Prioritized Access in a Channel-Hopping Network with Spectrum Sensing

Size: px
Start display at page:

Download "Prioritized Access in a Channel-Hopping Network with Spectrum Sensing"

Transcription

1 Prioritized Access in a Channel-Hopping Network with Spectrum Sensing NSysS, January 9, 206

2 Outline The problem: traffic prioritization in cognitive networks, and ways to achieve it Related work Details of the cognitive MAC protocol with different mechanisms for priority-based traffic differentiation Probabilistic analysis of the protocol, including Modeling the MAC algorithm Collisions with primary source transmissions Packet access delay Performance evaluation of the proposed schemes Conclusions and directions for future work

3 Traffic Prioritization in Cognitive Networks Traffic prioritization often used to achieve the desired QoS Cognitive networks pose additional problems since traffic prioritization interferes with spectrum sensing, esp. when nodes are equipped with a single radio and collaborative spectrum sensing is performed by individual nodes Prioritization in such cases may be achieved by scheduling the order of transmissions per klass Using different service disciplines (K-limited), Adjusting the amount of spectrum sensing, or A combination of previous ones In this paper, we investigate the impact of traffic prioritization on the performance of the transmission tax-based cognitive MAC protocol

4 Related Work A cross-layer approach integrates PHY level spectrum sensing with MAC level QoS-aware packet scheduling (Su and Zhang) but two radios are used and MAC needs a dedicated control channel Hamdi et al. schedule uplink transmissions with QoS provisions Negotiated secondary access with centralized resource allocation scheme (Attar et al) uses game theory to meet the QoS requirements for both primary and secondary users Queueing network model based on M/G/ queues with preemptive resume priority (Wang et al.) analyzes the difference between reactive and proactive spectrum decision model

5 Related Work (2) MAC protocol by Chen et al. integrates spectrum sensing and QoS provisioning whilst making use of nodes with a single radio, but only a small subset of working channels is sensed in each transmission CSMA/CA mechanism was modified to differentiate between real time and non-real time used by Wang et al. using both contention-based and contention-free access A similar approach by Alshamrani et al. reserves some channels for exclusive use by real time users, while others can be shared between real-time and non-real time users A distributed MAC protocol by Cai et al. allocates different sensing periods to different classes of multimedia traffic

6 Network Operation leading beacon data exchange other nodes sense all other channels sensing results bandwidth requests trailing beacon leading beacon time channel x nodes that transmit/receive remain on channel x other nodes sense all other channels all nodes channel y Time structured in superframes, each of which may take place on a different channel Collaborative spectrum sensing: nodes sense, send data to the coordinator which makes spectrum decision Transmissions paid for by performing spectrum sensing Sensing may be suspended for reception If the node returns from sensing with an empty buffer, it undertakes additional sensing duty

7 Traffic Classes A number of traffic classes, from (highest) to m (lowest) Each class has m i nodes, for a total of M = m i= M i nodes Transmissions from nodes of a single priority class are scheduled in a round robin fashion Higher priority traffic will get its transmission slots scheduled before lower priority ones Traffic class i serviced using (gated) K i -limited service A different value of the penalty coefficient k p (i) class i allocated to each traffic

8 Modeling the MAC algorithm Superframe length is s f unit slots and the packet size be k d + slots incl. acknowledgment, resulting in the PGF of b(z) = z k d + Packets arrive at the class i node according to a Poisson process with arrival rate λ i, resulting in offered load of ρ i = λ i b Nodes have buffers of infinite capacity Markov points are moment when node applies for bandwidth. Mass probabilities for k packets in the traffic class i node are q (i) j Q (i) (z) denotes the corresponding PGF for the number of packets queued

9 MAC Operation (2) reservation waiting for allocated time (incl. higher priority classes) beacon/trailer frames Tx from node i to j sensing and reporting, reception last sensing report reservation time A2 A3 A4 A Packet transmission cycle includes waiting for the transmission slot, actual transmission, synchronization with becon, sensing and waiting for reservation. Node transmission time is randomly positioned with respect to the beacon.

10 MAC Operation (3) Table : Periods and PGFs for arrival processes within MAC period period pdf arrival process PGF mass probs. waiting for allocated time d 2 (x) A (i) 2 (z) a(i) 2,k data transfer for target node s(x) A (i) 3 (z) a(i) 3,k sensing period v u (x) A (i) f (z) a (i) f,k total sensing period v(x) A (i) s f A (i) 0 sensing for a single superframe synchronization with the beacon d 4 (x) A (i) 4 (z) a(i),k (z) a(i) 0,k (z) a(i) 4,k single packet transmission b(x) A (i) s (z) a (i) s,k

11 MAC Operation (3a) If each node of class i is allowed to transmit up to K i packets in each transmission cycle, balance equations for each traffic class are q (i) k = q (i) 0 a(i) + x=0,k + Ki (λ i x) k k! q (i) j j=k i j= q (i) j e λ i x d (i) 2 (x) b(x)(j) v u(x) (j) d 4(x)dx x=0 (λ i x) k j+k i (k j + K i )! e λ i x d (i) 2 (x) b(x)(k i ) v u(x) (K i ) d 4(x)dx () where q (i) j denotes mass probability of having j packets upon return from sensing for a node in traffic class i; symbol denotes convolution; b(x) (j) denotes j-fold convolution of packet transmission time; and v u (x) (j) denotes j-fold convolution of single packet penalty time.

12 MAC Operation (4) Probability generating function (PGF) for the number of packets queued at node from class i is Q (i) (z) = j=0 q(i) j z j = Qn(i) (z) Qd (i) (z) ; for tractability we need auxilary PGFs: (z) = A (i) 2 (z)a(i) 4 (z)(a(i) s (z)) j, j =... K i β (i) j (z)a (i) f K i and partial PGF of Q (i) kl (z) = q (i) j z j. j= These two are then used to write denominator and numerator polynomials as Qn (i) (z) = z K i q (i) 0 A(i) (z) + z K i K i j= q (i) j β (i) j (z) β (i) K i (z)q (i) kl (z) (2) Qd (i) (z) = z K i β (i) K i (z) (3)

13 Important Periods the PGF for the number of transmitted packets is Φ (i) (z) = the PGF for the service period is Ki k= q(i) k z k + q (i) 0 k=k i q (i) k z K i (4) Sr (i) (z) = K i k=0 q (i) k z k + k=k i q (i) k z K i (5) The PGF for the number of packets that arrive to the node during transmission time is A (i) 3 (z) = Φ(i) (λ i λ i z). (6)

14 Sensing periods Since sensing period is proportinal to the number of transmitted packets in the busy period the PGF for the time node spent in sensing is V (i) (z) = Φ (i) (z k(i) p s f ) (7) The number of packet arrivals during a single sensing period has the PGF of A (i) (z) = V (i) (λ i λ i z) = a (i),k z k (8) After packet transmission, the node needs to wait for the next trailing beacon in order to learn about the next and backup channels. This waiting time is residual time with respect to a random point in superframe, and its LST has the form R (s) = ( e s s f ) /(ss f ); k=0 the corresponding number of packet arrivals has the PGF of A (i) 4 (z) = R (λ i λ i z).

15 Waiting for service A class i node has to wait until all nodes from higher priority classes, and nodes from the same priority but with lower IDs have been serviced The time between two successive transmission opportunities the class i cycle time has the LST of i C (i) (s) = C (j) (s)(sr (i) (s)) M i (9) For target node waiting time for service is elapsed cycle time: j= C (i) (s) = C (i) (s) sc (i) (0) The number of packet arrivals during that time has the PGF of i 2 (z) = C (j) (λ i λ i z)c (i) (λ i λ i z) () A (i) j= By combining these equations we obtain the probability distribution of the number of class i packets in the buffer upon return from sensing

16 Collisions with primary source transmission Type collision is caused by the onset of primary source activity during an ongoing superframe this component depends only on the dynamics of primary source activity Since higher priority traffic classes transmit earlier in the superframe, they may be expected to experience fewer collisions with primary source transmissions Type 2 collisions are caused by errors in the channel table maintained by the coordinator, which occur when the primary source changes the state between two sensing events Type 2 collsions are significant when the number of sensing nodes is small compared to the number of channels

17 Collisions (2) Piconet uses N frequency channels primary source s onset and OFF periods can be described with (pdf-s) t on (x) and t off. pdf for the channel residual idle time is d(y) = z=y t off (z)dz T off The time from the moment of arrival of the piconet to the channel, until the onset of channel activity is residual (channel) idle time, which has the PDF of D(x) = x d(y)dy. 0 Collision probability due to the onset of primary user activity for traffic class i is the probability that residual idle channel time is shorter than the superframe duration: P (i) c = x=0 (D(x + i j= C (j) + C (i) + S (i) ) D(x))d(x)dx (2) The total collision probability is, then, P (i) Col = P (i) c + p s (3)

18 Packet access delay Under K-limited service, up to K i packets that were in the buffer at the time of the bandwidth request will be serviced. the PGF for the number of packets left after n-th 0 < n K i departing packet is A (i) 2 (z)a(i) s (z) n q (i) k z k L (i) k=n n (z) = (4) We can further derive the PGF for the number of packets left after any departing packet as L (i) (z) = A(i) s (z)a (i) 2 (z) [ Q (i) Φ (i) kl (A (i) s (z)) Q (i) (z) ] ( A(i) s (z) z z n k=n q (i) k ) K i (Q (i) (z) Q (i) kl (z)) we derive the LST of the packet access time as T (i) (s) = L (i) ( s λ i ). (5)

19 Performance evaluation To obtain performance parameters we have solved the system of equations using Maple 6 by Maplesoft, Inc We have considered a piconet with the coordinator and two traffic classes with M = M 2 = 5 nodes each Packet arrival rate was varied simultaneously for both traffic classes between λ = λ 2 = 0.00 and packets per node per slot. Penalty coefficient for higher priority traffic (class ) was fixed at k p () = 0.25 while that for lower priority traffic (class 2) was varied between k p () = The piconet uses N = 30 RF channels with independent primary sources that are characterized by exponentially distributed ON and OFF periods with mean values of 900 and 200 slots, respectively Data packets have a constant size of k d = 0 slots, while acknowledgment packets take a single slot, while the superframe size was set to s f = 00 unit slots

20 Impact of scheduling parameter on class traffic class : num. packets served in transmission cycle lambda (a) Mean number of packets per node served in one active transmission cycle mean access time for class lambda (b) Mean packet access time collision probability for class lambda (c) Probability of collision with the primary user transmission. K =, 2, 3, 4, are denoted diamond, box, circle, cross. K 2 = but figs. are the same for K 2 = 2, 3, 4. Scheduling parameter of class 2 does not affect class. increasing the scheduling parameter K above 2, where performance is very good, shows no significant improvement for class traffic. Higher values of K might be considered only when traffic load increases, or higher sensing penalty is required due to the high number of channels.

21 Class 2 performance average number of packtes served in trasnmission cycle av packet access time Collision probability lambda kp 0.8 (d) Mean number of packets per node served in one trans. cycle, K = K 2 = 2. Tav lambda kp 0.8 (e) Mean packet access time, K = K 2 = Pc lambda kp 0.8 (f) Probability of collision with the primary source, K = K 2 = 2. average number of packtes served in transmission cycle av packet access time Collision probability lambda kp 0.8 (g) Mean number of packets per node served in one trans. cycle, K = K 2 = 3. Tav lambda kp 0.8 (h) Mean packet access time, K = K 2 = Pc lambda kp 0.8 (i) Probability of collision with the primary source, K = K 2 = 3.

22 Class 2 performance average number of packtes served in transmission cycle av packet access time Collision probability lambda kp 0.8 (j) Mean number of packets per node served in one trans. cycle, K = K 2 = 4. Tav lambda kp 0.8 (k) Mean packet access time, K = K 2 = Pc lambda kp 0.8 (l) Probability of collision with the primary source, K = K 2 = 4. the value of the penalty parameter is important for the performance: for k p = and K 2 = 2, the CPAN approaches stability limit marked by large access time. When K 2 is increased to 3, access time has a large drop of about 40%, and further increase of scheduling parameter gives no improvement.

23 Conclusions We have described and evaluated priority differentiation in a cognitive PAN using different scheduling parameters and/or variable sensing penalty We used class ordering and duration of sensing for priority differentiation and K-limited scheduling per class as a fairness mitigation parameter. Our results show that larger scheduling parameters for low traffic classes do not affect higher traffic classes. On the other hand they extend stability region of lower class nodes and still ensure accurate spectrum sensing reports.

Two-Hop Communications in a Cognitive Radio Network

Two-Hop Communications in a Cognitive Radio Network 1 Two-Hop Communications in a Cognitive Radio Network Md. Mizanur Rahman, Jelena Mišić and Vojislav B. Mišić Ryerson University, Toronto, ON, Canada Abstract In this paper, we describe an efficient bridging

More information

Fig. 1. Superframe structure in IEEE

Fig. 1. Superframe structure in IEEE Analyzing the Performance of GTS Allocation Using Markov Model in IEEE 802.15.4 Alladi Ramesh 1,Dr.P.Sumithabhashini 2 1 Dept.of CSE, PETW, Hyderabad 2 Dept.of ECE, PETW, Hyderabad Abstract-In this paper,

More information

Lecture 14: M/G/1 Queueing System with Priority

Lecture 14: M/G/1 Queueing System with Priority Lecture 14: M/G/1 Queueing System with Priority Dr. Mohammed Hawa Electrical Engineering Department University of Jordan EE723: Telephony. Priority Queueing Systems Until the moment, we assumed identical

More information

Class-based Packet Scheduling Policies for Bluetooth

Class-based Packet Scheduling Policies for Bluetooth Class-based Packet Scheduling Policies for Bluetooth Vishwanath Sinha, D. Raveendra Babu Department of Electrical Engineering Indian Institute of Technology, Kanpur - 08 06, INDIA vsinha@iitk.ernet.in,

More information

Mesh Networks

Mesh Networks Institute of Computer Science Department of Distributed Systems Prof. Dr.-Ing. P. Tran-Gia Decentralized Bandwidth Management in IEEE 802.16 Mesh Networks www3.informatik.uni-wuerzburg.de Motivation IEEE

More information

Medium Access Control. MAC protocols: design goals, challenges, contention-based and contention-free protocols

Medium Access Control. MAC protocols: design goals, challenges, contention-based and contention-free protocols Medium Access Control MAC protocols: design goals, challenges, contention-based and contention-free protocols 1 Why do we need MAC protocols? Wireless medium is shared Many nodes may need to access the

More information

Packet multiple access and the Aloha protocol

Packet multiple access and the Aloha protocol Packet multiple access and the Aloha protocol Massachusetts Institute of Technology Department of Aeronautics and Astronautics Slide 1 Packet Multiple Access PMA SHARED UPLINK TERMINAL TERMINAL APPL TRANS

More information

Chapter -5 QUALITY OF SERVICE (QOS) PLATFORM DESIGN FOR REAL TIME MULTIMEDIA APPLICATIONS

Chapter -5 QUALITY OF SERVICE (QOS) PLATFORM DESIGN FOR REAL TIME MULTIMEDIA APPLICATIONS Chapter -5 QUALITY OF SERVICE (QOS) PLATFORM DESIGN FOR REAL TIME MULTIMEDIA APPLICATIONS Chapter 5 QUALITY OF SERVICE (QOS) PLATFORM DESIGN FOR REAL TIME MULTIMEDIA APPLICATIONS 5.1 Introduction For successful

More information

Wireless Communications

Wireless Communications 4. Medium Access Control Sublayer DIN/CTC/UEM 2018 Why do we need MAC for? Medium Access Control (MAC) Shared medium instead of point-to-point link MAC sublayer controls access to shared medium Examples:

More information

Performance Evaluation of Scheduling Mechanisms for Broadband Networks

Performance Evaluation of Scheduling Mechanisms for Broadband Networks Performance Evaluation of Scheduling Mechanisms for Broadband Networks Gayathri Chandrasekaran Master s Thesis Defense The University of Kansas 07.31.2003 Committee: Dr. David W. Petr (Chair) Dr. Joseph

More information

CHAPTER 4 CALL ADMISSION CONTROL BASED ON BANDWIDTH ALLOCATION (CACBA)

CHAPTER 4 CALL ADMISSION CONTROL BASED ON BANDWIDTH ALLOCATION (CACBA) 92 CHAPTER 4 CALL ADMISSION CONTROL BASED ON BANDWIDTH ALLOCATION (CACBA) 4.1 INTRODUCTION In our previous work, we have presented a cross-layer based routing protocol with a power saving technique (CBRP-PS)

More information

B. Bellalta Mobile Communication Networks

B. Bellalta Mobile Communication Networks IEEE 802.11e : EDCA B. Bellalta Mobile Communication Networks Scenario STA AP STA Server Server Fixed Network STA Server Upwnlink TCP flows Downlink TCP flows STA AP STA What is the WLAN cell performance

More information

Cross Layer QoS Provisioning in Home Networks

Cross Layer QoS Provisioning in Home Networks Cross Layer QoS Provisioning in Home Networks Jiayuan Wang, Lukasz Brewka, Sarah Ruepp, Lars Dittmann Technical University of Denmark E-mail: jwan@fotonik.dtu.dk Abstract This paper introduces an innovative

More information

4.3 IEEE Physical Layer IEEE IEEE b IEEE a IEEE g IEEE n IEEE 802.

4.3 IEEE Physical Layer IEEE IEEE b IEEE a IEEE g IEEE n IEEE 802. 4.3 IEEE 802.11 Physical Layer 4.3.1 IEEE 802.11 4.3.2 IEEE 802.11b 4.3.3 IEEE 802.11a 4.3.4 IEEE 802.11g 4.3.5 IEEE 802.11n 4.3.6 IEEE 802.11ac,ad Andreas Könsgen Summer Term 2012 4.3.3 IEEE 802.11a Data

More information

Modeling a Beacon Enabled Cluster with Bidirectional Traffic

Modeling a Beacon Enabled Cluster with Bidirectional Traffic Modeling a Beacon Enabled 802..4 Cluster with Bidirectional Traffic Jelena Mišić, Shairmina Shafi, and Vojislav B. Mišić Department of Computer Science, University of Manitoba, Winnipeg, Canada Abstract.

More information

Lecture 5: Performance Analysis I

Lecture 5: Performance Analysis I CS 6323 : Modeling and Inference Lecture 5: Performance Analysis I Prof. Gregory Provan Department of Computer Science University College Cork Slides: Based on M. Yin (Performability Analysis) Overview

More information

A Quota Transfer Protocol for Upstream Transmissions in Wireless Mesh Networks

A Quota Transfer Protocol for Upstream Transmissions in Wireless Mesh Networks A Quota Transfer Protocol for Upstream Transmissions in Wireless Mesh Networks Yen-Bin Lee and Wen-Shyang Hwang Department of Electrical Engineering, National Kaohsiung University of Applied Sciences,

More information

Chapter 6 Queuing Disciplines. Networking CS 3470, Section 1

Chapter 6 Queuing Disciplines. Networking CS 3470, Section 1 Chapter 6 Queuing Disciplines Networking CS 3470, Section 1 Flow control vs Congestion control Flow control involves preventing senders from overrunning the capacity of the receivers Congestion control

More information

878 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 16, NO. 4, AUGUST 2008

878 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 16, NO. 4, AUGUST 2008 878 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 16, NO. 4, AUGUST 2008 Modeling Queueing and Channel Access Delay in Unsaturated IEEE 802.11 Random Access MAC Based Wireless Networks Omesh Tickoo and Biplab

More information

Multiple Access Links and Protocols

Multiple Access Links and Protocols Multiple Access Links and Protocols Two types of links : point-to-point PPP for dial-up access point-to-point link between Ethernet switch and host broadcast (shared wire or medium) old-fashioned Ethernet

More information

MODELING OF SMART GRID TRAFFICS USING NON- PREEMPTIVE PRIORITY QUEUES

MODELING OF SMART GRID TRAFFICS USING NON- PREEMPTIVE PRIORITY QUEUES MODELING OF SMART GRID TRAFFICS USING NON- PREEMPTIVE PRIORITY QUEUES Contents Smart Grid Model and Components. Future Smart grid components. Classification of Smart Grid Traffic. Brief explanation of

More information

Multiple Access Communications. EEE 538, WEEK 11 Dr. Nail Akar Bilkent University Electrical and Electronics Engineering Department

Multiple Access Communications. EEE 538, WEEK 11 Dr. Nail Akar Bilkent University Electrical and Electronics Engineering Department Multiple Access Communications EEE 538, WEEK 11 Dr. Nail Akar Bilkent University Electrical and Electronics Engineering Department 1 Multiple Access Satellite systems, radio networks (WLAN), ethernet segment

More information

TSIN01 Information Networks Lecture 3

TSIN01 Information Networks Lecture 3 TSIN01 Information Networks Lecture 3 Danyo Danev Division of Communication Systems Department of Electrical Engineering Linköping University, Sweden September 10 th, 2018 Danyo Danev TSIN01 Information

More information

MAC in /20/06

MAC in /20/06 MAC in 802.11 2/20/06 MAC Multiple users share common medium. Important issues: Collision detection Delay Fairness Hidden terminals Synchronization Power management Roaming Use 802.11 as an example to

More information

Comparison of the Quality of Service (QoS) on the IEEE e and the g Wireless LANs

Comparison of the Quality of Service (QoS) on the IEEE e and the g Wireless LANs ENSC 427: COMMUNICATION NETWORKS Comparison of the Quality of Service (QoS) on the IEEE 802.11e and the 802.11g Wireless LANs Spring 2010 Final Report Group 5 Yalda Hakki (yha17@sfu.ca) Rosy Johal (rja2@sfu.ca)

More information

Improving the Data Scheduling Efficiency of the IEEE (d) Mesh Network

Improving the Data Scheduling Efficiency of the IEEE (d) Mesh Network Improving the Data Scheduling Efficiency of the IEEE 802.16(d) Mesh Network Shie-Yuan Wang Email: shieyuan@csie.nctu.edu.tw Chih-Che Lin Email: jclin@csie.nctu.edu.tw Ku-Han Fang Email: khfang@csie.nctu.edu.tw

More information

VoIP over wireless networks: a packet scheduling approach to provide QoS using Linux

VoIP over wireless networks: a packet scheduling approach to provide QoS using Linux VoIP over 82.11 wireless networks: a packet scheduling approach to provide QoS using Linux Terrence van Valkenhoef and Mishar Mahboob December 13, 25 Abstract In this work, we propose a layer three scheduler

More information

An Analytical Model for IEEE with Sleep Mode Based on Time-varying Queue

An Analytical Model for IEEE with Sleep Mode Based on Time-varying Queue This full text paper was peer reviewed at the direction of IEEE Communications Society subject matter experts for publication in the IEEE ICC 2 proceedings An Analytical Model for IEEE 82.5.4 with Sleep

More information

SENSOR-MAC CASE STUDY

SENSOR-MAC CASE STUDY SENSOR-MAC CASE STUDY Periodic Listen and Sleep Operations One of the S-MAC design objectives is to reduce energy consumption by avoiding idle listening. This is achieved by establishing low-duty-cycle

More information

Department of Electrical and Computer Systems Engineering

Department of Electrical and Computer Systems Engineering Department of Electrical and Computer Systems Engineering Technical Report MECSE-6-2006 Medium Access Control (MAC) Schemes for Quality of Service (QoS) provision of Voice over Internet Protocol (VoIP)

More information

Radio Networks. Riccardo Cavallari. Radio Networks Office: 3 rd floor, Main Building

Radio Networks. Riccardo Cavallari. Radio Networks Office: 3 rd floor, Main Building Radio Networks riccardo.cavallari@unibo.it +39 051 20 93180 Office: 3 rd floor, Main Building 1 Wireless Body Area Networks (WBAN) and IEEE 802.15.6 Standard 2 Outline 1. Introduction Definitions and Application

More information

B. Bellalta Mobile Communication Networks

B. Bellalta Mobile Communication Networks IEEE 802.11e : EDCA B. Bellalta Mobile Communication Networks Scenario STA AP STA Server Server Fixed Network STA Server Upwnlink TCP flows Downlink TCP flows STA AP STA What is the WLAN cell performance

More information

Performance Analysis of Cell Switching Management Scheme in Wireless Packet Communications

Performance Analysis of Cell Switching Management Scheme in Wireless Packet Communications Performance Analysis of Cell Switching Management Scheme in Wireless Packet Communications Jongho Bang Sirin Tekinay Nirwan Ansari New Jersey Center for Wireless Telecommunications Department of Electrical

More information

Intelligent Transportation Systems. Medium Access Control. Prof. Dr. Thomas Strang

Intelligent Transportation Systems. Medium Access Control. Prof. Dr. Thomas Strang Intelligent Transportation Systems Medium Access Control Prof. Dr. Thomas Strang Recap: Wireless Interconnections Networking types + Scalability + Range Delay Individuality Broadcast o Scalability o Range

More information

PERFORMANCE ANALYSIS OF COGNITIVE RADIO NETWORK SPECTRUM ACCESS

PERFORMANCE ANALYSIS OF COGNITIVE RADIO NETWORK SPECTRUM ACCESS International Journal of Industrial Electronics Electrical Engineering, ISSN: 2347-6982 PERFORMANCE ANALYSIS OF COGNITIVE RADIO NETWORK SPECTRUM ACCESS 1 GOURI P. BRAHMANKAR, 2 S. B. MULE 1 M.E. (Student),

More information

standards like IEEE [37], IEEE [38] or IEEE [39] do not consider

standards like IEEE [37], IEEE [38] or IEEE [39] do not consider Chapter 5 IEEE 802.15.4 5.1 Introduction Wireless Sensor Network(WSN) is resource constrained network developed specially targeting applications having unattended network for long time. Such a network

More information

Priority Queueing Models for Cognitive Radio Networks with Traffic Differentiation

Priority Queueing Models for Cognitive Radio Networks with Traffic Differentiation Priority Queueing Models for Cognitive Radio Networks with Traffic Differentiation Arash Azarfar, Student Member, IEEE, Jean-François Frigon, Senior Member, IEEE, and Brunilde Sansò, Member, IEEE 1 arxiv:1203.6413v3

More information

The MAC layer in wireless networks

The MAC layer in wireless networks The MAC layer in wireless networks The wireless MAC layer roles Access control to shared channel(s) Natural broadcast of wireless transmission Collision of signal: a time/space problem Who transmits when?

More information

Lecture 16: QoS and "

Lecture 16: QoS and Lecture 16: QoS and 802.11" CSE 123: Computer Networks Alex C. Snoeren HW 4 due now! Lecture 16 Overview" Network-wide QoS IntServ DifServ 802.11 Wireless CSMA/CA Hidden Terminals RTS/CTS CSE 123 Lecture

More information

GUARANTEED END-TO-END LATENCY THROUGH ETHERNET

GUARANTEED END-TO-END LATENCY THROUGH ETHERNET GUARANTEED END-TO-END LATENCY THROUGH ETHERNET Øyvind Holmeide, OnTime Networks AS, Oslo, Norway oeyvind@ontimenet.com Markus Schmitz, OnTime Networks LLC, Texas, USA markus@ontimenet.com Abstract: Latency

More information

Real-Time Protocol (RTP)

Real-Time Protocol (RTP) Real-Time Protocol (RTP) Provides standard packet format for real-time application Typically runs over UDP Specifies header fields below Payload Type: 7 bits, providing 128 possible different types of

More information

Distributed Sequential Access MAC Protocol for Single-Hop Wireless Networks

Distributed Sequential Access MAC Protocol for Single-Hop Wireless Networks Wireless Pers Commun DOI 10.1007/s11277-013-1142-8 Distributed Sequential Access MAC Protocol for Single-Hop Wireless Networks Ki-seok Lee Cheeha Kim Springer Science+Business Media New York 2013 Abstract

More information

Resource allocation in networks. Resource Allocation in Networks. Resource allocation

Resource allocation in networks. Resource Allocation in Networks. Resource allocation Resource allocation in networks Resource Allocation in Networks Very much like a resource allocation problem in operating systems How is it different? Resources and jobs are different Resources are buffers

More information

Stochastic Processing Networks: What, Why and How? Ruth J. Williams University of California, San Diego

Stochastic Processing Networks: What, Why and How? Ruth J. Williams University of California, San Diego Stochastic Processing Networks: What, Why and How? Ruth J. Williams University of California, San Diego http://www.math.ucsd.edu/~williams 1 OUTLINE! What is a Stochastic Processing Network?! Applications!

More information

On the Packet Allocation of Multi-Band Aggregation Wireless Networks

On the Packet Allocation of Multi-Band Aggregation Wireless Networks 1 On the Packet Allocation of Multi-Band Aggregation Wireless Networks Sanay Goyal 1, Tan Le, Amith Chincholi 3, Tariq Elkourdi 4, Alpaslan Demir 1 1 InterDigital Communications, Inc., Melville, NY, USA

More information

Key Performance Aspects of an LTE FDD based Smart Grid Communications Network

Key Performance Aspects of an LTE FDD based Smart Grid Communications Network Key Performance Aspects of an LTE FDD based Smart Grid Communications Network Presented by: Ran Zhang Supervisors: Prof. Sherman(Xuemin) Shen, Prof. Liang-liang Xie Main Reference Jason Brown, and Jamil

More information

048866: Packet Switch Architectures

048866: Packet Switch Architectures 048866: Packet Switch Architectures Output-Queued Switches Deterministic Queueing Analysis Fairness and Delay Guarantees Dr. Isaac Keslassy Electrical Engineering, Technion isaac@ee.technion.ac.il http://comnet.technion.ac.il/~isaac/

More information

The MAC layer in wireless networks

The MAC layer in wireless networks The MAC layer in wireless networks The wireless MAC layer roles Access control to shared channel(s) Natural broadcast of wireless transmission Collision of signal: a /space problem Who transmits when?

More information

Simulation-Based Performance Comparison of Queueing Disciplines for Differentiated Services Using OPNET

Simulation-Based Performance Comparison of Queueing Disciplines for Differentiated Services Using OPNET Simulation-Based Performance Comparison of Queueing Disciplines for Differentiated Services Using OPNET Hafiz M. Asif and El-Sayed M. El-Alfy College of Computer Science and Engineering King Fahd University

More information

Protocols for Multiaccess Networks

Protocols for Multiaccess Networks Protocols for Multiaccess Networks Hosts broadcast packets When a collision occurs, all transmitted packets are lost Lost packets have to be retransmitted => Need Multiaccess Protocol Model - Slotted Aloha

More information

Research Article Optimization of Access Threshold for Cognitive Radio Networks with Prioritized Secondary Users

Research Article Optimization of Access Threshold for Cognitive Radio Networks with Prioritized Secondary Users Mobile Information Systems Volume 2016, Article ID 3297938, 8 pages http://dx.doi.org/10.1155/2016/3297938 Research Article Optimization of Access Threshold for Cognitive Radio Networks with Prioritized

More information

Prioritization scheme for QoS in IEEE e WLAN

Prioritization scheme for QoS in IEEE e WLAN Prioritization scheme for QoS in IEEE 802.11e WLAN Yakubu Suleiman Baguda a, Norsheila Fisal b a,b Department of Telematics & Communication Engineering, Faculty of Electrical Engineering Universiti Teknologi

More information

Absolute QoS Differentiation in Optical Burst-Switched Networks

Absolute QoS Differentiation in Optical Burst-Switched Networks IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 22, NO. 9, NOVEMBER 2004 1781 Absolute QoS Differentiation in Optical Burst-Switched Networks Qiong Zhang, Student Member, IEEE, Vinod M. Vokkarane,

More information

Quality of Service (QoS)

Quality of Service (QoS) Quality of Service (QoS) The Internet was originally designed for best-effort service without guarantee of predictable performance. Best-effort service is often sufficient for a traffic that is not sensitive

More information

This document is downloaded from DR-NTU, Nanyang Technological University Library, Singapore.

This document is downloaded from DR-NTU, Nanyang Technological University Library, Singapore. This document is downloaded from DR-NTU, Nanyang Technological University Library, Singapore. Title Optimal channel access management with QoS support for cognitive vehicular networks Author(s) Niyato,

More information

Adaptive Mechanism for Aggregation with fragments retransmission in high-speed wireless networks

Adaptive Mechanism for Aggregation with fragments retransmission in high-speed wireless networks Int. J. Open Problems Compt. Math., Vol. 4, No. 3, September 2011 ISSN 1998-6262; Copyright ICSRS Publication, 2011 www.i-csrs.org Adaptive Mechanism for Aggregation with fragments retransmission in high-speed

More information

DDSS: Dynamic Dedicated Servers Scheduling for Multi Priority Level Classes in Cloud Computing

DDSS: Dynamic Dedicated Servers Scheduling for Multi Priority Level Classes in Cloud Computing DDSS: Dynamic Dedicated Servers Scheduling for Multi Priority Level Classes in Cloud Computing Husnu Saner Narman Md. Shohrab Hossain Mohammed Atiquzzaman School of Computer Science University of Oklahoma,

More information

Real-Time Medical Data over WLANs

Real-Time Medical Data over WLANs 2015 International Conference on Computational Science and Computational Intelligence Real-Time Medical Data over WLANs Constantine Coutras Department of Computer Science Montclair State University Montclair,

More information

Bluetooth Time Division Duplex - Exact Analysis as a Polling System

Bluetooth Time Division Duplex - Exact Analysis as a Polling System CCIT Report 414, Technion Dept. of Electrical Engineering, Feb. 003. Bluetooth Time Division Duplex - Exact Analysis as a Polling System Gil Zussman 1, Adrian Segall 1, and Uri Yechiali 1 Department of

More information

THE number of mobile devices and the demand for multimedia

THE number of mobile devices and the demand for multimedia An Energy Efficient MAC Protocol for Fully Connected Wireless Ad Hoc Networks Kamal Rahimi Malekshan, Student member, IEEE, Weihua Zhuang, Fellow, IEEE and Yves Lostanlen, Senior member, IEEE arxiv:47.6266v

More information

IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 14, NO. 10, OCTOBER Aimin Tang and Xudong Wang, Senior Member, IEEE

IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 14, NO. 10, OCTOBER Aimin Tang and Xudong Wang, Senior Member, IEEE IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 14, NO. 10, OCTOBER 2015 5871 A-Duplex: Medium Access Control for Efficient Coexistence Between Full-Duplex and Half-Duplex Communications Aimin Tang

More information

MAC. Fall Data Communications II 1

MAC. Fall Data Communications II 1 802.11 MAC Fall 2005 91.564 Data Communications II 1 RF Quality (ACK) Fall 2005 91.564 Data Communications II 2 Hidden Terminal (RTS/CTS) Fall 2005 91.564 Data Communications II 3 MAC Coordination Functions

More information

Advanced Computer Networks WLAN

Advanced Computer Networks WLAN Advanced Computer Networks 263 3501 00 WLAN Patrick Stuedi Spring Semester 2014 1 Oriana Riva, Department of Computer Science ETH Zürich Last week Outlook Medium Access COPE Short Range Wireless Networks:

More information

Providing QoS to Real and Non-Real Time Traffic in IEEE networks

Providing QoS to Real and Non-Real Time Traffic in IEEE networks Providing QoS to Real and Non-Real Time Traffic in IEEE 802.16 networks Joint work with my student Harish Shetiya Dept. of Electrical Communication Engg., Indian Institute of Science, Bangalore Overview

More information

Resource Allocation in Contention-Based WiFi Networks

Resource Allocation in Contention-Based WiFi Networks The 2011 Santa Barbara Control Workshop Resource Allocation in Contention-Based WiFi Networks Laura Giarré Universita di Palermo (giarre@unipa.it) Joint works with I. Tinnirello (Università di Palermo),

More information

Modeling and Analysis of MAC Protocol for LTE-U Co-existing with Wi-Fi

Modeling and Analysis of MAC Protocol for LTE-U Co-existing with Wi-Fi Modeling and Analysis of MAC Protocol for LTE-U Co-existing with Wi-Fi Ran Zhang Miao Wang Lin X. Cai Xuemin (Sherman) Shen Liang-Liang Xie Yu Cheng Abstract In this paper a new MAC protocol for LTE over

More information

A Low Latency Data Transmission Scheme for Smart Grid Condition Monitoring Applications 28/05/2012

A Low Latency Data Transmission Scheme for Smart Grid Condition Monitoring Applications 28/05/2012 1 A Low Latency Data Transmission Scheme for Smart Grid Condition Monitoring Applications I R F A N S. A L - A N B A G I, M E L I K E E R O L - K A N T A R C I, H U S S E I N T. M O U F T A H U N I V E

More information

Local Area Networks NETW 901

Local Area Networks NETW 901 Local Area Networks NETW 901 Lecture 4 Wireless LAN Course Instructor: Dr.-Ing. Maggie Mashaly maggie.ezzat@guc.edu.eg C3.220 1 Contents What is a Wireless LAN? Applications and Requirements Transmission

More information

Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs)

Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Project: IEEE P802.15 Working Group for Wireless Personal Area Networks (WPANs) Title: [Simulation Results for Final Proposal 15-3-0380] Date Submitted: [Aug 2013] Source: [Hongkun Li, Zhuo Chen, Chonggang

More information

Basics (cont.) Characteristics of data communication technologies OSI-Model

Basics (cont.) Characteristics of data communication technologies OSI-Model 48 Basics (cont.) Characteristics of data communication technologies OSI-Model Topologies Packet switching / Circuit switching Medium Access Control (MAC) mechanisms Coding Quality of Service (QoS) 49

More information

Network Support for Multimedia

Network Support for Multimedia Network Support for Multimedia Daniel Zappala CS 460 Computer Networking Brigham Young University Network Support for Multimedia 2/33 make the best of best effort use application-level techniques use CDNs

More information

Introduction to Queuing Systems

Introduction to Queuing Systems Introduction to Queuing Systems Queuing Theory View network as collections of queues FIFO data-structures Queuing theory provides probabilistic analysis of these queues Examples: Average length Probability

More information

Spectrum Management in Cognitive Radio Networks

Spectrum Management in Cognitive Radio Networks Spectrum Management in Cognitive Radio Networks Jul 14,2010 Instructor: professor m.j omidi 1/60 BY : MOZHDEH MOLA & ZAHRA ALAVIKIA Contents Overview: Cognitive Radio Spectrum Sensing Spectrum Decision

More information

Wireless Networks (CSC-7602) Lecture 8 (15 Oct. 2007)

Wireless Networks (CSC-7602) Lecture 8 (15 Oct. 2007) Wireless Networks (CSC-7602) Lecture 8 (15 Oct. 2007) Seung-Jong Park (Jay) http://www.csc.lsu.edu/~sjpark 1 Today Wireline Fair Schedulling Why? Ideal algorithm Practical algorithms Wireless Fair Scheduling

More information

Queuing. Congestion Control and Resource Allocation. Resource Allocation Evaluation Criteria. Resource allocation Drop disciplines Queuing disciplines

Queuing. Congestion Control and Resource Allocation. Resource Allocation Evaluation Criteria. Resource allocation Drop disciplines Queuing disciplines Resource allocation Drop disciplines Queuing disciplines Queuing 1 Congestion Control and Resource Allocation Handle congestion if and when it happens TCP Congestion Control Allocate resources to avoid

More information

A CDCA-TRACE MAC PROTOCOL FRAMEWORK IN MOBILE AD-HOC NETWORK

A CDCA-TRACE MAC PROTOCOL FRAMEWORK IN MOBILE AD-HOC NETWORK Research Manuscript Title A CDCA-TRACE MAC PROTOCOL FRAMEWORK IN MOBILE AD-HOC NETWORK Jaichitra.I, Aishwarya.K, P.G Student, Asst.Professor, CSE Department, Arulmigu Meenakshi Amman College of Engineering,

More information

Com S 611 Spring Semester 2007 Discrete Algorithms for Mobile and Wireless Networks. Lecture 3: Tuesday, 23rd January 2007

Com S 611 Spring Semester 2007 Discrete Algorithms for Mobile and Wireless Networks. Lecture 3: Tuesday, 23rd January 2007 Com S 611 Spring Semester 2007 Discrete Algorithms for Mobile and Wireless Networks Lecture 3: Tuesday, 23rd January 2007 Instructor: Soma Chaudhuri Scribe: Abhishek Sinha 1 Introduction The lecture can

More information

Delay Analysis of IEEE Wireless Metropolitan Area Network

Delay Analysis of IEEE Wireless Metropolitan Area Network Delay Analysis of IEEE 802.16 Wireless Metropolitan Area Network Zsolt Saffer Technical University of Budapest 1521 Budapest Hungary safferzs@hit.bme.hu Sergey Andreev State University of Aerospace Instrumentation

More information

Practical Lazy Scheduling in Wireless Sensor Networks. Ramana Rao Kompella and Alex C. Snoeren

Practical Lazy Scheduling in Wireless Sensor Networks. Ramana Rao Kompella and Alex C. Snoeren Practical Lazy Scheduling in Wireless Sensor Networks Ramana Rao Kompella and Alex C. Snoeren Distributed Rate Adaptation Problem: In wireless networks (e.g., sensor nets, 802.11) radios consume significant

More information

Chapter 6 Medium Access Control Protocols and Local Area Networks

Chapter 6 Medium Access Control Protocols and Local Area Networks Chapter 6 Medium Access Control Protocols and Local Area Networks Part I: Medium Access Control Part II: Local Area Networks CSE 3213, Winter 2010 Instructor: Foroohar Foroozan Chapter Overview Broadcast

More information

P B 1-P B ARRIVE ATTEMPT RETRY 2 1-(1-P RF ) 2 1-(1-P RF ) 3 1-(1-P RF ) 4. Figure 1: The state transition diagram for FBR.

P B 1-P B ARRIVE ATTEMPT RETRY 2 1-(1-P RF ) 2 1-(1-P RF ) 3 1-(1-P RF ) 4. Figure 1: The state transition diagram for FBR. 1 Analytical Model In this section, we will propose an analytical model to investigate the MAC delay of FBR. For simplicity, a frame length is normalized as a time unit (slot). 1.1 State Transition of

More information

A Comparative Study of Different Queuing Scheduling Disciplines

A Comparative Study of Different Queuing Scheduling Disciplines RESEARCH ARTICLE OPEN ACCESS A Comparative Study of Different Queuing Scheduling Disciplines Sarhan M. Musa, Mahamadou Tembely, Matthew N. O. Sadiku, And Pamela Obliomon Roy G. Perry College of Engineering,

More information

Scheduling Algorithms to Minimize Session Delays

Scheduling Algorithms to Minimize Session Delays Scheduling Algorithms to Minimize Session Delays Nandita Dukkipati and David Gutierrez A Motivation I INTRODUCTION TCP flows constitute the majority of the traffic volume in the Internet today Most of

More information

Distributed Localized Interference Avoidance for Dynamic Frequency Hopping ad hoc Networks

Distributed Localized Interference Avoidance for Dynamic Frequency Hopping ad hoc Networks Distributed Localized Interference Avoidance for Dynamic Frequency Hopping ad hoc Networks Sebastian Koslowski, Jens P. Elsner, Friedrich K. Jondral; Karlsruhe Institute of Technology (KIT) {koslowski,

More information

Impact of Packet Arrivals on Wi-Fi and Cellular System Sharing Unlicensed Spectrum

Impact of Packet Arrivals on Wi-Fi and Cellular System Sharing Unlicensed Spectrum 1 Impact of Packet Arrivals on Wi-Fi and Cellular System Sharing Unlicensed Spectrum Yujae Song, Ki Won Sung, and Youngnam Han Abstract We investigate the coexistence performance of Wi- Fi and cellular

More information

Lecture 23 Overview. Last Lecture. This Lecture. Next Lecture ADSL, ATM. Wireless Technologies (1) Source: chapters 6.2, 15

Lecture 23 Overview. Last Lecture. This Lecture. Next Lecture ADSL, ATM. Wireless Technologies (1) Source: chapters 6.2, 15 Lecture 23 Overview Last Lecture ADSL, ATM This Lecture Wireless Technologies (1) Wireless LAN, CSMA/CA, Bluetooth Source: chapters 6.2, 15 Next Lecture Wireless Technologies (2) Source: chapter 16, 19.3

More information

Implementation of WiFiRe PHY Sectorization in OPNET

Implementation of WiFiRe PHY Sectorization in OPNET P Sreedhar Reddy Roll No. 06305024 24th July, 2007 Under the Guidance Of Prof. Sridhar Iyer Department Of Computer Science and Engineering Indian Institute Of Technology, Bombay Outline WiFiRe overview.

More information

WiMedia Media Access Control (MAC) Dan Froelich

WiMedia Media Access Control (MAC) Dan Froelich WiMedia Media Access Control (MAC) Dan Froelich Intel Corporation Content also provided by: Kris Flemming, Intel Corporation Agenda Key Messages Relationship of Certified Wireless USB and other WiMedia

More information

Two-Tier WBAN/WLAN Healthcare Networks; Priority Considerations

Two-Tier WBAN/WLAN Healthcare Networks; Priority Considerations Two-Tier WBAN/WLAN Healthcare Networks; Priority Considerations Saeed Rashwand Department of Computer Science University of Manitoba Jelena Mišić Department of Computer Science Ryerson University Abstract

More information

CHAPTER 5. QoS RPOVISIONING THROUGH EFFECTIVE RESOURCE ALLOCATION

CHAPTER 5. QoS RPOVISIONING THROUGH EFFECTIVE RESOURCE ALLOCATION CHAPTER 5 QoS RPOVISIONING THROUGH EFFECTIVE RESOURCE ALLOCATION 5.1 PRINCIPLE OF RRM The success of mobile communication systems and the need for better QoS, has led to the development of 3G mobile systems

More information

A Novel Framework for Radio Resource Management in IEEE Wireless LANs

A Novel Framework for Radio Resource Management in IEEE Wireless LANs Dublin Institute of Technology ARROW@DIT Conference papers Communications Network Research Institute 2005-01-01 A Novel Framework for Radio Resource Management in IEEE 802.11 Wireless LANs Mark Davis Dublin

More information

Outline. Application examples

Outline. Application examples Outline Application examples Google page rank algorithm Aloha protocol Virtual circuit with window flow control Store-and-Forward packet-switched network Interactive system with infinite servers 1 Example1:

More information

Chapter 3 MEDIA ACCESS CONTROL

Chapter 3 MEDIA ACCESS CONTROL Chapter 3 MEDIA ACCESS CONTROL Distributed Computing Group Mobile Computing Winter 2005 / 2006 Overview Motivation SDMA, FDMA, TDMA Aloha Adaptive Aloha Backoff protocols Reservation schemes Polling Distributed

More information

MAC protocols for ad hoc networks

MAC protocols for ad hoc networks MAC protocols for ad hoc networks Lecturer: Dmitri A. Moltchanov E-mail: moltchan@cs.tut.fi http://www.cs.tut.fi/kurssit/tlt-2756/ OUTLINE: Problems for MAC to deal with; Design goals; Classification of

More information

WEB OBJECT SIZE SATISFYING MEAN WAITING TIME IN MULTIPLE ACCESS ENVIRONMENT

WEB OBJECT SIZE SATISFYING MEAN WAITING TIME IN MULTIPLE ACCESS ENVIRONMENT International Journal of Computer Networks & Communications (IJCNC) Vol.6, No.4, July 014 WEB OBJECT SIZE SATISFYING MEAN WAITING TIME IN MULTIPLE ACCESS ENVIRONMENT Y. J. Lee Department of Technology

More information

PON Functional Requirements: Services and Performance

PON Functional Requirements: Services and Performance PON Functional Requirements: Services and Performance Dolors Sala Ajay Gummalla {dolors,ajay}@broadcom.com July 10-12, 2001 Ethernet in the First Mile Study Group 1 July 2001 Objective Outline the PON-specific

More information

Fairness in the IEEE network. Shun Y. Cheung

Fairness in the IEEE network. Shun Y. Cheung Fairness in the IEEE 802.11 network Shun Y. Cheung Simple FIFO queueing High data rate flow Output queue (infinite size) Low data rate flow Packets from low data rate flow experience excessive queueing

More information

Queuing Systems. 1 Lecturer: Hawraa Sh. Modeling & Simulation- Lecture -4-21/10/2012

Queuing Systems. 1 Lecturer: Hawraa Sh. Modeling & Simulation- Lecture -4-21/10/2012 Queuing Systems Queuing theory establishes a powerful tool in modeling and performance analysis of many complex systems, such as computer networks, telecommunication systems, call centers, manufacturing

More information

Optimal Resource Allocation for Pervasive Health Monitoring Systems with Body Sensor Network

Optimal Resource Allocation for Pervasive Health Monitoring Systems with Body Sensor Network Haili Dong Optimal Resource Allocation for Pervasive Health Monitoring Systems with Body Sensor Network Yifeng He, Wenwu Zhu, Ling Guan IEEE TMC 2011 CS 6204 1 Outline Introduction Related Work Problem

More information

Worst-case Ethernet Network Latency for Shaped Sources

Worst-case Ethernet Network Latency for Shaped Sources Worst-case Ethernet Network Latency for Shaped Sources Max Azarov, SMSC 7th October 2005 Contents For 802.3 ResE study group 1 Worst-case latency theorem 1 1.1 Assumptions.............................

More information