Performance Evaluation of Deadline Monotonic Policy over protocol
|
|
- Virgil Carter
- 5 years ago
- Views:
Transcription
1 Performance Evaluation of Deadline Monotonic Policy over 80. protocol Ines El Korbi and Leila Azouz Saidane National School of Computer Science University of Manouba, 00 Tunisia s: ABSTRACT Real time applications are characterized by their delay bounds. To satisfy the Quality of Service (QoS) requirements of such flows over wireless communications, we enhance the 80. protocol to support the Deadline Monotonic (DM) scheduling policy. Then, we propose to evaluate the performance of DM in terms of throughput, average medium access delay and medium access delay distrbution. To evaluate the performance of the DM policy, we develop a Markov chain based analytical model and derive expressions of the throughput, the average MAC layer service time and the service time distribution. Therefore, we validate the mathematical model and extend analytial results to a multi-hop network by simulation using the ns- network simulator. Keywords: Deadline Monotonic, 80., Performance evaluation, Average medium access delay, Throughput, Probabilistic medium access delay bounds. INTRODUCTION Supporting applications with QoS requirements has become an important challenge for all communications networks. In wireless LANs, the IEEE 80. protocol [5] has been enhanced and the IEEE 80.e protocol [6] was proposed to support quality of service over wireless communications. In the absence of a coordination point, the IEEE 80. defines the Distributed Coordination Function (DCF) based on the Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA) protocol. The IEEE 80.e proposes the Enhanced Distributed Channel Access (EDCA) as an extension for DCF. With EDCA, each station maintains four priorities called Access Categories (ACs). The quality of service offered to each flow depends on the AC to which it belongs. Nevertheless, the granularity of service offered by 80.e (4 priorities at most) can not satisfy the real time flows requirements (where each flow is characterized by its own delay bound). Therefore, we propose in this paper a new medium access mechanism based on the Deadline Monotonic (DM) policy [9] to schedule real time flows over 80.. Indeed DM is a real time scheduling policy that assigns static priorities to flow packets according to their deadlines; the packet with the shortest deadline being assigned the highest priority. To support the DM policy over 80., we use a distributed scheduling and introduce a new medium access backoff policy. Therefore, we focus on performance evaluation of the DM policy in terms of achievable throughput, average MAC layer service time and MAC layer service time distribution. Hence, we follow these steps: First, we propose a Markov Chain framework modeling the backoff process of n contending stations within the same broadcast region []. Due to the complexity of the mathematical model, we restrict the analysis to n contending stations belonging to two traffic categories (each traffic category is characterized by its own delay bound). From the analytical model, we derive the throughput achieved by each traffic category. Then, we use the generalized Z-transforms [3] to derive expressions of the average MAC layer service time and the service time distribution. As the analytical model was restricted to two traffic categories, analytical results are extended by simulation to different traffic categories. Finally, we consider a simple multi-hop scenario to deduce the behavior of the DM policy in a multi hop environment. Volume 3 Number 4 Page 7
2 The rest of this paper is organized as follows. In section, we review the state of the art of the IEEE 80. DCF, QoS support over 80. mainly the IEEE 80.e EDCA and real time scheduling over 80.. In section 3, we present the distributed scheduling and introduce the new medium access backoff policy to support DM over 80.. In section 4, we present our mathematical model based on Markov chain analysis. Section 5 and 6 present respectively throughput and the service time analysis. Analytical results are validated by simulation using the ns- network simulator [6]. In section 7, we extend our study by simulation, first to take into consideration different traffic categories, second, to study the behavior of the DM algorithm in a multi-hop environment where factors like interferences or routing protocols exist. Finally, we conclude the paper in section 8. LITTERATURE REVIEWS. The 80. protocol.. Description of the IEEE 80. DCF Using DCF, a station shall ensure that the channel is idle when it attempts to transmit. Then it selects a random backoff in the contention window [0,CW ], where CW is the current window size and varies between the minimum and the maximum contention window sizes. If the channel is sensed busy, the station suspends its backoff until the channel becomes idle for a Distributed Inter Frame Space (DIFS) after a successful transmission or an Extended Inter Frame Space (EIFS) after a collision. The packet is transmitted when the backoff reaches zero. A packet is dropped if it collides after maximum retransmission attempts. The above described two way handshaking packet transmission procedure is called basic access mechanism. DCF defines a four way handshaking technique called Request To Send/Clear To Send (RTS/CTS) to prevent the hidden station problem. A maximum achievable throughput. The native model is also extended in [0] to a non saturated environment. In [], the authors derive the average packet service time at a 80. node. A new generalized Z-transform based framework has been proposed in [3] to derive probabilistic bounds on MAC layer service time. Therefore, it would be possible to provide probabilistic end to end delay bounds in a wireless network.. Supporting QoS over Differentiation mechanisms over 80. Emerging applications like audio and video applications require quality of service guarantees in terms of throughput delay, jitter, loss rate, etc. Transmitting such flows over wireless communications require supporting service differentiation mechanisms over such networks. Many medium access schemes have been proposed to provide some QoS enhancements over the IEEE 80. WLAN. Indeed, [4] assigns different priorities to the incoming flows. Priority classes are differentiated according to one of three 80. parameters: the backoff increase function, the Inter Frame Spacing (IFS) and the maximum frame length. Experiments show that all the three differentiation schemes offer better guarantees for the highest priority flow. But the backoff increase function mechanism doesn t perform well with TCP flows because ACKs affect the differentiation mechanism. In [7], an algorithm is proposed to provide service differentiation using two parameters of IEEE 80., the backoff interval and the IFS. With this scheme high priority stations are more likely to access the medium than low priority ones. The above described researches led to the standardization of a new protocol that supports QoS over 80., the IEEE 80.e protocol [6]. station S j is said to be hidden from S i if S j is.. The IEEE 80.e EDCA The IEEE 80.e proposes a new medium within the transmission range of the receiver of S i and out of the transmission range of S i... Performance evaluation of the 80. DCF Different works have been proposed to evaluate the performance of the 80. protocol based on Bianchi s work []. Indeed, Bianchi proposed a Markov chain based analytical model to evaluate the saturation throughput of the 80. protocol. By saturation conditions, it s meant that contending stations have always packets to transmit. Several works extended the Bianchi model either to suit more realistic scenarios or to evaluate other performance parameters. Indeed, the authors of [] incorporate the frame retry limits in the Bianchi s model and show that Bianchi overestimates the access mechanism called the Enhanced Distributed Channel Access (EDCA), that enhances the IEEE 80. DCF. With EDCA, each station maintains four priorities called Access Categories (ACs). Each access category is characterized by a minimum and a maximum contention window sizes and an Arbitration Inter Frame Spacing (AIFS). Different analytical models have been proposed to evaluate the performance of 80.e EDCA. In [7], Xiao extends Bianchi s model to the prioritized schemes provided by 80.e by introducing multiple ACs with distinct minimum and maximum contention window sizes. But the AIFS differentiation parameter is lacking in Xiao s model. Recently Osterbo and Al. have proposed Volume 3 Number 4 Page 8
3 different works to evaluate the performance of the IEEE 80.e EDCA [3], [4], [5]. They proposed a model that takes into consideration all the differentiation parameters of the EDCA especially the AIFS one. Moreover different parameters of QoS have been evaluated such as throughput, average service time, service time distribution and probabilistic response time bounds for both saturated and non saturated cases. Although the IEEE 80.e EDCA classifies the traffic into four prioritized ACs, there is still no guarantee of real time transmission service. This is due to the lack of a satisfactory scheduling method for various delay-sensitive flows. Hence, we need a scheduling policy dedicated to such delay sensitive flows..3 Real time scheduling over 80. A distributed solution for the support of realtime sources over IEEE 80., called Blackburst, is discussed in [8]. This scheme modifies the MAC protocol to send short transmissions in order to gain priority for real-time service. It is shown that this approach is able to support bounded delays. The main drawback of this scheme is that it requires backoff value is inferred from the deadline information. 3 SUPPORTING DEADLINE MONOTONIC (DM) POLICY OVER 80. With DCF all the stations share the same transmission medium. Then, the HOL (Head of Line) packets of all the stations (highest priority packets) will contend for the channel with the same priority even if they have different deadlines. Introducing DM over 80. allows stations having packets with short deadlines to access the channel with higher priority than those having packets with long deadlines. Providing such a QoS requires distributed scheduling and a new medium access policy. 3. Distributed Scheduling over 80. To realize a distributed scheduling over 80., we introduce a priority broadcast mechanism similar to [8]. Indeed each station maintains a local scheduling table with entries for HOL packets of all other stations. Each entry in the scheduling table of node S i comprises two fields (S j, D j ) where S j is the source node MAC address and D j is the constant intervals for high priority traffic; otherwise deadline of the HOL packet of node S j. To the performance degrades very much. In [8], the authors introduced a distributed broadcast HOL packets deadlines, we propose to use the two way handshake DATA/ACK access mode. priority scheduling over 80. to support a class of When a node S dynamic priority schedulers such as Earliest i transmits a DATA packet, it Deadline First (EDF) or Virtual Clock (VC). Indeed, piggybacks the deadline of its HOL packet. Nodes the EDF policy is used to schedule real time flows hearing the DATA packet add an entry for S i in according to their absolute deadlines, where the their local scheduling tables by filling the absolute deadline is the node arrival time plus the delay bound. To realize a distributed scheduling over 80., corresponding fields. The receiver of the DATA packet copies the priority of the HOL packet in ACK before sending the ACK frame. All the stations that the authors of [8] used a priority broadcast did not hear the DATA packet add an entry for S i mechanism where each station maintains an entry for the highest priority packet of all other stations. Thus, using the information in the ACK packet. stations can adjust their backoff according to other 3. DM medium access backoff policy stations priorities. Let s consider two stations S and S The overhead introduced by the broadcast transmitting two flows with the same deadline D priority mechanism is negligible. This is due to the ( D is expressed as a number of 80. slots). The fact that priorities are exchanged using native DATA and ACK packets. Nevertheless, authors of [8] proposed a generic backoff policy that can be used two stations having the same delay bound can access the channel with the same priority using the native 80. DCF. by a class of dynamic priority schedulers no matter if Now, we suppose that S and S transmit flows this scheduler targets delay sensitive flows or rate sensitive flows. with different delay bounds D and D such as D < D, and generate two packets at time instants In this paper, we focus on delay sensitive flows and propose to support the fixed priority Deadline t and t. If S had the same delay bound as S, Monotonic (DM) policy over 80. to schedule its packet would have been generated at time t such delay sensitive flows. For instance, we use a priority as t = t + D, where D = (D D ). broadcast mechanism similar to [8] and introduce a new medium access backoff policy where the At that time, S and S would have the same Volume 3 Number 4 Page 9
4 priority and transmit their packets according to the Volume 3 Number 4 Page 0
5 80. protocol. following assumptions: Thus, to support DM over 80., each station uses a new backoff policy where the backoff is given Assumption : by: The system under study comprises n contending The random backoff selected in [0,CW ] stations hearing each other transmissions. according to 80. DCF, referred as BAsic Backoff (BAB). Assumption : The DM Shifting Backoff (DMSB): Each station S i transmits a flow F i with a delay corresponds to the additional backoff slots that bound D i. The n stations are divided into two a station with low priority (the HOL packet traffic categories C and C such as: having a large deadline) adds to its BAB to have the same priority as the station with the C represents highest priority (the HOL packet having the shortest deadline). n nodes transmitting flows with delay bound D. C represents n nodes transmitting flows Whenever a station S i sends an ACK or hears with delay bound D, such as D < D, an ACK on the channel its DMSB is revaluated as D = (D D ) and (n + n ) = n. follows: DMSB(S i ) = Deadline(HOL(S i )) DT min (S i ) () Where DT min (S i ) is the minimum of the HOL Assumption 3: We operate in saturation conditions: each station has immediately a packet available for transmission after the service completion of the previous packet []. packet deadlines present in S i scheduling table and Assumption 4: Deadline(HOL(S i )) is the HOL packet deadline of A station selects a BAB in a constant contention node S i. window [0,W ] independently of the transmission attempt. This is a simplifying assumption to limit the Hence, when S i has to transmit its HOL packet complexity of the mathematical model. with a delay bound D i, it selects a BAB in the contention window [0,CW min ] and computes the WHole Backoff (WHB) value as follows: WHB(S i ) = DMSB(S i )+ BAB(S i ) () Assumption 5: We are in stationary conditions, i.e. the n stations have already sent one packet at least. Depending on the traffic category to which it belongs, each station S The station S i decrements its BAB when it i will be modeled by a Markov Chain representing its whole backoff (WHB) senses an idle slot. Now, we suppose that S i senses process. the channel busy. If a successful transmission is heard, then S i revaluates its DMSB when a correct 4. Markov chain modeling a station of category ACK is heard. Then the station S i adds the new C DMSB value to its current BAB as in equation (). Whereas, if a collision is heard, S i reinitializes its DMSB and adds it to its current BAB to allow colliding stations contending with the same priority Figure illustrates the Markov chain modeling a station S of category C. The states of this Markov chain are described by the following quadruplet (R,i,i j, D ) where: as for their first transmission attempt. S i transmits R : takes two values denoted by C and when its WHB reaches 0. If the transmission fails, S i doubles its contention window size and repeats the ~ C. When R =~ C, the n stations of above procedure until the packet is successfully category C are decrementing their shifting transmitted or dropped after maximum backoff (DMSB) during D slots and retransmission attempts. wouldn t contend for the channel. When R = C, the D slots had already been 4 MATHEMATICAL MODEL OF THE DM POLICY OVER 80. elapsed and stations of category C contend for the channel. i : the value of the BAB selected by In this section, we propose a mathematical model to evaluate the performance of the DM policy [0,W ]. using Markov chain analysis []. We consider the Volume 3 Number 4 Page will S in
6 Figure : Markov chain modeling a category C Station (i j ) : corresponds to the current backoff moves to the state (~ C,i j,i j, D ), i =..W j = 0.. min(d,i ). of the station S. D : corresponds to (D D ). We choose the negative notation D for stations of Now, If S is in one of the states C to express the fact that only stations of (C,i,i D, D ), i = (D + )..W and at category C have a positive DMSB equal to least one of the (n ) remaining stations (either a D. category C or a category C station) transmits, Initially S selects a random BAB and is in then S moves to one of the states one of the states (~ C,i,i, D ), i = 0..W. (~ C,i D,i D, D ), i = (D + )..W. During (D ) slots, S decrements its backoff if none of the (n ) remaining stations of category C transmits. Indeed, during these slots, the n stations of category C are decrementing their DMSB and wouldn t contend for the channel. 4. Markov chain modeling a station of category C Figure illustrates the Markov chain modeling a station S of category C. Each state of S Markov chain is represented by the quadruplet (i, k, D j, D ) where: When S is in one of the states i : refers to the BAB value selected by S in (~ C,i,i (D ), D ), i = D..W and [0,W ]. th senses the channel idle, it decrements its D slot. k : refers to the current BAB value of S. But S knows that henceforth the n stations of D j : refers to the current DMSB of S, category C can contend for the channel (the D j [0, D ]. slots had been elapsed). Hence, S moves to one of the states (C,i,i D, D ), i = D..W. D : corresponds to (D D ). When S selects a BAB, its DMSB equals However, when the station S is in one of the D and is in one of the states (i,i, D, D ), states (~ C, i,i j, D ), for i =..W, i = 0..W. During D slots, only the n j = 0.. min(d,i ) and at least one of the stations of category C contend for the channel. (n ) remaining stations of category C transmits, then the stations of category C will If S senses the channel idle during D slots, it reinitialize their DMSB and wouldn t contend for moves to one of the states (i,i,0, D ), i = 0..W, channel during additional D slots. Therefore, S where it ends its shifting backoff. Volume 3 Number 4 Page
7 Figure : Markov chain modeling a category C Station When S is in one of the states (i,i,0, D ), ξ = {(i,i, D j, D ),i = 0..W, i = 0..W, the (n ) other stations of category j = 0..(D )} C have also decremented their DMSB and can γ : the set of states of S, where stations contend for the channel. Thus, S decrements its of category C contend for the channel BAB and moves to the state (i,i,0, D ), i =..W, only if none of the (n ) remaining stations transmits. (pink states in figure ). γ = {(i,i,0, D ),i = 0..W (i,i,0, D ),i =..W } If S is in one of the states (i,i,0, D ), Therefore, when stations of category C are in i =..W, and at least one of the (n ) one the states of ξ, stations of category C are in remaining stations transmits, the n stations of one of the states of ξ. Similarly, when stations of category C will reinitialize their DMSB and S category C are is in one of the states of γ, moves to the state (i,i, D, D ), stations of category C are in one of the states of i =..W. γ. 4.3 Blocking probabilities in the Markov chains Hence, we derive the expressions of S According to the explanations given in blocking probabilities p and p shown in paragraphs 4. and 4., the states of the Markov figure as follows: chains modeling stations S and S can be divided into the following groups: p : the probability that S is blocked given that S is in one of the states of ξ. p is ξ : the set of states of S where none of the the probability that at least a station S of n stations of category C contends for the the other (n channel (blue states in figure ). ) stations of C transmits ξ = {(~ C,i,i j, D ),i = 0..W, given that S is in one of the states of ξ. j = 0.. min(max(0,i ), D )} p = ( τ ) n (3) γ : the set of states of S where stations of category C can contend for the channel (pink states in figure ). γ = {(C,i,i D, D ),i = D..W } where τ is the probability that a station S of C ξ : the set of states of S where stations of = transmits given that the states of ξ : τ = Pr[S transmits ξ ] (~C π,0,0, D ) S is in one of (4) W min(max(0,i ),D ) (~C,i,i j, D ) category C do not contend for the channel π (blue states in figure ). i =0 j =0 Volume 3 Number 4 Page 3
8 π (R,i,i j, D ) is defined as the probability of p the state (R,i,i j, D ), in the stationary : the probability that S is blocked conditions and Π = {π (R,i,i j, D ) } given that S is the is in one of the states of γ. S 4.4 Transition probability matrices 4.4. Transition probability matrix of a where τ is the probability that a station category C station S of C transmits given that S Let P is in one be the transition probability matrix of the station S of the states of γ. of category C. P {i, j} is the probability to transit from state i to state j. We τ = Pr[S transmits γ ] have: (C π,d,0, D ) = (6) W π (C,i,i D, D ) π i = D probability vector of a category C station. S p = ( τ ) n ( τ ) n (9) The blocking probabilities described above p : the probability that S is blocked allow deducing the transition state probabilities and given that S is in one of the states of γ. having the transition probability matrix P i, for a p is the probability that at least a station station of traffic category C i. S of the other (n ) stations of C transmits given that S is in one of the states of γ or at least a station S of the n stations of C transmits given that one of the states of γ. p = ( τ ) n ( τ ) n (5) Therefore, we can evaluate the state probabilities by solving the following system []: Π P = Π is in π i = and τ the probability that a station S of i =.. min(w, D ) C transmits given that i i i j (0) j P {(~ C,i,i j, D ), (~ C,i,i ( j + ), D )} = p,i =..W, j = 0.. min(i, D ) () P {(~ C,i,, D ), (~ C,0,0, D )} = p, is in one of the () states of γ. P {(~ C,i,i D +, D ), (C,i,i D, D )} = p,i = D..W τ = Pr [S transmits γ ] (3) = W π (0,0,0,D ) P {(~ C, i, i j, D ),(~ C, i j, i j, D )} (4) = p, i =..W, j =.. min(i, D ) W (7) π (i,i,0,d ) + π (i,i,0,d ) i =0 (i,k,d j,d ) i = P {(~ C, i, i, D ), (~ C, i, i, D )} = p, is defined as the probability i =..W of the state (i, k, D j, D ), in the P {(C,i,i D, D ),(~ C,i D,i D, D )} stationary condition. Π = {π (i,k,d j,d ) } = p,i = (D + )..W is the probability vector of a category C station. P {(C,i,i D, D ),(C,(i ),(i D ), D )} In the same way, we evaluate p and p the = p,i = (D + )..W blocking probabilities of station S shown in figure : p : the probability that S is blocked given that S is in one of the states of ξ. i = 0..W p = ( τ ) n (8) P {(~ C,0,0, D ), (~ C, i,i, D )} =, If (D < W ) then: Volume 3 Number 4 Page 4 (5) (6) (7) W (8)
9 P {(C, D,0, D ),(~ C, i, i, D )} = τ, = f (τ,τ,τ ) W (9) τ,τ,τ ) i = 0..W τ = f (τ,τ,τ ) By replacing p and p by their values in under the constraint equations (3) and (5) and by replacing P and Π τ > 0,τ > 0,τ > 0,τ <,τ <,τ < in (0) and solving the resulting system, we can (8) express π (R,i,i j, D ) as a function of τ, τ and Solving the above system (8), allows deducing τ given respectively by equations (4), (6) and the expressions of τ, τ and τ, and deriving (7). the state probabilities of Markov chains modeling 4.4. Transition probability matrix of a category C and category C stations. category C station Let P be the transition probability matrix of 5 THROUGHPUT ANALYSIS the station S belonging to the traffic category C. The transition probabilities of S are: In this section, we propose to evaluate B i, the normalized throughput achieved by a station of (0) traffic category C i []. Hence, we define: P {(i, i, D j, D ), (i, i, D ( j + ), D )} = p, i = 0..W, j = 0..(D ) P i,s : the probability that a station S i P {(i,i, D j, D ), (i, i, D, D )} = p, belonging to traffic category C i transmits a () i = 0..W, j = 0..(D ) packet successfully. Let S and S be two P {(i, i,0, D ), (i, i,0, D )} = p, i =..W W The channel is idle if the n stations of category C don t transmit given that these stations By replacing p and p by their values in are in one of the states of ξ or if the n stations equations (8) and (9) and by replacing P and Π (both category C and category C stations) don t in (0) and solving the resulting system, we can transmit given that stations of category C are in (i,k,d express π j,d ) as a function of τ, τ one of the states of γ. Thus: and τ given respectively by equations (4), (6) () P {(,,0, D ), (0,0,0, D )} = p (3) P {(i,i,0, D ), (i, i, D, D )} = p, i =..W (4) P {(i,i,0, D ), (i,i, D, D )} = p, i =..W (5) P {(i, i,0, D ), (i, i,0, D )} = p, i = 3..W (6) P {(0,0,0, D ), (i, i, D, D )} =, i = 0..W (7) stations belonging respectively to traffic categories C and C. We have: P,s = Pr[S transmits successfully ξ ] Pr[ξ ] + Pr[S transmits successfully γ ] Pr[γ ] = τ ( p ) Pr[ξ ]+ τ ( p ) Pr[γ ] P,s = Pr[S transmits successfully ξ ] Pr[ξ ] + Pr[S transmits successfully γ ] Pr[γ ] = τ ( p ) Pr[γ ] (9) (30) P idle : the probability that the channel is idle. and (7). Moreover, by replacing π (R,i,i j, D ) and Pidle = ( τ ) n Pr[ξ ]+ ( τ ) n ( τ ) n Pr[γ ] π (i,k,d j,d ) by their values, in equations (4), (6) and (7), we obtain a system of non linear equations as follows: (3) Hence, the expression of the throughput of a category C i station is given by: Volume 3 Number 4 Page 5
10 B i = different stations present in the network as a P Idle T e + P s T s + P Idle n i P i,s T function of the contention window size W, c i = (D = ). We notice that the throughput achieved (3) by category C stations (stations numbered from S to S 4 ) is greater than the one achieved by Where T e denotes the duration of an empty category C stations (stations numbered from S slot, T s and T c denote respectively the duration of to S a successful transmission and a collision. 4 ). PIdle n i P i,s corresponds to the i = probability of collision. Finally T p denotes the average time required to transmit the packet data payload. We have: T s = (T PHY + T MAC + T p + T D )+ SIFS + (T PHY + T ACK + T D )+ DIFS T c = (T PHY + T MAC + T p + T D )+ EIFS (33) (34) Where T PHY, T MAC and T ACK are the durations of the PHY header, the MAC header and the ACK packet [], [3]. T D is the time required to transmit the two bytes deadline information. Stations hearing a collision wait during EIFS before resuming their packets. For numerical results stations transmit 5 bytes data packets using 80..b MAC and PHY layers parameters (given in table ) with a data rate equal to Mbps. For simulation scenarios, the propagation model is a two ray ground model. The transmission range of each node is 50m. The distance between two neighbors is 5m. The EIFS parameter is set to ACKTimeout as in ns-, where: Figure 3: Normalized throughput as a function of the contention window size (D =, n = 8 ) Analytically, stations belonging to the same traffic category have the same throughput given by equation (3). Simulation results validate analytical results and show that stations belonging to the same traffic category (either category C or category C ) have nearly the same throughput. Thus, we conclude the fairness of DM between stations of the same category. For subsequent throughput scenarios, we focus on one representative station of each traffic ACKTimeout = DIFS + (T PHY + T ACK + T D ) + SIFS (35) category. Figure 4, compares category C and category C stations throughputs to the one Table : 80. b parameters. obtained with 80.. Data Rate Mb/s Slot 0 µs SIFS 0 µs DIFS 50 µs PHY Header 9 µs MAC Header 7 µs ACK µs Short Retry Limit 7 For all the scenarios, we consider that we are in n presence of n contending stations with stations for each traffic category. In figure 3, n is fixed to Curves are represented as a function of W and for different values of D. Indeed as D increases, the category C station throughput increases, whereas the category C station throughput decreases. Moreover as W increases, the difference between stations throughputs is reduced. This is due to the fact that the shifting backoff becomes negligible compared to the contention window size. Finally, we notice that the category C station obtains better throughput with DM than with Volume 3 Number 4 Page 6
11 category C station. service time distribution. The service time depends on the duration of an idle slot T e, the duration of a successful transmission T s and the duration of a collision T c [], [3],[4]. As T e is the smallest duration event, the duration of all events will be T given by event. T e 6. Z-Transform of the MAC layer service time Figure 4: Normalized throughput as a function of the contention window size (different D values) In figure 5, we generalize the results for different numbers of contending stations and fix the contention window size W to Service time Z-transform of a category C station: Let TS (Z ) be the service time Z-transform of a station define: S belonging to traffic category C. We H (R,i,i j, D ) (Z ) : The Z-transform of the time already elapsed from the instant S selects a basic backoff in [0,W ] (i.e. being in one of the states (~ C,i,i, D ) ) to the time it is found in the state (R,i,i j, D ). Moreover, we define: P suc : the probability that S observes a successful transmission on the channel, while S is in one of the states of ξ. P = (n )τ ( τ ) n (36) suc P suc : the probability that S observes a successful transmission on the channel, while S is in one of the states of γ. Figure 5: Normalized throughput as a function of P = (n )τ ( τ ) n ( τ ) n the number of contending stations suc (37) + n τ ( τ ) n ( τ ) n All the curves show that DM performs service differentiation over 80. and offers better We evaluate H (R,i,i j, D ) (Z ) for each state throughput for category C stations independently of S Markov chain as follows: of the number of contending stations. 6 SERVICE TIME ANALYSIS In this section, we evaluate the average MAC layer service time of category C and category C T s T H ( ~ C,i,i, D )(Z ) = + suc W P Z e + T c min ( i + D,W ) ( ) T ( ) stations using the DM policy. The service time is p P suc Z e H (~C,k,i, D ) Z the time interval from the time instant that a packet becomes at the head of the queue and starts to contend for transmission to the time instant that either the packet is acknowledged for a successful transmission or dropped [3]. k =i + T s T T + Ĥ (C,i + D,i, D ) (Z ) P suc Z e + (p P suc )Z e We propose to evaluate the Z- T c Transform of the MAC layer service time [3], [4], [5] to derive Volume 3 Number 4 Page 7
12 an Where: (38) Volume 3 Number 4 Page 8
13 Ĥ (C,i + D,i, D ) (Z ) = H (C,i + D,i, D ) (Z ) T s (i + D ) W (39) if D T s T j = D TS (Z ) = Z Moreover, we define: ( p )ZH (~ C,,, D ) (Z ) H (~ C,0,0, D )(Z ) = T s T c P suc : the probability that S observes a P Z T e (p P )Z T e successful transmission on the channel, suc suc min(w,d ) while S is in one of the states of ξ. + ( p )Z H ( ~ C,i,, D ) (Z ) + P = n τ ( τ ) n W (45) i = suc (43) P suc : the probability that S observes a If S transmission state is (~ C,0,0, D ), successful transmission on the channel, the transmission will be successful only if none of while S is in one of the states of γ. the (n ) remaining stations of C transmits. P = n τ ( τ ) n ( τ ) n suc Whereas when the station S transmission state is (46) + (n )τ ( τ ) n ( τ ) n (C, D,0, D ), the transmission occurs T e (( p )H ( ) (Z ) ~ C,0,0, D Ĥ m (C,i + D,i, D )(Z ) = 0 Otherwise ( ) ( )) T c T e + p H (C,D,0, D ) Z Z p H (~C,0,0, D ) Z i =0 We also have: i + p H ( C,D,0, D ) (Z ))) H (~ C,i,i j, D ) (Z ) T s (( p )Z ) H (~ C,i,i, D ) (Z ) P Z T e (p suc i =..W, j =..min(i,d ) T c P )Z T e suc (40) T c + Z e (p H (Z ~ C,0,0, D ) + p H C,D ) ( T ( ( ( ),0, D ) (( p )Z ) H (~ C,i,i, D ) (Z ) 6.. Service time Z-transform of a category H (C,i,i D, D ) (Z ) = T s T c C station: P Z T e (p P )Z T e In the same way, let TS (Z ) be the service time Z-transform of a station S of category C. suc suc + ( p )ZH (C,i +,i + D, D )(Z ),i = D..W (4) m + (Z )) (44) We define: H (i,k,d j,d )(Z ): The Z-transform of the H (C,W,W D, D ) (Z ) time already elapsed from the instant S selects a basic backoff in [0,W ] (i.e. being in one of the = (( p )Z ) H (~C,W,W, D ) (Z ) (4) T c ( ) T state (i, k, D j, D ). P suc Z e p P suc Z e states (i,i, D, D ) ) to the time it is found in the successfully only if none of (n ) remaining We evaluate H (i,i,d j,d ) (Z ) for each state stations (either a category C station) transmits. or a category C If the transmission fails, S tries another of S Markov chain as follows: H (i,i,d,d ) (Z ) =,i = 0 and i = W W transmission. After m retransmissions, if the T s packet is not acknowledged, it will be dropped. H (i,i,d,d ) (Z ) = + P suc Z T e + Thus, the Z-transform of station S service time is: W T c (47) Volume 3 Number 4 Page 9
14 T (p P )Z e H (i,i,0,d ) (Z ),i =..W suc + (48) Volume 3 Number 4 Page 0
15 To compute H (i,i,d j,d ) (Z ), we define T j (Z ), such as: dec 0 Tdec (Z ) = (49) j Tdec (Z ) = for j =..D ( p )ZH (W,W,0,D )(Z ) category. = T s T c (53) P Z T e + (p P )Z T e T D suc suc dec (Z ) T c T TS (Z ) = p Z e H (0,0,0,D i i =0 i m + )(Z ) + i T s T c m T T ( p )Z T s (55) P Z T e + (p P )Z T e T j suc suc (Z ) dec T c ( p )Z e H (0,0,0,D ) (Z ) p Z e H (0,0,0,D (50) 6. Average Service Time From equations (44) (respectively equation (55)), we derive the average service time of a category C So: station ( respectively a category C station). The average service time of a category C i H ( ) (Z ) = H ( ) (Z )T j station is given by: i,i,d j,d i,i,d j +,D dec (Z ), X i = TS () () (56) i = 0..W, j =..D, (i, j ) (0, D ) And: (5) Where TS () (Z ), is the derivate of the service H (i,i,0,d ) (Z ) = ( p )ZH (i +,i,0,d ) (Z ) time Z-transform of a category C i station []. + ( p )ZH (i,i,0,d ) (Z ) By considering the same configuration as in T s T c figure 3, we depict in figure 5, the average service P Z T e + (p P )Z T e T D (Z ) time of category C and category C stations as a suc suc dec function of W. As for the throughput analysis, stations belonging to the same traffic category have i =..W H (W,W,0,D )(Z ) (5) nearly the same average service value. Simulation service time values coincide with analytical values given by equation (56). These results confirm the fairness of DM in serving stations of the same ) (Z ) According to figure and using equation (5), we have: H ( ) (Z ) = H ( ) (Z )T D (Z ) + 0,0,0,D 0,,0,D dec ( p )ZH (,,0,D )(Z ) T s T c (54) P Z T e + (p P )Z T e T D suc suc dec (Z ) Therefore, we can derive an expression of S Z-transform service time as follows: Figure 6: Average service time as a function of the contention window size (D =, n = 8) In figure 7, we show that category C stations obtain better average service time than the one obtained with 80. protocol. Whereas, the opposite scenario happens for category C stations Volume 3 Number 4 Page
16 independently of n, the number of contending stations in the network. exceeds 0.0s equals 0.%. Whereas, station S service time exceeds 0.0s with the probability 57,6%. Thus, DM offers better service time guarantees for the stations with the highest priority. In figure 9, we double the size of the contention window size and set it to 64. We notice that category C and category C stations service time curves become closer. Indeed, when W becomes large, the BAB values increase and the DMSB becomes negligible compared to the basic backoff. The whole backoff values of S and S become closer and their service time accordingly. Figure 7: Average service time as a function of the number of contending stations 6.3 Service Time Distribution Service time distribution is obtained by inverting the service time Z transforms given by equations (44) and (55). But we are most interested in probabilistic service time bounds derived by inverting the complementary service time Z transform given by []: Figure 9: Complementary service time distribution TS (Z ) X (Z ) = (56) ~ i for different values of D ( W = 64 ) i Z In figure 0, we depict the complementary In figure 8, we depict analytical and simulation service time distribution for both category C and values of the complementary service time category C stations and for different values of n, distribution of a category C and a category C the number of contending nodes. stations for different values of D and (W = 3). Figure 8: Complementary service time distribution for different values of D, (W = 3) Figure 0: Complementary service time distribution for different values of the contending stations All the curves drop gradually to 0 as the delay Analytical and simulation results show that increases. Category C stations curves drop to 0 complementary service time curves drop faster when the number of contending stations is small for faster than category C curves. Indeed, when both category C and category C stations. This D = 4 slots, the probability that S service time means that all stations service time increases as the Volume 3 Number 4 Page
17 number of contending nodes increases. 7 EXTENTIONS OF THE ANAYTICAL RESULTS BY SIMULATION The mathematical analysis undertaken above showed that DM performs service differentiation over 80. protocol and offers better QoS guarantees for highest priority stations Nevertheless, the analysis was restricted to two traffic categories. In this section, we first generalize the results by simulation for different traffic categories. Then, we consider a simple multi-hop and evaluate the performance of the DM policy when the stations belong to different broadcast regions. 7. Extension of the analytical results In this section, we consider n stations contending for the channel in the same broadcast region. The n stations belong to 5 traffic categories where n = 5m and m is the number of stations of the same traffic category. A traffic category C i is characterized by a delay bound D i, and D ij = D i D j is the difference between the by different traffic categories stations as a function of the minimum contention window size CW min such as CW min is always smaller than CW max, CW max < 04 and K =. Analytical and simulation results show that throughput values increase with stations priorities. Indeed, the station with the lowest delay bound has the maximum throughput. Moreover, figure shows that stations belonging to the same traffic category have the same throughput. For instance, when n is set to 5 (i.e. m = 3 ), the three stations each traffic category have almost the same throughput. deadline values of category C i stations. We have: and category C j D ij = (i j )K (57) Figure : Normalized throughput: different Where K is the deadline multiplicity factor stations belonging to the same traffic category and is given by: D i +,i = D i + D i = K (58) In figure 3, we depict the average service time of the different traffic categories stations as a Indeed, when K varies, the D ij the difference function of K, the deadline multiplicity factor. We notice that the highest priority station average between deadline values of category C i and service time decreases as the deadline multiplicity category C j stations also varies. Stations factor increases. Whereas, the lowest priority station average service time increases with K. belonging to the traffic category C i are numbered from S i to S im. Figure : Normalized throughput for different traffic category stations In figure, we depict the throughput achieved Figure 3: Average service time as a function of the deadline multiplicity factor K In the same way, the probabilistic service time bounds offered to S (the highest priority station) Volume 3 Number 4 Page 3
18 are better than those offered to station S 5 (the Flows packets are routed using the Ad-hoc On lowest priority station). Indeed, the probability that Demand (AODV) protocol. Flows F and F are S service time exceeds 0.0s=0.3%. But, station respectively transmitted by stations S and S S 5 service time exceeds 0.0s with the probability with delay bounds D and D and of 36%. D = D D =5 slots. Flows F 3 and F 4 are transmitted respectively by S 3 and S 4 and have the same delay bound. Finally, F 5 and F 6 are transmitted respectively by S 5 and S 6 with delay bounds D 5 and D 6 and D 65 = D 6 D 5 = 4 slots. Figure 6 shows that the throughput achieved by F is smaller than the one achieved by F. Indeed, both flows cross nodes 6 and 7, where F got a higher priority to access the medium than F when the DM policy is used. We obtain the same Figure 4: Complementary service time distribution (CW min = 3, n = 8) results for flows F 5 and F 6. Flows F 3 and F 4 have almost the same throughput since they have equal deadlines. The above results generalize the analytical model results and show once again that DM performs service differentiation over 80. and offer better guarantees in terms of throughput, average service time and probabilistic service time bounds for flows with short deadlines. 7. Simple Multi hop scenario In the above study, we considered that contending stations belong to the same broadcast region. In reality, stations may not be within one hop from each other. Thus a packet can go through several hops before reaching its destination. Hence, factors like routing protocols or interferences may preclude the DM policy from working correctly. In the following paragraph, we evaluate the performance of the DM policy in a multi-hop environment. Hence, we consider a 3 node simple mtlti-hop scenario described in figure 5. Six flows are transmitted over the network. Figure 6: Normalized throughput using DM policy Figure 7 show that the complementary service time distribution curves drop to 0 faster for flow F than for flow F. Figure 5: Simple multi hop scenario Figure 7: End to end complementary service time distribution Volume 3 Number 4 Page 4
19 The same behavior is obtained for flow F 5 and (PHY) specification, IEEE (999). F 6, where F 5 has the shortest delay bound. IEEE 80. WG: Draft Supplement to Part : Wireless Medium Access Control (MAC) and physical layer (PHY) specifications: Medium Hence, we conclude that even in a multi-hop environment, the DM policy performs service differentiation over 80. and provides better QoS guarantees for flows with short deadlines. 8 CONCLUSION In this paper we proposed to support the DM policy over 80. protocol. Therefore, we used a distributed backoff scheduling algorithm and introduced a new medium access backoff policy. Then we proposed a Markov Chain based mathematical model to evaluate the performance of the DM policy in terms of throughput, average medium access delay and medium access delay distribution. Analytical and simulation results showed that DM performs service differentiation over 80. and offers better guarantees in terms of throughput, average service time and probabilistic service time bounds for flows with small deadlines. Moreover, DM achieves fairness between stations belonging to the same traffic category. Then, we extended by simulation the analytical results obtained for two traffic categories to different traffic categories. Simulation results showed that even if contending stations belong to K traffic categories, K >, the DM policy offers better QoS guarantees for highest priority stations. Finally, we considered a simple multi-hop scenario and concluded that factors like routing messages or interferences don t impact the behavior of the DM policy and DM still provides better QoS guarantees for stations with short deadlines. 9 REFERENCES G. Bianchi: Performance Analysis of the IEEE 80. Distributed Coordination Function, IEEE J-SAC Vol. 8 N. 3, (March 000). H. Wu, Y. Peng, K. Long, S. Cheng, J. Ma: Performance of Reliable Transport Protocol over IEEE 80. Wireless LAN: Analysis and Enhancement, In Proceedings of the IEEE INFOCOM 0, June 00. H. Zhai, Y. Kwon, Y., Fang: Performance Analysis of IEEE 80. MAC protocol in wireless LANs, Wireless Computer and Mobile Computing, (004). I. Aad and C. Castelluccia: Differentiation mechanisms for IEEE 80., In Proc. of IEEE Infocom 00, (April 00). IEEE 80. WG: Part : Wireless LAN Medium Access Control (MAC) and Physical Layer Access Control (MAC) Enhancements for Quality of Service (QoS), IEEE 80.e/D3.0, (January 005). J. Deng, R. S. Chang: A priority Scheme for IEEE 80. DCF Access Method, IEICE Transactions in Communications, vol. 8-B, no., (January 999). J.L. Sobrinho, A.S. Krishnakumar: Real-time traffic over the IEEE 80. medium access control layer, Bell Labs Technical Journal, pp. 7-87, (996). J. Y. T. Leung, J. Whitehead: On the Complexity of Fixed-Priority Scheduling of Periodic, Real- Time Tasks, Performance Evaluation (Netherlands), pp , (98). K. Duffy, D. Malone, D. J. Leith: Modeling the 80. Distributed Coordination Function in Non-saturated Conditions, IEEE/ACM Transactions on Networking (TON), Vol. 5, pp (February 007) L. Kleinrock: Queuing Systems,Vol. : Theory, Wiley Interscience, 976. P. Chatzimisios, V. Vitsas, A. C. Boucouvalas: Throughput and delay analysis of IEEE 80. protocol, in Proceedings of 00 IEEE 5th International Workshop on Networked Appliances, (00). P.E. Engelstad, O.N. Osterbo: Delay and Throughput Analysis of IEEE 80.e EDCA with Starvation Prediction, In proceedings of the The IEEE Conference on Local Computer Networks, LCN 05 (005). P.E. Engelstad, O.N. Osterbo: Queueing Delay Analysis of 80.e EDCA, Proceedings of The Third Annual Conference on Wireless On demand Network Systems and Services (WONS 006), France, (January 006). P.E. Engelstad, O.N. Osterbo: The Delay Distribution of IEEE 80.e EDCA and 80. DCF, in the proceeding of 5th IEEE International Performance Computing and Communications Conference (IPCCC 06), (April 006), USA. The network simulator ns-, Y. Xiao: Performance analysis of IEEE 80.e EDCF under saturation conditions, Proceedings of International Conference on Communication (ICC 04), Paris, France, (June 004). V. Kanodia, C. Li: Distribted Priority Scheduling and Medium Access in Ad-hoc Networks, ACM Wireless Networks, Volume 8, (November 00). Volume 3 Number 4 Page 5
Performance Analysis of the IEEE e Block ACK Scheme in a Noisy Channel
Performance Analysis of the IEEE 802.11e Block ACK Scheme in a Noisy Channel Tianji Li, Qiang Ni, Hamilton Institute, NUIM, Ireland. Thierry Turletti, Planete Group, INRIA, France. Yang Xiao, University
More informationGiuseppe Bianchi, Ilenia Tinnirello
Capacity of WLAN Networs Summary Ł Ł Ł Ł Arbitrary networ capacity [Gupta & Kumar The Capacity of Wireless Networs ] Ł! Ł "! Receiver Model Ł Ł # Ł $%&% Ł $% '( * &%* r (1+ r Ł + 1 / n 1 / n log n Area
More informationWiFi MAC Models David Malone
WiFi MAC Models David Malone November 26, MACSI Hamilton Institute, NUIM, Ireland Talk outline Introducing the 82.11 CSMA/CA MAC. Finite load 82.11 model and its predictions. Issues with standard 82.11,
More informationPerformance analysis of IEEE WLANs with saturated and unsaturated sources
Performance analysis of IEEE 82.11 WLANs with saturated and unsaturated sources Suong H. Nguyen, Hai L. Vu, Lachlan L. H. Andrew Centre for Advanced Internet Architectures, Technical Report 11811A Swinburne
More informationMathematical Analysis of IEEE Energy Efficiency
Information Engineering Department University of Padova Mathematical Analysis of IEEE 802.11 Energy Efficiency A. Zanella and F. De Pellegrini IEEE WPMC 2004 Padova, Sept. 12 15, 2004 A. Zanella and F.
More informationGiuseppe Bianchi, Ilenia Tinnirello
Capacity of WLAN Networs Summary Per-node throughput in case of: Full connected networs each node sees all the others Generic networ topology not all nodes are visible Performance Analysis of single-hop
More informationWireless Internet Exercises
Wireless Internet Exercises Prof. Alessandro Redondi 2018-05-28 1 WLAN 1.1 Exercise 1 A Wi-Fi network has the following features: Physical layer transmission rate: 54 Mbps MAC layer header: 28 bytes MAC
More informationPerformance analysis of IEEE WLANs with saturated and unsaturated sources
1 Performance analysis of IEEE 8.11 WLANs with saturated and unsaturated sources Suong H. Nguyen, Student Member, IEEE, Hai L. Vu, Senior Member, IEEE, and Lachlan L. H. Andrew, Senior Member, IEEE Abstract
More informationModeling Approximations for an IEEE WLAN under Poisson MAC-Level Arrivals
Modeling Approximations for an IEEE 802.11 WLAN under Poisson MAC-Level Arrivals Ioannis Koukoutsidis 1 and Vasilios A. Siris 1,2 1 FORTH-ICS, P.O. Box 1385, 71110 Heraklion, Crete, Greece 2 Computer Science
More informationService differentiation without prioritization in IEEE WLANs
Service differentiation without prioritization in IEEE 8. WLANs Suong H. Nguyen, Student Member, IEEE, Hai L. Vu, Senior Member, IEEE, and Lachlan L. H. Andrew, Senior Member, IEEE Abstract Wireless LANs
More informationExact Distribution of Access Delay in IEEE DCF MAC
Exact Distribution of Access Delay in IEEE 8.11 DCF MAC Teerawat Issariyakul, Dusit Niyato, Ekram Hossain, and Attahiru Sule Alfa University of Manitoba and TRLabs Winnipeg, MB, Canada. Email: teerawat,
More informationDetecting Stations Cheating on Backoff Rules in Networks Using Sequential Analysis
Detecting Stations Cheating on Backoff Rules in 82.11 Networks Using Sequential Analysis Yanxia Rong Department of Computer Science George Washington University Washington DC Email: yxrong@gwu.edu Sang-Kyu
More informationA Comprehensive Study of the IEEE e Enhanced Distributed Control Access (EDCA) Function. Chunyu Hu and Jennifer C. Hou.
Report No. UIUCDCS-R-26-27 UILU-ENG-26-743 A Comprehensive Study of the IEEE 82.e Enhanced Distributed Control Access EDCA) Function by Chunyu Hu and Jennifer C. Hou April 26 A Comprehensive Study of the
More informationA POMDP Framework for Cognitive MAC Based on Primary Feedback Exploitation
A POMDP Framework for Cognitive MAC Based on Primary Feedback Exploitation Karim G. Seddik and Amr A. El-Sherif 2 Electronics and Communications Engineering Department, American University in Cairo, New
More informationrequests/sec. The total channel load is requests/sec. Using slot as the time unit, the total channel load is 50 ( ) = 1
Prof. X. Shen E&CE 70 : Examples #2 Problem Consider the following Aloha systems. (a) A group of N users share a 56 kbps pure Aloha channel. Each user generates at a Passion rate of one 000-bit packet
More informationInformation in Aloha Networks
Achieving Proportional Fairness using Local Information in Aloha Networks Koushik Kar, Saswati Sarkar, Leandros Tassiulas Abstract We address the problem of attaining proportionally fair rates using Aloha
More informationOn the Validity of IEEE MAC Modeling Hypotheses
On the Validity of IEEE 82.11 MAC Modeling Hypotheses K. D. Huang, K. R. Duffy and D. Malone Hamilton Institute, National University of Ireland, Maynooth, Ireland. Corresponding author: ken.duffy@nuim.ie
More informationOptimization of IEEE Multirate Wireless LAN
JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 26 77-785 (200) Optimization of IEEE 802 Multirate Wireless LAN A V BABU LILLYKUTTY JACOB AND S ABDUL SUBHAN Department of Electronics and Communication Engineering
More informationRandom Access Protocols ALOHA
Random Access Protocols ALOHA 1 ALOHA Invented by N. Abramson in 1970-Pure ALOHA Uncontrolled users (no coordination among users) Same packet (frame) size Instant feedback Large (~ infinite) population
More informationP e = 0.1. P e = 0.01
23 10 0 10-2 P e = 0.1 Deadline Failure Probability 10-4 10-6 10-8 P e = 0.01 10-10 P e = 0.001 10-12 10 11 12 13 14 15 16 Number of Slots in a Frame Fig. 10. The deadline failure probability as a function
More informationModeling the Effect of Transmission Errors on TCP Controlled Transfers over Infrastructure Wireless LANs
Modeling the Effect of Transmission Errors on TCP Controlled Transfers over Infrastructure 8 Wireless LANs ABSTRACT Subhashini Krishnasamy Dept of Electrical Communication Engg Indian Institute of Science,
More informationOn the MAC for Power-Line Communications: Modeling Assumptions and Performance Tradeoffs
On the MAC for Power-Line Communications: Modeling Assumptions and Performance Tradeoffs Technical Report Christina Vlachou, Albert Banchs, Julien Herzen, Patrick Thiran EPFL, Switzerland, Institute IMDEA
More informationBit Error Period Determination and Optimal Frame Length Prediction for a Noisy Communication Channel
Bit Error Period Determination and Optimal Frame Length Prediction for a oisy Communication Channel Georgi Atanasov aydenov and Petko Stoyanov Stoyanov Faculty of Science and Technology, Technical University
More informationTCP over Cognitive Radio Channels
1/43 TCP over Cognitive Radio Channels Sudheer Poojary Department of ECE, Indian Institute of Science, Bangalore IEEE-IISc I-YES seminar 19 May 2016 2/43 Acknowledgments The work presented here was done
More informationModeling and Simulation NETW 707
Modeling and Simulation NETW 707 Lecture 6 ARQ Modeling: Modeling Error/Flow Control Course Instructor: Dr.-Ing. Maggie Mashaly maggie.ezzat@guc.edu.eg C3.220 1 Data Link Layer Data Link Layer provides
More informationIntegrity-Oriented Content Transmission in Highway Vehicular Ad Hoc Networks
VANET Analysis Integrity-Oriented Content Transmission in Highway Vehicular Ad Hoc Networks Tom Hao Luan, Xuemin (Sherman) Shen, and Fan Bai BBCR, ECE, University of Waterloo, Waterloo, Ontario, N2L 3G1,
More informationANALYSIS OF THE RTS/CTS MULTIPLE ACCESS SCHEME WITH CAPTURE EFFECT
ANALYSIS OF THE RTS/CTS MULTIPLE ACCESS SCHEME WITH CAPTURE EFFECT Chin Keong Ho Eindhoven University of Technology Eindhoven, The Netherlands Jean-Paul M. G. Linnartz Philips Research Laboratories Eindhoven,
More informationLan Performance LAB Ethernet : CSMA/CD TOKEN RING: TOKEN
Lan Performance LAB Ethernet : CSMA/CD TOKEN RING: TOKEN Ethernet Frame Format 7 b y te s 1 b y te 2 o r 6 b y te s 2 o r 6 b y te s 2 b y te s 4-1 5 0 0 b y te s 4 b y te s P r e a m b le S ta r t F r
More informationPower Controlled FCFS Splitting Algorithm for Wireless Networks
Power Controlled FCFS Splitting Algorithm for Wireless Networks Ashutosh Deepak Gore Abhay Karandikar Department of Electrical Engineering Indian Institute of Technology - Bombay COMNET Workshop, July
More informationOptimal Physical Carrier Sense for Maximizing Network Capacity in Multi-hop Wireless Networks
Optimal Physical Carrier Sense for Maximizing Network Capacity in Multi-hop Wireless Networks Kyung-Joon Park, Jihyuk Choi, and Jennifer C. Hou Department of Computer Science University of Illinois at
More informationMethodology for Computer Science Research Lecture 4: Mathematical Modeling
Methodology for Computer Science Research Andrey Lukyanenko Department of Computer Science and Engineering Aalto University, School of Science and Technology andrey.lukyanenko@tkk.fi Definitions and Goals
More information1. WiMAX Wi-Fi Wi-Fi (AP) Wi-Fi 1 1 AP AP WLAN [1] [1] [1] WLAN [4] WLAN WLAN WLAN 1 WLAN WLAN WLAN N =3 [1] W
[] LAN 263 8522 1-33 514-857 1577 NEC 211-8666 1753 464-861 E-mail: {aoki@, kmr@faculty., shioda@faculty., sekiya@faculty.}chiba-u.jp, k.sanada@elec.mie-u.ac.jp 一般社団法人 電子情報通信学会 信学技報 THE INSTITUTE OF ELECTRONICS,
More informationOn queueing in coded networks queue size follows degrees of freedom
On queueing in coded networks queue size follows degrees of freedom Jay Kumar Sundararajan, Devavrat Shah, Muriel Médard Laboratory for Information and Decision Systems, Massachusetts Institute of Technology,
More informationNICTA Short Course. Network Analysis. Vijay Sivaraman. Day 1 Queueing Systems and Markov Chains. Network Analysis, 2008s2 1-1
NICTA Short Course Network Analysis Vijay Sivaraman Day 1 Queueing Systems and Markov Chains Network Analysis, 2008s2 1-1 Outline Why a short course on mathematical analysis? Limited current course offering
More informationOn Selfish Behavior in CSMA/CA Networks
On Selfish Behavior in CSMA/CA Networks Mario Čagalj1 Saurabh Ganeriwal 2 Imad Aad 1 Jean-Pierre Hubaux 1 1 LCA-IC-EPFL 2 NESL-EE-UCLA March 17, 2005 - IEEE Infocom 2005 - Introduction CSMA/CA is the most
More informationMean Field Markov Models of Wireless Local Area Networks
Mean Field Markov Models of Wireless Local Area Networks Ken R. Duffy 26 th September 2010; revised 8 th April 2010. To appear in Markov Processes and Related Fields Abstract In 1998, Giuseppe Bianchi
More informationApproximate Queueing Model for Multi-rate Multi-user MIMO systems.
An Approximate Queueing Model for Multi-rate Multi-user MIMO systems Boris Bellalta,Vanesa Daza, Miquel Oliver Abstract A queueing model for Multi-rate Multi-user MIMO systems is presented. The model is
More informationLecture 6. Real-Time Systems. Dynamic Priority Scheduling
Real-Time Systems Lecture 6 Dynamic Priority Scheduling Online scheduling with dynamic priorities: Earliest Deadline First scheduling CPU utilization bound Optimality and comparison with RM: Schedulability
More informationChannel Allocation Using Pricing in Satellite Networks
Channel Allocation Using Pricing in Satellite Networks Jun Sun and Eytan Modiano Laboratory for Information and Decision Systems Massachusetts Institute of Technology {junsun, modiano}@mitedu Abstract
More informationMessage Delivery Probability of Two-Hop Relay with Erasure Coding in MANETs
01 7th International ICST Conference on Communications and Networking in China (CHINACOM) Message Delivery Probability of Two-Hop Relay with Erasure Coding in MANETs Jiajia Liu Tohoku University Sendai,
More informationTimestepped Stochastic Simulation. of WLANs
Timestepped Stochastic Simulation 1 of 82.11 WLANs Arunchandar Vasan and A. Udaya Shankar Department of Computer Science and UMIACS University of Maryland College Park, MD 2742 CS-TR-4866 and UMIACS-TR-27-19
More informationCPU SCHEDULING RONG ZHENG
CPU SCHEDULING RONG ZHENG OVERVIEW Why scheduling? Non-preemptive vs Preemptive policies FCFS, SJF, Round robin, multilevel queues with feedback, guaranteed scheduling 2 SHORT-TERM, MID-TERM, LONG- TERM
More informationGeneralized Two-Hop Relay for Flexible Delay Control in MANETs
Generalized Two-Hop Relay for Flexible Delay Control in MANETs 12 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media,
More informationQueue Length Stability in Trees under Slowly Convergent Traffic using Sequential Maximal Scheduling
1 Queue Length Stability in Trees under Slowly Convergent Traffic using Sequential Maximal Scheduling Saswati Sarkar and Koushik Kar Abstract In this paper, we consider queue-length stability in wireless
More informationHow do Wireless Chains Behave? The Impact of MAC Interactions
The Impact of MAC Interactions S. Razak 1 Vinay Kolar 2 N. Abu-Ghazaleh 1 K. Harras 1 1 Department of Computer Science Carnegie Mellon University, Qatar 2 Department of Wireless Networks RWTH Aachen University,
More informationRandom Access Game. Medium Access Control Design for Wireless Networks 1. Sandip Chakraborty. Department of Computer Science and Engineering,
Random Access Game Medium Access Control Design for Wireless Networks 1 Sandip Chakraborty Department of Computer Science and Engineering, INDIAN INSTITUTE OF TECHNOLOGY KHARAGPUR October 22, 2016 1 Chen
More informationChapter 5 A Modified Scheduling Algorithm for The FIP Fieldbus System
Chapter 5 A Modified Scheduling Algorithm for The FIP Fieldbus System As we stated before FIP is one of the fieldbus systems, these systems usually consist of many control loops that communicate and interact
More informationCross-layer Theoretical Analysis of NC-aided. Cooperative ARQ Protocols in Correlated Shadowed Environments (Extended Version)
Cross-layer Theoretical Analysis of NC-aided Cooperative ARQ Protocols in Correlated Shadowed Environments (Extended Version) Angelos Antonopoulos, Member, IEEE, Aris S. Lalos, Member, IEEE, arxiv:408.609v
More informationEDF Feasibility and Hardware Accelerators
EDF Feasibility and Hardware Accelerators Andrew Morton University of Waterloo, Waterloo, Canada, arrmorton@uwaterloo.ca Wayne M. Loucks University of Waterloo, Waterloo, Canada, wmloucks@pads.uwaterloo.ca
More informationTRANSMISSION STRATEGIES FOR SINGLE-DESTINATION WIRELESS NETWORKS
The 20 Military Communications Conference - Track - Waveforms and Signal Processing TRANSMISSION STRATEGIES FOR SINGLE-DESTINATION WIRELESS NETWORKS Gam D. Nguyen, Jeffrey E. Wieselthier 2, Sastry Kompella,
More informationChapter 5. Elementary Performance Analysis
Chapter 5 Elementary Performance Analysis 1 5.0 2 5.1 Ref: Mischa Schwartz Telecommunication Networks Addison-Wesley publishing company 1988 3 4 p t T m T P(k)= 5 6 5.2 : arrived rate : service rate 7
More informationOn the Stability and Optimal Decentralized Throughput of CSMA with Multipacket Reception Capability
On the Stability and Optimal Decentralized Throughput of CSMA with Multipacket Reception Capability Douglas S. Chan Toby Berger Lang Tong School of Electrical & Computer Engineering Cornell University,
More informationQueuing Networks: Burke s Theorem, Kleinrock s Approximation, and Jackson s Theorem. Wade Trappe
Queuing Networks: Burke s Theorem, Kleinrock s Approximation, and Jackson s Theorem Wade Trappe Lecture Overview Network of Queues Introduction Queues in Tandem roduct Form Solutions Burke s Theorem What
More informationPerformance Analysis of a System with Bursty Traffic and Adjustable Transmission Times
Performance Analysis of a System with Bursty Traffic and Adjustable Transmission Times Nikolaos Pappas Department of Science and Technology, Linköping University, Sweden E-mail: nikolaospappas@liuse arxiv:1809085v1
More informationReal-Time and Embedded Systems (M) Lecture 5
Priority-driven Scheduling of Periodic Tasks (1) Real-Time and Embedded Systems (M) Lecture 5 Lecture Outline Assumptions Fixed-priority algorithms Rate monotonic Deadline monotonic Dynamic-priority algorithms
More informationEE 550: Notes on Markov chains, Travel Times, and Opportunistic Routing
EE 550: Notes on Markov chains, Travel Times, and Opportunistic Routing Michael J. Neely University of Southern California http://www-bcf.usc.edu/ mjneely 1 Abstract This collection of notes provides a
More informationCooperative HARQ with Poisson Interference and Opportunistic Routing
Cooperative HARQ with Poisson Interference and Opportunistic Routing Amogh Rajanna & Mostafa Kaveh Department of Electrical and Computer Engineering University of Minnesota, Minneapolis, MN USA. Outline
More informationEnergy minimization based Resource Scheduling for Strict Delay Constrained Wireless Communications
Energy minimization based Resource Scheduling for Strict Delay Constrained Wireless Communications Ibrahim Fawaz 1,2, Philippe Ciblat 2, and Mireille Sarkiss 1 1 LIST, CEA, Communicating Systems Laboratory,
More informationTuning the TCP Timeout Mechanism in Wireless Networks to Maximize Throughput via Stochastic Stopping Time Methods
Tuning the TCP Timeout Mechanism in Wireless Networks to Maximize Throughput via Stochastic Stopping Time Methods George Papageorgiou and John S. Baras Abstract We present an optimization problem that
More informationDynamic Power Allocation and Routing for Time Varying Wireless Networks
Dynamic Power Allocation and Routing for Time Varying Wireless Networks X 14 (t) X 12 (t) 1 3 4 k a P ak () t P a tot X 21 (t) 2 N X 2N (t) X N4 (t) µ ab () rate µ ab µ ab (p, S 3 ) µ ab µ ac () µ ab (p,
More informationCollision-aware Design of Rate Adaptation for Multi-rate WLANs
Collision-aware Design of Rate Adaptation for Multi-rate 82. WLANs Jaehyuk Choi, Jongkeun Na, Yeon-sup Lim, Kihong Park, Member, IEEE, and Chong-kwon Kim, Member, IEEE Abstract One of the key challenges
More informationScheduling. Uwe R. Zimmer & Alistair Rendell The Australian National University
6 Scheduling Uwe R. Zimmer & Alistair Rendell The Australian National University References for this chapter [Bacon98] J. Bacon Concurrent Systems 1998 (2nd Edition) Addison Wesley Longman Ltd, ISBN 0-201-17767-6
More informationTDDB68 Concurrent programming and operating systems. Lecture: CPU Scheduling II
TDDB68 Concurrent programming and operating systems Lecture: CPU Scheduling II Mikael Asplund, Senior Lecturer Real-time Systems Laboratory Department of Computer and Information Science Copyright Notice:
More informationPerformance of Round Robin Policies for Dynamic Multichannel Access
Performance of Round Robin Policies for Dynamic Multichannel Access Changmian Wang, Bhaskar Krishnamachari, Qing Zhao and Geir E. Øien Norwegian University of Science and Technology, Norway, {changmia,
More informationSchedulability analysis of global Deadline-Monotonic scheduling
Schedulability analysis of global Deadline-Monotonic scheduling Sanjoy Baruah Abstract The multiprocessor Deadline-Monotonic (DM) scheduling of sporadic task systems is studied. A new sufficient schedulability
More informationPriority-driven Scheduling of Periodic Tasks (1) Advanced Operating Systems (M) Lecture 4
Priority-driven Scheduling of Periodic Tasks (1) Advanced Operating Systems (M) Lecture 4 Priority-driven Scheduling Assign priorities to jobs, based on their deadline or other timing constraint Make scheduling
More informationRadio Network Clustering from Scratch
Radio Network Clustering from Scratch Fabian Kuhn, Thomas Moscibroda, Roger Wattenhofer {kuhn,moscitho,wattenhofer}@inf.ethz.ch Department of Computer Science, ETH Zurich, 8092 Zurich, Switzerland Abstract.
More informationOptimal Association of Stations and APs in an IEEE WLAN
Optimal Association of Stations and APs in an IEEE 802. WLAN Anurag Kumar and Vinod Kumar Abstract We propose a maximum utility based formulation for the problem of optimal association of wireless stations
More informationcommunication networks
Positive matrices associated with synchronised communication networks Abraham Berman Department of Mathematics Robert Shorten Hamilton Institute Douglas Leith Hamilton Instiute The Technion NUI Maynooth
More informationA Stochastic Control Approach for Scheduling Multimedia Transmissions over a Polled Multiaccess Fading Channel
A Stochastic Control Approach for Scheduling Multimedia Transmissions over a Polled Multiaccess Fading Channel 1 Munish Goyal, Anurag Kumar and Vinod Sharma Dept. of Electrical Communication Engineering,
More informationBounding the End-to-End Response Times of Tasks in a Distributed. Real-Time System Using the Direct Synchronization Protocol.
Bounding the End-to-End Response imes of asks in a Distributed Real-ime System Using the Direct Synchronization Protocol Jun Sun Jane Liu Abstract In a distributed real-time system, a task may consist
More informationThroughput-Delay Analysis of Random Linear Network Coding for Wireless Broadcasting
Throughput-Delay Analysis of Random Linear Network Coding for Wireless Broadcasting Swapna B.T., Atilla Eryilmaz, and Ness B. Shroff Departments of ECE and CSE The Ohio State University Columbus, OH 43210
More informationExam Spring Embedded Systems. Prof. L. Thiele
Exam Spring 20 Embedded Systems Prof. L. Thiele NOTE: The given solution is only a proposal. For correctness, completeness, or understandability no responsibility is taken. Sommer 20 Eingebettete Systeme
More informationAdaptive Reverse Link Rate Control Scheme for cdma2000 1xEV-DO Systems
Adaptive Reverse Link Rate Control Scheme for cdma2000 1xEV-DO Systems HyeJeong Lee, Woon-Young Yeo and Dong-Ho Cho Korea Advanced Institute of Science and Technology Abstract The cdma2000 1xEV-DO standard
More informationOn the Throughput-Optimality of CSMA Policies in Multihop Wireless Networks
Technical Report Computer Networks Research Lab Department of Computer Science University of Toronto CNRL-08-002 August 29th, 2008 On the Throughput-Optimality of CSMA Policies in Multihop Wireless Networks
More informationAn Admission Control Mechanism for Providing Service Differentiation in Optical Burst-Switching Networks
An Admission Control Mechanism for Providing Service Differentiation in Optical Burst-Switching Networks Igor M. Moraes, Daniel de O. Cunha, Marco D. D. Bicudo, Rafael P. Laufer, and Otto Carlos M. B.
More informationOn the stability of flow-aware CSMA
On the stability of flow-aware CSMA Thomas Bonald, Mathieu Feuillet To cite this version: Thomas Bonald, Mathieu Feuillet. On the stability of flow-aware CSMA. Performance Evaluation, Elsevier, 010, .
More informationPower Laws in ALOHA Systems
Power Laws in ALOHA Systems E6083: lecture 8 Prof. Predrag R. Jelenković Dept. of Electrical Engineering Columbia University, NY 10027, USA predrag@ee.columbia.edu March 6, 2007 Jelenković (Columbia University)
More informationOn the Energy-Delay Trade-off of a Two-Way Relay Network
On the Energy-Delay Trade-off of a To-Way Relay Netork Xiang He Aylin Yener Wireless Communications and Netorking Laboratory Electrical Engineering Department The Pennsylvania State University University
More informationIEEE abc-01/22r1
Project IEEE 802.16 Broadband Wireless Access Working Group Title An ARQ proposal for consideration by TG3/4 MAC group Date Submitted 2001-08 -31 Source(s) Yigal Leiba Itzik Kitroser
More informationAsymptotics, asynchrony, and asymmetry in distributed consensus
DANCES Seminar 1 / Asymptotics, asynchrony, and asymmetry in distributed consensus Anand D. Information Theory and Applications Center University of California, San Diego 9 March 011 Joint work with Alex
More informationMultiaccess Communication
Information Networks p. 1 Multiaccess Communication Satellite systems, radio networks (WLAN), Ethernet segment The received signal is the sum of attenuated transmitted signals from a set of other nodes,
More informationPerformance Analysis of Priority Queueing Schemes in Internet Routers
Conference on Information Sciences and Systems, The Johns Hopkins University, March 8, Performance Analysis of Priority Queueing Schemes in Internet Routers Ashvin Lakshmikantha Coordinated Science Lab
More informationChapter 6: Securing neighbor discovery
Securit and Cooperation in Wireless Networks http://secowinet.epfl.ch/ the wormhole attack; centralized and decentralized wormhole detection mechanisms; 007 Levente Buttán and Jean-Pierre Hubau Introduction
More informationPerformance Analysis of a Network of Event-Based Systems
3568 IEEE TRANSACTIONS ON AUTOMATIC CONTROL, VOL. 61, NO. 11, NOVEMBER 2016 Performance Analysis of a Network of Event-Based Systems Chithrupa Ramesh, Member, IEEE, Henrik Sandberg, Member, IEEE, and Karl
More informationA Measurement-Analytic Approach for QoS Estimation in a Network Based on the Dominant Time Scale
222 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 11, NO. 2, APRIL 2003 A Measurement-Analytic Approach for QoS Estimation in a Network Based on the Dominant Time Scale Do Young Eun and Ness B. Shroff, Senior
More informationEnergy Harvesting Multiple Access Channel with Peak Temperature Constraints
Energy Harvesting Multiple Access Channel with Peak Temperature Constraints Abdulrahman Baknina, Omur Ozel 2, and Sennur Ulukus Department of Electrical and Computer Engineering, University of Maryland,
More informationSubmitted to IEEE Transactions on Computers, June Evaluating Dynamic Failure Probability for Streams with. (m; k)-firm Deadlines
Submitted to IEEE Transactions on Computers, June 1994 Evaluating Dynamic Failure Probability for Streams with (m; k)-firm Deadlines Moncef Hamdaoui and Parameswaran Ramanathan Department of Electrical
More informationPERFORMANCE ANALYSIS OF WIRELESS LANS: AN INTEGRATED PACKET/FLOW LEVEL APPROACH
PERFORMANCE ANALYSIS OF WIRELESS LANS: AN INTEGRATED PACKET/FLOW LEVEL APPROACH Remco Litjens 1,FrankRoijers, Hans van den Berg,, Richard J. Boucherie, and Maria Fleuren Knowledge Innovation Center, TNO
More informationScheduling Multicast Traffic with Deadlines in Wireless Networks
Scheduling Multicast Traffic with Deadlines in Wireless Networks yu Seob im, Chih-ping Li, and Eytan Modiano Laboratory for Information and Decision Systems Massachusetts Institute of Technology Abstract
More informationDistributed Optimization over Networks Gossip-Based Algorithms
Distributed Optimization over Networks Gossip-Based Algorithms Angelia Nedić angelia@illinois.edu ISE Department and Coordinated Science Laboratory University of Illinois at Urbana-Champaign Outline Random
More informationTime Synchronization
Massachusetts Institute of Technology Lecture 7 6.895: Advanced Distributed Algorithms March 6, 2006 Professor Nancy Lynch Time Synchronization Readings: Fan, Lynch. Gradient clock synchronization Attiya,
More informationPower Allocation and Coverage for a Relay-Assisted Downlink with Voice Users
Power Allocation and Coverage for a Relay-Assisted Downlink with Voice Users Junjik Bae, Randall Berry, and Michael L. Honig Department of Electrical Engineering and Computer Science Northwestern University,
More informationContinuous-Model Communication Complexity with Application in Distributed Resource Allocation in Wireless Ad hoc Networks
Continuous-Model Communication Complexity with Application in Distributed Resource Allocation in Wireless Ad hoc Networks Husheng Li 1 and Huaiyu Dai 2 1 Department of Electrical Engineering and Computer
More informationDesign and Analysis of Multichannel Slotted ALOHA for Machine-to-Machine Communication
Design and Analysis of Multichannel Slotted ALOHA for Machine-to-Machine Communication Chih-Hua Chang and Ronald Y. Chang School of Electrical and Computer Engineering, Purdue University, USA Research
More informationcs/ee/ids 143 Communication Networks
cs/ee/ids 143 Communication Networks Chapter 4 Transport Text: Walrand & Parakh, 2010 Steven Low CMS, EE, Caltech Agenda Internetworking n Routing across LANs, layer2-layer3 n DHCP n NAT Transport layer
More informationHDR - A Hysteresis-Driven Routing Algorithm for Energy Harvesting Tag Networks
HDR - A Hysteresis-Driven Routing Algorithm for Energy Harvesting Tag Networks Adrian Segall arxiv:1512.06997v1 [cs.ni] 22 Dec 2015 March 12, 2018 Abstract The work contains a first attempt to treat the
More informationSystem Model. Real-Time systems. Giuseppe Lipari. Scuola Superiore Sant Anna Pisa -Italy
Real-Time systems System Model Giuseppe Lipari Scuola Superiore Sant Anna Pisa -Italy Corso di Sistemi in tempo reale Laurea Specialistica in Ingegneria dell Informazione Università di Pisa p. 1/?? Task
More informationStatic priority scheduling
Static priority scheduling Michal Sojka Czech Technical University in Prague, Faculty of Electrical Engineering, Department of Control Engineering November 8, 2017 Some slides are derived from lectures
More information