Power Laws in ALOHA Systems

Similar documents
Packet multiple access and the Aloha protocol

Multiple Access Communications. EEE 538, WEEK 11 Dr. Nail Akar Bilkent University Electrical and Electronics Engineering Department

Multiple Access (1) Required reading: Garcia 6.1, 6.2.1, CSE 3213, Fall 2010 Instructor: N. Vlajic

Markov Chains and Multiaccess Protocols: An. Introduction

Chapter 6 Medium Access Control Protocols and Local Area Networks

Where Are We? Basics: Network Classification Network Architecture Reliable Data Transfer Delay Models Implementation: Protocol Design

TSIN01 Information Networks Lecture 3

ECE 4450:427/527 - Computer Networks Spring 2017

Protocols for Multiaccess Networks

Random Access. 1. Aloha. 2. Slotted Aloha 3. CSMA 4. CSMA/CD

Slotted Aloha UHFHLYHU. Recall assumptions:

1-1. Switching Networks (Fall 2010) EE 586 Communication and. November 8, Lecture 30

EP2210 FEP3210 Performance analysis of Communication networks. Topic 2 Medium access control (or multiple access protocols)

Multiple Access Links and Protocols

LANs. Local Area Networks. via the Media Access Control (MAC) SubLayer. Networks: Local Area Networks

Aloha and slotted aloha

Multimedia Communication Services Traffic Modeling and Streaming

Multiple Access Protocols

TSIN01 Information Networks Lecture 8

Wireless Medium Access Control Protocols

Lecture 19. Principles behind data link layer services Framing Multiple access protocols

Outline. Introduction to Networked Embedded Systems - Embedded systems Networked embedded systems Embedded Internet - Network properties

MAC Protocols and Packet Switching

The Link Layer and LANs. Chapter 6: Link layer and LANs

Chapter 1 Basic concepts of wireless data networks (cont d)

CMPE 150/L : Introduction to Computer Networks. Chen Qian Computer Engineering UCSC Baskin Engineering Lecture 16

Lecture 6. Data Link Layer (cont d) Data Link Layer 1-1

Random Assignment Protocols

Medium Access Control

Physical Layer. Medium Access Links and Protocols. Point-to-Point protocols. Modems: Signaling. Modems Signaling. Srinidhi Varadarajan

CHAPTER 7 MAC LAYER PROTOCOLS. Dr. Bhargavi Goswami Associate Professor & Head Department of Computer Science Garden City College

Medium Access Control. MAC protocols: design goals, challenges, contention-based and contention-free protocols

Data Link Layer: Collisions

Link Layer and LANs 안상현서울시립대학교컴퓨터 통계학과.

Redes de Computadores. Medium Access Control

CS 43: Computer Networks. 27: Media Access Contd. December 3, 2018

Data Link Layer. Goals of This Lecture. Engineering Questions. Outline of the Class

Splitting Algorithms

ECEN 5032 Data Networks Medium Access Control Sublayer

Topics. Link Layer Services (more) Link Layer Services LECTURE 5 MULTIPLE ACCESS AND LOCAL AREA NETWORKS. flow control: error detection:

Data Link Layer: Multi Access Protocols

Computer Networks Medium Access Control. Mostafa Salehi Fall 2008

ETSN01 Exam. August 22nd am 1pm. Clearly label each page you hand in with your name and the page number in the bottom right hand corner.

ECE453 Introduction to Computer Networks. Broadcast vs. PPP. Delay. Lecture 7 Multiple Access Control (I)

Simulated SA Throughput vs. p

ICE 1332/0715 Mobile Computing (Summer, 2008)

CS 716: Introduction to communication networks. - 9 th class; 19 th Aug Instructor: Sridhar Iyer IIT Bombay

Computer Network Fundamentals Spring Week 3 MAC Layer Andreas Terzis

COS 140: Foundations of Computer Science

LANs Local Area Networks LANs provide an efficient network solution : To support a large number of stations Over moderately high speed

Intelligent Transportation Systems. Medium Access Control. Prof. Dr. Thomas Strang

The Medium Access Control Scheme (MAC Layer) Reference: Andrew S. Tanenbaum, Computer Networks, 3rd Edition, Prentice Hall, 1996.

Chapter 3 MEDIA ACCESS CONTROL

CHAPTER 5 PROPAGATION DELAY

COMPUTER NETWORKS - Local area networks

Local area networks. Copyright

College of Computer and Information Sciences Department of Computer Engineering CEN444 Computer Networks Midterm 2 Exam Second Semester 1434/1435

Chapter 5: Link layer

Wireless Communications

CS 43: Computer Networks Media Access. Kevin Webb Swarthmore College November 30, 2017

Com S 611 Spring Semester 2007 Discrete Algorithms for Mobile and Wireless Networks. Lecture 3: Tuesday, 23rd January 2007

CSC 4900 Computer Networks: The Link Layer

CS 455/555 Intro to Networks and Communications. Link Layer

NMA Radio Networks Network Level: Medium Access Control Roberto Verdone

Lecture 8 The Data Link Layer part I. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it

Lecture 12 December 04, Wireless Access. Graduate course in Communications Engineering. University of Rome La Sapienza. Rome, Italy

Lecture 9 November 12, Wireless Access. Graduate course in Communications Engineering. University of Rome La Sapienza. Rome, Italy

Introduction to CDMA ALOHA. 3. Access Control Techniques for CDMA ALOHA

2. Modelling of telecommunication systems (part 1)

Chapter 6 Medium Access Control Protocols and Local Area Networks

Chapter 5 Link Layer and LANs

Connection-Level Scheduling in Wireless Networks Using Only MAC-Layer Information

Ethernet. Introduction. CSE 3213 Fall 2011

Computer Networks. Wenzhong Li. Nanjing University

CSE 461: Multiple Access Networks. This Lecture

Wireless Sensor Networks 7th Lecture

Multiple-access protocols

Data Communications. Automatic Repeat Request Medium Access Control

Analyzing Multi-Channel Medium Access Control Schemes With ALOHA Reservation

Performance Evaluation and Design Improvement of Media Access Control Protocols for Broadband Wireless Local Loop

Jaringan Komputer. Broadcast Network. Outline. MAC (Medium Access Control) Channel Allocation Problem. Dynamic Channel Allocation

CSC 401 Data and Computer Communications Networks

Can Multiple Subchannels Improve the Delay Performance of RTS/CTS-based MAC Schemes?

High Level View. EE 122: Ethernet and Random Access protocols. Medium Access Protocols

CCM 4300 Lecture 5 Computer Networks, Wireless and Mobile Communications. Dr Shahedur Rahman. Room: T115

Data Link Layer Technologies

Performance Evaluation of Scheduling Mechanisms for Broadband Networks

COS 140: Foundations of Computer Science

ECSE-4670: Computer Communication Networks (CCN) Informal Quiz 3

Random Access Suitable Protocols

COMP/ELEC 429/556 Introduction to Computer Networks

Lecture 5 The Data Link Layer. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it

Improved Collision Resolution Algorithms for Multiple Access Channels with Limited Number of Users * Chiung-Shien Wu y and Po-Ning Chen z y Computer a

CS 3516: Computer Networks

Data Link Layer: Overview, operations

This formula shows that partitioning the network decreases the total traffic if 1 N R (1 + p) < N R p < 1, i.e., if not all the packets have to go

Access Technologies! Fabio Martignon

Queuing Delay and Achievable Throughput in Random Access Wireless Ad Hoc Networks

Department of Electrical Engineering and Computer Science MASSACHUSETTS INSTITUTE OF TECHNOLOGY Spring Quiz III

The MAC layer in wireless networks

Transcription:

Power Laws in ALOHA Systems E6083: lecture 7 Prof. Predrag R. Jelenković Dept. of Electrical Engineering Columbia University, NY 10027, USA predrag@ee.columbia.edu February 28, 2007 Jelenković (Columbia University) ALOHA February 28, 2007 1 / 24

Outline 1 Random Access Protocols 2 Introduction to ALOHA Protocols 3 Power Laws in ALOHA Jelenković (Columbia University) ALOHA February 28, 2007 2 / 24

Multiple Access Nodes share a common medium A receiver can hear several transmitters A transmitter can broadcast to several receivers The major problem with multi-access is to decide how to share the medium when the nodes do not know if the other nodes have data to send. Jelenković (Columbia University) ALOHA February 28, 2007 3 / 24

Approaches to Multiple Access Fixed Assignment TDMA, FDMA, CDMA: each node is allocated a fixed fraction of bandwidth, very inefficient for light traffic and complex Contention systems Random access (ALOHA) Reservation Polling Jelenković (Columbia University) ALOHA February 28, 2007 4 / 24

Fixed Assignment VS. Contention Jelenković (Columbia University) ALOHA February 28, 2007 5 / 24

Random Access Protocols When a user has data to send, she transmits at full channel data rate C. does not coordinate with other users Two or more transmitting nodes cause collision. Random access MAC protocol specifies: collision detection recovery from collisions (delayed retransmissions) Examples of random access MAC protocols: slotted ALOHA unslotted ALOHA CSMA Jelenković (Columbia University) ALOHA February 28, 2007 6 / 24

ALOHA A family of contention-type Multiple access protocols Figure: Satellite system, wireless Two basic types of ALOHA systems Pure (unslotted) ALOHA Slotted ALOHA Jelenković (Columbia University) ALOHA February 28, 2007 7 / 24

Pure ALOHA Basic version of ALOHA protocols Poisson external arrival (infinite population model) New packets are transmitted immediately, no synchronization Immediate feedback If no conflict, packet will be transmitted correctly If two or more packet transmissions overlap in time, none is transmitted successfully and need retransmission Jelenković (Columbia University) ALOHA February 28, 2007 8 / 24

Simple Calculation of the Throughput of Pure ALOHA If the length of the packets is fixed T, and the rate of scheduled packets is g, then a packet sent at time t is successful if and only if no other packet is scheduled in the interval (t T, t + T ), thus Throughput is P suc = e 2gT, S = gte 2gT. The throughput achieves maximum S max = e 2 when gt = 1 2. Jelenković (Columbia University) ALOHA February 28, 2007 9 / 24

Assumptions of Slotted ALOHA Poisson external arrivals with rate λ No capture Packets involved in a collision are lost Capture models are also possible Immediate feedback If a new packet arrives during a slot, transmit in next slot (or assume arrivals happen at the beginning of each slot) If a transmission has a collision, node becomes backlogged - while backlogged, transmit in each slot with probability q r until successful. No buffering at each node (queue size = 1). The assumption of constant transmission rate g is flawed... Jelenković (Columbia University) ALOHA February 28, 2007 10 / 24

Slotted ALOHA Time is divided into slots of one packet duration T = 1 New packet will be send in the beginning of the next slot Successful only if exactly one packet is scheduled for transmission during the slot In case of collision, node becomes backlogged Jelenković (Columbia University) ALOHA February 28, 2007 11 / 24

Instability of Slotted ALOHA Let g(n) be the attempt rate (the expected number of packets transmitted in a slot) in state n, g(n) = λ + nq r. The number of attempted packets per slot in state n is approximately a Poisson random variable of mean g(n). P[ m attempts] = g(n) m e g(n) /m! P[idle] = probability of no attempts in a slot = e g(n) P[success] = probability of one attempt in a slot = g(n)e g(n) P[collision] = P[two or more attempts] = 1 P[idle] P[success] Jelenković (Columbia University) ALOHA February 28, 2007 12 / 24

Throughput of Slotted ALOHA P[success] = g(n)e g(n) g(n) = 1 maximizes the throughput P[success] = 1/e 0.36 Jelenković (Columbia University) ALOHA February 28, 2007 13 / 24

Instability of Slotted ALOHA with Infinite Number of Users If backlog increases beyond unstable point, then the departure rate will drop to 0. Drift = λ P[success]. Jelenković (Columbia University) ALOHA February 28, 2007 14 / 24

Stabilizing Slotted ALOHA Since g(n) = λ + nq r, choosing q r small increases the backlog at which instability occurs, but also increases delay. Method: estimate the backlog from past feedback Given the backlog estimate, choose q r to keep g(n) = 1. A good rule is increase the estimate of n on each collision, and to decrease it on each idle slot or successful slot. For more detailed discussion of ALOHA/MAC protocols see the standard textbook "Data Networks" by D. Bertsekas and Gallager, Prentice Hall, 2nd edition, 1992. Jelenković (Columbia University) ALOHA February 28, 2007 15 / 24

Slotted ALOHA with Finite Users n is the total number of users q a is the arrival probability q r is the retransmission probability with q r > q a Implies that the throughput is positive for slotted ALOHA with finite users. However, our findings challenge the traditional result. Jelenković (Columbia University) ALOHA February 28, 2007 16 / 24

ALOHA with Variable Size Packets: Model Description The rest of this and the following lecture is based on our paper: P. R. Jelenkovic and J. Tan, "Is ALOHA Causing Power Law Delays?", ITC-20, Ottawa, Canada, June 17-21, 2007, to appear. (Top 3 paper out of 98 accepted, selected for presentation in the plenary session. Finite number of users. Each user can hold at most one packet in its queue. New packet is generated after an independent (from all other variables) exponential time with mean 1/λ. Each packet has an independent length that is equal in distribution to a generic random variable L. After a collision, each participating user waits (backoffs) for an independent exponential period of time with mean 1/ν and then attempts to retransmit its packet. Jelenković (Columbia University) ALOHA February 28, 2007 17 / 24

Visualized Scheme We study: N - number of transmission attempts between 2 successful transmissions. T - time between 2 successful transmissions. Jelenković (Columbia University) ALOHA February 28, 2007 18 / 24

Power Laws in the Finite Population ALOHA with Variable Size Packets Theorem If then, we have and log P[L > x] lim = µ, µ > 0, x x log P[N > n] lim = Mµ n log n (M 1)ν log P[T > t] lim = Mµ t log t (M 1)ν. Jelenković (Columbia University) ALOHA February 28, 2007 19 / 24

Power Laws in the Finite Population ALOHA with Variable Size Packets Example 4 experiments: M = 2, 4, 10, 20; packet sizes i.i.d. exp(1); arrival intervals and backoffs exp(2/3); simulation samples = 10 5. As M gets large (M = 10, 20), the slopes of the distributions on the log / log plot are essentially the same. Figure: Interval distribution between successfully transmitted packets. Jelenković (Columbia University) ALOHA February 28, 2007 20 / 24

Implications the distribution tails of N and T are essentially power laws when the packet distribution e µx. The finite population ALOHA may exhibit high variations and possible zero throughput. 0 < Mµ/(M 1)ν < 1 zero throughput; 1 < Mµ/(M 1)ν < 2 Var[T ] =. For large M, Mµ/(M 1) µ/ν and thus, the system has zero throughput if ν µ. High variability may even occur when EL 1/ν. Jelenković (Columbia University) ALOHA February 28, 2007 21 / 24

Power Laws in Slotted ALOHA with Random Number of Users Power laws can be eliminated by reducing the variability of the packet sizes, however, when the number of active users M is random, we may also have power laws. Theorem If there exists α > 0, such that, then, we have log P[M > x] lim = α, x x log P[N > n] log P[T > t] lim = lim = α n log n t log t ν. More details including the proofs will be presented in the next class. Jelenković (Columbia University) ALOHA February 28, 2007 22 / 24

Power Laws in Slotted ALOHA with Random Number of Users Example (Setting) If active users M is bounded P[T > x] is exponentially bounded. However, this exponential behavior may happen for very small probabilities, while the delays of interest can fall inside the region of the distribution (main body) that behaves as the power law. Assume that initially M 1 users have unit size packets ready to send and M follows geometric distribution with mean 3. The backoff times of colliding users are independent and geometrically distributed with mean 2. M has finite support [1, K ] where K ranges from 6 to 14 and we set the number of users to be equal to M K = min(m, K ). Jelenković (Columbia University) ALOHA February 28, 2007 23 / 24

Power Laws in Slotted ALOHA with Random Number of Users Example (Simulation Results) The support of the main body of P[T > t] grows exponentially fast. If K = 14, the probabilities of interest for P[T > t] are bigger than 1/500, then the result of this experiment is basically the same as for K =. Figure: Stretched support of the power law main body when the number of users is min(m, K ). Jelenković (Columbia University) ALOHA February 28, 2007 24 / 24