 1... F K-1 F K Characterization of network steady-state points is based on the fixed-point equations of limiting probability of successful transmission of HOL packets p = lim t p t. Lin Dai (City University of Hong Kong) Massive Random Access: Fundamental Limits, Optimal Design, March, and Applications to M2M / 64 C

39 State Characterization of HOL Packets: State T State T: The HOL packet makes a successful transmission. Mean holding time τ T (in unit of time slots) at State T depends on the access mechanism. Basic Access: PHY MAC Packet Payload SIFS ACK DIFS τ Basic T RTS/CTS Access: = PHY+MAC+Payload+SIFS+ACK+DIFS slot time RTS SIFS CTS SIFS PHY MAC Packet Payload SIFS ACK DIFS τ RTS T = RTS+SIFS+CTS+SIFS+PHY+MAC+Payload+SIFS+ACK+DIFS slot time Lin Dai (City University of Hong Kong) Massive Random Access: Fundamental Limits, Optimal Design, March, and Applications to M2M / 64 C

40 State Characterization of HOL Packets: State F i State F i : The HOL packet experiences a failure. Mean holding time τ F (in unit of time slots) at State F i depends on the access mechanism. Basic Access: PHY MAC Packet Payload DIFS τ Basic F = PHY+MAC+Payload+DIFS slot time RTS/CTS Access: RTS DIFS τ RTS F = RTS+DIFS slot time Lin Dai (City University of Hong Kong) Massive Random Access: Fundamental Limits, Optimal Design, March, and Applications to M2M / 64 C

41 State Characterization of HOL Packets: State R i State R i : The HOL packet waits to request a transmission. Mean holding time τ Ri (in unit of time slots) at State R i depends on the backoff window size W i. t 1 W i t 1 W t i t W W i i B t t 0 B 1 B t 2... t B W 1 1 t 1 1 t 1 t 1 t 1 i τ Ri = 1 2α (1+W i), where α = lim t α t is the limiting probability of 1 sensing the channel idle, which is given by α = 1+τ F τ F p (τ T τ F )plnp. Lin Dai (City University of Hong Kong) Massive Random Access: Fundamental Limits, Optimal Design, March, and Applications to M2M / 64 C

42 Network Steady-State Points Desired steady-state point p L ( {W 0 p L =exp ˆλ(1+τ F )/τ T 1 (1 τ F /τ T )ˆλ exp { }) } ˆλτ F /τ T ˆλτ F /τ T +. 1 (1 τ F /τ T )ˆλ 1 (1 τ F /τ T )ˆλ p L is determined by the aggregate input rate ˆλ, and the holding time in successful transmission and collision states, τ T and τ F. Undesired steady-state point p A When the network becomes saturated, it shifts to the undesired stable point p A, which is the root of the following fixed-point equation: p = exp W 2n ( ( p 2p p 2p 1 )(2(1 p)) K). p A is determined by the network size n and the backoff parameters, i.e., initial backoff window size W and the cutoff phase K. W 0 (.) is the principal branch of the Lambert W function. Lin Dai (City University of Hong Kong) Massive Random Access: Fundamental Limits, Optimal Design, March, and Applications to M2M / 64 C

43 Maximum Network Throughput The maximum network throughput ˆλ max of IEEE DCF networks is ) 1 W 0 ( e(1+1/τ F ) ˆλ max = ). 1 τ F /τ T (1 τ F /τ T )W 0 ( e(1+1/τ F ) The optimal initial backoff widow size W m for achieving ˆλ max is ( ) 4(1+τ F) 1 τ F W 0 e(1+1/τ F ) 2 W m = n ( ) ( ( )). 1+τ F 1 τ F W 0 e(1+1/τ F ) ln 1+τ F 1 τ F W 0 e(1+1/τ F ) To achieve the maximum network throughput, the initial backoff window size should be linearly increased with the network size n. Lin Dai (City University of Hong Kong) Massive Random Access: Fundamental Limits, Optimal Design, March, and Applications to M2M / 64 C

44 Maximum Network Throughput: Basic Access versus RTS/CTS Access Table : Parameter Setting (802.11n) Packet payload 4096B MAC header 36B PHY header 20µs ACK 14B+PHY header RTS 20B+PHY header CTS 14B+PHY header Slot Time 9µs SIFS 16µs DIFS 34µs Basic Rate 6 Mbps Data Rate 57.8 Mbps Basic Access τt Basic τf Basic ˆλ Basic = 75.7 time slots and = 69.5 time slots. max = = 10.4n. W Basic m RTS/CTS Access τt RTS τf RTS ˆλ RTS = 88.7 time slots and = 9 time slots. max = = 2.7n. W RTS m Lin Dai (City University of Hong Kong) Massive Random Access: Fundamental Limits, Optimal Design, March, and Applications to M2M / 64 C

45 Access Delay D 0 : Service time of HOL packets (which is also the access delay of packets). Based on the state transition of HOL packets, we can obtain the probability generating function G D0 (z), from which the n-th moment of D 0 can be derived, n = 1,2,... Lin Dai (City University of Hong Kong) Massive Random Access: Fundamental Limits, Optimal Design, March, and Applications to M2M / 64 C

46 Access Delay Mean Access Delay: j=i+1 E[D 0 ]=τ T + 1 p p τ F+ 1+τ F τ F p (τ T τ F )plnp 2 ( K 1 ) (1 p) i W i + (1 p)k W K + 1. p p i=0 Second Moment of Access Delay: E[D0]= 2 3+p 3αp ( ) ( 2 6α 2 p 2 + α +(2 p)τ (1 p)τf F p 2 + τ T + 2(1 p) τ F + 1 ) τ T p αp ( 1 α + 2α ) 2α 2 p +pτ T+(1 p)τ F (1 p) i W i + 1 ( τ F + 1 ) αp α 2α i=0 i=0 (1 p) j W j + 1 3α 2 (1 p) i Wi α 2 W i (1 p) j W j. i=0 i=0 j=i+1 Lin Dai (City University of Hong Kong) Massive Random Access: Fundamental Limits, Optimal Design, March, and Applications to M2M / 64 C

47 Mean Access Delay with BEB At the desired steady-state point p L 1 E[D 0,p=pL ] = τ T + 1+W 2. At the undesired steady-state point p A ( 1 p A E[D 0,p=pA ]= τ T +τ F +(1+τ F (1 p A ) (1 τ F )p A lnp A ) p A ( 1 + W ( ( 1 1 2p A 2 2p A ))) )(2(1 p A )) K. p A 2p A 1 E[D 0,p=pA ] is inversely proportional to the network throughput. min W E[D 0,p=pA ]= n ˆλ max, which is achieved when W = W m. Lin Dai (City University of Hong Kong) Massive Random Access: Fundamental Limits, Optimal Design, March, and Applications to M2M / 64 C

48 Second Moment of Access Delay with BEB At the undesired stable point p A E[D 2,K= 0,p=p A ] = when W 4n 3ln n # of packets in the buffer capture time(s) Capture phenomenon: Some node captures the channel and produces a continuous stream of packets, while others have to wait for a long time. Poor queueing delay performance Short-term unfairness Lin Dai (City University of Hong Kong) Massive Random Access: Fundamental Limits, Optimal Design, March, and Applications to M2M / 64 C

49 Effect of Backoff In general, a backoff scheme can be characterized by a sequence of backoff window sizes {W i }. With a monotonic increasing sequence of backoff window sizes {W i }, the limiting growth rate of backoff window size is W i+1 lim 1. i W i Accordingly, we can divide the backoff schemes into two categories: Aggressive Backoff: lim i W i+1 W i > 1. Mild Backoff: lim i W i+1 W i = 1. Lin Dai (City University of Hong Kong) Massive Random Access: Fundamental Limits, Optimal Design, March, and Applications to M2M / 64 C

50 Tradeoff between Throughput and Delay Theorem The maximum network throughput ˆλ max is given by ) 1 W 0 ( e(1+1/τ F ) ˆλ max = ). 1 τ F /τ T (1 τ F /τ T )W 0 ( e(1+1/τ F ) Corollary ˆλ max is achievable as n if and only if K = and lim i W i+1 W i > 1. Theorem If lim i W i+1 W i W lim i+1 i W i n > n. = 1, E[D 2,K= 0,p=p A ] < for any finite n < ; otherwise, if > 1, there exists n < such that E[D 2,K= 0,p=p A ] = when Lin Dai (City University of Hong Kong) Massive Random Access: Fundamental Limits, Optimal Design, March, and Applications to M2M / 64 C

51 Tradeoff between Throughput and Delay Both aggressive backoff and mild backoff have the same maximum network throughput ˆλ max, which is solely determined by the access mechanism, i.e., the basic access or the RTS/CTS access. With aggressive backoff schemes, the maximum network throughput can be achieved even as the network size n goes to infinity. But an infinite second moment of access delay may be incurred if the network size exceeds a certain threshold. Mild backoff schemes can reach a better balance: The maximum network throughput and a bounded second moment of access delay can both be achieved as long as the network size is finite. Lin Dai (City University of Hong Kong) Massive Random Access: Fundamental Limits, Optimal Design, March, and Applications to M2M / 64 C

52 2 Comparison of BEB and Quadratic Backoff (QB): Fairness and Second Moment of Access Delay QB QB BEB EIED W=32 W=128 Analysis Simulation Analysis Simulation Simulation F t BEB EIED EILD(d=64) EILD(d=32) E [ D ] p p A 0, t (second) K Jain s Fairness Index F t versus time t in saturated IEEE DCF networks with BEB, QB, EIED and EILD. W = 32, K = 6 and n = 50. Second moment of access delay E[D 2 0,p=p A ] versus cutoff phase K in saturated IEEE DCF networks with BEB, QB and EIED. n = 50. Lin Dai (City University of Hong Kong) Massive Random Access: Fundamental Limits, Optimal Design, March, and Applications to M2M / 64 C

53 Further Extensions From homogeneous to heterogeneous: Distinct traffic input rates: [Gao-Sun-Dai 13] Distinct priority levels: [Gao-Sun-Dai 14] Distinct data transmission rates: [Sun-Dai 17] From infinite retry limit to finite retry limit: [Sun-Dai 16] From single access point to multiple access points: [Gao-Dai-Hei 17] Lin Dai (City University of Hong Kong) Massive Random Access: Fundamental Limits, Optimal Design, March, and Applications to M2M / 64 C

54 Application to M2M in LTE Networks Lin Dai (City University of Hong Kong) Massive Random Access: Fundamental Limits, Optimal Design, March, and Applications to M2M / 64 C

55 Random Access Process of LTE Networks Connection-based Random Access In LTE networks, a connection would first be established between a device and the base station (BS) before the device starts to transmit its data packets. The connection-based random access adopted in the LTE networks differs from the conventional packet-based random access in that the data packets do not contend for the channel individually. Instead, each device with data packets to transmit first sends a connection request to the BS, and if a device s request is successfully received, then the BS will allocate resource blocks for the device to clear its data queue. Lin Dai (City University of Hong Kong) Massive Random Access: Fundamental Limits, Optimal Design, March, and Applications to M2M / 64 C

56 Random Access Process of LTE Networks Periodical PRACH Subframes Orthogonal Preambles Each device randomly chooses one out of M orthogonal preambles. If more than one devices transmit the same preamble over the same PRACH subframe, then a collision occurs and all of them fail. Lin Dai (City University of Hong Kong) Massive Random Access: Fundamental Limits, Optimal Design, March, and Applications to M2M / 64 C

57 Random Access Process of LTE Networks ACB Check and Uniform Backoff ACB check: Each access request is transmitted with probability q. That is, a random number between 0 and 1 is generated, and compared with the ACB factor q (0,1]. If the number is less than q, then the access request is transmitted. Otherwise, it is barred temporarily. Uniform Backoff: If an access request is transmitted but involved in a collision, then it randomly selects a value from [0,W], and counts down until it reaches zero. Lin Dai (City University of Hong Kong) Massive Random Access: Fundamental Limits, Optimal Design, March, and Applications to M2M / 64 C

58 Network Throughput Focus on the average number of devices that can successfully access the BS per PRACH subframe. Network throughput is defined as the average number of successful access requests per time slot (a time slot is defined as the interval between two consecutive PRACH subframes). How to properly tune the ACB factor q and the uniform backoff window size W to maximize the network throughput? Lin Dai (City University of Hong Kong) Massive Random Access: Fundamental Limits, Optimal Design, March, and Applications to M2M / 64 C

59 Node-centric Modeling Double-queue Model of Each Device n Each device has one data queue and one request queue. Each newly arrival data packet generates an access request, but only one request can be kept since each device can have at most one ongoing access request regardless of how many data packets in its buffer. Upon successful transmission of the access request, the BS will assign sufficient resources for the device to clear its data buffer. Lin Dai (City University of Hong Kong) Massive Random Access: Fundamental Limits, Optimal Design, March, and Applications to M2M / 64 C

60 Node-centric Modeling State Characterization of Access Request q 1 p / W t qp t 1 pt qp t 1 q q T 0 W 1 2 W p 1 t 1 q q W q 1 p / W t Characterization of network steady-state points is based on the fixed-point equations of limiting probability of successful transmission of access requests p = lim t p t. Lin Dai (City University of Hong Kong) Massive Random Access: Fundamental Limits, Optimal Design, March, and Applications to M2M / 64 C

61 Maximum Network Throughput and Optimal Setting The maximum network throughput ˆλ M max = Me 1, where M is the number of orthogonal preambles. The optimal ACB factor q,m and uniform backoff window size W,M should satisfy ( ) e 1 q,m 2 W,M 1 = n M e 1 λ. (1) where n is the total number of devices, and λ is the traffic input rate of each device. W = 1: q,m W=1 = λ nλ M e 1. ( ) n q = 1: W,M 2 q=1 = M e 1 λ e 1 Lin Dai (City University of Hong Kong) Massive Random Access: Fundamental Limits, Optimal Design, March, and Applications to M2M / 64 C

62 Maximum Network Throughput and Optimal Setting 10 1 ˆM 10 1 max 10e ˆM 6 1 max 6e 10 0 *, M q qw 1 Analysis Simulation 10-1 M= *, M W Wq 1 Analysis Simulation ˆM out M=6 q 1, W 8 1 Analysis Simulation 10-5 q 0.5, W 21 Analysis Simulation n With the standard setting (fixed q and W): The network throughput quickly deteriorates as the number of devices n increases. With the optimal setting: The maximum network throughput ˆλ M max can always be achieved, which does not vary with the number of devices n. Lin Dai (City University of Hong Kong) Massive Random Access: Fundamental Limits, Optimal Design, March, and Applications to M2M / 64 C

63 Summary The proposed unified analytical framework for random access has been successfully applied to WiFi and LTE networks. The modeling complexity is independent of the number of nodes even with the queueing behavior of each node taken into consideration, which is highly attractive in the massive access scenario. The analysis reveals how to optimally tune the backoff parameters based on the statistical information such as the traffic input rate of each node and the total number of nodes, which is crucial for random-access networks especially when the number of nodes is large. Lin Dai (City University of Hong Kong) Massive Random Access: Fundamental Limits, Optimal Design, March, and Applications to M2M / 64 C

64 The End Thank You! Lin Dai (City University of Hong Kong) Massive Random Access: Fundamental Limits, Optimal Design, March, and Applications to M2M / 64 C

P B 1-P B ARRIVE ATTEMPT RETRY 2 1-(1-P RF ) 2 1-(1-P RF ) 3 1-(1-P RF ) 4. Figure 1: The state transition diagram for FBR.

P B 1-P B ARRIVE ATTEMPT RETRY 2 1-(1-P RF ) 2 1-(1-P RF ) 3 1-(1-P RF ) 4. Figure 1: The state transition diagram for FBR. 1 Analytical Model In this section, we will propose an analytical model to investigate the MAC delay of FBR. For simplicity, a frame length is normalized as a time unit (slot). 1.1 State Transition of

More information

2 Related Work. 1 Introduction. 3 Background

2 Related Work. 1 Introduction. 3 Background Modeling the Performance of A Wireless Node in Multihop Ad-Hoc Networks Ping Ding, JoAnne Holliday, Aslihan Celik {pding, jholliday, acelik}@scu.edu Santa Clara University Abstract: In this paper, we model

More information

Mohammad Hossein Manshaei 1393

Mohammad Hossein Manshaei 1393 Mohammad Hossein Manshaei manshaei@gmail.com 1393 1 An Analytical Approach: Bianchi Model 2 Real Experimentations HoE on IEEE 802.11b Analytical Models Bianchi s Model Simulations ns-2 3 N links with the

More information

B. Bellalta Mobile Communication Networks

B. Bellalta Mobile Communication Networks IEEE 802.11e : EDCA B. Bellalta Mobile Communication Networks Scenario STA AP STA Server Server Fixed Network STA Server Upwnlink TCP flows Downlink TCP flows STA AP STA What is the WLAN cell performance

More information

Comparison of pre-backoff and post-backoff procedures for IEEE distributed coordination function

Comparison of pre-backoff and post-backoff procedures for IEEE distributed coordination function Comparison of pre-backoff and post-backoff procedures for IEEE 802.11 distributed coordination function Ping Zhong, Xuemin Hong, Xiaofang Wu, Jianghong Shi a), and Huihuang Chen School of Information Science

More information

An Efficient Scheduling Scheme for High Speed IEEE WLANs

An Efficient Scheduling Scheme for High Speed IEEE WLANs An Efficient Scheduling Scheme for High Speed IEEE 802.11 WLANs Juki Wirawan Tantra, Chuan Heng Foh, and Bu Sung Lee Centre of Muldia and Network Technology School of Computer Engineering Nanyang Technological

More information

A Backoff Algorithm for Improving Saturation Throughput in IEEE DCF

A Backoff Algorithm for Improving Saturation Throughput in IEEE DCF A Backoff Algorithm for Improving Saturation Throughput in IEEE 80.11 DCF Kiyoshi Takahashi and Toshinori Tsuboi School of Computer Science, Tokyo University of Technology, 1404-1 Katakura, Hachioji, Tokyo,

More information

Title. Author(s)Nguyen, Thi Xuan My; Saivichit, Chaiyachet; Miyanaga. Issue Date Doc URL. Type. Note. File Information

Title. Author(s)Nguyen, Thi Xuan My; Saivichit, Chaiyachet; Miyanaga. Issue Date Doc URL. Type. Note. File Information Title Performance Analysis for Total Delay and Total Packe Author(s)Nguyen, Thi Xuan My; Saivichit, Chaiyachet; Miyanaga Proceedings : APSIPA ASC 2009 : Asia-Pacific Signal Citationand Conference: 791-796

More information

Performance Analysis of WLANs Under Sporadic Traffic

Performance Analysis of WLANs Under Sporadic Traffic Performance Analysis of 802.11 WLANs Under Sporadic Traffic M. Garetto and C.-F. Chiasserini Dipartimento di Elettronica, Politecnico di Torino, Italy Abstract. We analyze the performance of 802.11 WLANs

More information

Analysis of Throughput and Energy Efficiency in the IEEE Wireless Local Area Networks using Constant backoff Window Algorithm

Analysis of Throughput and Energy Efficiency in the IEEE Wireless Local Area Networks using Constant backoff Window Algorithm International Journal of Computer Applications (975 8887) Volume 6 No.8, July Analysis of Throughput and Energy Efficiency in the IEEE 8. Wireless Local Area Networks using Constant backoff Window Algorithm

More information

298 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 15, NO. 1, JANUARY 2016

298 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 15, NO. 1, JANUARY 2016 298 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 5, NO., JANUARY 206 Hybrid Network Coding for Unbalanced Slotted ALOHA Relay Networks Shijun Lin, Member, IEEE, Liqun Fu, Member, IEEE, Jianmin Xie,

More information

Evaluation of the backoff procedure of Homeplug MAC vs. DCF

Evaluation of the backoff procedure of Homeplug MAC vs. DCF Evaluation of the backoff procedure of Homeplug MAC vs. DCF Cristina Cano and David Malone Hamilton Institute National University of Ireland, Maynooth Co. Kildare, Ireland Email: {cristina.cano,david.malone}@nuim.ie

More information

AGOOD medium access control (MAC) protocol for wireless

AGOOD medium access control (MAC) protocol for wireless IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 3, NO. 3, MAY 2004 793 Design of MAC Protocols With Fast Collision Resolution for Wireless Local Area Networks Younggoo Kwon, Yuguang Fang, Senior Member,

More information

Priority Collision Resolution - Distributed Coordination Function for Distributed Wireless Networks

Priority Collision Resolution - Distributed Coordination Function for Distributed Wireless Networks Priority Collision Resolution - Distributed Coordination Function for Distributed Wireless etworks Xiaohui Ye *, Xin Liu #, S. J. Ben Yoo *, and Zhi Ding * * Department of Electrical and Computer Engineering,

More information

Analysis of the Stability and Performance of Exponential Backoff

Analysis of the Stability and Performance of Exponential Backoff Analysis of the Stability and Performance of Exponential Backoff Byung-Jae Kwak bjkwak@antd.nist.gov Nah-Oak Song nsong@antd.nist.gov Leonard E. Miller lmiller@antd.nist.gov Abstract New analytical results

More information

Characterising the Behaviour of IEEE Broadcast Transmissions in Ad Hoc Wireless LANs

Characterising the Behaviour of IEEE Broadcast Transmissions in Ad Hoc Wireless LANs University of Wollongong Research Online Faculty of Informatics - Papers (Archive) Faculty of Engineering and Information Sciences 2009 Characterising the Behaviour of IEEE 802.11 Broadcast Transmissions

More information

Impact of IEEE MAC Packet Size on Performance of Wireless Sensor Networks

Impact of IEEE MAC Packet Size on Performance of Wireless Sensor Networks IOSR Journal of Electronics and Communication Engineering (IOSR-JECE) e-issn: 2278-2834,p- ISSN: 2278-8735.Volume 10, Issue 3, Ver. IV (May - Jun.2015), PP 06-11 www.iosrjournals.org Impact of IEEE 802.11

More information

Fu-Yi Hung ALL RIGHTS RESERVED

Fu-Yi Hung ALL RIGHTS RESERVED 009 Fu-Yi Hung ALL RIGHTS RESERVED PERFORMANCE ANALYSIS OF THE IEEE 80.-BASED WIRELESS NETWORKS IN THE PRESENCE OF HIDDEN STATIONS by FU-YI HUNG A Dissertation submitted to the Graduate School-New Brunswick

More information

NMA Radio Networks Network Level: Medium Access Control Roberto Verdone

NMA Radio Networks Network Level: Medium Access Control Roberto Verdone NMA Radio Networks Network Level: Medium Access Control Roberto Verdone Outline 1. Introduction 2. Fundamentals of Random MAC Aloha in Compact Networks Slotted Aloha in Compact Networks CSMA in Compact

More information

Numerical Analysis of IEEE Broadcast Scheme in Multihop Wireless Ad Hoc Networks

Numerical Analysis of IEEE Broadcast Scheme in Multihop Wireless Ad Hoc Networks Numerical Analysis of IEEE 802.11 Broadcast Scheme in Multihop Wireless Ad Hoc Networks Jong-Mu Choi 1, Jungmin So 2, and Young-Bae Ko 1 1 School of Information and Computer Engineering Ajou University,

More information

Spatial Clustering in Slotted ALOHA Two-Hop Random Access for Machine Type Communication

Spatial Clustering in Slotted ALOHA Two-Hop Random Access for Machine Type Communication Spatial Clustering in Slotted ALOHA Two-Hop Random Access for Machine Type Communication Ziwen Zhao, Sebastian S. Szyszkowicz, Tamer Beitelmal, Halim Yanikomeroglu Carleton University Ottawa, Canada Contents

More information

Wireless MACs: MACAW/802.11

Wireless MACs: MACAW/802.11 Wireless MACs: MACAW/802.11 Mark Handley UCL Computer Science CS 3035/GZ01 Fundamentals: Spectrum and Capacity A particular radio transmits over some range of frequencies; its bandwidth, in the physical

More information

Exploiting Multi-User Diversity in Wireless LANs with Channel-Aware CSMA/CA

Exploiting Multi-User Diversity in Wireless LANs with Channel-Aware CSMA/CA Exploiting Multi-User Diversity in Wireless LANs with Channel-Aware CSMA/CA Xiaowei Wang, Mahsa Derakhshani, Tho Le-Ngoc Department of Electrical & Computer Engineering, McGill University, Montreal, QC,

More information

Multiple Access Links and Protocols

Multiple Access Links and Protocols Multiple Access Links and Protocols Two types of links : point-to-point PPP for dial-up access point-to-point link between Ethernet switch and host broadcast (shared wire or medium) old-fashioned Ethernet

More information

A Novel Contention Window Control Scheme Based on a Markov Chain Model in Dense WLAN Environment

A Novel Contention Window Control Scheme Based on a Markov Chain Model in Dense WLAN Environment 05 Third International Conference on Artificial Intelligence, Modelling and Simulation A Novel Contention Window Control Scheme Based on a Markov Chain Model in Dense WLAN Environment Yoshiaki Morino,

More information

Performance anomaly of b

Performance anomaly of b Laboratoire LSR Logiciels Systèmes Réseaux Software, Systems, Networks Performance anomaly of 802.11b Andrzej Duda LSR-IMAG Andrzej.Duda@imag.fr Joint work with Martin Heusse, Franck Rousseau, Gilles Berger-Sabbatel

More information

Chapter 6 Medium Access Control Protocols and Local Area Networks

Chapter 6 Medium Access Control Protocols and Local Area Networks Chapter 6 Medium Access Control Protocols and Local Area Networks Part I: Medium Access Control Part II: Local Area Networks CSE 3213, Winter 2010 Instructor: Foroohar Foroozan Chapter Overview Broadcast

More information

Analytical Model for an IEEE WLAN using DCF with Two Types of VoIP Calls

Analytical Model for an IEEE WLAN using DCF with Two Types of VoIP Calls Analytical Model for an IEEE 802.11 WLAN using DCF with Two Types of VoIP Calls Sri Harsha Anurag Kumar Vinod Sharma Department of Electrical Communication Engineering Indian Institute of Science Bangalore

More information

Link Layer II: MACA and MACAW

Link Layer II: MACA and MACAW Link Layer II: MACA and MACAW COS 463: Wireless Networks Lecture 5 Kyle Jamieson [Parts adapted from J. Kurose, K. Ross, D. Holmar] Medium access: Timeline Packet radio Wireless LAN Wired LAN ALOHAnet

More information

Reliable Multicast Scheme Based on Busy Signal in Wireless LANs

Reliable Multicast Scheme Based on Busy Signal in Wireless LANs Journal of Modern Science and Technology Vol.2 No.1 March 2014. Pp.18-25 Reliable Multicast Scheme Based on Busy Signal in Wireless LANs Sunmyeng For unicast transmissions, the IEEE 802.11 WLAN MAC (Medium

More information

878 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 16, NO. 4, AUGUST 2008

878 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 16, NO. 4, AUGUST 2008 878 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 16, NO. 4, AUGUST 2008 Modeling Queueing and Channel Access Delay in Unsaturated IEEE 802.11 Random Access MAC Based Wireless Networks Omesh Tickoo and Biplab

More information

Investigating MAC-layer Schemes to Promote Doze Mode in based WLANs

Investigating MAC-layer Schemes to Promote Doze Mode in based WLANs Investigating MAC-layer Schemes to Promote Doze Mode in 802.11-based WLANs V. Baiamonte and C.-F. Chiasserini CERCOM - Dipartimento di Elettronica Politecnico di Torino Torino, Italy Email: baiamonte,chiasserini

More information

Wireless Networking & Mobile Computing

Wireless Networking & Mobile Computing Wireless Networking & Mobile Computing CS 752/852 - Spring 2012 Lec #4: Medium Access Control - II Tamer Nadeem Dept. of Computer Science IEEE 802.11 Standards Page 2 Spring 2012 CS 752/852 - Wireless

More information

Wireless Networks (MAC)

Wireless Networks (MAC) 802.11 Wireless Networks (MAC) Kate Ching-Ju Lin ( 林靖茹 ) Academia Sinica 2016.03.18 CSIE, NTU Reference 1. A Technical Tutorial on the IEEE 802.11 Protocol By Pablo Brenner online: http://www.sss-mag.com/pdf/802_11tut.pdf

More information

Protocols for Multiaccess Networks

Protocols for Multiaccess Networks Protocols for Multiaccess Networks Hosts broadcast packets When a collision occurs, all transmitted packets are lost Lost packets have to be retransmitted => Need Multiaccess Protocol Model - Slotted Aloha

More information

CSE 461: Wireless Networks

CSE 461: Wireless Networks CSE 461: Wireless Networks Wireless IEEE 802.11 A physical and multiple access layer standard for wireless local area networks (WLAN) Ad Hoc Network: no servers or access points Infrastructure Network

More information

Mohamed Khedr.

Mohamed Khedr. Mohamed Khedr http://webmail.aast.edu/~khedr Tentatively Week 1 Week 2 Week 3 Week 4 Week 5 Week 6 Week 7 Week 8 Week 9 Week 10 Week 11 Week 12 Week 13 Week 14 Week 15 Overview Packet Switching IP addressing

More information

ICE 1332/0715 Mobile Computing (Summer, 2008)

ICE 1332/0715 Mobile Computing (Summer, 2008) ICE 1332/0715 Mobile Computing (Summer, 2008) Medium Access Control Prof. Chansu Yu http://academic.csuohio.edu/yuc/ Simplified Reference Model Application layer Transport layer Network layer Data link

More information

A Framework for Femtocells to Access Both Licensed and Unlicensed Bands

A Framework for Femtocells to Access Both Licensed and Unlicensed Bands Indoor and Outdoor Femto Cells A Framework for Femtocells to Access Both Licensed and Unlicensed Bands Feilu Liu, Erdem Bala, Elza Erkip and Rui Yang ECE Department, Polytechnic Institute of NYU, Brooklyn,

More information

Lecture 16: QoS and "

Lecture 16: QoS and Lecture 16: QoS and 802.11" CSE 123: Computer Networks Alex C. Snoeren HW 4 due now! Lecture 16 Overview" Network-wide QoS IntServ DifServ 802.11 Wireless CSMA/CA Hidden Terminals RTS/CTS CSE 123 Lecture

More information

TSIN01 Information Networks Lecture 8

TSIN01 Information Networks Lecture 8 TSIN01 Information Networks Lecture 8 Danyo Danev Division of Communication Systems Department of Electrical Engineering Linköping University, Sweden September 24 th, 2018 Danyo Danev TSIN01 Information

More information

Resource Allocation in Contention-Based WiFi Networks

Resource Allocation in Contention-Based WiFi Networks The 2011 Santa Barbara Control Workshop Resource Allocation in Contention-Based WiFi Networks Laura Giarré Universita di Palermo (giarre@unipa.it) Joint works with I. Tinnirello (Università di Palermo),

More information

AN ANALYSIS OF THE MODIFIED BACKOFF MECHANISM FOR IEEE NETWORKS

AN ANALYSIS OF THE MODIFIED BACKOFF MECHANISM FOR IEEE NETWORKS AN ANALYSIS OF THE MODIFIED BACKOFF MECHANISM FOR IEEE 802.11 NETWORKS Marek Natkaniec, Andrzej R. Pach Department of Telecommunications University of Mining and Metallurgy al. Mickiewicza 30, 30-059 Cracow

More information

Medium Access Control. MAC protocols: design goals, challenges, contention-based and contention-free protocols

Medium Access Control. MAC protocols: design goals, challenges, contention-based and contention-free protocols Medium Access Control MAC protocols: design goals, challenges, contention-based and contention-free protocols 1 Why do we need MAC protocols? Wireless medium is shared Many nodes may need to access the

More information

THE demand for wireless connectivity has been

THE demand for wireless connectivity has been 1 Activity Probability-Based Performance Analysis and Contention Control for IEEE 802.11 WLANs Junsu Choi, Student Member, IEEE, Seongho Byeon, Student Member, IEEE, Sunghyun Choi, Fellow, IEEE, and Kwang

More information

The MAC layer in wireless networks

The MAC layer in wireless networks The MAC layer in wireless networks The wireless MAC layer roles Access control to shared channel(s) Natural broadcast of wireless transmission Collision of signal: a /space problem Who transmits when?

More information

The MAC layer in wireless networks

The MAC layer in wireless networks The MAC layer in wireless networks The wireless MAC layer roles Access control to shared channel(s) Natural broadcast of wireless transmission Collision of signal: a time/space problem Who transmits when?

More information

June 20th, École Polytechnique, Paris, France. A mean-field model for WLANs. Florent Cadoux. IEEE single-cell WLANs

June 20th, École Polytechnique, Paris, France. A mean-field model for WLANs. Florent Cadoux. IEEE single-cell WLANs Initial Markov under Bianchi s École Polytechnique, Paris, France June 20th, 2005 Outline Initial Markov under Bianchi s 1 2 Initial Markov under Bianchi s 3 Outline Initial Markov under Bianchi s 1 2

More information

A Comparative Analysis on Backoff Algorithms to Optimize Mobile Network

A Comparative Analysis on Backoff Algorithms to Optimize Mobile Network Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 7, July 2014, pg.771

More information

Performance Study of IEEE DCF and IEEE e EDCA

Performance Study of IEEE DCF and IEEE e EDCA 4 erformance Study of IEEE 802. DCF and IEEE 802.e EDCA Giuseppe Bianchi a, Sunghyun Choi b and Ilenia Tinnirello c 4. Introduction One of the key factors for the wide acceptance and deployment of IEEE

More information

Some Optimization Trade-offs in Wireless Network Coding

Some Optimization Trade-offs in Wireless Network Coding Some Optimization Trade-offs in Wireless Network Coding Yalin Evren Sagduyu and Anthony Ephremides Electrical and Computer Engineering Department and Institute for Systems Research University of Maryland,

More information

Can Multiple Subchannels Improve the Delay Performance of RTS/CTS-based MAC Schemes?

Can Multiple Subchannels Improve the Delay Performance of RTS/CTS-based MAC Schemes? Can Multiple Subchannels Improve the Delay Performance of RTS/CTS-based MAC Schemes? By: Jing Deng, Yunghsiang S. Han, and Sanjeev R. Kulkarni. J. Deng, Y. S. Han, and S. R. Kulkarni, "Can Multiple Subchannels

More information

CMPE 257: Wireless and Mobile Networking

CMPE 257: Wireless and Mobile Networking CMPE 257: Wireless and Mobile Networking Katia Obraczka Computer Engineering UCSC Baskin Engineering Lecture 3 CMPE 257 Winter'11 1 Announcements Accessing secure part of the class Web page: User id: cmpe257.

More information

Multiple Access (1) Required reading: Garcia 6.1, 6.2.1, CSE 3213, Fall 2010 Instructor: N. Vlajic

Multiple Access (1) Required reading: Garcia 6.1, 6.2.1, CSE 3213, Fall 2010 Instructor: N. Vlajic 1 Multiple Access (1) Required reading: Garcia 6.1, 6.2.1, 6.2.2 CSE 3213, Fall 2010 Instructor: N. Vlajic Multiple Access Communications 2 Broadcast Networks aka multiple access networks multiple sending

More information

Wireless Networks (MAC) Kate Ching-Ju Lin ( 林靖茹 ) Academia Sinica

Wireless Networks (MAC) Kate Ching-Ju Lin ( 林靖茹 ) Academia Sinica 802.11 Wireless Networks (MAC) Kate Ching-Ju Lin ( 林靖茹 ) Academia Sinica Reference 1. A Technical Tutorial on the IEEE 802.11 Protocol By Pablo Brenner online: http://www.sss-mag.com/pdf/802_11tut.pdf

More information

High Performance Distributed Coordination Function for Wireless LANs

High Performance Distributed Coordination Function for Wireless LANs High Performance Distributed Coordination Function for Wireless LANs Haithem Al-Mefleh and J. Morris Chang Dept. of Electrical and Computer Engineering Iowa State University, Ames, IA 511, USA {almehai,morris}@iastate.edu

More information

Modeling of Partially Overlapping Wireless Personal Area Networks

Modeling of Partially Overlapping Wireless Personal Area Networks Modeling of Partially Overlapping Wireless Personal Area Networks 21. ComNets-Workshop Mobil- und Telekommunikation Dipl.-Ing. Holger Rosier March 16, 2012 ComNets Research Group RWTH Aachen University,

More information

A Channel Accessing Scheme with Joint Detection Receivers in Ad Hoc Networks

A Channel Accessing Scheme with Joint Detection Receivers in Ad Hoc Networks A Channel Accessing Scheme with Joint Detection Receivers in Ad Hoc Networks Sumeeth Nagaraj, Christian Schlegel High Capacity Digital Communications Lab University of Alberta, Canada. e-mail: {snagaraj,schlegel}@ece.ualberta.ca

More information

Advanced Computer Networks WLAN

Advanced Computer Networks WLAN Advanced Computer Networks 263 3501 00 WLAN Patrick Stuedi Spring Semester 2014 1 Oriana Riva, Department of Computer Science ETH Zürich Last week Outlook Medium Access COPE Short Range Wireless Networks:

More information

IEEE Medium Access Control. Medium Access Control

IEEE Medium Access Control. Medium Access Control IEEE 802.11 Medium Access Control EECS3214 3 April 2018 Medium Access Control reliable data delivery access control MAC layer covers three functional areas: security 2 1 MAC Requirements To avoid interference

More information

Collisions & Virtual collisions in IEEE networks

Collisions & Virtual collisions in IEEE networks Collisions & Virtual collisions in IEEE 82.11 networks Libin Jiang EE228a project report, Spring 26 Abstract Packet collisions lead to performance degradation in IEEE 82.11 [1] networks. The carrier-sensing

More information

. 14 Byte for Acks. Due to this fact, the overhead is more relevant if the data contained in packets is sent to high rates:

. 14 Byte for Acks. Due to this fact, the overhead is more relevant if the data contained in packets is sent to high rates: QoS in IEEE 802.11 Issues Some issues are important for quality of service: the first one mentioned is the difference of performances expired by nodes based on their position in the network. Indeed, considering

More information

Markov Chains and Multiaccess Protocols: An. Introduction

Markov Chains and Multiaccess Protocols: An. Introduction Markov Chains and Multiaccess Protocols: An Introduction Laila Daniel and Krishnan Narayanan April 8, 2012 Outline of the talk Introduction to Markov Chain applications in Communication and Computer Science

More information

Chapter 4. The Medium Access Control Sublayer. Points and Questions to Consider. Multiple Access Protocols. The Channel Allocation Problem.

Chapter 4. The Medium Access Control Sublayer. Points and Questions to Consider. Multiple Access Protocols. The Channel Allocation Problem. Dynamic Channel Allocation in LANs and MANs Chapter 4 The Medium Access Control Sublayer 1. Station Model. 2. Single Channel Assumption. 3. Collision Assumption. 4. (a) Continuous Time. (b) Slotted Time.

More information

Splitting Algorithms

Splitting Algorithms Splitting Algorithms We have seen that slotted Aloha has maximal throughput 1/e Now we will look at more sophisticated collision resolution techniques which have higher achievable throughput These techniques

More information

IEEE , Token Rings. 10/11/06 CS/ECE UIUC, Fall

IEEE , Token Rings. 10/11/06 CS/ECE UIUC, Fall IEEE 802.11, Token Rings 10/11/06 CS/ECE 438 - UIUC, Fall 2006 1 Medium Access Control Wireless channel is a shared medium Need access control mechanism to avoid interference Why not CSMA/CD? 10/11/06

More information

CHAPTER 4 CALL ADMISSION CONTROL BASED ON BANDWIDTH ALLOCATION (CACBA)

CHAPTER 4 CALL ADMISSION CONTROL BASED ON BANDWIDTH ALLOCATION (CACBA) 92 CHAPTER 4 CALL ADMISSION CONTROL BASED ON BANDWIDTH ALLOCATION (CACBA) 4.1 INTRODUCTION In our previous work, we have presented a cross-layer based routing protocol with a power saving technique (CBRP-PS)

More information

Random access with adaptive packet aggregation in LTE/LTE-A

Random access with adaptive packet aggregation in LTE/LTE-A Zhou and Nikaein EURASIP Journal on Wireless Communications and Networking (2016) 2016:36 DOI 10.1186/s13638-016-0531-6 Research Open Access Random access with adaptive packet aggregation in LTE/LTE-A

More information

A Scheme for Enhancing TCP Fairness and Throughput in IEEE WLANs

A Scheme for Enhancing TCP Fairness and Throughput in IEEE WLANs A Scheme for Enhancing TCP Fairness and Throughput in IEEE 802.11 WLANs Eun-Jong Lee 1, Hyung-Taig Lim 1, Seung-Joon Seok 2, and Chul-Hee Kang 1 1 Department of Electronics Engineering, Korea University

More information

IEEE Proof Print Version

IEEE Proof Print Version IEEE/ACM TRANSACTIONS ON NETWORKING 1 Random Access Game and Medium Access Control Design Lijun Chen, Member, IEEE, Steven H. Low, Fellow, IEEE, and John C. Doyle Abstract Motivated partially by a control-theoretic

More information

Two-phase Collision Avoidance to Improve Scalability in Wireless LANs

Two-phase Collision Avoidance to Improve Scalability in Wireless LANs Two-phase Collision Avoidance to Improve Scalability in Wireless LANs Seongil Han, Yongsub Nam, Yongho Seok, Taekyoung Kwon and Yanghee Choi School of Computer Science and Engineering Seoul National University,

More information

WLAN Performance Aspects

WLAN Performance Aspects Mobile Networks Module C- Part 1 WLAN Performance Aspects Mohammad Hossein Manshaei Jean-Pierre Hubaux http://mobnet.epfl.ch 1 Performance Evaluation of IEEE 802.11(DCF) Real Experimentations HoE on IEEE

More information

6.9 Summary. 11/20/2013 Wireless and Mobile Networks (SSL) 6-1. Characteristics of selected wireless link standards a, g point-to-point

6.9 Summary. 11/20/2013 Wireless and Mobile Networks (SSL) 6-1. Characteristics of selected wireless link standards a, g point-to-point Chapter 6 outline 6.1 Introduction Wireless 6.2 Wireless links, characteristics CDMA 6.3 IEEE 802.11 wireless LANs ( wi-fi ) 6.4 Cellular Internet Access architecture standards (e.g., GSM) Mobility 6.5

More information

Duck-Yong Yang, Tae-Jin Lee, Member, IEEE, Kyunghun Jang, Jin-Bong Chang and Sunghyun Choi, Member, IEEE. Abstract

Duck-Yong Yang, Tae-Jin Lee, Member, IEEE, Kyunghun Jang, Jin-Bong Chang and Sunghyun Choi, Member, IEEE. Abstract Performance Enhancement of Multi-Rate IEEE 802. WLANs with Geographically-Scattered Stations Duck-Yong Yang, Tae-Jin Lee, Member, IEEE, Kyunghun Jang, Jin-Bong Chang and Sunghyun Choi, Member, IEEE Abstract

More information

Design and Analysis of an Adaptive Backoff Algorithm for IEEE DCF mechanism

Design and Analysis of an Adaptive Backoff Algorithm for IEEE DCF mechanism Design and Analysis of an Adaptive Backoff Algorithm for IEEE 802.11 DCF mechanism Mouhamad Ibrahim and Sara Alouf INRIA B.P. 93 06902 Sophia Antipolis France {mibrahim,salouf}@sophia.inria.fr Abstract.

More information

Collision Free Hybrid Slot Protocol for Improving Performance in Wireless Networks

Collision Free Hybrid Slot Protocol for Improving Performance in Wireless Networks International Journal of Engineering Research and Technology. ISSN 0974-3154 Volume 11, Number 8 (2018), pp. 1285-1300 International Research Publication House http://www.irphouse.com Collision Free Hybrid

More information

A Frame Aggregation Scheduler for IEEE n

A Frame Aggregation Scheduler for IEEE n A Frame Aggregation Scheduler for IEEE 802.11n Selvam T AU-KBC Research Centre MIT campus of Anna University Chennai, India selvam@au-kbc.org Srikanth S AU-KBC Research Centre MIT Campus of Anna University

More information

Outline. Wireless Channel Characteristics. Multi-path Fading. Opportunistic Communication - with a focus on WLAN environments -

Outline. Wireless Channel Characteristics. Multi-path Fading. Opportunistic Communication - with a focus on WLAN environments - Outline Opportunistic Communication - with a focus on WLAN environments - Jong-won Lee 2006. 02.20. Background? Wireless Channels? Opportunistic communication? Examples? Basics of WLAN Previous Works?

More information

Packet multiple access and the Aloha protocol

Packet multiple access and the Aloha protocol Packet multiple access and the Aloha protocol Massachusetts Institute of Technology Department of Aeronautics and Astronautics Slide 1 Packet Multiple Access PMA SHARED UPLINK TERMINAL TERMINAL APPL TRANS

More information

Supporting Deadline Monotonic Policy over Average Service Time Analysis

Supporting Deadline Monotonic Policy over Average Service Time Analysis Supporting Deadline Monotonic Policy over 802. Average Service Time Analysis Inès El Korbi Ecole Nationale des Sciences de l Informatique Laboratoire Cristal Université de la Manouba, 200 Tunisia ines.korbi@gmail.com

More information

Wireless Communications

Wireless Communications 4. Medium Access Control Sublayer DIN/CTC/UEM 2018 Why do we need MAC for? Medium Access Control (MAC) Shared medium instead of point-to-point link MAC sublayer controls access to shared medium Examples:

More information

TSIN01 Information Networks Lecture 3

TSIN01 Information Networks Lecture 3 TSIN01 Information Networks Lecture 3 Danyo Danev Division of Communication Systems Department of Electrical Engineering Linköping University, Sweden September 10 th, 2018 Danyo Danev TSIN01 Information

More information

ECEN 5032 Data Networks Medium Access Control Sublayer

ECEN 5032 Data Networks Medium Access Control Sublayer ECEN 5032 Data Networks Medium Access Control Sublayer Peter Mathys mathys@colorado.edu University of Colorado, Boulder c 1996 2005, P. Mathys p.1/35 Overview (Sub)networks can be divided into two categories:

More information

CSE 461: Multiple Access Networks. This Lecture

CSE 461: Multiple Access Networks. This Lecture CSE 461: Multiple Access Networks This Lecture Key Focus: How do multiple parties share a wire? This is the Medium Access Control (MAC) portion of the Link Layer Randomized access protocols: 1. Aloha 2.

More information

Performance analysis of the IEEE MAC protocol for wireless LANs

Performance analysis of the IEEE MAC protocol for wireless LANs INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS Int. J. Commun. Syst. 25; 18:545 569 Published online 2 June 25 in Wiley InterScience (www.interscience.wiley.com). DOI: 1.12/dac.717 Performance analysis

More information

An Accurate Model for Energy Efficiency in IEEE WLANs

An Accurate Model for Energy Efficiency in IEEE WLANs An Accurate Model for Energy Efficiency in IEEE 802.11 WLANs Eleni-Constantina Davri, Emmanouil Kafetzakis, Kimon Kontovasilis, Charalabos Skianis National Centre for Scientific Research Demokritos, Athens,

More information

Data and Computer Communications. Chapter 13 Wireless LANs

Data and Computer Communications. Chapter 13 Wireless LANs Data and Computer Communications Chapter 13 Wireless LANs Wireless LAN Topology Infrastructure LAN Connect to stations on wired LAN and in other cells May do automatic handoff Ad hoc LAN No hub Peer-to-peer

More information

Enhancements and Performance Evaluation of Wireless Local Area Networks

Enhancements and Performance Evaluation of Wireless Local Area Networks Enhancements and Performance Evaluation of Wireless Local Area Networks Jiaqing Song and Ljiljana Trajkovic Communication Networks Laboratory Simon Fraser University Burnaby, BC, Canada E-mail: {jsong,

More information

ACENTRAL question in the study of multihop networks

ACENTRAL question in the study of multihop networks 1118 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL 17, NO 4, AUGUST 2009 The Achievable Rate Region of 80211-Scheduled Multihop Networks Apoorva Jindal, Member, IEEE, and Konstantinos Psounis, Senior Member,

More information

Design and analysis of MAC protocols for wireless networks

Design and analysis of MAC protocols for wireless networks Graduate Theses and Dissertations Graduate College 2009 Design and analysis of MAC protocols for wireless networks Haithem Al-mefleh Iowa State University Follow this and additional works at: http://lib.dr.iastate.edu/etd

More information

Sample solution to Midterm

Sample solution to Midterm College of Computer & Information Science Spring 2007 Northeastern University Handout 10 CSG250: Wireless Networks 27 February 2007 Sample solution to Midterm Part I (4 4 = 16 points) 1. Explain how the

More information

Outline. Application examples

Outline. Application examples Outline Application examples Google page rank algorithm Aloha protocol Virtual circuit with window flow control Store-and-Forward packet-switched network Interactive system with infinite servers 1 Example1:

More information

Call Admission Control for IEEE Contention Access Mechanism

Call Admission Control for IEEE Contention Access Mechanism Call Admission Control for IEEE 82.11 Contention Access Mechanism Dennis Pong and Tim Moors School of Electrical Engineering and Telecommunications, The University of New South Wales, Australia Email:

More information

Performance Analysis of Cell Switching Management Scheme in Wireless Packet Communications

Performance Analysis of Cell Switching Management Scheme in Wireless Packet Communications Performance Analysis of Cell Switching Management Scheme in Wireless Packet Communications Jongho Bang Sirin Tekinay Nirwan Ansari New Jersey Center for Wireless Telecommunications Department of Electrical

More information

E-BEB Algorithm to Improve Quality of Service on Wireless Ad-Hoc Networks

E-BEB Algorithm to Improve Quality of Service on Wireless Ad-Hoc Networks Research Journal of Applied Sciences, Engineering and Technology 4(7): 807-812, 2012 ISSN: 2040-7467 Maxwell Scientific Organization, 2012 Submitted: vember 10, 2011 Accepted: December 09, 2011 Published:

More information

MAC. Fall Data Communications II 1

MAC. Fall Data Communications II 1 802.11 MAC Fall 2005 91.564 Data Communications II 1 RF Quality (ACK) Fall 2005 91.564 Data Communications II 2 Hidden Terminal (RTS/CTS) Fall 2005 91.564 Data Communications II 3 MAC Coordination Functions

More information

Medium Access Control Sublayer

Medium Access Control Sublayer Wireless (WLAN) Medium Access Control Sublayer Mahalingam Mississippi State University, MS October 20, 2014 Outline Medium Access Protocols Wireless (WLAN) 1 Medium Access Protocols ALOHA Slotted ALOHA

More information

Performance Evaluation of Scheduling Mechanisms for Broadband Networks

Performance Evaluation of Scheduling Mechanisms for Broadband Networks Performance Evaluation of Scheduling Mechanisms for Broadband Networks Gayathri Chandrasekaran Master s Thesis Defense The University of Kansas 07.31.2003 Committee: Dr. David W. Petr (Chair) Dr. Joseph

More information

Fine-Tuning the Femtocell Performance in Unlicensed Bands: Case of WiFi Co-existence

Fine-Tuning the Femtocell Performance in Unlicensed Bands: Case of WiFi Co-existence Fine-Tuning the Femtocell Performance in Unlicensed Bands: Case of WiFi Co-existence Sima Hajmohammad Université du Québec à Montréal Montreal, Canada haj mohammad.sima@courrier.uqam.ca Halima Elbiaze

More information

Performance Comparison of IEEE e EDCA and b DCF Under Non- Saturation Condition using Network Simulator

Performance Comparison of IEEE e EDCA and b DCF Under Non- Saturation Condition using Network Simulator Research Journal of Applied Sciences, Engineering and Technology 4(22): 4748-4754, 212 ISSN: 24-7467 Maxwell Scientific Organization, 212 Submitted: April 3, 212 Accepted: April 23, 212 Published: November

More information