An Adaptive Strategy for Maximizing Throughput in MAC layer Wireless Multicast
|
|
- Gloria Paul
- 6 years ago
- Views:
Transcription
1 University of Pennsylvania ScholarlyCommons Departmental Papers (ESE) Department of Electrical & Systems Engineering May 24 An Adaptive Strategy for Maximizing Throghpt in MAC layer Wireless Mlticast Prasanna Chaporkar University of Pennsylvania Anita Bhat University of Pennsylvania Saswati Sarkar University of Pennsylvania, Follow this and additional works at: Recommended Citation Prasanna Chaporkar, Anita Bhat, and Saswati Sarkar, "An Adaptive Strategy for Maximizing Throghpt in MAC layer Wireless Mlticast",. May 24. Copyright ACM, 24. This is the athor's version of the work. It is posted here by permission of ACM for yor personal se. Not for redistribtion. The definitive version was pblished in Proceedings of the 5th ACM International Symposim on Mobile Ad Hoc Networking and Compting 24 (MobiHoc 24), pages Pblisher URL: This paper is posted at ScholarlyCommons. For more information, please contact
2 An Adaptive Strategy for Maximizing Throghpt in MAC layer Wireless Mlticast Abstract Bandwidth efficiency of wireless mlticast can be improved sbstantially by exploiting the fact that several receivers can be reached at the MAC layer by a single transmission. The mlticast natre of the transmissions, however, introdces several design challenges, and systematic design approaches that have been sed effectively in nicast and wireline mlticast do not apply in wireless mlticast. For example, a transmission policy that maximizes the stability region of the network need not maximize the network throghpt. Therefore, the objective is to design a policy that decides when a sender shold transmit in order to maximize the system throghpt sbject to maintaining the system stability. We present a sfficient condition that can be sed to establish the throghpt optimality of a stable transmission policy. We sbseqently design an adaptive stable policy that allows a sender to decide when to transmit sing simple comptations based only on limited information abot crrent transmissions in its neighborhood, and withot sing any information abot the network statistics. The proposed policy attains the same throghpt as the optimal offline stable policy that ses in its decision process past, present, and even ftre network states. We prove the throghpt optimality of this policy sing the sffi- cient condition and the large deviation reslts. We present a MAC protocol for acqiring the local information necessary for execting this policy, and implement it in ns-2. The performance evalations demonstrate that the optimal strategy significantly otperforms the existing approaches in adhoc networks consisting of several mlticast and nicast sessions. Keywords Compter-Commnication Networks, Network Architectre and Design, Algorithms, Design, Wireless mlticast, MAC layer schedling, throghpt optimal policy, stability Comments Copyright ACM, 24. This is the athor's version of the work. It is posted here by permission of ACM for yor personal se. Not for redistribtion. The definitive version was pblished in Proceedings of the 5th ACM International Symposim on Mobile Ad Hoc Networking and Compting 24 (MobiHoc 24), pages Pblisher URL: This conference paper is available at ScholarlyCommons:
3 An Adaptive Strategy for Maximizing Throghpt in MAC layer Wireless Mlticast Prasanna Chaporkar Department of Electrical and Systems Engineering University of Pennsylvania Anita Bhat Department of Electrical and Systems Engineering University of Pennsylvania Saswati Sarkar Department of Electrical and Systems Engineering University of Pennsylvania ABSTRACT Bandwidth efficiency of wireless mlticast can be improved sbstantially by exploiting the fact that several receivers can be reached at the MAC layer by a single transmission. The mlticast natre of the transmissions, however, introdces several design challenges, and systematic design approaches that have been sed effectively in nicast and wireline mlticast do not apply in wireless mlticast. For example, a transmission policy that maximizes the stability region of the network need not maximize the network throghpt. Therefore, the objective is to design a policy that decides when a sender shold transmit in order to maximize the system throghpt sbject to maintaining the system stability. We present a sfficient condition that can be sed to establish the throghpt optimality of a stable transmission policy. We sbseqently design an adaptive stable policy that allows a sender to decide when to transmit sing simple comptations based only on limited information abot crrent transmissions in its neighborhood, and withot sing any information abot the network statistics. The proposed policy attains the same throghpt as the optimal offline stable policy that ses in its decision process past, present, and even ftre network states. We prove the throghpt optimality of this policy sing the sfficient condition and the large deviation reslts. We present a MAC protocol for acqiring the local information necessary for execting this policy, and implement it in ns-2. The performance evalations demonstrate that the optimal strategy significantly otperforms the existing approaches in adhoc networks consisting of several mlticast and nicast sessions. Categories and Sbject Descriptors C.2 [Compter-Commnication Networks]: Network Architectre and Design This research was spported in part by NSF grants ANI and NCR Permission to make digital or hard copies of all or part of this work for personal or classroom se is granted withot fee provided that copies are not made or distribted for profit or commercial advantage and that copies bear this notice and the fll citation on the first page. To copy otherwise, to repblish, to post on servers or to redistribte to lists, reqires prior specific permission and/or a fee. MobiHoc 4, May 24 26, 24, Roppongi, Japan. Copyright 24 ACM /4/ General Terms Algorithms, Design Keywords Wireless mlticast, MAC layer schedling, throghpt optimal policy, stability 1. INTRODUCTION Many crrent day wireless applications need mlticast commnication, e.g., sensor networks and military operations. Wireless commnication is inherently broadcast in natre, i.e. all nodes in the transmission range of a sender can receive a transmission from the sender. Hence, at the MAC layer, it sffices to transmit each packet only once in order to reach all the intended receivers. We focs on designing an optimal MAC strategy for wireless mlticast that tilizes the broadcast natre of the wireless medim. Thogh the broadcast natre of wireless transmissions provides a possible approach to improve the efficiency of the mlticast commnication, it also imposes varios difficlties. A mlticast specific challenge is that some bt not all the receivers may be ready to receive. For example, in Figre 1, when is transmitting to, can not receive the transmission from as both the transmissions will collide at. However,, and can still receive the transmission. The readiness state of a receiver depends on the network load. The policy decision is whether shold transmit or it shold wait till all the receivers are ready. A transmission policy that does not transmit ntil a sfficient nmber of receivers are ready may lead to nstable systems that have nbonded qee lengths at the senders. On the other hand, if the senders transmit when only a few receivers are ready, then the transmitted packet will be lost at the receivers that were not ready, which may reslt in low system throghpt. Ths, there is a tradeoff between system stability and the throghpt. The system clearly needs to be stable. The challenge therefore is to design a MAC layer transmission strategy that maximizes the system throghpt, while maintaining system stability. Frthermore, the optimm transmission strategy shold be sch that each sender decides whether or not to transmit sing (a) simple comptations, (b) no information abot system statistics, (c) limited control message exchange and (d) limited information abot its neighbors. We propose a transmission strategy that attains the above objectives (Section 3). First step in this direction has been to develop a model that captres the essential featres of a wireless network
4 R4 S1 R 3 R1 Transmission Range of S 1 Transmission Range of S 2 R 2 Figre 1: An example to demonstrate the advantages and the challenges associated with wireless mlticast. The figre shows two senders, and 5 receivers to. to are s receivers, and is s receiver. Dashed circle indicates the commnication range of a sender. (Section 2). We sbseqently se this model to obtain a sfficient condition to establish the throghpt optimality of an arbitrary stable policy. Using the model, we show that the proposed policy maximizes throghpt among all policies that stabilize the system [5]. The transmission decisions of the proposed policy are based on the qee length at a sender and the nmber of ready receivers. The first qantity is easily available at a sender. We propose a few MAC protocols that allow a sender to estimate the nmber of ready receivers (Section 4). We evalate the performance of varios mlticast schemes sing ns-simlations in a wireless network consisting of several mlticast and nicast sessions (Section 5). Simlation reslts show that the proposed optimal policy provides significantly higher throghpt than existing approaches. We present discssion on the model and the analytical reslts in Section 6. The previos research in wireless mlticast have lead to the development of transport and network layer protocols. End-to-end error recovery protocols address the isse of reliable loss recovery with minimm cost of information exchange among nodes, e.g., [4, 17]. Several mlticast roting protocols have been proposed at the network layer, e.g., [8, 13, 16, 19, 23]. Protocols for energy efficient mlticast roting have been proposed in [22, 29, 31]. Zho et al. have investigated content based mlticast in adhoc networks [32]. Nagy et al. have investigated mlticast in celllar networks [15]. The proposed transport and network layer protocols can work with any nderlying MAC layer strategy. Thogh efficiency of these higher layer schemes depends on the efficiency of MAC layer strategy, MAC layer mlticast has not been adeqately explored. Singh et al. have proposed a MAC protocol for power aware broadcast [22]. Wang et al. have proposed a schedling and power control protocol to minimize the transmission power at the sender nodes [3]. Jaikaeo et al. have stdied mlticast with directional antennas [11]. Kri et al. have proposed a protocol for reliable packet delivery in wireless LANs [12]. The design of the protocol is based on many assmptions that hold in wireless LANs bt not in ad-hoc networks. For ad-hoc networks, Tang et al. have proposed a nicast based mlticast scheme that transmits a packet to each receiver separately in rond robin fashion [26]. Crrently poplar mltiple access standard IEEE implements mlticast by broadcasting a packet after disabling all control messages. Ths, second hop interference is ignored. Tang et al. have also proposed the threshold- mlticast scheme where a sender transmits a packet whenever at least one receiver is ready to receive [24, 25]. The S2 R 5 nicast based mlticast policy does not exploit the broadcast natre of wireless medim, and its mltiple transmissions of a packet wastes power and bandwidth. The broadcast based mlticast and threshold-1 mlticast policies case packet loss at receivers becase several receivers may not be ready at the time of transmission. The broadcast based mlticast also cases packet collision de to second hop interference. We have proposed a throghpt optimal mlticast strategy in [6]. The parameters of this policy can only be compted with knowledge of the network load and statistics of the arrival process, which sender may not know. We now present an adaptive policy that maximizes the throghpt withot reqiring any sch information. We believe that MAC layer mlticast presents several research challenges and design isses that wold be of interest to both theoreticians and practitioners. Considering all sch isses is beyond the scope of a single paper. We, however, otline open problems in this area in Section 7. We hope that or reslts wold lay a basis for developing a flly operational MAC layer mlticast protocol, and stimlate frther research to address the open problems. De to the space constraints proofs for all the reslts are presented in [5]. 2. SYSTEM MODEL We consider a wireless network with several MAC layer mlticast and nicast sessions. All the nodes in the network need not be in each other s transmission range. Each mlticast session comprises of a sender and a set of receivers (mlticast grop). At the MAC layer all the receivers are within the sender s transmission range. We consider transmission of data traffic. Time is slotted. We assme that each packet can be transmitted in a single slot; this assmption can be relaxed easily. A major design challenge in wireless mlticast is that several existing approaches for optimizing system performance do not apply. Consider the objective of maximizing system throghpt in a network with senders generating packets at rates respectively. Consider only the policies that ensre correct reception of every packet by at least one receiver. Now, throghpt is the sm of the nmber of packets received correctly per nit time over all the receivers. The stability region of a transmission policy is the set of arrival rates for which the senders have finite expected qee lengths. The stability region of the network (denoted as ) is the nion of that of all transmission policies. In nicast and wireline mlticast, a policy maximizes throghpt if and only if its stability region eqals. The latter happens if there exists a lyapnov fnction that has a negative drift for the policy in. This property has been sed to show that back-pressre based policies maximize the stability region and hence the system throghpt in packet radio and wireline mlticast networks [27, 2]. This systematic approach cannot be sed in wireless mlticast as a policy that attains need not maximize the throghpt and vice-versa. Example: Consider Figre 1. When transmits, receive the packet withot any error; receives the packet only if is not transmitting simltaneosly. When transmits, receives the packet withot any error. Consider two transmission policies and. Under each sender transmits whenever it has a packet. Under transmits whenever it has a packet, while transmits only when is not transmitting. We assme that knows s transmission decisions, and in each slot a packet arrives at ( ) with probability ( ). Policy s stability
5 ' Arrival Rate λ S R1... R G R 2 Rest of the Wireless Network Figre 2: Figre shows a MAC layer mlticast session and its interaction with the rest of the network. Node is a sender, where packets arrive at the rate. Sender transmits the packets to receivers to. R 7 S 2 R 6 S 3 I3 R8 I S 2 1 R I1 9 R1 R 5 R4 R3 R2 Figre 3: Figre shows a mlticast session from to receivers to and two nicast sessions from to and to in a mlti-hop wireless network. First we observe that a single network layer mlticast session corresponds to many MAC layer mlticast sessions, e.g., mlticasts to intermediate nodes to, mlticasts to the receivers to, etc. Consider a MAC layer mlticast session from sender MAC layer receivers, and. Observe that when is receiving data, is not ready to transmit, bt all the receivers are ready to receive. Frthermore, when is transmitting to, receivers and are not ready to receive, bt is ready to transmit and is is ready to receive. Ths, readiness states of and are correlated. This is also the region is network s stability region as a sender can transmit only one packet in each slot. The network throghpt nder for arrival rates is Now, s stability region is! " which is a strict sbset of the network s and s stability region. The throghpt nder for arrival rates # is Ths, the throghpt nder is strictly higher than that nder for in Ths, nlike attains the stability region of the network, bt for certain arrival rates its throghpt is less than s throghpt. The above observation has two conseqences. First, we mst maximize the throghpt sbject to stability. In other words, we mst design a stable transmission policy that maximizes the throghpt among all the stable policies. Second, the existing framework does not apply. Therefore, we need a new design techniqe to attain the objective. We develop a sfficient condition for a policy to attain the objective sing an abstraction of a network which we describe next. Figre 2 shows a single MAC layer mlticast session, and represents its interaction with the rest of the network. De to the broadcast natre of wireless medim, transmissions from other nodes in the network affect the performance of the mlticast session and vice versa. The effect of the rest of the network on the mlticast session to is that the receivers are not always ready to receive. A receiver will not be ready when there are transmissions in its neighborhood or the transmission condition is poor, or when it is in a sleep mode. For example, in Figre 3 the receivers and will not be ready when is transmitting to %. Frther, the readiness states of different receivers are correlated in the same slot. The correlation across slots is de to brsty channel errors. The impact of the session on the rest of the network is that the sender s transmission interferes with simltaneos transmissions in its neighborhood. The interference is controlled as follows. The sender does not transmit if any node in its neighborhood is receiving a packet. For example in Figre 3, does not transmit when is transmitting a packet to %. Also, the sender backs-off jst after transmitting a packet so that other senders can se the shared medim. Ths, a sender is not ready when it backs off or a node in its neighborhood is receiving a packet. Ths, the effect of the session on the rest of the network is controlled by reglating the sender s readiness states. The readiness states of the receivers may be correlated with the readiness state of the sender. We consider a single mlticast session with & receivers, and model its interaction with the rest of the network by considering stochastic readiness states of the sender and the receivers. For example, in Figre 2 we only consider the sender and the receivers to, and assme that the readiness states are governed by a stationary and ergodic stochastic process. The readiness process in a slot is described by a & dimensional vector '+*,' ' )( ',-, where the component '.* is 1 if the sender is ready and it is otherwise. Frther for all /1, '.2 is 1 if the /4345 receiver is ready and it is otherwise. The packet arrival process at the sender is an irredcible, aperiodic and time homogeneos Markov Chain (MC) of 6 states. A state of the MC indicates the nmber of arrivals in a slot. Here 6 denotes the maximm nmber of packets arriving in a slot, and denotes the expected nmber of arrivals in a slot nder the MC s stationary distribtion. Next we present some definitions that will be sed in the rest of the paper. DEFINITION 1. A transmission policy is an algorithm at a sender node that decides when to transmit a packet. A necessary condition for a sender to transmit a packet is that it is ready to transmit, and it has a packet to transmit The class of transmission policies inclde offline strategies that se in the decision process a prior knowledge of packet arrivals and readiness states at all (inclding ftre) slots. DEFINITION 2. A reward for a packet is the nmber of receivers that receive the packet sccessflly. DEFINITION 3. System throghpt is the expected reward per nit time. DEFINITION 4. The packet loss at a receiver is the fraction of transmitted packets that are either not received or received in error at the receiver. The system loss is the sm of the packet losses at all the receivers in the mlticast grop. DEFINITION 5. A system is said to be stable if the mean qee length is bonded. Frther, a transmission policy that stabilizes the system is called a stable policy. Note that for any stable policy the packet departre rate is eqal to the arrival rate.
6 ( 3 ' DEFINITION 6. A stable transmission policy is called -throghpt We show that is -throghpt optimal nder some additional assmptions on the readiness process. We assme that optimal if no other stable transmission policy can achieve throghpt more than pls the throghpt nder. the readiness process is an irredcible, aperiodic and time homogeneos Markov Chain (MC) with arbitrary transition probabilities. The state of the MC is the & dimensional vector DEFINITION 7. The bsy slots are the slots in which the sender s qee is non-empty. '+*' ' - that represents the readiness state. Note that the DEFINITION 8. A policy belongs to the class of generalized threshold policies, if it sets threshold & in every bsy slot based on arbitrary rles and then transmits a packet only when the sender and or more receivers are ready. The threshold may be selected based on past, present and ftre arrivals and readiness states. We note that for any transmission policy, there exists a generalized threshold policy that transmits in the same slots as. This can be seen as follows. Let, sing certain rles, select slots, in which it transmits. Consider a generalized threshold policy that comptes slots, sing the same rle as and sets threshold in these slots. In the remaining bsy slots, sets threshold &. Ths, and transmit in the same slots. Hence, it is sfficient to consider only generalized threshold policies. In the following lemma, we provide a sfficient condition for a generalized threshold policy to be -throghpt optimal. Let denote the nmber of bsy slots in which threshold is chosen till time nder a generalized threshold policy. Note that it is not necessary to select a threshold when qee length is zero, as a packet cannot be transmitted in this case. LEMMA 1. For any, a stable generalized threshold policy is -throghpt optimal w.p. 1 if the following condition holds for some threshold. &. 3 & w.p. 1 (1) Lemma 1 does not show how to design an -throghpt optimal policy. Nevertheless it is a sefl tool as it provides a sfficient condition to establish the -throghpt optimality of a stable generalized threshold policy. The tility of the lemma is similar to that of a lyapnov fnction. Recall that a sfficient condition for a policy to be stable is the existence of a lyapnov fnction with negative drift. Bt this sfficient condition does not in general show how to design a stable policy. In the next section, we design an adaptive transmission policy that satisfies condition (1) and hence is -throghpt optimal. 3. THROUGHPUT OPTIMAL TRANSMIS- SION POLICY ( ) We describe a parameterized transmission policy, that we prove to be -throghpt optimal. The policy selects a threshold vale based on the qee length at the sender in each slot. A packet is transmitted if (a) the sender is ready to transmit, (b) the nmber of ready receivers is greater than or eqal to the threshold and (c) the sender has a packet to transmit. The threshold vales are selected as follows. Let denote the qee length at the sender and let be some fixed positive integer. For )&, the threshold is if & & and threshold is if &. Ths, the threshold vale increases with decrease in qee length. The policy does not select a threshold when qee length is zero. MC has a finite nmber of states, since '.2 for every / &. Since we do not impose any restriction on the transition probabilities of the markov chain, the chain can captre the correlations of the sender s and the receiver s readiness states in the same and different time slots. Figre 3 shows how sch correlations arise in practice. Let denote the niqe steady state probability that the sender is ready to transmit and! receivers are ready to receive. Let denote the nmber of slots till time in which the sender and! receivers are ready. Now, by stationarity and ergodicity of the readiness process 3 " w.p. 1 (2) In general, from ergodicity we cannot conclde anything abot the to #&% rate of convergence of the empirical distribtion 3 3' the stationary distribtion. Bt for finite, aperiodic MC s, empirical distribtion converges to the steady state distribtion exponentially fast [3, 21]. We se this exponential convergence to prove the optimality of. The optimality of holds for any stationary and ergodic stochastic process that has the exponential convergence property. *) %+ '. Let the The throghpt of policy is denoted as ( maximm throghpt attained by a stable policy be (-,. 3 the following reslt in the appendix. THEOREM 1. If the arrival rate. We prove is less than the steady state probability that the sender is ready (/ * 1 ), then for any given there exists 2 sch that *) is -throghpt optimal for every 32. Formally, (4,. 3 5( %+ ' " w.p. 1. Frther, no policy is stable if /6 *. Note that the above reslt implies that any stable off-line policy that takes transmission decisions based on the knowledge of past, present and ftre arrivals and readiness states can not at- *) tain throghpt more than ( %+ '. This holds even thogh takes transmission decisions based on only the crrent packet availability and the crrent nmber of ready receivers. The intition behind the reslt is as follows. Consider a policy that selects the same threshold in every slot. The expected reward is a monotonically increasing fnction of the threshold. Hence a throghpt optimal policy shold select the largest threshold that stabilizes the system. This threshold mst satisfy 7 ) " 7 ) (3) The throghpt can be frther improved by appropriately randomizing between the threshold vales and. The randomization shold be sch that the system remains stable. This is the basic idea behind the design of the static optimm policy [6]. Intitively an adaptive optimm policy shold select the thresholds and most of the time. The difficlty, however, is that and s are not known, and ths cannot be compted. Now, we explain why will select the thresholds and most of the time. From (3), the rate at which slots with 8 or
7 more ready receivers arrive is more than the packet arrival rate, for every 8. On the other hand, for 8 the rate at which the samples with 8 or more ready receivers arrive is smaller than. This implies that for threshold vales greater than or eqal to, i.e., when &, the qee length process has a positive drift and as a reslt the qee length increases, and conseqently the threshold decreases. On the other hand for threshold vales less than or eqal to, i.e., when &, the qee length process has a negative drift and hence qee length decreases, and the threshold increases. Hence we observe that are selected when is large enogh the thresholds and! most of the time. Recall that a packet is lost at a receiver if the receiver is not ready at the time of transmission. The MAC protocol we propose may transmit a packet even when some of the receivers are not ready, and is therefore nreliable. Bt, wireless is an inherently nreliable medim. Ths, it is a standard practice to se a reliable transport layer strategy to retrieve the information lost at the MAC layer. Several existing MAC strategies for mlticast in adhoc networks, like broadcast based mlticast and threshold-1 mlticast are nreliable as well. Fortnately, several reliable transport layer schemes have been proposed specifically for wireless mlticast transmissions, which can be sed in conjnction with any MAC layer strategy [4, 17]. Bt, the efficiency of these schemes is severely impaired when the packet loss at the MAC layer is high. Or focs is to minimize the packet loss sbject to resorce limitations in the network. Now, there wold not be any loss if a packet is transmitted only when all the receivers are ready, bt then as discssed before, the system may become nstable. Note that stability is essential as otherwise the qee lengths at the sender wold be nbonded leading to nbonded delays. Ths or objective is to se a transmission policy that minimizes the packet loss among all stable policies. The next theorem shows that achieves this objective. THEOREM 2. If is ( )-throghpt optimal, then no sta- mi- ble policy can achieve loss smaller than the loss nder ns for any given. Assme that the system is stable. The system loss is &, where is the average reward received by the policy per packet. Ths, we need to maximize the mean reward in order to minimize the system loss. The throghpt of a transmission policy is. Ths, a throghpt optimal policy maximizes and therefore minimizes the system loss sbject to system stability. Since is throghpt optimal, it minimizes the loss. From Theorem 2, if the system loss for is more than that the system can tolerate, then the reqired loss constraint can not be garanteed by any stable transmission policy. Since stability is essential, the resorces available in this case are not enogh to deliver the reqired QoS, and other measres sch as admission control mst be resorted to. This is beyond the scope of this paper. Henceforth we do not consider loss explicitly. The vale of 2 depends on the system parameters. However, since optimality of that is similar to except that it trans- selects threshold if & &) for and threshold 1 if &. Now, s and s is garanteed for all large only a rogh estimate of 2 is necessary. Simlations show that the optimality is attained for modest vales of. If the qee length is greater than & then has threshold and can therefore transmit a packet even when no receiver is ready; bt, in this case, the transmission is seless. So, we consider a policy mits only when at least one receiver is ready. Now, transmission rles are the same once the thresholds are selected. DEFINITION 9. is a class of policies that transmit a packet only when the sender and at least one receiver is ready, and the sender has a packet to transmit. Note that the broadcast policy is not in there THEOREM 3. If!3/6, then for any given exists sch that is -throghpt optimal for every 2. Frthermore, if /6, then no policy in is stable. The intition for Theorem 3 is similar to that for Theorem 1. The policy and provide comptationally simple transmission rles. The sender only needs the nmber of ready receivers and need not know which particlar receivers are ready. This simplifies the protocol design problem. 4. MAC LAYER PROTOCOL The optimal decision rle is based on the sender s qee length, its readiness state, and the nmber of ready receivers. The sender is ready if it is not backing off, and none of its neighbors is receiving a packet. We explore varios possible approaches to inform the sender abot the nmber of ready receivers and transmissions in its neighborhood. First we present the system challenges experienced by the existing IEEE hand-shakes in case of mltiple receivers. Recall that IEEE ses RTS-CTS-DATA-ACK handshake for commnication. The handshake works well if the sender transmits to only one receiver. If all the nodes in a mlticast grop send CTS simltaneosly in response to a RTS from a sender, then these CTS messages will collide at the sender. Hence, the sender will not know whether the receivers are ready. If the sender knew that the colliding messages were CTS responses from the receivers, then the sender can infer the nmber of ready receivers by measring the power. Power is additive and power information is not destroyed even dring collision. Bt the power measrement does not solve the problem entirely becase of the following reasons. The CTS message conveys the dration of the data transfer, so that the neighboring nodes can defer their transmissions. This is no longer possible if CTS collides and hence data packets collide with other transmissions in the neighborhood. Similar problems exist for ACK transmission. We propose to se a bsy-tone based scheme [28]. The available bandwidth is divided into two channels (a) a message channel and (b) a bsy-tone channel. A sender initiates a data transfer by sending an RTS message on the message channel. After receiving RTS, all the receivers in the mlticast grop that are ready to receive send a bsy-tone. This bsy-tone acts as a CTS message. A sender estimates the nmber of ready receivers by measring the power of the bsy-tone signal. The total received power can be measred sing standard circits [18]. If this estimate is greater than a threshold vale, the sender transmits the data packet. Receivers transmit the bsy tone ntil the packet transmission is complete. Bsy-tone does not interfere with the data transmission as both are on different freqency bands. Neighboring nodes defer their transmission till the
8 Procedre MAC at Sender() begin /* refers to the crrent vale of contention window */ /* and refer to the minimm and the maximm vales for respectively*/ When a packet arrives from a higher layer, then do the following Enqee the packet in the MAC layer bffer; qee length = qee length + 1; Compte threshold based on the qee length as described in Section 3; if (qee length = 1) then /*if the sender s qee was empty before the arrival*/ ; Choose an integer niformly from ; Set back-off timer for time dration! #"!%'&("*) ; When the back-off timer expires do the following if (data or bsy tone channel is not idle) then /* the sender is not ready */,+.-/ ; Choose an integer niformly from ; Set back-off timer for time dration! #"!%'&("*) ; else /* the sender is ready */ Send RTS packet; Measre the power on bsy tone channel; Estimate the nmber of ready receivers based on the measred bsy tone power; if (The estimate 78 ) then 5+.-/12 43,9 ; Choose an integer niformly from ; Set back-off timer for time dration :;< #" <%'&("*) ; else Transmit data packet; end qee length = qee length - 1; Compte threshold based on the qee length as described in Section 3; if (qee length = ) then > ; Choose an integer niformly from 9? ; Set back-off timer for time #"!%A&("*) ; Figre 4: Psedo code describes the bsy tone based MAC layer protocol at the sender. bsy-tone stops. If the decision is not to transmit, then the sender transmits a release signal and backs-off for a random interval. The back-off intervals are independent and niformly distribted. The receivers stop emitting the bsy tone once they receive the release signal. Refer to Figres 4 and 5 for psedo code. The sender can infer the nmber of ready receivers from the received bsy-tone power only if the received power levels are the same for all the receivers. This is not possible withot any power reglation as the receivers are at different distances from the sender ( near-far effect ). If all the receivers know their distances from the sender, then they can reglate the power so that the bsy tones from all the receivers reach the sender at the same power level. The receivers can estimate their distances from the power level of the received RTS, assming that all the senders transmit at the same power. By providing nambigos and instantaneos feedback, the bsy tone scheme solves the problems originating from CTS and ACK Procedre MAC at Receiver() begin When RTS intended for the receiver is received do the following if (Bsy tone and data channels are idle) then Pt p a bsy tone and wait for data packet; Set RcvTimer for the dration eqals to for times maximm propagation delay; if (Data packet begins to arrive before RcvTimer expires) then Receive the data packet and pass it to the higher layer; Stop the bsy tone; else Stop the bsy tone; end Figre 5: Psedo code describes the bsy tone based MAC layer protocol at the receiver. collisions in IEEE based mlticast schemes. The limitations of the bsy tone scheme are the following. (1) The scheme is not totally compatible with IEEE 82.11, thogh it works on the same philosophy. Hence the implementation of this scheme will need protocol changes. Bt some other recent papers have advocated bsy tone based schemes as well [9, 14, 22]. (2) Accrate power control and power measrement are difficlt in practice. Hence, the sender s estimate of the nmber of ready receivers may not be accrate. Using simlations, we have verified that the proposed optimal policy is robst, i.e., its throghpt is close to optimal even in presence of the estimation errors (Figre 9). Frther, ftre extensions for IEEE are likely to spport power control and power measrement fnctionalities [1]. We have also proposed an agmentation of IEEE protocol to implement [7]. The MAC protocol in [7] does not need any power measrement and control fnctionalities. (3) The receivers power consmption increase de to the transmission of bsy tone throghot the data transmission. (4) The receivers need to transmit a bsy tone signal while receiving the data. Ths, two radios are reqired at the receivers. Most of the crrent wireless appliances have a single radio and hence continos transmission of the bsy tone while receiving data may not be feasible. The problems (3) and (4) can be addressed with an additional bsy tone channel [9]. On one bsy tone channel, receivers can send a short brst of signal indicating CTS message, and on the other bsy tone channel receivers can send a short brst indicating ACK. All the nodes in the neighborhood will not initiate any commnication till they receive ACK bsy tone for every CTS bsy tone they received. 5. SIMULATION RESULTS AND DISCUSSION We have proved that is -throghpt optimal, when the readiness states are Markovian. We examine the application layer throghpt in a wireless network with several nicast and mlticast sessions when every sender ses, and the readiness states are generated de to packet transmissions. The simlation reslts sbstantiate the claim that attains significantly higher throghpt than the other existing policies. Using ns-2, we simlate the performance of and the other existing mlticast policies like broadcast based mlticast, nicast based mlticast and threshold-1 mlticast. In [2], we describe how
9 7 U7 6 8 U6 m 7 U8 m m 6 8 U5 m5 M m 3 U 3 3 m U U 4 m m 2 4 U U7 U6 6 m6 m 7 7 m 8 8 U8 U5 5 U4 m 5 4 m4 m 3 M U m m1 2 1 U1 U2 (a) Topology 1 (b) Topology 2 Figre 6: We evalate the the performance of varios mlticast strategies in Topologies 1 and 2. Each topology has a mlticast session with sender and 8 receivers 8 to 8 and 8 nicast sessions. Unicast session has sender and receiver!,. The difference between the topologies 1 and 2 is that the nicast receivers! s are not in the transmission range of in topology 1, while they are in the transmission range of in topology 2. we implement these policies in ns-2. We have not compared the performance of with that of the MAC policies proposed for wireless LANs, e.g. [12], becase they can only be sed in the scenario where a single node is in the transmission range of all other nodes in the network. This assmption does not hold in adhoc networks. 5.1 Simlation Scenario We se UDP at the transport layer. We do not se TCP, as the interaction between TCP and wireless MAC is not well nderstood and hence the topic of research even for nicast sessions [1]. We measre the throghpt of a receiver as the nmber of packets it receives sccessflly per nit time, and the throghpt of a session as the sm of the throghpts of its receivers. We consider a time interval of 5 seconds. The choice of the channel capacity scales the throghpt of all the policies by a factor of. We select 1 Mbps. The RTS packet has 44 bytes. The length of a slot is 2 s and the maximm propagation delay is 2 s. We se the bsy tone based approach described in Section 4 (Figre 4 and 5) to implement and threshold-1 mlticast. We consider sample topologies shown in Figre 6. In both the topologies, we assme that the nicast sender generates packets at rate and the mlticast sender generates packets at rate. The packet arrival process is Poisson. The packets arriving at have length 552 bytes, while those arriving at have length 53 bytes. For larger packet sizes at nicast sessions the reslts differ only in magnitde, bt the trends remain the same. Frther, stability region of the mlticast session is small when the packet size for nicast sessions is large. We, however, stdy the impact of high network load on the mlticast session by increasing (Figres 1 and 11). Now we discss how the packet transmissions generate readiness states in topologies 1 and 2. In topologies 1 and 2, for every, is ready when it is not backing off and 8 is not generating bsy tone. Also, 8 is ready when is not transmitting a packet to!. In topology 1, is not ready when it backs off, while! is always ready. In topology 2, is not ready and when some! is generating bsy tone. Frther, none of the nicast receivers are ready when is transmitting. 5.2 Discssion on Simlation Reslts We have proved that any stable policy that selects any two consective thresholds and ( & ) most of the time maximizes throghpt as long as the readiness states are ergodic (Lemma 1). The readiness states are likely to be stationary and ergodic even when they are generated by packet transmissions. We needed the additional assmption that the readiness states are Markovian to show that chooses two consective thresholds most of the time. Figre 7(a) shows that selects two consective thresholds most of the time even when the readiness states are generated by packet transmissions. This validates the optimality reslt. Now, Theorem 1 garantees that wold select two consective thresholds most of the time only when is sfficiently large. The observation in Figre 7(b) that freqently selects more than three thresholds for low vales of frther validates the theorem. Also, Figre 8 shows that as increases the throghpt of the mlticast session nder converges to optimm vale. Now, we compare the throghpt of the mlticast session in topologies 1 and 2 nder with that nder broadcast based mlticast, threshold-1 mlticast and nicast based mlticast policies. We observe that achieves mch higher throghpt than the other existing policies in both the topologies (Figres 1 and 11). We next explain the performance difference. The broadcast based mlticast scheme does not exchange any hand shake messages, and ths cases freqent data packet collisions. Ths, the reward per packet is low reslting in low system throghpt. Threshold-1 policy exchanges hand-shake messages and avoids the data packet collisions. As a reslt, this policy provides mch better throghpt than broadcast based mlticast policy. The limitation of this scheme is that the threshold is always 1, and hence the policy may transmit even when only a few receivers are ready. The policy otperforms these policies as it prevents data packet collisions by exchanging hand-shake massages,
10 1 Histogram for the Fraction of Time Each Threshold is Chosen 1 Histogram for the Fraction of Time Each Threshold is Chosen 8 8 Fraction of time (%) 6 4 Fraction of time (%) Threshold Vale Threshold Vale (a) (b) Figre 7: Figres (a) and (b) plot the fraction of time each threshold is chosen by in topology 1 for eqal to 25 and 2, respectively. Here, 5 packets/sec and 5 packets/sec. and it also prevents transmission when only a few receivers are ready by choosing an appropriate threshold vale. The nicast based mlticast policy ses separate transmissions to reach different members of the mlticast grop even when they can be reached sing a single transmission. Hence, the total nmber of packets transmitted nder this policy is mch smaller than that nder other policies. This reslts in low throghpt. From Figres 1(b) and 11(b), we observe that the throghpt gain of over the nicast based mlticast policy increases with increase in. This is becase the stability region of the nicast policy is small, and hence the throghpt of the policy satrates even for small vales of (Figres 1(a) and 11(a)). On the other hand, has large stability region. Now, transmits packets per second in its stability region, and this nmber nmber increases with increase in. As increases the threshold chosen by may decrease in order to maintain the system stability. Hence the reward per packet nder may redce. Bt this decrease is compensated by the increase in the nmber of packets transmitted per nit time, which also explains increases the non-linear increase in throghpt for as (Figres 1(a) and 11(a)). Now, the throghpt gain of over threshold-1 and broadcast based mlticast policies decreases with the increase in. This is becase as increases the thresholds chosen by decreases, becomes closer to 1. Ths the difference between the throghpt of and threshold-1 and broadcast based mlticast policy decreases. Hence the gain also decreases. From Figres 1(e) and 11(e), we observe that as increases the throghpt gain of over all the existing policies increases. This is becase for small vales of, the fraction of slots in which the nicast senders transmit a packet is small. Hence the mlticast receivers are ready most of the time reslting in a large reward per transmission nder all the policies. Ths, the choice of threshold does not affect the throghpt. Bt for higher vales of, large nmber of mlticast receivers are ready only in a small fraction of slots. Unlike other policies transmits only in these slots de to an appropriate selection of threshold. Hence the s throghpt gain increases with increase in. We also stdy the throghpt of in topology 1, when makes errors in estimating the nmber of ready receivers. We consider binomial errors and plot s throghpt for varios vales of the variance in Figre 9. Simlation reslts show that the throghpt of mlticast session nder decreases only marginally when the estimate is erroneos. The difference between s throghpt withot estimation errors and with estimation errors increases as increases. Frthermore, the decreased throghpt is still significantly higher than that of the other existing policies (Figre 9). Figres 1(c) and 11(c) show that in both the topologies the throghpt of nicast sessions is similar to or higher than that nder any other the policy. Ths, increases the throghpt of the mlticast session by sending more packets when the nicast sessions are not transmitting and not by decreasing the throghpt of the nicast sessions. Now, we explain why the difference between the throghpts nder threshold-1 policy and is small for all vales of in topology 2 (Figre 11(a)). Recall that in topology 2, and 8 are not ready when! is generating a bsy tone. Ths, when is ready, all the mlticast receivers are also ready. Hence, the reward per packet shold be 8 irrespective of the choice of threshold. In other words, and threshold-1 mlticast policy shold achieve the same throghpt. The throghpt vales differ by a small amont becase of the collision of RTS messages from and at 8. In this case, 8 will not pt a bsy tone, and it will not receive the data packet even if decides to transmit. Since chooses an appropriate threshold vale, it may not transmit when 8" does not pt p a bsy tone, and ths nlike threshold-1 mlticast policy which always has threshold 1, avoids packet loss at 8!. We note that this is an extreme case, and in general provides a significant throghpt gain over threshold-1 mlticast, e.g. Figre 1(b).
11 DISCUSSION We have designed a policy which is throghpt opti- is adaptive, and mal constrained to stability. The policy takes transmission decisions based only on the qee length at the sender and the receiver readiness states in the crrent slot. Hence, can be implemented in distribted settings. The optimality of also holds nder the following more general scenarios than that considered here. The analytical framework can be generalized to allow three or more readiness states for each receiver. Optimality of holds even when the readiness process is an irredcible, aperiodic, time-homogeneos discrete time markov chain with ' 2 states where the / th state is ( ' 2 - ' 2 is the probability of error-free reception of a packet at the th receiver in the / th state. Recall that earlier ' 2 Ths, the optimality of holds nder a more general fading model. We have considered packets of nit lengths. The optimality of holds for iid packet lengths. Lemma 1 holds for any stationary and ergodic receiver readiness process (not necessarily markovian). Also, Theorems 1 and 3 hold for any stationary and ergodic readiness process for which the empirical distribtion converges to the stationary distribtion at exponential rate. Now, let s examine the featres that are not captred by the analytical model proposed here. In the analytical model, we assme that the receiver readiness process cannot be controlled, and then the throghpt for a mlticast session is maximized constrained to stability nder the given readiness process. This approach is jstified if the senders do not coordinate with each other explicitly to decide transmission schedle. The following example shows that by appropriately coordinating the transmissions, it is possible to control the receiver readiness process and thereby achieve better throghpt. Example: Consider topology 1 in Figre 6(a). Let arrival rate at a nicast sender be for every and for small. Also, let arrival rate at the mlticast sender be. Note that simltaneos transmissions from all the nicast senders can be received correctly at their respective receivers. In this scenario, the throghpt is maximized if s coordinate among each other so as to transmit only in odd slots, i.e., in slots and transmits only in even slots, i.e., in slots. Here, s throghpt is &. Observe that s throghpt may be less than & if s do not coordinate, e.g., if transmits in slots for each and, then in most of the slots only &# (and not & ) recievers will be ready. Ths, s throghpt will be & approximately. Designing a coordination among different senders typically leads to centralized schedling schemes. For example, Tassilas et al. have proposed a centralized algorithm for determining the optimal coordination for maximizing throghpt in nicast wireless networks [27]. Since we are interested in a distribted implementation, we do not consider explicit coordination among senders. Throghpt (packets/sec) Throghpt of the Mlticast Session as a Fnction of Qee Theshold Qee Threshold Figre 8: We plot the throghpt of the mlticast session nder as a fnction of in topology 1. Here, + packets/sec and packets/sec. The parameter is referred as qee threshold in the figre Topology 1: Throghpt of Mlticast Session nder Varios Policies Error Varience v = 1 Error Varience v = 3 Error Varience v = Arrival Rate at Mlticast Senders (packets/s) Figre 9: We plot the performance of when the mlticast sender makes random error in estimating the nmber of ready receivers at time. We assme that is binomial random variable with mean and variance, and is positive with probability 1/2. 7. CONCLUSION Maximizing the performance metrics in wireless mlticast presents challenges that are not encontered in wireless nicast or wireline mlticast networks. For example, a transmission policy that maximizes the stability region of the network need not maximize the network throghpt. The objective therefore is to maximize throghpt sbject to attaining system stability. We consider a single mlticast session, and model its interactions with the rest of the network sing stochastic readiness states. We present a sfficient condition that can be sed to establish the throghpt optimality of a stable transmission policy. We sbseqently design an adaptive stable policy that allows a sender to decide when to transmit sing simple comptations based only on its local information sch as its qee length, its readiness state and the nmber of ready receivers, and withot sing any information abot the network statistics. The proposed policy attains the same throghpt as the optimal offline stable policy that ses in its decision process past, present, and even
The Disciplined Flood Protocol in Sensor Networks
The Disciplined Flood Protocol in Sensor Networks Yong-ri Choi and Mohamed G. Goda Department of Compter Sciences The University of Texas at Astin, U.S.A. fyrchoi, godag@cs.texas.ed Hssein M. Abdel-Wahab
More informationCautionary Aspects of Cross Layer Design: Context, Architecture and Interactions
Cationary Aspects of Cross Layer Design: Context, Architectre and Interactions Vikas Kawadia and P. R. Kmar Dept. of Electrical and Compter Engineering, and Coordinated Science Lab University of Illinois,
More informationIEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 6, NO. 5, MAY On the Analysis of the Bluetooth Time Division Duplex Mechanism
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 6, NO. 5, MAY 2007 1 On the Analysis of the Bletooth Time Division Dplex Mechanism Gil Zssman Member, IEEE, Adrian Segall Fellow, IEEE, and Uri Yechiali
More informationREPLICATION IN BANDWIDTH-SYMMETRIC BITTORRENT NETWORKS. M. Meulpolder, D.H.J. Epema, H.J. Sips
REPLICATION IN BANDWIDTH-SYMMETRIC BITTORRENT NETWORKS M. Melpolder, D.H.J. Epema, H.J. Sips Parallel and Distribted Systems Grop Department of Compter Science, Delft University of Technology, the Netherlands
More informationOn the Computational Complexity and Effectiveness of N-hub Shortest-Path Routing
1 On the Comptational Complexity and Effectiveness of N-hb Shortest-Path Roting Reven Cohen Gabi Nakibli Dept. of Compter Sciences Technion Israel Abstract In this paper we stdy the comptational complexity
More informationWireless Multicast: Theory and Approaches
University of Pennsylvania ScholarlyCommons Departmental Papers (ESE) Department of Electrical & Systems Engineering June 2005 Wireless Multicast: Theory Approaches Prasanna Chaporkar University of Pennsylvania
More informationPipelined van Emde Boas Tree: Algorithms, Analysis, and Applications
This fll text paper was peer reviewed at the direction of IEEE Commnications Society sbject matter experts for pblication in the IEEE INFOCOM 007 proceedings Pipelined van Emde Boas Tree: Algorithms, Analysis,
More informationCost Based Local Forwarding Transmission Schemes for Two-hop Cellular Networks
Cost Based Local Forwarding Transmission Schemes for Two-hop Celllar Networks Zhenggang Zhao, Xming Fang, Yan Long, Xiaopeng H, Ye Zhao Key Lab of Information Coding & Transmission Sothwest Jiaotong University,
More informationThe Impact of Avatar Mobility on Distributed Server Assignment for Delivering Mobile Immersive Communication Environment
This fll text paper was peer reviewed at the direction of IEEE Commnications Society sbject matter experts for pblication in the ICC 27 proceedings. The Impact of Avatar Mobility on Distribted Server Assignment
More informationBroadcasting XORs: On the Application of Network Coding in Access Point-to-Multipoint Networks
Broadcasting XORs: On the Application of Network Coding in Access Point-to-Mltipoint Networks The MIT Faclty has made this article openly available Please share how this access benefits yo Yor story matters
More informationEvaluating Influence Diagrams
Evalating Inflence Diagrams Where we ve been and where we re going Mark Crowley Department of Compter Science University of British Colmbia crowley@cs.bc.ca Agst 31, 2004 Abstract In this paper we will
More informationCollision Avoidance and Resolution Multiple Access: First-Success Protocols
Collision Avoidance and Resoltion Mltiple Access: First-Sccess Protocols Rodrigo Garcés and J.J. Garcia-Lna-Aceves askin Center for Compter Engineering and Information Sciences University of California
More informationTdb: A Source-level Debugger for Dynamically Translated Programs
Tdb: A Sorce-level Debgger for Dynamically Translated Programs Naveen Kmar, Brce R. Childers, and Mary Lo Soffa Department of Compter Science University of Pittsbrgh Pittsbrgh, Pennsylvania 15260 {naveen,
More informationLecture 4: Routing. CSE 222A: Computer Communication Networks Alex C. Snoeren. Thanks: Amin Vahdat
Lectre 4: Roting CSE 222A: Compter Commnication Networks Alex C. Snoeren Thanks: Amin Vahdat Lectre 4 Overview Pop qiz Paxon 95 discssion Brief intro to overlay and active networking 2 End-to-End Roting
More informationIP Multicast Fault Recovery in PIM over OSPF
1 IP Mlticast Falt Recovery in PIM over OSPF Abstract Relatively little attention has been given to nderstanding the falt recovery characteristics and performance tning of native IP mlticast networks.
More informationConstructing Multiple Light Multicast Trees in WDM Optical Networks
Constrcting Mltiple Light Mlticast Trees in WDM Optical Networks Weifa Liang Department of Compter Science Astralian National University Canberra ACT 0200 Astralia wliang@csaneda Abstract Mlticast roting
More informationReal-time mean-shift based tracker for thermal vision systems
9 th International Conference on Qantitative InfraRed Thermography Jly -5, 008, Krakow - Poland Real-time mean-shift based tracker for thermal vision systems G. Bieszczad* T. Sosnowski** * Military University
More informationConstructing and Comparing User Mobility Profiles for Location-based Services
Constrcting and Comparing User Mobility Profiles for Location-based Services Xihi Chen Interdisciplinary Centre for Secrity, Reliability and Trst, University of Lxemborg Jn Pang Compter Science and Commnications,
More informationSubgraph Matching with Set Similarity in a Large Graph Database
1 Sbgraph Matching with Set Similarity in a Large Graph Database Liang Hong, Lei Zo, Xiang Lian, Philip S. Y Abstract In real-world graphs sch as social networks, Semantic Web and biological networks,
More informationMillimeter-Wave Multi-Hop Wireless Backhauling for 5G Cellular Networks
2017 IEEE 85th Vehiclar Technology Conference (VTC-Spring) Millimeter-Wave Mlti-Hop Wireless Backhaling for 5G Celllar Networks B. P. S. Sahoo, Chn-Han Yao, and Hng-Y Wei Gradate Institte of Electrical
More informationIoT-Cloud Service Optimization in Next Generation Smart Environments
1 IoT-Clod Service Optimization in Next Generation Smart Environments Marc Barcelo, Alejandro Correa, Jaime Llorca, Antonia M. Tlino, Jose Lopez Vicario, Antoni Morell Universidad Atonoma de Barcelona,
More informationSTABILITY OF SIMULTANEOUS RECURRENT NEURAL NETWORK DYNAMICS FOR STATIC OPTIMIZATION
STABILITY OF SIMULTANEOUS RECURRENT NEURAL NETWOR DYNAMICS FOR STATIC OPTIMIZATION Grsel Serpen and Yifeng X Electrical Engineering and Compter Science Department, The University of Toledo, Toledo, OH
More informationFault Tolerance in Hypercubes
Falt Tolerance in Hypercbes Shobana Balakrishnan, Füsn Özgüner, and Baback A. Izadi Department of Electrical Engineering, The Ohio State University, Colmbs, OH 40, USA Abstract: This paper describes different
More information5 Performance Evaluation
5 Performance Evalation his chapter evalates the performance of the compared to the MIP, and FMIP individal performances. We stdy the packet loss and the latency to restore the downstream and pstream of
More informationMinimal Edge Addition for Network Controllability
This article has been accepted for pblication in a ftre isse of this jornal, bt has not been flly edited. Content may change prior to final pblication. Citation information: DOI 10.1109/TCNS.2018.2814841,
More informationNetworks An introduction to microcomputer networking concepts
Behavior Research Methods& Instrmentation 1978, Vol 10 (4),522-526 Networks An introdction to microcompter networking concepts RALPH WALLACE and RICHARD N. JOHNSON GA TX, Chicago, Illinois60648 and JAMES
More informationCongestion-adaptive Data Collection with Accuracy Guarantee in Cyber-Physical Systems
Congestion-adaptive Data Collection with Accracy Garantee in Cyber-Physical Systems Nematollah Iri, Lei Y, Haiying Shen, Gregori Calfield Department of Electrical and Compter Engineering, Clemson University,
More informationTopic Continuity for Web Document Categorization and Ranking
Topic Continity for Web ocment Categorization and Ranking B. L. Narayan, C. A. Mrthy and Sankar. Pal Machine Intelligence Unit, Indian Statistical Institte, 03, B. T. Road, olkata - 70008, India. E-mail:
More informationEfficient and Accurate Delaunay Triangulation Protocols under Churn
Efficient and Accrate Delanay Trianglation Protocols nder Chrn Dong-Yong Lee and Simon S. Lam Department of Compter Sciences The University of Texas at Astin {dylee, lam}@cs.texas.ed November 9, 2007 Technical
More informationA sufficient condition for spiral cone beam long object imaging via backprojection
A sfficient condition for spiral cone beam long object imaging via backprojection K. C. Tam Siemens Corporate Research, Inc., Princeton, NJ, USA Abstract The response of a point object in cone beam spiral
More informationMaximal Cliques in Unit Disk Graphs: Polynomial Approximation
Maximal Cliqes in Unit Disk Graphs: Polynomial Approximation Rajarshi Gpta, Jean Walrand, Oliier Goldschmidt 2 Department of Electrical Engineering and Compter Science Uniersity of California, Berkeley,
More informationDiscrete Cost Multicommodity Network Optimization Problems and Exact Solution Methods
Annals of Operations Research 106, 19 46, 2001 2002 Klwer Academic Pblishers. Manfactred in The Netherlands. Discrete Cost Mlticommodity Network Optimization Problems and Exact Soltion Methods MICHEL MINOUX
More informationDate: December 5, 1999 Dist'n: T1E1.4
12/4/99 1 T1E14/99-559 Project: T1E14: VDSL Title: Vectored VDSL (99-559) Contact: J Cioffi, G Ginis, W Y Dept of EE, Stanford U, Stanford, CA 945 Cioffi@stanforded, 1-65-723-215, F: 1-65-724-3652 Date:
More informationMaximum Weight Independent Sets in an Infinite Plane
Maximm Weight Independent Sets in an Infinite Plane Jarno Nosiainen, Jorma Virtamo, Pasi Lassila jarno.nosiainen@tkk.fi, jorma.virtamo@tkk.fi, pasi.lassila@tkk.fi Department of Commnications and Networking
More informationA Wireless MAC Protocol comparison.
Doc: IEEE P82.1192S1 IEEE 82.11 Wireless Access Method and Physical Layer Specifications Title: Presented by: A Wireless MAC Protocol comparison. Wim Diepstraten NCR SEUtrecht NCRAT&T Network Prodct Grop
More informationLecture 13: Traffic Engineering
Lectre 13: Traffic Engineering CSE 222A: Compter Commnication Networks Alex C. Snoeren Thanks: Mike Freedman, Nick Feamster, and Ming Zhang Lectre 13 Overview Dealing with mltiple paths Mltihoming Entact
More informationCOMPOSITION OF STABLE SET POLYHEDRA
COMPOSITION OF STABLE SET POLYHEDRA Benjamin McClosky and Illya V. Hicks Department of Comptational and Applied Mathematics Rice University November 30, 2007 Abstract Barahona and Mahjob fond a defining
More informationA Hybrid Weight-Based Clustering Algorithm for Wireless Sensor Networks
Open Access Library Jornal A Hybrid Weight-Based Clstering Algorithm for Wireless Sensor Networks Cheikh Sidy Mohamed Cisse, Cheikh Sarr * Faclty of Science and Technology, University of Thies, Thies,
More informationDiscretized Approximations for POMDP with Average Cost
Discretized Approximations for POMDP with Average Cost Hizhen Y Lab for Information and Decisions EECS Dept., MIT Cambridge, MA 0239 Dimitri P. Bertsekas Lab for Information and Decisions EECS Dept., MIT
More informationAlliances and Bisection Width for Planar Graphs
Alliances and Bisection Width for Planar Graphs Martin Olsen 1 and Morten Revsbæk 1 AU Herning Aarhs University, Denmark. martino@hih.a.dk MADAGO, Department of Compter Science Aarhs University, Denmark.
More informationEfficient Scheduling for Periodic Aggregation Queries in Multihop Sensor Networks
1 Efficient Schedling for Periodic Aggregation Qeries in Mltihop Sensor Networks XiaoHa X, Shaojie Tang, Member, IEEE, XiangYang Li, Senior Member, IEEE Abstract In this work, we stdy periodic qery schedling
More informationStaCo: Stackelberg-based Coverage Approach in Robotic Swarms
Maastricht University Department of Knowledge Engineering Technical Report No.:... : Stackelberg-based Coverage Approach in Robotic Swarms Kateřina Staňková, Bijan Ranjbar-Sahraei, Gerhard Weiss, Karl
More informationNETWORK PRESERVATION THROUGH A TOPOLOGY CONTROL ALGORITHM FOR WIRELESS MESH NETWORKS
ETWORK PRESERVATIO THROUGH A TOPOLOGY COTROL ALGORITHM FOR WIRELESS MESH ETWORKS F. O. Aron, T. O. Olwal, A. Krien, Y. Hamam Tshwane University of Technology, Pretoria, Soth Africa. Dept of the French
More informationA choice relation framework for supporting category-partition test case generation
Title A choice relation framework for spporting category-partition test case generation Athor(s) Chen, TY; Poon, PL; Tse, TH Citation Ieee Transactions On Software Engineering, 2003, v. 29 n. 7, p. 577-593
More informationIMPLEMENTATION OF OBJECT ORIENTED APPROACH TO MODIFIED ANT ALGORITHM FOR TASK SCHEDULING IN GRID COMPUTING
International Jornal of Modern Engineering Research (IJMER) www.imer.com Vol.1, Isse1, pp-134-139 ISSN: 2249-6645 IMPLEMENTATION OF OBJECT ORIENTED APPROACH TO MODIFIED ANT ALGORITHM FOR TASK SCHEDULING
More informationAUTOMATIC REGISTRATION FOR REPEAT-TRACK INSAR DATA PROCESSING
AUTOMATIC REGISTRATION FOR REPEAT-TRACK INSAR DATA PROCESSING Mingsheng LIAO, Li ZHANG, Zxn ZHANG, Jiangqing ZHANG Whan Technical University of Srveying and Mapping, Natinal Lab. for Information Eng. in
More informationBias of Higher Order Predictive Interpolation for Sub-pixel Registration
Bias of Higher Order Predictive Interpolation for Sb-pixel Registration Donald G Bailey Institte of Information Sciences and Technology Massey University Palmerston North, New Zealand D.G.Bailey@massey.ac.nz
More informationIsilon InsightIQ. Version 2.5. User Guide
Isilon InsightIQ Version 2.5 User Gide Pblished March, 2014 Copyright 2010-2014 EMC Corporation. All rights reserved. EMC believes the information in this pblication is accrate as of its pblication date.
More informationStatistical Methods in functional MRI. Standard Analysis. Data Processing Pipeline. Multiple Comparisons Problem. Multiple Comparisons Problem
Statistical Methods in fnctional MRI Lectre 7: Mltiple Comparisons 04/3/13 Martin Lindqist Department of Biostatistics Johns Hopkins University Data Processing Pipeline Standard Analysis Data Acqisition
More informationMaster for Co-Simulation Using FMI
Master for Co-Simlation Using FMI Jens Bastian Christoph Claß Ssann Wolf Peter Schneider Franhofer Institte for Integrated Circits IIS / Design Atomation Division EAS Zenerstraße 38, 69 Dresden, Germany
More informationImage Compression Compression Fundamentals
Compression Fndamentals Data compression refers to the process of redcing the amont of data reqired to represent given qantity of information. Note that data and information are not the same. Data refers
More informationWhat s New in AppSense Management Suite Version 7.0?
What s New in AMS V7.0 What s New in AppSense Management Site Version 7.0? AppSense Management Site Version 7.0 is the latest version of the AppSense prodct range and comprises three prodct components,
More informationChapter 7 TOPOLOGY CONTROL
Chapter TOPOLOGY CONTROL Oeriew Topology Control Gabriel Graph et al. XTC Interference SINR & Schedling Complexity Distribted Compting Grop Mobile Compting Winter 00 / 00 Distribted Compting Grop MOBILE
More informationComputer User s Guide 4.0
Compter User s Gide 4.0 2001 Glenn A. Miller, All rights reserved 2 The SASSI Compter User s Gide 4.0 Table of Contents Chapter 1 Introdction...3 Chapter 2 Installation and Start Up...5 System Reqirements
More informationThe final datapath. M u x. Add. 4 Add. Shift left 2. PCSrc. RegWrite. MemToR. MemWrite. Read data 1 I [25-21] Instruction. Read. register 1 Read.
The final path PC 4 Add Reg Shift left 2 Add PCSrc Instrction [3-] Instrction I [25-2] I [2-6] I [5 - ] register register 2 register 2 Registers ALU Zero Reslt ALUOp em Data emtor RegDst ALUSrc em I [5
More informationLWIP and Wi-Fi Boost Flow Control
LWIP and Wi-Fi Boost Flow Control David López-Pérez 1, Jonathan Ling 1, Bong Ho Kim 1, Vasdevan Sbramanian 1, Satish Kangovi 1, Ming Ding 2 1 Nokia Bell Laboratories 2 Data61, Astralia Abstract 3GPP LWIP
More informationPOWER-OF-2 BOUNDARIES
Warren.3.fm Page 5 Monday, Jne 17, 5:6 PM CHAPTER 3 POWER-OF- BOUNDARIES 3 1 Ronding Up/Down to a Mltiple of a Known Power of Ronding an nsigned integer down to, for eample, the net smaller mltiple of
More informationPavlin and Daniel D. Corkill. Department of Computer and Information Science University of Massachusetts Amherst, Massachusetts 01003
From: AAAI-84 Proceedings. Copyright 1984, AAAI (www.aaai.org). All rights reserved. SELECTIVE ABSTRACTION OF AI SYSTEM ACTIVITY Jasmina Pavlin and Daniel D. Corkill Department of Compter and Information
More informationEMC ViPR. User Guide. Version
EMC ViPR Version 1.1.0 User Gide 302-000-481 01 Copyright 2013-2014 EMC Corporation. All rights reserved. Pblished in USA. Pblished Febrary, 2014 EMC believes the information in this pblication is accrate
More informationCS 153 Design of Operating Systems Spring 18
CS 153 Design of Operating Systems Spring 18 Lectre 11: Semaphores Instrctor: Chengy Song Slide contribtions from Nael Ab-Ghazaleh, Harsha Madhyvasta and Zhiyn Qian Last time Worked throgh software implementation
More informationResolving Linkage Anomalies in Extracted Software System Models
Resolving Linkage Anomalies in Extracted Software System Models Jingwei W and Richard C. Holt School of Compter Science University of Waterloo Waterloo, Canada j25w, holt @plg.waterloo.ca Abstract Program
More information(2, 4) Tree Example (2, 4) Tree: Insertion
Presentation for se with the textbook, Algorithm Design and Applications, by M. T. Goodrich and R. Tamassia, Wiley, 2015 B-Trees and External Memory (2, 4) Trees Each internal node has 2 to 4 children:
More informationLecture 17: Wireless Networking
Lectre 17: 802.11 Wireless Networking CSE 222A: Compter Commnication Networks Alex C. Snoeren Thanks: Lili Qi, Nitin Vaidya Lectre 17 Overview Project discssion Intro to 802.11 WiFi Jigsaw discssion CSE
More informationUncertainty Determination for Dimensional Measurements with Computed Tomography
Uncertainty Determination for Dimensional Measrements with Compted Tomography Kim Kiekens 1,, Tan Ye 1,, Frank Welkenhyzen, Jean-Pierre Krth, Wim Dewlf 1, 1 Grop T even University College, KU even Association
More informationNeighbourhood Searches for the Bounded Diameter Minimum Spanning Tree Problem Embedded in a VNS, EA, and ACO
Neighborhood Searches for the Bonded Diameter Minimm Spanning Tree Problem Embedded in a VNS, EA, and ACO Martin Grber Institte for Compter Graphics and Algorithms, Vienna University of Technology, Favoritenstraße
More informationBlended Deformable Models
Blended Deformable Models (In IEEE Trans. Pattern Analysis and Machine Intelligence, April 996, 8:4, pp. 443-448) Doglas DeCarlo and Dimitri Metaxas Department of Compter & Information Science University
More informationA Recovery Algorithm for Reliable Multicasting in Reliable Networks
A Recovery Algorithm for Reliable Mlticasting in Reliable Networks Danyang Zhang Sibabrata Ray Dept. of Compter Science University of Alabama Tscaloosa, AL 35487 {dzhang, sib}@cs.a.ed Ragopal Kannan S.
More informationSwitched state-feedback controllers with multi-estimators for MIMO systems
Proceedings of the th WEA Int Conf on COMPUTATIONAL INTELLIGENCE MAN-MACHINE YTEM AND CYBERNETIC Venice Ital November - 6 89 witched state-feedback controllers with mlti-estimators for MIMO sstems LIBOR
More informationAugmenting the edge connectivity of planar straight line graphs to three
Agmenting the edge connectivity of planar straight line graphs to three Marwan Al-Jbeh Mashhood Ishaqe Kristóf Rédei Diane L. Sovaine Csaba D. Tóth Pavel Valtr Abstract We characterize the planar straight
More informationarxiv: v1 [cs.cg] 27 Nov 2015
On Visibility Representations of Non-planar Graphs Therese Biedl 1, Giseppe Liotta 2, Fabrizio Montecchiani 2 David R. Cheriton School of Compter Science, University of Waterloo, Canada biedl@waterloo.ca
More informationMultiple-Choice Test Chapter Golden Section Search Method Optimization COMPLETE SOLUTION SET
Mltiple-Choice Test Chapter 09.0 Golden Section Search Method Optimization COMPLETE SOLUTION SET. Which o the ollowing statements is incorrect regarding the Eqal Interval Search and Golden Section Search
More informationQoS-driven Runtime Adaptation of Service Oriented Architectures
Qo-driven Rntime Adaptation of ervice Oriented Architectres Valeria ardellini 1 Emiliano asalicchio 1 Vincenzo Grassi 1 Francesco Lo Presti 1 Raffaela Mirandola 2 1 Dipartimento di Informatica, istemi
More informationMembership Library in DPDK Sameh Gobriel & Charlie Tai - Intel DPDK US Summit - San Jose
Membership Library in DPDK 17.11 Sameh Gobriel & Charlie Tai - Intel DPDK US Smmit - San Jose - 2017 Contribtors Yipeng Wang yipeng1.wang@intel.com Ren Wang ren.wang@intel.com John Mcnamara john.mcnamara@intel.com
More informationA personalized search using a semantic distance measure in a graph-based ranking model
Article A personalized search sing a semantic distance measre in a graph-based ranking model Jornal of Information Science XX (X) pp. 1-23 The Athor(s) 2011 Reprints and Permissions: sagepb.co.k/jornalspermissions.nav
More informationAddressing in Future Internet: Problems, Issues, and Approaches
Addressing in Ftre Internet: Problems, Isses, and Approaches Mltimedia and Mobile commnications Laboratory Seol National University Jaeyong Choi, Chlhyn Park, Hakyng Jng, Taekyong Kwon, Yanghee Choi 19
More informationTowards Understanding Bilevel Multi-objective Optimization with Deterministic Lower Level Decisions
Towards Understanding Bilevel Mlti-objective Optimization with Deterministic Lower Level Decisions Ankr Sinha Ankr.Sinha@aalto.fi Department of Information and Service Economy, Aalto University School
More informationCombined cine- and tagged-mri for tracking landmarks on the tongue surface
INTERSPEECH 2015 Combined cine- and tagged-mri for tracking landmarks on the tonge srface Honghao Bao 1, Wenhan L 1, Kiyoshi Honda 2,*, Jiango Wei 1, Qiang Fang 3, Jianw Dang 2, 4 1 School of Compter Software,
More informationConstrained Routing Between Non-Visible Vertices
Constrained Roting Between Non-Visible Vertices Prosenjit Bose 1, Matias Korman 2, André van Renssen 3,4, and Sander Verdonschot 1 1 School of Compter Science, Carleton University, Ottawa, Canada. jit@scs.carleton.ca,
More informationTAKING THE PULSE OF ICT IN HEALTHCARE
ICT TODAY THE OFFICIAL TRADE JOURNAL OF BICSI Janary/Febrary 2016 Volme 37, Nmber 1 TAKING THE PULSE OF ICT IN HEALTHCARE + PLUS + High-Power PoE + Using HDBaseT in AV Design for Schools + Focs on Wireless
More informationEnergy-Efficient Mobile-Edge Computation Offloading for Applications with Shared Data
Energy-Efficient Mobile-Edge Comptation Offloading for Applications with Shared Data Xiangy He, Hong Xing, Ye Chen, Armgam Nallanathan School of Electronic Engineering and Compter Science Qeen Mary University
More informationComputer-Aided Mechanical Design Using Configuration Spaces
Compter-Aided Mechanical Design Using Configration Spaces Leo Joskowicz Institte of Compter Science The Hebrew University Jersalem 91904, Israel E-mail: josko@cs.hji.ac.il Elisha Sacks (corresponding athor)
More informationLocalized Delaunay Triangulation with Application in Ad Hoc Wireless Networks
1 Localized Delanay Trianglation with Application in Ad Hoc Wireless Networks Xiang-Yang Li Gria Călinesc Peng-Jn Wan Y Wang Department of Compter Science, Illinois Institte of Technology, Chicago, IL
More informationThe extra single-cycle adders
lticycle Datapath As an added bons, we can eliminate some of the etra hardware from the single-cycle path. We will restrict orselves to sing each fnctional nit once per cycle, jst like before. Bt since
More informationOptimal Sampling in Compressed Sensing
Optimal Sampling in Compressed Sensing Joyita Dtta Introdction Compressed sensing allows s to recover objects reasonably well from highly ndersampled data, in spite of violating the Nyqist criterion. In
More informationDistributed Systems Security. Authentication Practice - 2. Prof. Steve Wilbur
Distribted Systems Secrity Athentication Practice - 2 Prof. Steve Wilbr s.wilbr@cs.cl.ac.k MSc in Data Commnications Networks and Distribted Systems, UCL Lectre Objectives Examine X.509 as a practical
More informationIntroduction to Computational Manifolds and Applications
IMPA - Institto de Matemática Pra e Aplicada, Rio de Janeiro, RJ, Brazil Introdction to Comptational Manifolds and Applications Part 1 - Constrctions Prof. Marcelo Ferreira Siqeira mfsiqeira@dimap.frn.br
More informationarxiv: v3 [math.co] 7 Sep 2018
Cts in matchings of 3-connected cbic graphs Kolja Knaer Petr Valicov arxiv:1712.06143v3 [math.co] 7 Sep 2018 September 10, 2018 Abstract We discss conjectres on Hamiltonicity in cbic graphs (Tait, Barnette,
More informationAbstract 1 Introduction
Combining Relevance Information in a Synchronos Collaborative Information Retrieval Environment Colm Foley, Alan F. Smeaton and Gareth J. F. Jones Centre for Digital Video Processing and Adaptive Information
More informationA GENERIC MODEL OF A BASE-ISOLATED BUILDING
Chapter 5 A GENERIC MODEL OF A BASE-ISOLATED BUILDING This chapter draws together the work o Chapters 3 and 4 and describes the assembly o a generic model o a base-isolated bilding. The irst section describes
More informationComparison of memory write policies for NoC based Multicore Cache Coherent Systems
Comparison of memory write policies for NoC based Mlticore Cache Coherent Systems Pierre Gironnet de Massas, Frederic Petrot System-Level Synthesis Grop TIMA Laboratory 46, Av Felix Viallet, 38031 Grenoble,
More informationOffline and Online Scheduling of Concurrent Bags-of-Tasks on Heterogeneous Platforms
Offline and Online Schedling of Concrrent Bags-of-Tasks on Heterogeneos Platforms Anne Benoit, Loris Marchal, Jean-François Pinea, Yves Robert, Frédéric Vivien To cite this version: Anne Benoit, Loris
More informationInteligencia Artificial. Revista Iberoamericana de Inteligencia Artificial ISSN:
Inteligencia Artificial. Revista Iberoamericana de Inteligencia Artificial ISSN: 1137-3601 revista@aepia.org Asociación Española para la Inteligencia Artificial España Zaballos, Lis J.; Henning, Gabriela
More informationMobility Control and Its Applications in Mobile Ad Hoc Networks
Mobility Control and Its Applications in Mobile Ad Hoc Netorks Jie W and Fei Dai Department of Compter Science and Engineering Florida Atlantic Uniersity Boca Raton, FL 3331 Abstract Most existing localized
More informationFLARE: Coordinated Rate Adaptation for HTTP Adaptive Streaming in Cellular Networks
FLARE: Coordinated Rate Adaptation for HTTP Adaptive Streaming in Celllar Networks Yongbin Im, Jinyong Han, Ji Hoon Lee, Yoon Kwon, Carlee Joe-Wong, Ted Taekyong Kwon, and Sangtae Ha University of Colorado
More informationOptimal Routing and Scheduling in Multihop Wireless Renewable Energy Networks
Optimal Routing and Scheduling in Multihop Wireless Renewable Energy Networks ITA 11, San Diego CA, February 2011 MHR. Khouzani, Saswati Sarkar, Koushik Kar UPenn, UPenn, RPI March 23, 2011 Khouzani, Sarkar,
More informationLecture 14: Congestion Control
Lectre 14: Congestion Control CSE 222A: Compter Commnication Networks George Porter Thanks: Amin Vahdat, Dina Katabi Lectre 14 Overview TCP congestion control review XCP Overview CSE 222A Lectre 14: Congestion
More informationThe single-cycle design from last time
lticycle path Last time we saw a single-cycle path and control nit for or simple IPS-based instrction set. A mlticycle processor fies some shortcomings in the single-cycle CPU. Faster instrctions are not
More informationA Dynamic Bandwidth Allocation Mechanism for Slotted Ring Networks*
A Dynamic Bandwidth Aocation Mechanism for Sotted Ring Networs* L. OROZCO-BARBOSA University of Ottawa, Schoo of nformation Technoogy and Engineering 161 Lois Paster, St. Ottawa, ON, K1N 6N5 CANADA Abstract
More informationNash Convergence of Gradient Dynamics in General-Sum Games. Michael Kearns.
Convergence of Gradient Dynamics in General-Sm Games Satinder Singh AT&T Labs Florham Park, NJ 7932 bavejaresearch.att.com Michael Kearns AT&T Labs Florham Park, NJ 7932 mkearnsresearch.att.com Yishay
More informationFaster Random Walks By Rewiring Online Social Networks On-The-Fly
1 Faster Random Walks By Rewiring Online ocial Networks On-The-Fly Zhojie Zho 1, Nan Zhang 2, Zhigo Gong 3, Gatam Das 4 1,2 Compter cience Department, George Washington Uniersity 1 rexzho@gw.ed 2 nzhang10@gw.ed
More information