Achieving Fairness in Wireless LANs by Enhanced DCF *

Size: px
Start display at page:

Download "Achieving Fairness in Wireless LANs by Enhanced DCF *"

Transcription

1 U.C. ECECS Techical Report August 2005 Achievig Fairess i Wireless LANs by Ehaced 802. DCF * by Nagesh S. Nadiraju, Hrishikesh Gossai, Dave Cavalcati, Kaushik R. Chowdhury, Dharma P. Agrawal Ceter for Distributed ad Mobile Computig, Dept. of ECECS, Uiversity of Ciciati - Ciciati,OH 4522 (adirs, cavalcdt, kaushir, dpa)@ececs.uc.edu Mesh Research ad Developmet Group Motorola, Ic., Maitlad, Florida Hrishikesh.Gossai@motorola.com

2 Nagesh S. Nadiraju et al. of 6 Abstract Over the past few years, Wireless Local Area Networks (WLANs) have gaied a icreased attetio ad a large umber of WLANs are beig deployed i uiversities, compaies, airports etc. Majority of the IEEE 802. based WLANs employ Distributed Coordiatio Fuctio (DCF) i Wireless Access Poits (AP) to arbitrate the wireless chael amog Wireless Statios (STAs). However, DCF poses serious ufairess problem betwee uplik ad dowlik flows. To overcome this ufairess problem, we propose a simple ehacemet to the IEEE 802. DCF which provides priority to the AP ad thus eables it to acquire a larger share of the chael whe required. We have demostrated the ufairess problem through systematic measuremets i a experimetal test bed of WLAN usig the legacy 802. DCF. We also developed aalytical models to calculate the throughput of AP ad the STAs ad verify these results through thorough simulatios i s-2. We observe that our simulatio results fid i good agreemet with our aalytical models. Results show that our proposed ehacemet achieves a fair distributio of badwidth ad improves the throughput (by early 300%) ad reduces the delay (by early 60%) for the dowlik flows as compared to the DCF, without severely affectig the performace of uplik flows. Keywords: Fairess, MAC protocols, Performace Evaluatio, Test beds, WLANs.

3 Nagesh S. Nadiraju et al. 2 of 6. INTRODUCTION I the last decade, Wireless LANs experieced a proliferatig growth due to their flexibility ad ubiquitous ature. I particular, WLAN hotspots are typically foud i uiversities, compaies, airports, shoppig malls, etc. With the icreasig iterest i the itegratio of various wireless etworks (4G etworks), WLANs are gaiig more popularity tha ever. The capacity of WLANs has rapidly icreased from 2Mbps to 54Mbps ad proposals (IEEE 802.) to achieve early 00Mbps are also uderway. May efforts are also beig made to make QoS provisios for real time traffic (IEEE 802.e). Most of the curret WLAN implemetatios are based o the IEEE 802. [] stadard, which supports two basic mechaisms for chael arbitratio: Distributed Co-ordiatio Fuctio (DCF) ad Poit Coordiatio Fuctio (PCF). The implemetatio of DCF i IEEE 802. compliat devices is madatory while provisio of PCF is optioal. DCF is based o the traditioal CSMA/CA paradigm ad provides equal chael access privileges to all participatig Wireless Statios (STAs). I cotrast, PCF is a cetralized schedulig algorithm. It requires a poit coordiator (PC) at the AP to cotrol the chael access. The default schedulig algorithm of IEEE 802. PCF is a roud robi scheme ad may ot always be ideal. Due to the iheret complexity ivolved with the deploymet of PCF [2], most of the curret implemetatios of IEEE 802., eve i hot spot scearios, use DCF access mechaism. However, DCF poses serious ufairess problem betwee uplik ad dowlik flows. With DCF, the chael share of the AP would be a fractio of total umber of trasmittig STAs i its service area. All STAs, icludig the AP, have the same chael access privileges. As a result, the share of the chael obtaied by the AP is early equal to the share of ay other STA uder its coverage. This results i ufair sharig of the badwidth amog uplik ad dowlik flows. All the dowlik flows (flows that are destied for wireless statios) have to utilize the AP s chael share while the uplik flows origiatig from differet STAs ejoy a larger share. With the icrease i the umber of STAs uder the AP s coverage, the dowlik flows would suffer from relatively low share of the available badwidth. To better illustrate the ufairess problem, cosider a typical WLAN hotspot sceario as show i figure. A set of wireless users (STAs) are coected to the iteret through a AP. All the traffic to ad from the STAs passes through the AP ad thus the wireless lik becomes the bottleeck for all the traffic. Assume STA-STA5 are receivig UDP traffic from server S (dowlik flows); whereas STA6-STA0 are trasmittig UDP traffic to server S (uplik flows). I this sceario, the AP, ad STA6-STA0 will coted for the wireless chael through the regular IEEE 802. DCF. Recall from previous paragraph DCF gives early equal chael share to all the cotedig odes i a eighborhood. Thus, the chael share obtaied by the AP (ad hece the combied dowlik traffic) would early be equal to the idividual shares of other cotedig STAs (STA6- STA0). I other words, the badwidth available to the idividual flows edig at STA- STA5 would be a fractio of the badwidth available to the idividual uplik flows of STA 6- STA 0. Iterestigly, this sceario is just the reverse of a typical wired access etwork (e. g. DSL.), where badwidth available to dowward flows is always higher tha upward flows. S Primergy AP Primergy STA STA 2 W STA0 STA 9 STA 5 STA 6 Figure : IEEE 802. DCF based WLAN Access Sceario I order to overcome the aforemetioed problem, we propose a simple MAC layer ehacemet to IEEE 802. DCF, called Bidirectioal-DCF (BDCF). We specifically address the uplik/dowlik ufairess by providig the AP with more cotetio free trasmissio opportuities whe high load is experieced. I particular, if a AP s MAC receives a DATA packet, istead of trasmittig a regular MAC layer ACK, it checks the buffer for a outstadig packet to ay of the STAs i

4 Nagesh S. Nadiraju et al. 3 of 6 its Basic Service Set (BSS). If a packet is foud, the it will sed the DATA with a piggybacked ACK after SIFS time, thus elimiatig the eed for a fresh chael cotetio to trasmit this packet. I this way, the AP gets a preferetial treatmet resultig i a relatively higher badwidth share as compared to its STAs. Clearly, this kid of preferetial treatmet for the AP is desirable i hot spots scearios. This is because most of the users accessig iteret i these hotspots use applicatios (e.g. , web browsig, Iteret radio, etc.) that typically geerate large volume of dowlik traffic for a sigle uplik request. It is worthwhile to ote that if the AP does ot have traffic to sed i dowlik directio, BDCF works exactly as DCF. Our specific cotributios through this paper are: Experimetal demostratio of the ufairess problem i a IEEE 802.b based test-bed. A simple ehacemet to DCF for overcomig the ufairess problem i AP based etworks. A aalytical model to evaluate the throughputs of AP ad STAs complemeted by extesive simulatio study. Our aalytical ad simulatio results show that BDCF has a better throughput ad delay performace for dowlik flows ad also has a fair chael sharig i both directios as compared to DCF. I additio, we compare BDCF with DCF+ [5], which uses a similar idea to reduce MAC layer overhead ad icrease the throughput, while it does ot give ay priority to the AP. The outlie for the rest of this paper is as follows. I sectio 2, we briefly describe DCF, PCF, ad EDCA (802.e) for the completeess of the text. We the experimetally demostrate the ufairess problem caused by DCF i WLAN hot spot scearios i sectio 3. We describe our proposed BDCF mechaism i sectio 4. Next, we develop a aalytical model for the uplik ad dowlik throughputs with BDCF i sectio 5. Sectio 6 provides comprehesive simulatio results, comparig BDCF with DCF ad DCF+. I sectio 7, we discuss the related work, ad fially, we coclude the paper i Sectio 8, highlightig some ope problems ad future research directios. 2. BACKGROUND DCF follows the CSMA/CA mechaism for chael access. I this method, ay STA before trasmittig a packet seses the chael. If the chael is sesed busy, the STA waits for the ogoig trasmissio to complete. Otherwise, if the chael is idle for DIFS (Distributed Iter-Frame Space) period ad if the backoff timer is zero, the STA will trasmit. After trasmittig a DATA packet, the STA waits for a ackowledgemet (ACK) from the receiver, which is set after SIFS (Small Iter-Frame Space) period. If the seder does ot receive the ACK, it assumes a collisio has occurred ad schedules a retrasmissio after a radom backoff time. I additio to this basic access scheme, DCF also supports virtual carrier sesig, i a attempt to reserve the chael before every data trasmissio. I this case, the seder trasmits a RTS (Request To Sed) ad the receiver replies with CTS (Clear To Sed) if it is ready to accept the DATA packet. Upo receivig the CTS packet, the seder trasmits the DATA packet ad waits for the ACK. Both RTS ad CTS packets carry a duratio field that idicates the time period for which the chael is reserved for the followig trasmissio. Thus, all the odes overhearig the RTS/CTS hadshake, record this iformatio i the data structure, Network Allocatio Vector (NAV), ad defer their trasmissio for the specified time frame i the NAV. PCF, o the other had, is maily desiged for ifrastructure operatio mode, i.e., for Access Poit (AP) based systems, ad it rus o top of DCF. I PCF, there is a poit coordiator (PC), which is geerally located i the AP, ad cetrally cotrols the chael access. A cotetio free period (CFP) ad a cotetio period (CP) form a super frame, which is periodically iitiated by the PC after each beaco trasmissio. I CFP, the PC polls STAs for collisio free trasmissios accordig to a pollig list. The CFP is followed by a CP i which all statios follow DCF for chael cotetio. I order to efficietly poll the STAs, the AP should be iformed about the curret traffic patter beforehad. With the chagig traffic patters i the cosidered WLAN access sceario, it is ot feasible to provide such iformatio to the AP. Moreover the pollig scheme of PCF geerates a lot of overhead, thereby makig it more iefficiet. Due to this iheret complexity ad limitatios of PCF, it is ot employed for practical deploymet. The IEEE 802. workig group is attemptig to ehace the curret 802. MAC ad make provisios for quality of service (QoS) provisioig. This ehaced MAC (802.e) provides varyig chael access priorities for differet traffic categories (TCs). It specifies eight differet TCs ad QoS-eabled STAs mark their frames accordig to the applicatio service requiremets. EDCA provides service differetiatio amog the various traffic classes while maitaiig backward compatibility with legacy DCF. However it does ot address ode level access priorities ad either limits the traffic geerated by ay STA.

5 Nagesh S. Nadiraju et al. 4 of 6 3. THE DCF UNFARINESS PROBLEM IN WLAN HOT SPOTS I this sectio we illustrate the ufairess amog dowlik/uplik flows whe DCF is employed i a WLAN. We have set up a experimetal test bed to model the typical WLAN hot spot sceario as show i Figure. We cofigured a ifrastructure based IEEE 802.b etwork with a data rate of Mbps ad coected the AP to a desktop PC (with a Itel Petium 4 processor). We start the server S i the same machie, so that the coectio betwee the AP ad the server is ot a bottleeck. Furthermore, the AP uses the hostap driver package [9], ad the STAs use IEEE 802.b USB adapters, Netgear WG3 or Atheros wireless cards. We have systematically examied the TCP ad UDP throughput performace with a symmetric ad a asymmetric traffic cofiguratio. TCP ad UDP traffic is geerated by Iperf v.7 [20] which rus i both the cliet ad server modes. We first cosider a asymmetric traffic sceario where 3 UDP flows origiatig at the differet wireless odes destied to the server (called uplik flows) ad 7 UDP flows from the server towards the wireless odes (called dowlik flows). Each flow geerates traffic at a rate of 3Mbps, which is eough to saturate the wireless lik. We have coducted 0 differet rus for each traffic sceario ad measured the throughputs of idividual flows. The throughputs of flows i the same directio do ot have much variatio. Thus, for the sake of brevity, we oly show the aggregate throughputs of uplik ad dowlik flows for all the four scearios i Figure 2. As ca be see from the plot (i Figure 2 (a)), i the case of asymmetric UDP traffic, the three uplik flows obtai a throughput of Kbps (749.6 Kbps per flow o a average) while the 7 dowlik flows obtai a throughput of oly Kbps ( Kbps per flow o a average). It ca be observed that the throughput of a idividual dowlik flow is early /3 of the throughput achieved by ay uplik flow. Clearly the MAC level fairess achieved by DCF leads to a udesirable situatio. For example, cosider a typical WLAN hotspot sceario where a couple of studets (who are a part of peer-to-peer file sharig etwork) are uploadig sogs/movies through the wireless etwork. Their applicatios (are uplik) cosume fairly large share of the wireless chael ad thus limit the badwidth for the dowlik traffic. Thus other users who are checkig their or usig other predomiatly dowlik traffic based applicatios experiece larger dowload delays ad icreasig frustratio Up Lik Dow Lik Up Lik Dow Lik Throughput (kbps) Asymmetric (3Up-7D) Symmetric (5Up-5D) Throughput (kbps) Asymmetric (3Up-7D) Symmetric (5Up-5D) Figure 2 (a) UDP Traffic Figure 2 (b) TCP Traffic These results motivate the eed for a preferetial treatmet to the AP i order to allot a fair share of badwidth for the dowlik flows. Although with PCF, the chael access for each statio is cotrolled by the AP (through pollig), it is ot flexible. By default the AP polls all the statios i the pollig list i a roud robi fashio. I order to efficietly poll the STAs, the AP should be iformed about the curret traffic patter beforehad. With the chagig traffic patters i the cosidered WLAN access sceario, it is ot feasible to provide such iformatio to the AP. Moreover the pollig scheme of PCF geerates a lot of overhead thus makig it more iefficiet. We propose a simple ehacemet to DCF i the ext sectio, which prioritizes the AP without the requiremet of ay additioal iformatio ad achieves the required fairess amog the uplik ad dowlik flows. 4. BIDIRECTIONAL DISTRIBUTED CO-ORDINATION FUNCTION (BDCF) I order to hadle the ufair badwidth availability to the dowlik traffic i WLAN hot spot scearios, we propose a Bidirectioal DCF (BDCF), which provides preferetial treatmet to the dowlik flows at the AP. For implemetig BDCF, we modified IEEE 802. DCF to support piggybackig of ACK packets i the DATA trasmissio from the AP. Similar to

6 Nagesh S. Nadiraju et al. 5 of 6 IEEE 802. DCF, BDCF supports both basic (DATA-ACK) ad 4-way hadshake (RTS-CTS-DATA-ACK) chael access mechaisms. I the remaider of this sectio we describe the details of BDCF. STA(i) DIFS SIFS RTS DATA AP SIFS SIFS CTS DATA AP NAV(RTS) NAV(DATA ) STA(j) SIFS ACK STA(i) AP STA(j) DIFS DATA SIFS DATA AP NAV(DATA ) SIFS ACK NAV(RTS) NAV(DATA ) DIFS Other (Source Rage) (Destiatio Rage) NAV(CTS) Defer Access Cotetio Widow Backoff Starts Others NAV(DATA ) Defer Access NAV(DATA AP) DIFS Cotetio Widow Backoff Starts Figure 3(a). Timig diagram of BDCF with RTS-CTS hadshake Figure 3(b). Timig diagram of BDCF with basic access 4. BDCF with RTS-CTS hadshake We first start by describig the operatio of BDCF whe RTS-CTS hadshake is eabled. Figure 3(a) shows the timig diagram of the BDCF operatio. Iitially all STAs ad the AP coted for the chael with equal privilege. Durig the cotetio resolutio period, if the AP gets the access to the chael, BDCF works exactly like DCF. The differece comes whe a STA wis the chael cotetio. Figure 3(a) illustrates this case i detail. STA(i) iitially seds a RTS to the AP i order to reserve the chael for its DATA trasmissio. The AP respods this request of STA(i) by sedig a CTS. Upo receptio of the CTS packet, STA(i) seds its DATA packet (DATA i ) to the AP. After receivig DATA i, the AP checks its MAC buffer for ay packet to trasmit. If o packet is foud, the AP simply seds the correspodig ACK to STA(i). However, if the AP has a outstadig packet for ay of its servig STA(j) (where j may be same as i), it trasmits that DATA packet (idicated by DATA AP i Figure 3(a)) with a piggybacked ACK, after a SIFS time period. If STA(i) seses trasmissio from the AP after a SIFS period, it will implicitly recogize the ACK set by the AP. As log as the STAs are withi the coverage regio of the AP, they are able detect the piggybacked ACK (STA(i) was waitig for a ACK for DATA i from AP). Sice all the STAs i the servig BSS should be withi the coverage of AP our assumptio is valid. After a successful receptio of the DATA AP, the destiatio STA(j) will sed back a ACK to the AP i the usual way. However, if the AP does ot receive the iitial data frame (DATA i ) correctly, it does ot sed ay DATA AP or ACK, thus STA(i) becomes aware of its usuccessful trasmissio ad schedules a retrasmissio. It is importat to ote that BDCF allows piggybackig of DATA packets oly at the AP, thus avoidig the chace of formig ay cycles (pheomeo where AP ad ay oe of STAs repeatedly access ad capture the chael). Furthermore, whe the AP trasmits the DATA packet with piggybacked ACK (DATA AP ), it freezes its backoff timer, such that the trasmissio of DATA AP is totally trasparet to the regular chael cotetio at the AP. The chages made at the MAC layer for implemetig BDCF does ot require ay chages to the upper layers ad thus totally trasparet to the upper layers. As we will show i the ext sectio, by usig this simple ehacemet, BDCF ca provide fair access to the wireless chael i both the directios, irrespective of the type of trasport layer (UDP or TCP) uder cosideratio. It should also be oted that with BDCF, we avoid sedig ACK, RTS, ad CTS packets while seakig a DATA AP packet from the AP, thus reducig MAC layer cotrol overhead as compared to DCF. Moreover we also reduce the time wasted i ay chael cotetio ad backoff mechaism. I order to avoid ay egative effect of BDCF o the uplik flows whe there are fewer dowlik flows tha uplik flows, we adopt a dyamic piggybackig strategy. With this strategy the AP records the umber of STAs trasmittig the uplik flows ad the umber of STAs receivig dowlik flows over a time widow. The AP piggybacks a DATA packet oly with a probability equal to the ratio of dowlik ad uplik flows. This way, we esure that the dowlik flows do ot get ay udue advatage ad ifluece fairess of the system. 4.2 BDCF Basic Access mechaism The workig priciple of BDCF i the basic access mechaism (without RTS-CTS hadshake) is similar to its operatio whe RTS-CTS hadshake is eabled. Figure 3(b) illustrates the timig diagram of BDCF for this case. Oce STA(i) has

7 Nagesh S. Nadiraju et al. 6 of 6 captured the chael it seds its DATA packet (DATA ) to the AP. After receivig DATA, the AP checks its MAC buffer for ay outstadig packet. If a packet for ay STA(j) is foud, the AP seds it (DATA AP i Figure 3(b)) after SIFS period, otherwise it simply respods with a ACK packet to STA(i). 5. ANALYTICAL EVALUATION OF BDCF As poited out i sectio 4, BDCF esures that the dowlik flows gets a fair share of the system badwidth. We validate this claim by derivig aalytical expressios for the throughput of the AP (dowlik) ad the remaiig STAs (uplik) whe BDCF is used with the RTS-CTS hadshake mechaism. We assume fixed STAs ad oe AP, each of them havig a packet to trasmit at all times (saturatio traffic coditios with equal umber of uplik ad dowlik flows). We also assume perfect chael coditios ad o hidde termials. We defie the throughput by the followig equatio S = E[payload iformatio trasmitted i a slot time] E[legthof slot time] () ( p)/w0 0,0 ( p)/w0 0, 0,2 0,W0 2 0,W0 p/w i,0 p/wi p/wi i,0 i, i,2 0,Wi 2 0,Wi p/wi+ p/wm m,0 m, m,2 m,wm 2 p/wm p/wm p/wm Figure 4. Biachi s Markov Chai model We first study various evets that ca occur i ay arbitrary slot, the time duratios for the idividual evets, ad fially the total trasmissio time. We follow a approach similar to that used by Biachi [2] i derivig our expressios. It is assumed that each statio icludig the AP trasmits i a radomly chose slot time with probability ad collisios occur with a costat probability p, irrespective of the umber of previous collisios before a successful trasmissio. We cosider the slot time to be of legthσ. Let E p, H ad deote the average packet payload size, the packet header size (calculated as PHY hdr + MAC hdr ) ad the propagatio delay, respectively. E p ad H are measured i time uits. For simplicity we defie, W = CW mi ad m as the maximum backoff slots so that, CW max = 2 m * CW mi.the probability of trasmissio () i a give time slot as derived i [2] is 2( 2 p)( p) τ = m ( 2 p)( W + ) + p( W ( 2 p ( ) ) I what follows, we idetify the various evets that ca occur i a arbitrary time slot uder BDFC operatio ad calculate their probabilities of occurrece. Recall from sectio 4 that i BDCF, the AP trasmits a data packet uder two coditios: by cotetio or by piggybackig. I. Whe AP coteds for the chael I this case, the AP coteds for the chael afresh with all the other odes (this evet is deoted by tr). I this sceario, BDCF works similar to DCF ad collisios ca occur whe two or more RTS packets are trasmitted simultaeously. The probability of a trasmissio by the AP i ay arbitrary slot is give by: P tr(ap) = (2) m,wm

8 Nagesh S. Nadiraju et al. 7 of 6 tr(ap) Oce the AP wis the chael, the time spet for a successful trasmissio of the DATA packet by the AP is calculated as: T s(ap) = O rts + {H + E p + + SIFS + ACK + + DIFS}, (4) Where, O rts = {RTS ++ SIFS + CTS+ + SIFS} is the time required for RTS/CTS exchage. I case of a collisio, whe RTS/CTS scheme is used, the collisio time is give by T c(ap) = RTS + + SIFS + CTS+ + DIFS (5) II. Whe the AP Piggybacks Wheever the AP receives a DATA packet from a STA, it will have the optio of sedig a DATA packet with the piggybacked ACK after SIFS time period. We deote this trasmissio as tr2. With the assumptio of saturatio traffic coditios, the AP always has a DATA packet to sed to ay oe of the STAs. As the chael is reserved for the ACK trasmissio from the AP, this trasmissio (DATA with piggybacked ACK) is guarateed (assumig o hidde termials) ad there is o eed for cotetio. Thus the collisio probability i this case is 0. The trasmissio probability for the AP (P tr2(ap) ) i this case is the same as the probability of successful trasmissio by ay STA i the prior data trasfer stage, which is give by This trasmissio is successful oly if oe of the other STAs trasmit i the same slot. Thus, the probability of success give that the trasmissio has occurred is: τ (-τ ) P s(ap) = = (-τ ) (3) P P tr2(ap) = Probability AP ot trasmittig i the previous trasfer probability that oly oe STA trasmitted - = (-τ ) τ (-τ ) = τ (-τ ). (6) P s2(ap) = (7) The time for which the chael is busy (we have to cosider the time spet by the STAs as well) is give by: T s2 (AP) = O rts + {H + E p + + SIFS + H + E p + + SIFS + ACK + + DIFS} (8) We ow proceed with the calculatios for the STAs. STAs ca oly trasmit by cotedig ad wiig the chael; ad the probability that at least oe STA trasmits is give as P tr (STA) = [- (-τ ) ] (9) The probability of successful trasmissio give that there is trasmissio from a STA is the probability that the AP did ot trasmit ad oly oe STA trasmitted, - (-τ ) τ (-τ ) τ (-τ ) P s (STA) = = (0) (-τ ) P tr ( STA) Each time a STA udergoes a successful trasmissio, the AP piggybacks aother packet immediately ad hece the total time for successful trasmissio accouts for both the packet duratios ad is the same as T s2(ap) T s(sta) = T s2(ap). () Similarly, the time spet i a collisio i this case is same as the case whe the AP coteds for the chael. T c(sta) = T c(ap). (2) After we have examied the various cases of trasmissios ad their correspodig probabilities, we ow calculate the average time spet i each case. The time duratio i which the system is active is give by: 4 T total = = p ( i) T i i Where, p ( ) T = Probability of idle chael Slot duratio

9 Nagesh S. Nadiraju et al. 8 of 6 p ( 2) T = Probability of AP successfully trasmits T s(ap) 2 = P tr(ap) P s(ap) T s(ap) = τ (-τ ) Ts(AP) p ( 3) T = Probability of STA successfully trasmits T s(sta) 3 = c(ap) T AP (E ) = p τ. (4) Similarly, evaluatig the useful trasmissio time for the remaiig STAs we have, T (E ) = τ. (5) Let P tr deote the probability of at least oe trasmissio i a cosidered slot time ad P s deote a successful trasmissio. As the AP ad the STAs coted for the chael with equal privileges, the share of the AP i the system throughput is S /( + ) S /( + ) where S is the system throughput as derived by Biachi [2]: while that of the remaiig STAs is [ ] tr s p S = (9) + = [(-τ ) (-τ ) ] σ = (-τ ) σ = P tr(sta) P s(sta) T s(sta) = τ (-τ ) Ts(STA) It is importat to ote that the time the AP occupies the chael i case II (AP piggybacks) is accouted i the evet of a successful trasmissio by the STAs. p ( 4) T = Probability of collisio T 4 cl(ap) = (- Probability of a sigle or o trasmissio) T cl(ap) + [ ( τ ) ( + ) τ (-τ ) ] T Thus, + + T total = (-τ ) σ + τ (-τ ) T + s(ap) τ (-τ ) T + s(sta) [ ( τ ) ( + ) τ (-τ ) ] T (3) c(ap) For the AP, the time spet i useful trasmissio cosiderig both the cases i which trasmissios occur is give by: P tr(ap) P s( AP) E p + P tr2(ap) P s2(ap) E p = [ τ (-τ ) + τ (-τ ) ] Ep = [ (-τ ) ( + )] Ep P STAs p tr(sta) P s(sta) E p - = (-τ ) E p We fially calculate the AP s throughput usig (), (3) ad (4) as: [ τ (-τ ) ( + )] Ep SAP = (6) TTotal From (), (3) ad (5) the throughput of the STAs is give by: - τ (-τ ) Ep Sode =. (7) TTotal We ext evaluate the throughput for the STA ad AP for 802. DCF based o the model preseted i [2]. The time, T s, for which chael will be busy due to a successful trasmissio is same as T s(ap). Also the collisio time remais costat i both BDCF ad DCF. Thus, T s = T s(ap) ad T c = T c(ap) (8) (- P ) + P P T + ( P )P T tr P P E tr s s s tr c Figure 5(a-c) shows the umerical results of the throughput as a fuctio of umber of statios ad validate our aalysis through simulatios. We cosider Mbps chael ad other parameters are same as described i ext sectio. Figure 5(a) shows the obtaied throughput by AP ad STAs with DCF. Clearly, we ca observe a substatial ufairess betwee the throughputs of AP (dowlik flows) ad STAs (uplik flows). This is because of the CSMA/CA mechaism, which provides equal access privileges to the AP ad STAs. Thus the AP oly gets /(+) of the total available badwidth (with STAs ad a AP), while the STAs obtai a higher share (/(+)). O the other had, with the preferetial treatmet for AP i BDCF the AP achieves fair share of the badwidth (almost equal to that obtaied by the STAs).

10 Nagesh S. Nadiraju et al. 9 of 6 (a) Throughput compariso of AP ad STAs with DCF (b) Throughput compariso of AP with BDCF (c) Throughput compariso of STAs with BDCF Figure 5. Aalytical ad Simulatio throughput comparisos of BDCF 6. SIMULATION RESULTS I this sectio, we compare the performace of BDCF with DCF ad DCF+ [5]. Before we proceed to the aalysis, we briefly describe the workig of DCF+. I DCF+, a STA trasmits a DATA packet after reservig the chael via RTS-CTS hadshake as i DCF. Upo receivig a DATA packet, the destiatio STA checks its buffer for ay outstadig packet destied for the seder. If such a packet is foud, it attempts to reserve the chael for trasmittig this DATA packet. The reservatio is accomplished by modifyig the duratio field i the ACK packet, thus turig it ito a implicit RTS packet. The, the seder may respod with a CTS packet (if it agrees for the followig trasmissio) or discard it treatig as a regular ACK (if it does ot agree for the followig trasmissio). Origially desiged for ad hoc etworks, DCF+ also uses the piggybackig cocept, but applies this idea to every STA, i.e., it does ot give ay priority to the AP. We have implemeted BDCF ad DCF+ i the s-2 simulator (versio 2.26) [6]. For our simulatios, we have used the sceario described i Figure, where a AP is servig 0 statioary STAs. We placed the STAs such that all were i the trasmissio rage of each other, thus avoidig ay hidde termial problem. The badwidth of the wireless chael is set to 2 Mbps ad the AP is coected to a server through a wired lik with badwidth of 00 Mbps ad 2ms of propagatio delay. Other simulatio parameters are summarized i Table I. We have cosidered both symmetric ad asymmetric traffic patters: For symmetric traffic we cosidered 5 uplik ad 5 dowlik flows, deoted by 5Up-5D. I case of asymmetric traffic we agai cosidered two differet cases: 3 uplik flows ad 7 dowlik flows, deoted by 3Up-7D ad 7 uplik flows ad 3 dowlik flows, deoted by 7Up-3D. We assume that o two flows start/ed at the same ode. We have doe a comparative aalysis of the aggregate throughput, average ed to ed delay, ad per stream fairess of IEEE 802. DCF, BDCF ad DCF+ for the aforemetioed traffic patters. All results preseted here are averaged over 0 simulatio rus with differet seed values. Table I: Simulatio Parameters. Parameters Value Number of Nodes 0 Packet Size 000 bytes Simulatio Time 250s Trasmissio Rage 250m Badwidth 2 Mbps Node Placemet Fixed Radio Propagatio Model Two Ray Groud MAC Protocol IEEE 802. Routig Protocol DSDV Trasport/Applicatio Protocol UDP(CBR), TCP(FTP)

11 Nagesh S. Nadiraju et al. 0 of 6 6. Aalysis of UDP traffic I this sectio, we discuss ad aalyze the various performace metrics for UDP traffic. 6.. Aggregate Throughput We first compare the performace of the aggregate uplik/dowlik throughputs achieved by the three schemes (BDCF, DCF ad DCF+). We vary the DATA rate of the CBR traffic ruig over UDP from 00Kbps to 800Kbps ad measure the aggregate throughput achieved by the flows i either directios (uplik ad dowlik). Cosiderig the two differet traffic patters metioed above, Figures 6(a-c) ad 6(d-f) show the aggregate uplik ad dowlik throughputs respectively. We observe a huge differece betwee the uplik ad dowlik throughputs whe DCF/DCF+ is employed. As show i Figure 6(a-c), at low loads all the three protocols have similar performace. This is because the chael is relatively free ad all odes ca trasmit their packets without much cotetio. With DCF/DCF+, as we icrease the traffic load, the aggregate uplik throughput rapidly icreases ad dowlik flows starve. Eve for margial icrease i the traffic load, with IEEE 802. DCF or DCF+, the uplik flows obtai a very high throughput ad completely domiate the access to the chael. Dowlik flows experiece severe cogestio resultig i drastic reductio of the aggregate dowlik throughput. Oe importat thig to ote from Figure 6(d) is that, till 200Kbps load, the throughput of dowlik traffic icreases as there is sufficiet badwidth to accommodate all uplik ad dowlik flows. O the other had, with BDCF the available badwidth is fairly distributed amog uplik ad dowlik traffic. The dowlik flows achieve a fair share of the total badwidth, without affectig the performace of uplik flows. This ca be attributed to the preferetial treatmet for the AP. AP obtais substatial chael share to accommodate all the dowlik flows ad thus limitig the uplik traffic from the odes. I DCF, the throughput of idividual uplik flows is early 4 times the throughput of idividual dowlik flows. However whe BDCF is employed, this sharp differece does ot occur. The throughput of idividual uplik flows is almost equal to ay of the idividual dowlik flows. The aggregate dowlik throughput is improved by early 300% whe compared with DCF/DCF+. Hece, by providig preferetial access to the AP, BDCF esures fair sharig of badwidth amog uplik ad dowlik flows Average ed-to-ed packet delay We ow aalyze the average ed-to-ed delay of the uplik/dowlik traffic. We observe that BDCF sigificatly reduces the average ed-to-ed delay of dowlik traffic without severely affectig the delay of uplik traffic. Figure 7(a-f) shows the average ed-to-ed delay of the data packets. The average ed-to-ed delay for both uplik ad dowlik flows icreases with the icrease i the data rate. With DCF/ DCF+, the AP drops a large umber of packets belogig to the dowlik traffic. The packets that are trasmitted by the AP experiece similar delays as experieced by the packets of uplik flows. Thus the edto-ed delay of dowlik traffic does ot reflect the true problem with DCF. As ca be see from Figure 7(a-c), BDCF slightly icreases the delay for the uplik flows. This is because the AP takes the chael more frequetly ad thus the STAs have to wait for a relatively loger time i BDCF, to trasmit their packets. O the other had, the average ed-to-ed delay for the dowlik traffic is sigificatly reduced (see Figure 6(d-f)). Dowlik flows experiece substatially smaller ed-to-ed delays (by a factor of 2 to 3), sice the AP trasmits the packets headig for the STAs more ofte. Although there is slight icrease i the delay for uplik flows, this icrease is acceptable cosiderig the icreased trasmissio by the AP. Furthermore, these results are ecouragig as most of the traffic is expected to be i dowlik directio ad from the AP (e.g. , web browsig, dowloadig music etc.). The higher average ed-to-ed delay with DCF/DCF+ may result i higher dowload times ad cosequet user dissatisfactio Fairess Idex I this sectio we compare the fairess amog all the flows. We have used the Jai s fairess idex (f) [8] to measure the fairess amog the flows. It is give by: 2 xi i= f = i, 2 * xi i= Where, there are flows i the etwork ad x i is the throughput achieved by flow i. The fairess idex is always positive ad whe it approaches oe, it implies that all the flows are gettig equal share of the available badwidth. Whe the fairess idex drops or has egative slope, the it idicates that the available badwidth is ot fairly shared amog the flows. The fairess

12 Nagesh S. Nadiraju et al. of 6 idexes for asymmetric (3Up-7D) ad symmetric traffic (5Up-5D) cofiguratios are show i Figure 8(a) ad (b), respectively. The fairess idex is ear costat ad is close to oe with BDCF i both traffic cofiguratios. This is because all the flows obtai a fair share of the available badwidth. However, this is ot the case whe legacy DCF ad DCF+ are employed, as the dowstream flows achieve very low throughputs whe compared to the throughputs of uplik flows. (a) 3Up-7D (b) 5Up-5D (c) 3Up-7D (d) 3Up-7D (e) 5Up-5D (f) 5Up-5D Figure 6. Aggregate Throughput for UDP Traffic 6.2. Aalysis of TCP traffic I this sectio, we aalyze the performace of TCP traffic with differet traffic patters. Oce agai we observe similar ufairess amog the uplik/dowlik flows as illustrated i the experimetal results (preseted i sectio 3). As ca be oted from the previous sub-sectio, for UDP traffic flows, BDCF solves the ufairess problems by sigificatly improvig the performace of dowlik flows. I this sectio, we demostrate how BDCF overcomes the ufairess problem for TCP traffic as well. Furthermore we also otice that BDCF also achieves early 5% improvemet i the overall throughput of TCP Aggregate Throughput Figure 9 shows the throughput performace of TCP traffic for the differet traffic patters (asymmetric ad symmetric). From figures 9(a-c), we ca observe the disgraceful performace of the dowlik TCP traffic flows whe legacy 802. DCF is employed. I cotrast, whe BDCF is employed, we observe fair sharig of the available badwidth amog uplik ad dowlik flows for all traffic patters. For istace, with BDCF i the asymmetric traffic (3Up-7D) sceario, the dowlik flows achieve Kbps (20 Kbps per flow); while the uplik flows obtai aroud 389 Kbps (29 Kbps per flow). However, with DCF ad asymmetric traffic (3Up-7D), the dowlik flows get oly a meager 60 Kbps (aroud 87 Kbps per flow), while the aggregate uplik throughput (Figure 9(b)) is as high as 470 Kbps (aroud 57 Kbps per flow). The poor performace of TCP with DCF ca be explaied as follows. TCP geerates bi-directioal traffic. TCP ACKs of the uplik flows ad TCP DATA packets of the dowlik flows compete for the limited chael share of the AP. This icreased dowlik traffic load at the AP leads to overflowig of the lik layer queues at the AP ad resultig i excessive packet drops. TCP cogestio cotrol algorithm further worses the situatio by reducig the cogestio widow of a flow whe it detects a packet drop. If a TCP DATA packet of a dowlik flow is dropped at the AP, timeout occurs at the source ad hece the cogestio widow is decreased, leadig to a lower throughput. However, if a TCP ACK of a uplik

13 Nagesh S. Nadiraju et al. 2 of 6 flow is dropped, due to the cumulative ature of TCP ACKs, evetually aother ACK with a higher sequece umber will reach the uplik flow source ad the TCP cogestio widow will ot be reduced. Thus the dowlik traffic experieces severe cogestio cotrol while the uplik traffic is ot affected at the same rate. Cosequetly the uplik flows ejoy higher et throughputs whe compared to dowlik flows. (a) 3Up-7D (b) 5Up-5D (c) 7Up-3D (d) 3Up-7D (e) 5Up-5D (f) 7Up-3D Figure 7. Average Ed to Ed Delay for UDP Traffic Per Flow Fairess BDCF DCF DCF+ u3-d7 u5-d5 u7-d3 8(a) UDP Traffic (3Up-7D) (b) UDP Traffic(5Up-5D) (c) TCP Traffic Figure 8. Fairess Idex I summary, dowlik flows are ot oly affected by the limited chael availability for the AP, but also due to TCP- DATA packet drops at the AP. We carefully observed the cogestio widow growth of all flows ad otice that the cogestio widow of dowlik flows experiece frequet cut dow due to packet drops at the AP (ad thereby leadig to timeouts). I cotrast, the cogestio widow for all the uplik flows grows cotiuously. Similar observatio is also reported by the authors i [4]. Oce agai BDCF overcomes this problem by givig a preferetial treatmet to the AP. Wheever a packet from the STAs is received by the AP; it ca immediately trasmit a packet (recall from sectio 4) from its buffer without ay eed for chael

14 Nagesh S. Nadiraju et al. 3 of 6 cotetio. I this way, at high traffic loads, the AP ca avoid large queues ad overflows by immediately trasmittig either the TCP-ACKs/TCP-DATA packets. As more ad more dowstream DATA packets are trasmitted the dowlik flows achieve acceptable throughputs without affectig the uplik flows. Throughput (Kbps) Uplik Dowlik Throughput (Kbps) Uplik Dowlik Throughput (Kbps) Uplik Dowlik 0 BDCF DCF DCF+ 0 BDCF DCF DCF+ 0 BDCF DCF DCF+ (a) Asymmetric traffic (U3-D7) (b) Symmetric traffic (U5-D5) (c) Asymmetric traffic (U7-D3) Figure 9. TCP Aggregate Throughput Fairess Idex As show i Figure 8(c), BDCF maitais high fairess idex with TCP traffic as well. It is iterestig to ote that DCF performs better i the case of TCP traffic as compared to the UDP traffic, but it still has a low fairess idex whe compared with BDCF. With BDCF, all flows achieve uiform throughput which is idicated by the high fairess idex. I the case of symmetric traffic (5Up-5D), the fairess idex for DCF is just 0.9 while our scheme still maitais a fairess idex close to (i.e. all flows get equal share of the chael badwidth). DCF+ works better tha DCF for TCP traffic. 7. RELATED WORK Fairess provisioig i wireless etworks has bee a attractive area of research ad has bee explored at various layers. Most of the research addresses the problem of ufairess observed i the upper layers. A large amout of work aalyses the iteractio of TCP with the IEEE MAC layer [0][2][3]. Fair amout of research also reports the ufairess of IEEE 802. i multi-hop wireless etworks. I particular, Xu et al. [7] demostrated the istable behavior of TCP i ad hoc etworks ad the ufairess effect o the selectio of the TCP cogestio widow. The ufairess problem betwee uplik ad dowlik TCP flows i a AP based WLAN was iitially reported by Ramjee et al. [2].They studied the iteractio betwee TCP ad IEEE 802. MAC protocol ad idetified the buffer size at the AP as the cause for ufairess, the they proposed receiver widow size maipulatio i the TCP ACK to gover the access of wireless lik. Bottigliego et al. [3] studied the ufairess due to chael uavailability. They aalyzed the chael coditios betwee the STA ad the AP, choosig the STA with best chael coditio for trasmissio ad compesatig the other STAs later with a burst trasmissio. Yag et al. [6] studied the ufairess betwee a sigle uplik ad dowlik flow i multi-hop etworks ad suggested a rate limitig i the MAC layer o to decrease the ufairess amog the flows. However, their scheme reduces the throughput achieved. The cocept of reverse chael reservatio i WLANs has bee first itroduced i the DCF+ scheme [5]. The goal of DCF+ is to improve the performace of TCP i WLANs (usig DCF) by a implicit reservatio of the chael. However, as our simulatio results have idicated, DCF+ also has the ufairess problem because the implicit reservatio is used by ay STA. Recetly, attempts to improve performace of TCP i multi-hop ad hoc etworks by similar techiques were proposed i [3] ad [5]. I [3], the authors try to reduce itra ad iter flow cotetio. Itra flow cotetio is ecoutered betwee TCP-DATA ad TCP-ACK packets of a sigle TCP flow while Iter-flow cotetio is experieced betwee TCP-DATA packets of differet TCP flows. They propose two schemes Quick exchage, i which the seder reserves the reverse chael for the TCP-ACK packets ad Fast-forward, i which the seder allows the receiver to forward the curretly received packet towards the destiatio. Kuag et al. [5] proposed a multi-chael MAC ad reverse chael reservatio for mitigatig the DATA-DATA ad DATA-ACK cotetios. However they have ot addressed the fairess problem for the ifrastructure

15 Nagesh S. Nadiraju et al. 4 of 6 based etworks. Moreover, it should also be oted that the above schemes are desiged for MANETs. Furthermore, this ability to seak a packet is eabled for ay receivig STA that has a packet to trasmit. Hece, whe applied to AP based WLANs, these schemes ca ot distiguish betwee a AP ad other STAs ad will ot be able provide a preferetial treatmet to AP packets oly. Piggybackig, implicit ACK ad IFS based preferetial access are also preset i PCF. I PCF, the PC waits for a small PIFS time period after the chael is sesed idle before pollig a STA for trasmissio. I this way, it gets guarateed chael access before other STAs. However, PCF is complex to implemet ad it has ot bee used i practice. O the other had, we observe that our very simple ehacemet to the DCF ca provide substatial fairess improvemet. It is also worth to metio the IEEE 802.e stadard amedmet, which is supposed to provide QoS support for WLANs, ad is expected for the ed of this year. I IEEE 802.e, several traffic classes are defied ad the AP ca give differet access priority to differet classes. 802.e icludes more sophisticated facilities to support QoS compared with legacy 802., such as call admissio cotrol ad maximum trasmissio opportuity provisios. Clearly, BDCF ca ot provide QoS support, but its basic priciple ca still be applied i the case where all STAs use the best effort service provided by 802.e. 8. CONCLUSION The log term MAC layer fairess idea of IEEE 802. DCF does ot guaratee trasport layer fairess amog uplik ad dowlik flows. Cosequetly, the dowlik flows suffer from very low throughputs ad higher ed-to-ed delays. O the other had, the uplik flows ejoy relatively higher throughput ad low ed to ed delays. The mai cotributios of our paper are three fold: We experimetally demostrate the existig ufairess problem i typical WLAN hotpots. We propose a simple ehacemet to DCF for overcomig the ufairess problem. We develop aalytical models to evaluate the throughputs of AP ad STAs ad verify these models through extesive simulatio study. Our proposed BDCF protocol eables the AP to access the chael more frequetly by gratig a preferetial treatmet. I additio to this, our protocol also reduces the time wasted i chael cotetio ad backoff mechaism at the MAC layer. BDCF grats fair share of the badwidth to the dowlik flows ad avoids the moopoly of uplik flows. We otice that the aalytical results fid i good agreemet with the simulatio results. Comprehesive simulatios are also coducted o various traffic patters for both TCP ad UDP traffic. It has bee demostrated that BDCF successfully solves the ufairess problem alog with substatial improvemets i the throughputs ad reductio i the ed-to-ed delays of the dowward traffic (aroud 300%). REFERENCES [] IEEE Std IEEE Stadard for Wireless LAN Medium Access Cotrol (MAC) ad Physical Layer (PHY) Specificatio, ISO/IEC 8802-:999 (E), Aug., 999. [2] S. Pilosof, R. Ramjee, D. Raz, Y. Shavitt, ad P. Siha, Uderstadig TCP Fairess over Wireless LAN, IEEE INFOCOM, vol. 2, pp , April [3] M. Bottigliego, C. Casetti, C. F. Chiasserii ad M. Meo, Short-term Fairess for TCP Flows i 802.b WLANs, IEEE INFOCOM [4] I. Aad ad C. Casette, Differetiatig mechaisms i IEEE 802., IEEE INFOCOM 200. [5] H. Wu, Y. Peg, K. Log, S. Cheg, ad J. Ma, Performace of Reliable Trasport Protocol over IEEE 802. Wireless LAN: Aalysis ad Ehacemet, IEEE INFOCOM, vol. 2, pp , Jue [6] UCB/LBNL/VINT Network Simulator (s-2), Available at [7] V. Bharghava et al., "MACAW: A Media Access Protocol for Wireless LANs," Proc. ACM SIGCOMM '94, vol. 24, o. 4, 994, pp [8] R. Jai, The Art of Computer Systems Performace Aalysis, Joh Wiley ad Sos, 99. [9] H. Balakrisha ad V. Padmaabha, How Network Asymmetry affects TCP performace, IEEE commuicatio magazie, 60-67, April 200. [0] S. Xu ad T. Saddawi, Does the IEEE 802. MAC protocol work well i multihop wireless ad hoc etworks?, IEEE commuicatio magazie, 39(6):30-37, Jue 200. [] S. Lu, V. Bharghava, ad R. Srikat, Fair schedulig i wireless packet etworks, ACM Sigcomm 97, Caes, Fracem Sep 997.

16 Nagesh S. Nadiraju et al. 5 of 6 [2] G. Hollad ad N. H. Vaidya, Aalysis of TCP performace over mobile ad hoc etworks, IEEE/ACM MobiCom 99, August 999, pp [3] K. Tag, M. Correa, ad M. Gerla, Effects of ad hoc MAC layer medium access mechaisms uder TCP, ACM/Bal MONET, vol. 6, o. 4,pp , 200. [4] D. Berger et al., TCP-Friedly Medium Access Cotrol for Ad-Hoc Wireless Networks: Alleviatig Self-Cotetio, MASS 04, Oct 24-27, 2004, Florida. [5] T. Kuag ad C. Williamso, A bidirectioal multi-chael MAC protocol for improvig TCP performace o multihop wireless ad hoc etworks, Proc. of ACM/IEEE MSWiM, Veice, Italy, pp , October [6] L. Yag, W.K.G. Seah ad Q. Yi, Improvig Fairess amog TCP Flows crossig Wireless Ad Hoc ad Wired Networks, Mobihoc 03, Jue -3, 2003, Aapolis, Marylad. [7] K. Xu, S. Bae, S. Lee ad M. Gerla, TCP Behavior across Multihop Wireless Networks ad the Wired Iteret, WoWMoM 02, September 28, 2002, Atlata, Georgia. [8] Z. Fu et al., The Impact of Multihop Wireless Chael o TCP Throughput ad Loss, IEEE INFOCOM [9] J. Malie, Host AP Driver package for Liux, Available at [20] NLANR/DAST Iperf, Available at [2] G. Biachi, Performace aalysis of the IEEE 802. distributed coordiatio fuctio, IEEE J. Select. Areas Commuicatio, vol. 8, pp , Mar

Achieving Fairness in Wireless LANs by Enhanced IEEE DCF *

Achieving Fairness in Wireless LANs by Enhanced IEEE DCF * Achievig Fairess i Wireless LANs by Ehaced IEEE 802.11 DCF * Nagesh S. P. Nadiraju, Hrishikesh Gossai, Dave Cavalcati, Kaushik R. Chowdhury, Dharma P. Agrawal Ceter for Distributed ad Mobile Computig,

More information

Introduction to Wireless & Mobile Systems. Chapter 6. Multiple Radio Access Cengage Learning Engineering. All Rights Reserved.

Introduction to Wireless & Mobile Systems. Chapter 6. Multiple Radio Access Cengage Learning Engineering. All Rights Reserved. Itroductio to Wireless & Mobile Systems Chapter 6 Multiple Radio Access 1 Outlie Itroductio Multiple Radio Access Protocols Cotetio-based Protocols Pure ALOHA Slotted ALOHA CSMA (Carrier Sese Multiple

More information

Announcements. Reading. Project #4 is on the web. Homework #1. Midterm #2. Chapter 4 ( ) Note policy about project #3 missing components

Announcements. Reading. Project #4 is on the web. Homework #1. Midterm #2. Chapter 4 ( ) Note policy about project #3 missing components Aoucemets Readig Chapter 4 (4.1-4.2) Project #4 is o the web ote policy about project #3 missig compoets Homework #1 Due 11/6/01 Chapter 6: 4, 12, 24, 37 Midterm #2 11/8/01 i class 1 Project #4 otes IPv6Iit,

More information

Lecture 28: Data Link Layer

Lecture 28: Data Link Layer Automatic Repeat Request (ARQ) 2. Go ack N ARQ Although the Stop ad Wait ARQ is very simple, you ca easily show that it has very the low efficiecy. The low efficiecy comes from the fact that the trasmittig

More information

MAC Throughput Improvement Using Adaptive Contention Window

MAC Throughput Improvement Using Adaptive Contention Window Joural of Computer ad Commuicatios, 2015, 3, 1 14 Published Olie Jauary 2015 i SciRes. http://www.scirp.org/joural/jcc http://dx.doi.org/10.4236/jcc.2015.31001 MAC Throughput Improvemet Usig Adaptive Cotetio

More information

Reliable Transmission. Spring 2018 CS 438 Staff - University of Illinois 1

Reliable Transmission. Spring 2018 CS 438 Staff - University of Illinois 1 Reliable Trasmissio Sprig 2018 CS 438 Staff - Uiversity of Illiois 1 Reliable Trasmissio Hello! My computer s ame is Alice. Alice Bob Hello! Alice. Sprig 2018 CS 438 Staff - Uiversity of Illiois 2 Reliable

More information

Table 2 GSM, UMTS and LTE Coverage Levels

Table 2 GSM, UMTS and LTE Coverage Levels 6 INDICATORS OF QUALITY OF SERVICE This sectio defies quality idicators that characterize the performace of services supported o mobile commuicatio systems i their various phases of access ad use 6. 6.1

More information

A New per-class Flow Fixed Proportional Differentiated Service for Multi-service Wireless LAN*

A New per-class Flow Fixed Proportional Differentiated Service for Multi-service Wireless LAN* A New per-class Flow Fixed Proportioal Differetiated Service for Multi-service Wireless LAN* Meg Chag Che, Li-Pig Tug 2, Yeali S. Su 3, ad Wei-Kua Shih 2 Istitute of Iformatio Sciece, Academia Siica, Taipei,

More information

History Based Probabilistic Backoff Algorithm

History Based Probabilistic Backoff Algorithm America Joural of Egieerig ad Applied Scieces, 2012, 5 (3), 230-236 ISSN: 1941-7020 2014 Rajagopala ad Mala, This ope access article is distributed uder a Creative Commos Attributio (CC-BY) 3.0 licese

More information

Session Initiated Protocol (SIP) and Message-based Load Balancing (MBLB)

Session Initiated Protocol (SIP) and Message-based Load Balancing (MBLB) F5 White Paper Sessio Iitiated Protocol (SIP) ad Message-based Load Balacig (MBLB) The ability to provide ew ad creative methods of commuicatios has esured a SIP presece i almost every orgaizatio. The

More information

performance to the performance they can experience when they use the services from a xed location.

performance to the performance they can experience when they use the services from a xed location. I the Proceedigs of The First Aual Iteratioal Coferece o Mobile Computig ad Networkig (MobiCom 9) November -, 99, Berkeley, Califoria USA Performace Compariso of Mobile Support Strategies Rieko Kadobayashi

More information

Data diverse software fault tolerance techniques

Data diverse software fault tolerance techniques Data diverse software fault tolerace techiques Complemets desig diversity by compesatig for desig diversity s s limitatios Ivolves obtaiig a related set of poits i the program data space, executig the

More information

Quality of Service. Spring 2018 CS 438 Staff - University of Illinois 1

Quality of Service. Spring 2018 CS 438 Staff - University of Illinois 1 Quality of Service Sprig 2018 CS 438 Staff - Uiversity of Illiois 1 Quality of Service How good are late data ad lowthroughput chaels? It depeds o the applicatio. Do you care if... Your e-mail takes 1/2

More information

Bayesian approach to reliability modelling for a probability of failure on demand parameter

Bayesian approach to reliability modelling for a probability of failure on demand parameter Bayesia approach to reliability modellig for a probability of failure o demad parameter BÖRCSÖK J., SCHAEFER S. Departmet of Computer Architecture ad System Programmig Uiversity Kassel, Wilhelmshöher Allee

More information

Prevention of Black Hole Attack in Mobile Ad-hoc Networks using MN-ID Broadcasting

Prevention of Black Hole Attack in Mobile Ad-hoc Networks using MN-ID Broadcasting Vol.2, Issue.3, May-Jue 2012 pp-1017-1021 ISSN: 2249-6645 Prevetio of Black Hole Attack i Mobile Ad-hoc Networks usig MN-ID Broadcastig Atoy Devassy 1, K. Jayathi 2 *(PG scholar, ME commuicatio Systems,

More information

Admission control issues in sensor clusters

Admission control issues in sensor clusters Admissio cotrol issues i 802.15.4 sesor clusters Jelea Mišić, Shairmia Shafi, ad Vojislav B. Mišić Departmet of Computer Sciece, Uiversity of Maitoba Wiipeg, Maitoba, Caada PACS umbers: Valid PACS appear

More information

Morgan Kaufmann Publishers 26 February, COMPUTER ORGANIZATION AND DESIGN The Hardware/Software Interface. Chapter 5

Morgan Kaufmann Publishers 26 February, COMPUTER ORGANIZATION AND DESIGN The Hardware/Software Interface. Chapter 5 Morga Kaufma Publishers 26 February, 28 COMPUTER ORGANIZATION AND DESIGN The Hardware/Software Iterface 5 th Editio Chapter 5 Set-Associative Cache Architecture Performace Summary Whe CPU performace icreases:

More information

Evaluation scheme for Tracking in AMI

Evaluation scheme for Tracking in AMI A M I C o m m u i c a t i o A U G M E N T E D M U L T I - P A R T Y I N T E R A C T I O N http://www.amiproject.org/ Evaluatio scheme for Trackig i AMI S. Schreiber a D. Gatica-Perez b AMI WP4 Trackig:

More information

Avid Interplay Bundle

Avid Interplay Bundle Avid Iterplay Budle Versio 2.5 Cofigurator ReadMe Overview This documet provides a overview of Iterplay Budle v2.5 ad describes how to ru the Iterplay Budle cofiguratio tool. Iterplay Budle v2.5 refers

More information

Elementary Educational Computer

Elementary Educational Computer Chapter 5 Elemetary Educatioal Computer. Geeral structure of the Elemetary Educatioal Computer (EEC) The EEC coforms to the 5 uits structure defied by vo Neuma's model (.) All uits are preseted i a simplified

More information

One advantage that SONAR has over any other music-sequencing product I ve worked

One advantage that SONAR has over any other music-sequencing product I ve worked *gajedra* D:/Thomso_Learig_Projects/Garrigus_163132/z_productio/z_3B2_3D_files/Garrigus_163132_ch17.3d, 14/11/08/16:26:39, 16:26, page: 647 17 CAL 101 Oe advatage that SONAR has over ay other music-sequecig

More information

An Improved Shuffled Frog-Leaping Algorithm for Knapsack Problem

An Improved Shuffled Frog-Leaping Algorithm for Knapsack Problem A Improved Shuffled Frog-Leapig Algorithm for Kapsack Problem Zhoufag Li, Ya Zhou, ad Peg Cheg School of Iformatio Sciece ad Egieerig Hea Uiversity of Techology ZhegZhou, Chia lzhf1978@126.com Abstract.

More information

3D Model Retrieval Method Based on Sample Prediction

3D Model Retrieval Method Based on Sample Prediction 20 Iteratioal Coferece o Computer Commuicatio ad Maagemet Proc.of CSIT vol.5 (20) (20) IACSIT Press, Sigapore 3D Model Retrieval Method Based o Sample Predictio Qigche Zhag, Ya Tag* School of Computer

More information

Switching Hardware. Spring 2018 CS 438 Staff, University of Illinois 1

Switching Hardware. Spring 2018 CS 438 Staff, University of Illinois 1 Switchig Hardware Sprig 208 CS 438 Staff, Uiversity of Illiois Where are we? Uderstad Differet ways to move through a etwork (forwardig) Read sigs at each switch (datagram) Follow a kow path (virtual circuit)

More information

Traditional queuing behaviour in routers. Scheduling and queue management. Questions. Scheduling mechanisms. Scheduling [1] Scheduling [2]

Traditional queuing behaviour in routers. Scheduling and queue management. Questions. Scheduling mechanisms. Scheduling [1] Scheduling [2] Traditioal queuig behaviour i routers Schedulig ad queue maagemet Data trasfer: datagrams: idividual packets o recogitio of flows coectioless: o sigallig Forwardig: based o per-datagram, forwardig table

More information

Guaranteeing Hard Real Time End-to-End Communications Deadlines

Guaranteeing Hard Real Time End-to-End Communications Deadlines Guarateeig Hard Real Time Ed-to-Ed Commuicatios Deadlies K. W. Tidell A. Burs A. J. Welligs Real Time Systems Research Group Departmet of Computer Sciece Uiversity of York e-mail: ke@mister.york.ac.uk

More information

1. SWITCHING FUNDAMENTALS

1. SWITCHING FUNDAMENTALS . SWITCING FUNDMENTLS Switchig is the provisio of a o-demad coectio betwee two ed poits. Two distict switchig techiques are employed i commuicatio etwors-- circuit switchig ad pacet switchig. Circuit switchig

More information

Markov Chain Model of HomePlug CSMA MAC for Determining Optimal Fixed Contention Window Size

Markov Chain Model of HomePlug CSMA MAC for Determining Optimal Fixed Contention Window Size Markov Chai Model of HomePlug CSMA MAC for Determiig Optimal Fixed Cotetio Widow Size Eva Krimiger * ad Haiph Latchma Dept. of Electrical ad Computer Egieerig, Uiversity of Florida, Gaiesville, FL, USA

More information

A QoS Provisioning mechanism of Real-time Wireless USB Transfers for Smart HDTV Multimedia Services

A QoS Provisioning mechanism of Real-time Wireless USB Transfers for Smart HDTV Multimedia Services A QoS Provisioig mechaism of Real-time Wireless USB Trasfers for Smart HDTV Multimedia Services Ji-Woo im 1, yeog Hur 2, Jog-Geu Jeog 3, Dog Hoo Lee 4, Moo Sog Yeu 5, Yeowoo Lee 6 ad Seog Ro Lee 7 1 Istitute

More information

Python Programming: An Introduction to Computer Science

Python Programming: An Introduction to Computer Science Pytho Programmig: A Itroductio to Computer Sciece Chapter 6 Defiig Fuctios Pytho Programmig, 2/e 1 Objectives To uderstad why programmers divide programs up ito sets of cooperatig fuctios. To be able to

More information

On Multicast Scheduling and Routing in Multistage Clos Networks

On Multicast Scheduling and Routing in Multistage Clos Networks O Multicast Schedulig ad Routig i Multistage Clos Networks Bi Tag Departmet of Computer Sciece Stoy Brook Uiversity Stoy Brook, NY 794 bitag@cs.suysb.edu Abstract Multicast commuicatio, which ivolves trasmittig

More information

IS-IS in Detail. ISP Workshops

IS-IS in Detail. ISP Workshops IS-IS i Detail ISP Workshops These materials are licesed uder the Creative Commos Attributio-NoCommercial 4.0 Iteratioal licese (http://creativecommos.org/liceses/by-c/4.0/) Last updated 27 th November

More information

Media Access Protocols. Spring 2018 CS 438 Staff, University of Illinois 1

Media Access Protocols. Spring 2018 CS 438 Staff, University of Illinois 1 Media Access Protocols Sprig 2018 CS 438 Staff, Uiversity of Illiois 1 Where are We? you are here 00010001 11001001 00011101 A midterm is here Sprig 2018 CS 438 Staff, Uiversity of Illiois 2 Multiple Access

More information

1&1 Next Level Hosting

1&1 Next Level Hosting 1&1 Next Level Hostig Performace Level: Performace that grows with your requiremets Copyright 1&1 Iteret SE 2017 1ad1.com 2 1&1 NEXT LEVEL HOSTING 3 Fast page loadig ad short respose times play importat

More information

APPLICATION NOTE PACE1750AE BUILT-IN FUNCTIONS

APPLICATION NOTE PACE1750AE BUILT-IN FUNCTIONS APPLICATION NOTE PACE175AE BUILT-IN UNCTIONS About This Note This applicatio brief is iteded to explai ad demostrate the use of the special fuctios that are built ito the PACE175AE processor. These powerful

More information

On Nonblocking Folded-Clos Networks in Computer Communication Environments

On Nonblocking Folded-Clos Networks in Computer Communication Environments O Noblockig Folded-Clos Networks i Computer Commuicatio Eviromets Xi Yua Departmet of Computer Sciece, Florida State Uiversity, Tallahassee, FL 3306 xyua@cs.fsu.edu Abstract Folded-Clos etworks, also referred

More information

Acknowledgement-Aware MPR MAC Protocol for Distributed WLANs: Design and Analysis

Acknowledgement-Aware MPR MAC Protocol for Distributed WLANs: Design and Analysis Globecom 2012 - Wireless Commuicatios Symposium Ackowledgemet-Aware MPR MAC Protocol for Distributed WLANs: Desig ad Aalysis Arpa Mukhopadhyay, Neelesh B. Mehta, Seior Member, IEEE, Vikram Sriivasa, Member,

More information

Switch Construction CS

Switch Construction CS Switch Costructio CS 00 Workstatio-Based Aggregate badwidth /2 of the I/O bus badwidth capacity shared amog all hosts coected to switch example: Gbps bus ca support 5 x 00Mbps ports (i theory) I/O bus

More information

The Penta-S: A Scalable Crossbar Network for Distributed Shared Memory Multiprocessor Systems

The Penta-S: A Scalable Crossbar Network for Distributed Shared Memory Multiprocessor Systems The Peta-S: A Scalable Crossbar Network for Distributed Shared Memory Multiprocessor Systems Abdulkarim Ayyad Departmet of Computer Egieerig, Al-Quds Uiversity, Jerusalem, P.O. Box 20002 Tel: 02-2797024,

More information

. Written in factored form it is easy to see that the roots are 2, 2, i,

. Written in factored form it is easy to see that the roots are 2, 2, i, CMPS A Itroductio to Programmig Programmig Assigmet 4 I this assigmet you will write a java program that determies the real roots of a polyomial that lie withi a specified rage. Recall that the roots (or

More information

GTS Scheduling Scheme for Real-Time Communication in IEEE Industrial Wireless Sensor Networks

GTS Scheduling Scheme for Real-Time Communication in IEEE Industrial Wireless Sensor Networks Idia Joural of Sciece ad Techology, Vol 9(7), DOI:.7485/ijst/6/v9i7/87734, February 6 ISSN (Prit) : 974-6846 ISSN (Olie) : 974-5645 GTS Schedulig Scheme for Real-Time Commuicatio i IEEE8.5.4 Idustrial

More information

Adaptive Graph Partitioning Wireless Protocol S. L. Ng 1, P. M. Geethakumari 1, S. Zhou 2, and W. J. Dewar 1 1

Adaptive Graph Partitioning Wireless Protocol S. L. Ng 1, P. M. Geethakumari 1, S. Zhou 2, and W. J. Dewar 1 1 Adaptive Graph Partitioig Wireless Protocol S. L. Ng 1, P. M. Geethakumari 1, S. Zhou 2, ad W. J. Dewar 1 1 School of Electrical Egieerig Uiversity of New South Wales, Australia 2 Divisio of Radiophysics

More information

Adaptive Resource Allocation for Electric Environmental Pollution through the Control Network

Adaptive Resource Allocation for Electric Environmental Pollution through the Control Network Available olie at www.sciecedirect.com Eergy Procedia 6 (202) 60 64 202 Iteratioal Coferece o Future Eergy, Eviromet, ad Materials Adaptive Resource Allocatio for Electric Evirometal Pollutio through the

More information

Interference Aware Channel Assignment Scheme in Multichannel Wireless Mesh Networks

Interference Aware Channel Assignment Scheme in Multichannel Wireless Mesh Networks Iterferece Aware Chael Assigmet Scheme i Multichael Wireless Mesh Networks Sumyeg Kim Departmet of Computer Software Egieerig Kumoh Natioal Istitute of Techology Gum South Korea Abstract Wireless mesh

More information

Fast Fourier Transform (FFT) Algorithms

Fast Fourier Transform (FFT) Algorithms Fast Fourier Trasform FFT Algorithms Relatio to the z-trasform elsewhere, ozero, z x z X x [ ] 2 ~ elsewhere,, ~ e j x X x x π j e z z X X π 2 ~ The DFS X represets evely spaced samples of the z- trasform

More information

1 Graph Sparsfication

1 Graph Sparsfication CME 305: Discrete Mathematics ad Algorithms 1 Graph Sparsficatio I this sectio we discuss the approximatio of a graph G(V, E) by a sparse graph H(V, F ) o the same vertex set. I particular, we cosider

More information

Random Network Coding in Wireless Sensor Networks: Energy Efficiency via Cross-Layer Approach

Random Network Coding in Wireless Sensor Networks: Energy Efficiency via Cross-Layer Approach Radom Network Codig i Wireless Sesor Networks: Eergy Efficiecy via Cross-Layer Approach Daiel Platz, Dereje H. Woldegebreal, ad Holger Karl Uiversity of Paderbor, Paderbor, Germay {platz, dereje.hmr, holger.karl}@upb.de

More information

The Value of Peering

The Value of Peering The Value of Peerig ISP/IXP Workshops These materials are licesed uder the Creative Commos Attributio-NoCommercial 4.0 Iteratioal licese (http://creativecommos.org/liceses/by-c/4.0/) Last updated 25 th

More information

27 Refraction, Dispersion, Internal Reflection

27 Refraction, Dispersion, Internal Reflection Chapter 7 Refractio, Dispersio, Iteral Reflectio 7 Refractio, Dispersio, Iteral Reflectio Whe we talked about thi film iterferece, we said that whe light ecouters a smooth iterface betwee two trasparet

More information

End Semester Examination CSE, III Yr. (I Sem), 30002: Computer Organization

End Semester Examination CSE, III Yr. (I Sem), 30002: Computer Organization Ed Semester Examiatio 2013-14 CSE, III Yr. (I Sem), 30002: Computer Orgaizatio Istructios: GROUP -A 1. Write the questio paper group (A, B, C, D), o frot page top of aswer book, as per what is metioed

More information

A Generalized Markov Chain Model for Effective Analysis of Slotted IEEE

A Generalized Markov Chain Model for Effective Analysis of Slotted IEEE A Geeralized Markov Chai Model for Effective Aalysis of Slotted IEEE 8..4 Pagu Park, Piergiuseppe Di Marco, Pablo Soldati, Carlo Fischioe, Karl Herik Johasso Abstract A geeralized aalysis of the IEEE 8..4

More information

On Signaling Efficiency for Call Setup in all-ip Wireless Networks

On Signaling Efficiency for Call Setup in all-ip Wireless Networks O Sigalig Efficiecy for Call Setup i all-ip Wireless Networks Miguel Melyk ad Admela Juka Uiversity of Illiois at Urbaa Champaig {mmelyk2, juka}@uiuc.edu Abstract This paper aalyzes the sigalig efficiecy

More information

Analysis Metrics. Intro to Algorithm Analysis. Slides. 12. Alg Analysis. 12. Alg Analysis

Analysis Metrics. Intro to Algorithm Analysis. Slides. 12. Alg Analysis. 12. Alg Analysis Itro to Algorithm Aalysis Aalysis Metrics Slides. Table of Cotets. Aalysis Metrics 3. Exact Aalysis Rules 4. Simple Summatio 5. Summatio Formulas 6. Order of Magitude 7. Big-O otatio 8. Big-O Theorems

More information

Appendix D. Controller Implementation

Appendix D. Controller Implementation COMPUTER ORGANIZATION AND DESIGN The Hardware/Software Iterface 5 th Editio Appedix D Cotroller Implemetatio Cotroller Implemetatios Combiatioal logic (sigle-cycle); Fiite state machie (multi-cycle, pipelied);

More information

Improvement of the Orthogonal Code Convolution Capabilities Using FPGA Implementation

Improvement of the Orthogonal Code Convolution Capabilities Using FPGA Implementation Improvemet of the Orthogoal Code Covolutio Capabilities Usig FPGA Implemetatio Naima Kaabouch, Member, IEEE, Apara Dhirde, Member, IEEE, Saleh Faruque, Member, IEEE Departmet of Electrical Egieerig, Uiversity

More information

A PREDICTION MODEL FOR USER S SHARE ANALYSIS IN DUAL- SIM ENVIRONMENT

A PREDICTION MODEL FOR USER S SHARE ANALYSIS IN DUAL- SIM ENVIRONMENT GSJ: Computer Sciece ad Telecommuicatios 03 No.3(39) ISSN 5-3 A PRDICTION MODL FOR USR S SHAR ANALYSIS IN DUAL- SIM NVIRONMNT Thakur Sajay, Jai Parag Orietal Uiversity, Idore, Idia sajaymca00@yahoo.com

More information

Improving Template Based Spike Detection

Improving Template Based Spike Detection Improvig Template Based Spike Detectio Kirk Smith, Member - IEEE Portlad State Uiversity petra@ee.pdx.edu Abstract Template matchig algorithms like SSE, Covolutio ad Maximum Likelihood are well kow for

More information

Adaptive and Lazy Segmentation Based Proxy Caching for Streaming Media Delivery

Adaptive and Lazy Segmentation Based Proxy Caching for Streaming Media Delivery Adaptive ad Based Proxy Cachig for Streamig Media Delivery Sogqig Che Dept. of Computer Sciece College of William ad Mary Williamsburg, VA 23187 sqche@cs.wm.edu Susie Wee Mobile ad Media System Lab Hewlett-Packard

More information

S. Mehta and K.S. Kwak. UWB Wireless Communications Research Center, Inha University Incheon, , Korea

S. Mehta and K.S. Kwak. UWB Wireless Communications Research Center, Inha University Incheon, , Korea S. Mehta ad K.S. Kwak UWB Wireless Commuicatios Research Ceter, Iha Uiversity Icheo, 402-75, Korea suryaad.m@gmail.com ABSTRACT I this paper, we propose a hybrid medium access cotrol protocol (H-MAC) for

More information

A Study on the Performance of Cholesky-Factorization using MPI

A Study on the Performance of Cholesky-Factorization using MPI A Study o the Performace of Cholesky-Factorizatio usig MPI Ha S. Kim Scott B. Bade Departmet of Computer Sciece ad Egieerig Uiversity of Califoria Sa Diego {hskim, bade}@cs.ucsd.edu Abstract Cholesky-factorizatio

More information

ADVANCES in information and communication technologies

ADVANCES in information and communication technologies IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, VOL. XXX, NO. XX, XXXXXXX 200 Use of Aalytical Performace Models for System Sizig ad Resource Allocatio i Iteractive Video-o-Demad Systems Employig

More information

The Magma Database file formats

The Magma Database file formats The Magma Database file formats Adrew Gaylard, Bret Pikey, ad Mart-Mari Breedt Johaesburg, South Africa 15th May 2006 1 Summary Magma is a ope-source object database created by Chris Muller, of Kasas City,

More information

Security of Bluetooth: An overview of Bluetooth Security

Security of Bluetooth: An overview of Bluetooth Security Versio 2 Security of Bluetooth: A overview of Bluetooth Security Marjaaa Träskbäck Departmet of Electrical ad Commuicatios Egieerig mtraskba@cc.hut.fi 52655H ABSTRACT The purpose of this paper is to give

More information

UNIVERSITY OF MORATUWA

UNIVERSITY OF MORATUWA UNIVERSITY OF MORATUWA FACULTY OF ENGINEERING DEPARTMENT OF COMPUTER SCIENCE & ENGINEERING B.Sc. Egieerig 2014 Itake Semester 2 Examiatio CS2052 COMPUTER ARCHITECTURE Time allowed: 2 Hours Jauary 2016

More information

Introduction to Network Technologies & Layered Architecture BUPT/QMUL

Introduction to Network Technologies & Layered Architecture BUPT/QMUL Itroductio to Network Techologies & Layered Architecture BUPT/QMUL 2018-3-12 Review What is the Iteret? How does it work? Whe & how did it come about? Who cotrols it? Where is it goig? 2 Ageda Basic Network

More information

n Explore virtualization concepts n Become familiar with cloud concepts

n Explore virtualization concepts n Become familiar with cloud concepts Chapter Objectives Explore virtualizatio cocepts Become familiar with cloud cocepts Chapter #15: Architecture ad Desig 2 Hypervisor Virtualizatio ad cloud services are becomig commo eterprise tools to

More information

Task scenarios Outline. Scenarios in Knowledge Extraction. Proposed Framework for Scenario to Design Diagram Transformation

Task scenarios Outline. Scenarios in Knowledge Extraction. Proposed Framework for Scenario to Design Diagram Transformation 6-0-0 Kowledge Trasformatio from Task Scearios to View-based Desig Diagrams Nima Dezhkam Kamra Sartipi {dezhka, sartipi}@mcmaster.ca Departmet of Computig ad Software McMaster Uiversity CANADA SEKE 08

More information

Descriptive Statistics Summary Lists

Descriptive Statistics Summary Lists Chapter 209 Descriptive Statistics Summary Lists Itroductio This procedure is used to summarize cotiuous data. Large volumes of such data may be easily summarized i statistical lists of meas, couts, stadard

More information

NON-LINEAR MODELLING OF A GEOTHERMAL STEAM PIPE

NON-LINEAR MODELLING OF A GEOTHERMAL STEAM PIPE 14thNew Zealad Workshop 1992 NON-LNEAR MODELLNG OF A GEOTHERMAL STEAM PPE Y. Huag ad D. H. Freesto Geothermal stitute, Uiversity of Aucklad SUMMARY Recet work o developig a o-liear model for a geothermal

More information

Realistic Storage of Pending Requests in Content-Centric Network Routers

Realistic Storage of Pending Requests in Content-Centric Network Routers Realistic Storage of Pedig Requests i Cotet-Cetric Network Routers Wei You, Bertrad Mathieu, Patrick Truog, Jea-Fraçois Peltier Orage Labs Laio, Frace {wei.you, bertrad2.mathieu, patrick.truog, jeafracois.peltier}@orage.com

More information

Chapter 3 Classification of FFT Processor Algorithms

Chapter 3 Classification of FFT Processor Algorithms Chapter Classificatio of FFT Processor Algorithms The computatioal complexity of the Discrete Fourier trasform (DFT) is very high. It requires () 2 complex multiplicatios ad () complex additios [5]. As

More information

SCI Reflective Memory

SCI Reflective Memory Embedded SCI Solutios SCI Reflective Memory (Experimetal) Atle Vesterkjær Dolphi Itercoect Solutios AS Olaf Helsets vei 6, N-0621 Oslo, Norway Phoe: (47) 23 16 71 42 Fax: (47) 23 16 71 80 Mail: atleve@dolphiics.o

More information

Analysis of Server Resource Consumption of Meteorological Satellite Application System Based on Contour Curve

Analysis of Server Resource Consumption of Meteorological Satellite Application System Based on Contour Curve Advaces i Computer, Sigals ad Systems (2018) 2: 19-25 Clausius Scietific Press, Caada Aalysis of Server Resource Cosumptio of Meteorological Satellite Applicatio System Based o Cotour Curve Xiagag Zhao

More information

6.854J / J Advanced Algorithms Fall 2008

6.854J / J Advanced Algorithms Fall 2008 MIT OpeCourseWare http://ocw.mit.edu 6.854J / 18.415J Advaced Algorithms Fall 2008 For iformatio about citig these materials or our Terms of Use, visit: http://ocw.mit.edu/terms. 18.415/6.854 Advaced Algorithms

More information

n Based on unrealistic growth forecast n Overcapacity: Fiber 5x100 in three years n Wireless: Expensive spectrum licenses n Fibers

n Based on unrealistic growth forecast n Overcapacity: Fiber 5x100 in three years n Wireless: Expensive spectrum licenses n Fibers EECS228a Research Topics Jea Walrad www.eecs.berkeley.edu/~wlr of Networks Walrad 52 of Networks Pricig of Services Competitio of Users Competitio of Providers Suggested Readigs: http://www.bgsu.edu/departmets/tcom/aota.htm

More information

IMP: Superposer Integrated Morphometrics Package Superposition Tool

IMP: Superposer Integrated Morphometrics Package Superposition Tool IMP: Superposer Itegrated Morphometrics Package Superpositio Tool Programmig by: David Lieber ( 03) Caisius College 200 Mai St. Buffalo, NY 4208 Cocept by: H. David Sheets, Dept. of Physics, Caisius College

More information

Transitioning to BGP

Transitioning to BGP Trasitioig to BGP ISP Workshops These materials are licesed uder the Creative Commos Attributio-NoCommercial 4.0 Iteratioal licese (http://creativecommos.org/liceses/by-c/4.0/) Last updated 24 th April

More information

GE FUNDAMENTALS OF COMPUTING AND PROGRAMMING UNIT III

GE FUNDAMENTALS OF COMPUTING AND PROGRAMMING UNIT III GE2112 - FUNDAMENTALS OF COMPUTING AND PROGRAMMING UNIT III PROBLEM SOLVING AND OFFICE APPLICATION SOFTWARE Plaig the Computer Program Purpose Algorithm Flow Charts Pseudocode -Applicatio Software Packages-

More information

MOTIF XF Extension Owner s Manual

MOTIF XF Extension Owner s Manual MOTIF XF Extesio Ower s Maual Table of Cotets About MOTIF XF Extesio...2 What Extesio ca do...2 Auto settig of Audio Driver... 2 Auto settigs of Remote Device... 2 Project templates with Iput/ Output Bus

More information

Using the Keyboard. Using the Wireless Keyboard. > Using the Keyboard

Using the Keyboard. Using the Wireless Keyboard. > Using the Keyboard 1 A wireless keyboard is supplied with your computer. The wireless keyboard uses a stadard key arragemet with additioal keys that perform specific fuctios. Usig the Wireless Keyboard Two AA alkalie batteries

More information

Lecture 7 7 Refraction and Snell s Law Reading Assignment: Read Kipnis Chapter 4 Refraction of Light, Section III, IV

Lecture 7 7 Refraction and Snell s Law Reading Assignment: Read Kipnis Chapter 4 Refraction of Light, Section III, IV Lecture 7 7 Refractio ad Sell s Law Readig Assigmet: Read Kipis Chapter 4 Refractio of Light, Sectio III, IV 7. History I Eglish-speakig coutries, the law of refractio is kow as Sell s Law, after the Dutch

More information

Lecture 10 Collision resolution. Collision resolution

Lecture 10 Collision resolution. Collision resolution Lecture 10 Collisio resolutio Collisio resolutio May applicatios ivolve a iquiry over a shared chael, which ca be ivoked for: discovery of eighborig devices i ad hoc etworks, coutig the umber of RFID tags

More information

Selfish Attacks in IEEE aa Networks with Intra-AC Prioritization

Selfish Attacks in IEEE aa Networks with Intra-AC Prioritization Selfish Attacks i IEEE 8.11aa Networks with Itra-AC Prioritizatio Lukasz Prasal AGH Uiversity of Sciece ad Techology Krakow, Polad Email: prasal@kt.agh.edu.pl Szymo Szott AGH Uiversity of Sciece ad Techology

More information

A Key Distribution method for Reducing Storage and Supporting High Level Security in the Large-scale WSN

A Key Distribution method for Reducing Storage and Supporting High Level Security in the Large-scale WSN Iteratioal Joural of Digital Cotet Techology ad its Applicatios Vol. 2 No 1, March 2008 A Key Distributio method for Reducig Storage ad Supportig High Level Security i the Large-scale WSN Yoo-Su Jeog *1,

More information

Copyright 2016 Ramez Elmasri and Shamkant B. Navathe

Copyright 2016 Ramez Elmasri and Shamkant B. Navathe Copyright 2016 Ramez Elmasri ad Shamkat B. Navathe CHAPTER 18 Strategies for Query Processig Copyright 2016 Ramez Elmasri ad Shamkat B. Navathe Itroductio DBMS techiques to process a query Scaer idetifies

More information

Lecture Notes 6 Introduction to algorithm analysis CSS 501 Data Structures and Object-Oriented Programming

Lecture Notes 6 Introduction to algorithm analysis CSS 501 Data Structures and Object-Oriented Programming Lecture Notes 6 Itroductio to algorithm aalysis CSS 501 Data Structures ad Object-Orieted Programmig Readig for this lecture: Carrao, Chapter 10 To be covered i this lecture: Itroductio to algorithm aalysis

More information

Performance Analysis of Multiclass FIFO: Motivation, Difficulty and a Network Calculus Approach

Performance Analysis of Multiclass FIFO: Motivation, Difficulty and a Network Calculus Approach Performace Aalysis of Multiclass FIFO: Motivatio, Difficulty ad a Network alculus Approach Yumig Jiag Norwegia Uiversity of Sciece ad Techology (NTNU) 1 19 March 2014, 2d Workshop o Network alculus, Bamberg,

More information

Load balanced Parallel Prime Number Generator with Sieve of Eratosthenes on Cluster Computers *

Load balanced Parallel Prime Number Generator with Sieve of Eratosthenes on Cluster Computers * Load balaced Parallel Prime umber Geerator with Sieve of Eratosthees o luster omputers * Soowook Hwag*, Kyusik hug**, ad Dogseug Kim* *Departmet of Electrical Egieerig Korea Uiversity Seoul, -, Rep. of

More information

Copyright 2016 Ramez Elmasri and Shamkant B. Navathe

Copyright 2016 Ramez Elmasri and Shamkant B. Navathe Copyright 2016 Ramez Elmasri ad Shamkat B. Navathe CHAPTER 26 Ehaced Data Models: Itroductio to Active, Temporal, Spatial, Multimedia, ad Deductive Databases Copyright 2016 Ramez Elmasri ad Shamkat B.

More information

Throughput-Delay Scaling in Wireless Networks with Constant-Size Packets

Throughput-Delay Scaling in Wireless Networks with Constant-Size Packets Throughput-Delay Scalig i Wireless Networks with Costat-Size Packets Abbas El Gamal, James Mamme, Balaji Prabhakar, Devavrat Shah Departmets of EE ad CS Staford Uiversity, CA 94305 Email: {abbas, jmamme,

More information

CS644 Advanced Networks

CS644 Advanced Networks Limitatios of IP CS644 Advaced Networks Lecture 7 QoS Adreas Terzis IP provides oly best effort service IP does ot participate i resource maagemet Caot provide service guaratees o a per flow basis Caot

More information

Price-based Congestion-Control in Wi-Fi Hot Spots

Price-based Congestion-Control in Wi-Fi Hot Spots Price-based Cogestio-Cotrol i Wi-Fi Hot Spots Roberto Battiti, Marco Coti, Erico Gregori, Mikalai Sabel To cite this versio: Roberto Battiti, Marco Coti, Erico Gregori, Mikalai Sabel. Price-based Cogestio-Cotrol

More information

QoS Management: A Model-Based Approach

QoS Management: A Model-Based Approach Copyright ad Referece Iformatio: This material (preprit, accepted mauscript, or other author-distributable versio) is provided to esure timely dissemiatio of scholarly work. Copyright ad all rights therei

More information

Global Optimization of File Availability Through Replication for Efficient File Sharing in MANETs

Global Optimization of File Availability Through Replication for Efficient File Sharing in MANETs Global Optimizatio of File Availability Through Replicatio for Efficiet File Sharig i MANETs Kag Che ad Haiyig She Departmet of Electrical ad Computer Egieerig Clemso Uiversity Clemso, South Carolia 29631

More information

CS200: Hash Tables. Prichard Ch CS200 - Hash Tables 1

CS200: Hash Tables. Prichard Ch CS200 - Hash Tables 1 CS200: Hash Tables Prichard Ch. 13.2 CS200 - Hash Tables 1 Table Implemetatios: average cases Search Add Remove Sorted array-based Usorted array-based Balaced Search Trees O(log ) O() O() O() O(1) O()

More information

APPLICATION NOTE. Automated Gain Flattening. 1. Experimental Setup. Scope and Overview

APPLICATION NOTE. Automated Gain Flattening. 1. Experimental Setup. Scope and Overview APPLICATION NOTE Automated Gai Flatteig Scope ad Overview A flat optical power spectrum is essetial for optical telecommuicatio sigals. This stems from a eed to balace the chael powers across large distaces.

More information

Traffic Models and QoS

Traffic Models and QoS Traffic Models ad QoS TELE4642: Week9 Ackowledgemet: Some slides are adapted from Computer Networkig: A Top Dow Approach Featurig the Iteret, 2 d editio, J.F Kurose ad K.W. Ross All Rights Reserved, copyright

More information

Copyright 2010, Elsevier Inc. All rights Reserved

Copyright 2010, Elsevier Inc. All rights Reserved Computer Networks: A Systems Approach, 5e Larry L. Peterso ad Bruce S. Davie (Subset of topics) Gettig Coected Framig Error Detectio. Reliable Trasmissio Sharig: Etheret ad Multiple Access Networks, Wireless

More information

Multi-Threading. Hyper-, Multi-, and Simultaneous Thread Execution

Multi-Threading. Hyper-, Multi-, and Simultaneous Thread Execution Multi-Threadig Hyper-, Multi-, ad Simultaeous Thread Executio 1 Performace To Date Icreasig processor performace Pipeliig. Brach predictio. Super-scalar executio. Out-of-order executio. Caches. Hyper-Threadig

More information

Global Support Guide. Verizon WIreless. For the BlackBerry 8830 World Edition Smartphone and the Motorola Z6c

Global Support Guide. Verizon WIreless. For the BlackBerry 8830 World Edition Smartphone and the Motorola Z6c Verizo WIreless Global Support Guide For the BlackBerry 8830 World Editio Smartphoe ad the Motorola Z6c For complete iformatio o global services, please refer to verizowireless.com/vzglobal. Whether i

More information