DISTANCE MEASURES FOR QOS PERFORMANCE MANAGEMENT IN MIXED NETWORKS

Size: px
Start display at page:

Download "DISTANCE MEASURES FOR QOS PERFORMANCE MANAGEMENT IN MIXED NETWORKS"

Transcription

1 DISAE MEASURES FOR QOS PERFORMAE MANAEMEN IN MIXED NEWORKS Yacob Astatke Department of Electrical and omputer Engineering Morgan State University Dr. Richard Dean Faculty Advisor ABSRA he integrated Network Enhanced elemetry effort (ine) was launched to create a telemetry network that will enhance the traditional point-to-point telemetry link from test articles (As) to ground stations (S). wo of the critical needs identified by the entral est and Evaluation Investment Program (EIP) are, the need to be able to provide reliable coverage in potentially high capacity environments, even in Over-he-Horizon (OH) settings, and the need to make more efficient use of spectrum resources through dynamic sharing of said resources, based on instantaneous demand thereof. Research conducted at Morgan State University (MSU) has focused on providing solutions for both critical problems. he Mixed Network architecture developed by MSU has shown that a hybrid network can be used to provide coverage for As that are beyond the coverage area of the S. he mixed network uses clustering techniques to partition the aggregate network into clusters or sub-networks based on properties of each A, which currently include signal strengths, and location. he paper starts with a detailed analysis of two parameters that affect the performance of each sub-network: contention between the As in the mobile ad-hoc network, and queuing at the ateway As that serve as the link between the mobile ad-hoc and the ellular networks. ontention and queuing will be used to evaluate two performance (distance) measures for each sub-network: throughput and delay. We define a new distance measure known as power, which is equal to the ratio of throughput over delay, and is used as a measure of performance of the mixed network for Quality of Service (QOS). his paper describes the analytical foundation used to prove that the power performance measure is an excellent tool for optimizing the clustering of a mixed network to provide QOS. KEYWORDS Quality of Service, Mixed Network, Adhoc, ontention, hroughput,delay, Power performance measures 1

2 I. INRODUION he integrated Network Enhanced elemetry effort (ine) was launched to create a telemetry network that will enhance the traditional IRI-106 point-to-point telemetry link from test articles (As) to ground stations (S). Research conducted at Morgan State University (MSU) has focused on providing solutions for two important critical needs identified by the entral est and Evaluation Investment Program (EIP). hey are: the need to be able to provide reliable coverage in potentially high capacity environments, even in Over-he-Horizon (OH) settings, and the need to make more efficient use of spectrum resources through dynamic sharing of said resources, based on instantaneous demand thereof. he Mixed Network architecture developed by MSU has shown that a cellular-adhoc hybrid network can be used to provide coverage for As that are beyond the coverage area of the S, while maintaining the desired level of QOS for all the As in the network. he mixed network uses clustering techniques to partition the aggregate network into clusters or sub-networks based on properties of each A, which currently include signal strengths, location, throughput and delay [1][2]. he paper starts with an overview of the mixed network architecture followed by an analysis of two parameters that affect the performance of each sub-network: contention between the As in the mobile ad-hoc network, and queuing at the ateway As that serve as the link between the mobile ad-hoc and the ellular networks. ontention and queuing will be used to evaluate two performance measures for each sub-network: throughput and delay. Finally, a discussion of new distance measure known as power is presented. his paper ends with the discussion of the analytical and simulation results used to prove that the power performance measure is an excellent tool for optimizing the clustering of a mixed network to provide QOS for various applications. II. MIXED NEWORK ARHIEURE he Mixed Network designed by MSU is based on the following assumptions. It uses an optimized clustering scheme based on distance and angle developed by Babasola [1] to divide the network into a cellular with a S and one or more ad-hoc sub-networks also known as cluster cells (). It is assumed that the S is located at the center of the cellular network, and that several s are located around it as shown in Figure 1. All As are equipped with dual interface Network Interface ards (NI) that allows them to operate in cellular mode (M), ad-hoc mode (AHM) or gateway mode (M) depending on their location from the S. It is also assumed that each A is aware of its geographical location at all times through PS or any other positioning mechanism. ateway nodes (N) are capable of communicating in both cellular and ad hoc mode simultaneously and they can be used to relay data from As that are operating in OH settings to the S or vice versa. More information regarding the architecture of the mixed network can be found in [1]. In a typical ine scenario As that are operating in either M, AHM, or M send their data to the S for processing. he choice of the Ns is very important to the overall performance of the network because they can create a bottleneck between the adhoc network and the cellular network. 2

3 Ad-hoc Node luster cells ateway node round Station ellular Nodes ateway node Figure 1: Mixed Network Overview (source [1]) A closer look of the region in the mixed network where the Ns are located indicates that the performance of the mixed network depends on the interaction between the As in the two sub-networks. here are two important parameters that affect the performance of each sub-network: contention between the As in the mobile ad-hoc network, and queuing at the ateway As that serve as the link between the mobile ad-hoc and the ellular networks as shown in Figure 2. ontention and queuing will be used to evaluate two performance or distance measures for each sub-network: throughput and delay. he two distance measures will then be used to manage the overall performance of the mixed network for QOS applications. ateway A round Station ontention Ad-Hoc Network Queue ellular Network Figure 2: Effect of ontention and Queuing III. ONENION AND QUEUIN IN HE MIXED NEWORK A. ontention Model he most widely used wireless standard that defines all aspects of radio frequency based wireless networking is IEEE here are two kinds of wireless networks: infrastructure based and infrastructure-less. Infrastructure based wireless networks use an access point, or a base station to provide connectivity for the wireless nodes that are 3

4 within their range of coverage. Infrastructure-less wireless networks, which are also known as ad-hoc, or peer-to-peer networks consist of wireless nodes (As) that can communicate directly with all of the other wireless enabled nodes (As). urrent Mobile Ad-hoc Networks (MANE) face two critical issues: routing and multiple access, that affect their effective implementation. he lack of any centralized control and possible node mobility in ad-hoc wireless networks give rise to many issues at the network, medium access, and physical layers, which have no counterparts in the wired networks or in cellular networks. he Medium Access ontrol (MA) protocols have to be able to allow as many nodes as possible to simultaneously use the available bandwidth while avoiding interference and collisions. here are two types of MA protocols. he first one is the distributed, or contention based (random) MA protocol that is suitable for infrastructure-less ad-hoc networks. he second one is the centralized, or conflict-free (scheduled) MA protocol that is suitable for infrastructure based networks. he main difference between the two MA protocols is that packets transmitted using contention-based protocols dont have any guarantee to be successfully delivered. he first contention based MA protocol is the pure ALOHA protocol [3] where nodes transmit randomly without checking whether the channel is free or not. It was then followed by the Slotted-ALOHA MA protocol [4] where nodes transmit randomly but within a given time slot. Although this approach still suffers from collisions, the use of time slots minimizes the number of collisions compared to the pure ALOHA scheme. he slotted-aloha MA protocol was then replaced by the arrier Sense Multiple Access with ollision Detection (SMA/D) or ollision Avoidance (SMA/A) protocols [5] that allows nodes that to avoid collisions by listening to the channel before transmitting. he theoretical and experimental results discussed in this paper are based for reasons of simplicity on the Slotted-Aloha contention protocol shown in Figure 3. Figure 3: Slotted Aloha protocol Source: Wikipedia - ALOHA 4

5 B. Queuing model Queuing plays an important role in the overall performance of the mixed network because it affects the performance of the Ns. A queue is usually referred as a collection of packets temporarily stored in one or more buffers waiting to be processed. he most commonly used queue processing technique is the first in first out (FIFO) technique, where items are processed in the order that they are received. Both single server or multi-server queues can be used to provide service for two kinds of traffic: priority and non-priority. Queuing theory can be used to derive several queue related performance measures such as the average waiting time in the queue or the system, the expected number of items waiting or receiving service and the probability of encountering the system in different states such as empty, full, etc he theoretical and experimental results discussed in this paper are based on the single server queue model shown in Figure 4, and discussed in detail in [7]. Figure 4: Single Server Queue Example he characteristics of a queuing model can be described using the Kendals A/B/ queuing notation, where A represents the interarrival time distribution, B the service time distribution, and as number of servers. In our case, we used the M/M/1 queue, which is the most basic and important queuing model. It assumes Poisson arrivals with some rate, Exponential service times, a single server, and an infinite length buffer. IV. POWER DISAE MEASURE FOR HE MIXED NEWORK A. Analytical Derivations for ontention he analytical derivation of the throughput and delay distance measures for the contention constrained ad-hoc network is based on the assumption that the slotted Aloha multiple access contention protocol is used. If we assume that we have contention network with demand, the probability of no collision is given by [6]: P e, which implies that the probability of collision can be expressed as: P 1 P 1 e. he throughput of the contention network can be expressed as: S ( ) e (1) he delay of the contention network can be derived by aggregating the delay due to collision experienced by As that have to wait n attempts with time slots, and based on their back-off window size A before sending their data. he final delay equation can be derived by induction as follows: 5

6 Delay( ) P na P P P P na P (2) n 0 n n 0 n n 0 Each term of the delay expression can be rewritten as follows: n i 1 P P is of the form x n 0 i 0 1 x n i x P na P is of the form ix 2 n 0 i 0 1 x n P n P A P herefore: P P and P na P 2 n 0 1 P n 0 1 P P P A P AP AP Delay( ) (3) 2 1 P 1 P 1 P P n Using P 1 P. he overall delay is shown below: AP A 1 e Delay( ) (4) P e B. Analytical Derivations for Q he analytical derivation of the throughput and delay distance measures for the q constrained network where the Ns operate is based on the assumption that we have an M/M/1 queuing system. he relationship between the service time, the time in the system or total queue time q, and the utilization of the system is derived in [7]: q (5) 1 Lets assume for a system with QOS requirements that a packet will be dropped if its queue time q is greater than some maximum threshold wait time max. he probability that the packet will be not be dropped (i.e. q < max ) can be derived as follows [7]: 1 max s P q max 1 e (6) If we assume that the delay of the queuing network is equal to the wait time: Delay( ) w (we are assuming demand = ) (7) 1 1 he throughput of the queuing network can be derived as follows: throughput *[Pr ob _ Not _ Dropped] * P E q E throughput max 1 max s *[Pr ob _ Not _ Dropped] * 1 e (8). Analytical derivations for the Power Distance Measure Performance measures play a critical role in the design of any communication system because they can be used to evaluate and compare it to other systems. he throughput and delay performance measures were derived separately for the contention and queuing networks. However, we need to use a homogeneous performance measure such as 6

7 power in order to characterize the overall performance of the mixed network and synthesize the effect of the various competing performance metrics (such as throughput and delay). he power performance function can be used to identify a communication systems optimum (best) performance point. he simple power function for a system at some load is expressed as follows [7]: hroughput _ cont( ) Power ( ) (9) Delay _ cont( ) he analytical power distance measure for the contention sub-network can be derived using equations (1) and (4) as follows: hroughput _ cont( ) e Powercont ( ) (10) Delay _ cont( ) A 1 e e he analytical power distance measure for the queuing sub-network can be derived using equations (7) and (8) as follows: 1 max * 1 e hroughput _ del( ) Powerque ( ) (11) Delay _ del( ) 1 Since contention and queuing affect the overall performance of the mixed network, the aggregate throughput and delay due to both parameters can be computed as follows: Aggregate _ hroughput hroughput cont * hroughput que Aggregate 1 max _ hroughput e * * 1 e s (12) Aggregate _ Delay Delay cont Delay que A 1 e Aggregate _ Delay (13) e 1 he aggregate power distance measure based on both contention and queuing is : Aggregate _ Power( ) Aggregate _ hroughput Aggregate _ Delay Aggregate _ Power( ) e * * 1 A 1 e e e 1 max 1 (14) 7

8 D. Simulation results and discussions he analytical results derived in the previous three sections were simulated using the MALAB simulation software. It should be noted that the value of 20 on the x axis in all the plots represents a demand of 100%. he aggregate delay and throughput of the mixed network are shown in figures 6 (a) and (b). Our results are similar to other theoretical results [6],[7], and prove that our analytical derivations are correct. he aggregate throughput plots indicate a maximum value of around 15%. his is expected because the maximum throughput of the slotted aloha contention protocol is around 37%. herefore, when we combine the effect of contention and q, we expect the overall performance to deteriorate even more. he aggregate power plot for the simple power function shown in figure 6(c) is similar to the theoretical results presented in [7], and proves that our analytical derivations are once again correct. he simple power function defined in equation (9) allows the user to identify only one particular operating point for the network. herefore, we modified the simple power function in order to adapt it to the QOS requirements of our mixed network. Our goal is to use the power function to optimize the clustering of a mixed network to provide QOS for various applications based on their throughput or delay requirements. We modified the simple power function by adding weights as exponents to each distance measure as shown in equation (15). w _ thr ( Aggregate _ hroughput) Modified _ Aggregate _ Power( ) (15) w _ del ( Aggregate _ Delay) We added the weights as exponents of each performance measure, because they allow us to vary the operating point of the power performance measure along the x axis based on the throughput or delay requirements. he two weighting factors (w_thr, and w_del) can be used to put an emphasis on either the throughput or delay. his implies that we can optimize the clustering of a mixed network to provide QOS for various applications based on their throughput or delay requirements. he plots in figure 6(d) indicate that the mixed network can be optimized for a performance that puts an emphasis on either throughput or delay. his implies that the clustering scheme for the mixed network proposed by [1] can now be modified to include two additional performance measures such as throughput and delay as shown in equation (16). w_dist w_ang w _ thru w _ del luster [ Dist,Angle,hru,Delay ] (16) 8

9 Figure 6 Performance plots versus Demand V. OLUSIONS AND FUURE WORK We have shown that both contention and queuing affect the overall performance of the mixed network because of their impact on two distance measures: throughput and delay. We have derived analytical results for the throughput and delay performance measures for our mixed network. We chose the slotted aloha contention protocol because of its simplicity in the derivations of a closed form solution for the delay and throughput. We plan to expand our analysis to include the most commonly used SMA/A contention protocol. We have also derived analytical results for a modified power performance measure and have shown through simulations that it can be used to optimize the performance of the mixed network based on QOS requirements. he next step in our research is to derive the appropriate weights for the power function and apply them to expand the clustering scheme shown in equation (16). his will allow us to re-cluster and optimize the performance of the mixed network for QOS applications based on distance, angle, throughput, delay, and any other performance measures such as interference and frequency management. We have demonstrated that the power distance measure is a powerful tool that can be used to optimize the overall performance of a communication system. 9

10 AKNOWLEDMENS I would like to thank my advisor Dr. Richard Dean, director of the Signals ommunications and Networks (SN) Lab at MSU, and Mr. Antwan haney (M.Eng 08) for doing most of the simulation work. REFEREES [1] Babalola, O. A., Optimal onfiguration For Nodes In Mixed ellular And Ad Hoc Network For Inet, I 2007 onference, Las Vegas, NV, October [2] St. Ange, L., he Optimization of Node onfiguration in a Mixed Network for Quality of Service, I 2008 onference, San Diego, A, October [3]A. handra, V. ummalla, and J. O. Limb, Wireless Medium Access ontrol Protocols. IEEE om. Surveys & utorials, Second Quarter Available from [4] N. Abramson, he hroughput of Packet Broadcasting hannels, IEEE ransactions on ommunications, 25(1):117128, [5] L. Kleinrock and F.A. obagi, Packet Switching in Radio hannels: Part I - arrier Sense Multiple-access modes and their throughput-delay characteristic, IEEE ransactions on ommunications, OM-23, [6] Agrawal, P.D, Zeng, Q.A., Introduction to Wireless and Mobile Systems, homson Learning, [7] Stallings, W., High-Speed Networks and Internets Performance and Quality of Service, Second Edition, Prentice Hall,

QoS Performance Management in Mixed Wireless Networks

QoS Performance Management in Mixed Wireless Networks QoS Performance Management in Mixed Wireless Networks Dr. Yacob Astatke Department of Electrical and Computer Engineering Morgan State University Dr. Richard Dean Faculty Advisor ABSTRACT This paper presents

More information

IMPLEMENTATION OF A PACKET PRIORITY AND FIFO QUEUING MODEL IN PACKET RADIO SYSTEM

IMPLEMENTATION OF A PACKET PRIORITY AND FIFO QUEUING MODEL IN PACKET RADIO SYSTEM IMPLEMENTATION OF A PACKET PRIORITY AND FIFO QUEUING MODEL IN PACKET RADIO SYSTEM H. Lami 1, A. Affandi 2 1, 2 Department of Electrical Engineering, Faculty of Industrial Technology, Institut Teknologi

More information

Comparison of pre-backoff and post-backoff procedures for IEEE distributed coordination function

Comparison of pre-backoff and post-backoff procedures for IEEE distributed coordination function Comparison of pre-backoff and post-backoff procedures for IEEE 802.11 distributed coordination function Ping Zhong, Xuemin Hong, Xiaofang Wu, Jianghong Shi a), and Huihuang Chen School of Information Science

More information

Wireless Medium Access Control Protocols

Wireless Medium Access Control Protocols Wireless Medium Access Control Protocols Telecomunicazioni Undergraduate course in Electrical Engineering University of Rome La Sapienza Rome, Italy 2007-2008 Classification of wireless MAC protocols Wireless

More information

Markov Chains and Multiaccess Protocols: An. Introduction

Markov Chains and Multiaccess Protocols: An. Introduction Markov Chains and Multiaccess Protocols: An Introduction Laila Daniel and Krishnan Narayanan April 8, 2012 Outline of the talk Introduction to Markov Chain applications in Communication and Computer Science

More information

MODIFIED VERTICAL HANDOFF DECISION ALGORITHM FOR IMPROVING QOS METRICS IN HETEROGENEOUS NETWORKS

MODIFIED VERTICAL HANDOFF DECISION ALGORITHM FOR IMPROVING QOS METRICS IN HETEROGENEOUS NETWORKS MODIFIED VERTICAL HANDOFF DECISION ALGORITHM FOR IMPROVING QOS METRICS IN HETEROGENEOUS NETWORKS 1 V.VINOTH, 2 M.LAKSHMI 1 Research Scholar, Faculty of Computing, Department of IT, Sathyabama University,

More information

The MAC layer in wireless networks

The MAC layer in wireless networks The MAC layer in wireless networks The wireless MAC layer roles Access control to shared channel(s) Natural broadcast of wireless transmission Collision of signal: a /space problem Who transmits when?

More information

Admission Control in Time-Slotted Multihop Mobile Networks

Admission Control in Time-Slotted Multihop Mobile Networks dmission ontrol in Time-Slotted Multihop Mobile Networks Shagun Dusad and nshul Khandelwal Information Networks Laboratory Department of Electrical Engineering Indian Institute of Technology - ombay Mumbai

More information

Coverage & Capacity in Hybrid Wideband Ad-hoc/cellular Access System. Results & Scenarios. by Pietro Lungaro

Coverage & Capacity in Hybrid Wideband Ad-hoc/cellular Access System. Results & Scenarios. by Pietro Lungaro Coverage & Capacity in Hybrid Wideband Ad-hoc/cellular Access System Results & Scenarios by Pietro Lungaro Agenda Problem Statement System Assumptions Results Threats Problem Statement Design a possible

More information

CHAPTER 5 PROPAGATION DELAY

CHAPTER 5 PROPAGATION DELAY 98 CHAPTER 5 PROPAGATION DELAY Underwater wireless sensor networks deployed of sensor nodes with sensing, forwarding and processing abilities that operate in underwater. In this environment brought challenges,

More information

Performance Evaluation of Scheduling Mechanisms for Broadband Networks

Performance Evaluation of Scheduling Mechanisms for Broadband Networks Performance Evaluation of Scheduling Mechanisms for Broadband Networks Gayathri Chandrasekaran Master s Thesis Defense The University of Kansas 07.31.2003 Committee: Dr. David W. Petr (Chair) Dr. Joseph

More information

CCM 4300 Lecture 5 Computer Networks, Wireless and Mobile Communications. Dr Shahedur Rahman. Room: T115

CCM 4300 Lecture 5 Computer Networks, Wireless and Mobile Communications. Dr Shahedur Rahman. Room: T115 CCM 4300 Lecture 5 Computer Networks, Wireless and Mobile Communications Dr Shahedur Rahman s.rahman@mdx.ac.uk Room: T115 1 Recap of Last Session Described the physical layer Analogue and Digital signal

More information

Random Access. 1. Aloha. 2. Slotted Aloha 3. CSMA 4. CSMA/CD

Random Access. 1. Aloha. 2. Slotted Aloha 3. CSMA 4. CSMA/CD Random Access 1. Aloha 2. Slotted Aloha 3. CSMA 4. CSMA/CD Background Communication medium B No Collision collision A C Modern Local Area Networks (LANs) operate as follows Users are connected to communication

More information

Long Distance Wireless Communication. Principally satellite communication:

Long Distance Wireless Communication. Principally satellite communication: Long Distance Wireless Communication Principally satellite communication: Uplink/Downlink Footprint LOS (line of sight) communication satellite base station is relay Effective for broadcast Limited bandwidth

More information

Lecture 12 December 04, Wireless Access. Graduate course in Communications Engineering. University of Rome La Sapienza. Rome, Italy

Lecture 12 December 04, Wireless Access. Graduate course in Communications Engineering. University of Rome La Sapienza. Rome, Italy Lecture 12 December 04, 2017 Wireless Access Graduate course in Communications Engineering University of Rome La Sapienza Rome, Italy 2017-2018 Random Medium Access Control Part II - CSMA and Collision

More information

Intelligent Transportation Systems. Medium Access Control. Prof. Dr. Thomas Strang

Intelligent Transportation Systems. Medium Access Control. Prof. Dr. Thomas Strang Intelligent Transportation Systems Medium Access Control Prof. Dr. Thomas Strang Recap: Wireless Interconnections Networking types + Scalability + Range Delay Individuality Broadcast o Scalability o Range

More information

On the Scalability of Hierarchical Ad Hoc Wireless Networks

On the Scalability of Hierarchical Ad Hoc Wireless Networks On the Scalability of Hierarchical Ad Hoc Wireless Networks Suli Zhao and Dipankar Raychaudhuri Fall 2006 IAB 11/15/2006 Outline Motivation Ad hoc wireless network architecture Three-tier hierarchical

More information

Chapter 4. The Medium Access Control Sublayer. Points and Questions to Consider. Multiple Access Protocols. The Channel Allocation Problem.

Chapter 4. The Medium Access Control Sublayer. Points and Questions to Consider. Multiple Access Protocols. The Channel Allocation Problem. Dynamic Channel Allocation in LANs and MANs Chapter 4 The Medium Access Control Sublayer 1. Station Model. 2. Single Channel Assumption. 3. Collision Assumption. 4. (a) Continuous Time. (b) Slotted Time.

More information

The MAC layer in wireless networks

The MAC layer in wireless networks The MAC layer in wireless networks The wireless MAC layer roles Access control to shared channel(s) Natural broadcast of wireless transmission Collision of signal: a time/space problem Who transmits when?

More information

A Pigeon Agents based Analytical Model to Optimize Communication in Delay Tolerant Network

A Pigeon Agents based Analytical Model to Optimize Communication in Delay Tolerant Network Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 4, Issue. 6, June 2015, pg.1029

More information

Final Exam: Mobile Networking (Part II of the course Réseaux et mobilité )

Final Exam: Mobile Networking (Part II of the course Réseaux et mobilité ) Final Exam: Mobile Networking (Part II of the course Réseaux et mobilité ) Prof. J.-P. Hubaux February 12, 2004 Duration: 2 hours, all documents allowed Please write your answers on these sheets, at the

More information

All Rights Reserved 2017 IJARCET

All Rights Reserved 2017 IJARCET END-TO-END DELAY WITH MARKOVIAN QUEUING BASED OPTIMUM ROUTE ALLOCATION FOR MANETs S. Sudha, Research Scholar Mrs. V.S.LAVANYA M.Sc(IT)., M.C.A., M.Phil., Assistant Professor, Department of Computer Science,

More information

Lecture 4: Wireless MAC Overview. Hung-Yu Wei National Taiwan University

Lecture 4: Wireless MAC Overview. Hung-Yu Wei National Taiwan University Lecture 4: Wireless MAC Overview Hung-Yu Wei National Taiwan University Medium Access Control Topology 3 Simplex and Duplex 4 FDMA TDMA CDMA DSSS FHSS Multiple Access Methods Notice: CDMA and spread spectrum

More information

Chapter 6 Medium Access Control Protocols and Local Area Networks

Chapter 6 Medium Access Control Protocols and Local Area Networks Chapter 6 Medium Access Control Protocols and Local Area Networks Part I: Medium Access Control Part II: Local Area Networks CSE 3213, Winter 2010 Instructor: Foroohar Foroozan Chapter Overview Broadcast

More information

CSMA based Medium Access Control for Wireless Sensor Network

CSMA based Medium Access Control for Wireless Sensor Network CSMA based Medium Access Control for Wireless Sensor Network H. Hoang, Halmstad University Abstract Wireless sensor networks bring many challenges on implementation of Medium Access Control protocols because

More information

Performance analysis of Internet applications over an adaptive IEEE MAC architecture

Performance analysis of Internet applications over an adaptive IEEE MAC architecture Journal of the Franklin Institute 343 (2006) 352 360 www.elsevier.com/locate/jfranklin Performance analysis of Internet applications over an adaptive IEEE 802.11 MAC architecture Uthman Baroudi, Mohammed

More information

Multiple Access Links and Protocols

Multiple Access Links and Protocols Multiple Access Links and Protocols Two types of links : point-to-point PPP for dial-up access point-to-point link between Ethernet switch and host broadcast (shared wire or medium) old-fashioned Ethernet

More information

Lecture 5: Performance Analysis I

Lecture 5: Performance Analysis I CS 6323 : Modeling and Inference Lecture 5: Performance Analysis I Prof. Gregory Provan Department of Computer Science University College Cork Slides: Based on M. Yin (Performability Analysis) Overview

More information

NMA Radio Networks Network Level: Medium Access Control Roberto Verdone

NMA Radio Networks Network Level: Medium Access Control Roberto Verdone NMA Radio Networks Network Level: Medium Access Control Roberto Verdone Outline 1. Introduction 2. Fundamentals of Random MAC Aloha in Compact Networks Slotted Aloha in Compact Networks CSMA in Compact

More information

CHAPTER 4 CALL ADMISSION CONTROL BASED ON BANDWIDTH ALLOCATION (CACBA)

CHAPTER 4 CALL ADMISSION CONTROL BASED ON BANDWIDTH ALLOCATION (CACBA) 92 CHAPTER 4 CALL ADMISSION CONTROL BASED ON BANDWIDTH ALLOCATION (CACBA) 4.1 INTRODUCTION In our previous work, we have presented a cross-layer based routing protocol with a power saving technique (CBRP-PS)

More information

An Efficient Broadcast Algorithm To Transmit Data In Multi-hop Relay MANETs Fathima Sana 1, Dr. M. Sudheep Elayidom 2

An Efficient Broadcast Algorithm To Transmit Data In Multi-hop Relay MANETs Fathima Sana 1, Dr. M. Sudheep Elayidom 2 International Journal of Emerging Trends in Science and Technology Impact Factor: 2.838 INC-BEAT 2016 An Efficient Broadcast Algorithm To Transmit Data In Multi-hop Relay MANETs Fathima Sana 1, Dr. M.

More information

ENHANCING THE PERFORMANCE OF MANET THROUGH MAC LAYER DESIGN

ENHANCING THE PERFORMANCE OF MANET THROUGH MAC LAYER DESIGN I J I T E ISSN: 2229-7367 3(1-2), 2012, pp. 19-24 ENHANCING THE PERFORMANCE OF MANET THROUGH MAC LAYER DESIGN 1 R. MANIKANDAN, 2 K. ARULMANI AND 3 K. SELVAKUMAR Department of Computer Science and Engineering,

More information

Multiple Access (1) Required reading: Garcia 6.1, 6.2.1, CSE 3213, Fall 2010 Instructor: N. Vlajic

Multiple Access (1) Required reading: Garcia 6.1, 6.2.1, CSE 3213, Fall 2010 Instructor: N. Vlajic 1 Multiple Access (1) Required reading: Garcia 6.1, 6.2.1, 6.2.2 CSE 3213, Fall 2010 Instructor: N. Vlajic Multiple Access Communications 2 Broadcast Networks aka multiple access networks multiple sending

More information

SMITE: A Stochastic Compressive Data Collection. Sensor Networks

SMITE: A Stochastic Compressive Data Collection. Sensor Networks SMITE: A Stochastic Compressive Data Collection Protocol for Mobile Wireless Sensor Networks Longjiang Guo, Raheem Beyah, and Yingshu Li Department of Computer Science, Georgia State University, USA Data

More information

Keywords: Medium access control, network coding, routing, throughput, transmission rate. I. INTRODUCTION

Keywords: Medium access control, network coding, routing, throughput, transmission rate. I. INTRODUCTION Performance Analysis of Network Parameters, Throughput Optimization Using Joint Routing, XOR Routing and Medium Access Control in Wireless Multihop Network 1 Dr. Anuradha M. S., 2 Ms. Anjali kulkarni 1

More information

Mobile Communications Chapter 3 : Media Access

Mobile Communications Chapter 3 : Media Access Mobile Communications Chapter 3 : Media Access 2. Motivation 3. SDMA, FDMA, TDMA 1. Aloha and contention based schemes 4. Reservation schemes 5. Collision avoidance, MACA 6. Polling CDMA (Lecture 6) Prof.

More information

Performance Analysis of Cell Switching Management Scheme in Wireless Packet Communications

Performance Analysis of Cell Switching Management Scheme in Wireless Packet Communications Performance Analysis of Cell Switching Management Scheme in Wireless Packet Communications Jongho Bang Sirin Tekinay Nirwan Ansari New Jersey Center for Wireless Telecommunications Department of Electrical

More information

TSIN01 Information Networks Lecture 3

TSIN01 Information Networks Lecture 3 TSIN01 Information Networks Lecture 3 Danyo Danev Division of Communication Systems Department of Electrical Engineering Linköping University, Sweden September 10 th, 2018 Danyo Danev TSIN01 Information

More information

MAC Sublayer(1) Principal service of the Medium Access Control Sublayer: Allocating a single broadcast channel (mostly a LAN) among competing users

MAC Sublayer(1) Principal service of the Medium Access Control Sublayer: Allocating a single broadcast channel (mostly a LAN) among competing users MAC Sublayer(1) Principal service of the Medium Access Control Sublayer: Allocating a single broadcast channel (mostly a LAN) among competing users Static Channel Allocation: Frequency Division Multiplexing

More information

Announcements / Wireless Networks and Applications Lecture 9: Wireless LANs Wireless. Regular Ethernet CSMA/CD.

Announcements / Wireless Networks and Applications Lecture 9: Wireless LANs Wireless. Regular Ethernet CSMA/CD. Announcements 18-452/18-750 Wireless Networks and Applications Lecture 9: Wireless LANs 802.11 Wireless Peter Steenkiste Homework 1 should be out by tomorrow Project 1 by Friday Schedule:» Thursday lecture

More information

PERFORMANCE ANALISIS OF THE LEMR-MULTICHANNEL PROTOCOL

PERFORMANCE ANALISIS OF THE LEMR-MULTICHANNEL PROTOCOL PERFORMANCE ANALISIS OF THE LEMR-MULTICHANNEL PROTOCOL Albeiro Cortés Cabezas Department of Electronic Engineering, Surcolombiana University Grupo de Tratamiento de Señales y Telecommunications - GTST

More information

AERONAUTICAL CHANNEL SIMULATION IN NETWORK SIMULATORS FOR INCORPORATION INTO OPNET

AERONAUTICAL CHANNEL SIMULATION IN NETWORK SIMULATORS FOR INCORPORATION INTO OPNET AERONAUTICAL CHANNEL SIMULATION IN NETWORK SIMULATORS FOR INCORPORATION INTO OPNET Author: Tianyin Zhang and Nur Jaber Advisor: Dr. Richard Dean Morgan State University ABSTRACT This paper discusses channel

More information

Adaptive Mechanism for Aggregation with fragments retransmission in high-speed wireless networks

Adaptive Mechanism for Aggregation with fragments retransmission in high-speed wireless networks Int. J. Open Problems Compt. Math., Vol. 4, No. 3, September 2011 ISSN 1998-6262; Copyright ICSRS Publication, 2011 www.i-csrs.org Adaptive Mechanism for Aggregation with fragments retransmission in high-speed

More information

Performance Analysis for Channel Utilization in Wireless LAN

Performance Analysis for Channel Utilization in Wireless LAN Performance Analysis for Channel Utilization in Wireless LAN Shweta Singh Naresh Chandra Arun Kumar Tripathi ABSTRACT Wireless network plays an important role in field of communication. Now a days people

More information

Lecture 9. Quality of Service in ad hoc wireless networks

Lecture 9. Quality of Service in ad hoc wireless networks Lecture 9 Quality of Service in ad hoc wireless networks Yevgeni Koucheryavy Department of Communications Engineering Tampere University of Technology yk@cs.tut.fi Lectured by Jakub Jakubiak QoS statement

More information

The Basics of Wireless Communication Octav Chipara

The Basics of Wireless Communication Octav Chipara The asics of Wireless ommunication Octav hipara genda hannel model: the protocol model High-level media access TM, SM hidden/exposed terminal problems WLN Fundamentals of routing proactive on-demand 2

More information

Read Chapter 4 of Kurose-Ross

Read Chapter 4 of Kurose-Ross CSE 422 Notes, Set 4 These slides contain materials provided with the text: Computer Networking: A Top Down Approach,5th edition, by Jim Kurose and Keith Ross, Addison-Wesley, April 2009. Additional figures

More information

Using Hybrid Algorithm in Wireless Ad-Hoc Networks: Reducing the Number of Transmissions

Using Hybrid Algorithm in Wireless Ad-Hoc Networks: Reducing the Number of Transmissions Using Hybrid Algorithm in Wireless Ad-Hoc Networks: Reducing the Number of Transmissions R.Thamaraiselvan 1, S.Gopikrishnan 2, V.Pavithra Devi 3 PG Student, Computer Science & Engineering, Paavai College

More information

CSMA/CA BASED AD-HOC NETWORK USING MAC PROTOCOL

CSMA/CA BASED AD-HOC NETWORK USING MAC PROTOCOL CSMA/CA BASED AD-HOC NETWORK USING MAC PROTOCOL Er. Prabhnoor Bachhal 1, Er. Shivani Kwatra 2 1M.Tech(CSE Deptt) GGGI, Dinarpur, Ambala 1Assistant Professor (CSE Deptt), GGGI, Dinarpur Ambala -----------------------------------------------------------------------------------***-------------------------------------------------------------------------------

More information

CHANNEL SHARING SCHEME FOR CELLULAR NETWORKS USING MDDCA PROTOCOL IN WLAN

CHANNEL SHARING SCHEME FOR CELLULAR NETWORKS USING MDDCA PROTOCOL IN WLAN International Journal on Information Sciences and Computing, Vol. 5, No.1, January 2011 65 Abstract CHANNEL SHARING SCHEME FOR CELLULAR NETWORKS USING MDDCA PROTOCOL IN WLAN Jesu Jayarin P. 1, Ravi T.

More information

Multiple Access Communications. EEE 538, WEEK 11 Dr. Nail Akar Bilkent University Electrical and Electronics Engineering Department

Multiple Access Communications. EEE 538, WEEK 11 Dr. Nail Akar Bilkent University Electrical and Electronics Engineering Department Multiple Access Communications EEE 538, WEEK 11 Dr. Nail Akar Bilkent University Electrical and Electronics Engineering Department 1 Multiple Access Satellite systems, radio networks (WLAN), ethernet segment

More information

Volume 2, Issue 4, April 2014 International Journal of Advance Research in Computer Science and Management Studies

Volume 2, Issue 4, April 2014 International Journal of Advance Research in Computer Science and Management Studies Volume 2, Issue 4, April 2014 International Journal of Advance Research in Computer Science and Management Studies Research Article / Paper / Case Study Available online at: www.ijarcsms.com Efficient

More information

2. Modelling of telecommunication systems (part 1)

2. Modelling of telecommunication systems (part 1) 2. Modelling of telecommunication systems (part ) lect02.ppt S-38.45 - Introduction to Teletraffic Theory - Fall 999 2. Modelling of telecommunication systems (part ) Contents Telecommunication networks

More information

ICE 1332/0715 Mobile Computing (Summer, 2008)

ICE 1332/0715 Mobile Computing (Summer, 2008) ICE 1332/0715 Mobile Computing (Summer, 2008) Medium Access Control Prof. Chansu Yu http://academic.csuohio.edu/yuc/ Simplified Reference Model Application layer Transport layer Network layer Data link

More information

Chapter 1 Basic concepts of wireless data networks (cont d)

Chapter 1 Basic concepts of wireless data networks (cont d) Chapter 1 Basic concepts of wireless data networks (cont d) Part 2: Medium access methods for mobile data networks Sept 15 2004 1 Fixed assignment access schemes in voice-oriented networks Frequency division

More information

EL Wireless and Mobile Networking Spring 2002 Mid-Term Exam Solution - March 6, 2002

EL Wireless and Mobile Networking Spring 2002 Mid-Term Exam Solution - March 6, 2002 Instructions: EL 604 - Wireless and Mobile Networking Spring 2002 Mid-Term Exam Solution - March 6, 2002 Be sure to write your name on your submission. This is an open book test. Use your class notes,

More information

Performance Analysis of UGS and BE QoS classes in WiMAX

Performance Analysis of UGS and BE QoS classes in WiMAX Advance in Electronic and Electric Engineering. ISSN 2231-1297, Volume 3, Number 7 (2013), pp. 805-810 Research India Publications http://www.ripublication.com/aeee.htm Performance Analysis of UGS and

More information

CHAPTER 7 MAC LAYER PROTOCOLS. Dr. Bhargavi Goswami Associate Professor & Head Department of Computer Science Garden City College

CHAPTER 7 MAC LAYER PROTOCOLS. Dr. Bhargavi Goswami Associate Professor & Head Department of Computer Science Garden City College CHAPTER 7 MAC LAYER PROTOCOLS Dr. Bhargavi Goswami Associate Professor & Head Department of Computer Science Garden City College MEDIUM ACCESS CONTROL - MAC PROTOCOLS When the two stations transmit data

More information

ECE 4450:427/527 - Computer Networks Spring 2017

ECE 4450:427/527 - Computer Networks Spring 2017 ECE 4450:427/527 - Computer Networks Spring 2017 Dr. Nghi Tran Department of Electrical & Computer Engineering Lecture 5.6: Wireless Networks - MAC Dr. Nghi Tran (ECE-University of Akron) ECE 4450:427/527

More information

IMPACT OF LEADER SELECTION STRATEGIES ON THE PEGASIS DATA GATHERING PROTOCOL FOR WIRELESS SENSOR NETWORKS

IMPACT OF LEADER SELECTION STRATEGIES ON THE PEGASIS DATA GATHERING PROTOCOL FOR WIRELESS SENSOR NETWORKS IMPACT OF LEADER SELECTION STRATEGIES ON THE PEGASIS DATA GATHERING PROTOCOL FOR WIRELESS SENSOR NETWORKS Indu Shukla, Natarajan Meghanathan Jackson State University, Jackson MS, USA indu.shukla@jsums.edu,

More information

Journal of Electronics and Communication Engineering & Technology (JECET)

Journal of Electronics and Communication Engineering & Technology (JECET) Journal of Electronics and Communication Engineering & Technology (JECET) JECET I A E M E Journal of Electronics and Communication Engineering & Technology (JECET)ISSN ISSN 2347-4181 (Print) ISSN 2347-419X

More information

Dynamic Design of Cellular Wireless Networks via Self Organizing Mechanism

Dynamic Design of Cellular Wireless Networks via Self Organizing Mechanism Dynamic Design of Cellular Wireless Networks via Self Organizing Mechanism V.Narasimha Raghavan, M.Venkatesh, Divya Sridharabalan, T.Sabhanayagam, Nithin Bharath Abstract In our paper, we are utilizing

More information

Physical Layer. Medium Access Links and Protocols. Point-to-Point protocols. Modems: Signaling. Modems Signaling. Srinidhi Varadarajan

Physical Layer. Medium Access Links and Protocols. Point-to-Point protocols. Modems: Signaling. Modems Signaling. Srinidhi Varadarajan P Physical Layer Srinidhi Varadarajan Medium Access Links and Protocols Three types of links : point-to-point (single wire, e.g. PPP, SLIP) broadcast (shared wire or medium; e.g, Ethernet, Wavelan, etc.)

More information

The Medium Access Control Scheme (MAC Layer) Reference: Andrew S. Tanenbaum, Computer Networks, 3rd Edition, Prentice Hall, 1996.

The Medium Access Control Scheme (MAC Layer) Reference: Andrew S. Tanenbaum, Computer Networks, 3rd Edition, Prentice Hall, 1996. The Medium Access Control Scheme (MAC Layer) Reference: Andrew S. Tanenbaum, Computer Networks, 3rd Edition, Prentice Hall, 1996. 1 Table of Contents Introduction ALOHA Carrier Sense Multiple Sense (CSMA)

More information

Computer Network Fundamentals Spring Week 3 MAC Layer Andreas Terzis

Computer Network Fundamentals Spring Week 3 MAC Layer Andreas Terzis Computer Network Fundamentals Spring 2008 Week 3 MAC Layer Andreas Terzis Outline MAC Protocols MAC Protocol Examples Channel Partitioning TDMA/FDMA Token Ring Random Access Protocols Aloha and Slotted

More information

Enhancement of MTC Performance in LTE Networks by Maximizing Random Access Procedure Throughput

Enhancement of MTC Performance in LTE Networks by Maximizing Random Access Procedure Throughput Journal of Electrical Engineering 6 (2018) 40-45 doi: 10.17265/2328-2223/2018.01.006 D DAVID PUBLISHING Enhancement of MTC Performance in LTE Networks by Ibraheem M. Fayed and Eman S. El-Din Network Planning

More information

ADAPTIVE SLOT ALLOCATION AND BANDWIDTH SHARING FOR PRIORITIZED HANDOFF CALLS IN MOBILE NETWOKS

ADAPTIVE SLOT ALLOCATION AND BANDWIDTH SHARING FOR PRIORITIZED HANDOFF CALLS IN MOBILE NETWOKS ADAPTIVE SLOT ALLOCATION AND BANDWIDTH SHARING FOR PRIORITIZED HANDOFF CALLS IN MOBILE NETWOKS S.Malathy G.Sudhasadasivam K.Murugan S.Lokesh Research Scholar Professor, CSE Department Lecturer, IT Dept

More information

A Fuzzy Based Approach for Priority Allocation in Wireless Sensor Networks Imen Bouazzi #1, Jamila Bhar #2, Semia Barouni *3, Mohamed Atri #4

A Fuzzy Based Approach for Priority Allocation in Wireless Sensor Networks Imen Bouazzi #1, Jamila Bhar #2, Semia Barouni *3, Mohamed Atri #4 A Fuzzy Based Approach for Priority Allocation in Wireless Sensor Networks Imen Bouazzi #1, Jamila Bhar #2, Semia Barouni *3, Mohamed Atri #4 # EμE Laboratory, Faculty of Science of Monastir Monastir,

More information

AN EFFICIENT MAC PROTOCOL FOR SUPPORTING QOS IN WIRELESS SENSOR NETWORKS

AN EFFICIENT MAC PROTOCOL FOR SUPPORTING QOS IN WIRELESS SENSOR NETWORKS AN EFFICIENT MAC PROTOCOL FOR SUPPORTING QOS IN WIRELESS SENSOR NETWORKS YINGHUI QIU School of Electrical and Electronic Engineering, North China Electric Power University, Beijing, 102206, China ABSTRACT

More information

Mesh Networks

Mesh Networks Institute of Computer Science Department of Distributed Systems Prof. Dr.-Ing. P. Tran-Gia Decentralized Bandwidth Management in IEEE 802.16 Mesh Networks www3.informatik.uni-wuerzburg.de Motivation IEEE

More information

IN distributed random multiple access, nodes transmit

IN distributed random multiple access, nodes transmit 414 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 52, NO. 2, FEBRUARY 2006 Power Levels and Packet Lengths in Random Multiple Access With Multiple-Packet Reception Capability Jie Luo, Member, IEEE, and

More information

An Enhanced Dynamic Packet Buffer Management

An Enhanced Dynamic Packet Buffer Management An Enhanced Dynamic Packet Buffer Management Vinod Rajan Cypress Southeast Design Center Cypress Semiconductor Cooperation vur@cypress.com Abstract A packet buffer for a protocol processor is a large shared

More information

Where Are We? Basics: Network Classification Network Architecture Reliable Data Transfer Delay Models Implementation: Protocol Design

Where Are We? Basics: Network Classification Network Architecture Reliable Data Transfer Delay Models Implementation: Protocol Design Where Are We? Basics: Network Classification Network Architecture Reliable Data Transfer Delay Models Implementation: Protocol Design Layered Architecture Layered Architecture Data Link Layer Functionality

More information

and coverage as the nodes can act both as clients and routers. In this paper, the clients are distributed using four different

and coverage as the nodes can act both as clients and routers. In this paper, the clients are distributed using four different ISSN: 0975-766X CODEN: IJPTFI Available Online through Research Article www.ijptonline.com PERFORMANCE ANALYSIS FOR WIRELESS MESH NETWORK CONSIDERING DIFFERENT CLIENT DISTRIBUTION PATTERNS S.Dhivya #1,

More information

Subject: Adhoc Networks

Subject: Adhoc Networks ISSUES IN AD HOC WIRELESS NETWORKS The major issues that affect the design, deployment, & performance of an ad hoc wireless network system are: Medium Access Scheme. Transport Layer Protocol. Routing.

More information

A Novel Scheduling and Queue Management Scheme for Multi-band Mobile Routers

A Novel Scheduling and Queue Management Scheme for Multi-band Mobile Routers A Novel Scheduling and Queue Management Scheme for Multi-band Mobile Routers Md Shohrab Hossain, Husnu S Narman and Mohammed Atiquzzaman School of Computer Science, University of Oklahoma, Norman, OK 739

More information

ECE 158A: Lecture 13. Fall 2015

ECE 158A: Lecture 13. Fall 2015 ECE 158A: Lecture 13 Fall 2015 Random Access and Ethernet! Random Access! Basic idea: Exploit statistical multiplexing Do not avoid collisions, just recover from them When a node has packet to send Transmit

More information

Performance of Multihop Communications Using Logical Topologies on Optical Torus Networks

Performance of Multihop Communications Using Logical Topologies on Optical Torus Networks Performance of Multihop Communications Using Logical Topologies on Optical Torus Networks X. Yuan, R. Melhem and R. Gupta Department of Computer Science University of Pittsburgh Pittsburgh, PA 156 fxyuan,

More information

Reliable and Efficient flooding Algorithm for Broadcasting in VANET

Reliable and Efficient flooding Algorithm for Broadcasting in VANET Reliable and Efficient flooding Algorithm for Broadcasting in VANET Vinod Kumar*, Meenakshi Bansal Mtech Student YCOE,Talwandi Sabo(india), A.P. YCOE, Talwandi Sabo(india) Vinod_Sharma85@rediffmail.com,

More information

The Effects of Asymmetry on TCP Performance

The Effects of Asymmetry on TCP Performance The Effects of Asymmetry on TCP Performance Hari Balakrishnan Venkata N. Padmanabhan Randy H. Katz University of California at Berkeley Daedalus/BARWAN Retreat June 1997 Outline Overview Bandwidth asymmetry

More information

Performance Evaluation and Design Improvement of Media Access Control Protocols for Broadband Wireless Local Loop

Performance Evaluation and Design Improvement of Media Access Control Protocols for Broadband Wireless Local Loop Performance Evaluation and Design Improvement of Media Access Control Protocols for Broadband Wireless Local Loop Mihir Thaker Masters Thesis Presentation Department of Electrical Engineering and Computer

More information

CHAPTER 2 WIRELESS SENSOR NETWORKS AND NEED OF TOPOLOGY CONTROL

CHAPTER 2 WIRELESS SENSOR NETWORKS AND NEED OF TOPOLOGY CONTROL WIRELESS SENSOR NETWORKS AND NEED OF TOPOLOGY CONTROL 2.1 Topology Control in Wireless Sensor Networks Network topology control is about management of network topology to support network-wide requirement.

More information

Performance Analysis of Integrated Voice and Data Systems Considering Different Service Distributions

Performance Analysis of Integrated Voice and Data Systems Considering Different Service Distributions Performance Analysis of Integrated Voice and Data Systems Considering Different Service Distributions Eser Gemikonakli University of Kyrenia, Kyrenia, Mersin 10, Turkey Abstract In this study, the aim

More information

Router s Queue Management

Router s Queue Management Router s Queue Management Manages sharing of (i) buffer space (ii) bandwidth Q1: Which packet to drop when queue is full? Q2: Which packet to send next? FIFO + Drop Tail Keep a single queue Answer to Q1:

More information

Outline. MAC (Medium Access Control) General MAC Requirements. Typical MAC protocols. Typical MAC protocols

Outline. MAC (Medium Access Control) General MAC Requirements. Typical MAC protocols. Typical MAC protocols Outline Medium ccess ontrol With oordinated daptive Sleeping for Wireless Sensor Networks Presented by: rik rooks Introduction to M S-M Overview S-M Evaluation ritique omparison to MW Washington University

More information

Local Area Networks (LANs) SMU CSE 5344 /

Local Area Networks (LANs) SMU CSE 5344 / Local Area Networks (LANs) SMU CSE 5344 / 7344 1 LAN/MAN Technology Factors Topology Transmission Medium Medium Access Control Techniques SMU CSE 5344 / 7344 2 Topologies Topology: the shape of a communication

More information

ECE453 Introduction to Computer Networks. Broadcast vs. PPP. Delay. Lecture 7 Multiple Access Control (I)

ECE453 Introduction to Computer Networks. Broadcast vs. PPP. Delay. Lecture 7 Multiple Access Control (I) ECE453 Introduction to Computer Networks Lecture 7 Multiple Access Control (I) 1 Broadcast vs. PPP Broadcast channel = multiaccess channel = random access channel Broadcast LAN Satellite network PPP WAN

More information

Design and Development of Carrier Assignment and Packet Scheduling in LTE-A and Wi-Fi

Design and Development of Carrier Assignment and Packet Scheduling in LTE-A and Wi-Fi PhD Defense Design and Development of Carrier Assignment and Packet Scheduling in LTE-A and Wi-Fi Husnu S. Narman Outline Introduction Objective Multi-band in LTE-A Multi-band in Wi-Fi Conclusion Husnu

More information

Lecture 6. Data Link Layer (cont d) Data Link Layer 1-1

Lecture 6. Data Link Layer (cont d) Data Link Layer 1-1 Lecture 6 Data Link Layer (cont d) Data Link Layer 1-1 Agenda Continue the Data Link Layer Multiple Access Links and Protocols Addressing Data Link Layer 1-2 Multiple Access Links and Protocols Two types

More information

Performance Study of Interweave Spectrum Sharing Method in Cognitive Radio

Performance Study of Interweave Spectrum Sharing Method in Cognitive Radio Performance Study of Interweave Spectrum Sharing Method in Cognitive Radio Abstract Spectrum scarcity is one of the most critical recent problems in the field of wireless communication One of the promising

More information

Introduction to CDMA ALOHA. 3. Access Control Techniques for CDMA ALOHA

Introduction to CDMA ALOHA. 3. Access Control Techniques for CDMA ALOHA Introduction to CDMA ALOHA 3. Access Control Techniques for CDMA ALOHA Takaya Yamazato Center for Information Media Studies, Nagoya University Nagoya 464-01, Japan yamazato@nuee.nagoya-u.ac.jp CDMA ALOHA

More information

Enhancements and Performance Evaluation of Wireless Local Area Networks

Enhancements and Performance Evaluation of Wireless Local Area Networks Enhancements and Performance Evaluation of Wireless Local Area Networks Jiaqing Song and Ljiljana Trajkovic Communication Networks Laboratory Simon Fraser University Burnaby, BC, Canada E-mail: {jsong,

More information

Class-based Packet Scheduling Policies for Bluetooth

Class-based Packet Scheduling Policies for Bluetooth Class-based Packet Scheduling Policies for Bluetooth Vishwanath Sinha, D. Raveendra Babu Department of Electrical Engineering Indian Institute of Technology, Kanpur - 08 06, INDIA vsinha@iitk.ernet.in,

More information

Queuing Networks Modeling Virtual Laboratory

Queuing Networks Modeling Virtual Laboratory Queuing Networks Modeling Virtual Laboratory Dr. S. Dharmaraja Department of Mathematics IIT Delhi http://web.iitd.ac.in/~dharmar Queues Notes 1 1 Outline Introduction Simple Queues Performance Measures

More information

CAERP: A Congestion and Energy Aware Routing Protocol for Mobile Ad Hoc Network

CAERP: A Congestion and Energy Aware Routing Protocol for Mobile Ad Hoc Network Indian Journal of Science and Technology, Vol 8(35), DOI: 10.17485/ijst/2015/v8i35/70014, December 2015 ISSN (Print) : 0974-6846 ISSN (Online) : 0974-5645 : A Congestion and Energy Aware Routing Protocol

More information

ETSN01 Exam Solutions

ETSN01 Exam Solutions ETSN01 Exam Solutions March 014 Question 1 (a) See p17 of the cellular systems slides for a diagram and the full procedure. The main points here were that the HLR needs to be queried to determine the location

More information

Self-Energy Optimizations for Future Green Cellular Networks. Zhenni Pan Shimamoto-Lab

Self-Energy Optimizations for Future Green Cellular Networks. Zhenni Pan Shimamoto-Lab Self-Energy Optimizations for Future Green Cellular Networks Zhenni Pan Shimamoto-Lab Outline Introduction (Background & Key enablers) Case study Impacts for Homogeneous & Heterogeneous Deployments Cyclic

More information

Multiple-access protocols

Multiple-access protocols Multiple Access Multiple-access protocols Random Access MA CSMA CSMA/CD CSMA/CA RANDOM ACCESS In a random access method, each station has the right to the medium without being controlled by any other station.

More information

Venkatesh Ramaiyan 1.05, Network Engineering Lab Mobile: Dept. of Electrical Communication Engg. (ECE) Fax: (+91)

Venkatesh Ramaiyan 1.05, Network Engineering Lab Mobile: Dept. of Electrical Communication Engg. (ECE) Fax: (+91) Venkatesh Ramaiyan 1.05, Network Engineering Lab Mobile: +91-94482 26130 Dept. of Electrical Communication Engg. (ECE) Fax: (+91)-80-2360 0991 Indian Institute of Science E-mail: rvenkat@ece.iisc.ernet.in

More information

QoS-Enabled Video Streaming in Wireless Sensor Networks

QoS-Enabled Video Streaming in Wireless Sensor Networks QoS-Enabled Video Streaming in Wireless Sensor Networks S. Guo and T.D.C. Little Department of Electrical and Computer Engineering Boston University, Boston, MA 02215 {guosong, tdcl}@bu.edu MCL Technical

More information