Prioritized Access in a Channel-Hopping Network with Spectrum Sensing
|
|
- Ralf Willis
- 5 years ago
- Views:
Transcription
1 Prioritized Access in a Channel-Hopping Network with Spectrum Sensing NSysS, January 9, 206
2 Outline The problem: traffic prioritization in cognitive networks, and ways to achieve it Related work Details of the cognitive MAC protocol with different mechanisms for priority-based traffic differentiation Probabilistic analysis of the protocol, including Modeling the MAC algorithm Collisions with primary source transmissions Packet access delay Performance evaluation of the proposed schemes Conclusions and directions for future work
3 Traffic Prioritization in Cognitive Networks Traffic prioritization often used to achieve the desired QoS Cognitive networks pose additional problems since traffic prioritization interferes with spectrum sensing, esp. when nodes are equipped with a single radio and collaborative spectrum sensing is performed by individual nodes Prioritization in such cases may be achieved by scheduling the order of transmissions per klass Using different service disciplines (K-limited), Adjusting the amount of spectrum sensing, or A combination of previous ones In this paper, we investigate the impact of traffic prioritization on the performance of the transmission tax-based cognitive MAC protocol
4 Related Work A cross-layer approach integrates PHY level spectrum sensing with MAC level QoS-aware packet scheduling (Su and Zhang) but two radios are used and MAC needs a dedicated control channel Hamdi et al. schedule uplink transmissions with QoS provisions Negotiated secondary access with centralized resource allocation scheme (Attar et al) uses game theory to meet the QoS requirements for both primary and secondary users Queueing network model based on M/G/ queues with preemptive resume priority (Wang et al.) analyzes the difference between reactive and proactive spectrum decision model
5 Related Work (2) MAC protocol by Chen et al. integrates spectrum sensing and QoS provisioning whilst making use of nodes with a single radio, but only a small subset of working channels is sensed in each transmission CSMA/CA mechanism was modified to differentiate between real time and non-real time used by Wang et al. using both contention-based and contention-free access A similar approach by Alshamrani et al. reserves some channels for exclusive use by real time users, while others can be shared between real-time and non-real time users A distributed MAC protocol by Cai et al. allocates different sensing periods to different classes of multimedia traffic
6 Network Operation leading beacon data exchange other nodes sense all other channels sensing results bandwidth requests trailing beacon leading beacon time channel x nodes that transmit/receive remain on channel x other nodes sense all other channels all nodes channel y Time structured in superframes, each of which may take place on a different channel Collaborative spectrum sensing: nodes sense, send data to the coordinator which makes spectrum decision Transmissions paid for by performing spectrum sensing Sensing may be suspended for reception If the node returns from sensing with an empty buffer, it undertakes additional sensing duty
7 Traffic Classes A number of traffic classes, from (highest) to m (lowest) Each class has m i nodes, for a total of M = m i= M i nodes Transmissions from nodes of a single priority class are scheduled in a round robin fashion Higher priority traffic will get its transmission slots scheduled before lower priority ones Traffic class i serviced using (gated) K i -limited service A different value of the penalty coefficient k p (i) class i allocated to each traffic
8 Modeling the MAC algorithm Superframe length is s f unit slots and the packet size be k d + slots incl. acknowledgment, resulting in the PGF of b(z) = z k d + Packets arrive at the class i node according to a Poisson process with arrival rate λ i, resulting in offered load of ρ i = λ i b Nodes have buffers of infinite capacity Markov points are moment when node applies for bandwidth. Mass probabilities for k packets in the traffic class i node are q (i) j Q (i) (z) denotes the corresponding PGF for the number of packets queued
9 MAC Operation (2) reservation waiting for allocated time (incl. higher priority classes) beacon/trailer frames Tx from node i to j sensing and reporting, reception last sensing report reservation time A2 A3 A4 A Packet transmission cycle includes waiting for the transmission slot, actual transmission, synchronization with becon, sensing and waiting for reservation. Node transmission time is randomly positioned with respect to the beacon.
10 MAC Operation (3) Table : Periods and PGFs for arrival processes within MAC period period pdf arrival process PGF mass probs. waiting for allocated time d 2 (x) A (i) 2 (z) a(i) 2,k data transfer for target node s(x) A (i) 3 (z) a(i) 3,k sensing period v u (x) A (i) f (z) a (i) f,k total sensing period v(x) A (i) s f A (i) 0 sensing for a single superframe synchronization with the beacon d 4 (x) A (i) 4 (z) a(i),k (z) a(i) 0,k (z) a(i) 4,k single packet transmission b(x) A (i) s (z) a (i) s,k
11 MAC Operation (3a) If each node of class i is allowed to transmit up to K i packets in each transmission cycle, balance equations for each traffic class are q (i) k = q (i) 0 a(i) + x=0,k + Ki (λ i x) k k! q (i) j j=k i j= q (i) j e λ i x d (i) 2 (x) b(x)(j) v u(x) (j) d 4(x)dx x=0 (λ i x) k j+k i (k j + K i )! e λ i x d (i) 2 (x) b(x)(k i ) v u(x) (K i ) d 4(x)dx () where q (i) j denotes mass probability of having j packets upon return from sensing for a node in traffic class i; symbol denotes convolution; b(x) (j) denotes j-fold convolution of packet transmission time; and v u (x) (j) denotes j-fold convolution of single packet penalty time.
12 MAC Operation (4) Probability generating function (PGF) for the number of packets queued at node from class i is Q (i) (z) = j=0 q(i) j z j = Qn(i) (z) Qd (i) (z) ; for tractability we need auxilary PGFs: (z) = A (i) 2 (z)a(i) 4 (z)(a(i) s (z)) j, j =... K i β (i) j (z)a (i) f K i and partial PGF of Q (i) kl (z) = q (i) j z j. j= These two are then used to write denominator and numerator polynomials as Qn (i) (z) = z K i q (i) 0 A(i) (z) + z K i K i j= q (i) j β (i) j (z) β (i) K i (z)q (i) kl (z) (2) Qd (i) (z) = z K i β (i) K i (z) (3)
13 Important Periods the PGF for the number of transmitted packets is Φ (i) (z) = the PGF for the service period is Ki k= q(i) k z k + q (i) 0 k=k i q (i) k z K i (4) Sr (i) (z) = K i k=0 q (i) k z k + k=k i q (i) k z K i (5) The PGF for the number of packets that arrive to the node during transmission time is A (i) 3 (z) = Φ(i) (λ i λ i z). (6)
14 Sensing periods Since sensing period is proportinal to the number of transmitted packets in the busy period the PGF for the time node spent in sensing is V (i) (z) = Φ (i) (z k(i) p s f ) (7) The number of packet arrivals during a single sensing period has the PGF of A (i) (z) = V (i) (λ i λ i z) = a (i),k z k (8) After packet transmission, the node needs to wait for the next trailing beacon in order to learn about the next and backup channels. This waiting time is residual time with respect to a random point in superframe, and its LST has the form R (s) = ( e s s f ) /(ss f ); k=0 the corresponding number of packet arrivals has the PGF of A (i) 4 (z) = R (λ i λ i z).
15 Waiting for service A class i node has to wait until all nodes from higher priority classes, and nodes from the same priority but with lower IDs have been serviced The time between two successive transmission opportunities the class i cycle time has the LST of i C (i) (s) = C (j) (s)(sr (i) (s)) M i (9) For target node waiting time for service is elapsed cycle time: j= C (i) (s) = C (i) (s) sc (i) (0) The number of packet arrivals during that time has the PGF of i 2 (z) = C (j) (λ i λ i z)c (i) (λ i λ i z) () A (i) j= By combining these equations we obtain the probability distribution of the number of class i packets in the buffer upon return from sensing
16 Collisions with primary source transmission Type collision is caused by the onset of primary source activity during an ongoing superframe this component depends only on the dynamics of primary source activity Since higher priority traffic classes transmit earlier in the superframe, they may be expected to experience fewer collisions with primary source transmissions Type 2 collisions are caused by errors in the channel table maintained by the coordinator, which occur when the primary source changes the state between two sensing events Type 2 collsions are significant when the number of sensing nodes is small compared to the number of channels
17 Collisions (2) Piconet uses N frequency channels primary source s onset and OFF periods can be described with (pdf-s) t on (x) and t off. pdf for the channel residual idle time is d(y) = z=y t off (z)dz T off The time from the moment of arrival of the piconet to the channel, until the onset of channel activity is residual (channel) idle time, which has the PDF of D(x) = x d(y)dy. 0 Collision probability due to the onset of primary user activity for traffic class i is the probability that residual idle channel time is shorter than the superframe duration: P (i) c = x=0 (D(x + i j= C (j) + C (i) + S (i) ) D(x))d(x)dx (2) The total collision probability is, then, P (i) Col = P (i) c + p s (3)
18 Packet access delay Under K-limited service, up to K i packets that were in the buffer at the time of the bandwidth request will be serviced. the PGF for the number of packets left after n-th 0 < n K i departing packet is A (i) 2 (z)a(i) s (z) n q (i) k z k L (i) k=n n (z) = (4) We can further derive the PGF for the number of packets left after any departing packet as L (i) (z) = A(i) s (z)a (i) 2 (z) [ Q (i) Φ (i) kl (A (i) s (z)) Q (i) (z) ] ( A(i) s (z) z z n k=n q (i) k ) K i (Q (i) (z) Q (i) kl (z)) we derive the LST of the packet access time as T (i) (s) = L (i) ( s λ i ). (5)
19 Performance evaluation To obtain performance parameters we have solved the system of equations using Maple 6 by Maplesoft, Inc We have considered a piconet with the coordinator and two traffic classes with M = M 2 = 5 nodes each Packet arrival rate was varied simultaneously for both traffic classes between λ = λ 2 = 0.00 and packets per node per slot. Penalty coefficient for higher priority traffic (class ) was fixed at k p () = 0.25 while that for lower priority traffic (class 2) was varied between k p () = The piconet uses N = 30 RF channels with independent primary sources that are characterized by exponentially distributed ON and OFF periods with mean values of 900 and 200 slots, respectively Data packets have a constant size of k d = 0 slots, while acknowledgment packets take a single slot, while the superframe size was set to s f = 00 unit slots
20 Impact of scheduling parameter on class traffic class : num. packets served in transmission cycle lambda (a) Mean number of packets per node served in one active transmission cycle mean access time for class lambda (b) Mean packet access time collision probability for class lambda (c) Probability of collision with the primary user transmission. K =, 2, 3, 4, are denoted diamond, box, circle, cross. K 2 = but figs. are the same for K 2 = 2, 3, 4. Scheduling parameter of class 2 does not affect class. increasing the scheduling parameter K above 2, where performance is very good, shows no significant improvement for class traffic. Higher values of K might be considered only when traffic load increases, or higher sensing penalty is required due to the high number of channels.
21 Class 2 performance average number of packtes served in trasnmission cycle av packet access time Collision probability lambda kp 0.8 (d) Mean number of packets per node served in one trans. cycle, K = K 2 = 2. Tav lambda kp 0.8 (e) Mean packet access time, K = K 2 = Pc lambda kp 0.8 (f) Probability of collision with the primary source, K = K 2 = 2. average number of packtes served in transmission cycle av packet access time Collision probability lambda kp 0.8 (g) Mean number of packets per node served in one trans. cycle, K = K 2 = 3. Tav lambda kp 0.8 (h) Mean packet access time, K = K 2 = Pc lambda kp 0.8 (i) Probability of collision with the primary source, K = K 2 = 3.
22 Class 2 performance average number of packtes served in transmission cycle av packet access time Collision probability lambda kp 0.8 (j) Mean number of packets per node served in one trans. cycle, K = K 2 = 4. Tav lambda kp 0.8 (k) Mean packet access time, K = K 2 = Pc lambda kp 0.8 (l) Probability of collision with the primary source, K = K 2 = 4. the value of the penalty parameter is important for the performance: for k p = and K 2 = 2, the CPAN approaches stability limit marked by large access time. When K 2 is increased to 3, access time has a large drop of about 40%, and further increase of scheduling parameter gives no improvement.
23 Conclusions We have described and evaluated priority differentiation in a cognitive PAN using different scheduling parameters and/or variable sensing penalty We used class ordering and duration of sensing for priority differentiation and K-limited scheduling per class as a fairness mitigation parameter. Our results show that larger scheduling parameters for low traffic classes do not affect higher traffic classes. On the other hand they extend stability region of lower class nodes and still ensure accurate spectrum sensing reports.
Two-Hop Communications in a Cognitive Radio Network
1 Two-Hop Communications in a Cognitive Radio Network Md. Mizanur Rahman, Jelena Mišić and Vojislav B. Mišić Ryerson University, Toronto, ON, Canada Abstract In this paper, we describe an efficient bridging
More informationFig. 1. Superframe structure in IEEE
Analyzing the Performance of GTS Allocation Using Markov Model in IEEE 802.15.4 Alladi Ramesh 1,Dr.P.Sumithabhashini 2 1 Dept.of CSE, PETW, Hyderabad 2 Dept.of ECE, PETW, Hyderabad Abstract-In this paper,
More informationLecture 14: M/G/1 Queueing System with Priority
Lecture 14: M/G/1 Queueing System with Priority Dr. Mohammed Hawa Electrical Engineering Department University of Jordan EE723: Telephony. Priority Queueing Systems Until the moment, we assumed identical
More informationClass-based Packet Scheduling Policies for Bluetooth
Class-based Packet Scheduling Policies for Bluetooth Vishwanath Sinha, D. Raveendra Babu Department of Electrical Engineering Indian Institute of Technology, Kanpur - 08 06, INDIA vsinha@iitk.ernet.in,
More informationMesh Networks
Institute of Computer Science Department of Distributed Systems Prof. Dr.-Ing. P. Tran-Gia Decentralized Bandwidth Management in IEEE 802.16 Mesh Networks www3.informatik.uni-wuerzburg.de Motivation IEEE
More informationMedium Access Control. MAC protocols: design goals, challenges, contention-based and contention-free protocols
Medium Access Control MAC protocols: design goals, challenges, contention-based and contention-free protocols 1 Why do we need MAC protocols? Wireless medium is shared Many nodes may need to access the
More informationPacket multiple access and the Aloha protocol
Packet multiple access and the Aloha protocol Massachusetts Institute of Technology Department of Aeronautics and Astronautics Slide 1 Packet Multiple Access PMA SHARED UPLINK TERMINAL TERMINAL APPL TRANS
More informationChapter -5 QUALITY OF SERVICE (QOS) PLATFORM DESIGN FOR REAL TIME MULTIMEDIA APPLICATIONS
Chapter -5 QUALITY OF SERVICE (QOS) PLATFORM DESIGN FOR REAL TIME MULTIMEDIA APPLICATIONS Chapter 5 QUALITY OF SERVICE (QOS) PLATFORM DESIGN FOR REAL TIME MULTIMEDIA APPLICATIONS 5.1 Introduction For successful
More informationWireless Communications
4. Medium Access Control Sublayer DIN/CTC/UEM 2018 Why do we need MAC for? Medium Access Control (MAC) Shared medium instead of point-to-point link MAC sublayer controls access to shared medium Examples:
More informationPerformance Evaluation of Scheduling Mechanisms for Broadband Networks
Performance Evaluation of Scheduling Mechanisms for Broadband Networks Gayathri Chandrasekaran Master s Thesis Defense The University of Kansas 07.31.2003 Committee: Dr. David W. Petr (Chair) Dr. Joseph
More informationCHAPTER 4 CALL ADMISSION CONTROL BASED ON BANDWIDTH ALLOCATION (CACBA)
92 CHAPTER 4 CALL ADMISSION CONTROL BASED ON BANDWIDTH ALLOCATION (CACBA) 4.1 INTRODUCTION In our previous work, we have presented a cross-layer based routing protocol with a power saving technique (CBRP-PS)
More informationB. Bellalta Mobile Communication Networks
IEEE 802.11e : EDCA B. Bellalta Mobile Communication Networks Scenario STA AP STA Server Server Fixed Network STA Server Upwnlink TCP flows Downlink TCP flows STA AP STA What is the WLAN cell performance
More informationCross Layer QoS Provisioning in Home Networks
Cross Layer QoS Provisioning in Home Networks Jiayuan Wang, Lukasz Brewka, Sarah Ruepp, Lars Dittmann Technical University of Denmark E-mail: jwan@fotonik.dtu.dk Abstract This paper introduces an innovative
More information4.3 IEEE Physical Layer IEEE IEEE b IEEE a IEEE g IEEE n IEEE 802.
4.3 IEEE 802.11 Physical Layer 4.3.1 IEEE 802.11 4.3.2 IEEE 802.11b 4.3.3 IEEE 802.11a 4.3.4 IEEE 802.11g 4.3.5 IEEE 802.11n 4.3.6 IEEE 802.11ac,ad Andreas Könsgen Summer Term 2012 4.3.3 IEEE 802.11a Data
More informationModeling a Beacon Enabled Cluster with Bidirectional Traffic
Modeling a Beacon Enabled 802..4 Cluster with Bidirectional Traffic Jelena Mišić, Shairmina Shafi, and Vojislav B. Mišić Department of Computer Science, University of Manitoba, Winnipeg, Canada Abstract.
More informationLecture 5: Performance Analysis I
CS 6323 : Modeling and Inference Lecture 5: Performance Analysis I Prof. Gregory Provan Department of Computer Science University College Cork Slides: Based on M. Yin (Performability Analysis) Overview
More informationA Quota Transfer Protocol for Upstream Transmissions in Wireless Mesh Networks
A Quota Transfer Protocol for Upstream Transmissions in Wireless Mesh Networks Yen-Bin Lee and Wen-Shyang Hwang Department of Electrical Engineering, National Kaohsiung University of Applied Sciences,
More informationChapter 6 Queuing Disciplines. Networking CS 3470, Section 1
Chapter 6 Queuing Disciplines Networking CS 3470, Section 1 Flow control vs Congestion control Flow control involves preventing senders from overrunning the capacity of the receivers Congestion control
More information878 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 16, NO. 4, AUGUST 2008
878 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 16, NO. 4, AUGUST 2008 Modeling Queueing and Channel Access Delay in Unsaturated IEEE 802.11 Random Access MAC Based Wireless Networks Omesh Tickoo and Biplab
More informationMultiple Access Links and Protocols
Multiple Access Links and Protocols Two types of links : point-to-point PPP for dial-up access point-to-point link between Ethernet switch and host broadcast (shared wire or medium) old-fashioned Ethernet
More informationMODELING OF SMART GRID TRAFFICS USING NON- PREEMPTIVE PRIORITY QUEUES
MODELING OF SMART GRID TRAFFICS USING NON- PREEMPTIVE PRIORITY QUEUES Contents Smart Grid Model and Components. Future Smart grid components. Classification of Smart Grid Traffic. Brief explanation of
More informationMultiple Access Communications. EEE 538, WEEK 11 Dr. Nail Akar Bilkent University Electrical and Electronics Engineering Department
Multiple Access Communications EEE 538, WEEK 11 Dr. Nail Akar Bilkent University Electrical and Electronics Engineering Department 1 Multiple Access Satellite systems, radio networks (WLAN), ethernet segment
More informationTSIN01 Information Networks Lecture 3
TSIN01 Information Networks Lecture 3 Danyo Danev Division of Communication Systems Department of Electrical Engineering Linköping University, Sweden September 10 th, 2018 Danyo Danev TSIN01 Information
More informationMAC in /20/06
MAC in 802.11 2/20/06 MAC Multiple users share common medium. Important issues: Collision detection Delay Fairness Hidden terminals Synchronization Power management Roaming Use 802.11 as an example to
More informationComparison of the Quality of Service (QoS) on the IEEE e and the g Wireless LANs
ENSC 427: COMMUNICATION NETWORKS Comparison of the Quality of Service (QoS) on the IEEE 802.11e and the 802.11g Wireless LANs Spring 2010 Final Report Group 5 Yalda Hakki (yha17@sfu.ca) Rosy Johal (rja2@sfu.ca)
More informationImproving the Data Scheduling Efficiency of the IEEE (d) Mesh Network
Improving the Data Scheduling Efficiency of the IEEE 802.16(d) Mesh Network Shie-Yuan Wang Email: shieyuan@csie.nctu.edu.tw Chih-Che Lin Email: jclin@csie.nctu.edu.tw Ku-Han Fang Email: khfang@csie.nctu.edu.tw
More informationVoIP over wireless networks: a packet scheduling approach to provide QoS using Linux
VoIP over 82.11 wireless networks: a packet scheduling approach to provide QoS using Linux Terrence van Valkenhoef and Mishar Mahboob December 13, 25 Abstract In this work, we propose a layer three scheduler
More informationAn Analytical Model for IEEE with Sleep Mode Based on Time-varying Queue
This full text paper was peer reviewed at the direction of IEEE Communications Society subject matter experts for publication in the IEEE ICC 2 proceedings An Analytical Model for IEEE 82.5.4 with Sleep
More informationSENSOR-MAC CASE STUDY
SENSOR-MAC CASE STUDY Periodic Listen and Sleep Operations One of the S-MAC design objectives is to reduce energy consumption by avoiding idle listening. This is achieved by establishing low-duty-cycle
More informationDepartment of Electrical and Computer Systems Engineering
Department of Electrical and Computer Systems Engineering Technical Report MECSE-6-2006 Medium Access Control (MAC) Schemes for Quality of Service (QoS) provision of Voice over Internet Protocol (VoIP)
More informationRadio Networks. Riccardo Cavallari. Radio Networks Office: 3 rd floor, Main Building
Radio Networks riccardo.cavallari@unibo.it +39 051 20 93180 Office: 3 rd floor, Main Building 1 Wireless Body Area Networks (WBAN) and IEEE 802.15.6 Standard 2 Outline 1. Introduction Definitions and Application
More informationB. Bellalta Mobile Communication Networks
IEEE 802.11e : EDCA B. Bellalta Mobile Communication Networks Scenario STA AP STA Server Server Fixed Network STA Server Upwnlink TCP flows Downlink TCP flows STA AP STA What is the WLAN cell performance
More informationPerformance Analysis of Cell Switching Management Scheme in Wireless Packet Communications
Performance Analysis of Cell Switching Management Scheme in Wireless Packet Communications Jongho Bang Sirin Tekinay Nirwan Ansari New Jersey Center for Wireless Telecommunications Department of Electrical
More informationIntelligent Transportation Systems. Medium Access Control. Prof. Dr. Thomas Strang
Intelligent Transportation Systems Medium Access Control Prof. Dr. Thomas Strang Recap: Wireless Interconnections Networking types + Scalability + Range Delay Individuality Broadcast o Scalability o Range
More informationPERFORMANCE ANALYSIS OF COGNITIVE RADIO NETWORK SPECTRUM ACCESS
International Journal of Industrial Electronics Electrical Engineering, ISSN: 2347-6982 PERFORMANCE ANALYSIS OF COGNITIVE RADIO NETWORK SPECTRUM ACCESS 1 GOURI P. BRAHMANKAR, 2 S. B. MULE 1 M.E. (Student),
More informationstandards like IEEE [37], IEEE [38] or IEEE [39] do not consider
Chapter 5 IEEE 802.15.4 5.1 Introduction Wireless Sensor Network(WSN) is resource constrained network developed specially targeting applications having unattended network for long time. Such a network
More informationPriority Queueing Models for Cognitive Radio Networks with Traffic Differentiation
Priority Queueing Models for Cognitive Radio Networks with Traffic Differentiation Arash Azarfar, Student Member, IEEE, Jean-François Frigon, Senior Member, IEEE, and Brunilde Sansò, Member, IEEE 1 arxiv:1203.6413v3
More informationThe MAC layer in wireless networks
The MAC layer in wireless networks The wireless MAC layer roles Access control to shared channel(s) Natural broadcast of wireless transmission Collision of signal: a time/space problem Who transmits when?
More informationLecture 16: QoS and "
Lecture 16: QoS and 802.11" CSE 123: Computer Networks Alex C. Snoeren HW 4 due now! Lecture 16 Overview" Network-wide QoS IntServ DifServ 802.11 Wireless CSMA/CA Hidden Terminals RTS/CTS CSE 123 Lecture
More informationGUARANTEED END-TO-END LATENCY THROUGH ETHERNET
GUARANTEED END-TO-END LATENCY THROUGH ETHERNET Øyvind Holmeide, OnTime Networks AS, Oslo, Norway oeyvind@ontimenet.com Markus Schmitz, OnTime Networks LLC, Texas, USA markus@ontimenet.com Abstract: Latency
More informationReal-Time Protocol (RTP)
Real-Time Protocol (RTP) Provides standard packet format for real-time application Typically runs over UDP Specifies header fields below Payload Type: 7 bits, providing 128 possible different types of
More informationDistributed Sequential Access MAC Protocol for Single-Hop Wireless Networks
Wireless Pers Commun DOI 10.1007/s11277-013-1142-8 Distributed Sequential Access MAC Protocol for Single-Hop Wireless Networks Ki-seok Lee Cheeha Kim Springer Science+Business Media New York 2013 Abstract
More informationResource allocation in networks. Resource Allocation in Networks. Resource allocation
Resource allocation in networks Resource Allocation in Networks Very much like a resource allocation problem in operating systems How is it different? Resources and jobs are different Resources are buffers
More informationStochastic Processing Networks: What, Why and How? Ruth J. Williams University of California, San Diego
Stochastic Processing Networks: What, Why and How? Ruth J. Williams University of California, San Diego http://www.math.ucsd.edu/~williams 1 OUTLINE! What is a Stochastic Processing Network?! Applications!
More informationOn the Packet Allocation of Multi-Band Aggregation Wireless Networks
1 On the Packet Allocation of Multi-Band Aggregation Wireless Networks Sanay Goyal 1, Tan Le, Amith Chincholi 3, Tariq Elkourdi 4, Alpaslan Demir 1 1 InterDigital Communications, Inc., Melville, NY, USA
More informationKey Performance Aspects of an LTE FDD based Smart Grid Communications Network
Key Performance Aspects of an LTE FDD based Smart Grid Communications Network Presented by: Ran Zhang Supervisors: Prof. Sherman(Xuemin) Shen, Prof. Liang-liang Xie Main Reference Jason Brown, and Jamil
More information048866: Packet Switch Architectures
048866: Packet Switch Architectures Output-Queued Switches Deterministic Queueing Analysis Fairness and Delay Guarantees Dr. Isaac Keslassy Electrical Engineering, Technion isaac@ee.technion.ac.il http://comnet.technion.ac.il/~isaac/
More informationThe MAC layer in wireless networks
The MAC layer in wireless networks The wireless MAC layer roles Access control to shared channel(s) Natural broadcast of wireless transmission Collision of signal: a /space problem Who transmits when?
More informationSimulation-Based Performance Comparison of Queueing Disciplines for Differentiated Services Using OPNET
Simulation-Based Performance Comparison of Queueing Disciplines for Differentiated Services Using OPNET Hafiz M. Asif and El-Sayed M. El-Alfy College of Computer Science and Engineering King Fahd University
More informationProtocols for Multiaccess Networks
Protocols for Multiaccess Networks Hosts broadcast packets When a collision occurs, all transmitted packets are lost Lost packets have to be retransmitted => Need Multiaccess Protocol Model - Slotted Aloha
More informationResearch Article Optimization of Access Threshold for Cognitive Radio Networks with Prioritized Secondary Users
Mobile Information Systems Volume 2016, Article ID 3297938, 8 pages http://dx.doi.org/10.1155/2016/3297938 Research Article Optimization of Access Threshold for Cognitive Radio Networks with Prioritized
More informationPrioritization scheme for QoS in IEEE e WLAN
Prioritization scheme for QoS in IEEE 802.11e WLAN Yakubu Suleiman Baguda a, Norsheila Fisal b a,b Department of Telematics & Communication Engineering, Faculty of Electrical Engineering Universiti Teknologi
More informationAbsolute QoS Differentiation in Optical Burst-Switched Networks
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 22, NO. 9, NOVEMBER 2004 1781 Absolute QoS Differentiation in Optical Burst-Switched Networks Qiong Zhang, Student Member, IEEE, Vinod M. Vokkarane,
More informationQuality of Service (QoS)
Quality of Service (QoS) The Internet was originally designed for best-effort service without guarantee of predictable performance. Best-effort service is often sufficient for a traffic that is not sensitive
More informationThis document is downloaded from DR-NTU, Nanyang Technological University Library, Singapore.
This document is downloaded from DR-NTU, Nanyang Technological University Library, Singapore. Title Optimal channel access management with QoS support for cognitive vehicular networks Author(s) Niyato,
More informationAdaptive Mechanism for Aggregation with fragments retransmission in high-speed wireless networks
Int. J. Open Problems Compt. Math., Vol. 4, No. 3, September 2011 ISSN 1998-6262; Copyright ICSRS Publication, 2011 www.i-csrs.org Adaptive Mechanism for Aggregation with fragments retransmission in high-speed
More informationDDSS: Dynamic Dedicated Servers Scheduling for Multi Priority Level Classes in Cloud Computing
DDSS: Dynamic Dedicated Servers Scheduling for Multi Priority Level Classes in Cloud Computing Husnu Saner Narman Md. Shohrab Hossain Mohammed Atiquzzaman School of Computer Science University of Oklahoma,
More informationReal-Time Medical Data over WLANs
2015 International Conference on Computational Science and Computational Intelligence Real-Time Medical Data over WLANs Constantine Coutras Department of Computer Science Montclair State University Montclair,
More informationBluetooth Time Division Duplex - Exact Analysis as a Polling System
CCIT Report 414, Technion Dept. of Electrical Engineering, Feb. 003. Bluetooth Time Division Duplex - Exact Analysis as a Polling System Gil Zussman 1, Adrian Segall 1, and Uri Yechiali 1 Department of
More informationTHE number of mobile devices and the demand for multimedia
An Energy Efficient MAC Protocol for Fully Connected Wireless Ad Hoc Networks Kamal Rahimi Malekshan, Student member, IEEE, Weihua Zhuang, Fellow, IEEE and Yves Lostanlen, Senior member, IEEE arxiv:47.6266v
More informationIEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 14, NO. 10, OCTOBER Aimin Tang and Xudong Wang, Senior Member, IEEE
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 14, NO. 10, OCTOBER 2015 5871 A-Duplex: Medium Access Control for Efficient Coexistence Between Full-Duplex and Half-Duplex Communications Aimin Tang
More informationMAC. Fall Data Communications II 1
802.11 MAC Fall 2005 91.564 Data Communications II 1 RF Quality (ACK) Fall 2005 91.564 Data Communications II 2 Hidden Terminal (RTS/CTS) Fall 2005 91.564 Data Communications II 3 MAC Coordination Functions
More informationAdvanced Computer Networks WLAN
Advanced Computer Networks 263 3501 00 WLAN Patrick Stuedi Spring Semester 2014 1 Oriana Riva, Department of Computer Science ETH Zürich Last week Outlook Medium Access COPE Short Range Wireless Networks:
More informationProviding QoS to Real and Non-Real Time Traffic in IEEE networks
Providing QoS to Real and Non-Real Time Traffic in IEEE 802.16 networks Joint work with my student Harish Shetiya Dept. of Electrical Communication Engg., Indian Institute of Science, Bangalore Overview
More informationResource Allocation in Contention-Based WiFi Networks
The 2011 Santa Barbara Control Workshop Resource Allocation in Contention-Based WiFi Networks Laura Giarré Universita di Palermo (giarre@unipa.it) Joint works with I. Tinnirello (Università di Palermo),
More informationModeling and Analysis of MAC Protocol for LTE-U Co-existing with Wi-Fi
Modeling and Analysis of MAC Protocol for LTE-U Co-existing with Wi-Fi Ran Zhang Miao Wang Lin X. Cai Xuemin (Sherman) Shen Liang-Liang Xie Yu Cheng Abstract In this paper a new MAC protocol for LTE over
More informationA Low Latency Data Transmission Scheme for Smart Grid Condition Monitoring Applications 28/05/2012
1 A Low Latency Data Transmission Scheme for Smart Grid Condition Monitoring Applications I R F A N S. A L - A N B A G I, M E L I K E E R O L - K A N T A R C I, H U S S E I N T. M O U F T A H U N I V E
More informationLocal Area Networks NETW 901
Local Area Networks NETW 901 Lecture 4 Wireless LAN Course Instructor: Dr.-Ing. Maggie Mashaly maggie.ezzat@guc.edu.eg C3.220 1 Contents What is a Wireless LAN? Applications and Requirements Transmission
More informationProject: IEEE P Working Group for Wireless Personal Area Networks (WPANs)
Project: IEEE P802.15 Working Group for Wireless Personal Area Networks (WPANs) Title: [Simulation Results for Final Proposal 15-3-0380] Date Submitted: [Aug 2013] Source: [Hongkun Li, Zhuo Chen, Chonggang
More informationBasics (cont.) Characteristics of data communication technologies OSI-Model
48 Basics (cont.) Characteristics of data communication technologies OSI-Model Topologies Packet switching / Circuit switching Medium Access Control (MAC) mechanisms Coding Quality of Service (QoS) 49
More informationNetwork Support for Multimedia
Network Support for Multimedia Daniel Zappala CS 460 Computer Networking Brigham Young University Network Support for Multimedia 2/33 make the best of best effort use application-level techniques use CDNs
More informationIntroduction to Queuing Systems
Introduction to Queuing Systems Queuing Theory View network as collections of queues FIFO data-structures Queuing theory provides probabilistic analysis of these queues Examples: Average length Probability
More informationSpectrum Management in Cognitive Radio Networks
Spectrum Management in Cognitive Radio Networks Jul 14,2010 Instructor: professor m.j omidi 1/60 BY : MOZHDEH MOLA & ZAHRA ALAVIKIA Contents Overview: Cognitive Radio Spectrum Sensing Spectrum Decision
More informationWireless Networks (CSC-7602) Lecture 8 (15 Oct. 2007)
Wireless Networks (CSC-7602) Lecture 8 (15 Oct. 2007) Seung-Jong Park (Jay) http://www.csc.lsu.edu/~sjpark 1 Today Wireline Fair Schedulling Why? Ideal algorithm Practical algorithms Wireless Fair Scheduling
More informationQueuing. Congestion Control and Resource Allocation. Resource Allocation Evaluation Criteria. Resource allocation Drop disciplines Queuing disciplines
Resource allocation Drop disciplines Queuing disciplines Queuing 1 Congestion Control and Resource Allocation Handle congestion if and when it happens TCP Congestion Control Allocate resources to avoid
More informationA CDCA-TRACE MAC PROTOCOL FRAMEWORK IN MOBILE AD-HOC NETWORK
Research Manuscript Title A CDCA-TRACE MAC PROTOCOL FRAMEWORK IN MOBILE AD-HOC NETWORK Jaichitra.I, Aishwarya.K, P.G Student, Asst.Professor, CSE Department, Arulmigu Meenakshi Amman College of Engineering,
More informationCom S 611 Spring Semester 2007 Discrete Algorithms for Mobile and Wireless Networks. Lecture 3: Tuesday, 23rd January 2007
Com S 611 Spring Semester 2007 Discrete Algorithms for Mobile and Wireless Networks Lecture 3: Tuesday, 23rd January 2007 Instructor: Soma Chaudhuri Scribe: Abhishek Sinha 1 Introduction The lecture can
More informationDelay Analysis of IEEE Wireless Metropolitan Area Network
Delay Analysis of IEEE 802.16 Wireless Metropolitan Area Network Zsolt Saffer Technical University of Budapest 1521 Budapest Hungary safferzs@hit.bme.hu Sergey Andreev State University of Aerospace Instrumentation
More informationPractical Lazy Scheduling in Wireless Sensor Networks. Ramana Rao Kompella and Alex C. Snoeren
Practical Lazy Scheduling in Wireless Sensor Networks Ramana Rao Kompella and Alex C. Snoeren Distributed Rate Adaptation Problem: In wireless networks (e.g., sensor nets, 802.11) radios consume significant
More informationChapter 6 Medium Access Control Protocols and Local Area Networks
Chapter 6 Medium Access Control Protocols and Local Area Networks Part I: Medium Access Control Part II: Local Area Networks CSE 3213, Winter 2010 Instructor: Foroohar Foroozan Chapter Overview Broadcast
More informationP B 1-P B ARRIVE ATTEMPT RETRY 2 1-(1-P RF ) 2 1-(1-P RF ) 3 1-(1-P RF ) 4. Figure 1: The state transition diagram for FBR.
1 Analytical Model In this section, we will propose an analytical model to investigate the MAC delay of FBR. For simplicity, a frame length is normalized as a time unit (slot). 1.1 State Transition of
More informationA Comparative Study of Different Queuing Scheduling Disciplines
RESEARCH ARTICLE OPEN ACCESS A Comparative Study of Different Queuing Scheduling Disciplines Sarhan M. Musa, Mahamadou Tembely, Matthew N. O. Sadiku, And Pamela Obliomon Roy G. Perry College of Engineering,
More informationScheduling Algorithms to Minimize Session Delays
Scheduling Algorithms to Minimize Session Delays Nandita Dukkipati and David Gutierrez A Motivation I INTRODUCTION TCP flows constitute the majority of the traffic volume in the Internet today Most of
More informationDistributed Localized Interference Avoidance for Dynamic Frequency Hopping ad hoc Networks
Distributed Localized Interference Avoidance for Dynamic Frequency Hopping ad hoc Networks Sebastian Koslowski, Jens P. Elsner, Friedrich K. Jondral; Karlsruhe Institute of Technology (KIT) {koslowski,
More informationImpact of Packet Arrivals on Wi-Fi and Cellular System Sharing Unlicensed Spectrum
1 Impact of Packet Arrivals on Wi-Fi and Cellular System Sharing Unlicensed Spectrum Yujae Song, Ki Won Sung, and Youngnam Han Abstract We investigate the coexistence performance of Wi- Fi and cellular
More informationLecture 23 Overview. Last Lecture. This Lecture. Next Lecture ADSL, ATM. Wireless Technologies (1) Source: chapters 6.2, 15
Lecture 23 Overview Last Lecture ADSL, ATM This Lecture Wireless Technologies (1) Wireless LAN, CSMA/CA, Bluetooth Source: chapters 6.2, 15 Next Lecture Wireless Technologies (2) Source: chapter 16, 19.3
More informationImplementation of WiFiRe PHY Sectorization in OPNET
P Sreedhar Reddy Roll No. 06305024 24th July, 2007 Under the Guidance Of Prof. Sridhar Iyer Department Of Computer Science and Engineering Indian Institute Of Technology, Bombay Outline WiFiRe overview.
More informationWiMedia Media Access Control (MAC) Dan Froelich
WiMedia Media Access Control (MAC) Dan Froelich Intel Corporation Content also provided by: Kris Flemming, Intel Corporation Agenda Key Messages Relationship of Certified Wireless USB and other WiMedia
More informationTwo-Tier WBAN/WLAN Healthcare Networks; Priority Considerations
Two-Tier WBAN/WLAN Healthcare Networks; Priority Considerations Saeed Rashwand Department of Computer Science University of Manitoba Jelena Mišić Department of Computer Science Ryerson University Abstract
More informationCHAPTER 5. QoS RPOVISIONING THROUGH EFFECTIVE RESOURCE ALLOCATION
CHAPTER 5 QoS RPOVISIONING THROUGH EFFECTIVE RESOURCE ALLOCATION 5.1 PRINCIPLE OF RRM The success of mobile communication systems and the need for better QoS, has led to the development of 3G mobile systems
More informationA Novel Framework for Radio Resource Management in IEEE Wireless LANs
Dublin Institute of Technology ARROW@DIT Conference papers Communications Network Research Institute 2005-01-01 A Novel Framework for Radio Resource Management in IEEE 802.11 Wireless LANs Mark Davis Dublin
More informationOutline. Application examples
Outline Application examples Google page rank algorithm Aloha protocol Virtual circuit with window flow control Store-and-Forward packet-switched network Interactive system with infinite servers 1 Example1:
More informationChapter 3 MEDIA ACCESS CONTROL
Chapter 3 MEDIA ACCESS CONTROL Distributed Computing Group Mobile Computing Winter 2005 / 2006 Overview Motivation SDMA, FDMA, TDMA Aloha Adaptive Aloha Backoff protocols Reservation schemes Polling Distributed
More informationMAC protocols for ad hoc networks
MAC protocols for ad hoc networks Lecturer: Dmitri A. Moltchanov E-mail: moltchan@cs.tut.fi http://www.cs.tut.fi/kurssit/tlt-2756/ OUTLINE: Problems for MAC to deal with; Design goals; Classification of
More informationWEB OBJECT SIZE SATISFYING MEAN WAITING TIME IN MULTIPLE ACCESS ENVIRONMENT
International Journal of Computer Networks & Communications (IJCNC) Vol.6, No.4, July 014 WEB OBJECT SIZE SATISFYING MEAN WAITING TIME IN MULTIPLE ACCESS ENVIRONMENT Y. J. Lee Department of Technology
More informationPON Functional Requirements: Services and Performance
PON Functional Requirements: Services and Performance Dolors Sala Ajay Gummalla {dolors,ajay}@broadcom.com July 10-12, 2001 Ethernet in the First Mile Study Group 1 July 2001 Objective Outline the PON-specific
More informationFairness in the IEEE network. Shun Y. Cheung
Fairness in the IEEE 802.11 network Shun Y. Cheung Simple FIFO queueing High data rate flow Output queue (infinite size) Low data rate flow Packets from low data rate flow experience excessive queueing
More informationQueuing Systems. 1 Lecturer: Hawraa Sh. Modeling & Simulation- Lecture -4-21/10/2012
Queuing Systems Queuing theory establishes a powerful tool in modeling and performance analysis of many complex systems, such as computer networks, telecommunication systems, call centers, manufacturing
More informationOptimal Resource Allocation for Pervasive Health Monitoring Systems with Body Sensor Network
Haili Dong Optimal Resource Allocation for Pervasive Health Monitoring Systems with Body Sensor Network Yifeng He, Wenwu Zhu, Ling Guan IEEE TMC 2011 CS 6204 1 Outline Introduction Related Work Problem
More informationWorst-case Ethernet Network Latency for Shaped Sources
Worst-case Ethernet Network Latency for Shaped Sources Max Azarov, SMSC 7th October 2005 Contents For 802.3 ResE study group 1 Worst-case latency theorem 1 1.1 Assumptions.............................
More information