Giuseppe Bianchi, Ilenia Tinnirello

Size: px
Start display at page:

Download "Giuseppe Bianchi, Ilenia Tinnirello"

Transcription

1 Capacity of WLAN Networs

2 Summary Ł Ł Ł Ł

3 Arbitrary networ capacity [Gupta & Kumar The Capacity of Wireless Networs ] Ł! Ł "!

4 Receiver Model Ł Ł # Ł $%&% Ł $% '( * &%* r (1+ r Ł + 1 / n 1 / n log n

5 Area consumption for each TX Ł Ł,,

6 Area consumption for each TX Ł Ł,,

7 Area consumption for each TX r1 > r1 >(1+ r1 Ł Ł,,

8 Area consumption for each TX > r1 Ł Ł,,

9 Area consumption for each TX > r2 Ł Ł,,

10 Area consumption for each TX > (r1+r2/2 Ł Ł,,-

11 Area consumption for each TX > (r1+r2/2 Ł./

12 Area consumption for each TX r1/2 r2/2 Ł./

13 Area consumption for each TX Ł./0, Ł, 1 2

14 Bound on consumption area Ł 31 Ł 442 Ł 56/-1 2

15 Area Constraint Ł 7 6,4 n / 2 i1 2 1 ( r i 4 4 A

16 Channel Constraints Ł ' 5 / ' (5 / (95 65 Ł - : 1 Ł + & '/9 ;& &.: Ł./5& nt b1 h( b h1 1( H h th hop of bit b is on channel m in slot s nt b1 h( b n WT 2 W m n 2

17 Space Constraints Ł Ł < r( h, b 16 Ł &,0 5&./../ 65& Ł &4& nt h( b b1 h1 2 2 r ( h, b 16 AWT nt h( b b1 h1 r 2 ( h, b H 16AWT 2 H

18 Convexity Convexity nt b b h h nt b b h h H WT A H b h r b h r H 1 2 ( ( 1 16, (, ( 1

19 Space + Channel Constraints + Convexity Ł - $ 4 1 H nt h( b b1 h1 r( h, b 2 nt h( b b1 h1 r 2 ( h, b H 16AWT 2 H nt R nt h( b b1 h1 r( h, b 16AWT 2 H

20 Capacity upper bound Ł = 5&./ 4 nt R 16AWT 2 H WT 8An 8A W 1 R n Ł & W / n Ł > 2 W / n log n

21 Conclusions Ł? n / log n n Ł & Ł + 3 #,5> B

22 Performance Analysis of single-hop DCF

23 Throughput Ł Represents the system efficiency (different definitions. Ł Overheads: bacoff, monitoring times, collisions, headers, ACK/RTS/CTS. Payload bits transmitted in average per each second Fraction of the channel time used for payload transmissions (normalized throughput

24 Delay Ł Time required for a pacet to reach the destination after it leaves the source. Ł Three different components: queue delay, service access delay, transmission delay. queue access tx

25 Saturation Analysis fered load meas. throughput of 0,85 0,80 0,75 0,70 0,65 0,60 0,55 offered load (nominal offered load (measured throughput (measured simulation time (seconds Fixed number of stations, varying arrival rate Arrival rate higher than maximum throughput -> transmission queues build up until saturation (always full Saturation throughput : limit reached by the system throughput as the offered load increases

26 DCF Overheads

27 Frame Transmission Time Ł Let R be the data rate and R* the control rate. Ł Let P be the MSDU size [byte]. 20*8/R* 14*8/R* + 28*8/R P*8/R 14*8/R* T FRAME = T MPDU + SIFS + T ACK +DIFS T FRAME = T RTS + SIFS + T CTS +SIFS + T MPDU + SIFS + T ACK +DIFS

28 different rates (P=1500 bytes RTS/CTS Basic RTS/CTS Basic Tra nsmssion Time (use c DIFS Ave Bacoff RTS+SIFS CTS+SIFS Payload+SIFS ACK

29 Protocol Overhead Ł Suppose to have just a single station, with a never empty queue Ł Each transmission is originated after a bacoff counter expiration Ł Since no collision is possible, and no channel error is considered, each bacoff is extracted in the range [0, CW min ] TX CYCLE A B C D ENTIRE TX PROCESS Ł Different transmission cycles on the channel, composed of: 1 frame transmission time, which depends on the MSDU size; 2 random delay time, which depends on the bacoff extraction.

30 Max Throughput Computation TX CYCLE A B C D b B b C b D ENTIRE TX PROCESS Ł From the throughput definition: S P i T FRAME b i i Ł After each transmission, bacoff counters are regenerated. From Renewal Theory: S E[ T E[ P] ] E[ b] FRAME Ł In the case of fixed pacet size, given CW min : S T FRAME P CW min / 2

31 Max Throughput Max Throughput (normalized (normalized! " # $ % & ' ( * +.-, / / , / /

32 Saturation Throughput Analysis

33 DCF Bianchi s model approach Step 1: Discrete-Time model of bacoff for tagged STA bacground STAs summarize into a unique collision probability value p bacground STA Step 2: find transmission prob. t Result: t versus p non-lin function Step 3: assume bacground STAs behave as tagged STA, i.e. transmit with probability t Result: p versus t non-lin function Step 4: solve non linear 2eqs system Tagged STA Finite number n of STA Step 5: find performance figures Throughput, Delay

34 Discrete Not Uniform Time scale Bacoff for station A FRAME ACK SIFS DIFS A Slot time = Time interval between two consecutive bacoff time counter decrements: idle bacoff slot busy time + DIFS + 1 bacoff slot

35 DCF as -persistent CSMA Model Time. Actual Time -In each system slot, each station accesses with probability (and does not access with probability 1-. -Each system slot can assume 3 different sizes: idle slot, successful slot, collision slot. -The ey assumption is that is fixed slot by slot (and then also the collision probability p.

36 Channel Access Probability Given the time scale, 1 transmission every bacoff + 1 slot slots 7 slots 10 slots Note that the access cycle length in discrete time slot is not related to the actual channel time (e.g., the last cycle is the shortest cycle according the channel time, but the longest one according to the model time Whenever W 0 =W 1 =..=W R =W, from renewal theory: =1 / (W/2+1 = 1/ (E[W] + 1 (alternatively, 1/ =E[W]+1 In general, the access time depends on the bacoff stage, i.e. on the number of consecutive collisions.. N.B. Access cycle = transmission cycle for a given station

37 Formal derivation Formal derivation i s TX P TX i s P TX P i s P i s TX P i s P TX i s P TX P / ( / ( ( ( / ( ( / ( ( R o i R i i s TX P TX i s P TX P i s P i s TX P 0 / ( / ( 1 ( 1 ( / (

38 Bacoff stage Probablity Suppose to now the collision probability p: We are in stage i if we were in stage i-1 in the previous attempt and we experienced a collision: Pr(s=i/TX=Pr(s=i-1/TX p; After a success or after R collisions, we come bac to stage 0. Then, this probability has a geometric distribution: i (1 p p P( s i TX i(0,1,... R R1 1 p 1-p p p p R 1-p 1-p 1

39 Channel Access Probability (2 We can finally express the channel access probability as a function of the collision probability p and of the average bacoff values W i /2: 1 p 1 p 1 W R i i p 1 R 1 i0 2 Note: does not depend on the bacoff value distribution, but only on the average value!!!

40 How much is p??? The conditional collision probability p, i.e. the probability to experience a collision in a given slot, given that the tagged station is transmitting, is the probability that at least one of the other N-1 stations is accessing the channel. If we assume that all the stations have the same behavior, and then access the channel with probability, it is easily expressed as: p=1 (1- N-1

41 From &p to Throughput Performance S P E[ T s SUCC Ps E[ P] ] P E[ T c COLL ] P idle Ps E[ P] E[ slot] P N-1 s : Pr success in a contention slot = N (1- =N (1-p P idle = 1- (1- N P c = 1-P S -P idle

42 Delay Computation Ł Very easy, via Little s Result! Clients: Contending pacets which will be ultimately delivered Server: DCF protocol Delay: system permanence time D = E[N] / acc Ł In static scenarios and saturation: A new client is accepted if the pacet is transmitted before the retry limit expiration Arrival rate : e new pacet arrives to the system : When a pacet is successfully transmitted When a pacet is dropped because of a retry limit expiration Accepted traffic acc =throughput! acc ST1 ST4 ST2 ST3 ST5

43 Retry Limit = Ł = Throughput [p/s] D N S / N E[ P] N P S E[ slot] ST2 ST4 ST1 ST5 ST3

44 Ł E[N] = N(1-p lost Retry Limit = R D E[ N] acc N(1 plost S / E[ P] acc ST2 ST4 ST3 R ST1 ST5

45 Pacet loss probability Pacet loss probability Ł In a generic contention slot, with access probability, the pacet loss probability depends on the number of already suffered collisions: R i lost i s P i s lost P p 0 ( / ( i 0 i R p i s lost P 1 / ( 2 / (1 1 (1 / ( / ( ( ( 1 i R i W p p p i s TX P TX i s P TX P i s P

46 How to tae into account the 2-way or 4-way access mode? Ł By simply defining opportunely frame transmission times and collision times. Assuming fixed MPDU size: BASIC ACCESS: T FRAME = T MPDU + SIFS + T ACK + DIFS T COLL RTS/CTS: = T MPDU + DIFS T FRAME = T RTS + SIFS + T CTS +SIFS T MPDU + SIFS + T ACK + DIFS T COLL = T RTS + DIFS Note: The channel access probability and the collision probability do not depend on the employed access mode!

47

48

49 EDCA model

50 CW differentiation < 5 (1 2 p (1 2(1 2 p p R 1 (1 W p (1 R p 1 (1 (2 p R 1,13 p C (1 r 1 1 (1 n r

51 Per Per-class Throughput class Throughput < & (1 1 1 ( 1, 1 C r r n r n success p n n P r & c C r success C r n r C r s success C r n r success T P T P E P P S r r ( (1 1 ( (1 ] [ (

52 Throughput Ratio Throughput Ratio ( ( P j P S S success success j +4 2 W 1 2 j j j j j j j n W W n W n W n n n S S (1 (1

53 Performance Optimizations

54

55

56 Throughput vs CWmin P=1000 bytes

57 And in actual networs? Ł CW opt =f(load, AIFSN, but.. Load estimation Function f evaluation f depends on the traffic sources, which need to be estimated and modeled! complex f expressions for notsaturated traffic sources no close expression for every traffic conditions..

58 How to compute CWopt? Ł Our solution: not fixed CWmin, but adaptive corrections on the basis of the channel monitoring status, to force idle slots and collision equalization [Gallagher]? CWmin = CWopt CWmin(t = CWmin(t-1 + CW CW has an opposite effects on the two different events of channel wastes of the access protocol: BACKOFF, COLLISIONS Large CW -> too long bacoff expirations Small CW -> too high collision probability Optimal CW as a tradeoff between these channel wastes different tuning algorithms are possible based on: If (COLLISIONS > BACKOFF -> increase the CWmin If (BACKOFF > COLLISIONS -> decrease the CWmin No estimation of the system status, but simple channel monitoring of BACKOFF and COLLISIONS Intrinsically suitable for dynamic networ conditions

59 An example Ł Ł Assume that every 10 seconds a new data station joins the networ.. At each beacon: double the contention window at each beacon in which the collisions overcome the bacoff times; half the contention window at each beacon in which the bacoff overcomes the collision times time

60 An example Ł Ł Assume that every 10 seconds a new data station joins the networ.. At each beacon: double the contention window at each beacon in which the collisions overcome the bacoff times; half the contention window at each beacon in which the bacoff overcomes the collision times time

61 An example Ł Ł Assume that every 10 seconds a new data station joins the networ.. At each beacon: double the contention window at each beacon in which the collisions overcome the bacoff times; half the contention window at each beacon in which the bacoff overcomes the collision times time

62 References: Ł G. Bianchi, Performance Analysis of the IEEE Distributed Coordination Function, IEEE Journal on Selected Areas in Communications, vol. 18, no. 3, March 2000 Ł G. Bianchi, and I. Tinnirello, Remars on IEEE DCF Performance Analysis, to appear in IEEE Communication Letters Ł F. Cali, M. Conti, and E. Gregori, "Dynamic Tuning of the IEEE Protocol to Achieve a Theoretical Throughput Limit," IEEE/ACM Trans. Networing (TON, vol. 8, No. 6, Dec Ł Giuseppe Bianchi and Sunghyun Choi, "IEEE Ad-Hoc Networs," a chapter in Wireless Ad hoc and Sensor Networs, Ed. Kluwer, to be published in 2004.

Giuseppe Bianchi, Ilenia Tinnirello

Giuseppe Bianchi, Ilenia Tinnirello Capacity of WLAN Networs Summary Per-node throughput in case of: Full connected networs each node sees all the others Generic networ topology not all nodes are visible Performance Analysis of single-hop

More information

Mathematical Analysis of IEEE Energy Efficiency

Mathematical Analysis of IEEE Energy Efficiency Information Engineering Department University of Padova Mathematical Analysis of IEEE 802.11 Energy Efficiency A. Zanella and F. De Pellegrini IEEE WPMC 2004 Padova, Sept. 12 15, 2004 A. Zanella and F.

More information

Performance Analysis of the IEEE e Block ACK Scheme in a Noisy Channel

Performance Analysis of the IEEE e Block ACK Scheme in a Noisy Channel Performance Analysis of the IEEE 802.11e Block ACK Scheme in a Noisy Channel Tianji Li, Qiang Ni, Hamilton Institute, NUIM, Ireland. Thierry Turletti, Planete Group, INRIA, France. Yang Xiao, University

More information

WiFi MAC Models David Malone

WiFi MAC Models David Malone WiFi MAC Models David Malone November 26, MACSI Hamilton Institute, NUIM, Ireland Talk outline Introducing the 82.11 CSMA/CA MAC. Finite load 82.11 model and its predictions. Issues with standard 82.11,

More information

Wireless Internet Exercises

Wireless Internet Exercises Wireless Internet Exercises Prof. Alessandro Redondi 2018-05-28 1 WLAN 1.1 Exercise 1 A Wi-Fi network has the following features: Physical layer transmission rate: 54 Mbps MAC layer header: 28 bytes MAC

More information

Performance analysis of IEEE WLANs with saturated and unsaturated sources

Performance analysis of IEEE WLANs with saturated and unsaturated sources Performance analysis of IEEE 82.11 WLANs with saturated and unsaturated sources Suong H. Nguyen, Hai L. Vu, Lachlan L. H. Andrew Centre for Advanced Internet Architectures, Technical Report 11811A Swinburne

More information

Modeling Approximations for an IEEE WLAN under Poisson MAC-Level Arrivals

Modeling Approximations for an IEEE WLAN under Poisson MAC-Level Arrivals Modeling Approximations for an IEEE 802.11 WLAN under Poisson MAC-Level Arrivals Ioannis Koukoutsidis 1 and Vasilios A. Siris 1,2 1 FORTH-ICS, P.O. Box 1385, 71110 Heraklion, Crete, Greece 2 Computer Science

More information

Performance Evaluation of Deadline Monotonic Policy over protocol

Performance Evaluation of Deadline Monotonic Policy over protocol Performance Evaluation of Deadline Monotonic Policy over 80. protocol Ines El Korbi and Leila Azouz Saidane National School of Computer Science University of Manouba, 00 Tunisia Emails: ines.korbi@gmail.com

More information

A Comprehensive Study of the IEEE e Enhanced Distributed Control Access (EDCA) Function. Chunyu Hu and Jennifer C. Hou.

A Comprehensive Study of the IEEE e Enhanced Distributed Control Access (EDCA) Function. Chunyu Hu and Jennifer C. Hou. Report No. UIUCDCS-R-26-27 UILU-ENG-26-743 A Comprehensive Study of the IEEE 82.e Enhanced Distributed Control Access EDCA) Function by Chunyu Hu and Jennifer C. Hou April 26 A Comprehensive Study of the

More information

Modeling the Effect of Transmission Errors on TCP Controlled Transfers over Infrastructure Wireless LANs

Modeling the Effect of Transmission Errors on TCP Controlled Transfers over Infrastructure Wireless LANs Modeling the Effect of Transmission Errors on TCP Controlled Transfers over Infrastructure 8 Wireless LANs ABSTRACT Subhashini Krishnasamy Dept of Electrical Communication Engg Indian Institute of Science,

More information

Service differentiation without prioritization in IEEE WLANs

Service differentiation without prioritization in IEEE WLANs Service differentiation without prioritization in IEEE 8. WLANs Suong H. Nguyen, Student Member, IEEE, Hai L. Vu, Senior Member, IEEE, and Lachlan L. H. Andrew, Senior Member, IEEE Abstract Wireless LANs

More information

Performance analysis of IEEE WLANs with saturated and unsaturated sources

Performance analysis of IEEE WLANs with saturated and unsaturated sources 1 Performance analysis of IEEE 8.11 WLANs with saturated and unsaturated sources Suong H. Nguyen, Student Member, IEEE, Hai L. Vu, Senior Member, IEEE, and Lachlan L. H. Andrew, Senior Member, IEEE Abstract

More information

requests/sec. The total channel load is requests/sec. Using slot as the time unit, the total channel load is 50 ( ) = 1

requests/sec. The total channel load is requests/sec. Using slot as the time unit, the total channel load is 50 ( ) = 1 Prof. X. Shen E&CE 70 : Examples #2 Problem Consider the following Aloha systems. (a) A group of N users share a 56 kbps pure Aloha channel. Each user generates at a Passion rate of one 000-bit packet

More information

Exact Distribution of Access Delay in IEEE DCF MAC

Exact Distribution of Access Delay in IEEE DCF MAC Exact Distribution of Access Delay in IEEE 8.11 DCF MAC Teerawat Issariyakul, Dusit Niyato, Ekram Hossain, and Attahiru Sule Alfa University of Manitoba and TRLabs Winnipeg, MB, Canada. Email: teerawat,

More information

Detecting Stations Cheating on Backoff Rules in Networks Using Sequential Analysis

Detecting Stations Cheating on Backoff Rules in Networks Using Sequential Analysis Detecting Stations Cheating on Backoff Rules in 82.11 Networks Using Sequential Analysis Yanxia Rong Department of Computer Science George Washington University Washington DC Email: yxrong@gwu.edu Sang-Kyu

More information

On the Validity of IEEE MAC Modeling Hypotheses

On the Validity of IEEE MAC Modeling Hypotheses On the Validity of IEEE 82.11 MAC Modeling Hypotheses K. D. Huang, K. R. Duffy and D. Malone Hamilton Institute, National University of Ireland, Maynooth, Ireland. Corresponding author: ken.duffy@nuim.ie

More information

Modeling and Simulation NETW 707

Modeling and Simulation NETW 707 Modeling and Simulation NETW 707 Lecture 6 ARQ Modeling: Modeling Error/Flow Control Course Instructor: Dr.-Ing. Maggie Mashaly maggie.ezzat@guc.edu.eg C3.220 1 Data Link Layer Data Link Layer provides

More information

Chapter 5. Elementary Performance Analysis

Chapter 5. Elementary Performance Analysis Chapter 5 Elementary Performance Analysis 1 5.0 2 5.1 Ref: Mischa Schwartz Telecommunication Networks Addison-Wesley publishing company 1988 3 4 p t T m T P(k)= 5 6 5.2 : arrived rate : service rate 7

More information

Optimization of IEEE Multirate Wireless LAN

Optimization of IEEE Multirate Wireless LAN JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 26 77-785 (200) Optimization of IEEE 802 Multirate Wireless LAN A V BABU LILLYKUTTY JACOB AND S ABDUL SUBHAN Department of Electronics and Communication Engineering

More information

On the MAC for Power-Line Communications: Modeling Assumptions and Performance Tradeoffs

On the MAC for Power-Line Communications: Modeling Assumptions and Performance Tradeoffs On the MAC for Power-Line Communications: Modeling Assumptions and Performance Tradeoffs Technical Report Christina Vlachou, Albert Banchs, Julien Herzen, Patrick Thiran EPFL, Switzerland, Institute IMDEA

More information

Mean Field Markov Models of Wireless Local Area Networks

Mean Field Markov Models of Wireless Local Area Networks Mean Field Markov Models of Wireless Local Area Networks Ken R. Duffy 26 th September 2010; revised 8 th April 2010. To appear in Markov Processes and Related Fields Abstract In 1998, Giuseppe Bianchi

More information

Effective Capacity-based Stochastic Delay Guarantees for Systems with Time-Varying Servers, with an Application to IEEE 802.

Effective Capacity-based Stochastic Delay Guarantees for Systems with Time-Varying Servers, with an Application to IEEE 802. Effective Capacity-based Stochastic Delay Guarantees for Systems with Time-Varying Servers, with an Application to IEEE 802.11 WLANs Emmanouil Kafetzakis a,b, Kimon Kontovasilis a,, Ioannis Stavrakakis

More information

ANALYSIS OF THE RTS/CTS MULTIPLE ACCESS SCHEME WITH CAPTURE EFFECT

ANALYSIS OF THE RTS/CTS MULTIPLE ACCESS SCHEME WITH CAPTURE EFFECT ANALYSIS OF THE RTS/CTS MULTIPLE ACCESS SCHEME WITH CAPTURE EFFECT Chin Keong Ho Eindhoven University of Technology Eindhoven, The Netherlands Jean-Paul M. G. Linnartz Philips Research Laboratories Eindhoven,

More information

P e = 0.1. P e = 0.01

P e = 0.1. P e = 0.01 23 10 0 10-2 P e = 0.1 Deadline Failure Probability 10-4 10-6 10-8 P e = 0.01 10-10 P e = 0.001 10-12 10 11 12 13 14 15 16 Number of Slots in a Frame Fig. 10. The deadline failure probability as a function

More information

On the Energy Efficiency of IEEE WLANs

On the Energy Efficiency of IEEE WLANs On the Energy Efficiency of IEEE 8. WLs Pablo Serrano, ndres Garcia-Saavedra Depto. de Ingeniería Telemática Universidad arlos III de Madrid vda. Universidad, 3 89 Leganés, Spain {pablo, agsaaved}@it.uc3m.es

More information

Optimal Physical Carrier Sense for Maximizing Network Capacity in Multi-hop Wireless Networks

Optimal Physical Carrier Sense for Maximizing Network Capacity in Multi-hop Wireless Networks Optimal Physical Carrier Sense for Maximizing Network Capacity in Multi-hop Wireless Networks Kyung-Joon Park, Jihyuk Choi, and Jennifer C. Hou Department of Computer Science University of Illinois at

More information

Random Access Protocols ALOHA

Random Access Protocols ALOHA Random Access Protocols ALOHA 1 ALOHA Invented by N. Abramson in 1970-Pure ALOHA Uncontrolled users (no coordination among users) Same packet (frame) size Instant feedback Large (~ infinite) population

More information

1. WiMAX Wi-Fi Wi-Fi (AP) Wi-Fi 1 1 AP AP WLAN [1] [1] [1] WLAN [4] WLAN WLAN WLAN 1 WLAN WLAN WLAN N =3 [1] W

1. WiMAX Wi-Fi Wi-Fi (AP) Wi-Fi 1 1 AP AP WLAN [1] [1] [1] WLAN [4] WLAN WLAN WLAN 1 WLAN WLAN WLAN N =3 [1] W [] LAN 263 8522 1-33 514-857 1577 NEC 211-8666 1753 464-861 E-mail: {aoki@, kmr@faculty., shioda@faculty., sekiya@faculty.}chiba-u.jp, k.sanada@elec.mie-u.ac.jp 一般社団法人 電子情報通信学会 信学技報 THE INSTITUTE OF ELECTRONICS,

More information

PERFORMANCE ANALYSIS OF WIRELESS LANS: AN INTEGRATED PACKET/FLOW LEVEL APPROACH

PERFORMANCE ANALYSIS OF WIRELESS LANS: AN INTEGRATED PACKET/FLOW LEVEL APPROACH PERFORMANCE ANALYSIS OF WIRELESS LANS: AN INTEGRATED PACKET/FLOW LEVEL APPROACH Remco Litjens 1,FrankRoijers, Hans van den Berg,, Richard J. Boucherie, and Maria Fleuren Knowledge Innovation Center, TNO

More information

Information in Aloha Networks

Information in Aloha Networks Achieving Proportional Fairness using Local Information in Aloha Networks Koushik Kar, Saswati Sarkar, Leandros Tassiulas Abstract We address the problem of attaining proportionally fair rates using Aloha

More information

ATM VP-Based Ring Network Exclusive Video or Data Traffics

ATM VP-Based Ring Network Exclusive Video or Data Traffics ATM VP-Based Ring Network Exclusive Video or Data Traffics In this chapter, the performance characteristic of the proposed ATM VP-Based Ring Network exclusive video or data traffic is studied. The maximum

More information

Capacity and Delay Tradeoffs for Ad-Hoc Mobile Networks

Capacity and Delay Tradeoffs for Ad-Hoc Mobile Networks IEEE TRASACTIOS O IFORMATIO THEORY 1 Capacity and Delay Tradeoffs for Ad-Hoc Mobile etworks Michael J. eely University of Southern California mjneely@usc.edu http://www-rcf.usc.edu/ mjneely Eytan Modiano

More information

Dynamic Power Allocation and Routing for Time Varying Wireless Networks

Dynamic Power Allocation and Routing for Time Varying Wireless Networks Dynamic Power Allocation and Routing for Time Varying Wireless Networks X 14 (t) X 12 (t) 1 3 4 k a P ak () t P a tot X 21 (t) 2 N X 2N (t) X N4 (t) µ ab () rate µ ab µ ab (p, S 3 ) µ ab µ ac () µ ab (p,

More information

Integrity-Oriented Content Transmission in Highway Vehicular Ad Hoc Networks

Integrity-Oriented Content Transmission in Highway Vehicular Ad Hoc Networks VANET Analysis Integrity-Oriented Content Transmission in Highway Vehicular Ad Hoc Networks Tom Hao Luan, Xuemin (Sherman) Shen, and Fan Bai BBCR, ECE, University of Waterloo, Waterloo, Ontario, N2L 3G1,

More information

Queueing Theory I Summary! Little s Law! Queueing System Notation! Stationary Analysis of Elementary Queueing Systems " M/M/1 " M/M/m " M/M/1/K "

Queueing Theory I Summary! Little s Law! Queueing System Notation! Stationary Analysis of Elementary Queueing Systems  M/M/1  M/M/m  M/M/1/K Queueing Theory I Summary Little s Law Queueing System Notation Stationary Analysis of Elementary Queueing Systems " M/M/1 " M/M/m " M/M/1/K " Little s Law a(t): the process that counts the number of arrivals

More information

TRANSMISSION STRATEGIES FOR SINGLE-DESTINATION WIRELESS NETWORKS

TRANSMISSION STRATEGIES FOR SINGLE-DESTINATION WIRELESS NETWORKS The 20 Military Communications Conference - Track - Waveforms and Signal Processing TRANSMISSION STRATEGIES FOR SINGLE-DESTINATION WIRELESS NETWORKS Gam D. Nguyen, Jeffrey E. Wieselthier 2, Sastry Kompella,

More information

Multicast With Prioritized Delivery: How Fresh is Your Data?

Multicast With Prioritized Delivery: How Fresh is Your Data? Multicast With Prioritized Delivery: How Fresh is Your Data? Jing Zhong, Roy D Yates and Emina Solanin Department of ECE, Rutgers University, {ingzhong, ryates, eminasolanin}@rutgersedu arxiv:885738v [csit

More information

TCP over Cognitive Radio Channels

TCP over Cognitive Radio Channels 1/43 TCP over Cognitive Radio Channels Sudheer Poojary Department of ECE, Indian Institute of Science, Bangalore IEEE-IISc I-YES seminar 19 May 2016 2/43 Acknowledgments The work presented here was done

More information

Wireless MAC Protocol Classification /Performance Wireless MAC 프로토콜성능분석

Wireless MAC Protocol Classification /Performance Wireless MAC 프로토콜성능분석 무선통신망 MAC 프로토콜성능분석 2007. 05. 6 Wireless Information and Network Engineering Research Lab. School of Electrical amd Computer Engineering Ajou University, Korea E-mail : jkim@ajou.ac.kr Homepage: http://madang.ajou.ac.kr/~jkim

More information

Maximum Sum Rate of Slotted Aloha with Capture

Maximum Sum Rate of Slotted Aloha with Capture Maximum Sum Rate of Slotted Aloha with Capture Yitong Li and Lin Dai, Senior Member, IEEE arxiv:50.03380v3 [cs.it] 7 Dec 205 Abstract The sum rate performance of random-access networks crucially depends

More information

STABILITY OF FINITE-USER SLOTTED ALOHA UNDER PARTIAL INTERFERENCE IN WIRELESS MESH NETWORKS

STABILITY OF FINITE-USER SLOTTED ALOHA UNDER PARTIAL INTERFERENCE IN WIRELESS MESH NETWORKS The 8th Annual IEEE International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC 7) STABILITY OF FINITE-USER SLOTTED ALOHA UNDER PARTIAL INTERFERENCE IN WIRELESS MESH NETWORKS Ka-Hung

More information

Random Access Game. Medium Access Control Design for Wireless Networks 1. Sandip Chakraborty. Department of Computer Science and Engineering,

Random Access Game. Medium Access Control Design for Wireless Networks 1. Sandip Chakraborty. Department of Computer Science and Engineering, Random Access Game Medium Access Control Design for Wireless Networks 1 Sandip Chakraborty Department of Computer Science and Engineering, INDIAN INSTITUTE OF TECHNOLOGY KHARAGPUR October 22, 2016 1 Chen

More information

16:330:543 Communication Networks I Midterm Exam November 7, 2005

16:330:543 Communication Networks I Midterm Exam November 7, 2005 l l l l l l l l 1 3 np n = ρ 1 ρ = λ µ λ. n= T = E[N] = 1 λ µ λ = 1 µ 1. 16:33:543 Communication Networks I Midterm Exam November 7, 5 You have 16 minutes to complete this four problem exam. If you know

More information

Timestepped Stochastic Simulation. of WLANs

Timestepped Stochastic Simulation. of WLANs Timestepped Stochastic Simulation 1 of 82.11 WLANs Arunchandar Vasan and A. Udaya Shankar Department of Computer Science and UMIACS University of Maryland College Park, MD 2742 CS-TR-4866 and UMIACS-TR-27-19

More information

A Simple Model for the Window Size Evolution of TCP Coupled with MAC and PHY Layers

A Simple Model for the Window Size Evolution of TCP Coupled with MAC and PHY Layers A Simple Model for the Window Size Evolution of TCP Coupled with and PHY Layers George Papageorgiou, John S. Baras Institute for Systems Research, University of Maryland, College Par, MD 20742 Email: gpapag,

More information

IEEE abc-01/22r1

IEEE abc-01/22r1 Project IEEE 802.16 Broadband Wireless Access Working Group Title An ARQ proposal for consideration by TG3/4 MAC group Date Submitted 2001-08 -31 Source(s) Yigal Leiba Itzik Kitroser

More information

Introduction to queuing theory

Introduction to queuing theory Introduction to queuing theory Claude Rigault ENST claude.rigault@enst.fr Introduction to Queuing theory 1 Outline The problem The number of clients in a system The client process Delay processes Loss

More information

Collision-aware Design of Rate Adaptation for Multi-rate WLANs

Collision-aware Design of Rate Adaptation for Multi-rate WLANs Collision-aware Design of Rate Adaptation for Multi-rate 82. WLANs Jaehyuk Choi, Jongkeun Na, Yeon-sup Lim, Kihong Park, Member, IEEE, and Chong-kwon Kim, Member, IEEE Abstract One of the key challenges

More information

A New Technique for Link Utilization Estimation

A New Technique for Link Utilization Estimation A New Technique for Link Utilization Estimation in Packet Data Networks using SNMP Variables S. Amarnath and Anurag Kumar* Dept. of Electrical Communication Engineering Indian Institute of Science, Bangalore

More information

A POMDP Framework for Cognitive MAC Based on Primary Feedback Exploitation

A POMDP Framework for Cognitive MAC Based on Primary Feedback Exploitation A POMDP Framework for Cognitive MAC Based on Primary Feedback Exploitation Karim G. Seddik and Amr A. El-Sherif 2 Electronics and Communications Engineering Department, American University in Cairo, New

More information

Computer Networks More general queuing systems

Computer Networks More general queuing systems Computer Networks More general queuing systems Saad Mneimneh Computer Science Hunter College of CUNY New York M/G/ Introduction We now consider a queuing system where the customer service times have a

More information

Max-min Fairness in Mesh Networks

Max-min Fairness in Mesh Networks Max-min Fairness in 802. Mesh Networks Douglas J. Leith, Qizhi Cao, Vijay G. Subramanian Hamilton Institute, NUI Maynooth arxiv:002.58v2 [cs.ni] 3 Mar 200 Abstract In this paper we build upon the recent

More information

Channel Probing in Communication Systems: Myopic Policies Are Not Always Optimal

Channel Probing in Communication Systems: Myopic Policies Are Not Always Optimal Channel Probing in Communication Systems: Myopic Policies Are Not Always Optimal Matthew Johnston, Eytan Modiano Laboratory for Information and Decision Systems Massachusetts Institute of Technology Cambridge,

More information

On the stability of flow-aware CSMA

On the stability of flow-aware CSMA On the stability of flow-aware CSMA Thomas Bonald, Mathieu Feuillet To cite this version: Thomas Bonald, Mathieu Feuillet. On the stability of flow-aware CSMA. Performance Evaluation, Elsevier, 010, .

More information

Bit Error Period Determination and Optimal Frame Length Prediction for a Noisy Communication Channel

Bit Error Period Determination and Optimal Frame Length Prediction for a Noisy Communication Channel Bit Error Period Determination and Optimal Frame Length Prediction for a oisy Communication Channel Georgi Atanasov aydenov and Petko Stoyanov Stoyanov Faculty of Science and Technology, Technical University

More information

Energy Optimal Control for Time Varying Wireless Networks. Michael J. Neely University of Southern California

Energy Optimal Control for Time Varying Wireless Networks. Michael J. Neely University of Southern California Energy Optimal Control for Time Varying Wireless Networks Michael J. Neely University of Southern California http://www-rcf.usc.edu/~mjneely Part 1: A single wireless downlink (L links) L 2 1 S={Totally

More information

BIRTH DEATH PROCESSES AND QUEUEING SYSTEMS

BIRTH DEATH PROCESSES AND QUEUEING SYSTEMS BIRTH DEATH PROCESSES AND QUEUEING SYSTEMS Andrea Bobbio Anno Accademico 999-2000 Queueing Systems 2 Notation for Queueing Systems /λ mean time between arrivals S = /µ ρ = λ/µ N mean service time traffic

More information

Performance Analysis and Evaluation of Digital Connection Oriented Internet Service Systems

Performance Analysis and Evaluation of Digital Connection Oriented Internet Service Systems Performance Analysis and Evaluation of Digital Connection Oriented Internet Service Systems Shunfu Jin 1 and Wuyi Yue 2 1 College of Information Science and Engineering Yanshan University, Qinhuangdao

More information

Optimal Association of Stations and APs in an IEEE WLAN

Optimal Association of Stations and APs in an IEEE WLAN Optimal Association of Stations and APs in an IEEE 802. WLAN Anurag Kumar and Vinod Kumar Abstract We propose a maximum utility based formulation for the problem of optimal association of wireless stations

More information

Lan Performance LAB Ethernet : CSMA/CD TOKEN RING: TOKEN

Lan Performance LAB Ethernet : CSMA/CD TOKEN RING: TOKEN Lan Performance LAB Ethernet : CSMA/CD TOKEN RING: TOKEN Ethernet Frame Format 7 b y te s 1 b y te 2 o r 6 b y te s 2 o r 6 b y te s 2 b y te s 4-1 5 0 0 b y te s 4 b y te s P r e a m b le S ta r t F r

More information

Approximate Queueing Model for Multi-rate Multi-user MIMO systems.

Approximate Queueing Model for Multi-rate Multi-user MIMO systems. An Approximate Queueing Model for Multi-rate Multi-user MIMO systems Boris Bellalta,Vanesa Daza, Miquel Oliver Abstract A queueing model for Multi-rate Multi-user MIMO systems is presented. The model is

More information

Analysis of random-access MAC schemes

Analysis of random-access MAC schemes Analysis of random-access MA schemes M. Veeraraghavan and Tao i ast updated: Sept. 203. Slotted Aloha [4] First-order analysis: if we assume there are infinite number of nodes, the number of new arrivals

More information

On queueing in coded networks queue size follows degrees of freedom

On queueing in coded networks queue size follows degrees of freedom On queueing in coded networks queue size follows degrees of freedom Jay Kumar Sundararajan, Devavrat Shah, Muriel Médard Laboratory for Information and Decision Systems, Massachusetts Institute of Technology,

More information

CSE 123: Computer Networks

CSE 123: Computer Networks CSE 123: Computer Networks Total points: 40 Homework 1 - Solutions Out: 10/4, Due: 10/11 Solutions 1. Two-dimensional parity Given below is a series of 7 7-bit items of data, with an additional bit each

More information

Performance Analysis of a Threshold-Based Relay Selection Algorithm in Wireless Networks

Performance Analysis of a Threshold-Based Relay Selection Algorithm in Wireless Networks Communications and Networ, 2010, 2, 87-92 doi:10.4236/cn.2010.22014 Published Online May 2010 (http://www.scirp.org/journal/cn Performance Analysis of a Threshold-Based Relay Selection Algorithm in Wireless

More information

Cross-layer Theoretical Analysis of NC-aided. Cooperative ARQ Protocols in Correlated Shadowed Environments (Extended Version)

Cross-layer Theoretical Analysis of NC-aided. Cooperative ARQ Protocols in Correlated Shadowed Environments (Extended Version) Cross-layer Theoretical Analysis of NC-aided Cooperative ARQ Protocols in Correlated Shadowed Environments (Extended Version) Angelos Antonopoulos, Member, IEEE, Aris S. Lalos, Member, IEEE, arxiv:408.609v

More information

On Selfish Behavior in CSMA/CA Networks

On Selfish Behavior in CSMA/CA Networks On Selfish Behavior in CSMA/CA Networks Mario Čagalj1 Saurabh Ganeriwal 2 Imad Aad 1 Jean-Pierre Hubaux 1 1 LCA-IC-EPFL 2 NESL-EE-UCLA March 17, 2005 - IEEE Infocom 2005 - Introduction CSMA/CA is the most

More information

Cooperative HARQ with Poisson Interference and Opportunistic Routing

Cooperative HARQ with Poisson Interference and Opportunistic Routing Cooperative HARQ with Poisson Interference and Opportunistic Routing Amogh Rajanna & Mostafa Kaveh Department of Electrical and Computer Engineering University of Minnesota, Minneapolis, MN USA. Outline

More information

Throughput and Fairness Analysis of based Vehicle-to-Infrastructure Data Transfers

Throughput and Fairness Analysis of based Vehicle-to-Infrastructure Data Transfers 211 Eighth IEEE International Conference on Mobile Ad-Hoc and Sensor Systems Throughput and Fairness Analysis of 82.11-based Vehicle-to-Infrastructure Data Transfers Raffaele Bruno, Marco Conti Institute

More information

Analyzing Queuing Systems with Coupled Processors. through Semidefinite Programming

Analyzing Queuing Systems with Coupled Processors. through Semidefinite Programming Analyzing Queuing Systems with Coupled Processors through Semidefinite Programming Balaji Rengarajan, Constantine Caramanis, and Gustavo de Veciana Dept. of Electrical and Computer Engineering The University

More information

Computer Networks ( Classroom Practice Booklet Solutions)

Computer Networks ( Classroom Practice Booklet Solutions) Computer Networks ( Classroom Practice Booklet Solutions). Concept Of Layering 0. Ans: (b) Sol: Data Link Layer is responsible for decoding bit stream into frames. 0. Ans: (c) Sol: Network Layer has the

More information

On the Throughput, Capacity and Stability Regions of Random Multiple Access over Standard Multi-Packet Reception Channels

On the Throughput, Capacity and Stability Regions of Random Multiple Access over Standard Multi-Packet Reception Channels On the Throughput, Capacity and Stability Regions of Random Multiple Access over Standard Multi-Packet Reception Channels Jie Luo, Anthony Ephremides ECE Dept. Univ. of Maryland College Park, MD 20742

More information

Markov decision processes with threshold-based piecewise-linear optimal policies

Markov decision processes with threshold-based piecewise-linear optimal policies 1/31 Markov decision processes with threshold-based piecewise-linear optimal policies T. Erseghe, A. Zanella, C. Codemo Dept. of Information Engineering, University of Padova, Italy Padova, June 2, 213

More information

Message Delivery Probability of Two-Hop Relay with Erasure Coding in MANETs

Message Delivery Probability of Two-Hop Relay with Erasure Coding in MANETs 01 7th International ICST Conference on Communications and Networking in China (CHINACOM) Message Delivery Probability of Two-Hop Relay with Erasure Coding in MANETs Jiajia Liu Tohoku University Sendai,

More information

Exploiting the Capture Effect to Enhance RACH Performance in Cellular-Based M2M Communications

Exploiting the Capture Effect to Enhance RACH Performance in Cellular-Based M2M Communications sensors Article Exploiting the Capture Effect to Enhance RACH Performance in Cellular-Based M2M Communications Jonghun Kim and Jaiyong Lee * Ubiquitous Network Laboratory, School of Electrical and Electronic

More information

arxiv:submit/ [cs.ni] 2 Apr 2011

arxiv:submit/ [cs.ni] 2 Apr 2011 Author manuscript, published in "Queueing Systems 72, 1-2 (212) 139-16" Performance of CSMA in Multi-Channel Wireless Networs Thomas Bonald and Mathieu Feuillet arxiv:submit/22429 [cs.ni] 2 Apr 211 April

More information

Optimal Sleeping Mechanism for Multiple Servers with MMPP-Based Bursty Traffic Arrival

Optimal Sleeping Mechanism for Multiple Servers with MMPP-Based Bursty Traffic Arrival 1 Optimal Sleeping Mechanism for Multiple Servers with MMPP-Based Bursty Traffic Arrival Zhiyuan Jiang, Bhaskar Krishnamachari, Sheng Zhou, arxiv:1711.07912v1 [cs.it] 21 Nov 2017 Zhisheng Niu, Fellow,

More information

On the Throughput-Optimality of CSMA Policies in Multihop Wireless Networks

On the Throughput-Optimality of CSMA Policies in Multihop Wireless Networks Technical Report Computer Networks Research Lab Department of Computer Science University of Toronto CNRL-08-002 August 29th, 2008 On the Throughput-Optimality of CSMA Policies in Multihop Wireless Networks

More information

Lecture on Sensor Networks

Lecture on Sensor Networks Lecture on Sensor Networks Cyclic Historical Redundancy Development Copyright (c) 2008 Dr. Thomas Haenselmann (University of Mannheim, Germany). Permission is granted to copy, distribute and/or modify

More information

Design and Analysis of a Propagation Delay Tolerant ALOHA Protocol for Underwater Networks

Design and Analysis of a Propagation Delay Tolerant ALOHA Protocol for Underwater Networks Design and Analysis of a Propagation Delay Tolerant ALOHA Protocol for Underwater Networks Joon Ahn a, Affan Syed b, Bhaskar Krishnamachari a, John Heidemann b a Ming Hsieh Department of Electrical Engineering,

More information

Open Loop Optimal Control of Base Station Activation for Green Networks

Open Loop Optimal Control of Base Station Activation for Green Networks Open Loop Optimal Control of Base Station Activation for Green etworks Sreenath Ramanath, Veeraruna Kavitha,2 and Eitan Altman IRIA, Sophia-Antipolis, France, 2 Universite d Avignon, Avignon, France Abstract

More information

On the Stability and Optimal Decentralized Throughput of CSMA with Multipacket Reception Capability

On the Stability and Optimal Decentralized Throughput of CSMA with Multipacket Reception Capability On the Stability and Optimal Decentralized Throughput of CSMA with Multipacket Reception Capability Douglas S. Chan Toby Berger Lang Tong School of Electrical & Computer Engineering Cornell University,

More information

Methodology for Computer Science Research Lecture 4: Mathematical Modeling

Methodology for Computer Science Research Lecture 4: Mathematical Modeling Methodology for Computer Science Research Andrey Lukyanenko Department of Computer Science and Engineering Aalto University, School of Science and Technology andrey.lukyanenko@tkk.fi Definitions and Goals

More information

Power Controlled FCFS Splitting Algorithm for Wireless Networks

Power Controlled FCFS Splitting Algorithm for Wireless Networks Power Controlled FCFS Splitting Algorithm for Wireless Networks Ashutosh Deepak Gore Abhay Karandikar Department of Electrical Engineering Indian Institute of Technology - Bombay COMNET Workshop, July

More information

HDR - A Hysteresis-Driven Routing Algorithm for Energy Harvesting Tag Networks

HDR - A Hysteresis-Driven Routing Algorithm for Energy Harvesting Tag Networks HDR - A Hysteresis-Driven Routing Algorithm for Energy Harvesting Tag Networks Adrian Segall arxiv:1512.06997v1 [cs.ni] 22 Dec 2015 March 12, 2018 Abstract The work contains a first attempt to treat the

More information

The impact of varying channel capacity on the quality of advanced data services in PCS networks

The impact of varying channel capacity on the quality of advanced data services in PCS networks The impact of varying channel capacity on the quality of advanced data services in PCS networks Markus Fiedler Dept. of Telecommunications and Signal Processing, University of Karlskrona/Ronneby, S-371

More information

STABILITY OF MULTICLASS QUEUEING NETWORKS UNDER LONGEST-QUEUE AND LONGEST-DOMINATING-QUEUE SCHEDULING

STABILITY OF MULTICLASS QUEUEING NETWORKS UNDER LONGEST-QUEUE AND LONGEST-DOMINATING-QUEUE SCHEDULING Applied Probability Trust (7 May 2015) STABILITY OF MULTICLASS QUEUEING NETWORKS UNDER LONGEST-QUEUE AND LONGEST-DOMINATING-QUEUE SCHEDULING RAMTIN PEDARSANI and JEAN WALRAND, University of California,

More information

Generalized Two-Hop Relay for Flexible Delay Control in MANETs

Generalized Two-Hop Relay for Flexible Delay Control in MANETs Generalized Two-Hop Relay for Flexible Delay Control in MANETs 12 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media,

More information

Performance Evaluation of Queuing Systems

Performance Evaluation of Queuing Systems Performance Evaluation of Queuing Systems Introduction to Queuing Systems System Performance Measures & Little s Law Equilibrium Solution of Birth-Death Processes Analysis of Single-Station Queuing Systems

More information

SCHEDULING is one of the core problems in the design

SCHEDULING is one of the core problems in the design IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, VOL. 66, NO. 6, JUNE 2017 5387 Head-of-Line Access Delay-Based Scheduling Algorithm for Flow-Level Dynamics Yi Chen, Student Member, IEEE, Xuan Wang, and Lin

More information

An Improved Bound for Minimizing the Total Weighted Completion Time of Coflows in Datacenters

An Improved Bound for Minimizing the Total Weighted Completion Time of Coflows in Datacenters IEEE/ACM TRANSACTIONS ON NETWORKING An Improved Bound for Minimizing the Total Weighted Completion Time of Coflows in Datacenters Mehrnoosh Shafiee, Student Member, IEEE, and Javad Ghaderi, Member, IEEE

More information

Discrete Random Variables

Discrete Random Variables CPSC 53 Systems Modeling and Simulation Discrete Random Variables Dr. Anirban Mahanti Department of Computer Science University of Calgary mahanti@cpsc.ucalgary.ca Random Variables A random variable is

More information

Residual White Space Distribution Based Opportunistic Channel Access Scheme for Cognitive Radio Systems. Technical Report: TR-CSE June 2010

Residual White Space Distribution Based Opportunistic Channel Access Scheme for Cognitive Radio Systems. Technical Report: TR-CSE June 2010 Residual White Space Distribution Based Opportunistic Channel Access Scheme for Cognitive Radio Systems Technical Report: TR-CSE-010-30 June 010 Manuj Sharma, Anirudha Sahoo Department of Computer Science

More information

Residual White Space Distribution Based Opportunistic Channel Access Scheme for Cognitive Radio Systems. Technical Report: TR-CSE March 2010

Residual White Space Distribution Based Opportunistic Channel Access Scheme for Cognitive Radio Systems. Technical Report: TR-CSE March 2010 Residual White Space Distribution Based Opportunistic Channel Access Scheme for Cognitive Radio Systems Technical Report: TR-CSE-010-6 March 010 Manuj Sharma, Anirudha Sahoo Department of Computer Science

More information

On Selfish Behavior in CSMA/CA Networks

On Selfish Behavior in CSMA/CA Networks On Selfish Behavior in CSMA/CA Networks Mario Čagalj, Saurabh Ganeriwal,ImadAad and Jean-Pierre Hubaux School of Computer and Communication Sciences Ecole Polytechnique Fédérale de Lausanne (EPFL), CH-1015

More information

On Scheduling for Minimizing End-to-End Buffer Usage over Multihop Wireless Networks

On Scheduling for Minimizing End-to-End Buffer Usage over Multihop Wireless Networks On Scheduling for Minimizing End-to-End Buffer Usage over Multihop Wireless Networs V.J. Venataramanan and Xiaojun Lin School of ECE Purdue University Email: {vvenat,linx}@purdue.edu Lei Ying Department

More information

Models and Techniques for Network Tomography

Models and Techniques for Network Tomography Proceedings of the 21 IEEE Worshop on Information Assurance and Security T1C2 13 United States Military Academy West Point NY 5 6 June 21 Models and Techniques for Networ Tomography Stephan Bohace bohace@mathuscedu

More information

Design and Analysis of Multichannel Slotted ALOHA for Machine-to-Machine Communication

Design and Analysis of Multichannel Slotted ALOHA for Machine-to-Machine Communication Design and Analysis of Multichannel Slotted ALOHA for Machine-to-Machine Communication Chih-Hua Chang and Ronald Y. Chang School of Electrical and Computer Engineering, Purdue University, USA Research

More information

Performance Analysis of License Assisted Access LTE with Asymmetric Hidden Terminals

Performance Analysis of License Assisted Access LTE with Asymmetric Hidden Terminals Performance Analysis of License Assisted Access LTE with Asymmetric idden Terminals arim Lee, yoil Kim, Senior Member, IEEE, yun Jong Yang, Member, IEEE, Jeong Tak Kim, and SeungKwon Baek arxiv:62.4244v

More information