IEEE Distributed Coordination Function(DCF): Analysis and Enhancement *

Size: px
Start display at page:

Download "IEEE Distributed Coordination Function(DCF): Analysis and Enhancement *"

Transcription

1 IEEE 802. Dstrbuted Coordnaton Functon(DCF): Analyss and Enhanceent * Hatao Wu, Shduan Cheng, Yong Peng, Keng Long, Jan Ma 2 Natonal Key Lab of Swtchng Technology and Telecouncaton Networks, P.O.Box 206, Bejng Unversty of Posts & Telecouncatons, Bejng 00876, P.R.Chna 2 Noka Chna R&D Center, Noka House, No., He Png L Dong Je, Bejng, 0003, P.R.Chna Abstract- Beng a art of IEEE roject 802, the 802. Medu Access Control(MAC) s used to suort asynchronous and te bounded delvery of rado data ackets. It s roosed that a Dstrbuted Coordnaton Functon(DCF), whch uses Carrer Sense Multle Access wth Collson Avodance (CSMA/CA) and bnary slotted exonental backoff, be the bass of the IEEE 802. WLAN MAC rotocols. Ths aer rooses a throughut enhanceent echans for DCF by adjustng the Contenton Wndow(CW) resettng schee. Moreover, an analytcal odel based on Markov chan s ntroduced to coute the enhanced throughut of 802. DCF. The accuracy of the odel and the enhanceent of the roosed schee are verfed by elaborate sulatons. Key Words: IEEE 802., CSMA/CA, DCF, analyss I. INTRODUCTION Recently, there s an ncreasng need towards ortable and oble couters or workstatons wth the develoent wreless acket coutng technology. Wreless networks need to rovde councatons between oble ternals, oreover, hgh seed access to backbone networks needs to be rovded too. Wreless Local Area Networks(WLANs)[-4], whch rovdes hgher flexblty and convenence than ther wred counter art, are beng develoed to rovde hgh bandwdth access for users n a lted geograhcal area. IEEE Project 802 recoends an nternatonal standard 802.[-2] for WLANs. The standards ncludes detaled secfcatons both for Medu Access Control(MAC) and Physcal Layer(PHY). In WLANs, the hyscal eda, whch s shared by all statons and has lted connecton range, has sgnfcant dfferences when coared to wred eda. The IEEE 802. standards nclude Dstrbuted Coordnaton Functon(DCF) and otonal Pont Coordnaton Functon(PCF). In 802., the DCF s the fundaental access ethod used to suort asynchronous data transfer on a best effort bass. As secfed n the standards, the DCF ust be suorted by all the statons n a basc servce set(bss). The DCF s based on Carrer Sense Multle Access wth Collson Avodance (CSMA/CA). CSMA/CD s not used because a staton s unable to lsten to the channel whle transttng. In 802. CS s erfored both at hyscal layer, whch s also referred to as hyscal carrer sensng, and at the MAC layer, whch s known as vrtual carrer sensng. The PCF n the 802. s a ollng-based rotocol, whch s desgned to suort collson *Ths work s suorted by Noka-BUPT roject free and real te servces. There are two technques used for acket transttng n DCF. The default one s a two-way handshakng echans, also known as basc access ethod. A ostve MAC acknowledgeent(ack) s transtted by the destnaton staton to sgnal the successful acket transsson. The other otonal one s a four-way handshakng echans, whch uses request-to-send/clear-to-send(rts/cts) technque to reserve the channel before data transsson. Ths technque has been ntroduced to reduce the erforance degradaton due to hdden ternal. However, the drawback of RTS/CTS echans s ncreased overhead for short data fraes. In DCF, a bnary slotted exonental backoff s used wth CSMA/CA. Whenever a backoff occurs, the backoff te s set fro a unfor dstrbuton over the nterval [0,CW], whle the Contenton Wndow(CW) wll be doubled for a retry and reset for a new acket. Ths aer rooses a lttle bt conservatve way by resettng the CW to rove the throughut erforance of DCF. To analyze resettng CW, the odelng of 802. has been exaned. Paer [5] gves the theoretcal throughut lt of 802. based on a -ersstent varant. However, t doesn t take the effect of the Contenton Wndow(CW) and bnary slotted exonental back-off rocedure used by DCF nto consderaton. Unlke those ones, Paer [6,7] use Markov rocess to analyze the saturated throughut of The Markov odel n aer[7] can be regarded as an extenson of the odel n aer[6] and t takes the retranssson lt of MAC fraes nto account. Ths aer analyzes the effect of roosed CW resettng schee by a new Markov chan odel, whch s valdated by elaborate sulatons. The aer s organzed as followng. Secton II brefly descrbes the DCF of IEEE 802. MAC rotocols. In secton III, the new CW resettng schee s ntroduced and an analytcal odel s roosed. Secton IV valdates the accuracy of ths odel by sulatons, and the odel s used for throughut erforance analyss. Fnally, secton V concludes the aer. II. DISTRIBUTED COORDINATION FUNCTION IN 802. The basc servce set(bss) s the fundaental buldng block of IEEE 802. archtecture. The geograhcal area covered by the BSS s known as the basc servce area(bsa), whch s slar to a cell n a cellular network /02/$7.00 (C) 2002 IEEE

2 suorts both the ad hoc network and nfrastructure network archtecture. Ths aer only gves a bref ntroducton of 802. DCF, the readers are referred to [,2] for detaled nforaton about It conssts of both a basc access ethod and an otonal RTS/CTS access ethod. A. The basc access ethod In 802., rorty access to the wreless edu s controlled by the use of nter-frae sace(ifs) te between the transsson of fraes. Totally three IFS ntervals have been secfed by 802. standard: short IFS(SIFS), ont coordnaton functon IFS(PIFS), and DCF-IFS(DIFS). The SIFS s the sallest and the DIFS s the largest. The staton ay roceed wth ts transsson f the edu s sensed to be dle for an nterval larger than the Dstrbuted Inter Frae Sace(DIFS). If the edu s busy, the staton defers untl after a DIFS s detected and then generate a rando back-off erod before transttng. The back-off ter counter s decreased as long as the channel s sensed dle, frozen when the channel s sensed busy, and resued when the channel s sensed dle agan for ore than a DIFS. A staton can ntate a transsson when the backoff ter reaches zero. The back-off te s unforly chosen n the range (0, w-). Also (w-) s known as Contenton Wndow(CW), whch s an nteger wth the range deterned by the PHY characterstcs CW n and CW ax. After each unsuccessful transsson, w s doubled, u to value 2 W, where W equals to (CW n +) and 2 W equals to (CW ax +). Uon receved a acket correctly, the destnaton staton wats for a SIFS nterval edately followng the receton of the data frae and transts a MAC ACK back to the source staton, ndcatng that the data frae has been receved correctly. In case the source staton does not receve an ACK, the data frae s assued to be lost and the source staton schedules retranssson wth the CW doubled. When the data frae s transtted, all the other statons hearng the data frae adjust ther Network Allocaton Vector(NAV), whch s used for vrtual CS at the MAC layer, based on the duraton feld value n the data frae, whch ncludes the SIFS and the ACK followng the data frae. B. The RTS/CTS access ethod In 802.[], DCF also rovdes an otonal way of transttng data fraes that nvolve transsson of secal short RTS and CTS fraes ror to the transsson of actual data frae. When the destnaton receves the RTS frae, t wll transt a CTS frae after SIFS nterval edately followng the receton of the RTS frae. The source staton s allowed to transt ts acket only f t receves the CTS correctly. If a collson occurs wth RTS fraes, less bandwdth s wasted when coared wth the stuaton where larger data fraes are n collson. III. DCF PERFORMANCE ENHANCEMENT AND ANALYSIS In ths aer, we focus on the saturated throughut, whch s also exaned n aer [6,7]. It s a fundaental erforance fgure defned as the throughut lt reached by the syste as the offered load ncreases, and t reresents the load that the syste can carry n stable condtons. A. New backoff schee to reset the CW In 802. DCF, a bnary slotted exonental backoff s used wth CSMA/CA. Whenever a backoff occurs; the backoff te s set fro a unfor dstrbuton over the nterval [0, w-]. After each unsuccessful transsson, w s doubled, u to a axu value 2 W, where W equals to (CW n +) and 2 W equals to (CW ax +). Once the CW reaches CW ax, t wll rean at the value of CW ax untl t s reset. The CW wll be reset to CW n after every successful attet of transsson of a data frae or a RTS frae, or where a retry counter reaches ts lt, whose value s dfferent for data and RTS frae n 802.,.e., 5 and 7[2]. Snce a staton use CW to control the backoff wndow of acket transsson, the otal settng of CW wll affect the erforance of DCF. The backoff rocedure of CW can be consdered as a rogress to robe the otal value of CW, however, the resettng schee n 802. breaks ths rogress, whch wll degrades the erforance of DCF. Then the queston s how to control the backoff counter, or CW otally or near otally. Ths aer rooses a sle change for 802. n order to ake the backoff counter oscllate around the otal value wthout colex calculaton and run-te estaton as n aer [5]. The way s conservatve than that used n It can be descrbed as followng: )Whenever the retry counter reaches the lt, the CW s ket and not reset; 2)After a successful transsson, w s set to the value ax[w/2, CW n +]; 3)Whenever a transsson for fals, w s set to the value n[2w, CW ax +]. It wll be referred as new backoff schee through out ths aer. Another contrbuton of ths aer s the analytcal evaluaton of the saturated throughut of the new backoff schee, n the assuton of deal channel condtons. Ths aer does not choose the way n aer [5], whch uses a - ersstent varant that does not cature the effect of bnary exonental settng of CW. Ths aer uses Markov chan to analyze the effect of new backoff schee. A new Markov chan s roosed, whch dfferentates t fro The analyss ncludes two arts: )Wth a Markov chan, the behavor of a staton s exaned, whch we use to get the statonary robablty τ that the staton transt a acket; 2)The throughut of both basc and RTS/CTS access ethods s exaned. B. Markov Chan Model We use the sae assuton n aer [6,7] for the analyss. The contendng statons s suosed to a fxed nuber, n. Let b(t) be the stochastc rocess reresentng the back-off wndow sze for a gven staton at slot te t. Note the slot te s referred to as the constant value σ and the varable te nterval between two consecutve backoff te counter decreents[6]. As n aer [6,7], the key aroxaton n /02/$7.00 (C) 2002 IEEE

3 b 2( 2 x)( x) + + W( (2 x) )( x) + ( 2 x)( x ) = 2( 2 x)( x) W x x + x x + W x x x ' + + ' ' + ' ( (2 ) )( ) ( 2 )( ) 2 ( 2 )( ) ' > ' (9) ths odel s that the robablty that a transtted acket colldes s ndeendent on the state s(t) of the staton. Thus, the b-densonal rocess {s(t), b(t)} of our roosed schee s a dscrete-te Markov chan, whch s shown n Fg.. - 0, 0,2 -,0,,2 -,0,,2 0,W 0-2 0,W 0 - -,0 -, -,2 -,W ,W - -,W -2,W -,W -2,W - Fg. Markov chan odel of new back-off wndow schee Ths aer use all the araeters assgned for Drect Sequence Sread Sectru(DSSS) PHY n 802.; for other PHY layers, the analyss rocess s slar. In DSSS, CW n and CW ax equal to 3 and 023. Therefore, we have W = 2 W ' () ' W = 2 W > ' where W=(CW n +), and 2 ' W = ( CWax + ), so for DSSS, we have ' = 5. Here we use to reresent axu backoff stage. As secfed n 802.[], ths value could be larger than, whle the CW wll be hold after that, whch s shown s equaton (). In fact, here also eans the axu retranssson count, whch s dfferent for data frae and RTS frae,.e., 5 and 7. In ths aer, the backoff schee to reset the CW s dfferent fro that n 802. DCF, so the Markov chan n ths aer and that n aer [7] are dfferent. In ths Markov chan, the only non-null one-ste transton robabltes are Pk {, k, + } = k [0, W 2] [0, ] P {, k,0} = ( )/ W k [0, W 0 ] [, ] (2) Pk {,,0} = / W k [0, W ] [, ] Pk {,,0} = W / k [0, W ] P{0, k 0, 0} = ( ) / W0 k [0, W0 ] These transton robabltes account, resectvely, for: )the decreents of the backoff ter; 2)after a successful We adot the sae short notaton used n aer [0]: P{, k 0, k 0 }=P{s(t+) =, b(t+) = k s(t) = 0, b(t) = k 0 } transsson at backoff stage, the backoff ter of the new acket starts wth a backoff stage (-); 3)an unsuccessful transsson akes the backoff stages ncrease; 4)at the the axu backoff stage, the CW wll kee the sae value f transsson s unsuccessful; 5)at backoff stage 0, t wll stay on the sae stage f the transsson s successful. Let b,k be the statonary dstrbuton of the Markov chan. Frst note that b,0 = ( ) b 0 < (3),0 we have b,0 = xb 0 (4) where x= /( ) (5) Snce the chan s regular, so for each k (0, W ), we have ( )( b,0 + b ) = 0 W k (6) bk, = b,0 + ( ) b 0 < < +,0 W b (,0 + b,0) = Wth (4)(5) and transtons n the chan, equaton (6) can be slfed as W k b = b k,,0 W 0 (7) Therefore, by usng the noralzaton condton for statonary dstrbuton, we have W W W k W + (8) = bk, = b,0 = b,0 = 0 k= 0 = 0 k= 0 W = 0 2 Usng equaton ()(4)(5)(8), we have equaton (9), whch s shown at the to of ths age. Now the robablty τ that a staton transts n a randoly chosen slot te can be exressed as, x τ = = + b,0 b = 0 x (0) where b can be obtaned fro equaton (9) and x s fro equaton (5). In the statonary state, a staton transts a acket wth robablty τ, so we have τ Therefore, equatons (5)(9)(0) and () reresent a nonlnear syste n the two unknowns τ and, whch can be solved by nuercal results. Note that we ust have = ( ) n () (0,) and τ (0,) Snce the Markov chan transtons n Fg. are dfferent fro those n aer [7], the results obtaned for b s dfferent fro that n aer [7], so do τ and. In fact, for the sae other araeters, the value of τ and are saller than those n aer [7] because of the new backoff schee used. C. Throughut Analyss Let P tr be the robablty that there s at least one transsson n the consdered slot te. And let P s be the /02/$7.00 (C) 2002 IEEE

4 robablty that a transsson s successful, gven the robablty P tr. So we have P ( ) n tr = τ (2) n n nτ( τ) nτ( τ) (3) Ps = = n Ptr ( τ ) Now we are able to exress the noralzed syste throughut S as the rato, E[Payload Inforaton n a slot te] S = E[Length of a slot te] (4) PP s tre[ P] = ( P ) σ + PPT + ( P) PT tr s tr s s tr c where we use the sae sybols as those n aer [6]. Here, T s and T c are the average te the channel s sensed busy because of a successful transsson or a collson. The E[P] s the average acket length and σ s the duraton of an ety slot te. Let acket header be H = PHY hdr + MAC hdr and let roagaton be δ. Then we ust have the followng exresson. bas Ts = H + E[ P] + SIFS + δ + ACK + DIFS+ δ (5) bas Tc = H + E[ P*] + SIFS + δ + ACK + DIFS + δ where bas eans basc access ethod and E[P*] s the average length of the longest acket ayload nvolved n a collson. In all our cases, all the ackets have the sae fxed sze, therefore, we have E[P]=E[P*]=P. For the RTS/CTS access ethod, assung that all the staton use the RTS/CTS for the data frae for slcty, then we have rts Ts = RTS + SIFS+ δ + CTS+ SIFS+ δ + H (6) + E[ P] + SIFS + δ + ACK + DIFS + δ rts Tc = RTS + SIFS+ δ + CTS+ DIFS+ δ where rts eans RTS/CTS access ethod. Note that here we suose collson only occurs between RTS fraes. IV. MODEL VALIDATION Ths aer uses the well-known sulaton tool NS-2 [8] fro Lawrence Berkeley Natonal Laboratory. To valdate our odel, we also coare the results of the new backoff schee wth those of 802. n aer [7]. Also, ths aer assues each staton has enough data to send to obtan the saturated throughut erforance of the new backoff schee. All the araeters used n analytcal odel and our sulatons follow the secfcatons n standard[] for DSSS, and are the sae as those n [7]. Note that we assue the alcaton data ayload s 000bytes and IP header and UDP header are 20 and 8 bytes, so acket ayload at MAC layer s 028bytes. Note our MAC Markov odel equatons are ndeendent of the PHY araeters, so t does not atter when choosng araeters for dfferent PHY layers. A. Sulaton results for basc access ethod Frst we see the results of basc access ethod, whch s shown n Fg.2. Here we use 802. to reresent the odel n aer [7] for 802. standards and New backoff to reresent the odel n ths aer for new CW settng schee. For a fxed nuber of statons, we run 0 sulatons wth dfferent rando seed. Each sybol + or reresents a sulaton result, for 802. and new CW settng schee resectvely. Note for soe sulaton seres, soe sybols are suerosed because those results are dentcal or very close to each other. Fro the fgure we are able to see that the analytcal odel of ths aer s accurate and catures the trend exactly. The odel n aer [7] also accurate to trace the results of 802. because t follows the standards closely both n the Markov chan transtons and n the throughut analyss. Our analyss closely odels 802. and new backoff schee esecally when the nuber of statons s over dozens, whch follows our assuton that the Markov chan s fored,.e., that the robablty that a transtted acket colldes s ndeendent of the state s(t) of the staton s accurate when the nuber of statons s large. We also see that the analyss for the new CW settng a lttle bt overestates the sulaton results. Ths s because n sulatons, there exsts the transsson of routng ackets, whch are send by broadcast and CW wll be reset at the sae te, therefore, t wll break the CW resettng schee roosed n ths aer when the nuber of statons s very hgh. Also we can see that the CW resettng schee n ths aer could enhance the erforance of 802. DCF sgnfcant, whch s roved by both analyss and sulaton results. Snce the schee s rather sle and effectve, and can be regarded as an oton for 802., t can rove the stablty of syste esecally when the nuber of statons s hgh. Saturaton Throughut Nuber of Statons 802. sulaton 802. calculaton New backoff sulaton New backoff calculaton Fg.2 Analyss versus sulatons: basc access ethod B. Sulaton results for RTS/CTS access ethod The results coarson of RTS/CTS access ethod s slar to that of basc ethod. Note that n Fg.3, the vertcal axs scale s dfferent to that n Fg.2, so the reader ay feel /02/$7.00 (C) 2002 IEEE

5 that the analyss s uch hgher than sulatons results. Another reason for the analyss overestates the sulaton results s that n our sulatons, the routng ackets n broadcast ay cause collson wth other routng ackets or RTS frae, therefore, the sulaton erforance s degraded. Fro ths fgure, we are able to conclude that RTS/CTS access ethod s useful to coensate the erforance degradaton due to collson, whose robablty ncreases wth the nuber of statons. Note that we can get these results because n ths aer the acket ayload length, 028bytes, s large enough to coensate the overheads of RTS/CTS. Saturaton Throughut sulaton 802. calculaton New backoff sulaton New backoff calculaton Nuber of Statons Fg.3 Analyss versus sulatons: RTS/CTS access ethod Saturaton Throughut = New backoff New Backoff =3 =5 =7 =7 = Nuber of Statons Fg.4 Effect of for basc access ethod C. Perforance Analyss Ths aer uses the roosed Markov odel to analyze the throughut erforance wth dfferent araeters. As we know fro equaton (9), the value of, and W wll affect the results we acheve. Snce the value of and W has been assgned value related to PHY n the standards, we wll exane the effect of n ths aer. The effect of s shown s Fg.4 and Fg.5, for basc and RTS/CTS access ethod resectvely. Fro these fgures, we can see the effectveness of our new backoff schee. Also, we fnd that can affect the erforance greatly. Note n the aer [2], there s =5, whch s for DSSS PHY. Fro the analyss we know that hgher brngs hgher stablty and ncreased delay for retransssons. Fro Fg.4 and Fg.5 we conclude that the value of 5 and 7 for basc and RTS/CTS access ethod s a good tradeoff. Saturaton Throughut New backoff New Backoff =3 =3 =5 =7 =5 = Nuber of Statons Fg.5 Effect of for RTS/CTS access ethod V. CONCLUSIONS Ths aer rooses a sle and effectve Contenton Wndow(CW) resettng schee to enhance the erforance of IEEE 802. DCF. A new and sle analytcal odel based on Markov chan s ntroduced to coute the throughut of the roosed schee. Ths odel can be used n coutaton both for the basc access ethod and the RTS/CTS access ethod. Coarsons wth sulaton results as well as the odel resented n aer [7] show that ths odel s accurate n redctng the erforance and rove the effectveness of the new backoff schee. REFERENCES [] IEEE standard for Wreless LAN Medu Access Control (MAC) and Physcal Layer (PHY) secfcatons, ISO/IEC 8802-:999(E), Aug. 999 [2] B.P. Crow, J.G. K, IEEE 802. Wreless Local Area Networks, IEEE Councatons agazne, Set. 997 [3] G. Anastas, L.Lenzn QoS rovded by IEEE 802. wreless LAN to advanced data alcatons: a sulaton analyss , Wreless Networks 6 (2000) [4] G.Banch. L.Fratta, M.Olver. Perforance Evaluaton and Enhanceent of the CSMA/CA MAC Protocol for 802. Wreless LANs. Proc. PIMRC , Oct.996 [5] F.Cal, M.Cont, E.Gregor. Dynac Tunng of the IEEE 802. Protocol to Acheve a Theoretcal Throughut Lt, IEEE/ACM Trans. On Networkng, V8, N6, Dec [6] G.Banch. Perforance Analyss of the IEEE 802. Dstrbuted Coordnaton Functon. IEEE Journal on Selected Area n Co. V8, N3, March 2000 [7] Hatao Wu, Yong Peng, Keng Long, Shduan Cheng, A sle odel of IEEE 802. Wreless LAN, Proceedngs of ICII 200,.54-59, Oct. 200 [8] NS, URL htt://www-ash.cs.berkeley.edu/ns /02/$7.00 (C) 2002 IEEE

Access Delay Analysis of IEEE DCF in the Presence of Hidden Stations

Access Delay Analysis of IEEE DCF in the Presence of Hidden Stations Access Delay Analyss of IEEE 82. DCF n the Presence of Hdden tatons Fu-Y Hung and Ivan Marsc CAIP Center, ECE Deartent, Rutgers Unversty Pscataway, NJ 8854-888 {fuyhung, arsc}@ca.rutgers.edu Abstract In

More information

Delay Analysis of Different Backoff Algorithms in IEEE

Delay Analysis of Different Backoff Algorithms in IEEE Delay Analyss of Dfferent Backoff Algorths n IEEE 82. Ivan N. Vukovc otorola Inc., 44 W. Sure Dr., Arlngton Heghts, IL, 64 USA, Ivan.Vukovc@otorola.co, (847) 632-5963, fax (847) 435-997 Abstract - In ths

More information

2016 International Conference on Sustainable Energy, Environment and Information Engineering (SEEIE 2016) ISBN:

2016 International Conference on Sustainable Energy, Environment and Information Engineering (SEEIE 2016) ISBN: 06 Internatonal Conference on Sustanable Energy, Envronent and Inforaton Engneerng (SEEIE 06) ISBN: 978--60595-337-3 A Study on IEEE 80. MAC Layer Msbehavor under Dfferent Back-off Algorths Trong Mnh HOANG,,

More information

Interclass Collision Protection for IEEE e Wireless LANs

Interclass Collision Protection for IEEE e Wireless LANs Interclass Collson Protecton for IEEE 82.e Wreless LANs Woon Sun Cho, Chae Y. Lee Dstrbuted Coordnaton Functon (DCF) n IEEE 82. and Enhanced Dstrbuted Channel Access (EDCA) n IEEE 82.e are contenton-based

More information

Voice capacity of IEEE b WLANs

Voice capacity of IEEE b WLANs Voce capacty of IEEE 82.b WLANs D. S. Amanatads, V. Vtsas, A. Mantsars 2, I. Mavrds 2, P. Chatzmsos and A.C. Boucouvalas 3 Abstract-There s a tremendous growth n the deployment and usage of Wreless Local

More information

Efficient Backoff Algorithm in Wireless Multihop Ad Hoc Networks

Efficient Backoff Algorithm in Wireless Multihop Ad Hoc Networks 1 Chen-Mn Wu, 2 Hu-Ka Su, 3 Wang-Has Yang *1,Correspondng Author Nanhua Unversty, cmwu@mal.nhu.edu.tw 2 Natonal Formosa Unversty, hksu@nfu.edu.tw 3 Hsupng Insttute of Technology, yangwh@mal.ht.edu.tw do:10.4156/jact.vol3.

More information

Introduction. Leslie Lamports Time, Clocks & the Ordering of Events in a Distributed System. Overview. Introduction Concepts: Time

Introduction. Leslie Lamports Time, Clocks & the Ordering of Events in a Distributed System. Overview. Introduction Concepts: Time Lesle Laports e, locks & the Orderng of Events n a Dstrbuted Syste Joseph Sprng Departent of oputer Scence Dstrbuted Systes and Securty Overvew Introducton he artal Orderng Logcal locks Orderng the Events

More information

A Backoff Algorithm for Improving Saturation Throughput in IEEE DCF

A Backoff Algorithm for Improving Saturation Throughput in IEEE DCF A Backoff Algorithm for Improving Saturation Throughput in IEEE 80.11 DCF Kiyoshi Takahashi and Toshinori Tsuboi School of Computer Science, Tokyo University of Technology, 1404-1 Katakura, Hachioji, Tokyo,

More information

136 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 6, NO. 1, JANUARY Ching-Ling Huang and Wanjiun Liao, Senior Member, IEEE

136 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 6, NO. 1, JANUARY Ching-Ling Huang and Wanjiun Liao, Senior Member, IEEE 136 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 6, NO. 1, JANUARY 2007 Throughput and Delay Performance of IEEE 802.11e Enhanced Dstrbuted Channel Access (EDCA) Under Saturaton Condton Chng-Lng

More information

An Adaptive Sleep Strategy for Energy Conservation in Wireless Sensor Networks

An Adaptive Sleep Strategy for Energy Conservation in Wireless Sensor Networks An Adaptve Sleep Strategy for Energy Conservaton n Wreless Sensor Networks Guseppe Anastas, Marco Cont, Maro D Francesco Abstract - In recent years, wreless sensor network deployents for real lfe applcatons

More information

Performance Analysis of the Binary Exponential Backoff Algorithm for IEEE Based Mobile Ad Hoc Networks

Performance Analysis of the Binary Exponential Backoff Algorithm for IEEE Based Mobile Ad Hoc Networks Ths full text aer was eer revewed at the dreton of IEEE Counatons Soety subet atter exerts for ublaton n the IEEE ICC roeedngs Perforane Analyss of the Bnary Exonental Bakoff Algorth for IEEE 8. Based

More information

The ray density estimation of a CT system by a supervised learning algorithm

The ray density estimation of a CT system by a supervised learning algorithm Te ray densty estaton of a CT syste by a suervsed learnng algort Nae : Jongduk Baek Student ID : 5459 Toc y toc s to fnd te ray densty of a new CT syste by usng te learnng algort Background Snce te develoent

More information

Simulation Based Analysis of FAST TCP using OMNET++

Simulation Based Analysis of FAST TCP using OMNET++ Smulaton Based Analyss of FAST TCP usng OMNET++ Umar ul Hassan 04030038@lums.edu.pk Md Term Report CS678 Topcs n Internet Research Sprng, 2006 Introducton Internet traffc s doublng roughly every 3 months

More information

On-line Scheduling Algorithm with Precedence Constraint in Embeded Real-time System

On-line Scheduling Algorithm with Precedence Constraint in Embeded Real-time System 00 rd Internatonal Conference on Coputer and Electrcal Engneerng (ICCEE 00 IPCSIT vol (0 (0 IACSIT Press, Sngapore DOI: 077/IPCSIT0VNo80 On-lne Schedulng Algorth wth Precedence Constrant n Ebeded Real-te

More information

Virtual Memory. Background. No. 10. Virtual Memory: concept. Logical Memory Space (review) Demand Paging(1) Virtual Memory

Virtual Memory. Background. No. 10. Virtual Memory: concept. Logical Memory Space (review) Demand Paging(1) Virtual Memory Background EECS. Operatng System Fundamentals No. Vrtual Memory Prof. Hu Jang Department of Electrcal Engneerng and Computer Scence, York Unversty Memory-management methods normally requres the entre process

More information

A Base Station-Coordinated Contention Resolution for IEEE PMP Networks

A Base Station-Coordinated Contention Resolution for IEEE PMP Networks A Base Staton-Coordnated Contenton Resoluton for IEEE 802.6 PMP Networks Wenyan Lu, Weja Ja,2, Wenfeng Du, and Ldong Ln 2 School of Informaton Scence & Engneerng, Central South Unversty, Changsha, 40083,

More information

Modeling TCP Throughput: A Simple Model and its Empirical Validation

Modeling TCP Throughput: A Simple Model and its Empirical Validation Modelng TCP Throughut: A Smle Model and ts mrcal Valdaton Jtendra Padhye, Vctor Frou, Don Towsley, Jm Kuros 0-09-9 Presenter: Ognjen Vukovc Modelng TCP Throughut: A Smle Model and ts mrcal Valdaton Motvaton

More information

An Adaptive Batched Patch Caching Scheme for Multimedia Streaming *

An Adaptive Batched Patch Caching Scheme for Multimedia Streaming * An Adatve Batched Patch achng Schee for Multeda Streang * Shaohua Qn, Wehong He, Zu L, and Janng Hu School of outer Scence, Beng Unversty of Aeronautcs & Astronautcs, Beng 8,hna {shqn,annghu}@buaa.edu.cn

More information

Mohammad Hossein Manshaei 1393

Mohammad Hossein Manshaei 1393 Mohammad Hossein Manshaei manshaei@gmail.com 1393 1 An Analytical Approach: Bianchi Model 2 Real Experimentations HoE on IEEE 802.11b Analytical Models Bianchi s Model Simulations ns-2 3 N links with the

More information

An Analytical Model for IEEE Point-to-Point Link

An Analytical Model for IEEE Point-to-Point Link An Analytcal Model for IEEE 82. Pont-to-Pont Lnk Yong Yan, Xaowen hu Department of omputer cence, Hong Kong Baptst Unversty Emal: {yyan, chxw}@comp.hkbu.edu.hk Abstract - Wreless mesh networks have attracted

More information

Analysis of Collaborative Distributed Admission Control in x Networks

Analysis of Collaborative Distributed Admission Control in x Networks 1 Analyss of Collaboratve Dstrbuted Admsson Control n 82.11x Networks Thnh Nguyen, Member, IEEE, Ken Nguyen, Member, IEEE, Lnha He, Member, IEEE, Abstract Wth the recent surge of wreless home networks,

More information

RAP. Speed/RAP/CODA. Real-time Systems. Modeling the sensor networks. Real-time Systems. Modeling the sensor networks. Real-time systems:

RAP. Speed/RAP/CODA. Real-time Systems. Modeling the sensor networks. Real-time Systems. Modeling the sensor networks. Real-time systems: Speed/RAP/CODA Presented by Octav Chpara Real-tme Systems Many wreless sensor network applcatons requre real-tme support Survellance and trackng Border patrol Fre fghtng Real-tme systems: Hard real-tme:

More information

THE IEEE standard for wireless local area networks

THE IEEE standard for wireless local area networks IEEE RANSACIONS ON VEHICULAR ECHNOLOGY, VOL. 58, NO. 2, FEBRUARY 2009 855 Determnstc Prorty Channel Access Scheme for QoS Support n IEEE 802.11e Wreless LANs Sunmyeng Km, Rongsheng Huang, Student Member,

More information

A Fair Access Mechanism Based on TXOP in IEEE e Wireless Networks

A Fair Access Mechanism Based on TXOP in IEEE e Wireless Networks 11 Internatonal Journal of Communcaton Networks and Informaton Securty (IJCNIS) Vol. 8, No. 1, Aprl 16 A Far Access Mechansm Based on TXOP n IEEE 8.11e Wreless Networks Marjan Yazdan 1, Maryam Kamal, Neda

More information

UBICC Publishers 2008 Ubiquitous Computing and Communication Journal

UBICC Publishers 2008 Ubiquitous Computing and Communication Journal UBICC Journal Ubqutous Computng and Communcaton Journal 008 Volume 3. 008-04-30. ISSN 99-844 Specal Issue on Moble Adhoc Networks UBICC ublshers 008 Ubqutous Computng and Communcaton Journal Edted by Usman

More information

Optimization Methods: Integer Programming Integer Linear Programming 1. Module 7 Lecture Notes 1. Integer Linear Programming

Optimization Methods: Integer Programming Integer Linear Programming 1. Module 7 Lecture Notes 1. Integer Linear Programming Optzaton Methods: Integer Prograng Integer Lnear Prograng Module Lecture Notes Integer Lnear Prograng Introducton In all the prevous lectures n lnear prograng dscussed so far, the desgn varables consdered

More information

Equation Based Rate Control and Multiple Connections for Adaptive Video Streaming in Cellular Networks

Equation Based Rate Control and Multiple Connections for Adaptive Video Streaming in Cellular Networks Equaton Based Rate Control and Multple Connectons for Adaptve Vdeo Streang n Cellular Networks A. Mardanan Dehkord and V. Tabataba Vakl Abstract Rate control s an portant ssue for vdeo streang n cellular

More information

An Energy-Aware QoS Routing Protocol for Wireless Sensor Networks

An Energy-Aware QoS Routing Protocol for Wireless Sensor Networks An Energy-Aware QoS Routng Protocol for Wreless Sensor Networks Abstract Recent advances n wreless sensor networks have led to any new routng rotocols secfcally desgned for sensor networks. Alost all of

More information

Sums of exponential functions and their new fundamental properties

Sums of exponential functions and their new fundamental properties Sus of exonental functons and ther new fundaental roertes Yur K. Shestoaloff Abstract hs aer dscovers and roves the fundaental roertes of sus of exonental functon n the for of а heore that s stated as

More information

An Efficient Fault-Tolerant Multi-Bus Data Scheduling Algorithm Based on Replication and Deallocation

An Efficient Fault-Tolerant Multi-Bus Data Scheduling Algorithm Based on Replication and Deallocation BULGARIAN ACADEMY OF SCIENCES CYBERNETICS AND INFORMATION TECHNOLOGIES Volue 16, No Sofa 016 Prnt ISSN: 1311-970; Onlne ISSN: 1314-4081 DOI: 10.1515/cat-016-001 An Effcent Fault-Tolerant Mult-Bus Data

More information

Solutions to Programming Assignment Five Interpolation and Numerical Differentiation

Solutions to Programming Assignment Five Interpolation and Numerical Differentiation College of Engneerng and Coputer Scence Mechancal Engneerng Departent Mechancal Engneerng 309 Nuercal Analyss of Engneerng Systes Sprng 04 Nuber: 537 Instructor: Larry Caretto Solutons to Prograng Assgnent

More information

Performance Analysis of Markov Modulated 1-Persistent CSMA/CA Protocols with Exponential Backoff Scheduling

Performance Analysis of Markov Modulated 1-Persistent CSMA/CA Protocols with Exponential Backoff Scheduling Performance Analyss of Markov Modulated -Persstent CSMA/CA Protocols wth ponental Backoff Schedulng Pu ng Wong, Dongje Yn, and Tony T. Lee, Abstract. Ths paper proposes a Markovan model of -persstent CSMA/CA

More information

Algorithm for Computer Aided Design Curve Shape Form Generation of Knitting Patterns

Algorithm for Computer Aided Design Curve Shape Form Generation of Knitting Patterns Algorth for Couter Aded Desgn Curve Shae For Generaton of Knttng Patterns Elena Zahareva-Stoyanova Techncal Unversty of Gabrovo 4 H. Drat str. 500 Gabrovo, ulgara, hone +59 59 Abstract - The knttng ndustry

More information

Fast Retransmission of Real-Time Traffic in HIPERLAN/2 Systems

Fast Retransmission of Real-Time Traffic in HIPERLAN/2 Systems Fast Retransmsson of Real-Tme Traffc n HIPERLAN/ Systems José A Afonso and Joaqum E Neves Department of Industral Electroncs Unversty of Mnho, Campus de Azurém 4800-058 Gumarães, Portugal {joseafonso,

More information

IEEE E: QOS PROVISIONING AT THE MAC LAYER YANG XIAO, THE UNIVERSITY OF MEMPHIS

IEEE E: QOS PROVISIONING AT THE MAC LAYER YANG XIAO, THE UNIVERSITY OF MEMPHIS ACCEPTED FROM O PEN C ALL IEEE 802.11E: QOS PROVISIONING AT THE MAC LAYER YANG XIAO, THE UNIVERSITY OF MEMPHIS ess AIFS[j] AIFS[] PIFS SIFS AIFS[] Content 0 to CW Bac Slot Select s The emergng IEEE 802.11e

More information

Pattern Classification of Back-Propagation Algorithm Using Exclusive Connecting Network

Pattern Classification of Back-Propagation Algorithm Using Exclusive Connecting Network World Acade of Scence, Engneerng and Technolog 36 7 Pattern Classfcaton of Bac-Propagaton Algorth Usng Eclusve Connectng Networ Insung Jung, and G-Na Wang Abstract The obectve of ths paper s to a desgn

More information

Analysis of QoS in WLAN

Analysis of QoS in WLAN Analyss of QoS n WLAN PAAL E. ENGELSTAD AND OLAV N. ØSTERBØ Paal E. Engelstad s Research Scentst n Telenor R&D An analytcal model s proposed to descrbe the prorty schemes of the EDCA mechansm of the IEEE

More information

Aggregated traffic flow weight controlled hierarchical MAC protocol for wireless sensor networks

Aggregated traffic flow weight controlled hierarchical MAC protocol for wireless sensor networks Ann. Telecommun. (29) 64:75 721 DOI.7/s12243-9-95- Aggregated traffc flow weght controlled herarchcal MAC protocol for wreless sensor networks M. Abdur Razzaque M. Mamun-Or-Rashd Muhammad Mahbub Alam Choong

More information

USER CLASS BASED QoS DIFFERENTIATION IN e WLAN

USER CLASS BASED QoS DIFFERENTIATION IN e WLAN USER CLASS BASED QoS DIFFERENTIATION IN 802.11e WLAN Amt Kejrwal, Ratan Guha School of Computer Scence Unversty of Central Florda Orlando, FL-32816 USA E-mal: {kejrwal, guha}@cs.ucf.edu Manak Chatterjee

More information

Achievable Bandwidth Estimation for Stations in Multi-Rate IEEE WLAN Cells

Achievable Bandwidth Estimation for Stations in Multi-Rate IEEE WLAN Cells Achevable Bandwdth Estmaton for Statons n Mult-Rate IEEE 802. WLAN Cells Eduard Garca, Davd Vamonte, Rafael Vdal and Josep Paradells Wreless Networks Group - echncal Unversty of Catalona (UPC) {eduardg,

More information

Extension and Comparison of QoS-Enabled Wi-Fi Models in the Presence of Errors

Extension and Comparison of QoS-Enabled Wi-Fi Models in the Presence of Errors Extenson and Comparson of QoS-Enabled W-F Models n the Presence of Errors Ioanns Papapanagotou, Georgos S. Paschos*, Stavros A. Kotsopoulos** and Mchael Devetskots Electrcal and Computer Engneerng, North

More information

S1 Note. Basis functions.

S1 Note. Basis functions. S1 Note. Bass functons. Contents Types of bass functons...1 The Fourer bass...2 B-splne bass...3 Power and type I error rates wth dfferent numbers of bass functons...4 Table S1. Smulaton results of type

More information

Light Weight Distributed QoS Adapter in Large-Scale Ad hoc Networks. Seyed Hossein Hosseini Nazhad Ghazani 1, R.M.Alguliev 2

Light Weight Distributed QoS Adapter in Large-Scale Ad hoc Networks. Seyed Hossein Hosseini Nazhad Ghazani 1, R.M.Alguliev 2 Lght Weght Dstruted QoS Adapter n Large-Scale Ad hoc Networs Seyed Hossen Hossen Nazhad Ghazan, R.M.Algulev 2 Ph.D. Canddate, Insttute of Inforaton Technology of ANAS, Bau, Azerajan 2 Doctor of Techncal

More information

Load Balancing Algorithm for Web Server Based on Weighted Minimal Connections

Load Balancing Algorithm for Web Server Based on Weighted Minimal Connections Journal of Web ystes and Applcatons (2017) Vol. 1, Nuuber 1 Clausus centfc Press, Canada Load Balancng Algorth for Web erver Based on Weghted Mnal Connectons Pan Zhu1, a, Jangxng Zhang 2,b College of Inforaton

More information

A Free-Collision MAC Proposal for Networks

A Free-Collision MAC Proposal for Networks 12th Brazlan Workshop on Real-Tme and Embedded Systems 89 A Free-Collson MAC Proposal for 802.11 Networks Omar Alment 1,2, Gullermo Fredrch 1, Gullermo Reggan 1 1 SITIC Group Unversdad Tecnológca Naconal

More information

126 Int. J. Ad Hoc and Ubiquitous Computing, Vol. 1, No. 3, Djamel Djenouri*

126 Int. J. Ad Hoc and Ubiquitous Computing, Vol. 1, No. 3, Djamel Djenouri* 126 Int. J. Ad Hoc and Ubqutous Coputng, Vol. 1, No. 3, 2006 New power-aware routng protocol for oble ad hoc networks Djael Djenour* Basc Software Laboratory, CERIST Center of Research, Algers, Algera

More information

AN ALGORITHM FOR ODD GRACEFULNESS OF THE TENSOR PRODUCT OF TWO LINE GRAPHS

AN ALGORITHM FOR ODD GRACEFULNESS OF THE TENSOR PRODUCT OF TWO LINE GRAPHS Internatonal ournal on applcatons of graph theory n wreless ad hoc networks and sensor networks (GRAPH-HOC) Vol.3, No., March 0 AN ALGORITHM FOR ODD GRACEFULNESS OF THE TENSOR PRODUCT OF TWO LINE GRAPHS

More information

Performance analysis of distributed cluster-based MAC protocol for multiuser MIMO wireless networks

Performance analysis of distributed cluster-based MAC protocol for multiuser MIMO wireless networks RESEARCH Open Access Performance analyss of dstrbuted cluster-based MAC protocol for multuser MIMO wreless networks Azadeh Ettefagh *, Marc Kuhn, Celal Eşl and Armn Wttneben Abstract It s known that multuser

More information

Semi-Markov Process based Model for Performance Analysis of Wireless LANs

Semi-Markov Process based Model for Performance Analysis of Wireless LANs Semi-Markov Process based Model for Performance Analysis of Wireless LANs Murali Krishna Kadiyala, Diti Shikha, Ravi Pendse, and Neeraj Jaggi Deartment of Electrical Engineering and Comuter Science Wichita

More information

Efficient QoS Provisioning at the MAC Layer in Heterogeneous Wireless Sensor Networks

Efficient QoS Provisioning at the MAC Layer in Heterogeneous Wireless Sensor Networks Effcent QoS Provsonng at the MAC Layer n Heterogeneous Wreless Sensor Networks M.Soul a,, A.Bouabdallah a, A.E.Kamal b a UMR CNRS 7253 HeuDaSyC, Unversté de Technologe de Compègne, Compègne Cedex F-625,

More information

WIRELESS communication technology has gained widespread

WIRELESS communication technology has gained widespread 616 IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. 4, NO. 6, NOVEMBER/DECEMBER 2005 Dstrbuted Far Schedulng n a Wreless LAN Ntn Vadya, Senor Member, IEEE, Anurag Dugar, Seema Gupta, and Paramvr Bahl, Senor

More information

Video Proxy System for a Large-scale VOD System (DINA)

Video Proxy System for a Large-scale VOD System (DINA) Vdeo Proxy System for a Large-scale VOD System (DINA) KWUN-CHUNG CHAN #, KWOK-WAI CHEUNG *# #Department of Informaton Engneerng *Centre of Innovaton and Technology The Chnese Unversty of Hong Kong SHATIN,

More information

A study of Adaptive Replication Technique in routing time-constrained messages (VoIP) in MANET

A study of Adaptive Replication Technique in routing time-constrained messages (VoIP) in MANET A study of Adaptve Replcaton Technque n routng te-constraned essages (VoIP) n MANET SWATI SAXENA Research Scholar AIM & ACT Banasthal Vdyapth Banasthal, (Ra.) Dr. MADHAVI SINHA Asst. Prof. (HOD) Dept.

More information

Dynamic Resource Discovery based on Preference and Movement Pattern Similarity for Large-Scale Social Internet-of-Things

Dynamic Resource Discovery based on Preference and Movement Pattern Similarity for Large-Scale Social Internet-of-Things > REPLACE THIS LINE WITH YOUR PAPER IDENTIFICATION NUMBER (DOUBLE-CLICK HERE TO EDIT) < 1 Dynac Resource Dscovery based on Preference and Moveent Pattern Slarty for Large-Scale Socal Internet-of-Thngs

More information

Performance Evaluation of IEEE e based on ON-OFF Traffic Model I. Papapanagiotou PhD. Student

Performance Evaluation of IEEE e based on ON-OFF Traffic Model I. Papapanagiotou PhD. Student erformance Evaluaton of IEEE 82.e based on ON-OFF Traffc Model I. apapanagotou hd. Student Wreless Telecommuncaton Laboratory Unversty of atras 265 4 atras Greece papapanag@upnet.gr J.S. Vardakas hd. Student

More information

Time-based Adaptive Retry for Wireless Video Streaming 1

Time-based Adaptive Retry for Wireless Video Streaming 1 Tme-based Adatve etry for Wreless Vdeo Streamng 1 Me-Hsuan Lu, Peter Steenkste, and Tsuhan Chen Electrcal and Comuter Engneerng Deartment Carnege Mellon Unversty 5000 Forbes Avenue, Pttsburgh PA 15213-3890,

More information

Research Article A Comparison Performance Analysis of QoS WLANs: Approaches with Enhanced Features

Research Article A Comparison Performance Analysis of QoS WLANs: Approaches with Enhanced Features Hndaw Publshng Corporaton Advances n Multmeda Volume 007, Artcle ID 387, 3 pages do:055/007/387 Research Artcle A Comparson Performance Analyss of QoS WLANs: Approaches wth Enhanced Features Ioanns Papapanagotou,

More information

A Fair MAC Algorithm with Dynamic Priority for e WLANs

A Fair MAC Algorithm with Dynamic Priority for e WLANs 29 Internatonal Conference on Communcaton Software and Networks A Far MAC Algorthm wth Dynamc Prorty for 82.e WLANs Rong He, Xumng Fang Provncal Key Lab of Informaton Codng & Transmsson, Southwest Jaotong

More information

Keywords: Cloud Computing, Resource Allocation, Queueing Theory, Performance Measures.

Keywords: Cloud Computing, Resource Allocation, Queueing Theory, Performance Measures. Volume, Issue 9, Setember ISSN: 77 8X Internatonal Journal of Advanced Research n Comuter Scence and Software Engneerng Research Paer Avalable onlne at: wwwjarcssecom Resource Allocaton n Cloud Comutng

More information

Performance Analysis of Beacon-Less IEEE Multi-Hop Networks

Performance Analysis of Beacon-Less IEEE Multi-Hop Networks Performance Analyss of Beacon-Less IEEE 2..4 Mult-Hop Networks Racht Srvastava Deptt. of Electrcal Communcaton Engneerng Indan Insttute of Scence Bangalore, Inda 62 rachtsr@gmal.com Anurag Kumar Deptt.

More information

Routing Time-Constrained Traffic in Wireless Sensor Networks

Routing Time-Constrained Traffic in Wireless Sensor Networks Routng Te-Constraned Traffc n Wreless Sensor Networks Keal Akkaya and Mohaed Youns Departent of Coputer Scence and Electrcal Engneerng Unversty of Maryland, Baltore County Baltore, MD 2250 keal youns@cs.ubc.edu

More information

Department of Electrical and Computer Systems Engineering

Department of Electrical and Computer Systems Engineering Department of Electrcal and Computer Systems Engneerng Techncal Report MECSE-5-2004 A Survey of IEEE 802.11 MAC Mechansms for Qualty of Servce (QoS) n Wreless Local Area Networks (WLANs) D. Pham, A. Sekercoglu

More information

A Fast Visual Tracking Algorithm Based on Circle Pixels Matching

A Fast Visual Tracking Algorithm Based on Circle Pixels Matching A Fast Vsual Trackng Algorthm Based on Crcle Pxels Matchng Zhqang Hou hou_zhq@sohu.com Chongzhao Han czhan@mal.xjtu.edu.cn Ln Zheng Abstract: A fast vsual trackng algorthm based on crcle pxels matchng

More information

User Behavior Recognition based on Clustering for the Smart Home

User Behavior Recognition based on Clustering for the Smart Home 3rd WSEAS Internatonal Conference on REMOTE SENSING, Vence, Italy, Noveber 2-23, 2007 52 User Behavor Recognton based on Clusterng for the Sart Hoe WOOYONG CHUNG, JAEHUN LEE, SUKHYUN YUN, SOOHAN KIM* AND

More information

A New Scheduling Algorithm for Servers

A New Scheduling Algorithm for Servers A New Schedulng Algorth for Servers Nann Yao, Wenbn Yao, Shaobn Ca, and Jun N College of Coputer Scence and Technology, Harbn Engneerng Unversty, Harbn, Chna {yaonann, yaowenbn, cashaobn, nun}@hrbeu.edu.cn

More information

Priority-Based Scheduling Algorithm for Downlink Traffics in IEEE Networks

Priority-Based Scheduling Algorithm for Downlink Traffics in IEEE Networks Prorty-Based Schedulng Algorthm for Downlnk Traffcs n IEEE 80.6 Networks Ja-Mng Lang, Jen-Jee Chen, You-Chun Wang, Yu-Chee Tseng, and Bao-Shuh P. Ln Department of Computer Scence Natonal Chao-Tung Unversty,

More information

Performance Analysis of the IEEE MAC Protocol over a WLAN with Capture Effect

Performance Analysis of the IEEE MAC Protocol over a WLAN with Capture Effect Vol. IPSJ Dgtal Courer Nov. 25 Regular Paper Performance Analyss of the IEEE 82. MAC Protocol over a WLAN wth Capture Effect Xaolong L, and Qng-An Zeng, In ths paper, we use a dscrete Markov chan model

More information

Handover Delay Estimation Method for IMS-Based Systems with Heterogeneous Access Networks

Handover Delay Estimation Method for IMS-Based Systems with Heterogeneous Access Networks Councatons 07; (): -7 http://www.scencepublshnggroup.co/j/co do: 0.8/j.co.0700. ISSN: 8-9 (Prnt); ISSN: 8-9 (Onlne) Handover Delay Estaton Method for IMS-Based Systes wth Heterogeneous Access Networks

More information

Bayesian Networks: Independencies and Inference. What Independencies does a Bayes Net Model?

Bayesian Networks: Independencies and Inference. What Independencies does a Bayes Net Model? Bayesan Networks: Indeendences and Inference Scott Daves and Andrew Moore Note to other teachers and users of these sldes. Andrew and Scott would be delghted f you found ths source materal useful n gvng

More information

Merging Results by Using Predicted Retrieval Effectiveness

Merging Results by Using Predicted Retrieval Effectiveness Mergng Results by Usng Predcted Retreval Effectveness Introducton Wen-Cheng Ln and Hsn-Hs Chen Departent of Coputer Scence and Inforaton Engneerng Natonal Tawan Unversty Tape, TAIWAN densln@nlg.cse.ntu.edu.tw;

More information

1 Calculation and Analysis of Buffer

1 Calculation and Analysis of Buffer Sep. 5 Journal of Electronc Scence and Technology of Chna Vol.3 No.3 ` Calculaton and Analyss of Destnaton Buffer for ulteda Servce n ole Ad Hoc Network ZHOU Zhong, AO Yu-ng, JIANG Zh-qong. School of Councaton

More information

A Game Theory based Contention Window Adjustment for IEEE under Heavy Load

A Game Theory based Contention Window Adjustment for IEEE under Heavy Load 93 Internatonal Journal of Communcaton Networks and Informaton Securty (IJCNIS) Vol. 5, No. 2, August 203 A Game Theory based Contenton Wndow Adjustment for IEEE 802. under Heavy Load Mahdeh Ghazvn, Naser

More information

Analysis of Throughput and Energy Efficiency in the IEEE Wireless Local Area Networks using Constant backoff Window Algorithm

Analysis of Throughput and Energy Efficiency in the IEEE Wireless Local Area Networks using Constant backoff Window Algorithm International Journal of Computer Applications (975 8887) Volume 6 No.8, July Analysis of Throughput and Energy Efficiency in the IEEE 8. Wireless Local Area Networks using Constant backoff Window Algorithm

More information

Generating Fuzzy Term Sets for Software Project Attributes using and Real Coded Genetic Algorithms

Generating Fuzzy Term Sets for Software Project Attributes using and Real Coded Genetic Algorithms Generatng Fuzzy Ter Sets for Software Proect Attrbutes usng Fuzzy C-Means C and Real Coded Genetc Algorths Al Idr, Ph.D., ENSIAS, Rabat Alan Abran, Ph.D., ETS, Montreal Azeddne Zah, FST, Fes Internatonal

More information

An Approach for Congestion Control in Sensor Network Using Priority Based Application*

An Approach for Congestion Control in Sensor Network Using Priority Based Application* An Aroach for Congeston Control n Sensor Network Usng Prorty Based Alcaton* Md. Obadur Rahman Muhammad Mostafa Monowar Byung Goo Cho Choong Seon Hong Deartment of Comuter Engneerng, Kyung Hee Unversty

More information

A FUZZY-LOGIC APPROACH FOR DEVELOPING VARIABLES CONTROL CHARTS AND PROCESS CAPABILITY INDICES UNDER LINGUISTIC MEASUREMENTS

A FUZZY-LOGIC APPROACH FOR DEVELOPING VARIABLES CONTROL CHARTS AND PROCESS CAPABILITY INDICES UNDER LINGUISTIC MEASUREMENTS A FUZZY-LOGIC APPROACH FOR DEVELOPING VARIABLES CONTROL CHARTS AND PROCESS CAPABILITY INDICES UNDER LINGUISTIC MEASUREMENTS Abbas Al-Refae, Areen Obadat 1, Ra H. Fouad 1, and Bassel Hanayneh 1 Deartent

More information

A General Model of Wireless Interference

A General Model of Wireless Interference A General Model of Wreless Interference Ll Qu Yn Zhang Feng Wang M Kyung Han Ratul Mahajan Unversty of Texas at Austn Mcrosoft Research Austn, TX 7872, USA Redmond, WA 9852, USA {ll,yzhang,wangf,hanm2}@cs.utexas.edu

More information

E-DEEC- Enhanced Distributed Energy Efficient Clustering Scheme for heterogeneous WSN

E-DEEC- Enhanced Distributed Energy Efficient Clustering Scheme for heterogeneous WSN 21 1st Internatonal Conference on Parallel, Dstrbuted and Grd Comutng (PDGC - 21) E-DEEC- Enhanced Dstrbuted Energy Effcent Clusterng Scheme for heterogeneous WSN Parul San Deartment of Comuter Scence

More information

Real-Time Guarantees. Traffic Characteristics. Flow Control

Real-Time Guarantees. Traffic Characteristics. Flow Control Real-Tme Guarantees Requrements on RT communcaton protocols: delay (response s) small jtter small throughput hgh error detecton at recever (and sender) small error detecton latency no thrashng under peak

More information

Hermite Splines in Lie Groups as Products of Geodesics

Hermite Splines in Lie Groups as Products of Geodesics Hermte Splnes n Le Groups as Products of Geodescs Ethan Eade Updated May 28, 2017 1 Introducton 1.1 Goal Ths document defnes a curve n the Le group G parametrzed by tme and by structural parameters n the

More information

Broadcast Time Synchronization Algorithm for Wireless Sensor Networks Chaonong Xu 1)2)3), Lei Zhao 1)2), Yongjun Xu 1)2) and Xiaowei Li 1)2)

Broadcast Time Synchronization Algorithm for Wireless Sensor Networks Chaonong Xu 1)2)3), Lei Zhao 1)2), Yongjun Xu 1)2) and Xiaowei Li 1)2) Broadcast Tme Synchronzaton Algorthm for Wreless Sensor Networs Chaonong Xu )2)3), Le Zhao )2), Yongun Xu )2) and Xaowe L )2) ) Key Laboratory of Comuter Archtecture, Insttute of Comutng Technology Chnese

More information

A Scheduling Algorithm of Periodic Messages for Hard Real-time Communications on a Switched Ethernet

A Scheduling Algorithm of Periodic Messages for Hard Real-time Communications on a Switched Ethernet IJCSNS Internatonal Journal of Comuter Scence and Networ Securty VOL.6 No.5B May 26 A Schedulng Algorthm of Perodc Messages for Hard eal-tme Communcatons on a Swtched Ethernet Hee Chan Lee and Myung Kyun

More information

A Unified Approach to Survivability of Connection-Oriented Networks

A Unified Approach to Survivability of Connection-Oriented Networks A Unfed Approach to Survvablty of Connecton-Orented Networs Krzysztof Walowa Char of Systes and Coputer Networs, Faculty of Electroncs, Wroclaw Unversty of Technology, Wybrzeze Wyspansego 27, 50-370 Wroclaw,

More information

Re-routing Instability in IEEE Multi-hop Ad-hoc Networks *

Re-routing Instability in IEEE Multi-hop Ad-hoc Networks * Re-routng Instablty n IEEE 802.11 Mult-hop Ad-hoc Networks * Png Chung Ng and Soung Chang Lew Department of Informaton Engneerng The Chnese Unversty of Hong Kong {pcng3, soung}@e.cuhk.edu.hk Abstract TCP

More information

2x x l. Module 3: Element Properties Lecture 4: Lagrange and Serendipity Elements

2x x l. Module 3: Element Properties Lecture 4: Lagrange and Serendipity Elements Module 3: Element Propertes Lecture : Lagrange and Serendpty Elements 5 In last lecture note, the nterpolaton functons are derved on the bass of assumed polynomal from Pascal s trangle for the fled varable.

More information

Problem Set 3 Solutions

Problem Set 3 Solutions Introducton to Algorthms October 4, 2002 Massachusetts Insttute of Technology 6046J/18410J Professors Erk Demane and Shaf Goldwasser Handout 14 Problem Set 3 Solutons (Exercses were not to be turned n,

More information

STATISTICAL PERFORMANCE ANALYSIS OF THE PREDICTIVE FAST AND SEAMLESS HANDOFF SCHEME FOR THE NESTED MOBILE NETWORK

STATISTICAL PERFORMANCE ANALYSIS OF THE PREDICTIVE FAST AND SEAMLESS HANDOFF SCHEME FOR THE NESTED MOBILE NETWORK Pak. J. Statst. 011 Vol. 7(5), 591-61 STATISTICAL PERFORMANCE ANALYSIS OF THE PREDICTIVE FAST AND SEAMLESS HANDOFF SCHEME FOR THE NESTED MOBILE NETWORK Ing-Chau Chang and Cou-Song Lu Departent of Coputer

More information

A New Token Allocation Algorithm for TCP Traffic in Diffserv Network

A New Token Allocation Algorithm for TCP Traffic in Diffserv Network A New Token Allocaton Algorthm for TCP Traffc n Dffserv Network A New Token Allocaton Algorthm for TCP Traffc n Dffserv Network S. Sudha and N. Ammasagounden Natonal Insttute of Technology, Truchrappall,

More information

Scheduling Workflow Applications on the Heterogeneous Cloud Resources

Scheduling Workflow Applications on the Heterogeneous Cloud Resources Indan Journal of Scence and Technology, Vol 8(2, DOI: 0.7485/jst/205/v82/57984, June 205 ISSN (rnt : 0974-6846 ISSN (Onlne : 0974-5645 Schedulng Workflow Applcatons on the Heterogeneous Cloud Resources

More information

Parallelism for Nested Loops with Non-uniform and Flow Dependences

Parallelism for Nested Loops with Non-uniform and Flow Dependences Parallelsm for Nested Loops wth Non-unform and Flow Dependences Sam-Jn Jeong Dept. of Informaton & Communcaton Engneerng, Cheonan Unversty, 5, Anseo-dong, Cheonan, Chungnam, 330-80, Korea. seong@cheonan.ac.kr

More information

Mobility Based Routing Protocol with MAC Collision Improvement in Vehicular Ad Hoc Networks

Mobility Based Routing Protocol with MAC Collision Improvement in Vehicular Ad Hoc Networks Moblty Based Routng Protocol wth MAC Collson Improvement n Vehcular Ad Hoc Networks Zhhao Dng, Pny Ren, Qnghe Du Shaanx Smart Networks and Ubqutous Access Rearch Center School of Electronc and Informaton

More information

Virtual Machine Migration based on Trust Measurement of Computer Node

Virtual Machine Migration based on Trust Measurement of Computer Node Appled Mechancs and Materals Onlne: 2014-04-04 ISSN: 1662-7482, Vols. 536-537, pp 678-682 do:10.4028/www.scentfc.net/amm.536-537.678 2014 Trans Tech Publcatons, Swtzerland Vrtual Machne Mgraton based on

More information

Energy-aware Delay-Constrained Routing in Wireless Sensor Networks

Energy-aware Delay-Constrained Routing in Wireless Sensor Networks Energy-aware Delay-Constraned Routng n Wreless Sensor Networks Keal Akkaya and Mohaed Youns Departent of Coputer Scence and Electrcal Engneerng Unversty of Maryland Baltore County, Baltore, MD 21250 {keal1,

More information

Traffic Classification Method Based On Data Stream Fingerprint

Traffic Classification Method Based On Data Stream Fingerprint 5th nternatonal Conference on Advanced Materals and Comuter Scence (CAMCS 6) Traffc Classfcaton Method Based On Data Stream Fngerrnt Kefe Cheng, a, Guohu We,b and Xangjun Ma3,c College of Comuter Scence

More information

Idle Sense: An Optimal Access Method for High Throughput and Fairness in Rate Diverse Wireless LANs

Idle Sense: An Optimal Access Method for High Throughput and Fairness in Rate Diverse Wireless LANs Idle Sense: An Optmal Access Method for Hgh Throughput and Farness n Rate Dverse Wreless LAs Martn Heusse, Franck Rousseau, Romarc Guller, Andrzej Duda LSR-IMAG Laboratory Grenoble, France {Martn.Heusse,

More information

Control strategies for network efficiency and resilience with route choice

Control strategies for network efficiency and resilience with route choice Control strateges for networ effcency and reslence wth route choce Andy Chow Ru Sha Centre for Transport Studes Unversty College London, UK Centralsed strateges UK 1 Centralsed strateges Some effectve

More information

Fu-Yi Hung ALL RIGHTS RESERVED

Fu-Yi Hung ALL RIGHTS RESERVED 009 Fu-Yi Hung ALL RIGHTS RESERVED PERFORMANCE ANALYSIS OF THE IEEE 80.-BASED WIRELESS NETWORKS IN THE PRESENCE OF HIDDEN STATIONS by FU-YI HUNG A Dissertation submitted to the Graduate School-New Brunswick

More information

with `ook-ahead for Broadcast WDM Networks TR May 14, 1996 Abstract

with `ook-ahead for Broadcast WDM Networks TR May 14, 1996 Abstract HPeR-`: A Hgh Performance Reservaton Protocol wth `ook-ahead for Broadcast WDM Networks Vjay Svaraman George N. Rouskas TR-96-06 May 14, 1996 Abstract We consder the problem of coordnatng access to the

More information

Adaptive Network Resource Management in IEEE Wireless Random Access MAC

Adaptive Network Resource Management in IEEE Wireless Random Access MAC Adaptve Network Resource Management n IEEE 802.11 Wreless Random Access MAC Hao Wang, Changcheng Huang, James Yan Department of Systems and Computer Engneerng Carleton Unversty, Ottawa, ON, Canada Abstract

More information

Internet Traffic Managers

Internet Traffic Managers Internet Traffc Managers Ibrahm Matta matta@cs.bu.edu www.cs.bu.edu/faculty/matta Computer Scence Department Boston Unversty Boston, MA 225 Jont work wth members of the WING group: Azer Bestavros, John

More information