NMA Radio Networks Network Level: Medium Access Control Roberto Verdone

Similar documents
Wireless Sensor Networks

Lecture 12 December 04, Wireless Access. Graduate course in Communications Engineering. University of Rome La Sapienza. Rome, Italy

Intelligent Transportation Systems. Medium Access Control. Prof. Dr. Thomas Strang

Random Assignment Protocols

Multiple Access Links and Protocols

Wireless Medium Access Control Protocols

Wireless Communications

Chapter 4. The Medium Access Control Sublayer. Points and Questions to Consider. Multiple Access Protocols. The Channel Allocation Problem.

ICE 1332/0715 Mobile Computing (Summer, 2008)

CSE 461: Wireless Networks

Markov Chains and Multiaccess Protocols: An. Introduction

CS 43: Computer Networks. 27: Media Access Contd. December 3, 2018

ECEN 5032 Data Networks Medium Access Control Sublayer

CMPE 257: Wireless and Mobile Networking

Medium Access Control. MAC protocols: design goals, challenges, contention-based and contention-free protocols

Aloha and slotted aloha

LECTURE PLAN. Script. Introduction about MAC Types o ALOHA o CSMA o CSMA/CD o CSMA/CA

Unit 7 Media Access Control (MAC)

Random Access. 1. Aloha. 2. Slotted Aloha 3. CSMA 4. CSMA/CD

Packet multiple access and the Aloha protocol

ECE 4450:427/527 - Computer Networks Spring 2017

Medium Access Control

Mobile Communications Chapter 3 : Media Access

CS 43: Computer Networks Media Access. Kevin Webb Swarthmore College November 30, 2017

Wireless Networking & Mobile Computing

Computer Communication III

Multiple Access Communications. EEE 538, WEEK 11 Dr. Nail Akar Bilkent University Electrical and Electronics Engineering Department

Medium Access Control Sublayer

CSE 461: Multiple Access Networks. This Lecture

CSE/EE 461 Wireless and Contention-Free Protocols

IEEE , Token Rings. 10/11/06 CS/ECE UIUC, Fall

CMPE 257: Wireless and Mobile Networking

Chapter 4. The Medium Access Control Sublayer

Chapter 6 Medium Access Control Protocols and Local Area Networks

Announcements / Wireless Networks and Applications Lecture 9: Wireless LANs Wireless. Regular Ethernet CSMA/CD.

The MAC layer in wireless networks

Multiple Access Protocols

MAC Sublayer(1) Principal service of the Medium Access Control Sublayer: Allocating a single broadcast channel (mostly a LAN) among competing users

Outline. Introduction to Networked Embedded Systems - Embedded systems Networked embedded systems Embedded Internet - Network properties

CHAPTER 7 MAC LAYER PROTOCOLS. Dr. Bhargavi Goswami Associate Professor & Head Department of Computer Science Garden City College

Wireless LANs. ITS 413 Internet Technologies and Applications

Lecture 6. Data Link Layer (cont d) Data Link Layer 1-1

Chapter 12 Multiple Access 12.1

Computer Network Fundamentals Spring Week 3 MAC Layer Andreas Terzis

Media Access Control in Ad Hoc Networks

Power Laws in ALOHA Systems

Data and Computer Communications. Chapter 13 Wireless LANs

SENSOR-MAC CASE STUDY

CSC344 Wireless and Mobile Computing. Department of Computer Science COMSATS Institute of Information Technology

Ethernet. Introduction. CSE 3213 Fall 2011

MAC LAYER. Murat Demirbas SUNY Buffalo

Topics. Link Layer Services (more) Link Layer Services LECTURE 5 MULTIPLE ACCESS AND LOCAL AREA NETWORKS. flow control: error detection:

Wireless Sensor Networks

The MAC layer in wireless networks

LANs. Local Area Networks. via the Media Access Control (MAC) SubLayer. Networks: Local Area Networks

Wireless MACs: MACAW/802.11

Mohamed Khedr.

Lecture 16: QoS and "

Principles of Wireless Sensor Networks

Lecture 24: CSE 123: Computer Networks Stefan Savage. HW4 due NOW

Strengthening Unlicensed Band Wireless Backhaul

Medium Access Control (MAC) Protocols for Ad hoc Wireless Networks -IV

Medium Access Control. IEEE , Token Rings. CSMA/CD in WLANs? Ethernet MAC Algorithm. MACA Solution for Hidden Terminal Problem

High Level View. EE 122: Ethernet and Random Access protocols. Medium Access Protocols

6.9 Summary. 11/20/2013 Wireless and Mobile Networks (SSL) 6-1. Characteristics of selected wireless link standards a, g point-to-point

Access Technologies! Fabio Martignon

MULTIPLE ACCESS PROTOCOLS 2. 1

Outline / Wireless Networks and Applications Lecture 9: Wireless LANs Aloha and 802 Wireless. Regular Ethernet CSMA/CD

Wireless & Mobile Networking

ECE453 Introduction to Computer Networks. Broadcast vs. PPP. Delay. Lecture 7 Multiple Access Control (I)

04/11/2011. Wireless LANs. CSE 3213 Fall November Overview

MSIT 413: Wireless Technologies Week 8

EL2745 Principles of Wireless Sensor Networks

Computer Networks Medium Access Control. Mostafa Salehi Fall 2008

Student ID: CS457: Computer Networking Date: 5/8/2007 Name:

Media Access Control. Networked Systems (H) Lecture 5

Chapter 1 Basic concepts of wireless data networks (cont d)

TSIN01 Information Networks Lecture 3

Telecommunication Protocols Laboratory Course. Lecture 2

Wireless Network Security Spring 2013

Principles of Wireless Sensor Networks. Medium Access Control and IEEE

Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs)

Multiple Access (1) Required reading: Garcia 6.1, 6.2.1, CSE 3213, Fall 2010 Instructor: N. Vlajic

MAC protocols for ad hoc networks

EE 122: Ethernet and

Data and Computer Communications. Chapter 11 Local Area Network

The Medium Access Control Sublayer

COS 140: Foundations of Computer Science

MAC in /20/06

The Link Layer and LANs. Chapter 6: Link layer and LANs

original standard a transmission at 5 GHz bit rate 54 Mbit/s b support for 5.5 and 11 Mbit/s e QoS

Lecture 4: Wireless MAC Overview. Hung-Yu Wei National Taiwan University

Data Communications. Data Link Layer Protocols Wireless LANs

Mohammad Hossein Manshaei 1393

CSMA/CA BASED AD-HOC NETWORK USING MAC PROTOCOL

RMIT University. Data Communication and Net-Centric Computing COSC 1111/2061/1110. Lecture 8. Medium Access Control Methods & LAN

Wireless Networked Systems

CSCD 433 Network Programming Fall Lecture 7 Ethernet and Wireless

Redes de Computadores. Medium Access Control

Wireless Local Area Networks (WLANs) Part I

Transcription:

NMA Radio Networks Network Level: Medium Access Control Roberto Verdone

Outline 1. Introduction 2. Fundamentals of Random MAC Aloha in Compact Networks Slotted Aloha in Compact Networks CSMA in Compact Networks 3. CSMA in Sparse Networks 4. Bianchi s Model 5. Scheduling

1. Introduction Prof. Roberto Verdone

Introduction T T T Shared pool of radio resources R R R APPLICATION TRANSPORT NETWORK DATA LINK PHYSICAL user throughput network throughput throughput bit rate channel bandwidth APPLICATION TRANSPORT NETWORK DATA LINK PHYSICAL

Introduction (Centralised) Fixed RR Assignment A centralised entity assigns RUs permanently for the duration of a session (Centralised) Scheduled RR Assignment A centralised entity assigns RUs based on evolution of traffic flows (Distributed) Controlled RR Assignment Nodes self-assign RUs based on concerted policies (Distributed) Random RR Assignment Nodes self-assign RUs without concerted policies

Introduction T R data blocks PDUs, somes denoted as frames PCI SDU z bits k bits APPLICATION TRANSPORT NETWORK DATA LINK PHYSICAL user throughput network throughput throughput bit rate channel bandwidth APPLICATION TRANSPORT NETWORK DATA LINK PHYSICAL

Introduction T R Offered Traffic G = E [ z / Tif ] = lo Tf (assuming PCI << PDU) Tif lo is the frame generation rate Tf z bits z bits APPLICATION TRANSPORT NETWORK DATA LINK PHYSICAL user throughput network throughput throughput bit rate channel bandwidth APPLICATION TRANSPORT NETWORK DATA LINK PHYSICAL

Introduction T R Normalised Throughput S = E [ z / Tif ] Ps = G Ps < 1 Throughput Th = S * Rb Ps is the probability of frame success APPLICATION TRANSPORT NETWORK DATA LINK PHYSICAL user throughput network throughput throughput bit rate channel bandwidth APPLICATION TRANSPORT NETWORK DATA LINK PHYSICAL

Introduction 1 N T T T Shared pool of radio resources R R R Offered Traffic G = N E [ z / Tif ] = N lo Tf = l Tf Normalised Throughput S = G Ps G accounts for all transmissions made at Data Link layer Assumption: traffic generation follows a Poisson model (the number of frames generated in any interval D is Poisson, with mean D N lo = D l)

2. Fundamentals of Random MAC Prof. Roberto Verdone

Random MAC (TDMA based) ALOHA S- ALOHA CSMA CSMA/CD CSMA/CA CSMA/CA with RTS/CTS

Aloha When a node has a data block in the data link layer buffer, it sends it. Collisions (i.e. partial or total overlap between packet transmissions by separate sources) may occur, with probability P colla In an interference-limited environment, data block losses (i.e. events of data blocks not captured by the receiver because of C/I below capture threshold) may occur, with probability P lossa < P colla. A B A B A B A B ; Z Y wanted transmission undesired transmission A Y A Z Z

Aloha - retransmissions If an acknowledgement mechanism is included, the node will retransmit in case of loss, after an interval of (backoff ) randomly chosen within a given interval (contention window) whose size normally increases when a new retransmission is needed A B A B A B A B ; Z Y wanted transmission undesired transmission A Y A Z Z delay reply backoff

Aloha in Compact Networks: Throughput Analysis

Aloha in Compact Networks: Throughput Analysis Ps = 1 - P colla = 1 - P lossa = exp (- 2G) S = G exp (- 2G)

S-Aloha Time is slotted. When a node has a data block in the data link layer buffer, it sends it starting from the instant when next slot initiates. Collisions (total overlap between packets) may occur, with probability P collsa In an interference-limited environment, data block losses (i.e. events of data blocks not captured by the receiver because of C/I below capture threshold) may occur, with probability P losssa < P collsa. A B A B A B A B ; Z Y wanted transmission undesired transmission A Y A Z Z

S-Aloha - retransmissions If an acknowledgement mechanism is included, the node will retransmit in case of loss, after an interval of (backoff ) randomly chosen within a given interval (contention window) whose size normally increases when a new retransmission is needed A B A B A B A B ; Z Y wanted transmission undesired transmission A Y A Z Z delay reply backoff

S-Aloha in Compact Networks: Throughput Analysis

S-Aloha in Compact Networks: Throughput Analysis

S-Aloha in Compact Networks: Throughput Analysis Ps = 1 - P collsa = 1 - P losssa = exp (- G) S = G exp (- G)

CSMA Based Protocols Carrier Sensing Multiple Access is based on the concept that when the data block is ready for transmission, the node senses the channel, in either of two ways: - (true) carrier sensing, via signal cross-correlation - energy detection If sensing is performed each a data block is to be transmitted, this is also said Listen Before Talk (LBT). CSMA protocols can be either slotted or unslotted A B A B A B A B ; Z Y wanted transmission undesired transmission Y Z

CSMA (1 persistent CSMA) When a node has a data block in the data link layer buffer, it starts sensing the carrier. As soon as it detects the channel is free, it sends the data block. Collisions may occur if two nodes stop sensing the carrier simultaneously, with probability P collc P collc can not be reduced to zero. In an interference-limited environment, data block losses may occur, with probability P lossc < P collc. A B A B A B A B ; Z Y wanted transmission undesired transmission busy A Y A Z Z LBT

CSMA - retransmissions If an acknowledgement mechanism is included, the node will retransmit in case of loss, after an interval of (backoff ) randomly chosen within a given interval (contention window) whose size normally increases when a new retransmission is needed, and a short sensing period. A B A B A B A B ; Z Y wanted transmission undesired transmission busy A sensing Y A Z Z delay reply backoff sensing LBT

CSMA/CD When a node has a data block in the data link layer buffer, it starts sensing the carrier. When it detects the channel is free, it broadcasts the data block. While transmitting, the receiver is on and detects whether a collision occurs. If a collision is detected, transmission is immediately stopped. This is not possible with wireless systems because of the large power ranges and possible consequent burn of receiver by own transmitter.

CSMA with delayed transmission When a node has a data block in the data link layer buffer, it starts sensing the carrier. As soon as it detects the channel is free, a backoff phase (i.e. transmission is deferred by a random delay) is initiated; at its end, the node sends the data block. Collisions may occur with probability P collcc. Large backoffs can reduce collisions deliberately (P collcc can be reduced to zero). In an interference-limited network, block losses may occur, with P losscc < P collcc. A B A B A B A B ; Z Y wanted transmission undesired transmission busy A sensing Y A Z Z LBT

CSMA with delayed transmission - retransmissions If an acknowledgement mechanism is included, the node will retransmit in case of loss, after an interval of (backoff ) randomly chosen within a given interval (contention window) whose size normally increases when a new retransmission is needed A B A B A B A B ; Z Y wanted transmission undesired transmission A Y A Z Z busy

CSMA/CA (non persistent CSMA) When a node has a data block in the data link layer buffer, it starts sensing the carrier. If the channel is free, it sends the data block; if not, a backoff phase (i.e. transmission is deferred by a random delay) is initiated; at its end, the node repeats the procedure. Collisions may occur with probability P collcc owing to propagation delays (the spent on the radio channel by the data burst). Large backoffs can reduce collisions deliberately (P collcc can be reduced to zero). In an interference-limited network, block losses may occur, with P losscc < P collcc. A B A B A B A B ; Z Y wanted transmission undesired transmission busy A sensing Y A Z Z LBT

p persistent CSMA When a node has a data block in the data link layer buffer, it starts sensing the carrier. As soon as it detects the channel is free, it sends the data block with probability p. Collisions may occur with probability P collc. P collc can not be reduced to zero. In an interference-limited environment, data block losses may occur, with probability P lossc < P collc. p = 1 1 persistent p = 0 non persistent A B A B A B A B ; Z Y wanted transmission undesired transmission busy A sensing Y A Z Z LBT

Random MAC in Compact Nets: Throughput Analysis Protocol Pure ALOHA Slotted ALOHA Unslotted 1-persistent CSMA Slotted 1-persistent CSMA Unslotted nonpersistent CSMA Slotted nonpersistent CSMA S Throughput Ge G G 1 G G(1 G G 2) e G G(1 2 ) (1 e ) (1 G) e S = t / Tf normalised propagation delay G[1 e (1 )(1 e S G Ge 1 e 2G G G G G ] e ) e G Ge G(1 2 ) e S S S Ge G G (1 ) G(1 ) (1 2 ) G(1 )

Throughput Comparison a) CSMA presents higher S with respect to ALOHA and S-ALOHA; b) 1-persistent CSMA has better performance with low traffic, and it becomes instable (reaching S=0) very quickly for high G. c) Non-persistent CSMA is excellent for high load, up to a maximum S almost 0.9 in the slotted case. Normalized propagation delay α = 0.01

Unslotted Non Persistent CSMA: Throughput S G Ge G(1 2 ) e G a) α S ; the inefficiency related to the propagation τ is less significant and the sensing operation becomes more efficient; b) α=1; τ =Tf or τ>>tf results in a low protocol efficiency; c) α=0; theoretical limit. S tends to be 1, so no network instability as G increases. Ideally, no collision could happen.

Throughput versus Propagation Delay a) For ALOHA and S-ALOHA S MAX is a constant value with respect to α : 0.184 for ALOHA 0.368 for S-ALOHA S MAX b) CSMA has generally higher S MAX values, but for broad networks (large α) sensing is no more efficient and S MAX could be also less than in the ALOHA case. Nomalised Propagation Delay α

Example: 802.15.4 Beacon-Enabled Mode Superframe Beacon Beacon CAP CFP Non Beacon-Enabled Mode (a kind of) slotted CSMA/CA Only CAP, with (unslotted) CSMA/CA Maximum 7 GTSs (Guaranteed Time Slots)

Example: 802.15.4 NBE Flow Diagram Start NB=0, BE=BEmin Two parameters describe the MAC protocol besides the flow diagram: - NB counts the number of s the node tries to access the channel (backoff stages); - BE is used to derive the maximum backoff (i.e. the contention window). Delay for random (2 BE -1) unit backoff periods Perform sensing Channel free? N NB=NB+1, BE=min(BE+1,BEmax) Y N NB>NBmax? Y Blockage Transmission

Example: 802.15.4 NBE State Transition Diagram (incomplete version) standby/sleep idle listening transmission reception

Example: 802.15.4 NBE State Evolution Instance Packet generation busy free Delay for a random number of backoff periods [0 2 BE -1], BE min BE min BE BE max BE is increased by 1 at each backoff stage Default values: BE min =3, BE max =5, NB max =4 Backoff Period = T = 320 μs Sensing duration = 128 μs

Exercise NMA#1 Draw the flow diagram, the state transition diagram and an instance of the protocol evolution for 1-persistent CSMA. Assume: Rb = 2 Mbit/s, z = 160 bits, distance between nodes equal to 100 m, processing equal to 10 ms, acknowledgements of 40 bits, backoff procedure with constant contention window of 80 ms. Exercise NMA#2 Draw the flow diagram, the state transition diagram and an instance of the protocol evolution for non persistent CSMA. Assume: Rb = 2 Mbit/s, z = 160 bits, distance between nodes equal to 100 m, processing equal to 10 ms, acknowledgements of 40 bits, backoff procedure with constant contention window of 80 ms.

3. CSMA in Sparse Networks Prof. Roberto Verdone

CSMA/CA Hidden Node Problem Even if backoff solve collision problems in a compact network (where every node is within range of all others), hidden nodes cause collisions if transmission ranges do not cover the whole network (sparse networks). If node Z, willing to transmit to a given node Y, does not sense the transmission from a given source A to an other node B because received power is too small, but the node receiving both packets (B) is within range of both A and Z and detects a collision, then A is said to be an hidden node. A B A B A B A B ; Z Y R R = Range wanted transmission undesired transmission A Hidden node Y A Z Z busy

CSMA/CA with RTS/CTS When a node has a data block in the data link layer buffer, it starts sensing the carrier. When it detects the channel is free, a backoff phase is initiated; then, the node sends a short RTS block informing everyone within its range to avoid transmission. The receiver responds with a short CTS block allowing transmission and informing everyone within its range to avoid transmission. Upon reception of the CTS, the source node sends the data block. All nodes within range of receiver know that have to wait before transmitting a RTS. A B A B A B A B ; Z Y R R = Range wanted transmission undesired transmission busy A RTS B CTS Y A Z B Z Y

CSMA with RTS/CTS Exposed Node Problem If a node (A) willing to transmit a data block to a given sink (B), broadcasts the RTS, all other nodes within its range will refrain from transmitting. On the other hand, there might be a node Y willing to transmit to a sink Z which would not detect a collision because it is not within range of the interferer A, which refrains from transmitting though its transmission would not be a problem because its (Y s) range does not include the other link s sink (B). CSMA would work better in this case. CSMA/CA with RTS/CTS reduces throughput. A B A B A B A B ; Y Z R R = Range Exposed node wanted transmission undesired transmission busy A RTS B CTS Y A Z B Y Z

CSMA with RTS/CTS RTS / CTS mode is a powerful tool but must be used with care, dimensioning the transmit power of such short blocks so as to keep refrained from transmitting only those nodes that would really cause data losses. Particular problems may arise in ad hoc networks with relays. Case study follows.

CSMA with RTS/CTS in multi-hop networks Homogeneous deterministic mono-dimensional multi-hop scenario: network-layer throughput evaluation for a sequence of packets from A to B through n nodes; A R1 R2 Rn D D D D D D D B Assumptions: Backoff delay equal to zero Node A buffer always full C = k d -2 I = k d i -2 Frames are captured if C/I > 2 [d/d i ] -2 > 2 [d i /d] > 1.4 Frames are captured if C > C thr d < d thr = 2D Frames are perceived during sensing if C > C thrs d < d thrs = 3D inactive transmit receive sensing

CSMA with RTS/CTS in multi-hop networks A R1 R2 Rn B A R1 RTS CTS frame R2 R3 R4 R5 B

CSMA with RTS/CTS in multi-hop networks A R1 R2 Rn B A R1 R2 R3 R4 R5 B

CSMA with RTS/CTS in multi-hop networks A R1 R2 Rn B A R1 R2 R3 R4 R5 B

CSMA with RTS/CTS in multi-hop networks A R1 R2 Rn B A R1 R2 R3 R4 R5 B

CSMA with RTS/CTS in multi-hop networks A R1 R2 Rn B A R1 R2 R3 R4 R5 RTS frame captured CTS captured frame captured CTS captured B

CSMA with RTS/CTS in multi-hop networks Delay A P Tf A transmits RTS B receives B U CTS Assuming P << Tf, then delay is equal to Tf s (n+1): U = Tf (n+1) If random backoff s are included, with contention window size B, then delay also includes on average B/2 s (n+1): U = (Tf + B/2) (n+1)

CSMA with RTS/CTS in multi-hop networks Throughput A P Tf W Assuming P << Tf, if e.m. activity can be sensed up to 3D meters, then W = 4Tf. More generally, assuming P << Tf, if e.m. activity can be sensed up to xd meters, then W = (x+1)tf. Throughput is equal to RbTf bits divided by W: Th = Rb Tf / W = Rb / (x+1) It is relevant to make the RTS and CTS power level as small as possible, to minimise x, given that received power is sufficient to allow capture.

CSMA with RTS/CTS in multi-hop networks In a more complex scenario, with nodes distributed in a bi-dimensional environment, evaluation of throughput, even under simple assumptions, is more complex. In general, power control is needed to limit the throughput decrease due to the exposed terminal problem.

4. Bianchi s Model Prof. Roberto Verdone

Bianchi s paper Performance Analysis of a CSMA/CA Based System Through State Diagrams: IEEE 802.11 Distributed Coordination Function as a Case Study Evaluation of the Saturated Throughput 1 2 n

Bianchi s paper Ideal links No hidden nodes No packet capture 1 2 n

The 802.11 DCF MAC Algorithm Prof. Roberto Verdone

The 802.11 DCF MAC Algorithm W=W 0 m = 5 W m

Saturation Throughput Prof. Roberto Verdone

1. Packet Transmission Probability i, k i backoff stage k backoff counter value p collision probability

1. Packet Transmission Probability i, k i backoff stage k backoff counter value

1. Packet Transmission Probability i, k i backoff stage k backoff counter value

2. Saturation Throughput Prof. Roberto Verdone

Results Prof. Roberto Verdone

Results Prof. Roberto Verdone

Results Prof. Roberto Verdone

Results Prof. Roberto Verdone

Results Prof. Roberto Verdone

5. Scheduling Prof. Roberto Verdone

Scheduling scheduler

t k-1 t k T SCHED Prof. Roberto Verdone Scheduling M RU requests Scheduling instant Scheduling interval Scheduling Algorithm Classes: Application Unaware Scheduling Application Aware Scheduling Channel&Application Aware Scheduling Cross-Layer Scheduling N RUs (e.g. N slots) Ex: RR Ex: EDF Ex: MT, PF

Scheduling: Round Robin t k-1 t k The scheduler assigns one RU per request, repeating the assignment till all requests are exhausted or the scheduling interval has expired.

Scheduling: Earliest Deadline First t k-1 t k The scheduler computes the deadlines of requests, summing the maximum latency to the instant when the request was made. Then, it assigns RUs to requests, starting from the earliest deadline, assigning as many RUs are needed to fulfil the request, before considering the request with the next earliest deadline.

Scheduling: Maximum Throughput t k-1 t k The scheduler computes for each RU the throughput that every link would provide, and assigns each RU to the request maximizing the throughput, till all requests are exhausted or the scheduling interval has expired.

Scheduling: Proportional Fair t k-1 t k The scheduler computes for each RU the throughput that every link would provide, then assigns each RU k to the request i maximizing the following ratio: Th i / (Thp i + Thc i ) where Thp i = S L j=1 Th i,j Thc i = S k-1 j=1 Th i,j (sum over a window made of L previous intervals) (sum over all RUs assigned so far in current interval)

Scheduling: Fairness vs Opportunism Opportunism* Can be measured through the sum throughput achieved by the whole set of RUs during one scheduling interval STh STh = S N j=1 Th j (t k ) MAX Fairness* Can be measured through the Jain index J = ( S M i=1 Tha i ) 2 / M S M i=1 Tha 2 i 0 0 1 J Tha i = < Th i > (average over a window made of several intervals) * Throughput Th can be replaced by other metrics

Exercise NMA#3 A scheduler executes scheduling every 10 ms, assigning up to 20 orthogonal radio resource units per scheduling interval. Three users, A, B, C, request assignment at T i = t 0 - Dt i, of a number R i of resource units, with maximum latencies t i. They are located at distances d i from the base station they are trying to access to. The value of these parameters are given below for i = A, B and C. The SNR is equal to 86 db at the distance of 1 m. The received power follows a distance dependent power law with propagation exponent equal to 4. Assume that the transmitters use a MCS requiring a minimum SNR* = 9 db to achieve BLER = 0. The BLER is equal to 1 for SNR < SNR*. Assign resources to the users according to RR, EDF, MT and PF algorithms, running at t 0. Compute in each case the Sum Throughput and the Jain index (in terms of RUs). Dt i t i R i d i A 5 ms 15 ms 12 50 m B 4 ms 60 ms 15 10 m C 2 ms 10 ms 2 100 m

Exercise NMA#4 A scheduler executes scheduling every 10 ms, assigning up to 20 orthogonal radio resource units per scheduling interval. Three users, A, B, C, request assignment at T i = t 0 - Dt i, of a number R i of resource units, with maximum latencies t i. They are located at distances d i from the base station they are trying to access to. The value of these parameters are given below for i = A, B and C. The SNR is equal to 86 db at the distance of 1 m. The received power follows a distance dependent power law with propagation exponent equal to 4. Assume that the transmitters use a MCS requiring a minimum SNR* = 9 db to achieve BLER = 0. The BLER is equal to 1 for SNR < SNR*. Assign resources to the users according to RR, EDF, MT and PF algorithms, running at t 0. Compute in each case the Sum Throughput and the Jain index (in terms of RUs). Dt i t i R i d i A 5 ms 15 ms 12 100 m B 4 ms 60 ms 15 10 m C 2 ms 10 ms 2 100 m

Exercise NMA#5 A scheduler executes scheduling every 10 ms, assigning up to 20 orthogonal radio resource units per scheduling interval. Three users, A, B, C, request assignment at T i = t 0 - Dt i, of a number R i of resource units, with maximum latencies t i. They are located at distances d i from the base station they are trying to access to. The value of these parameters are given below for i = A, B and C. The SNR is equal to 86 db at the distance of 1 m. The received power follows a distance dependent power law with propagation exponent equal to 4. Assume that the transmitters can use several MCSs providing up to 50 Kbit/s/RU. The channel bandwidth per RU is 10 KHz. Assign resources to the users according to RR, EDF, MT and PF algorithms, running at t 0. Compute in each case the Sum Throughput and the Jain index (in terms of bit/s, using Shannon bound). Dt i t i R i d i A 5 ms 15 ms 12 50 m B 4 ms 60 ms 15 10 m C 2 ms 10 ms 2 100 m