Access Delay Analysis of IEEE DCF in the Presence of Hidden Stations

Size: px
Start display at page:

Download "Access Delay Analysis of IEEE DCF in the Presence of Hidden Stations"

Transcription

1 Access Delay Analyss of IEEE 82. DCF n the Presence of Hdden tatons Fu-Y Hung and Ivan Marsc CAIP Center, ECE Deartent, Rutgers Unversty Pscataway, NJ {fuyhung, arsc}@ca.rutgers.edu Abstract In ths aer, we resent an analytcal odel to evaluate the hdden staton effect on the access delay of the IEEE 82. Dstrbuted Coordnaton Functon (DCF n both non-saturaton and saturaton condton. DCF s a rando channel-access schee based on Carrer ense Multle Access wth Collson Avodance (CMA/CA ethod and the exonental backoff rocedure to reduce acket collsons. However, hdden statons stll cause any collsons under CMA/CA ethod because statons cannot sense each other s transsson and often send ackets concurrently, resultng n sgnfcant erforance degradaton. Pror research has bult accurate access delay odel for 82. DCF. However, the hdden staton effect on the erforance has not been adeuately studed. Our odel generalzes the exstng work on access delay odelng of 82. DCF for both non-saturaton and saturaton condtons, under the hdden-staton effect. The erforance of our odel s evaluated by coarson wth ns-2 sulatons and they are found to agree. I. INTRODUCTION IEEE 82. [] s the ost oular standard used n reless Local Area Networks (LANs. The IEEE 82. Medu Access Control (MAC defnes two access ethods: the Dstrbuted Coordnaton Functon (DCF and the Pont Coordnaton Functon (PCF. The ollng-based PCF uses a vrtual carrer-sense echans aded by an access rorty echans to control the channel access. On the other hand, the contenton-based DCF uses a rando access schee where each staton has the rght to ntate ts transsson wthout nfrastructure suort. o, ths schee s useable not only n nfrastructure network confguratons but also n dstrbuted and self-organzed wreless networks. The suort for varous wreless networks has ade the DCF very oular. The basc access echans s a two-way handshakng ethod where the sender transts a data frae and the recever reles wth an acknowledgeent ( frae to confr a successful transsson. However, t unavodably suffers fro the hdden staton roble [2 4] because of ultle sultaneous transssons on the sae channel wthout any coordnator. In order to revent the nterference fro hdden statons, DCF ntroduces Reuest-To-end/ Clear-To-end (RT/CT access echans. RT/CT, whch s a four-way handshakng ethod, reserves the edu before transttng a data frae by transttng a RT frae and relyng a CT frae. The odelng of IEEE 82. has attracted a nuber of studes. Ref. [5] was the frst to derve a odel that ncororates the exonental backoff rocess nherent to 82. as a two densonal Markov chan. Ref. [6] follows the sae Markov chan odel and consders frae retry lts to avod overestatng the throughut of 82. as n [5]. Ref. [7] extends ths odel to evaluate the saturated throughut under the hdden staton effect. Refs. [8, 9] odfed ths odel to reresent the non-saturaton and saturaton condtons. On the other hand, an average servce te and jtter analyss n the saturated condton s derved n [] based on ths Markov chan odel. Ref. [] consders the data length and the nuber of backoff slot as rando varables. It rooses a robablty generatng functon (PGF for the access delay and nverts ths PGF to obtan an aroxate dstrbuton of the access delay. Refs. [2, 3] extend ths PGF work by consderng ore araeters as rando varables to derve ther PGFs and dstrbutons for the access delay. Pror research has atteted to buld an accurate access delay odel for 82. DCF. However, the hdden staton effect on the backoff schee has not been gven adeuate attenton. As wll be shown below, ths effect sgnfcantly ncreases the access delay, esecally for the basc access ethod n the saturated condton. In ths aer, we study the access delay of 82. DCF under non-saturaton and saturaton condtons n the resence of hdden statons for both basc and RT/CT access ethods based on the Markov chan odel and the PGF analyss. The rest of ths aer s organzed as follows. In secton II, we ntroduce the concet of vulnerable erod to study the effectveness of both basc and RT/CT access ethods n the resence of hdden statons. In secton III, we use a two-densonal Markov chan odel to calculate the acket transsson robablty n the vulnerable erod and the access delay n both non-saturaton and saturaton condton. In secton IV, we valdate the analytcal odel by coarng the nuercal results wth ns-2 sulaton [4]. Fnally, conclusons are resented n secton V. II. THE HIDDEN TATION EFFECT ON 82. DCF The DCF s the fundaental access ethod of the IEEE 82.. It s based on the CMA/CA and a backoff rocedure to reduce the collson robablty between ultle statons accessng the channel. The CMA/CA echans defnes two channel states: dle and busy. If a staton senses no transsson on the channel, t consders the channel state as dle; otherwse t consders the channel state as busy. hen a staton tres to access the channel, t enters the backoff rocedure that randoly chooses a backoff te n a range (, C wth a unfor robablty. The C s known as the nu contenton wndow sze. Durng the backoff rocedure, f the staton senses channel as dle ts ter decreents one backoff slot. If the channel s sensed as busy, /7/$ IEEE Ths full text aer was eer revewed at the drecton of IEEE Councatons ocety subject atter exerts for ublcaton n the IEEE GLOBECOM 27 roceedngs. Authorzed lcensed use lted to: Rutgers Unversty. Downloaded on Arl, 29 at 5:26 fro IEEE lore. Restrctons aly.

2 DIF IF DIF ource Backoff-ndow DATA - Destnaton Hdden taton Backoff-ndow Freeze Backoff Ter - -, (- - -, - -, , , - Vulnerable Perod Fg..The vulnerable erod for the hdden statons: Basc access ethod -, /, /, 2 /, -2, - DIF IF IF IF ource Backoff-ndow RT DATA - ', /ax ', ', 2 /ax ', ax -2 ', ax - Destnaton CT /ax /ax /ax Hdden taton Backoff-ndow Freeze Backoff Ter Vulnerable Perod Fg. 2.The vulnerable erod for the hdden statons: RT/CT access ethod /ax /ax,,, 2, ax -2 Fg. 3. Markov chan odel for backoff rocedure, ax- the ter s frozen. After the channel becoes dle agan, the ter resues fro the frozen slot and counts down the reanng backoff slots. After the ter fnshes the countdown, the staton accesses the channel agan. If the transsson fals, the staton reeats the backoff rocedure and doubles the contenton wndow sze. After every faled transsson, the exonental backoff echans doubles the contenton wndow sze u to a redefned axu range. However, f soe statons are hdden to each other so they cannot sense each other s transsson, they ay stakenly deterne the channel as dle and transt concurrently. The erod fro the end of the revous transsson untl an ongong transsson s detected s called the vulnerable erod. A. Hdden taton Effect on the Basc Access Method The basc access ethod s shown n Fg.. Any staton that can sense the transsson fro the source, called covered staton, wll deterne the channel as busy and defer ts own transssons for the duraton of the Network Allocaton Vector (NAV. The only ossble acket collson between the source and a covered staton haens f they fnsh ther backoff countdown sultaneously. The vulnerable erod for covered statons s one backoff slot long. However, the hdden statons do not sense the transsson fro the source untl they receve an, so they sense the channel as dle untl sensng the. If any one of these hdden statons coletes ts backoff rocedure before sensng the, t wll send another data frae to the destnaton, whch wll collde wth the data frae fro the exstng source. The vulnerable erod for hdden statons euals the length of a data frae. B. Hdden taton Effect on the RT/CT Access Method The RT/CT access ethod s shown n Fg. 2. As n the basc access ethod, the vulnerable erod for the covered statons s also one backoff slot long. The hdden statons wll set ther NAV after recevng the CT frae fro the destnaton, so the vulnerable erod for the hdden statons euals the length of the RT frae lus a IF erod. Unlke the basc access ethod, the vulnerable erod for hdden statons n RT/CT access ethod s a fxed length erod and s not related to the length of the data frae fro the source. III. THE ACCE DELAY MODEL The key contrbuton of ths aer s the cobned analytcal evaluaton of the access delay for both non-saturated and saturated condtons n the resence of hdden statons. A. Markov Chan Model of taton Transssons In the analyss, we assue the followng condtons: (a deal channel condton,.e., no cature effect; (b constant and ndeendent collson robablty of a acket transtted by each staton, regardless of the nuber of collsons already suffered; and (c fxed nuber of contendng statons. Let n denote the nuber of contendng statons. Let b(t be the stochastc rocess reresentng the backoff ter for a gven slot. As n [5], the key aroxaton n ths odel s that the robablty of a transtted acket colldng wth another acket s ndeendent of the staton s backoff stage s(t. o, the two-densonal rocess {s(t, b(t} can be odeled as a dscrete-te Markov chan, shown n Fg. 3, where s the axu backoff stage and s the backoff stage at whch the contenton wndow sze reaches the axu value, C ax, and reans at C ax after ths stage. (C n and (C ax. The C n s the nu contenton wndow sze. e set 5 n ths aer. Based on the 82. standard [], the contenton wndow, also called backoff wndow, ncreases exonentally fro C n to C ax. It can be reresented as 2 2 > The backoff states (, k for k (, n Fg. 3 reresent the ost-backoff stage. After a successful ( /7/$ IEEE Ths full text aer was eer revewed at the drecton of IEEE Councatons ocety subject atter exerts for ublcaton n the IEEE GLOBECOM 27 roceedngs. Authorzed lcensed use lted to: Rutgers Unversty. Downloaded on Arl, 29 at 5:26 fro IEEE lore. Restrctons aly.

3 (2 ( (, b 2 2 (2 2 (4 τ 2 V b, k k V V ( ( ( ( V ( ( 2 2 ( V V( ( V V ( ( ( ( V ( 2 (2 (2 2 (2P V V (2 ( ( 2 b, V ( ( ( b, < V,, (6, V > transsson, the staton resets ts C value to and erfors a rando backoff rocedure even f there are no endng ackets n the ueue. Ths ost backoff ensures that there s at least one backoff nterval between two consecutve transssons of a staton. e assue that each staton can buffer one acket and reresents the robablty that at least one acket wats for transsson durng a slot te. If, then the staton s n the saturaton condton and does not go to ost-backoff stage. In ths Markov chan, the transton robabltes are P(,, P (,, ( P (, k, k P(, k, k P (, k, k k ( ( P (, k, k, P(, k, k ( P(, k, k, P (, k, k k, P (, k, P (, k, k k, Let b,k l t P{s(t, b(t k}, (,, k (, be the statonary dstrbuton of the Markov chan. By usng the noralzaton condton for a statonary dstrbuton, we have (2 b, k b, k k k (3 Based on the chan regulartes, we can obtan b, n (4. The statonary robablty τ (that a staton transts a acket n a randoly chosen te slot, can be reresented as: τ b, b, (5 The statonary robablty τ 2 (that a staton transts a acket n a vulnerable erod, can be reresented as E. (6 where V s the vulnerable erod length n the unts of backoff slots. s the nu backoff stage at whch the backoff wndow sze s greater than V. For exale, f < V 2, then use 2 n E. (6. As already noted, τ s a secal case of τ 2 because τ can be consdered as the vulnerable erod wth the duraton of one slot te. e can verfy ths usng V and n the frst case of E. (6. In the statonary state, the collson robablty s the robablty that at least one covered staton transts n the sae backoff slot as the source, or at least one hdden staton transts n the vulnerable erod. Thus can be exressed as: n C n ( τ ( H τ 2 (7 where n C s nuber of the covered statons that ncludes the transttng staton tself, and n H s the nuber of the hdden statons. The total nuber of contendng statons, n, euals n n C n H. e solve the nonlnear Es. (4 (7 by nuercal ethod to obtan τ and τ 2. B. The Access Delay Analyss Let P tr be the robablty that there s at least one transsson n the consdered slot te. n P tr ( τ (8 The robablty of a successful transsson n the resence of hdden statons, P s, s the robablty that exactly one of n backlogged statons transts and none of ts covered staton /7/$ IEEE Ths full text aer was eer revewed at the drecton of IEEE Councatons ocety subject atter exerts for ublcaton n the IEEE GLOBECOM 27 roceedngs. Authorzed lcensed use lted to: Rutgers Unversty. Downloaded on Arl, 29 at 5:26 fro IEEE lore. Restrctons aly.

4 transts n the sae te slot and none of the hdden statons transts n the vulnerable erod nc n H nτ ( τ ( τ 2 P (9 Ptr The length of a slot te E can be reresented as E ( Ptr σ P Ptr T ( P Ptr T C ( where σ s the duraton of an ety backoff slot. The T and T C are the erod of te that the channel s sensed busy because of a successful transsson or a collson, resectvely. They are dfferent n the basc and RT/CT access ethods: T bas DATA δ IF δ DIF T bas C DATA δ _ Teout ( where DATA s the data frae length and δ s the roagaton delay. The _Teout IF DIF. For RT/CT access ethod, T and T C can be exressed as: RT δ IF CT δ IF DATA δ IF δ DIF (2 T C rts RT δ CT _ Teout where CT_Teout IF CT (2 σ. Let U be a rando varable wth a dscrete unfor dstrbuton Pr{ U k } k,,...(,,... (3 The accuulated backoff te B before a staton transts a acket successfully fro the th backoff stage or dscards t because of exceedng the retry lt can be reresented as U r TC,,... r B (4 U r TC r T rts The staton dscards the acket when the stage s reached. Hence, the robablty of a staton transttng a acket successfully at th stage or dscardng t at stage s (,,... (5 o the access delay D ncludng all backoff stages s D B T (6 In order to obtan the dstrbuton of the access delay, we derve the Probablty Generatng Functon (PGF of the access delay D(Z by z-transfor [ 3] T D ( Z B ( Z Z (7 where the B (Z can be reresented as ( Z U r ( Z Z B ( Z r ( Z U r ( Z Z r and E(Z can be reresented as TC TC,,... (8 tr tr T T ( P C Ptr Z σ (9 E ( Z ( P Z P P Z e nvert the PGF of the access delay nuercally to obtan ts dstrbuton. The aroxate dstrbuton of the access delay s valdated n next secton. IV. PERFORMANCE EVALUATION A. ulaton etu All the araeters used n the analytcal odel and the ns-2 sulaton are suarzed n Table I. Table I. yste araeters Transsson Rate Mbs Packet Payload 25 Bytes PHY header 92 bts RT 6 bts PHY header CT 2 bts PHY header 2 bts PHY header DIF 5 µs IF µs lot Te (σ 2 µs Proagaton Delay (δ µs C n 3 C ax 23 e use a rng toology that s coosed of one access ont located n the center of a rng and 6 statons unforly dstrbuted along the rng. The cature effect can be gnored n our toology because of eual dstance fro the access ont to all statons. The transsson range and carrer sensng ranges are set at 597 eters (. In ths study, we vary the rng daeter, defned as d, to obtan dfferent nuber of hdden statons n the 6-staton network: (a d 54 each staton can sense all the ackets fro the other 5 statons, so there s no hdden statons and there are 6 covered statons; (b d 6 hdden staton and 5 covered ones; (c d 63 3 hdden statons and 3 covered statons; (d d 68 5 hdden statons and covered ones. B. Model Valdaton and Access Delay Analyss Frst, we valdate the average access delay of our analytcal odel wth the ns-2 results for dfferent offered load n both basc and RT/CT access ethods, as shown n Fgs. 4 and 5. Based on the result, the access delay can be dvded nto three condtons: non-saturaton, transton and saturaton. In the non-saturaton condton, as the offered load ncreases, the access delay ncreases lnearly n both access ethods. Access delay values are alost the sae regardless of the nuber of hdden statons n the network. The hdden staton effect s nsgnfcant n ths condton. In the transton condton, the access delay jus fro ts non-saturated value to the saturated one. As the nuber of hdden staton ncreases, there s a hgher overshoot n the access delay curve. The analytcal access delay cannot cature the sulated result because we solve nonlnear Es. (4 (7 by nuercal ethod to get an aroxate analytcal result. In the saturaton condton, the access delay reans constant. Coarng ths value n both the basc and RT/CT access ethods, we can see that the basc access ethod s uch ore senstve to the hdden /7/$ IEEE Ths full text aer was eer revewed at the drecton of IEEE Councatons ocety subject atter exerts for ublcaton n the IEEE GLOBECOM 27 roceedngs. Authorzed lcensed use lted to: Rutgers Unversty. Downloaded on Arl, 29 at 5:26 fro IEEE lore. Restrctons aly.

5 Access delay (s hdden - odel 5 hdden - ns2 3 hdden - odel 3 hdden - ns2 hdden - odel hdden - ns2 hdden - odel hdden - ns2.5.5 Noralzed offered load Probablty No hdden - Model No Hdden - ns2 hdden - Model Hdden - ns2 3 hdden - Model 3 Hdden - ns2 5 hdden - Model 5 Hdden - ns No of Retranssson ( 7 dscard Probablty No hdden - Model No Hdden - ns2 hdden - Model Hdden - ns2 3 hdden - Model 3 Hdden - ns2 5 hdden - Model 5 Hdden - ns Aaccess Delay (s Fg. 4 Access delay versus noralzed offered load: Fg. 6 PMF of nuber of retry Fg. 8 PMF of the access delay Basc access ethod Basc access ethod Basc access ethod Access delay (s hdden - odel 5 hdden - ns2 3 hdden - odel 3 hdden - ns2 hdden - odel hdden - ns2 hdden - odel hdden - ns2.5.5 Noralzed offered load Probablty No hdden - odel No hdden - ns2 hdden - odel hdden - ns2 3 hdden - odel 3 hdden - ns2 5 hdden - odel 5 hdden - ns No of Retranssson ( 7 dscard Probablty.2 No hdden - odel. No hdden - ns2.2. hdden - odel hdden - ns2.2 3 hdden - odel. 3 hdden - ns hdden - odel 5 hdden - ns Aaccess Delay (s Fg. 5 Access delay versus noralzed offered load: Fg. 7 PMF of nuber of retry Fg. 9 PMF of the access delay RT/CT access ethod RT/CT access ethod RT/CT access ethod staton effect. As the nuber of hdden staton grows, the access delays n, 3 and 5 hdden staton cases are about 2.3, 5.5 and 3 tes of that n the case of no hdden statons, resectvely. nce the revous 82. DCF delay odels do not account for hdden statons, ther delays would corresond to the botto curves n Fgs. 4 and 5 (no hdden statons scenaro. Obvously, ths s nadeuate. e also study the Probablty Mass Functon (PMF of the nuber of retres before a successful transsson (Fg. 6 and 7 and access delay (Fgs. 8 and 9 n the saturaton condton. In the basc access ethod, as the nuber of hdden staton grows, fewer ackets can be transtted successfully n the frst attet and ore ackets wll be dscarded because of exceedng the retry lt (Fg. 6. The dstrbuton of the access delay (Fg.8 also shows ths tendency. The PMF s gettng flat and wdesread as the nuber of hdden statons ncreases. On the other hand, the RT/CT access ethod s ore robust to the hdden-staton effect. The PMF charts for dfferent network scenaros are slar (Fgs. 7 and 9. V. CONCLUION In ths aer, we derved an analytcal odel for the access delay of the basc and RT/CT access ethods n IEEE 82. DCF under both the non-saturaton and saturaton condton n the resence of hdden statons. The roosed odel s n good agreeent wth ns-2 sulatons and, thus, can be used to estate accurately the access delay. The revous work can be consdered as a secal case of our odel, wth zero hdden statons. REFERENCE [] IEEE tandard for reless LAN Medu Access Control (MAC and Physcal Layer (PHY secfcatons, IEEE 82.b, 999. [2] A.. Tanenbau, Couter Networks. 3rd Edton, Prentce Hall, Uer addle Rver, NJ, 996. [3] L. Klenrock and F. Tobag, Packet swtchng n rado channels, Part II The hdden ternal roble n carrer sense ultle access and the busy tone soluton, IEEE Trans. Co., vol. COM-23, no. 2, , Dec [4] H.. Chhaya and. Guta, Perforance odelng of asynchronous data transfer ethods of IEEE 82. MAC rotocol, reless Networks, vol. 3, , 997. [5] G. Banch, Perforance analyss of the IEEE 82. dstrbuted coordnaton functon, IEEE J. on elected Areas n Co., vol. 8, no. 3, , Mar. 2. [6] H. u, Y. Peng, K. Long,. Cheng, and J. Ma, Perforance of relable transort rotocol over IEEE 82. wreless LAN: Analyss and enhanceent, Proc. IEEE INFOCOM, vol. 2, , 22. [7] F. Hung, Pa and I. Marsc, Perforance Modelng and Analyss of the IEEE 82. Dstrbuton Coordnaton Functon n Presence of Hdden tatons, IEEE/AFCEA MILCOM, Oct. 26. [8] K. Duffy, D. Malone and D. Leth, Modelng the 82. Dstrbuted Coordnaton Functon n Non-saturated Condtons, IEEE Co. Letters. Vol. 9, No. 8, 75-77, Aug. 25. [9] P.E. Engelstad and O.N. Østerbø, Non-aturaton and aturaton Analyss of IEEE 82.e EDCA wth tarvaton Predcton, Proc. ACM MM 25, Oct. 25. [] M. Carvalho and J.J. Garca-Luna-Aceves, Delay Analyss of IEEE 82. n ngle-ho Networks, Proc. IEEE ICNP 3, Nov. 23. [] H. Zha, Y. Kwon, and Y. Fang, Perforance analyss of IEEE 82. MAC rotocols n wreless LANs, n Proc. reless Coun. And Moble Coutng 24, [2] O. Tckoo and B. kdar, Queueng analyss and delay tgaton n IEEE 82. rando access MAC based wreless networks, n Proc. IEEE INFOCOM 24, [3] H. Vu and T. akura, Accurate delay dstrbuton for IEEE 82. DCF, n IEEE Councatons Letters, Vol., NO. 4, Ar. 26. [4] The ns Manual, htt:// /7/$ IEEE Ths full text aer was eer revewed at the drecton of IEEE Councatons ocety subject atter exerts for ublcaton n the IEEE GLOBECOM 27 roceedngs. Authorzed lcensed use lted to: Rutgers Unversty. Downloaded on Arl, 29 at 5:26 fro IEEE lore. Restrctons aly.

IEEE Distributed Coordination Function(DCF): Analysis and Enhancement *

IEEE Distributed Coordination Function(DCF): Analysis and Enhancement * IEEE 802. Dstrbuted Coordnaton Functon(DCF): Analyss and Enhanceent * Hatao Wu, Shduan Cheng, Yong Peng, Keng Long, Jan Ma 2 Natonal Key Lab of Swtchng Technology and Telecouncaton Networks, P.O.Box 206,

More information

Delay Analysis of Different Backoff Algorithms in IEEE

Delay Analysis of Different Backoff Algorithms in IEEE Delay Analyss of Dfferent Backoff Algorths n IEEE 82. Ivan N. Vukovc otorola Inc., 44 W. Sure Dr., Arlngton Heghts, IL, 64 USA, Ivan.Vukovc@otorola.co, (847) 632-5963, fax (847) 435-997 Abstract - In ths

More information

2016 International Conference on Sustainable Energy, Environment and Information Engineering (SEEIE 2016) ISBN:

2016 International Conference on Sustainable Energy, Environment and Information Engineering (SEEIE 2016) ISBN: 06 Internatonal Conference on Sustanable Energy, Envronent and Inforaton Engneerng (SEEIE 06) ISBN: 978--60595-337-3 A Study on IEEE 80. MAC Layer Msbehavor under Dfferent Back-off Algorths Trong Mnh HOANG,,

More information

Interclass Collision Protection for IEEE e Wireless LANs

Interclass Collision Protection for IEEE e Wireless LANs Interclass Collson Protecton for IEEE 82.e Wreless LANs Woon Sun Cho, Chae Y. Lee Dstrbuted Coordnaton Functon (DCF) n IEEE 82. and Enhanced Dstrbuted Channel Access (EDCA) n IEEE 82.e are contenton-based

More information

136 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 6, NO. 1, JANUARY Ching-Ling Huang and Wanjiun Liao, Senior Member, IEEE

136 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 6, NO. 1, JANUARY Ching-Ling Huang and Wanjiun Liao, Senior Member, IEEE 136 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 6, NO. 1, JANUARY 2007 Throughput and Delay Performance of IEEE 802.11e Enhanced Dstrbuted Channel Access (EDCA) Under Saturaton Condton Chng-Lng

More information

Voice capacity of IEEE b WLANs

Voice capacity of IEEE b WLANs Voce capacty of IEEE 82.b WLANs D. S. Amanatads, V. Vtsas, A. Mantsars 2, I. Mavrds 2, P. Chatzmsos and A.C. Boucouvalas 3 Abstract-There s a tremendous growth n the deployment and usage of Wreless Local

More information

An Analytical Model for IEEE Point-to-Point Link

An Analytical Model for IEEE Point-to-Point Link An Analytcal Model for IEEE 82. Pont-to-Pont Lnk Yong Yan, Xaowen hu Department of omputer cence, Hong Kong Baptst Unversty Emal: {yyan, chxw}@comp.hkbu.edu.hk Abstract - Wreless mesh networks have attracted

More information

UBICC Publishers 2008 Ubiquitous Computing and Communication Journal

UBICC Publishers 2008 Ubiquitous Computing and Communication Journal UBICC Journal Ubqutous Computng and Communcaton Journal 008 Volume 3. 008-04-30. ISSN 99-844 Specal Issue on Moble Adhoc Networks UBICC ublshers 008 Ubqutous Computng and Communcaton Journal Edted by Usman

More information

THE IEEE standard for wireless local area networks

THE IEEE standard for wireless local area networks IEEE RANSACIONS ON VEHICULAR ECHNOLOGY, VOL. 58, NO. 2, FEBRUARY 2009 855 Determnstc Prorty Channel Access Scheme for QoS Support n IEEE 802.11e Wreless LANs Sunmyeng Km, Rongsheng Huang, Student Member,

More information

Modeling TCP Throughput: A Simple Model and its Empirical Validation

Modeling TCP Throughput: A Simple Model and its Empirical Validation Modelng TCP Throughut: A Smle Model and ts mrcal Valdaton Jtendra Padhye, Vctor Frou, Don Towsley, Jm Kuros 0-09-9 Presenter: Ognjen Vukovc Modelng TCP Throughut: A Smle Model and ts mrcal Valdaton Motvaton

More information

Solutions to Programming Assignment Five Interpolation and Numerical Differentiation

Solutions to Programming Assignment Five Interpolation and Numerical Differentiation College of Engneerng and Coputer Scence Mechancal Engneerng Departent Mechancal Engneerng 309 Nuercal Analyss of Engneerng Systes Sprng 04 Nuber: 537 Instructor: Larry Caretto Solutons to Prograng Assgnent

More information

Performance Analysis of Markov Modulated 1-Persistent CSMA/CA Protocols with Exponential Backoff Scheduling

Performance Analysis of Markov Modulated 1-Persistent CSMA/CA Protocols with Exponential Backoff Scheduling Performance Analyss of Markov Modulated -Persstent CSMA/CA Protocols wth ponental Backoff Schedulng Pu ng Wong, Dongje Yn, and Tony T. Lee, Abstract. Ths paper proposes a Markovan model of -persstent CSMA/CA

More information

Optimization Methods: Integer Programming Integer Linear Programming 1. Module 7 Lecture Notes 1. Integer Linear Programming

Optimization Methods: Integer Programming Integer Linear Programming 1. Module 7 Lecture Notes 1. Integer Linear Programming Optzaton Methods: Integer Prograng Integer Lnear Prograng Module Lecture Notes Integer Lnear Prograng Introducton In all the prevous lectures n lnear prograng dscussed so far, the desgn varables consdered

More information

Efficient Backoff Algorithm in Wireless Multihop Ad Hoc Networks

Efficient Backoff Algorithm in Wireless Multihop Ad Hoc Networks 1 Chen-Mn Wu, 2 Hu-Ka Su, 3 Wang-Has Yang *1,Correspondng Author Nanhua Unversty, cmwu@mal.nhu.edu.tw 2 Natonal Formosa Unversty, hksu@nfu.edu.tw 3 Hsupng Insttute of Technology, yangwh@mal.ht.edu.tw do:10.4156/jact.vol3.

More information

Analysis of QoS in WLAN

Analysis of QoS in WLAN Analyss of QoS n WLAN PAAL E. ENGELSTAD AND OLAV N. ØSTERBØ Paal E. Engelstad s Research Scentst n Telenor R&D An analytcal model s proposed to descrbe the prorty schemes of the EDCA mechansm of the IEEE

More information

Sums of exponential functions and their new fundamental properties

Sums of exponential functions and their new fundamental properties Sus of exonental functons and ther new fundaental roertes Yur K. Shestoaloff Abstract hs aer dscovers and roves the fundaental roertes of sus of exonental functon n the for of а heore that s stated as

More information

Performance Analysis of the Binary Exponential Backoff Algorithm for IEEE Based Mobile Ad Hoc Networks

Performance Analysis of the Binary Exponential Backoff Algorithm for IEEE Based Mobile Ad Hoc Networks Ths full text aer was eer revewed at the dreton of IEEE Counatons Soety subet atter exerts for ublaton n the IEEE ICC roeedngs Perforane Analyss of the Bnary Exonental Bakoff Algorth for IEEE 8. Based

More information

Performance Analysis of Beacon-Less IEEE Multi-Hop Networks

Performance Analysis of Beacon-Less IEEE Multi-Hop Networks Performance Analyss of Beacon-Less IEEE 2..4 Mult-Hop Networks Racht Srvastava Deptt. of Electrcal Communcaton Engneerng Indan Insttute of Scence Bangalore, Inda 62 rachtsr@gmal.com Anurag Kumar Deptt.

More information

Analysis of Collaborative Distributed Admission Control in x Networks

Analysis of Collaborative Distributed Admission Control in x Networks 1 Analyss of Collaboratve Dstrbuted Admsson Control n 82.11x Networks Thnh Nguyen, Member, IEEE, Ken Nguyen, Member, IEEE, Lnha He, Member, IEEE, Abstract Wth the recent surge of wreless home networks,

More information

Performance Evaluation of IEEE e based on ON-OFF Traffic Model I. Papapanagiotou PhD. Student

Performance Evaluation of IEEE e based on ON-OFF Traffic Model I. Papapanagiotou PhD. Student erformance Evaluaton of IEEE 82.e based on ON-OFF Traffc Model I. apapanagotou hd. Student Wreless Telecommuncaton Laboratory Unversty of atras 265 4 atras Greece papapanag@upnet.gr J.S. Vardakas hd. Student

More information

A Base Station-Coordinated Contention Resolution for IEEE PMP Networks

A Base Station-Coordinated Contention Resolution for IEEE PMP Networks A Base Staton-Coordnated Contenton Resoluton for IEEE 802.6 PMP Networks Wenyan Lu, Weja Ja,2, Wenfeng Du, and Ldong Ln 2 School of Informaton Scence & Engneerng, Central South Unversty, Changsha, 40083,

More information

Re-routing Instability in IEEE Multi-hop Ad-hoc Networks *

Re-routing Instability in IEEE Multi-hop Ad-hoc Networks * Re-routng Instablty n IEEE 802.11 Mult-hop Ad-hoc Networks * Png Chung Ng and Soung Chang Lew Department of Informaton Engneerng The Chnese Unversty of Hong Kong {pcng3, soung}@e.cuhk.edu.hk Abstract TCP

More information

An Adaptive Sleep Strategy for Energy Conservation in Wireless Sensor Networks

An Adaptive Sleep Strategy for Energy Conservation in Wireless Sensor Networks An Adaptve Sleep Strategy for Energy Conservaton n Wreless Sensor Networks Guseppe Anastas, Marco Cont, Maro D Francesco Abstract - In recent years, wreless sensor network deployents for real lfe applcatons

More information

A Backoff Algorithm for Improving Saturation Throughput in IEEE DCF

A Backoff Algorithm for Improving Saturation Throughput in IEEE DCF A Backoff Algorithm for Improving Saturation Throughput in IEEE 80.11 DCF Kiyoshi Takahashi and Toshinori Tsuboi School of Computer Science, Tokyo University of Technology, 1404-1 Katakura, Hachioji, Tokyo,

More information

The ray density estimation of a CT system by a supervised learning algorithm

The ray density estimation of a CT system by a supervised learning algorithm Te ray densty estaton of a CT syste by a suervsed learnng algort Nae : Jongduk Baek Student ID : 5459 Toc y toc s to fnd te ray densty of a new CT syste by usng te learnng algort Background Snce te develoent

More information

Performance analysis of distributed cluster-based MAC protocol for multiuser MIMO wireless networks

Performance analysis of distributed cluster-based MAC protocol for multiuser MIMO wireless networks RESEARCH Open Access Performance analyss of dstrbuted cluster-based MAC protocol for multuser MIMO wreless networks Azadeh Ettefagh *, Marc Kuhn, Celal Eşl and Armn Wttneben Abstract It s known that multuser

More information

Real-Time Guarantees. Traffic Characteristics. Flow Control

Real-Time Guarantees. Traffic Characteristics. Flow Control Real-Tme Guarantees Requrements on RT communcaton protocols: delay (response s) small jtter small throughput hgh error detecton at recever (and sender) small error detecton latency no thrashng under peak

More information

Performance Analysis of the IEEE MAC Protocol over a WLAN with Capture Effect

Performance Analysis of the IEEE MAC Protocol over a WLAN with Capture Effect Vol. IPSJ Dgtal Courer Nov. 25 Regular Paper Performance Analyss of the IEEE 82. MAC Protocol over a WLAN wth Capture Effect Xaolong L, and Qng-An Zeng, In ths paper, we use a dscrete Markov chan model

More information

An Adaptive Batched Patch Caching Scheme for Multimedia Streaming *

An Adaptive Batched Patch Caching Scheme for Multimedia Streaming * An Adatve Batched Patch achng Schee for Multeda Streang * Shaohua Qn, Wehong He, Zu L, and Janng Hu School of outer Scence, Beng Unversty of Aeronautcs & Astronautcs, Beng 8,hna {shqn,annghu}@buaa.edu.cn

More information

Introduction. Leslie Lamports Time, Clocks & the Ordering of Events in a Distributed System. Overview. Introduction Concepts: Time

Introduction. Leslie Lamports Time, Clocks & the Ordering of Events in a Distributed System. Overview. Introduction Concepts: Time Lesle Laports e, locks & the Orderng of Events n a Dstrbuted Syste Joseph Sprng Departent of oputer Scence Dstrbuted Systes and Securty Overvew Introducton he artal Orderng Logcal locks Orderng the Events

More information

Extension and Comparison of QoS-Enabled Wi-Fi Models in the Presence of Errors

Extension and Comparison of QoS-Enabled Wi-Fi Models in the Presence of Errors Extenson and Comparson of QoS-Enabled W-F Models n the Presence of Errors Ioanns Papapanagotou, Georgos S. Paschos*, Stavros A. Kotsopoulos** and Mchael Devetskots Electrcal and Computer Engneerng, North

More information

Fu-Yi Hung ALL RIGHTS RESERVED

Fu-Yi Hung ALL RIGHTS RESERVED 009 Fu-Yi Hung ALL RIGHTS RESERVED PERFORMANCE ANALYSIS OF THE IEEE 80.-BASED WIRELESS NETWORKS IN THE PRESENCE OF HIDDEN STATIONS by FU-YI HUNG A Dissertation submitted to the Graduate School-New Brunswick

More information

2x x l. Module 3: Element Properties Lecture 4: Lagrange and Serendipity Elements

2x x l. Module 3: Element Properties Lecture 4: Lagrange and Serendipity Elements Module 3: Element Propertes Lecture : Lagrange and Serendpty Elements 5 In last lecture note, the nterpolaton functons are derved on the bass of assumed polynomal from Pascal s trangle for the fled varable.

More information

A study of Adaptive Replication Technique in routing time-constrained messages (VoIP) in MANET

A study of Adaptive Replication Technique in routing time-constrained messages (VoIP) in MANET A study of Adaptve Replcaton Technque n routng te-constraned essages (VoIP) n MANET SWATI SAXENA Research Scholar AIM & ACT Banasthal Vdyapth Banasthal, (Ra.) Dr. MADHAVI SINHA Asst. Prof. (HOD) Dept.

More information

IEEE E: QOS PROVISIONING AT THE MAC LAYER YANG XIAO, THE UNIVERSITY OF MEMPHIS

IEEE E: QOS PROVISIONING AT THE MAC LAYER YANG XIAO, THE UNIVERSITY OF MEMPHIS ACCEPTED FROM O PEN C ALL IEEE 802.11E: QOS PROVISIONING AT THE MAC LAYER YANG XIAO, THE UNIVERSITY OF MEMPHIS ess AIFS[j] AIFS[] PIFS SIFS AIFS[] Content 0 to CW Bac Slot Select s The emergng IEEE 802.11e

More information

Adaptive Network Resource Management in IEEE Wireless Random Access MAC

Adaptive Network Resource Management in IEEE Wireless Random Access MAC Adaptve Network Resource Management n IEEE 802.11 Wreless Random Access MAC Hao Wang, Changcheng Huang, James Yan Department of Systems and Computer Engneerng Carleton Unversty, Ottawa, ON, Canada Abstract

More information

Generating Fuzzy Term Sets for Software Project Attributes using and Real Coded Genetic Algorithms

Generating Fuzzy Term Sets for Software Project Attributes using and Real Coded Genetic Algorithms Generatng Fuzzy Ter Sets for Software Proect Attrbutes usng Fuzzy C-Means C and Real Coded Genetc Algorths Al Idr, Ph.D., ENSIAS, Rabat Alan Abran, Ph.D., ETS, Montreal Azeddne Zah, FST, Fes Internatonal

More information

Achievable Bandwidth Estimation for Stations in Multi-Rate IEEE WLAN Cells

Achievable Bandwidth Estimation for Stations in Multi-Rate IEEE WLAN Cells Achevable Bandwdth Estmaton for Statons n Mult-Rate IEEE 802. WLAN Cells Eduard Garca, Davd Vamonte, Rafael Vdal and Josep Paradells Wreless Networks Group - echncal Unversty of Catalona (UPC) {eduardg,

More information

Light Weight Distributed QoS Adapter in Large-Scale Ad hoc Networks. Seyed Hossein Hosseini Nazhad Ghazani 1, R.M.Alguliev 2

Light Weight Distributed QoS Adapter in Large-Scale Ad hoc Networks. Seyed Hossein Hosseini Nazhad Ghazani 1, R.M.Alguliev 2 Lght Weght Dstruted QoS Adapter n Large-Scale Ad hoc Networs Seyed Hossen Hossen Nazhad Ghazan, R.M.Algulev 2 Ph.D. Canddate, Insttute of Inforaton Technology of ANAS, Bau, Azerajan 2 Doctor of Techncal

More information

Compiler Design. Spring Register Allocation. Sample Exercises and Solutions. Prof. Pedro C. Diniz

Compiler Design. Spring Register Allocation. Sample Exercises and Solutions. Prof. Pedro C. Diniz Compler Desgn Sprng 2014 Regster Allocaton Sample Exercses and Solutons Prof. Pedro C. Dnz USC / Informaton Scences Insttute 4676 Admralty Way, Sute 1001 Marna del Rey, Calforna 90292 pedro@s.edu Regster

More information

Problem Set 3 Solutions

Problem Set 3 Solutions Introducton to Algorthms October 4, 2002 Massachusetts Insttute of Technology 6046J/18410J Professors Erk Demane and Shaf Goldwasser Handout 14 Problem Set 3 Solutons (Exercses were not to be turned n,

More information

Load Balancing for Hex-Cell Interconnection Network

Load Balancing for Hex-Cell Interconnection Network Int. J. Communcatons, Network and System Scences,,, - Publshed Onlne Aprl n ScRes. http://www.scrp.org/journal/jcns http://dx.do.org/./jcns.. Load Balancng for Hex-Cell Interconnecton Network Saher Manaseer,

More information

Pattern Classification of Back-Propagation Algorithm Using Exclusive Connecting Network

Pattern Classification of Back-Propagation Algorithm Using Exclusive Connecting Network World Acade of Scence, Engneerng and Technolog 36 7 Pattern Classfcaton of Bac-Propagaton Algorth Usng Eclusve Connectng Networ Insung Jung, and G-Na Wang Abstract The obectve of ths paper s to a desgn

More information

RAP. Speed/RAP/CODA. Real-time Systems. Modeling the sensor networks. Real-time Systems. Modeling the sensor networks. Real-time systems:

RAP. Speed/RAP/CODA. Real-time Systems. Modeling the sensor networks. Real-time Systems. Modeling the sensor networks. Real-time systems: Speed/RAP/CODA Presented by Octav Chpara Real-tme Systems Many wreless sensor network applcatons requre real-tme support Survellance and trackng Border patrol Fre fghtng Real-tme systems: Hard real-tme:

More information

A Fair Access Mechanism Based on TXOP in IEEE e Wireless Networks

A Fair Access Mechanism Based on TXOP in IEEE e Wireless Networks 11 Internatonal Journal of Communcaton Networks and Informaton Securty (IJCNIS) Vol. 8, No. 1, Aprl 16 A Far Access Mechansm Based on TXOP n IEEE 8.11e Wreless Networks Marjan Yazdan 1, Maryam Kamal, Neda

More information

A Topology-aware Random Walk

A Topology-aware Random Walk A Topology-aware Random Walk Inkwan Yu, Rchard Newman Dept. of CISE, Unversty of Florda, Ganesvlle, Florda, USA Abstract When a graph can be decomposed nto clusters of well connected subgraphs, t s possble

More information

On-line Scheduling Algorithm with Precedence Constraint in Embeded Real-time System

On-line Scheduling Algorithm with Precedence Constraint in Embeded Real-time System 00 rd Internatonal Conference on Coputer and Electrcal Engneerng (ICCEE 00 IPCSIT vol (0 (0 IACSIT Press, Sngapore DOI: 077/IPCSIT0VNo80 On-lne Schedulng Algorth wth Precedence Constrant n Ebeded Real-te

More information

Algorithm for Computer Aided Design Curve Shape Form Generation of Knitting Patterns

Algorithm for Computer Aided Design Curve Shape Form Generation of Knitting Patterns Algorth for Couter Aded Desgn Curve Shae For Generaton of Knttng Patterns Elena Zahareva-Stoyanova Techncal Unversty of Gabrovo 4 H. Drat str. 500 Gabrovo, ulgara, hone +59 59 Abstract - The knttng ndustry

More information

Fast Retransmission of Real-Time Traffic in HIPERLAN/2 Systems

Fast Retransmission of Real-Time Traffic in HIPERLAN/2 Systems Fast Retransmsson of Real-Tme Traffc n HIPERLAN/ Systems José A Afonso and Joaqum E Neves Department of Industral Electroncs Unversty of Mnho, Campus de Azurém 4800-058 Gumarães, Portugal {joseafonso,

More information

Simulation Based Analysis of FAST TCP using OMNET++

Simulation Based Analysis of FAST TCP using OMNET++ Smulaton Based Analyss of FAST TCP usng OMNET++ Umar ul Hassan 04030038@lums.edu.pk Md Term Report CS678 Topcs n Internet Research Sprng, 2006 Introducton Internet traffc s doublng roughly every 3 months

More information

WIRELESS communication technology has gained widespread

WIRELESS communication technology has gained widespread 616 IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. 4, NO. 6, NOVEMBER/DECEMBER 2005 Dstrbuted Far Schedulng n a Wreless LAN Ntn Vadya, Senor Member, IEEE, Anurag Dugar, Seema Gupta, and Paramvr Bahl, Senor

More information

Equation Based Rate Control and Multiple Connections for Adaptive Video Streaming in Cellular Networks

Equation Based Rate Control and Multiple Connections for Adaptive Video Streaming in Cellular Networks Equaton Based Rate Control and Multple Connectons for Adaptve Vdeo Streang n Cellular Networks A. Mardanan Dehkord and V. Tabataba Vakl Abstract Rate control s an portant ssue for vdeo streang n cellular

More information

Applications and Challenges of the e EDCA Mechanism: An Experimental Study

Applications and Challenges of the e EDCA Mechanism: An Experimental Study Applcatons and Challenges of the 80.e EDCA Mechansm: An Expermental Study Albert Banchs, Arturo Azcorra, Carlos García, and Rubén Cuevas, Unversty Carlos III of Madrd Abstract In ths artcle we conduct

More information

Department of Electrical and Computer Systems Engineering

Department of Electrical and Computer Systems Engineering Department of Electrcal and Computer Systems Engneerng Techncal Report MECSE-5-2004 A Survey of IEEE 802.11 MAC Mechansms for Qualty of Servce (QoS) n Wreless Local Area Networks (WLANs) D. Pham, A. Sekercoglu

More information

Research Article A Comparison Performance Analysis of QoS WLANs: Approaches with Enhanced Features

Research Article A Comparison Performance Analysis of QoS WLANs: Approaches with Enhanced Features Hndaw Publshng Corporaton Advances n Multmeda Volume 007, Artcle ID 387, 3 pages do:055/007/387 Research Artcle A Comparson Performance Analyss of QoS WLANs: Approaches wth Enhanced Features Ioanns Papapanagotou,

More information

A General Model of Wireless Interference

A General Model of Wireless Interference A General Model of Wreless Interference Ll Qu Yn Zhang Feng Wang M Kyung Han Ratul Mahajan Unversty of Texas at Austn Mcrosoft Research Austn, TX 7872, USA Redmond, WA 9852, USA {ll,yzhang,wangf,hanm2}@cs.utexas.edu

More information

An Energy-Aware QoS Routing Protocol for Wireless Sensor Networks

An Energy-Aware QoS Routing Protocol for Wireless Sensor Networks An Energy-Aware QoS Routng Protocol for Wreless Sensor Networks Abstract Recent advances n wreless sensor networks have led to any new routng rotocols secfcally desgned for sensor networks. Alost all of

More information

AN ALGORITHM FOR ODD GRACEFULNESS OF THE TENSOR PRODUCT OF TWO LINE GRAPHS

AN ALGORITHM FOR ODD GRACEFULNESS OF THE TENSOR PRODUCT OF TWO LINE GRAPHS Internatonal ournal on applcatons of graph theory n wreless ad hoc networks and sensor networks (GRAPH-HOC) Vol.3, No., March 0 AN ALGORITHM FOR ODD GRACEFULNESS OF THE TENSOR PRODUCT OF TWO LINE GRAPHS

More information

Merging Results by Using Predicted Retrieval Effectiveness

Merging Results by Using Predicted Retrieval Effectiveness Mergng Results by Usng Predcted Retreval Effectveness Introducton Wen-Cheng Ln and Hsn-Hs Chen Departent of Coputer Scence and Inforaton Engneerng Natonal Tawan Unversty Tape, TAIWAN densln@nlg.cse.ntu.edu.tw;

More information

126 Int. J. Ad Hoc and Ubiquitous Computing, Vol. 1, No. 3, Djamel Djenouri*

126 Int. J. Ad Hoc and Ubiquitous Computing, Vol. 1, No. 3, Djamel Djenouri* 126 Int. J. Ad Hoc and Ubqutous Coputng, Vol. 1, No. 3, 2006 New power-aware routng protocol for oble ad hoc networks Djael Djenour* Basc Software Laboratory, CERIST Center of Research, Algers, Algera

More information

Priority-Based Scheduling Algorithm for Downlink Traffics in IEEE Networks

Priority-Based Scheduling Algorithm for Downlink Traffics in IEEE Networks Prorty-Based Schedulng Algorthm for Downlnk Traffcs n IEEE 80.6 Networks Ja-Mng Lang, Jen-Jee Chen, You-Chun Wang, Yu-Chee Tseng, and Bao-Shuh P. Ln Department of Computer Scence Natonal Chao-Tung Unversty,

More information

Keywords: Cloud Computing, Resource Allocation, Queueing Theory, Performance Measures.

Keywords: Cloud Computing, Resource Allocation, Queueing Theory, Performance Measures. Volume, Issue 9, Setember ISSN: 77 8X Internatonal Journal of Advanced Research n Comuter Scence and Software Engneerng Research Paer Avalable onlne at: wwwjarcssecom Resource Allocaton n Cloud Comutng

More information

A Free-Collision MAC Proposal for Networks

A Free-Collision MAC Proposal for Networks 12th Brazlan Workshop on Real-Tme and Embedded Systems 89 A Free-Collson MAC Proposal for 802.11 Networks Omar Alment 1,2, Gullermo Fredrch 1, Gullermo Reggan 1 1 SITIC Group Unversdad Tecnológca Naconal

More information

Dynamic wetting property investigation of AFM tips in micro/nanoscale

Dynamic wetting property investigation of AFM tips in micro/nanoscale Dynamc wettng property nvestgaton of AFM tps n mcro/nanoscale The wettng propertes of AFM probe tps are of concern n AFM tp related force measurement, fabrcaton, and manpulaton technques, such as dp-pen

More information

PERFORMANCE ANALYSIS IEEE BY TUNING PARAMETERS TO ENHANCEMENT NETWORK THROUGHPUT

PERFORMANCE ANALYSIS IEEE BY TUNING PARAMETERS TO ENHANCEMENT NETWORK THROUGHPUT Internatonal Journal of Inforaton Technology and Bune Manageent www.jt.co PERFORMANCE ANALYSIS IEEE 802.11 BY TUNING PARAMETERS TO ENHANCEMENT NETWORK THROUGHPUT Khall I. Alaf 1,Ekhla A. Alta 2 1 A. Prf.

More information

An Efficient Fault-Tolerant Multi-Bus Data Scheduling Algorithm Based on Replication and Deallocation

An Efficient Fault-Tolerant Multi-Bus Data Scheduling Algorithm Based on Replication and Deallocation BULGARIAN ACADEMY OF SCIENCES CYBERNETICS AND INFORMATION TECHNOLOGIES Volue 16, No Sofa 016 Prnt ISSN: 1311-970; Onlne ISSN: 1314-4081 DOI: 10.1515/cat-016-001 An Effcent Fault-Tolerant Mult-Bus Data

More information

A Semi-Distributed Load Balancing Architecture and Algorithm for Heterogeneous Wireless Networks

A Semi-Distributed Load Balancing Architecture and Algorithm for Heterogeneous Wireless Networks A Sem-Dstrbuted oad Balancng Archtecture and Algorthm for Heterogeneous reless Networks Md. Golam Rabul Ala Choong Seon Hong * Kyung Hee Unversty, Korea rob@networkng.khu.ac.kr, cshong@khu.ac.kr Abstract

More information

Efficient QoS Provisioning at the MAC Layer in Heterogeneous Wireless Sensor Networks

Efficient QoS Provisioning at the MAC Layer in Heterogeneous Wireless Sensor Networks Effcent QoS Provsonng at the MAC Layer n Heterogeneous Wreless Sensor Networks M.Soul a,, A.Bouabdallah a, A.E.Kamal b a UMR CNRS 7253 HeuDaSyC, Unversté de Technologe de Compègne, Compègne Cedex F-625,

More information

Parallelism for Nested Loops with Non-uniform and Flow Dependences

Parallelism for Nested Loops with Non-uniform and Flow Dependences Parallelsm for Nested Loops wth Non-unform and Flow Dependences Sam-Jn Jeong Dept. of Informaton & Communcaton Engneerng, Cheonan Unversty, 5, Anseo-dong, Cheonan, Chungnam, 330-80, Korea. seong@cheonan.ac.kr

More information

THE CONDENSED FUZZY K-NEAREST NEIGHBOR RULE BASED ON SAMPLE FUZZY ENTROPY

THE CONDENSED FUZZY K-NEAREST NEIGHBOR RULE BASED ON SAMPLE FUZZY ENTROPY Proceedngs of the 20 Internatonal Conference on Machne Learnng and Cybernetcs, Guln, 0-3 July, 20 THE CONDENSED FUZZY K-NEAREST NEIGHBOR RULE BASED ON SAMPLE FUZZY ENTROPY JUN-HAI ZHAI, NA LI, MENG-YAO

More information

Dynamic Resource Discovery based on Preference and Movement Pattern Similarity for Large-Scale Social Internet-of-Things

Dynamic Resource Discovery based on Preference and Movement Pattern Similarity for Large-Scale Social Internet-of-Things > REPLACE THIS LINE WITH YOUR PAPER IDENTIFICATION NUMBER (DOUBLE-CLICK HERE TO EDIT) < 1 Dynac Resource Dscovery based on Preference and Moveent Pattern Slarty for Large-Scale Socal Internet-of-Thngs

More information

MobileGrid: Capacity-aware Topology Control in Mobile Ad Hoc Networks

MobileGrid: Capacity-aware Topology Control in Mobile Ad Hoc Networks MobleGrd: Capacty-aware Topology Control n Moble Ad Hoc Networks Jle Lu, Baochun L Department of Electrcal and Computer Engneerng Unversty of Toronto {jenne,bl}@eecg.toronto.edu Abstract Snce wreless moble

More information

A New Approach For the Ranking of Fuzzy Sets With Different Heights

A New Approach For the Ranking of Fuzzy Sets With Different Heights New pproach For the ankng of Fuzzy Sets Wth Dfferent Heghts Pushpnder Sngh School of Mathematcs Computer pplcatons Thapar Unversty, Patala-7 00 Inda pushpndersnl@gmalcom STCT ankng of fuzzy sets plays

More information

Time-based Adaptive Retry for Wireless Video Streaming 1

Time-based Adaptive Retry for Wireless Video Streaming 1 Tme-based Adatve etry for Wreless Vdeo Streamng 1 Me-Hsuan Lu, Peter Steenkste, and Tsuhan Chen Electrcal and Comuter Engneerng Deartment Carnege Mellon Unversty 5000 Forbes Avenue, Pttsburgh PA 15213-3890,

More information

Semi-Markov Process based Model for Performance Analysis of Wireless LANs

Semi-Markov Process based Model for Performance Analysis of Wireless LANs Semi-Markov Process based Model for Performance Analysis of Wireless LANs Murali Krishna Kadiyala, Diti Shikha, Ravi Pendse, and Neeraj Jaggi Deartment of Electrical Engineering and Comuter Science Wichita

More information

AS MOBILE wireless devices became the essential parts

AS MOBILE wireless devices became the essential parts IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, VOL. 55, NO. 3, MAY 2006 865 A Cross-Layer Multhop Data Delvery Protocol Wth Farness Guarantees for Vehcular Networks Gökhan Korkmaz, Student Member, IEEE, Eylem

More information

X- Chart Using ANOM Approach

X- Chart Using ANOM Approach ISSN 1684-8403 Journal of Statstcs Volume 17, 010, pp. 3-3 Abstract X- Chart Usng ANOM Approach Gullapall Chakravarth 1 and Chaluvad Venkateswara Rao Control lmts for ndvdual measurements (X) chart are

More information

TECHNIQUE OF FORMATION HOMOGENEOUS SAMPLE SAME OBJECTS. Muradaliyev A.Z.

TECHNIQUE OF FORMATION HOMOGENEOUS SAMPLE SAME OBJECTS. Muradaliyev A.Z. TECHNIQUE OF FORMATION HOMOGENEOUS SAMPLE SAME OBJECTS Muradalyev AZ Azerbajan Scentfc-Research and Desgn-Prospectng Insttute of Energetc AZ1012, Ave HZardab-94 E-mal:aydn_murad@yahoocom Importance of

More information

Mohammad Hossein Manshaei 1393

Mohammad Hossein Manshaei 1393 Mohammad Hossein Manshaei manshaei@gmail.com 1393 1 An Analytical Approach: Bianchi Model 2 Real Experimentations HoE on IEEE 802.11b Analytical Models Bianchi s Model Simulations ns-2 3 N links with the

More information

A Unified Approach to Survivability of Connection-Oriented Networks

A Unified Approach to Survivability of Connection-Oriented Networks A Unfed Approach to Survvablty of Connecton-Orented Networs Krzysztof Walowa Char of Systes and Coputer Networs, Faculty of Electroncs, Wroclaw Unversty of Technology, Wybrzeze Wyspansego 27, 50-370 Wroclaw,

More information

Predicting Power Grid Component Outage In Response to Extreme Events. S. BAHRAMIRAD ComEd USA

Predicting Power Grid Component Outage In Response to Extreme Events. S. BAHRAMIRAD ComEd USA 1, rue d Artos, F-75008 PARIS CIGRE US Natonal Cottee http : //www.cgre.org 016 Grd of the Future Syposu Predctng Power Grd Coponent Outage In Response to Extree Events R. ESKANDARPOUR, A. KHODAEI Unversty

More information

User Behavior Recognition based on Clustering for the Smart Home

User Behavior Recognition based on Clustering for the Smart Home 3rd WSEAS Internatonal Conference on REMOTE SENSING, Vence, Italy, Noveber 2-23, 2007 52 User Behavor Recognton based on Clusterng for the Sart Hoe WOOYONG CHUNG, JAEHUN LEE, SUKHYUN YUN, SOOHAN KIM* AND

More information

Analysis of the IEEE e EDCA Under Statistical Traffic

Analysis of the IEEE e EDCA Under Statistical Traffic Analysis of the IEEE 82.11e EDCA Under tatistical Traffic Juki Wirawan Tantra, Chuan Heng Foh Centre for Multimedia and Network Technology chool of Computer Engineering Nanyang Technological University

More information

International Conference on Applied Science and Engineering Innovation (ASEI 2015)

International Conference on Applied Science and Engineering Innovation (ASEI 2015) Internatonal Conference on Appled cence and Engneerng Innovaton (AEI 2015) A new MAC protocol of UAN (ABIC-MAC) based on hgh effcency, concurrent and bdrecton LIU Jun 1,a, YANG Xao Lan 2, PENG Lng Feng

More information

Aggregated traffic flow weight controlled hierarchical MAC protocol for wireless sensor networks

Aggregated traffic flow weight controlled hierarchical MAC protocol for wireless sensor networks Ann. Telecommun. (29) 64:75 721 DOI.7/s12243-9-95- Aggregated traffc flow weght controlled herarchcal MAC protocol for wreless sensor networks M. Abdur Razzaque M. Mamun-Or-Rashd Muhammad Mahbub Alam Choong

More information

Virtual Memory. Background. No. 10. Virtual Memory: concept. Logical Memory Space (review) Demand Paging(1) Virtual Memory

Virtual Memory. Background. No. 10. Virtual Memory: concept. Logical Memory Space (review) Demand Paging(1) Virtual Memory Background EECS. Operatng System Fundamentals No. Vrtual Memory Prof. Hu Jang Department of Electrcal Engneerng and Computer Scence, York Unversty Memory-management methods normally requres the entre process

More information

USER CLASS BASED QoS DIFFERENTIATION IN e WLAN

USER CLASS BASED QoS DIFFERENTIATION IN e WLAN USER CLASS BASED QoS DIFFERENTIATION IN 802.11e WLAN Amt Kejrwal, Ratan Guha School of Computer Scence Unversty of Central Florda Orlando, FL-32816 USA E-mal: {kejrwal, guha}@cs.ucf.edu Manak Chatterjee

More information

Multicast Tree Rearrangement to Recover Node Failures. in Overlay Multicast Networks

Multicast Tree Rearrangement to Recover Node Failures. in Overlay Multicast Networks Multcast Tree Rearrangeent to Recover Node Falures n Overlay Multcast Networks Hee K. Cho and Chae Y. Lee Dept. of Industral Engneerng, KAIST, 373-1 Kusung Dong, Taejon, Korea Abstract Overlay ultcast

More information

AADL : about scheduling analysis

AADL : about scheduling analysis AADL : about schedulng analyss Schedulng analyss, what s t? Embedded real-tme crtcal systems have temporal constrants to meet (e.g. deadlne). Many systems are bult wth operatng systems provdng multtaskng

More information

A Game Theory based Contention Window Adjustment for IEEE under Heavy Load

A Game Theory based Contention Window Adjustment for IEEE under Heavy Load 93 Internatonal Journal of Communcaton Networks and Informaton Securty (IJCNIS) Vol. 5, No. 2, August 203 A Game Theory based Contenton Wndow Adjustment for IEEE 802. under Heavy Load Mahdeh Ghazvn, Naser

More information

Integrated Congestion-Control Mechanism in Optical Burst Switching Networks

Integrated Congestion-Control Mechanism in Optical Burst Switching Networks Ths full text paper was peer revewed at the drecton of IEEE Communcatons Socety subect matter experts for publcaton n the IEEE GLOBECOM 2005 proceedngs Integrated Congeston-Control Mechansm n Optcal Burst

More information

Enhanced Markov Chain Model and Throughput Analysis of the Slotted CSMA/CA for IEEE Under Unsaturated Traffic Conditions

Enhanced Markov Chain Model and Throughput Analysis of the Slotted CSMA/CA for IEEE Under Unsaturated Traffic Conditions IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, VOL. 58, NO. 1, JANUARY 2009 473 Enhanced Markov Chan Model and Throughput Analyss of the Slotted CSMA/CA for IEEE 802.15.4 Under Unsaturated Traffc Condtons

More information

Network Coding as a Dynamical System

Network Coding as a Dynamical System Network Codng as a Dynamcal System Narayan B. Mandayam IEEE Dstngushed Lecture (jont work wth Dan Zhang and a Su) Department of Electrcal and Computer Engneerng Rutgers Unversty Outlne. Introducton 2.

More information

Solitary and Traveling Wave Solutions to a Model. of Long Range Diffusion Involving Flux with. Stability Analysis

Solitary and Traveling Wave Solutions to a Model. of Long Range Diffusion Involving Flux with. Stability Analysis Internatonal Mathematcal Forum, Vol. 6,, no. 7, 8 Soltary and Travelng Wave Solutons to a Model of Long Range ffuson Involvng Flux wth Stablty Analyss Manar A. Al-Qudah Math epartment, Rabgh Faculty of

More information

Fusion Performance Model for Distributed Tracking and Classification

Fusion Performance Model for Distributed Tracking and Classification Fuson Performance Model for Dstrbuted rackng and Classfcaton K.C. Chang and Yng Song Dept. of SEOR, School of I&E George Mason Unversty FAIRFAX, VA kchang@gmu.edu Martn Lggns Verdan Systems Dvson, Inc.

More information

EFT: a high throughput routing metric for IEEE s wireless mesh networks

EFT: a high throughput routing metric for IEEE s wireless mesh networks Ann. Telecommun. (2010) 65:247 262 DOI 10.1007/s12243-009-0130-1 EFT: a hgh throughput routng metrc for IEEE 802.11s wreless mesh networks Md. Sharful Islam Muhammad Mahbub Alam Md. Abdul Hamd Choong Seon

More information

A New Scheduling Algorithm for Servers

A New Scheduling Algorithm for Servers A New Schedulng Algorth for Servers Nann Yao, Wenbn Yao, Shaobn Ca, and Jun N College of Coputer Scence and Technology, Harbn Engneerng Unversty, Harbn, Chna {yaonann, yaowenbn, cashaobn, nun}@hrbeu.edu.cn

More information

Impact of the Parameterization of IEEE Medium Access Layer on the Consumption of ZigBee Sensor Motes

Impact of the Parameterization of IEEE Medium Access Layer on the Consumption of ZigBee Sensor Motes UBICOMM 21 : The Fourth Internatonal Conference on Moble Ubqutous Computng, Systems, Servces and Technologes Impact of the Parameterzaton of IEEE 82.15.4 Medum Access Layer on the Consumpton of ZgBee Sensor

More information

An Energy-Efficient MAC Protocol for WSNs: Game-Theoretic Constraint Optimization with Multiple Objectives

An Energy-Efficient MAC Protocol for WSNs: Game-Theoretic Constraint Optimization with Multiple Objectives Wreless Sensor Network, 2009, 1, 358-364 do:10.4236/wsn.2009.14044 Publshed Onlne November 2009 (http://www.scrp.org/ournal/wsn). An Energy-Effcent MAC Protocol for s: Game-Theoretc Constrant Optmzaton

More information

Overview. Basic Setup [9] Motivation and Tasks. Modularization 2008/2/20 IMPROVED COVERAGE CONTROL USING ONLY LOCAL INFORMATION

Overview. Basic Setup [9] Motivation and Tasks. Modularization 2008/2/20 IMPROVED COVERAGE CONTROL USING ONLY LOCAL INFORMATION Overvew 2 IMPROVED COVERAGE CONTROL USING ONLY LOCAL INFORMATION Introducton Mult- Smulator MASIM Theoretcal Work and Smulaton Results Concluson Jay Wagenpfel, Adran Trachte Motvaton and Tasks Basc Setup

More information