TSIN01 Information Networks Lecture 9
|
|
- Rudolf Fields
- 6 years ago
- Views:
Transcription
1 TSIN01 Information Networks Lecture 9 Danyo Danev Division of Communication Systems Department of Electrical Engineering Linköping University, Sweden September 26 th, 2017 Danyo Danev TSIN01 Information Networks Lecture 9 1 / 38
2 Lecture overview Agenda CSMA Slotted ALOHA (contd) CSMA Slotted ALOHA: Pseudo-Bayesian stabilization CSMA Unslotted ALOHA FCFS with CSMA Multiaccess reservations CSMA/CD (Collision Detection): slotted and unslotted Danyo Danev TSIN01 Information Networks Lecture 9 2 / 38
3 Nonpersistent CSMA slotted ALOHA The drift in state n is as before the expected number of arrivals less expected numbers of departures ( D n = λ(β +1 e λβ (1 q r ) n ) λβ + q ) rn e λβ (1 q r ) n 1 q r For small q r we make the approximation (1 q r ) n 1 (1 q r ) n e qrn and get D n λ(β + 1 e g(n) ) g(n)e g(n) where g(n) = λβ + q r n is expected number of attempted transmissions Danyo Danev TSIN01 Information Networks Lecture 9 3 / 38
4 Nonpersistent CSMA slotted ALOHA The drift is negative if λ < g(n)e g(n) β + 1 e g(n) where the numerator is the expected number of departures per state transition and the denominator is the expected duration of a state transition, so the ratio can be interpreted as the departure rate in state n We can plot the departure rate as function of attempted rate as before, for small β this function has a maximum of approximately 1/(1 + 2β) for g = 2β Danyo Danev TSIN01 Information Networks Lecture 9 4 / 38
5 Nonpersistent CSMA slotted ALOHA Danyo Danev TSIN01 Information Networks Lecture 9 5 / 38
6 Nonpersistent CSMA slotted ALOHA Same stability problem as in ordinary slotted ALOHA For fixed q r, g(n) grows with n and when n becomes too large, departure rate is less than arrival rate (drift is positive), leading to yet larger backlogs Expected idle time that a backlogged node must wait before attempting retransmission is β(q r + 2q r (1 q r ) + 3q r (1 q r ) ) = β/q r For small β and modest λ, q r can be quite small without causing appreciable delay This means that the backlog must be very large before instability sets in and the problem is less serious than for ordinary ALOHA Danyo Danev TSIN01 Information Networks Lecture 9 6 / 38
7 CSMA slotted ALOHA stabilization P-persistent CSMA, in which packets are transmitted after idle slots with probability p if they are new arrivals and with some much smaller probability q r if they have had collisions will give a little extra protection against instability A more fundamental way to achieve stability is to do a pseudo-bayesian stabilization as for the ordinary slotted ALOHA All packets are considered backlogged immediately after entering the system At end of each idle slot, each backlogged packet is transmitted with probability q r (ˆn) which will vary with the estimated channel backlog ˆn Danyo Danev TSIN01 Information Networks Lecture 9 7 / 38
8 Pseudo-Bayesian stabilization In state n, expected number of packets transmitted at end of idle slot is g(n) = nq r, packet departure rate is maximized (for small β and q r ) when g(n) = 2β so we choose { 2β q r (ˆn) = min ˆn, } 2β Backlog estimate is updated according to ˆn k (1 q r (ˆn k )) + λβ, ˆn k+1 = ˆn k (1 q r (ˆn k )) + λ(1 + β), ˆn k λ(1 + β), for idle for success for collision Danyo Danev TSIN01 Information Networks Lecture 9 8 / 38
9 Pseudo-Bayesian stabilization Again the update rule for this Pseudo-Bayesian stabilization can be motivated by showing that for an a priori Poisson distribution of n k with mean ˆn k, the a posteriori distribution of n k is Poisson with mean ˆn k (1 q r (ˆn k )) given an idle slot Poisson with mean 1 + ˆn k (1 q r (ˆn k )) given a successful transmission approximately Poisson with mean ˆn k + 2 given a collision Adding the expected arrivals in the three cases yields the suggested update rule Danyo Danev TSIN01 Information Networks Lecture 9 9 / 38
10 Pseudo-Bayesian stabilization When n k and ˆn k are small, then q r is relatively large and new arrivals are scarcely delayed at all When ˆn k n k and n k is large, the departure rate is approximately 1/(1 + 2β) So, for λ < 1/(1 + 2β) the departure rate exceeds the arrival rate (i.e. the drift is negative) and the backlog decreases on average If n k ˆn k is large the expected change in backlog can be positive, but the expected change in n k ˆn k is negative so eventually ˆn k will be close to n k and backlog will decrease; similar to pseudo-bayesian stabilization of ordinary slotted ALOHA Danyo Danev TSIN01 Information Networks Lecture 9 10 / 38
11 Delay of pseudo-bayesian stabilization We can do a similar analysis of the expected queueing delay as for pseudo-bayesian stabilization of ordinary slotted ALOHA Let W i be the delay from arrival of ith packet until beginning of ith successful transmission Average of W i over all i is the expected queueing delay W Let n i be the number of backlogged packets at the instant before packet i s arrival, not counting any packet currently in successful transmission Danyo Danev TSIN01 Information Networks Lecture 9 11 / 38
12 Delay of pseudo-bayesian stabilization n i W i = R i + t j + y i j=1 R i is the residual time until next state transition, t j is the sequence of subsequent intervals until each of the next n i successful transmissions are completed, and y i is the remaining interval until the ith successful transmission starts The backlog is at least 1 in all of the state transition intervals and we make the simplifying approximation that the number of attempted transmissions in each of these intervals are Poisson with parameter g Danyo Danev TSIN01 Information Networks Lecture 9 12 / 38
13 Delay of pseudo-bayesian stabilization This is different from the analysis of ordinary stabilized slotted ALOHA, where we assumed that a successful transmission always occurred when backlog was 1. This difference is because q r in CSMA is chosen to be small The expected value for each t j is given by E[t] = e g (β+e[t])+ge g (1+β)+[1 (1+g)e g ](1+β+E[t]) The first term corresponds to an idle in the first state transmission interval The second term corresponds to a success, and the third term to a collision Danyo Danev TSIN01 Information Networks Lecture 9 13 / 38
14 Delay of pseudo-bayesian stabilization Solving for E[t] gives E[t] = 1 + β e g ge g This is the reciprocal of expected departure rate and thus is approximately minimized by g = 2β Averaging over i and using Little s theorem we get W = E[R] + λw E[t] + E[y] Danyo Danev TSIN01 Information Networks Lecture 9 14 / 38
15 Delay of pseudo-bayesian stabilization The expected residual time E[R] is approximated by observing that the system spends a fraction λ(1 + β) of the time in successful state transition intervals, and the expected residual time for arrivals in these intervals is (1 + β)/2 For small β, the fraction of time spend in collision intervals is negligible compared with that for success and the residual time for idle intervals is negligible too Thus, E[R] λ(1 + β)2 2 Danyo Danev TSIN01 Information Networks Lecture 9 15 / 38
16 Delay of pseudo-bayesian stabilization Finally E[y] is just E[t] less the time for a successful transmission, E[y] = E[t] (1 + β) Putting all these together we get W λ(1 + β)2 + 2(E[t] (1 + β)) 2(1 λe[t]) This expression is minimized over g by minimizing E[t] which is 1 + 2β at g = 2β (for small β), thus W λ + 2 2β 2(1 λ(1 + 2β)) Danyo Danev TSIN01 Information Networks Lecture 9 16 / 38
17 Delay of pseudo-bayesian stabilization The delay for stabilized CSMA ALOHA W λ + 2 2β 2(1 λ(1 + 2β)) is similar to the M/D/1 queueing delay with service time µ = 1 (we assumed time measured in average packet transmission time) W = λ 2(1 λ) By stabilizing CSMA ALOHA we modify q r with the backlog to maintain a departure rate close to 1/(1 + 2β) whenever a backlog exists Danyo Danev TSIN01 Information Networks Lecture 9 17 / 38
18 Unslotted CSMA ALOHA In slotted CSMA ALOHA we assumed that all nodes were synchronized to start transmissions only at time multiples of β in idle periods We now remove that restriction and assume that when a packet arrives its transmission starts immediately if the channel is sensed to be idle If the channel is sensed to be busy, or if transmission results in a collision, the packet is regarded as backlogged Each backlogged packet repeatedly attempts to retransmit at randomly selected times separated by independent exponentially distributed random waiting times τ with probability density xe xτ Danyo Danev TSIN01 Information Networks Lecture 9 18 / 38
19 Unslotted CSMA ALOHA If the channel is idle at one of these times, the packet is transmitted and this continues until the packet has been successfully transmitted We again assume propagation and detection delay of β, so if one transmission starts at time t, another node will not detect that the channel is busy until time t + β thus causing the possibility of collisions For an idle period that starts with a backlog of n and infinite-node assumption, the time until first transmission starts is exponentially distributed with rate G(n) = λ + nx Note that G(n) is now the attempt rate in packets per unit time, previously g(n) was in packets per idle slot Danyo Danev TSIN01 Information Networks Lecture 9 19 / 38
20 Unslotted CSMA ALOHA After initiation of this first transmission, the backlog is n (if a new arrival started the transmission) or n 1 (if a backlogged packet started) The time from this first transmission until another node senses the channel (to transmit a backlogged or new packet) is exponentially distributed with rate G(n) or G(n 1) Collision occurs if this sensing is done within time β Probability of collision is P r(τ < β) = 1 e βg(n) (or 1 e βg(n 1), but the difference is small if βx is small) Probability of a successful transmission following an idle period is approximately e βg(n) Danyo Danev TSIN01 Information Networks Lecture 9 20 / 38
21 Unslotted CSMA ALOHA The expected time from beginning of one idle period until next is 1/G(n) + (1 + β) where 1/G(n) is the time until first transmission and (1 + β) is time until first transmission ends and the channel is detected as idle again If a collision occurs there is a slight additional time (< β) until the packets causing the collision are not detected, this time is however negligible since already β is negligible The departure rate when backlog is n is then e βg(n) 1/G(n) + (1 + β) Danyo Danev TSIN01 Information Networks Lecture 9 21 / 38
22 Unslotted CSMA ALOHA For small β, the maximum departure rate is approximately 1/(1 + 2 β), occurring when G(n) 1/ β It is slightly lower than for the slotted case The reason is the same as when CSMA is not used: for a given attempt rate, collisions are more likely in an unslotted system For CSMA with small β, the difference is quite small and in a slotted system β has to be larger due to synchronization inaccuracies and worst-case propagation delay Thus unslotted ALOHA is the natural choice for CSMA Danyo Danev TSIN01 Information Networks Lecture 9 22 / 38
23 Unslotted CSMA ALOHA CSMA unslotted ALOHA has the same stability problems as all the ALOHA systems It can be stabilized with a pseudo-bayesian stabilization strategy similar to the CSMA slotted ALOHA Danyo Danev TSIN01 Information Networks Lecture 9 23 / 38
24 FCFS splitting algorithm with CSMA Relatively little can be gained (in throughput or delay) by using splitting algorithms with CSMA For small β, the FCFS splitting algorithm has the same maximum throughput as slotted ALOHA This is not surprising when realizing that without CSMA the major advantage of FCFS algorithm is its efficiency in resolving collisions, and with CSMA collisions rarely occur When collisions do occur they are resolved in both strategies by retransmission with small probability Danyo Danev TSIN01 Information Networks Lecture 9 24 / 38
25 Multiaccess reservations If the data packets are long, it is inefficient to waste long slot times sending nothing or sending colliding packets It would be far more efficient to send very short packets (either in contention mode or in TDM mode) to reserve longer noncontending slots for the actual data In this way, the slots wasted by idles or collisions are all short, leading to a higher overall efficiency Assume that each reservation packet requires for transmission v time units, which is much less than the one time unit needed for a data packet Danyo Danev TSIN01 Information Networks Lecture 9 25 / 38
26 Multiaccess reservations The format of the reservation packet is unimportant, it simply has to contain enough information to establish the reservation With a (0, 1, e) instantaneous feedback, the mere existence of the reservation packet is enough After a successful transmission of a reservation packet, the next full time unit is automatically allocated for transmission of the corresponding data packet The reservation packets can use any multiaccess strategy, e.g., TDM, slotted ALOHA, or splitting algorithms Danyo Danev TSIN01 Information Networks Lecture 9 26 / 38
27 Multiaccess reservations Let S r be the maximum throughput, in successful reservation packets per reservation slot, of the algorithm used for reservation packets (1 for TDM, 1/e for slotted ALOHA, for splitting) Over a large number of reservations, the time required per reservation approaches v/s r Then, the total time per data packet approaches 1 + v/s r The maximum throughput S in data packets per unit time is 1 S = 1 + v/s r If v is small (e.g. 0.01), then S 1 irrespective of the (throughput S r of the) reservation strategy Danyo Danev TSIN01 Information Networks Lecture 9 27 / 38
28 CSMA/CD Ethernet is a widely used technique for local area networks, a number of nodes are all connected onto a common cable so that when one node transmits a packet (and all others are silent), all other nodes hear that packet In addition, as in carrier sensing, a node can listen to the cable before transmitting Finally because of the physical properties of the cable, it is possible for a node to listen to the cable while transmitting Thus, if two nodes start to transmit almost simultaneously, they will shortly detect a collision in process and both cease transmitting Danyo Danev TSIN01 Information Networks Lecture 9 28 / 38
29 CSMA/CD This technique is called CSMA/Collision Detection If one node starts transmitting and no other node starts before the first node s signal has propagated throughout the cable, the first node is guaranteed to finish its packet without collision Thus, we can view the first portion of a packet as making a reservation for the rest For analytic purposes it is easiest to visualize Ethernet in terms of slots and minislots, the minislots are of duration β which denotes the time for the signal to propagate throughout the cable and be detected Danyo Danev TSIN01 Information Networks Lecture 9 29 / 38
30 Slotted CSMA/CD All nodes are synchronized into minislots of duration β If only one node transmits in a minislot, all other nodes will detect the transmission and not use subsequent minislots until the entire packet completed If more than one node transmits in a minislot, each transmitting node will detect this and cease transmitting by the end of the minislot Thus, the minislots are used in contention mode, and when a successful transmission occurs in a minislot, the channel is reserved for the completion of the packet CSMA/CD can be analyzed with a Markov chain in the same way as CSMA ALOHA Danyo Danev TSIN01 Information Networks Lecture 9 30 / 38
31 Slotted CSMA/CD We assume that each backlogged node transmits after each idle slot with probability q r, and that the number of nodes transmitting after an idle slot is Poisson with parameter g(n) = λβ + nq r We consider state transitions at the end of idle slots: after time β (if no transmission occurs); after time 1 + β (if one transmission occurs); after time 2β (if collision occurs; this is because nodes must hear an idle slot after the collision before transmitting); Danyo Danev TSIN01 Information Networks Lecture 9 31 / 38
32 Slotted CSMA/CD The expected length of the interval between state transitions is then E[interval] = β + g(n)e g(n) + β(1 (1 + g(n))e g(n) ) The expected number of new arrivals between state transmissions is λ times this interval, so the drift in state n is λe[interval] Psucc, the probability of success is g(n)e g(n), so we get that the drift is negative if λ < g(n)e g(n) β + g(n)e g(n) + β(1 (1 + g(n))e g(n) ) The right-hand side of the inequality can be interpreted as the departure rate in state n Danyo Danev TSIN01 Information Networks Lecture 9 32 / 38
33 Slotted CSMA/CD The departure rate is maximized over g(n) at g(n) = 0.77 and the resulting maximum is 1/( β) CSMA/CD can be stabilized with e.g. the pseudo-bayesian technique and then the maximum λ for which the system is stable is λ = 1/( β) The constant 3.31 is dependent on the detailed assumptions about the system, different values can be obtained by making different assumptions If β is very small, as usual in Ethernet, this value is not very important Danyo Danev TSIN01 Information Networks Lecture 9 33 / 38
34 Unslotted CSMA/CD Unslotted CSMA/CD makes more sense than slotted, both because of the difficulty of synchronizing on short minislots and the advantages of capitalizing on shorter than maximum propagation delays when possible The exact analysis of unslotted CSMA/CD is somewhat messy and complicated, e.g. nodes closer together on the cable detect collisions faster than those more spread apart A conservative bound on throughput can be obtained by finding bounds on all relevant parameters from the end of one transmission to the end of next Assume that each node initiates transmissions according to independent Poisson processes whenever it senses the channel is idle, assume G is the overall Poisson intensity Danyo Danev TSIN01 Information Networks Lecture 9 34 / 38
35 Unslotted CSMA/CD All nodes sense beginning of idle period at most β after end of transmission, expected time to beginning of next transmission is an additional 1/G This next packet will collide with some later starting packet with probability at most 1 e βg and the colliding packets will cease transmission after at most 2β The packet will be successful with probability at least e βg and will occupy 1 time unit Departure rate is success probability divided by expected time of a success or collision; so S > e βg β + 1/G + 2β(1 e βg ) + e βg Danyo Danev TSIN01 Information Networks Lecture 9 35 / 38
36 Unslotted CSMA/CD This departure rate will be maximized at βg = 0.43 and the maximum value is 1/( β) The analysis is very conservative, but if β is small throughput close to 1 can be achieved and the difference compared to the result for slotted CSMA/CD is not large Maximum stable throughput approaches 1 with decreasing β as a constant times β for CSMA/CD, whereas the approach is as a constant times β for CSMA, the reason is that collisions are not very costly with CSMA/CD and thus a higher attempt rate can be used Danyo Danev TSIN01 Information Networks Lecture 9 36 / 38
37 Unslotted CSMA/CD CSMA/CD (and CSMA) becomes increasingly inefficient with increasing bus length, increasing data rate, and decreasing packet size Recall that β is in units of data packet duration, thus if τ is propagation delay and detection time in seconds, C is raw data rate on the bus, and L is average packet length, then β = τc/l Neither CSMA nor CSMA/CD are reasonable system choices if β is more than a few tenths Danyo Danev TSIN01 Information Networks Lecture 9 37 / 38
38 Next lecture Topics Packet radio networks (PRN) TDM and FDM for PRN Slotted ALOHA for PRN Routing Broadcasting: flooding Danyo Danev TSIN01 Information Networks Lecture 9 38 / 38
ECE 333: Introduction to Communication Networks Fall Lecture 15: Medium Access Control III
ECE 333: Introduction to Communication Networks Fall 200 Lecture 5: Medium Access Control III CSMA CSMA/CD Carrier Sense Multiple Access (CSMA) In studying Aloha, we assumed that a node simply transmitted
More informationDOPPLER SHIFT. Thus, the frequency of the received signal is
DOPPLER SHIFT Radio Propagation Doppler Effect: When a wave source and a receiver are moving towards each other, the frequency of the received signal will not be the same as the source. When they are moving
More informationLocal Area Networks NETW 901
Local Area Networks NETW 901 Lecture 2 Medium Access Control (MAC) Schemes Course Instructor: Dr. Ing. Maggie Mashaly maggie.ezzat@guc.edu.eg C3.220 1 Contents Why Multiple Access Random Access Aloha Slotted
More informationOutline. EEC-484/584 Computer Networks. Homework #1. Homework #1. Lecture 8. Wenbing Zhao Homework #1 Review
EEC-484/584 Computer Networks Lecture 8 wenbing@ieee.org (Lecture nodes are based on materials supplied by Dr. Louise Moser at UCSB and Prentice-Hall) Outline Homework #1 Review Protocol verification Example
More information6.1 Multiple Access Communications
Chap 6 Medium Access Control Protocols and Local Area Networks Broadcast Networks: a single transmission medium is shared by many users. ( Multiple access networks) User transmissions interfering or colliding
More informationMultiple Access (3) Required reading: Garcia 6.3, 6.4.1, CSE 3213, Fall 2010 Instructor: N. Vlajic
1 Multiple Access (3) Required reading: Garcia 6.3, 6.4.1, 6.4.2 CSE 3213, Fall 2010 Instructor: N. Vlajic 2 Medium Sharing Techniques Static Channelization FDMA TDMA Attempt to produce an orderly access
More informationMultiple Access Methods
Helsinki University of Technology S-72.333 Postgraduate Seminar on Radio Communications Multiple Access Methods Er Liu liuer@cc.hut.fi Communications Laboratory 16.11.2004 Content of presentation Protocol
More informationLecture 8: Media Access Control
Lecture 8: Media Access Control CSE 123: Computer Networks Alex C. Snoeren HW 2 due NEXT WEDNESDAY Overview Methods to share physical media: multiple access Fixed partitioning Random access Channelizing
More informationLecture 8: Media Access Control. CSE 123: Computer Networks Stefan Savage
Lecture 8: Media Access Control CSE 123: Computer Networks Stefan Savage Overview Methods to share physical media: multiple access Fixed partitioning Random access Channelizing mechanisms Contention-based
More informationMobile Computing. Chapter 3: Medium Access Control
Mobile Computing Chapter 3: Medium Access Control Prof. Sang-Jo Yoo Contents Motivation Access methods SDMA/FDMA/TDMA Aloha Other access methods Access method CDMA 2 1. Motivation Can we apply media access
More informationMedium Access Control. Wireless Networks: Guevara Noubir. Slides adapted from Mobile Communications by J. Schiller
Wireless Networks: Medium Access Control Guevara Noubir Slides adapted from Mobile Communications by J. Schiller S200, COM3525 Wireless Networks Lecture 4, Motivation Can we apply media access methods
More informationDepartment of Computer Science and Engineering. CSE 3213: Computer Networks I (Fall 2009) Instructor: N. Vlajic Date: Dec 11, 2009.
Department of Computer Science and Engineering CSE 3213: Computer Networks I (Fall 2009) Instructor: N. Vlajic Date: Dec 11, 2009 Final Examination Instructions: Examination time: 180 min. Print your name
More informationPseudo-Bayesian stability of CSMA and CSMA/CD local area networks
Calhoun: The NPS Institutional Archive Theses and Dissertations Thesis Collection 1988-12 Pseudo-Bayesian stability of CSMA and CSMA/CD local area networks Boyana, Murat A. http://hdl.handle.net/10945/23371
More informationCOSC 3213: Computer Networks I Instructor: Dr. Amir Asif Department of Computer Science York University Section B
MAC: Scheduled Approaches 1. Reservation Systems 2. Polling Systems 3. Token Passing Systems Static Channelization: TDMA and FDMA COSC 3213: Computer Networks I Instructor: Dr. Amir Asif Department of
More informationMedium Access Methods. Lecture 9
Medium Access Methods Lecture 9 Medium Access Control Medium Access Control (MAC) is the method that defines a procedure a station should follow when it needs to send a frame or frames. The use of regulated
More informationLecture 23: Media Access Control. CSE 123: Computer Networks Alex C. Snoeren
Lecture 23: Media Access Control CSE 123: Computer Networks Alex C. Snoeren Overview Finish encoding schemes Manchester, 4B/5B, etc. Methods to share physical media: multiple access Fixed partitioning
More information3644 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 57, NO. 6, JUNE 2011
3644 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 57, NO. 6, JUNE 2011 Asynchronous CSMA Policies in Multihop Wireless Networks With Primary Interference Constraints Peter Marbach, Member, IEEE, Atilla
More informationAchieving Network Consistency. Octav Chipara
Achieving Network Consistency Octav Chipara Reminders Homework is postponed until next class if you already turned in your homework, you may resubmit Please send me your peer evaluations 2 Next few lectures
More informationA Backlog-Based CSMA Mechanism to Achieve Fairness and Throughput-Optimality in Multihop Wireless Networks
A Backlog-Based CSMA Mechanism to Achieve Fairness and Throughput-Optimality in Multihop Wireless Networks Peter Marbach, and Atilla Eryilmaz Dept. of Computer Science, University of Toronto Email: marbach@cs.toronto.edu
More informationLecture on Sensor Networks
Lecture on Sensor Networks Copyright (c) 2008 Dr. Thomas Haenselmann (University of Mannheim, Germany). Permission is granted to copy, distribute and/or modify this document under the terms of the GNU
More informationCellular systems 02/10/06
Cellular systems 02/10/06 Cellular systems Implements space division multiplex: base station covers a certain transmission area (cell) Mobile stations communicate only via the base station Cell sizes from
More informationMedium Access Control
CMPE 477 Wireless and Mobile Networks Medium Access Control Motivation for Wireless MAC SDMA FDMA TDMA CDMA Comparisons CMPE 477 Motivation Can we apply media access methods from fixed networks? Example
More informationLectures 8 & 9. M/G/1 Queues
Lectures 8 & 9 M/G/1 Queues MIT Slide 1 M/G/1 QUEUE Poisson M/G/1 General independent Service times Poisson arrivals at rate λ Service time has arbitrary distribution with given E[X] and E[X 2 ] Service
More informationOpportunistic Communications under Energy & Delay Constraints
Opportunistic Communications under Energy & Delay Constraints Narayan Mandayam (joint work with Henry Wang) Opportunistic Communications Wireless Data on the Move Intermittent Connectivity Opportunities
More informationIEEE/ACM TRANSACTIONS ON NETWORKING, VOL. XX, NO. X, AUGUST 20XX 1
IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. XX, NO. X, AUGUST 0XX 1 Greenput: a Power-saving Algorithm That Achieves Maximum Throughput in Wireless Networks Cheng-Shang Chang, Fellow, IEEE, Duan-Shin Lee,
More informationTHROUGHPUT-DELAY PERFORMANCE ANALYSIS OF SSMA PACKET RADIO NETWORK
Engineering Journal ofthe University of Qatar, Vol. 13,2000, pp. THROUGHPUT-DELAY PERFORMANCE ANALYSIS OF SSMA PACKET RADIO NETWORK Yousef G. EI-Jaafreh Electrical Engineering Department Mutah University,
More information06/02/2006. Sharing the Medium. Peter Rounce Room Notes Courtesy of Graham Knight P.A.
Sharing the Medium Peter Rounce (P.Rounce@cs.ucl.ac.uk) Room 6.18 Notes Courtesy of Graham Knight 2011-05 P.A.Rounce 2011-05-1 Sharing a link Introduction TDM, FDM - fixed allocations Statistical multiplexing
More informationChapter 2 Overview. Duplexing, Multiple Access - 1 -
Chapter 2 Overview Part 1 (2 weeks ago) Digital Transmission System Frequencies, Spectrum Allocation Radio Propagation and Radio Channels Part 2 (last week) Modulation, Coding, Error Correction Part 3
More informationStabilization of Contention-Based CDMA Ranging Channel in Wireless Metropolitan Area Networks
Stabilization of Contention-Based CDMA Ranging Channel in Wireless Metropolitan Area Networks Jeong-Jae Won 1, Choong-Ho Cho 2, Hyong-Woo Lee 3, and Victor C.M. Leung 1 1 Department of Electrical and Computer
More informationLecture 8 Mul+user Systems
Wireless Communications Lecture 8 Mul+user Systems Prof. Chun-Hung Liu Dept. of Electrical and Computer Engineering National Chiao Tung University Fall 2014 Outline Multiuser Systems (Chapter 14 of Goldsmith
More informationAnalyzing Split Channel Medium Access Control Schemes
IEEE TRANS. ON WIRELESS COMMNICATIONS, TO APPEAR Analyzing Split Channel Medium Access Control Schemes Jing Deng, Member, IEEE, Yunghsiang S. Han, Member, IEEE, and Zygmunt J. Haas, Senior Member, IEEE
More informationKybernetika. Ioannis E. Pountourakis Performance of multichannel multiaccess protocols with receiver collisions
Kybernetika Ioannis E. Pountourakis Performance of multichannel multiaccess protocols with receiver collisions Kybernetika, Vol. 33 (1997), No. 5, 547--555 Persistent URL: http://dml.cz/dmlcz/125392 Terms
More informationThroughput-optimal number of relays in delaybounded multi-hop ALOHA networks
Page 1 of 10 Throughput-optimal number of relays in delaybounded multi-hop ALOHA networks. Nekoui and H. Pishro-Nik This letter addresses the throughput of an ALOHA-based Poisson-distributed multihop wireless
More informationChapter 2 On the Spectrum Handoff for Cognitive Radio Ad Hoc Networks Without Common Control Channel
Chapter 2 On the Spectrum Handoff for Cognitive Radio Ad Hoc Networks Without Common Control Channel Yi Song and Jiang Xie Abstract Cognitive radio (CR) technology is a promising solution to enhance the
More informationStochastic Modelling for Wireless Communication Networks-Multiple Access Methods.
Stochastic Modelling for Wireless Communication etworks-multiple Access Methods. By Hassan KHALIL U.U.D.M. Project Report 2003: **** Examensarbete i matematisk statistik 20 poäng Handledare och examinator:
More informationThe Long Range Wide Area Network - LoraWAN
Politecnico di Milano Advanced Network Technologies Laboratory The Long Range Wide Area Network - LoraWAN https://www.lora-alliance.org/ 1 Lang Range Communication Technologies Wi-Fi HaLow 2 Cellular IoT
More informationPerformance of ALOHA and CSMA in Spatially Distributed Wireless Networks
Performance of ALOHA and CSMA in Spatially Distributed Wireless Networks Mariam Kaynia and Nihar Jindal Dept. of Electrical and Computer Engineering, University of Minnesota Dept. of Electronics and Telecommunications,
More informationMAC Theory Chapter 7. Standby Energy [digitalstrom.org] Rating. Overview. No apps Mission critical
Standby Energy [digitalstrom.org] MAC Theory Chapter 7 0 billion electrical devices in Europe 9.5 billion are not networked 6 billion euro per year energy lost Make electricity smart cheap networking (over
More informationMAC Theory. Chapter 7
MAC Theory Chapter 7 Ad Hoc and Sensor Networks Roger Wattenhofer 7/1 Standby Energy [digitalstrom.org] 10 billion electrical devices in Europe 9.5 billion are not networked 6 billion euro per year energy
More informationCarrier Sensing based Multiple Access Protocols for Cognitive Radio Networks
Carrier Sensing based Multiple Access Protocols for Cognitive Radio Networks Shao-Yu Lien, Chih-Cheng Tseng, and Kwang-Cheng Chen Abstract Cognitive radio (CR) dynamically accessing inactive radio spectrum
More informationICT 5305 Mobile Communications. Lecture - 4 April Dr. Hossen Asiful Mustafa
ICT 5305 Mobile Communications Lecture - 4 April 2016 Dr. Hossen Asiful Mustafa Media Access Motivation Can we apply media access methods from fixed networks? Example CSMA/CD Carrier Sense Multiple Access
More informationUtilization-Aware Adaptive Back-Pressure Traffic Signal Control
Utilization-Aware Adaptive Back-Pressure Traffic Signal Control Wanli Chang, Samarjit Chakraborty and Anuradha Annaswamy Abstract Back-pressure control of traffic signal, which computes the control phase
More informationINTRODUCTION TO WIRELESS SENSOR NETWORKS. CHAPTER 3: RADIO COMMUNICATIONS Anna Förster
INTRODUCTION TO WIRELESS SENSOR NETWORKS CHAPTER 3: RADIO COMMUNICATIONS Anna Förster OVERVIEW 1. Radio Waves and Modulation/Demodulation 2. Properties of Wireless Communications 1. Interference and noise
More informationLink Models for Circuit Switching
Link Models for Circuit Switching The basis of traffic engineering for telecommunication networks is the Erlang loss function. It basically allows us to determine the amount of telephone traffic that can
More informationThe Optimal Packet Duration of ALOHA and CSMA in Ad Hoc Wireless Networks
The Optimal Packet Duration of ALOHA and CSMA in Ad Hoc Wireless Networks Jon Even Corneliussen Master of Science in Electronics Submission date: June 2009 Supervisor: Geir Egil Øien, IET Co-supervisor:
More informationTIME- OPTIMAL CONVERGECAST IN SENSOR NETWORKS WITH MULTIPLE CHANNELS
TIME- OPTIMAL CONVERGECAST IN SENSOR NETWORKS WITH MULTIPLE CHANNELS A Thesis by Masaaki Takahashi Bachelor of Science, Wichita State University, 28 Submitted to the Department of Electrical Engineering
More information1. Introduction 1.2 Medium Access Control. Prof. JP Hubaux
1. Introduction 1.2 Medium Access Control Prof. JP Hubaux 1 Modulation and demodulation (reminder) analog baseband digital signal data digital analog 101101001 modulation modulation radio transmitter radio
More informationMultiple MAC Protocols Selection Strategies. Presented by Chen-Hsiang Feng
Multiple MAC Protocols Selection Strategies Presented by Chen-Hsiang Feng Outline Motivation and Goal Simulation Environment MAC Selection Strategies Conclusions Motivation Today's devices have multiple
More informationDynamic Framed Slotted ALOHA Algorithms using Fast Tag Estimation Method for RFID System
Dynamic Framed Slotted AOHA Algorithms using Fast Tag Estimation Method for RFID System Jae-Ryong Cha School of Electrical and Computer Engineering Ajou Univ., Suwon, Korea builder@ajou.ac.kr Jae-Hyun
More informationMedium Access Control via Nearest-Neighbor Interactions for Regular Wireless Networks
Medium Access Control via Nearest-Neighbor Interactions for Regular Wireless Networks Ka Hung Hui, Dongning Guo and Randall A. Berry Department of Electrical Engineering and Computer Science Northwestern
More informationCooperation in Random Access Wireless Networks
Cooperation in Random Access Wireless Networks Presented by: Frank Prihoda Advisor: Dr. Athina Petropulu Communications and Signal Processing Laboratory (CSPL) Electrical and Computer Engineering Department
More informationDelay Performance Modeling and Analysis in Clustered Cognitive Radio Networks
Delay Performance Modeling and Analysis in Clustered Cognitive Radio Networks Nadia Adem and Bechir Hamdaoui School of Electrical Engineering and Computer Science Oregon State University, Corvallis, Oregon
More informationPolitecnico di Milano Scuola di Ingegneria Industriale e dell Informazione. Physical layer. Fundamentals of Communication Networks
Politecnico di Milano Scuola di Ingegneria Industriale e dell Informazione Physical layer Fundamentals of Communication Networks 1 Disclaimer o The basics of signal characterization (in time and frequency
More informationChannel Sensing Order in Multi-user Cognitive Radio Networks
2012 IEEE International Symposium on Dynamic Spectrum Access Networks Channel Sensing Order in Multi-user Cognitive Radio Networks Jie Zhao and Xin Wang Department of Electrical and Computer Engineering
More informationAnalysis of cognitive radio networks with imperfect sensing
Analysis of cognitive radio networks with imperfect sensing Isameldin Suliman, Janne Lehtomäki and Timo Bräysy Centre for Wireless Communications CWC University of Oulu Oulu, Finland Kenta Umebayashi Tokyo
More informationFrequency-Hopped Spread-Spectrum
Chapter Frequency-Hopped Spread-Spectrum In this chapter we discuss frequency-hopped spread-spectrum. We first describe the antijam capability, then the multiple-access capability and finally the fading
More informationMobile Communications
COMP61242 Mobile Communications Lecture 7 Multiple access & medium access control (MAC) Barry Cheetham 16/03/2018 Lecture 7 1 Multiple access Communication links by wire or radio generally provide access
More information*Most details of this presentation obtain from Behrouz A. Forouzan. Data Communications and Networking, 5 th edition textbook
*Most details of this presentation obtain from Behrouz A. Forouzan. Data Communications and Networking, 5 th edition textbook 1 Multiplexing Frequency-Division Multiplexing Time-Division Multiplexing Wavelength-Division
More informationAverage Delay in Asynchronous Visual Light ALOHA Network
Average Delay in Asynchronous Visual Light ALOHA Network Xin Wang, Jean-Paul M.G. Linnartz, Signal Processing Systems, Dept. of Electrical Engineering Eindhoven University of Technology The Netherlands
More informationChapter 3 : Media Access. Mobile Communications. Collision avoidance, MACA
Mobile Communications Chapter 3 : Media Access Motivation Collision avoidance, MACA SDMA, FDMA, TDMA Polling Aloha CDMA Reservation schemes SAMA Comparison Prof. Dr.-Ing. Jochen Schiller, http://www.jochenschiller.de/
More informationMultiple Access. Difference between Multiplexing and Multiple Access
Multiple Access (MA) Satellite transponders are wide bandwidth devices with bandwidths standard bandwidth of around 35 MHz to 7 MHz. A satellite transponder is rarely used fully by a single user (for example
More informationFPGA-BASED DESIGN AND IMPLEMENTATION OF THREE-PRIORITY PERSISTENT CSMA PROTOCOL
U.P.B. Sci. Bull., Series C, Vol. 79, Iss. 4, 2017 ISSN 2286-3540 FPGA-BASED DESIGN AND IMPLEMENTATION OF THREE-PRIORITY PERSISTENT CSMA PROTOCOL Xu ZHI 1, Ding HONGWEI 2, Liu LONGJUN 3, Bao LIYONG 4,
More informationCapacity Analysis and Call Admission Control in Distributed Cognitive Radio Networks
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS (TO APPEAR) Capacity Analysis and Call Admission Control in Distributed Cognitive Radio Networks SubodhaGunawardena, Student Member, IEEE, and Weihua Zhuang,
More informationPerformance Analysis of 100 Mbps PACE Technology Ethernet Networks
Reprint erformance Analysis of Mbps ACE Technology Ethernet Networs A. antazi and T. Antonaopoulos The th EEE Symposium on Computers and Communications-SCC TUNSA, ULY Copyright Notice: This material is
More informationChapter 6 Bandwidth Utilization: Multiplexing and Spreading 6.1
Chapter 6 Bandwidth Utilization: Multiplexing and Spreading 6.1 Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. 3-6 PERFORMANCE One important issue in networking
More informationAnnouncements. Tuesday April 15 covers material from chapters: 1-3, 5-6 emphasis on material since last midterm
Announcements Reading Today: 4.1 & 4.2 (skip 4.2.4 and 4.2.5) Second Midterm: Tuesday Apri 15 covers materia from chapters: 1-3, 5-6 emphasis on materia since ast midterm CMSC 417 - S97 (ect 18) copyright
More informationFast and efficient randomized flooding on lattice sensor networks
Fast and efficient randomized flooding on lattice sensor networks Ananth Kini, Vilas Veeraraghavan, Steven Weber Department of Electrical and Computer Engineering Drexel University November 19, 2004 presentation
More informationarxiv: v1 [cs.it] 21 Feb 2015
1 Opportunistic Cooperative Channel Access in Distributed Wireless Networks with Decode-and-Forward Relays Zhou Zhang, Shuai Zhou, and Hai Jiang arxiv:1502.06085v1 [cs.it] 21 Feb 2015 Dept. of Electrical
More informationWireless Communications Lecture 4: Multiple Access Technologies
Wireless Communications Lecture 4: Multiple Access Technologies Module Representive: Prof. Dr.-Ing. Hans D. Schotten schotten@eit.uni-kl.de Lecturer: Dr. Vincenzo Sciancalepore vincenzo.sciancalepore@neclab.eu
More informationAN EFFICIENT MULTIACCESS PROTOCOL FOR WIRELESS NETWORKS. Benjamin W. Wah and Xiao Su
AN EFFICIENT MULTIACCESS PROTOCOL FOR WIRELESS NETWORKS enjamin W. Wah and Xiao Su Department of Electrical and Computer Engineering and the Coordinated Science Laboratory University of Illinois at Urbana-Champaign
More informationPolitecnico di Milano Advanced Network Technologies Laboratory. Radio Frequency Identification
Politecnico di Milano Advanced Network Technologies Laboratory Radio Frequency Identification 1 RFID in Nutshell o To Enhance the concept of bar-codes for faster identification of assets (goods, people,
More informationBlock diagram of a radio-over-fiber network. Central Unit RAU. Server. Downlink. Uplink E/O O/E E/O O/E
Performance Analysis of IEEE. Distributed Coordination Function in Presence of Hidden Stations under Non-saturated Conditions with in Radio-over-Fiber Wireless LANs Amitangshu Pal and Asis Nasipuri Electrical
More informationIEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 51, NO. 2, FEBRUARY Srihari Adireddy, Student Member, IEEE, and Lang Tong, Fellow, IEEE
IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 51, NO. 2, FEBRUARY 2005 537 Exploiting Decentralized Channel State Information for Random Access Srihari Adireddy, Student Member, IEEE, and Lang Tong, Fellow,
More information3094 IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, VOL. 57, NO. 5, SEPTEMBER /$ IEEE
3094 IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, VOL. 57, NO. 5, SEPTEMBER 2008 Analytical Modeling of Contention-Based Bandwidth Request Mechanism in IEEE 802.16 Wireless Networks Yaser Pourmohammadi Fallah,
More informationWireless Intro : Computer Networking. Wireless Challenges. Overview
Wireless Intro 15-744: Computer Networking L-17 Wireless Overview TCP on wireless links Wireless MAC Assigned reading [BM09] In Defense of Wireless Carrier Sense [BAB+05] Roofnet (2 sections) Optional
More informationPULSE: A MAC Protocol for RFID Networks
PULSE: A MAC Protocol for RFID Networks Shailesh M. Birari and Sridhar Iyer K. R. School of Information Technology Indian Institute of Technology, Powai, Mumbai, India 400 076. (e-mail: shailesh,sri@it.iitb.ac.in)
More informationTransmission Scheduling in Capture-Based Wireless Networks
ransmission Scheduling in Capture-Based Wireless Networks Gam D. Nguyen and Sastry Kompella Information echnology Division, Naval Research Laboratory, Washington DC 375 Jeffrey E. Wieselthier Wieselthier
More informationNetwork Management System for Telecommunication and Internet Application
Network Management System for Telecommunication and Internet Application Gerd Bumiller GmbH Unterschlauersbacher-Hauptstr. 10, D-906 13 Groahabersdorf, Germany Phone: +49 9105 9960-51, Fax: +49 9105 9960-19,
More informationDiCa: Distributed Tag Access with Collision-Avoidance among Mobile RFID Readers
DiCa: Distributed Tag Access with Collision-Avoidance among Mobile RFID Readers Kwang-il Hwang, Kyung-tae Kim, and Doo-seop Eom Department of Electronics and Computer Engineering, Korea University 5-1ga,
More informationANTI-JAMMING PERFORMANCE OF COGNITIVE RADIO NETWORKS. Xiaohua Li and Wednel Cadeau
ANTI-JAMMING PERFORMANCE OF COGNITIVE RADIO NETWORKS Xiaohua Li and Wednel Cadeau Department of Electrical and Computer Engineering State University of New York at Binghamton Binghamton, NY 392 {xli, wcadeau}@binghamton.edu
More informationColor of Interference and Joint Encoding and Medium Access in Large Wireless Networks
Color of Interference and Joint Encoding and Medium Access in Large Wireless Networks Nithin Sugavanam, C. Emre Koksal, Atilla Eryilmaz Department of Electrical and Computer Engineering The Ohio State
More informationRandom Access Congestion Control in DVB-RCS2 Interactive Satellite Terminals
Random Access Congestion Control in DVB-RCS2 Interactive Satellite Terminals Alessio Meloni and Maurizio Murroni DIEE - Department of Electrical and Electronic Engineering University of Cagliari Piazza
More informationAnalysis of Random Access Protocol and Channel Allocation Schemes for Service Differentiation in Cellular Networks
Eleventh LACCEI Latin American and Cariean Conference for Engineering and Technology (LACCEI 2013) Innovation in Engineering, Technology and Education for Competitiveness and Prosperity August 14-16, 2013
More informationUltra-Wideband Impulse Radio for Tactical Ad Hoc Communication Networks
Ultra-Wideband Impulse Radio for Tactical Ad Hoc Communication Networks J. Keith Townsend William M. Lovelace, Jon R. Ward, Robert J. Ulman N.C. State University, Raleigh, NC N.C. A&T State University,
More informationImproving Reader Performance of an UHF RFID System Using Frequency Hopping Techniques
1 Improving Reader Performance of an UHF RFID System Using Frequency Hopping Techniques Ju-Yen Hung and Venkatesh Sarangan *, MSCS 219, Computer Science Department, Oklahoma State University, Stillwater,
More informationPolitecnico di Milano Advanced Network Technologies Laboratory. Radio Frequency Identification
Politecnico di Milano Advanced Network Technologies Laboratory Radio Frequency Identification RFID in Nutshell o To Enhance the concept of bar-codes for faster identification of assets (goods, people,
More informationA Random Network Coding-based ARQ Scheme and Performance Analysis for Wireless Broadcast
ISSN 746-7659, England, U Journal of Information and Computing Science Vol. 4, No., 9, pp. 4-3 A Random Networ Coding-based ARQ Scheme and Performance Analysis for Wireless Broadcast in Yang,, +, Gang
More informationQueuing Theory Systems Analysis in Wireless Networks Mobile Stations with Non-Preemptive Priority
Queuing Theory Systems Analysis in Wireless Networks Mobile Stations with Non-Preemptive Priority Bakary Sylla Senior Systems Design Engineer Radio Access Network T-Mobile Inc. USA & Southern Methodist
More informationMedium Access Schemes
Medium Access Schemes Winter Semester 2010/11 Integrated Communication Systems Group Ilmenau University of Technology Media Access: Motivation The problem: multiple users compete for a common, shared resource
More informationMultiple Access Schemes
Multiple Access Schemes Dr Yousef Dama Faculty of Engineering and Information Technology An-Najah National University 2016-2017 Why Multiple access schemes Multiple access schemes are used to allow many
More informationModule 3: Physical Layer
Module 3: Physical Layer Dr. Associate Professor of Computer Science Jackson State University Jackson, MS 39217 Phone: 601-979-3661 E-mail: natarajan.meghanathan@jsums.edu 1 Topics 3.1 Signal Levels: Baud
More informationMultiuser Scheduling and Power Sharing for CDMA Packet Data Systems
Multiuser Scheduling and Power Sharing for CDMA Packet Data Systems Sandeep Vangipuram NVIDIA Graphics Pvt. Ltd. No. 10, M.G. Road, Bangalore 560001. sandeep84@gmail.com Srikrishna Bhashyam Department
More informationMultiplexing. Dr. Manas Khatua Assistant Professor Dept. of CSE IIT Jodhpur
CS311: DATA COMMUNICATION Multiplexing Dr. Manas Khatua Assistant Professor Dept. of CSE IIT Jodhpur e-mail: manaskhatua@iitj.ac.in Outline of the Lecture What is Multiplexing and why is it used? Basic
More informationModeling the impact of buffering on
Modeling the impact of buffering on 8. Ken Duffy and Ayalvadi J. Ganesh November Abstract A finite load, large buffer model for the WLAN medium access protocol IEEE 8. is developed that gives throughput
More informationOutline of the Lecture
CS311: DATA COMMUNICATION Multiplexing by Dr. Manas Khatua Assistant Professor Dept. of CSE IIT Jodhpur E-mail: manaskhatua@iitj.ac.in Web: http://home.iitj.ac.in/~manaskhatua http://manaskhatua.github.io/
More informationEfficiency and detectability of random reactive jamming in wireless networks
Efficiency and detectability of random reactive jamming in wireless networks Ni An, Steven Weber Modeling & Analysis of Networks Laboratory Drexel University Department of Electrical and Computer Engineering
More informationJoint work with Dragana Bajović and Dušan Jakovetić. DLR/TUM Workshop, Munich,
Slotted ALOHA in Small Cell Networks: How to Design Codes on Random Geometric Graphs? Dejan Vukobratović Associate Professor, DEET-UNS University of Novi Sad, Serbia Joint work with Dragana Bajović and
More informationTHE field of personal wireless communications is expanding
IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 5, NO. 6, DECEMBER 1997 907 Distributed Channel Allocation for PCN with Variable Rate Traffic Partha P. Bhattacharya, Leonidas Georgiadis, Senior Member, IEEE,
More informationExercise Data Networks
(due till January 19, 2009) Exercise 9.1: IEEE 802.11 (WLAN) a) In which mode of operation is this network in? b) Why is the start of the back-off timers delayed until the DIFS contention phase? c) How
More informationOn Flow-Aware CSMA. in Multi-Channel Wireless Networks. Mathieu Feuillet. Joint work with Thomas Bonald CISS 2011
On Flow-Aware CSMA in Multi-Channel Wireless Networks Mathieu Feuillet Joint work with Thomas Bonald CISS 2011 Outline Model Background Standard CSMA Flow-aware CSMA Conclusion Outline Model Background
More information