Access Delay Analysis of IEEE DCF in the Presence of Hidden Stations
|
|
- Antony Greene
- 6 years ago
- Views:
Transcription
1 Access Delay Analyss of IEEE 82. DCF n the Presence of Hdden tatons Fu-Y Hung and Ivan Marsc CAIP Center, ECE Deartent, Rutgers Unversty Pscataway, NJ {fuyhung, arsc}@ca.rutgers.edu Abstract In ths aer, we resent an analytcal odel to evaluate the hdden staton effect on the access delay of the IEEE 82. Dstrbuted Coordnaton Functon (DCF n both non-saturaton and saturaton condton. DCF s a rando channel-access schee based on Carrer ense Multle Access wth Collson Avodance (CMA/CA ethod and the exonental backoff rocedure to reduce acket collsons. However, hdden statons stll cause any collsons under CMA/CA ethod because statons cannot sense each other s transsson and often send ackets concurrently, resultng n sgnfcant erforance degradaton. Pror research has bult accurate access delay odel for 82. DCF. However, the hdden staton effect on the erforance has not been adeuately studed. Our odel generalzes the exstng work on access delay odelng of 82. DCF for both non-saturaton and saturaton condtons, under the hdden-staton effect. The erforance of our odel s evaluated by coarson wth ns-2 sulatons and they are found to agree. I. INTRODUCTION IEEE 82. [] s the ost oular standard used n reless Local Area Networks (LANs. The IEEE 82. Medu Access Control (MAC defnes two access ethods: the Dstrbuted Coordnaton Functon (DCF and the Pont Coordnaton Functon (PCF. The ollng-based PCF uses a vrtual carrer-sense echans aded by an access rorty echans to control the channel access. On the other hand, the contenton-based DCF uses a rando access schee where each staton has the rght to ntate ts transsson wthout nfrastructure suort. o, ths schee s useable not only n nfrastructure network confguratons but also n dstrbuted and self-organzed wreless networks. The suort for varous wreless networks has ade the DCF very oular. The basc access echans s a two-way handshakng ethod where the sender transts a data frae and the recever reles wth an acknowledgeent ( frae to confr a successful transsson. However, t unavodably suffers fro the hdden staton roble [2 4] because of ultle sultaneous transssons on the sae channel wthout any coordnator. In order to revent the nterference fro hdden statons, DCF ntroduces Reuest-To-end/ Clear-To-end (RT/CT access echans. RT/CT, whch s a four-way handshakng ethod, reserves the edu before transttng a data frae by transttng a RT frae and relyng a CT frae. The odelng of IEEE 82. has attracted a nuber of studes. Ref. [5] was the frst to derve a odel that ncororates the exonental backoff rocess nherent to 82. as a two densonal Markov chan. Ref. [6] follows the sae Markov chan odel and consders frae retry lts to avod overestatng the throughut of 82. as n [5]. Ref. [7] extends ths odel to evaluate the saturated throughut under the hdden staton effect. Refs. [8, 9] odfed ths odel to reresent the non-saturaton and saturaton condtons. On the other hand, an average servce te and jtter analyss n the saturated condton s derved n [] based on ths Markov chan odel. Ref. [] consders the data length and the nuber of backoff slot as rando varables. It rooses a robablty generatng functon (PGF for the access delay and nverts ths PGF to obtan an aroxate dstrbuton of the access delay. Refs. [2, 3] extend ths PGF work by consderng ore araeters as rando varables to derve ther PGFs and dstrbutons for the access delay. Pror research has atteted to buld an accurate access delay odel for 82. DCF. However, the hdden staton effect on the backoff schee has not been gven adeuate attenton. As wll be shown below, ths effect sgnfcantly ncreases the access delay, esecally for the basc access ethod n the saturated condton. In ths aer, we study the access delay of 82. DCF under non-saturaton and saturaton condtons n the resence of hdden statons for both basc and RT/CT access ethods based on the Markov chan odel and the PGF analyss. The rest of ths aer s organzed as follows. In secton II, we ntroduce the concet of vulnerable erod to study the effectveness of both basc and RT/CT access ethods n the resence of hdden statons. In secton III, we use a two-densonal Markov chan odel to calculate the acket transsson robablty n the vulnerable erod and the access delay n both non-saturaton and saturaton condton. In secton IV, we valdate the analytcal odel by coarng the nuercal results wth ns-2 sulaton [4]. Fnally, conclusons are resented n secton V. II. THE HIDDEN TATION EFFECT ON 82. DCF The DCF s the fundaental access ethod of the IEEE 82.. It s based on the CMA/CA and a backoff rocedure to reduce the collson robablty between ultle statons accessng the channel. The CMA/CA echans defnes two channel states: dle and busy. If a staton senses no transsson on the channel, t consders the channel state as dle; otherwse t consders the channel state as busy. hen a staton tres to access the channel, t enters the backoff rocedure that randoly chooses a backoff te n a range (, C wth a unfor robablty. The C s known as the nu contenton wndow sze. Durng the backoff rocedure, f the staton senses channel as dle ts ter decreents one backoff slot. If the channel s sensed as busy, /7/$ IEEE Ths full text aer was eer revewed at the drecton of IEEE Councatons ocety subject atter exerts for ublcaton n the IEEE GLOBECOM 27 roceedngs. Authorzed lcensed use lted to: Rutgers Unversty. Downloaded on Arl, 29 at 5:26 fro IEEE lore. Restrctons aly.
2 DIF IF DIF ource Backoff-ndow DATA - Destnaton Hdden taton Backoff-ndow Freeze Backoff Ter - -, (- - -, - -, , , - Vulnerable Perod Fg..The vulnerable erod for the hdden statons: Basc access ethod -, /, /, 2 /, -2, - DIF IF IF IF ource Backoff-ndow RT DATA - ', /ax ', ', 2 /ax ', ax -2 ', ax - Destnaton CT /ax /ax /ax Hdden taton Backoff-ndow Freeze Backoff Ter Vulnerable Perod Fg. 2.The vulnerable erod for the hdden statons: RT/CT access ethod /ax /ax,,, 2, ax -2 Fg. 3. Markov chan odel for backoff rocedure, ax- the ter s frozen. After the channel becoes dle agan, the ter resues fro the frozen slot and counts down the reanng backoff slots. After the ter fnshes the countdown, the staton accesses the channel agan. If the transsson fals, the staton reeats the backoff rocedure and doubles the contenton wndow sze. After every faled transsson, the exonental backoff echans doubles the contenton wndow sze u to a redefned axu range. However, f soe statons are hdden to each other so they cannot sense each other s transsson, they ay stakenly deterne the channel as dle and transt concurrently. The erod fro the end of the revous transsson untl an ongong transsson s detected s called the vulnerable erod. A. Hdden taton Effect on the Basc Access Method The basc access ethod s shown n Fg.. Any staton that can sense the transsson fro the source, called covered staton, wll deterne the channel as busy and defer ts own transssons for the duraton of the Network Allocaton Vector (NAV. The only ossble acket collson between the source and a covered staton haens f they fnsh ther backoff countdown sultaneously. The vulnerable erod for covered statons s one backoff slot long. However, the hdden statons do not sense the transsson fro the source untl they receve an, so they sense the channel as dle untl sensng the. If any one of these hdden statons coletes ts backoff rocedure before sensng the, t wll send another data frae to the destnaton, whch wll collde wth the data frae fro the exstng source. The vulnerable erod for hdden statons euals the length of a data frae. B. Hdden taton Effect on the RT/CT Access Method The RT/CT access ethod s shown n Fg. 2. As n the basc access ethod, the vulnerable erod for the covered statons s also one backoff slot long. The hdden statons wll set ther NAV after recevng the CT frae fro the destnaton, so the vulnerable erod for the hdden statons euals the length of the RT frae lus a IF erod. Unlke the basc access ethod, the vulnerable erod for hdden statons n RT/CT access ethod s a fxed length erod and s not related to the length of the data frae fro the source. III. THE ACCE DELAY MODEL The key contrbuton of ths aer s the cobned analytcal evaluaton of the access delay for both non-saturated and saturated condtons n the resence of hdden statons. A. Markov Chan Model of taton Transssons In the analyss, we assue the followng condtons: (a deal channel condton,.e., no cature effect; (b constant and ndeendent collson robablty of a acket transtted by each staton, regardless of the nuber of collsons already suffered; and (c fxed nuber of contendng statons. Let n denote the nuber of contendng statons. Let b(t be the stochastc rocess reresentng the backoff ter for a gven slot. As n [5], the key aroxaton n ths odel s that the robablty of a transtted acket colldng wth another acket s ndeendent of the staton s backoff stage s(t. o, the two-densonal rocess {s(t, b(t} can be odeled as a dscrete-te Markov chan, shown n Fg. 3, where s the axu backoff stage and s the backoff stage at whch the contenton wndow sze reaches the axu value, C ax, and reans at C ax after ths stage. (C n and (C ax. The C n s the nu contenton wndow sze. e set 5 n ths aer. Based on the 82. standard [], the contenton wndow, also called backoff wndow, ncreases exonentally fro C n to C ax. It can be reresented as 2 2 > The backoff states (, k for k (, n Fg. 3 reresent the ost-backoff stage. After a successful ( /7/$ IEEE Ths full text aer was eer revewed at the drecton of IEEE Councatons ocety subject atter exerts for ublcaton n the IEEE GLOBECOM 27 roceedngs. Authorzed lcensed use lted to: Rutgers Unversty. Downloaded on Arl, 29 at 5:26 fro IEEE lore. Restrctons aly.
3 (2 ( (, b 2 2 (2 2 (4 τ 2 V b, k k V V ( ( ( ( V ( ( 2 2 ( V V( ( V V ( ( ( ( V ( 2 (2 (2 2 (2P V V (2 ( ( 2 b, V ( ( ( b, < V,, (6, V > transsson, the staton resets ts C value to and erfors a rando backoff rocedure even f there are no endng ackets n the ueue. Ths ost backoff ensures that there s at least one backoff nterval between two consecutve transssons of a staton. e assue that each staton can buffer one acket and reresents the robablty that at least one acket wats for transsson durng a slot te. If, then the staton s n the saturaton condton and does not go to ost-backoff stage. In ths Markov chan, the transton robabltes are P(,, P (,, ( P (, k, k P(, k, k P (, k, k k ( ( P (, k, k, P(, k, k ( P(, k, k, P (, k, k k, P (, k, P (, k, k k, Let b,k l t P{s(t, b(t k}, (,, k (, be the statonary dstrbuton of the Markov chan. By usng the noralzaton condton for a statonary dstrbuton, we have (2 b, k b, k k k (3 Based on the chan regulartes, we can obtan b, n (4. The statonary robablty τ (that a staton transts a acket n a randoly chosen te slot, can be reresented as: τ b, b, (5 The statonary robablty τ 2 (that a staton transts a acket n a vulnerable erod, can be reresented as E. (6 where V s the vulnerable erod length n the unts of backoff slots. s the nu backoff stage at whch the backoff wndow sze s greater than V. For exale, f < V 2, then use 2 n E. (6. As already noted, τ s a secal case of τ 2 because τ can be consdered as the vulnerable erod wth the duraton of one slot te. e can verfy ths usng V and n the frst case of E. (6. In the statonary state, the collson robablty s the robablty that at least one covered staton transts n the sae backoff slot as the source, or at least one hdden staton transts n the vulnerable erod. Thus can be exressed as: n C n ( τ ( H τ 2 (7 where n C s nuber of the covered statons that ncludes the transttng staton tself, and n H s the nuber of the hdden statons. The total nuber of contendng statons, n, euals n n C n H. e solve the nonlnear Es. (4 (7 by nuercal ethod to obtan τ and τ 2. B. The Access Delay Analyss Let P tr be the robablty that there s at least one transsson n the consdered slot te. n P tr ( τ (8 The robablty of a successful transsson n the resence of hdden statons, P s, s the robablty that exactly one of n backlogged statons transts and none of ts covered staton /7/$ IEEE Ths full text aer was eer revewed at the drecton of IEEE Councatons ocety subject atter exerts for ublcaton n the IEEE GLOBECOM 27 roceedngs. Authorzed lcensed use lted to: Rutgers Unversty. Downloaded on Arl, 29 at 5:26 fro IEEE lore. Restrctons aly.
4 transts n the sae te slot and none of the hdden statons transts n the vulnerable erod nc n H nτ ( τ ( τ 2 P (9 Ptr The length of a slot te E can be reresented as E ( Ptr σ P Ptr T ( P Ptr T C ( where σ s the duraton of an ety backoff slot. The T and T C are the erod of te that the channel s sensed busy because of a successful transsson or a collson, resectvely. They are dfferent n the basc and RT/CT access ethods: T bas DATA δ IF δ DIF T bas C DATA δ _ Teout ( where DATA s the data frae length and δ s the roagaton delay. The _Teout IF DIF. For RT/CT access ethod, T and T C can be exressed as: RT δ IF CT δ IF DATA δ IF δ DIF (2 T C rts RT δ CT _ Teout where CT_Teout IF CT (2 σ. Let U be a rando varable wth a dscrete unfor dstrbuton Pr{ U k } k,,...(,,... (3 The accuulated backoff te B before a staton transts a acket successfully fro the th backoff stage or dscards t because of exceedng the retry lt can be reresented as U r TC,,... r B (4 U r TC r T rts The staton dscards the acket when the stage s reached. Hence, the robablty of a staton transttng a acket successfully at th stage or dscardng t at stage s (,,... (5 o the access delay D ncludng all backoff stages s D B T (6 In order to obtan the dstrbuton of the access delay, we derve the Probablty Generatng Functon (PGF of the access delay D(Z by z-transfor [ 3] T D ( Z B ( Z Z (7 where the B (Z can be reresented as ( Z U r ( Z Z B ( Z r ( Z U r ( Z Z r and E(Z can be reresented as TC TC,,... (8 tr tr T T ( P C Ptr Z σ (9 E ( Z ( P Z P P Z e nvert the PGF of the access delay nuercally to obtan ts dstrbuton. The aroxate dstrbuton of the access delay s valdated n next secton. IV. PERFORMANCE EVALUATION A. ulaton etu All the araeters used n the analytcal odel and the ns-2 sulaton are suarzed n Table I. Table I. yste araeters Transsson Rate Mbs Packet Payload 25 Bytes PHY header 92 bts RT 6 bts PHY header CT 2 bts PHY header 2 bts PHY header DIF 5 µs IF µs lot Te (σ 2 µs Proagaton Delay (δ µs C n 3 C ax 23 e use a rng toology that s coosed of one access ont located n the center of a rng and 6 statons unforly dstrbuted along the rng. The cature effect can be gnored n our toology because of eual dstance fro the access ont to all statons. The transsson range and carrer sensng ranges are set at 597 eters (. In ths study, we vary the rng daeter, defned as d, to obtan dfferent nuber of hdden statons n the 6-staton network: (a d 54 each staton can sense all the ackets fro the other 5 statons, so there s no hdden statons and there are 6 covered statons; (b d 6 hdden staton and 5 covered ones; (c d 63 3 hdden statons and 3 covered statons; (d d 68 5 hdden statons and covered ones. B. Model Valdaton and Access Delay Analyss Frst, we valdate the average access delay of our analytcal odel wth the ns-2 results for dfferent offered load n both basc and RT/CT access ethods, as shown n Fgs. 4 and 5. Based on the result, the access delay can be dvded nto three condtons: non-saturaton, transton and saturaton. In the non-saturaton condton, as the offered load ncreases, the access delay ncreases lnearly n both access ethods. Access delay values are alost the sae regardless of the nuber of hdden statons n the network. The hdden staton effect s nsgnfcant n ths condton. In the transton condton, the access delay jus fro ts non-saturated value to the saturated one. As the nuber of hdden staton ncreases, there s a hgher overshoot n the access delay curve. The analytcal access delay cannot cature the sulated result because we solve nonlnear Es. (4 (7 by nuercal ethod to get an aroxate analytcal result. In the saturaton condton, the access delay reans constant. Coarng ths value n both the basc and RT/CT access ethods, we can see that the basc access ethod s uch ore senstve to the hdden /7/$ IEEE Ths full text aer was eer revewed at the drecton of IEEE Councatons ocety subject atter exerts for ublcaton n the IEEE GLOBECOM 27 roceedngs. Authorzed lcensed use lted to: Rutgers Unversty. Downloaded on Arl, 29 at 5:26 fro IEEE lore. Restrctons aly.
5 Access delay (s hdden - odel 5 hdden - ns2 3 hdden - odel 3 hdden - ns2 hdden - odel hdden - ns2 hdden - odel hdden - ns2.5.5 Noralzed offered load Probablty No hdden - Model No Hdden - ns2 hdden - Model Hdden - ns2 3 hdden - Model 3 Hdden - ns2 5 hdden - Model 5 Hdden - ns No of Retranssson ( 7 dscard Probablty No hdden - Model No Hdden - ns2 hdden - Model Hdden - ns2 3 hdden - Model 3 Hdden - ns2 5 hdden - Model 5 Hdden - ns Aaccess Delay (s Fg. 4 Access delay versus noralzed offered load: Fg. 6 PMF of nuber of retry Fg. 8 PMF of the access delay Basc access ethod Basc access ethod Basc access ethod Access delay (s hdden - odel 5 hdden - ns2 3 hdden - odel 3 hdden - ns2 hdden - odel hdden - ns2 hdden - odel hdden - ns2.5.5 Noralzed offered load Probablty No hdden - odel No hdden - ns2 hdden - odel hdden - ns2 3 hdden - odel 3 hdden - ns2 5 hdden - odel 5 hdden - ns No of Retranssson ( 7 dscard Probablty.2 No hdden - odel. No hdden - ns2.2. hdden - odel hdden - ns2.2 3 hdden - odel. 3 hdden - ns hdden - odel 5 hdden - ns Aaccess Delay (s Fg. 5 Access delay versus noralzed offered load: Fg. 7 PMF of nuber of retry Fg. 9 PMF of the access delay RT/CT access ethod RT/CT access ethod RT/CT access ethod staton effect. As the nuber of hdden staton grows, the access delays n, 3 and 5 hdden staton cases are about 2.3, 5.5 and 3 tes of that n the case of no hdden statons, resectvely. nce the revous 82. DCF delay odels do not account for hdden statons, ther delays would corresond to the botto curves n Fgs. 4 and 5 (no hdden statons scenaro. Obvously, ths s nadeuate. e also study the Probablty Mass Functon (PMF of the nuber of retres before a successful transsson (Fg. 6 and 7 and access delay (Fgs. 8 and 9 n the saturaton condton. In the basc access ethod, as the nuber of hdden staton grows, fewer ackets can be transtted successfully n the frst attet and ore ackets wll be dscarded because of exceedng the retry lt (Fg. 6. The dstrbuton of the access delay (Fg.8 also shows ths tendency. The PMF s gettng flat and wdesread as the nuber of hdden statons ncreases. On the other hand, the RT/CT access ethod s ore robust to the hdden-staton effect. The PMF charts for dfferent network scenaros are slar (Fgs. 7 and 9. V. CONCLUION In ths aer, we derved an analytcal odel for the access delay of the basc and RT/CT access ethods n IEEE 82. DCF under both the non-saturaton and saturaton condton n the resence of hdden statons. The roosed odel s n good agreeent wth ns-2 sulatons and, thus, can be used to estate accurately the access delay. The revous work can be consdered as a secal case of our odel, wth zero hdden statons. REFERENCE [] IEEE tandard for reless LAN Medu Access Control (MAC and Physcal Layer (PHY secfcatons, IEEE 82.b, 999. [2] A.. Tanenbau, Couter Networks. 3rd Edton, Prentce Hall, Uer addle Rver, NJ, 996. [3] L. Klenrock and F. Tobag, Packet swtchng n rado channels, Part II The hdden ternal roble n carrer sense ultle access and the busy tone soluton, IEEE Trans. Co., vol. COM-23, no. 2, , Dec [4] H.. Chhaya and. Guta, Perforance odelng of asynchronous data transfer ethods of IEEE 82. MAC rotocol, reless Networks, vol. 3, , 997. [5] G. Banch, Perforance analyss of the IEEE 82. dstrbuted coordnaton functon, IEEE J. on elected Areas n Co., vol. 8, no. 3, , Mar. 2. [6] H. u, Y. Peng, K. Long,. Cheng, and J. Ma, Perforance of relable transort rotocol over IEEE 82. wreless LAN: Analyss and enhanceent, Proc. IEEE INFOCOM, vol. 2, , 22. [7] F. Hung, Pa and I. Marsc, Perforance Modelng and Analyss of the IEEE 82. Dstrbuton Coordnaton Functon n Presence of Hdden tatons, IEEE/AFCEA MILCOM, Oct. 26. [8] K. Duffy, D. Malone and D. Leth, Modelng the 82. Dstrbuted Coordnaton Functon n Non-saturated Condtons, IEEE Co. Letters. Vol. 9, No. 8, 75-77, Aug. 25. [9] P.E. Engelstad and O.N. Østerbø, Non-aturaton and aturaton Analyss of IEEE 82.e EDCA wth tarvaton Predcton, Proc. ACM MM 25, Oct. 25. [] M. Carvalho and J.J. Garca-Luna-Aceves, Delay Analyss of IEEE 82. n ngle-ho Networks, Proc. IEEE ICNP 3, Nov. 23. [] H. Zha, Y. Kwon, and Y. Fang, Perforance analyss of IEEE 82. MAC rotocols n wreless LANs, n Proc. reless Coun. And Moble Coutng 24, [2] O. Tckoo and B. kdar, Queueng analyss and delay tgaton n IEEE 82. rando access MAC based wreless networks, n Proc. IEEE INFOCOM 24, [3] H. Vu and T. akura, Accurate delay dstrbuton for IEEE 82. DCF, n IEEE Councatons Letters, Vol., NO. 4, Ar. 26. [4] The ns Manual, htt:// /7/$ IEEE Ths full text aer was eer revewed at the drecton of IEEE Councatons ocety subject atter exerts for ublcaton n the IEEE GLOBECOM 27 roceedngs. Authorzed lcensed use lted to: Rutgers Unversty. Downloaded on Arl, 29 at 5:26 fro IEEE lore. Restrctons aly.
IEEE Distributed Coordination Function(DCF): Analysis and Enhancement *
IEEE 802. Dstrbuted Coordnaton Functon(DCF): Analyss and Enhanceent * Hatao Wu, Shduan Cheng, Yong Peng, Keng Long, Jan Ma 2 Natonal Key Lab of Swtchng Technology and Telecouncaton Networks, P.O.Box 206,
More informationDelay Analysis of Different Backoff Algorithms in IEEE
Delay Analyss of Dfferent Backoff Algorths n IEEE 82. Ivan N. Vukovc otorola Inc., 44 W. Sure Dr., Arlngton Heghts, IL, 64 USA, Ivan.Vukovc@otorola.co, (847) 632-5963, fax (847) 435-997 Abstract - In ths
More information2016 International Conference on Sustainable Energy, Environment and Information Engineering (SEEIE 2016) ISBN:
06 Internatonal Conference on Sustanable Energy, Envronent and Inforaton Engneerng (SEEIE 06) ISBN: 978--60595-337-3 A Study on IEEE 80. MAC Layer Msbehavor under Dfferent Back-off Algorths Trong Mnh HOANG,,
More informationInterclass Collision Protection for IEEE e Wireless LANs
Interclass Collson Protecton for IEEE 82.e Wreless LANs Woon Sun Cho, Chae Y. Lee Dstrbuted Coordnaton Functon (DCF) n IEEE 82. and Enhanced Dstrbuted Channel Access (EDCA) n IEEE 82.e are contenton-based
More information136 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 6, NO. 1, JANUARY Ching-Ling Huang and Wanjiun Liao, Senior Member, IEEE
136 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 6, NO. 1, JANUARY 2007 Throughput and Delay Performance of IEEE 802.11e Enhanced Dstrbuted Channel Access (EDCA) Under Saturaton Condton Chng-Lng
More informationVoice capacity of IEEE b WLANs
Voce capacty of IEEE 82.b WLANs D. S. Amanatads, V. Vtsas, A. Mantsars 2, I. Mavrds 2, P. Chatzmsos and A.C. Boucouvalas 3 Abstract-There s a tremendous growth n the deployment and usage of Wreless Local
More informationAn Analytical Model for IEEE Point-to-Point Link
An Analytcal Model for IEEE 82. Pont-to-Pont Lnk Yong Yan, Xaowen hu Department of omputer cence, Hong Kong Baptst Unversty Emal: {yyan, chxw}@comp.hkbu.edu.hk Abstract - Wreless mesh networks have attracted
More informationUBICC Publishers 2008 Ubiquitous Computing and Communication Journal
UBICC Journal Ubqutous Computng and Communcaton Journal 008 Volume 3. 008-04-30. ISSN 99-844 Specal Issue on Moble Adhoc Networks UBICC ublshers 008 Ubqutous Computng and Communcaton Journal Edted by Usman
More informationTHE IEEE standard for wireless local area networks
IEEE RANSACIONS ON VEHICULAR ECHNOLOGY, VOL. 58, NO. 2, FEBRUARY 2009 855 Determnstc Prorty Channel Access Scheme for QoS Support n IEEE 802.11e Wreless LANs Sunmyeng Km, Rongsheng Huang, Student Member,
More informationModeling TCP Throughput: A Simple Model and its Empirical Validation
Modelng TCP Throughut: A Smle Model and ts mrcal Valdaton Jtendra Padhye, Vctor Frou, Don Towsley, Jm Kuros 0-09-9 Presenter: Ognjen Vukovc Modelng TCP Throughut: A Smle Model and ts mrcal Valdaton Motvaton
More informationSolutions to Programming Assignment Five Interpolation and Numerical Differentiation
College of Engneerng and Coputer Scence Mechancal Engneerng Departent Mechancal Engneerng 309 Nuercal Analyss of Engneerng Systes Sprng 04 Nuber: 537 Instructor: Larry Caretto Solutons to Prograng Assgnent
More informationPerformance Analysis of Markov Modulated 1-Persistent CSMA/CA Protocols with Exponential Backoff Scheduling
Performance Analyss of Markov Modulated -Persstent CSMA/CA Protocols wth ponental Backoff Schedulng Pu ng Wong, Dongje Yn, and Tony T. Lee, Abstract. Ths paper proposes a Markovan model of -persstent CSMA/CA
More informationOptimization Methods: Integer Programming Integer Linear Programming 1. Module 7 Lecture Notes 1. Integer Linear Programming
Optzaton Methods: Integer Prograng Integer Lnear Prograng Module Lecture Notes Integer Lnear Prograng Introducton In all the prevous lectures n lnear prograng dscussed so far, the desgn varables consdered
More informationEfficient Backoff Algorithm in Wireless Multihop Ad Hoc Networks
1 Chen-Mn Wu, 2 Hu-Ka Su, 3 Wang-Has Yang *1,Correspondng Author Nanhua Unversty, cmwu@mal.nhu.edu.tw 2 Natonal Formosa Unversty, hksu@nfu.edu.tw 3 Hsupng Insttute of Technology, yangwh@mal.ht.edu.tw do:10.4156/jact.vol3.
More informationAnalysis of QoS in WLAN
Analyss of QoS n WLAN PAAL E. ENGELSTAD AND OLAV N. ØSTERBØ Paal E. Engelstad s Research Scentst n Telenor R&D An analytcal model s proposed to descrbe the prorty schemes of the EDCA mechansm of the IEEE
More informationSums of exponential functions and their new fundamental properties
Sus of exonental functons and ther new fundaental roertes Yur K. Shestoaloff Abstract hs aer dscovers and roves the fundaental roertes of sus of exonental functon n the for of а heore that s stated as
More informationPerformance Analysis of the Binary Exponential Backoff Algorithm for IEEE Based Mobile Ad Hoc Networks
Ths full text aer was eer revewed at the dreton of IEEE Counatons Soety subet atter exerts for ublaton n the IEEE ICC roeedngs Perforane Analyss of the Bnary Exonental Bakoff Algorth for IEEE 8. Based
More informationPerformance Analysis of Beacon-Less IEEE Multi-Hop Networks
Performance Analyss of Beacon-Less IEEE 2..4 Mult-Hop Networks Racht Srvastava Deptt. of Electrcal Communcaton Engneerng Indan Insttute of Scence Bangalore, Inda 62 rachtsr@gmal.com Anurag Kumar Deptt.
More informationAnalysis of Collaborative Distributed Admission Control in x Networks
1 Analyss of Collaboratve Dstrbuted Admsson Control n 82.11x Networks Thnh Nguyen, Member, IEEE, Ken Nguyen, Member, IEEE, Lnha He, Member, IEEE, Abstract Wth the recent surge of wreless home networks,
More informationPerformance Evaluation of IEEE e based on ON-OFF Traffic Model I. Papapanagiotou PhD. Student
erformance Evaluaton of IEEE 82.e based on ON-OFF Traffc Model I. apapanagotou hd. Student Wreless Telecommuncaton Laboratory Unversty of atras 265 4 atras Greece papapanag@upnet.gr J.S. Vardakas hd. Student
More informationA Base Station-Coordinated Contention Resolution for IEEE PMP Networks
A Base Staton-Coordnated Contenton Resoluton for IEEE 802.6 PMP Networks Wenyan Lu, Weja Ja,2, Wenfeng Du, and Ldong Ln 2 School of Informaton Scence & Engneerng, Central South Unversty, Changsha, 40083,
More informationRe-routing Instability in IEEE Multi-hop Ad-hoc Networks *
Re-routng Instablty n IEEE 802.11 Mult-hop Ad-hoc Networks * Png Chung Ng and Soung Chang Lew Department of Informaton Engneerng The Chnese Unversty of Hong Kong {pcng3, soung}@e.cuhk.edu.hk Abstract TCP
More informationAn Adaptive Sleep Strategy for Energy Conservation in Wireless Sensor Networks
An Adaptve Sleep Strategy for Energy Conservaton n Wreless Sensor Networks Guseppe Anastas, Marco Cont, Maro D Francesco Abstract - In recent years, wreless sensor network deployents for real lfe applcatons
More informationA Backoff Algorithm for Improving Saturation Throughput in IEEE DCF
A Backoff Algorithm for Improving Saturation Throughput in IEEE 80.11 DCF Kiyoshi Takahashi and Toshinori Tsuboi School of Computer Science, Tokyo University of Technology, 1404-1 Katakura, Hachioji, Tokyo,
More informationThe ray density estimation of a CT system by a supervised learning algorithm
Te ray densty estaton of a CT syste by a suervsed learnng algort Nae : Jongduk Baek Student ID : 5459 Toc y toc s to fnd te ray densty of a new CT syste by usng te learnng algort Background Snce te develoent
More informationPerformance analysis of distributed cluster-based MAC protocol for multiuser MIMO wireless networks
RESEARCH Open Access Performance analyss of dstrbuted cluster-based MAC protocol for multuser MIMO wreless networks Azadeh Ettefagh *, Marc Kuhn, Celal Eşl and Armn Wttneben Abstract It s known that multuser
More informationReal-Time Guarantees. Traffic Characteristics. Flow Control
Real-Tme Guarantees Requrements on RT communcaton protocols: delay (response s) small jtter small throughput hgh error detecton at recever (and sender) small error detecton latency no thrashng under peak
More informationPerformance Analysis of the IEEE MAC Protocol over a WLAN with Capture Effect
Vol. IPSJ Dgtal Courer Nov. 25 Regular Paper Performance Analyss of the IEEE 82. MAC Protocol over a WLAN wth Capture Effect Xaolong L, and Qng-An Zeng, In ths paper, we use a dscrete Markov chan model
More informationAn Adaptive Batched Patch Caching Scheme for Multimedia Streaming *
An Adatve Batched Patch achng Schee for Multeda Streang * Shaohua Qn, Wehong He, Zu L, and Janng Hu School of outer Scence, Beng Unversty of Aeronautcs & Astronautcs, Beng 8,hna {shqn,annghu}@buaa.edu.cn
More informationIntroduction. Leslie Lamports Time, Clocks & the Ordering of Events in a Distributed System. Overview. Introduction Concepts: Time
Lesle Laports e, locks & the Orderng of Events n a Dstrbuted Syste Joseph Sprng Departent of oputer Scence Dstrbuted Systes and Securty Overvew Introducton he artal Orderng Logcal locks Orderng the Events
More informationExtension and Comparison of QoS-Enabled Wi-Fi Models in the Presence of Errors
Extenson and Comparson of QoS-Enabled W-F Models n the Presence of Errors Ioanns Papapanagotou, Georgos S. Paschos*, Stavros A. Kotsopoulos** and Mchael Devetskots Electrcal and Computer Engneerng, North
More informationFu-Yi Hung ALL RIGHTS RESERVED
009 Fu-Yi Hung ALL RIGHTS RESERVED PERFORMANCE ANALYSIS OF THE IEEE 80.-BASED WIRELESS NETWORKS IN THE PRESENCE OF HIDDEN STATIONS by FU-YI HUNG A Dissertation submitted to the Graduate School-New Brunswick
More information2x x l. Module 3: Element Properties Lecture 4: Lagrange and Serendipity Elements
Module 3: Element Propertes Lecture : Lagrange and Serendpty Elements 5 In last lecture note, the nterpolaton functons are derved on the bass of assumed polynomal from Pascal s trangle for the fled varable.
More informationA study of Adaptive Replication Technique in routing time-constrained messages (VoIP) in MANET
A study of Adaptve Replcaton Technque n routng te-constraned essages (VoIP) n MANET SWATI SAXENA Research Scholar AIM & ACT Banasthal Vdyapth Banasthal, (Ra.) Dr. MADHAVI SINHA Asst. Prof. (HOD) Dept.
More informationIEEE E: QOS PROVISIONING AT THE MAC LAYER YANG XIAO, THE UNIVERSITY OF MEMPHIS
ACCEPTED FROM O PEN C ALL IEEE 802.11E: QOS PROVISIONING AT THE MAC LAYER YANG XIAO, THE UNIVERSITY OF MEMPHIS ess AIFS[j] AIFS[] PIFS SIFS AIFS[] Content 0 to CW Bac Slot Select s The emergng IEEE 802.11e
More informationAdaptive Network Resource Management in IEEE Wireless Random Access MAC
Adaptve Network Resource Management n IEEE 802.11 Wreless Random Access MAC Hao Wang, Changcheng Huang, James Yan Department of Systems and Computer Engneerng Carleton Unversty, Ottawa, ON, Canada Abstract
More informationGenerating Fuzzy Term Sets for Software Project Attributes using and Real Coded Genetic Algorithms
Generatng Fuzzy Ter Sets for Software Proect Attrbutes usng Fuzzy C-Means C and Real Coded Genetc Algorths Al Idr, Ph.D., ENSIAS, Rabat Alan Abran, Ph.D., ETS, Montreal Azeddne Zah, FST, Fes Internatonal
More informationAchievable Bandwidth Estimation for Stations in Multi-Rate IEEE WLAN Cells
Achevable Bandwdth Estmaton for Statons n Mult-Rate IEEE 802. WLAN Cells Eduard Garca, Davd Vamonte, Rafael Vdal and Josep Paradells Wreless Networks Group - echncal Unversty of Catalona (UPC) {eduardg,
More informationLight Weight Distributed QoS Adapter in Large-Scale Ad hoc Networks. Seyed Hossein Hosseini Nazhad Ghazani 1, R.M.Alguliev 2
Lght Weght Dstruted QoS Adapter n Large-Scale Ad hoc Networs Seyed Hossen Hossen Nazhad Ghazan, R.M.Algulev 2 Ph.D. Canddate, Insttute of Inforaton Technology of ANAS, Bau, Azerajan 2 Doctor of Techncal
More informationCompiler Design. Spring Register Allocation. Sample Exercises and Solutions. Prof. Pedro C. Diniz
Compler Desgn Sprng 2014 Regster Allocaton Sample Exercses and Solutons Prof. Pedro C. Dnz USC / Informaton Scences Insttute 4676 Admralty Way, Sute 1001 Marna del Rey, Calforna 90292 pedro@s.edu Regster
More informationProblem Set 3 Solutions
Introducton to Algorthms October 4, 2002 Massachusetts Insttute of Technology 6046J/18410J Professors Erk Demane and Shaf Goldwasser Handout 14 Problem Set 3 Solutons (Exercses were not to be turned n,
More informationLoad Balancing for Hex-Cell Interconnection Network
Int. J. Communcatons, Network and System Scences,,, - Publshed Onlne Aprl n ScRes. http://www.scrp.org/journal/jcns http://dx.do.org/./jcns.. Load Balancng for Hex-Cell Interconnecton Network Saher Manaseer,
More informationPattern Classification of Back-Propagation Algorithm Using Exclusive Connecting Network
World Acade of Scence, Engneerng and Technolog 36 7 Pattern Classfcaton of Bac-Propagaton Algorth Usng Eclusve Connectng Networ Insung Jung, and G-Na Wang Abstract The obectve of ths paper s to a desgn
More informationRAP. Speed/RAP/CODA. Real-time Systems. Modeling the sensor networks. Real-time Systems. Modeling the sensor networks. Real-time systems:
Speed/RAP/CODA Presented by Octav Chpara Real-tme Systems Many wreless sensor network applcatons requre real-tme support Survellance and trackng Border patrol Fre fghtng Real-tme systems: Hard real-tme:
More informationA Fair Access Mechanism Based on TXOP in IEEE e Wireless Networks
11 Internatonal Journal of Communcaton Networks and Informaton Securty (IJCNIS) Vol. 8, No. 1, Aprl 16 A Far Access Mechansm Based on TXOP n IEEE 8.11e Wreless Networks Marjan Yazdan 1, Maryam Kamal, Neda
More informationA Topology-aware Random Walk
A Topology-aware Random Walk Inkwan Yu, Rchard Newman Dept. of CISE, Unversty of Florda, Ganesvlle, Florda, USA Abstract When a graph can be decomposed nto clusters of well connected subgraphs, t s possble
More informationOn-line Scheduling Algorithm with Precedence Constraint in Embeded Real-time System
00 rd Internatonal Conference on Coputer and Electrcal Engneerng (ICCEE 00 IPCSIT vol (0 (0 IACSIT Press, Sngapore DOI: 077/IPCSIT0VNo80 On-lne Schedulng Algorth wth Precedence Constrant n Ebeded Real-te
More informationAlgorithm for Computer Aided Design Curve Shape Form Generation of Knitting Patterns
Algorth for Couter Aded Desgn Curve Shae For Generaton of Knttng Patterns Elena Zahareva-Stoyanova Techncal Unversty of Gabrovo 4 H. Drat str. 500 Gabrovo, ulgara, hone +59 59 Abstract - The knttng ndustry
More informationFast Retransmission of Real-Time Traffic in HIPERLAN/2 Systems
Fast Retransmsson of Real-Tme Traffc n HIPERLAN/ Systems José A Afonso and Joaqum E Neves Department of Industral Electroncs Unversty of Mnho, Campus de Azurém 4800-058 Gumarães, Portugal {joseafonso,
More informationSimulation Based Analysis of FAST TCP using OMNET++
Smulaton Based Analyss of FAST TCP usng OMNET++ Umar ul Hassan 04030038@lums.edu.pk Md Term Report CS678 Topcs n Internet Research Sprng, 2006 Introducton Internet traffc s doublng roughly every 3 months
More informationWIRELESS communication technology has gained widespread
616 IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. 4, NO. 6, NOVEMBER/DECEMBER 2005 Dstrbuted Far Schedulng n a Wreless LAN Ntn Vadya, Senor Member, IEEE, Anurag Dugar, Seema Gupta, and Paramvr Bahl, Senor
More informationEquation Based Rate Control and Multiple Connections for Adaptive Video Streaming in Cellular Networks
Equaton Based Rate Control and Multple Connectons for Adaptve Vdeo Streang n Cellular Networks A. Mardanan Dehkord and V. Tabataba Vakl Abstract Rate control s an portant ssue for vdeo streang n cellular
More informationApplications and Challenges of the e EDCA Mechanism: An Experimental Study
Applcatons and Challenges of the 80.e EDCA Mechansm: An Expermental Study Albert Banchs, Arturo Azcorra, Carlos García, and Rubén Cuevas, Unversty Carlos III of Madrd Abstract In ths artcle we conduct
More informationDepartment of Electrical and Computer Systems Engineering
Department of Electrcal and Computer Systems Engneerng Techncal Report MECSE-5-2004 A Survey of IEEE 802.11 MAC Mechansms for Qualty of Servce (QoS) n Wreless Local Area Networks (WLANs) D. Pham, A. Sekercoglu
More informationResearch Article A Comparison Performance Analysis of QoS WLANs: Approaches with Enhanced Features
Hndaw Publshng Corporaton Advances n Multmeda Volume 007, Artcle ID 387, 3 pages do:055/007/387 Research Artcle A Comparson Performance Analyss of QoS WLANs: Approaches wth Enhanced Features Ioanns Papapanagotou,
More informationA General Model of Wireless Interference
A General Model of Wreless Interference Ll Qu Yn Zhang Feng Wang M Kyung Han Ratul Mahajan Unversty of Texas at Austn Mcrosoft Research Austn, TX 7872, USA Redmond, WA 9852, USA {ll,yzhang,wangf,hanm2}@cs.utexas.edu
More informationAn Energy-Aware QoS Routing Protocol for Wireless Sensor Networks
An Energy-Aware QoS Routng Protocol for Wreless Sensor Networks Abstract Recent advances n wreless sensor networks have led to any new routng rotocols secfcally desgned for sensor networks. Alost all of
More informationAN ALGORITHM FOR ODD GRACEFULNESS OF THE TENSOR PRODUCT OF TWO LINE GRAPHS
Internatonal ournal on applcatons of graph theory n wreless ad hoc networks and sensor networks (GRAPH-HOC) Vol.3, No., March 0 AN ALGORITHM FOR ODD GRACEFULNESS OF THE TENSOR PRODUCT OF TWO LINE GRAPHS
More informationMerging Results by Using Predicted Retrieval Effectiveness
Mergng Results by Usng Predcted Retreval Effectveness Introducton Wen-Cheng Ln and Hsn-Hs Chen Departent of Coputer Scence and Inforaton Engneerng Natonal Tawan Unversty Tape, TAIWAN densln@nlg.cse.ntu.edu.tw;
More information126 Int. J. Ad Hoc and Ubiquitous Computing, Vol. 1, No. 3, Djamel Djenouri*
126 Int. J. Ad Hoc and Ubqutous Coputng, Vol. 1, No. 3, 2006 New power-aware routng protocol for oble ad hoc networks Djael Djenour* Basc Software Laboratory, CERIST Center of Research, Algers, Algera
More informationPriority-Based Scheduling Algorithm for Downlink Traffics in IEEE Networks
Prorty-Based Schedulng Algorthm for Downlnk Traffcs n IEEE 80.6 Networks Ja-Mng Lang, Jen-Jee Chen, You-Chun Wang, Yu-Chee Tseng, and Bao-Shuh P. Ln Department of Computer Scence Natonal Chao-Tung Unversty,
More informationKeywords: Cloud Computing, Resource Allocation, Queueing Theory, Performance Measures.
Volume, Issue 9, Setember ISSN: 77 8X Internatonal Journal of Advanced Research n Comuter Scence and Software Engneerng Research Paer Avalable onlne at: wwwjarcssecom Resource Allocaton n Cloud Comutng
More informationA Free-Collision MAC Proposal for Networks
12th Brazlan Workshop on Real-Tme and Embedded Systems 89 A Free-Collson MAC Proposal for 802.11 Networks Omar Alment 1,2, Gullermo Fredrch 1, Gullermo Reggan 1 1 SITIC Group Unversdad Tecnológca Naconal
More informationDynamic wetting property investigation of AFM tips in micro/nanoscale
Dynamc wettng property nvestgaton of AFM tps n mcro/nanoscale The wettng propertes of AFM probe tps are of concern n AFM tp related force measurement, fabrcaton, and manpulaton technques, such as dp-pen
More informationPERFORMANCE ANALYSIS IEEE BY TUNING PARAMETERS TO ENHANCEMENT NETWORK THROUGHPUT
Internatonal Journal of Inforaton Technology and Bune Manageent www.jt.co PERFORMANCE ANALYSIS IEEE 802.11 BY TUNING PARAMETERS TO ENHANCEMENT NETWORK THROUGHPUT Khall I. Alaf 1,Ekhla A. Alta 2 1 A. Prf.
More informationAn Efficient Fault-Tolerant Multi-Bus Data Scheduling Algorithm Based on Replication and Deallocation
BULGARIAN ACADEMY OF SCIENCES CYBERNETICS AND INFORMATION TECHNOLOGIES Volue 16, No Sofa 016 Prnt ISSN: 1311-970; Onlne ISSN: 1314-4081 DOI: 10.1515/cat-016-001 An Effcent Fault-Tolerant Mult-Bus Data
More informationA Semi-Distributed Load Balancing Architecture and Algorithm for Heterogeneous Wireless Networks
A Sem-Dstrbuted oad Balancng Archtecture and Algorthm for Heterogeneous reless Networks Md. Golam Rabul Ala Choong Seon Hong * Kyung Hee Unversty, Korea rob@networkng.khu.ac.kr, cshong@khu.ac.kr Abstract
More informationEfficient QoS Provisioning at the MAC Layer in Heterogeneous Wireless Sensor Networks
Effcent QoS Provsonng at the MAC Layer n Heterogeneous Wreless Sensor Networks M.Soul a,, A.Bouabdallah a, A.E.Kamal b a UMR CNRS 7253 HeuDaSyC, Unversté de Technologe de Compègne, Compègne Cedex F-625,
More informationParallelism for Nested Loops with Non-uniform and Flow Dependences
Parallelsm for Nested Loops wth Non-unform and Flow Dependences Sam-Jn Jeong Dept. of Informaton & Communcaton Engneerng, Cheonan Unversty, 5, Anseo-dong, Cheonan, Chungnam, 330-80, Korea. seong@cheonan.ac.kr
More informationTHE CONDENSED FUZZY K-NEAREST NEIGHBOR RULE BASED ON SAMPLE FUZZY ENTROPY
Proceedngs of the 20 Internatonal Conference on Machne Learnng and Cybernetcs, Guln, 0-3 July, 20 THE CONDENSED FUZZY K-NEAREST NEIGHBOR RULE BASED ON SAMPLE FUZZY ENTROPY JUN-HAI ZHAI, NA LI, MENG-YAO
More informationDynamic Resource Discovery based on Preference and Movement Pattern Similarity for Large-Scale Social Internet-of-Things
> REPLACE THIS LINE WITH YOUR PAPER IDENTIFICATION NUMBER (DOUBLE-CLICK HERE TO EDIT) < 1 Dynac Resource Dscovery based on Preference and Moveent Pattern Slarty for Large-Scale Socal Internet-of-Thngs
More informationMobileGrid: Capacity-aware Topology Control in Mobile Ad Hoc Networks
MobleGrd: Capacty-aware Topology Control n Moble Ad Hoc Networks Jle Lu, Baochun L Department of Electrcal and Computer Engneerng Unversty of Toronto {jenne,bl}@eecg.toronto.edu Abstract Snce wreless moble
More informationA New Approach For the Ranking of Fuzzy Sets With Different Heights
New pproach For the ankng of Fuzzy Sets Wth Dfferent Heghts Pushpnder Sngh School of Mathematcs Computer pplcatons Thapar Unversty, Patala-7 00 Inda pushpndersnl@gmalcom STCT ankng of fuzzy sets plays
More informationTime-based Adaptive Retry for Wireless Video Streaming 1
Tme-based Adatve etry for Wreless Vdeo Streamng 1 Me-Hsuan Lu, Peter Steenkste, and Tsuhan Chen Electrcal and Comuter Engneerng Deartment Carnege Mellon Unversty 5000 Forbes Avenue, Pttsburgh PA 15213-3890,
More informationSemi-Markov Process based Model for Performance Analysis of Wireless LANs
Semi-Markov Process based Model for Performance Analysis of Wireless LANs Murali Krishna Kadiyala, Diti Shikha, Ravi Pendse, and Neeraj Jaggi Deartment of Electrical Engineering and Comuter Science Wichita
More informationAS MOBILE wireless devices became the essential parts
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, VOL. 55, NO. 3, MAY 2006 865 A Cross-Layer Multhop Data Delvery Protocol Wth Farness Guarantees for Vehcular Networks Gökhan Korkmaz, Student Member, IEEE, Eylem
More informationX- Chart Using ANOM Approach
ISSN 1684-8403 Journal of Statstcs Volume 17, 010, pp. 3-3 Abstract X- Chart Usng ANOM Approach Gullapall Chakravarth 1 and Chaluvad Venkateswara Rao Control lmts for ndvdual measurements (X) chart are
More informationTECHNIQUE OF FORMATION HOMOGENEOUS SAMPLE SAME OBJECTS. Muradaliyev A.Z.
TECHNIQUE OF FORMATION HOMOGENEOUS SAMPLE SAME OBJECTS Muradalyev AZ Azerbajan Scentfc-Research and Desgn-Prospectng Insttute of Energetc AZ1012, Ave HZardab-94 E-mal:aydn_murad@yahoocom Importance of
More informationMohammad Hossein Manshaei 1393
Mohammad Hossein Manshaei manshaei@gmail.com 1393 1 An Analytical Approach: Bianchi Model 2 Real Experimentations HoE on IEEE 802.11b Analytical Models Bianchi s Model Simulations ns-2 3 N links with the
More informationA Unified Approach to Survivability of Connection-Oriented Networks
A Unfed Approach to Survvablty of Connecton-Orented Networs Krzysztof Walowa Char of Systes and Coputer Networs, Faculty of Electroncs, Wroclaw Unversty of Technology, Wybrzeze Wyspansego 27, 50-370 Wroclaw,
More informationPredicting Power Grid Component Outage In Response to Extreme Events. S. BAHRAMIRAD ComEd USA
1, rue d Artos, F-75008 PARIS CIGRE US Natonal Cottee http : //www.cgre.org 016 Grd of the Future Syposu Predctng Power Grd Coponent Outage In Response to Extree Events R. ESKANDARPOUR, A. KHODAEI Unversty
More informationUser Behavior Recognition based on Clustering for the Smart Home
3rd WSEAS Internatonal Conference on REMOTE SENSING, Vence, Italy, Noveber 2-23, 2007 52 User Behavor Recognton based on Clusterng for the Sart Hoe WOOYONG CHUNG, JAEHUN LEE, SUKHYUN YUN, SOOHAN KIM* AND
More informationAnalysis of the IEEE e EDCA Under Statistical Traffic
Analysis of the IEEE 82.11e EDCA Under tatistical Traffic Juki Wirawan Tantra, Chuan Heng Foh Centre for Multimedia and Network Technology chool of Computer Engineering Nanyang Technological University
More informationInternational Conference on Applied Science and Engineering Innovation (ASEI 2015)
Internatonal Conference on Appled cence and Engneerng Innovaton (AEI 2015) A new MAC protocol of UAN (ABIC-MAC) based on hgh effcency, concurrent and bdrecton LIU Jun 1,a, YANG Xao Lan 2, PENG Lng Feng
More informationAggregated traffic flow weight controlled hierarchical MAC protocol for wireless sensor networks
Ann. Telecommun. (29) 64:75 721 DOI.7/s12243-9-95- Aggregated traffc flow weght controlled herarchcal MAC protocol for wreless sensor networks M. Abdur Razzaque M. Mamun-Or-Rashd Muhammad Mahbub Alam Choong
More informationVirtual Memory. Background. No. 10. Virtual Memory: concept. Logical Memory Space (review) Demand Paging(1) Virtual Memory
Background EECS. Operatng System Fundamentals No. Vrtual Memory Prof. Hu Jang Department of Electrcal Engneerng and Computer Scence, York Unversty Memory-management methods normally requres the entre process
More informationUSER CLASS BASED QoS DIFFERENTIATION IN e WLAN
USER CLASS BASED QoS DIFFERENTIATION IN 802.11e WLAN Amt Kejrwal, Ratan Guha School of Computer Scence Unversty of Central Florda Orlando, FL-32816 USA E-mal: {kejrwal, guha}@cs.ucf.edu Manak Chatterjee
More informationMulticast Tree Rearrangement to Recover Node Failures. in Overlay Multicast Networks
Multcast Tree Rearrangeent to Recover Node Falures n Overlay Multcast Networks Hee K. Cho and Chae Y. Lee Dept. of Industral Engneerng, KAIST, 373-1 Kusung Dong, Taejon, Korea Abstract Overlay ultcast
More informationAADL : about scheduling analysis
AADL : about schedulng analyss Schedulng analyss, what s t? Embedded real-tme crtcal systems have temporal constrants to meet (e.g. deadlne). Many systems are bult wth operatng systems provdng multtaskng
More informationA Game Theory based Contention Window Adjustment for IEEE under Heavy Load
93 Internatonal Journal of Communcaton Networks and Informaton Securty (IJCNIS) Vol. 5, No. 2, August 203 A Game Theory based Contenton Wndow Adjustment for IEEE 802. under Heavy Load Mahdeh Ghazvn, Naser
More informationIntegrated Congestion-Control Mechanism in Optical Burst Switching Networks
Ths full text paper was peer revewed at the drecton of IEEE Communcatons Socety subect matter experts for publcaton n the IEEE GLOBECOM 2005 proceedngs Integrated Congeston-Control Mechansm n Optcal Burst
More informationEnhanced Markov Chain Model and Throughput Analysis of the Slotted CSMA/CA for IEEE Under Unsaturated Traffic Conditions
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, VOL. 58, NO. 1, JANUARY 2009 473 Enhanced Markov Chan Model and Throughput Analyss of the Slotted CSMA/CA for IEEE 802.15.4 Under Unsaturated Traffc Condtons
More informationNetwork Coding as a Dynamical System
Network Codng as a Dynamcal System Narayan B. Mandayam IEEE Dstngushed Lecture (jont work wth Dan Zhang and a Su) Department of Electrcal and Computer Engneerng Rutgers Unversty Outlne. Introducton 2.
More informationSolitary and Traveling Wave Solutions to a Model. of Long Range Diffusion Involving Flux with. Stability Analysis
Internatonal Mathematcal Forum, Vol. 6,, no. 7, 8 Soltary and Travelng Wave Solutons to a Model of Long Range ffuson Involvng Flux wth Stablty Analyss Manar A. Al-Qudah Math epartment, Rabgh Faculty of
More informationFusion Performance Model for Distributed Tracking and Classification
Fuson Performance Model for Dstrbuted rackng and Classfcaton K.C. Chang and Yng Song Dept. of SEOR, School of I&E George Mason Unversty FAIRFAX, VA kchang@gmu.edu Martn Lggns Verdan Systems Dvson, Inc.
More informationEFT: a high throughput routing metric for IEEE s wireless mesh networks
Ann. Telecommun. (2010) 65:247 262 DOI 10.1007/s12243-009-0130-1 EFT: a hgh throughput routng metrc for IEEE 802.11s wreless mesh networks Md. Sharful Islam Muhammad Mahbub Alam Md. Abdul Hamd Choong Seon
More informationA New Scheduling Algorithm for Servers
A New Schedulng Algorth for Servers Nann Yao, Wenbn Yao, Shaobn Ca, and Jun N College of Coputer Scence and Technology, Harbn Engneerng Unversty, Harbn, Chna {yaonann, yaowenbn, cashaobn, nun}@hrbeu.edu.cn
More informationImpact of the Parameterization of IEEE Medium Access Layer on the Consumption of ZigBee Sensor Motes
UBICOMM 21 : The Fourth Internatonal Conference on Moble Ubqutous Computng, Systems, Servces and Technologes Impact of the Parameterzaton of IEEE 82.15.4 Medum Access Layer on the Consumpton of ZgBee Sensor
More informationAn Energy-Efficient MAC Protocol for WSNs: Game-Theoretic Constraint Optimization with Multiple Objectives
Wreless Sensor Network, 2009, 1, 358-364 do:10.4236/wsn.2009.14044 Publshed Onlne November 2009 (http://www.scrp.org/ournal/wsn). An Energy-Effcent MAC Protocol for s: Game-Theoretc Constrant Optmzaton
More informationOverview. Basic Setup [9] Motivation and Tasks. Modularization 2008/2/20 IMPROVED COVERAGE CONTROL USING ONLY LOCAL INFORMATION
Overvew 2 IMPROVED COVERAGE CONTROL USING ONLY LOCAL INFORMATION Introducton Mult- Smulator MASIM Theoretcal Work and Smulaton Results Concluson Jay Wagenpfel, Adran Trachte Motvaton and Tasks Basc Setup
More information