Queuing Delay and Achievable Throughput in Random Access Wireless Ad Hoc Networks
|
|
- Britton Morgan
- 5 years ago
- Views:
Transcription
1 Queuing Delay and Achievable Throughput in Random Access Wireless Ad Hoc Networks Nabhendra Bisnik and Alhussein Abouzeid Rensselaer Polytechnic Institute Troy, NY
2 Outline q Introduction q Queuing Network Model q Main Results q Deviation from Real Networks q Simulation Results 2
3 Outline q Introduction q Queuing Network Model q Main Results q Deviation from Real Networks q Simulation Results 3
4 Important Questions q Important questions: q How throughput scales with network size? q How delay scales with network size? q Relation between delay and throughput? q What are the tradeoffs? q We developed queuing network models to analyze delay and throughput of multihop wireless ad hoc networks 4
5 Delay in Multihop Wireless Networks q End-to-end delay is sum of queuing and transmission delays at intermediate nodes q Queuing delay depends on q Packet arrival process how much traffic is handled by network? q Node density how many interferers are there? q MAC protocol how the channel is shared? q Traffic pattern how many times a packet is transmitted before it reaches destination q Modeling all the factors is quite challenging 5
6 Throughput in Multihop Wireless Networks q Maximum achievable per node throughput of a network is the maximum rate at which the nodes of a network may generate traffic while keeping delay finite q Maximum achievable throughput is inversely proportional to q Average time a node takes to serve a packet q Average number of flows served by a node 6
7 Related Work q Gupta and Kumar Capacity of Wireless Networks q Under optimal scheduling, per node throughput scales as q E.Gamal et al Throughput Delay Trade-off in Wireless Networks q D(n) = (n T(n)) q Assuming that: q Packet size scales with throughput q Infinite backlog at source q Centralized and deterministic scheduling q Delay is proportional to number of hops traversed 7
8 Outline q Introduction q Queuing Network Model q Main Results q Deviation from Real Networks q Simulation Results 8
9 Network and Interference Model q Network consists of n nodes that are distributed uniformly and independently distributed over a unit torus q Transmission rate of each node = W bits/sec q Interference Model: node i can successfully forward a packet to node j only if q r ij r(n) q r jk > r(n) nodes k transmitting simultaneously with i 9
10 A q : Neighbors of A All nodes within distance r(n) of A q + : Interfering neighbors of A All nodes within distance 2r(n) of A Transmission of A is guaranteed to be successful if none of the interfering neighbors of A transmit simultaneously 10
11 MAC Model q Before transmitting a packet each node counts down a random timer q The duration of the time is exponentially distributed with mean 1/ q Once the timer of a node expires it starts transmitting and at the same instant the timers of all interfering nodes is frozen The MAC model captures the collision avoidance mechanism of IEEE and is still mathematically tractable 11
12 Traffic Model q Each node is source, destination and relay of traffic q Size of each packet is fixed and equals L bits q Each node generates packets at rate packets/sec q When a node receives a packet from its neighbor: q The packet is absorbed by the node with probability p(n) (absorption probability) q The packet is forwarded to a randomly chosen neighbor with probability 1-p(n) q In other words, the fraction of packets received by a node that are destined to it equals p(n) p(n) characterizes the degree of locality of traffic Low p(n) average hops between a source destination pair is large 12
13 Queuing Network Model q In order to characterize delay, ad hoc network modeled as G/G/1 queuing network q Each node of the network is a station of queuing network q Incorporate queuing delays at source and relay in delay analysis q Diffusion approximation used to analyze the resulting queuing network 13
14 The queuing network 14
15 Outline q Introduction q Queuing Network Model q Main Results q Deviation from Real Networks q Simulation Results 15
16 Main Results q Mean service time ( ) Average time it takes for a node to serve a packet Service time in absence of interference Where, Term introduced by interfering neighbors 16
17 Interpreting the Service Time Result q Transmitter and receiver, in absence of interference q Service time = Wait for timer to expire + transmission time = 17
18 Interpreting the Service Time Result q Now suppose there are k interferes, each with packet arrival rate q Fraction of time for which the channel is occupied by the interferers = q The fraction of time the channel is available to the transmitter = q In our model = i and k = 4nA(n), therefore 18
19 Main Results q Average end-to-end delay ( ) Average time in which packet reaches the destination after being generated at source Where, The value of end-to-end delay is governed by and SCVs of service and inter-arrival times. 19
20 Main Results q Maximum achievable throughput ( ) or, Where, As expected, MAT varies inversely with mean path length, node density and communication radius of nodes 20
21 Comparison with Kumar-Gupta Results q When parameters of our model are comparable to that of Kumar-Gupta model i.e. and or The bound is similar to Gupta-Kumar bound but is not achievable. This is expected as channel capacity is wasted due to random access. 21
22 Outline q Introduction q Queuing Network Model q Main Results q Deviation from Real Networks q Simulation Results 22
23 Deviation from Real Networks q The MAC model does not take into account the packet collisions an essential feature of random access MAC q We assume all interfering nodes freeze their transmission timer as soon as a packet transmission begins. q In reality a node freezes its timer only when it hears a transmission q Thus, a transmission is successful if all interfering neighbors hear the transmission before their timers expire 23
24 Probability of Success q If a node has I interfering neighbors then q The expected probability of success, P s is given by 24
25 Improved Performance Bounds q Taking packet collision into account, for a more practical MAC the average service time is bounded by q Maximum achievable throughput is bounded by 25
26 Plots of the Deviation 26
27 Optimal Timer Rate q The optimal timer rate,, for which maximized is solution of this equation is q If, 27
28 Outline q Introduction q Queuing Network Model q Main Results q Deviation from Real Networks q Simulation Results 28
29 Simulation Results Comparison of theoretical and simulation results Diffusion Approximation yields pretty good results. 29
30 Conclusion and Future Work q Developed queuing network models for multihop wireless ad hoc networks q Used diffusion approximation to evaluate average delay and maximum achievable per-node throughput q Investigated the deviation of results from real life networks q Future work: extend analysis to many to one cases, taking deterministic routing into account 30
31 Thanks! 31
Queuing Delay and Achievable Throughput in Random Access Wireless Ad Hoc Networks
Queuing Delay and Achievable Throughput in Random Access Wireless Ad Hoc Networks Nabhendra Bisnik, Alhussein Abouzeid Rensselaer Polytechnic Institute Troy, NY 280 bisnin@rpi.edu, abouzeid@ecse.rpi.edu
More informationThe Capacity of Wireless Networks
The Capacity of Wireless Networks Piyush Gupta & P.R. Kumar Rahul Tandra --- EE228 Presentation Introduction We consider wireless networks without any centralized control. Try to analyze the capacity of
More informationCHAPTER 5 PROPAGATION DELAY
98 CHAPTER 5 PROPAGATION DELAY Underwater wireless sensor networks deployed of sensor nodes with sensing, forwarding and processing abilities that operate in underwater. In this environment brought challenges,
More informationLoad Balanced Link Reversal Routing in Mobile Wireless Ad Hoc Networks
Load Balanced Link Reversal Routing in Mobile Wireless Ad Hoc Networks Nabhendra Bisnik, Alhussein Abouzeid ECSE Department RPI Costas Busch CSCI Department RPI Mobile Wireless Networks Wireless nodes
More informationCapacity Deficit in Mobile Wireless Ad Hoc Networks Due to Geographic Routing Overheads
Capacity Deficit in Mobile Wireless Ad Hoc Networks Due to Geographic Routing Overheads Nabhendra Bisnik, Alhussein Abouzeid Abstract Mobility of nodes may cause routing protocols to incur large overheads
More informationACENTRAL question in the study of multihop networks
1118 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL 17, NO 4, AUGUST 2009 The Achievable Rate Region of 80211-Scheduled Multihop Networks Apoorva Jindal, Member, IEEE, and Konstantinos Psounis, Senior Member,
More informationENHANCING THE PERFORMANCE OF MANET THROUGH MAC LAYER DESIGN
I J I T E ISSN: 2229-7367 3(1-2), 2012, pp. 19-24 ENHANCING THE PERFORMANCE OF MANET THROUGH MAC LAYER DESIGN 1 R. MANIKANDAN, 2 K. ARULMANI AND 3 K. SELVAKUMAR Department of Computer Science and Engineering,
More informationPacket multiple access and the Aloha protocol
Packet multiple access and the Aloha protocol Massachusetts Institute of Technology Department of Aeronautics and Astronautics Slide 1 Packet Multiple Access PMA SHARED UPLINK TERMINAL TERMINAL APPL TRANS
More informationCALCULATION OF INFERENCE IN AD-HOC NETWORK
CALCULATION OF INFERENCE IN AD-HOC NETWORK POOJA GROVER, 2 NEHA GUPTA, 3 RANJIT KUMAR Asst. Prof., Department of Computer Science & Engineering, MDU, Rohtak, India-3300 2 Lecturer, Department of Information
More informationInterference avoidance in wireless multi-hop networks 1
Interference avoidance in wireless multi-hop networks 1 Youwei Zhang EE228A Project Report, Spring 2006 1 Motivation Wireless networks share the same unlicensed parts of the radio spectrum with devices
More informationConnection-Level Scheduling in Wireless Networks Using Only MAC-Layer Information
Connection-Level Scheduling in Wireless Networks Using Only MAC-Layer Information Javad Ghaderi, Tianxiong Ji and R. Srikant Coordinated Science Laboratory and Department of Electrical and Computer Engineering
More informationMarkov Chains and Multiaccess Protocols: An. Introduction
Markov Chains and Multiaccess Protocols: An Introduction Laila Daniel and Krishnan Narayanan April 8, 2012 Outline of the talk Introduction to Markov Chain applications in Communication and Computer Science
More information878 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 16, NO. 4, AUGUST 2008
878 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 16, NO. 4, AUGUST 2008 Modeling Queueing and Channel Access Delay in Unsaturated IEEE 802.11 Random Access MAC Based Wireless Networks Omesh Tickoo and Biplab
More informationPerformance Evaluation of Modified IEEE MAC for Multi-Channel Multi-Hop Ad Hoc Network *
Performance Evaluation of Modified IEEE 802.11 MAC for Multi-Channel Multi-Hop Ad Hoc Network * Jiandong LI ISN Lab., Xidian University JL384@cornell.edu Zygmunt J. Haas Cornell University haas@ece.cornell.edu
More informationPower Laws in ALOHA Systems
Power Laws in ALOHA Systems E6083: lecture 7 Prof. Predrag R. Jelenković Dept. of Electrical Engineering Columbia University, NY 10027, USA predrag@ee.columbia.edu February 28, 2007 Jelenković (Columbia
More informationHierarchical Cooperation Achieves Optimal Capacity Scaling in Ad Hoc Networks
Hierarchical Cooperation Achieves Optimal Capacity Scaling in Ad Hoc Networks Presentation: Alexandros Manolakos EE 360 Stanford University February 13, 2012 Table of Contents What are we trying to solve?
More informationOn the Maximum Throughput of A Single Chain Wireless Multi-Hop Path
On the Maximum Throughput of A Single Chain Wireless Multi-Hop Path Guoqiang Mao, Lixiang Xiong, and Xiaoyuan Ta School of Electrical and Information Engineering The University of Sydney NSW 2006, Australia
More informationQoS-Enabled Video Streaming in Wireless Sensor Networks
QoS-Enabled Video Streaming in Wireless Sensor Networks S. Guo and T.D.C. Little Department of Electrical and Computer Engineering Boston University, Boston, MA 02215 {guosong, tdcl}@bu.edu MCL Technical
More informationResource Allocation in Contention-Based WiFi Networks
The 2011 Santa Barbara Control Workshop Resource Allocation in Contention-Based WiFi Networks Laura Giarré Universita di Palermo (giarre@unipa.it) Joint works with I. Tinnirello (Università di Palermo),
More informationASAND: Asynchronous Slot Assignment and Neighbor Discovery Protocol for Wireless Networks
ASAND: Asynchronous Slot Assignment and Neighbor Discovery Protocol for Wireless Networks Fikret Sivrikaya, Costas Busch, Malik Magdon-Ismail, Bülent Yener Computer Science Department, Rensselaer Polytechnic
More informationTSIN01 Information Networks Lecture 3
TSIN01 Information Networks Lecture 3 Danyo Danev Division of Communication Systems Department of Electrical Engineering Linköping University, Sweden September 10 th, 2018 Danyo Danev TSIN01 Information
More informationPerformance Evaluation of Scheduling Mechanisms for Broadband Networks
Performance Evaluation of Scheduling Mechanisms for Broadband Networks Gayathri Chandrasekaran Master s Thesis Defense The University of Kansas 07.31.2003 Committee: Dr. David W. Petr (Chair) Dr. Joseph
More information2 Related Work. 1 Introduction. 3 Background
Modeling the Performance of A Wireless Node in Multihop Ad-Hoc Networks Ping Ding, JoAnne Holliday, Aslihan Celik {pding, jholliday, acelik}@scu.edu Santa Clara University Abstract: In this paper, we model
More informationMesh Networks
Institute of Computer Science Department of Distributed Systems Prof. Dr.-Ing. P. Tran-Gia Decentralized Bandwidth Management in IEEE 802.16 Mesh Networks www3.informatik.uni-wuerzburg.de Motivation IEEE
More informationReactive Routing Overhead in Networks with Unreliable Nodes
Reactive Routing Overhead in Networks with Unreliable Nodes Nianjun Zhou zhoun@rpi.edu Huaming Wu wuhm@rpi.edu Department of Electrical, Computer and Systems Engineering Rensselaer Polytechnic Institute
More informationAd Hoc Wireless Networks : Analysis, Protocols, Architecture and Convergence
Ad Hoc Wireless Networks : Analysis, Protocols, Architecture and Convergence P. R. Kumar (with P. Gupta, V. Kawadia, S. Narayanaswamy, R. Rozovsky, R. S. Sreenivas) Dept. of Electrical and Computer Engineering,
More informationHeterogeneity Increases Multicast Capacity in Clustered Network
Heterogeneity Increases Multicast Capacity in Clustered Network Qiuyu Peng Xinbing Wang Huan Tang Department of Electronic Engineering Shanghai Jiao Tong University April 15, 2010 Infocom 2011 1 / 32 Outline
More informationSLALoM: A Scalable Location Management Scheme for Large Mobile Ad-hoc Networks
SLALoM A Scalable Location Management Scheme for Large Mobile Ad-hoc Networks Christine T. Cheng *, Howard L. Lemberg, Sumesh J. Philip, Eric van den Berg and Tao Zhang * Institute for Math & its Applications,
More informationRouting in Variable Topology Networks
Routing in Variable Topology Networks Dr. Alhussein Abouzeid Electrical, Computer and Systems Engineering (ECSE) Rensselaer Polytechnic Institute Variable Topology Networks P2P networks for distributed
More informationFinal Exam for ECE374 05/03/12 Solution!!
ECE374: Second Midterm 1 Final Exam for ECE374 05/03/12 Solution!! Instructions: Put your name and student number on each sheet of paper! The exam is closed book. You have 90 minutes to complete the exam.
More informationCSC344 Wireless and Mobile Computing. Department of Computer Science COMSATS Institute of Information Technology
CSC344 Wireless and Mobile Computing Department of Computer Science COMSATS Institute of Information Technology Wireless Local Area Networks (WLANs) Part I Almost all wireless LANs now are IEEE 802.11
More informationSome Optimization Trade-offs in Wireless Network Coding
Some Optimization Trade-offs in Wireless Network Coding Yalin Evren Sagduyu and Anthony Ephremides Electrical and Computer Engineering Department and Institute for Systems Research University of Maryland,
More informationA Cluster-Based Energy Balancing Scheme in Heterogeneous Wireless Sensor Networks
A Cluster-Based Energy Balancing Scheme in Heterogeneous Wireless Sensor Networks Jing Ai, Damla Turgut, and Ladislau Bölöni Networking and Mobile Computing Research Laboratory (NetMoC) Department of Electrical
More informationFault-Aware Flow Control and Multi-path Routing in Wireless Sensor Networks
Fault-Aware Flow Control and Multi-path Routing in Wireless Sensor Networks X. Zhang, X. Dong Shanghai Jiaotong University J. Wu, X. Li Temple University, University of North Carolina N. Xiong Colorado
More informationIntroduction to Real-Time Communications. Real-Time and Embedded Systems (M) Lecture 15
Introduction to Real-Time Communications Real-Time and Embedded Systems (M) Lecture 15 Lecture Outline Modelling real-time communications Traffic and network models Properties of networks Throughput, delay
More informationOnroad Vehicular Broadcast
Onroad Vehicular Broadcast Jesus Arango, Alon Efrat Computer Science Department University of Arizona Srinivasan Ramasubramanian, Marwan Krunz Electrical and Computer Engineering University of Arizona
More information/$10.00 (c) 1998 IEEE
Dual Busy Tone Multiple Access (DBTMA) - Performance Results Zygmunt J. Haas and Jing Deng School of Electrical Engineering Frank Rhodes Hall Cornell University Ithaca, NY 85 E-mail: haas, jing@ee.cornell.edu
More informationOPTICAL NETWORKS. Virtual Topology Design. A. Gençata İTÜ, Dept. Computer Engineering 2005
OPTICAL NETWORKS Virtual Topology Design A. Gençata İTÜ, Dept. Computer Engineering 2005 Virtual Topology A lightpath provides single-hop communication between any two nodes, which could be far apart in
More informationMultimedia Communication Services Traffic Modeling and Streaming
Multimedia Communication Services Traffic Modeling and Streaming Medium Access Control algorithms Introduction and details on Aloha networks with infinite nodes Università degli Studi di Brescia A.A. 2014/2015
More informationMAC Protocols and Packet Switching
MAC Protocols and Packet Switching 6.02 Fall 2013 Lecture 19 Today s Plan MAC Protocols: Randomized Access (Aloha) Stabilization Algorithms Packet Switching: Multi-Hop Networks Delays, Queues, and the
More informationECE 4450:427/527 - Computer Networks Spring 2017
ECE 4450:427/527 - Computer Networks Spring 2017 Dr. Nghi Tran Department of Electrical & Computer Engineering Lecture 5.6: Wireless Networks - MAC Dr. Nghi Tran (ECE-University of Akron) ECE 4450:427/527
More informationIEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 52, NO. 2, FEBRUARY An Aloha Protocol for Multihop Mobile Wireless Networks
IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 52, NO. 2, FEBRUARY 2006 421 An Aloha Protocol for Multihop Mobile Wireless Networks François Baccelli, Bartłomiej Błaszczyszyn, and Paul Mühlethaler Abstract
More informationDelay and Capacity Trade-offs in Mobile Ad Hoc Networks: A Global Perspective
Delay and Capacity Trade-offs in Mobile Ad Hoc Networks: A Global Perspective Gaurav Sharma, Ravi Mazumdar, Ness Shroff School of Electrical and Computer Engineering Purdue University West Lafayette, IN
More information$ " Capacity of Ad Hoc Networks. Physical Layer Issues. Layer 1 Capacity. Path Loss Model. Path Loss Model. Bandwidth of 802.
Capacity of Ad Hoc Networks Quality of Wireless links Physical Layer Issues The Channel Capacity Path Loss Model and Signal Degradation 802.11 MAC for Ad-hoc Networks DCF (Distributed Coordination Function)
More informationOptimizing Random Walk Search Algorithms in P2P Networks
Optimizing Random Walk Search Algorithms in P2P Networks Nabhendra Bisnik Rensselaer Polytechnic Institute Troy, New York bisnin@rpi.edu Alhussein A. Abouzeid Rensselaer Polytechnic Institute Troy, New
More information554 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 54, NO. 2, FEBRUARY /$ IEEE
554 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 54, NO. 2, FEBRUARY 2008 Cross-Layer Optimization of MAC and Network Coding in Wireless Queueing Tandem Networks Yalin Evren Sagduyu, Member, IEEE, and
More informationADAPTIVE ROUTING IN COMMUNICATION NETWORKS USING CELL BREATHING BASED BACKPRESSURE ALGORITHM
Indian Journal of Communications Technology and Electronics (IJCTE) Vol.2.No.1 2014pp 13-17. available at: www.goniv.com Paper Received :05-03-2014 Paper Published:28-03-2014 Paper Reviewed by: 1. John
More informationTraffic Estimation in mobile ad-hoc networks (MANET)
Traffic Estimation in mobile ad-hoc networks (MANET) Syed Mushabbar Sadiq Abstract Channel resources are one of the most limiting factors in a radio network. The Medium Access Control
More informationApplication-Oriented Multimedia Streaming over Wireless Multihop Networks
Application-Oriented Multimedia Streaming over Wireless Multihop Networks Luan, Hao (Tom) BBCR Lab, ECE Department University of Waterloo May 11, 2009 1 / 21 Multimedia Streaming Display of audio-visual
More informationCSE 461: Wireless Networks
CSE 461: Wireless Networks Wireless IEEE 802.11 A physical and multiple access layer standard for wireless local area networks (WLAN) Ad Hoc Network: no servers or access points Infrastructure Network
More informationOn the Scalability of Hierarchical Ad Hoc Wireless Networks
On the Scalability of Hierarchical Ad Hoc Wireless Networks Suli Zhao and Dipankar Raychaudhuri Fall 2006 IAB 11/15/2006 Outline Motivation Ad hoc wireless network architecture Three-tier hierarchical
More informationNumerical Analysis of IEEE Broadcast Scheme in Multihop Wireless Ad Hoc Networks
Numerical Analysis of IEEE 802.11 Broadcast Scheme in Multihop Wireless Ad Hoc Networks Jong-Mu Choi 1, Jungmin So 2, and Young-Bae Ko 1 1 School of Information and Computer Engineering Ajou University,
More informationPerformance of Multihop Communications Using Logical Topologies on Optical Torus Networks
Performance of Multihop Communications Using Logical Topologies on Optical Torus Networks X. Yuan, R. Melhem and R. Gupta Department of Computer Science University of Pittsburgh Pittsburgh, PA 156 fxyuan,
More informationCSMA based Medium Access Control for Wireless Sensor Network
CSMA based Medium Access Control for Wireless Sensor Network H. Hoang, Halmstad University Abstract Wireless sensor networks bring many challenges on implementation of Medium Access Control protocols because
More informationICE 1332/0715 Mobile Computing (Summer, 2008)
ICE 1332/0715 Mobile Computing (Summer, 2008) Medium Access Control Prof. Chansu Yu http://academic.csuohio.edu/yuc/ Simplified Reference Model Application layer Transport layer Network layer Data link
More informationRECEIVER CONTROLLED MEDIUM ACCESS IN MULTIHOP AD HOC NETWORKS WITH MULTIPACKET RECEPTION
RECEIVER CONTROLLED MEDIUM ACCESS IN MULTIHOP AD HOC NETWORKS WITH MULTIPACKET RECEPTION Gökhan Mergen and Lang Tong School of Electrical and Computer Engineering Cornell University, Ithaca, NY 14853 {mergen,ltong}@eecornelledu
More informationAchieving MAC Fairness in Wireless Ad-hoc Networks using Adaptive Transmission Control
Achieving MAC Fairness in Wireless Ad-hoc Networks using Adaptive Transmission Control Zhifei Li School of Computer Engineering Nanyang Technological University Singapore, 639798 Sukumar Nandi Dept. of
More informationAnalysis of Slotted Multi-Access Techniques for Wireless Sensor Networks
Analysis of Slotted Multi-Access Techniques for Wireless Sensor Networks Kiran Yedavalli and Bhaskar Krishnamachari Department of Electrical Engineering - Systems University of Southern California, Los
More informationWireless Networks. CSE 3461: Introduction to Computer Networking Reading: , Kurose and Ross
Wireless Networks CSE 3461: Introduction to Computer Networking Reading: 6.1 6.3, Kurose and Ross 1 Wireless Networks Background: Number of wireless (mobile) phone subscribers now exceeds number of wired
More informationThe MAC layer in wireless networks
The MAC layer in wireless networks The wireless MAC layer roles Access control to shared channel(s) Natural broadcast of wireless transmission Collision of signal: a /space problem Who transmits when?
More informationAn Efficient Bandwidth Estimation Schemes used in Wireless Mesh Networks
An Efficient Bandwidth Estimation Schemes used in Wireless Mesh Networks First Author A.Sandeep Kumar Narasaraopeta Engineering College, Andhra Pradesh, India. Second Author Dr S.N.Tirumala Rao (Ph.d)
More informationModeling and Analysis of Random Walk Search Algorithms in P2P Networks
Modeling and Analysis of Random Walk Search Algorithms in P2P Networks Nabhendra Bisnik and Alhussein Abouzeid Electrical, Computer and Systems Engineering Department Rensselaer Polytechnic Institute Troy,
More informationIMPROVING THE DATA COLLECTION RATE IN WIRELESS SENSOR NETWORKS BY USING THE MOBILE RELAYS
IMPROVING THE DATA COLLECTION RATE IN WIRELESS SENSOR NETWORKS BY USING THE MOBILE RELAYS 1 K MADHURI, 2 J.KRISHNA, 3 C.SIVABALAJI II M.Tech CSE, AITS, Asst Professor CSE, AITS, Asst Professor CSE, NIST
More informationMAC Theory. Chapter 7. Ad Hoc and Sensor Networks Roger Wattenhofer
MAC Theory Chapter 7 7/1 Seeing Through Walls! [Wilson, Patwari, U. Utah] Schoolboy s dream, now reality thank to sensor networks... 7/2 Rating Area maturity First steps Text book Practical importance
More informationCover sheet for Assignment 3
Faculty of Arts and Science University of Toronto CSC 358 - Introduction to Computer Networks, Winter 2018, LEC0101 Cover sheet for Assignment 3 Due Monday March 5, 10:00am. Complete this page and attach
More informationSENSOR-MAC CASE STUDY
SENSOR-MAC CASE STUDY Periodic Listen and Sleep Operations One of the S-MAC design objectives is to reduce energy consumption by avoiding idle listening. This is achieved by establishing low-duty-cycle
More information/99/$10.00 (c) 1999 IEEE
COLLISION-FREE MEDIUM ACCESS CONTROL SCHEME FOR AD-HOC NETWORKS Zygmunt J. Haas and Jing Deng School of Electrical Engineering Cornell University Ithaca, NY 14853 haas@ee.cornell.edu Siamak Tabrizi US
More informationIssues of Long-Hop and Short-Hop Routing in Mobile Ad Hoc Networks: A Comprehensive Study
Issues of Long-Hop and Short-Hop Routing in Mobile Ad Hoc Networks: A Comprehensive Study M. Tarique, A. Hossain, R. Islam and C. Akram Hossain Dept. of Electrical and Electronic Engineering, American
More informationWireless MACs: MACAW/802.11
Wireless MACs: MACAW/802.11 Mark Handley UCL Computer Science CS 3035/GZ01 Fundamentals: Spectrum and Capacity A particular radio transmits over some range of frequencies; its bandwidth, in the physical
More informationEnergy Management Issue in Ad Hoc Networks
Wireless Ad Hoc and Sensor Networks - Energy Management Outline Energy Management Issue in ad hoc networks WS 2010/2011 Main Reasons for Energy Management in ad hoc networks Classification of Energy Management
More informationIEEE Medium Access Control. Medium Access Control
IEEE 802.11 Medium Access Control EECS3214 3 April 2018 Medium Access Control reliable data delivery access control MAC layer covers three functional areas: security 2 1 MAC Requirements To avoid interference
More informationUsing Mobile Relays to Prolong the Lifetime of Wireless Sensor Networks. Wang Wei Vikram Srinivasan Chua Kee-Chaing
Using Mobile Relays to Prolong the Lifetime of Wireless Sensor Networks Wang Wei Vikram Srinivasan Chua Kee-Chaing Overview The motivation of mobile relay The performance analysis for mobile relay in the
More informationAN ADAPTIVE ENERGY EFFICIENT MAC PROTOCOL FOR WIRELESS SENSOR NETWORKS
International Journal on Intelligent Electronic Systems, Vol.3, No.2, July 2009 7 Abstract AN ADAPTIVE ENERGY EFFICIENT MAC PROTOCOL FOR WIRELESS SENSOR NETWORKS Lakshmanan M., Noor Mohammed V. 1 E-mail
More informationIn-Network Aggregation Trade-offs for Data Collection in Wireless Sensor Networks
In-Network Aggregation Trade-offs for Data Collection in Wireless Sensor Networks Ignacio Solis isolis@cse.ucsc.edu Computer Engineering Department University of California, Santa Cruz Katia Obraczka katia@cse.ucsc.edu
More informationNetwork Design for QoS under IEEE ( Zigbee ) CSMA/CA for Internet of Things Applications
Network Design for QoS under IEEE 802.15.4 ( Zigbee ) CSMA/CA for Internet of Things Applications EECS Symposium Abhijit Bhattacharya Advisor: Prof. Anurag Kumar Dept. of ECE, IISc, Bangalore April 28,
More informationCapacity Evaluation of Multi-Channel Wireless Ad Hoc Networks
Capacity Evaluation of Multi-Channel Wireless Ad Hoc Networks Jiandong LI, Zygmunt J. Haas Min Sheng + School of Electrical and Computer Engineering Cornell University, Ithaca, NY, 14853 USA JL384@cornell.edu,
More informationStrong Edge Coloring for Channel Assignment in Wireless Radio Networks
IEEE Workshop on Foundations and Algorithms for Wireless Networking (FAWN 2006) Strong Edge Coloring for Channel Assignment in Wireless Radio Networks Christopher L. Barrett Gabriel Istrate V. S. Anil
More informationDelay-Throughput Tradeoff for Supportive Two-Tier Networks
Delay-Throughput Tradeoff for Supportive Two-Tier Networks arxiv:082.4826v [cs.it] 28 Dec 2008 Long Gao, Rui Zhang, Changchuan Yin, Shuguang Cui Department of Electrical and Computer Engineering Texas
More informationA Cross-Layer Design for Reducing Packet Loss Caused by Fading in a Mobile Ad Hoc Network
Clemson University TigerPrints All Theses Theses 8-2017 A Cross-Layer Design for Reducing Packet Loss Caused by Fading in a Mobile Ad Hoc Network William Derek Johnson Clemson University Follow this and
More informationAnalysis of Random Data Hopping in Distributed Multihop Wireless Networks
Analysis of Random Data Hopping in Distributed Multihop Wireless Networks Hrishikesh Venkataraman 1, Gabriel-Miro Muntean 2 1 Dhirubhai Ambani Institute of Information and Communication Technology, Gandhinagar,
More informationEnergy Management Issue in Ad Hoc Networks
Wireless Ad Hoc and Sensor Networks (Energy Management) Outline Energy Management Issue in ad hoc networks WS 2009/2010 Main Reasons for Energy Management in ad hoc networks Classification of Energy Management
More informationIEEE/ACM TRANSACTIONS ON NETWORKING 1. On the Efficiency of CSMA-CA Scheduling in Wireless Multihop Networks
IEEE/ACM TRANSACTIONS ON NETWORKING 1 On the Efficiency of CSMA-CA Scheduling in Wireless Multihop Networks Apoorva Jindal, Member, IEEE, and Konstantinos Psounis, Senior Member, IEEE Abstract This paper
More informationACK-based QoS Support and Throughput Improvement over WLANs
ACK-based QoS Support and Throughput Improvement over 802.11 WLANs Mehmet Fatih Tüysüz Department of Computer Engineering Harran University ftuysuz@harran.edu.tr ABSTRACT In IEEE 802.11 wireless network
More informationTopology Control in Wireless Networks 4/24/06
Topology Control in Wireless Networks 4/4/06 1 Topology control Choose the transmission power of the nodes so as to satisfy some properties Connectivity Minimize power consumption, etc. Last class Percolation:
More informationCapacity Regions for Wireless Ad Hoc Networks
736 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 2, NO. 4, JULY 2003 Capacity Regions for Wireless Ad Hoc Networks Stavros Toumpis, Student Member, IEEE and Andrea J. Goldsmith, Senior Member, IEEE
More informationNMA Radio Networks Network Level: Medium Access Control Roberto Verdone
NMA Radio Networks Network Level: Medium Access Control Roberto Verdone Outline 1. Introduction 2. Fundamentals of Random MAC Aloha in Compact Networks Slotted Aloha in Compact Networks CSMA in Compact
More informationJune 20th, École Polytechnique, Paris, France. A mean-field model for WLANs. Florent Cadoux. IEEE single-cell WLANs
Initial Markov under Bianchi s École Polytechnique, Paris, France June 20th, 2005 Outline Initial Markov under Bianchi s 1 2 Initial Markov under Bianchi s 3 Outline Initial Markov under Bianchi s 1 2
More informationcs/ee 143 Fall
cs/ee 143 Fall 2018 5 2 Ethernet 2.1 W&P, P3.2 3 Points. Consider the Slotted ALOHA MAC protocol. There are N nodes sharing a medium, and time is divided into slots. Each packet takes up a single slot.
More informationComparison of pre-backoff and post-backoff procedures for IEEE distributed coordination function
Comparison of pre-backoff and post-backoff procedures for IEEE 802.11 distributed coordination function Ping Zhong, Xuemin Hong, Xiaofang Wu, Jianghong Shi a), and Huihuang Chen School of Information Science
More information6.9 Summary. 11/20/2013 Wireless and Mobile Networks (SSL) 6-1. Characteristics of selected wireless link standards a, g point-to-point
Chapter 6 outline 6.1 Introduction Wireless 6.2 Wireless links, characteristics CDMA 6.3 IEEE 802.11 wireless LANs ( wi-fi ) 6.4 Cellular Internet Access architecture standards (e.g., GSM) Mobility 6.5
More informationTHE capabilities of mobile cellular communications may
680 IEEE TRANSACTIONS ON COMMUNICATIONS, VOL. 54, NO. 4, APRIL 2006 Analysis and Modeling of Upstream Throughput in Multihop Packet CDMA Cellular Networks Ali Nabi Zadeh, Member, IEEE, and Bijan Jabbari,
More informationVenkatesh Ramaiyan 1.05, Network Engineering Lab Mobile: Dept. of Electrical Communication Engg. (ECE) Fax: (+91)
Venkatesh Ramaiyan 1.05, Network Engineering Lab Mobile: +91-94482 26130 Dept. of Electrical Communication Engg. (ECE) Fax: (+91)-80-2360 0991 Indian Institute of Science E-mail: rvenkat@ece.iisc.ernet.in
More informationCDMA-Based MAC Protocol for Wireless Ad Hoc Networks
CDMA-Based MAC Protocol for Wireless Ad Hoc Networks Alaa Muqattash and Marwan Krunz Presented by: Habibullah Pagarkar for 600.647-Advanced Topics in Wireless Networks. JHU. Spring 04 Today s Presentation
More informationWireless Network Capacity. Nitin Vaidya
Wireless Network Capacity Nitin Vaidya 2009 1 Wireless Networks Why use multi-hop routes to delivery data? Is this optimal? What s the best performance achievable? Capacity analysis can help answer such
More informationSensor Network Protocols
EE360: Lecture 15 Outline Sensor Network Protocols Announcements 2nd paper summary due March 7 Reschedule Wed lecture: 11-12:15? 12-1:15? 5-6:15? Project poster session March 15 5:30pm? Next HW posted
More informationRWPS: A Low Computation Routing Algorithm for Sensor Networks
RWPS: A Low Computation Routing Algorithm for Sensor Networks Pierpaolo Bergamo, Daniela Maniezzo, Gianluca Mazzini Engineering Dept., University of Ferrara, Italy Mario Gerla Computer Science Dept., UCLA,
More informationNetwork-on-chip (NOC) Topologies
Network-on-chip (NOC) Topologies 1 Network Topology Static arrangement of channels and nodes in an interconnection network The roads over which packets travel Topology chosen based on cost and performance
More informationDistributed STDMA in Ad Hoc Networks
Distributed STDMA in Ad Hoc Networks Jimmi Grönkvist Swedish Defence Research Agency SE-581 11 Linköping, Sweden email: jimgro@foi.se Abstract Spatial reuse TDMA is a collision-free access scheme for ad
More informationMulti-Rate Interference Sensitive and Conflict Aware Multicast in Wireless Ad hoc Networks
Multi-Rate Interference Sensitive and Conflict Aware Multicast in Wireless Ad hoc Networks Asma Ben Hassouna, Hend Koubaa, Farouk Kamoun CRISTAL Laboratory National School of Computer Science ENSI La Manouba,
More informationCSCD 433 Network Programming Fall Lecture 7 Ethernet and Wireless
CSCD 433 Network Programming Fall 2016 Lecture 7 Ethernet and Wireless 802.11 1 Topics 802 Standard MAC and LLC Sublayers Review of MAC in Ethernet MAC in 802.11 Wireless 2 IEEE Standards In 1985, Computer
More information