Performance Tuning of Failure Detectors in Wireless Ad-Hoc Networks: Modelling and Experiments

Size: px
Start display at page:

Download "Performance Tuning of Failure Detectors in Wireless Ad-Hoc Networks: Modelling and Experiments"

Transcription

1 Performance Tuning of Failure Detectors in Wireless Ad-Hoc Networks: Modelling and Experiments Laboratoire ID-IMAG (UMR 5132), Projet Apache. MIRRA Project: Industrial collaboration INRIA - France Télécom R&D September 2, 2005 orine Marchand & Jean-Marc Vincent {Corine.Marchand,Jean-Marc.Vincent}@imag.fr EPEW - September 2005 ( Laboratoire September ID-IMAG 2, 2005 (UMR 5132), 1 / 24Pr

2 Outline 1 Wireless environment Wireless environment Distributed systems on a wireless network The Consensus Problem 2 Quality of Service of Failure Detectors Theoretical Concept Failure Detectors Implementation Quality of Service 3 Stochastic Models Statistical Description Independent assumption Model Contention on receiver 4 Experimentation Experimental environment Saturation Ideal Setting Experimentation Experimentation in perturbed environment 5 Conclusion and future works {Corine.Marchand,Jean-Marc.Vincent}@imag.fr EPEW - September 2005 ( Laboratoire September ID-IMAG 2, 2005 (UMR 5132), 2 / 24Pr

3 Outline 1 Wireless environment Wireless environment Distributed systems on a wireless network The Consensus Problem 2 Quality of Service of Failure Detectors Theoretical Concept Failure Detectors Implementation Quality of Service 3 Stochastic Models Statistical Description Independent assumption Model Contention on receiver 4 Experimentation Experimental environment Saturation Ideal Setting Experimentation Experimentation in perturbed environment 5 Conclusion and future works {Corine.Marchand,Jean-Marc.Vincent}@imag.fr EPEW - September 2005 ( Laboratoire September ID-IMAG 2, 2005 (UMR 5132), 3 / 24Pr

4 Wireless environment Environment Wireless Devices Laptop computers, Personal digital assistants (PDAs), Mobile phones,... Wireless Ad-Hoc Network WIFI, Bluetooth,... Principle Devices share services and collaborate to maintain the community. General distributed system problem Dynamical control of the architecture. State of the system observation and distributed decision process. orine Marchand & Jean-Marc Vincent EPEW - September 2005 ( Laboratoire September ID-IMAG 2, 2005 (UMR 5132), 4 / 24Pr

5 Wireless environment Environment Wireless Devices Laptop computers, Personal digital assistants (PDAs), Mobile phones,... Wireless Ad-Hoc Network WIFI, Bluetooth,... Principle Devices share services and collaborate to maintain the community. General distributed system problem Dynamical control of the architecture. State of the system observation and distributed decision process. orine Marchand & Jean-Marc Vincent EPEW - September 2005 ( Laboratoire September ID-IMAG 2, 2005 (UMR 5132), 4 / 24Pr

6 Operating systems on a wireless network Dynamic Architecture Heterogeneity of devices Behavior of wireless devices connections / disconnections Behavior of wireless network Unreliability of communications Variability of latencies Solution to maintain the consistency of the community Design and adapt distributed algorithms; to make some distributed decisions. (consensus, election, atomic broadcast, group membership,...) {Corine.Marchand,Jean-Marc.Vincent}@imag.fr EPEW - September 2005 ( Laboratoire September ID-IMAG 2, 2005 (UMR 5132), 5 / 24Pr

7 The Consensus Problem The impossibility of Fisher, Lynch & Paterson [Fischer-Lynch-Paterson 85] Some approaches to circumvent this impossibility result: Probabilistic algorithms [Canetti-Rabin 93] Self-Stabilizing algorithms [Tixeuil 00] An approach with partial synchrony [Dwork-Lynch-Stockmeyer 88]... The selected approach : Consensus + unreliable failure detectors [Chandra-Toueg 96] Interest: Dynamicity analysis of the environment is concentrated only inside failure detectors. Objective: Guarantee a quality of service for failure detectors. {Corine.Marchand,Jean-Marc.Vincent}@imag.fr EPEW - September 2005 ( Laboratoire September ID-IMAG 2, 2005 (UMR 5132), 6 / 24Pr

8 The Consensus Problem The impossibility of Fisher, Lynch & Paterson [Fischer-Lynch-Paterson 85] Some approaches to circumvent this impossibility result: Probabilistic algorithms [Canetti-Rabin 93] Self-Stabilizing algorithms [Tixeuil 00] An approach with partial synchrony [Dwork-Lynch-Stockmeyer 88]... The selected approach : Consensus + unreliable failure detectors [Chandra-Toueg 96] Interest: Dynamicity analysis of the environment is concentrated only inside failure detectors. Objective: Guarantee a quality of service for failure detectors. {Corine.Marchand,Jean-Marc.Vincent}@imag.fr EPEW - September 2005 ( Laboratoire September ID-IMAG 2, 2005 (UMR 5132), 6 / 24Pr

9 Outline 1 Wireless environment Wireless environment Distributed systems on a wireless network The Consensus Problem 2 Quality of Service of Failure Detectors Theoretical Concept Failure Detectors Implementation Quality of Service 3 Stochastic Models Statistical Description Independent assumption Model Contention on receiver 4 Experimentation Experimental environment Saturation Ideal Setting Experimentation Experimentation in perturbed environment 5 Conclusion and future works {Corine.Marchand,Jean-Marc.Vincent}@imag.fr EPEW - September 2005 ( Laboratoire September ID-IMAG 2, 2005 (UMR 5132), 7 / 24Pr

10 Unreliable Failure Detectors Principle: For each remote device, build an estimation of the global state. Local view of the global system. List of suspected devices Properties Accuracy: a correct process should not be suspected Completeness: an incorrect process should be suspected Quality of service Quality of information and reactivity false suspicion rate = function(reactivity) Implementation - false suspicion type 1: correct process suspected - false suspicion type 2: crashed process not suspected Risk analysis {Corine.Marchand,Jean-Marc.Vincent}@imag.fr EPEW - September 2005 ( Laboratoire September ID-IMAG 2, 2005 (UMR 5132), 8 / 24Pr

11 Unreliable Failure Detectors Principle: For each remote device, build an estimation of the global state. Local view of the global system. List of suspected devices Properties Accuracy: a correct process should not be suspected Completeness: an incorrect process should be suspected Quality of service Quality of information and reactivity Implementation false suspicion rate = function(reactivity) Timeout - false suspicion type 1: correct process suspected - false suspicion type 2: crashed process not suspected Risk analysis No Suspicion Heartbeat Receipt Suspicion {Corine.Marchand,Jean-Marc.Vincent}@imag.fr EPEW - September 2005 ( Laboratoire September ID-IMAG 2, 2005 (UMR 5132), 8 / 24Pr

12 Failure Detectors Implementation Need of information on remote devices Export local data Collect and analyse data coming from remote devices Info publication Consultation Informations Export Broadcast of information by anticipation (Heartbeat mecanism) Network Interface Export module Middleware Interface MW control ( policy & parameters ) Suspicion request Information List to query List of suspects Consensus interface MW control ( policy & parameters ) Network interface Import module Middleware Interface Suspicion request Informations Import Collect information Estimate the state of remote devices Information {Corine.Marchand,Jean-Marc.Vincent}@imag.fr EPEW - September 2005 ( Laboratoire September ID-IMAG 2, 2005 (UMR 5132), 9 / 24Pr

13 Failure Detectors Parameters The running principle: Implemented mecanism: heartbeat. FD Export Process FD sending delay Sender Device FD Import Process FD receipt delay θ θ θ θ θ Receiver Device Parameters Heartbeat sending period. Estimate function of suspicions (timeout). [Bertier-Marin-Sens 03] Goal Estimate the timeout values according to the expected quality of service. EPEW - September 2005 ( Laboratoire September ID-IMAG 2, 2005 (UMR ), / 24Pr

14 Failure Detectors Parameters The running principle: Implemented mecanism: heartbeat. FD Export Process FD sending delay Sender Device FD Import Process FD receipt delay θ θ θ θ θ Receiver Device Parameters Heartbeat sending period. Estimate function of suspicions (timeout). [Bertier-Marin-Sens 03] Goal Estimate the timeout values according to the expected quality of service. EPEW - September 2005 ( Laboratoire September ID-IMAG 2, 2005 (UMR ), / 24Pr

15 Outline 1 Wireless environment Wireless environment Distributed systems on a wireless network The Consensus Problem 2 Quality of Service of Failure Detectors Theoretical Concept Failure Detectors Implementation Quality of Service 3 Stochastic Models Statistical Description Independent assumption Model Contention on receiver 4 Experimentation Experimental environment Saturation Ideal Setting Experimentation Experimentation in perturbed environment 5 Conclusion and future works {Corine.Marchand,Jean-Marc.Vincent}@imag.fr EPEW - September 2005 ( Laboratoire September ID-IMAG 2, 2005 (UMR ), / 24Pr

16 Statistical Description FD Export Process Network FD sending delay HB Interval (given) Network sending delay Sender Device Network FD Import Process Network receipt delay HB interval (measured) FD receipt delay Receiver Device Variability of HB arrivals λ 0 = emission beat rate X i = Heartbeat inter-arrivals. λ = 1 HB period (assumption : few losses λ = λ 0.(1 loss probability) orine Marchand & Jean-Marc Vincent {Corine.Marchand,Jean-Marc.Vincent}@imag.fr EPEW - September 2005 ( Laboratoire September ID-IMAG 2, 2005 (UMR ), / 24Pr

17 Statistical Description False Detection Probability θ = suspicion threshold (timeout) φ I (θ) = asymptotic false suspicion rate 1 φ I (θ) = λ lim n n nx (X i θ) + If the inter-arrivals {X i } of beats are independent and identically distributed, then : i=1 φ I (θ) = λe π [X θ] + where π is the distribution of X i. (renewal process) {Corine.Marchand,Jean-Marc.Vincent}@imag.fr EPEW - September 2005 ( Laboratoire September ID-IMAG 2, 2005 (UMR 5132), / 24Pr

18 Independent assumption Model Variable Sending Delay Hypothesis : {X i } : renewal process (iid) Model suspicion rate no information on variance Exponential φ I (θ) = e λθ low variation coefficient Erlang(k,kλ) φ I (θ) = e kλθ P k (λθ) high variation coefficient Pareto(α) φ I (θ) = 1 (1+ α 2 θ )α 2 Suspicion probability related to reactivity Erlang model: Pareto model: {Corine.Marchand,Jean-Marc.Vincent}@imag.fr EPEW - September 2005 ( Laboratoire September ID-IMAG 2, 2005 (UMR ), / 24Pr

19 Independent assumption Model Variable Sending Delay Hypothesis : {X i } : renewal process (iid) Model suspicion rate no information on variance Exponential φ I (θ) = e λθ low variation coefficient Erlang(k,kλ) φ I (θ) = e kλθ P k (λθ) high variation coefficient Pareto(α) φ I (θ) = 1 (1+ α 2 θ )α 2 Suspicion probability related to reactivity Erlang model: False suspicion rate k=1 (exponential model) Pareto model: k= σ= 3 1e 04 k=3 k=5 k=4 1e θ σ=1.1 σ= θ {Corine.Marchand,Jean-Marc.Vincent}@imag.fr EPEW - September 2005 ( Laboratoire September ID-IMAG 2, 2005 (UMR ), / 24Pr

20 Contention on receiver (1) Variability of Heartbeat Arrivals Depends on the type of receiver (Laptop or PDA) + Correlation between inter-beats arrival periods Network FD Import Process variability of delivery Receiver Device HB contention on the receiver Heart beats Network Buffer Service Failure detector input process : {A n} n N service model : {S n} n N Delivery to upper layer GI/M/1 queue hypothesis : deterministic arrivals {Corine.Marchand,Jean-Marc.Vincent}@imag.fr EPEW - September 2005 ( Laboratoire September ID-IMAG 2, 2005 (UMR ), / 24Pr

21 Contention on receiver (2) Output process of a D/M/1 queue Suspicion rate computation Inter-output period : A = 1 λ ; β unique solution of β = L A(µ(1 β)) = e Aµ(1 β) f Z (x) = ( µ Rate of false suspicion : θ > A φ I (θ) = 2 β e µ(1 β)a ((1 β)e µ(1 β)x + e µx ) if x < A; µ 2 β e µx (e µ(1 β)a + (1 β)e µa ) if x A. 1 A(2 β)µ e µθ (e µ(1 β)a + (1 β)e µa ) θ A False suspicion probability, D/M/1 model {Corine.Marchand,Jean-Marc.Vincent}@imag.fr EPEW - September 2005 ( Laboratoire September ID-IMAG 2, 2005 (UMR ), / 24Pr

22 Contention on receiver (2) Output process of a D/M/1 queue Suspicion rate computation Inter-output period : A = 1 λ ; β unique solution of β = L A(µ(1 β)) = e Aµ(1 β) f Z (x) = ( µ Rate of false suspicion : θ > A φ I (θ) = 2 β e µ(1 β)a ((1 β)e µ(1 β)x + e µx ) if x < A; µ 2 β e µx (e µ(1 β)a + (1 β)e µa ) if x A. 1 A(2 β)µ e µθ (e µ(1 β)a + (1 β)e µa ) θ A False suspicion probability, D/M/1 model 10 False probability suspicion False probability suspicion µ=2 1 1e 05 µ= e e 15 1e 04 1e 20 1e 05 1e 25 1e 06 1e 30 A=1 A=1 1e 07 1e 35 θ θ {Corine.Marchand,Jean-Marc.Vincent}@imag.fr EPEW - September 2005 ( Laboratoire September ID-IMAG 2, 2005 (UMR ), / 24Pr

23 Outline 1 Wireless environment Wireless environment Distributed systems on a wireless network The Consensus Problem 2 Quality of Service of Failure Detectors Theoretical Concept Failure Detectors Implementation Quality of Service 3 Stochastic Models Statistical Description Independent assumption Model Contention on receiver 4 Experimentation Experimental environment Saturation Ideal Setting Experimentation Experimentation in perturbed environment 5 Conclusion and future works {Corine.Marchand,Jean-Marc.Vincent}@imag.fr EPEW - September 2005 ( Laboratoire September ID-IMAG 2, 2005 (UMR ), / 24Pr

24 Experimental environment Experimental Design: Devices (same OS, Java): Architecture 1 : 4 devices (2 Laptops + 2 PDAs) Architecture 2 : 6 devices (2 Laptops + 3 PDAs + 1 sensor Interconnection : b ad-hoc network Experimental duration: 15 min ( about 10,000 measurements) HB parameter Settings: Architecture 1 Architecture 2 Architecture 2 Highly loaded Ideal Setting Perturbed Environment HB emission period 100 ms 500 ms 500 ms Timeout none none none Reception process analysis Density of the delivery process timeout tuning {Corine.Marchand,Jean-Marc.Vincent}@imag.fr EPEW - September 2005 ( Laboratoire September ID-IMAG 2, 2005 (UMR ), / 24Pr

25 Experimental environment Experimental Design: Devices (same OS, Java): Architecture 1 : 4 devices (2 Laptops + 2 PDAs) Architecture 2 : 6 devices (2 Laptops + 3 PDAs + 1 sensor Interconnection : b ad-hoc network Experimental duration: 15 min ( about 10,000 measurements) HB parameter Settings: Architecture 1 Architecture 2 Architecture 2 Highly loaded Ideal Setting Perturbed Environment HB emission period 100 ms 500 ms 500 ms Timeout none none none Reception process analysis Density of the delivery process timeout tuning {Corine.Marchand,Jean-Marc.Vincent}@imag.fr EPEW - September 2005 ( Laboratoire September ID-IMAG 2, 2005 (UMR ), / 24Pr

26 Highly loaded system Distribution of the update times: 0.01 sender: PDA1 - receiver: PDA sender: PDA1 - receiver: laptop Probability Probability Times between 2 heartbeat receipts sender: laptop1 - receiver: PDA Times between 2 heartbeat receipts Probability Probability Times between 2 heartbeat receipts 0.08 sender: laptop1 - receiver: laptop Times between 2 heartbeat receipts If timeout value = 200 ms Quality of service highly depends on the type of the receiver orine Marchand & Jean-Marc Vincent {Corine.Marchand,Jean-Marc.Vincent}@imag.fr EPEW - September 2005 ( Laboratoire September ID-IMAG 2, 2005 (UMR ), / 24Pr

27 Highly loaded system Distribution of the update times: 0.01 sender: PDA1 - receiver: PDA sender: PDA1 - receiver: laptop Probability Probability Times between 2 heartbeat receipts sender: laptop1 - receiver: PDA Times between 2 heartbeat receipts Probability Probability Times between 2 heartbeat receipts 0.08 sender: laptop1 - receiver: laptop Times between 2 heartbeat receipts If timeout value = 200 ms Quality of service highly depends on the type of the receiver orine Marchand & Jean-Marc Vincent {Corine.Marchand,Jean-Marc.Vincent}@imag.fr EPEW - September 2005 ( Laboratoire September ID-IMAG 2, 2005 (UMR ), / 24Pr

28 Ideal Setting Experimentation Heartbeat Reception Analysis: 0.14 sender: laptop1 receiver: laptop2 sender: laptop1 receiver: pda2 sender: pda1 receiver: laptop sender: pda1 receiver: pda2 Probability Elapsed times between 2 receipts Timeout value: If the timeout value = 2 (HB period time) Then, the suspicion rate is around 10 3 if the receiver is a laptop 10 2 if the receiver is a PDA {Corine.Marchand,Jean-Marc.Vincent}@imag.fr EPEW - September 2005 ( Laboratoire September ID-IMAG 2, 2005 (UMR ), / 24Pr

29 Ideal Setting Experimentation Heartbeat Reception Analysis: 0.14 sender: laptop1 receiver: laptop2 sender: laptop1 receiver: pda2 sender: pda1 receiver: laptop sender: pda1 receiver: pda2 Probability Elapsed times between 2 receipts Timeout value: If the timeout value = 2 (HB period time) Then, the suspicion rate is around 10 3 if the receiver is a laptop 10 2 if the receiver is a PDA {Corine.Marchand,Jean-Marc.Vincent}@imag.fr EPEW - September 2005 ( Laboratoire September ID-IMAG 2, 2005 (UMR ), / 24Pr

30 Experimentation in perturbed environment Perturbation control : An external device is used to generate an external load (ping with 200kbytes/s) Heartbeat Reception Analysis: sender: Laptop1 receiver: Laptop2 sender: Laptop1 receiver: PDA2 sender: PDA1 receiver: Laptop2 sender: PDA1 receiver: PDA2 Probability Elapsed Times between 2 heartbeat receipts Results: Long non receiving period for PDA Some very small delays between HB receipts (after a long waiting time) Correlation between succesive waiting times of two HB (bursty receptions) {Corine.Marchand,Jean-Marc.Vincent}@imag.fr EPEW - September 2005 ( Laboratoire September ID-IMAG 2, 2005 (UMR ), / 24Pr

31 Experimentation in perturbed environment Perturbation control : An external device is used to generate an external load (ping with 200kbytes/s) Heartbeat Reception Analysis: sender: Laptop1 receiver: Laptop2 sender: Laptop1 receiver: PDA2 sender: PDA1 receiver: Laptop2 sender: PDA1 receiver: PDA2 Probability Elapsed Times between 2 heartbeat receipts Results: Long non receiving period for PDA Some very small delays between HB receipts (after a long waiting time) Correlation between succesive waiting times of two HB (bursty receptions) {Corine.Marchand,Jean-Marc.Vincent}@imag.fr EPEW - September 2005 ( Laboratoire September ID-IMAG 2, 2005 (UMR ), / 24Pr

32 Outline 1 Wireless environment Wireless environment Distributed systems on a wireless network The Consensus Problem 2 Quality of Service of Failure Detectors Theoretical Concept Failure Detectors Implementation Quality of Service 3 Stochastic Models Statistical Description Independent assumption Model Contention on receiver 4 Experimentation Experimental environment Saturation Ideal Setting Experimentation Experimentation in perturbed environment 5 Conclusion and future works {Corine.Marchand,Jean-Marc.Vincent}@imag.fr EPEW - September 2005 ( Laboratoire September ID-IMAG 2, 2005 (UMR ), / 24Pr

33 Conclusion Modelling Models for systems in stationary regime Contention on receivers Analytical formula Architecture Identification of FD QoS Experimental protocol Implementation in a distributed Middleware (Sidrah) {Corine.Marchand,Jean-Marc.Vincent}@imag.fr EPEW - September 2005 ( Laboratoire September ID-IMAG 2, 2005 (UMR ), / 24Pr

34 Future works Modelling Non-stationary analysis : auto-regressive models Environment evolution model Application model : network sniffing Architecture Scaling the system : routing (dynamic graph model) Multilevel observation environment Dynamic control : contention prevention {Corine.Marchand,Jean-Marc.Vincent}@imag.fr EPEW - September 2005 ( Laboratoire September ID-IMAG 2, 2005 (UMR ), / 24Pr

An Exponential Smoothing Adaptive Failure Detector in the Dual Model of Heartbeat and Interaction

An Exponential Smoothing Adaptive Failure Detector in the Dual Model of Heartbeat and Interaction Regular Paper Journal of Computing Science and Engineering, Vol. 8, No., March 204, pp. 7-24 An Exponential Smoothing Adaptive Failure Detector in the Dual Model of Heartbeat and Interaction Zhiyong Yang*,

More information

The ϕ Accrual Failure Detector

The ϕ Accrual Failure Detector The ϕ Accrual Failure Detector Naohiro Hayashibara, Xavier Défago (contact), Rami Yared and Takuya Katayama School of Information Science Japan Advanced Institute of Science and Technology (JAIST) 1-1

More information

AN ADAPTIVE FAILURE DETECTION APPROACH FOR REAL-TIME DISTRIBUTED CONTROL SYSTEMS OVER SHARED ETHERNET

AN ADAPTIVE FAILURE DETECTION APPROACH FOR REAL-TIME DISTRIBUTED CONTROL SYSTEMS OVER SHARED ETHERNET AN ADAPTIVE FAILURE DETECTION APPROACH FOR REAL-TIME DISTRIBUTED CONTROL SYSTEMS OVER SHARED ETHERNET Alírio dos Santos Sá and Raimundo José de Araújo Macêdo Pos-Graduation Program on Mechatronics 1 -

More information

How user throughput depends on the traffic demand in large cellular networks

How user throughput depends on the traffic demand in large cellular networks How user throughput depends on the traffic demand in large cellular networks B. Błaszczyszyn Inria/ENS based on a joint work with M. Jovanovic and M. K. Karray (Orange Labs, Paris) 1st Symposium on Spatial

More information

Mining for Statistical Models of Availability in Large-Scale Distributed Systems: An Empirical Study of

Mining for Statistical Models of Availability in Large-Scale Distributed Systems: An Empirical Study of Mining for Statistical Models of Availability in Large-Scale Distributed Systems: An Empirical Study of SETI@home Bahman Javadi 1, Derrick Kondo 1, Jean-Marc Vincent 1,2, David P. Anderson 3 1 Laboratoire

More information

Transport Capacity and Spectral Efficiency of Large Wireless CDMA Ad Hoc Networks

Transport Capacity and Spectral Efficiency of Large Wireless CDMA Ad Hoc Networks Transport Capacity and Spectral Efficiency of Large Wireless CDMA Ad Hoc Networks Yi Sun Department of Electrical Engineering The City College of City University of New York Acknowledgement: supported

More information

EE 791 EEG-5 Measures of EEG Dynamic Properties

EE 791 EEG-5 Measures of EEG Dynamic Properties EE 791 EEG-5 Measures of EEG Dynamic Properties Computer analysis of EEG EEG scientists must be especially wary of mathematics in search of applications after all the number of ways to transform data is

More information

Experimental study of the effects of Transmission Power Control and Blacklisting in Wireless Sensor Networks

Experimental study of the effects of Transmission Power Control and Blacklisting in Wireless Sensor Networks Experimental study of the effects of Transmission Power Control and Blacklisting in Wireless Sensor Networks Dongjin Son, Bhaskar Krishnamachari and John Heidemann Presented by Alexander Lash CS525M Introduction

More information

Hedonic Coalition Formation for Distributed Task Allocation among Wireless Agents

Hedonic Coalition Formation for Distributed Task Allocation among Wireless Agents Hedonic Coalition Formation for Distributed Task Allocation among Wireless Agents Walid Saad, Zhu Han, Tamer Basar, Me rouane Debbah, and Are Hjørungnes. IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. 10,

More information

Wireless communications: from simple stochastic geometry models to practice III Capacity

Wireless communications: from simple stochastic geometry models to practice III Capacity Wireless communications: from simple stochastic geometry models to practice III Capacity B. Błaszczyszyn Inria/ENS Workshop on Probabilistic Methods in Telecommunication WIAS Berlin, November 14 16, 2016

More information

Chapter 2 Distributed Consensus Estimation of Wireless Sensor Networks

Chapter 2 Distributed Consensus Estimation of Wireless Sensor Networks Chapter 2 Distributed Consensus Estimation of Wireless Sensor Networks Recently, consensus based distributed estimation has attracted considerable attention from various fields to estimate deterministic

More information

Throughput-optimal number of relays in delaybounded multi-hop ALOHA networks

Throughput-optimal number of relays in delaybounded multi-hop ALOHA networks Page 1 of 10 Throughput-optimal number of relays in delaybounded multi-hop ALOHA networks. Nekoui and H. Pishro-Nik This letter addresses the throughput of an ALOHA-based Poisson-distributed multihop wireless

More information

Bandwidth Estimation Using End-to- End Packet-Train Probing: Stochastic Foundation

Bandwidth Estimation Using End-to- End Packet-Train Probing: Stochastic Foundation Bandwidth Estimation Using End-to- End Packet-Train Probing: Stochastic Foundation Xiliang Liu Joint work with Kaliappa Ravindran and Dmitri Loguinov Department of Computer Science City University of New

More information

Some results on optimal estimation and control for lossy NCS. Luca Schenato

Some results on optimal estimation and control for lossy NCS. Luca Schenato Some results on optimal estimation and control for lossy NCS Luca Schenato Networked Control Systems Drive-by-wire systems Swarm robotics Smart structures: adaptive space telescope Wireless Sensor Networks

More information

Lecture 8: Frequency Reuse Concepts

Lecture 8: Frequency Reuse Concepts EE 499: Wireless & Mobile ommunications (082) Lecture 8: Frequency Reuse oncepts Dr. Wajih. bu-l-saud Trunking and Grade of Service (GoS) Trunking is the concept that allows large number of users to use

More information

Panda: Neighbor Discovery on a Power Harvesting Budget. Robert Margolies, Guy Grebla, Tingjun Chen, Dan Rubenstein, Gil Zussman

Panda: Neighbor Discovery on a Power Harvesting Budget. Robert Margolies, Guy Grebla, Tingjun Chen, Dan Rubenstein, Gil Zussman Panda: Neighbor Discovery on a Power Harvesting Budget Robert Margolies, Guy Grebla, Tingjun Chen, Dan Rubenstein, Gil Zussman The Internet of Tags Small energetically self-reliant tags Enabling technologies

More information

Analytical Model for an IEEE WLAN using DCF with Two Types of VoIP Calls

Analytical Model for an IEEE WLAN using DCF with Two Types of VoIP Calls Analytical Model for an IEEE 80.11 WLAN using DCF with Two Types of VoIP Calls Sri Harsha Anurag Kumar Vinod Sharma Department of Electrical Communication Engineering Indian Institute of Science Bangalore

More information

Real Time User-Centric Energy Efficient Scheduling In Embedded Systems

Real Time User-Centric Energy Efficient Scheduling In Embedded Systems Real Time User-Centric Energy Efficient Scheduling In Embedded Systems N.SREEVALLI, PG Student in Embedded System, ECE Under the Guidance of Mr.D.SRIHARI NAIDU, SIDDARTHA EDUCATIONAL ACADEMY GROUP OF INSTITUTIONS,

More information

2 Polling. Politecnico di Milano Facoltà di Ingegneria dell Informazione

2 Polling. Politecnico di Milano Facoltà di Ingegneria dell Informazione Politecnico di Milano Facoltà di Ingegneria dell Informazione Polling Multiple Access in Wireless Networks: Models and echnologies Prof. Antonio Capone Assumptions and notation o In the following we drop

More information

Closing the loop around Sensor Networks

Closing the loop around Sensor Networks Closing the loop around Sensor Networks Bruno Sinopoli Shankar Sastry Dept of Electrical Engineering, UC Berkeley Chess Review May 11, 2005 Berkeley, CA Conceptual Issues Given a certain wireless sensor

More information

Downlink Erlang Capacity of Cellular OFDMA

Downlink Erlang Capacity of Cellular OFDMA Downlink Erlang Capacity of Cellular OFDMA Gauri Joshi, Harshad Maral, Abhay Karandikar Department of Electrical Engineering Indian Institute of Technology Bombay Powai, Mumbai, India 400076. Email: gaurijoshi@iitb.ac.in,

More information

Circuit Switching: Traffic Engineering References Chapter 1, Telecommunication System Engineering, Roger L. Freeman, Wiley. J.1

Circuit Switching: Traffic Engineering References Chapter 1, Telecommunication System Engineering, Roger L. Freeman, Wiley. J.1 Circuit Switching: Traffic Engineering References Chapter 1, Telecommunication System Engineering, Roger L. Freeman, Wiley. J.1 Introduction Example: mesh connection (full mesh) for an eight-subscriber

More information

Increasing Broadcast Reliability for Vehicular Ad Hoc Networks. Nathan Balon and Jinhua Guo University of Michigan - Dearborn

Increasing Broadcast Reliability for Vehicular Ad Hoc Networks. Nathan Balon and Jinhua Guo University of Michigan - Dearborn Increasing Broadcast Reliability for Vehicular Ad Hoc Networks Nathan Balon and Jinhua Guo University of Michigan - Dearborn I n t r o d u c t i o n General Information on VANETs Background on 802.11 Background

More information

Efficiency and detectability of random reactive jamming in wireless networks

Efficiency and detectability of random reactive jamming in wireless networks Efficiency and detectability of random reactive jamming in wireless networks Ni An, Steven Weber Modeling & Analysis of Networks Laboratory Drexel University Department of Electrical and Computer Engineering

More information

Retransmission and Back-off Strategies for Broadcasting in Multi-hop Wireless Networks

Retransmission and Back-off Strategies for Broadcasting in Multi-hop Wireless Networks Retransmission and Back-off Strategies for Broadcasting in Multi-hop Wireless Networks Jesus Arango, Alon Efrat Computer Science Department University of Arizona Srinivasan Ramasubramanian Electrical and

More information

RECOMMENDATION ITU-R P The prediction of the time and the spatial profile for broadband land mobile services using UHF and SHF bands

RECOMMENDATION ITU-R P The prediction of the time and the spatial profile for broadband land mobile services using UHF and SHF bands Rec. ITU-R P.1816 1 RECOMMENDATION ITU-R P.1816 The prediction of the time and the spatial profile for broadband land mobile services using UHF and SHF bands (Question ITU-R 211/3) (2007) Scope The purpose

More information

TRADING OFF CONSUMPTION OF ROUTING AND PRECISION OF MEMBERSHIP IN AD HOC NETWORKS

TRADING OFF CONSUMPTION OF ROUTING AND PRECISION OF MEMBERSHIP IN AD HOC NETWORKS TRADING OFF CONSUMPTION OF ROUTING AND PRECISION OF MEMBERSHIP IN AD HOC NETWORKS Juan Carlos García, Mari-Carmen Bañuls, Pablo Galdámez and Rubén Quintero Instituto Tecnológico de Informática, Universidad

More information

Ranging detection algorithm for indoor UWB channels and research activities relating to a UWB-RFID localization system

Ranging detection algorithm for indoor UWB channels and research activities relating to a UWB-RFID localization system Ranging detection algorithm for indoor UWB channels and research activities relating to a UWB-RFID localization system Dr Choi Look LAW Founding Director Positioning and Wireless Technology Centre School

More information

Understanding Channel and Interface Heterogeneity in Multi-channel Multi-radio Wireless Mesh Networks

Understanding Channel and Interface Heterogeneity in Multi-channel Multi-radio Wireless Mesh Networks Understanding Channel and Interface Heterogeneity in Multi-channel Multi-radio Wireless Mesh Networks Anand Prabhu Subramanian, Jing Cao 2, Chul Sung, Samir R. Das Stony Brook University, NY, U.S.A. 2

More information

Localization in Wireless Sensor Networks

Localization in Wireless Sensor Networks Localization in Wireless Sensor Networks Part 2: Localization techniques Department of Informatics University of Oslo Cyber Physical Systems, 11.10.2011 Localization problem in WSN In a localization problem

More information

Energy-Efficient Data Management for Sensor Networks

Energy-Efficient Data Management for Sensor Networks Energy-Efficient Data Management for Sensor Networks Al Demers, Cornell University ademers@cs.cornell.edu Johannes Gehrke, Cornell University Rajmohan Rajaraman, Northeastern University Niki Trigoni, Cornell

More information

Syed Obaid Amin. Date: February 11 th, Networking Lab Kyung Hee University

Syed Obaid Amin. Date: February 11 th, Networking Lab Kyung Hee University Detecting Jamming Attacks in Ubiquitous Sensor Networks Networking Lab Kyung Hee University Date: February 11 th, 2008 Syed Obaid Amin obaid@networking.khu.ac.kr Contents Background Introduction USN (Ubiquitous

More information

Randomized Channel Access Reduces Network Local Delay

Randomized Channel Access Reduces Network Local Delay Randomized Channel Access Reduces Network Local Delay Wenyi Zhang USTC Joint work with Yi Zhong (Ph.D. student) and Martin Haenggi (Notre Dame) 2013 Joint HK/TW Workshop on ITC CUHK, January 19, 2013 Acknowledgement

More information

Estimating the Transmission Probability in Wireless Networks with Configuration Models

Estimating the Transmission Probability in Wireless Networks with Configuration Models Estimating the Transmission Probability in Wireless Networks with Configuration Models Paola Bermolen niversidad de la República - ruguay Joint work with: Matthieu Jonckheere (BA), Federico Larroca (delar)

More information

On Flow-Aware CSMA. in Multi-Channel Wireless Networks. Mathieu Feuillet. Joint work with Thomas Bonald CISS 2011

On Flow-Aware CSMA. in Multi-Channel Wireless Networks. Mathieu Feuillet. Joint work with Thomas Bonald CISS 2011 On Flow-Aware CSMA in Multi-Channel Wireless Networks Mathieu Feuillet Joint work with Thomas Bonald CISS 2011 Outline Model Background Standard CSMA Flow-aware CSMA Conclusion Outline Model Background

More information

NETWORK COOPERATION FOR ENERGY SAVING IN GREEN RADIO COMMUNICATIONS. Muhammad Ismail and Weihua Zhuang IEEE Wireless Communications Oct.

NETWORK COOPERATION FOR ENERGY SAVING IN GREEN RADIO COMMUNICATIONS. Muhammad Ismail and Weihua Zhuang IEEE Wireless Communications Oct. NETWORK COOPERATION FOR ENERGY SAVING IN GREEN RADIO COMMUNICATIONS Muhammad Ismail and Weihua Zhuang IEEE Wireless Communications Oct. 2011 Outline 2 Introduction Energy Saving at the Network Level The

More information

Department of Statistics and Operations Research Undergraduate Programmes

Department of Statistics and Operations Research Undergraduate Programmes Department of Statistics and Operations Research Undergraduate Programmes OPERATIONS RESEARCH YEAR LEVEL 2 INTRODUCTION TO LINEAR PROGRAMMING SSOA021 Linear Programming Model: Formulation of an LP model;

More information

Improved Directional Perturbation Algorithm for Collaborative Beamforming

Improved Directional Perturbation Algorithm for Collaborative Beamforming American Journal of Networks and Communications 2017; 6(4): 62-66 http://www.sciencepublishinggroup.com/j/ajnc doi: 10.11648/j.ajnc.20170604.11 ISSN: 2326-893X (Print); ISSN: 2326-8964 (Online) Improved

More information

A Backlog-Based CSMA Mechanism to Achieve Fairness and Throughput-Optimality in Multihop Wireless Networks

A Backlog-Based CSMA Mechanism to Achieve Fairness and Throughput-Optimality in Multihop Wireless Networks A Backlog-Based CSMA Mechanism to Achieve Fairness and Throughput-Optimality in Multihop Wireless Networks Peter Marbach, and Atilla Eryilmaz Dept. of Computer Science, University of Toronto Email: marbach@cs.toronto.edu

More information

Research Article Implementing Statistical Multiplexing in DVB-H

Research Article Implementing Statistical Multiplexing in DVB-H Hindawi Publishing Corporation International Journal of Digital Multimedia Broadcasting Volume 29, Article ID 261231, 15 pages doi:1.1155/29/261231 Research Article Implementing Statistical Multiplexing

More information

Service Appointment Scheduling with Walk-In, Short-term, and Traditional Scheduling

Service Appointment Scheduling with Walk-In, Short-term, and Traditional Scheduling Service Appointment Scheduling with Walk-In, Short-term, and Traditional Scheduling 1 Decision Sciences Institute Annual Meeting New Orleans November 16, 2009 Dr. Linda R. LaGanga Director of Quality Systems

More information

ROUTING PROTOCOLS. Dr. Ahmed Khattab. EECE Department Cairo University Fall 2012 ELC 659/ELC724

ROUTING PROTOCOLS. Dr. Ahmed Khattab. EECE Department Cairo University Fall 2012 ELC 659/ELC724 ROUTING PROTOCOLS Dr. Ahmed Khattab EECE Department Cairo University Fall 2012 ELC 659/ELC724 Dr. Ahmed Khattab Fall 2012 2 Routing Network-wide process the determine the end to end paths that packets

More information

Measurement Driven Deployment of a Two-Tier Urban Mesh Access Network

Measurement Driven Deployment of a Two-Tier Urban Mesh Access Network Measurement Driven Deployment of a Two-Tier Urban Mesh Access Network J. Camp, J. Robinson, C. Steger, E. Knightly Rice Networks Group MobiSys 2006 6/20/06 Two-Tier Mesh Architecture Limited Gateway Nodes

More information

Capacity and Interference modeling of CSMA/CA networks using SSI point processes

Capacity and Interference modeling of CSMA/CA networks using SSI point processes Capacity and Interference modeling of CSMA/CA networks using SSI point processes Anthony Busson and Guillaume Chelius University Paris-Sud 11 Centre Scientifique d Orsay 9145 Orsay Cedex, France anthony.busson@u-psud.fr

More information

Introduction to Phase Noise

Introduction to Phase Noise hapter Introduction to Phase Noise brief introduction into the subject of phase noise is given here. We first describe the conversion of the phase fluctuations into the noise sideband of the carrier. We

More information

The Capability of Error Correction for Burst-noise Channels Using Error Estimating Code

The Capability of Error Correction for Burst-noise Channels Using Error Estimating Code The Capability of Error Correction for Burst-noise Channels Using Error Estimating Code Yaoyu Wang Nanjing University yaoyu.wang.nju@gmail.com June 10, 2016 Yaoyu Wang (NJU) Error correction with EEC June

More information

Applications of Monte Carlo Methods in Charged Particles Optics

Applications of Monte Carlo Methods in Charged Particles Optics Sydney 13-17 February 2012 p. 1/3 Applications of Monte Carlo Methods in Charged Particles Optics Alla Shymanska alla.shymanska@aut.ac.nz School of Computing and Mathematical Sciences Auckland University

More information

LTE in Unlicensed Spectrum

LTE in Unlicensed Spectrum LTE in Unlicensed Spectrum Prof. Geoffrey Ye Li School of ECE, Georgia Tech. Email: liye@ece.gatech.edu Website: http://users.ece.gatech.edu/liye/ Contributors: Q.-M. Chen, G.-D. Yu, and A. Maaref Outline

More information

Revisiting Neighbor Discovery with Interferences Consideration

Revisiting Neighbor Discovery with Interferences Consideration Author manuscript, published in "3rd ACM international workshop on Performance Evaluation of Wireless Ad hoc, Sensor and Ubiquitous Networks (PEWASUN ) () 7-1" DOI : 1.115/1131.1133 Revisiting Neighbor

More information

2.6.1: Program Outcomes

2.6.1: Program Outcomes 2.6.1: Program Outcomes Program: M.Sc. Informatics Program Specific Outcomes (PSO) PSO1 This program provides studies in the field of informatics, which is essentially a blend of three domains: networking,

More information

Resource Allocation Challenges in Future Wireless Networks

Resource Allocation Challenges in Future Wireless Networks Resource Allocation Challenges in Future Wireless Networks Mohamad Assaad Dept of Telecommunications, Supelec - France Mar. 2014 Outline 1 General Introduction 2 Fully Decentralized Allocation 3 Future

More information

Phase Transition of Message Propagation Speed in Delay Tolerant Vehicular Networks

Phase Transition of Message Propagation Speed in Delay Tolerant Vehicular Networks Phase Transition of Message Propagation Speed in Delay Tolerant Vehicular Networks A. Agarwal, D. Starobinski, and T.D.C. Little Department of Electrical and Computer Engineering Boston University, Boston,

More information

Exact statistics of ARQ packet delivery delay over Markov channels with finite round-trip delay

Exact statistics of ARQ packet delivery delay over Markov channels with finite round-trip delay Exact statistics of ARQ packet delivery delay over Markov channels with finite round-trip delay Michele Rossi, Leonardo Badia, Michele Zorzi Dipartimento di Ingegneria, Università di Ferrara via Saragat,

More information

Papers. Ad Hoc Routing. Outline. Motivation

Papers. Ad Hoc Routing. Outline. Motivation CS 15-849E: Wireless Networks (Spring 2006) Ad Hoc Routing Discussion Leads: Abhijit Deshmukh Sai Vinayak Srinivasan Seshan Dave Andersen Papers Outdoor Experimental Comparison of Four Ad Hoc Routing Algorithms

More information

4.5. Latency in milliseconds Number of Shutdowns

4.5. Latency in milliseconds Number of Shutdowns Latency Effects of System Level Power Management Algorithms Λ Dinesh Ramanathan Sandy Irani Rajesh Gupta Department of Information and Computer Science University of California Irvine, CA 92697 fdinesh,irani,rguptag@ics.uci.edu

More information

Improving Reinforcement Learning Algorithms for Dynamic Spectrum Allocation in Cognitive Sensor Networks

Improving Reinforcement Learning Algorithms for Dynamic Spectrum Allocation in Cognitive Sensor Networks Improving Reinforcement Learning Algorithms for Dynamic Spectrum Allocation in Cognitive Sensor Networks Wireless Communications and Networking Conference Leonardo Faganello, Rafael Kunst, Cristiano Both,

More information

Performance Analysis of Energy Consumption of AFECA in Wireless Sensor Networks

Performance Analysis of Energy Consumption of AFECA in Wireless Sensor Networks Proceedings of the World Congress on Engineering 2 Vol II WCE 2, July 6-8, 2, London, U.K. Performance Analysis of Energy Consumption of AFECA in Wireless Sensor Networks Yun Won Chung Abstract Energy

More information

Performance of ALOHA and CSMA in Spatially Distributed Wireless Networks

Performance of ALOHA and CSMA in Spatially Distributed Wireless Networks Performance of ALOHA and CSMA in Spatially Distributed Wireless Networks Mariam Kaynia and Nihar Jindal Dept. of Electrical and Computer Engineering, University of Minnesota Dept. of Electronics and Telecommunications,

More information

Utilization Based Duty Cycle Tuning MAC Protocol for Wireless Sensor Networks

Utilization Based Duty Cycle Tuning MAC Protocol for Wireless Sensor Networks Utilization Based Duty Cycle Tuning MAC Protocol for Wireless Sensor Networks Shih-Hsien Yang, Hung-Wei Tseng, Eric Hsiao-Kuang Wu, and Gen-Huey Chen Dept. of Computer Science and Information Engineering,

More information

Convergence of Desynchronization Primitives in Wireless Sensor Networks: A Stochastic Modeling Approach

Convergence of Desynchronization Primitives in Wireless Sensor Networks: A Stochastic Modeling Approach 1 Convergence of Desynchronization Primitives in ireless Sensor Networks: A Stochastic Modeling Approach Dujdow Buranapanichkit, Nikos Deligiannis, Member, IEEE, and Yiannis Andreopoulos, Senior Member,

More information

Power Control and Scheduling for Guaranteeing Quality of Service in Cellular Networks

Power Control and Scheduling for Guaranteeing Quality of Service in Cellular Networks Power Control and Scheduling for Guaranteeing Quality of Service in Cellular Networks Dapeng Wu Rohit Negi Abstract Providing Quality of Service(QoS) guarantees is important in the third generation (3G)

More information

INTERNATIONAL JOURNAL OF ELECTRONICS AND COMMUNICATION ENGINEERING & TECHNOLOGY (IJECET)

INTERNATIONAL JOURNAL OF ELECTRONICS AND COMMUNICATION ENGINEERING & TECHNOLOGY (IJECET) INTERNATIONAL JOURNAL OF ELECTRONICS AND COMMUNICATION ENGINEERING & TECHNOLOGY (IJECET) International Journal of Electronics and Communication Engineering & Technology (IJECET), ISSN ISSN 0976 6464(Print)

More information

Noncoherent Communications with Large Antenna Arrays

Noncoherent Communications with Large Antenna Arrays Noncoherent Communications with Large Antenna Arrays Mainak Chowdhury Joint work with: Alexandros Manolakos, Andrea Goldsmith, Felipe Gomez-Cuba and Elza Erkip Stanford University September 29, 2016 Wireless

More information

Collaborative transmission in wireless sensor networks

Collaborative transmission in wireless sensor networks Collaborative transmission in wireless sensor networks Cooperative transmission schemes Stephan Sigg Distributed and Ubiquitous Systems Technische Universität Braunschweig November 22, 2010 Stephan Sigg

More information

Downlink Scheduler Optimization in High-Speed Downlink Packet Access Networks

Downlink Scheduler Optimization in High-Speed Downlink Packet Access Networks Downlink Scheduler Optimization in High-Speed Downlink Packet Access Networks Hussein Al-Zubaidy SCE-Carleton University 1125 Colonel By Drive, Ottawa, ON, Canada Email: hussein@sce.carleton.ca 21 August

More information

Stability Analysis for Network Coded Multicast Cell with Opportunistic Relay

Stability Analysis for Network Coded Multicast Cell with Opportunistic Relay This full text paper was peer reviewed at the direction of IEEE Communications Society subject matter experts for publication in the IEEE ICC 00 proceedings Stability Analysis for Network Coded Multicast

More information

Chapter Number. Parameter Estimation Over Noisy Communication Channels in Distributed Sensor Networks

Chapter Number. Parameter Estimation Over Noisy Communication Channels in Distributed Sensor Networks Chapter Number Parameter Estimation Over Noisy Communication Channels in Distributed Sensor Networks Thakshila Wimalajeewa 1, Sudharman K. Jayaweera 1 and Carlos Mosquera 2 1 Dept. of Electrical and Computer

More information

CS649 Sensor Networks IP Lecture 9: Synchronization

CS649 Sensor Networks IP Lecture 9: Synchronization CS649 Sensor Networks IP Lecture 9: Synchronization I-Jeng Wang http://hinrg.cs.jhu.edu/wsn06/ Spring 2006 CS 649 1 Outline Description of the problem: axes, shortcomings Reference-Broadcast Synchronization

More information

Fourier Analysis and Change Detection. Dynamic Network Analysis

Fourier Analysis and Change Detection. Dynamic Network Analysis Fourier Analysis and Change Detection Prof. L. Richard Carley carley@ece.cmu.edu 1 Dynamic Network Analysis Key focus Networks change over time Summary statistics typically average all data Useless for

More information

Exploring Pedestrian Bluetooth and WiFi Detection at Public Transportation Terminals

Exploring Pedestrian Bluetooth and WiFi Detection at Public Transportation Terminals Exploring Pedestrian Bluetooth and WiFi Detection at Public Transportation Terminals Neveen Shlayan 1, Abdullah Kurkcu 2, and Kaan Ozbay 3 November 1, 2016 1 Assistant Professor, Department of Electrical

More information

Opportunistic cooperation in wireless ad hoc networks with interference correlation

Opportunistic cooperation in wireless ad hoc networks with interference correlation Noname manuscript No. (will be inserted by the editor) Opportunistic cooperation in wireless ad hoc networks with interference correlation Yong Zhou Weihua Zhuang Received: date / Accepted: date Abstract

More information

LEARNING BASED HYPERBOLIC POSITION BOUNDING IN WIRELESS NETWORKS

LEARNING BASED HYPERBOLIC POSITION BOUNDING IN WIRELESS NETWORKS LEARNING BASED HYPERBOLIC POSITION BOUNDING IN WIRELESS NETWORKS by Eldai El Sayr A thesis submitted to the Faculty of Graduate Studies and Research in partial fulfillment of the requirements for the degree

More information

Antennas and Propagation. Chapter 6b: Path Models Rayleigh, Rician Fading, MIMO

Antennas and Propagation. Chapter 6b: Path Models Rayleigh, Rician Fading, MIMO Antennas and Propagation b: Path Models Rayleigh, Rician Fading, MIMO Introduction From last lecture How do we model H p? Discrete path model (physical, plane waves) Random matrix models (forget H p and

More information

ECE 5325/6325: Wireless Communication Systems Lecture Notes, Spring 2013

ECE 5325/6325: Wireless Communication Systems Lecture Notes, Spring 2013 ECE 5325/6325: Wireless Communication Systems Lecture Notes, Spring 2013 Lecture 3 Today: (2) Trunking Reading: Today: 4.2.2. Thu: Rap 3.7.2 (pdf on Canvas). 1 Trunking Trunking refers to sharing few channels

More information

Channel. Muhammad Ali Jinnah University, Islamabad Campus, Pakistan. Multi-Path Fading. Dr. Noor M Khan EE, MAJU

Channel. Muhammad Ali Jinnah University, Islamabad Campus, Pakistan. Multi-Path Fading. Dr. Noor M Khan EE, MAJU Instructor: Prof. Dr. Noor M. Khan Department of Electronic Engineering, Muhammad Ali Jinnah University, Islamabad Campus, Islamabad, PAKISTAN Ph: +9 (51) 111-878787, Ext. 19 (Office), 186 (Lab) Fax: +9

More information

Wireless Internet Routing. IEEE s

Wireless Internet Routing. IEEE s Wireless Internet Routing IEEE 802.11s 1 Acknowledgments Cigdem Sengul, Deutsche Telekom Laboratories 2 Outline Introduction Interworking Topology discovery Routing 3 IEEE 802.11a/b/g /n /s IEEE 802.11s:

More information

Single channel noise reduction

Single channel noise reduction Single channel noise reduction Basics and processing used for ETSI STF 94 ETSI Workshop on Speech and Noise in Wideband Communication Claude Marro France Telecom ETSI 007. All rights reserved Outline Scope

More information

CORRELATION BASED CLASSIFICATION OF COMPLEX PRI MODULATION TYPES

CORRELATION BASED CLASSIFICATION OF COMPLEX PRI MODULATION TYPES CORRELATION BASED CLASSIFICATION OF COMPLEX PRI MODULATION TYPES Fotios Katsilieris, Sabine Apfeld, Alexander Charlish Sensor Data and Information Fusion Fraunhofer Institute for Communication, Information

More information

Multi-Path Fading Channel

Multi-Path Fading Channel Instructor: Prof. Dr. Noor M. Khan Department of Electronic Engineering, Muhammad Ali Jinnah University, Islamabad Campus, Islamabad, PAKISTAN Ph: +9 (51) 111-878787, Ext. 19 (Office), 186 (Lab) Fax: +9

More information

SIGNAL DETECTION IN NON-GAUSSIAN NOISE BY A KURTOSIS-BASED PROBABILITY DENSITY FUNCTION MODEL

SIGNAL DETECTION IN NON-GAUSSIAN NOISE BY A KURTOSIS-BASED PROBABILITY DENSITY FUNCTION MODEL SIGNAL DETECTION IN NON-GAUSSIAN NOISE BY A KURTOSIS-BASED PROBABILITY DENSITY FUNCTION MODEL A. Tesei, and C.S. Regazzoni Department of Biophysical and Electronic Engineering (DIBE), University of Genoa

More information

Lightweight Decentralized Algorithm for Localizing Reactive Jammers in Wireless Sensor Network

Lightweight Decentralized Algorithm for Localizing Reactive Jammers in Wireless Sensor Network International Journal Of Computational Engineering Research (ijceronline.com) Vol. 3 Issue. 3 Lightweight Decentralized Algorithm for Localizing Reactive Jammers in Wireless Sensor Network 1, Vinothkumar.G,

More information

MAC Protocol with Regression based Dynamic Duty Cycle Feature for Mission Critical Applications in WSN

MAC Protocol with Regression based Dynamic Duty Cycle Feature for Mission Critical Applications in WSN MAC Protocol with Regression based Dynamic Duty Cycle Feature for Mission Critical Applications in WSN Gayatri Sakya Department of Electronics and Communication Engineering JSS Academy of Technical Education,

More information

The fundamentals of detection theory

The fundamentals of detection theory Advanced Signal Processing: The fundamentals of detection theory Side 1 of 18 Index of contents: Advanced Signal Processing: The fundamentals of detection theory... 3 1 Problem Statements... 3 2 Detection

More information

Propagation Channels. Chapter Path Loss

Propagation Channels. Chapter Path Loss Chapter 9 Propagation Channels The transmit and receive antennas in the systems we have analyzed in earlier chapters have been in free space with no other objects present. In a practical communication

More information

Probabilistic Coverage in Wireless Sensor Networks

Probabilistic Coverage in Wireless Sensor Networks Probabilistic Coverage in Wireless Sensor Networks Mohamed Hefeeda and Hossein Ahmadi School of Computing Science Simon Fraser University Surrey, Canada {mhefeeda, hahmadi}@cs.sfu.ca Technical Report:

More information

TSIN01 Information Networks Lecture 9

TSIN01 Information Networks Lecture 9 TSIN01 Information Networks Lecture 9 Danyo Danev Division of Communication Systems Department of Electrical Engineering Linköping University, Sweden September 26 th, 2017 Danyo Danev TSIN01 Information

More information

ADAPTIVE CONSENSUS-BASED DISTRIBUTED DETECTION IN WSN WITH UNRELIABLE LINKS

ADAPTIVE CONSENSUS-BASED DISTRIBUTED DETECTION IN WSN WITH UNRELIABLE LINKS ADAPTIVE CONSENSUS-BASED DISTRIBUTED DETECTION IN WSN WITH UNRELIABLE LINKS Daniel Alonso-Román and Baltasar Beferull-Lozano Department of Information and Communication Technologies University of Agder,

More information

Optimal Clock Synchronization in Networks. Christoph Lenzen Philipp Sommer Roger Wattenhofer

Optimal Clock Synchronization in Networks. Christoph Lenzen Philipp Sommer Roger Wattenhofer Optimal Clock Synchronization in Networks Christoph Lenzen Philipp Sommer Roger Wattenhofer Time in Sensor Networks Synchronized clocks are essential for many applications: Sensing TDMA Localization Duty-

More information

Opportunistic Scheduling: Generalizations to. Include Multiple Constraints, Multiple Interfaces,

Opportunistic Scheduling: Generalizations to. Include Multiple Constraints, Multiple Interfaces, Opportunistic Scheduling: Generalizations to Include Multiple Constraints, Multiple Interfaces, and Short Term Fairness Sunil Suresh Kulkarni, Catherine Rosenberg School of Electrical and Computer Engineering

More information

Outline for this presentation. Introduction I -- background. Introduction I Background

Outline for this presentation. Introduction I -- background. Introduction I Background Mining Spectrum Usage Data: A Large-Scale Spectrum Measurement Study Sixing Yin, Dawei Chen, Qian Zhang, Mingyan Liu, Shufang Li Outline for this presentation! Introduction! Methodology! Statistic and

More information

Next Generation of Adaptive Traffic Signal Control

Next Generation of Adaptive Traffic Signal Control Next Generation of Adaptive Traffic Signal Control Pitu Mirchandani ATLAS Research Laboratory Arizona State University NSF Workshop Rutgers, New Brunswick, NJ June 7, 2010 Acknowledgements: FHWA, ADOT,

More information

A. Siffer, P-A Fouque, A. Termier and C. Largouet April 26, 2017

A. Siffer, P-A Fouque, A. Termier and C. Largouet April 26, 2017 A. Siffer, P-A Fouque, A. Termier and C. Largouet April 26, 2017 Context Providing better thresholds Finding anomalies in streams Application to intrusion detection A more general framework 1 Massive

More information

IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. XX, NO. X, AUGUST 20XX 1

IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. XX, NO. X, AUGUST 20XX 1 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. XX, NO. X, AUGUST 0XX 1 Greenput: a Power-saving Algorithm That Achieves Maximum Throughput in Wireless Networks Cheng-Shang Chang, Fellow, IEEE, Duan-Shin Lee,

More information

RECENTLY, with the rapid proliferation of portable devices

RECENTLY, with the rapid proliferation of portable devices IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, VOL. 62, NO. 9, NOVEMBER 2013 4629 On Exploiting Contact Patterns for Data Forwarding in Duty-Cycle Opportunistic Mobile Networks Huan Zhou, Jiming Chen, Senior

More information

SUPPLEMENT TO THE PAPER TESTING EQUALITY OF SPECTRAL DENSITIES USING RANDOMIZATION TECHNIQUES

SUPPLEMENT TO THE PAPER TESTING EQUALITY OF SPECTRAL DENSITIES USING RANDOMIZATION TECHNIQUES SUPPLEMENT TO THE PAPER TESTING EQUALITY OF SPECTRAL DENSITIES USING RANDOMIZATION TECHNIQUES CARSTEN JENTSCH AND MARKUS PAULY Abstract. In this supplementary material we provide additional supporting

More information

Low-Cost Localization of Mobile Robots Through Probabilistic Sensor Fusion

Low-Cost Localization of Mobile Robots Through Probabilistic Sensor Fusion Low-Cost Localization of Mobile Robots Through Probabilistic Sensor Fusion Brian Chung December, Abstract Efforts to achieve mobile robotic localization have relied on probabilistic techniques such as

More information

Sensitivity study for the optimization of the viewing chord arrangement of the ITER poloidal polarimeter

Sensitivity study for the optimization of the viewing chord arrangement of the ITER poloidal polarimeter P8-29 6th International Toki Conference, December 5-8, 26 Sensitivity study for the optimization of the viewing chord arrangement of the ITER poloidal polarimeter T. Yamaguchi, Y. Kawano and Y. Kusama

More information

Capacity Analysis and Call Admission Control in Distributed Cognitive Radio Networks

Capacity Analysis and Call Admission Control in Distributed Cognitive Radio Networks IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS (TO APPEAR) Capacity Analysis and Call Admission Control in Distributed Cognitive Radio Networks SubodhaGunawardena, Student Member, IEEE, and Weihua Zhuang,

More information

PERFORMANCE ANALYSIS OF THE SLEEP/WAKEUP PROTOCOL IN A WIRELESS SENSOR NETWORK. Received October 2010; revised March 2011

PERFORMANCE ANALYSIS OF THE SLEEP/WAKEUP PROTOCOL IN A WIRELESS SENSOR NETWORK. Received October 2010; revised March 2011 International Journal of Innovative Computing, Information and Control ICIC International c 2012 ISSN 1349-4198 Volume 8, Number 5(B), May 2012 pp. 3833 3844 PERFORMANCE ANALYSIS OF THE SLEEP/WAKEUP PROTOCOL

More information

Q-Learning Algorithms for Constrained Markov Decision Processes with Randomized Monotone Policies: Application to MIMO Transmission Control

Q-Learning Algorithms for Constrained Markov Decision Processes with Randomized Monotone Policies: Application to MIMO Transmission Control Q-Learning Algorithms for Constrained Markov Decision Processes with Randomized Monotone Policies: Application to MIMO Transmission Control Dejan V. Djonin, Vikram Krishnamurthy, Fellow, IEEE Abstract

More information