DIFS DIFS DIFS DIFS DIFS DIFS. defer

Size: px
Start display at page:

Download "DIFS DIFS DIFS DIFS DIFS DIFS. defer"

Transcription

1 A apacity Analysis for the I MA Protocol Y.. Tay K.. hua National University of Singapore Abstract The recently proposed I MA protocol provides shared access to a wireless channel. This paper uses an analytic model to study the channel capacity i.e. maximum throughput when using the basic access (two-way handshaking) method in this protocol. It provides closed-form approximations for (1) the probability of collision p, (2) the maximum throughput S and (3) the limit on the number of stations in a wireless cell. The analysis also shows that (4) p does not depend on the packet length, the latency in crossing the MA and physical layers, the acknowledgement timeout, the interframe spaces and the slot size; (5) p and S (and other performance measures) depend on the minimum window size W and the number of stations n only through a variable g = W=(n + 1) consequently, halving W is like doubling n; (6) the maximum contention window size has minimal eect on p and S; (7) the choice of W that maximizes S is proportional to the square root of the packet length; (8) S is maximum when transmission rate (including collisions) equals the reciprocal of transmission time, and this happens when channel wastage due to collisions balances idle bandwidth caused by backos. Keywords: I MA protocol, capacity analysis, saturation throughput, closed-form approximation, backo thrashing, analytic validation. 1 Introduction With the proliferation of mobile computers, their limited computing resources, and the popularity of Internet access, there is a growing need for these computers to be networked. In response, the I study group has recently proposed a standard for wireless local area networks [I]. This standard species the characteristics of the physical layer, as well as the medium access control (MA) protocols in the link layer. There are essentially two MA protocols in the proposal a basic access method that uses two-way handshaking (ATA-AK) and a RTS/TS variant that uses request-to-send and clear-to-send messages in a four-way handshake (RTS-TS-ATA-AK). This paper analyzes the former but not the latter, for two reasons: (1) the basic access method is mandatory, whereas RTS/TS is an optional variant; (2) the performance for RTS/TS is signicantly dierent from that for basic access [BFO], and therefore requires a separate analytic model. 1

2 We also do not discuss the no-ak option meant for broadcasts and multicasts, nor the point coordination function, which is an optional polling scheme dened on top of basic access. The basic access method uses carrier-sensing multiple access with collision avoidance (SMA/A). There are numerous SMA protocols, and their performance under low load conditions are usually similar [To, V]. The many variations arise because of eorts to improve on performance and push back the limits. Our analysis therefore focuses on the most important such limit namely, the maximum (or saturation) throughput, which measures the capacity when the protocol is used to access the channel, and is lower than the raw bandwidth for the physical medium itself. Our model assumes that the stations are homogeneous in trac generation, channel noise is negligible, and there are no hidden terminals. A scenario that may t these assumptions would be a classroom or meeting in which students or executives exchange information on their laptops. From the modeling perspective, it is not dicult (but somewhat tedious) to take noise into consideration; also, hidden terminals require a separate model and, in any case, should be analyzed together with RTS/TS because the two are closely related [BFO, G, H]. In contrast to previous simulation studies of the MA protocols [BFO, NI, V], the performance analysis we present here is based on a mathematical model. This model not only diers from previous analytic models of the protocols [G, H], it is also dierent from the other techniques in the SMA literature [AS, HLR, KT, PSP, S, TT, TK]. Our technique is simple, yet eective: It provides closed-form expressions for the probability of a collision and the saturation throughput, thus facilitating the analysis of various issues, like the choice of window size, the limit on the number of stations, and the tradeo between collisions and backos. It also yields two rules of thumb: halving the initial window size W (for the exponential backo) is similar in eect to doubling the number of stations, and the optimum choice of W is proportional to the square root of packet size. A performance model is usually validated by comparing its numerical predictions with simulation results. For our model, we also check its analytical conclusions against simulated performance we call this analytic validation. We use Bianchi et al's simulator [BFO] for the validation; this simulator is comprehensive in capturing the many details in the protocol. Although our model omits many of these details and relies on many approximations, the comparison shows that it is accurate both numerically and analytically. We begin in Section 2 by describing the protocol, and introduce the performance model in Section 3. We then check the numerical accuracy of the model in Section 4, before using it to analyze the protocol in Section 5; there, we constantly use the simulator to check the results from the analysis. Section 6 summarizes our conclusions. The Appendix contains a detailed derivation of our performance model. 2 Protocol escription The basic access method for the MA protocol works as follows: To send a packet, a station X rst listens to the channel for time T IFS (IFS is distributed interframe space). If there is silence for T IFS, X proceeds with the transmission (e.g. Station A in Figure 1); otherwise, 2

3 IFS IFS IFS IFS IFS IFS Station A defer Station B defer Station defer Station defer Station transmission backoff remaining backoff Figure 1 Basic access in the MA protocol (with SIFS and AK omitted). X waits for the rst T IFS of silence after the current busy period, then backs o for a random interval (e.g. Station in Figure 1). X chooses the backo with an integer uniformly distributed over 0; 1; : : : ; ~ W?1, where ~ W is the contention window size. For each packet, X initializes ~ W to be W, the minimum window size. X sets a timer to ~ W and decrements it after every Tslot period of silence, but suspends it if another station Y begins transmission; when the timer reaches 0, X begins transmission of its packet (e.g. Stations B, and in Figure 1). The packet is transmitted in its entirety, even if there is a collision, since X does not do collision detection. The receiver uses the R (cyclic redundancy check) bits in each packet to check for collisions and, if no error is detected, sends an AK (acknowledgement) after time T SIFS (SIFS is short interframe space; T SIFS < T IFS ). If the sender does not detect an AK within an AK-timeout, it enters a retransmit backo: if ~ W is smaller than the maximum window size 2 m W, then ~ W is doubled (thus, m is the number of retransmission attempts before ~ W reaches its maximum size thereafter, the window size remains unchanged until it is reinitialized to W for a new packet); X sets a timer to a value uniformly chosen from less than the new ~ W, and (re)transmission is postponed to when this timer expires, as before. Finally, a station must separate two consecutive transmissions by a random backo, even if the channel is idle for IFS after the rst transmission (e.g. Station B in Figure 1.) 3

4 3 The Performance Model The signal propagation delay in a local area network is very small, so a carrier sensing protocol may be expected to have a negligible probability of collision. However, because time is slotted (with the help of synchronizing beacons) and transmissions occur at the beginning of slots, a window size of, say, 32 slots means that there are only 32 possible choices of transmission times within a range of 32T slot, where T slot is the time duration of a slot. If, say, 10 stations are choosing transmission times from the same 32 slots (after the IFS that follow a busy period), then the probability of a collision p is very high. The basic access method in the MA protocol is designed to avoid collisions (e.g. the random backo interval if the channel is found to be busy). While it is possible to stress the protocol with a workload that causes a high collision rate, the protocol is clearly not designed for such workloads. Specically, workloads that cause p to exceed, say, 0.5 should probably be considered incompatible with the protocol, and require more access coordination, such as that provided by RTS/TS. Our performance model for basic access is therefore restricted to workloads for which p is small (less than 0.5). Note that this is not the same as saying workload is low, since our analysis is focused on saturation throughput, which is clearly heavy (in fact, maximum) workload; in other words, saturation happens for small p as well. Indeed, simulation results show that our model is accurate even when the saturation throughput is thrashing, i.e. decreasing as more stations are added. It is a common misconception that throughput thrashes (only) because of too many collisions when, in fact, thrashing can also happen because senders spend too much time waiting for each other in backos we call this backo thrashing, and it is something to guard against in a SMA/A protocol. (A similar phenomenon occurs in transaction processing [TGS].) The details for our model are given in the Appendix. There, we show that p is the root of the approximation p 1? p? p(2p)m = 2? ? 2p W 3 n n? 1 n ; (1) where W (slots) is the minimum window size, 2 m W is the maximum window size and n is the number of stations. The rates of successful (i.e. uncollided) transmissions, transmissions (k packets that collide count as k transmissions) and collisions (multiple packets that collide count as one collision) are given by r success = 2(1? p) 2? p r xmit = 2 2? p and r collision = p 2? p 1 T physical + T SIFS + T AK + T IFS + W T ; (2) n+1 slot 1 T physical + T SIFS + T AK + T IFS + W n+1 T slot 1 T physical + T SIFS + T AK + T IFS + W n+1 T slot respectively, where T physical is the transmission time for a physical packet (payload plus headers), T SIFS is the time duration for a SIFS, T AK is the transmission time for an AK, T IFS is the time 4 (3) (4)

5 duration for a IFS, and T slot is the slot time. The two most important performance measures are the total channel utilization u total = r success (T physical + T AK ) + r collision T physical (5) and the saturation throughput (the fraction of channel bandwidth that is used to successfully transmit payload bits) S = 2(1? p) 2? p where T payload is the transmission time for payload bits. T payload T physical + T SIFS + T AK + T IFS + W T ; (6) n+1 slot 4 Numerical Validation For validation, we use Bianchi et al's discrete-event simulator (written in ++). The number of stations n is assumed to be xed, all packets are of the same size and not fragmented, the time between packet generation is exponentially distributed, and there is no noise and no hidden terminal. The packet format and parameter values used in the simulation are shown in Table 1. The latter values are those for the frequency hopping physical layer. In Table 1, RxTx Turnaround Time is the time between when the MA transmission request is sent to the physical layer and when the rst bit is transmitted; the Busy etect Time is the time between when the channel changes state and when the MA layer receives notication. packet payload MA header PHY header AK length 8184 bits 272 bits 128 bits 240 bits hannel Bit Rate Propagation elay RxTx Turnaround Time Busy etect time SIFS IFS AK Timeout Slot Time 1 Mbits/sec 1 sec 20 sec 29 sec 28 sec 130 sec 300 sec 51 sec Table 1 Packet format and parameter values used in the simulation. In the gures that follow, each sample point represents the average from 10 simulation runs; each run is for 10 secs of simulated time, with the rst 5 secs of transient behavior ignored. The 95% condence interval for each sample point is usually too small to be shown in the gures. To verify the numerical accuracy of our model, we compare its prediction of the two most important performance measures p (see Figure 2) and S (see Figures 3 and 4) to results from the simulator. The curves in each graph are plotted by solving (1) and (6); for W = 16 and W = 32, they are truncated at p = 0:5, since higher values of p are of no practical interest. (For p > 0:5, every packet would have to be sent more than twice, on average; users are unlikely to tolerate such wastage of bandwidth.) 5

6 p A B B A A B B n W m A 16 3 B Figure 2 omparison of model's prediction (solid line) against simulation results for p. S A B A B A B B W m A 16 3 B Figure 3 omparison of model's prediction (solid line) against simulation results for S. n 6

7 S 0.8 F 0.7 G F G H F G H G HF G H F H G 0.6 H F W n m F 5 3 G 20 3 H 50 3 Figure 4 omparison of model's prediction (solid line) against simulation results for S. The gures show that the model is reasonably accurate, despite its many approximations. Moreover, the accuracy holds good even when S drops as we increase n (Figure 3) or W (Figure 4). In particular, for W = 128 and W = 256 ( and curves) S is maximum when p is small, thus indicating backo thrashing. Again, it would be meaningless to take the model validation far into the thrashing region (where throughput is dropping), since the protocol is clearly not designed to operate in that region. We will present more data from the simulator, and study the interesting shapes in Figures 3 and 4, in the next section. 5 Protocol Analysis We now use our model to analyze the protocol. As with any approximate performance model of a system, one must be careful that the properties deduced from the model are in fact properties of the system, and not just properties of the approximation itself. In the following, we always make an attempt at analytic validation, i.e. verify that the results from our analysis apply to the simulated behavior of the protocol. laim 1 The probability of a collision does not depend on packet length, the latency in crossing the MA/PHY layers (i.e. RxTx Turnaround Time and Busy etect Time), the acknowledgement timeout, the interframe spaces and the slot size; it only depends on W, m and n. 7

8 Proof This follows from (1). To validate this claim, we ran the simulator for various choices of T payload, RxTx Turnaround Time, Busy etect Time, T SIFS, T IFS and T slot. Table 2 shows that only W, m and n aect p. (In fact, the eect of m is minimal see laim 3.) RxTx BusyT T slot T SIFS T IFS AK T T payload n W m p RxTx is RxTx Turnaround Time, BusyT is Busy etect Time, AK T is AK-timeout. Table 2 Validating laim 1: p only depends on W, m and n. ven the dependence on W and n can be simplied: laim 2 The protocol's performance (p, r success, r xmit, r collision, S, u total ) depends on the minimum window size W and number of stations n only through g = W when n is large (say, n 5). n+1 Proof The RHS of (1) can be approximated by? n n? 1 = 2n2 + n? 3 2n + 1 n 3n 3 2(n + 1) : 3 (The approximations here may seem arbitrary, but they are in fact guided by simulation results.) Hence, p becomes the root of the approximation p 1? p? p(2p)m 1? 2p = 4 3 n + 1 W : (7) The claim now follows from (2){(7). To validate this claim, the simulator's values for p and S in Figures 2 and 3 are plotted against g in Figures 5 and 6 for n 5. We see that the data points do in fact form a single curve, despite large variations in W (16 to 256) and n (2 to 50). 8

9 p B AB B A B g W m A 16 3 B Figure 5 Validation of laim 2 that p is a function of W and n only through g. (Values for W, m and n are as in Figure 2.) S A BA A B B B W m A 16 3 B Figure 6 Validation of laim 2 that S is a function of W and n only through g. (Values for W, m and n are as in Figure 3.) g 9

10 laim 2 now makes the complicated, unintuitive behavior in Figure 3 easy to understand: all the curves are manifestations of the same curve in Figure 6. For W = 16 and W = 32, the curves are taken from the pre-maximum segment in Figure 6 (because W is small), so there are no maximums; the curves for W = 128 and W = 256 are two segments of the same curve that are scaled, reected, translated and superimposed in Figure 3. The choice of m splits the curve for W = 32 in Figure 3 when n is comparable to W because the relevant segment (near g = 0) in Figure 6 is steep in this range and sensitive to the window size. It is intuitively obvious that increasing the number of stations n will have a signicant impact on the throughput. One may think that the minimum window size has a secondary eect, since a choice of W that is too small can always be remedied with exponential backo. However, the following corollary of laim 2 shows that W and n have equivalent eect: orollary 1 Halving the initial window size has similar impact on saturation throughput as doubling the number of stations. Proof This follows from (6) and (7) and the fact that W=2 n + 1 W 2n : Let S be the saturation throughput for some choice of W, m and n, S W=2 the new S when W is halved, and S 2n the new S when n is doubled. Figure 7 compares S W=2 and S 2n from the simulator for a wide range of values in W and n. (The next claim considers the eect of m.) The data points lie close to the line S W=2 = S 2n, thus supporting the corollary. This is another example of what we mean by analytical validation of the model: Analysis of our model leads to the claim that S W=2 = S 2n, and this claim is then checked with simulated values of S W=2 and S 2n. This is unlike the numerical validation in the previous section, where the comparison is between the model's prediction and the simulation's result. Bianchi et al have observed that throughput performance is strongly dependent on W ; using our model, we have now quantied (with orollary 1) this dependence through the eect of n. orollary 1 points out the importance of the minimum window size. We now show that, in contrast, the maximum window size has only a small eect on p and S. laim 3 Suppose p < 0:5. For small p, the choice of maximum window size has minimal eect (namely, O(p(2p) m )) on the collision rate and saturation throughput. Proof Suppose 1? p m? p m (2p m ) m p m = 2? ? 2p m W 3 n n? 1 1? p 1 = p 1 : (8) n 1? 2p 1 10

11 SW/ B A I G H F n W m A B F G H I S2n Figure 7 Validation of orollary 1 that halving W has the same eect on S as doubling n. i.e. p m is the root of (1) for maximum window size 2 m W and p 1 is the root for unbounded window size (using 2p < 1). Let p = (p 1? p m )=p m. Ignoring the higher order terms k p for k 2, (8) gives p =?p m (2p m ) m 1? 2p m 1? 2p m + 2p 2 m(1? (2p m ) m ) : Since 2p < 1, we get j p j < p m (2p m ) m : (9) Similarly, if S m and S 1 are the corresponding throughputs and S = (S 1? S m )=S m, then we get from (6) S = 2(1? p m(1 + p )) 2? p(1 + p ) 2? p m 2(1? p m )? 1 =? p m p (2? p m (1 + p ))(1? p m ) : Since p < 0, we have j S j < p m j p j (2? p m )(1? p m ) : (10) For example, if m = 3 and p m = 0:3, then the RHS of (9) is less than and the RHS of (10) is less than 0.017, showing that the choice of m (between 3 and 1) has minimal impact on p and S. To validate this claim with the simulator, Table 3 examines the eect of choosing between 2 m W and 2 i W as the maximum window size for some values of W and n. The simulations show that the eect is even smaller than the tight bounds derived with our model. Using laim 3, we can now express p and S explicitly in terms of the parameters in Table 1: 11

12 W n g m i p m p i pi?pm pm S m S i Si?Sm Sm % % % % % % % % % % % % % % Table 3 The eect of maximum window size on p and S. laim 4 The saturation throughput can be approximated by 2(1? p) T payload S = 2? p T physical + T SIFS + T AK + T IFS + W where p = r 2 3g? 1 +? 8 2 3g and g = W n + 1 : n+1 T slot (11) (12) Proof Since the choice of m has minimal impact on p, we can approximate (7) by p(1? p) 1? 2p = 4 3g : This has solution p = r 3g? 1 +? 8 2 : 3g (The positive square root gives p > 1, which is impossible.) The claim follows from (6). quations (11) and (12) are plotted in Figures 8 and 9, which show that the explicit expressions are reasonably accurate in estimating p and S. Figure 6 shows that there is a value of g for which S is maximum. The next claim locates this maximum. laim 5 Suppose T payload T slot >> W > 3. The saturation throughput is maximum when n+1 W = r 2 T physical + T SIFS + T AK + T IFS (n + 1): 3 T slot 12

13 p 0.5 B AB B A B g W m A 16 3 B Figure 8 Validation of closed-form expression (12) for p. (ata points are as in Figure 2.) S A BA A B B B W m A 16 3 B Figure 9 Validation of closed-form expression (11) for S. (ata points are as in Figure 3.) g 13

14 Proof To determine the maximum, rst let a = T payload T slot and b = T physical + T SIFS + T AK + T IFS T slot : Then, from (11) and (12), where ds dg =?2 2? p dp dg =?1 2 a b + g 1 2? p 1?? 8 3g 2 dp dg + 1? p b + g 8 q 3g 1 + ( 8 3g )2 : (13) The maximum requires ds dg = 0, i.e. dp dg =?(2? p)(1? p) b + g? 2? 3p b since b > T physical T slot >> W n + 1 = g: Using (13), we now have 1? 8 1? 2 3g 2 8 q 3g 1 + ( 8 3g )2 Given g > 3, we can use (12) to simplify the approximation as This gives a solution and the claim follows. 4? 8 1? 3g 2 3g g 1? 3 2? b 2 r 2b 3 ; = 2? 3p : b 8 : 3g For the parameter values in the simulation, laim 5 puts the maximum at g = W=(n + 1) 11. Thus, a class of 15 students should set W to be 176 (assuming the parameter values and trac assumptions apply). Since the curve for S is very at around the maximum, the value 11 here is just a \ballpark" gure it wouldn't matter much to S if the ratio deviates somewhat from 11. Because the maximum is at, randomness in the sample average S makes locating the maximum and hence validating laim 5 dicult. However, the claim is consistent with an analysis by Bianchi et al, who show that, for constant backo (i.e. no exponential enlargement of the backo window size), S is maximum at W n r 2 T physical + T SIFS + T AK + T IFS T slot : It follows that, for the same n(> 1), saturation throughput under constant backo is maximum at a larger (initial) window size than under exponential backo; this formally conrms one's expectation 14

15 that, with exponential backo to help adjust the approximate window size, the protocol can aord to be aggressive and start with a smaller W. laim 5 leads to the following instructive rules: orollary 2 For maximum throughput, (i) W should increase linearly with n and (ii) W should be proportional to the square root of the packet size (in slots), assuming T physical >> T SIFS + T AK + T IFS. This corollary suggests how the protocol can be made adaptive: By monitoring the trac, the nodes in a cell can estimate n [BFO] and the packet size, and scale W up or down when they increase or decrease. Although packet sizes do not aect p (laim 1), they do aect S, thus leading to orollary 2(ii). There are, in fact, two underlying forces that determine S as we vary W. Intuitively, if W is too small, throughput is adversely aected by collisions; as W increases, the collision rate decreases, but then more channel bandwidth is lost to backos. Thus, the maximum is a tradeo between bandwidth wastage by collisions and by backos. The next claim conrms this intuition: laim 6 Suppose T AK << T physical. Bandwidth wasted by collisions exceeds idle bandwidth caused by backos if and only if 1 r xmit > : T physical Proof Let u collision be the fraction of bandwidth wasted by collisions. We can estimate the channel silence due to backos by 1? u total. The dierence between the two is = u collision? (1? u total ) = r collision T physical? 1 + (r success (T physical + T AK ) + r collision T physical ) by (5) (2r collision + r success )T physical? 1 since T AK << T physical = r? 1 where r = r xmit T physical ; using (2)? (4): Hence, > 0 if and only if r > 1, and the claim follows. The claim is intuitively appealing because 1=T physical is the maximum transmission rate if packets do not overlap, so the result says that to exceed this rate is to waste bandwidth on collisions, while a lower rate causes excess idle bandwidth. (Note that u total need not be 1 when r xmit = 1=T physical, because some transmissions may collide and overlap; in other words, there may be signicant idle bandwidth even if r xmit = 1=T physical.) 15

16 n = 5; m = 3 W S : r xmit T physical 1:04 0: n = 20; m = 3 W S : r xmit T physical :04 0: n = 50; m = 3 W S :83 r xmit T physical :01 0:94 Table 4 Validation of laim 6 that r xmit T physical = 1 when W is optimum. As validation, Table 4 shows the simulator's value of r xmit T physical decreasing from one side of 1 to the other as W increases, with the crossover happening near where W is optimum (i.e. S is maximum). Having examined the choice of W for a xed n, we now consider: For a given W and trac rate of packets/sec from each station, what is the congestion point, i.e. the value of n at which saturation sets in? laim 7 Suppose T physical >> T SIFS + T AK + T IFS + W 3 T slot. For a given minimum window size W and throughput per station, congestion (meaning S is near its maximum) occurs when n = n = Proof For all trac to get through, we require Thus, from (2), the maximum n is given by From (12), we get n? 1? p 2 1 T physical + 2 : (14) 3W nt payload < S = r success T payload : 1 T physical + T SIFS + T AK + T IFS + W T : n+1 slot n(t physical + T SIFS + T AK + T IFS + W n + 1 T slot) 1? 1 8(n + 1) 4 3W : Now T physical >> T SIFS +T AK +T IFS + W 3 T slot T SIFS +T AK +T IFS + W n+1 T slot, since congestion is meaningful only if n 2. Hence nt physical 1? 2n 3W ; 16

17 W n m S S from (14) from simulator from simulator (i) (ii) (iii) Table 5 omparing the throughput at the congestion point n and at saturation. and the claim follows. Table 5 compares the throughput S at n computed from laim 7 (rounded to the nearest integer) against the saturation throughput S when n is unbounded and each station generates trac at packets/sec. The table shows that throughput at the congestion point n is in fact close to saturation, except when the saturation throughput is sensitive to the choice of m (see (i); recall the related remark after laim 2), and when n is so small that there is a signicant dierence in throughput between n = n and n = n + 1 (see (iii)); note that, within experimental error, S may exceed S (e.g. (ii)). Like for orollary 2, (14) suggests a way of making W adaptive: By monitoring n and the average packet rate, the nodes in a cell can compare n to n and adjust W accordingly. If n << n, W can be reduced, thus reducing backos and improving send latency; if n approaches n, the congestion can be relieved by increasing W. Note that there is a limit to how far the congestion point n can be pushed by increasing W, since lim W!1 n = 1=T physical. 6 onclusion We draw two sets of conclusions from our analysis, one on the analytic technique, and one on the protocol's behavior. The technique of using average values wherever possible is simple (see Appendix), yet accurate (see Figures 2, 3, 4, 8 and 9); the accuracy remains good even when the saturation throughput is thrashing. It provides closed-form expressions (see laims 4, 5 and 7) and reveals several properties of the protocol. These properties, rst proved with the technique, are conrmed by the simulator. They include: how hardware features (e.g. RxTx Turnaround Time and Busy etect Time), protocol parameters (e.g. AK-timeout and interference spaces) and trac characteristics (e.g. payload) 17

18 aect or do not aect performance (Tables 2 and 3); how window size W and the number of stations n aect performance through the single parameter g = W=(n + 1) (Figures 5 and 6); and how the optimum W is determined by the tradeo between collisions and backos (laim 6 and Table 4). The model also provides instructive guidelines on the eect of W (orollary 1 and Figure 7), the choice of W (orollary 2) and the limit on n (laim 7 and Table 5). Acknowledgement We thank Giuseppe Bianchi for giving us a copy of their simulator, Matteo Oliveri for explaining the simulator, Mooi hoo huah for explaining the MA protocol, and Brahim Bensaou for helpful comments on the draft. Appendix: The Performance Model n W m W backo T slot T SIFS T IFS T payload T physical T AK T slice T cycle r success r collision r xmit p S u total the number of stations in a wireless cell minimum window size maximum window size is 2 m W (average) backo window size slot time time duration of short interframe space time duration of distributed interframe space time to transmit payload bits time to transmit packet (including headers) transmission time for an acknowledgement slient time between contentions, observed by a station time between the start of two payload transmissions rate of successful (i.e. uncollided) transmissions rate of collisions rate of transmissions probability of a collision channel utilization by successful transmission of payload bits total channel utilization (including collisions) Table A1 Glossary The performance analysis of any real system requires approximations if it is to be tractable. Only idealized queues (e.g. M/M/1) and networks (e.g. product-form) can be analyzed exactly [K]. For example, stochastic analysis of a protocol must adopt assumptions (e.g. exponential distributions, independent variables) and techniques (e.g. state space aggregation) that are { in eect { approximations of reality. Our model makes numerous approximations, some implicitly, but these approximations are 18

19 Wbackoff Tslot Tslice transmission Tslice transmission Tslice transmission contention contention timer ends transmission begins time Figure A1 ontentions divide backo into time slices. carefully chosen by using the simulator to check their eect on the model's accuracy. The tradeo is between simplicity (to facilitate analysis) and accuracy, since the conclusions drawn from the approximate model are acceptable only if it is numerically accurate. Instead of using the detailed stochastic models that are popular in SMA analysis [KT, PSP, RS, Ta, TT]. we use the average value for a variable wherever possible this is a methodology that is commonly used in the performance analysis of computer systems. The model hinges on estimating p, the probability of a collision (Table A1 lists the variables used in our analysis). At saturation, a transmitting station will always have a queue of packets to send, so every transmission is preceded by a backo (see the nal remark in Section 2's protocol description). Since the backo is uniformly distributed over 0; 1; : : : ; W? 1, the backo timer is W=2 (slots) on average at rst; for simplicity, we use W=2 instead of (W?1)=2. ach collision causes a dilation of the contention window until the maximum is reached, so the (average) backo window size is W backo = (1? p) W 2 + p(1? p)2w 2 = 1? p? p(2p)m W 1? 2p pm (1? p) 2m W 2 + p m+1 2m W 2 The backo timer is decremented after each time slot unless a contention i.e. a transmission by another station causes the timer to be suspended. The contentions thus divide the backo into n contention + 1 time slices of T slice each (see Figure A1), so (A1) (n contention + 1)T slice = W backo T slot : (A2) We now estimate the probability of a contention caused by station transmitting during station B's backo. At saturation, each station alternates between transmission and backo. Therefore, when B's timer begins, is in a backo (see Figure A2), and the average residual life of 's timer is W backo =3. (The expected residual life is m 2 =2m 1, where m i is the i-th moment of the timer distribution [K]; for a uniform distribution, m 2 = W backo 2 =3 and m 1 = W backo =2.) Now there is contention from if and only if B's timer expires after 's. This has probability 1? W backo=3 W backo = 2 3 : 19

20 timer begins residual life timer ends B timer begins timer ends (no contention from ) timer ends (contention from ) Figure A2 ontention from during B's backo. A station's backo timer can therefore expect about 2 (n? 1) interruptions from the other n? 1 3 stations. This is an underestimate, since B's timer can be interrupted more than once by ; a check with the simulator shows that a better estimate is given by n contention = 2 3 n: (A3) Substitution into (A2) gives ( n)t slice = W backo T slot : (A4) Since p < 0:5, most transmissions are rst attempts preceded by carrier sensing. Therefore, most collisions occur because one station senses an idle channel in the slot just before a transmission, so p can be approximated by T slot =T slice. However, this is an overestimate because we have not excluded transmissions that belong to the station itself. To factor out these transmissions, we use p = n? 1 n T slot T slice ; (A5) this is similar to the Schweitzer approximation [J] for queueing networks, and correctly gives p = 0 for n = 1. liminating T slice and W backo from (A1), (A4) and (A5) gives p 1? p? p(2p)m 1? 2p = 2 W? n n? 1 n : (A6) For given W, m and n, this equation can be solved for p. The next task is to derive the saturation throughput and other performance measures. Since each transmission has probability p of collision, and a station transmits a packet multiple times until it receives an acknowledgement (thus indicating a successful transmission), we can model the number of transmissions per packet as geometrically distributed with probability of success 1? p and average 1=(1? p). But the average number of transmissions per packet is also r xmit =r success, so 1 1? p = r xmit r success : (A7) We count multiple transmissions that collide as one collision; to a rst approximation, each collision is between just two transmissions, so r xmit? r success = 2r collision : (A8) 20

21 The transmission episodes along the time-line occur at rate 1=T cycle where T cycle is the time between two payload transmissions and consist of successful and collided transmissions, so (A7), (A8) and (A9) give 1 T cycle = r success + r collision : 2(1? p) 1 r success = ; 2? p T cycle r xmit = 2 1 2? p T cycle and r collision = p 1 : 2? p T cycle (A9) (A10) (A11) (A12) The time T cycle consists of the physical transmission time, a SIFS, an acknowledgement, a IFS (the last three are also used to approximate the AK-timeout for collided transmissions) and a silent interval. In (A4), this slice of silence is T slice = W backot slot 2 n + 1 ; 3 but this is the silent time observed by one of the stations in a backo. At saturation, most transmissions are preceded by a minimum backo of W ; when n stations uniformly choose a time in W, the gap between choices has mean W=(n+1). We therefore use W T slot =(n+1) to approximate the silence instead, so T cycle = T physical + T SIFS + T AK + T IFS + W n + 1 T slot: (A13) We can now derive expressions for performance measures like the average number of retransmissions, the average access delay to the channel, etc. Of these, the two that are most important are S = r success T payload ; (A14) where S is the saturation throughput (i.e. the fraction of channel bandwidth that is used to successfully transmit payload bits) and the total channel utilization u total = r success (T physical + T AK ) + r collision T physical : (A15) References [AS]. Arthurs and B.W. Stuck, A theoretical performance analysis of polling and carrier sense collision detection communication systems. In Local omputer Networks (P.. Ravasio, G. Hopkins and N. Naah, eds.), North-Holland, Amsterdam (1982), 415{437. [BFO] G. Bianchi, L. Fratta and M. Oliveri, Performance evaluation and enhancement of the SMA/A MA protocol for wireless LANs, Proc. PIMR, Taipei, Taiwan (Oct. 1996), [G] H.S. hhaya and S. Gupta, Throughput and fairness properties of asynchronous data transfer methods in the I MA protocol, Proc. PIMR, Toronto, anada (Sept. 1995), 613{

22 [H] K.. Huang and K.. hen, Interference analysis of nonpersistent SMA with hidden terminals in multicell wireless data networks, Proc. PIMR, Toronto, anada (Sept. 1995), 907{911. [HLR] J. Hastad, T. Leighton and B. Rogo, Analysis of backo protocols for multiple access channels, Proc. Symposium on Theory of omputing, New York (May 1987), 241{253. [I] P802.11, I raft Standard for Wireless LAN Medium Access ontrol (MA) and Physical Layer (PHY) Specication, 2.0 (July 1995). [J] R. Jain, The Art of omputer Systems Performance Analysis, John Wiley & Sons, New York, NY (1991). [K] L. Kleinrock, Queuing Systems, Vol. I: Theory, Wiley-Interscience, New York, NY (1975). [KT] [NI] [PSP] [RS] [S] [Ta] [To] [TGS] [TK] [TT] [V] [V] L. Kleinrock and F.A. Tobagi, Packet switching in radio channels: Part I arrier sense multiple-access modes and their throughput-delay characteristics, I Trans. ommunications 23, 12 (ec. 1975), 1400{1416. S.M. Nor and I. Ismail, Performance of SMA-A MA protocol for distributed radio local area networks, Proc. PIMR, Toronto, anada (Sept. 1995), 912{916. I.. Pountourakis,.. Sykas and.n. Protonotarios, Stability and throughput optimization of multichannel slotted nonpersistent SMA protocol, omputer ommunications 18, 12(ec.1995), 949{958. R. Rom and M. Sidi, Multiple Access Protocols: Performance and Analysis, Springer-Verlag (1990). W. Szpankowski, A multiqueue problem: bounds and approximations. In Performance of omputer-ommunication Systems (H. Rudin and W. Bux, eds.), North-Holland, Amsterdam (1984), 349{364. S. Tasaka, Performance Analysis of Multiple Access Protocols, MIT Press, ambridge, MA (1986). F.A. Tobagi, Multiaccess protocols in packet communication systems, I Trans. ommunications 28, 4(Apr. 1980), 468{488. Y.. Tay, N. Goodman and R. Suri, Locking performance in centralized databases. AM Transactions on atabase Systems 10, 4 (ec. 1985), 415{462. H. Takagi and L. Kleinrock, Throughput analysis for persistent SMA systems, I Trans. ommunications OM-33, 7 (July 1985), 627{638. H.H. Tan and K. Tsai, Packet output process of SMA and SMA/ protocols, I Trans. ommunications 44, 4(Apr. 1996), 464{474. T. Vo-ai, Throughput-delay analysis of the nonslotted and nonpersistent SMA- protocol. In Local omputer Networks (P.. Ravasio, G. Hopkins and N. Naah, eds.), North- Holland, Amsterdam (1982), 459{476. M. Visser and M. l Zarki, Voice and data transmission over an wireless network, Proc. PIMR, Toronto, anada (Sept. 1995), 648{

Wireless Internet Exercises

Wireless Internet Exercises Wireless Internet Exercises Prof. Alessandro Redondi 2018-05-28 1 WLAN 1.1 Exercise 1 A Wi-Fi network has the following features: Physical layer transmission rate: 54 Mbps MAC layer header: 28 bytes MAC

More information

Analysis of random-access MAC schemes

Analysis of random-access MAC schemes Analysis of random-access MA schemes M. Veeraraghavan and Tao i ast updated: Sept. 203. Slotted Aloha [4] First-order analysis: if we assume there are infinite number of nodes, the number of new arrivals

More information

requests/sec. The total channel load is requests/sec. Using slot as the time unit, the total channel load is 50 ( ) = 1

requests/sec. The total channel load is requests/sec. Using slot as the time unit, the total channel load is 50 ( ) = 1 Prof. X. Shen E&CE 70 : Examples #2 Problem Consider the following Aloha systems. (a) A group of N users share a 56 kbps pure Aloha channel. Each user generates at a Passion rate of one 000-bit packet

More information

Mathematical Analysis of IEEE Energy Efficiency

Mathematical Analysis of IEEE Energy Efficiency Information Engineering Department University of Padova Mathematical Analysis of IEEE 802.11 Energy Efficiency A. Zanella and F. De Pellegrini IEEE WPMC 2004 Padova, Sept. 12 15, 2004 A. Zanella and F.

More information

Detecting Stations Cheating on Backoff Rules in Networks Using Sequential Analysis

Detecting Stations Cheating on Backoff Rules in Networks Using Sequential Analysis Detecting Stations Cheating on Backoff Rules in 82.11 Networks Using Sequential Analysis Yanxia Rong Department of Computer Science George Washington University Washington DC Email: yxrong@gwu.edu Sang-Kyu

More information

TRANSMISSION STRATEGIES FOR SINGLE-DESTINATION WIRELESS NETWORKS

TRANSMISSION STRATEGIES FOR SINGLE-DESTINATION WIRELESS NETWORKS The 20 Military Communications Conference - Track - Waveforms and Signal Processing TRANSMISSION STRATEGIES FOR SINGLE-DESTINATION WIRELESS NETWORKS Gam D. Nguyen, Jeffrey E. Wieselthier 2, Sastry Kompella,

More information

Giuseppe Bianchi, Ilenia Tinnirello

Giuseppe Bianchi, Ilenia Tinnirello Capacity of WLAN Networs Summary Ł Ł Ł Ł Arbitrary networ capacity [Gupta & Kumar The Capacity of Wireless Networs ] Ł! Ł "! Receiver Model Ł Ł # Ł $%&% Ł $% '( * &%* r (1+ r Ł + 1 / n 1 / n log n Area

More information

Giuseppe Bianchi, Ilenia Tinnirello

Giuseppe Bianchi, Ilenia Tinnirello Capacity of WLAN Networs Summary Per-node throughput in case of: Full connected networs each node sees all the others Generic networ topology not all nodes are visible Performance Analysis of single-hop

More information

TCP over Cognitive Radio Channels

TCP over Cognitive Radio Channels 1/43 TCP over Cognitive Radio Channels Sudheer Poojary Department of ECE, Indian Institute of Science, Bangalore IEEE-IISc I-YES seminar 19 May 2016 2/43 Acknowledgments The work presented here was done

More information

Information in Aloha Networks

Information in Aloha Networks Achieving Proportional Fairness using Local Information in Aloha Networks Koushik Kar, Saswati Sarkar, Leandros Tassiulas Abstract We address the problem of attaining proportionally fair rates using Aloha

More information

Random Access Protocols ALOHA

Random Access Protocols ALOHA Random Access Protocols ALOHA 1 ALOHA Invented by N. Abramson in 1970-Pure ALOHA Uncontrolled users (no coordination among users) Same packet (frame) size Instant feedback Large (~ infinite) population

More information

Modeling and Simulation NETW 707

Modeling and Simulation NETW 707 Modeling and Simulation NETW 707 Lecture 6 ARQ Modeling: Modeling Error/Flow Control Course Instructor: Dr.-Ing. Maggie Mashaly maggie.ezzat@guc.edu.eg C3.220 1 Data Link Layer Data Link Layer provides

More information

ANALYSIS OF THE RTS/CTS MULTIPLE ACCESS SCHEME WITH CAPTURE EFFECT

ANALYSIS OF THE RTS/CTS MULTIPLE ACCESS SCHEME WITH CAPTURE EFFECT ANALYSIS OF THE RTS/CTS MULTIPLE ACCESS SCHEME WITH CAPTURE EFFECT Chin Keong Ho Eindhoven University of Technology Eindhoven, The Netherlands Jean-Paul M. G. Linnartz Philips Research Laboratories Eindhoven,

More information

Tuning the TCP Timeout Mechanism in Wireless Networks to Maximize Throughput via Stochastic Stopping Time Methods

Tuning the TCP Timeout Mechanism in Wireless Networks to Maximize Throughput via Stochastic Stopping Time Methods Tuning the TCP Timeout Mechanism in Wireless Networks to Maximize Throughput via Stochastic Stopping Time Methods George Papageorgiou and John S. Baras Abstract We present an optimization problem that

More information

Chapter 5. Elementary Performance Analysis

Chapter 5. Elementary Performance Analysis Chapter 5 Elementary Performance Analysis 1 5.0 2 5.1 Ref: Mischa Schwartz Telecommunication Networks Addison-Wesley publishing company 1988 3 4 p t T m T P(k)= 5 6 5.2 : arrived rate : service rate 7

More information

Response Time in Data Broadcast Systems: Mean, Variance and Trade-O. Shu Jiang Nitin H. Vaidya. Department of Computer Science

Response Time in Data Broadcast Systems: Mean, Variance and Trade-O. Shu Jiang Nitin H. Vaidya. Department of Computer Science Response Time in Data Broadcast Systems: Mean, Variance and Trade-O Shu Jiang Nitin H. Vaidya Department of Computer Science Texas A&M University College Station, TX 7784-11, USA Email: fjiangs,vaidyag@cs.tamu.edu

More information

A POMDP Framework for Cognitive MAC Based on Primary Feedback Exploitation

A POMDP Framework for Cognitive MAC Based on Primary Feedback Exploitation A POMDP Framework for Cognitive MAC Based on Primary Feedback Exploitation Karim G. Seddik and Amr A. El-Sherif 2 Electronics and Communications Engineering Department, American University in Cairo, New

More information

Multiaccess Communication

Multiaccess Communication Information Networks p. 1 Multiaccess Communication Satellite systems, radio networks (WLAN), Ethernet segment The received signal is the sum of attenuated transmitted signals from a set of other nodes,

More information

Bounding the End-to-End Response Times of Tasks in a Distributed. Real-Time System Using the Direct Synchronization Protocol.

Bounding the End-to-End Response Times of Tasks in a Distributed. Real-Time System Using the Direct Synchronization Protocol. Bounding the End-to-End Response imes of asks in a Distributed Real-ime System Using the Direct Synchronization Protocol Jun Sun Jane Liu Abstract In a distributed real-time system, a task may consist

More information

Performance Evaluation of Deadline Monotonic Policy over protocol

Performance Evaluation of Deadline Monotonic Policy over protocol Performance Evaluation of Deadline Monotonic Policy over 80. protocol Ines El Korbi and Leila Azouz Saidane National School of Computer Science University of Manouba, 00 Tunisia Emails: ines.korbi@gmail.com

More information

Performance analysis of IEEE WLANs with saturated and unsaturated sources

Performance analysis of IEEE WLANs with saturated and unsaturated sources 1 Performance analysis of IEEE 8.11 WLANs with saturated and unsaturated sources Suong H. Nguyen, Student Member, IEEE, Hai L. Vu, Senior Member, IEEE, and Lachlan L. H. Andrew, Senior Member, IEEE Abstract

More information

Performance analysis of IEEE WLANs with saturated and unsaturated sources

Performance analysis of IEEE WLANs with saturated and unsaturated sources Performance analysis of IEEE 82.11 WLANs with saturated and unsaturated sources Suong H. Nguyen, Hai L. Vu, Lachlan L. H. Andrew Centre for Advanced Internet Architectures, Technical Report 11811A Swinburne

More information

16:330:543 Communication Networks I Midterm Exam November 7, 2005

16:330:543 Communication Networks I Midterm Exam November 7, 2005 l l l l l l l l 1 3 np n = ρ 1 ρ = λ µ λ. n= T = E[N] = 1 λ µ λ = 1 µ 1. 16:33:543 Communication Networks I Midterm Exam November 7, 5 You have 16 minutes to complete this four problem exam. If you know

More information

P e = 0.1. P e = 0.01

P e = 0.1. P e = 0.01 23 10 0 10-2 P e = 0.1 Deadline Failure Probability 10-4 10-6 10-8 P e = 0.01 10-10 P e = 0.001 10-12 10 11 12 13 14 15 16 Number of Slots in a Frame Fig. 10. The deadline failure probability as a function

More information

A POPULATION-MIX DRIVEN APPROXIMATION FOR QUEUEING NETWORKS WITH FINITE CAPACITY REGIONS

A POPULATION-MIX DRIVEN APPROXIMATION FOR QUEUEING NETWORKS WITH FINITE CAPACITY REGIONS A POPULATION-MIX DRIVEN APPROXIMATION FOR QUEUEING NETWORKS WITH FINITE CAPACITY REGIONS J. Anselmi 1, G. Casale 2, P. Cremonesi 1 1 Politecnico di Milano, Via Ponzio 34/5, I-20133 Milan, Italy 2 Neptuny

More information

Power Allocation and Coverage for a Relay-Assisted Downlink with Voice Users

Power Allocation and Coverage for a Relay-Assisted Downlink with Voice Users Power Allocation and Coverage for a Relay-Assisted Downlink with Voice Users Junjik Bae, Randall Berry, and Michael L. Honig Department of Electrical Engineering and Computer Science Northwestern University,

More information

Service differentiation without prioritization in IEEE WLANs

Service differentiation without prioritization in IEEE WLANs Service differentiation without prioritization in IEEE 8. WLANs Suong H. Nguyen, Student Member, IEEE, Hai L. Vu, Senior Member, IEEE, and Lachlan L. H. Andrew, Senior Member, IEEE Abstract Wireless LANs

More information

Channel Allocation Using Pricing in Satellite Networks

Channel Allocation Using Pricing in Satellite Networks Channel Allocation Using Pricing in Satellite Networks Jun Sun and Eytan Modiano Laboratory for Information and Decision Systems Massachusetts Institute of Technology {junsun, modiano}@mitedu Abstract

More information

Design and Analysis of a Propagation Delay Tolerant ALOHA Protocol for Underwater Networks

Design and Analysis of a Propagation Delay Tolerant ALOHA Protocol for Underwater Networks Design and Analysis of a Propagation Delay Tolerant ALOHA Protocol for Underwater Networks Joon Ahn a, Affan Syed b, Bhaskar Krishnamachari a, John Heidemann b a Ming Hsieh Department of Electrical Engineering,

More information

Impact of Cross Traffic Burstiness on the Packet-scale Paradigm An Extended Analysis

Impact of Cross Traffic Burstiness on the Packet-scale Paradigm An Extended Analysis Impact of ross Traffic Burstiness on the Packet-scale Paradigm An Extended Analysis Rebecca Lovewell and Jasleen Kaur Technical Report # TR11-007 Department of omputer Science University of North arolina

More information

A Simple Model for the Window Size Evolution of TCP Coupled with MAC and PHY Layers

A Simple Model for the Window Size Evolution of TCP Coupled with MAC and PHY Layers A Simple Model for the Window Size Evolution of TCP Coupled with and PHY Layers George Papageorgiou, John S. Baras Institute for Systems Research, University of Maryland, College Par, MD 20742 Email: gpapag,

More information

Lan Performance LAB Ethernet : CSMA/CD TOKEN RING: TOKEN

Lan Performance LAB Ethernet : CSMA/CD TOKEN RING: TOKEN Lan Performance LAB Ethernet : CSMA/CD TOKEN RING: TOKEN Ethernet Frame Format 7 b y te s 1 b y te 2 o r 6 b y te s 2 o r 6 b y te s 2 b y te s 4-1 5 0 0 b y te s 4 b y te s P r e a m b le S ta r t F r

More information

On the Stability and Optimal Decentralized Throughput of CSMA with Multipacket Reception Capability

On the Stability and Optimal Decentralized Throughput of CSMA with Multipacket Reception Capability On the Stability and Optimal Decentralized Throughput of CSMA with Multipacket Reception Capability Douglas S. Chan Toby Berger Lang Tong School of Electrical & Computer Engineering Cornell University,

More information

WiFi MAC Models David Malone

WiFi MAC Models David Malone WiFi MAC Models David Malone November 26, MACSI Hamilton Institute, NUIM, Ireland Talk outline Introducing the 82.11 CSMA/CA MAC. Finite load 82.11 model and its predictions. Issues with standard 82.11,

More information

Queueing Theory I Summary! Little s Law! Queueing System Notation! Stationary Analysis of Elementary Queueing Systems " M/M/1 " M/M/m " M/M/1/K "

Queueing Theory I Summary! Little s Law! Queueing System Notation! Stationary Analysis of Elementary Queueing Systems  M/M/1  M/M/m  M/M/1/K Queueing Theory I Summary Little s Law Queueing System Notation Stationary Analysis of Elementary Queueing Systems " M/M/1 " M/M/m " M/M/1/K " Little s Law a(t): the process that counts the number of arrivals

More information

Discrete Random Variables

Discrete Random Variables CPSC 53 Systems Modeling and Simulation Discrete Random Variables Dr. Anirban Mahanti Department of Computer Science University of Calgary mahanti@cpsc.ucalgary.ca Random Variables A random variable is

More information

cs/ee/ids 143 Communication Networks

cs/ee/ids 143 Communication Networks cs/ee/ids 143 Communication Networks Chapter 4 Transport Text: Walrand & Parakh, 2010 Steven Low CMS, EE, Caltech Agenda Internetworking n Routing across LANs, layer2-layer3 n DHCP n NAT Transport layer

More information

Environment (E) IBP IBP IBP 2 N 2 N. server. System (S) Adapter (A) ACV

Environment (E) IBP IBP IBP 2 N 2 N. server. System (S) Adapter (A) ACV The Adaptive Cross Validation Method - applied to polling schemes Anders Svensson and Johan M Karlsson Department of Communication Systems Lund Institute of Technology P. O. Box 118, 22100 Lund, Sweden

More information

Modeling Approximations for an IEEE WLAN under Poisson MAC-Level Arrivals

Modeling Approximations for an IEEE WLAN under Poisson MAC-Level Arrivals Modeling Approximations for an IEEE 802.11 WLAN under Poisson MAC-Level Arrivals Ioannis Koukoutsidis 1 and Vasilios A. Siris 1,2 1 FORTH-ICS, P.O. Box 1385, 71110 Heraklion, Crete, Greece 2 Computer Science

More information

Power Laws in ALOHA Systems

Power Laws in ALOHA Systems Power Laws in ALOHA Systems E6083: lecture 8 Prof. Predrag R. Jelenković Dept. of Electrical Engineering Columbia University, NY 10027, USA predrag@ee.columbia.edu March 6, 2007 Jelenković (Columbia University)

More information

Exact Distribution of Access Delay in IEEE DCF MAC

Exact Distribution of Access Delay in IEEE DCF MAC Exact Distribution of Access Delay in IEEE 8.11 DCF MAC Teerawat Issariyakul, Dusit Niyato, Ekram Hossain, and Attahiru Sule Alfa University of Manitoba and TRLabs Winnipeg, MB, Canada. Email: teerawat,

More information

Robust Network Codes for Unicast Connections: A Case Study

Robust Network Codes for Unicast Connections: A Case Study Robust Network Codes for Unicast Connections: A Case Study Salim Y. El Rouayheb, Alex Sprintson, and Costas Georghiades Department of Electrical and Computer Engineering Texas A&M University College Station,

More information

Bounded Delay for Weighted Round Robin with Burst Crediting

Bounded Delay for Weighted Round Robin with Burst Crediting Bounded Delay for Weighted Round Robin with Burst Crediting Sponsor: Sprint Kert Mezger David W. Petr Technical Report TISL-0230-08 Telecommunications and Information Sciences Laboratory Department of

More information

Data Gathering and Personalized Broadcasting in Radio Grids with Interferences

Data Gathering and Personalized Broadcasting in Radio Grids with Interferences Data Gathering and Personalized Broadcasting in Radio Grids with Interferences Jean-Claude Bermond a,, Bi Li a,b, Nicolas Nisse a, Hervé Rivano c, Min-Li Yu d a Coati Project, INRIA I3S(CNRS/UNSA), Sophia

More information

Continuous-Model Communication Complexity with Application in Distributed Resource Allocation in Wireless Ad hoc Networks

Continuous-Model Communication Complexity with Application in Distributed Resource Allocation in Wireless Ad hoc Networks Continuous-Model Communication Complexity with Application in Distributed Resource Allocation in Wireless Ad hoc Networks Husheng Li 1 and Huaiyu Dai 2 1 Department of Electrical Engineering and Computer

More information

Radio Network Clustering from Scratch

Radio Network Clustering from Scratch Radio Network Clustering from Scratch Fabian Kuhn, Thomas Moscibroda, Roger Wattenhofer {kuhn,moscitho,wattenhofer}@inf.ethz.ch Department of Computer Science, ETH Zurich, 8092 Zurich, Switzerland Abstract.

More information

Multiplicative Multifractal Modeling of. Long-Range-Dependent (LRD) Trac in. Computer Communications Networks. Jianbo Gao and Izhak Rubin

Multiplicative Multifractal Modeling of. Long-Range-Dependent (LRD) Trac in. Computer Communications Networks. Jianbo Gao and Izhak Rubin Multiplicative Multifractal Modeling of Long-Range-Dependent (LRD) Trac in Computer Communications Networks Jianbo Gao and Izhak Rubin Electrical Engineering Department, University of California, Los Angeles

More information

1 Modelling and Simulation

1 Modelling and Simulation 1 Modelling and Simulation 1.1 Introduction This course teaches various aspects of computer-aided modelling for the performance evaluation of computer systems and communication networks. The performance

More information

IEEE abc-01/22r1

IEEE abc-01/22r1 Project IEEE 802.16 Broadband Wireless Access Working Group Title An ARQ proposal for consideration by TG3/4 MAC group Date Submitted 2001-08 -31 Source(s) Yigal Leiba Itzik Kitroser

More information

Performance Evaluation of Queuing Systems

Performance Evaluation of Queuing Systems Performance Evaluation of Queuing Systems Introduction to Queuing Systems System Performance Measures & Little s Law Equilibrium Solution of Birth-Death Processes Analysis of Single-Station Queuing Systems

More information

Data Gathering and Personalized Broadcasting in Radio Grids with Interferences

Data Gathering and Personalized Broadcasting in Radio Grids with Interferences Data Gathering and Personalized Broadcasting in Radio Grids with Interferences Jean-Claude Bermond a,b,, Bi Li b,a,c, Nicolas Nisse b,a, Hervé Rivano d, Min-Li Yu e a Univ. Nice Sophia Antipolis, CNRS,

More information

On the Throughput-Optimality of CSMA Policies in Multihop Wireless Networks

On the Throughput-Optimality of CSMA Policies in Multihop Wireless Networks Technical Report Computer Networks Research Lab Department of Computer Science University of Toronto CNRL-08-002 August 29th, 2008 On the Throughput-Optimality of CSMA Policies in Multihop Wireless Networks

More information

STABILITY OF FINITE-USER SLOTTED ALOHA UNDER PARTIAL INTERFERENCE IN WIRELESS MESH NETWORKS

STABILITY OF FINITE-USER SLOTTED ALOHA UNDER PARTIAL INTERFERENCE IN WIRELESS MESH NETWORKS The 8th Annual IEEE International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC 7) STABILITY OF FINITE-USER SLOTTED ALOHA UNDER PARTIAL INTERFERENCE IN WIRELESS MESH NETWORKS Ka-Hung

More information

Random Access Game. Medium Access Control Design for Wireless Networks 1. Sandip Chakraborty. Department of Computer Science and Engineering,

Random Access Game. Medium Access Control Design for Wireless Networks 1. Sandip Chakraborty. Department of Computer Science and Engineering, Random Access Game Medium Access Control Design for Wireless Networks 1 Sandip Chakraborty Department of Computer Science and Engineering, INDIAN INSTITUTE OF TECHNOLOGY KHARAGPUR October 22, 2016 1 Chen

More information

Agressive Transmissions over Redundant Paths for Time Critical Messages

Agressive Transmissions over Redundant Paths for Time Critical Messages Agressive Transmissions over Redundant Paths for Time Critical Messages Hector Garcia-Molina Department of Computer Science Stanford University Stanford CA 94305 Ben Kao Department of Computer Science

More information

On Equilibria of Distributed Message-Passing Games

On Equilibria of Distributed Message-Passing Games On Equilibria of Distributed Message-Passing Games Concetta Pilotto and K. Mani Chandy California Institute of Technology, Computer Science Department 1200 E. California Blvd. MC 256-80 Pasadena, US {pilotto,mani}@cs.caltech.edu

More information

On the Throughput, Capacity and Stability Regions of Random Multiple Access over Standard Multi-Packet Reception Channels

On the Throughput, Capacity and Stability Regions of Random Multiple Access over Standard Multi-Packet Reception Channels On the Throughput, Capacity and Stability Regions of Random Multiple Access over Standard Multi-Packet Reception Channels Jie Luo, Anthony Ephremides ECE Dept. Univ. of Maryland College Park, MD 20742

More information

Methodology for Computer Science Research Lecture 4: Mathematical Modeling

Methodology for Computer Science Research Lecture 4: Mathematical Modeling Methodology for Computer Science Research Andrey Lukyanenko Department of Computer Science and Engineering Aalto University, School of Science and Technology andrey.lukyanenko@tkk.fi Definitions and Goals

More information

Optimal Association of Stations and APs in an IEEE WLAN

Optimal Association of Stations and APs in an IEEE WLAN Optimal Association of Stations and APs in an IEEE 802. WLAN Anurag Kumar and Vinod Kumar Abstract We propose a maximum utility based formulation for the problem of optimal association of wireless stations

More information

Performance Analysis of the IEEE e Block ACK Scheme in a Noisy Channel

Performance Analysis of the IEEE e Block ACK Scheme in a Noisy Channel Performance Analysis of the IEEE 802.11e Block ACK Scheme in a Noisy Channel Tianji Li, Qiang Ni, Hamilton Institute, NUIM, Ireland. Thierry Turletti, Planete Group, INRIA, France. Yang Xiao, University

More information

EE 550: Notes on Markov chains, Travel Times, and Opportunistic Routing

EE 550: Notes on Markov chains, Travel Times, and Opportunistic Routing EE 550: Notes on Markov chains, Travel Times, and Opportunistic Routing Michael J. Neely University of Southern California http://www-bcf.usc.edu/ mjneely 1 Abstract This collection of notes provides a

More information

On queueing in coded networks queue size follows degrees of freedom

On queueing in coded networks queue size follows degrees of freedom On queueing in coded networks queue size follows degrees of freedom Jay Kumar Sundararajan, Devavrat Shah, Muriel Médard Laboratory for Information and Decision Systems, Massachusetts Institute of Technology,

More information

A Comprehensive Study of the IEEE e Enhanced Distributed Control Access (EDCA) Function. Chunyu Hu and Jennifer C. Hou.

A Comprehensive Study of the IEEE e Enhanced Distributed Control Access (EDCA) Function. Chunyu Hu and Jennifer C. Hou. Report No. UIUCDCS-R-26-27 UILU-ENG-26-743 A Comprehensive Study of the IEEE 82.e Enhanced Distributed Control Access EDCA) Function by Chunyu Hu and Jennifer C. Hou April 26 A Comprehensive Study of the

More information

On the MAC for Power-Line Communications: Modeling Assumptions and Performance Tradeoffs

On the MAC for Power-Line Communications: Modeling Assumptions and Performance Tradeoffs On the MAC for Power-Line Communications: Modeling Assumptions and Performance Tradeoffs Technical Report Christina Vlachou, Albert Banchs, Julien Herzen, Patrick Thiran EPFL, Switzerland, Institute IMDEA

More information

1 Introduction During the execution of a distributed computation, processes exchange information via messages. The message exchange establishes causal

1 Introduction During the execution of a distributed computation, processes exchange information via messages. The message exchange establishes causal Quasi-Synchronous heckpointing: Models, haracterization, and lassication D. Manivannan Mukesh Singhal Department of omputer and Information Science The Ohio State University olumbus, OH 43210 (email: fmanivann,singhalg@cis.ohio-state.edu)

More information

Che-Wei Chang Department of Computer Science and Information Engineering, Chang Gung University

Che-Wei Chang Department of Computer Science and Information Engineering, Chang Gung University Che-Wei Chang chewei@mail.cgu.edu.tw Department of Computer Science and Information Engineering, Chang Gung University } 2017/11/15 Midterm } 2017/11/22 Final Project Announcement 2 1. Introduction 2.

More information

Design and Analysis of Multichannel Slotted ALOHA for Machine-to-Machine Communication

Design and Analysis of Multichannel Slotted ALOHA for Machine-to-Machine Communication Design and Analysis of Multichannel Slotted ALOHA for Machine-to-Machine Communication Chih-Hua Chang and Ronald Y. Chang School of Electrical and Computer Engineering, Purdue University, USA Research

More information

1 Introduction During the execution of a distributed computation, processes exchange information via messages. The message exchange establishes causal

1 Introduction During the execution of a distributed computation, processes exchange information via messages. The message exchange establishes causal TR No. OSU-ISR-5/96-TR33, Dept. of omputer and Information Science, The Ohio State University. Quasi-Synchronous heckpointing: Models, haracterization, and lassication D. Manivannan Mukesh Singhal Department

More information

ANALYSIS OF A PARTIAL DECORRELATOR IN A MULTI-CELL DS/CDMA SYSTEM

ANALYSIS OF A PARTIAL DECORRELATOR IN A MULTI-CELL DS/CDMA SYSTEM ANAYSIS OF A PARTIA DECORREATOR IN A MUTI-CE DS/CDMA SYSTEM Mohammad Saquib ECE Department, SU Baton Rouge, A 70803-590 e-mail: saquib@winlab.rutgers.edu Roy Yates WINAB, Rutgers University Piscataway

More information

CS115 Computer Simulation Project list

CS115 Computer Simulation Project list CS115 Computer Simulation Project list The final project for this class is worth 40% of your grade. Below are your choices. You only need to do one of them. Project MC: Monte Carlo vs. Deterministic Volume

More information

CSE 123: Computer Networks

CSE 123: Computer Networks CSE 123: Computer Networks Total points: 40 Homework 1 - Solutions Out: 10/4, Due: 10/11 Solutions 1. Two-dimensional parity Given below is a series of 7 7-bit items of data, with an additional bit each

More information

II. THE TWO-WAY TWO-RELAY CHANNEL

II. THE TWO-WAY TWO-RELAY CHANNEL An Achievable Rate Region for the Two-Way Two-Relay Channel Jonathan Ponniah Liang-Liang Xie Department of Electrical Computer Engineering, University of Waterloo, Canada Abstract We propose an achievable

More information

Distributed Systems Principles and Paradigms. Chapter 06: Synchronization

Distributed Systems Principles and Paradigms. Chapter 06: Synchronization Distributed Systems Principles and Paradigms Maarten van Steen VU Amsterdam, Dept. Computer Science Room R4.20, steen@cs.vu.nl Chapter 06: Synchronization Version: November 16, 2009 2 / 39 Contents Chapter

More information

Lecture on Sensor Networks

Lecture on Sensor Networks Lecture on Sensor Networks Cyclic Historical Redundancy Development Copyright (c) 2008 Dr. Thomas Haenselmann (University of Mannheim, Germany). Permission is granted to copy, distribute and/or modify

More information

Burst Scheduling Based on Time-slotting and Fragmentation in WDM Optical Burst Switched Networks

Burst Scheduling Based on Time-slotting and Fragmentation in WDM Optical Burst Switched Networks Burst Scheduling Based on Time-slotting and Fragmentation in WDM Optical Burst Switched Networks G. Mohan, M. Ashish, and K. Akash Department of Electrical and Computer Engineering National University

More information

Agreement. Today. l Coordination and agreement in group communication. l Consensus

Agreement. Today. l Coordination and agreement in group communication. l Consensus Agreement Today l Coordination and agreement in group communication l Consensus Events and process states " A distributed system a collection P of N singlethreaded processes w/o shared memory Each process

More information

On Two Class-Constrained Versions of the Multiple Knapsack Problem

On Two Class-Constrained Versions of the Multiple Knapsack Problem On Two Class-Constrained Versions of the Multiple Knapsack Problem Hadas Shachnai Tami Tamir Department of Computer Science The Technion, Haifa 32000, Israel Abstract We study two variants of the classic

More information

Integrity-Oriented Content Transmission in Highway Vehicular Ad Hoc Networks

Integrity-Oriented Content Transmission in Highway Vehicular Ad Hoc Networks VANET Analysis Integrity-Oriented Content Transmission in Highway Vehicular Ad Hoc Networks Tom Hao Luan, Xuemin (Sherman) Shen, and Fan Bai BBCR, ECE, University of Waterloo, Waterloo, Ontario, N2L 3G1,

More information

Capacity and Delay Tradeoffs for Ad-Hoc Mobile Networks

Capacity and Delay Tradeoffs for Ad-Hoc Mobile Networks IEEE TRASACTIOS O IFORMATIO THEORY 1 Capacity and Delay Tradeoffs for Ad-Hoc Mobile etworks Michael J. eely University of Southern California mjneely@usc.edu http://www-rcf.usc.edu/ mjneely Eytan Modiano

More information

Distributed Systems Principles and Paradigms

Distributed Systems Principles and Paradigms Distributed Systems Principles and Paradigms Chapter 6 (version April 7, 28) Maarten van Steen Vrije Universiteit Amsterdam, Faculty of Science Dept. Mathematics and Computer Science Room R4.2. Tel: (2)

More information

Reliable Data Transport: Sliding Windows

Reliable Data Transport: Sliding Windows Reliable Data Transport: Sliding Windows 6.02 Fall 2013 Lecture 23 Exclusive! A Brief History of the Internet guest lecture by Prof. Hari Balakrishnan Wenesday December 4, 2013, usual 6.02 lecture time

More information

2009), URL

2009), URL Title A queue with multiple stable regions Author(s) Li, GL; Li, VOK Citation The 25th UK Performance Engineering Workshop (UKPEW 29), Leeds, U.K., 6-7 July 29. Issued Date 29 URL http://hdl.handle.net/1722/129698

More information

arxiv: v1 [cs.dc] 30 Mar 2015

arxiv: v1 [cs.dc] 30 Mar 2015 Uniform Information Exchange in Multi-channel Wireless Ad Hoc Networks arxiv:1503.08570v1 [cs.dc] 30 Mar 2015 Li Ning Center for High Performance Computing Shenzhen Institutes of Advanced Technology, CAS

More information

CHAPTER 4. Networks of queues. 1. Open networks Suppose that we have a network of queues as given in Figure 4.1. Arrivals

CHAPTER 4. Networks of queues. 1. Open networks Suppose that we have a network of queues as given in Figure 4.1. Arrivals CHAPTER 4 Networks of queues. Open networks Suppose that we have a network of queues as given in Figure 4.. Arrivals Figure 4.. An open network can occur from outside of the network to any subset of nodes.

More information

Throughput-Delay Analysis of Random Linear Network Coding for Wireless Broadcasting

Throughput-Delay Analysis of Random Linear Network Coding for Wireless Broadcasting Throughput-Delay Analysis of Random Linear Network Coding for Wireless Broadcasting Swapna B.T., Atilla Eryilmaz, and Ness B. Shroff Departments of ECE and CSE The Ohio State University Columbus, OH 43210

More information

DISTRIBUTED COMPUTER SYSTEMS

DISTRIBUTED COMPUTER SYSTEMS DISTRIBUTED COMPUTER SYSTEMS SYNCHRONIZATION Dr. Jack Lange Computer Science Department University of Pittsburgh Fall 2015 Topics Clock Synchronization Physical Clocks Clock Synchronization Algorithms

More information

`First Come, First Served' can be unstable! Thomas I. Seidman. Department of Mathematics and Statistics. University of Maryland Baltimore County

`First Come, First Served' can be unstable! Thomas I. Seidman. Department of Mathematics and Statistics. University of Maryland Baltimore County revision2: 9/4/'93 `First Come, First Served' can be unstable! Thomas I. Seidman Department of Mathematics and Statistics University of Maryland Baltimore County Baltimore, MD 21228, USA e-mail: hseidman@math.umbc.edui

More information

Bit Error Period Determination and Optimal Frame Length Prediction for a Noisy Communication Channel

Bit Error Period Determination and Optimal Frame Length Prediction for a Noisy Communication Channel Bit Error Period Determination and Optimal Frame Length Prediction for a oisy Communication Channel Georgi Atanasov aydenov and Petko Stoyanov Stoyanov Faculty of Science and Technology, Technical University

More information

Channel Selection in Cognitive Radio Networks with Opportunistic RF Energy Harvesting

Channel Selection in Cognitive Radio Networks with Opportunistic RF Energy Harvesting 1 Channel Selection in Cognitive Radio Networks with Opportunistic RF Energy Harvesting Dusit Niyato 1, Ping Wang 1, and Dong In Kim 2 1 School of Computer Engineering, Nanyang Technological University

More information

Degradable Agreement in the Presence of. Byzantine Faults. Nitin H. Vaidya. Technical Report #

Degradable Agreement in the Presence of. Byzantine Faults. Nitin H. Vaidya. Technical Report # Degradable Agreement in the Presence of Byzantine Faults Nitin H. Vaidya Technical Report # 92-020 Abstract Consider a system consisting of a sender that wants to send a value to certain receivers. Byzantine

More information

Analyzing Contention and Backoff in Asynchronous Shared Memory

Analyzing Contention and Backoff in Asynchronous Shared Memory Analyzing Contention and Backoff in Asynchronous Shared Memory ABSTRACT Naama Ben-David Carnegie Mellon University nbendavi@cs.cmu.edu Randomized backoff protocols have long been used to reduce contention

More information

14 Random Variables and Simulation

14 Random Variables and Simulation 14 Random Variables and Simulation In this lecture note we consider the relationship between random variables and simulation models. Random variables play two important roles in simulation models. We assume

More information

CS 700: Quantitative Methods & Experimental Design in Computer Science

CS 700: Quantitative Methods & Experimental Design in Computer Science CS 700: Quantitative Methods & Experimental Design in Computer Science Sanjeev Setia Dept of Computer Science George Mason University Logistics Grade: 35% project, 25% Homework assignments 20% midterm,

More information

Optimal Discrete Search with Imperfect Specicity

Optimal Discrete Search with Imperfect Specicity Optimal Discrete Search with Imperfect Specicity Moshe Kress, Kyle Y. Lin, and Roberto Szechtman Operations Research Department Naval Postgraduate School, Monterey, California 93943 April 16, 2007 Abstract

More information

Queueing Theory and Simulation. Introduction

Queueing Theory and Simulation. Introduction Queueing Theory and Simulation Based on the slides of Dr. Dharma P. Agrawal, University of Cincinnati and Dr. Hiroyuki Ohsaki Graduate School of Information Science & Technology, Osaka University, Japan

More information

ESTIMATION OF THE BURST LENGTH IN OBS NETWORKS

ESTIMATION OF THE BURST LENGTH IN OBS NETWORKS ESTIMATION OF THE BURST LENGTH IN OBS NETWORKS Pallavi S. Department of CSE, Sathyabama University Chennai, Tamilnadu, India pallavi.das12@gmail.com M. Lakshmi Department of CSE, Sathyabama University

More information

AGREEMENT PROBLEMS (1) Agreement problems arise in many practical applications:

AGREEMENT PROBLEMS (1) Agreement problems arise in many practical applications: AGREEMENT PROBLEMS (1) AGREEMENT PROBLEMS Agreement problems arise in many practical applications: agreement on whether to commit or abort the results of a distributed atomic action (e.g. database transaction)

More information

ECE 3511: Communications Networks Theory and Analysis. Fall Quarter Instructor: Prof. A. Bruce McDonald. Lecture Topic

ECE 3511: Communications Networks Theory and Analysis. Fall Quarter Instructor: Prof. A. Bruce McDonald. Lecture Topic ECE 3511: Communications Networks Theory and Analysis Fall Quarter 2002 Instructor: Prof. A. Bruce McDonald Lecture Topic Introductory Analysis of M/G/1 Queueing Systems Module Number One Steady-State

More information

CPU SCHEDULING RONG ZHENG

CPU SCHEDULING RONG ZHENG CPU SCHEDULING RONG ZHENG OVERVIEW Why scheduling? Non-preemptive vs Preemptive policies FCFS, SJF, Round robin, multilevel queues with feedback, guaranteed scheduling 2 SHORT-TERM, MID-TERM, LONG- TERM

More information