TSIN01 Information Networks Lecture 9

Size: px
Start display at page:

Download "TSIN01 Information Networks Lecture 9"

Transcription

1 TSIN01 Information Networks Lecture 9 Danyo Danev Division of Communication Systems Department of Electrical Engineering Linköping University, Sweden September 26 th, 2017 Danyo Danev TSIN01 Information Networks Lecture 9 1 / 38

2 Lecture overview Agenda CSMA Slotted ALOHA (contd) CSMA Slotted ALOHA: Pseudo-Bayesian stabilization CSMA Unslotted ALOHA FCFS with CSMA Multiaccess reservations CSMA/CD (Collision Detection): slotted and unslotted Danyo Danev TSIN01 Information Networks Lecture 9 2 / 38

3 Nonpersistent CSMA slotted ALOHA The drift in state n is as before the expected number of arrivals less expected numbers of departures ( D n = λ(β +1 e λβ (1 q r ) n ) λβ + q ) rn e λβ (1 q r ) n 1 q r For small q r we make the approximation (1 q r ) n 1 (1 q r ) n e qrn and get D n λ(β + 1 e g(n) ) g(n)e g(n) where g(n) = λβ + q r n is expected number of attempted transmissions Danyo Danev TSIN01 Information Networks Lecture 9 3 / 38

4 Nonpersistent CSMA slotted ALOHA The drift is negative if λ < g(n)e g(n) β + 1 e g(n) where the numerator is the expected number of departures per state transition and the denominator is the expected duration of a state transition, so the ratio can be interpreted as the departure rate in state n We can plot the departure rate as function of attempted rate as before, for small β this function has a maximum of approximately 1/(1 + 2β) for g = 2β Danyo Danev TSIN01 Information Networks Lecture 9 4 / 38

5 Nonpersistent CSMA slotted ALOHA Danyo Danev TSIN01 Information Networks Lecture 9 5 / 38

6 Nonpersistent CSMA slotted ALOHA Same stability problem as in ordinary slotted ALOHA For fixed q r, g(n) grows with n and when n becomes too large, departure rate is less than arrival rate (drift is positive), leading to yet larger backlogs Expected idle time that a backlogged node must wait before attempting retransmission is β(q r + 2q r (1 q r ) + 3q r (1 q r ) ) = β/q r For small β and modest λ, q r can be quite small without causing appreciable delay This means that the backlog must be very large before instability sets in and the problem is less serious than for ordinary ALOHA Danyo Danev TSIN01 Information Networks Lecture 9 6 / 38

7 CSMA slotted ALOHA stabilization P-persistent CSMA, in which packets are transmitted after idle slots with probability p if they are new arrivals and with some much smaller probability q r if they have had collisions will give a little extra protection against instability A more fundamental way to achieve stability is to do a pseudo-bayesian stabilization as for the ordinary slotted ALOHA All packets are considered backlogged immediately after entering the system At end of each idle slot, each backlogged packet is transmitted with probability q r (ˆn) which will vary with the estimated channel backlog ˆn Danyo Danev TSIN01 Information Networks Lecture 9 7 / 38

8 Pseudo-Bayesian stabilization In state n, expected number of packets transmitted at end of idle slot is g(n) = nq r, packet departure rate is maximized (for small β and q r ) when g(n) = 2β so we choose { 2β q r (ˆn) = min ˆn, } 2β Backlog estimate is updated according to ˆn k (1 q r (ˆn k )) + λβ, ˆn k+1 = ˆn k (1 q r (ˆn k )) + λ(1 + β), ˆn k λ(1 + β), for idle for success for collision Danyo Danev TSIN01 Information Networks Lecture 9 8 / 38

9 Pseudo-Bayesian stabilization Again the update rule for this Pseudo-Bayesian stabilization can be motivated by showing that for an a priori Poisson distribution of n k with mean ˆn k, the a posteriori distribution of n k is Poisson with mean ˆn k (1 q r (ˆn k )) given an idle slot Poisson with mean 1 + ˆn k (1 q r (ˆn k )) given a successful transmission approximately Poisson with mean ˆn k + 2 given a collision Adding the expected arrivals in the three cases yields the suggested update rule Danyo Danev TSIN01 Information Networks Lecture 9 9 / 38

10 Pseudo-Bayesian stabilization When n k and ˆn k are small, then q r is relatively large and new arrivals are scarcely delayed at all When ˆn k n k and n k is large, the departure rate is approximately 1/(1 + 2β) So, for λ < 1/(1 + 2β) the departure rate exceeds the arrival rate (i.e. the drift is negative) and the backlog decreases on average If n k ˆn k is large the expected change in backlog can be positive, but the expected change in n k ˆn k is negative so eventually ˆn k will be close to n k and backlog will decrease; similar to pseudo-bayesian stabilization of ordinary slotted ALOHA Danyo Danev TSIN01 Information Networks Lecture 9 10 / 38

11 Delay of pseudo-bayesian stabilization We can do a similar analysis of the expected queueing delay as for pseudo-bayesian stabilization of ordinary slotted ALOHA Let W i be the delay from arrival of ith packet until beginning of ith successful transmission Average of W i over all i is the expected queueing delay W Let n i be the number of backlogged packets at the instant before packet i s arrival, not counting any packet currently in successful transmission Danyo Danev TSIN01 Information Networks Lecture 9 11 / 38

12 Delay of pseudo-bayesian stabilization n i W i = R i + t j + y i j=1 R i is the residual time until next state transition, t j is the sequence of subsequent intervals until each of the next n i successful transmissions are completed, and y i is the remaining interval until the ith successful transmission starts The backlog is at least 1 in all of the state transition intervals and we make the simplifying approximation that the number of attempted transmissions in each of these intervals are Poisson with parameter g Danyo Danev TSIN01 Information Networks Lecture 9 12 / 38

13 Delay of pseudo-bayesian stabilization This is different from the analysis of ordinary stabilized slotted ALOHA, where we assumed that a successful transmission always occurred when backlog was 1. This difference is because q r in CSMA is chosen to be small The expected value for each t j is given by E[t] = e g (β+e[t])+ge g (1+β)+[1 (1+g)e g ](1+β+E[t]) The first term corresponds to an idle in the first state transmission interval The second term corresponds to a success, and the third term to a collision Danyo Danev TSIN01 Information Networks Lecture 9 13 / 38

14 Delay of pseudo-bayesian stabilization Solving for E[t] gives E[t] = 1 + β e g ge g This is the reciprocal of expected departure rate and thus is approximately minimized by g = 2β Averaging over i and using Little s theorem we get W = E[R] + λw E[t] + E[y] Danyo Danev TSIN01 Information Networks Lecture 9 14 / 38

15 Delay of pseudo-bayesian stabilization The expected residual time E[R] is approximated by observing that the system spends a fraction λ(1 + β) of the time in successful state transition intervals, and the expected residual time for arrivals in these intervals is (1 + β)/2 For small β, the fraction of time spend in collision intervals is negligible compared with that for success and the residual time for idle intervals is negligible too Thus, E[R] λ(1 + β)2 2 Danyo Danev TSIN01 Information Networks Lecture 9 15 / 38

16 Delay of pseudo-bayesian stabilization Finally E[y] is just E[t] less the time for a successful transmission, E[y] = E[t] (1 + β) Putting all these together we get W λ(1 + β)2 + 2(E[t] (1 + β)) 2(1 λe[t]) This expression is minimized over g by minimizing E[t] which is 1 + 2β at g = 2β (for small β), thus W λ + 2 2β 2(1 λ(1 + 2β)) Danyo Danev TSIN01 Information Networks Lecture 9 16 / 38

17 Delay of pseudo-bayesian stabilization The delay for stabilized CSMA ALOHA W λ + 2 2β 2(1 λ(1 + 2β)) is similar to the M/D/1 queueing delay with service time µ = 1 (we assumed time measured in average packet transmission time) W = λ 2(1 λ) By stabilizing CSMA ALOHA we modify q r with the backlog to maintain a departure rate close to 1/(1 + 2β) whenever a backlog exists Danyo Danev TSIN01 Information Networks Lecture 9 17 / 38

18 Unslotted CSMA ALOHA In slotted CSMA ALOHA we assumed that all nodes were synchronized to start transmissions only at time multiples of β in idle periods We now remove that restriction and assume that when a packet arrives its transmission starts immediately if the channel is sensed to be idle If the channel is sensed to be busy, or if transmission results in a collision, the packet is regarded as backlogged Each backlogged packet repeatedly attempts to retransmit at randomly selected times separated by independent exponentially distributed random waiting times τ with probability density xe xτ Danyo Danev TSIN01 Information Networks Lecture 9 18 / 38

19 Unslotted CSMA ALOHA If the channel is idle at one of these times, the packet is transmitted and this continues until the packet has been successfully transmitted We again assume propagation and detection delay of β, so if one transmission starts at time t, another node will not detect that the channel is busy until time t + β thus causing the possibility of collisions For an idle period that starts with a backlog of n and infinite-node assumption, the time until first transmission starts is exponentially distributed with rate G(n) = λ + nx Note that G(n) is now the attempt rate in packets per unit time, previously g(n) was in packets per idle slot Danyo Danev TSIN01 Information Networks Lecture 9 19 / 38

20 Unslotted CSMA ALOHA After initiation of this first transmission, the backlog is n (if a new arrival started the transmission) or n 1 (if a backlogged packet started) The time from this first transmission until another node senses the channel (to transmit a backlogged or new packet) is exponentially distributed with rate G(n) or G(n 1) Collision occurs if this sensing is done within time β Probability of collision is P r(τ < β) = 1 e βg(n) (or 1 e βg(n 1), but the difference is small if βx is small) Probability of a successful transmission following an idle period is approximately e βg(n) Danyo Danev TSIN01 Information Networks Lecture 9 20 / 38

21 Unslotted CSMA ALOHA The expected time from beginning of one idle period until next is 1/G(n) + (1 + β) where 1/G(n) is the time until first transmission and (1 + β) is time until first transmission ends and the channel is detected as idle again If a collision occurs there is a slight additional time (< β) until the packets causing the collision are not detected, this time is however negligible since already β is negligible The departure rate when backlog is n is then e βg(n) 1/G(n) + (1 + β) Danyo Danev TSIN01 Information Networks Lecture 9 21 / 38

22 Unslotted CSMA ALOHA For small β, the maximum departure rate is approximately 1/(1 + 2 β), occurring when G(n) 1/ β It is slightly lower than for the slotted case The reason is the same as when CSMA is not used: for a given attempt rate, collisions are more likely in an unslotted system For CSMA with small β, the difference is quite small and in a slotted system β has to be larger due to synchronization inaccuracies and worst-case propagation delay Thus unslotted ALOHA is the natural choice for CSMA Danyo Danev TSIN01 Information Networks Lecture 9 22 / 38

23 Unslotted CSMA ALOHA CSMA unslotted ALOHA has the same stability problems as all the ALOHA systems It can be stabilized with a pseudo-bayesian stabilization strategy similar to the CSMA slotted ALOHA Danyo Danev TSIN01 Information Networks Lecture 9 23 / 38

24 FCFS splitting algorithm with CSMA Relatively little can be gained (in throughput or delay) by using splitting algorithms with CSMA For small β, the FCFS splitting algorithm has the same maximum throughput as slotted ALOHA This is not surprising when realizing that without CSMA the major advantage of FCFS algorithm is its efficiency in resolving collisions, and with CSMA collisions rarely occur When collisions do occur they are resolved in both strategies by retransmission with small probability Danyo Danev TSIN01 Information Networks Lecture 9 24 / 38

25 Multiaccess reservations If the data packets are long, it is inefficient to waste long slot times sending nothing or sending colliding packets It would be far more efficient to send very short packets (either in contention mode or in TDM mode) to reserve longer noncontending slots for the actual data In this way, the slots wasted by idles or collisions are all short, leading to a higher overall efficiency Assume that each reservation packet requires for transmission v time units, which is much less than the one time unit needed for a data packet Danyo Danev TSIN01 Information Networks Lecture 9 25 / 38

26 Multiaccess reservations The format of the reservation packet is unimportant, it simply has to contain enough information to establish the reservation With a (0, 1, e) instantaneous feedback, the mere existence of the reservation packet is enough After a successful transmission of a reservation packet, the next full time unit is automatically allocated for transmission of the corresponding data packet The reservation packets can use any multiaccess strategy, e.g., TDM, slotted ALOHA, or splitting algorithms Danyo Danev TSIN01 Information Networks Lecture 9 26 / 38

27 Multiaccess reservations Let S r be the maximum throughput, in successful reservation packets per reservation slot, of the algorithm used for reservation packets (1 for TDM, 1/e for slotted ALOHA, for splitting) Over a large number of reservations, the time required per reservation approaches v/s r Then, the total time per data packet approaches 1 + v/s r The maximum throughput S in data packets per unit time is 1 S = 1 + v/s r If v is small (e.g. 0.01), then S 1 irrespective of the (throughput S r of the) reservation strategy Danyo Danev TSIN01 Information Networks Lecture 9 27 / 38

28 CSMA/CD Ethernet is a widely used technique for local area networks, a number of nodes are all connected onto a common cable so that when one node transmits a packet (and all others are silent), all other nodes hear that packet In addition, as in carrier sensing, a node can listen to the cable before transmitting Finally because of the physical properties of the cable, it is possible for a node to listen to the cable while transmitting Thus, if two nodes start to transmit almost simultaneously, they will shortly detect a collision in process and both cease transmitting Danyo Danev TSIN01 Information Networks Lecture 9 28 / 38

29 CSMA/CD This technique is called CSMA/Collision Detection If one node starts transmitting and no other node starts before the first node s signal has propagated throughout the cable, the first node is guaranteed to finish its packet without collision Thus, we can view the first portion of a packet as making a reservation for the rest For analytic purposes it is easiest to visualize Ethernet in terms of slots and minislots, the minislots are of duration β which denotes the time for the signal to propagate throughout the cable and be detected Danyo Danev TSIN01 Information Networks Lecture 9 29 / 38

30 Slotted CSMA/CD All nodes are synchronized into minislots of duration β If only one node transmits in a minislot, all other nodes will detect the transmission and not use subsequent minislots until the entire packet completed If more than one node transmits in a minislot, each transmitting node will detect this and cease transmitting by the end of the minislot Thus, the minislots are used in contention mode, and when a successful transmission occurs in a minislot, the channel is reserved for the completion of the packet CSMA/CD can be analyzed with a Markov chain in the same way as CSMA ALOHA Danyo Danev TSIN01 Information Networks Lecture 9 30 / 38

31 Slotted CSMA/CD We assume that each backlogged node transmits after each idle slot with probability q r, and that the number of nodes transmitting after an idle slot is Poisson with parameter g(n) = λβ + nq r We consider state transitions at the end of idle slots: after time β (if no transmission occurs); after time 1 + β (if one transmission occurs); after time 2β (if collision occurs; this is because nodes must hear an idle slot after the collision before transmitting); Danyo Danev TSIN01 Information Networks Lecture 9 31 / 38

32 Slotted CSMA/CD The expected length of the interval between state transitions is then E[interval] = β + g(n)e g(n) + β(1 (1 + g(n))e g(n) ) The expected number of new arrivals between state transmissions is λ times this interval, so the drift in state n is λe[interval] Psucc, the probability of success is g(n)e g(n), so we get that the drift is negative if λ < g(n)e g(n) β + g(n)e g(n) + β(1 (1 + g(n))e g(n) ) The right-hand side of the inequality can be interpreted as the departure rate in state n Danyo Danev TSIN01 Information Networks Lecture 9 32 / 38

33 Slotted CSMA/CD The departure rate is maximized over g(n) at g(n) = 0.77 and the resulting maximum is 1/( β) CSMA/CD can be stabilized with e.g. the pseudo-bayesian technique and then the maximum λ for which the system is stable is λ = 1/( β) The constant 3.31 is dependent on the detailed assumptions about the system, different values can be obtained by making different assumptions If β is very small, as usual in Ethernet, this value is not very important Danyo Danev TSIN01 Information Networks Lecture 9 33 / 38

34 Unslotted CSMA/CD Unslotted CSMA/CD makes more sense than slotted, both because of the difficulty of synchronizing on short minislots and the advantages of capitalizing on shorter than maximum propagation delays when possible The exact analysis of unslotted CSMA/CD is somewhat messy and complicated, e.g. nodes closer together on the cable detect collisions faster than those more spread apart A conservative bound on throughput can be obtained by finding bounds on all relevant parameters from the end of one transmission to the end of next Assume that each node initiates transmissions according to independent Poisson processes whenever it senses the channel is idle, assume G is the overall Poisson intensity Danyo Danev TSIN01 Information Networks Lecture 9 34 / 38

35 Unslotted CSMA/CD All nodes sense beginning of idle period at most β after end of transmission, expected time to beginning of next transmission is an additional 1/G This next packet will collide with some later starting packet with probability at most 1 e βg and the colliding packets will cease transmission after at most 2β The packet will be successful with probability at least e βg and will occupy 1 time unit Departure rate is success probability divided by expected time of a success or collision; so S > e βg β + 1/G + 2β(1 e βg ) + e βg Danyo Danev TSIN01 Information Networks Lecture 9 35 / 38

36 Unslotted CSMA/CD This departure rate will be maximized at βg = 0.43 and the maximum value is 1/( β) The analysis is very conservative, but if β is small throughput close to 1 can be achieved and the difference compared to the result for slotted CSMA/CD is not large Maximum stable throughput approaches 1 with decreasing β as a constant times β for CSMA/CD, whereas the approach is as a constant times β for CSMA, the reason is that collisions are not very costly with CSMA/CD and thus a higher attempt rate can be used Danyo Danev TSIN01 Information Networks Lecture 9 36 / 38

37 Unslotted CSMA/CD CSMA/CD (and CSMA) becomes increasingly inefficient with increasing bus length, increasing data rate, and decreasing packet size Recall that β is in units of data packet duration, thus if τ is propagation delay and detection time in seconds, C is raw data rate on the bus, and L is average packet length, then β = τc/l Neither CSMA nor CSMA/CD are reasonable system choices if β is more than a few tenths Danyo Danev TSIN01 Information Networks Lecture 9 37 / 38

38 Next lecture Topics Packet radio networks (PRN) TDM and FDM for PRN Slotted ALOHA for PRN Routing Broadcasting: flooding Danyo Danev TSIN01 Information Networks Lecture 9 38 / 38

ECE 333: Introduction to Communication Networks Fall Lecture 15: Medium Access Control III

ECE 333: Introduction to Communication Networks Fall Lecture 15: Medium Access Control III ECE 333: Introduction to Communication Networks Fall 200 Lecture 5: Medium Access Control III CSMA CSMA/CD Carrier Sense Multiple Access (CSMA) In studying Aloha, we assumed that a node simply transmitted

More information

DOPPLER SHIFT. Thus, the frequency of the received signal is

DOPPLER SHIFT. Thus, the frequency of the received signal is DOPPLER SHIFT Radio Propagation Doppler Effect: When a wave source and a receiver are moving towards each other, the frequency of the received signal will not be the same as the source. When they are moving

More information

Local Area Networks NETW 901

Local Area Networks NETW 901 Local Area Networks NETW 901 Lecture 2 Medium Access Control (MAC) Schemes Course Instructor: Dr. Ing. Maggie Mashaly maggie.ezzat@guc.edu.eg C3.220 1 Contents Why Multiple Access Random Access Aloha Slotted

More information

Outline. EEC-484/584 Computer Networks. Homework #1. Homework #1. Lecture 8. Wenbing Zhao Homework #1 Review

Outline. EEC-484/584 Computer Networks. Homework #1. Homework #1. Lecture 8. Wenbing Zhao Homework #1 Review EEC-484/584 Computer Networks Lecture 8 wenbing@ieee.org (Lecture nodes are based on materials supplied by Dr. Louise Moser at UCSB and Prentice-Hall) Outline Homework #1 Review Protocol verification Example

More information

6.1 Multiple Access Communications

6.1 Multiple Access Communications Chap 6 Medium Access Control Protocols and Local Area Networks Broadcast Networks: a single transmission medium is shared by many users. ( Multiple access networks) User transmissions interfering or colliding

More information

Multiple Access (3) Required reading: Garcia 6.3, 6.4.1, CSE 3213, Fall 2010 Instructor: N. Vlajic

Multiple Access (3) Required reading: Garcia 6.3, 6.4.1, CSE 3213, Fall 2010 Instructor: N. Vlajic 1 Multiple Access (3) Required reading: Garcia 6.3, 6.4.1, 6.4.2 CSE 3213, Fall 2010 Instructor: N. Vlajic 2 Medium Sharing Techniques Static Channelization FDMA TDMA Attempt to produce an orderly access

More information

Multiple Access Methods

Multiple Access Methods Helsinki University of Technology S-72.333 Postgraduate Seminar on Radio Communications Multiple Access Methods Er Liu liuer@cc.hut.fi Communications Laboratory 16.11.2004 Content of presentation Protocol

More information

Lecture 8: Media Access Control

Lecture 8: Media Access Control Lecture 8: Media Access Control CSE 123: Computer Networks Alex C. Snoeren HW 2 due NEXT WEDNESDAY Overview Methods to share physical media: multiple access Fixed partitioning Random access Channelizing

More information

Lecture 8: Media Access Control. CSE 123: Computer Networks Stefan Savage

Lecture 8: Media Access Control. CSE 123: Computer Networks Stefan Savage Lecture 8: Media Access Control CSE 123: Computer Networks Stefan Savage Overview Methods to share physical media: multiple access Fixed partitioning Random access Channelizing mechanisms Contention-based

More information

Mobile Computing. Chapter 3: Medium Access Control

Mobile Computing. Chapter 3: Medium Access Control Mobile Computing Chapter 3: Medium Access Control Prof. Sang-Jo Yoo Contents Motivation Access methods SDMA/FDMA/TDMA Aloha Other access methods Access method CDMA 2 1. Motivation Can we apply media access

More information

Medium Access Control. Wireless Networks: Guevara Noubir. Slides adapted from Mobile Communications by J. Schiller

Medium Access Control. Wireless Networks: Guevara Noubir. Slides adapted from Mobile Communications by J. Schiller Wireless Networks: Medium Access Control Guevara Noubir Slides adapted from Mobile Communications by J. Schiller S200, COM3525 Wireless Networks Lecture 4, Motivation Can we apply media access methods

More information

Department of Computer Science and Engineering. CSE 3213: Computer Networks I (Fall 2009) Instructor: N. Vlajic Date: Dec 11, 2009.

Department of Computer Science and Engineering. CSE 3213: Computer Networks I (Fall 2009) Instructor: N. Vlajic Date: Dec 11, 2009. Department of Computer Science and Engineering CSE 3213: Computer Networks I (Fall 2009) Instructor: N. Vlajic Date: Dec 11, 2009 Final Examination Instructions: Examination time: 180 min. Print your name

More information

Pseudo-Bayesian stability of CSMA and CSMA/CD local area networks

Pseudo-Bayesian stability of CSMA and CSMA/CD local area networks Calhoun: The NPS Institutional Archive Theses and Dissertations Thesis Collection 1988-12 Pseudo-Bayesian stability of CSMA and CSMA/CD local area networks Boyana, Murat A. http://hdl.handle.net/10945/23371

More information

COSC 3213: Computer Networks I Instructor: Dr. Amir Asif Department of Computer Science York University Section B

COSC 3213: Computer Networks I Instructor: Dr. Amir Asif Department of Computer Science York University Section B MAC: Scheduled Approaches 1. Reservation Systems 2. Polling Systems 3. Token Passing Systems Static Channelization: TDMA and FDMA COSC 3213: Computer Networks I Instructor: Dr. Amir Asif Department of

More information

Medium Access Methods. Lecture 9

Medium Access Methods. Lecture 9 Medium Access Methods Lecture 9 Medium Access Control Medium Access Control (MAC) is the method that defines a procedure a station should follow when it needs to send a frame or frames. The use of regulated

More information

Lecture 23: Media Access Control. CSE 123: Computer Networks Alex C. Snoeren

Lecture 23: Media Access Control. CSE 123: Computer Networks Alex C. Snoeren Lecture 23: Media Access Control CSE 123: Computer Networks Alex C. Snoeren Overview Finish encoding schemes Manchester, 4B/5B, etc. Methods to share physical media: multiple access Fixed partitioning

More information

3644 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 57, NO. 6, JUNE 2011

3644 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 57, NO. 6, JUNE 2011 3644 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 57, NO. 6, JUNE 2011 Asynchronous CSMA Policies in Multihop Wireless Networks With Primary Interference Constraints Peter Marbach, Member, IEEE, Atilla

More information

Achieving Network Consistency. Octav Chipara

Achieving Network Consistency. Octav Chipara Achieving Network Consistency Octav Chipara Reminders Homework is postponed until next class if you already turned in your homework, you may resubmit Please send me your peer evaluations 2 Next few lectures

More information

A Backlog-Based CSMA Mechanism to Achieve Fairness and Throughput-Optimality in Multihop Wireless Networks

A Backlog-Based CSMA Mechanism to Achieve Fairness and Throughput-Optimality in Multihop Wireless Networks A Backlog-Based CSMA Mechanism to Achieve Fairness and Throughput-Optimality in Multihop Wireless Networks Peter Marbach, and Atilla Eryilmaz Dept. of Computer Science, University of Toronto Email: marbach@cs.toronto.edu

More information

Lecture on Sensor Networks

Lecture on Sensor Networks Lecture on Sensor Networks Copyright (c) 2008 Dr. Thomas Haenselmann (University of Mannheim, Germany). Permission is granted to copy, distribute and/or modify this document under the terms of the GNU

More information

Cellular systems 02/10/06

Cellular systems 02/10/06 Cellular systems 02/10/06 Cellular systems Implements space division multiplex: base station covers a certain transmission area (cell) Mobile stations communicate only via the base station Cell sizes from

More information

Medium Access Control

Medium Access Control CMPE 477 Wireless and Mobile Networks Medium Access Control Motivation for Wireless MAC SDMA FDMA TDMA CDMA Comparisons CMPE 477 Motivation Can we apply media access methods from fixed networks? Example

More information

Lectures 8 & 9. M/G/1 Queues

Lectures 8 & 9. M/G/1 Queues Lectures 8 & 9 M/G/1 Queues MIT Slide 1 M/G/1 QUEUE Poisson M/G/1 General independent Service times Poisson arrivals at rate λ Service time has arbitrary distribution with given E[X] and E[X 2 ] Service

More information

Opportunistic Communications under Energy & Delay Constraints

Opportunistic Communications under Energy & Delay Constraints Opportunistic Communications under Energy & Delay Constraints Narayan Mandayam (joint work with Henry Wang) Opportunistic Communications Wireless Data on the Move Intermittent Connectivity Opportunities

More information

IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. XX, NO. X, AUGUST 20XX 1

IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. XX, NO. X, AUGUST 20XX 1 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. XX, NO. X, AUGUST 0XX 1 Greenput: a Power-saving Algorithm That Achieves Maximum Throughput in Wireless Networks Cheng-Shang Chang, Fellow, IEEE, Duan-Shin Lee,

More information

THROUGHPUT-DELAY PERFORMANCE ANALYSIS OF SSMA PACKET RADIO NETWORK

THROUGHPUT-DELAY PERFORMANCE ANALYSIS OF SSMA PACKET RADIO NETWORK Engineering Journal ofthe University of Qatar, Vol. 13,2000, pp. THROUGHPUT-DELAY PERFORMANCE ANALYSIS OF SSMA PACKET RADIO NETWORK Yousef G. EI-Jaafreh Electrical Engineering Department Mutah University,

More information

06/02/2006. Sharing the Medium. Peter Rounce Room Notes Courtesy of Graham Knight P.A.

06/02/2006. Sharing the Medium. Peter Rounce Room Notes Courtesy of Graham Knight P.A. Sharing the Medium Peter Rounce (P.Rounce@cs.ucl.ac.uk) Room 6.18 Notes Courtesy of Graham Knight 2011-05 P.A.Rounce 2011-05-1 Sharing a link Introduction TDM, FDM - fixed allocations Statistical multiplexing

More information

Chapter 2 Overview. Duplexing, Multiple Access - 1 -

Chapter 2 Overview. Duplexing, Multiple Access - 1 - Chapter 2 Overview Part 1 (2 weeks ago) Digital Transmission System Frequencies, Spectrum Allocation Radio Propagation and Radio Channels Part 2 (last week) Modulation, Coding, Error Correction Part 3

More information

Stabilization of Contention-Based CDMA Ranging Channel in Wireless Metropolitan Area Networks

Stabilization of Contention-Based CDMA Ranging Channel in Wireless Metropolitan Area Networks Stabilization of Contention-Based CDMA Ranging Channel in Wireless Metropolitan Area Networks Jeong-Jae Won 1, Choong-Ho Cho 2, Hyong-Woo Lee 3, and Victor C.M. Leung 1 1 Department of Electrical and Computer

More information

Lecture 8 Mul+user Systems

Lecture 8 Mul+user Systems Wireless Communications Lecture 8 Mul+user Systems Prof. Chun-Hung Liu Dept. of Electrical and Computer Engineering National Chiao Tung University Fall 2014 Outline Multiuser Systems (Chapter 14 of Goldsmith

More information

Analyzing Split Channel Medium Access Control Schemes

Analyzing Split Channel Medium Access Control Schemes IEEE TRANS. ON WIRELESS COMMNICATIONS, TO APPEAR Analyzing Split Channel Medium Access Control Schemes Jing Deng, Member, IEEE, Yunghsiang S. Han, Member, IEEE, and Zygmunt J. Haas, Senior Member, IEEE

More information

Kybernetika. Ioannis E. Pountourakis Performance of multichannel multiaccess protocols with receiver collisions

Kybernetika. Ioannis E. Pountourakis Performance of multichannel multiaccess protocols with receiver collisions Kybernetika Ioannis E. Pountourakis Performance of multichannel multiaccess protocols with receiver collisions Kybernetika, Vol. 33 (1997), No. 5, 547--555 Persistent URL: http://dml.cz/dmlcz/125392 Terms

More information

Throughput-optimal number of relays in delaybounded multi-hop ALOHA networks

Throughput-optimal number of relays in delaybounded multi-hop ALOHA networks Page 1 of 10 Throughput-optimal number of relays in delaybounded multi-hop ALOHA networks. Nekoui and H. Pishro-Nik This letter addresses the throughput of an ALOHA-based Poisson-distributed multihop wireless

More information

Chapter 2 On the Spectrum Handoff for Cognitive Radio Ad Hoc Networks Without Common Control Channel

Chapter 2 On the Spectrum Handoff for Cognitive Radio Ad Hoc Networks Without Common Control Channel Chapter 2 On the Spectrum Handoff for Cognitive Radio Ad Hoc Networks Without Common Control Channel Yi Song and Jiang Xie Abstract Cognitive radio (CR) technology is a promising solution to enhance the

More information

Stochastic Modelling for Wireless Communication Networks-Multiple Access Methods.

Stochastic Modelling for Wireless Communication Networks-Multiple Access Methods. Stochastic Modelling for Wireless Communication etworks-multiple Access Methods. By Hassan KHALIL U.U.D.M. Project Report 2003: **** Examensarbete i matematisk statistik 20 poäng Handledare och examinator:

More information

The Long Range Wide Area Network - LoraWAN

The Long Range Wide Area Network - LoraWAN Politecnico di Milano Advanced Network Technologies Laboratory The Long Range Wide Area Network - LoraWAN https://www.lora-alliance.org/ 1 Lang Range Communication Technologies Wi-Fi HaLow 2 Cellular IoT

More information

Performance of ALOHA and CSMA in Spatially Distributed Wireless Networks

Performance of ALOHA and CSMA in Spatially Distributed Wireless Networks Performance of ALOHA and CSMA in Spatially Distributed Wireless Networks Mariam Kaynia and Nihar Jindal Dept. of Electrical and Computer Engineering, University of Minnesota Dept. of Electronics and Telecommunications,

More information

MAC Theory Chapter 7. Standby Energy [digitalstrom.org] Rating. Overview. No apps Mission critical

MAC Theory Chapter 7. Standby Energy [digitalstrom.org] Rating. Overview. No apps Mission critical Standby Energy [digitalstrom.org] MAC Theory Chapter 7 0 billion electrical devices in Europe 9.5 billion are not networked 6 billion euro per year energy lost Make electricity smart cheap networking (over

More information

MAC Theory. Chapter 7

MAC Theory. Chapter 7 MAC Theory Chapter 7 Ad Hoc and Sensor Networks Roger Wattenhofer 7/1 Standby Energy [digitalstrom.org] 10 billion electrical devices in Europe 9.5 billion are not networked 6 billion euro per year energy

More information

Carrier Sensing based Multiple Access Protocols for Cognitive Radio Networks

Carrier Sensing based Multiple Access Protocols for Cognitive Radio Networks Carrier Sensing based Multiple Access Protocols for Cognitive Radio Networks Shao-Yu Lien, Chih-Cheng Tseng, and Kwang-Cheng Chen Abstract Cognitive radio (CR) dynamically accessing inactive radio spectrum

More information

ICT 5305 Mobile Communications. Lecture - 4 April Dr. Hossen Asiful Mustafa

ICT 5305 Mobile Communications. Lecture - 4 April Dr. Hossen Asiful Mustafa ICT 5305 Mobile Communications Lecture - 4 April 2016 Dr. Hossen Asiful Mustafa Media Access Motivation Can we apply media access methods from fixed networks? Example CSMA/CD Carrier Sense Multiple Access

More information

Utilization-Aware Adaptive Back-Pressure Traffic Signal Control

Utilization-Aware Adaptive Back-Pressure Traffic Signal Control Utilization-Aware Adaptive Back-Pressure Traffic Signal Control Wanli Chang, Samarjit Chakraborty and Anuradha Annaswamy Abstract Back-pressure control of traffic signal, which computes the control phase

More information

INTRODUCTION TO WIRELESS SENSOR NETWORKS. CHAPTER 3: RADIO COMMUNICATIONS Anna Förster

INTRODUCTION TO WIRELESS SENSOR NETWORKS. CHAPTER 3: RADIO COMMUNICATIONS Anna Förster INTRODUCTION TO WIRELESS SENSOR NETWORKS CHAPTER 3: RADIO COMMUNICATIONS Anna Förster OVERVIEW 1. Radio Waves and Modulation/Demodulation 2. Properties of Wireless Communications 1. Interference and noise

More information

Link Models for Circuit Switching

Link Models for Circuit Switching Link Models for Circuit Switching The basis of traffic engineering for telecommunication networks is the Erlang loss function. It basically allows us to determine the amount of telephone traffic that can

More information

The Optimal Packet Duration of ALOHA and CSMA in Ad Hoc Wireless Networks

The Optimal Packet Duration of ALOHA and CSMA in Ad Hoc Wireless Networks The Optimal Packet Duration of ALOHA and CSMA in Ad Hoc Wireless Networks Jon Even Corneliussen Master of Science in Electronics Submission date: June 2009 Supervisor: Geir Egil Øien, IET Co-supervisor:

More information

TIME- OPTIMAL CONVERGECAST IN SENSOR NETWORKS WITH MULTIPLE CHANNELS

TIME- OPTIMAL CONVERGECAST IN SENSOR NETWORKS WITH MULTIPLE CHANNELS TIME- OPTIMAL CONVERGECAST IN SENSOR NETWORKS WITH MULTIPLE CHANNELS A Thesis by Masaaki Takahashi Bachelor of Science, Wichita State University, 28 Submitted to the Department of Electrical Engineering

More information

1. Introduction 1.2 Medium Access Control. Prof. JP Hubaux

1. Introduction 1.2 Medium Access Control. Prof. JP Hubaux 1. Introduction 1.2 Medium Access Control Prof. JP Hubaux 1 Modulation and demodulation (reminder) analog baseband digital signal data digital analog 101101001 modulation modulation radio transmitter radio

More information

Multiple MAC Protocols Selection Strategies. Presented by Chen-Hsiang Feng

Multiple MAC Protocols Selection Strategies. Presented by Chen-Hsiang Feng Multiple MAC Protocols Selection Strategies Presented by Chen-Hsiang Feng Outline Motivation and Goal Simulation Environment MAC Selection Strategies Conclusions Motivation Today's devices have multiple

More information

Dynamic Framed Slotted ALOHA Algorithms using Fast Tag Estimation Method for RFID System

Dynamic Framed Slotted ALOHA Algorithms using Fast Tag Estimation Method for RFID System Dynamic Framed Slotted AOHA Algorithms using Fast Tag Estimation Method for RFID System Jae-Ryong Cha School of Electrical and Computer Engineering Ajou Univ., Suwon, Korea builder@ajou.ac.kr Jae-Hyun

More information

Medium Access Control via Nearest-Neighbor Interactions for Regular Wireless Networks

Medium Access Control via Nearest-Neighbor Interactions for Regular Wireless Networks Medium Access Control via Nearest-Neighbor Interactions for Regular Wireless Networks Ka Hung Hui, Dongning Guo and Randall A. Berry Department of Electrical Engineering and Computer Science Northwestern

More information

Cooperation in Random Access Wireless Networks

Cooperation in Random Access Wireless Networks Cooperation in Random Access Wireless Networks Presented by: Frank Prihoda Advisor: Dr. Athina Petropulu Communications and Signal Processing Laboratory (CSPL) Electrical and Computer Engineering Department

More information

Delay Performance Modeling and Analysis in Clustered Cognitive Radio Networks

Delay Performance Modeling and Analysis in Clustered Cognitive Radio Networks Delay Performance Modeling and Analysis in Clustered Cognitive Radio Networks Nadia Adem and Bechir Hamdaoui School of Electrical Engineering and Computer Science Oregon State University, Corvallis, Oregon

More information

Politecnico di Milano Scuola di Ingegneria Industriale e dell Informazione. Physical layer. Fundamentals of Communication Networks

Politecnico di Milano Scuola di Ingegneria Industriale e dell Informazione. Physical layer. Fundamentals of Communication Networks Politecnico di Milano Scuola di Ingegneria Industriale e dell Informazione Physical layer Fundamentals of Communication Networks 1 Disclaimer o The basics of signal characterization (in time and frequency

More information

Channel Sensing Order in Multi-user Cognitive Radio Networks

Channel Sensing Order in Multi-user Cognitive Radio Networks 2012 IEEE International Symposium on Dynamic Spectrum Access Networks Channel Sensing Order in Multi-user Cognitive Radio Networks Jie Zhao and Xin Wang Department of Electrical and Computer Engineering

More information

Analysis of cognitive radio networks with imperfect sensing

Analysis of cognitive radio networks with imperfect sensing Analysis of cognitive radio networks with imperfect sensing Isameldin Suliman, Janne Lehtomäki and Timo Bräysy Centre for Wireless Communications CWC University of Oulu Oulu, Finland Kenta Umebayashi Tokyo

More information

Frequency-Hopped Spread-Spectrum

Frequency-Hopped Spread-Spectrum Chapter Frequency-Hopped Spread-Spectrum In this chapter we discuss frequency-hopped spread-spectrum. We first describe the antijam capability, then the multiple-access capability and finally the fading

More information

Mobile Communications

Mobile Communications COMP61242 Mobile Communications Lecture 7 Multiple access & medium access control (MAC) Barry Cheetham 16/03/2018 Lecture 7 1 Multiple access Communication links by wire or radio generally provide access

More information

*Most details of this presentation obtain from Behrouz A. Forouzan. Data Communications and Networking, 5 th edition textbook

*Most details of this presentation obtain from Behrouz A. Forouzan. Data Communications and Networking, 5 th edition textbook *Most details of this presentation obtain from Behrouz A. Forouzan. Data Communications and Networking, 5 th edition textbook 1 Multiplexing Frequency-Division Multiplexing Time-Division Multiplexing Wavelength-Division

More information

Average Delay in Asynchronous Visual Light ALOHA Network

Average Delay in Asynchronous Visual Light ALOHA Network Average Delay in Asynchronous Visual Light ALOHA Network Xin Wang, Jean-Paul M.G. Linnartz, Signal Processing Systems, Dept. of Electrical Engineering Eindhoven University of Technology The Netherlands

More information

Chapter 3 : Media Access. Mobile Communications. Collision avoidance, MACA

Chapter 3 : Media Access. Mobile Communications. Collision avoidance, MACA Mobile Communications Chapter 3 : Media Access Motivation Collision avoidance, MACA SDMA, FDMA, TDMA Polling Aloha CDMA Reservation schemes SAMA Comparison Prof. Dr.-Ing. Jochen Schiller, http://www.jochenschiller.de/

More information

Multiple Access. Difference between Multiplexing and Multiple Access

Multiple Access. Difference between Multiplexing and Multiple Access Multiple Access (MA) Satellite transponders are wide bandwidth devices with bandwidths standard bandwidth of around 35 MHz to 7 MHz. A satellite transponder is rarely used fully by a single user (for example

More information

FPGA-BASED DESIGN AND IMPLEMENTATION OF THREE-PRIORITY PERSISTENT CSMA PROTOCOL

FPGA-BASED DESIGN AND IMPLEMENTATION OF THREE-PRIORITY PERSISTENT CSMA PROTOCOL U.P.B. Sci. Bull., Series C, Vol. 79, Iss. 4, 2017 ISSN 2286-3540 FPGA-BASED DESIGN AND IMPLEMENTATION OF THREE-PRIORITY PERSISTENT CSMA PROTOCOL Xu ZHI 1, Ding HONGWEI 2, Liu LONGJUN 3, Bao LIYONG 4,

More information

Capacity Analysis and Call Admission Control in Distributed Cognitive Radio Networks

Capacity Analysis and Call Admission Control in Distributed Cognitive Radio Networks IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS (TO APPEAR) Capacity Analysis and Call Admission Control in Distributed Cognitive Radio Networks SubodhaGunawardena, Student Member, IEEE, and Weihua Zhuang,

More information

Performance Analysis of 100 Mbps PACE Technology Ethernet Networks

Performance Analysis of 100 Mbps PACE Technology Ethernet Networks Reprint erformance Analysis of Mbps ACE Technology Ethernet Networs A. antazi and T. Antonaopoulos The th EEE Symposium on Computers and Communications-SCC TUNSA, ULY Copyright Notice: This material is

More information

Chapter 6 Bandwidth Utilization: Multiplexing and Spreading 6.1

Chapter 6 Bandwidth Utilization: Multiplexing and Spreading 6.1 Chapter 6 Bandwidth Utilization: Multiplexing and Spreading 6.1 Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. 3-6 PERFORMANCE One important issue in networking

More information

Announcements. Tuesday April 15 covers material from chapters: 1-3, 5-6 emphasis on material since last midterm

Announcements. Tuesday April 15 covers material from chapters: 1-3, 5-6 emphasis on material since last midterm Announcements Reading Today: 4.1 & 4.2 (skip 4.2.4 and 4.2.5) Second Midterm: Tuesday Apri 15 covers materia from chapters: 1-3, 5-6 emphasis on materia since ast midterm CMSC 417 - S97 (ect 18) copyright

More information

Fast and efficient randomized flooding on lattice sensor networks

Fast and efficient randomized flooding on lattice sensor networks Fast and efficient randomized flooding on lattice sensor networks Ananth Kini, Vilas Veeraraghavan, Steven Weber Department of Electrical and Computer Engineering Drexel University November 19, 2004 presentation

More information

arxiv: v1 [cs.it] 21 Feb 2015

arxiv: v1 [cs.it] 21 Feb 2015 1 Opportunistic Cooperative Channel Access in Distributed Wireless Networks with Decode-and-Forward Relays Zhou Zhang, Shuai Zhou, and Hai Jiang arxiv:1502.06085v1 [cs.it] 21 Feb 2015 Dept. of Electrical

More information

Wireless Communications Lecture 4: Multiple Access Technologies

Wireless Communications Lecture 4: Multiple Access Technologies Wireless Communications Lecture 4: Multiple Access Technologies Module Representive: Prof. Dr.-Ing. Hans D. Schotten schotten@eit.uni-kl.de Lecturer: Dr. Vincenzo Sciancalepore vincenzo.sciancalepore@neclab.eu

More information

AN EFFICIENT MULTIACCESS PROTOCOL FOR WIRELESS NETWORKS. Benjamin W. Wah and Xiao Su

AN EFFICIENT MULTIACCESS PROTOCOL FOR WIRELESS NETWORKS. Benjamin W. Wah and Xiao Su AN EFFICIENT MULTIACCESS PROTOCOL FOR WIRELESS NETWORKS enjamin W. Wah and Xiao Su Department of Electrical and Computer Engineering and the Coordinated Science Laboratory University of Illinois at Urbana-Champaign

More information

Politecnico di Milano Advanced Network Technologies Laboratory. Radio Frequency Identification

Politecnico di Milano Advanced Network Technologies Laboratory. Radio Frequency Identification Politecnico di Milano Advanced Network Technologies Laboratory Radio Frequency Identification 1 RFID in Nutshell o To Enhance the concept of bar-codes for faster identification of assets (goods, people,

More information

Block diagram of a radio-over-fiber network. Central Unit RAU. Server. Downlink. Uplink E/O O/E E/O O/E

Block diagram of a radio-over-fiber network. Central Unit RAU. Server. Downlink. Uplink E/O O/E E/O O/E Performance Analysis of IEEE. Distributed Coordination Function in Presence of Hidden Stations under Non-saturated Conditions with in Radio-over-Fiber Wireless LANs Amitangshu Pal and Asis Nasipuri Electrical

More information

IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 51, NO. 2, FEBRUARY Srihari Adireddy, Student Member, IEEE, and Lang Tong, Fellow, IEEE

IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 51, NO. 2, FEBRUARY Srihari Adireddy, Student Member, IEEE, and Lang Tong, Fellow, IEEE IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 51, NO. 2, FEBRUARY 2005 537 Exploiting Decentralized Channel State Information for Random Access Srihari Adireddy, Student Member, IEEE, and Lang Tong, Fellow,

More information

3094 IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, VOL. 57, NO. 5, SEPTEMBER /$ IEEE

3094 IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, VOL. 57, NO. 5, SEPTEMBER /$ IEEE 3094 IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, VOL. 57, NO. 5, SEPTEMBER 2008 Analytical Modeling of Contention-Based Bandwidth Request Mechanism in IEEE 802.16 Wireless Networks Yaser Pourmohammadi Fallah,

More information

Wireless Intro : Computer Networking. Wireless Challenges. Overview

Wireless Intro : Computer Networking. Wireless Challenges. Overview Wireless Intro 15-744: Computer Networking L-17 Wireless Overview TCP on wireless links Wireless MAC Assigned reading [BM09] In Defense of Wireless Carrier Sense [BAB+05] Roofnet (2 sections) Optional

More information

PULSE: A MAC Protocol for RFID Networks

PULSE: A MAC Protocol for RFID Networks PULSE: A MAC Protocol for RFID Networks Shailesh M. Birari and Sridhar Iyer K. R. School of Information Technology Indian Institute of Technology, Powai, Mumbai, India 400 076. (e-mail: shailesh,sri@it.iitb.ac.in)

More information

Transmission Scheduling in Capture-Based Wireless Networks

Transmission Scheduling in Capture-Based Wireless Networks ransmission Scheduling in Capture-Based Wireless Networks Gam D. Nguyen and Sastry Kompella Information echnology Division, Naval Research Laboratory, Washington DC 375 Jeffrey E. Wieselthier Wieselthier

More information

Network Management System for Telecommunication and Internet Application

Network Management System for Telecommunication and Internet Application Network Management System for Telecommunication and Internet Application Gerd Bumiller GmbH Unterschlauersbacher-Hauptstr. 10, D-906 13 Groahabersdorf, Germany Phone: +49 9105 9960-51, Fax: +49 9105 9960-19,

More information

DiCa: Distributed Tag Access with Collision-Avoidance among Mobile RFID Readers

DiCa: Distributed Tag Access with Collision-Avoidance among Mobile RFID Readers DiCa: Distributed Tag Access with Collision-Avoidance among Mobile RFID Readers Kwang-il Hwang, Kyung-tae Kim, and Doo-seop Eom Department of Electronics and Computer Engineering, Korea University 5-1ga,

More information

ANTI-JAMMING PERFORMANCE OF COGNITIVE RADIO NETWORKS. Xiaohua Li and Wednel Cadeau

ANTI-JAMMING PERFORMANCE OF COGNITIVE RADIO NETWORKS. Xiaohua Li and Wednel Cadeau ANTI-JAMMING PERFORMANCE OF COGNITIVE RADIO NETWORKS Xiaohua Li and Wednel Cadeau Department of Electrical and Computer Engineering State University of New York at Binghamton Binghamton, NY 392 {xli, wcadeau}@binghamton.edu

More information

Color of Interference and Joint Encoding and Medium Access in Large Wireless Networks

Color of Interference and Joint Encoding and Medium Access in Large Wireless Networks Color of Interference and Joint Encoding and Medium Access in Large Wireless Networks Nithin Sugavanam, C. Emre Koksal, Atilla Eryilmaz Department of Electrical and Computer Engineering The Ohio State

More information

Random Access Congestion Control in DVB-RCS2 Interactive Satellite Terminals

Random Access Congestion Control in DVB-RCS2 Interactive Satellite Terminals Random Access Congestion Control in DVB-RCS2 Interactive Satellite Terminals Alessio Meloni and Maurizio Murroni DIEE - Department of Electrical and Electronic Engineering University of Cagliari Piazza

More information

Analysis of Random Access Protocol and Channel Allocation Schemes for Service Differentiation in Cellular Networks

Analysis of Random Access Protocol and Channel Allocation Schemes for Service Differentiation in Cellular Networks Eleventh LACCEI Latin American and Cariean Conference for Engineering and Technology (LACCEI 2013) Innovation in Engineering, Technology and Education for Competitiveness and Prosperity August 14-16, 2013

More information

Ultra-Wideband Impulse Radio for Tactical Ad Hoc Communication Networks

Ultra-Wideband Impulse Radio for Tactical Ad Hoc Communication Networks Ultra-Wideband Impulse Radio for Tactical Ad Hoc Communication Networks J. Keith Townsend William M. Lovelace, Jon R. Ward, Robert J. Ulman N.C. State University, Raleigh, NC N.C. A&T State University,

More information

Improving Reader Performance of an UHF RFID System Using Frequency Hopping Techniques

Improving Reader Performance of an UHF RFID System Using Frequency Hopping Techniques 1 Improving Reader Performance of an UHF RFID System Using Frequency Hopping Techniques Ju-Yen Hung and Venkatesh Sarangan *, MSCS 219, Computer Science Department, Oklahoma State University, Stillwater,

More information

Politecnico di Milano Advanced Network Technologies Laboratory. Radio Frequency Identification

Politecnico di Milano Advanced Network Technologies Laboratory. Radio Frequency Identification Politecnico di Milano Advanced Network Technologies Laboratory Radio Frequency Identification RFID in Nutshell o To Enhance the concept of bar-codes for faster identification of assets (goods, people,

More information

A Random Network Coding-based ARQ Scheme and Performance Analysis for Wireless Broadcast

A Random Network Coding-based ARQ Scheme and Performance Analysis for Wireless Broadcast ISSN 746-7659, England, U Journal of Information and Computing Science Vol. 4, No., 9, pp. 4-3 A Random Networ Coding-based ARQ Scheme and Performance Analysis for Wireless Broadcast in Yang,, +, Gang

More information

Queuing Theory Systems Analysis in Wireless Networks Mobile Stations with Non-Preemptive Priority

Queuing Theory Systems Analysis in Wireless Networks Mobile Stations with Non-Preemptive Priority Queuing Theory Systems Analysis in Wireless Networks Mobile Stations with Non-Preemptive Priority Bakary Sylla Senior Systems Design Engineer Radio Access Network T-Mobile Inc. USA & Southern Methodist

More information

Medium Access Schemes

Medium Access Schemes Medium Access Schemes Winter Semester 2010/11 Integrated Communication Systems Group Ilmenau University of Technology Media Access: Motivation The problem: multiple users compete for a common, shared resource

More information

Multiple Access Schemes

Multiple Access Schemes Multiple Access Schemes Dr Yousef Dama Faculty of Engineering and Information Technology An-Najah National University 2016-2017 Why Multiple access schemes Multiple access schemes are used to allow many

More information

Module 3: Physical Layer

Module 3: Physical Layer Module 3: Physical Layer Dr. Associate Professor of Computer Science Jackson State University Jackson, MS 39217 Phone: 601-979-3661 E-mail: natarajan.meghanathan@jsums.edu 1 Topics 3.1 Signal Levels: Baud

More information

Multiuser Scheduling and Power Sharing for CDMA Packet Data Systems

Multiuser Scheduling and Power Sharing for CDMA Packet Data Systems Multiuser Scheduling and Power Sharing for CDMA Packet Data Systems Sandeep Vangipuram NVIDIA Graphics Pvt. Ltd. No. 10, M.G. Road, Bangalore 560001. sandeep84@gmail.com Srikrishna Bhashyam Department

More information

Multiplexing. Dr. Manas Khatua Assistant Professor Dept. of CSE IIT Jodhpur

Multiplexing. Dr. Manas Khatua Assistant Professor Dept. of CSE IIT Jodhpur CS311: DATA COMMUNICATION Multiplexing Dr. Manas Khatua Assistant Professor Dept. of CSE IIT Jodhpur e-mail: manaskhatua@iitj.ac.in Outline of the Lecture What is Multiplexing and why is it used? Basic

More information

Modeling the impact of buffering on

Modeling the impact of buffering on Modeling the impact of buffering on 8. Ken Duffy and Ayalvadi J. Ganesh November Abstract A finite load, large buffer model for the WLAN medium access protocol IEEE 8. is developed that gives throughput

More information

Outline of the Lecture

Outline of the Lecture CS311: DATA COMMUNICATION Multiplexing by Dr. Manas Khatua Assistant Professor Dept. of CSE IIT Jodhpur E-mail: manaskhatua@iitj.ac.in Web: http://home.iitj.ac.in/~manaskhatua http://manaskhatua.github.io/

More information

Efficiency and detectability of random reactive jamming in wireless networks

Efficiency and detectability of random reactive jamming in wireless networks Efficiency and detectability of random reactive jamming in wireless networks Ni An, Steven Weber Modeling & Analysis of Networks Laboratory Drexel University Department of Electrical and Computer Engineering

More information

Joint work with Dragana Bajović and Dušan Jakovetić. DLR/TUM Workshop, Munich,

Joint work with Dragana Bajović and Dušan Jakovetić. DLR/TUM Workshop, Munich, Slotted ALOHA in Small Cell Networks: How to Design Codes on Random Geometric Graphs? Dejan Vukobratović Associate Professor, DEET-UNS University of Novi Sad, Serbia Joint work with Dragana Bajović and

More information

THE field of personal wireless communications is expanding

THE field of personal wireless communications is expanding IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 5, NO. 6, DECEMBER 1997 907 Distributed Channel Allocation for PCN with Variable Rate Traffic Partha P. Bhattacharya, Leonidas Georgiadis, Senior Member, IEEE,

More information

Exercise Data Networks

Exercise Data Networks (due till January 19, 2009) Exercise 9.1: IEEE 802.11 (WLAN) a) In which mode of operation is this network in? b) Why is the start of the back-off timers delayed until the DIFS contention phase? c) How

More information

On Flow-Aware CSMA. in Multi-Channel Wireless Networks. Mathieu Feuillet. Joint work with Thomas Bonald CISS 2011

On Flow-Aware CSMA. in Multi-Channel Wireless Networks. Mathieu Feuillet. Joint work with Thomas Bonald CISS 2011 On Flow-Aware CSMA in Multi-Channel Wireless Networks Mathieu Feuillet Joint work with Thomas Bonald CISS 2011 Outline Model Background Standard CSMA Flow-aware CSMA Conclusion Outline Model Background

More information